Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810040
M. F. Ibrahim, M. I. Md Ali, N. F. Naim
This paper demonstrates and discusses a generation of multi wavelength Laser Utilizing Fabry-Pérot Filter in Hybrid Raman and Erbium Doped Fiber Gains has been proposed and investigated experimentally. The Hybrid Raman-Erbium Doped Fiber (EDF) gain produce the stability of the ring cavity laser at room temperature. A Fabry-Pérot (F-P) Filter as a comb filter and a Gain Flattening filter form a resonant cavity is producing a stable Multi wavelength output. The key features of multi wavelength laser are high Side-Mode Suppression Ratio (SMSR), smaller Free Spectral Range (FSR), and narrow line width had been discussed about and studied.
{"title":"Multi wavelength Laser Utilizing Fabry-Pérot Interferometer in Hybrid Raman and Erbium Doped Fiber Gains","authors":"M. F. Ibrahim, M. I. Md Ali, N. F. Naim","doi":"10.1109/SCORED.2016.7810040","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810040","url":null,"abstract":"This paper demonstrates and discusses a generation of multi wavelength Laser Utilizing Fabry-Pérot Filter in Hybrid Raman and Erbium Doped Fiber Gains has been proposed and investigated experimentally. The Hybrid Raman-Erbium Doped Fiber (EDF) gain produce the stability of the ring cavity laser at room temperature. A Fabry-Pérot (F-P) Filter as a comb filter and a Gain Flattening filter form a resonant cavity is producing a stable Multi wavelength output. The key features of multi wavelength laser are high Side-Mode Suppression Ratio (SMSR), smaller Free Spectral Range (FSR), and narrow line width had been discussed about and studied.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"8 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81979027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810071
K. Azmi, D. Ishak, M. Kamarol, A. Zuhairi
This paper reported the construction of partial discharge measurement system under influence of cylindrical metal particle in transformer oil. The partial discharge of free cylindrical metal particle in the uniform electric field under AC applied voltage was studied in this paper. The partial discharge inception voltage (PDIV) for the single particle was measure to be 11kV. The typical waveform of positive PD and negative PD was also obtained. The result shows that the magnitude of negative PD is higher compared to positive PD. The observation on cylindrical metal particle movement revealed that there were a few stages of motion process involved.
{"title":"Construction of partial discharge measurement system under influence of cylindrical metal particle in transformer oil","authors":"K. Azmi, D. Ishak, M. Kamarol, A. Zuhairi","doi":"10.1109/SCORED.2016.7810071","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810071","url":null,"abstract":"This paper reported the construction of partial discharge measurement system under influence of cylindrical metal particle in transformer oil. The partial discharge of free cylindrical metal particle in the uniform electric field under AC applied voltage was studied in this paper. The partial discharge inception voltage (PDIV) for the single particle was measure to be 11kV. The typical waveform of positive PD and negative PD was also obtained. The result shows that the magnitude of negative PD is higher compared to positive PD. The observation on cylindrical metal particle movement revealed that there were a few stages of motion process involved.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"78 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84050114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/SCORED.2016.7810097
Mhd Zaher Al Katsha, H. Ramli
Carrier Aggregation (CA), which is a method that aggregates multiple Component Carriers (CCs) of the same or different frequency bands, is one of the Long Term Evolution-Advanced (LTE-Advanced) key features. It allows the LTE-Advanced to support wider transmission bandwidth. Another important requirement is that the system needs to support a mixture of LTE-Advanced and the legacy Long Term Evolution (LTE) users simultaneously. The LTE-Advanced users can transmit packets on all of the available CCs whereas the LTE users are limited to transmit packets on a single CC. At the early stage of migration, there will be many LTE users in the LTE-Advanced system. Therefore, CC selection algorithm that is responsible to assign a CC to each newly-arrived legacy LTE users is becoming of paramount importance in the LTE-Advanced system. The existing CC selection algorithms can slightly provide good mobile cellular performance in terms of maximizing the throughput and balancing the load. To further improve the LTE-Advanced performance, this paper proposes a novel CC selection algorithm that takes the channel quality and traffic load in each CC into consideration. It was shown via simulation that the proposed algorithm can significantly improve the downlink LTE-Advanced performance as compared to the conventional CC selection algorithms.
