Pichate Kunakornvong, Chiewchan Tangkongkiet, P. Sooraksa
{"title":"Defect detection on air bearing surface with gray level co-occurrence matrix","authors":"Pichate Kunakornvong, Chiewchan Tangkongkiet, P. Sooraksa","doi":"10.1109/JICTEE.2014.6804086","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804086","url":null,"abstract":"Air bearing surface (ABS) is the part of magnetic read/write head flying height controller. It is very important part in magnetic disk (hard disk drive), defected on ABS lead to crash between read/write head and disk surface, therefore its verifying is necessary. The best way to verify defect on ABS is machine vision. Main problem of machine vision in real world is variation of luminance intensity that affects image acquisition. This research proposes method for detecting defect on ABS which has variance luminance intensity, the Co-Occurrence Matrix is used to avoid the variance intensity of ABS image then feature parameter is defined by four identification features and defected detect by threshold that selected from Euclidean distance of each identification. The experimental results show very low error of defect detection on ABS by Co-Occurrence matrix and their identification feature.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129427911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A power-aware design of a Spacer Detector for ternary logic asynchronous digital systems using conventional CMOS process technology","authors":"Thanasin Bunnam","doi":"10.1109/JICTEE.2014.6804112","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804112","url":null,"abstract":"Recently, a C-ternary logic asynchronous digital system design was proposed. The advantage of this design was the use of conventional CMOS process technology, which reduced the process cost, instead of the multi-threshold one. However, the design had to use the element called “Spacer Detector”, or “SD”, to detect the half logic. This element design, like an inverter, had the cons that the current is drawn when the half logic is available on the input terminal. This paper proposes a power-aware design of the spacer detector for ternary logic asynchronous digital systems in transistor level. This design still gain the advantage of cost reduction from using conventional CMOS process technology. The SPICE simulation results, based on 0.5μm C5 process, show that this design consumes less power than the previous design for about 25%.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124529188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Thumwarin, N. Wakayaphattaramanus, T. Matsuura, K. Yakoompai
{"title":"Audio forensics from gunshot for firearm identification","authors":"P. Thumwarin, N. Wakayaphattaramanus, T. Matsuura, K. Yakoompai","doi":"10.1109/JICTEE.2014.6804081","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804081","url":null,"abstract":"The gunshot blast is one of the evidences used to identify the criminal gun in the shooting scene. We proposed a method of using the gunshot blast to identify the firearm caliber in terms of audio forensics. The experiments were performed on the database consisting of 80 audio files of gunshot sounds fired from 8 different guns. At first, the autocorrelation functions of the gunshot sounds were calculated and normalized in the preprocessing stage. Then the Fourier cosine coefficients could be used to reduce the fluctuation and to extract the features of gunshot sounds. In addition, the gun sounds could also be verified by evaluating the difference among the Fourier cosine coefficients of the reference, and then the gun caliber could be identified.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130998438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Associate rule minimization using boolean algebra set function","authors":"Pornsak Deekumpa, P. Sooraksa","doi":"10.1109/JICTEE.2014.6804099","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804099","url":null,"abstract":"Associated rule mining has become a common subject in data mining research field that is very popular used for marketing basket analysis. The discovery knowledge pattern mined can provide insight to the data holder as well as be invaluable in important task, such as decision making and strategic planning. This paper presents an associated rule mining technique that significantly helping for improvement of the decision making or planning. As a minimization mining strategy, we adopt the minimization using algebra set function and association rule mining methods. Our goal is to minimize the number of associated rule. This paper is of reviews preliminaries method presented a minimization algorithm and also tested with the well known data. The experimental results also show that our algorithm is an efficient method one.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132266469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"First-order allpass network using CFTA","authors":"U. Torteanchai, M. Kumngern","doi":"10.1109/JICTEE.2014.6804120","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804120","url":null,"abstract":"This paper presents a new current-mode first-order allpass network. The network employs only one current follower transconductance amplifier, one capacitor and two resistors. Unlike previously works, the proposed network offers both non-inverting and inverting allpass transfer functions into one circuit. Moreover, the current gain of the network can be adjusted. The output terminal of the filter possesses high impedance level which is directly connected to the next stage without any buffer circuit. For realizing allpass transfer functions, no component-matching conditions are required. The simulation results are also used to verify the workability of the proposed network.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126951340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kanchit Pamanee, Angela Duangchit, R. Chaisricharoen
{"title":"Enhancement of video features for vision restoration of dangerous head light glare affected scenario","authors":"Kanchit Pamanee, Angela Duangchit, R. Chaisricharoen","doi":"10.1109/JICTEE.2014.6804093","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804093","url":null,"abstract":"Though there is a study concerning vision restoration of headlight-glare vision, enhancing visual quality is able to be improved. Current frame information would contain more video features instead of restoring it only from the previous frame in order to achieve higher quality of vision during dangerous-glare encounter. Therefore, this paper proposes a new method recovering information from the surrounding area of glare centroid which distorts the luminance. Three-dimensional recursive search (3DRS) is assigned to retrieve luminance information from Macroblock (MB) of the previous non-glare affected frames. Tone mapping is also applied to improve luminance of the distorted MB. The result shows that frames with the glare area under 15% implemented the proposed method acquires higher peak-signal-to-noise ratio (PSNR) than those applied glare simulation. Furthermore, the combination of restoration method and the proposed one results in the best performance of increasing PSNR among applying only a single method.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125122986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Somjai Klinngam, P. Supnithi, N. Manositthichai, K. Sepsirisuk, T. Tsugawa, T. Maruyama
