Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863095
Haichen Zhao, Liangrong Li, Linhua Li, Shaolu Hu
This paper presents a dual-microphone adaptive noise cancelling algorithm which uses the voice activity detection method in the adaptive noise cancellation to avoid voice leakage. With such a method, the noise canceller can well judge and cancel the environmental noises from the mixed signals and restore the desired voices. A series of tests are carried out with voices and noises which all prove the algorithm's excellent performances.
{"title":"Dual-microphone adaptive noise canceller with a voice activity detector","authors":"Haichen Zhao, Liangrong Li, Linhua Li, Shaolu Hu","doi":"10.1109/TENCONSPRING.2014.6863095","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863095","url":null,"abstract":"This paper presents a dual-microphone adaptive noise cancelling algorithm which uses the voice activity detection method in the adaptive noise cancellation to avoid voice leakage. With such a method, the noise canceller can well judge and cancel the environmental noises from the mixed signals and restore the desired voices. A series of tests are carried out with voices and noises which all prove the algorithm's excellent performances.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116810943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based environment. Accordingly, this paper offers an efficient and scalable user authentication scheme for cloud computing environment. It the suggested model, various tools and techniques have been introduced and used by using the concept of agent. Therefore, a client-based user authentication agent has been introduced to confirm identity of the user in client-side. Furthermore, a cloud-based software-as-a-service application has been used to confirm the process of authentication for unregistered devices. Moreover, there are two separate servers for storing authentication and cryptography resources from main servers to decrease the dependency of user authentication and encryption processes from main server. Cryptography agent was also introduced to encrypt resources before storing on cloud servers. In overall, the theoretical analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the reliability and rate of trust in cloud computing environments as an emerging and powerful technology in various industries.
{"title":"A scalable and efficient user authentication scheme for cloud computing environments","authors":"Faraz Fatemi Moghaddam, Shiva Gerayeli Moghaddam, Sohrab Rouzbeh, Sagheb Kohpayeh Araghi, Nima Morad Alibeigi, Shirin Dabbaghi Varnosfaderani","doi":"10.1109/TENCONSPRING.2014.6863086","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863086","url":null,"abstract":"Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based environment. Accordingly, this paper offers an efficient and scalable user authentication scheme for cloud computing environment. It the suggested model, various tools and techniques have been introduced and used by using the concept of agent. Therefore, a client-based user authentication agent has been introduced to confirm identity of the user in client-side. Furthermore, a cloud-based software-as-a-service application has been used to confirm the process of authentication for unregistered devices. Moreover, there are two separate servers for storing authentication and cryptography resources from main servers to decrease the dependency of user authentication and encryption processes from main server. Cryptography agent was also introduced to encrypt resources before storing on cloud servers. In overall, the theoretical analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the reliability and rate of trust in cloud computing environments as an emerging and powerful technology in various industries.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125031810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863109
B. V. Ghaffari, T. Kitajima, S. S. Abdullah, M. Kouhnavard
This paper presents a robust method for license plate localization (LPL). Basically, the performance of LPL directly affects the accuracy of License Plate Recognition system. Although many studies had been conducted on LPL systems, many of them only discuss on license plate (LP) from countries that have restricted and distinguished LP types in terms of shapes and fonts. In this paper, a novel LPL system is proposed to address difficulties in recognizing extraordinary LP types with respect to shapes and fonts. The system has been implemented using MATLAB in eight different conditions of illumination in an actual environment to illustrate the efficiency of the proposed method. The total accuracy of this system for all conditions is 96% to 97%.
