{"title":"Enhanced neuromorphic visual processing by segmented neuron for intelligent vehicle","authors":"W. Han, I. Han","doi":"10.1109/SAI.2016.7555999","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555999","url":null,"abstract":"The neuromorphic visual processing framework mimicking the biological vision system offers an alternative process into applying computer vision in everyday environment. With the growing interest for an effective approach for making detection of vulnerable road users for the purpose of safety enhancement, the proposed neuromorphic visual processing was tested on vulnerable road users such as cyclists on the road. The effectiveness of proposed neuromorphic networks of visual processing is evaluated for the vulnerable road user detection technology via maintaining the successful detection rate of over 95% without complex denoising network. The segmented neuron mixed with the rectifier enhanced the performance via extending the detection range by 33 % as well as saving the denoising process. The post enhancement with deep networks becomes flexible that further applications could be sought from incorporating neuromorphic visual processing. The early implementation demonstrated the advantages of fast and robust neuromorphic vision with either the mobile embedded systems of GPU or FPGA hardware processing, or the portable computer based emulator.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mapping sorting algorithm","authors":"Hoda Osama, Yasser Omar, A. Badr","doi":"10.1109/SAI.2016.7556025","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556025","url":null,"abstract":"Computing algorithms are a basic research area in computer science. In last years, many researchers proposed several sorting techniques to enhance time complexity and space complexity [8]. In this paper we present a sorting algorithm for any datatype, which uses mapping methodology. The mapping will be between elements of array and indexes without using any comparisons and swapping. The paper analyzes time complexity of proposed algorithm mathematically and empirically. The complexity of proposed algorithm is O(xlogm)+O(n) where n represents number of sorted elements and m, x<;<;n. Result shows that the Performance of mapping sorting algorithm is better than or almost equal to quick sorting.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116881565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of different sensor systems to classify plant and weed in organic farming applications","authors":"F. Knoll, Tim Holtorf, S. Hussmann","doi":"10.1109/SAI.2016.7556004","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556004","url":null,"abstract":"As part of a research project, a robot with the ability to distinguish root plants and weeds with various sensors will be developed. The given information is then being used to destroy the weeds automatically. This will help to minimize the use of pesticides, or even completely erase it, thus improving the environmental impact. The first step in this project is to evaluate various sensors to find out which sensor and which configuration can be used. Another wanted information is at what time of the plant growth period the plants can be distinguished. Too small plants give too little information to distinguish them. If the plants are too large, they overlap each other so much that the individual plants can no longer be separated good enough.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124375928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learners' acceptance toward blended learning","authors":"Pradit Songsangyos, Supanut Kankaew, N. Jongsawat","doi":"10.1109/SAI.2016.7556085","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556085","url":null,"abstract":"A world of technology-driven innovation is continuously and rapidly growing. People can learn from anywhere and at anytime. However, many people face obstacles when they first use online tools for collaborative learning or social media to support collaborative work. The aims of this survey research are 1) to finding a level of learners' acceptance toward the blended learning courses 2) investigating significant levels of learner satisfaction and acceptance among different groups of learners, computer-related and irrelevant fields of study. The research instrument was the questionnaire, which was divided into two parts, Part 1: Learners' background and Part 2: Learners' acceptance toward the blended learning environment. The questionnaire consists of both open-ended and Likert 5 scale closed-ended questions. Participants in this study were undergraduate students who studied at RMUTSB in the academic year 2014. With stratified sampling, the population is divided into groups that are assigned by the faculties. A simple random sampling is obtained based on students' field of study, computer-related and irrelevant. The data were collected from 300 correspondents and then analysed using statistical software. The statistical techniques include arithmetic means, standard deviation, and t-test. The learners' acceptance toward the blended learning courses in overall is at a very good level, including the perceived ease of use; the perceived usefulness; and behavior intention. There is no significant difference among different groups of learners, computer-related and irrelevant fields of study. For further study, the factors that influence teachers' acceptance with blended learning will be explored. The proportion between online and in-person learning will be included. Other approaches such as a flipped classroom and smart classroom will also be taken into consideration.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122854966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Batteryless radio system for hospital application","authors":"R. Kanan, Obaidallah Elhassan","doi":"10.1109/SAI.2016.7556093","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556093","url":null,"abstract":"This paper presents a design of a batteryless and wireless system that can be used in hospitals to call nurses. Compared to actual nurse calling systems, the proposed transmitter neither needs batteries nor long wires to provide energy. Therefore, it is maintenance-free and can be easily installed. The key feature of the proposed system is that it will harvest its energy from motion. When a patient presses the push button to call a nurse, the mechanical energy converter will convert this small movement into electrical power, and then a radio signal is sent to the receiver module. This activates an alarm at the nurse station's display. Also, this alarm is forwarded to other platforms such as nurse's smart phone and smart watch. The goal of this work is to develop a smart, green, and wireless system unlike most of current nurse calling systems in which are not necessarily the case. Also, the proposed system is user-friendly and Internet of Things (IoT) based architecture.