2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)最新文献

筛选
英文 中文
Achieving Complete UAV Delivery in the Presence of Motor Failures 在电机故障的情况下实现无人机的完整交付
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2020-04-01 DOI: 10.1109/ISCAIE47305.2020.9108809
E. Magsino, M. Say, John A. Tan
{"title":"Achieving Complete UAV Delivery in the Presence of Motor Failures","authors":"E. Magsino, M. Say, John A. Tan","doi":"10.1109/ISCAIE47305.2020.9108809","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108809","url":null,"abstract":"This paper addresses a redundant flight recovery system (RFRS) in unmanned aerial vehicles (UAV) specifically applied for octocopter delivery or courier applications. RFRS implements a state diagram to allow octocopters to be fault-tolerant during motor breakdown or switches to less-energy mode consumption after package delivery. Conventional linear and nonlinear controllers are employed in achieving complete flight and landing stability of the UAV. Empirical experiments have confirmed the feasibility of RFRS being implemented in an octocopter platform.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125840202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Relationships between foot dimensions and plantar pressure distributed in older people 老年人足部尺寸与足底压力的关系
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2020-04-01 DOI: 10.1109/ISCAIE47305.2020.9108800
Nibras S. Abbas, A. Chong, Ali A. Al-kharaz, Hanan Al-Hadeethi
{"title":"Relationships between foot dimensions and plantar pressure distributed in older people","authors":"Nibras S. Abbas, A. Chong, Ali A. Al-kharaz, Hanan Al-Hadeethi","doi":"10.1109/ISCAIE47305.2020.9108800","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108800","url":null,"abstract":"The relationship between plantar pressure under the foot and the dimensions of the foot are essential for shoe manufacturers to design suitable footwear and evaluate foot problems, especially for older people. This study observed the plantar pressure of 7 older subjects during walking and calculated the measurements of their foot dimensions by videogrammetry. The aim of the present study is to focus on older people and find the relationship between the following issues: the plantar pressure parameters, which were calculated for contact area, contact pressure, peak pressure, pressure-time integral, force, and force-time integral of the three main foot regions and the whole foot with foot dimensions. The results show that the highest pressure was in the forefoot and hindfoot. The highest positive correlation was found between the mean weight of older subjects with the plantar pressure parameters of the whole foot and the forefoot area. In addition, the high negative correlation was located in the foot length with relation to the whole foot contact area; furthermore, the forefoot breadth was negative correlated with most of the plantar pressure parameters underneath the whole foot. The forefoot breadth had a negative correlation with the contact pressure and peak pressure values in the forefoot. No significant correlation was found between midfoot and hindfoot breadths and plantar pressure parameters for these regions. Future work may be extended to other foot dimensions like body height and toe length of the foot when influenced by pressure.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128209564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Hiding for Text Files by Adopting the Genetic Algorithm and DNA Coding 基于遗传算法和DNA编码的文本文件信息隐藏
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2020-04-01 DOI: 10.1109/ISCAIE47305.2020.9108842
A. H. Saleh, A. Yousif, F. Y. Ahmed
{"title":"Information Hiding for Text Files by Adopting the Genetic Algorithm and DNA Coding","authors":"A. H. Saleh, A. Yousif, F. Y. Ahmed","doi":"10.1109/ISCAIE47305.2020.9108842","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108842","url":null,"abstract":"Hiding information is a process to hide data or include it in different digital media such as image, audio, video, and text. However, there are many techniques to achieve the process of hiding information in the image processing, in this paper, a new method has been proposed for hidden data mechanism (which is a text file), then a transposition cipher method has been employed for encryption completed. It can be used to build an encrypted text and also to increase security against possible attacks while sending it over the World Wide Web. A genetic algorithm has been affected in the adjustment of the encoded text and DNA in the creation of an encrypted text that is difficult to detect and then include in the image and that affected the image visual quality. The proposed method outperforms the state of arts in terms of efficiently retrieving the embedded messages. Performance evaluation has been recorded high visual quality scores for the (SNR (single to noise ratio), PSNR (peak single to noise ratio) and MSE (mean square error).","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129634418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing the Sorting Layers in the Initial Stage of High School Timetabling 在高中课程表编排的初始阶段加强排序层次
