H. Sulaiman, M. Othman, M. N. Shah Zainudin, Abd Majid Bin Darsono, A. Bade, Mohd Harun Abdullah
{"title":"Computing penetration depth of collision detection between primitives","authors":"H. Sulaiman, M. Othman, M. N. Shah Zainudin, Abd Majid Bin Darsono, A. Bade, Mohd Harun Abdullah","doi":"10.1109/ISTMET.2014.6936561","DOIUrl":"https://doi.org/10.1109/ISTMET.2014.6936561","url":null,"abstract":"DyOP-PD is the third part of narrow phase collision detection that involved finding the penetration depth using Dynamic Pivot Point (DyOP) technique. After the object or the primitive has collided into another primitive, penetration depth algorithm will check for any significant penetration that might occurs upon the intersection. In our implementation, we propose our own algorithm called DyOP-PD where the implementation will be done in 2D for Lin Canny, GJK and DyOP technique and 3D for Lin Canny and DyOP technique. In this chapter, we will explain the concept of our DyOP-PD algorithm that has efficiently contributed to faster penetration depth computation when using DyOP technique.","PeriodicalId":364834,"journal":{"name":"2014 International Symposium on Technology Management and Emerging Technologies","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122463799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. H. Affendi, M. Sarah, N. Azhar, I. Saurdi, A. Ishak, M. Rusop
{"title":"Structural and electrical properties of nanostructured TiO2 thin film at low molarity","authors":"I. H. Affendi, M. Sarah, N. Azhar, I. Saurdi, A. Ishak, M. Rusop","doi":"10.1109/ISTMET.2014.6936503","DOIUrl":"https://doi.org/10.1109/ISTMET.2014.6936503","url":null,"abstract":"Titanium dioxide, TiO2 is a semiconductor material which has many useful properties. This paper is to clarify the use of sol-gel method in the production of nanostructured TiO2. Since sol-gel method is quite simple to compare with sputtering or pyrogenic process. The solution concentration will be varied in low molarity of 0.06M, 0.04M and 0.02M. Spin coating was used to deposit the nanostructured TiO2 on to the glass substrate and the surface morphology was observed using the Atomic Force Microscopy (AFM) and Field Emission Scanning Electron Microscopy (FESEM). The electrical properties were investigated by using two probe current-voltage (I-V) measurements to study the electrical resistivity behavior hence the conductivity of the film. Based on the result, higher the molarity of TiO2, the surface become more uniform and the IV becomes much better. The best thin film characteristic by low molarity parameter from 0.06M, 0.04M, 0.02M and 0.01M is the one with lowest molarity of 0.01M thin film.","PeriodicalId":364834,"journal":{"name":"2014 International Symposium on Technology Management and Emerging Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126424496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applicability of machine-learning techniques in predicting customer defection","authors":"Niken Prasasti, H. Ohwada","doi":"10.1109/ISTMET.2014.6936498","DOIUrl":"https://doi.org/10.1109/ISTMET.2014.6936498","url":null,"abstract":"Machine learning is an established method of predicting customer defection from a contractual business. However, no systematic comparison or evaluation of the different machine-learning techniques has been performed. In this study, we provide a comprehensive comparison of different machine-learning techniques with three different data sets of a software company to predict customer defection. The evaluation criteria of the techniques are understandability of the model, convenience of using the model, time efficiency in running the learning model, and performance of predicting customer defection.","PeriodicalId":364834,"journal":{"name":"2014 International Symposium on Technology Management and Emerging Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121778286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Sulaiman, M. Othman, M. M. Ismail, M. A. Meor Said, A. Bade, Mohd Harun Abdullah
{"title":"Methodology of performing narrow phase collision detection for virtual environment","authors":"H. Sulaiman, M. Othman, M. M. Ismail, M. A. Meor Said, A. Bade, Mohd Harun Abdullah","doi":"10.1109/ISTMET.2014.6936564","DOIUrl":"https://doi.org/10.1109/ISTMET.2014.6936564","url":null,"abstract":"Contact determination between near colliding objects is one of crucial issues in virtual environment simulation for nearly accurate collision detection system such as in medical simulation, computer games, and engineering visualization. The contact determination technique consists of distance computation, point of contact and depth penetration phase. It requires information of object direction toward another object that move towards another object that is in opposite direction; resulting in an intersection. The main problem is caused by complex calculations involved in distance approximation