Pub Date : 2021-11-06DOI: 10.1109/ICSET53708.2021.9612438
Nadher Alsafwani, Musab A. M. Ali, N. Tahir
Security is the key concern, which allows safe communication between any two mobile nodes in an unfavorable environment. Wireless Ad Hoc can be unsecured against attacks by means of malicious nodes. Hence this study assesses the influence of wormhole attacks on Mobile Ad Hoc network (MANET) system that is evaluated and validated based on the QualNet simulator. The MANET performance is investigated utilizing the wormhole attacks. The simulation is performed on Mobile node's network layer and data link layer in the WANET (wireless Ad Hoc network). The MANET performance was examined using “what-if” analyses too. Results showed that for security purposes, it is indeed necessary to assess the Mobile Ad Hoc node deployment.
{"title":"Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator","authors":"Nadher Alsafwani, Musab A. M. Ali, N. Tahir","doi":"10.1109/ICSET53708.2021.9612438","DOIUrl":"https://doi.org/10.1109/ICSET53708.2021.9612438","url":null,"abstract":"Security is the key concern, which allows safe communication between any two mobile nodes in an unfavorable environment. Wireless Ad Hoc can be unsecured against attacks by means of malicious nodes. Hence this study assesses the influence of wormhole attacks on Mobile Ad Hoc network (MANET) system that is evaluated and validated based on the QualNet simulator. The MANET performance is investigated utilizing the wormhole attacks. The simulation is performed on Mobile node's network layer and data link layer in the WANET (wireless Ad Hoc network). The MANET performance was examined using “what-if” analyses too. Results showed that for security purposes, it is indeed necessary to assess the Mobile Ad Hoc node deployment.","PeriodicalId":433197,"journal":{"name":"2021 IEEE 11th International Conference on System Engineering and Technology (ICSET)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123225494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-06DOI: 10.1109/ICSET53708.2021.9612429
Jia Yi Goh, W. Lai
Clean water is a very important resource to all living things. This paper describes the design and development of a novel optical system for water quality characterisation. The system utilises transmitted light as well as scattered light from a sample to determine the level of turbidity of the liquid sample. The developed system can also be used to perform quality control on food and beverage (F&B) products that are manufactured on a large scale. The system was tested on various liquids of different concentrations. This was then used to train a shallow neural network and tested on new samples to identify the level of contaminants. For a good liquid sample the system was able to provide a good estimate with an error of less than 2 % with the 180°detector and about 12 % based on the reflected light. In addition to this, it was also used to determine if the beverage sample has gone rancid. For such a sample both the detectors were able to indicate abnormality.
{"title":"Design and Development of a Novel Portable Optical System with a Shallow Neural Network to Characterise Liquid Turbidity","authors":"Jia Yi Goh, W. Lai","doi":"10.1109/ICSET53708.2021.9612429","DOIUrl":"https://doi.org/10.1109/ICSET53708.2021.9612429","url":null,"abstract":"Clean water is a very important resource to all living things. This paper describes the design and development of a novel optical system for water quality characterisation. The system utilises transmitted light as well as scattered light from a sample to determine the level of turbidity of the liquid sample. The developed system can also be used to perform quality control on food and beverage (F&B) products that are manufactured on a large scale. The system was tested on various liquids of different concentrations. This was then used to train a shallow neural network and tested on new samples to identify the level of contaminants. For a good liquid sample the system was able to provide a good estimate with an error of less than 2 % with the 180°detector and about 12 % based on the reflected light. In addition to this, it was also used to determine if the beverage sample has gone rancid. For such a sample both the detectors were able to indicate abnormality.","PeriodicalId":433197,"journal":{"name":"2021 IEEE 11th International Conference on System Engineering and Technology (ICSET)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125680481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-06DOI: 10.1109/ICSET53708.2021.9612533
S. Cheong, H. Ling, Pei-Lee Teh
This paper proposes a Unified Hotel Access Control (UHAC) system, which is a complete integrated hardware and software solution for contactless check-in and access to hotel room using the proposed Encrypted Steganography Quick Response (ESQR) key, either through mobile devices or physical printouts. An embedded system installed in front of hotel room was deployed to allow guest simultaneously check-in and unlock room door using the ESQR key. This eliminates the need of queuing up and checking-in at reception desk or through check-in kiosk. Thus, the proposed contactless check-in-access is more convenient and embrace social distance during the pandemic. The new approach could increase guest's satisfaction and privacy level because the ESQR key can be digitally transmitted in advance to the guest upon successful booking and payment. Additionally, a survey of 108 participants was conducted to evaluate the users' perception towards the UHAC system. The findings suggest that the UHAC system is perceived as a convenient and secure system, resulting in positive behavioral intention to use the system. Thus, the UHAC system has the potential to transcend the hotel and tourism industries by enhancing the guest staying experience through a more convenient, secure, and easy contactless check-in and access to hotel rooms.
