{"title":"Performance Analysis of Wireless Control Area Network (WCAN) Using Token Frame Scheme","authors":"W. Ng, C. K. Ng, N. Noordin, B. Ali","doi":"10.1109/ISMS.2012.74","DOIUrl":"https://doi.org/10.1109/ISMS.2012.74","url":null,"abstract":"This paper presents the performance analysis of Wireless Controller Area Network (WCAN). The said WCAN is an adaptation of CAN protocol which follows the data-centric approach. WCAN uses token frame method in providing channel access to nodes in the system. This method allow nodes to share a common broadcast channel by taking turns in transmitting upon receiving the token frame that are circulating around the network for a specified amount of time. The token frame allows nodes to access the network one at a time, giving 'fair' chance to all nodes to transmit, instead of competing with one another. Message with highest priority has the highest priority to transmit. The token frame method provides high throughput in a bounded latency environment. WCAN is tested in a simulation environment and is found outperforms IEEE 802.11 in a ring network environment in terms of network scalability and high data rate.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117317211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modulation of Spatial Attention by Emotional Expression","authors":"M. Molavi, Jasmy bin Yunus","doi":"10.1109/ISMS.2012.124","DOIUrl":"https://doi.org/10.1109/ISMS.2012.124","url":null,"abstract":"After the gaze is shifted to some events or objects peripherally, the attention mechanism follows it. It is aimed to investigate the emotion and spatial attention dynamic by neural processing of subsequent expression stimuli. The Posner as a gaze cueing paradigm has been used to study the spatial attention mechanism. It is investigated the effect of expression facial cues and meaningful word targets on event-related potential (ERPs) extracted from recorded Electroencephalography (EEG) as indices of gaze-directed orienting. According to analyzes the ERPs component (P1 and N1), Results show that special attention and motivational significantly approach by happy emotion. Understanding the mental chronometry of joint mutual special attention and emotion is implicated by results.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123250956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multidirectional Local Feature for Speaker Recognition","authors":"A. Mahmood, M. Alsulaiman, G. Muhammad","doi":"10.1109/ISMS.2012.45","DOIUrl":"https://doi.org/10.1109/ISMS.2012.45","url":null,"abstract":"This paper proposes a new feature extraction method called multi-directional local feature (MDLF) to apply on an automatic speaker recognition system. To obtain MDLF, a linear regression is applied on FFT signal in four different directions which are horizontal (time axis), vertical (frequency axis), diagonal 45 degree (time-frequency) and diagonal 135 degree (time-frequency). In the experiments, Gaussian mixture model with different number of mixtures is used as classifier. Different experiments were conducted using all alphabets of Arabic for speaker recognition systems. Experimental results show that the proposed MDLF achieves better recognition accuracies than the traditional MFCC and Local features for speaker recognition system.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123578913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Improvement of Overlay Networks for P2P Systems Using Trust-Based Mechanisms","authors":"Ayaz H. Khan, Shoieb Arshad","doi":"10.1109/ISMS.2012.135","DOIUrl":"https://doi.org/10.1109/ISMS.2012.135","url":null,"abstract":"Emergence of peer-to-peer (P2P) networks has provided a new dimension to overlay networks. People can help each other by sharing the contents of which other people may not have strength to purchase. Besides these generous peers, there are some other peers who always try to harm the network by providing harmful data or just block the activities with invalid responses and dropping lookup queries to fail the searches by the source peers. These problems force the researchers to introduce trust system into the peer-to-peer networks to isolate the malicious nodes from the generous nodes. In this paper, we have evaluated the effects of malicious nodes in the network by running the simulation of GIA (GIAnduia: an unstructured P2P network, creates the overlay network based on nodes capacities) using OverSim and found out that how we can improve the performance of P2P systems by creating the network based on trust -- based topologies.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115502445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Random Feature Selection Method for Classification of Mammogram Images","authors":"I. Faye","doi":"10.1109/ISMS.2012.125","DOIUrl":"https://doi.org/10.1109/ISMS.2012.125","url":null,"abstract":"This article discusses the use of a random feature selection method for classification of mammogram images using a multi-scale transform. Each image is represented by a vector of coefficients. Subsets of columns are randomly generated and used for classification of a training set. The subsets achieving a predefined performance are kept and pooled in a final set for testing. The method is tested using a set of images provided by the Mammography Image Analysis Society (MIAS) to differentiate normal and abnormal images. In our experiments the classifiers K nearest neighbors (kNN) and Discriminant Analysis (DA) are used with Wavelet transform.