R. A. Z. Daou, Miguel Sfeir Ali Hayek Josef Borcsok Elie Geagea
{"title":"Control of a Powerpoint Presentation Using Eye Movements","authors":"R. A. Z. Daou, Miguel Sfeir Ali Hayek Josef Borcsok Elie Geagea","doi":"10.17781/p002427","DOIUrl":"https://doi.org/10.17781/p002427","url":null,"abstract":"The purpose of this paper is to present a system capable of helping a person to control the slide shows during his/her presentation without the use of his/her hands. In fact, a particular movement in the eye will allow a change in the slide (towards the next or the previous slide). To do so, some electrodes were used in order to record the eyes movements and some electronic circuits as well as a microcontroller were deployed for recognizing the eye movement signal from the noise in order to limit any faulty signal. A wireless signal is sent to the computer in order to move the presentation up or down. The system was tested on several persons while taking into consideration the age, the skin color, the fatigue, the quantity of light, the use of glasses / medical lenses and the results were very promising especially with the hitting percentage that reached more than 90%, which means, in other words, that the error percentage was less than 10%. Keywords—Embedded system; EEG system; Electrodes; Microcontroller; powerpoint presentation control; analog filters;","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126361297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SENSORS-ENABLED SMART ATTENDANCE SYSTEMS USING NFC AND RFID TECHNOLOGIES","authors":"Cheah Boon Chew","doi":"10.17781/p001645","DOIUrl":"https://doi.org/10.17781/p001645","url":null,"abstract":"Attendance system is a system that is used to track the attendance of a particular person and is applied in the industries, schools, universities or working places. The traditional way for taking attendance has drawback, which is the data of the attendance list cannot be reuse and tracking and tracing student’s attendance is harder. The technology-based attendance system such as sensors and biometrics based attendance system reduced human involvement and errors. Thus in this paper, a NFC-based attendance system is presented. A comparative study between this both NFC and RFID is also discussed thoroughly, especially in terms of their architectures, functionality features, benefits and weakness. Overall, even both NFC and RFID attendance system increases the efficiency in recording attendance, NFC system is providing more conveniences and cheaper infrastructure in both operational and setup cost.","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122321823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drone Route Planning for Military Image Acquisition Using Parallel Simulated Annealing","authors":"S. S. Zaghloul","doi":"10.17781/P002316","DOIUrl":"https://doi.org/10.17781/P002316","url":null,"abstract":"","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124212572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bipolar Single Valued Neutrosophic Isolated Graphs: Revisited","authors":"S. Broumi","doi":"10.17781/P002335","DOIUrl":"https://doi.org/10.17781/P002335","url":null,"abstract":"","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MODELING AND UTILIZATION OF AN IPMC MUSCLE","authors":"Mirna Atieh","doi":"10.17781/P0013","DOIUrl":"https://doi.org/10.17781/P0013","url":null,"abstract":"Artificial muscles are one of the most important applications of the technology of flexible structure, designed to imitate human or animal muscles and to monitor its activities and conditions. The aim of our paper is to study the different possibilities of modeling and usage of artificial muscles. Our application is based on three IPMC muscles used to simulate a three fingers grasp. The magnitude of the voltage is utilized to compute the buildup columbic load using the capacitor block in the model. Keywords— Artificial muscle; IPMC Ionic Polymer Metal Composit; Modeling.","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"6 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132747499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEVELOPMENT OF AN INTEGRATED INFORMATION SERVER SYSTEM FOR IT EDUCATION THROUGH SERVER VIRTUALIZATION TECHNOLOGY","authors":"Y. Moritoh, Y. Imai","doi":"10.17781/p001707","DOIUrl":"https://doi.org/10.17781/p001707","url":null,"abstract":"Recent decade years, our educational environments have been already including several kinds of computing infrastructures according to user’s requests. But we are sometimes suffering from lack of suitable methodology to accomplish effective improvement and efficient maintenance. Server virtualization technology is one of the most powerful and ecological solutions to realize information server system for so-called cloud computing. System of our educational information server has been configured with such a virtualization technology and demonstrated in detail for the sake of robust and disturbance-avoiding education environment. Our case of utilization of server virtualization technology has been based on CITRIX Xen open-source virtualization technology because of its flexibility and