By Topic

Open Systems (ICOS), 2013 IEEE Conference on

Date 2-4 Dec. 2013

Filter Results

Displaying Results 1 - 25 of 53
  • [Front cover]

    Publication Year: 2013 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (108 KB)  
    Freely Available from IEEE
  • 2013 IEEE Conference on Open Systems (ICOS): Copyright and Reprint Permission

    Publication Year: 2013 , Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (31 KB)  
    Freely Available from IEEE
  • Chairman's message: General chair, ICOS, ICWiSe and IC3e 2013

    Publication Year: 2013 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (73 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): iv - v
    Save to Project icon | Request Permissions | PDF file iconPDF (146 KB)  
    Freely Available from IEEE
  • A parallel bloom filter string searching algorithm on a many-core processor

    Publication Year: 2013 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1523 KB) |  | HTML iconHTML  

    This paper analyzes the underlying architecture of a serial Bloom filter string searching algorithm to identify the performance impact of this algorithm for large datasets. Then, a parallel multi-core driven Bloom filter algorithm using software application threads is studied as benchmark. Experimental results suggest that for a set of 10 million strings, this algorithm exhibits speedups of up to 3.3× against a serial Bloom filter algorithm, when using an 8-logical processor multi-core architecture. To further improve the speedup, a many-core driven parallel Bloom filter algorithm is proposed using the Compute Unified Device Architecture (CUDA) parallel computing platform. The proposed algorithm segments the string list into blocks of words and threads in generating the bit table for the string searching process, which maximizes computational performance and sustains consistent string searching results. Experimental results suggest that the proposed algorithm extends the speedup to 5.5× against a serial Bloom filter algorithm, when using a 256-core CUDA graphics processing unit architecture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active participant identification and tracking using depth sensing technology for video conferencing

    Publication Year: 2013 , Page(s): 7 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1643 KB) |  | HTML iconHTML  

    Video conferencing represents an effective method of point-to-point or multipoint real-time communication between two or more participants. However, persistent manual adjustments of the video capture device to focus on an active participant represent a challenge, especially if the conference participant moves out of the video capture window. As such, this paper proposes an active-based participant identification and tracking system, which continuously tracks and automatically adjusts the video capture device to maintain focus of the active conference participant. The proposed system first applies a haarcascade face detection algorithm to register and store a set of facial images of the active participant. By leveraging on the depth sensing technology of Microsoft Kinect, this system compares the captured skeletal head position images of participants within the Kinect camera viewpoint, which is then compared against the aforementioned stored face detection images using the principle component analysis face recognition algorithm. The recognized user by the system is then continuously tracked as a skeletal object via a custom designed vertical and horizontal servo controlled motorized system. The custom motorized system sits under the Kinect sensor and is able to achieve 180 degrees in horizontal panning and 22.7 degrees in vertical tilting in line with tracking the movement of the active conference participant. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NFC smartphone based access control system using information hiding

    Publication Year: 2013 , Page(s): 13 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (810 KB) |  | HTML iconHTML  

    A digital access control system allows users to access a premise using an access card. It is introduced as an alternative system to the most common access control system using physical keys and mechanical locks to increase the level of convenience to access a premise. However, an intruder is able to gain access to the premise if he/she possesses the access card or the physical keys. Therefore, in this paper, we propose an access control system that utilizes near field communication (NFC) smartphone and information hiding technique to overcome the disadvantage mentioned previously on the existing systems. The first protection level is NFC smartphone and NFC reader or tag to initiate the access control to the premise. The second protection level is the information hiding technique to embed access passcode into the user's photo to obtain an encoded photo, which is also known as stego-photo. The access passcode in the stego-photo is later extracted using information hiding technique during the door access stage for verification of the legitimate user. An automated door is developed and NFC reader or tag is located near the door. The interaction between NFC smartphone and NFC reader or tag enables prompting of the correct stego-photo to be selected using the smartphone to perform the user authentication process. The door is unlocked if the access passcode extracted from the stego-photo matches with the access passcode in the database located at the server. If otherwise, alarm is triggered and a light emitting diode (LED) is turned on. The lighted LED acts as an indicator to give an alert to the user that someone has tried to break into his/her house when he/she is not around. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online signature verification using neural network and pearson correlation features

