Loading...

Proceedings of

International Conference on Advances in Computer and Electronics Technology ACET 2014

Date
27-Aug-2014
Location
CITY UNIVERSITY F HONGKONG , Hong Kong
Authors
80
ISBN
978-1-63248-024-8

29 Articles Published

1. PERFORMANCE ANALYSIS OF EDGE DETECTORS FOR PALMPRINT MATCHING

Authors: SARAVANAN CHANDRAN

Abstract: The palmprint has been used for future prediction of human being. In the recent years the palmprint has been used for biometric applications as human verification. The palmprint has many lines of different sizes and directions. The lines are detected as edges using popular edge detecting algorithms such as Sobel, Prewitt, Roberts, Log, Zero-cross, and Canny. Thus, an analysis work has been performed on these popular edge detection algorithms to identify suitable edge detection algorithm which improves the palmprint matching process. The experiment results reveal that the canny edge detection algorithm identifies complete set of edges of various sizes compared with other popular edge detection algorithms. Moreover, the Sobel edge detection algorithm identifies the medium and as well as longer lines. Further, the Prewitt, Roberts, Log, and Zero-cross edge detection algorithms ignore the small lines and identifies only the main longer lines. Thus, the analysis work confirms the Canny and

Keywords: Palmprint, Edge Detection, Biometrics

Pages: 1 - 3 | DOI: 10.15224/978-1-63248-024-8-01

2. A CORNER DIFFERENTIATION WITH ULTRASONIC SENSORS FOR INDOOR ROBOT NAVIGATION

Authors: KUO-YI CHEN , REN-YI HUANG

Abstract: With the growing trend of indoor mobile robots in the present day, such as elder caring and shopping helper, the issue of indoor robot navigation is becoming very important. In order to navigate mobile robots walk around in a room environment safely, the building of an indoor map is critical. However, the corner differentiation is usually becoming a significant issue. A robot should visit all corners and their consisting planes in a room correctly. Therefore, an efficient corner differentiation approach is essential for an indoor robot. In order to improve this issue, an effective corner differentiation is proposed in this paper to develop an indoor map building process.

Keywords: mobile robot, indoor map building, corner differentiation.

Pages: 4 - 8 | DOI: 10.15224/978-1-63248-024-8-02

3. AN EMPIRICAL STUDY OF ACCURACY OF MOBILE LOCATION POSITIONING IN CELLULAR NETWORKS

Authors: CHI-IN WONG , KIN-YEUNG WONG , MAN-HOK WONG , SHEUNG-ON CHOY

Abstract: Mobile applications that provide location-based services need to retrieve the user's current location. It is well known that the location of a mobile device can be determined by using GPS. In addition to GPS, the use of network-based location estimation methods in today’s mobile devices is common. This paper aims to study the accuracy of the network-based location estimation methods in cellular networks. An empirical study is carried out to find out the major factors that affect the accuracy of location estimation. Firstly, a number of measurement tools are developed and identified for the collection of location information of a mobile device. The information includes the actual location and those locations that are estimated by different external location providers. Secondly, a number of experiments are designed to collect location information in different situations and conditions. Thirdly, data are processed and analyzed to identify the major factors that affect the accuracy. Our ex

Keywords: Cellular, GPS, Positioning, Location Services

Pages: 9 - 14 | DOI: 10.15224/978-1-63248-024-8-03

4. A CENTRALIZED WEB3D FOR ARCHIVING AND VIEWING CULTURAL ARTIFACTS BASED ON WEBGL TECHNOLOGY

Authors: WEERAPHAN CHANHOM

Abstract: This paper proposes the prototype of a centralized system for archiving and viewing cultural artifacts in 3D based on WebGL technology. The objectives of this project are providing a platform to integrate data from different museums and providing services for both cultural experts and public entities to visualize artifacts in 3D. The prototype include three parts, which are Producer side, Server side, and Consumer side. In addition, the result of the system could enable the exchange of knowledge and experience between people in their societies

