{"title":"Forward Kinematics of 3 Degree of Freedom Delta Robot","authors":"M. Mustafa, R. Misuari, H. Daniyal","doi":"10.1109/SCORED.2007.4451401","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451401","url":null,"abstract":"Delta robot is a type of parallel robot. It consists of three arms connected to universal joints at the base. In this project, 3 degree of freedom Delta robot use of parallelograms in the arms, this maintains the orientation of the end effectors. The development of the Delta robot corresponds to the current requirement of having a robot able to transfer amount of light object in the least time. In this paper involves forward kinematics calculation using S-S (spherical-spherical) joint pair and compared with real position of Delta robot.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116982494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring the TEC Variation Using GPS Dual Frequency System During Quiet and Disturbed Day","authors":"N. Ya'acob, M. H. Jusoh, M. Abdullah, M. Ismail","doi":"10.1109/SCORED.2007.4451417","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451417","url":null,"abstract":"The Global Positioning System (GPS) has become a powerful tool for ionospheric studies. The parameter of the ionosphere that produces most of the effects on radio signals is the total electron content (TEC). This paper reports on the variability of the total electron content (TEC) during the North Sumatra earthquake of 26 December 2004 with a magnitude of 9.3 Richter scale. TEC is measured 7 days before and 6 days after the earthquake. The GPS data is taken from JUPEM (Malaysian mapping and Geodesy department). Four sets of data are selected from different GPS satellites that passed near the earthquake location. Results show that earthquake precursors can be seen at nighttime and early morning beginning from 21 December 2004, which is five days before the occurrence of earthquake until one day before the earthquake, which is on 25 December 2004. The results show a good agreement with other researchers who studied other earthquakes.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128562951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weed Detection utilizing Quadratic Polynomial and ROI Techniques","authors":"A. J. Ishak, S. S. Mokri, M. Mustafa, A. Hussain","doi":"10.1109/SCORED.2007.4451360","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451360","url":null,"abstract":"Machine vision for selective weeding or selective herbicide spraying relies substantially on the ability of the system to analyze weed images and process the extracted knowledge for decision making prior to implementing the identified control action. To control weed, different weed type would require different herbicide formulation. Consequently the weed must be identified and classified accordingly. In this work, weed images were classified as either broad or narrow weed type. A fundamental problem in weed image recognition using planar curve analysis is to detect curve. It is difficult to successfully extract curve from the image of weed edges since the appropriate scale to use for extraction is not known a priori. As such, this paper considers a curve detection method based on the quadratic polynomial technique which include the use of the region-of- interests (ROI) technique. The ROI technique creates image subsets by selecting regions of the displayed image. The ROIs are typically used to extract statistics for image operations such as classification. As such, the objective of this paper is to present a novel application of curve detection feature extraction technique in weed classification.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134349389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. V. Viswacheda, P. Surireddy, M. S. Arifianto, M. Y. Hamid, E. Husni, L. Barukang
{"title":"Investigations of the Use of PosEye for Position Measurements","authors":"D. V. Viswacheda, P. Surireddy, M. S. Arifianto, M. Y. Hamid, E. Husni, L. Barukang","doi":"10.1109/SCORED.2007.4451380","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451380","url":null,"abstract":"The PosEye system is basically a position measurement system which takes images of the reference. The infra-red LEDs which emits IR lights is captured by the CCD and is used as the reference. In this system the absolute positioning and orientation were made with the help of a PosEye. The PosEye is normally fixed on a robot arm or the object which requires orientation of its own position in correspondence to its reference points in the working area. This paper discusses general ideas about reference markers, set-up procedures, and issues behind the sensor. This mainly includes the principles of PosEye sensor, basics of vision and cameras. The paper details the experiments in which results were obtained through the PosEye system with the help of electronics and PosEye camera. In the experimental setup, the connection of PosEye with the electronic application is presented, the usage of PosEye and the robot control system communication with the PosEye system using coordinate system. The working of the PosEye system is observed by taking images on the reference plate and finding the co-ordinates (x, y, z). The manipulation of the obtained images to the robot for a movement is also studied.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133812244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design","authors":"M. Bhakti, A. Abdullah, L. T. Jung","doi":"10.1109/SCORED.2007.4451356","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451356","url":null,"abstract":"Wireless networks have grown rapidly and more becoming part of our life, due to its advantages over the wired network, such as convenience, mobility, and flexibility. However the security concerns in wireless networks might have prevented its further widespread adoption. One of the solutions to overcome the wireless network security concerns is the IEEE 802.1X specification, a mechanism for port-based network access control, which is based on extensible authentication protocol (EAP), an authentication framework that can support multiple authentication methods. This paper proposed a design for an extension to the EAP framework for EAP authentication method selection purpose. The design then can be used to develop a simulation model of the EAP method selection mechanism.