{"title":"Encrypted Steganography Quick Response Scheme for Unified Hotel Access Control System","authors":"S. Cheong, H. Ling, Pei-Lee Teh","doi":"10.1109/ICSET53708.2021.9612533","DOIUrl":"https://doi.org/10.1109/ICSET53708.2021.9612533","url":null,"abstract":"This paper proposes a Unified Hotel Access Control (UHAC) system, which is a complete integrated hardware and software solution for contactless check-in and access to hotel room using the proposed Encrypted Steganography Quick Response (ESQR) key, either through mobile devices or physical printouts. An embedded system installed in front of hotel room was deployed to allow guest simultaneously check-in and unlock room door using the ESQR key. This eliminates the need of queuing up and checking-in at reception desk or through check-in kiosk. Thus, the proposed contactless check-in-access is more convenient and embrace social distance during the pandemic. The new approach could increase guest's satisfaction and privacy level because the ESQR key can be digitally transmitted in advance to the guest upon successful booking and payment. Additionally, a survey of 108 participants was conducted to evaluate the users' perception towards the UHAC system. The findings suggest that the UHAC system is perceived as a convenient and secure system, resulting in positive behavioral intention to use the system. Thus, the UHAC system has the potential to transcend the hotel and tourism industries by enhancing the guest staying experience through a more convenient, secure, and easy contactless check-in and access to hotel rooms.","PeriodicalId":433197,"journal":{"name":"2021 IEEE 11th International Conference on System Engineering and Technology (ICSET)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114181099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Incorporating efficient and precise gravimetric dosing devices into conveyor lines for bulk material transportation is identified as a critical engineering step to create productive and cost-effective material feeding or mixing plants. So far different dosing equipment has been used to meter the bulk material transportation in cement industries. However, the implementation process of an accurate gravimetric dosing device for transporting Alternative Fuels (AF) in cement plants needs both a stable mechanical framework and an advanced controller architecture integration, since AF dosing performance usually suffers from volatile bulk material properties (e.g. varying bulk density and humidity). This work focuses on the model-based design of a new type of dosing equipment: The Gravimetric Plate Dosing Conveyor (GPDC) to transport fibrous and inhomogeneous low-density materials. Unlike conventional dosing screws of the belt weighing system, this novel dosing approach helps to regulate the mass flow rate accurately and to maintain equilibrium on the conveyor. A twin load cell measuring system has been proposed to accurately measure the material on the conveyor and thereby regulating the output mass flow rate of the material using control systems. A virtual simulation framework has been developed to verify and validate the controller architecture to regulate the speed of the conveyor to maintain a steady mass flow rate. It is shown that the proposed model-based approach supports the design and implementation stage for a more robust controller tuning and a more efficient overall design process.
