H. Elfeqy, M. Shahin, A. Al-Rumaihi, A. Massoud, A. Gastli
{"title":"A highly efficient PV power system for DC MicroGrids","authors":"H. Elfeqy, M. Shahin, A. Al-Rumaihi, A. Massoud, A. Gastli","doi":"10.1109/ISCAIE.2016.7575060","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575060","url":null,"abstract":"Climate change attracted widespread attention to shift towards environmentally friendly energy sources such as photovoltaics. Considering the facts that there are large numbers of DC loads that are used in today's buildings, the existing infrastructure is an AC power system, and the PV is a DC source, there will be power losses in the DC-AC-DC conversions. Therefore, the concept of using a DC MicroGrid can provide more efficient power to native DC loads directly from the DC green sources, with minimum conversions. This paper attempts to design a highly efficient power system for a DC MicroGrid. One building at Qatar University is selected and considered as a case study for the DC MicroGrid system integration. This paper discusses also the simulation of PV modeling and the maximum power point tracker using Matlab/Simulink. In addition, a feasibility study is carried out to investigate the viability of the system design through the implementation of two DC-DC converters: interleaved boost converter for the PV system and bidirectional buck converter for the energy storage system. The results are very satisfactory.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115530952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laith Mohammad Abualigah, A. Khader, M. Al-Betar, M. Awadallah
{"title":"A krill herd algorithm for efficient text documents clustering","authors":"Laith Mohammad Abualigah, A. Khader, M. Al-Betar, M. Awadallah","doi":"10.1109/ISCAIE.2016.7575039","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575039","url":null,"abstract":"Recently, due to the huge growth of web pages, social media and modern applications, text clustering technique has emerged as a significant task to deal with a huge amount of text documents. Some web pages are easily browsed and tidily presented via applying the clustering technique in order to partition the documents into a subset of homogeneous clusters. In this paper, two novel text clustering algorithms based on krill herd (KH) algorithm are proposed to improve the web text documents clustering. In the first method, the basic KH algorithm with all its operators is utilized while in the second method, the genetic operators in the basic KH algorithm are neglected. The performance of the proposed KH algorithms is analyzed and compared with the k-mean algorithm. The experiments were conducted using four standard benchmark text datasets. The results showed that the proposed KH algorithms outperformed the k-mean algorithm in term of clusters quality that is evaluated using two common clustering measures, namely, Purity and Entropy.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"153 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120913581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of autism children gait patterns using Neural Network and Support Vector Machine","authors":"Suryani Ilias, N. Tahir, R. Jailani, C. Hasan","doi":"10.1109/ISCAIE.2016.7575036","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575036","url":null,"abstract":"In this study, we deemed further to evaluate the performance of Neural Network (NN) and Support Vector Machine (SVM) in classifying the gait patterns between autism and normal children. Firstly, temporal spatial, kinetic and kinematic gait parameters of forty four subjects namely thirty two normal subjects and twelve autism children are acquired. Next, these three category gait parameters acted as inputs to both classifiers. Results showed that fusion of temporal spatial and kinematic contributed the highest accuracy rate for NN classifier specifically 95% whilst SVM with polynomial as kernel, 95% accuracy rate is contributed by fusion of all gait parameters as inputs to the classifier. In addition, the classifiers performance is validated by computing both value of sensitivity and specificity. With SVM using polynomial as kernel, sensitivity attained is 100% indicated that the classifier's ability to perfectly discriminate normal subjects from autism subjects whilst 85% specificity showed that SVM is able to identify autism subjects as autism based on their gait patterns at 85% rate.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128530490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social login privacy alert: Does it improve privacy awareness of facebook users?","authors":"Lee Kah Moey, N. Katuk, M. Omar","doi":"10.1109/ISCAIE.2016.7575044","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575044","url":null,"abstract":"Social login (SL) allows web application providers to obtain authentication service from social network providers for users who own the social network accounts. By approving a consent dialogue, users are granted access to the web applications when login using the SL. It also allows web application providers to access personal information that is associated with the users' social network credentials (SNC). This can be a source to privacy leakage if the users simply approve the consent dialogue without understanding the contents. Therefore, this research intends to explore users' privacy awareness when they login to web applications using SL for the first time particularly using Facebook SNC. An experimental study was conducted to evaluate the effects of SL permission messages on users' privacy awareness. The results suggested that the permission message with privacy alert has significantly increased the participants' awareness on the privacy of their personal information obtained through SNC. The outcome of this study provides an opportunity as a guide to increase users' awareness on the privacy of their personal information obtained from SNC.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124508237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mariam Elmenshawy, Mena S. ElMenshawy, A. Massoud, A. Gastli
{"title":"Solar car efficient power converters' design","authors":"Mariam Elmenshawy, Mena S. ElMenshawy, A. Massoud, A. Gastli","doi":"10.1109/ISCAIE.2016.7575059","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575059","url":null,"abstract":"The first solar car racing named as the World Solar Challenge was organised in Australia aiming to trigger the development of solar powered vehicles by researchers all over the world, and so do, various technologies have emerged targeting to make solar powered vehicles perform similar to fuel powered vehicles. Nevertheless, such vehicles still have limitations in terms of energy management technology, including photovoltaic and energy storage system. A solar car energy management system must ensure that the flow of electrical power from the PV and from/to the energy storage devices to the motor are optimised and monitored. Energy efficiency and light weight are important factors for a successful vehicle. In order to achieve that in this work, a 5 kWh Lithium ion battery, 2 kW in-wheel axial flux permanent magnet brushless DC motor with a rated voltage of 48 V, 1035 W monocrystalline PV modules, and silicon carbide devices in power converters are selected to attain such constraints. In addition, ultra capacitor is used as a second energy storage device to take the advantages of the fast charging and discharging. Buck-Boost converters are designed to regulate the output voltage of the three sources which are PV panel, battery, and ultra capacitor. The proposed design was validated with simulations and experiments.