Pub Date : 2018-10-01DOI: 10.1109/icsengt.2018.8606369
{"title":"ICSET 2018 Author Index","authors":"","doi":"10.1109/icsengt.2018.8606369","DOIUrl":"https://doi.org/10.1109/icsengt.2018.8606369","url":null,"abstract":"","PeriodicalId":111551,"journal":{"name":"2018 IEEE 8th International Conference on System Engineering and Technology (ICSET)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116561355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICSENGT.2018.8606381
Fenny Anak Daud, R. Ab Rahman, M. Kassim, A. Idris
Dynamic Multipoint Virtual Private Network (DMVPN) is a Cisco IOS software solution for improvement scalable IPsec Virtual Private Network (VPN) that allows communication between branches over the Internet without requiring a permanent VPN tunnel between sites. DMVPN is a new technology that combines multiple GRE (MGRE) Tunnels, IPsec encryption and NHRP (Next Hop Resolution Protocol) that consist of two mainly deployment designs such as static hub to spoke and dynamic spoke to spoke IPsec tunnels. The security of data is an important aspect and encryption algorithm play an important role to provide the security to data. In this research, a performance and comparison of encryption techniques (AES, 3DES, DES) using Dynamic Virtual Protocol Network (DMVPN) Technology by GNS3 and real Cisco devices with different parameters (throughput, jitter and packet loss) based on transferring data and video streaming were presented. The results of this study indicate that the AES encryption has better performance to provide optimum performance in the network.
动态多点虚拟专用网(Dynamic Multipoint Virtual Private Network, DMVPN)是一款思科IOS软件解决方案,用于改进可扩展的IPsec虚拟专用网(IPsec Virtual Private Network, VPN),允许分支机构之间通过Internet进行通信,而无需在站点之间建立永久的VPN隧道。DMVPN是一种将多个GRE (MGRE)隧道、IPsec加密和下一跳解析协议(NHRP)相结合的新技术,主要包括静态hub to spoke和动态spoke to spoke两种IPsec隧道的部署设计。数据安全是数据安全的一个重要方面,加密算法在为数据提供安全保障方面发挥着重要作用。在本研究中,介绍了GNS3和真实Cisco设备基于传输数据和视频流的不同参数(吞吐量、抖动和丢包)采用动态虚拟协议网络(DMVPN)技术的加密技术(AES、3DES、DES)的性能和比较。研究结果表明,AES加密具有更好的性能,可以在网络中提供最优的性能。
{"title":"Performance of Encryption Techniques Using Dynamic Virtual Protocol Network Technology","authors":"Fenny Anak Daud, R. Ab Rahman, M. Kassim, A. Idris","doi":"10.1109/ICSENGT.2018.8606381","DOIUrl":"https://doi.org/10.1109/ICSENGT.2018.8606381","url":null,"abstract":"Dynamic Multipoint Virtual Private Network (DMVPN) is a Cisco IOS software solution for improvement scalable IPsec Virtual Private Network (VPN) that allows communication between branches over the Internet without requiring a permanent VPN tunnel between sites. DMVPN is a new technology that combines multiple GRE (MGRE) Tunnels, IPsec encryption and NHRP (Next Hop Resolution Protocol) that consist of two mainly deployment designs such as static hub to spoke and dynamic spoke to spoke IPsec tunnels. The security of data is an important aspect and encryption algorithm play an important role to provide the security to data. In this research, a performance and comparison of encryption techniques (AES, 3DES, DES) using Dynamic Virtual Protocol Network (DMVPN) Technology by GNS3 and real Cisco devices with different parameters (throughput, jitter and packet loss) based on transferring data and video streaming were presented. The results of this study indicate that the AES encryption has better performance to provide optimum performance in the network.","PeriodicalId":111551,"journal":{"name":"2018 IEEE 8th International Conference on System Engineering and Technology (ICSET)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114164075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICSENGT.2018.8606384
S. Z. Yahaya, Z. Hussain, R. Boudville, F. Ahmad, M. Taib
Rehabilitation exercise with the use of functional electrical stimulation (FES) has become one of the effective technique of rehabilitation for hemiplegic and other neurological disorder conditions. Control is among the main issues in FES since muscle response is highly dynamic due to fatigue and other reasons. Different way of FES application may come with different structure of control technique. In this work, fuzzy logic controller (FLC) based cycle-to-cycle control with an energy storage element was designed and implemented for FES-assisted elliptical stepping exercise. The aim is to obtain appropriate control performance by combining the control action of FLC cycle-to-cycle control and effect of the energy storage element. The energy storage element makes use linear extension spring that provide resist and assist action to the exercise movement. Thus, instead of control action that totally rely on the FLC cycle-to-cycle control, the energy storage element could provide additional assistance in improving the exercise performance. Analysis was conducted to determine the appropriate spring length and constant. Comparison of performance with the FLC cycle-to-cycle control without the energy storage element was also conducted. The result showed a promising performance and hence supports the potential use of the proposed control technique for FES-assisted elliptical stepping exercise.