resulting speed and efficiency in collision reporting deterioration. The proposed technique starts by first identifying the nearest triangle of corresponding objects that is going to be intersected with another triangle that are bound with an Axis Aligned Bounding-Box (AABB) for whole object. Then, we need to find the parallel line distribution created by each axis of AABB for each triangle. Three sets of testing have been conducted to evaluate and verify the proposed technique with two other common techniques of Lin-Canny and GJK technique. This paper presented our methodology of our solution for computing a single phase collision detection instead of expensive two-phase collision detection algorithm.","PeriodicalId":364834,"journal":{"name":"2014 International Symposium on Technology Management and Emerging Technologies","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual-band Planar Inverted F Antenna with parasitic element for LTE and WiMAX mobile communication","authors":"F. Redzwan, M. Ali, M. N. Md Tan, N. Miswadi","doi":"10.1109/ISTMET.2014.6936478","DOIUrl":"https://doi.org/10.1109/ISTMET.2014.6936478","url":null,"abstract":"In this paper, a new conception of dual-band Planar Inverted F Antenna (PIFA) for mobile communication application purposes have been staged. The dual- band antenna is designed by introducing a rectangular form of parasitic element which is located under the main radiating patch of the PIFA in order to attain a dual-band operating frequencies. This dual-band PIFA can be operated at two different operating frequencies which are 2600 MHz for Long Tem Evolution (LTE) Band 7and 3500 MHz for WiMAX application. The antenna is made up from rectangular planar element located above the Flame Retardant 4 (FR4) dielectric substrate and the shorting plate that connect between the top radiating patch to the ground plane. The ground plane is positioned along the bottom side of the substrate. The overall dimension of this antenna is 17.8 mm × 16.5 mm and the height of the antenna is 5 mm. The simulated radiation pattern shows nearly omni-directional with obtaining a gain antenna of 4 to 5 dBi at two different operating frequencies. The antenna design in term of antenna structure, return loss, far field radiation pattern,VSWR and antenna gain are presented in this paper.","PeriodicalId":364834,"journal":{"name":"2014 International Symposium on Technology Management and Emerging Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116139076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determining customers' perception on green hotel using attitudes toward green behaviour (ATGB) model","authors":"A. Shamsuddin, N. H. Abdullah, E. Wahab","doi":"10.1109/ISTMET.2014.6936548","DOIUrl":"https://doi.org/10.1109/ISTMET.2014.6936548","url":null,"abstract":"This research is on a study of the influence of eco-friendly attitudes on the intention of customers from a certified green hotel. The specific dimension of attitudes toward green behavior that gives strong influence on customer's eco-friendly intention has been identified by using the attitudes toward green behavior (ATGB) model. This is a quantitative research. It adopted a case study as the research strategy. A certified green hotel that has been chosen was located in Selangor. 105 questionnaires have been distributed among the customers from this green hotel. The findings of multiple regression method indicate that the green hotel customer's eco-friendly attitudes of ATGB model are significantly associated with their expressed eco-friendly intentions to visit and pay more for a green hotel. This research is expected to raise attention on the ATGB model dimensions to be focused more rigorously by the hotel management. Consequently, customer retention strategies can be focused on.","PeriodicalId":364834,"journal":{"name":"2014 International Symposium on Technology Management and Emerging Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115092453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Djanali, F. X. Arunanto, B. Pratomo, H. Studiawan, Satrio Gita Nugraha
{"title":"SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker","authors":"S. Djanali, F. X. Arunanto, B. Pratomo, H. Studiawan, Satrio Gita Nugraha","doi":"10.1109/ISTMET.2014.6936499","DOIUrl":"https://doi.org/10.1109/ISTMET.2014.6936499","url":null,"abstract":"One of the most common security attack for web application is SQL injection. It is an attack to acquire access to application's database through injection of script or malicious query attributes. This attack can be executed in any page of web application which interacts with database. SQL injection could be more dangerous if the victim was an enterprise system such as online banking. Many methods have been researched and developed to prevent SQL injection attacks. One of them is the use of a honeypot. This paper proposed a method for increasing system's capability to detect