Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559849
M. M. Danesh, S. Mortazavi, M. Nahavandi
In this paper, the terms e-learning and e-commerce are introduced and companies that offer free online education are brought under focus. Another thing defined here is how we can use e-learning to achieve e-commerce goals, making money and improve the value of the firms. In This study, strengths, weaknesses, opportunities and threats are defined (SWOT analysis) and suggestions are given to improve the efficiency of companies. Finally, a questionnaire formed with Likert scale and filled by the MBA students who study IT major in a privet university in Malaysia is discussed. This sample group is selected simply because they will be IT managers in future and this paper has tried to find the rate of the understanding line between free e-learning websites and e-commerce and evaluate which challenges are faced by the managers to achieve their goals. SPSS software has been used as the analysis tool in this study.
{"title":"Relationship between free e-learning websites and e-commerce","authors":"M. M. Danesh, S. Mortazavi, M. Nahavandi","doi":"10.1109/ICEIE.2010.5559849","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559849","url":null,"abstract":"In this paper, the terms e-learning and e-commerce are introduced and companies that offer free online education are brought under focus. Another thing defined here is how we can use e-learning to achieve e-commerce goals, making money and improve the value of the firms. In This study, strengths, weaknesses, opportunities and threats are defined (SWOT analysis) and suggestions are given to improve the efficiency of companies. Finally, a questionnaire formed with Likert scale and filled by the MBA students who study IT major in a privet university in Malaysia is discussed. This sample group is selected simply because they will be IT managers in future and this paper has tried to find the rate of the understanding line between free e-learning websites and e-commerce and evaluate which challenges are faced by the managers to achieve their goals. SPSS software has been used as the analysis tool in this study.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121198509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559683
H. Seo, Tae-You Lee, D. Shin
In recent years, eco-friendly transportation is becoming more important. Vehicle has to be replaced with electric car to reduce pollution. Under these circumstances, if it can be operated with other public transportation, it will be more efficient transportation in the future. To make it possible, electric unmanned vehicle requires middleware for decision making to driving. Middleware in unmanned vehicle is important to extensive data processing. Therefore, we will construct an environment for testing and developing middleware by simulator.
{"title":"A study of developing unmanned vehicle middleware using simulator","authors":"H. Seo, Tae-You Lee, D. Shin","doi":"10.1109/ICEIE.2010.5559683","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559683","url":null,"abstract":"In recent years, eco-friendly transportation is becoming more important. Vehicle has to be replaced with electric car to reduce pollution. Under these circumstances, if it can be operated with other public transportation, it will be more efficient transportation in the future. To make it possible, electric unmanned vehicle requires middleware for decision making to driving. Middleware in unmanned vehicle is important to extensive data processing. Therefore, we will construct an environment for testing and developing middleware by simulator.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116404475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559795
Rashid Amin, Shehzad Ashraf ch, M. Akhtar, Aftab Khan
Mobile ad hoc network and peer-to-peer networks are most advancing and emerging research areas in the recent years. Both of these networks are based on the same phenomenon like self-configuration and self-organization. Although, peer-to-peer network was firstly designed for wired network but now a days it may be deployed over mobile ad hoc network. When P2P networks are deployed over ad hoc network, it faces different problems due to dynamic topology and limited resources like memory, bandwidth and battery life of mobile nodes. In mobile ad hoc network nodes are continuously moving in a certain direction so network topology is changing from time to time. Node mobility is an important issue in these networks. Most of the researchers used only one mobility model in evaluation of routing protocols in mobile peer-to-peer network. As mobility models plays an important role in evaluation of the performance of different protocols, so other mobility models should also be used. We consider two mobility models probabilistic random walk and freeway mobility model in this network and we also compare these results with already used random waypoint mobility model. We used an ad hoc routing protocol Ad hoc On Demand Distance Vector routing under a peer-to-peer network application to evaluate the performance under prescribed mobility model. The results have been validated using network simulator (NS-2) and this helped in choosing proper mobility model for specific environment.
