{"title":"Forming virtualized test bed for Trusted Platform Module in Windows environment","authors":"Mohd Ameer Yuslan Razmi, H. Hashim","doi":"10.1109/ICCAIE.2011.6162213","DOIUrl":"https://doi.org/10.1109/ICCAIE.2011.6162213","url":null,"abstract":"The remarkable growth in usage of Trusted Platform Module (TPM) nowadays leads researchers to build various test bed to perform the emulation of TPM hardware which can reduce physical devices needed to perform research involving TPM implementation. Current test bed formations are more focusing on using UNIX as the platform such as Linux. This is due to the flexibility and openness of the UNIX based platform itself. Even though UNIX is flexible, Microsoft Windows is still the preferred Operating System (OS) in the world. Due to its popularity, there is a rapid shift in security threats towards Windows platform every day. In this paper, we explore an approach to form a virtualized test bed for TPM implementation using TPM Emulator in Windows. This paper mainly focuses on forming an improved virtualized test bed in Windows while preserve required components to build a working test bed for TPM implementation.","PeriodicalId":132155,"journal":{"name":"2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127744258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance enhancement of SAC-OCDMA system using modified-AND subtraction detection","authors":"H. M. Al-Khafaji, S. Aljunid, H. Fadhil","doi":"10.1109/ICCAIE.2011.6162170","DOIUrl":"https://doi.org/10.1109/ICCAIE.2011.6162170","url":null,"abstract":"Technology is already on the move towards exploiting the limits of the fiber's physical properties and more sophisticated techniques will be needed to increase the throughput and counteract the transmission impairments. In this paper, we present a new detection technique called the modified-AND subtraction detection for spectral-amplitude coding optical code-division multiple access (SAC-OCDMA) systems. This detection technique is based upon decreasing the received signal strength to the decoder's branches by dividing the weight of the utilized code sequence. The new technique is capable of mitigating the intensity and shot noise impacts, as well as eliminating the multiple access interference (MAI) influence. We simulate the system performance of the proposed detection technique using OptiSystem 9.0 software. The entire practical effects of fiber nonlinearities, dispersion and attenuation were considered in the simulation of SAC-OCDMA system. Based on modified double-weight (MDW) code, the simulation results revealed that the modified-AND subtraction detection improves SAC-OCDMA system performance significantly compared to the conventional AND subtraction detection.","PeriodicalId":132155,"journal":{"name":"2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126232184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric authentication for securing life cycle management of electronic patient records","authors":"Mohd Idzwan Mohd Salleh, M. Rosman, R. Yaacob","doi":"10.1109/ICCAIE.2011.6162205","DOIUrl":"https://doi.org/10.1109/ICCAIE.2011.6162205","url":null,"abstract":"Biometrics has been increasingly utilized in the present situation by the numerous industries for strengthening the security access to any form of information system. From the benefits offered despite reducing the problems of security breaches those in network, theft or fraud, there is a necessity for embedding biometric authentication into traditional medical records systems. As a new approach of converting paper-based to electronic, more secure authentication and verification functions provided by biometrics may permit the medical practitioners to access, consult and update patients' medical information via their desktop, laptop or palmtop PCs from multiple locations simultaneously. With a minimum cost, the paper highlighted the analysis and design of a system prototype equipped with fingerprint and online signature biometrics to secure life cycle management of electronic patient records toward attaining trusted records management and transparency of medical services.","PeriodicalId":132155,"journal":{"name":"2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116392691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. So-In, Chinnakorn Netphakdee, Kasidit Wijitsopon, Chavalit Panichayanubal, Pusadee Seresangtakul