{"title":"The statistics of equatorial spread-F at the conjugate stations in Southeast Asia","authors":"Somjai Klinngam, P. Supnithi, N. Manositthichai, K. Sepsirisuk, T. Tsugawa, T. Maruyama","doi":"10.1109/JICTEE.2014.6804062","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804062","url":null,"abstract":"Ionospheric disturbance is a major impediment to current communication systems with the signals propagating through the ionosphere. A signature of such disturbance when appearing in an ionogram, resulting from the ionosonde observation system, is known as spread-F. The spread-F statistics is therefore crucial to the design and operation of communication system. In this work, we analyze the equatorial spread-F (ESF) statistics at the conjugate stations: Chiangmai, Chumphon and Kototabang during the period of minimum solar activity from September 2008 to April 2009. The statistics of range type spread-F (RSF) occurrence after the local sunset are shown in terms of the monthly average percentage since it is related to the Equatorial Plasma Bubble (ESP). We found that the RSF occurrence is higher at Chumphon station, which is near the magnetic equator, than at Kototabang and Chiangmai stations. The maximum level occurs during March 2009 at Chumphon station and the higher rate mostly during the equinoctial months. In addition, we compare the observed RSF occurrence probability at Chumphon station with the IRI-2012 model prediction. The comparison results show that the IRI model overestimates our results in all seasons, most evidently in December Solstice, except the estimation in June solstice during 21:00-03:30 LT when IRI model underestimates the statistics of RSF occurrence. Nevertheless, the IRI model gives closer probability values in March equinox during 20:00-22:00 LT than other seasons.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114104898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Cheepchol, W. San-Um, S. Kiattisin, A. Leelasantitham
{"title":"Digital biometric facial image encryption using chaotic cellular automata for secure image storages","authors":"S. Cheepchol, W. San-Um, S. Kiattisin, A. Leelasantitham","doi":"10.1109/JICTEE.2014.6804084","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804084","url":null,"abstract":"This paper presents the digital image encryption scheme for biometric facial image using Cellular Automata (CA) for secure image storage. The proposed scheme is relatively simple using a segmentation of CA binary image with embedded secret keys generated by the third class of well-known Wolfram Cellular Automata that exhibits chaotic patterns. Such segmented CA binary image is diffused to the shuffled and bit-plane separated of the original biometric facial image through to XOR operations. Experiments have been performed in MATLAB using a standard digital biometric facial image with the size of 160×160 pixels. Encryption qualitative performances are evaluated through pixel density histograms, 2-dimensional power spectral density, and vertical, horizontal, and diagonal correlation plots. For the encryption quantitative measures, correlation coefficients, entropy, NPCR and UACI are realized. Demonstrations of wrong-key decrypted image are also included. The proposed encryption scheme offers a potential alternative to digital biometric facial image storage in a various applications such as in border security control, payment system, or in crime prevention, detection, and forensics.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117262205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Significant Matrix without Genetic Algorithm for the feature selection (Significant Matrix 2)","authors":"Ekapong Chuasuwan","doi":"10.1109/JICTEE.2014.6804070","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804070","url":null,"abstract":"This paper presents to the improvement of the Significant Matrix [1] that works along with Genetic Algorithm in feature selection of appropriate data for a decision tree structure. This work proposes the reduction of time that cut off the Genetic Algorithm's work times. The new method is proposed in the name “Significant Matrix 2” which is calculated from the relationship between categorical data and a class label for determining the threshold of the feature selection and the sub-dataset from the method contains the appropriate feature to create decision trees. The results of experiment of feature selection times. The proposed work can work faster than [1], average 28 times and the results of experiments of the decision tree model is constructed from the feature of the method and model of neural networks. The proposed work gives the average accuracy of the classification at 95.9% of the 11 sample database, also a number of the data features are less than a number of the features from the method of neural networks [6] that uses the feature only 48.08% from all feature in example dataset. Furthermore, when comparing the accuracy of the classification decision tree which another feature selected method. This proposed work have the amount of average accuracy higher than the selected data from another method. Experimental results show that the proposed method does not only provide a higher accuracy, but reduce the complexity by using less features of the dataset.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"747 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128863519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kanokrat Chumwangwapee, W. Jaikla, Wisuit Sunthonkanokpong, W. Jaikhang, S. Maneewan, B. Sreewirote
{"title":"High input impedance mixed-mode biquad filter with orthogonal tune of natural frequency and quality factor","authors":"Kanokrat Chumwangwapee, W. Jaikla, Wisuit Sunthonkanokpong, W. Jaikhang, S. Maneewan, B. Sreewirote","doi":"10.1109/JICTEE.2014.6804104","DOIUrl":"https://doi.org/10.1109/JICTEE.2014.6804104","url":null,"abstract":"This paper deals with a single-input multiple-output mixed-mode second-order filter providing two voltage-mode functions (low-pass and band-pass) and three transconductance-mode functions (low-pass, band-pass and band-reject) based on voltage differencing transconductance amplifier (VDTA). The quality factor and pole frequency can be electronically and orthogonally tuned via the bias current. The proposed circuit uses two VDTAs and two grounded capacitors without any external resistors, which is suitable to further develop into an integrated circuit. Moreover, the circuit possesses high input impedance, providing easy cascading. The PSPICE simulation results are included, verifying the key characteristics of the proposed filter. The given results agree well with the theoretical presumptions.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129187749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}