{"title":"Effect of 132kV Cross-Country Fault on Distance Protection System","authors":"A. Zin, N. A. Omar, A. M. Yusof, S. Karim","doi":"10.1109/AMS.2012.17","DOIUrl":"https://doi.org/10.1109/AMS.2012.17","url":null,"abstract":"Towers with different voltage levels are now widely used transmission system. On this situation, it is probably that the faults that occurred will involve the two different voltage levels at the same time in a same tower. This paper presents the study of the effect of cross-country fault on distance protection. This study has been performed on a simple model circuit in transmission line. The cross-country fault analysis is more complicated than basic fault because it has to be considered fault locations simultaneously in the analysis. PSCAD/EMTDC software is used to perform the modeling and analysis of the effect of cross-country fault on distance protection. From simulation result, it can be identified the effect of cross-country fault on distance protection and the result can be compared with the basic fault analysis.","PeriodicalId":407900,"journal":{"name":"2012 Sixth Asia Modelling Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124664933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crash Prediction System for Mobile Device on Android by Using Data Stream Minning Techniques","authors":"Garima Singh, S. Dongre","doi":"10.1109/AMS.2012.16","DOIUrl":"https://doi.org/10.1109/AMS.2012.16","url":null,"abstract":"As an accident is very common scenario for today's world. This paper presents one more step towards safety of driving through an application called Crash Prediction System (CPS). That analyzes driver's behaviour in real time and predicts that whether driver is suitable or not for driving. This system requires various profile of driver's detail for accurate prediction and gives result like Fit, Unfit and Partially Fit. For this application a concept of Data Stream minning is used with Principle Component Analysis (PCA) and Hidden Markov Model (HMM) techniques. Other interactive feature for this application is that, it used for mobile device. A large range of application is running on mobile device which are facing problem like a memory, computational capability, battery and many more. For eliminating all these issues there is a platform known as Android which we used for this application. Experiment result of CPS on Google Android platform is presented, proving the effectiveness of the proposed system.","PeriodicalId":407900,"journal":{"name":"2012 Sixth Asia Modelling Symposium","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123848722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visual Object Categorization Based on Orientation Descriptor","authors":"H. Ayad, S. N. H. S. Abdullah, A. Abdullah","doi":"10.1109/AMS.2012.43","DOIUrl":"https://doi.org/10.1109/AMS.2012.43","url":null,"abstract":"The demand of new fast technology and image investigation in many applications has made managing visual object categorization techniques extremely important. The main problem of visual object categorization is the semantic gap (categorization problem). Currently, several researches show that using a texture feature could improve the categorization problem especially when using orientation descriptors. Mainly, in this research the edge histogram descriptor has been selected to extract the texture feature. Obviously, the main demerit of using this kind of texture descriptor is it uses single orientation to extract the texture feature. Therefore, the Gabor filter has been proposed to improve the performance of this descriptor by constructing different feature maps based on different scale and orientation. To demonstrate the performance of the proposed method, the first 20 classes of the Caltech 101 dataset have been used. Moreover, we compared the performance recognition of the proposed method in two different domains, namely spatial and frequency domains. Finally, the result shows that the proposed method in the spatial domain outperforms the proposed method in the frequency domain. This is because of losing some of the basic raw data though using Fast Fourier Transform algorithm in converting the system to the frequency domain.","PeriodicalId":407900,"journal":{"name":"2012 Sixth Asia Modelling Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132914767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business Simulation Game Development for Education and Training in Supply Chain Management","authors":"Y. Merkuryev, J. Bikovska","doi":"10.1109/AMS.2012.12","DOIUrl":"https://doi.org/10.1109/AMS.2012.12","url":null,"abstract":"This paper presents a simulation-based business game for training and education in the area of supply chain management. It starts with a short review of existing simulation games used for training and education in supply chain management, which is followed by a brief description of the ECLIPS game that has been developed for providing an insight into various aspects of supply chain management, with opportunity to analyze different supply chain structures and control mechanisms. In particular, the application of the ECLIPS game to comparison of different supply chain inventory management policies, including non-cyclic and cyclic ones, is provided. Also, the paper presents a special computer-aided tool that allows testing and evaluating various scenarios of the ECLIPS game. The method of scenario evaluation is described as well.","PeriodicalId":407900,"journal":{"name":"2012 Sixth Asia Modelling Symposium","volume":"13 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114032667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Reconstruction Using Zernike Moment and Discrete Cosine Transform: A Comparison","authors":"H. Norhazman, A. Nor'aini","doi":"10.1109/AMS.2012.45","DOIUrl":"https://doi.org/10.1109/AMS.2012.45","url":null,"abstract":"Image reconstruction is very much concerned with the ability to reproduce image of possibly the same quality as original. This paper presents the comparison of Zernike Moment (ZM) and Discrete Cosine Transform (DCT) for image reconstruction in noise environment. Two types of images used are gray scale and binary. The original images are corrupted with three different noises that are Salt and Pepper, Gaussian and Random. Both original and corrupted images are reconstructed using Inverse Zernike Moment and Inverse Discrete Cosine Transform. The performance of each algorithm is measured by evaluating Peak Signal to Noise Ratio (PSNR) for the reconstructed gray scale of pixel size 64×64 and binary of pixel size 30×30 images. The comparison of PSNR values between the two techniques proves that Zernike Moment is less sensitive to noisy images compared to Discrete Cosine Transform.","PeriodicalId":407900,"journal":{"name":"2012 Sixth Asia Modelling Symposium","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125104026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Innovative Model for Optimizing Software Risk Mitigation Plan: A Case