CA (Carrier Aggregation)是LTE-Advanced的关键特性之一,是一种将多个相同或不同频段的cc (Component Carrier)聚合在一起的方法。允许LTE-Advanced支持更宽的传输带宽。另一个重要要求是,系统需要同时支持LTE- advanced和传统长期演进(LTE)用户的混合。LTE- advanced用户可以在所有可用的CC上传输数据包,而LTE用户只能在单个CC上传输数据包。在迁移初期,LTE- advanced系统中会有很多LTE用户。因此,负责为每个新到达的传统LTE用户分配CC的CC选择算法在LTE- advanced系统中变得至关重要。现有的CC选择算法在吞吐量最大化和负载均衡方面可以提供较好的移动蜂窝性能。为了进一步提高LTE-Advanced的性能,本文提出了一种新的CC选择算法,该算法考虑了每个CC中的信道质量和流量负载。仿真结果表明,与传统的CC选择算法相比,该算法可以显著提高下行链路LTE-Advanced的性能。
{"title":"Development of a novel component carrier selection algorithm in Long Term Evolution-Advanced (LTE-A) with Carrier Aggregation","authors":"Mhd Zaher Al Katsha, H. Ramli","doi":"10.1109/SCORED.2016.7810097","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810097","url":null,"abstract":"Carrier Aggregation (CA), which is a method that aggregates multiple Component Carriers (CCs) of the same or different frequency bands, is one of the Long Term Evolution-Advanced (LTE-Advanced) key features. It allows the LTE-Advanced to support wider transmission bandwidth. Another important requirement is that the system needs to support a mixture of LTE-Advanced and the legacy Long Term Evolution (LTE) users simultaneously. The LTE-Advanced users can transmit packets on all of the available CCs whereas the LTE users are limited to transmit packets on a single CC. At the early stage of migration, there will be many LTE users in the LTE-Advanced system. Therefore, CC selection algorithm that is responsible to assign a CC to each newly-arrived legacy LTE users is becoming of paramount importance in the LTE-Advanced system. The existing CC selection algorithms can slightly provide good mobile cellular performance in terms of maximizing the throughput and balancing the load. To further improve the LTE-Advanced performance, this paper proposes a novel CC selection algorithm that takes the channel quality and traffic load in each CC into consideration. It was shown via simulation that the proposed algorithm can significantly improve the downlink LTE-Advanced performance as compared to the conventional CC selection algorithms.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"31 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86503667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-18DOI: 10.1109/SCORED.2016.7810062
Samuel Jia Wei Tang, K. Y. Ng, V. Kalavally, J. Parkkinen
LED lamps for general room lighting is increasingly popular due to their many advantages including their tunability and color mixing abilities over their predecessors of halogen and fluorescent bulbs. Studies have shown that different color lighting have various effects on humans, but room lighting conditions can vary due to LED color shift or other lighting factors. This paper presents a novel closed-loop control algorithm using a typical Android smartphone camera to control an RGB luminaire. When tested in a controlled lab environment, it was able to produce an average chromaticity difference Δu',v' of 0.0225 to the selected colors.