{"title":"Implementation of Cycle-to-Cycle Control with Energy Storage Element for FES-Assisted Elliptical Stepping Exercise","authors":"S. Z. Yahaya, Z. Hussain, R. Boudville, F. Ahmad, M. Taib","doi":"10.1109/ICSENGT.2018.8606384","DOIUrl":"https://doi.org/10.1109/ICSENGT.2018.8606384","url":null,"abstract":"Rehabilitation exercise with the use of functional electrical stimulation (FES) has become one of the effective technique of rehabilitation for hemiplegic and other neurological disorder conditions. Control is among the main issues in FES since muscle response is highly dynamic due to fatigue and other reasons. Different way of FES application may come with different structure of control technique. In this work, fuzzy logic controller (FLC) based cycle-to-cycle control with an energy storage element was designed and implemented for FES-assisted elliptical stepping exercise. The aim is to obtain appropriate control performance by combining the control action of FLC cycle-to-cycle control and effect of the energy storage element. The energy storage element makes use linear extension spring that provide resist and assist action to the exercise movement. Thus, instead of control action that totally rely on the FLC cycle-to-cycle control, the energy storage element could provide additional assistance in improving the exercise performance. Analysis was conducted to determine the appropriate spring length and constant. Comparison of performance with the FLC cycle-to-cycle control without the energy storage element was also conducted. The result showed a promising performance and hence supports the potential use of the proposed control technique for FES-assisted elliptical stepping exercise.","PeriodicalId":111551,"journal":{"name":"2018 IEEE 8th International Conference on System Engineering and Technology (ICSET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125969971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/icsengt.2018.8606378
{"title":"ICSET 2018 Committees","authors":"","doi":"10.1109/icsengt.2018.8606378","DOIUrl":"https://doi.org/10.1109/icsengt.2018.8606378","url":null,"abstract":"","PeriodicalId":111551,"journal":{"name":"2018 IEEE 8th International Conference on System Engineering and Technology (ICSET)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131052680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICSENGT.2018.8606375
A. Muhammad, A. Prihatmanto, Rifki Wijaya, Harits Ar Rosyid, Hashfi Rasis Hakim, Antonius Pitra Dana, Ummu Chanifatu Al Himmah
The Demite is an educational game with a horror genre using Augmented Reality technology and Speech Recognition. In this game, the player will capture and eliminate ghosts with English pronunciation. Therefore, players will not only catch and eliminate ghosts, but players will also train their English pronunciation correctly. To find out the exact and correct pronunciation in English, The Demite requires an assessment system to measure the distance in the pronunciation of English words. The assessment system requires a method to measure the distance parameters that will be used in the assessment system. Parameters to be measured are Phonetic, Syllable, and Phonetic Length. In this study focused on choosing the right method between Levenshtein Distance, Euclidian Distance, and Manhattan Distance in measuring the distance of these parameters. Based on the results of the tests performed, it was concluded that it is possible to use Levenshtein distance in measuring the distance between phonetic and after observing the test data in syllable and phonetic length measurements, the Manhattan distance method is more appropriate to measure syllable and phonetic length distances even if viewed the average measurement of the Manhattan distance and Euclidean distance is almost the same value. However, when the distance from syllable and phonetic length is far, Euclidean measurements take the midpoint of the accumulation of all parameters, whereas, The Demite assessment system requires the sum of all distances obtained from these parameters. Therefore, the Manhattan distance method is used which measures the distance of the Syllable and Phonetic parameter by sum all the distance values obtained.