and prevent SQL injection attacks based on removal of SQL query attribute values and honeypot for trapping attackers. A honeypot is placed as decoy system to hide actual web server from attacker. Malicious queries from attackers will be sent to honeypot while normal queries will be sent directly to the real web server. Honeypot is also used to provide activity logging of each attack which can be used for further analysis. We play with Raspberry Pi because it is cheap and effective to be used as a honeypot. Due to its limited computational ability, we make cluster to improve its power. Based on conducted experiments, we could achieve up to 64% accuracy of SQL injection attack. Moreover, with the redirection, our honeypot could get more attack data to be analyzed.","PeriodicalId":364834,"journal":{"name":"2014 International Symposium on Technology Management and Emerging Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting major disease in public hospital using ensemble techniques","authors":"Mgs. Afriyan Firdaus, Rin Nadia, Bayu Adhi Tama","doi":"10.1109/ISTMET.2014.6936496","DOIUrl":"https://doi.org/10.1109/ISTMET.2014.6936496","url":null,"abstract":"Hepatitis is chronic disease that becomes major problem in developing countries. Health experts estimate that more than 185 billion people have chronic hepatitis worldwide. This paper attempts to detect major disease such as hepatitis in public hospital using ensemble methods. Several ensemble techniques were applied to acquire knowledge from patient medical records. Afterwards, rule extraction from decision tree and neural network are summarized in order to assist experts in detecting hepatitis. Accuracy of those algorithms is also performed and from the experimental result shows that Bagging, with decision tree as base-classifier, denotes best performance among other classifiers.","PeriodicalId":364834,"journal":{"name":"2014 International Symposium on Technology Management and Emerging Technologies","volume":"466 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127011298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology management in lean manufacturing implementation: A case study","authors":"N. Nordin, G. Othman","doi":"10.1109/ISTMET.2014.6936519","DOIUrl":"https://doi.org/10.1109/ISTMET.2014.6936519","url":null,"abstract":"The demanding of globalization and the concern to remain competitive in the global economy has driven countries to actively pursue high-technology and knowledge-intensive service in industrialization strategies. To encourage the development of industrial technology, several factors must be considered such as knowledge, skills, technical development and basic infrastructure. This study attempts to investigate the technology management required in implementing lean manufacturing system in a manufacturing company. This system is useful to ensure production process in operation smoothly run without interrupted. A single-case study was employed. The three different methods for data gathering: interview, observation and documents all contributed towards the data analysis. The respondents were asked about their experience in implementing lean manufacturing in the company and also the challenges occurred. The results from the case study show that to implementing a new technology, commitment from all employees in the organization is crucial. Management also should analyze and predict the potential failure as a preparation before starting to adopt the new technology in the organization.","PeriodicalId":364834,"journal":{"name":"2014 International Symposium on Technology Management and Emerging Technologies","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130258112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fadzilah Mohamad, N. H. Abdullah, N. Kamaruddin, M. Mohammad
{"title":"Implementation of ISO50001 energy management system","authors":"Fadzilah Mohamad, N. H. Abdullah, N. Kamaruddin, M. Mohammad","doi":"10.1109/ISTMET.2014.6936518","DOIUrl":"https://doi.org/10.1109/ISTMET.2014.6936518","url":null,"abstract":"The accentuated importance of energy management has resulted in the introduction of ISO50001standard on energy management system. However, implementation of this standard is still at its infancy with many companies hesitant to adopt it. This paper presents a case of a Malaysian Copper manufacturer which implemented Energy Management System (EnMS) standard via the use of PDCA approach. Data was collected using participant observation approach. It was observed that the copper manufacturer achieved energy saving up to 3% in June 2013. This finding substantiates the importance of having Energy Management System in place to ensure business sustainability.","PeriodicalId":364834,"journal":{"name":"2014 International Symposium on Technology Management and Emerging Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127705836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}