The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)最新文献

筛选
英文 中文
Performance of Log-MAP algorithm for graph-based detections on the 2-D interference channel Log-MAP算法在二维干扰信道上基于图的检测性能
T. Sopon, P. Supnithi, K. Vichienchom
{"title":"Performance of Log-MAP algorithm for graph-based detections on the 2-D interference channel","authors":"T. Sopon, P. Supnithi, K. Vichienchom","doi":"10.1109/JICTEE.2014.6804075","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804075","url":null,"abstract":"The read channel of magnetic recording system is affected by two-dimensional interference channel that is a combination of inter-symbol interference and inter-track interference. Inter-track interference is one of the biggest challenges in the high density magnetic recording systems and it can degrade the performance of the channels. In this work, we compare three variations of log-MAP algorithms for graph-based detectors in two-dimensional interference channels. The simulation results show the performance of the graph-based detector with the full log-MAP and extended log-MAP algorithms achieve the gains of about 0.1 and 0.05 dB at BER = 10-5, over the max approximation on bit patterned media recording system with the areal density 2.5 Tbits/in2.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127363596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Low-cost saline droplet measurement system using for common patient room in rural public hospital 低成本生理盐水液滴测量系统在农村公立医院普通病房的应用
Pattarakamon Rangsee, P. Suebsombut, P. Boonyanant
{"title":"Low-cost saline droplet measurement system using for common patient room in rural public hospital","authors":"Pattarakamon Rangsee, P. Suebsombut, P. Boonyanant","doi":"10.1109/JICTEE.2014.6804111","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804111","url":null,"abstract":"This paper proposes low-cost saline droplet measurement system (SDMS). The system can be used to check saline droplet of patients in each patient's bed in rural public hospital. By installing the measuring modules in all patients' beds, the system will show saline droplet status of each patient. So, nurses can accurately check saline droplet status of their patients on a computer including saline droplet statuses, saline droplet rate (drops per minute), and remaining time. The saline droplet statuses include four statuses that are Normal status (the system is working, the green light is shown on monitor), Warning status (sensor at critical point cannot detect saline, the yellow light is shown on monitor), Error status (droplet sensor cannot detect saline droplet, the red light is shown on monitor), and Chang New Bag (the blue light is shown on monitor). So, nurses do not need to go to patient's bed every time because they can check saline drop let status of each patient via this system. This system is a low-cost system and comfortable for a nurses. Therefore, in rural public hospital can use this system in common patient's room.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122395842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Action recognition with adaptive RBFNN 基于自适应RBFNN的动作识别
Srisuda Aphaipanan, Yuttana Kidjaidure
{"title":"Action recognition with adaptive RBFNN","authors":"Srisuda Aphaipanan, Yuttana Kidjaidure","doi":"10.1109/JICTEE.2014.6804095","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804095","url":null,"abstract":"This paper presents a method for action recognition by Adaptive Radial Basis Function Neural Network (ARBFNN) based on 3 dimensional human models. Recently, the action recognition of human is popular for the interactive applications caused many researchers tried to develop the algorithm and to find the features that have high performance. So this paper employed the features from the scalar part of Quaternion rotation that uses lower dimension than the conventional Cartesian features. Also, the Fuzzy C Means technique was used for pre-training the Radial Basis Function Neural Network (RBFNN). This method was tested with the CMU MoCap database and showed high recognition rates with small computation time.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123011261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A partial encryption scheme using absolute-value chaotic map for secure electronic health records 基于绝对混沌映射的安全电子病历部分加密方案
S. Fong-In, S. Kiattisin, A. Leelasantitham, W. San-Um