    Publication Year: 2013 , Page(s): 18 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (287 KB) |  | HTML iconHTML  

    In this paper, we proposed a method for feature extraction in online signature verification. We first used signature coordinate points and pen pressure of all signatures, which are available in the SIGMA database. Then, Pearson correlation coefficients were selected for feature extraction. The obtained features were used in back-propagation neural network for verification. The results indicate an accuracy of 82.42%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A relationship model of playful interaction, interaction design, kansei engineering and mobile usability in mobile learning

    Publication Year: 2013 , Page(s): 22 - 26
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (533 KB) |  | HTML iconHTML  

    Mobile learning is a new technology embraced in the educational environment. In general, mobile learning can be described as teaching and learning activities by using mobile technologies. Designing interactivity with mobile learning is important for learners and educators. The requirements and different perspective towards mobile learning need to be explored. The demographic profiling of the user may also affect the usage and usability of mobile learning. Designers may need to identify the elements and relevant methodologies when designing interactivity of mobile learning. This main objective of this paper is to conceptualize the relationship model of (i) playful interaction, (ii) interaction design, (iii) kansei engineering and (iv) mobile usability in mobile learning. The model from this study may provide the motivation and prescription to designers in designing mobile application for teaching and learning. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CNC machine system via STEP-NC data model and LabVIEW platform for Milling operation

    Publication Year: 2013 , Page(s): 27 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1422 KB) |  | HTML iconHTML  

    CNC or Computer Numerical Control is a system that using CAD, CAPP, CAM and CNC called CAx chain for machining processes from design up to production stage. The Milling operation is one of the modern CNC systems for the machining processes for material removal and operated on the principle of rotary motion. Currently, ISO 6983 standard or G/M code is used as a data model for the CNC system, however, this programming language does not explicitly relate to each other to have control of arbitrary locations other than the motion of the block-by-block. As a solution, STEP-NC is a new implementation in CAx chains for manufacturing technology to replace a current standard. It plays a key role in the field of advanced manufacturing. In this paper STEP-NC data model part 10, 11 and 111 for milling are discussed and an open architecture of the controller via LabVIEW is proposed. In this proposed framework involved software and hardware platform. In order to integrate data between interpreter and LabVIEW of the data exchange platform realization methodology for the CNC system is determined in the mode of “offline.” As a result, an open CNC controller system is successfully integrated for 3-axis milling machine. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The assessment of amylose content using near infrared spectroscopy analysis of rice grain samples

    Publication Year: 2013 , Page(s): 32 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1633 KB) |  | HTML iconHTML  

    Nowadays there are several methods in assessing the traits of rice including destructive and non-destructive method. The objective of this study is to evaluate the amylose content (AC) on seven types of rice grain in Malaysian market by using the Near-Infrared (NIR) Spectroscopy. AC is one of the main criteria to determine the quality of cooked rice. The total sample is 210, which includes two types of brown rice and basmati rice respectively, and three types of milled white rice where each of them were divided into 30 samples per group. Spectrums from 210 samples were collected between the range 680nm and 1280 nm using a non-destructive, rapid, and economical method. Reflectance spectra was converted into absorbance spectra and the baseline shift effect in the absorbance spectra was removed using first and second order derivative coupled with a first and second order Savitzky-Golay smoothing filter. Next, the spectral data was processed and examined independently, by applying partial least square (PLS) analysis. Results show that NIR Spectroscopy helped to determine the amylose content based on the spectra at 878 nm, 979 nm, 989 nm, 1100 nm and 1210 nm. The prediction on amylose content in Malaysian rice by using NIR Spectroscopy needs to be further investigated on a large number of samples with different varieties, growing, cultivation methods and processing after harvesting. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of near infrared spectroscopy for assessment of free fatty acid in palm oil