{"title":"A robust and highly efficient localization method for irregular license plates","authors":"B. V. Ghaffari, T. Kitajima, S. S. Abdullah, M. Kouhnavard","doi":"10.1109/TENCONSPRING.2014.6863109","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863109","url":null,"abstract":"This paper presents a robust method for license plate localization (LPL). Basically, the performance of LPL directly affects the accuracy of License Plate Recognition system. Although many studies had been conducted on LPL systems, many of them only discuss on license plate (LP) from countries that have restricted and distinguished LP types in terms of shapes and fonts. In this paper, a novel LPL system is proposed to address difficulties in recognizing extraordinary LP types with respect to shapes and fonts. The system has been implemented using MATLAB in eight different conditions of illumination in an actual environment to illustrate the efficiency of the proposed method. The total accuracy of this system for all conditions is 96% to 97%.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128304791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863118
M. Fernandez, Kristina Joyce E. Gob, Aubrey Rose M. Leonidas, Ron Jason J. Ravara, A. Bandala, E. Dadios
The study presented aims to design and develop a face recognition system. The system utilized Viola Jones Algorithm in detecting faces from a given image. Also the system used Artificial Neural Networks in recognizing faces detected from the input. Upon experimentation the system generated can recognize human faces with accuracy of 87.05%. The system performs at its best if the person is around 150cm away from the camera with an accuracy rate of 87.59%. Also, the best amount of lighting for the recognition system is at 480 lumens with an accuracy rate of 88.64%. Lastly, the system also performs at its best if the person is directly facing the camera or at 0 degrees with respect to the camera.
{"title":"Simultaneous face detection and recognition using Viola-Jones Algorithm and Artificial Neural Networks for identity verification","authors":"M. Fernandez, Kristina Joyce E. Gob, Aubrey Rose M. Leonidas, Ron Jason J. Ravara, A. Bandala, E. Dadios","doi":"10.1109/TENCONSPRING.2014.6863118","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863118","url":null,"abstract":"The study presented aims to design and develop a face recognition system. The system utilized Viola Jones Algorithm in detecting faces from a given image. Also the system used Artificial Neural Networks in recognizing faces detected from the input. Upon experimentation the system generated can recognize human faces with accuracy of 87.05%. The system performs at its best if the person is around 150cm away from the camera with an accuracy rate of 87.59%. Also, the best amount of lighting for the recognition system is at 480 lumens with an accuracy rate of 88.64%. Lastly, the system also performs at its best if the person is directly facing the camera or at 0 degrees with respect to the camera.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128248570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863093
R. Kodali
In Wireless sensor networks (WSNs), many tiny sensor nodes communicate using wireless links and collaborate with each other. The data collected by each of the nodes is communicated towards the gateway node after carrying out aggregation of the data by different nodes. It is necessary to secure the data collected by the WSN nodes while they communicate among themselves using multi hop wireless links. To meet this objective it is required to make use of energy efficient cryptographic algorithms so that the same can be ported over the resource constrained nodes. It is needed to create trust initially among the WSN nodes while using any of the cryptographic algorithms. Towards this, a key management technique needs to be made use of. Due to the resource constrained nature of the WSN nodes and the remote deployment of the nodes, an implementation of conventional key management techniques is infeasible. This work proposes a key management technique, with its reduced resource overheads, which is highly suited to be used in hierarchical WSN applications. Both Identity based key management (IBK) and probabilistic key pre-distribution schemes are made use of at different hierarchical levels. The proposed key management technique has been implemented using IRIS WSN nodes. A comparison of resource overheads has also been carried out.
