Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914215
Ahmed R. Kobaiz, S. E. Ghrare
In this paper, we examine the behavior of LSSVM and SVM adaptive channel equalizers in environments where the interfering noise exhibits non-Gaussian due to impulsive phenomena. The family of α-stable distributions is used as a suitable and flexible tool for the modeling of signals with impulsive nature. By using computer simulation we show the behavior of both equalizers due to impulsiveness noise influence.
{"title":"Behavior of LSSVM and SVM channel equalizers in non-Gaussian noise","authors":"Ahmed R. Kobaiz, S. E. Ghrare","doi":"10.1109/I4CT.2014.6914215","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914215","url":null,"abstract":"In this paper, we examine the behavior of LSSVM and SVM adaptive channel equalizers in environments where the interfering noise exhibits non-Gaussian due to impulsive phenomena. The family of α-stable distributions is used as a suitable and flexible tool for the modeling of signals with impulsive nature. By using computer simulation we show the behavior of both equalizers due to impulsiveness noise influence.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"10 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116734863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914203
A. F. Rosmani, H. Ahmad, Umi Hanim Mazlan, Noor Azura Zainuddin, Abdullah Ibrahim
Wirid is a recitation or practice that has been taken from certain verses in Al-Quran and it was arranged to the readers, especially Muslims, read and understand easily. Wirid is a good practice for Muslims as it can bring them closer to their Creator that is Allah SWT and in forming them to become good leaders or caliphs in the future. Therefore, the main intention of this project is to investigate and design a mobile application for wirid as a guide to recite and understand wirid via mobile platform. This after prayer wirid is embedded in mobile environment with the integration of multimedia elements as a medium to attract and encourage Muslims to recite and memorize a wirid. This i-Wirid application has been developed using Eclipse as the main platform and has undergone two testing phases which are User Acceptance Test and Heuristic Evaluation in order to assess the application. The Heuristic Test was done by the experts and the User Acceptance Test was implemented on 70 respondents. Based on the results collected, there is about 93 percent of respondents who are satisfied with the application and 97 percent agreed that the application is interesting to be used in their daily lives.
{"title":"i-Wirid: Construction of digital wirid via mobile platform","authors":"A. F. Rosmani, H. Ahmad, Umi Hanim Mazlan, Noor Azura Zainuddin, Abdullah Ibrahim","doi":"10.1109/I4CT.2014.6914203","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914203","url":null,"abstract":"Wirid is a recitation or practice that has been taken from certain verses in Al-Quran and it was arranged to the readers, especially Muslims, read and understand easily. Wirid is a good practice for Muslims as it can bring them closer to their Creator that is Allah SWT and in forming them to become good leaders or caliphs in the future. Therefore, the main intention of this project is to investigate and design a mobile application for wirid as a guide to recite and understand wirid via mobile platform. This after prayer wirid is embedded in mobile environment with the integration of multimedia elements as a medium to attract and encourage Muslims to recite and memorize a wirid. This i-Wirid application has been developed using Eclipse as the main platform and has undergone two testing phases which are User Acceptance Test and Heuristic Evaluation in order to assess the application. The Heuristic Test was done by the experts and the User Acceptance Test was implemented on 70 respondents. Based on the results collected, there is about 93 percent of respondents who are satisfied with the application and 97 percent agreed that the application is interesting to be used in their daily lives.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121699966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914198
Muhammad Amir Khan, H. Hasbullah, B. Nazir
Any common methodology for functionality research in the field of communication systems engineering is network simulation. There is always the overriding worry when utilizing simulation that the results may not reflect appropriate behavior. Therefore, it is important to recognize the particular strengths and also flaws of such simulators. There are a variety of network simulators, as an illustration, NS-2, NS-3, OMNET++, SWAN, OPNET, Jist, and also GloMoSiM and so forth. As a result, the selection of any network simulator for assessing investigation function is really a critical activity for researchers. The leading emphasis in this research is usually to examine the particular advanced, open source network simulators based on the parameters, CPU usage, memory usage, computational time period, and also scalibility by simulating a wireless sensor network routing protocol, to identify a best network simulator to the investigation area.