{"title":"Web-based automatic network discovery/Map Systems","authors":"C. So-In, Chinnakorn Netphakdee, Kasidit Wijitsopon, Chavalit Panichayanubal, Pusadee Seresangtakul","doi":"10.1109/ICCAIE.2011.6162171","DOIUrl":"https://doi.org/10.1109/ICCAIE.2011.6162171","url":null,"abstract":"This paper introduces a new automatic network discovery/map system via Web architecture, the so-called Web-based Automatic Network discovery/Map Systems (WANMS). The system functions as a plug-in for a wellknown network management system, Cacti. Enriched features, especially the automatic networking discovery and map module, have been added in order to enhance the efficiency of Cacti embedded with a weather map plug-in. With user defined-pattern functions, the discovery process recognizes a proper type of networking devices. The discovery process generates XML-based information so that a graph visualization using jQuery via HTML5 can generate a simplified network map using a force-directed layout technique. WANMS is easy-to-use and less complicated, and so lessening the discovery time. In particular, for performance comparison with OpenMMS and DNMA, WANMS outperforms others in several perspectives, i.e., faster convergence, better coverage, and more details of types of networking devices. The system is presently used at the department of Information Technology, Provincial Police Region 4, Thailand.","PeriodicalId":132155,"journal":{"name":"2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114530515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simple schemes of remote alerting by fire and intruder detection: A proposal favoring home security","authors":"A. Cellatoglu, K. Balasubramanian","doi":"10.1109/ICCAIE.2011.6162104","DOIUrl":"https://doi.org/10.1109/ICCAIE.2011.6162104","url":null,"abstract":"A fire detector circuit kept in home triggers the landline telephone to dial automatically the alternative cellular phone of the resident. If he is inside the home, this alarm alerts him to operate the fire extinguisher manually. If he is away he dials back to the home telephone number with an additional digit to trigger ON the fire extinguisher. By dialing further digits he can switch off selected electrical appliances which might have activated the fire. Also, an intruder detector circuit incorporated with the telephone automatically dials digits to reach a public emergency service and upon receiving the response the attachment unit extends a recorded voice message to the called end informing about the intrusion. As these are simple means of maintaining the home security they can easily be adopted to any environment. Alternatively, with cell phone installed in home for this purpose the above techniques are implemented. This design has more security concerns as a microcontroller checks password and allows the switching process of appliances to take place. As public emergency service is reachable confidently by telephone this method is preferred amongst other possible approaches.","PeriodicalId":132155,"journal":{"name":"2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125968223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SINR based Media Independent Handover in WiMAX and WLAN networks","authors":"Ammar A. Bathich, M. D. Baba, R. Ab Rahman","doi":"10.1109/ICCAIE.2011.6162155","DOIUrl":"https://doi.org/10.1109/ICCAIE.2011.6162155","url":null,"abstract":"Subscribers are becoming more demanding regarding roaming capabilities across different networking technologies such as WLAN, WiMAX, and CDMA as they claim service continuity with QoS requirement and good security features. To achieve seamless handover between different access technologies is a great challenge as it needs to obey different performance of QoS and security constraints. Heterogeneous handover requires collecting network information from different entities that are not necessarily interoperable and then applying optimized policies to execute the appropriate handover decision and processing them. In this paper, a QoS based vertical handover mechanism between WiMAX and WLAN networks is proposed by applying the Signal to Interference and Noise Ratio (SINR). The Media Independent Handover (MIH) (IEEE 802.21) protocol is adopted to assist in the handover decisions by providing a suitable platform for vertical handovers.","PeriodicalId":132155,"journal":{"name":"2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122124716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of iris recognition using low resolution iris image for attendance monitoring","authors":"Teh Wei Hsiung, Shahrizat Shaik Mohamed","doi":"10.1109/ICCAIE.2011.6162207","DOIUrl":"https://doi.org/10.1109/ICCAIE.2011.6162207","url":null,"abstract":"The biometric identification system is one of the technology used in the recognition system. Iris recognition system is the most reliable system for an individual identification. Nowadays, many applications have been implemented with this feature such as the time attendance system for high security environment, hospitals, airports, government agencies, educational facilities, and etc. The conventional method applied on the security is not reliable such as the passwords may be forgotten or hacked and ID cards may be lost or forged. The main purpose of this project is to achieve good quality performance of iris recognition using low resolution image for attendance monitoring system. This project apply two existing methods which are Hough Transform and Daugman's Integro Differential Operator to identify the best technique of iris detection using low resolution image as input. The results show that these techniques capable to recognize the low resolution iris with the accuracy of 100% when applied Hough Transform compared to the Daugman's Integro Differential Operator with only 