{"title":"Intelligent Personalized Learning System Consideration","authors":"Alex Pongpech","doi":"10.1109/UKSim.2012.18","DOIUrl":"https://doi.org/10.1109/UKSim.2012.18","url":null,"abstract":"Personalised learning is a crucial key element for promoting lifelong learners. The concept of personalised learning is based on learner-centric approach, represented by different ways of adaptation of the services such as content, support, and presentation to the learner's needs. For any system to support various needs of the learners, it must offer functionality which allows learners to configure the services to meet their needs. Thus facilitates the system adaptability for providing services for each individual based on his/her needs. An adaptive system is usually defined as a system which is capable of adapting its services to meet the requirements of each user. The principles of e-learning and the expectations from learners are revisited, and several existing systems are discussed. Several difficulties of designing intelligent personalize learning machine which maybe solvable and useful in practice are then suggested.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122552032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimizing Vertices in 3D Lips Model Using Relevance Measure","authors":"S. S. Salleh","doi":"10.1109/UKSim.2012.111","DOIUrl":"https://doi.org/10.1109/UKSim.2012.111","url":null,"abstract":"This paper presents works involved in developing a three-dimensional lips in a visual speech synthesis system. Several works have been done in similar areas, but a systematic approach of identifying and determining appropriate number of vertices in the lips model were not explained thoroughly. Instead of the development technique, this paper is also presents an experimental set up designed to test the capabilities and flexibility of the lips in deforming speech. This paper explains on the process of capturing the lips and on the relevance measure technique used to identify optimum number of vertices to deform visemes in Standard Malay language. Results shown in this work proves that a systematic degradation by retaining 0.005% of 24,000 vertices into 120 vertices would remain the similar quality of lips deformation. Therefore, the outcome of this study justifies that an appropriate number of vertices which suitable to be used in visual speech synthesis for 3D lips model.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":" 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120833416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ADEUS: Tool for Rapid Acceleration of Network Simulation in OMNeT++","authors":"P. Vilhan, J. Gajdos","doi":"10.1109/UKSim.2012.90","DOIUrl":"https://doi.org/10.1109/UKSim.2012.90","url":null,"abstract":"There is lot of accessible mobile devices on the market nowadays, which caused significant rise of mobile networks. There are two main types of mobile networks, infrastructure and ad-hoc. This paper is focused on mobile ad-hoc networks also known as MANET, which are easy to build, and do not rely on fixed infrastructure. On the other side, simulation of MANET is really difficult and it is really important to properly design test and simulation scenario. There are various well known simulation environments over there, but this paper aims at OMNeT++[5]. The main contribution of this paper is to introduce ADEUS, support tool used to simplify creation and reduce the time needed to set up OMNeT++ simulation environment, for simulation of public key infrastructure, further referred as PKI, in MANET. ADEUS is graphical add-on for OMNeT++, with simple but powerful user interface.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121819891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Docking Study of Synthesized Juvenile Hormone Analogues as an Insect Growth Regulators","authors":"P. Awasthi, Priyanka Sharma","doi":"10.1109/UKSim.2012.109","DOIUrl":"https://doi.org/10.1109/UKSim.2012.109","url":null,"abstract":"Molecular modeling is a basic tool to understand virtually all biological phenomena. It provides a direction to interpret theoretical understanding of structure - activity relationship in terms of physical forces responsible for receptor-ligand binding process. If a three dimensional structure of target receptor is available along with detail knowledge of the nature of the ligand binding site, ligand binding mode, the interactions between the ligand and receptor can be studied extensively in order to design and develop new target specific new compounds in short time. Juvenile Hormone Analogues, sesqui-terpenoid series of compound act as an insect growth regulators and presently in use as a potential environment friendly pesticides. Chemosterlization is the most effectual way to control the vast insect population. Computationally designing of juvenile hormone analogues are new and emerging area to counter the insect problem. We have carried out in-silico comparison between different JHAs containing sulphonamide functionality and Juvabione containing oxa and aza features as juvenile hormone analogues synthesized in our laboratory and studied their interactions against receptor protein of Galleria mellonella insect species using Auto Dock software module on Linux platform.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"4 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Qlogic's Dispersive Routing on High Performance Clusters","authors":"S. M. Sait, R. Al-Shaikh","doi":"10.1109/UKSim.2012.75","DOIUrl":"https://doi.org/10.1109/UKSim.2012.75","url":null,"abstract":"As high performance clusters (HPC) expand in terms of nodes count and processing cores, internet work congestion and bottlenecks at the host and network levels become one of the main concerns in clustered computing. Considerably, the Infiniband Architecture (IBA) Specification provides six different routing algorithms to better optimize the HPC internet work traffic. In this paper, we present these algorithms and then evaluate QLogic's dispersive routing using a large-scale Infiniband cluster, equipped with Intel's latest Westmere processor. The paper presents the cluster configuration and evaluates its performance using High Performance LINPACK (HPL) and Intel MPI (IMB) benchmarks. Our results show that whilst the default Min Hop algorithm suits most of the serial and point-to-point benchmarks, the dispersive routing algorithm exhibits improved performance when running specific computational and parallel transfer routines.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. S. Hossain, A. Kabir, P. Mazumder, Ahmedullah Aziz, M. Hassan, Md. Azizul Islam, P. K. Saha
