2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)最新文献

筛选
英文 中文
A highly efficient PV power system for DC MicroGrids 一种用于直流微电网的高效光伏发电系统
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2016-09-26 DOI: 10.1109/ISCAIE.2016.7575060
H. Elfeqy, M. Shahin, A. Al-Rumaihi, A. Massoud, A. Gastli
{"title":"A highly efficient PV power system for DC MicroGrids","authors":"H. Elfeqy, M. Shahin, A. Al-Rumaihi, A. Massoud, A. Gastli","doi":"10.1109/ISCAIE.2016.7575060","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575060","url":null,"abstract":"Climate change attracted widespread attention to shift towards environmentally friendly energy sources such as photovoltaics. Considering the facts that there are large numbers of DC loads that are used in today's buildings, the existing infrastructure is an AC power system, and the PV is a DC source, there will be power losses in the DC-AC-DC conversions. Therefore, the concept of using a DC MicroGrid can provide more efficient power to native DC loads directly from the DC green sources, with minimum conversions. This paper attempts to design a highly efficient power system for a DC MicroGrid. One building at Qatar University is selected and considered as a case study for the DC MicroGrid system integration. This paper discusses also the simulation of PV modeling and the maximum power point tracker using Matlab/Simulink. In addition, a feasibility study is carried out to investigate the viability of the system design through the implementation of two DC-DC converters: interleaved boost converter for the PV system and bidirectional buck converter for the energy storage system. The results are very satisfactory.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115530952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A krill herd algorithm for efficient text documents clustering 一种高效文本文档聚类的磷虾群算法
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2016-05-30 DOI: 10.1109/ISCAIE.2016.7575039
Laith Mohammad Abualigah, A. Khader, M. Al-Betar, M. Awadallah
{"title":"A krill herd algorithm for efficient text documents clustering","authors":"Laith Mohammad Abualigah, A. Khader, M. Al-Betar, M. Awadallah","doi":"10.1109/ISCAIE.2016.7575039","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575039","url":null,"abstract":"Recently, due to the huge growth of web pages, social media and modern applications, text clustering technique has emerged as a significant task to deal with a huge amount of text documents. Some web pages are easily browsed and tidily presented via applying the clustering technique in order to partition the documents into a subset of homogeneous clusters. In this paper, two novel text clustering algorithms based on krill herd (KH) algorithm are proposed to improve the web text documents clustering. In the first method, the basic KH algorithm with all its operators is utilized while in the second method, the genetic operators in the basic KH algorithm are neglected. The performance of the proposed KH algorithms is analyzed and compared with the k-mean algorithm. The experiments were conducted using four standard benchmark text datasets. The results showed that the proposed KH algorithms outperformed the k-mean algorithm in term of clusters quality that is evaluated using two common clustering measures, namely, Purity and Entropy.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"153 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120913581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Classification of autism children gait patterns using Neural Network and Support Vector Machine 基于神经网络和支持向量机的自闭症儿童步态模式分类
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2016-05-30 DOI: 10.1109/ISCAIE.2016.7575036
Suryani Ilias, N. Tahir, R. Jailani, C. Hasan
{"title":"Classification of autism children gait patterns using Neural Network and Support Vector Machine","authors":"Suryani Ilias, N. Tahir, R. Jailani, C. Hasan","doi":"10.1109/ISCAIE.2016.7575036","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575036","url":null,"abstract":"In this study, we deemed further to evaluate the performance of Neural Network (NN) and Support Vector Machine (SVM) in classifying the gait patterns between autism and normal children. Firstly, temporal spatial, kinetic and kinematic gait parameters of forty four subjects namely thirty two normal subjects and twelve autism children are acquired. Next, these three category gait parameters acted as inputs to both classifiers. Results showed that fusion of temporal spatial and kinematic contributed the highest accuracy rate for NN classifier specifically 95% whilst SVM with polynomial as kernel, 95% accuracy rate is contributed by fusion of all gait parameters as inputs to the classifier. In addition, the classifiers performance is validated by computing both value of sensitivity and specificity. With SVM using polynomial as kernel, sensitivity attained is 100% indicated that the classifier's ability to perfectly discriminate normal subjects from autism subjects whilst 85% specificity showed that SVM is able to identify autism subjects as autism based on their gait patterns at 85% rate.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128530490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Social login privacy alert: Does it improve privacy awareness of facebook users? 社交登录隐私警报:facebook用户的隐私意识提高了吗?
