{"title":"Observed Shape Detection from EEG Time Series","authors":"M. Alobaidi, A. Duru, O. Bayat","doi":"10.1109/SCOReD53546.2021.9652681","DOIUrl":"https://doi.org/10.1109/SCOReD53546.2021.9652681","url":null,"abstract":"Brain computer interface studies required recording of a physiological response of a subject to exhibit relevant information. This extracted information can be used to perform an action and the amount of the information plays a significant role in the determination of brain computer interface (BCI) performance. The use of improved experimental paradigms as well as measuring the brain responses using electroencephalogram (EEG) is the most common approach for the BCI studies. In this study, the classification of the ongoing brain activity occurring as response to the four shapes is managed and reported. We applied Fourier transform to obtain the frequency spectrum regarding the one second time series of each channel with a time overlap of 50% to the feature set of each stimulus type. Four machine learning classifiers are implemented, and in the concept of the classification, (delta, theta, alpha, beta, and gamma) band power values for one second period constituted the feature set, resulting in a total of 315 features. Among the four ML classifier Quadratic Discriminant 87.1% recorded the highest accuracy.","PeriodicalId":6762,"journal":{"name":"2021 IEEE 19th Student Conference on Research and Development (SCOReD)","volume":"3 1","pages":"278-283"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81982816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samra Urooj Khan, N. Taujuddin, Tara Othman Qadir, Sundas Khan, Zoya Khan
{"title":"Iris Recognition Through Feature Extraction Methods: A Biometric Approach","authors":"Samra Urooj Khan, N. Taujuddin, Tara Othman Qadir, Sundas Khan, Zoya Khan","doi":"10.1109/SCOReD53546.2021.9652775","DOIUrl":"https://doi.org/10.1109/SCOReD53546.2021.9652775","url":null,"abstract":"Security has been one of the most passionately debated topics of science for decades, but its importance is growing exponentially as the amount of data collected by users grows. Verification and authentication have gotten a lot of attention in the security paradigm. With the passage of time, identifying a user's identity is becoming increasingly difficult. Many attempts have been done in this area, particularly with the use of human gestures such as fingerprints, face detection, palm print, retina detection, DNA test, heartbeat, speech checker, and so on. The most essential stage in this work is feature extraction, which extracts the iris' distinctive characteristics. In order to extract the distinguishing characteristic that is unique to each individual, several approaches have been presented. The goal of this study is to suggest the Gabor filter and Wavelet along with low and high-pass filters to deconstruct iris data and extract a unique pattern for iris recognition. The study investigates it. Because wavelet is the most sable means of image processing, the study investigates it.","PeriodicalId":6762,"journal":{"name":"2021 IEEE 19th Student Conference on Research and Development (SCOReD)","volume":"63 1","pages":"339-344"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76197509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/scored53546.2021.9652740","DOIUrl":"https://doi.org/10.1109/scored53546.2021.9652740","url":null,"abstract":"","PeriodicalId":6762,"journal":{"name":"2021 IEEE 19th Student Conference on Research and Development (SCOReD)","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79041981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"5G Inter-RAT Network Slicing Handover Mechanism: A Systematic Review","authors":"Fariza Salleh, S. Hassan","doi":"10.1109/SCOReD53546.2021.9652743","DOIUrl":"https://doi.org/10.1109/SCOReD53546.2021.9652743","url":null,"abstract":"Network slicing is a virtual network that has the capabilities to provides different logical segment based on different classes of services based on the three used cases in 5G network that released by 3GPP Rel 16 which are Enhanced Mobile Broadband (eMBB), Ultra Reliable and Low Latency Communication (URLLC) and Massive Machine Type Communication (mMTC). During the handover between different RATs occurred (Inter-RAT) in 5G NR heterogeneous environment, the process for UE allocation to the right network slice should be handle in a manner way to maintain the performance from the previous network slice. This paper aims to review the Inter-RAT handover mechanism approach for network slice selection in 5G environment. Review process will investigate the handover procedure works, then we will go through the mathematical theories used for modelling the network slice selection mechanism for Inter-RAT handover. Lastly, we will compare the theories and discuss the benefits in term of optimization and performance based on the selected criteria. With the purpose of limiting our scope to our main goal, we considered only papers published in conferences and journals between 2011 and 2020. A selected paper must discuss the network slicing Inter-RAT handover mechanism in dealing with a 5G technological issue. We will focus on works included only Inter-RAT handover in 5G, the handover procedure, selected criteria and mathematical theories used for optimization and performance in network slicing. The findings that will be discuss in this paper is the mathematical theories used in modelling the network slice selection mechanism during Inter-RAT handover by focusing on optimization and performance based on the selected criteria in 5G NR heterogeneous environment. This paper will contribute the systematic review around network slice selection mechanism during Inter-RAT handover.","PeriodicalId":6762,"journal":{"name":"2021 IEEE 19th Student Conference on Research and Development (SCOReD)","volume":"8 1","pages":"311-316"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79408840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Husainiamer, Madihah Mohd Saudi, Muhammad Yusof