{"title":"A partial encryption scheme using absolute-value chaotic map for secure electronic health records","authors":"S. Fong-In, S. Kiattisin, A. Leelasantitham, W. San-Um","doi":"10.1109/JICTEE.2014.6804083","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804083","url":null,"abstract":"This paper presents a partial encryption scheme using absolute-value chaotic map for secure electronic health records (EHR). The HER system has been an emerging technology that allows medical personals to create, manage, and control medical data electronically through specific database or even web browsers. The proposed encryption scheme realizes XOR operations between separated planes of binary gray-scale image and a binaty imgae generated by an absolute-value chaotic map. The proposed is relatively simple containning a single absolute-value function with two constants and offers complex and robust dynamical behaviors in terms of random output values. Experiments have been performed in MATLAB using a magnetic resosnace image which is divided into 64 sub-blocks and 13th itterations were proceeded for encryption. Encryption qualitative performances are evaluated through pixel density histograms, 2-dimensional power spectral density, and vertical, horizontal, and diagonal correlation plots. For the encryption quantitative measures, correlation coefficients, entropy, NPCR and UACI are realized. Demonstrations of wrong-key decrypted image are also included. The proposed encryption scheme offers a potential alternative to a secure medical data records and web browsing through clound computing systems.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133366295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Pair-wise testing applied with online registration 配对测试适用于在线注册
Wasan Uthaileang, S. Kiattisin, A. Leelasantitham
{"title":"Pair-wise testing applied with online registration","authors":"Wasan Uthaileang, S. Kiattisin, A. Leelasantitham","doi":"10.1109/JICTEE.2014.6804077","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804077","url":null,"abstract":"Pair-wise testing is a software testing technique used for design of test cases to test every possibility input parameters pairing interaction together. This result is to decrease in the number of test cases. This paper presents to reduce the number of test cases with pair-wise testing using the reference with algorithm invented and accepted in software testing. It is applied to case in the online registration website (Thai language) to generate test suits in every possible of input parameters. Reducing the number of input parameters is to decrease time consumption of testing and it helps to find highest defects with coverage in testing. The result from the software testing with pair-wise has more effectiveness than the all pair testing up to 60-80%. The reason is to use pair-wise testing in test because society of tester in Thailand has a little to use such method to reduce input parameters before testing. Therefore, it will make a high cost of each testing. However, pair-wise testing in the testing process has an importance for Software Development Life Cycle (SDLC) and Software Testing Life Cycle (STLC) in Thailand.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114957493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fraud Detection System for Steel Logistic SME Business on Cloud Services model 基于云服务模式的钢铁物流中小企业欺诈检测系统
Soisala Phuttima, Worasak Rueangsirasak, R. Chaisricharoen
{"title":"Fraud Detection System for Steel Logistic SME Business on Cloud Services model","authors":"Soisala Phuttima, Worasak Rueangsirasak, R. Chaisricharoen","doi":"10.1109/JICTEE.2014.6804088","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804088","url":null,"abstract":"This paper aims to present the system of Fraudulent Detection for Steel Logistic SME Business on Cloud Services. The system is developed based on the traditional steel logistic business management which is deployed on the cloud computing system. The study takes into account the concept of the Logistic Management in which it is started from analyzing the customer order processing and to the end process of the accounts clearing. The fraudulent detection is implemented to track all the logistic process. The survey of conceptual framework evaluation shows the significant efficiency between two kinds of business management models. Furthermore, the results of the evaluation also demonstrates that the positive feedback from all officers is greater than 80%. After implementing the success Fraudulent Detection System on the actual management, the results of the factors influencing the adoption of sufficient cloud services for steel logistic SME Business shows that the Delivery Performance Percentage (DPP) and the Truck Maintenance Performance can be classified into three levels: highest, medium and lowest of the delivery performance and the truck maintenance performance.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information process analysis for KPIs based on the International Classification of Disease: Diabetes Mellitus 基于《国际疾病分类:糖尿病》的kpi信息处理分析
Thanawat Chailert, S. Kiattisin, Sotarat Thamaboosadee, A. Leelasantitham