{"title":"Key management technique for WSNs","authors":"R. Kodali","doi":"10.1109/TENCONSPRING.2014.6863093","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863093","url":null,"abstract":"In Wireless sensor networks (WSNs), many tiny sensor nodes communicate using wireless links and collaborate with each other. The data collected by each of the nodes is communicated towards the gateway node after carrying out aggregation of the data by different nodes. It is necessary to secure the data collected by the WSN nodes while they communicate among themselves using multi hop wireless links. To meet this objective it is required to make use of energy efficient cryptographic algorithms so that the same can be ported over the resource constrained nodes. It is needed to create trust initially among the WSN nodes while using any of the cryptographic algorithms. Towards this, a key management technique needs to be made use of. Due to the resource constrained nature of the WSN nodes and the remote deployment of the nodes, an implementation of conventional key management techniques is infeasible. This work proposes a key management technique, with its reduced resource overheads, which is highly suited to be used in hierarchical WSN applications. Both Identity based key management (IBK) and probabilistic key pre-distribution schemes are made use of at different hierarchical levels. The proposed key management technique has been implemented using IRIS WSN nodes. A comparison of resource overheads has also been carried out.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"3 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132405765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6862989
G. Pandey, H. Singh, P. K. Bharti, M. K. Meshram
In this paper, a compact Ultrawideband (UWB) high gain microstrip patch antenna using planar metamaterial structures is proposed. The antenna has two layers of metamaterial structure which are made by etching π-shaped slot on main radiating patch and crossed shaped slots on the ground plane. The inductances and capacitances developed due to the ground plane and patterned radiating patch leads to the left handed behavior of the metamaterial. The proposed antenna has compact size 27.6×30.8mm2 with height 1.6mm and designed on low cost FR4 substrate. The impedance bandwidth (-10dB) of the antenna is 3-12GHz with average gain of 4dBi and the peak gain 5.8 dBi at 9.5 GHz. The results obtained from the simulation studies shows that the antenna has good radiation characteristics for the UWB applications.
{"title":"Metamaterial based compact antenna design for UWB applications","authors":"G. Pandey, H. Singh, P. K. Bharti, M. K. Meshram","doi":"10.1109/TENCONSPRING.2014.6862989","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6862989","url":null,"abstract":"In this paper, a compact Ultrawideband (UWB) high gain microstrip patch antenna using planar metamaterial structures is proposed. The antenna has two layers of metamaterial structure which are made by etching π-shaped slot on main radiating patch and crossed shaped slots on the ground plane. The inductances and capacitances developed due to the ground plane and patterned radiating patch leads to the left handed behavior of the metamaterial. The proposed antenna has compact size 27.6×30.8mm2 with height 1.6mm and designed on low cost FR4 substrate. The impedance bandwidth (-10dB) of the antenna is 3-12GHz with average gain of 4dBi and the peak gain 5.8 dBi at 9.5 GHz. The results obtained from the simulation studies shows that the antenna has good radiation characteristics for the UWB applications.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125501815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863100
S. F. Mohammed Esa, K. Y. Lee, R. Jarmin
Histamine is produced by the decarboxylation of histidine in fish muscle tissue. When histamine is ingested in excessive amount, Scombroid poisoning occurs. Scombroid poisoning is a type of allergy with symptom such as headache, nausea, vomiting, diarrhea, facial swelling and low blood pressure. Existing methods to detect histamine include HPLC and TLC. However, they are expensive; in need of well trained technician and are laborious and time consuming. In contrast, ISFET is robust, cheap, miniaturization enabling and simple. This is the first attempt to apply ISFET technology on detection of histamine. Our previous work has shown histamine can be detected by depositing a PVC-based liquid membrane, plasticized with DOP added with ionophore Mn(TPP)Cl and polyHEMA layer on the insulator gate of ISFET. In order to increase the sensitivity of ISFET towards histamine, the effect from duration to condition the ISFET in 0.05 molar of histamine, is examined here. It is found that ISFET A and C, which show good sensitivity near Nernstian response towards pH, are showing good sensitivity towards histamine also. It is also observed that the longer the conditioning time, the lower the sensitivity. ISFET A is found to display a more stable and repeatable performance, at a sensitivity of about 7mV/dec. The sensitivity is found higher with 1 hour conditioning in 0.05 molar of histamine.