{"title":"Distance Measurements Method for The Demite Pronunciation Assessment","authors":"A. Muhammad, A. Prihatmanto, Rifki Wijaya, Harits Ar Rosyid, Hashfi Rasis Hakim, Antonius Pitra Dana, Ummu Chanifatu Al Himmah","doi":"10.1109/ICSENGT.2018.8606375","DOIUrl":"https://doi.org/10.1109/ICSENGT.2018.8606375","url":null,"abstract":"The Demite is an educational game with a horror genre using Augmented Reality technology and Speech Recognition. In this game, the player will capture and eliminate ghosts with English pronunciation. Therefore, players will not only catch and eliminate ghosts, but players will also train their English pronunciation correctly. To find out the exact and correct pronunciation in English, The Demite requires an assessment system to measure the distance in the pronunciation of English words. The assessment system requires a method to measure the distance parameters that will be used in the assessment system. Parameters to be measured are Phonetic, Syllable, and Phonetic Length. In this study focused on choosing the right method between Levenshtein Distance, Euclidian Distance, and Manhattan Distance in measuring the distance of these parameters. Based on the results of the tests performed, it was concluded that it is possible to use Levenshtein distance in measuring the distance between phonetic and after observing the test data in syllable and phonetic length measurements, the Manhattan distance method is more appropriate to measure syllable and phonetic length distances even if viewed the average measurement of the Manhattan distance and Euclidean distance is almost the same value. However, when the distance from syllable and phonetic length is far, Euclidean measurements take the midpoint of the accumulation of all parameters, whereas, The Demite assessment system requires the sum of all distances obtained from these parameters. Therefore, the Manhattan distance method is used which measures the distance of the Syllable and Phonetic parameter by sum all the distance values obtained.","PeriodicalId":111551,"journal":{"name":"2018 IEEE 8th International Conference on System Engineering and Technology (ICSET)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133853685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICSENGT.2018.8606366
Dyah Ayu Anggreini Tuasikal, Hanif Fakhrurroja, C. Machbub
Voice activation and speaker recognition are needed in many applications today. Speaker recognition is the process of automatically recognizing who speaks based on the voice signal. The introduction of these speakers is generally required on systems that use security and privacy. One example of this paper application is for activation and security in controlling humanoid robots. Voice recording process using Kinect 2.0. The first step in the speech recognition process is feature extraction. In this paper use Mel Frequency Cepstrum Coefficient (MFCC) on characteristic extraction process and Dynamic Time Warping (DTW) used as feature matching technique. The test was performed by 5 different speakers, with 2 types of words (“aktifkan” means activate and “hello slim”), and test with different recording distance (0.5m, 2m, 4m). Robot activation using two different types of words has an average accuracy of 91.5%. At the next difficulty level for testing the recording distance accuracy decreased from 97.5% to 85% to 65%.
{"title":"Voice Activation Using Speaker Recognition for Controlling Humanoid Robot","authors":"Dyah Ayu Anggreini Tuasikal, Hanif Fakhrurroja, C. Machbub","doi":"10.1109/ICSENGT.2018.8606366","DOIUrl":"https://doi.org/10.1109/ICSENGT.2018.8606366","url":null,"abstract":"Voice activation and speaker recognition are needed in many applications today. Speaker recognition is the process of automatically recognizing who speaks based on the voice signal. The introduction of these speakers is generally required on systems that use security and privacy. One example of this paper application is for activation and security in controlling humanoid robots. Voice recording process using Kinect 2.0. The first step in the speech recognition process is feature extraction. In this paper use Mel Frequency Cepstrum Coefficient (MFCC) on characteristic extraction process and Dynamic Time Warping (DTW) used as feature matching technique. The test was performed by 5 different speakers, with 2 types of words (“aktifkan” means activate and “hello slim”), and test with different recording distance (0.5m, 2m, 4m). Robot activation using two different types of words has an average accuracy of 91.5%. At the next difficulty level for testing the recording distance accuracy decreased from 97.5% to 85% to 65%.","PeriodicalId":111551,"journal":{"name":"2018 IEEE 8th International Conference on System Engineering and Technology (ICSET)","volume":"45 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132220146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICSENGT.2018.8606392
A. Idris, Alya Balqis Binti Mohd Fauzi, Mohd Syarhan Idris, I. Taib, M. Kassim, R. Ab Rahman
As the number of demand may increase per year, thus the world need to move to the advance technologies cellular system. Researcher come up with Filtered-OFDMA (F- OFDMA) is the new waveform that has been proposed for 5G system. But still high Peak to Average Power Ratio (PAPR) is the drawbacks of the system. This paper evaluates the performance of PAPR in F-OFDMA by using two block coding. Huffman coding and Turbo codes are the proposed method for this simulation. From the analysis, the simulation results showed that proposed method Huffman Coding scheme greatly reduce the PAPR in F-OFDMA system by 17.17% in 64 APSK modulation while Turbo code scheme is only by 13.13%.
