Loading...

Proceedings of

3rd International Conference on Advances In Computing, Control And Networking ACCN 2015

Date
29-Dec-2015
Location
Bangkok , Thailand
Authors
51
ISBN
978-1-63248-082-8

20 Articles Published

1. THE STATIC ANALYSIS OF A POROUS AEROSTATIC BEARING

Authors: KUO-YU CHIEN

Abstract: A study was made of a porous aerostatic bearing by analysis of its relevant static characteristics. The purpose was to authenticate the theoretical computing results in terms of previously published data. The porous aerostatic bearing and its working mechanism was first introduced after which the mathematical model and the boundary conditions were built. Graphs of the characteristics of the porous aerostatic bearing were made that included data about capacity and clearance and a comparison was made between these findings and the accepted published data to establish and verify correctness of the theory

Keywords: Porous restriction, porous material, aerostatic bearing, finite difference method, orifice restriction.

Pages: 1 - 4 | DOI: 10.15224/978-1-63248-082-8-01

2. AUTOMATIC TRAFFIC ANALYSIS IN VIDEO SEQUENCES

Authors: KANNIKAR INTAWONG , MIHAELA SCUTURICI

Abstract: The main goal of this study is to extract traffic statistics throughout the day, week and season based on video surveillance. For our propose, we focus on traffic analysis that is related to vehicle counting. We provide the following process chain: objects detection and tracking, trajectories extraction, detection of entry/exit zones and vehicle counting. Experiments show that the information obtained is reliable and gives effective vehicles counting that are compared to previously published results obtained on a public data set. Additional comparisons are done with ground truth for a private data set.

Keywords: image processing, video surveillance, traffic analysis, statistics

Pages: 5 - 9 | DOI: 10.15224/978-1-63248-082-8-02

3. STABLE CLUSTER MAINTENANCE SCHEME FOR BEE-ADHOC- C: AN ENERGY-EFFICIENT AND SCALABLE MULTIPATH ROUTING PROTOCOL FOR MANET

Authors: M.SIDDAPPA , SASMITA MOHAPATRA

Abstract: Mobile ad hoc network (MANET) is one of the most important and unique network in wireless network which has brought maximum mobility and scalability. High efficient routing is an important issue in the design of limited energy resource MANETs. Many research work have been conducted by the researchers in the field of routing protocols for MANETs for making it energy efficient as the nodes are with limited resources in terms of battery supplied energy, storage and processing capability. In this paper we have proposed a new technique of routing protocol which utilizes the concept of swarm intelligence in which bee inspired routing is chosen as the ultimate routing protocol for energy efficient MANETs. To make the system more energy efficient we have chosen the clustered based approach as Bee-AdHoc-C. Bee-AdHoc-C is an evolution from Bee-AdHoc which is a bee inspired routing protocol for MANETs. This method provides parallel routing by which it reduces the overhead and improves the scalabi

Keywords: MANET;Energy Efficiency; Swarm Intelligence; Bee-AdHoc-C; Cluster; Improved Clustering Scheme; Routing Overhead)

Pages: 10 - 14 | DOI: 10.15224/978-1-63248-082-8-03

4. DESIGN OF AN AUTOMATED GRAIN STORAGE CHAMBER BASED ON WIRELESS SENSOR NETWORK

Authors: PANKAJ SHARMA , PARAMITA GUHA , SUNITA MISHRA

Abstract: The main objective of this paper is to design a monitoring and controlling system for storage of wheat grains. The temperature, humidity, CO2 and O2 gas levels are the main controlling parameters. Sensors are placed inside the chamber to monitor them and the data is analyzed using wireless communication devices. The data of all the sensors is sent to a wireless zigbee coordinator which is again connected to a microcontroller PIC16F877A. Depending upon the output of the sensor, an actuator operates. The design and implementation of this process has been done using PIC microcontroller, Zigbee & LABVIEW software. This paper provides details of sensing, data acquisition, and controlling the storage parameters.

