{"title":"ISCAIE 2019 Cover Page","authors":"","doi":"10.1109/iscaie.2019.8743978","DOIUrl":"https://doi.org/10.1109/iscaie.2019.8743978","url":null,"abstract":"I am happy to welcome and wish “SELAMAT DATANG” to all delegates attending the 2019 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE 2019). We have been organizing ISCAIE for seven years now, and we continue our tradition of maintaining its high standard and quality. ISCAIE2019 has received full support and technical assistance from the IEEE Malaysia Industrial Electronics & Industrial Applications Joint Chapter.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced algorithms for clock selection in a packet based synchronization method","authors":"Satheesh Kumar S, Prasanth Kemparaj","doi":"10.1109/ISCAIE.2019.8743747","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743747","url":null,"abstract":"Clock selection algorithms plays an important role in selecting the best clock sources from the available pool of candidate clock sources based on many factors. Improper selection of the clock source in the network can have a detrimental impact in the network which could affect services that enables various applications in today’s next generation networks. Though the selection algorithms available as per various standard recommendations, it is important to fine tune and design a prominent method that could be adopted in packet based synchronization method. This paper addresses a new proposal for clock selection algorithms for packet based synchronization method by which the algorithm select the best clock from the candidate clocks to establish most reliable and efficient synchronization mechanism for the real-time deployments that comprises of either SyncE or 1588v2 with physical layer frequency assist as the synchronization transport. This method comprises of selecting a best clock based on the actual clock whose frequency expressed in parts per billion (ppb) seen by the Digital Phase Locked Loop (DPLL) at its inputs instead of selecting the clock based on the traditional clock selection algorithms. This method has a potential benefit of establishing a good frequency clock path throughout the network so that more efficient and reliable clock delivery is achieved within or external to the network. This paper therefore takes care of the potential delivery of bad frequency clock on legacy clock selection algorithm. Analysis and measurement results shows that the proposed method eliminate all the existing issues by conforming all the standard recommendations.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132480790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shaiful Bakhtiar bin Rodzman, Mohammad Hanif Rashid, N. K. Ismail, Nurazzah Abd Rahman, S. A. Aljunid, Hayati Abd Rahman
{"title":"Experiment with Lexicon Based Techniques on Domain-Specific Malay Document Sentiment Analysis","authors":"Shaiful Bakhtiar bin Rodzman, Mohammad Hanif Rashid, N. K. Ismail, Nurazzah Abd Rahman, S. A. Aljunid, Hayati Abd Rahman","doi":"10.1109/ISCAIE.2019.8743942","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743942","url":null,"abstract":"The nature of Sentiment Analysis (SA) mostly is generated by human beings. They expressed their emotion in writing or expressing their feeling via social media or blog. The Advancement of Internet and the increasing number of users in social media are the factors on why the sentiment analysis gaining its popularity in Malay languages. This research aims to implement the Sentiment Analysis on Malay language documents and propose a lexicon-based technique for Malay based sentiment analysis on specific domain such as Song, Politic and Product to find the best SA classifier on the Domain-Specific Malay Document Sentiment Analysis. Analysis of the evaluation result is based on the comparison of expert evaluation, Lexicon-based evaluation’s result and Naïve Bayes SA classification’s result, which is Naïve Bayes represent Machine Learning approach in this study. The result shows Lexicon-based Classification has outperformed Naïve Bayes SA classification in overall 3 topics which are Song, Politic and Product in average of 70% compared to 50% average for Naïve Bayes. For the future works, the researcher would like to improve in the particular area such as Sentiment Analysis based on the Malay dialect, increase the data in the dictionary and applying phrase level for better and optimum results.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129224656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chang Pei Shan, Wong HON LOON, Lee Kay Win, Dahlia Din, Sea Chong Seak
{"title":"Automated Login Method Selection in a Multi-modal Authentication System : Login Method Selection based on User Behavior","authors":"Chang Pei Shan, Wong HON LOON, Lee Kay Win, Dahlia Din, Sea Chong Seak","doi":"10.1109/ISCAIE.2019.8743992","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743992","url":null,"abstract":"An intelligent model is proposed to automate selection of login authentication method in a multi-model authentication system based on user behavior profile. The proposed protocol analyzes the user behavior data to minimize the process in real time and prevent untrusted attempt, meanwhile, it able to facilitate frictionless user experience in a multi-modal authentication system. The proposed system determines a user at a log-in interface and retrieves the user’s behavioral historical data as its determinant factors, matching user behavior based on data retrieval from database. Wherein the behavioral data includes the user’s login sessions time, geolocation, accessed application and type of user-agent used. The system processes the behavioral data to generate a user profile by a profiling module, at that point, evaluates the user’s profile by factoring in environmental parameters of the user terminal to select an authentication method by an evaluation module. The selected authentication method will be displayed for the user to complete the authentication process. On the other hand, the system will updating the user profile with data relating to a new successful login session for future evaluation.