{"title":"Design and Development of an Y4 Copter Control System","authors":"M. S. Hossain, A. Kabir, P. Mazumder, Ahmedullah Aziz, M. Hassan, Md. Azizul Islam, P. K. Saha","doi":"10.1109/UKSim.2012.43","DOIUrl":"https://doi.org/10.1109/UKSim.2012.43","url":null,"abstract":"The y4 copter is intended to be a UAV (Unmanned Aerial Vehicle) with autonomous subsystems. Automation is implemented in case of maintaining the desired roll, pitch and yaw. An improved algorithm that uses Quaternion is implemented to determine Euler angles avoiding Gimbal lock. It has a self-stabilization system achieved using Proportional Integral Derivative (PID) control system. A custom remote is built to communicate with the y4 copter using XBee modules which offer long range and security. Secured data transmission between the controller and the copter makes it suitable for military applications. Perhaps the most significant purpose of this y4 copter is to exercise a low cost and efficient engineering design with total automation considering all possible aerodynamics which is intended to be the first y4 copter built in the Indian subcontinent.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133312812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Coal Mechanical Preparation in Light of Platform Independent Modeling: Two Solutions","authors":"Bob Arnold, M. R. Shadnam","doi":"10.1109/UKSim.2012.58","DOIUrl":"https://doi.org/10.1109/UKSim.2012.58","url":null,"abstract":"This contribution describes methodologies for modeling of coal preparation systems. We extend the Reuter and van Deventer steady state method, which optimizes both network design and valuable mineral grade for a network of froth flotation cells in two passes using LP techniques, we have proposed a way that the empirical model for the flotation process can be extended to model heavy media, and water-only cyclones and other types of sieves and classifiers. The initial configuration has been simplified to include one of each of the four types of processing units, initially with only one species of input feed. We have expanded our initial LP model to include multiple elements present in multiple species. The LP model could be used to suggest an alternative circuit configuration based on changed operating conditions, making use in a global control loop possible. We subsequently compared the LP model with a System Dynamics (SD) model, generated from the same coal wash plant platform independent model. We attempt to simulate the same constructs with both approaches but find that extension of the constructs available to the SD platform dependent model may be required to make the two approaches converge.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"10 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133482717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applicability of Neural Networks to Software Security","authors":"A. Adebiyi, J. Arreymbi, C. Imafidon","doi":"10.1109/UKSim.2012.14","DOIUrl":"https://doi.org/10.1109/UKSim.2012.14","url":null,"abstract":"Software design flaws account for 50% software security vulnerability today. As attacks on vulnerable software continue to increase, the demand for secure software is also increasing thereby putting software developers under more pressure. This is especially true for those developers whose primary aim is to produce their software quickly under tight deadlines in order to release it into the market early. While there are many tools focusing on implementation problems during software development lifecycle (SDLC), this does not provide a complete solution in resolving software security problems. Therefore designing software with security in mind will go a long way in developing secure software. In this paper some of the current approaches used in integrating security at the design level of SDLC are discussed briefly and a new method of evaluating software design using neural network is presented. With the aid of the proposed neural network tool, this research found out that software design scenarios can be matched to attack patterns that identify the security flaws in the design scenarios. The result of performance of the neural network is presented in this paper.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117096494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scatter and Doppler Effect of Wind Power Plants to Land Radars","authors":"Derya Sozen, M. Kartal","doi":"10.1109/UKSim.2012.68","DOIUrl":"https://doi.org/10.1109/UKSim.2012.68","url":null,"abstract":"Wind power plant installations at different scales are in an increasing pattern starting from year 2000. A curiosity has been raised about 4-5 years ago for if wind turbines interfere with radars. The interference occurs when wind turbines reflect radar waves and cause missing targets and blind regions on radar images. Doppler radars are most used to discriminate between the return from a desired target and that from undesired objects, usually ground clutter [1]. There are so many resulting effects of interference such as shadowing, damage to radar equipment, larger radar cross section (RCS) and missing desired targets, etc. Both radar and wind power plant mitigations are available. But still, there is no overall solution, only case by case treatment. RADAR is an acronym for RAdio Detection And Ranging, it will be used as \"radar\" throughout this paper.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116155988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection of Integrity and Ownership of PDF Documents Using Invisible Signature","authors":"I. A. Shaikhli, A. Zeki, R. Makarim, A. Pathan","doi":"10.1109/UKSim.2012.81","DOIUrl":"https://doi.org/10.1109/UKSim.2012.81","url":null,"abstract":"Distributing digital document through insecure channel leads to the question of the integrity and the ownership of the file on the receiver's side. Employing hash function and digital signature algorithms solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. In this paper, a method to attach digital signature in Portable Document File (PDF) as invisible watermark is proposed. We show that the space character that splits the field in cross-reference table can be overwritten without corrupting the file. The method to embed and extract the signature are proven to be efficient, since the offset index for cross-reference table are available at the end of the file. Our proposed method to embed the signature in the PDF file does not increase the size of the file and offer flexibility for the user to implements the digital signature scheme of his/her own preference.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}