Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890799
E. Daud, S. A. Mokhtar, F. Mohd
This research is proposing for a new usability heuristics in the context of control features on mobile games for the use of touchscreen devices. Usability is the ease of use and learnability of a human-made object while heuristics generic name for a set of techniques that involve inspectors examining the user interface to check whether it complies with a set of design principles. Due to small size and senseless feel of the touchscreens, these conventional usability heuristics is not suitable for use. Some references were made in order to develop a preliminary design for the new usability heuristics. Moreover, the design is based on two references; the Nielsen's Ten Heuristics and the ideas of Mark Overmars on how to design a good iPhone Games. This paper discusses the preliminary design ideas for designing the new usability heuristics for this specific use. Focusing on the control aspects, this preliminary model comprises of eight usability features which will be discussed more briefly in the next part of this paper. The results of this study will provide mobile game designers with a set of usability heuristics (control aspects) as their guidelines for designing and evaluating mobile games.
这项研究提出了一种新的可用性启发法,适用于使用触屏设备的手机游戏的控制功能。可用性是指人造对象的易用性和易学性,而启发式则是一组技术的通用名称,这些技术涉及检查人员检查用户界面以检查它是否符合一组设计原则。由于触摸屏的小尺寸和无意义的感觉,这些传统的可用性启发式不适合使用。为开发新的可用性启发法的初步设计提供了一些参考。此外,该设计基于两个参考文献;Nielsen’s Ten Heuristics以及Mark Overmars关于如何设计优秀iPhone游戏的观点。本文讨论了针对这一特定用途设计新的可用性启发式的初步设计思想。关注于控制方面,这个初步模型包括八个可用性特征,这些特征将在本文的下一部分进行更简短的讨论。这项研究的结果将为手机游戏设计师提供一系列可用性启发法(控制方面),作为他们设计和评估手机游戏的指导方针。
{"title":"Usability heuristics in the context of control features on mobile games","authors":"E. Daud, S. A. Mokhtar, F. Mohd","doi":"10.1109/ICICTM.2016.7890799","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890799","url":null,"abstract":"This research is proposing for a new usability heuristics in the context of control features on mobile games for the use of touchscreen devices. Usability is the ease of use and learnability of a human-made object while heuristics generic name for a set of techniques that involve inspectors examining the user interface to check whether it complies with a set of design principles. Due to small size and senseless feel of the touchscreens, these conventional usability heuristics is not suitable for use. Some references were made in order to develop a preliminary design for the new usability heuristics. Moreover, the design is based on two references; the Nielsen's Ten Heuristics and the ideas of Mark Overmars on how to design a good iPhone Games. This paper discusses the preliminary design ideas for designing the new usability heuristics for this specific use. Focusing on the control aspects, this preliminary model comprises of eight usability features which will be discussed more briefly in the next part of this paper. The results of this study will provide mobile game designers with a set of usability heuristics (control aspects) as their guidelines for designing and evaluating mobile games.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121151029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890789
M. Amir, R. M. Sharip, P. Nohuddin, A. Nordin, M. B. A. Ghani, Afizi Shukran, W. Muda
The design of wave energy converter (WEC) is crucial in order to generate the optimum power required to safely and reliably benefit from the available wave energy resource to produce electricity. The effects of the added mass on the idealized power take-off wave energy absorber in irregular waves are examined using a linear frequency domain method. Two strategies in this study are to maximize the converter power based on measuring the incident wave using the SOM clustering, and adding the auxiliary mass to the system. The objective of this study is to investigate the response of the added mass on heave buoy to optimize the annual power output without over the limit of the devices. The result shows that the heave buoy with added mass improves its ability to work in realistic wave conditions. The results also suggested the importance of tuning the system with wave data probabilistic to avoid the potential failures and to capture the maximum wave energy on the specific site.