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2020-04-01 DOI: 10.1109/ISCAIE47305.2020.9108804
Billel Arbaoui, J. Wahid, Syariza Abdul-Rahman
{"title":"Enhancing the Sorting Layers in the Initial Stage of High School Timetabling","authors":"Billel Arbaoui, J. Wahid, Syariza Abdul-Rahman","doi":"10.1109/ISCAIE47305.2020.9108804","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108804","url":null,"abstract":"The high school timetabling problem (HSTP) is considered as an NP-Complete problem as the optimal solution for it, is still not discovered by any algorithm. Generally, NP-Complete problem was solved firstly by constructing the initial solution, in the construction phase. The initial solution will be improvised in the improvisation phase. KHE is an algorithm that generates initial solution of HSTP. The layer sorting procedure in KHE is based on a certain priority. For every two layers, the layers will be ranked based on the highest value of duration. If both layers have equal value of duration, the layer with the highest value of demand will be at a higher rank. If both layers have equal value of demand. The layer will be arranged according to the index value of the layer. These sorting criteria use the layer properties independently which causes non-good results after the time-assignment phase. Therefore, this study proposed a mathematical model based on the Markov Chain Model for the sorting procedure that combines the layer properties in a formula. The proposed model was executed with 40 datasets of XHSTT2014, and it shows better results on 25 datasets of XHSTT2014 compared to the KHE algorithm. The mathematical model based on Markov Chain proposed in this study is able to improvise the original sorting of KHE.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129103856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Safety Detection Algorithm Towards Deadlock Avoidance 一种改进的死锁避免安全检测算法
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2020-04-01 DOI: 10.1109/ISCAIE47305.2020.9108818
M. Begum, O. Faruque, Md. Waliur Rahman Miah, Bimal Chandra Das
{"title":"An Improved Safety Detection Algorithm Towards Deadlock Avoidance","authors":"M. Begum, O. Faruque, Md. Waliur Rahman Miah, Bimal Chandra Das","doi":"10.1109/ISCAIE47305.2020.9108818","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108818","url":null,"abstract":"In operating system, the resource allocation to each process is a critical issue, because the resources are limited and sometimes may not be shareable among processes. An ineffective resource allocation may cause deadlock situation in the system. The banker's algorithm and some other modified algorithms are available to handle deadlock situations. However, the complexities of these algorithms are quite high. This paper presents an innovative technique for safe state detection in a system based on the maximum resource requirements of processes and the minimum resource available. In our approach, the resource requirements of each process are sorted in a linked list, where it is easy to check whether the request exceeds the available resources. In our experiments we compare our approach with some other methods including the original banker's algorithm. The results show that our proposed method provides less time complexity and less space complexity than the other methods.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Technical Program Overview 技术方案概述
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2020-04-01 DOI: 10.1109/iscaie47305.2020.9108703
{"title":"Technical Program Overview","authors":"","doi":"10.1109/iscaie47305.2020.9108703","DOIUrl":"https://doi.org/10.1109/iscaie47305.2020.9108703","url":null,"abstract":"","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132087625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graphic Design Software and Aesthetic Features of Digital Caricature 平面设计软件与数字漫画的美学特征
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2020-04-01 DOI: 10.1109/ISCAIE47305.2020.9108836
W. Hamdan, Junita Shariza Mohd Nasir, Roopesh Sitharan
{"title":"Graphic Design Software and Aesthetic Features of Digital Caricature","authors":"W. Hamdan, Junita Shariza Mohd Nasir, Roopesh Sitharan","doi":"10.1109/ISCAIE47305.2020.9108836","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108836","url":null,"abstract":"Aesthetic is a pragmatic term that got scholars intention from a long time. This study emphasis on proposing a conceptual framework for aesthetic features of caricature art in order to examine how the use of digital tools affect those features. The proposed framework classify the features into three dimensions; micro-objective, macro-subjective, and interaction-psychology. Techniques of caricature such as reversing and assimilation are unique to this art and form the macro dimensions. Information dimension includes the overall message of caricature drawing and the emotional perception of the audience. Micro dimension includes the traditional color, texture, compositions, and salience features. In future, the proposed conceptual framework will be validated by experts then designing a tool for quantifying the features measure.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133820489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adoption of Mobile Technology in Teaching Moral Values to Children: A Study in Malaysia 移动技术在儿童道德教育中的应用:马来西亚的一项研究
