2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE)最新文献

筛选
英文 中文
Distance measurement using 3D stereoscopic technique for robot eyes 机器人眼睛三维立体距离测量技术
Sainatee Boonkwang, Saiyan Saiyod
{"title":"Distance measurement using 3D stereoscopic technique for robot eyes","authors":"Sainatee Boonkwang, Saiyan Saiyod","doi":"10.1109/ICITEED.2015.7408947","DOIUrl":"https://doi.org/10.1109/ICITEED.2015.7408947","url":null,"abstract":"This paper proposes a distance measurement system for robots using a 3D stereoscopic technique, which is a new approach for solving the problem of measuring objects in a 3D image system. This can effectively measure the images precisely. Therefore, this paper focuses on the detection system and measuring the distance to an object using image processing techniques and 3D stereoscopic vision for robot eyes. We propose the new equations to calculate the distance by looking through 2 cameras for calculating the distance by using an equation and watching the virtual image in real time. We have tested by setting the camera focus point at 2 meters. The focus object and neighbor objects were placed on control environment. The experimental results show that the error of proposed distance measurement system were lower than 10 percent when compared to the actual measurement.","PeriodicalId":207985,"journal":{"name":"2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129315381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Robust control of Control Moment Gyroscope with friction disturbance - Using polytopic representation 具有摩擦扰动的控制力矩陀螺仪的鲁棒控制——基于多面体表示
T. Inaba, Chinatsu Murai, Gan Chen, I. Takami
{"title":"Robust control of Control Moment Gyroscope with friction disturbance - Using polytopic representation","authors":"T. Inaba, Chinatsu Murai, Gan Chen, I. Takami","doi":"10.1109/ICITEED.2015.7409010","DOIUrl":"https://doi.org/10.1109/ICITEED.2015.7409010","url":null,"abstract":"This paper presents robust control design for Control Moment Gyroscope (CMG). There are practical difficulties in the control design of CMG. First, friction occurs on the rotation axis of CMG. Second, CMG is a nonlinear system. Third, there are uncertainties in the mathematical model of CMG. In this study, those practical difficulties are solved. The controller is designed to compensate the friction. The controller has the integrator for the error between state and reference to eliminate steady-state error. There are trigonometric functions of a state variable in the mathematical model of CMG. In this study, the trigonometric function is approximated more exactly by not first-order but third-order Taylor series expansion. The mathematical model involving those high order terms is represented as the equivalent first-order system by using descriptor representation and linear fractional transformation (LFT). The robust stability for the system with those trigonometric functions is guaranteed by using polytopic representation based on Linear Matrix Inequalities (LMIs). The moment of inertia has one of the uncertainties in the mathematical model. It is treated as the uncertain parameter in this study. The robust stability for the system with the uncertainty is guaranteed by using polytopic representation based on LMIs. The effectiveness of the proposed controller is illustrated by simulations.","PeriodicalId":207985,"journal":{"name":"2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114175553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compact dual wideband asymmetric cross patch antenna fed by cross strip line for WLAN and WiMAX applications 紧凑的双宽带非对称交叉贴片天线,由交叉带线馈电,用于WLAN和WiMAX应用
Y. Chawanonphithak
{"title":"Compact dual wideband asymmetric cross patch antenna fed by cross strip line for WLAN and WiMAX applications","authors":"Y. Chawanonphithak","doi":"10.1109/ICITEED.2015.7408918","DOIUrl":"https://doi.org/10.1109/ICITEED.2015.7408918","url":null,"abstract":"This paper presents a compact dual wideband asymmetric cross patch antenna fed by cross strip line for WLAN and WiMAX applications over the frequency band of (WLAN: 2.4-2.484 GHz, 5.15-5.35 GHz and 5.725-5.825 GHz) and (WiMAX: 2.5-2.69, 3.3-3.7, and 5.25-5.85 GHz). The antenna designed on an FR4 substrate with a thickness of 1.6 mm and the relative permittivity of 4.4, is fed by a 50Ω transmission line with SMA connector, and is of size with 25mm × 35mm in dimensions. The measured results show that the compact antenna achieves a broad operating bandwidth of 2.38-2.79 GHz and 4.51-5.87 GHz for |S11|<; -10 dB and omnidirectional radiation pattern. The measured gains of the antenna at 2.4 GHz and 5.5 GHz frequencies are 1.55 dBi and 3.11 dBi, respectively.","PeriodicalId":207985,"journal":{"name":"2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116228644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-thread performance on a single thread in-memory database 单线程内存数据库上的多线程性能
Ramot Lubis, Albert Sagala