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126461461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Genetic Algorithm and Particle Swarm Optimization Based Microwave Tomography for Breast Cancer Detection","authors":"Mehrnaz Ronagh, M. Eshghi","doi":"10.1109/ISCAIE.2019.8743814","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743814","url":null,"abstract":"A study on the development of a microwave tomography imaging algorithm for detecting the malignant tumor in the breast is presented. Tomography modality is based on the electromagnetic reflections generated by the dielectric contrast between breast tissue types at microwave frequencies. In the tomography method, finite difference time domain method (FDTD) has been used as a technique for calculating electromagnetic scattered fields. In this paper, we propose a novel hybrid optimization technique for solving the inverse scattering problem which uses the binary Genetic algorithm (BGA) and binary particle swarm optimization (BPSO). The convergence rate of this proposed algorithm is around 4 times better than the regular BGA. The proposed FDTD/hybrid BGA-BPSO method has the ability to reconstruct the heterogeneous and dispersive breast tissues to provide a quantitative image of permittivity and conductivity profile of the breast. The proposed technique is capable to detect the size, location and permittivity and conductivity of the tumor even though it is surrounded by benign and fibroglandular tissues.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115276662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting trapped humans through chest wall movements with Non-contact Doppler sensor","authors":"L. Pham, M. Paul, Chandana Withana","doi":"10.1109/ISCAIE.2019.8743708","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743708","url":null,"abstract":"This paper aims to examine a noncontact pulmonary detection method in a laboratory setting, based on the use of frequencies similar to the current smartphone-liked devices. The paper utilises existing Wi-Fi 2.4 GHz spectrum wavelength, and a Doppler effect radar that detects and measures movements of the human chest during in- and exhalation under conditions that simulate entrapment caused by natural or man-made disasters. Based on the simulated scenarios, 100% accuracy was achieved for detecting a human subject when compared to traditional contact or invasive respiration measurements. This approach could be used as an alternative to the commercially designed devices currently used in rescue relief events.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121852393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Automated-Scripting Method for Improved Management of SQL Injection Penetration Tests on a Large Scale","authors":"Razman Hakim Abdul Raman","doi":"10.1109/ISCAIE.2019.8743936","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743936","url":null,"abstract":"Typically, in an assessment project for a web application or database with a large scale and scope, tasks required to be performed by a security analyst are such as SQL injection and penetration testing. To carry out these large-scale tasks, the analyst will have to perform 100 or more SQLi penetration tests on one or more target. This makes the process much more complex and much harder to implement. This paper attempts to compare large-scale SQL injections performed with Manual Methods, which is the benchmark, and the proposed SQLiAutoScript Method. The SQLiAutoScript method uses sqlmap as a tool, in combination with sqlmap scripting and logging features, to facilitate a more effective and manageable approach within a large scale of hundreds or thousands of SQL injection penetration tests. Comparison of the test results for both Manual and SQLiAutoScript approaches and their benefits is included in the comparative analysis. The tests were performed over a scope of 24 SQL injection (SQLi) tests that comprises over 100,000 HTTP requests and injections, and within a total testing run-time period of about 50 hours. The scope of testing also covers both SQLiAutoScript and Manual methods. In the SQLiAutoScript method, each SQL injection test has its own sub-folder and files for data such as results (output), progress (traffic logs) and logging. In this way across all SQLi tests, the results, data and details related to SQLi tests are logged, available, traceable, accurate and not missed out. Available and traceable data also facilitates traceability of failed SQLi tests, and higher recovery and reruns of failed SQLi tests to maximize increased attack surface upon the target.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114064556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Sample and Hold Time-to-Amplitude Converter for single photon time-of-flight measurement","authors":"Sihui Zhu, Yue Xu, Ding Li, Zhong Wu","doi":"10.1109/ISCAIE.2019.8743999","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743999","url":null,"abstract":"A novel Time-to-Amplitude Converter (TAC) based on Sample and Hold (S/H) principle is presented for single photon time-of-flight (TOF) measurement. With a high fill factor as much as 34% for a single photon avalanche diode (SPAD) pixel, the designed TAC offers the potential to realize high-density time-correlated single photon counting (TCSPC) detectors. Post-layout simulation reveals that time resolution of 195 ps LSB is obtained over a 100 ns time full-scale range (FSR). Furthermore, the TAC is characterized by a low differential nonlinearity (DNL) of 0.25% LSB and a low integral nonlinearity (INL) of 0.15 LSB in the whole detectable time range.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"2005 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}