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2016-05-30 DOI: 10.1109/ISCAIE.2016.7575044
Lee Kah Moey, N. Katuk, M. Omar
{"title":"Social login privacy alert: Does it improve privacy awareness of facebook users?","authors":"Lee Kah Moey, N. Katuk, M. Omar","doi":"10.1109/ISCAIE.2016.7575044","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575044","url":null,"abstract":"Social login (SL) allows web application providers to obtain authentication service from social network providers for users who own the social network accounts. By approving a consent dialogue, users are granted access to the web applications when login using the SL. It also allows web application providers to access personal information that is associated with the users' social network credentials (SNC). This can be a source to privacy leakage if the users simply approve the consent dialogue without understanding the contents. Therefore, this research intends to explore users' privacy awareness when they login to web applications using SL for the first time particularly using Facebook SNC. An experimental study was conducted to evaluate the effects of SL permission messages on users' privacy awareness. The results suggested that the permission message with privacy alert has significantly increased the participants' awareness on the privacy of their personal information obtained through SNC. The outcome of this study provides an opportunity as a guide to increase users' awareness on the privacy of their personal information obtained from SNC.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124508237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Solar car efficient power converters' design 太阳能汽车高效电源转换器的设计
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2016-05-30 DOI: 10.1109/ISCAIE.2016.7575059
Mariam Elmenshawy, Mena S. ElMenshawy, A. Massoud, A. Gastli
{"title":"Solar car efficient power converters' design","authors":"Mariam Elmenshawy, Mena S. ElMenshawy, A. Massoud, A. Gastli","doi":"10.1109/ISCAIE.2016.7575059","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575059","url":null,"abstract":"The first solar car racing named as the World Solar Challenge was organised in Australia aiming to trigger the development of solar powered vehicles by researchers all over the world, and so do, various technologies have emerged targeting to make solar powered vehicles perform similar to fuel powered vehicles. Nevertheless, such vehicles still have limitations in terms of energy management technology, including photovoltaic and energy storage system. A solar car energy management system must ensure that the flow of electrical power from the PV and from/to the energy storage devices to the motor are optimised and monitored. Energy efficiency and light weight are important factors for a successful vehicle. In order to achieve that in this work, a 5 kWh Lithium ion battery, 2 kW in-wheel axial flux permanent magnet brushless DC motor with a rated voltage of 48 V, 1035 W monocrystalline PV modules, and silicon carbide devices in power converters are selected to attain such constraints. In addition, ultra capacitor is used as a second energy storage device to take the advantages of the fast charging and discharging. Buck-Boost converters are designed to regulate the output voltage of the three sources which are PV panel, battery, and ultra capacitor. The proposed design was validated with simulations and experiments.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"122 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132803911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security metrics maturity model for operational security 用于操作安全性的安全性度量成熟度模型
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2016-05-30 DOI: 10.1109/ISCAIE.2016.7575045
S. Muthukrishnan, S. Palaniappan
{"title":"Security metrics maturity model for operational security","authors":"S. Muthukrishnan, S. Palaniappan","doi":"10.1109/ISCAIE.2016.7575045","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575045","url":null,"abstract":"Information Technology (IT) is continuously evolving at faster rate and enterprises are always trying to keep pace with the changes. So do the threats. As the complexity of IT increase, the unprecedented threat environment and security challenges also have increased multi fold over the years. Security Managers are continuously having challenging task not only protecting their company but also convincing the stakeholders on the security investments. The well informed stakeholder demands higher level transparency, Return on Investment (ROI) and security. Security metrics plays a key role in responding to these demands. However the security metrics alone are not enough but must be substantiated. The stakeholders always question and challenge the metrics provided. They are always skeptical on the numbers shown in metrics. As such, more information is needed to substantiate the metrics claims. Therefore, this research will explore the identification of quality security elements to determine the matured security metrics within operational security environment. The research will categorize the metrics maturity into three types: infant, evolving and matured metrics. The classification is performed by analyzing the quality of a metric through a scorecard and by providing a scoring. Towards the end Security Metrics Maturity Index (SM-Mi) is introduced to label a company on how trustable and confidence on can feel when look into the metrics. The entire classification uses operational security taxonomy for better understanding. The end result of this research will be a guide for the Security Managers to produce a convincing and close to accurate report for C Level management of an organization. This research will look into various studies done on existing measurements and security elements for Security Metrics and produce a method that will portray the maturity of security metrics used in an organization.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132738096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Impact of switching frequency variation to the power transfer efficiency of wireless power transfer converter 开关频率变化对无线功率传输转换器功率传输效率的影响