{"title":"Effect of conditioning time on a novel PVC-based membrane for chemFET sensitive to histamine","authors":"S. F. Mohammed Esa, K. Y. Lee, R. Jarmin","doi":"10.1109/TENCONSPRING.2014.6863100","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863100","url":null,"abstract":"Histamine is produced by the decarboxylation of histidine in fish muscle tissue. When histamine is ingested in excessive amount, Scombroid poisoning occurs. Scombroid poisoning is a type of allergy with symptom such as headache, nausea, vomiting, diarrhea, facial swelling and low blood pressure. Existing methods to detect histamine include HPLC and TLC. However, they are expensive; in need of well trained technician and are laborious and time consuming. In contrast, ISFET is robust, cheap, miniaturization enabling and simple. This is the first attempt to apply ISFET technology on detection of histamine. Our previous work has shown histamine can be detected by depositing a PVC-based liquid membrane, plasticized with DOP added with ionophore Mn(TPP)Cl and polyHEMA layer on the insulator gate of ISFET. In order to increase the sensitivity of ISFET towards histamine, the effect from duration to condition the ISFET in 0.05 molar of histamine, is examined here. It is found that ISFET A and C, which show good sensitivity near Nernstian response towards pH, are showing good sensitivity towards histamine also. It is also observed that the longer the conditioning time, the lower the sensitivity. ISFET A is found to display a more stable and repeatable performance, at a sensitivity of about 7mV/dec. The sensitivity is found higher with 1 hour conditioning in 0.05 molar of histamine.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122689854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863030
S. Kalraiya, H. Singh, M. K. Meshram, M. Thottapan
A dual-band planar printed monopole antenna for wireless local area network (WLAN) and worldwide interoperability for microwave access (WiMAX) applications are presented. The proposed antenna is designed on inexpensive FR4 substrate having dielectric constant 4.4 and thickness 1.6 mm, which covers WLAN 2.4 GHz (2.4 GHzȓ2.5 GHz), WiMAX 2.5 GHz (2.5 GHzȓ2.69 GHz), WiMAX 3.5 GHz (3.3GHzȓ3.6GHz), HIPERLAN1 5.2 GHz (5.15 GHz-5.35 GHz), and HIPERLAN2 5.8 GHz (5.725 GHzȓ5.825 GHz). The proposed antenna mainly consists of inverted U-shaped strip, inverted L-shaped strip and modified ground plane. The modified ground plane was introduced to enhance the performance of the proposed antenna. It is found that the proposed antenna can meet the demands of WLAN and WiMAX systems by having bandwidth of 1.4 GHz (2.25-3.65 GHz) for the lower band and 2.13 GHz (4.37 GHzȓ6.5 GHz) for the upper band defined by -10dB reflection coefficient. The radiation patterns and gain characteristics are also presented. Due to compact size, the proposed monopole antenna may well work as an internal antenna in a portable device for WLAN/WiMAX operations.
{"title":"Microstripline-fed dual band printed monopole antenna for WLAN/WiMAX/HIPERLAN applications","authors":"S. Kalraiya, H. Singh, M. K. Meshram, M. Thottapan","doi":"10.1109/TENCONSPRING.2014.6863030","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863030","url":null,"abstract":"A dual-band planar printed monopole antenna for wireless local area network (WLAN) and worldwide interoperability for microwave access (WiMAX) applications are presented. The proposed antenna is designed on inexpensive FR4 substrate having dielectric constant 4.4 and thickness 1.6 mm, which covers WLAN 2.4 GHz (2.4 GHzȓ2.5 GHz), WiMAX 2.5 GHz (2.5 GHzȓ2.69 GHz), WiMAX 3.5 GHz (3.3GHzȓ3.6GHz), HIPERLAN1 5.2 GHz (5.15 GHz-5.35 GHz), and HIPERLAN2 5.8 GHz (5.725 GHzȓ5.825 GHz). The proposed antenna mainly consists of inverted U-shaped strip, inverted L-shaped strip and modified ground plane. The modified ground plane was introduced to enhance the performance of the proposed antenna. It is found that the proposed antenna can meet the demands of WLAN and WiMAX systems by having bandwidth of 1.4 GHz (2.25-3.65 GHz) for the lower band and 2.13 GHz (4.37 GHzȓ6.5 GHz) for the upper band defined by -10dB reflection coefficient. The radiation patterns and gain characteristics are also presented. Due to compact size, the proposed monopole antenna may well work as an internal antenna in a portable device for WLAN/WiMAX operations.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127749092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863103
N. Samah, Hadijah Jaffri, Lokman Mohd Tahir, A. Sha'ameri, U. U. Sheikh
This paper describes the implementation of Problem-based Laboratory (PBLab) Model at Digital Signal Processing Laboratory (DSP Lab), Faculty of Electrical Engineering, Universiti Teknologi Malaysia (UTM). The model was developed as an alternative to the conventional instructional based laboratory previously practiced. Grounded in the paradigm of constructivism, the implementation of PBLab model serves as mechanism that enhances construction of knowledge, critical thinking, creativity and transferable skills among engineering undergraduates. A case study is presented to illustrate of undergraduates' problem solving process during PBLab that includes activities and facilitations throughout in-lab and out-lab sessions. Insights from a group interview suggest that problem-based PBLab facilitates undergraduates' higher order thinking skills which include metacognition strategies and transfer of knowledge abilities, as well as generic skills such as intrapersonal/interpersonal communications and team-working skills.
