{"title":"Achieving Complete UAV Delivery in the Presence of Motor Failures","authors":"E. Magsino, M. Say, John A. Tan","doi":"10.1109/ISCAIE47305.2020.9108809","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108809","url":null,"abstract":"This paper addresses a redundant flight recovery system (RFRS) in unmanned aerial vehicles (UAV) specifically applied for octocopter delivery or courier applications. RFRS implements a state diagram to allow octocopters to be fault-tolerant during motor breakdown or switches to less-energy mode consumption after package delivery. Conventional linear and nonlinear controllers are employed in achieving complete flight and landing stability of the UAV. Empirical experiments have confirmed the feasibility of RFRS being implemented in an octocopter platform.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125840202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nibras S. Abbas, A. Chong, Ali A. Al-kharaz, Hanan Al-Hadeethi
{"title":"Relationships between foot dimensions and plantar pressure distributed in older people","authors":"Nibras S. Abbas, A. Chong, Ali A. Al-kharaz, Hanan Al-Hadeethi","doi":"10.1109/ISCAIE47305.2020.9108800","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108800","url":null,"abstract":"The relationship between plantar pressure under the foot and the dimensions of the foot are essential for shoe manufacturers to design suitable footwear and evaluate foot problems, especially for older people. This study observed the plantar pressure of 7 older subjects during walking and calculated the measurements of their foot dimensions by videogrammetry. The aim of the present study is to focus on older people and find the relationship between the following issues: the plantar pressure parameters, which were calculated for contact area, contact pressure, peak pressure, pressure-time integral, force, and force-time integral of the three main foot regions and the whole foot with foot dimensions. The results show that the highest pressure was in the forefoot and hindfoot. The highest positive correlation was found between the mean weight of older subjects with the plantar pressure parameters of the whole foot and the forefoot area. In addition, the high negative correlation was located in the foot length with relation to the whole foot contact area; furthermore, the forefoot breadth was negative correlated with most of the plantar pressure parameters underneath the whole foot. The forefoot breadth had a negative correlation with the contact pressure and peak pressure values in the forefoot. No significant correlation was found between midfoot and hindfoot breadths and plantar pressure parameters for these regions. Future work may be extended to other foot dimensions like body height and toe length of the foot when influenced by pressure.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128209564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Hiding for Text Files by Adopting the Genetic Algorithm and DNA Coding","authors":"A. H. Saleh, A. Yousif, F. Y. Ahmed","doi":"10.1109/ISCAIE47305.2020.9108842","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108842","url":null,"abstract":"Hiding information is a process to hide data or include it in different digital media such as image, audio, video, and text. However, there are many techniques to achieve the process of hiding information in the image processing, in this paper, a new method has been proposed for hidden data mechanism (which is a text file), then a transposition cipher method has been employed for encryption completed. It can be used to build an encrypted text and also to increase security against possible attacks while sending it over the World Wide Web. A genetic algorithm has been affected in the adjustment of the encoded text and DNA in the creation of an encrypted text that is difficult to detect and then include in the image and that affected the image visual quality. The proposed method outperforms the state of arts in terms of efficiently retrieving the embedded messages. Performance evaluation has been recorded high visual quality scores for the (SNR (single to noise ratio), PSNR (peak single to noise ratio) and MSE (mean square error).","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129634418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing the Sorting Layers in the Initial Stage of High School Timetabling","authors":"Billel Arbaoui, J. Wahid, Syariza Abdul-Rahman","doi":"10.1109/ISCAIE47305.2020.9108804","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108804","url":null,"abstract":"The high school timetabling problem (HSTP) is considered as an NP-Complete problem as the optimal solution for it, is still not discovered by any algorithm. Generally, NP-Complete problem was solved firstly by constructing the initial solution, in the construction phase. The initial solution will be improvised in the improvisation phase. KHE is an algorithm that generates initial solution of HSTP. The layer sorting procedure in KHE is based on a certain priority. For every two layers, the layers will be ranked based on the highest value of duration. If both layers have equal value of duration, the layer with the highest value of demand will be at a higher rank. If both layers have equal value of demand. The layer will be arranged according to the index value of the layer. These sorting criteria use the layer properties independently which causes non-good results after the time-assignment phase. Therefore, this study proposed a mathematical model based on the Markov Chain Model for the sorting procedure that combines the layer properties in a formula. The proposed model was executed with 40 datasets of XHSTT2014, and it shows better results on 25 datasets of XHSTT2014 compared to the KHE algorithm. The mathematical model based on Markov Chain proposed in this study is able to improvise the original sorting of KHE.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129103856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Begum, O. Faruque, Md. Waliur Rahman Miah, Bimal Chandra Das