{"title":"Recent open source wireless sensor network supporting simulators: A performance comparison","authors":"Muhammad Amir Khan, H. Hasbullah, B. Nazir","doi":"10.1109/I4CT.2014.6914198","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914198","url":null,"abstract":"Any common methodology for functionality research in the field of communication systems engineering is network simulation. There is always the overriding worry when utilizing simulation that the results may not reflect appropriate behavior. Therefore, it is important to recognize the particular strengths and also flaws of such simulators. There are a variety of network simulators, as an illustration, NS-2, NS-3, OMNET++, SWAN, OPNET, Jist, and also GloMoSiM and so forth. As a result, the selection of any network simulator for assessing investigation function is really a critical activity for researchers. The leading emphasis in this research is usually to examine the particular advanced, open source network simulators based on the parameters, CPU usage, memory usage, computational time period, and also scalibility by simulating a wireless sensor network routing protocol, to identify a best network simulator to the investigation area.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914142
R. J. D'Souza, Ganala Santoshi
In this work a rectangular Region of interest (ROI) is covered with Mobile Sensor Nodes (MSNs) using coverage based pattern of movement. ROI is divided into equilateral triangles and squares in tesselation fashion to provide complete coverage without coverage holes. MSNs are moved along the vertices of polygons to have optimized movement cost. All MSNs should travel an approximately equal distance, otherwise the MSN which travels longer distance depletes more energy compared to the MSN which travels shorter distance. We show that, the ROI partition in tessellation fashion is application specific and plays a great role in uniform energy depletion of the MSNs during the traversal. An improper partition may lead to an unbalanced movement cost and non-uniform residual energy.
{"title":"Mobile sensor node traversal schemes using coverage based pattern movement with uniform energy depletion","authors":"R. J. D'Souza, Ganala Santoshi","doi":"10.1109/I4CT.2014.6914142","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914142","url":null,"abstract":"In this work a rectangular Region of interest (ROI) is covered with Mobile Sensor Nodes (MSNs) using coverage based pattern of movement. ROI is divided into equilateral triangles and squares in tesselation fashion to provide complete coverage without coverage holes. MSNs are moved along the vertices of polygons to have optimized movement cost. All MSNs should travel an approximately equal distance, otherwise the MSN which travels longer distance depletes more energy compared to the MSN which travels shorter distance. We show that, the ROI partition in tessellation fashion is application specific and plays a great role in uniform energy depletion of the MSNs during the traversal. An improper partition may lead to an unbalanced movement cost and non-uniform residual energy.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126574705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914186
Abdul Rehman Gila, Jafreezal Jaafa, Mazni Omar, M. Z. Tunio
Human aspect is considered as one of the success factors for software development. Besides, diversity is labeled as the most effective element for creating effectiveness in team performance. Thus, this study has aimed to find the effects of gender diversity on team performance based on personality types. The personality types' variations were found effective on team performance based on genders. For instance, male-lead groups were found convenient with both genders but female-lead groups looked much comfortable with only female members. Moreover, female-gender looked uneasy in male dominant teams especially when their personality is E (extrovert). Whereas, male-gender was observed as digestible in female-lead teams if the I (introvert) personality is dominating.
{"title":"Impact of personality and gender diversity on software development teams' performance","authors":"Abdul Rehman Gila, Jafreezal Jaafa, Mazni Omar, M. Z. Tunio","doi":"10.1109/I4CT.2014.6914186","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914186","url":null,"abstract":"Human aspect is considered as one of the success factors for software development. Besides, diversity is labeled as the most effective element for creating effectiveness in team performance. Thus, this study has aimed to find the effects of gender diversity on team performance based on personality types. The personality types' variations were found effective on team performance based on genders. For instance, male-lead groups were found convenient with both genders but female-lead groups looked much comfortable with only female members. Moreover, female-gender looked uneasy in male dominant teams especially when their personality is E (extrovert). Whereas, male-gender was observed as digestible in female-lead teams if the I (introvert) personality is dominating.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122075573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914230
S. E. Ghrare, Ahmed R. Khobaiz
With the continuing growth of modern communication technologies, demand for image data compression is increasing rapidly. Techniques for achieving data compression can be divided into two basic approaches: spatial coding and Transform coding. This research paper presents a proposed method for the compression of digital images using hybrid compression method based on Block Truncation Coding (BTC) and Walsh Hadamard Transform (WHT). The objective of this hybrid approach is to achieve higher compression ratio by applying BTC and WHT. Several grayscale test images are used to evaluate the coding efficency and performance of the hybrid method and compared with the BTC and WHT respectively. It is generally shown that the proposed method gives better results.