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2020-04-01 DOI: 10.1109/ISCAIE47305.2020.9108827
Nicolas Lim Ming Jian, C. S. Mon, Kasthuri Subaramaniam
{"title":"Adoption of Mobile Technology in Teaching Moral Values to Children: A Study in Malaysia","authors":"Nicolas Lim Ming Jian, C. S. Mon, Kasthuri Subaramaniam","doi":"10.1109/ISCAIE47305.2020.9108827","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108827","url":null,"abstract":"In today's modern society, many parents are busy building a successful career and it is very common that there are many young families with both parents working. Hence, the young children of such families will be placed in day-care centres or they are looked after by their grandparents and maids. Working parents would not be spending much quality time with their children and providing them with moral guidance. This group of children, if not given adequate and proper guidance, would not know much about good moral values. There are also children who grow up around people who do not practise good moral values and commit all types of wrongdoings such as cheating, stealing, bullying, being selfish, greedy, uncaring and ill-treating animals. It is easy for children to be influenced by such actions and behaviours. Therefore, this research plans to assist in imparting moral values to children by using the concept of “edutainment” with the use of a mobile application. Based on the results collected in this research, the application is fully functional without any bugs because all the respondents who took part in the testing of the application were able to launch the application on their mobile phones successfully. The results also show that the mobile application is well received by both parents and the children and it has been effective in helping children aged 4 to 9 to have a better understanding of moral values.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116469271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of a Three-phase Isolated SEPIC-Based Off-Board Fast Charger for Electric Vehicles 基于三相隔离式sepic的电动汽车车载快速充电器设计
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2020-04-01 DOI: 10.1109/ISCAIE47305.2020.9108824
Bayan Hussein, Nima Abdi, A. Massoud
{"title":"Design of a Three-phase Isolated SEPIC-Based Off-Board Fast Charger for Electric Vehicles","authors":"Bayan Hussein, Nima Abdi, A. Massoud","doi":"10.1109/ISCAIE47305.2020.9108824","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108824","url":null,"abstract":"The industry of Electric Vehicles (EVs) is emerging as a significant solution for the environmental issues introduced by Internal-Combustion Engine (ICE) vehicles. This paper presents the design of a unidirectional three-phase fast charger for EV, using three single-phase modules of isolated SEPIC with Power Factor Correction (PFC) capability. The converter can be designed to operate in both Continuous or Discontinuous Conduction Modes (CCM or DCM). The presented concept is validated using MATLAB/Simulink platform, where the simulation results show an input current THD of less than 3% and an almost unity input power factor. Also, the effect of the source impedance on the input current THD is studied considering an insignificant SEPIC's input inductance.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125920498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Drill Test Using Phishing Attack: A Pilot Study of a Large Financial Services Firm in Thailand 使用网络钓鱼攻击的网络安全演习测试:泰国一家大型金融服务公司的试点研究
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2020-04-01 DOI: 10.1109/ISCAIE47305.2020.9108832
Surachai Chatchalermpun, Pongpisit Wuttidittachotti, Therdpong Daengsi
{"title":"Cybersecurity Drill Test Using Phishing Attack: A Pilot Study of a Large Financial Services Firm in Thailand","authors":"Surachai Chatchalermpun, Pongpisit Wuttidittachotti, Therdpong Daengsi","doi":"10.1109/ISCAIE47305.2020.9108832","DOIUrl":"https://doi.org/10.1109/ISCAIE47305.2020.9108832","url":null,"abstract":"This paper presents a pilot study about cybersecurity drill tests within a large financial services company in Thailand using a phishing technique. After conducting simulation by sending phishing emails to more than 21,000 users nationwide, including executives and employees, it has been found that 73% of executives and 77% of employees ignored the phishing emails, whereas, 12% of executives and 15% of employees opened, clicked and filled-in the password. The numbers are higher than the result from earlier research provided by Verizon. Therefore, the result from this can be used to increase awareness and improve the cybersecurity within this organization by proposing the training program to their staff, as well as conducting the other cybersecurity drill tests in future work. Besides, this study can be an example for other companies to improve organizational cybersecurity.","PeriodicalId":383466,"journal":{"name":"2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128727385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信