{"title":"Multi-thread performance on a single thread in-memory database","authors":"Ramot Lubis, Albert Sagala","doi":"10.1109/ICITEED.2015.7409012","DOIUrl":"https://doi.org/10.1109/ICITEED.2015.7409012","url":null,"abstract":"Industries have now leveraged commodity hardware on their big data products. When it comes to big-data, large scale tasks are executed with a huge amount of data being processed and optionally stored in persistent storage. One of leading innovation in alternative NoSQL and big data which enables low cost commodity hardware plays role is Redis, an in-memory database technology. Instead of disk, memory used in Redis is mainly to avoid latency during I/O processes. Big data processes require tons of I/O process on storage. This makes in-memory database run faster than conventional disk-optimized database. This research is an attempt to expose latency and improve performance by experimenting multi-thread approach during short message (SMS) delivery in single-thread Redis environment in combination with Rapidpro, a mass SMS management platform.","PeriodicalId":207985,"journal":{"name":"2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126162712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A means for visualization of skills in software development 一种在软件开发中可视化技能的方法
Takahiro Yonamine, K. Yajima, Y. Takeichi, J. Sato, Yasushi Kato, Makoto Yamazaki
{"title":"A means for visualization of skills in software development","authors":"Takahiro Yonamine, K. Yajima, Y. Takeichi, J. Sato, Yasushi Kato, Makoto Yamazaki","doi":"10.1109/ICITEED.2015.7408902","DOIUrl":"https://doi.org/10.1109/ICITEED.2015.7408902","url":null,"abstract":"The total number of students, who graduate from all the colleges of National Institute of Technology (NIT) Japan, is over 10,000 every year. The college graduates are highly evaluated from the industrial world for over 50 years. In order for the students to acquire high skills, the curriculum in NIT should be combined lectures with experiments and/or practical trainings. However the skills of experiments and practical trainings are implicit know-how up to now. Therefore, we make the skills be explicit knowledge for improvement of skills. In this paper, we propose a method to visualize the skills, and we introduce an approach to decide the level of achievement of experiments and practical training skills. This approach is almost based on original lab manuals, but in order to evaluate of ICT and Software skills, we attempt to use \"i Competency Dictionary\". In order to propose our methods, we checked and evaluated over 300 lab manuals. The experimental skill-sheets and the evaluation-sheets that are the vital part of our methods, have been developed using the learning items, which derived from those manuals in manually. It is possible to visualize each student's skills by defining evaluation standard with the sheets. The evaluation standard is one of the tools to guide students to their final target effectively and clearly. Using our methods, the level of achievement and the motivation of students' skills will be improved drastically in the experimental subjects and practical trainings.","PeriodicalId":207985,"journal":{"name":"2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123735183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of the internet using behavior of adolescents by using data mining technique 基于数据挖掘技术的青少年网络使用行为分析
Chonnikarn Rodmorn, Mathuros Panmuang, Khuanwara Potiwara
{"title":"Analysis of the internet using behavior of adolescents by using data mining technique","authors":"Chonnikarn Rodmorn, Mathuros Panmuang, Khuanwara Potiwara","doi":"10.1109/ICITEED.2015.7408979","DOIUrl":"https://doi.org/10.1109/ICITEED.2015.7408979","url":null,"abstract":"Internet using behavior of teenagers is very vulnerable to threats, because internet information has both positive and negative aspects in which teenagers try to imitate what they see, but they cannot judge for themselves what is appropriate or not. Teenagers are curious, and always want to know more about new thing, but they lack the experience in decision-making, and since this phase of life is known as the transition period of life full of physical, mental, emotional changes which affect the social relationships; therefore, they need attention and proper advice and guidance from their parents which is very important to determine the role or behavior from their children. From the above mentioned, we investigated the relation between the upbringing of their parents, internet using behavior and experience of teenagers. We use data mining technique to group parents and teenagers into clusters, and then use the association rule technique to investigate the relationship of upbringing of parents that affect internet using behavior of teenagers.","PeriodicalId":207985,"journal":{"name":"2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129618336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusion detection model based on ensemble learning for U2R and R2L attacks 基于集成学习的U2R和R2L入侵检测模型
Ployphan Sornsuwit, S. Jaiyen