{"title":"Reduction of PAPR using Huffman Coding and APSK Modulation Technique for F-OFDMA in 5G System","authors":"A. Idris, Alya Balqis Binti Mohd Fauzi, Mohd Syarhan Idris, I. Taib, M. Kassim, R. Ab Rahman","doi":"10.1109/ICSENGT.2018.8606392","DOIUrl":"https://doi.org/10.1109/ICSENGT.2018.8606392","url":null,"abstract":"As the number of demand may increase per year, thus the world need to move to the advance technologies cellular system. Researcher come up with Filtered-OFDMA (F- OFDMA) is the new waveform that has been proposed for 5G system. But still high Peak to Average Power Ratio (PAPR) is the drawbacks of the system. This paper evaluates the performance of PAPR in F-OFDMA by using two block coding. Huffman coding and Turbo codes are the proposed method for this simulation. From the analysis, the simulation results showed that proposed method Huffman Coding scheme greatly reduce the PAPR in F-OFDMA system by 17.17% in 64 APSK modulation while Turbo code scheme is only by 13.13%.","PeriodicalId":111551,"journal":{"name":"2018 IEEE 8th International Conference on System Engineering and Technology (ICSET)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133995649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICSENGT.2018.8606390
N. M. Anuar, F. Kasran, Zatul Iffah Abdul Latif, Siti Amalina Ence Ab Rahim, Arif Manut, M. H. Jusoh, N. A. Hadi, A. Yoshikawa
This paper presents the preliminary observation on the possible Geomagnetic Induced Current (GIC) activities at Malaysia region during the quiet period of solar cycle 24 (year 2017). In fact, the damage of power system operation might lead to the malfunction of the transformer, which is the main component of the power system. Previously, the cause of the damage has been identified in the long-term investigation, where it drives from the space weather effect so-called (GIC). In this work, the quiet period has been selected by respecting the value of K-Planetary index (Kp) must be less than 3 extracted from OMNIWeb data source. The main objective of the current work is to investigate the behavior of the GIC amplitude at Malaysia region as well as to identify the parameter (ionospheric current and magnetospheric current) that contribute significantly towards the GIC activity at Malaysia region. The type of analysis was carried out using the data of geomagnetic field by extracting the time derivative of the horizontal component (dH/dt) as the indicator for GIC activity. The geomagnetic data was obtained from the MAGDAS observatories at Langkawi (LKW), Perak (PER), and Johor (JOH) stations. Subsequently, the dH/dt value is less than 30 nT/min represent no GIC activity occurred during that particular date for all three stations. However, the results revealed that the ionospheric current, DP2 corresponds well to the dH/dt amplitude. Plus, the latitudinal correlation gave the best representation of the control factor of GIC activity.
