Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890790
M. Amir, A. Wahid, H. Appelbe, Halimah Abdul Aziz, Mohd Arif Ahmad, Hardy Azmir, Roshamida Abd Jamil, Z. M. Radzi
Under the 10th Malaysia Plan, National Defense University of Malaysia (NDUM) has developed a new naval architecture laboratory to suit the requirement as a niche and boutique university for new knowledge and competencies in defense related disciplines. This paper describes the optimal specification and design of a wave test flume in a confined space. The wave maker was specified with the constraints of limited budget and space, therefore optimization of the generated waves for this particular flume is paramount. The wave flume finally constructed to the specification is capable of producing regular and irregular waves controlled by computer programs, and is able to provide data logging. Result shows that the final design is a result of objective oriented design simplicity, but producing very accurate and effective results for a range of research and studies. The wave flume design also provides a basis to expand the facility to allow towing tests, as and when space allows.
{"title":"Optimal specification of wave flume in confined space","authors":"M. Amir, A. Wahid, H. Appelbe, Halimah Abdul Aziz, Mohd Arif Ahmad, Hardy Azmir, Roshamida Abd Jamil, Z. M. Radzi","doi":"10.1109/ICICTM.2016.7890790","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890790","url":null,"abstract":"Under the 10th Malaysia Plan, National Defense University of Malaysia (NDUM) has developed a new naval architecture laboratory to suit the requirement as a niche and boutique university for new knowledge and competencies in defense related disciplines. This paper describes the optimal specification and design of a wave test flume in a confined space. The wave maker was specified with the constraints of limited budget and space, therefore optimization of the generated waves for this particular flume is paramount. The wave flume finally constructed to the specification is capable of producing regular and irregular waves controlled by computer programs, and is able to provide data logging. Result shows that the final design is a result of objective oriented design simplicity, but producing very accurate and effective results for a range of research and studies. The wave flume design also provides a basis to expand the facility to allow towing tests, as and when space allows.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123449973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890787
S. A. Mokhtar, Abdulkarem Al-Sharafi, Siti Haryati Shaikh Ali, AbdulAleem Al-Othmani
Cloud computing is a new model of information Technology. It has drastically changed the way information technology services are used in organizations. Cloud computing technology can be used to provide good solutions for higher education institutions (HEIs). Despite the features of using cloud computing technology in education sector, however, still many of HEIs have not fully benefited from cloud computing features. Using the Technology-Organization-Environment framework, this study develops a theoretical model for cloud computing adoption HEIs. Eight variables (relative advantage, complexity, compatibility, top management support, institution size, adoption plan, service provider support, and government support) are proposed those are effect on the adoption of cloud computing by higher education institutions. We include the adoption plan as an important factor in organizational context, but has been ignored in information system (IS) literature. This study proposes to empirically test the model with adequate sample size of HEIs.
{"title":"Identifying the determinants of cloud computing adoption in higher education institutions","authors":"S. A. Mokhtar, Abdulkarem Al-Sharafi, Siti Haryati Shaikh Ali, AbdulAleem Al-Othmani","doi":"10.1109/ICICTM.2016.7890787","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890787","url":null,"abstract":"Cloud computing is a new model of information Technology. It has drastically changed the way information technology services are used in organizations. Cloud computing technology can be used to provide good solutions for higher education institutions (HEIs). Despite the features of using cloud computing technology in education sector, however, still many of HEIs have not fully benefited from cloud computing features. Using the Technology-Organization-Environment framework, this study develops a theoretical model for cloud computing adoption HEIs. Eight variables (relative advantage, complexity, compatibility, top management support, institution size, adoption plan, service provider support, and government support) are proposed those are effect on the adoption of cloud computing by higher education institutions. We include the adoption plan as an important factor in organizational context, but has been ignored in information system (IS) literature. This study proposes to empirically test the model with adequate sample size of HEIs.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121879958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890781
S. A. Mokhtar, Zulfadli, S. Anuar
Implementation of Outcomes Based Education (OBE) is compulsory requirement by Malaysian Qualifications Agency as importance criteria to give accreditation for campuses in Malaysia. OBE is a philosophy in education that more focused on output of learning outcomes rather than input, it is involved Course Learning Outcomes (CLO) and Program Learning Outcomes (PLO) as a component in OBE, measurement of the attainment of these components are crucial part to analyze related to implement OBE. Universiti Kuala Lumpur (UniKL) has been adopting OBE since 2009 but haven't the automation system to measure the CLO and PLO attainment. This paper describe the functional modules of Learning Outcomes Attainment Measurement System (LOAMS) model which helping UniKL to measure the learning outcomes attainment. Explanation in this paper involves a few figure and models, review the system performance based on the features, and provides system ability exploration using systematic flow chart.