{"title":"Digital image compression using Block Truncation Coding and Walsh Hadamard Transform hybrid technique","authors":"S. E. Ghrare, Ahmed R. Khobaiz","doi":"10.1109/I4CT.2014.6914230","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914230","url":null,"abstract":"With the continuing growth of modern communication technologies, demand for image data compression is increasing rapidly. Techniques for achieving data compression can be divided into two basic approaches: spatial coding and Transform coding. This research paper presents a proposed method for the compression of digital images using hybrid compression method based on Block Truncation Coding (BTC) and Walsh Hadamard Transform (WHT). The objective of this hybrid approach is to achieve higher compression ratio by applying BTC and WHT. Several grayscale test images are used to evaluate the coding efficency and performance of the hybrid method and compared with the BTC and WHT respectively. It is generally shown that the proposed method gives better results.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122229524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914153
B. Fruth, H. Looser, Detlef Hummes, Wojciech Betlej
The reliability of rotating electrical machines is of prime importance for the owner. Unplanned outages may lead to significant production losses. (Remote) monitoring of critical insulation components (rotor and stator) allows the recognition of a developing problem at a very early stage, so that counter measures can be initiated before major damage occurs. A (multi-parameter) monitoring system has been designed, which targets specifically the insulation of large electrical machines. Its remote access (LAN, Internet) allows user and experts to access data, receive warnings and eventually determine corrective actions any time. In order to monitor the long-term efficiency and quality of maintenance and to try and establish the start of problems, the following basic techniques are typically applied on-line, and are part of the monitoring system.
{"title":"Integrated remote insulation condition monitoring of generators and motors using traditional and wireless sensor technologies","authors":"B. Fruth, H. Looser, Detlef Hummes, Wojciech Betlej","doi":"10.1109/I4CT.2014.6914153","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914153","url":null,"abstract":"The reliability of rotating electrical machines is of prime importance for the owner. Unplanned outages may lead to significant production losses. (Remote) monitoring of critical insulation components (rotor and stator) allows the recognition of a developing problem at a very early stage, so that counter measures can be initiated before major damage occurs. A (multi-parameter) monitoring system has been designed, which targets specifically the insulation of large electrical machines. Its remote access (LAN, Internet) allows user and experts to access data, receive warnings and eventually determine corrective actions any time. In order to monitor the long-term efficiency and quality of maintenance and to try and establish the start of problems, the following basic techniques are typically applied on-line, and are part of the monitoring system.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121080194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914210
Z. Mustapa, S. Saat, S. Husin, N. Abas
This paper discusses on attitude control of a quadcopter unmanned aerial vehicle (UAV) in real time application. The paper describes the controller design method for the hovering control of UAV automatic vertical take-off system. In order to take-off the quadcopter and stable the altitude, PID controller has been designed. The scope of study is to develop an altitude controller of the vertical take-off as realistic as possible. The quadcopter flight system has nonlinear characteristics. A simulation is conducted to test and analyze the control performance of the quadcopter model. The simulation was conducted by using Mat-lab Simulink. On the other hand, for the real time application, the PCI-1711 data acquisition card is used as an interface for controller design which routes from Simulink to hardware. This study showed the controller designs are implemented and tuned to the real system using Real Time Windows Target approach by Mat-Lab Simulink.
{"title":"Altitude controller design for multi-copter UAV","authors":"Z. Mustapa, S. Saat, S. Husin, N. Abas","doi":"10.1109/I4CT.2014.6914210","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914210","url":null,"abstract":"This paper discusses on attitude control of a quadcopter unmanned aerial vehicle (UAV) in real time application. The paper describes the controller design method for the hovering control of UAV automatic vertical take-off system. In order to take-off the quadcopter and stable the altitude, PID controller has been designed. The scope of study is to develop an altitude controller of the vertical take-off as realistic as possible. The quadcopter flight system has nonlinear characteristics. A simulation is conducted to test and analyze the control performance of the quadcopter model. The simulation was conducted by using Mat-lab Simulink. On the other hand, for the real time application, the PCI-1711 data acquisition card is used as an interface for controller design which routes from Simulink to hardware. This study showed the controller designs are implemented and tuned to the real system using Real Time Windows Target approach by Mat-Lab Simulink.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125760313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914204
M. Razali, N. S. Ahmad, Z. M. Zaki, W. Ismail
Adaptive threshold works at pixel level and the result of the adaptive threshold is either background or foreground. The adaptive threshold produces superior result compared to global threshold, especially for the images that have uneven pixel intensity distribution. In the dental age assessment, X-ray image is used as an aid to estimate the age of the person. The existing process of assessment is done manually. However, this can be made automatically. The process of automated dental age assessment, require threshold segmentation to separate the background and the teeth area. In order to optimize the result of the adaptive threshold, it depends on the threshold value. In this paper, we present three methods (i.e. mean, median and OTSU) to estimate the range of the threshold value. The result of the study shown that the median threshold provides better results than the mean and OTSU thresholds. In terms of the region of the segmentation, median threshold value covers more teeth followed by mean threshold and OTSU threshold. The region of segmentation is important because one of the requirements in Demirjian method is to assess all the teeth types in quadrant 2 and quadrant 3.Based on the result of the experiment shown the region of median threshold able to segment most of the teeth area in quadrant 2 and quadrant 3.
