2007 5th Student Conference on Research and Development最新文献

筛选
英文 中文
Forward Kinematics of 3 Degree of Freedom Delta Robot 三自由度Delta机器人的正运动学
2007 5th Student Conference on Research and Development Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451401
M. Mustafa, R. Misuari, H. Daniyal
{"title":"Forward Kinematics of 3 Degree of Freedom Delta Robot","authors":"M. Mustafa, R. Misuari, H. Daniyal","doi":"10.1109/SCORED.2007.4451401","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451401","url":null,"abstract":"Delta robot is a type of parallel robot. It consists of three arms connected to universal joints at the base. In this project, 3 degree of freedom Delta robot use of parallelograms in the arms, this maintains the orientation of the end effectors. The development of the Delta robot corresponds to the current requirement of having a robot able to transfer amount of light object in the least time. In this paper involves forward kinematics calculation using S-S (spherical-spherical) joint pair and compared with real position of Delta robot.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116982494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Monitoring the TEC Variation Using GPS Dual Frequency System During Quiet and Disturbed Day 利用GPS双频系统监测静日和扰动日的TEC变化
2007 5th Student Conference on Research and Development Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451417
N. Ya'acob, M. H. Jusoh, M. Abdullah, M. Ismail
{"title":"Monitoring the TEC Variation Using GPS Dual Frequency System During Quiet and Disturbed Day","authors":"N. Ya'acob, M. H. Jusoh, M. Abdullah, M. Ismail","doi":"10.1109/SCORED.2007.4451417","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451417","url":null,"abstract":"The Global Positioning System (GPS) has become a powerful tool for ionospheric studies. The parameter of the ionosphere that produces most of the effects on radio signals is the total electron content (TEC). This paper reports on the variability of the total electron content (TEC) during the North Sumatra earthquake of 26 December 2004 with a magnitude of 9.3 Richter scale. TEC is measured 7 days before and 6 days after the earthquake. The GPS data is taken from JUPEM (Malaysian mapping and Geodesy department). Four sets of data are selected from different GPS satellites that passed near the earthquake location. Results show that earthquake precursors can be seen at nighttime and early morning beginning from 21 December 2004, which is five days before the occurrence of earthquake until one day before the earthquake, which is on 25 December 2004. The results show a good agreement with other researchers who studied other earthquakes.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128562951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Weed Detection utilizing Quadratic Polynomial and ROI Techniques 利用二次多项式和ROI技术的杂草检测
2007 5th Student Conference on Research and Development Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451360
A. J. Ishak, S. S. Mokri, M. Mustafa, A. Hussain
{"title":"Weed Detection utilizing Quadratic Polynomial and ROI Techniques","authors":"A. J. Ishak, S. S. Mokri, M. Mustafa, A. Hussain","doi":"10.1109/SCORED.2007.4451360","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451360","url":null,"abstract":"Machine vision for selective weeding or selective herbicide spraying relies substantially on the ability of the system to analyze weed images and process the extracted knowledge for decision making prior to implementing the identified control action. To control weed, different weed type would require different herbicide formulation. Consequently the weed must be identified and classified accordingly. In this work, weed images were classified as either broad or narrow weed type. A fundamental problem in weed image recognition using planar curve analysis is to detect curve. It is difficult to successfully extract curve from the image of weed edges since the appropriate scale to use for extraction is not known a priori. As such, this paper considers a curve detection method based on the quadratic polynomial technique which include the use of the region-of- interests (ROI) technique. The ROI technique creates image subsets by selecting regions of the displayed image. The ROIs are typically used to extract statistics for image operations such as classification. As such, the objective of this paper is to present a novel application of curve detection feature extraction technique in weed classification.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134349389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Investigations of the Use of PosEye for Position Measurements 利用PosEye进行位置测量的研究
2007 5th Student Conference on Research and Development Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451380
D. V. Viswacheda, P. Surireddy, M. S. Arifianto, M. Y. Hamid, E. Husni, L. Barukang