{"title":"Functioning modules for Learning Outcomes Attainment Measurement System in Universiti Kuala Lumpur","authors":"S. A. Mokhtar, Zulfadli, S. Anuar","doi":"10.1109/ICICTM.2016.7890781","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890781","url":null,"abstract":"Implementation of Outcomes Based Education (OBE) is compulsory requirement by Malaysian Qualifications Agency as importance criteria to give accreditation for campuses in Malaysia. OBE is a philosophy in education that more focused on output of learning outcomes rather than input, it is involved Course Learning Outcomes (CLO) and Program Learning Outcomes (PLO) as a component in OBE, measurement of the attainment of these components are crucial part to analyze related to implement OBE. Universiti Kuala Lumpur (UniKL) has been adopting OBE since 2009 but haven't the automation system to measure the CLO and PLO attainment. This paper describe the functional modules of Learning Outcomes Attainment Measurement System (LOAMS) model which helping UniKL to measure the learning outcomes attainment. Explanation in this paper involves a few figure and models, review the system performance based on the features, and provides system ability exploration using systematic flow chart.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124280511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One can recognize today's world as a place full of threats. Every field is vulnerable to threat, be it banking, education, government or medical. In health sector Wearable Computing and Smart Wearable Devices are gaining popularity. With this emerging success of these devices, the risk of threat is also increasing rapidly. People who are disabled, aged or children can get update about their health by monitoring themselves easily being in their comfort zone with the help of wearable devices. To gain the trust of people we are focusing on data privacy and data security so that more and more people could take maximum benefit from the facilities provided. Another challenge is the fear of patients to leak out their medical histories over wireless channels. Our paper is designed to provide a brief description about the technologically advanced wearable sensors which takes care and monitor the health in a smarter way and also provide a secure transmission channel for information to go through. In our paper we are using encryption key technique and the biometric sensor technology to make our channel secure. We have tested the working of these wearable devices in real test bed in Neemrana, Rajasthan (India)Hospital.
{"title":"Secure and Wearable Computing in WBANs","authors":"Jetendra Joshi, Sanya Mittal, B. Birdi, Rishabh Kumar, Divya Kurian, Sibeli Mukherjee, Prakhar Awasthi","doi":"10.1109/ICICTM.2016.7890779","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890779","url":null,"abstract":"One can recognize today's world as a place full of threats. Every field is vulnerable to threat, be it banking, education, government or medical. In health sector Wearable Computing and Smart Wearable Devices are gaining popularity. With this emerging success of these devices, the risk of threat is also increasing rapidly. People who are disabled, aged or children can get update about their health by monitoring themselves easily being in their comfort zone with the help of wearable devices. To gain the trust of people we are focusing on data privacy and data security so that more and more people could take maximum benefit from the facilities provided. Another challenge is the fear of patients to leak out their medical histories over wireless channels. Our paper is designed to provide a brief description about the technologically advanced wearable sensors which takes care and monitor the health in a smarter way and also provide a secure transmission channel for information to go through. In our paper we are using encryption key technique and the biometric sensor technology to make our channel secure. We have tested the working of these wearable devices in real test bed in Neemrana, Rajasthan (India)Hospital.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121144182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890788
Rashid Zafar, Eiad Yafi, M. Zuhairi, H. Dao
The quantity of data transmitted in the network intensified rapidly with the increased dependency on social media applications, sensors for data acquisitions and smartphones utilizations. Typically, such data is unstructured and originates from multiple sources in different format. Consequently, the abstraction of data for rendering is difficult, that lead to the development of a computing system that is able to store data in unstructured format and support distributed parallel computing. To data, there exist approaches to handle big data using NoSQL. This paper provides a review and the comparison between NoSQL and Relational Database Management System (RDBMS). By reviewing each approach, the mechanics of NoSQL systems can be clearly distinguished from the RDBMS. Basically, such systems rely on multiple factors, that include the query language, architecture, data model and consumer API. This paper also defines the application that matches the system and subsequently able to accurately correlates to a specific NoSQL system.