Study","authors":"A. Khatavakhotan, S. H. Ow","doi":"10.1109/AMS.2012.55","DOIUrl":"https://doi.org/10.1109/AMS.2012.55","url":null,"abstract":"Software risk management process like any other process faces some threats. Ignoring such threats may influence the efficiency of software systems. The risk mitigation process would not be proper if the unseen risks neglected. The model in this research presents the best combination of solutions for integration of risk mitigation plan. The proposed model facilitates the identification of circumferential opportunities and risks in mitigation process. In addition, hidden competencies will be identified and the effectiveness of risk mitigation decisions will be optimized. By applying the method on the active software project, the circumferential risks and opportunities were detected and prioritized based on the obtained values. The case study verifies the model in practice and shows its applicability.","PeriodicalId":407900,"journal":{"name":"2012 Sixth Asia Modelling Symposium","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129566144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Abdelgawad, M. Snaprud, J. Krogstie, Rudolph Brynn
{"title":"Disabled People from Welfare to Jobs: A Decision Support Tool","authors":"A. Abdelgawad, M. Snaprud, J. Krogstie, Rudolph Brynn","doi":"10.1109/AMS.2012.24","DOIUrl":"https://doi.org/10.1109/AMS.2012.24","url":null,"abstract":"Despite repeated statements from successive governments in Norway, disabled people employment rate remains unchanged since 2000. A range of studies to describe and analyse the situation qualitatively and quantitatively have been performed, however we have not been able to find any study containing a decision support tool focusing on this issue. This paper presents a simulation model, built using the System Dynamics methodology. The model focuses on enabling disabled people to move from welfare to work, incorporating attitudes of disabled people and employers. The model is designed to cover selected factors that are believed to enable and encourage disabled people to take up jobs. It is intended to be used by policy makers, disability organisations, and individual citizens, and support more targeted discussions among them. To build the underlying model we have conducted an extensive literature review, and two surveys on attitudes of disabled people and employers. The paper contains a description of the model structure, and its behaviour.","PeriodicalId":407900,"journal":{"name":"2012 Sixth Asia Modelling Symposium","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114899701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Segmentation of Speech Signal Using MFCC and Acoustic Parameters","authors":"Zhandos Yessenbayev","doi":"10.1109/AMS.2012.26","DOIUrl":"https://doi.org/10.1109/AMS.2012.26","url":null,"abstract":"In the current work, we investigate the effect of combining the mel-frequency cepstral coefficients (MFCC) with the acoustic parameters (AP) in the task of segmentation of continuous speech into sonorant and obstruent regions using Hidden Markov Models (HMM) with Gaussian Mixture Models (GMM). Along with the influence of APs to the performance of the model built, we analyze the set of acoustic features extracted for each phoneme to see how robust they are in the noise. All the experiments were conducted on TIMIT database. The results of the experiments show that there are APs, which have nice separating property and, therefore, improve the performance of a system if used with MFCCs, however, they are not robust to noise. On the other hand, there are APs, which do not have this property, but possess the intrinsic stability in noisy conditions and, as a result, add some robustness to a system.","PeriodicalId":407900,"journal":{"name":"2012 Sixth Asia Modelling Symposium","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114717682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"End-to-End Delay Bounds Analysis of Different On-chip Cache Coherence Policies: A Network Calculus-Based Approch","authors":"X. Lai, Zhiying Wang, Quanyou Feng","doi":"10.1109/AMS.2012.27","DOIUrl":"https://doi.org/10.1109/AMS.2012.27","url":null,"abstract":"To analyze and compare end-to-end delay bounds of different cache coherence policies will provide beneficial guidelines for NoC design. However, it is not an easy task, because 1) packet flows generated by cache coherence events do not conform to the Poisson process, traditional queue theorem can't be applied to the performance analyzing for the NoCs that support cache coherence, 2) broadcast or multicast operations, which will duplicate the cache coherence packets, makes the analysis much more complicated. To address these challenges, in this paper, we use the stochastic network calculus to analyze the end-to-end delay bounds of different cache coherence policies. Specifically, we utilize Markov-modulated On-Off (MMOO) flow to model the arrival process of cache coherence events, and then deduce the general end-to-end delay bounds for different cache coherence policies. Furthermore, to deal with packet duplication issues in broadcast or multicast operations, we develop an analytical model based on scaling functions to study their impacts on end-to-end delay bounds.","PeriodicalId":407900,"journal":{"name":"2012 Sixth Asia Modelling Symposium","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116020460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparison of Iris Localization Techniques for Pattern Recognition Analysis","authors":"A. Nor'aini, R. Sahak, A. Saparon","doi":"10.1109/AMS.2012.44","DOIUrl":"https://doi.org/10.1109/AMS.2012.44","url":null,"abstract":"This paper presents a comparison of iris localization techniques namely, Circular Hough Transform (CHT), Daugman's Integro Differential Operator (DIDO) and Circular Boundary Detector (CBD) for localization of iris region. The difference among these three techniques are, CHT employs a segmentation technique to highlight the edges of interest and the circular shape of the iris is detected using the equation of circle, DIDO makes use of integro differential operator for locating the iris and pupil regions while CBD is developed based on the equation of circle by first selecting two points at the iris region: one at the center and the other one at the circumference of the iris. Once this selection has been made, the computation of the outer iris boundary takes place. The same procedure is repeated for the construction of inner iris boundary. The circular iris region can be un-wrapped into rectangular form for the purpose of pattern recognition analysis. The iris localization was conducted on iris images taken from healthy women free from Human Papilloma Virus (HPV). The results show that CBD is able to localize the iris region for all tested iris images while using DIDO and CHT, not all iris images can be localized precisely.","PeriodicalId":407900,"journal":{"name":"2012 Sixth Asia Modelling Symposium","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116448544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}