86.88%.","PeriodicalId":132155,"journal":{"name":"2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121466767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UAV-based stereo vision for photogrammetric survey in aerial terrain mapping","authors":"K. N. Tahar, A. Ahmad, W. Wan Mohd Akib","doi":"10.1109/ICCAIE.2011.6162176","DOIUrl":"https://doi.org/10.1109/ICCAIE.2011.6162176","url":null,"abstract":"Recently, Unmanned Aerial Vehicle (UAV) technology is becoming useful to solve problems in many applications. The aim of this study is to investigate the use of light weight rotary-wing UAV for mapping simulation model. The objective of this study is to determine the accuracy of the photogrammetric output. This study only concentrates on one type of rotor-wing UAV. It is because rotor-wing units are more stable and able to capture images easily. It allows remote control UAV to be practiced in any environment and urban mapping. In the simulation model, ground control points (GCP) and checked point (CP) were established using total station. The GCP is used in the photogrammetric processes to produce photogrammetric output while the CP is used for accuracy assessment. A Nikon Coolpix consumer digital camera was used for images acquisition of the simulation model where two methods were used. In the first method, the camera was mounted vertically in a rotary-wing UAV and captured the images at an altitude. In the second method, the camera is mounted vertically at a fixed height. The acquired images were processed using photogrammetric software to produce orthophoto and digital elevation model of the simulation model. From this study, it was found that root mean square errors for fixed platform are ±0.002m, ±0.001m, ±0.214m for coordinate x, y and z respectively while the root mean square errors for mobile platform are ±0.002m, ±0.002m, ±0.223m for coordinate x, y and z respectively. It can be concluded that the differences between the mobile and fixed platforms are not significant. In conclusion, UAV system can be used for large scale mapping for aerial terrain mapping.","PeriodicalId":132155,"journal":{"name":"2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE)","volume":"63 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132737349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A modular system of Deep Level Transient Spectroscopy","authors":"N. Rusli, D. Debuf","doi":"10.1109/ICCAIE.2011.6162137","DOIUrl":"https://doi.org/10.1109/ICCAIE.2011.6162137","url":null,"abstract":"Deep Level Transient Spectroscopy (DLTS) is a technique to determine the electrical characteristics of an electrically active defect in a semiconductor. A measurement system is developed to detect defects in a semiconductor in a LabView environment. A more accurate method namely Fundamental Frequency Deep Level Transient Spectroscopy (FFDLTS) is proposed as one of the methods to analyze the defect level depth.","PeriodicalId":132155,"journal":{"name":"2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132909920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power spectra based classification of cancerous nevoscope skin images","authors":"N. Dhinagar, M. Celenk","doi":"10.1109/ICCAIE.2011.6162145","DOIUrl":"https://doi.org/10.1109/ICCAIE.2011.6162145","url":null,"abstract":"This paper describes a new method to discriminate between benign and malignant skin cancer samples obtained from the nevoscope which is one of the most commonly used skin imaging apparatus amidst an array of others including the electron microscope and the spectrometer. Although there have been various approaches in the literature proposed for skin cancer detection, they lack from not being very robust to noise and variations in the input images and the effective computational cost. In particular, the work done in [1] makes use of basic feature extraction and an expert system to help in differentiating the skin samples. It involves extraction of many different features and human intervention. In this paper we propose a new approach to skin cancer classification problem based on power spectrum estimation in the frequency domain and demonstrates that significant changes between the two classes can be derived. The periodogram is a means for the spectrum estimation and effectively utilized here in. In the implementation, periodograms of sampled windows of the two classes, benign and malignant skin lesions, are compared to classify them in their respective classes. This is achieved by observing the variations in different window sizes for sampling and determining the most discriminative window size, respectively. The experimental results show that power spectra based classification of cancerous nevoscope skin images is an effective means (i.e almost 97% accurate classification) of non-invasively detecting skin cancer with potential applications in biomedical imaging and related technologies(eg. preventive health care, biopsy, dermatology, etc.).","PeriodicalId":132155,"journal":{"name":"2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122119808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}