{"title":"Closed-loop color control of an RGB luminaire using sensors onboard a mobile computing system","authors":"Samuel Jia Wei Tang, K. Y. Ng, V. Kalavally, J. Parkkinen","doi":"10.1109/SCORED.2016.7810062","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810062","url":null,"abstract":"LED lamps for general room lighting is increasingly popular due to their many advantages including their tunability and color mixing abilities over their predecessors of halogen and fluorescent bulbs. Studies have shown that different color lighting have various effects on humans, but room lighting conditions can vary due to LED color shift or other lighting factors. This paper presents a novel closed-loop control algorithm using a typical Android smartphone camera to control an RGB luminaire. When tested in a controlled lab environment, it was able to produce an average chromaticity difference Δu',v' of 0.0225 to the selected colors.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"2 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73024937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-01-09DOI: 10.1109/SCORED.2016.7810049
Bismita Choudhury, P. Then, V. Raman, B. Issac, M. K. Haldar
The Cancelable Biometrics is a template protection scheme that can replace a stolen or lost biometric template. Instead of the original biometric template, Cancelable biometrics stores a modified version of the biometric template. In this paper, we have proposed a Cancelable biometrics scheme for Iris based on the Steganographic technique. This paper presents a non-invertible transformation function by combining Huffman Encoding and Discrete Cosine Transformation (DCT). The combination of Huffman Encoding and DCT is basically used in steganography to conceal a secret image in a cover image. This combination is considered as one of the powerful non-invertible transformation where it is not possible to extract the exact secret image from the Stego-image. Therefore, retrieving the exact original image from the Stego-image is nearly impossible. The proposed non-invertible transformation function embeds the Huffman encoded bit-stream of a secret image in the DCT coefficients of the iris texture to generate the transformed template. This novel method provides very high security as it is not possible to regenerate the original iris template from the transformed (stego) iris template. In this paper, we have also improved the segmentation and normalization process.
{"title":"Cancelable iris Biometrics based on data hiding schemes","authors":"Bismita Choudhury, P. Then, V. Raman, B. Issac, M. K. Haldar","doi":"10.1109/SCORED.2016.7810049","DOIUrl":"https://doi.org/10.1109/SCORED.2016.7810049","url":null,"abstract":"The Cancelable Biometrics is a template protection scheme that can replace a stolen or lost biometric template. Instead of the original biometric template, Cancelable biometrics stores a modified version of the biometric template. In this paper, we have proposed a Cancelable biometrics scheme for Iris based on the Steganographic technique. This paper presents a non-invertible transformation function by combining Huffman Encoding and Discrete Cosine Transformation (DCT). The combination of Huffman Encoding and DCT is basically used in steganography to conceal a secret image in a cover image. This combination is considered as one of the powerful non-invertible transformation where it is not possible to extract the exact secret image from the Stego-image. Therefore, retrieving the exact original image from the Stego-image is nearly impossible. The proposed non-invertible transformation function embeds the Huffman encoded bit-stream of a secret image in the DCT coefficients of the iris texture to generate the transformed template. This novel method provides very high security as it is not possible to regenerate the original iris template from the transformed (stego) iris template. In this paper, we have also improved the segmentation and normalization process.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"9 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87287550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-11-07DOI: 10.1109/SCORED.2002.1033040
M. Rodd, A. Miskin, J. Tomlinson
The IEE is actively re-engineering itself to remain, in an Internet-driven era, a premier provider of lifelong career support for its ever-increasing, worldwide membership. To do this, the IEE must provide unique and valued support for academics, teachers, researchers and industrialists at all stages of their careers. The Internet, with its rich potential, offers a wonderful platform on which to deliver this support, but the experience of many professional users is still poor. In particular, the delivery of relevant technical information and educational/training support is still generally relatively unsuccessful. With this mission in mind, the IEE has introduced over thirty fully managed Professional Networks (PNs): Internet-enabled communities, offering access to a wide range of information resources as well as facilities to support community interaction. A wide range of services has been introduced to explore technical capabilities and real costs, as well as to test user acceptance. This paper discusses these experiences and reviews the fundamental issues that are being raised, suggesting where work needs to be undertaken to satisfy these real requirements. In particular, it explores issues of content management, and highlights the need for a range of new techniques.
{"title":"Knowledge management in a multimedia environment: some key research issues","authors":"M. Rodd, A. Miskin, J. Tomlinson","doi":"10.1109/SCORED.2002.1033040","DOIUrl":"https://doi.org/10.1109/SCORED.2002.1033040","url":null,"abstract":"The IEE is actively re-engineering itself to remain, in an Internet-driven era, a premier provider of lifelong career support for its ever-increasing, worldwide membership. To do this, the IEE must provide unique and valued support for academics, teachers, researchers and industrialists at all stages of their careers. The Internet, with its rich potential, offers a wonderful platform on which to deliver this support, but the experience of many professional users is still poor. In particular, the delivery of relevant technical information and educational/training support is still generally relatively unsuccessful. With this mission in mind, the IEE has introduced over thirty fully managed Professional Networks (PNs): Internet-enabled communities, offering access to a wide range of information resources as well as facilities to support community interaction. A wide range of services has been introduced to explore technical capabilities and real costs, as well as to test user acceptance. This paper discusses these experiences and reviews the fundamental issues that are being raised, suggesting where work needs to be undertaken to satisfy these real requirements. In particular, it explores issues of content management, and highlights the need for a range of new techniques.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"29 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75149100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-11-07DOI: 10.1109/SCORED.2002.1033168
C. C. Chew, A. Singh, B. Mohamed, M. Zabidi
The MPEG-2 video standard developed by the Moving Picture Experts Group (MPEG) specifies the coded bit stream for high quality digital video. The encoding of MPEG-2 video needs a lot of processor power and mostly depends on the PC's processor and its clock speed. To makes the encoding process faster and better on the Microsoft Windows platform, a distributed computer system architecture can be implemented. By making use of the existing low cost PC inside computer laboratories with LAN, the video encoding processing can be divided to every PC that is idle and can fully utilize them. When each PC finishes the encoding process, the result is sent back to the main PC that distributes the job. Instead of doing the encoding job alone, distributing the whole encoding job to a few PC or more is much better and faster. It also saves a lot of time in carrying out such a heavy-duty process.
{"title":"Distributed MPEG-2 video encoding on Microsoft Windows platform","authors":"C. C. Chew, A. Singh, B. Mohamed, M. Zabidi","doi":"10.1109/SCORED.2002.1033168","DOIUrl":"https://doi.org/10.1109/SCORED.2002.1033168","url":null,"abstract":"The MPEG-2 video standard developed by the Moving Picture Experts Group (MPEG) specifies the coded bit stream for high quality digital video. The encoding of MPEG-2 video needs a lot of processor power and mostly depends on the PC's processor and its clock speed. To makes the encoding process faster and better on the Microsoft Windows platform, a distributed computer system architecture can be implemented. By making use of the existing low cost PC inside computer laboratories with LAN, the video encoding processing can be divided to every PC that is idle and can fully utilize them. When each PC finishes the encoding process, the result is sent back to the main PC that distributes the job. Instead of doing the encoding job alone, distributing the whole encoding job to a few PC or more is much better and faster. It also saves a lot of time in carrying out such a heavy-duty process.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"56 1","pages":"502-504"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75630159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-11-07DOI: 10.1109/SCORED.2002.1033104
S. Mian, M. Ghassempoory, M. Bentall
The level of complexity in computer networks is rising and the mathematics needed to model the network traffic behaviour is not an exact science. This paper aims to bridge the gap between mathematics and engineering by illustrating some of the problems that exist with conventional traffic modeling, and show how to obtain informative network statistics via mathematical tools such as the Hurst (1951) parameter and the autocorrelation function. We show how aggregated traffic behaves over various time scales and focus on certain protocols to observe their impact on the network at various ingress/egress points on our university network. Furthermore, we present the many analytical tools that are useful in characterising these systems.
{"title":"Mathematical analysis of network traffic","authors":"S. Mian, M. Ghassempoory, M. Bentall","doi":"10.1109/SCORED.2002.1033104","DOIUrl":"https://doi.org/10.1109/SCORED.2002.1033104","url":null,"abstract":"The level of complexity in computer networks is rising and the mathematics needed to model the network traffic behaviour is not an exact science. This paper aims to bridge the gap between mathematics and engineering by illustrating some of the problems that exist with conventional traffic modeling, and show how to obtain informative network statistics via mathematical tools such as the Hurst (1951) parameter and the autocorrelation function. We show how aggregated traffic behaves over various time scales and focus on certain protocols to observe their impact on the network at various ingress/egress points on our university network. Furthermore, we present the many analytical tools that are useful in characterising these systems.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"26 1","pages":"249-252"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74677182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-11-07DOI: 10.1109/SCORED.2002.1033083
S.M. Mokhsin, R.A. Hadi, B.N. Sheikh Rahimullah
This paper describes the design of ANN based rotor speed estimator for separately excited DC motor using MATLAB Toolbox. A comparative analysis of the DC motor drive's behavior with and without ANN based was performed. It is shown that rotor speed feedback by suitably trained ANN enables very good quality of the drive performance over a wide range operating conditions for both open and close loop systems. For the purpose of the training, the Levenberg-Marquardt back-propagation algorithm was used. A standard three layer feed-forward neural network with tan-sigmoid (tansig) activation functions in hidden layer and purelin at the output layer was applied in this design. The result shows that by using only one hidden layer, minimum error can be obtained and the performance of the estimator is excellent. The proposed solution seems to be attractive to the conventional speed estimator, resulting a mechanically simpler motor and consequently increasing the degree of reliability for the whole drive systems.
{"title":"Design of artificial neural network (ANN) based rotor speed estimator for DC drive","authors":"S.M. Mokhsin, R.A. Hadi, B.N. Sheikh Rahimullah","doi":"10.1109/SCORED.2002.1033083","DOIUrl":"https://doi.org/10.1109/SCORED.2002.1033083","url":null,"abstract":"This paper describes the design of ANN based rotor speed estimator for separately excited DC motor using MATLAB Toolbox. A comparative analysis of the DC motor drive's behavior with and without ANN based was performed. It is shown that rotor speed feedback by suitably trained ANN enables very good quality of the drive performance over a wide range operating conditions for both open and close loop systems. For the purpose of the training, the Levenberg-Marquardt back-propagation algorithm was used. A standard three layer feed-forward neural network with tan-sigmoid (tansig) activation functions in hidden layer and purelin at the output layer was applied in this design. The result shows that by using only one hidden layer, minimum error can be obtained and the performance of the estimator is excellent. The proposed solution seems to be attractive to the conventional speed estimator, resulting a mechanically simpler motor and consequently increasing the degree of reliability for the whole drive systems.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"94 1","pages":"165-168"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73585542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-11-07DOI: 10.1109/SCORED.2002.1033112
T. Hock, M. Shah bin Majid, H. Abd Rahman
In order to ensure the success of energy efficiency standards and labeling program, a detailed consumer analysis of the room air conditioner market should be carried out. It is essential to know what factors influence preferences for room air conditioner, so that a program can be devised to increase the market share for an energy efficient room air conditioner. Previous researchers typically have used attitude and opinion surveys to investigate consumers' perceived importance of product attributes. However, these approaches do not require consumers to trade-off among different attributes. In this study, conjoint analysis was used to analyze consumers' preferences for room air conditioners described by a set of 5 attributes, examining the relative importance as well as the trade-off among these attributes. Among all attributes, price is the most important factor in purchasing a room air conditioner. However, different consumer groups attach different relative importance to these attributes was observed.
{"title":"Consumer preferences for energy efficient room air conditioner in Malaysia: a conjoint approach","authors":"T. Hock, M. Shah bin Majid, H. Abd Rahman","doi":"10.1109/SCORED.2002.1033112","DOIUrl":"https://doi.org/10.1109/SCORED.2002.1033112","url":null,"abstract":"In order to ensure the success of energy efficiency standards and labeling program, a detailed consumer analysis of the room air conditioner market should be carried out. It is essential to know what factors influence preferences for room air conditioner, so that a program can be devised to increase the market share for an energy efficient room air conditioner. Previous researchers typically have used attitude and opinion surveys to investigate consumers' perceived importance of product attributes. However, these approaches do not require consumers to trade-off among different attributes. In this study, conjoint analysis was used to analyze consumers' preferences for room air conditioners described by a set of 5 attributes, examining the relative importance as well as the trade-off among these attributes. Among all attributes, price is the most important factor in purchasing a room air conditioner. However, different consumer groups attach different relative importance to these attributes was observed.","PeriodicalId":6865,"journal":{"name":"2016 IEEE Student Conference on Research and Development (SCOReD)","volume":"1 1","pages":"282-285"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78435359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}