Keywords: Web3D, WebGL, computer 3D graphic, 3D cultural artifact

Pages: 15 - 19 | DOI: 10.15224/978-1-63248-024-8-04

5. INFECTION DECTECTION IN COMPLEX NETWORKS WITH COMMUNITY STRUCTURES

Authors: GAOXI XIAO , YI YU

Abstract: Infection detection is of significant importance as it allows early reaction and proper measures for infection control. Existing studies typically propose algorithms for finding the best locations for a given number of monitors in order to achieve most effective early detection. In this work, we examine the influences of community structures on infection detection. Specifically, a few different cases are tested where monitors are deployed in two community networks, namely community random network and community scale-free network, respectively. By comparing the average/maximum infection sizes in different networks with different community strengths, we show that the existence of community structures, in most cases, helps significantly reduce the infection size. We also test the case where each monitor has a certain probability failing to detect the infection. Simulation results show that in the community networks, similar to that in random networks without community structures, even a l

Keywords: complex network, infection detection, community structure, system reliability

Pages: 20 - 24 | DOI: 10.15224/978-1-63248-024-8-05

6. VARIANT OF GENETIC ALGORITHM AND ITS APPLICATIONS

Authors: CHANCHAL KUMAR , DINESH PRASAD SAHU , SHIV PRAKASH , , TARUN KUMAR GUPTA

Abstract: For very long time, finding solutions to problems like Travelling Salesmen Problem, Multiple Knapsack Problems, scheduling in heterogeneous system etc. were considered very tedious task. The solution to such problems was time consuming and requires high end computations. Genetic Algorithm (GA) emerged as an efficient solution and considered as a successful tool to solve such problems for many years. With the passage of time, researchers find GA traps near optimal solution. Therefore, the concept of Quantum computing is merged with GA and known as Quantum Genetic Algorithm (QGA). The evaluation of the performance of proposed model is done over scheduling in distributed computing.

Keywords: GA, GA and QGA Operators, QC, QGA, DC, Scheduling

Pages: 25 - 29 | DOI: 10.15224/978-1-63248-024-8-06

7. SIMULATION OF CASCODE LNA USING LADDER MATCHING NETWORKS FOR WIRELESS APPLICATIONS

Authors: ABU BAKAR IBRAHIM , MOHAMAD FADZIL BASIR AHMAD , MOHAMAD SHUKOR AMIN , ZAN AIZUWAN ZAINAL ABIDIN

Abstract: This paper presents a design of Cascode LNA using ladder matching network applicable for wireless applications. It’s using the FHX76LP Low Noise SuperHEMT FET transistor. The LNA designed used Ladder-matching network consisting of lump reactive element at the input and the T-matching network at output terminal. The cascode low noise amplifier (LNA) produced gain of 19.23 dB and noise figure (NF) of 1.03 dB. The input reflection (S11) and output return loss (S22) are -15.3 dB and -12.7 dB respectively. The bandwidth of the amplifier recorded is 1.5 GHz. The input sensitivity is compliant with the IEEE 802.16 standards

Keywords: Cascode LNA, Radio Frequency, Ladder -Matching Network

Pages: 30 - 33 | DOI: 10.15224/978-1-63248-024-8-07

8. SECURITY IMPROVEMENT IN ETC NETWORK USING RC4-LOGISTIC CHAOTIC ENCRYPTION

Authors: JIA LI , LIPING ZHANG , QING CHEN , SHANYU TANG , WEI ZHANG

Abstract: Electronic Toll Collection (ETC) is a charging method in intelligent transportation systems, which transmits information over ETC network. The information is subject to eavesdropping and interfering on ETC network owing to the defects of mutual authentication standard in Dedicated Short Range Communication (DSRC) protocol, the inherent security vulnerabilities of WSN and some other problems associated with the ETC network. In order to improve information security for ETC network and ensure every toll transaction could be successfully finished, we paid more attention to Wireless Sensor Network (WSN) as a part of the whole ETC network and proposed an information protection method based on a RC4-Logistic chaotic encryption algorithm. The proposed method not only enhanced the security of WSN in key manage and information encryption, but satisfied the limitation in battery and CPU power of wireless sensor nodes. The results from our experiments demonstrated that our propose method not only

Keywords: Information security, ETC network, RC4-logistic chaotic algorithm, WSN

Pages: 34 - 38 | DOI: 10.15224/978-1-63248-024-8-08

9. WEARABLE HAND REHABILITATION TRAINING SYSTEM

Authors: CHUN-YU YEH , JIA-RU YOU , MING-YI GAO , YA-HSIN HSUEH , YU-HUNG LIN

Abstract: This study applies real-time visual feedback game to increase the rehabilitation intention of patients, which allows patients to perform related upper limb training movements during game. 6-axis-accelerometer/gyroscope is used as wearable device and submits values to a tablet computer through Bluetooth. In this system, patients wear the device on hand. The system is combined with hand rehabilitation training game APP to make patients practice wrist range of motion, wrist stretch and forearm pronation and supination during rehabilitation. This system can not only improve hand agility but also increase connection with life.