{"title":"Model-based Control of a Gravimetric Dosing Conveyor for Alternative Fuels in the Cement Industry","authors":"Hareesh Konanki, Alexander Elbel, Benedikt Schmidt, Sairam Nandyala, Alfons Noe, Dominik Aufderheide","doi":"10.1109/ICSET53708.2021.9612545","DOIUrl":"https://doi.org/10.1109/ICSET53708.2021.9612545","url":null,"abstract":"Incorporating efficient and precise gravimetric dosing devices into conveyor lines for bulk material transportation is identified as a critical engineering step to create productive and cost-effective material feeding or mixing plants. So far different dosing equipment has been used to meter the bulk material transportation in cement industries. However, the implementation process of an accurate gravimetric dosing device for transporting Alternative Fuels (AF) in cement plants needs both a stable mechanical framework and an advanced controller architecture integration, since AF dosing performance usually suffers from volatile bulk material properties (e.g. varying bulk density and humidity). This work focuses on the model-based design of a new type of dosing equipment: The Gravimetric Plate Dosing Conveyor (GPDC) to transport fibrous and inhomogeneous low-density materials. Unlike conventional dosing screws of the belt weighing system, this novel dosing approach helps to regulate the mass flow rate accurately and to maintain equilibrium on the conveyor. A twin load cell measuring system has been proposed to accurately measure the material on the conveyor and thereby regulating the output mass flow rate of the material using control systems. A virtual simulation framework has been developed to verify and validate the controller architecture to regulate the speed of the conveyor to maintain a steady mass flow rate. It is shown that the proposed model-based approach supports the design and implementation stage for a more robust controller tuning and a more efficient overall design process.","PeriodicalId":433197,"journal":{"name":"2021 IEEE 11th International Conference on System Engineering and Technology (ICSET)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114622667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-06DOI: 10.1109/ICSET53708.2021.9612570
Siti Ayu Jalil, S. Shariff, A. Rahmat, Siti Aimi Sarah Zainal Abidin, Nina Naquiah Ahmad Nizar
The challenge of decarbonizing Malaysia's energy sector to cut carbon emissions need to be deeply understood and examined to seek balance between its energy policy goals and developing its economic activities to ensure income growth. Technological development and making innovations appear to be the essential method to cut CO2 emissions for a country as to pursue the seventeen (17) sustainable development goals (SDGs) set up by the United Nations. This study investigates the causal relationships between gross domestic product (GDP), technological advancement proxy by fixed telephone line (FTL), gross fixed capital formation (GFCF), foreign direct investment (FDI), electricity production (ELC), renewable energy (RWE), transport (TPT), manufacturing (MFC) and non-renewable energy (NREW) proxy by fossil fuel energy consumption in reducing the carbon emissions in Malaysia. The results of multiple regression analysis showed a positive significant effect between GDP, MFC and carbon emission, but a negative significant effect between GFCF and REW with carbon emission. The remaining five variables portray an insignificant impact. Hence, it implies that Malaysia should invest more on GFCF and REW which would help to improve its manufacturing sector and sustain its GDP concurrently help to decarbonize its emissions.
{"title":"A Simple Multivariate Time Series Analysis Examining the Effect of Technological Advancement, Gross Fixed Capital Formation and Renewable Energy on Malaysia's Decarbonization","authors":"Siti Ayu Jalil, S. Shariff, A. Rahmat, Siti Aimi Sarah Zainal Abidin, Nina Naquiah Ahmad Nizar","doi":"10.1109/ICSET53708.2021.9612570","DOIUrl":"https://doi.org/10.1109/ICSET53708.2021.9612570","url":null,"abstract":"The challenge of decarbonizing Malaysia's energy sector to cut carbon emissions need to be deeply understood and examined to seek balance between its energy policy goals and developing its economic activities to ensure income growth. Technological development and making innovations appear to be the essential method to cut CO2 emissions for a country as to pursue the seventeen (17) sustainable development goals (SDGs) set up by the United Nations. This study investigates the causal relationships between gross domestic product (GDP), technological advancement proxy by fixed telephone line (FTL), gross fixed capital formation (GFCF), foreign direct investment (FDI), electricity production (ELC), renewable energy (RWE), transport (TPT), manufacturing (MFC) and non-renewable energy (NREW) proxy by fossil fuel energy consumption in reducing the carbon emissions in Malaysia. The results of multiple regression analysis showed a positive significant effect between GDP, MFC and carbon emission, but a negative significant effect between GFCF and REW with carbon emission. The remaining five variables portray an insignificant impact. Hence, it implies that Malaysia should invest more on GFCF and REW which would help to improve its manufacturing sector and sustain its GDP concurrently help to decarbonize its emissions.","PeriodicalId":433197,"journal":{"name":"2021 IEEE 11th International Conference on System Engineering and Technology (ICSET)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133297478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-06DOI: 10.1109/ICSET53708.2021.9612525
K. N. Ismail, Ali Seman, K. A. Samah
This paper presents a comparison between external and internal cluster validity indices with a similar bounded index range. F-measure (FM) and Fowlkes-Mallows (FMI) of external validity indices, as well as Silhouette (SIL) of internal validity index, were chosen for this comparative analysis. Ten numerical data sets, namely Haberman, BUPA (liver disorder), Wisconsin Diagnostic Breast Cancer (WDBC), Iris, Seeds, Wine, User Knowledge, Cleveland, Segmentation, and Glass, were deployed to benchmark the clustering outcomes based on Fuzzy C-Mean (FCM) algorithm. Mean, minimum, and maximum scores were calculated to determine the similarities and differences among the indices. Pearson correlation was reported as well. As a result, the index scores displayed a slight difference between the external and internal validity indices. A moderate and positive correlation was noted between the external and internal validity index (r=. 66, r=.65 p<0.01) scores. This correlation signifies a similar graph pattern between the cluster validity indices. This comparative analysis revealed that the external and internal cluster validity indices with similar bounded index ranges and slightly different index scores generate a moderate and positive correlation with a similar graph pattern.