    Publication Year: 2013 , Page(s): 38 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (433 KB) |  | HTML iconHTML  

    This paper propose an experiment to determine compatibility of near infrared (NIR) application in crude palm oil (CPO) quality measurement, considering only the Free Fatty Acid (FFA) that can be made as open source software. 100 samples were taken from Felda Johor Bulkers, Terminal 1 in 7 consecutive days of experiment. FFA reading from conventional wet chemical analysis is used as the reference and validation for NIR method. Partial Least Square Regression (PLSR) method is used for the linear analysis, generated from MATLAB software. However, the finding from this experiment not really support the application at which the accuracy percentage acquire is only 48.12%. Further investigation will be used Neural Network for give a better accuracy compared with PLSR. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison of Genetic Algorithm, Differential Evolution and Particle Swarm Optimization towards benchmark functions

    Publication Year: 2013 , Page(s): 41 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (247 KB) |  | HTML iconHTML  

    Genetic algorithm (GA), Differential Evolution (DE) and Particle Swarm Optimization (PSO) are always implemented to solve different kinds of complex optimization problems. Each method contains its own advantages and the performance varies based on different case studies. There are many Soft Computing (SC) methods which can generate different result for the same optimization problems. However, no exact result is produced because random function is usually applied in SC methods. The performance maybe is affected by the parameter setting or operations inside each method. Therefore, the motivation of this paper is to compare the performance of GA, DE and PSO by using the same parameters setting and optimization problems. The experiments can prove that although same parameters setting are applied, but different fitness and time can be obtained. Based on the result, GA was proven to perform better compared to DE and PSO in obtaining highest number of best minimum fitness and faster than both methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware accelerator implementation on FPGA for video processing

    Publication Year: 2013 , Page(s): 47 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1703 KB) |  | HTML iconHTML  

    Intelligent video surveillance for security purposes requires real-time performance. Such performance requires large amount of resources, including bandwidth, processing power and memory. In addition, the deployment of such system requires an embedded solution with low cost and power. However, embedded systems have limited resource for processing. The advancement of Field Programmable Gate Array (FPGA) enables development and implementation of a system with reconfiguration capability. Besides, it also offers competitive cost in comparison to an Application Specific Integrated Circuit (ASIC) deployment of the system. In recent years there is an increase research in the effort to implement video surveillance and processing system using FPGA. The computational heavy processing of streaming frames in video processing is implemented using hardware accelerator, a dedicated processing unit for the video processing algorithm. Majority of the research on video processing hardware accelerator are to develop a dedicated hardware implementation of the video processing algorithm. This research aims to investigate and propose a general model from hardware accelerator development which has the capability to accommodate different video processing applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A portable class Lecture Recording system for E-learning purpose

    Publication Year: 2013 , Page(s): 52 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2373 KB) |  | HTML iconHTML  

    In a new educational concept, the Lecture Recording system is one of the devices that are widely used to provide educational material to students. Even so, the existing Lecture Recording systems are able to record only one video in real time. If the system is able to record multiple video, the video editing is done after recording time. In this paper, a new design for lecture recording system is introduced. It offers a simple equipment set up for lecture recording that will minimize lecturer's burden. Furthermore, the system will edit the video in real time depend on user setting. This system is also small in size and portable. This lecture recording system allows students to re-experience the lecture session at anytime and anywhere by downloading it or viewing it through the portal. This lecture recording system is user friendly where it can be installed without any additional software. Therefore, it can be a great system for lecturers who are using laptops for their class presentation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Petri net simulation of software development lifecycle towards green IT

    Publication Year: 2013 , Page(s): 58 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1512 KB) |  | HTML iconHTML  

    In this work, we present a novel simulation approach using Petri nets to study optimal policies for software development while reducing carbon footprint. We use CPN Tools as our Petri net framework to develop the simulation model of a software development lifecycle. The motivation behind the work is to apply simulation techniques to obtain the optimal resource configuration for a software development project and reduce its carbon footprint. We show a subset of our experiments conducted using the Petri net simulation to illustrate its capabilities. We model the different resources using colored tokens in a timed hierarchical Petri net and monitor the carbon footprint of the software as it goes through its lifecycle. Our simulation experiments show that allocating developers with medium skills is the preferred suboptimal policy, as it has both relatively low carbon footprint and lower cost of software development compared to allocating the extremely skilled developers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study on the application of predictive analytics toward forecasting swing door failure