{"title":"Optimization in heave buoy energy convertors using SOM clustering and simulation with an auxiliary mass","authors":"M. Amir, R. M. Sharip, P. Nohuddin, A. Nordin, M. B. A. Ghani, Afizi Shukran, W. Muda","doi":"10.1109/ICICTM.2016.7890789","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890789","url":null,"abstract":"The design of wave energy converter (WEC) is crucial in order to generate the optimum power required to safely and reliably benefit from the available wave energy resource to produce electricity. The effects of the added mass on the idealized power take-off wave energy absorber in irregular waves are examined using a linear frequency domain method. Two strategies in this study are to maximize the converter power based on measuring the incident wave using the SOM clustering, and adding the auxiliary mass to the system. The objective of this study is to investigate the response of the added mass on heave buoy to optimize the annual power output without over the limit of the devices. The result shows that the heave buoy with added mass improves its ability to work in realistic wave conditions. The results also suggested the importance of tuning the system with wave data probabilistic to avoid the potential failures and to capture the maximum wave energy on the specific site.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127071996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890778
Haidawati Nasir, Wan Nur Fazlin Dallina, S. Marzukhi, Zuraini Zainol
Crosswinds are one of the natural disasters that pose risks to high-profile vehicles especially on the highway. There are possibilities of fatal accidents when drivers and motorists failed to control their vehicles when this dangerous wind blows perpendicular to the vehicles. Even though, each area of the crosswinds is placed with crosswinds signs (i.e. windsocks) but these signs are not so obvious especially when there are obstacles such as rain, poor lighting and fog. In addition, the colour of the windsock itself is faded due to the exposure to the various changes of the weather and environments. Here, the Wind Speed Detection System is proposed in helping to monitor and manage this critical situation by providing crucial information to the vehicles and motorists regarding the crosswinds conditions, plan and preparation and many others. The system is able to measure the wind speed level and alert the motorists and vehicles with warning lamp/light according to the crosswinds conditions. Furthermore, the system can record the wind speed reading and save it into a file that can be further analysed.
{"title":"Wind Speed Detection System: Framework and implementation","authors":"Haidawati Nasir, Wan Nur Fazlin Dallina, S. Marzukhi, Zuraini Zainol","doi":"10.1109/ICICTM.2016.7890778","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890778","url":null,"abstract":"Crosswinds are one of the natural disasters that pose risks to high-profile vehicles especially on the highway. There are possibilities of fatal accidents when drivers and motorists failed to control their vehicles when this dangerous wind blows perpendicular to the vehicles. Even though, each area of the crosswinds is placed with crosswinds signs (i.e. windsocks) but these signs are not so obvious especially when there are obstacles such as rain, poor lighting and fog. In addition, the colour of the windsock itself is faded due to the exposure to the various changes of the weather and environments. Here, the Wind Speed Detection System is proposed in helping to monitor and manage this critical situation by providing crucial information to the vehicles and motorists regarding the crosswinds conditions, plan and preparation and many others. The system is able to measure the wind speed level and alert the motorists and vehicles with warning lamp/light according to the crosswinds conditions. Furthermore, the system can record the wind speed reading and save it into a file that can be further analysed.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120950849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890792
A.J Roshamida, M. Amir, M. Zulkifly
Risk assessment is a vital for any industry to characterize the hazards and decision making on its control options. Risk assessment comprise 3 stages of process which are risk identification, risk estimation and risk evaluation. In the case of seaport terminal operation, it is crucial for seaport to determine possible risks. This study review a qualitative decision making method known as Analytic Hierarchy Process (AHP) for assessing the risk of the dry bulk cargo operations within seaport terminal. A brainstorming approach has undertaken to identify the risk attributes to operational process of dry bulk cargo. Using the real live data from the case study, the dry bulk cargo operations risk ranking was measured to be an indicator in decision making on risk control options and evaluation of its effectiveness towards each risk factor identified in this study. It shows that AHP method is good tools to converting qualitative measures which used a set of linguistic terms in describing the relationship between risk factors in the hierarchy into quantitative measures using mathematical calculation through Analytic Hierarchy Process to measure the operational risk of bulk cargo operation within seaport. Therefore, the pairwise comparisons between factors in the hierarchy could applied linguistic terms and the calculation of weightage to measure the operational risk of bulk cargo operation within seaport.