本文给出了具有相似有界索引范围的外部和内部聚类有效性指标的比较。采用F-measure (FM)和Fowlkes-Mallows (FMI)作为外部效度指标,采用Silhouette (SIL)作为内部效度指标进行比较分析。采用Haberman、BUPA(肝脏疾病)、Wisconsin Diagnostic Breast Cancer (WDBC)、Iris、Seeds、Wine、User Knowledge、Cleveland、Segmentation和Glass等10个数值数据集,对基于模糊c均值(FCM)算法的聚类结果进行基准测试。计算平均值、最小值和最大值,以确定指标之间的相似性和差异性。Pearson相关性也被报道。因此,指标得分在外部和内部效度指标之间表现出轻微的差异。外部效度指数与内部效度指数呈中度正相关(r=。66年,r =。65 p<0.01)评分。这种相关性表明聚类有效性指数之间具有类似的图形模式。对比分析发现,指标范围相近、指标得分略有差异的外部和内部聚类效度指标在相似的图形模式下产生适度的正相关关系。
{"title":"A Comparison Between External and Internal Cluster Validity Indices","authors":"K. N. Ismail, Ali Seman, K. A. Samah","doi":"10.1109/ICSET53708.2021.9612525","DOIUrl":"https://doi.org/10.1109/ICSET53708.2021.9612525","url":null,"abstract":"This paper presents a comparison between external and internal cluster validity indices with a similar bounded index range. F-measure (FM) and Fowlkes-Mallows (FMI) of external validity indices, as well as Silhouette (SIL) of internal validity index, were chosen for this comparative analysis. Ten numerical data sets, namely Haberman, BUPA (liver disorder), Wisconsin Diagnostic Breast Cancer (WDBC), Iris, Seeds, Wine, User Knowledge, Cleveland, Segmentation, and Glass, were deployed to benchmark the clustering outcomes based on Fuzzy C-Mean (FCM) algorithm. Mean, minimum, and maximum scores were calculated to determine the similarities and differences among the indices. Pearson correlation was reported as well. As a result, the index scores displayed a slight difference between the external and internal validity indices. A moderate and positive correlation was noted between the external and internal validity index (r=. 66, r=.65 p<0.01) scores. This correlation signifies a similar graph pattern between the cluster validity indices. This comparative analysis revealed that the external and internal cluster validity indices with similar bounded index ranges and slightly different index scores generate a moderate and positive correlation with a similar graph pattern.","PeriodicalId":433197,"journal":{"name":"2021 IEEE 11th International Conference on System Engineering and Technology (ICSET)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127753287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-06DOI: 10.1109/ICSET53708.2021.9612528
Maisarah Adibah Murad, N. Abdullah, M. M. Rosli
Software effort estimation is a crucial stage in the process of software project development including mobile application development. It is required to assist the project manager on deciding the project outlining, staff resources evaluation, cost estimation, quality control, and benchmarking. The methods of estimation can be categorized into parametric and non-parametric methods. This paper analyses and compares two algorithmic methods, namely Constructive Cost Model II (COCOMO II) and Constructive System Engineering Cost Model (COSYSMO) in calculating the effort for mobile application development. The experiment is conducted based on COCOMO datasets, and the experiment result is evaluated using the Mean Magnitude of Relative Error (MMRE). We found that the COCOMO II is a more suitable parametric effort estimation for mobile applications with the MMRE value of 0.4805. For future research, the cost drivers which are related to the mobile software aspects should be added.