expandability. This paper describes how to construct educational computing environment with server virtualization and demonstrate some applications of information server into IT-based higher education through practical classroom lecture. And moreover it reports quantitative and qualitative evaluation of such an environment by means of questionnaire from learners, too.","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130437761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ADAPTIVE CACHE REPLACEMENT POLICY (ACRP): A DYNAMIC REPLACEMENT POLICY FOR CACHE MANAGEMENT","authors":"O. Olakanmi","doi":"10.17781/P0017","DOIUrl":"https://doi.org/10.17781/P0017","url":null,"abstract":"The discovery of memory access time as one of the major design issues in the processor has increased effort in the development of different cache replacement policies to manage what to be the content of caches in both uniprocessor and multiprocessor. This is to improve the overall performance of the processor. Most time the potential benefits of these policies are not instantaneous due to the varying nature of the workloads. Therefore, it is difficult to identify which particular policy to apply during cache’s content replacement. In this paper, an adaptive replacement technique using the minimum threshold value of the improvement factor of cache, which was analytically obtained, is proposed in order to explore the combine merits of fundamental replacement policies and strikes a minimum balance with their demerits. ACRP approach uses the threshold values of improvement factor obtained from the analytic modeling to determine when the current replacement policy’s performance becomes or getting worse, the ACRP switches to another replacement policy from the pool of replacement policy. Specifically, the ACRP approach solves the problem associated with wrong usage of replacement policy and reduces processor cache miss rate caused by wrong evictions.","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134509609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Young-jin Go, Buhm Lee Kyoung-Min Kim ByongOk Jung
{"title":"NEW VEHICLE DIAGNOSTIC SYSTEM USING DATA COMBINE AND COMMUNICATION","authors":"Young-jin Go, Buhm Lee Kyoung-Min Kim ByongOk Jung","doi":"10.17781/p002035","DOIUrl":"https://doi.org/10.17781/p002035","url":null,"abstract":"This paper proposed a new vehicle diagnostic system which can combine and analyze C-CAN, B-CAN and analog signals and transfer their data and analyzing results to another mobile system by using LTE. By using this system to a vehicle, small-scale long-hour test is possible on actual running vehicle. This system was implemented and verified by testing for actual vehicle.","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128714663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 3-Dimensional Object Recognition Method Using SHOT and Relationship of Distances and Angles in Feature Points","authors":"H. Kudo, Hiroki Imamura Kazuo Ikeshiro","doi":"10.17781/p002288","DOIUrl":"https://doi.org/10.17781/p002288","url":null,"abstract":"In recent years, a human support robot has been receiving attention. This robot is required to perform various tasks to support humans. Especially the object recognition task, which is important when people request the robot to transport and rearrange objects. Object recognition methods, especially using the 3D sensor are also receiving attention. As conventional object recognition methods using 3dimensional information, Signature of Histogram of OrienTations (SHOT) is commonly used. SHOT performs highly accurate object recognition since SHOT descriptor is represented by 352 dimensions. However SHOT misrecognizes objects which have the same feature but which are not the same objects and if there is occlusion in the 3-dimensional object. As a solution, I would like to propose the object recognition method with high quality by using the positive part of SHOT.","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129548644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Continuous Genetic Algorithms for Optimization of Logistic Networks Governed by Order-Up-To Inventory Policy","authors":"P. Ignaciuk","doi":"10.17781/P002312","DOIUrl":"https://doi.org/10.17781/P002312","url":null,"abstract":"The paper addresses the optimization problem of goods distribution process in logistic networks. The controlled nodes in the considered class of networks form a mesh structure. The stock level at the nodes is replenished from external sources and other nodes in the controlled network. The external demand is imposed on any node without prior knowledge about the requested quantity. Inventory control is realized through the application of order-up-to policy implemented in a distributed way. The aim is to provide high customer satisfaction while minimizing the total holding costs. In order to determine the optimal reference stock level for the policy operation a continuous genetic algorithm is applied and adjusted for the analyzed class of application centered problems.","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134183894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}