{"title":"Risk assessment of dry bulk cargo operations using Analytic Hierarchy Process (AHP) method","authors":"A.J Roshamida, M. Amir, M. Zulkifly","doi":"10.1109/ICICTM.2016.7890792","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890792","url":null,"abstract":"Risk assessment is a vital for any industry to characterize the hazards and decision making on its control options. Risk assessment comprise 3 stages of process which are risk identification, risk estimation and risk evaluation. In the case of seaport terminal operation, it is crucial for seaport to determine possible risks. This study review a qualitative decision making method known as Analytic Hierarchy Process (AHP) for assessing the risk of the dry bulk cargo operations within seaport terminal. A brainstorming approach has undertaken to identify the risk attributes to operational process of dry bulk cargo. Using the real live data from the case study, the dry bulk cargo operations risk ranking was measured to be an indicator in decision making on risk control options and evaluation of its effectiveness towards each risk factor identified in this study. It shows that AHP method is good tools to converting qualitative measures which used a set of linguistic terms in describing the relationship between risk factors in the hierarchy into quantitative measures using mathematical calculation through Analytic Hierarchy Process to measure the operational risk of bulk cargo operation within seaport. Therefore, the pairwise comparisons between factors in the hierarchy could applied linguistic terms and the calculation of weightage to measure the operational risk of bulk cargo operation within seaport.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125969947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890794
Dahlan Bin Abdul Ghani
P.Ramlee films in Malaysia can be described as unique form of film expression. Unfortunately this artistic value of appreciation among the young generation is slowly being decline. Furthermore, some still argue that the quality of Malaysian mainstream films are still not within the standard of the P.Ramlee's era. With the current updated technologies, globalisation and digital natives era, efforts are essential to ensure that P. Ramlee films will survive with this current scenario. Therefore, this research will focus on developing the art of comic adaption from the original P.Ramlee 1972 Laksamana Do Re Mi film visual styles. This study will include the methodology, comic and film expression including developing a prototype of digital interactive comic visual art adapted from the famous P.Ramlee Do Re Mi film.
P.Ramlee电影在马来西亚可以说是一种独特的电影表现形式。不幸的是,这种在年轻一代中欣赏的艺术价值正在慢慢下降。此外,一些人仍然认为马来西亚主流电影的质量仍然没有达到拉姆利时代的标准。随着当今技术的更新,全球化和数字原住民时代,努力确保P. Ramlee电影能够在当前的情况下生存下去是必不可少的。因此,本研究将著重于从原版P.Ramlee 1972 Laksamana Do Re Mi电影的视觉风格发展漫画改编艺术。本研究将包括方法论,漫画和电影表达,包括开发一个数字互动漫画视觉艺术的原型,改编自著名的P.Ramlee Do Re Mi电影。
{"title":"P.Ramlee's Laksamana Do Re Mi: The study of interactive comic film adaptation","authors":"Dahlan Bin Abdul Ghani","doi":"10.1109/ICICTM.2016.7890794","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890794","url":null,"abstract":"P.Ramlee films in Malaysia can be described as unique form of film expression. Unfortunately this artistic value of appreciation among the young generation is slowly being decline. Furthermore, some still argue that the quality of Malaysian mainstream films are still not within the standard of the P.Ramlee's era. With the current updated technologies, globalisation and digital natives era, efforts are essential to ensure that P. Ramlee films will survive with this current scenario. Therefore, this research will focus on developing the art of comic adaption from the original P.Ramlee 1972 Laksamana Do Re Mi film visual styles. This study will include the methodology, comic and film expression including developing a prototype of digital interactive comic visual art adapted from the famous P.Ramlee Do Re Mi film.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128580671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890804
A. Ghani, M. Ismail, Z. Omar, P. Nohuddin
This paper describes a preliminary study for proposing a viable mesh network communication for knowledge sharing platform. This network structure is to support military infantry personnel for utilizing mobile knowledge based system in restricted operation areas. The study investigates several components for implementing an effective and efficient closed network structure. Closed and secure are among reliable network features for this mesh network.