{"title":"Big Data: The NoSQL and RDBMS review","authors":"Rashid Zafar, Eiad Yafi, M. Zuhairi, H. Dao","doi":"10.1109/ICICTM.2016.7890788","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890788","url":null,"abstract":"The quantity of data transmitted in the network intensified rapidly with the increased dependency on social media applications, sensors for data acquisitions and smartphones utilizations. Typically, such data is unstructured and originates from multiple sources in different format. Consequently, the abstraction of data for rendering is difficult, that lead to the development of a computing system that is able to store data in unstructured format and support distributed parallel computing. To data, there exist approaches to handle big data using NoSQL. This paper provides a review and the comparison between NoSQL and Relational Database Management System (RDBMS). By reviewing each approach, the mechanics of NoSQL systems can be clearly distinguished from the RDBMS. Basically, such systems rely on multiple factors, that include the query language, architecture, data model and consumer API. This paper also defines the application that matches the system and subsequently able to accurately correlates to a specific NoSQL system.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132670755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890784
W. C. Kok, J. Labadin, -. Mohammad, Kok Siong. Wong, Yei Ling Chang
Intensive worldwide effort is speeding up the developments in the establishment of a global surveillance network for combating pandemics of emerging infectious disease. However, there is no delivery platform available to send accurate and just-in-time disease information to reach out to the community. The public can only obtain information from the newspaper, radio or social media, which sometimes may not be an accurate information and can be classified as rumors. An android-based disease monitoring system has been implemented with a strong predictive model to help create awareness in our community. This monitoring system consists of 2 parts which are (i) Online Communicable Disease Monitoring System and (ii) Android-based monitoring application. In Malaysia, public health department utilizes Communicable Disease Control Information System to collect data and monitor diseases. However, the current system only collects the data from an authorized medical personnel but not utilizes the data to help the decision makers to access and monitor the spread of disease. The proposed system aimed to enhance the current system by providing better data visualization and incorporate forecasting component by using a mathematical model. Hand, Foot and Mouth Disease (HFMD) is used as a case study to demonstrate the system. Through the mobile application, the public user can be informed with real-time epidemic disease information from the proposed system.