{"title":"Region of adaptive threshold segmentation between mean, median and otsu threshold for dental age assessment","authors":"M. Razali, N. S. Ahmad, Z. M. Zaki, W. Ismail","doi":"10.1109/I4CT.2014.6914204","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914204","url":null,"abstract":"Adaptive threshold works at pixel level and the result of the adaptive threshold is either background or foreground. The adaptive threshold produces superior result compared to global threshold, especially for the images that have uneven pixel intensity distribution. In the dental age assessment, X-ray image is used as an aid to estimate the age of the person. The existing process of assessment is done manually. However, this can be made automatically. The process of automated dental age assessment, require threshold segmentation to separate the background and the teeth area. In order to optimize the result of the adaptive threshold, it depends on the threshold value. In this paper, we present three methods (i.e. mean, median and OTSU) to estimate the range of the threshold value. The result of the study shown that the median threshold provides better results than the mean and OTSU thresholds. In terms of the region of the segmentation, median threshold value covers more teeth followed by mean threshold and OTSU threshold. The region of segmentation is important because one of the requirements in Demirjian method is to assess all the teeth types in quadrant 2 and quadrant 3.Based on the result of the experiment shown the region of median threshold able to segment most of the teeth area in quadrant 2 and quadrant 3.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115308233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914196
Sandrawarman Balasundram, M. Jenu, S. Z. Sapuan
This paper presents the measured gain values of a passive horn antenna, acquired by employing metallic reflector alone coupled with a vector network analyzer, in compliance with the image theory. Such novel methodology provides an alternative to the conventional three-antenna or two-antenna gain measurement method. The gain values were computed by a simple formula based on the distance between antenna and reflector, operating frequency, S-parameter and the speed of light. The antenna was directed first at an absorber, and then at a reflector to obtain the S11 parameter with the aid of a complex network analyzer. The studies were conducted in three settings - shielding room, anechoic chamber and open space - at antenna-reflector distances of 0.5 m, 1 m, 2 m, 3 m and 4 m. The computed results were compared with and analyzed in accordance to the manufacturing data. Encouragingly, the computed data corresponded closely to the manufacturer's data at the distance of 0.5 m for anechoic chamber, with a correlation coefficient of 0.93; and at the distance of 1 m for shielding room and open space, with a correlation coefficient of 0.77 and 0.79, respectively. These findings suggest that while the image theory-based single-antenna method demands less space, time and cost, this economical approach can be further improved by taking into consideration such governing factors as signal losses, reflective sources, optimization of far-field distances as well as the reflector size required for calculating the gain.
{"title":"Impact of test area in antenna gain measurement using image theory","authors":"Sandrawarman Balasundram, M. Jenu, S. Z. Sapuan","doi":"10.1109/I4CT.2014.6914196","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914196","url":null,"abstract":"This paper presents the measured gain values of a passive horn antenna, acquired by employing metallic reflector alone coupled with a vector network analyzer, in compliance with the image theory. Such novel methodology provides an alternative to the conventional three-antenna or two-antenna gain measurement method. The gain values were computed by a simple formula based on the distance between antenna and reflector, operating frequency, S-parameter and the speed of light. The antenna was directed first at an absorber, and then at a reflector to obtain the S11 parameter with the aid of a complex network analyzer. The studies were conducted in three settings - shielding room, anechoic chamber and open space - at antenna-reflector distances of 0.5 m, 1 m, 2 m, 3 m and 4 m. The computed results were compared with and analyzed in accordance to the manufacturing data. Encouragingly, the computed data corresponded closely to the manufacturer's data at the distance of 0.5 m for anechoic chamber, with a correlation coefficient of 0.93; and at the distance of 1 m for shielding room and open space, with a correlation coefficient of 0.77 and 0.79, respectively. These findings suggest that while the image theory-based single-antenna method demands less space, time and cost, this economical approach can be further improved by taking into consideration such governing factors as signal losses, reflective sources, optimization of far-field distances as well as the reflector size required for calculating the gain.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115691811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}