{"title":"Investigations of the Use of PosEye for Position Measurements","authors":"D. V. Viswacheda, P. Surireddy, M. S. Arifianto, M. Y. Hamid, E. Husni, L. Barukang","doi":"10.1109/SCORED.2007.4451380","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451380","url":null,"abstract":"The PosEye system is basically a position measurement system which takes images of the reference. The infra-red LEDs which emits IR lights is captured by the CCD and is used as the reference. In this system the absolute positioning and orientation were made with the help of a PosEye. The PosEye is normally fixed on a robot arm or the object which requires orientation of its own position in correspondence to its reference points in the working area. This paper discusses general ideas about reference markers, set-up procedures, and issues behind the sensor. This mainly includes the principles of PosEye sensor, basics of vision and cameras. The paper details the experiments in which results were obtained through the PosEye system with the help of electronics and PosEye camera. In the experimental setup, the connection of PosEye with the electronic application is presented, the usage of PosEye and the robot control system communication with the PosEye system using coordinate system. The working of the PosEye system is observed by taking images on the reference plate and finding the co-ordinates (x, y, z). The manipulation of the obtained images to the robot for a movement is also studied.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133812244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design 基于EAP的认证与EAP方法选择机制:仿真设计
2007 5th Student Conference on Research and Development Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451356
M. Bhakti, A. Abdullah, L. T. Jung
{"title":"EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design","authors":"M. Bhakti, A. Abdullah, L. T. Jung","doi":"10.1109/SCORED.2007.4451356","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451356","url":null,"abstract":"Wireless networks have grown rapidly and more becoming part of our life, due to its advantages over the wired network, such as convenience, mobility, and flexibility. However the security concerns in wireless networks might have prevented its further widespread adoption. One of the solutions to overcome the wireless network security concerns is the IEEE 802.1X specification, a mechanism for port-based network access control, which is based on extensible authentication protocol (EAP), an authentication framework that can support multiple authentication methods. This paper proposed a design for an extension to the EAP framework for EAP authentication method selection purpose. The design then can be used to develop a simulation model of the EAP method selection mechanism.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127725160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluation of Modulation and Channel Coding Candidates for Adaptive Data Communication System 自适应数据通信系统调制和信道候选编码的评价
2007 5th Student Conference on Research and Development Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451362
R. Sidek, A.Z. bin Sha'ameri
{"title":"Evaluation of Modulation and Channel Coding Candidates for Adaptive Data Communication System","authors":"R. Sidek, A.Z. bin Sha'ameri","doi":"10.1109/SCORED.2007.4451362","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451362","url":null,"abstract":"This paper evaluates at the various modulation and coding techniques suitable for adaptive data communication system. The techniques evaluated are applicable to HF spectrum. Examples of modulation and coding scheme that are evaluated include PACTOR I, PACTOR II, PACTOR III, GTOR and STANAG 4285. Analysis of system performance is made in the presence of AWGN with future extension for multipath fading conditions. Comparison will be made based on the bit-error rate (BER), packet-error rate (PER) and the throughput. In addition, the effective data rate for all the schemes is compared with the Shannon capacity limit to ensure the optimal utilization of the given channel bandwidth. The modulation and coding scheme that meets all of the above requirements will be used for future adaptive data communication system.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115264670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Development Methodology for Multithreaded Network Application 多线程网络应用的高效开发方法
2007 5th Student Conference on Research and Development Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451394
Nguyen Due Chinh, E. Kandasamy, Lam Yoke Khei
{"title":"Efficient Development Methodology for Multithreaded Network Application","authors":"Nguyen Due Chinh, E. Kandasamy, Lam Yoke Khei","doi":"10.1109/SCORED.2007.4451394","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451394","url":null,"abstract":"Multithreading is becoming increasingly important for modern network programming. In inter-process communication platform, multithreaded applications have much benefit especially to improve application's throughput, responsiveness and latency. However, developing good quality of multithreaded codes is difficult, because threads may interact with each others in unpredictable ways. Although modern compilers can manage threads well, but in practice, synchronization errors (such as: data race errors, deadlocks) required careful management and good optimization method. The goal of this work is to discover common pitfalls in multithreaded network applications, present a software development technique to detect errors and optimize efficiently multithreaded applications. We compare performance of a single threaded network application with multithreaded network applications, use tools called Intelreg VTunetrade Performance Analyzer, Intelreg Thread Checker and our method to efficiently fix errors and optimize performance. Our methodology is divided into three phases: First phase is performance analysis using Intelreg VTunetrade Performance Analyzer with the aim is to identify performance optimization opportunities and detect bottlenecks. In second phase, with Intelreg Thread Checker we allocate data races, memory leakage and debug the multithreaded applications. In third phase, we apply tuning and optimization to the multithreaded applications. With the understanding of the common pitfalls in multithreaded network applications, through the development and debugging methodology aforementioned above, developers are able to optimize and tune their applications efficiently.