{"title":"The implementation of problem-based laboratory model at digital signal processing laboratory","authors":"N. Samah, Hadijah Jaffri, Lokman Mohd Tahir, A. Sha'ameri, U. U. Sheikh","doi":"10.1109/TENCONSPRING.2014.6863103","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863103","url":null,"abstract":"This paper describes the implementation of Problem-based Laboratory (PBLab) Model at Digital Signal Processing Laboratory (DSP Lab), Faculty of Electrical Engineering, Universiti Teknologi Malaysia (UTM). The model was developed as an alternative to the conventional instructional based laboratory previously practiced. Grounded in the paradigm of constructivism, the implementation of PBLab model serves as mechanism that enhances construction of knowledge, critical thinking, creativity and transferable skills among engineering undergraduates. A case study is presented to illustrate of undergraduates' problem solving process during PBLab that includes activities and facilitations throughout in-lab and out-lab sessions. Insights from a group interview suggest that problem-based PBLab facilitates undergraduates' higher order thinking skills which include metacognition strategies and transfer of knowledge abilities, as well as generic skills such as intrapersonal/interpersonal communications and team-working skills.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133334583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863056
Charmaine B. Balubal, Angela Rachel D. Bernardo, Bryan Lloyd L. Lasheras, R. Uyehara, A. Bandala, E. Dadios
The creation of an optimized cabling plan in terms of cost through optimized cable length was introduced in this study. The researchers designed a system that utilized Genetic Algorithm for the said optimization. This system was integrated in a graphical user interface created using visual c# language which enables the users to upload an image representing the floor plan of the desired network to be optimized. The user can then place specified components on the floor plan. Lastly, the system will generate the optimized cabling plan which the user can readily print. Furthermore, a complete bill of materials and costing report will be generated also. The system generated these outputs by using genetic algorithm in the graphical inputs which were processed and converted in numerical representations. Upon accomplishing all the experimentations, the system yielded 99.51% optimization accuracy with 99.02% as the highest optimization level generated after accomplishing 100 trials on 10 different floor plans.
{"title":"Cabling and cost optimization system for IP based networks through Genetic Algorithm","authors":"Charmaine B. Balubal, Angela Rachel D. Bernardo, Bryan Lloyd L. Lasheras, R. Uyehara, A. Bandala, E. Dadios","doi":"10.1109/TENCONSPRING.2014.6863056","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863056","url":null,"abstract":"The creation of an optimized cabling plan in terms of cost through optimized cable length was introduced in this study. The researchers designed a system that utilized Genetic Algorithm for the said optimization. This system was integrated in a graphical user interface created using visual c# language which enables the users to upload an image representing the floor plan of the desired network to be optimized. The user can then place specified components on the floor plan. Lastly, the system will generate the optimized cabling plan which the user can readily print. Furthermore, a complete bill of materials and costing report will be generated also. The system generated these outputs by using genetic algorithm in the graphical inputs which were processed and converted in numerical representations. Upon accomplishing all the experimentations, the system yielded 99.51% optimization accuracy with 99.02% as the highest optimization level generated after accomplishing 100 trials on 10 different floor plans.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133855218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}