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128359116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The creation of a data management platform for use in the UCWW","authors":"Ivan Ganchev, Zhanlin Ji, M. O'Droma","doi":"10.1109/SAI.2016.7556040","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556040","url":null,"abstract":"This paper presents a cloud-based Data Management Platform (DMP) for use in the Ubiquitous Consumer Wireless World (UCWW) environment for the management of raw data, i.e., for turning `big data' logs of consumers' mobile services activities into actionable analytic dataset, supporting an enhanced Always Best Connected and best Served (ABC&S) access to mobile services. It facilitates the provision of enriched consumer profiling to the real-time service recommendation system utilized within the UCWW. Details of the DMP design and implementation are provided.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127617606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jawad Hussain Awan, S. Memon, M. Shah, Fawad Hussain Awan
{"title":"Security of eGovernment services and challenges in Pakistan","authors":"Jawad Hussain Awan, S. Memon, M. Shah, Fawad Hussain Awan","doi":"10.1109/SAI.2016.7556112","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556112","url":null,"abstract":"In this modern age, as time passes new emerging technologies, cyber services have been introduced. In this regard, most of the developing countries have deployed and implemented these technologies and services Such as: e Banking, eCommerce and eBusiness in their countries. Pakistan is also one of these developing countries, who has implemented and currently using for the citizen, users, businessmen and also offers these services as government offers user-oriented services. This type of services save the users time and also provides efficient services as well as enhance the economical and social reputation in the market. But, these services may raise a crucial challenge about their security. At this time cyber criminals are active to breach the security measures. Pakistan is also facing the security problem because of limited resources, technical personals and lack of standardized policies. Moreover, this paper highlights the cyber threats and attacks, cyber laws as well as some eGovernment service challenges and recommends cyber protection policies for policy makers. This paper also helps the policy makers and service oriented organizations to design new security policies and strategies for citizens of Pakistan.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127934415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zainab Nayyar, Nousheen Hashmi, N. Rafique, Khurram Mahmood
{"title":"Keyword based searching in social networks","authors":"Zainab Nayyar, Nousheen Hashmi, N. Rafique, Khurram Mahmood","doi":"10.1109/SAI.2016.7556058","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556058","url":null,"abstract":"The main purpose of analyzing the social network data is to observe the behaviors and trends that are followed by people. How people interact with each other, what they usually share, what are their interests on social networks, so that analysts can focus new trends for the provision of those things which are of great interest for people so in this paper an easy approach of gathering and analyzing data through keyword based search in social networks is examined using NodeXL and data is gathered from twitter in which political trends have been analyzed. As a result it will be analyzed that, what people are focusing most in politics.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125778252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A neural network based approach for iris recognition based on both eyes","authors":"M. Sharkas","doi":"10.1109/SAI.2016.7555991","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555991","url":null,"abstract":"A novel approach for iris recognition using both eyes is implemented and tested. The right and left eyes of three individuals from the CASIA Iris database V3 are used. The iris is extracted from the whole eye, normalized and enhanced. A one level discrete wavelet transform is applied on the enhanced iris sheet. The mean of an 8×8 or 4×4 blocks of the approximation coefficients is evaluated and the iris code is generated. A system trained using the right eye code and tested using the left eye code achieved a max recognition rate of 75%. The system is then trained using half the data from the right eye and the other half from the left eye. The rest of the data is used for testing. When using the approximation coefficients, a vector of length 1647 is obtained and a recognition rate of 98.3% is achieved. The mean of 8×8 blocks of 1st approximation coefficients is then used in the same manner resulting in reduction in the code size while improving the recognition rate which reached 100% in this case. The same was done for the approximation of a 2nd level discrete wavelet transform where the mean of 4×4 blocks is calculated and employed to generate a feature vector of a much reduced size. The recognition rate reached also 100% in this case which verifies the superiority of the suggested technique.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128075844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for impact analysis of post-implementation enterprise resource planning modifications","authors":"M. Parhizkar, M. Comuzzi","doi":"10.1109/SAI.2016.7556059","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556059","url":null,"abstract":"Competitive environments cause an inevitable change in business requirements, which encourages postimplementation modifications of ERP systems. Understanding and managing the impact of these changes on implemented ERP systems is a challenging task for most enterprises. Change impact analysis is a strategic approach to analyzing modifications in large and complex software systems, such as ERP. In this paper, we present an impact analysis framework for ERP post-implementation modifications. Our framework builds an analogy with Engineering Change Requests in product lifecycle management. It defines a conceptual model of ERP system entities and their dependencies to support change specification, a set of mechanisms to evaluate the impact of modifications, and an analysis of strategies to implement the change. Our method serves as an aid to business analysts and practitioners to assess the feasibility and impact of post-implementation requirements in ERP systems.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130881171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}