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127446094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of Robust SIFT-C Technique for Image Classification 鲁棒SIFT-C图像分类技术的实现
2007 5th Student Conference on Research and Development Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451374
K. Ghazali, S. S. Mokri, M. Mustafa, A. Hussain
{"title":"Implementation of Robust SIFT-C Technique for Image Classification","authors":"K. Ghazali, S. S. Mokri, M. Mustafa, A. Hussain","doi":"10.1109/SCORED.2007.4451374","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451374","url":null,"abstract":"This paper describes the development of a robust technique for image classification using scale invariant feature transform (SIFT), abbreviated as SIFT-C. The proposed SIFT-C technique was developed to cater for varying conditions such as lightings, resolution and target range which are known to affect classification accuracies. In this study, the SIFT algorithm is used to extract a set of feature vectors to represent the image and the extracted feature sets are then used for classification of two classes of weed. The weeds are classified as either broad or narrow weed type and the decision will be used in the control strategy of weed infestation in palm oil plantations. The effectiveness of the robust SIFT-C technique was put to test using offline weed images that were captured under various conditions which truly reflect the actual field conditions. A classification accuracy of 95.7% was recorded which implies the effectiveness of the SIFT-C.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130569034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Problem Difficulty for Genetic Algorithm in Combinatorial Optimization 遗传算法在组合优化中的问题难度
2007 5th Student Conference on Research and Development Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451368
Z. Zukhri, K. Omar
{"title":"Problem Difficulty for Genetic Algorithm in Combinatorial Optimization","authors":"Z. Zukhri, K. Omar","doi":"10.1109/SCORED.2007.4451368","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451368","url":null,"abstract":"This paper presents how difficult to handle (genetic algorithm) GA with combinatorial approach in clustering problem and an alternative approach is suggested. Clustering problem can be viewed as combinatorial optimization. In this paper, the objects must be clustered are new students. They must be allocated into a few of classes, so that each class contains students with low gap of intelligence. Initially, we apply GA with combinatorial approach. But experiments only provide a small scale case (200 students and 5 classes). Then we try to apply GA with binary chromosome representation and we evaluate it with the same data. We have successfully improved the performance with this approach. This result seems to indicate that GA is not effective to be applied for solving combinatorial optimization problems in general. We suggest that binary representation approach should be used to avoid this difficulty.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126945481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EEG Analysis of Wake-sleep Data using UMACE filter 基于UMACE滤波的醒-睡数据脑电分析
2007 5th Student Conference on Research and Development Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451421
R. Ghafar, N. Tahir, A. Hussain, S. Samad
{"title":"EEG Analysis of Wake-sleep Data using UMACE filter","authors":"R. Ghafar, N. Tahir, A. Hussain, S. Samad","doi":"10.1109/SCORED.2007.4451421","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451421","url":null,"abstract":"Electroencephalogram (EEG) signal has been found to be the most predictive and reliable indicator in wake-sleep research. It is a real time signal that reflects the brain states of a subject including the alertness. However the study of wake-sleep condition using EEG signal is difficult due to the complexity of the EEG signal itself. The exact underlying dynamics of the EEG data is still questionable. EEG signal varies from one individual to another and has an inter variability in the same physiological state. It is hard to compare the EEG to the specific pattern of individual or situation. This paper tries to investigate the use of UMACE in distinguish between awake and sleep state of a subject. Normal EEG data from individual is used as an input in building UMACE filter. From the result, we find UMACE has the capability to distinguish awake and sleep state of a subject.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130358912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信