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"122 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132803911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security metrics maturity model for operational security","authors":"S. Muthukrishnan, S. Palaniappan","doi":"10.1109/ISCAIE.2016.7575045","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575045","url":null,"abstract":"Information Technology (IT) is continuously evolving at faster rate and enterprises are always trying to keep pace with the changes. So do the threats. As the complexity of IT increase, the unprecedented threat environment and security challenges also have increased multi fold over the years. Security Managers are continuously having challenging task not only protecting their company but also convincing the stakeholders on the security investments. The well informed stakeholder demands higher level transparency, Return on Investment (ROI) and security. Security metrics plays a key role in responding to these demands. However the security metrics alone are not enough but must be substantiated. The stakeholders always question and challenge the metrics provided. They are always skeptical on the numbers shown in metrics. As such, more information is needed to substantiate the metrics claims. Therefore, this research will explore the identification of quality security elements to determine the matured security metrics within operational security environment. The research will categorize the metrics maturity into three types: infant, evolving and matured metrics. The classification is performed by analyzing the quality of a metric through a scorecard and by providing a scoring. Towards the end Security Metrics Maturity Index (SM-Mi) is introduced to label a company on how trustable and confidence on can feel when look into the metrics. The entire classification uses operational security taxonomy for better understanding. The end result of this research will be a guide for the Security Managers to produce a convincing and close to accurate report for C Level management of an organization. This research will look into various studies done on existing measurements and security elements for Security Metrics and produce a method that will portray the maturity of security metrics used in an organization.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132738096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Baharom, M. N. Seroji, M. Salleh, K. S. Muhammad
{"title":"Impact of switching frequency variation to the power transfer efficiency of wireless power transfer converter","authors":"R. Baharom, M. N. Seroji, M. Salleh, K. S. Muhammad","doi":"10.1109/ISCAIE.2016.7575050","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575050","url":null,"abstract":"This paper presents the impact of the switching frequency variation to the power transfer efficiency of a wireless power transfer converter. An experimental demonstrator is used to as a model for this study. The transmitter use Wurth Elektronik wireless power charging coils, 24μH, 10%, which is installed across the output of high frequency half-bridge inverter. The switching frequency is varied from 10kHz in steps of 10kHz until 100kHz. The distance between the coils is fixed at 10mm. The receiving coil is fed with a high frequency full-bridge rectifier and a DC load. Experimental results show that the power transfer efficiency varies when the switching frequency is increased. The power transfer efficiency reached its peak at 72% when the switching frequency is at 30kHz.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115799823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Raja, Ahmad Ali, Mansoor Ahmed, Abid Khan, A. P. Malik
{"title":"Semantics enabled role based sentiment analysis for drug abuse on social media: A framework","authors":"B. Raja, Ahmad Ali, Mansoor Ahmed, Abid Khan, A. P. Malik","doi":"10.1109/ISCAIE.2016.7575064","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575064","url":null,"abstract":"With the advent of World Wide Web, social networking has evolved as a major driving force for communication and information sharing. Its usage has reinforced the concept of Six Degree of Separation in its true manner. Social media can be used for prediction, propagation, marketing and influencing purposes. The aim of this research is to present a comprehensive and novel framework that uses the social media to expedite the epidemiologic study and drug abuse. To achieve the aforesaid task a semantic web (SW) based model that enlightens itself with sentiment analysis (SA) is proposed with the amalgamation of role based (RB) ontological structure. The architecture not only evolves the drug abuse trends but also has the capability to suggest the stakeholders that how the drug addicts are influenced to curtail the illegitimate use of drugs. Ontology based role hierarchy calculates the influence factor of people around the drug abusers and suggests an appropriate personality that can influence the drug abuser to abstain from the drug abuse.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124026816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayman A. Zayyan, M. Elmahdy, Husniza binti Husni, J. A. Al Ja'am
{"title":"Automatic diacritics restoration for modern standard arabic text","authors":"Ayman A. Zayyan, M. Elmahdy, Husniza binti Husni, J. A. Al Ja'am","doi":"10.1109/ISCAIE.2016.7575067","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575067","url":null,"abstract":"In this paper, the problem of missing diacritic marks in most of Arabic written resources is investigated. Our aim is to implement a scalable and extensible platform to automatically restore missing diacritic marks for Modern Standard Arabic text. Different rule-based and statistical techniques are proposed. These include: morphological analyzer-based, maximum likelihood estimate, and statistical n-gram models. Diacritization accuracy of each technique was evaluated based on Diacritic Error Rate (DER) and Word Error Rate (WER). The proposed platform includes helper tools for text preprocessing and encoding conversion. It yielded a WER of 7.1% and DER of 3.9%. When the case ending was ignored, the platform yielded a WER and DER of 5.1% and 2.7%, respectively.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132173835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Car alarm detection device","authors":"Y. Faridah, W. M. Amir Asyraf W. Rahman","doi":"10.1109/ISCAIE.2016.7575062","DOIUrl":"https://doi.org/10.1109/ISCAIE.2016.7575062","url":null,"abstract":"Number of break-ins either in cars or houses are rising at an alarming rate. This cause problems to society in terms of loss of belongings or precious items and damages of the properties. This system is designed to help car users to protect their cars from such incidents with the use of alarm and GSM module. It focused on detection of movement inside the vehicle with sensor. An SMS is send to the owner with no sound of alarm to notify on the intrusion. After receiving the notification, only the owner can unlock the car as the system as it used a remote controlled switch key.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125305069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}