Keywords: Wireless sensor network, PIC 16F877A, Zigbee, LabVIEW, Sensor, Actuator

Pages: 15 - 19 | DOI: 10.15224/978-1-63248-082-8-04

5. MCCN: A SOFTWARIZED APPROACH TO 5G

Authors: KHOA TRUONG DINH , SLAWOMIR KUKLINSKI , TINKU RASHEED

Abstract: 5G networks are expected to be deployed by 2020 and 5G is currently a hot research topic receiving considerable attention from industry and academia alike. It is expected that the latest networking technologies like Software-Defined Networking (SDN), Network Function Virtualization (NFV) and Mobile Edge Computing will play a pivotal role in the design of the integrated 5G network infrastructure. This paper shows how the mentioned technologies (baptized together as network softwarization) may impact the 5G networks design, operations, standardization and business models. A high level concept of Mobile Code based Convergent Network (MCCN), based on a dynamic placement of software modules in a distributed cloud environment, that is able to cope with 5G requirements will be discussed in detail and we argue the potential benefits of the proposed solution.

Keywords: Softwarization, SDN, 5G, cloud, NFV

Pages: 20 - 26 | DOI: 10.15224/978-1-63248-082-8-05

6. CHURN PREDICTION RETENTION FRAMEWORK

Authors: ABOUL ELLA HASSANIEN , ESSAM SHAABAN

Abstract: Churn prediction is considered a big issue in the Telecom market because customer acquisition costs five to eight times than retaining an existing one. Customer retention is the action that a service provider undertakes in order to reduce customer dissatisfaction and decrease the probability of leaving a service provider. This paper proposes a churn prediction retention framework based on data mining techniques. Deploying the proposed framework into a business intelligence system can help in enhancing the efficiency of customer relationship management. Moreover it can help customer churn management department to easily predict and retain the expected future churners in many business areas. The proposed framework mainly composed of seven phases and sub-phases. A case study is demonstrated to evaluate the framework throughout 5000 customers’ records in an anonymous telecom company.

Keywords: Churn prediction, customer retention, data mining, clustering, classification

Pages: 27 - 32 | DOI: 10.15224/978-1-63248-082-8-06

7. POTENTIAL GAME FRAMEWORK FOR INTERFERENCE AVOIDANCE IN CRAHNS USING WAVEFORM ADAPTATION AND SUB- CARRIER ALLOCATION

Authors: HASAN MAHMOOD , QURRATULAIN MINHAS , SUNDUS NASEER

Abstract: The simultaneous transmissions of multiple users on a channel interfere with each other and it becomes pivotal to devise a mechanism to obtain some form of separation. In a cognitive radio ad hoc network (CRAHN), the users compete to acquire best suitable bandwidth from already scarce spectrum, resulting in a fierce competition. The nodes may not observe desirable etiquettes in selecting channels and waveforms that result in chaos, which degrades the Quality of Service for the entire network. In order to inhibit the nodes while maintaining their autonomous behavior, there is a need of intelligent mechanism to inculcate the nodes in the network. A game theoretic framework is proposed to achieve convergence in selecting sub-channels and waveforms for transmissions. The proposed model is an eigen-iterative framework, in which signature sequences and sub-channels keep on updating after every cycle. Eigenvectors corresponding to the minimum eigenvalue of correlation matrix is used to maximi

Keywords: CRAHN, sub-carrier allocation, waveform adaptation, potential game

Pages: 33 - 37 | DOI: 10.15224/978-1-63248-082-8-07

8. A RULE-BASED SETSWANA VERB LEMMATIZER

Authors: G. A MALEMA , M. LEFOANE , N.P MOTLOGELWA

Abstract: Lemmatization is a pre-processing stage in several natural language processing applications such as data retrieval. There are a few attempts on Setswana word lemmatization. Developed Setswana lemmatizers do not show in details where lemmatization fails to work well leading to reduced performance. This paper presents a detailed rule-based Setswana verb lemmatizer. Challenges in verb lemmatization are pointed out by word category. The overall results show that rule based Setswana verb lemmatization gives a good performance of 87%. However, reflexive verbs have a significant large percentage of exceptions

Keywords: Setswana, Verb lemmatization,rule-based lemmatization.

