2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)最新文献

筛选
英文 中文
Intelligent Neonatal Monitoring System Based on Android Application using Multi Sensors 基于Android应用的多传感器新生儿智能监护系统
2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743867
S. Najib, Norshahida Binti Hassan, Nur Tysha Atikah binti Mohd Shair, N. Rahim, N. Wahab
{"title":"Intelligent Neonatal Monitoring System Based on Android Application using Multi Sensors","authors":"S. Najib, Norshahida Binti Hassan, Nur Tysha Atikah binti Mohd Shair, N. Rahim, N. Wahab","doi":"10.1109/ISCAIE.2019.8743867","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743867","url":null,"abstract":"The purpose of the project is to develop an Intelligent Neonatal Monitoring System based on temperature and pulse rate data. In the Neonatal Intensive Care Unit (NICU), there are premature babies and other ill babies who need extra care from the doctors, nurses as well as medical supplies. Therefore, an intelligent neonatal monitoring system should be a good solution in order to help them to observe neonates frequently and consistently. This system transmits the vital signs of the neonate such as body temperature and pulse rate to the Internet of Things (IoT) called ThingSpeak. The body temperature and the pulse rate will be detected by LM35 temperature sensor and pulse sensor respectively. These information will be sent to the IoT via ESP8266 Wi-Fi Shield. IoT helps the doctors and nurses to be connected with the neonate’s vital signs and it is helpful in monitoring the neonates at anytime and anywhere through the internet. The percentage difference between LM35 temperature sensor and digital thermometer is less than 3% while the pulse rate can be varied according to the physical activity. This develops system will providing efficiency and reliability which will play a vital role for better care.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122685293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Power Factor Correction Converters with Continuous Input and Output Currents for Battery Chargers in Data Centers: Performance Assessment 具有连续输入和输出电流的数据中心电池充电器功率因数校正转换器:性能评估
2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743725
Farah Hijjawi, Rameen S. Anjum, A. Massoud
{"title":"Power Factor Correction Converters with Continuous Input and Output Currents for Battery Chargers in Data Centers: Performance Assessment","authors":"Farah Hijjawi, Rameen S. Anjum, A. Massoud","doi":"10.1109/ISCAIE.2019.8743725","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743725","url":null,"abstract":"In this paper, the performance of two types of DC-DC converters namely Ćuk and Boost-Buck converters is assessed for battery charging systems. Operation with power factor correction for the input side AC current, and continuous input and output currents at the DC side of the converter are considered. The aforementioned system can be employed for many applications such as electric vehicles, data centers, etc. This paper focuses typically on data centers. Matlab/Simulink models for the two converters have been built to verify the claimed contributions.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114363470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automation Security System with Laser Lights Alarm on Web Pages and Mobile Apps 自动化安全系统与激光警报在网页和移动应用程序
2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743998
M. Z. Zainal Arifin, M. Kassim, A. R. Mahmud, Saiful Izwan Suliman
{"title":"Automation Security System with Laser Lights Alarm on Web Pages and Mobile Apps","authors":"M. Z. Zainal Arifin, M. Kassim, A. R. Mahmud, Saiful Izwan Suliman","doi":"10.1109/ISCAIE.2019.8743998","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743998","url":null,"abstract":"This paper presents a development of a Home Automation Security with Laser Lights Alarm that interfaces with web pages and Mobile apps. This system is designed to improve the security of a large space area like the factory from the robbery. A new development system using Raspberry Pi controllers which interface with Windows Mobile users and web pages which comprised on design system, hardware and sensors connections with programmed coding. Laser beam module and passive infrared (PIR) sensor are installed at a selected area to be protected to detect the intruder. Alerts lights are installed in a selected area. Lights are ON followed by alert's area when the laser is crossed out by intruders and PIR sensor detects changes of infrared radiation. Installed buzzers also are alert with sounds. LED lights are used to save energy consumed by lights. The alert message is sent out to mobile users and webpage. Reminder features of security activated set are also designed on the mobile apps. The prototype system is successfully developed and tested. The analysis shows there are 148 incoming messages and 196 of outgoing messages has been sent and delivered in 5 tested days. A total of 1157 of requests has been made by this system's software to the server and the results show 100% of the connection is successful. This research is significant for recent security issues on high rated of burglars for a large area. A large area security system is beneficial by implementing this system's concept of lights alert built that interfaces with mobile and webpage.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129418990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ISCAIE 2019 Reviewers
2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2019-04-01 DOI: 10.1109/iscaie.2019.8743824
{"title":"ISCAIE 2019 Reviewers","authors":"","doi":"10.1109/iscaie.2019.8743824","DOIUrl":"https://doi.org/10.1109/iscaie.2019.8743824","url":null,"abstract":"","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127721700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network approach for rapid prediction of transcutaneous oxygen saturation 快速预测经皮血氧饱和度的神经网络方法
2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743751
A. Huong, X. Ngu
{"title":"Neural Network approach for rapid prediction of transcutaneous oxygen saturation","authors":"A. Huong, X. Ngu","doi":"10.1109/ISCAIE.2019.8743751","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743751","url":null,"abstract":"This study presented the use of Neural Network (NN) approach in the prediction of transcutaneous oxygen saturation level, StO2. This is to overcome the limitation of using conventional signal processing approaches that are computational exhaustive. The accuracy of the NN predictive model was tested on 35 sets of new noise-corrupted Monte Carlo simulation data. This study found mean absolute error of 2.91± 2.29 % in its predictions while the statistical test revealed a strong correlation between the considered features and the predictions (ρ = 0.000). This work concluded that the proposed technique could promote further advancement in the current technology specifically in the development of portable StO2 measurement system.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131201443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Variable Input/Output Data Logging System Using FPGA for Energy Audit 基于FPGA的能源审计可变输入/输出数据记录系统
2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743805
Ezmin Abdullah, Eber Lazareen Anak Ignatius, N. Hidayat, N. I. Shuhaimi, R. Mohamad
{"title":"Variable Input/Output Data Logging System Using FPGA for Energy Audit","authors":"Ezmin Abdullah, Eber Lazareen Anak Ignatius, N. Hidayat, N. I. Shuhaimi, R. Mohamad","doi":"10.1109/ISCAIE.2019.8743805","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743805","url":null,"abstract":"Energy audit is a systematic process to understand how and where the energy is being used. From the audits, energy auditor can identify the energy saving potential and can decide energy management tasks base on the report. However, there are several important challenges need to be considered in conducting energy audits especially in collecting field data at the multiple locations with various parameters. Previously, energy auditors need some number of data loggers in order to log the data from different parameters such as voltage, current, temperature, humidity and lux. The loggers come from various brands, software’s and purposes. This inefficient process cause the unsynchronized date and time, different logging period and logging time interval which consequently leads to high cost of equipment used, manpower, time consuming and low accuracy of data taken. The aims of this project was to develop a tool dedicated to energy auditor to improve the energy audit process during field data collection named variable input/output data logger that combined various parameters under one tool. This project utilized Field Programmable Gate Array board (FPGA) on the design part using platform designer software (QSYS) to generate the Verilog coding in the Quartus Prime Lite software and Altera DE1-Soc development board for the prototype. In this project, the developed data logger had the ability to measure and logged three essential parameters that would be used for energy analysis which were voltage, current and temperature. The results showed all the parameters worked concurrently and time synchronized controlled by only one data logger. The time interval for each parameter can be easily set to the any other counting at the clock set in the Qsys software. Lastly, the logged data from the logger could be displayed in real time when connected to computer for immediate observation and also could be saved systematically in Excel format for energy report analysis. This project benefits energy auditor for their auditing works and report preparation in term of time consume, cost and increase data reliability due to synchronization of date and time.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Improved Critical Chain and Earned Value Technique in Software Engineering & Integrated Project Progress Control 改进的关键链和挣值技术在软件工程及集成项目进度控制中的应用
2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743672
Chengqian Ma, W. Hu, Yayin Deng
{"title":"Application of Improved Critical Chain and Earned Value Technique in Software Engineering & Integrated Project Progress Control","authors":"Chengqian Ma, W. Hu, Yayin Deng","doi":"10.1109/ISCAIE.2019.8743672","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743672","url":null,"abstract":"Software engineering & Integrated project includes both software development and hardware construction processes ,while its progress control is one of the main problems faced by construction units and owners. Critical chain project management minimized the risk of progress through setting a Buffer, managed stratification of the software and hardware processes of the software engineering and integrated project, compared with traditional progress management methods , which owned natural advantages. Based on the critical chain management methods, this paper proposed an improved technique which combined critical chain with the traditional earned value technique. Drawn references from the PERT Methods, this method determined the scheduled duration in three situations: unconsumed buffer, completely consumed buffer and most likely consumed buffer, transformed the critical chain project duration into traditional earned value project duration, and then carried out the earned value analysis, at the same time, the monitoring of buffer consumption was improved. The method controlled the project schedule at both external and internal levels, which improved the accuracy and flexibility of duration monitoring and conducted an empirical research by taking a software engineering and integrated project as an example.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130784495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Reduction Algorithms based on Computational Intelligence for Wireless Sensor Networks Applications 基于计算智能的无线传感器网络数据约简算法
2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743665
J. Abdullah, M. K. Hussien, N. Alduais, M. Husni, A. Jamil
{"title":"Data Reduction Algorithms based on Computational Intelligence for Wireless Sensor Networks Applications","authors":"J. Abdullah, M. K. Hussien, N. Alduais, M. Husni, A. Jamil","doi":"10.1109/ISCAIE.2019.8743665","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743665","url":null,"abstract":"Wireless sensor networks (WSN) are critically resource constrained due to small memory, limited power supply, low processing capability and narrow communication bandwidth. Tremendous researches are geared towards optimizing some aspects of packet transmissions to mitigate those constraints. The energy efficiency of a sensor node is affected by the process of data packet transmission from the sensor board to the fusion center (FC) and also by its packet size. An effective technique to reduce data transmission within the WSN, is to locally reduce the number of packets before transmission. In this paper, the performance of different computational intelligence based algorithms that reduce the data packet traffic is presented. These methods are data reduction based on artificial neural networks (DR-ANN); data reduction methods based on Independent Component Analysis (DR-ICA) and one that is based on regression utilizing deep learning method (DR-GDMLR). These algorithms have been applied to different applications and datasets type. The simulation results with best performance is shown by the DR-ANN algorithm that reduced the size of transmitted data by 66%, while the other two algorithms only reduced the size by 33% only.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130830490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hadamard Transform Improvement for HEVC using Intel AVX-512 Hadamard变换改进HEVC使用英特尔AVX-512
2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743904
Jackson Teh Ka Sing, Usman Ullah Sheikh, M. Mokji, N. Alias
{"title":"Hadamard Transform Improvement for HEVC using Intel AVX-512","authors":"Jackson Teh Ka Sing, Usman Ullah Sheikh, M. Mokji, N. Alias","doi":"10.1109/ISCAIE.2019.8743904","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743904","url":null,"abstract":"High Efficiency Video Coding (HEVC) doubles the data compression ratio compared to previous generation compression technology, Moving Picture Expert Group-Advanced Video Codec (MPEG-AVC/H.264) without sacrificing the image quality. However, this superior compression comes at the cost of more computation payload resulting in longer time for encoding and decoding. This work proposes the vectorization on HEVC data heavy computation algorithm, Hadamard Transform or Sum of Absolute Transform Difference (SATD) and Sum of Absolute Difference (SAD) to achieve optimized compression performance. Single Instruction Multiple Data (SIMD) acceleration will be based on the Intel AVX-512 (Advanced Vector Extension) Instruction Set Architecture (ISA). Since HEVC supports more coding tree block (CTB) sizes, SATD and SAD algorithms eventually become more complex compared to AVC. As a result, SATD and SAD algorithms with various block sizes will be subjected to SIMD acceleration. We provide performance evaluation based on different SIMD ISA and without SIMD implementation on HEVC SATD and SAD and found that AVX-512 optimized implementation performed faster when compared to non- optimized SATD and SAD but showed signs of reduced performance when compared to SSE optimized SATD and SAD.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"8 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130327688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behavioral Biometrics Scheme with Keystroke and Swipe Dynamics for User Authentication on Mobile Platform 基于击键和滑动动态的移动平台用户认证行为生物识别方案
2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743995
Ka‐Wing Tse, K. Hung
{"title":"Behavioral Biometrics Scheme with Keystroke and Swipe Dynamics for User Authentication on Mobile Platform","authors":"Ka‐Wing Tse, K. Hung","doi":"10.1109/ISCAIE.2019.8743995","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743995","url":null,"abstract":"Due to the explosive growth of mobile devices worldwide, authentication is receiving increasing attention. Conventionally, explicit authentication methods such as password is employed. However, the system would be breached if the password is stolen. Therefore, there is a continual search for ways to strengthen authentication for mobile platforms. Behavioral biometric information such as keystroke and swipe dynamics can be used for enhancing security. This paper presents an authentication scheme which employs a combination of password, keystroke dynamics, and swipe dynamics for touchscreen mobile devices. Features extracted from swiping pattern and typing pattern were evaluated. Accuracy of the system was enhanced by using combined behavioral biometrics features, as compared with using only a single set of features. The identification accuracies increased significantly from the range of 63.03% - 88.30% to 86.59% -94.05%; while the F1 scores increased from the range of 60.42% - 85.96% to 85.43% - 93.15%.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132385012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信