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128853275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of Age on Formant Frequencies of Malay Children between 7-12","authors":"A. Zourmand, A. Mahmoudi, J. Marimuthu, H. Ting","doi":"10.1109/ISMS.2012.127","DOIUrl":"https://doi.org/10.1109/ISMS.2012.127","url":null,"abstract":"The purpose of this study was investigate the first four formant frequencies of sustained vowels in normal Malaysian Malay children to find out the effect of age and gender on them. Thus there were several studies about formant frequencies which have been done for adults so far, but still look into the formant frequencies of Malay vowels produced by Malay children have not been well-established. The need to investigate on the effect of age and gender on formant frequency values on children is also obvious. The 360 normal Malay children in 6 different age groups were asked to pronounce all 6 Malay vowels in 5 seconds. The first four formant frequencies of all 6 Malay sustained vowels were extracted for each children in all age groups and the regression line, Mean and Standard Deviation of them were calculated. The results showed that generally Malay children females had higher formant frequency than their male counterparts. The trend reduced during the age growing up. The results also showed that F1 and F3 decreased clearer and more remarkable than F2 and F4 by rising the age.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128786152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Gary Shafer, E. Saputra, K. A. Bakar, F. Ramadhani
{"title":"Modeling of Fuzzy Logic Control System for Controlling Homogeneity of Light Intensity from Light Emitting Diode","authors":"Muhammad Gary Shafer, E. Saputra, K. A. Bakar, F. Ramadhani","doi":"10.1109/ISMS.2012.90","DOIUrl":"https://doi.org/10.1109/ISMS.2012.90","url":null,"abstract":"The use of Light Emitting Diode (LED) as the lighting device becomes popular due to its energy-efficient characteristic. However, LED has radiation angle that is relatively smaller than other types of lighting device. This results in heterogeneity of light intensity that received by particular point near the LED. To obtain homogeneity of light intensity, this paper proposes a model of fuzzy logic control system to control illumination of LEDs lamp in a room. This model involves several components, namely LEDs lamp, LED driver, illumination sensor, microcontroller, and a differential transceiver RS-485. The fuzzy logic control system that used in this model uses error of illumination and delta error of illumination as input parameter. As output, this control system will change duty cycle of Pulse Width Modulation (PWM) that used to control illumination of LEDs lamp. Based on experiment result, when expected light intensity is set to 150 Lux, homogeneity of light intensity can be achieved with error less than 2%. In addition, the control system also can reduce energy consumption up to 40% under the experimental environment.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117238331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Paramasivam, V. Adhinarayanan, S. Gopalakrishnan
{"title":"Design and Implementation of Automated Wave-Pipelined Circuit Using ASIC","authors":"R. Paramasivam, V. Adhinarayanan, S. Gopalakrishnan","doi":"10.1109/ISMS.2012.92","DOIUrl":"https://doi.org/10.1109/ISMS.2012.92","url":null,"abstract":"Wave-pipelining enables a digital circuit to be operated at higher frequency. In the literature, only trial and error and manual procedures are adopted for the choice of the optimum value of clock and clock skew between the I/O registers of wave-pipelined circuits. The major contribution of this paper is the proposal for automating the above procedure for the ASIC implementation of wave-pipelined circuits using built in self test approach. This is studied by a multiplier using dedicated AND gate by adopting three different schemes: wave-pipelining, pipelining and non-pipelining. From the implementation results, it is verified that the wavepipelined multipliers are faster by a factor of 1.08 compared to the non-pipelined multipliers. The wavepipelined multiplier dissipates less power in the factor of 1.43 compared to the pipelined multiplier.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121548743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement on Agglomerative Hierarchical Clustering Algorithm Based on Tree Data Structure with Bidirectional Approach","authors":"Hussain Mohammad Yousef Abu Dalbouh, N. Norwawi","doi":"10.1109/ISMS.2012.13","DOIUrl":"https://doi.org/10.1109/ISMS.2012.13","url":null,"abstract":"Hierarchical clustering algorithms take an input of pair wise data-item similarities and output a hierarchy of the data-items. This paper presents bi-directional agglomerative hierarchical clustering algorithm to create a bottom-up hierarchy, by iteratively merging the closest pair of data-items into one cluster. The result is a rooted AVL tree. The n leafs correspond to input data-items that need to n/2 or n/2+1 steps to merge into one cluster, correspond to groupings of items in coarser granularities climbing towards the root. As observed from the time complexity and number of steps needed to cluster all data points into one cluster perspective, the performance of the bi-directional agglomerative algorithm using tree data structure is better than the current agglomerative algorithms. Analysis on the experimental results indicates that the improved algorithm has a higher efficiency than previous methods.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116556820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Neuro-modelling Using Bacterial Foraging Optimisation with Fuzzy Adaptation","authors":"H. Supriyono, M. Tokhi","doi":"10.1109/ISMS.2012.107","DOIUrl":"https://doi.org/10.1109/ISMS.2012.107","url":null,"abstract":"This paper presents current work on fuzzy adaptation of chemotactic step size of bacterial foraging algorithm and its application to optimisation of parameters of a neural network, i.e. weights, biases and slope parameters of activation function, in modelling of a single-link flexible manipulator. Experimental input-output data pairs gathered from a laboratory-scale single-link flexible manipulator rig are used both in the modelling and validating phases. Moreover, a set of correlation tests is used to validate the resulted model. The objective of the work is to assess the performances of the improved bacterial foraging algorithms in comparison to standard one based on the cost function value achieved, convergence speed, and time-domain responses.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124110283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}