Pages: 38 - 45 | DOI: 10.15224/978-1-63248-082-8-08

9. NUMERICAL INVESTIGATION OF PACKED-BED THERMAL ENERGY STORAGE SYSTEMS WITH PREDICTION-BASED ADJUSTMENT OF THE HEAT TRANSFER FLUID FLO

Authors: ALESSANDRO PISANO , ANTONELLO BACCOLI , DANIELA DEJACO , ELIO USAI , FABIO SERRA , GIORGIO CAU , MARTIN HORN , PIERPAOLO PUDDU\

Abstract: This paper numerically investigates ad-hoc charging strategies for a Packed Bed Thermal Energy Storage System. We derive a mathematical model of the system, whose reliability is assessed through comparison with experimental measurements taken on a laboratory-scale prototype with the packed bed made of alumina particles and air being used as the heat transfer media. Then we show by numerical investigations that certain non-constant flow profiles, which are determined on the basis of a predictive mechanism, yield a more effective use of the considered sensible heat storage apparatus in comparison to the commonly adopted constant-flow charging/discharging process.

Keywords: Thermal Energy Storage System. Sensible heat storage, Packed-bed technology.

Pages: 46 - 50 | DOI: 10.15224/978-1-63248-082-8-09

10. REGION OF INTEREST VIDEO CODING FOR ULTRASOUND IMAGERY

Authors: BRIAN C.S. LOH , PATRICK H.H. THEN

Abstract: Echocardiograms are the result of utilizing ultrasound devices to capture cardiac structures and dynamics. The results of these scans, which are depicted as video or images, are assessed by physicians to determine heart conditions. Although ultrasound devices are making way into diverse medical scenarios, their utility has been hampered by the need for extensive operator training to perform examinations, and medical experience required for analysing imagery. Telesonography or tele-ultrasound, allows for the guidance and interpretation of ultrasound acquisitions by distant medical experts. Since video content sharing necessitates large amounts of bandwidth, encoding techniques can be applied beforehand to reduce the size of exchanged data. This paper introduces a healthcare solution that aims to support the encoding and compression of medical imagery. The proposed application combines several image processing techniques with ROI video coding algorithms to achieve optimal size and qualit

Keywords: video coding, region of interest, telesonography, echocardiogram

Pages: 51 - 55 | DOI: 10.15224/978-1-63248-082-8-10

11. ADAPTIVE MMSE EQUALIZER BASED ON CSLMS FOR BLIND FRACTIONAL SPACED CMA CHANNEL EQUALIZATION

Authors: K.KISHAN RAO , R. NIRMALA DEVI

Abstract: The adaptive algorithm has been broadly used in the digital signal processing like channel estimation, channel equalization, noise cancellation, and so on. One of the most significant adaptive algorithms is the NLMS algorithm .This paper discuss about several objective optimization approaches to fast blind channel equalization. Different filter structures are presented to nullify the diverse form of noises. In this paper the proposed algorithm constrained stability least mean square (CSLMS) algorithm has distinct feature of minimizing mean square error (MSE) effectively. Different adaptive filter methods are proposed and finally CSLMS based adaptive filter algorithm is found to be the best in performance in terms of signal to noise ratio(SNR) and mean square error without increasing the computational complexity.

Keywords: Least mean square (LMS), Normalized Least mean square (NLMS), Constant modulus algorithm (CMA), constrained stability least mean square (CSLMS

Pages: 56 - 60 | DOI: 10.15224/978-1-63248-082-8-11

12. A MAC PERFORMANCE OF MOBILE AD-HOC 802.11AC LAN OVER CORRELATED FADING CHANNEL

Authors: HA CHEOL LEE

Abstract: FER (Frame Error Rate) and MAC (Medium Access Control) throughput are derived over error-prone channel in the IEEE 802.11ac mobile ad-hoc LAN. In this paper, DCF (Distributed Coordination Function) protocol and A-MPDU (MAC Protocol Data Unit Aggregation) scheme are used to evaluate the MAC throughput. Using theoretical analysis method, A MAC saturation throughput is evaluated according to the mobile speed and the number of frames in each A-MPDU on the condition that the number of station, frame payload size, transmission probability, the number of parallel beams and fading margin are variables. When the mobile speed is typically 1 m/sec and the number of aggregated MPDUs in each A-MPDU is 100, it is identified that the MAC layer throughput of IEEE 802.11ac can be maximally attained up to a 97.2% of physical transmission rate in this evaluation.