Keywords: accelerometer/gyroscope, hand rehabilitation, APP

Pages: 39 - 42 | DOI: 10.15224/978-1-63248-024-8-09

10. PEST IDENTIFICATION USING IMAGE PROCESSING TECHNIQUES IN DETECTING IMAGE PATTERN THROUGH NEURAL NETWORK

Authors: BARTOLOME T. TANGUILIG , BOBBY D. GERARDO , JOHNNY L. MIRANDA

Abstract: In rice production, pest invasion is considered as the most challenging task for crop technicians and farmers. Pest invasion can cause serious losses and affect the income of farmers. It is then important to assess their density for pests forecasting decision making. Existing identification techniques of these species comprise of using different traps to detect their presence. However, these traditional methods are labor-intensive and sometimes experts on this field are not available. Another problem is that multiple site and frequent monitoring of rice pests is time consuming and tedious for a crop technician. This can lead to low accuracy and delays in obtaining accurate count of these species. In this study, an identification system was developed to automatically identify the insect pests in the paddy field. Sticky trap was used to capture the insect which continuously monitored by a wireless camera to record the video. Different image processing techniques was utilized to detect an

Keywords: paddy fields insect pests, automated pest identification, image pocessing, neural network

Pages: 43 - 48 | DOI: 10.15224/978-1-63248-024-8-10

11. ACADEMIC DECISION SUPPORT SYSTEM FOR COLLEGE COMPLETION MODEL

Authors: BARTOLOME T. TANGUILIG , BOBBY D. GERARDO , ALLEN M. PAZ

Abstract: Universities need to have extensive capabilities in order to analyze students’ achievement levels which will help in making appropriate academic decisions. Conversely, academic decisions will result in changes in academic performance which need to be assessed periodically and over spans of time. In this work, the college completion model based on k-means clustering algorithm was utilized in the development of the proposed academic decision support system (DSS). The system utilized data from the university database while the client front-end ensures adequate presentation so as to reveal significant details and dependencies. The system can be used to automate the decision making process of administrators aiming to decrease the high rate of academic failure among students. A real case study in Isabela State University is presented using a dataset collected from 2009-2013.

Keywords: decision support system, k-means clustering, college completion, data mining

Pages: 49 - 53 | DOI: 10.15224/978-1-63248-024-8-11

12. A NOVEL BLENDING METHOD FOR AUTOMATIC SEAMLESS IMAGE MOSAICING

Authors: AHMET HAMDI VAROL , EMRE SUMER

Abstract: An image mosaic is a panoramic image generated by assembling sequential images belong to the same scene . This method is mainly used in mapping applications, the evaluation of the images acquired from unmanned aerial vehicles, and various computer vision applications. In this study, we proposed a novel blending method for automatic seamless image mosaicing from ground level photos taken by an digital camera. For the correction of consistent seams occurred during the mosaicing, we measured the color differences around the overlapping regions. For this purpose, first, we determined the intensity values of image pixels inside and outside the overlapping region boundary within a 1 pixel wide zone. Secondly, the intensity values were averaged and finally, the average values of color differences were applied to overlapping regions. Besides, a motion blur filter was performed for the same boundary regions in order to reduce the seams. In order to test the accuracy, a subjective evaluation met

Keywords: seamless texture, image mosaicing, motion blur, color intensity

Pages: 54 - 589 | DOI: 10.15224/978-1-63248-024-8-12

13. AN AUTOMATIC SCHEDULING OF ACADEMIC TIME TABLE BY USING GENETIC ALGORITHMS

Authors: CHINNAKRIT SITTIHA , PANUWAT KETWONG , SITTICHAI BUSSAMAN

Abstract: Time Table Scheduling is one of optimization problems. It use a skillful human and take a long time for each constraint. Many of researchers try to use computers to manage them automatically. There are two main goals in this research: to schedule the academic time-table of Surin Poly-technical College automatically by using Genetic Algorithms and to find the best condition of Genetic operators for solving the scheduling problem. The best condition was found from 24 experiments; two point crossover followed by position base mutation is the best condition sequence. Having got the sequence, a computer program was implemented by using that condition. The application was useful after testing with the constraints of Surin Poly-technical College

Keywords: Genetic Algorithm, Time Table Scheduling, NPcomplete, Optimization.