{"title":"Establishing mesh network amongst infantry personnel during military operations: A preliminary study","authors":"A. Ghani, M. Ismail, Z. Omar, P. Nohuddin","doi":"10.1109/ICICTM.2016.7890804","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890804","url":null,"abstract":"This paper describes a preliminary study for proposing a viable mesh network communication for knowledge sharing platform. This network structure is to support military infantry personnel for utilizing mobile knowledge based system in restricted operation areas. The study investigates several components for implementing an effective and efficient closed network structure. Closed and secure are among reliable network features for this mesh network.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890798
Amira Fatin Binti Md Sahid, Wan Hazimah Wan Ismail, Dahlan Abd Ghani
Malay Sign Language (MSL) is a language that has been used by the hearing impaired community in Malaysia. The deaf and hearing-impaired people go to special schools to learn the MSL. In current age, technology could be utilized for the purpose of providing MSL course for the hearing-impaired people. With the provision of the technology-based MSL course, learning MSL not only happen in schools, but also at home, or anywhere. This makes the learning activity pervasive. Based on that argument, this study aims at proposing an android application Malay Sign Language for Beginners. Also this paper will focus discussing on the background concept for the needs and User Interface (UI) of the Malay Sign Language for Beginner such as the problem that lead for the Malay Sign Language for Beginner (Mari Belajar Asas Bahasa Isyarat), and activities and techniques using multimedia.
{"title":"Malay Sign Language (MSL) for Beginner using android application","authors":"Amira Fatin Binti Md Sahid, Wan Hazimah Wan Ismail, Dahlan Abd Ghani","doi":"10.1109/ICICTM.2016.7890798","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890798","url":null,"abstract":"Malay Sign Language (MSL) is a language that has been used by the hearing impaired community in Malaysia. The deaf and hearing-impaired people go to special schools to learn the MSL. In current age, technology could be utilized for the purpose of providing MSL course for the hearing-impaired people. With the provision of the technology-based MSL course, learning MSL not only happen in schools, but also at home, or anywhere. This makes the learning activity pervasive. Based on that argument, this study aims at proposing an android application Malay Sign Language for Beginners. Also this paper will focus discussing on the background concept for the needs and User Interface (UI) of the Malay Sign Language for Beginner such as the problem that lead for the Malay Sign Language for Beginner (Mari Belajar Asas Bahasa Isyarat), and activities and techniques using multimedia.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"44 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132738047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890810
Delina Beh Mei Yin, Mardiana Mahari, Nurul Sharaz Azmanuddin, S. Omar
Rapid growth of technology allows people to communicate electronically, but information privacy is not everyone that is aware of. Apparently, users may depend on solely encryption or data hiding, without realising our private message also can be exposed and tempered by the malicious user. This paper presents a hybrid approach of cryptographic approach before hiding the encrypted message into a cover image. The hybrid approach is binding the Extended Tiny Encryption (XTEA) algorithm with a session-based key generator. Our main focus is to retain the image quality after hiding a string of encrypted message. Subsequently, we also aim to prevent the secret message from being read or tempered by restricting the receiver reading the message within a time period that defined by the sender.