    Publication Year: 2013 , Page(s): 63 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (770 KB) |  | HTML iconHTML  

    Predictive maintenance is a maintenance approach that involves monitoring machines in order to predict their failures. This case study focuses on predicting failure of swing doors employed in a facility and scheduling maintenance based on the predicted failure date. Swing doors in a facility are checked regularly. Problems such as a door stays open only for a short period of time, a door opens only after a hard push act as signals that some larger problem may be growing. With this information, maintenance can be scheduled before the door goes out of service. Hold on Time (HoT), which is the specified time during which a swing door is held open, is collected for all swing doors in a facility. By closely following the trend exhibited by hold on time readings observed overtime, abnormal operations could be predicted beforehand, and maintenance can be carried out before any doors fail. Piecewise regression is the technique adopted for prediction and is implemented using R. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learner classification based on learning behavior and performance

    Publication Year: 2013 , Page(s): 66 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (915 KB) |  | HTML iconHTML  

    A learner classification is an important process in providing online lessons to suit each individual learner. In this paper, the concept of learner classification is considered on learning behavior and performance. There are two main processes for generating the classification model as follows: 1) Applying K-means clustering to analyze learning behaviors of each learner based on learner's profile from e-learning system; and 2) Applying a decision tree classifier to generate the learner classification model based on the learning behaviors and student's performance. The experimental results show that the learner classification model is achieved in 83.8% of precision, 85.4% of recall and 85.5% of F-measure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A learning based approach for tremor detection from videos

    Publication Year: 2013 , Page(s): 71 - 76
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1058 KB) |  | HTML iconHTML  

    This work deals with a learning-based approach for detecting tremor of hands from videos. This tremor detection problem has been represented as classification of video frames as having tremor or not. Horn-Schunk optical flow algorithm has been used in conjunction with joint entropy for feature extraction from the video frames. A training-testing paradigm has been dealt with in this work. Tremor detection using this training-testing paradigm does not make use of wearable sensors. For training of video frames using the extracted features Support Vector Machine (SVM) has been used. The results of the experiment has been shown in form of confusion matrix and precision-recall graph. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-pass assembler design for a reconfigurable RISC processor

    Publication Year: 2013 , Page(s): 77 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1296 KB) |  | HTML iconHTML  

    Hardware software co-design plays a crucial part in the embedded processor development especially with the current advancement of reconfigurable platforms. The reconfigurability features offered by platforms such as Field Programmable Gate Array (FPGA) has permitted the modification of the internal processor architecture with lower cost and higher performance. While the hardware architecture could be changed through various methods, the modifications need to be complemented with a compatible assembler that suits the amended architecture. This paper presents a two-pass assembler design technique that adapts to any instruction set architecture (ISA) modifications being applied on a reconfigurable processor. A Reduced Instruction Set Computer (RISC) processor core, which is described in Verilog Hardware Description Language (HDL), is used as the testing platform whereby its ISA is expanded to include new instruction sets. The assembler is developed based on two-pass approach and the assembling process would generate a coefficient file that is used as initialization files during the FPGA implementation of the processor core. The assemblers have been successfully developed with correct output format and verified during the FPGA implementation using Xilinx Spartan-3AN board. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overview of types of Ontology in the software development process

    Publication Year: 2013 , Page(s): 83 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (440 KB) |  | HTML iconHTML  

    Ontology is a word that has been the subject of many studies. It is an important concept in computer science to formally represent knowledge in a way that software can process the knowledge and reason about it. The software engineering ontology assists in defining information for the exchange of semantic project information frameworks. Research into ontological issues has been widely active in various areas. This paper presents the origin of ontology research and gives the different definitions of ontology. The paper provides an overview of ontology and its types including the building and design for an enterprise system. Finally the paper provides a systematic review of the subject. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of vehicle tracking system using GPS and GSM modem