{"title":"Software Cost Estimation for Mobile Application Development - A Comparative Study of COCOMO Models","authors":"Maisarah Adibah Murad, N. Abdullah, M. M. Rosli","doi":"10.1109/ICSET53708.2021.9612528","DOIUrl":"https://doi.org/10.1109/ICSET53708.2021.9612528","url":null,"abstract":"Software effort estimation is a crucial stage in the process of software project development including mobile application development. It is required to assist the project manager on deciding the project outlining, staff resources evaluation, cost estimation, quality control, and benchmarking. The methods of estimation can be categorized into parametric and non-parametric methods. This paper analyses and compares two algorithmic methods, namely Constructive Cost Model II (COCOMO II) and Constructive System Engineering Cost Model (COSYSMO) in calculating the effort for mobile application development. The experiment is conducted based on COCOMO datasets, and the experiment result is evaluated using the Mean Magnitude of Relative Error (MMRE). We found that the COCOMO II is a more suitable parametric effort estimation for mobile applications with the MMRE value of 0.4805. For future research, the cost drivers which are related to the mobile software aspects should be added.","PeriodicalId":433197,"journal":{"name":"2021 IEEE 11th International Conference on System Engineering and Technology (ICSET)","volume":"460 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124350094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-06DOI: 10.1109/ICSET53708.2021.9612555
A. S. Jouda, A. Sagheer, Moceheb Lazam Shuwandy
The Smartphone is one of the most well-known and widely used devices in contemporary times for protecting private information. Biometric methods are one way for authenticating Smartphones. However, the difference in ages (i.e., elders and children) affects the authentication procedure. This paper describes the current implementation of this technique on a smartphone device, which is in catch utilizing a properly valued magnet intensity (a magnetic ring) taken as a semi-biometric based on static authentication, called MagRing-SBSA. It bases on manipulating the Magnetometer sensor included in the latest generation of mobile devices. It can demonstrate the authentication procedure utilizing a magnetic ring from a magnetometer, detecting data from the unique per device generated in the area surrounding the device by a magnet held in hand. The magnetism applies to various users, and the magnetization ring value can provide a comprehensive authentication option, and it cannot readily duplicate because the ring is unique to the user on a particular smartphone. As a result of the experiments for three participants, two older participants and one child, show a high accuracy rate of 97% because they had undergone training before conducting the experiments. In future work, we will increase participants' numbers and study the effects of using this technique.
{"title":"MagRing-SASB: Static Authentication of Magnetism Sensor Using Semi-Biometric Interaction Magnetic Ring","authors":"A. S. Jouda, A. Sagheer, Moceheb Lazam Shuwandy","doi":"10.1109/ICSET53708.2021.9612555","DOIUrl":"https://doi.org/10.1109/ICSET53708.2021.9612555","url":null,"abstract":"The Smartphone is one of the most well-known and widely used devices in contemporary times for protecting private information. Biometric methods are one way for authenticating Smartphones. However, the difference in ages (i.e., elders and children) affects the authentication procedure. This paper describes the current implementation of this technique on a smartphone device, which is in catch utilizing a properly valued magnet intensity (a magnetic ring) taken as a semi-biometric based on static authentication, called MagRing-SBSA. It bases on manipulating the Magnetometer sensor included in the latest generation of mobile devices. It can demonstrate the authentication procedure utilizing a magnetic ring from a magnetometer, detecting data from the unique per device generated in the area surrounding the device by a magnet held in hand. The magnetism applies to various users, and the magnetization ring value can provide a comprehensive authentication option, and it cannot readily duplicate because the ring is unique to the user on a particular smartphone. As a result of the experiments for three participants, two older participants and one child, show a high accuracy rate of 97% because they had undergone training before conducting the experiments. In future work, we will increase participants' numbers and study the effects of using this technique.","PeriodicalId":433197,"journal":{"name":"2021 IEEE 11th International Conference on System Engineering and Technology (ICSET)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117176180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-06DOI: 10.1109/ICSET53708.2021.9612440
Hazrati Zaini, Norshahidatul Hasana Ishak, Nur Farahin Mohd Johari, Nor Aimuni Md Rashid, Hamizan Hamzah
Immunization has become part of the obligation for the parents to protect their children from major childhood diseases. The Malaysian government has emphasized on immunization programs on children to reduce mortality rates among children. Therefore, we developed a mobile application known as Baby Vaccination Schedule (BVS) with vaccine schedule reminder to decrease the rate of incomplete immunization due to overlooking of the vaccination date. In addition, this application aims to provide parents with knowledge on vaccine uptake for the children. One of the crucial parts in development of any software or system is to what extent the proposed solution may satisfy the user requirement. In this paper, Software Usability Measurement Inventory (SUMI) is used to evaluate the BVS application. The BVS application had successfully complied with all five factors in SUMI model which are, efficiency, affect, helpfulness, controllability, and learnability. The total mean represents the value which are related to the standard of the mean value in usability testing. The higher the mean value from the higher the data respondent from the respondent. The result classified that the level of usability in Baby Vaccine Schedule at 89% acceptable by the user. Thus, the respondent agreed that the apps can be used to solve the problem in spreading information and notify user on vaccine schedule.