{"title":"Securing Mobile Applications Against Mobile Malware Attacks: A Case Study","authors":"M. A. Husainiamer, Madihah Mohd Saudi, Muhammad Yusof","doi":"10.1109/SCOReD53546.2021.9652685","DOIUrl":"https://doi.org/10.1109/SCOReD53546.2021.9652685","url":null,"abstract":"Nowadays, the security exploitations against online systems and mobile applications(apps) are increasing tremendously. Due to the new norm, most of the meetings were conducted online with so many security challenges. Hence, this paper presents a new model called Mobotder to detect possible security exploitation for online meeting applications and online games based on geolocation (GPS), permissions, Application Programming Interface (API) calls, and system calls. This model was built using hybrid analysis in a controlled lab environment with the dataset from Drebin and Google Play Store for training and evaluation. As proof of concept (POC) for the developed model, a case study consists of twenty (20) online meeting applications were conducted. As a result, 10% of the tested mobile apps were at high risk of potentially being exploited by the attackers. While for online games, 7 out of 10 anonymous evaluated online games were identified as medium risk. As for future work, this model can be used as the benchmark and guideline in developing a mobile malware detection system for online mobile apps.","PeriodicalId":6762,"journal":{"name":"2021 IEEE 19th Student Conference on Research and Development (SCOReD)","volume":"219 1","pages":"433-438"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74637902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bibliometric Visualisation of Computer Science and COVID-19: A Review and Proposed Method","authors":"R. Patrick, Syahrul Nizam Junaini","doi":"10.1109/SCOReD53546.2021.9652741","DOIUrl":"https://doi.org/10.1109/SCOReD53546.2021.9652741","url":null,"abstract":"The pandemic of COVID-19 has accelerated significantly, generating great concern throughout the world. As a result, the quantity of articles and journals published on COVID-19 has rapidly increase. However, these publications do not cover bibliometric visualisation sufficiently, particularly in the computer science field. Thus, the purpose of this article is to conduct a brief content review of the websites that offer bibliographic visualisation about COVID-19. Additionally, we propose a new framework for visually representing bibliometric data pertaining to computer science research and COVID-19. We believe that our method for bibliometric visualisation will benefit future research by serving as a guide. It will serve as a way for conducting COVID-19 bibliometric visualisation, in other areas, not limited to the field of computer science.","PeriodicalId":6762,"journal":{"name":"2021 IEEE 19th Student Conference on Research and Development (SCOReD)","volume":"24 1","pages":"13-18"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83265804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Mustapa, Mohd Amin Hakim Ramli, R. H. Rozali
{"title":"Tension of Catenary and Taut Mooring Lines on One-body and Two-body Point Absorber with Low Wave Condition","authors":"M. A. Mustapa, Mohd Amin Hakim Ramli, R. H. Rozali","doi":"10.1109/SCOReD53546.2021.9652590","DOIUrl":"https://doi.org/10.1109/SCOReD53546.2021.9652590","url":null,"abstract":"Mooring lines systems for point absorber, wave energy converters (WECs) devices, must be engineered to withstand the cyclical loads and motions generated by the interaction of the wave load, as well as the WEC's motions in the random elevation of the sea surface. A simulation model was developed and validated concerning the simulated of point absorber motioned in a previous study; this study compares tension methodologies for point absorber with moorings lines using simulation approach. The purpose of this paper is to propose a mooring lines simulation approach that is suited for a one-body and two-body point absorber thorough examination of the heave motion response and, tension analysis of mooring lines coupled on the device and on seabed. The case study is a cylindrical, floating point absorber with one, two, three and four distributed mooring lines with catenary and taut configurations. The dynamics of the point absorber were simulated and analysed in the time domain using different configurations of mooring lines using Computational Fluid Dynamic (CFD) simulation approaches were compared. A thorough response analysis is undertaken using a Malaysia low wave condition in shallow water. The results were compared to the assessed for both one and two-body point absorber methods. The simulation process employing a two-body with four mooring lines recommended as the preferred method for capturing the interaction between the WEC system's components, which has been demonstrated to be critical for heaving response evaluation. The average maximum tension on four mooring lines with catenary configuration is preferred to have less tension with high heaving response of the device compared to others. The findings showed that a two-body point absorber with four catenary mooring lines average maximum tension of 700 N is more efficient at absorbing low wave heights than a single body.","PeriodicalId":6762,"journal":{"name":"2021 IEEE 19th Student Conference on Research and Development (SCOReD)","volume":"53 1","pages":"233-238"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85269955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aina Marie Joseph, N. Jali, Amelia Jati Robert Jupit, Suriati Khartini Jali