{"title":"Information process analysis for KPIs based on the International Classification of Disease: Diabetes Mellitus","authors":"Thanawat Chailert, S. Kiattisin, Sotarat Thamaboosadee, A. Leelasantitham","doi":"10.1109/JICTEE.2014.6804127","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804127","url":null,"abstract":"The measurements of performance for healthcare processing are important to healthcare system of the country, the accuracy of information makes the right decision for the leader who set a policies and strategies. According to the Health Promotion and Prevention strategies of The Ministry of Public Health 2011 shown that the major condition affected to Thai people's health are Diabetes Mellitus, Hypertension, Ischemic Heart Disease (IHD), Cerebrovascular Accident (CVA) and other injury. The processes of information analysis are started from compiling and collecting data. Beside, data cleansing and reporting must be also included in the process. Finally, the useful of accuracy KPIs will return its result to patients, healthcare unit, hospital and the Public Health.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123594060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICMP based Malicious Attack Identification Method for DHCP 基于ICMP的DHCP恶意攻击识别方法
Mayoon Yaibuates, R. Chaisricharoen
{"title":"ICMP based Malicious Attack Identification Method for DHCP","authors":"Mayoon Yaibuates, R. Chaisricharoen","doi":"10.1109/JICTEE.2014.6804073","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804073","url":null,"abstract":"DHCP starvation attack is one of problems that has occurred over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent denial of service to normal users. The detection criteria are based on identifying the validity of the requester using ICMP echo service. The result of this study revealed that the detection accuracy was greater than existing techniques.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Evaluating cooperative diversity-based WBAN by using STBC with pre-coding and relay selection 基于预编码和中继选择的STBC评价合作分集WBAN
P. Jamjareegulgarn
{"title":"Evaluating cooperative diversity-based WBAN by using STBC with pre-coding and relay selection","authors":"P. Jamjareegulgarn","doi":"10.1109/JICTEE.2014.6804072","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804072","url":null,"abstract":"The main objective of this paper is to evaluate the network performance of a cooperative diversity-based wireless body area network (WBAN) by using (2,2) Alamouti's space-time block code (STBC) with pre-coding scheme (STBC-PC) and a relay selection procedure (RSP). The considered WBAN model is served for healthcare service in order to mitigate the undesired effects of WBAN due to high path loss and fading as well as to keep a low transmit power while meeting to the desired WBAN quality of services. In this paper, the pre-coding scheme is taken to be employed in conjunction with the STBC, since a single antenna of each wireless sensor node in healthcare service can be exploited possibly as well as the high gain can still be achieved without loss of transmission rate. A channel model CM3 B is considered for computing the actual path loss of each WBAN link and the network performance is evaluated in terms of bit error rate (BER). The simulation results confirm that at each BER value, SNRs of STBC-PC without direct link (line-of-sight or LOS) scheme are the lowest which is compared with direct link, receive diversity and MRC, and (2,2) Alamouti's STBC. BER values of DQPSK-based STBC-PC are higher than those of DBPSK-based STBC-PC. Moreover, although any WBAN sensor nodes are chosen as a relay or any type of modulations are employed in STBC-PC with LOS, all of BER values have surprisingly the same trend.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132579904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An improved Three-Level Zero-Voltage and Zero-Current Switching PWM DC-DC converter for battery charger 一种改进的三电平零电压零电流开关PWM DC-DC变换器
A. Jangwanitlert
{"title":"An improved Three-Level Zero-Voltage and Zero-Current Switching PWM DC-DC converter for battery charger","authors":"A. Jangwanitlert","doi":"10.1109/JICTEE.2014.6804066","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804066","url":null,"abstract":"This paper describes a 2-kW Three-Level Zero-Voltage and Zero-Current Switching (TL-ZVZCS) PWM dc-dc converter for battery charger. To solve the disadvantages from TL-Zero-Voltage Switching (ZVS) such as a circulating primary current and parasitic voltage ringing on the dual diodes rectifier, a proposed simple auxiliary circuit is composed of a small capacitor with two small diodes is put on the transformer secondary side to achieve ZVZCS conditions of primary switches and to clamp secondary voltage rectifier. The auxiliary circuit does not give any losses in components and additional active switches, which provides the proposed circuit converter more effective and efficient. Moreover, this paper describes the key operation waveforms, operational modes and design considerations. The concept idea is verified by the MATLAB simulation.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133682096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信