{"title":"Android-based Disease Monitoring","authors":"W. C. Kok, J. Labadin, -. Mohammad, Kok Siong. Wong, Yei Ling Chang","doi":"10.1109/ICICTM.2016.7890784","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890784","url":null,"abstract":"Intensive worldwide effort is speeding up the developments in the establishment of a global surveillance network for combating pandemics of emerging infectious disease. However, there is no delivery platform available to send accurate and just-in-time disease information to reach out to the community. The public can only obtain information from the newspaper, radio or social media, which sometimes may not be an accurate information and can be classified as rumors. An android-based disease monitoring system has been implemented with a strong predictive model to help create awareness in our community. This monitoring system consists of 2 parts which are (i) Online Communicable Disease Monitoring System and (ii) Android-based monitoring application. In Malaysia, public health department utilizes Communicable Disease Control Information System to collect data and monitor diseases. However, the current system only collects the data from an authorized medical personnel but not utilizes the data to help the decision makers to access and monitor the spread of disease. The proposed system aimed to enhance the current system by providing better data visualization and incorporate forecasting component by using a mathematical model. Hand, Foot and Mouth Disease (HFMD) is used as a case study to demonstrate the system. Through the mobile application, the public user can be informed with real-time epidemic disease information from the proposed system.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134589112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890765
Siti Nur Alidda Mohd Ghazali, Hardy Azmir Anuar, Syed Nasir Alsagoff Syed Zakaria, Zaharin Yusoff
Search and Rescue (SAR) is an operation conducted to find and return to safety the survivors of an emergency incident, where the search may have to be conducted in difficult areas such as in mountains, deserts, forests or at sea. Maritime SAR operations normally involve a large number of vessels and possibly helicopters as well, but this has been found not to be effective enough. This paper looks at Unmanned Aerial Vehicles (UAVs) to assist in maritime SAR operations, leaning towards rotary wing UAVs with the capabilities of flying vertically and horizontally as well as hover at required positions for close monitoring. The focus is on the algorithm for determining the exact position of the target subject(s).
{"title":"Determining position of target subjects in Maritime Search and Rescue (MSAR) operations using rotary wing Unmanned Aerial Vehicles (UAVs)","authors":"Siti Nur Alidda Mohd Ghazali, Hardy Azmir Anuar, Syed Nasir Alsagoff Syed Zakaria, Zaharin Yusoff","doi":"10.1109/ICICTM.2016.7890765","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890765","url":null,"abstract":"Search and Rescue (SAR) is an operation conducted to find and return to safety the survivors of an emergency incident, where the search may have to be conducted in difficult areas such as in mountains, deserts, forests or at sea. Maritime SAR operations normally involve a large number of vessels and possibly helicopters as well, but this has been found not to be effective enough. This paper looks at Unmanned Aerial Vehicles (UAVs) to assist in maritime SAR operations, leaning towards rotary wing UAVs with the capabilities of flying vertically and horizontally as well as hover at required positions for close monitoring. The focus is on the algorithm for determining the exact position of the target subject(s).","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134450875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890768
Noor Izzati Mohd Khalid, Syed Nasir Alsagoff Syed Zakaria, Zaharin Yusoff, S. Marzukhi
This paper proposes a combination of network frequencies as the supporting medium for communication within a small Search and Rescue (SAR) team to ensure stable communication, and thus command and control, in particular in a forest environment. The proposal is to implement a combination of 869 MHz and 2.4 GHz, which will support the use of smart phones for the SAR team members for audio/oral, visual and data communication as well as other facilities, the most important being location monitoring. The proposal also includes the positioning of the (mobile) base station for uninterrupted coverage.
{"title":"Ensuring communication for command and control in Search and Rescue (SAR) operations using smart phones for audio, video and monitoring functions","authors":"Noor Izzati Mohd Khalid, Syed Nasir Alsagoff Syed Zakaria, Zaharin Yusoff, S. Marzukhi","doi":"10.1109/ICICTM.2016.7890768","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890768","url":null,"abstract":"This paper proposes a combination of network frequencies as the supporting medium for communication within a small Search and Rescue (SAR) team to ensure stable communication, and thus command and control, in particular in a forest environment. The proposal is to implement a combination of 869 MHz and 2.4 GHz, which will support the use of smart phones for the SAR team members for audio/oral, visual and data communication as well as other facilities, the most important being location monitoring. The proposal also includes the positioning of the (mobile) base station for uninterrupted coverage.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132861365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-16DOI: 10.1109/ICICTM.2016.7890769
T. T. Zizi, N. Othman, N. Zainudin, N. A. Wahab, N. Hasbullah, S. Ramli, N. Ibrahim
Lecturer Promotion Assessment System for Department of Computer Science, Faculty of Science and Technology Defence was built to help the promotion of lecturers featured appraiser to conduct an initial assessment of the eligibility status of lecturers. The lecturer will be treated as eligible, in observation or tidal worth in value that has been set to proceed with the application promotion. It is because, in the application for promotion of lecturers it includes several procedures such as application delivery and assessment meetings between committee members. Thus the system helps the evaluator by using the Fuzzy Logic method consists of several phases which are fuzzification, fuzzy inference system and defuzzification. The system uses the engine type Mamdani fuzzy inference system and defuzzification through technique of centroid of Gravity (COG) as the output. Each of the estimated assessment will be compared with a database that has been set before produced as output. There are several ways to analyze the results of these feasibility of using graphs and message box. The construction of this system is expected to help ease the burden of the assessors and settle the problems that arise. In fact, this system may also be a drive to the use of more high-tech systems and artificial intelligence features along with the rapidly evolving technology now.