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127725160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Modulation and Channel Coding Candidates for Adaptive Data Communication System","authors":"R. Sidek, A.Z. bin Sha'ameri","doi":"10.1109/SCORED.2007.4451362","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451362","url":null,"abstract":"This paper evaluates at the various modulation and coding techniques suitable for adaptive data communication system. The techniques evaluated are applicable to HF spectrum. Examples of modulation and coding scheme that are evaluated include PACTOR I, PACTOR II, PACTOR III, GTOR and STANAG 4285. Analysis of system performance is made in the presence of AWGN with future extension for multipath fading conditions. Comparison will be made based on the bit-error rate (BER), packet-error rate (PER) and the throughput. In addition, the effective data rate for all the schemes is compared with the Shannon capacity limit to ensure the optimal utilization of the given channel bandwidth. The modulation and coding scheme that meets all of the above requirements will be used for future adaptive data communication system.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115264670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Development Methodology for Multithreaded Network Application","authors":"Nguyen Due Chinh, E. Kandasamy, Lam Yoke Khei","doi":"10.1109/SCORED.2007.4451394","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451394","url":null,"abstract":"Multithreading is becoming increasingly important for modern network programming. In inter-process communication platform, multithreaded applications have much benefit especially to improve application's throughput, responsiveness and latency. However, developing good quality of multithreaded codes is difficult, because threads may interact with each others in unpredictable ways. Although modern compilers can manage threads well, but in practice, synchronization errors (such as: data race errors, deadlocks) required careful management and good optimization method. The goal of this work is to discover common pitfalls in multithreaded network applications, present a software development technique to detect errors and optimize efficiently multithreaded applications. We compare performance of a single threaded network application with multithreaded network applications, use tools called Intelreg VTunetrade Performance Analyzer, Intelreg Thread Checker and our method to efficiently fix errors and optimize performance. Our methodology is divided into three phases: First phase is performance analysis using Intelreg VTunetrade Performance Analyzer with the aim is to identify performance optimization opportunities and detect bottlenecks. In second phase, with Intelreg Thread Checker we allocate data races, memory leakage and debug the multithreaded applications. In third phase, we apply tuning and optimization to the multithreaded applications. With the understanding of the common pitfalls in multithreaded network applications, through the development and debugging methodology aforementioned above, developers are able to optimize and tune their applications efficiently.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127446094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Robust SIFT-C Technique for Image Classification","authors":"K. Ghazali, S. S. Mokri, M. Mustafa, A. Hussain","doi":"10.1109/SCORED.2007.4451374","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451374","url":null,"abstract":"This paper describes the development of a robust technique for image classification using scale invariant feature transform (SIFT), abbreviated as SIFT-C. The proposed SIFT-C technique was developed to cater for varying conditions such as lightings, resolution and target range which are known to affect classification accuracies. In this study, the SIFT algorithm is used to extract a set of feature vectors to represent the image and the extracted feature sets are then used for classification of two classes of weed. The weeds are classified as either broad or narrow weed type and the decision will be used in the control strategy of weed infestation in palm oil plantations. The effectiveness of the robust SIFT-C technique was put to test using offline weed images that were captured under various conditions which truly reflect the actual field conditions. A classification accuracy of 95.7% was recorded which implies the effectiveness of the SIFT-C.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130569034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Problem Difficulty for Genetic Algorithm in Combinatorial Optimization","authors":"Z. Zukhri, K. Omar","doi":"10.1109/SCORED.2007.4451368","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451368","url":null,"abstract":"This paper presents how difficult to handle (genetic algorithm) GA with combinatorial approach in clustering problem and an alternative approach is suggested. Clustering problem can be viewed as combinatorial optimization. In this paper, the objects must be clustered are new students. They must be allocated into a few of classes, so that each class contains students with low gap of intelligence. Initially, we apply GA with combinatorial approach. But experiments only provide a small scale case (200 students and 5 classes). Then we try to apply GA with binary chromosome representation and we evaluate it with the same data. We have successfully improved the performance with this approach. This result seems to indicate that GA is not effective to be applied for solving combinatorial optimization problems in general. We suggest that binary representation approach should be used to avoid this difficulty.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126945481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EEG Analysis of Wake-sleep Data using UMACE filter","authors":"R. Ghafar, N. Tahir, A. Hussain, S. Samad","doi":"10.1109/SCORED.2007.4451421","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451421","url":null,"abstract":"Electroencephalogram (EEG) signal has been found to be the most predictive and reliable indicator in wake-sleep research. It is a real time signal that reflects the brain states of a subject including the alertness. However the study of wake-sleep condition using EEG signal is difficult due to the complexity of the EEG signal itself. The exact underlying dynamics of the EEG data is still questionable. EEG signal varies from one individual to another and has an inter variability in the same physiological state. It is hard to compare the EEG to the specific pattern of individual or situation. This paper tries to investigate the use of UMACE in distinguish between awake and sleep state of a subject. Normal EEG data from individual is used as an input in building UMACE filter. From the result, we find UMACE has the capability to distinguish awake and sleep state of a subject.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130358912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}