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2016-05-30 DOI: 10.1109/ISCAIE.2016.7575050
R. Baharom, M. N. Seroji, M. Salleh, K. S. Muhammad
{"title":"Impact of switching frequency variation to the power transfer efficiency of wireless power transfer converter","authors":"R. Baharom, M. N. Seroji, M. Salleh, K. S. Muhammad","doi":"10.1109/ISCAIE.2016.7575050","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575050","url":null,"abstract":"This paper presents the impact of the switching frequency variation to the power transfer efficiency of a wireless power transfer converter. An experimental demonstrator is used to as a model for this study. The transmitter use Wurth Elektronik wireless power charging coils, 24μH, 10%, which is installed across the output of high frequency half-bridge inverter. The switching frequency is varied from 10kHz in steps of 10kHz until 100kHz. The distance between the coils is fixed at 10mm. The receiving coil is fed with a high frequency full-bridge rectifier and a DC load. Experimental results show that the power transfer efficiency varies when the switching frequency is increased. The power transfer efficiency reached its peak at 72% when the switching frequency is at 30kHz.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115799823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Semantics enabled role based sentiment analysis for drug abuse on social media: A framework 基于语义的基于角色的社交媒体药物滥用情绪分析:一个框架
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2016-05-30 DOI: 10.1109/ISCAIE.2016.7575064
B. Raja, Ahmad Ali, Mansoor Ahmed, Abid Khan, A. P. Malik
{"title":"Semantics enabled role based sentiment analysis for drug abuse on social media: A framework","authors":"B. Raja, Ahmad Ali, Mansoor Ahmed, Abid Khan, A. P. Malik","doi":"10.1109/ISCAIE.2016.7575064","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575064","url":null,"abstract":"With the advent of World Wide Web, social networking has evolved as a major driving force for communication and information sharing. Its usage has reinforced the concept of Six Degree of Separation in its true manner. Social media can be used for prediction, propagation, marketing and influencing purposes. The aim of this research is to present a comprehensive and novel framework that uses the social media to expedite the epidemiologic study and drug abuse. To achieve the aforesaid task a semantic web (SW) based model that enlightens itself with sentiment analysis (SA) is proposed with the amalgamation of role based (RB) ontological structure. The architecture not only evolves the drug abuse trends but also has the capability to suggest the stakeholders that how the drug addicts are influenced to curtail the illegitimate use of drugs. Ontology based role hierarchy calculates the influence factor of people around the drug abusers and suggests an appropriate personality that can influence the drug abuser to abstain from the drug abuse.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124026816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatic diacritics restoration for modern standard arabic text 自动变音符恢复现代标准阿拉伯语文本
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2016-05-30 DOI: 10.1109/ISCAIE.2016.7575067
Ayman A. Zayyan, M. Elmahdy, Husniza binti Husni, J. A. Al Ja'am
{"title":"Automatic diacritics restoration for modern standard arabic text","authors":"Ayman A. Zayyan, M. Elmahdy, Husniza binti Husni, J. A. Al Ja'am","doi":"10.1109/ISCAIE.2016.7575067","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575067","url":null,"abstract":"In this paper, the problem of missing diacritic marks in most of Arabic written resources is investigated. Our aim is to implement a scalable and extensible platform to automatically restore missing diacritic marks for Modern Standard Arabic text. Different rule-based and statistical techniques are proposed. These include: morphological analyzer-based, maximum likelihood estimate, and statistical n-gram models. Diacritization accuracy of each technique was evaluated based on Diacritic Error Rate (DER) and Word Error Rate (WER). The proposed platform includes helper tools for text preprocessing and encoding conversion. It yielded a WER of 7.1% and DER of 3.9%. When the case ending was ignored, the platform yielded a WER and DER of 5.1% and 2.7%, respectively.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132173835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Car alarm detection device 汽车报警检测装置
2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) Pub Date : 2016-05-30 DOI: 10.1109/ISCAIE.2016.7575062
Y. Faridah, W. M. Amir Asyraf W. Rahman
{"title":"Car alarm detection device","authors":"Y. Faridah, W. M. Amir Asyraf W. Rahman","doi":"10.1109/ISCAIE.2016.7575062","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575062","url":null,"abstract":"Number of break-ins either in cars or houses are rising at an alarming rate. This cause problems to society in terms of loss of belongings or precious items and damages of the properties. This system is designed to help car users to protect their cars from such incidents with the use of alarm and GSM module. It focused on detection of movement inside the vehicle with sensor. An SMS is send to the owner with no sound of alarm to notify on the intrusion. After receiving the notification, only the owner can unlock the car as the system as it used a remote controlled switch key.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125305069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信