Pages: 60 - 63 | DOI: 10.15224/978-1-63248-024-8-13

14. A NONLINEAR ARIMA TECHNIQUE FOR DEBIAN BUG NUMBER PREDICTION

Authors: JAYADEEP PATI , K.K. SHUKLA

Abstract: A bug in a software application may be a requirement bug, development bug, testing bug or security bug, etc. To predict the bug numbers accurately is a challenging task. Both end users and software developers get benefit by predicting the number of bugs in a new version of software application in advance. The choice of predicting models becomes an important factor for improving the prediction accuracy. This paper provides a combination methodology that combines ARIMA and ANN models for predicting the bug numbers in advance. This method is examined using bug number data for Debian which is publicly available. This paper also gives a comparative analysis of forecasting performance of hybrid Nonlinear ARIMA, ARIMA and ANN models. Empirical results indicate that an Nonlinear ARIMA model can improve the prediction accuracy.

Keywords: Debian, Bug, Bug Pattern, Artificial Neural Network, ARIMA, Hybrid Model

Pages: 64 - 68 | DOI: 10.15224/978-1-63248-024-8-14

15. RESIDUAL CHANNEL CODING IN LOW-POWER WSNS USING MINIMUM HAMMING DISTANCE DECODER

Authors: BAFRIN ZAREI , VALLIPURAM MUTHUKKUMARASAMY , XIN-WEN WU

Abstract: Forward Error Correction is an essential requirement for wireless communication systems with high bit error rates. Redundant Residue Number System codes are normally superior in parallel communication environments, such as sensor networks due to their weightless structure. Underlying error correction capability of redundant residue representation has led to the development of a new set of coding schemes. In this research, a novel error control technique, based on the residue number system is proposed and implemented using MATLAB. With the design of a new minimum-Hamming distance decoder, the proposed system achieved a more efficient error correction ability compared to the Reed Solomon code, particularly in lower signal to noise ratios.

Keywords: bit error rate; signal to noise ratio; additive white Gaussian noise; channel coding; wireless sensor networks

Pages: 69 - 73 | DOI: 10.15224/978-1-63248-024-8-15

16. CHALLENGES AND RISKS FOR A SECURE COMMUNICATION BETWEEN A SMARTCARD AND A SERVICE PROVIDER THROUGH CELLULAR NETWORK

Authors: KEREM OK , RAHMI CEM CEVIKBAS , VEDAT COSKUN

Abstract: Smart cards used in mobile phone, namely Subscriber Identity Module (SIM) cards, became a place where various value added services are proposed. SIM cards, in addition to authenticating users to the cellular network, contain a secure storage area, which provides necessary security conditions and performs data encryption and decryption. Mobile Network Operators (MNOs) and service providers such as banks use this area to provide value added services to the users. Security required value added services such as mobile financial services, e-government services, digital signature services can also be offered via SIM cards which require end-to-end secure data exchange between the service provider and the SIM card. In this paper, we analyze the current situation deeply, list several publications those are somewhat related to the subject, and put forward the risks and challenges with the problem.

Keywords: Smart card, SIM card, Mobile Network Operator, Service Provider, end-to-end securit

Pages: 74 - 78 | DOI: 10.15224/978-1-63248-024-8-16

17. DESIGN OF BAND NOTCH UWB CIRCULAR MICROSTRIP ANTENNA

Authors: V. RAJYA LAKSHMI

Abstract: Design of a compact circular micro strip antenna with band notched Ultra-Wide Band (UWB) characteristics has been proposed. The proposed antenna consists of circular radiating patch with a micro strip line type feed structure and employs a simple defected ground structure (DGS) in a rectangular shape to achieve UWB operation. A notch is also designed to avoid the function of the antenna at 5.5 GHz to reject WLAN2 band from 5.15 to 5.825 GHz. The crux of this design strategy is that a ‘C’ shaped slot has been embedded onto the patch antenna to achieve band-stop filtering action at above mentioned frequency. Simulation of the design is done with CST MW Studio 2012 Electromagnetic Simulator.

