By Topic

Open Systems (ICOS), 2010 IEEE Conference on

Date 5-7 Dec. 2010

Filter Results

Displaying Results 1 - 25 of 28
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (668 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Content

    Publication Year: 2010, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • Welcome address

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • International advisory/liaison

    Publication Year: 2010, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Technical program

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Semantic query for Quran documents results

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    The query-based on the result is less relevant documents results. In this study, a query has been improved in order to retrieve more relevant documents across language boundaries, a mechanism for query translation with semantic which is applied on as semantic query (SQ). Therefore, this study is conducted with the purposes to investigate semantic approach against the queries and vice versa. Furthe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hard and soft updating centroids for clustering Y-short tandem repeats (Y-STR) data

    Publication Year: 2010, Page(s):6 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    This paper compares hard and soft updating centroids for clustering Y-STR data. The hard centroids represented by New Fuzzy k-Modes clustering algorithm, whereas the soft centroids represented through k-Population algorithm. These two algorithms are experimented through two datasets, Y-STR haplogroups and Y-STR Surnames. The results show that the soft centroid performance is better than the hard c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-procurement current and future readiness level in Malaysia

    Publication Year: 2010, Page(s):12 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    E-procurement has been recognized as an element of Business-to-Business (B2B) E-commerce. In B2B organizations have inter firm acquisition of goods and services over the internet. This paper focuses the current and future readiness level of E-procurement among organizations in Malaysia. A survey questionnaire was administered to collect data from 46 organizations. The general finding shows that Ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural similarity of business process variants

    Publication Year: 2010, Page(s):17 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    Variance in business process can lead to various changes and modifications of business requirements, strategies and functionalities since it is a valuable source of organizational intellectual capital and represents a preferred and successful work practice. It is important to provide an effective method to analyze the similarity between these variants since it can bring benefits for organization p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of magnetizing inrush current in power transformers using GSA trained ANN for educational purposes

    Publication Year: 2010, Page(s):23 - 27
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Inrush current in transformers is generated when transformer cores are driven into saturation during no-load energization. This current consists of high amplitude, large DC component and also, has much 2nd harmonic content. In the proposed paper, a new computer-aided simulation technique for teaching inrush current principles and its discrimination from normal current based on artificia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making DC-DC converters easy to understand for undergraduate students

    Publication Year: 2010, Page(s):28 - 33
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB) | HTML iconHTML

    Power electronic laboratory may seem to be a good method of education. Despite the benefits of a laboratory-based education, some serious limitations make it difficult to consider this method as a main educating tool. In addition, power electronic laboratory is one of the most expensive laboratories in both foundation and operation. Moreover, the complexity of power electronic circuits makes it ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survnvote: A free web based audience response system to support interactivity in the classroom

    Publication Year: 2010, Page(s):34 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1416 KB) | HTML iconHTML

    Survnvote is a free Audience Response System (ARS) for surveys and voting using the web, sms and mobile devices (PDA or smart phone). This paper proposed some improved features of a web-based ARS which replace the clicker with mobile phone and use the web instead of specialist software and infrastructure. Survnvote solved the main problem of traditional ARS which is high cost and need to physicall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic query with stemmer for Quran documents results

    Publication Year: 2010, Page(s):40 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    The query-based on the result is lack of limited relevant documents in retrieval results. Therefore, query performance is considered to retrieve more relevant documents across language boundaries by applying semantic and stemmers which are more significant as stemming semantic query (SSQ). Therefore, this study is conducted with the purposes to investigate the integration semantic and stemmers app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A pilot study in using web 2.0 to aid academic writing skills

    Publication Year: 2010, Page(s):45 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Today a wide range of Web 2.0 applications (such as Facebook, Twitter, Blogs, RSS, Podcasts and Wikis) are giving new challenges and opportunities in teaching and learning. The work described here concerns a pilot study to investigate the acceptability and effectiveness of using web 2.0 as an aid to learning. The work focuses on a university course on academic writing skills. The role of Web 2.0 a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning acids and bases through inquiry based website

    Publication Year: 2010, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (665 KB) | HTML iconHTML

    Chemistry is not an easy subject to learn. Many people regard chemistry as being too hard, too abstract, too mathematical, and only for very bright students. As a result, a negative attitude has developed about chemistry with students claiming chemistry is boring. Besides, most of the chemical concepts articulated by macroscopic, microscopic, and symbolic. This led to conflict and confusion in lea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive window method of FIR filter design

    Publication Year: 2010, Page(s):57 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    There are several windows used for truncated the impulse response in order to fixed the filter size. Kaiser window is the most important type and from it is possible to generate other types of windows depending on the value of α. The proposed adaptive Finite Impulse Response (FIR) Filter is designed and implemented to merge many filter parameters. The results are obtained in different windo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Genetic Algorithm to break a mono - alphabetic substitution cipher

    Publication Year: 2010, Page(s):63 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    Genetic algorithms (GAs) are a class of optimization algorithms. GAs attempt to solve problems through modeling a simplified version of genetic processes. There are many problems for which a Genetic Algorithm approach is useful. It is, however, undetermined if cryptanalysis is such a problem. Therefore, this work trying to explore the use of Genetic Algorithms in cryptography. The focus is to be o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Control of a single-link flexible manipulator using improved bacterial foraging algorithm

    Publication Year: 2010, Page(s):68 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (509 KB) | HTML iconHTML

    This paper presents an investigation into application of controller tuning using improved bacterial foraging algorithm (BFA) namely exponentially adaptive BFA (EABFA). The objective of the work is to evaluate the performance of EABFA in the controller tuning of a joint-based collocated (JBC) proportional-derivative (PD) control system. A simulation model of a single-link flexible manipulator syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grid workflow recovery as Dynamic constraint satisfaction problem

    Publication Year: 2010, Page(s):74 - 79
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB) | HTML iconHTML

    With service level agreements (SLAs) the Grid broker guarantees to finish the Grid jobs by a given deadline. There are a number of approaches, to plan reservations to fulfil these deadline requirements and to handle currently running jobs in the case of a resource failure. However, there is a lack of strategies to handle the already planned but not yet started jobs. These jobs will be most likely ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speckle filtering of ultrasound B-Scan Images - a comparative study between spatial and diffusion filters

    Publication Year: 2010, Page(s):80 - 85
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (986 KB) | HTML iconHTML

    Speckle noise is the inherent property of ultrasound B-Scan images which has been filtered using well-established speckle reduction techniques. In this work, six spatial filters namely Frost, Median, Lee, Kuan, Wiener, and Homomorphic filters, and two diffusion filters viz., Speckle Reduction Anisotropic Diffusion (SRAD) filter, and Anisotropic Diffusion (AD) filter have been attempted over 200 di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of dashboard for hospital logistics management

    Publication Year: 2010, Page(s):86 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB) | HTML iconHTML

    Logistics as an important process in providing high quality and responsive health services has not received enough attention in the literature to date. This paper presents an initial work that attempt to fill this gap by developing a prototype of a dashboard for logistics management in hospital XYZ. The methodology used in this research is divided into intelligence, design and implementation phase... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-aware ubiquitous musafir

    Publication Year: 2010, Page(s):91 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (817 KB) | HTML iconHTML

    Population using Mobile phones and Mobile applications is increasing every day. Emergence of Cloud Computing and advances in Wireless Communication technologies has changed the dynamics of mobile applications by providing Scalable On-Demand High Available Infrastructure at minimal cost with zero maintenance and empowered with faster data transfer. Enterprises have started to develop Cloud based mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.