{"title":"An Improved Safety Detection Algorithm Towards Deadlock Avoidance","authors":"M. Begum, O. Faruque, Md. Waliur Rahman Miah, Bimal Chandra Das","doi":"10.1109/ISCAIE47305.2020.9108818","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108818","url":null,"abstract":"In operating system, the resource allocation to each process is a critical issue, because the resources are limited and sometimes may not be shareable among processes. An ineffective resource allocation may cause deadlock situation in the system. The banker's algorithm and some other modified algorithms are available to handle deadlock situations. However, the complexities of these algorithms are quite high. This paper presents an innovative technique for safe state detection in a system based on the maximum resource requirements of processes and the minimum resource available. In our approach, the resource requirements of each process are sorted in a linked list, where it is easy to check whether the request exceeds the available resources. In our experiments we compare our approach with some other methods including the original banker's algorithm. The results show that our proposed method provides less time complexity and less space complexity than the other methods.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Hamdan, Junita Shariza Mohd Nasir, Roopesh Sitharan
{"title":"Graphic Design Software and Aesthetic Features of Digital Caricature","authors":"W. Hamdan, Junita Shariza Mohd Nasir, Roopesh Sitharan","doi":"10.1109/ISCAIE47305.2020.9108836","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108836","url":null,"abstract":"Aesthetic is a pragmatic term that got scholars intention from a long time. This study emphasis on proposing a conceptual framework for aesthetic features of caricature art in order to examine how the use of digital tools affect those features. The proposed framework classify the features into three dimensions; micro-objective, macro-subjective, and interaction-psychology. Techniques of caricature such as reversing and assimilation are unique to this art and form the macro dimensions. Information dimension includes the overall message of caricature drawing and the emotional perception of the audience. Micro dimension includes the traditional color, texture, compositions, and salience features. In future, the proposed conceptual framework will be validated by experts then designing a tool for quantifying the features measure.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133820489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicolas Lim Ming Jian, C. S. Mon, Kasthuri Subaramaniam
{"title":"Adoption of Mobile Technology in Teaching Moral Values to Children: A Study in Malaysia","authors":"Nicolas Lim Ming Jian, C. S. Mon, Kasthuri Subaramaniam","doi":"10.1109/ISCAIE47305.2020.9108827","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108827","url":null,"abstract":"In today's modern society, many parents are busy building a successful career and it is very common that there are many young families with both parents working. Hence, the young children of such families will be placed in day-care centres or they are looked after by their grandparents and maids. Working parents would not be spending much quality time with their children and providing them with moral guidance. This group of children, if not given adequate and proper guidance, would not know much about good moral values. There are also children who grow up around people who do not practise good moral values and commit all types of wrongdoings such as cheating, stealing, bullying, being selfish, greedy, uncaring and ill-treating animals. It is easy for children to be influenced by such actions and behaviours. Therefore, this research plans to assist in imparting moral values to children by using the concept of “edutainment” with the use of a mobile application. Based on the results collected in this research, the application is fully functional without any bugs because all the respondents who took part in the testing of the application were able to launch the application on their mobile phones successfully. The results also show that the mobile application is well received by both parents and the children and it has been effective in helping children aged 4 to 9 to have a better understanding of moral values.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116469271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Three-phase Isolated SEPIC-Based Off-Board Fast Charger for Electric Vehicles","authors":"Bayan Hussein, Nima Abdi, A. Massoud","doi":"10.1109/ISCAIE47305.2020.9108824","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108824","url":null,"abstract":"The industry of Electric Vehicles (EVs) is emerging as a significant solution for the environmental issues introduced by Internal-Combustion Engine (ICE) vehicles. This paper presents the design of a unidirectional three-phase fast charger for EV, using three single-phase modules of isolated SEPIC with Power Factor Correction (PFC) capability. The converter can be designed to operate in both Continuous or Discontinuous Conduction Modes (CCM or DCM). The presented concept is validated using MATLAB/Simulink platform, where the simulation results show an input current THD of less than 3% and an almost unity input power factor. Also, the effect of the source impedance on the input current THD is studied considering an insignificant SEPIC's input inductance.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125920498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Drill Test Using Phishing Attack: A Pilot Study of a Large Financial Services Firm in Thailand","authors":"Surachai Chatchalermpun, Pongpisit Wuttidittachotti, Therdpong Daengsi","doi":"10.1109/ISCAIE47305.2020.9108832","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108832","url":null,"abstract":"This paper presents a pilot study about cybersecurity drill tests within a large financial services company in Thailand using a phishing technique. After conducting simulation by sending phishing emails to more than 21,000 users nationwide, including executives and employees, it has been found that 73% of executives and 77% of employees ignored the phishing emails, whereas, 12% of executives and 15% of employees opened, clicked and filled-in the password. The numbers are higher than the result from earlier research provided by Verizon. Therefore, the result from this can be used to increase awareness and improve the cybersecurity within this organization by proposing the training program to their staff, as well as conducting the other cybersecurity drill tests in future work. Besides, this study can be an example for other companies to improve organizational cybersecurity.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128727385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}