Keywords: Circular Microstrip antenna, Ultra wide band antenna, Defected ground structure, Notch.

Pages: 79 - 81 | DOI: 10.15224/978-1-63248-024-8-17

18. THE KNOWLEDGE REPRESENTATION OF THE PROGRAM ANALYSIS USING DECISION TREE DATA MINING TECHNIQUE

Authors: CHATKLAW JAREANPON , SASITORN KAEWMAN

Abstract: The Education Data Mining (EDM) is the data mining for analyzing the data from and for education. This paper proposed the framework to analysis the undergraduate program. The selected data mining technique is the well-known Decision Tree Data Mining Technique. This result of this proposed is able to analysis the major subjects that will effect with the student and the registered planning. Moreover, the course management is able to plan the relationship and the program. The experimental result tested from computer simulation from real registration data and grade of department of Informatics, Mahasarakham University shows that the knowledge representation of the program analysis using Decision Tree Data Mining Technique is very well. The average accuracy from k-fold cross validation is 74.05%.

Keywords: Knowledge Representation, Program Analysis, Decision Tree, Data Mining Technique.

Pages: 82 - 85 | DOI: 10.15224/978-1-63248-024-8-18

19. AN EXTENSION OF COMMUNITY EXTRACTION ALGORITHM ON BIPARTITE GRAPH

Authors: HIROSHI SAKAMOTO , KOJI MAEDA , TETSUJI KUBOYAMA , YANTING LI

Abstract: We introduce a truss decomposition algorithm for bipartite graphs. A subgraph G of a graph is called k-truss if there are at least k-2 triangles containing any edge e of G. By a standard breadth-first-search algorithm, we can compute the truss decomposition for large graphs. To extract a dense substructure that represents community in graph G, this method avoids the intractable problem of clique detection. The truss decomposition is not, however, applicable to the bipartite graphs due to its definition. For this problem, we have proposed quasi-truss decomposition introducing an additional set of edges. For this decomposition, there is another problem such that dense subgraphs G1 and G2 are connected with a small number of edges. The previous algorithm detects the sparse structure H = G1 ⋃ G2 as quasi-truss due to the definition. In this paper, we improve the algorithm to extract denser substructures by removing such sparse edges with a top-down strategy. The extended algorithm has been

Keywords: k-truss, community extraction, bipartite graph

Pages: 86 - 90 | DOI: 10.15224/978-1-63248-024-8-19

20. MOBILE GEOFENCING APPLICATIONS: DESIGN ISSUES AND PERFORMANCE EVALUATIONS

Authors: SHEUNG-ON CHOY , SIU-TING WONG

Abstract: Geofencing is becoming more and more important, and there is a lack of standards or metrics to evaluate whether an application is designed appropriately and performs well enough. In this research, an application is built to test about functions of geofencing in Android OS, and it is also a tool for assisting the evaluation of performance. Three performance metrics, namely power consumption, accuracy and responsiveness, are studied. To study the power consumption, an indirect approach is adopted, which is measurement of power endurance of the devices, instead of direct measurement of actual power consumption by the application. Field testing is used to study the accuracy and responsiveness of the application. The test is performed in the format that testers bring along the device, which has the testing application being installed, to walk through a path going through fences’ boundaries which are set before testing. Different location services are enabled and disabled alternately and rep

Keywords: geofencing, android application, design issues, performance evaluations, power consumption, power endurance, accuracy, responsiveness

Pages: 91 - 95 | DOI: 10.15224/978-1-63248-024-8-20

21. IMPROVED CHNNEL ESTIMATION FOR WIRELESS COMMUNICATION SYSTEMS

Authors: BANGWON SEO , CHEULSOON KIM , WON-HO KIM , YOUNG-JO KO

Abstract: We consider LTE-Advanced uplink system where user equipment (UE) transmits its data to eNodeB. In the uplink system, demodulation reference signal (DM-RS) is transmitted for the channel estimation on the center symbol of the resource block allocated to the UE. Also, sounding reference signal (SRS) is transmitted on the last symbol of the resource block periodically. In this paper, we propose an improved channel estimation scheme by using the SRS: lease square (LS)-based scheme. Simulation results show that the proposed channel estimation scheme has better performance than the DM-based conventional scheme.