{"title":"Silent secrecy: A hybrid steganographic scheme to conceal information","authors":"Delina Beh Mei Yin, Mardiana Mahari, Nurul Sharaz Azmanuddin, S. Omar","doi":"10.1109/ICICTM.2016.7890810","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890810","url":null,"abstract":"Rapid growth of technology allows people to communicate electronically, but information privacy is not everyone that is aware of. Apparently, users may depend on solely encryption or data hiding, without realising our private message also can be exposed and tempered by the malicious user. This paper presents a hybrid approach of cryptographic approach before hiding the encrypted message into a cover image. The hybrid approach is binding the Extended Tiny Encryption (XTEA) algorithm with a session-based key generator. Our main focus is to retain the image quality after hiding a string of encrypted message. Subsequently, we also aim to prevent the secret message from being read or tempered by restricting the receiver reading the message within a time period that defined by the sender.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115421447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890797
S. Ismail, Muhammad Fakhrin Ghazali
With the current trend of spending time socialising via mobile applications, students at institutes of higher learning often seek new knowledge and manage their learning from the virtual world. From the concept of personal learning and social learning environment, it is found that personal knowledge management (PKM) processes occurred in this virtual environment, in which opportunities of expanding new media technology is foreseen. Despite the time spent in interacting with each other on the progress of the group projects, they still face difficulties in coursework coordination, in terms of getting updates or receiving shares of updates on the progress by members of their groups. This often happens when the group members seldom meet up due to difference in schedule or having less time in class together, since most students are from various backgrounds with various levels of course undertaken. This paper highlights the concept of PKM in the learning environment, using the GUSC Model as a tool for functions deployment in the mobile coursework coordination application. A prototype called Progrés was developed to test the concept, in which this paper is based on. The outcome of this paper is a conceptual model on GUSC deployment in mobile coursework coordination using nodal approach.
{"title":"Mobile coursework coordination deploying the concept of agent-mediated personal knowledge management in learning environment","authors":"S. Ismail, Muhammad Fakhrin Ghazali","doi":"10.1109/ICICTM.2016.7890797","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890797","url":null,"abstract":"With the current trend of spending time socialising via mobile applications, students at institutes of higher learning often seek new knowledge and manage their learning from the virtual world. From the concept of personal learning and social learning environment, it is found that personal knowledge management (PKM) processes occurred in this virtual environment, in which opportunities of expanding new media technology is foreseen. Despite the time spent in interacting with each other on the progress of the group projects, they still face difficulties in coursework coordination, in terms of getting updates or receiving shares of updates on the progress by members of their groups. This often happens when the group members seldom meet up due to difference in schedule or having less time in class together, since most students are from various backgrounds with various levels of course undertaken. This paper highlights the concept of PKM in the learning environment, using the GUSC Model as a tool for functions deployment in the mobile coursework coordination application. A prototype called Progrés was developed to test the concept, in which this paper is based on. The outcome of this paper is a conceptual model on GUSC deployment in mobile coursework coordination using nodal approach.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121289459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890773
B. T. Krishna, K. Babulu
one of the important biological signals which is used to measure the health condition of the human being is an Electro Cardio Gram (ECG) Signal. This signal results because of the activity of the heart and consists of P, Q, R, S, T and U waves. QRS Detection is an important problem of research in Biomedical Engineering and Pan Tomkins Algorithm is one of the well-known techniques used for this purpose. The differentiator block forms an important role in the Pan Tompkins Algorithm. So, design of a differentiator with lesser hardware complexity and lesser error at low frequencies is an important research topic. In this paper an attempt is made to detect QRS complexes using novel infinite impulse response type digital differentiators which are obtained by the model order reduction techniques. Second order Savitzky-Golay type digital differentiators are also designed. The results obtained are compared to previous methods. The proposed filters reduce the hardware complexity and make them suitable for real time applications. The simulations are carried out using Matlab environment.
{"title":"QRS detection using novel digital differentiators","authors":"B. T. Krishna, K. Babulu","doi":"10.1109/ICICTM.2016.7890773","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890773","url":null,"abstract":"one of the important biological signals which is used to measure the health condition of the human being is an Electro Cardio Gram (ECG) Signal. This signal results because of the activity of the heart and consists of P, Q, R, S, T and U waves. QRS Detection is an important problem of research in Biomedical Engineering and Pan Tomkins Algorithm is one of the well-known techniques used for this purpose. The differentiator block forms an important role in the Pan Tompkins Algorithm. So, design of a differentiator with lesser hardware complexity and lesser error at low frequencies is an important research topic. In this paper an attempt is made to detect QRS complexes using novel infinite impulse response type digital differentiators which are obtained by the model order reduction techniques. Second order Savitzky-Golay type digital differentiators are also designed. The results obtained are compared to previous methods. The proposed filters reduce the hardware complexity and make them suitable for real time applications. The simulations are carried out using Matlab environment.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"37 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125687637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}