{"title":"Intrusion detection model based on ensemble learning for U2R and R2L attacks","authors":"Ployphan Sornsuwit, S. Jaiyen","doi":"10.1109/ICITEED.2015.7408971","DOIUrl":"https://doi.org/10.1109/ICITEED.2015.7408971","url":null,"abstract":"Intrusion Detection System (IDS) is a tool for anomaly detection in network that can help to protect network security. At present, intrusion detection systems have been developed to prevent attacks with accuracy. In this paper, we concentrate on ensemble learning for detecting network intrusion data, which are difficult to detect. In addition, correlation-based algorithm is used for reducing some redundant features. Adaboost algorithm is adopted to create the ensemble of weak learners in order to create the model that can protect the security and improve the performance of classifiers. The U2R and R2L attacks in KDD Cup'99 intrusion detection dataset are used to train and test the ensemble classifiers. The experimental results show that reducing features can improve efficiency in attack detection of classifiers in many weak leaners.","PeriodicalId":207985,"journal":{"name":"2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133583852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Finding potential influences of a specific financial market in Twitter 在Twitter中发现特定金融市场的潜在影响
Nont Kanungsukkasem, Teerapong Leelanupab
{"title":"Finding potential influences of a specific financial market in Twitter","authors":"Nont Kanungsukkasem, Teerapong Leelanupab","doi":"10.1109/ICITEED.2015.7408982","DOIUrl":"https://doi.org/10.1109/ICITEED.2015.7408982","url":null,"abstract":"This paper proposes a new framework to identify and rank Twitter accounts of which short messages or tweets may influence a specific financial stock price. In this paper, we start by mainly focusing on the first step of our framework, selecting potential influencers based on their association with a particular stock market. With numerous limitations of Twitter service to access and acquire Twitters data, a new methodology is also proposed to use a List feature to select potential financial influencers. It requires only Lists of accounts that contain an official Twitter account of the specific financial market, provided by Twitter's users, through Twitter API. Our methodology is designed to use only a small amount of data, by which it can be practically used under the limitation of Twitter API's crawling rate. Experimental results show that most of the potential influencers returned by our methodology are similar and related to the specific financial markets, which are companies listed on S&P 500 in this experiment. Most of the returned influencers are the official accounts of company or organization from the same sector and news media with a special emphasis on the same industry. Comparing to Twitter's user recommendation service (Who-To-Follow) and a crowdsourcing search for topic experts (Cognos), our methodology returns more related accounts in both percentage and the number.","PeriodicalId":207985,"journal":{"name":"2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114212943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A refugee tracking system in dCoST-ER: Disaster command and support centre for emergency response dCoST-ER中的难民跟踪系统:紧急反应灾害指挥和支持中心
L. Nugroho, Kurnianingsih, A. Rakhman, Widyawan, Lutfan Lazuardi
{"title":"A refugee tracking system in dCoST-ER: Disaster command and support centre for emergency response","authors":"L. Nugroho, Kurnianingsih, A. Rakhman, Widyawan, Lutfan Lazuardi","doi":"10.1109/ICITEED.2015.7408929","DOIUrl":"https://doi.org/10.1109/ICITEED.2015.7408929","url":null,"abstract":"In dealing with chaotic condition during disasters, speedy and accurate response is an important task. One of critical concerns in disaster situation is the separation of family members because of high people movement in natural disaster evacuation. An important humanitarian action for that situation is tracking refugees so that they can be reunited with their families. We have designed a system for refugee tracking. The tracking system is part of a bigger system for a more comprehensive disaster response. The tracking system identifies refugees based on their personal ID and records their location. Once a refugee can be identified and tracked, the system can search for the other family members and group them for better treatment. A prototype of the system is also presented.","PeriodicalId":207985,"journal":{"name":"2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114250994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Requirements traceability on web applications web应用程序的需求可追溯性
Waraporn Jirapanthong
{"title":"Requirements traceability on web applications","authors":"Waraporn Jirapanthong","doi":"10.1109/ICITEED.2015.7408905","DOIUrl":"https://doi.org/10.1109/ICITEED.2015.7408905","url":null,"abstract":"The development of software products is currently being expanded to be based on web applications. Due to the time constraints, software design and development for web applications are driven. It leads the software or applications become more complex. Identifying impacts of changes or relations takes a lot of time and effort. One challenge is to enable traceability on software artefacts created during the development of web applications. Moreover, it is believed that analysis of data obtained from traceability relations is another way to make software process more efficient. However, it is absolutely not an easy task due to lack of guidelines, support, and tools. This research thus aims to enable software traceability on the development of web applications which involve many types of documents.","PeriodicalId":207985,"journal":{"name":"2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116524192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信