{"title":"Estimation of Time Derivative of Horizontal Geomagnetic Component for GIC Assesment in Malaysia during Quiet Period","authors":"N. M. Anuar, F. Kasran, Zatul Iffah Abdul Latif, Siti Amalina Ence Ab Rahim, Arif Manut, M. H. Jusoh, N. A. Hadi, A. Yoshikawa","doi":"10.1109/ICSENGT.2018.8606390","DOIUrl":"https://doi.org/10.1109/ICSENGT.2018.8606390","url":null,"abstract":"This paper presents the preliminary observation on the possible Geomagnetic Induced Current (GIC) activities at Malaysia region during the quiet period of solar cycle 24 (year 2017). In fact, the damage of power system operation might lead to the malfunction of the transformer, which is the main component of the power system. Previously, the cause of the damage has been identified in the long-term investigation, where it drives from the space weather effect so-called (GIC). In this work, the quiet period has been selected by respecting the value of K-Planetary index (Kp) must be less than 3 extracted from OMNIWeb data source. The main objective of the current work is to investigate the behavior of the GIC amplitude at Malaysia region as well as to identify the parameter (ionospheric current and magnetospheric current) that contribute significantly towards the GIC activity at Malaysia region. The type of analysis was carried out using the data of geomagnetic field by extracting the time derivative of the horizontal component (dH/dt) as the indicator for GIC activity. The geomagnetic data was obtained from the MAGDAS observatories at Langkawi (LKW), Perak (PER), and Johor (JOH) stations. Subsequently, the dH/dt value is less than 30 nT/min represent no GIC activity occurred during that particular date for all three stations. However, the results revealed that the ionospheric current, DP2 corresponds well to the dH/dt amplitude. Plus, the latitudinal correlation gave the best representation of the control factor of GIC activity.","PeriodicalId":111551,"journal":{"name":"2018 IEEE 8th International Conference on System Engineering and Technology (ICSET)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133012162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/icsengt.2018.8606382
{"title":"ICSET 2018 Preface","authors":"","doi":"10.1109/icsengt.2018.8606382","DOIUrl":"https://doi.org/10.1109/icsengt.2018.8606382","url":null,"abstract":"","PeriodicalId":111551,"journal":{"name":"2018 IEEE 8th International Conference on System Engineering and Technology (ICSET)","volume":"120 22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126316957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICSENGT.2018.8606358
Abdul Rauf Abdul Rasam, Azri Haziq Azlin, N. M. Saraf
Disability is defined both evolving concept and manifestation of interaction between person with disabilities (PWDs) with physical and environmental barriers that hold them back from giving full and effective participation in a society. A person fall in this category will find himself trapped in such vulnerable condition as he or she may not counter their daily problems without high surveillance from their guardian. Development of a mobile apps and web-GIS-based healthcare system in Ampang is proposed in this study as this application has a bright potential to assist PWDs in term of accessibilities to reach healthcare centres. The main objectives of this paper are i) to study the needs assessment on the proposed system, ii) to develop a mobile and web GIS-based healthcare information system and iii) to evaluate the performance of the proposed system. Five main steps used to complete the objectives; mainly user need assessments, data collection, system design, system implementation and system testing phase. Selected respondents agreed on the development of the proposed system, namely the mobile apps and web system. The system was created with main menus such as doctor home visit, ambulance and medication delivery. Medical support team can also perform analyses in the system for PWD needs such as shortest path analysis, buffering and view of the main menus.
{"title":"Mobile Apps and Web GIS-Based Accessible Health and Social Care System for People with Disabilities","authors":"Abdul Rauf Abdul Rasam, Azri Haziq Azlin, N. M. Saraf","doi":"10.1109/ICSENGT.2018.8606358","DOIUrl":"https://doi.org/10.1109/ICSENGT.2018.8606358","url":null,"abstract":"Disability is defined both evolving concept and manifestation of interaction between person with disabilities (PWDs) with physical and environmental barriers that hold them back from giving full and effective participation in a society. A person fall in this category will find himself trapped in such vulnerable condition as he or she may not counter their daily problems without high surveillance from their guardian. Development of a mobile apps and web-GIS-based healthcare system in Ampang is proposed in this study as this application has a bright potential to assist PWDs in term of accessibilities to reach healthcare centres. The main objectives of this paper are i) to study the needs assessment on the proposed system, ii) to develop a mobile and web GIS-based healthcare information system and iii) to evaluate the performance of the proposed system. Five main steps used to complete the objectives; mainly user need assessments, data collection, system design, system implementation and system testing phase. Selected respondents agreed on the development of the proposed system, namely the mobile apps and web system. The system was created with main menus such as doctor home visit, ambulance and medication delivery. Medical support team can also perform analyses in the system for PWD needs such as shortest path analysis, buffering and view of the main menus.","PeriodicalId":111551,"journal":{"name":"2018 IEEE 8th International Conference on System Engineering and Technology (ICSET)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127025299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}