{"title":"Evaluation of a Child Immunization Schedule Application using the Software Usability Measurement Inventory (SUMI) Model","authors":"Hazrati Zaini, Norshahidatul Hasana Ishak, Nur Farahin Mohd Johari, Nor Aimuni Md Rashid, Hamizan Hamzah","doi":"10.1109/ICSET53708.2021.9612440","DOIUrl":"https://doi.org/10.1109/ICSET53708.2021.9612440","url":null,"abstract":"Immunization has become part of the obligation for the parents to protect their children from major childhood diseases. The Malaysian government has emphasized on immunization programs on children to reduce mortality rates among children. Therefore, we developed a mobile application known as Baby Vaccination Schedule (BVS) with vaccine schedule reminder to decrease the rate of incomplete immunization due to overlooking of the vaccination date. In addition, this application aims to provide parents with knowledge on vaccine uptake for the children. One of the crucial parts in development of any software or system is to what extent the proposed solution may satisfy the user requirement. In this paper, Software Usability Measurement Inventory (SUMI) is used to evaluate the BVS application. The BVS application had successfully complied with all five factors in SUMI model which are, efficiency, affect, helpfulness, controllability, and learnability. The total mean represents the value which are related to the standard of the mean value in usability testing. The higher the mean value from the higher the data respondent from the respondent. The result classified that the level of usability in Baby Vaccine Schedule at 89% acceptable by the user. Thus, the respondent agreed that the apps can be used to solve the problem in spreading information and notify user on vaccine schedule.","PeriodicalId":433197,"journal":{"name":"2021 IEEE 11th International Conference on System Engineering and Technology (ICSET)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129994263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-06DOI: 10.1109/ICSET53708.2021.9612442
Chee Hong Lim, Kam Meng Goh, Li Li Lim
Food recognition technology remains a challenging task to the computer vision community due to the diverse nature of food. Oriental food, with similar features such as colour and texture, makes the recognition process less effective and challenging with a convolutional neural network (CNN). More importantly, there are no literature reports on the use of Local Interpretable Model-agnostic Explanations (LIME) to increase the transparency of oriental food recognition. Hence, this paper investigates oriental food recognition using two different CNN models and implements LIME to interpret the model. The testing accuracy obtained by the proposed CNN models for oriental food recognition with optimum hyper-parameter setting is about 85.7% coupled with the utilization of the LIME model to increase the transparency of the deep learning models.
{"title":"Explainable Artificial Intelligence in Oriental Food Recognition using Convolutional Neural Network","authors":"Chee Hong Lim, Kam Meng Goh, Li Li Lim","doi":"10.1109/ICSET53708.2021.9612442","DOIUrl":"https://doi.org/10.1109/ICSET53708.2021.9612442","url":null,"abstract":"Food recognition technology remains a challenging task to the computer vision community due to the diverse nature of food. Oriental food, with similar features such as colour and texture, makes the recognition process less effective and challenging with a convolutional neural network (CNN). More importantly, there are no literature reports on the use of Local Interpretable Model-agnostic Explanations (LIME) to increase the transparency of oriental food recognition. Hence, this paper investigates oriental food recognition using two different CNN models and implements LIME to interpret the model. The testing accuracy obtained by the proposed CNN models for oriental food recognition with optimum hyper-parameter setting is about 85.7% coupled with the utilization of the LIME model to increase the transparency of the deep learning models.","PeriodicalId":433197,"journal":{"name":"2021 IEEE 11th International Conference on System Engineering and Technology (ICSET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130050801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}