{"title":"Lecturer Promotion Assessment System based on Fuzzy Logic","authors":"T. T. Zizi, N. Othman, N. Zainudin, N. A. Wahab, N. Hasbullah, S. Ramli, N. Ibrahim","doi":"10.1109/ICICTM.2016.7890769","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890769","url":null,"abstract":"Lecturer Promotion Assessment System for Department of Computer Science, Faculty of Science and Technology Defence was built to help the promotion of lecturers featured appraiser to conduct an initial assessment of the eligibility status of lecturers. The lecturer will be treated as eligible, in observation or tidal worth in value that has been set to proceed with the application promotion. It is because, in the application for promotion of lecturers it includes several procedures such as application delivery and assessment meetings between committee members. Thus the system helps the evaluator by using the Fuzzy Logic method consists of several phases which are fuzzification, fuzzy inference system and defuzzification. The system uses the engine type Mamdani fuzzy inference system and defuzzification through technique of centroid of Gravity (COG) as the output. Each of the estimated assessment will be compared with a database that has been set before produced as output. There are several ways to analyze the results of these feasibility of using graphs and message box. The construction of this system is expected to help ease the burden of the assessors and settle the problems that arise. In fact, this system may also be a drive to the use of more high-tech systems and artificial intelligence features along with the rapidly evolving technology now.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122080390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890803
M. Shukran, M. Ismail, K. Maskat, M. Isa
Detection System for Mobile Identity Bag Owners Students Using QR Codes (Quick Response) was developed to create a system of safety features in a briefcase National Defence University of Malaysia (NDUM) used by students. QR code technology is the best technology to solve the problems faced by the current system. The system is capable of decod QR, information display and transmission of information through short messaging system (SMS) is the best solution to replace the current system. Results from observational studies on the new system, the implementation of QR code tag on the briefcase with QR Tag Scanner application was able to overcome the difficulties encountered in identifying the true owner of the briefcase found. However, improvements to the Identity Detection System Owner Phone Bags Students Using QR Codes to do from time to time in order to create a more efficient system.
{"title":"Identification of Student's Bag using QR Tag Scanner","authors":"M. Shukran, M. Ismail, K. Maskat, M. Isa","doi":"10.1109/ICICTM.2016.7890803","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890803","url":null,"abstract":"Detection System for Mobile Identity Bag Owners Students Using QR Codes (Quick Response) was developed to create a system of safety features in a briefcase National Defence University of Malaysia (NDUM) used by students. QR code technology is the best technology to solve the problems faced by the current system. The system is capable of decod QR, information display and transmission of information through short messaging system (SMS) is the best solution to replace the current system. Results from observational studies on the new system, the implementation of QR code tag on the briefcase with QR Tag Scanner application was able to overcome the difficulties encountered in identifying the true owner of the briefcase found. However, improvements to the Identity Detection System Owner Phone Bags Students Using QR Codes to do from time to time in order to create a more efficient system.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115568621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}