{"title":"eMarket for Local Farmers","authors":"Aina Marie Joseph, N. Jali, Amelia Jati Robert Jupit, Suriati Khartini Jali","doi":"10.1109/SCOReD53546.2021.9652777","DOIUrl":"https://doi.org/10.1109/SCOReD53546.2021.9652777","url":null,"abstract":"The Covid-19 pandemic is a global health crisis that has brought an impact on everyone. A negative impact has made local farmers struggle to find their means of income other than selling their crops to their customers. The customers have had difficulties searching for good quality fresh produce other than from the supermarket. The purpose of this paper is twofold: firstly, to assess the manual and existing system on how consumers acquire their fresh produce during the Covid-19 pandemic, to design and implement a delivery system for local farmers to vend their fresh produce through a mobile application; and secondly, to test and evaluate the usability and functionality of the online farmers' market application. The existing mobile applications have changed everyone's approach in acquiring the daily essentials that the pandemic has brought. Therefore, the idea of developing an online marketplace for local farmers resulted in the proposed application, which will be explained in this paper. Rapid Application Development (RAD) was used as the methodology for the development of the eMarket application. A survey was conducted via Google form for twenty local farmers and another twenty potential customers during the pre-development stage. It was to collect data on the users' opinions regarding the proposed application. We then conducted the usability testing through Google form to collect the users' feedback on the eMarket application. Ten local farmers from Matang's market have participated in the testing phase. Additionally, ten students from a local university participated as potential customers in the usability testing. As a result of these testings, we have developed a usable farmer's market application that has been well-received by local farmers and customers.","PeriodicalId":6762,"journal":{"name":"2021 IEEE 19th Student Conference on Research and Development (SCOReD)","volume":"13 1","pages":"30-35"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73488691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightning Risk Assessment on Outdoor HV Substations Based on IEC 62305-2: A Case Study","authors":"Ong Chang Shen, S. C. Lim, N. E. Eng","doi":"10.1109/SCOReD53546.2021.9652677","DOIUrl":"https://doi.org/10.1109/SCOReD53546.2021.9652677","url":null,"abstract":"The importance of having lightning risk assessment for the outdoor high voltage substations is to minimize the injury rate of the operators while working at the substations and to ensure the continuity of power supplies to the public. Many electric utilities and practitioners are reluctant to apply IEC 62305-2 due to the lack of direction to perform the lightning risk assessment for the substations. Therefore, the electric utilities and practitioners usually select their preferred methodologies based on IEEE 998 which lacks coherence while performing the lightning protection design for substations. This study will demonstrate the applicability of the lightning risk assessment for substations based on IEC 62305-2. The dimensions such as lightning collection areas for substations can be determined via computer-aided design (CAD) software. These site features will be used for the lightning risk assessment by similarly representing the substations as the building structures. It is shown that some of the ambiguous risk factors such as loss reduction factor due to physical damage depending on the risk of fire or explosion and injury loss value due to loss of internal systems which have a significant gap between ranges of risk values will dominantly influence the variation in the results. Besides that, the lack of selection criteria and the vagueness of risk values that are used to represent the actual substations case are highlighted. Therefore, this paper has shown some major risk components usually appeared in substations. However, the individual risk factor values of each component shall be revisited as some of the dominant ambiguous risk factors may contribute towards the misrepresentation of the results.","PeriodicalId":6762,"journal":{"name":"2021 IEEE 19th Student Conference on Research and Development (SCOReD)","volume":"4 1","pages":"218-223"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87228762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bibliometric Analysis of COVID-19 Research in Information Systems: A Proposed Model","authors":"Shirley Sylvia Sulai, Syahrul Nizam Junaini","doi":"10.1109/SCOReD53546.2021.9652705","DOIUrl":"https://doi.org/10.1109/SCOReD53546.2021.9652705","url":null,"abstract":"A new coronavirus, eventually identified as COVID-19, triggered an outbreak in Wuhan, China, at the end of 2019. It has since spread around the world. This has also resulted in an increase in the number of publications pertaining to COVID-19. However, not much research has examined COVID-19 in information systems using bibliometrics. The purpose of this work is to develop a model for visualising COVID-19 research in information systems using bibliometric data. We did a brief survey of the literature in this study, followed by an analysis of related work. We anticipate that our proposed model will aid future researchers who wish to undertake bibliometric visualisations utilising it.","PeriodicalId":6762,"journal":{"name":"2021 IEEE 19th Student Conference on Research and Development (SCOReD)","volume":"19 1","pages":"19-23"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84347599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}