    Publication Year: 2013 , Page(s): 89 - 94
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1521 KB) |  | HTML iconHTML  

    The ability to track vehicles is useful in many applications including security of personal vehicles, public transportation systems, fleet management and others. Furthermore, the number of vehicles on the road globally is also expected to increase rapidly. Therefore, the development of vehicle tracking system using the Global Positioning System (GPS) and Global System for Mobile Communications (GSM) modem is undertaken with the aim of enabling users to locate their vehicles with ease and in a convenient manner. The system will provide users with the capability to track vehicle remotely through the mobile network. This paper presents the development of the vehicle tracking system's hardware prototype. Specifically, the system will utilize GPS to obtain a vehicle's coordinate and transmit it using GSM modem to the user's phone through the mobile network. The main hardware components of the system are u-blox NEO-6Q GPS receiver module, u-blox LEON-G100 GSM module and Arduino Uno microcontroller. The developed vehicle tracking system demonstrates the feasibility of near real-time tracking of vehicles and improved customizability, global operability and cost when compared to existing solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel watermarking technique in data transmission between QR codes and database

    Publication Year: 2013 , Page(s): 95 - 99
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1428 KB) |  | HTML iconHTML  

    Digital data transmission has become prominent in this era of communication. Digital data such as text, still images, movies, or sounds can be wirelessly distributed through internet, intranet or digital broadcasting. A recent data management technology known as QR Code (Quick Response Code) allows data or information to be communicated wirelessly using a common portable device installed with its scanning software. Even though this new data management technology is easy to handle, it is also easy to be duplicated by unauthorized parties. Besides authentication and encryption techniques for security, using watermark will be an advantage to provide better protections for wireless data transmissions. This paper describes how these protections are being applied in ensuring data transmission for QR Codes safe from intruders without affecting the quality of data transmitted. A different technique of applying watermark is proposed in this paper. In this technique, due to its unique information, data of authentication is used for the watermark. The technique is also supported with the use of binary numbers for the encryption. To confirm the effectiveness of this protection technique, percentage of data loss and processing time for data transmissions are measured. From the experiment, results show that there is no data loss but only a slight delay in processing time is observed. This shows that the proposed technique of security protection is effective with only a negligible amount of time delay. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical SVM classifier for road intersection detection and recognition

    Publication Year: 2013 , Page(s): 100 - 105
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1310 KB) |  | HTML iconHTML  

    This paper describes a hierarchical multi-classification approach for road intersection detection and classification using Support Vector Machines. Our approach has been organized in two main parts. The first involves the road detection in the bird's eye view image using an edge-based approach. In this step, we have exploited the concept of vertical spoke for road boundary extraction. The second step deals with the problem of road intersection detection and classification by hierarchical classification of the extracted road forms using the Unbalanced Decision Tree architecture. Many measures are incorporated for good evaluation of the proposed solution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal semantics of interactions in sequence diagrams for embedded software

    Publication Year: 2013 , Page(s): 106 - 111
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (351 KB) |  | HTML iconHTML  

    Recently, sequence diagrams have been extended with the introduction of a set of operators in the latest specification of the Unified Modeling Language 2 (UML 2). Embedded in combined fragments, these operators are intended to simplify the diagram's structure or alter the order of its events. However, the latest specification introduces a non-trivial degree of ambiguity in the interpretation and understanding of sequence diagrams. As these diagrams are increasingly adopted as modeling tools in embedded software, their ambiguity can exacerbate the challenges encountered in embedded system design. To address this ambiguity, this paper presents a formal model in operational semantics based on Abstract State Machines (ASM) to define the semantics of the loop, break and strict operators in sequence diagrams. Specifically, update rules are devised for ASMs to handle important behaviors present in most embedded software operating in distributed or parallel environments. This formal model can be readily extended to define the semantics of the remaining operators including information about time intervals and their related constraints. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.