Keywords: Wireless LAN, MAC, Throughput, CSMA/CA, DCF, IEEE 802.11ac

Pages: 61 - 66 | DOI: 10.15224/978-1-63248-082-8-12

13. A WEB-BASED DECISION SUPPORT SYSTEM FOR USED-CAR PRICING

Authors: AYHAN DEMIRIZ

Abstract: Used-car trade has a significant portion in overall automobile market and determining the values of the cars is an important problem. This study proposes a new methodology for determining the market value of the used-cars by observing the classifieds in an e-commerce site. This type of data acquisition plays an important role to build pricing models and to conduct further analysis in our approach. In data acquisition stage, a set of new listings are chosen randomly each day from an ecommerce site (a web site like Craigslist), then these listings are observed until a pre-determined period (e.g. thirty days) or delisting time, whichever comes first. The crucial part of our approach is the assumption of a sale event when the listing is no longer available i.e. delisted from the e-commerce site. The proposed methodology may potentially be used for pricing any used item based on the web listings. A web site was developed to help clients/users for determining the market values of their cars

Keywords: Used-Car Pricing, Web-based Decision Support, Logistic Regression

Pages: 67 - 70 | DOI: 10.15224/978-1-63248-082-8-13

14. ANALYTICAL APPROXIMATE SOLUTIONS OF THE DUFFING-RELATIVISTIC OSCILLATOR

Authors: M. S. H. CHOWDHURY , MD. ALAL HOSEN , S. M. A. MOTAKABBER

Abstract: The aim of this paper is to use high-order harmonic balance method (HBM) as a novel solution procedure for investigation of the Duffing-relativistic oscillation. Usually, a set of complex nonlinear algebraic equations is appeared when HBM is applied. Investigating analytically for such kind of complex nonlinear algebraic equations is tremendously difficult and cumbersome. In the present study, a small parameter is found, for which the power series solutions produces desired results. The obtained results are evaluated by comparing with the exact solutions computed numerically. The effect of initial conditions in the nonlinear natural frequencies is carried out and it is proved the proposed method is not only simple, but also more reliable for analysis for the Duffingrelativistic oscillator. The method is mainly illustrated in strongly nonlinear Duffing-relativistic oscillator, but it can be widely applicable in other problems arising nonlinear sciences and engineering.

Keywords: duffing-relativistic oscillator, harmonic balance method, power series solutions

Pages: 71 - 74 | DOI: 10.15224/978-1-63248-082-8-14

15. A SURVEY ON DATA MODELS FOR INTERNET OF THINGS

Authors: WENBIN LI

Abstract: In Internet of Things (IoT), heterogeneous objects are connected as networks to facilitate the exchange of goods and services. These objects, varying from electronic devices to physical entities, rely on data models to be accessed and achieve their digital functionality. Nevertheless, we observe a divergence of data models in current IoT environments which has been influencing data exchange, share and integration from different sources. In this paper, we present a survey on IoT data models and provide background for a common understanding. Firstly, we introduce the concept of IoT and its emergence; and then we discuss IoT data models according to data structure and management operations to show current achievements and limitations; at last we illustrate the challenges and prospects to shed light on future work.

Keywords: Internet of Things, Data Model, Survey, Semantics

Pages: 75 - 79 | DOI: 10.15224/978-1-63248-082-8-15

16. DESIGN AND PROTOTYPE IMPLEMENTATION OF A FEDERATED SEARCH SYSTEM FOR MULTIPLE JAPANESE HUMANITIES DATABASES

Authors: BILIGSAIKHAN BATJARGAL

Abstract: This paper discusses the authors' approach in implementing a Federated Search System for multiple Japanese humanities databases. We introduce a prototype federated search system for online Japanese databases, which retrieves multiple and heterogeneous humanities databases in parallel and provides real-time integration of the results. The authors' results are explored further in the paper.