Keywords: LTE-Advanced system, uplink, channel estimation, demodulation reference signal, sounding reference signal.

Pages: 96 - 99 | DOI: 10.15224/978-1-63248-024-8-21

22. A TECHNIQUE TO MINIMIZE THE POWER CONSUMPTION OF COMPUTER FLEETS

Authors: DANIEL F. GARCIA , JAVIER GARCIA , JOAQUIN ENTRIALGO , RAMON MEDRANO

Abstract: Energy consumption of current computer fleets of most organizations can be substantially reduced by using power management systems. Energy saving is an important matter as, with the sustained increment of the cost of electricity, the monetary savings can be significant. This paper presents a technique to minimize the power consumption of the computer fleet or an organization. The technique is based on a distributed system where a central manager coordinates the local power manager of each computer. A method to determine the profitability of this type of management system is also proposed. The key element to save energy is the idle timer used by local power controllers. When the controller detects that the computer is inactive, it starts the timer, and when the timer expires, the controller puts the computer in suspension or hibernation, or turns off the computer. This paper proposes a systematic technique to estimate the appropriate values of the idle timers for the computers of the fl

Keywords: computer power management systems; enervy saving applications; consumption minimization algorithm

Pages: 100 - 105 | DOI: 10.15224/978-1-63248-024-8-22

23. ROBUST ACTIVE QUEUE MANAGEMENT FOR UNCERTAIN TCP NETWORK CONGESTION CONTROL IN INTERNET

Authors: CHAO-JUNG CHENG , CHI-BIN CHENG

Abstract: This paper presents an active queue management (AQM) method of uncertain TCP network using the robust control. A numerical simulation for AQM of uncertain TCP network is conducted to justify the validity and feasibility of the proposed approach which is robust to high load variations in steady-state behavior.

Keywords: Active queue management, Robust control, Congestion control

Pages: 106 - 108 | DOI: 10.15224/978-1-63248-024-8-51

24. POLICY-BASED SLICE EMBEDDING IN A VIRTUALIZED TESTBED ON KREONET

Authors: DEOKJAI CHOI , KYUNGBAEK KIM , SEUNG-JOON SEOK , SEUNGHAE KIM , WANG-CHEOL SONG

Abstract: Recently, the software-defined networks (SDNs) are the most promising architecture which are mainly composed of the Openflow switches and the Flowvisor. The SDN provides virtualized separate networks as slices on a physical network according to the customer needs. The Flowvisor can provide customers to have their own controller and let the controller handle flow packets in its slice –a virtual network. In this paper we proposes a policy based slice embedding and have deployed a prototype in a virtualized testbed on KREONET – a Korean R and E network. The slice embedding system is designed as a part of aggregation management system to administer our testbed as interact with Flowvisor and slices can be automatically assigned by network resource provisioning with decision of Policy based Engineering (PBE) module in the system. Several points are considered to make policies for slicing so that slice embedding service for provisioning virtualized networks could be automatically deployable.

Keywords: virtualization, Slice embedding, Flowvisor, KREONET

Pages: 109 - 113 | DOI: 10.15224/978-1-63248-024-8-52

25. POSSIBILITY OF USING SMARTPHONES IN DISTRIBUTED COMPUTING NETWORKS

Authors: VIKTOR RÉBAY

Abstract: In this article the possible use of smartphones, as potential resources in a distributed computing system has been examined. First, the performance indexes of smartphones, desktop and notebook computers were compared, considering the six year period of the iPhone product line. In the second part some volunteer computing projects were summarized in a glance, to have a better picture of the necessary performance and donation system. Finally some motivating ideas have been proposed, to gather more donors for a smartphone based distributed computing network.

Keywords: Distributed Computing, Performance index, Geekbench, Smartphone, Smartphone performance

Pages: 114 - 118 | DOI: 10.15224/978-1-63248-024-8-53

26. DATA MODELING USING MHR METHOD

Authors: DARIUSZ JACEK JAKOBCZAK

Abstract: Applied science and mechanics need mathematical methods for 2D processes modeling using the set of data points. A novel method of Hurwitz-Radon Matrices (MHR) is used in 2D curve modeling. Proposed method is based on the family of Hurwitz-Radon matrices which possess columns composed of orthogonal vectors. Two-dimensional process is modeled via different functions: sine, cosine, tangent, logarithm, exponent, arc sin, arc cos, arc tan and power function

Keywords: process modeling, Hurwitz-Radon matrices, coefficient of MHR method, mathematical modeling

Pages: 125 - 128 | DOI: 10.15224/978-1-63248-024-8-63

27. EMPLOYMENT OF GENERALIZED DETECTOR IN SYNTHETIC APERTURE RADAR SYSTEMS FOR SHIP DETECTION

Authors: SAMANEH ROOSTA , VYACHESLAV TUZLUKOV

Abstract: This paper considers a ship detection in synthetic aperture radar (SAR) systems constructed on the basis of generalized detector (GD). To obtain better results without ambiguity it is better to use multi-channel SAR with more than two antennas. However, there are very few SAR systems with more than a single antenna, which is because of the complexity and immense data rates produced by multi-channel systems. So, it is preferred to use single channel SAR systems. In this research a single channel Envisat image is considered, in order to have more accurate result the symmetrical sub-aperture images (multi-look) are obtained from splitting a 1024×1024 part of Envisat image. The GD which is a combination of the Neyman-Pearson detector and the energy detector is applied on three separate sub-apertures with a limited number of ships. The intensity of pixels are compares with the GD threshold to make a decision statistics under hypothesis H0 and H1 to find ships in the sub-apertures.

Keywords: Generalized detector (GD), synthetic aperture radar (SAR), sub-aperture

Pages: 129 - 129 | DOI: 10.15224/978-1-63248-024-8-65

28. KNOWLEDGE-BASED RECONFIGURATION OF DRIVING STYLES FOR INTELLIGENT TRANSPORT SYSTEMS

Authors: GEORGE DIMITRAKOPOULOS

Abstract: The ceaseless evolution of Information and Communication Technologies (ICT) is reflected on their migration towards the Future Internet (FI) era, which is characterized, among others, by powerful and complex network infrastructures, and innovative applications, services and content. An area of applications that finds prosperous ground in the FI era lies in the world of transportation. In particular, recent and future ICT findings are envisaged to contribute to the enhancement of transportation efficiency at various levels, such as traffic, parking, safety and emergency management. In this context, the goal of this paper is to introduce an Intelligent Transportation System (ITS) that utilizes (i) the driver’s preferences, (ii) information extracted from the vehicle sensors, and (iii) previous knowledge and experience, in proposing adaptations of the vehicle’s driving style, in an automated manner. Knowledge is obtained through the exploitation of Bayesian networking concepts and specifi

Keywords: Intelligent Transportation Systems (ITS), vehicular networks, reconfigurable driving, algorithm, Bayesian

Pages: 130 - 136 | DOI: 10.15224/978-1-63248-024-8-60

29. TELLING THE LOCAL STORY: AN INTELLIGENT INTERACTIVE TOUR FOR PAGODA TOURISM USING 360 DEGREE PANORAMA

Authors: GEORGE DIMITRAKOPOULOS , KAVEEPOJ BANLUEWONG , PANIDA SONGRAM , SAMRUAN WIANGSAMUT

Abstract: The “Kuu” is the pagoda located in Mahasarakham province, Thailand. This pagoda is the cultural travel place. The most well-known pagoda named “Santaluk” is located in Nadun district, Mahasarakham province Thailand built with the laterite stone in Cambodia art for collecting the image of Buddha and functioning as the hospital. The interactive tour representation system for pagoda is the database together with the reality application based on Web application that is able to represent the in novel way. User is able to feel like at in the physical travel place. This system is divided into 2 parts that are 1) Pagoda database developed with PHP, HTML together with MYSQL database, and 2) Interactive tour representation system that is collected the 360 degrees picture with in one shot from camera and special lens. The image processing technique is used for transform the picture to the 360 degrees dome where the user located in the center of the dome feels like in the physical travel place. Mo

Keywords: Travel place, Interactive representation system

Pages: 137 - 141 | DOI: 10.15224/978-1-63248-024-8-70

Popular Proceedings

ESSHBS 2017 - 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023 - 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017 - 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017 - 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017 - 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017 - 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022 - 2022

8th International E- conference on Engineering, Technology and Management

SEM 2019 - 2019

9th International Conference on Advances in Social Science, Economics and Management Study