{"title":"Analyzing performance of ad hoc network mobility models in a peer-to-peer network application over mobile ad hoc network","authors":"Rashid Amin, Shehzad Ashraf ch, M. Akhtar, Aftab Khan","doi":"10.1109/ICEIE.2010.5559795","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559795","url":null,"abstract":"Mobile ad hoc network and peer-to-peer networks are most advancing and emerging research areas in the recent years. Both of these networks are based on the same phenomenon like self-configuration and self-organization. Although, peer-to-peer network was firstly designed for wired network but now a days it may be deployed over mobile ad hoc network. When P2P networks are deployed over ad hoc network, it faces different problems due to dynamic topology and limited resources like memory, bandwidth and battery life of mobile nodes. In mobile ad hoc network nodes are continuously moving in a certain direction so network topology is changing from time to time. Node mobility is an important issue in these networks. Most of the researchers used only one mobility model in evaluation of routing protocols in mobile peer-to-peer network. As mobility models plays an important role in evaluation of the performance of different protocols, so other mobility models should also be used. We consider two mobility models probabilistic random walk and freeway mobility model in this network and we also compare these results with already used random waypoint mobility model. We used an ad hoc routing protocol Ad hoc On Demand Distance Vector routing under a peer-to-peer network application to evaluate the performance under prescribed mobility model. The results have been validated using network simulator (NS-2) and this helped in choosing proper mobility model for specific environment.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116510509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559766
M. Seyrafi, Arghavan Asad, A. E. Zonouz, R. Berangi, M. Fathy, M. Soryani
In this paper a new fault tolerant routing algorithm with minimum hardware requirements and extremely high fault tolerance for 2D-mesh based NoCs is proposed. The LCFT (Low Cost Fault Tolerant) algorithm, removes the main limitations (forbidden turns) of the famous XY. So not only many new routes will be added to the list of selectable paths as well as deadlock freedom, but also it creates high level of fault tolerance. All these things are yielded only by the cost of adding one more virtual channel (for a total of two). Results show that LCFT algorithm can work well under almost bad conditions of faults in comparison with the already published methods.
{"title":"A new low cost fault tolerant solution for mesh based NoCs","authors":"M. Seyrafi, Arghavan Asad, A. E. Zonouz, R. Berangi, M. Fathy, M. Soryani","doi":"10.1109/ICEIE.2010.5559766","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559766","url":null,"abstract":"In this paper a new fault tolerant routing algorithm with minimum hardware requirements and extremely high fault tolerance for 2D-mesh based NoCs is proposed. The LCFT (Low Cost Fault Tolerant) algorithm, removes the main limitations (forbidden turns) of the famous XY. So not only many new routes will be added to the list of selectable paths as well as deadlock freedom, but also it creates high level of fault tolerance. All these things are yielded only by the cost of adding one more virtual channel (for a total of two). Results show that LCFT algorithm can work well under almost bad conditions of faults in comparison with the already published methods.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127097655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559894
Tianyi Li, Minghui Wang, W. Xiong
Based on the statistical properties of the colored noise in wavelet domain and the whitening property of wavelet transform, we present a novel method to filter colored noise efficiently. The proposed method treats every detail subband in wavelet domain as a regular image with white noise, and filters the noise using the threshold value algorithm by iteratively performing wavelet decomposition. The image polluted by colored noise is then denoised by doing inverse transform. The method is independent of the correlation parameter of the colored noise. Our simulation results indicate that the proposed method is able to achieve close or better performance in filtering the colored noise with significantly reduced computation cost than existing approaches, and it is also applicable to reduce white noise.