Keywords: Multilingual digital archive, federated search, Japanese humanities databases, information retrieval.

Pages: 80 - 84 | DOI: 10.15224/978-1-63248-082-8-79

17. TAXONOMY AND PERFORMANCE EVALUATION OF FEATURE BASED EXTRACTION TECHNIQUES IN DIGITAL IMAGE WATERMARKING

Authors: AZIZAH BT ABDUL MANAF , MAZDAK ZAMANI , SAGHEB KOHPAYEH ARAGHI , TANYA KOOHPAYEH ARAGHI

Abstract: Feature based extraction techniques attract a great attention in digital image watermarking to survive against various removal and geometric attacks. Due to information hiding according to the image content, these techniques find a huge popularity amongst different image watermarking techniques during the recent years. In this paper a survey is investigated in feature based extraction techniques to check, evaluate and compare the recent developments in this area. The aim is to find the vital influential factors on robustness, imperceptibility, capacity, security and speed of the watermarking algorithms proposed based on feature based extraction techniques as a recommendation for future researches. The experimental results prove the robustness of the selected features in each technique against the mentioned geometric and removal attacks.

Keywords: Digital image watermarking, Geometric attacks and feature extraction

Pages: 85 - 88 | DOI: 10.15224/978-1-63248-082-8-80

18. A SURVEY ON DIGITAL IMAGE WATERMARKING TECHNIQUES IN SPATIAL AND TRANSFORM DOMAINS

Authors: AZIZAH BT ABDUL MANAF , MAZDAK ZAMANI , SAGHEB KOHPAYEH ARAGHI , TANYA KOOHPAYEH ARAGHI

Abstract: Digital image watermarking is a branch of information hiding in which the ownership information will be hidden in the cover image. Performing digital image watermarking, some important issues such as imperceptibility, robustness, capacity and security should be considered. The strength and weakness of each of these issues depends on the watermark algorithm and also the domain in which the watermark has been hidden. In this research we investigate the role of the different domains used in digital image watermarking and categorize them based on the power of the mentioned issues that each domain potentially and innately offers.

Keywords: Digital image watermarking, Spatial domains, Transform domains, DFT, DCT

Pages: 89 - 93 | DOI: 10.15224/978-1-63248-082-8-81

19. APPLICATION OF FRACTIONAL ORDER PID CONTROLLER TO A DC MOTOR SYSTEM

Authors: MAZDAK ZAMANI , SHIH-YING HUNG

Abstract: PID controllers have been successfully used in versatile applications, especially with the aid of available mature tuning methods such as the Ziegler-Nichols method. Recently, fractional order PID controllers were proposed after a series of researches on fractional calculus. It is intriguing for the flexibility of the adoption of fractional order which is free from the limit of integer order. This paper studied the fractional order PID controller of different fraction order applied in a DC motor system. The simulation results show that the fractional order PID controllers are promising compared to the integer PID controllers.

Keywords: fractional order, PID, parameter tuning

Pages: 94 - 98 | DOI: 10.15224/978-1-63248-082-8-84

20. ANALYSIS OF WEB BASED APPLICATION FOR E-LEARNING ANALYTIC HIERARCHY PROCESS BASED EVALUATOR

Authors: TOTOK SUKARDIYONO , MUHAMMAD MUNIR , HANDARU JATI

Abstract: This research proposes the ISO 9126 quality model as a useful tool for assessing the e-learning system, particularly for teachers and education administrators. This web based evaluator model using Analytical Hierarchy Process approach demonstrates the validity of the model in a case study where the model was applied to an available e-learning system and showed that this can be used to detect design errors. The system proposes the metric that would be applicable to other e-learning systems and could be used as the basis of comparison for reporting on implementation decisions.

Keywords: E-learning, ISO 9126, web, AHP

Pages: 99 - 102 | DOI: 10.15224/978-1-63248-082-8-86

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering