This Tomato Maturity Estimator is developed to conduct tomato color grading using machine vision to replace human *** machine has not been widely applied in Malaysia since the cost is too *** major problem in tomato c...
详细信息
This Tomato Maturity Estimator is developed to conduct tomato color grading using machine vision to replace human *** machine has not been widely applied in Malaysia since the cost is too *** major problem in tomato color grading by human vision was due to the subjectivity of human vision and error prone by visual stress and ***,this system is carried out to judge the tomato maturity based on their color and to estimate the expiry date of tomato by their *** methodology was implemented in this system design by using several image processing techniques including image acquisition,image enhancement and feature *** sample data of tomatoes were collected during image acquisition phase in the format of RGB color *** quality of the collected images were being improved in the image enhancement phase;mainly converting to color space format(Lab),filtering and threshold *** the feature extraction phase,value of red-green is being *** values are then being used as information for determining the percentage of tomato maturity and to estimate expiry date of *** to the testing results,this system has met its objectives whereby 90.00% of the tomato tested has not rotten *** indicates that the judgment of tomato maturity and the estimation of tomato's expiry date were accurate in this project.
The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information Technology Department (ITD), M...
详细信息
ISBN:
(纸本)9781424451012
The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information Technology Department (ITD), Medical Record Department (MRD) and X-Ray Department in one of the leading government supported hospital in Malaysia. The hospital was equipped with Total Hospital Information System (THIS) environment. The data were collected using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The result shows the most critical threat for the THIS is the power failure. In addition, acts of human error or failure threat also show high frequency of occurrence. The contribution of the paper will be categorization of threats in HIS and can be used to design and implement effective security systems and policies in healthcare setting.
Search engines on the Web have popularized the keyword-based search paradigm, while searching in databases users need to know a database schema and a query language. Keyword search techniques on the Web cannot directl...
详细信息
Search engines on the Web have popularized the keyword-based search paradigm, while searching in databases users need to know a database schema and a query language. Keyword search techniques on the Web cannot directly be applied to databases because the data on the Internet and database are in different forms. So keyword search systems in relational databases have recently proposed. However existing systems limit type of keywords to database value terms, and generally assumed that answers are in instance level. Thus, this research aims to propose an effective approach for free-form keyword searching in databases which allows users to search either with database value terms, metadata terms or user terms. The metadata model accommodates these terms as well as underlying database semantics. Moreover, we present a branch and bound algorithm used for finding the optimal answer graphs. Our preliminary experiment results confirm precision of our approach.
The purpose of this paper is to present a new size metric for business process *** metric aims to measure size of process from use case *** metric consists of four series to support four perspectives of business proce...
详细信息
The purpose of this paper is to present a new size metric for business process *** metric aims to measure size of process from use case *** metric consists of four series to support four perspectives of business process:functional,behavioral,informational and *** addition,the guidance for pointing to related use case elements is included in each *** this paper,each size of perspective which measured from the new metric can use for indicating the number of business process elements are represented by UML-activity *** the example of the metric is only one,it is possible to apply for another modeling method such as BPMN,Petri Net and EPC.
Design patterns are applied to solve the recurring software design problems,Unfortunately,choosing appropriate design patterns for the specific design problem is considered a difficult task.A search tool is,therefore,...
详细信息
Design patterns are applied to solve the recurring software design problems,Unfortunately,choosing appropriate design patterns for the specific design problem is considered a difficult task.A search tool is,therefore,needed to supports selection,However,the existing design pattern searching methodologies generally have problems on keywordsearch *** this paper,we proposed an initial model to solve the problem by using Case-Based Reasoning(CBR) and Formal Concept Analysis(FCA).For the proposed model,a case base is created to represent design *** is used to be case organization that analyze case base for obtain knowledge embedded,The knowledge can suggest suitable indexes to use for new *** method is beneficial for learning index,This paper discusses the basis theoretical of representation and retrieval design patterns for this inprogress research,along with some preliminary result.
software developers currently find design patterns through search tools for solving software design problem. However, these search tools still have keyword-search problem. In this paper, we introduce the elementary id...
详细信息
ISBN:
(纸本)9781424452446
software developers currently find design patterns through search tools for solving software design problem. However, these search tools still have keyword-search problem. In this paper, we introduce the elementary idea to improve the design pattern retrieval tool. We propose the combination of case based reasoning (CBR) and formal concept analysis (FCA). Because of CBR lead to the smart solution and FCA provides flexible way to maintain indexing in the case base.
We illustrate the effective use of ATIM (ad hoc traffic indication message) window in static sensors to obtain potential energy savings for sensors during data dissemination in wireless sensor networks. The network co...
详细信息
We illustrate the effective use of ATIM (ad hoc traffic indication message) window in static sensors to obtain potential energy savings for sensors during data dissemination in wireless sensor networks. The network consists of resource-rich mobile sink node and resource-constrained sensor nodes forming a square grid. Sink may be multihop away from the sensor nodes and in order to collect the data, it moves to the vicinity of the sensor nodes in the grid. Each sensor node in the grid uses an ATIM window and sleeps during that time to conserve energy. The sleeping sensor node wakes up at regular interval of time to read the beacon messages. If the message comes from sink, sensor node immediately reads the header part of query packet to check whether it is the targeted sensor. The targeted sensor further reads the remaining part of query packet and responds back to the sink with requested data. The rest of the sensor nodes just ignore the remaining part of the query packet and go to sleep mode. If the message comes from the peer sensor node, the neighbor nodes just ignore it. We consider an affordable wireless network system with four sensor nodes and one mobile sink. Mobile sink transfers the collected data directly to the control station.
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which in...
详细信息
ISBN:
(纸本)9781424451012
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which interest them (e.g., virus attack). Certain factors which may be important remain unexplored. In addition, lack of tools and technologies directed to limited number of threats traced in healthcare system. Thus it introduces bias in threat analysis. This study explored the use of biological computational termed Genetic Algorithm (GAs) combined with Cox regression (CoRGA) in identifying a potential threat for healthcare system. The results show that variable described “misused of e-mail” is the major information security threats for healthcare system. Results were compared with manual analysis using the same data, and it is shows that GAs not just introducing new threats for healthcare system but it was similar with others threats proposed by previous researches.
Since after the historical moment of Malaysia Independence Day on the year of 1957, the government had been trying hard in order to find the most efficient methods in learning. However, it is hard to actually access a...
详细信息
Since after the historical moment of Malaysia Independence Day on the year of 1957, the government had been trying hard in order to find the most efficient methods in learning. However, it is hard to actually access and evaluate students whom will then be called an excellent student. It because in our realtime student who excellent is only excel in academic. This evaluation become a problem because it not balance in our real life interm of to get an excellent student in whole area in their involvement of curiculum and co-curiculum. To overcome this scenario, we proposed a method called Student Idol to evaluate student through three categories which are academic, co-curiculum and leadership. All the categories have their own merit point. Using this method, student will be evaluated more accurate compared to the previously. So, teacher can easily evaluate their student without having any emotion factor, relation factor and others. As conclustion this method will helps student evaluation more accurate and valid.
In this research,we present the development of Building Submission Checklist System (BuSCLI).The objective of developing BuSCLI is to simplify the management of submission of building plan approval through online syst...
详细信息
In this research,we present the development of Building Submission Checklist System (BuSCLI).The objective of developing BuSCLI is to simplify the management of submission of building plan approval through online system for the Local Authority (LA) or State Town and Country Planning in *** minimize human contacts thus provide fast,efficient,transparent and effective service to contractor,engineer and *** and web base method applied in this system with combination of PHP and MySQL as *** this system can facilitate user by computerized all the form accordance to the building categories,submission,endorsement or approval through online.
暂无评论