{"title":"A novel method for filtering of Gaussian colored noise in images with wavelet transform","authors":"Tianyi Li, Minghui Wang, W. Xiong","doi":"10.1109/ICEIE.2010.5559894","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559894","url":null,"abstract":"Based on the statistical properties of the colored noise in wavelet domain and the whitening property of wavelet transform, we present a novel method to filter colored noise efficiently. The proposed method treats every detail subband in wavelet domain as a regular image with white noise, and filters the noise using the threshold value algorithm by iteratively performing wavelet decomposition. The image polluted by colored noise is then denoised by doing inverse transform. The method is independent of the correlation parameter of the colored noise. Our simulation results indicate that the proposed method is able to achieve close or better performance in filtering the colored noise with significantly reduced computation cost than existing approaches, and it is also applicable to reduce white noise.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126605340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559872
Hosung Chun, T. Lehmann
A novel method is proposed that can generate a stable reference current using on-chip integrated resistors without the use of trimming. By optimally combining different types of integrated resistors, the overall resistance variability is reduced below that of the most accurate available resistor. Combining such a resistance with a band-gap reference and a temperature compensation circuit, we implement an on-chip current reference. This circuit is implemented using a standard 0.35um CMOS process with 3V power supply. Monte-Carlo simulations show a nominal reference current (1uA) from a combined resistor varies by ±11.5% over a −10°C to 70°C temperature range. This variation is reduced by a factor of two compared with using a normal resistor. The measured values of the combined resistor and the normal resistor are 1.08MΩ and 1.45MΩ, respectively. This is −10% and +20% deviation from the desired value of 1.2MΩ.
{"title":"CMOS current reference generator using integrated resistors","authors":"Hosung Chun, T. Lehmann","doi":"10.1109/ICEIE.2010.5559872","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559872","url":null,"abstract":"A novel method is proposed that can generate a stable reference current using on-chip integrated resistors without the use of trimming. By optimally combining different types of integrated resistors, the overall resistance variability is reduced below that of the most accurate available resistor. Combining such a resistance with a band-gap reference and a temperature compensation circuit, we implement an on-chip current reference. This circuit is implemented using a standard 0.35um CMOS process with 3V power supply. Monte-Carlo simulations show a nominal reference current (1uA) from a combined resistor varies by ±11.5% over a −10°C to 70°C temperature range. This variation is reduced by a factor of two compared with using a normal resistor. The measured values of the combined resistor and the normal resistor are 1.08MΩ and 1.45MΩ, respectively. This is −10% and +20% deviation from the desired value of 1.2MΩ.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559819
Hanieh Sadat Beiryaei, Mona Jamporazmay
Organizational knowledge is a valuable asset to survive in dynamic and challenging business environment. Knowledge management (KM) as a process of knowledge acquisition, storage and sharing is a critical managerial priority. In recent days, many firms had invested millions of dollars in KM initiatives especially in knowledge management systems (KMS) intended to improve knowledge sharing and innovation. Fulfilling of Knowledge requirements, knowledge project management and strategic KM, prioritizing and implementing KM projects and most importantly KM-business alignment are all so complicated issue that makes KM strategic planning as vital matter. KMS strategic planning is a solution of leveraging KM and is an important topic for managers and researchers alike. Despite of importance of it, there is lack of comprehensive framework for strategic KMS planning. This paper presents a framework for KMS strategic planning. By applying this framework, strategic KM-business alignment will be achievable.
{"title":"Propose a Framework for knowledge management strategic planning (KMSSP)","authors":"Hanieh Sadat Beiryaei, Mona Jamporazmay","doi":"10.1109/ICEIE.2010.5559819","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559819","url":null,"abstract":"Organizational knowledge is a valuable asset to survive in dynamic and challenging business environment. Knowledge management (KM) as a process of knowledge acquisition, storage and sharing is a critical managerial priority. In recent days, many firms had invested millions of dollars in KM initiatives especially in knowledge management systems (KMS) intended to improve knowledge sharing and innovation. Fulfilling of Knowledge requirements, knowledge project management and strategic KM, prioritizing and implementing KM projects and most importantly KM-business alignment are all so complicated issue that makes KM strategic planning as vital matter. KMS strategic planning is a solution of leveraging KM and is an important topic for managers and researchers alike. Despite of importance of it, there is lack of comprehensive framework for strategic KMS planning. This paper presents a framework for KMS strategic planning. By applying this framework, strategic KM-business alignment will be achievable.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127737490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559776
Hong-mei Li, L. Xiao, Yi-chi Zhang, J. Qiu
In this paper, a radiation model of Magnetic Flux Compression Generator with capacitive load is proposed based on the electrically small loop antenna theory, which can help to predicting the radiation characteristics of Magnetic Flux Compression Generator with capacitive loads and providing the necessary guidance on performance improvement and their experiment. The approximate calculation is necessary, however, by this approximation; the radiation efficiency can be a general assessment.
{"title":"Research on radiation of Magnetic Flux Compression Generator with capacitive load","authors":"Hong-mei Li, L. Xiao, Yi-chi Zhang, J. Qiu","doi":"10.1109/ICEIE.2010.5559776","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559776","url":null,"abstract":"In this paper, a radiation model of Magnetic Flux Compression Generator with capacitive load is proposed based on the electrically small loop antenna theory, which can help to predicting the radiation characteristics of Magnetic Flux Compression Generator with capacitive loads and providing the necessary guidance on performance improvement and their experiment. The approximate calculation is necessary, however, by this approximation; the radiation efficiency can be a general assessment.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559878
K. Kiratiratanapruk, W. Sinthupinyo
In this paper, we propose touching round grain segmentation technique based on center of individual grain and concavity of image boundary. The objective of this work is to identify single grain and detect position of touching round grain in binary image. First, center of grain is detected by using conventional technique such as Morphological algorithm and Color component labeling. From the detected centers of grain, we can separate individual grains from clustered grains. The clustered grains are further processed to detect concave points among centers of grain. We then apply several criteria such as distance, the opposite orientation and the angle to each others to determine splitting paths. The experimental results show good performance in separating touching round grains are of benefit for intelligent grain analysis.
{"title":"Segmentation algoritm for touching round grain image","authors":"K. Kiratiratanapruk, W. Sinthupinyo","doi":"10.1109/ICEIE.2010.5559878","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559878","url":null,"abstract":"In this paper, we propose touching round grain segmentation technique based on center of individual grain and concavity of image boundary. The objective of this work is to identify single grain and detect position of touching round grain in binary image. First, center of grain is detected by using conventional technique such as Morphological algorithm and Color component labeling. From the detected centers of grain, we can separate individual grains from clustered grains. The clustered grains are further processed to detect concave points among centers of grain. We then apply several criteria such as distance, the opposite orientation and the angle to each others to determine splitting paths. The experimental results show good performance in separating touching round grains are of benefit for intelligent grain analysis.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127506936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559868
Nchimunya Chaamwe, Wenyu Liu, Hongbo Jiang
Sudden earth tremors (seismic events) and the accompanying ground falls constitute a major threat to underground mining operations in most underground mines in Zambia. Seismic monitoring is therefore an important exercise that ensures not only a safe working environment for workers but ensures the safety of communities living nearby the mines. This paper discusses seismic events monitoring at one of the biggest mines in Zambia called Mufulira Copper mine. A study on seismic monitoring was carried out at the mine through observations, interviews and record inspections. The study revealed the different methods used over a period of time and it also revealed some major causes of seismicity at the mine. The paper then proposes the use of Wireless Underground Sensor Networks (WUSNs) to monitor seismic events in underground mines. Wireless sensor networks uses sensors that are capable of not only sensing, but processing and transmitting data, hence reducing on the wiring that is characterized by the current-system.
{"title":"Seismic monitoring in underground mines: A case of mufulira mine in Zambia: Using wireless sensor networks for seismic monitoring","authors":"Nchimunya Chaamwe, Wenyu Liu, Hongbo Jiang","doi":"10.1109/ICEIE.2010.5559868","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559868","url":null,"abstract":"Sudden earth tremors (seismic events) and the accompanying ground falls constitute a major threat to underground mining operations in most underground mines in Zambia. Seismic monitoring is therefore an important exercise that ensures not only a safe working environment for workers but ensures the safety of communities living nearby the mines. This paper discusses seismic events monitoring at one of the biggest mines in Zambia called Mufulira Copper mine. A study on seismic monitoring was carried out at the mine through observations, interviews and record inspections. The study revealed the different methods used over a period of time and it also revealed some major causes of seismicity at the mine. The paper then proposes the use of Wireless Underground Sensor Networks (WUSNs) to monitor seismic events in underground mines. Wireless sensor networks uses sensors that are capable of not only sensing, but processing and transmitting data, hence reducing on the wiring that is characterized by the current-system.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130417994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}