2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW)最新文献

筛选
英文 中文
Channel estimation for MIMO-OFDM systems MIMO-OFDM系统的信道估计
Shahid Manzoor, Adnan Salem Bamuhaisoon, Ahmed Nor Alifa
{"title":"Channel estimation for MIMO-OFDM systems","authors":"Shahid Manzoor, Adnan Salem Bamuhaisoon, Ahmed Nor Alifa","doi":"10.1109/NSITNSW.2015.7176415","DOIUrl":"https://doi.org/10.1109/NSITNSW.2015.7176415","url":null,"abstract":"Channel estimation is a very important process in the operation of MIMO-OFDM systems, as it is vital for accurately estimating the Channel Impulse Response (CIR) of the channel under various conditions. As such, it is useful to have a Matlab®/ Simulink to model the behavior of the channel estimation process in a MIMO-OFDM system, in order to study the error rate of the system under different modulation and SNR conditions. As one of the most common transmitter diversity schemes used in MIMO-OFDM systems is Alamouti's Space Time Block Code (STBC), a Simulink model is developed for performing channel estimation, assuming that the STBC is used. The model will then generate graphs of error rates vs SNR for different modulation schemes. The results show great improvement in Bit Error Rate (BER) by utilizing a Reed-Solomon Forward Error Correction code (RS-FEC) method.","PeriodicalId":171137,"journal":{"name":"2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115390450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Container based virtual honeynet for increased network security 基于容器的虚拟蜜网,提高网络安全性
Nogol Memari, S. J. Hashim, K. Samsudin
{"title":"Container based virtual honeynet for increased network security","authors":"Nogol Memari, S. J. Hashim, K. Samsudin","doi":"10.1109/NSITNSW.2015.7176410","DOIUrl":"https://doi.org/10.1109/NSITNSW.2015.7176410","url":null,"abstract":"Honeynet represents a new strategy in defending the computer networks and systems against unauthorized access or hacking attempts. Not only it can detect and display the attack pattern or the tools utilized, it can also help in eliminating access to real systems by representing an emulation of the physical systems and services present within the network, thus delaying or confusing the intruder. In this paper we provide an overview of a lightweight container based deployment that emulates popular Linux and Windows services to unsuspecting intruders. Results show the real world attacks against the deployed system.","PeriodicalId":171137,"journal":{"name":"2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123085406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of a efficient energy generating system using speed breaker for Bangladesh 孟加拉国采用减速机的高效发电系统设计
Md. Hossam-E.-Haider, M. Rokonuzzaman
{"title":"Design of a efficient energy generating system using speed breaker for Bangladesh","authors":"Md. Hossam-E.-Haider, M. Rokonuzzaman","doi":"10.1109/NSITNSW.2015.7176393","DOIUrl":"https://doi.org/10.1109/NSITNSW.2015.7176393","url":null,"abstract":"In order to meet the future electricity demand without harming the environment, it is necessary to focus more on renewable energy and unconventional sources for electricity generation. The utilization of waste energy can also be helpful for reducing dependence on conventional sources for electricity generation. In this paper, the electricity generation by utilizing the kinetic energy of moving vehicles over speed breaker is presented. The proposed system is designed to extract the kinetic energy of moving vehicles which converts into mechanical energy through rack and pinion mechanism. The mechanical energy drives the shaft which acts as prime mover for DC generator. A proto type model of the proposed system has presented in this paper which needs modification for large scale electricity generation.","PeriodicalId":171137,"journal":{"name":"2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125365812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Site suitability analysis for landslide monitoring base station using GIS-based multicriteria evaluation technique 基于gis的滑坡监测基站选址适宜性分析
I. S. Mustafa, N. M. Din, A. Ismail, R. C. Omar, N. H. N. Khalid
{"title":"Site suitability analysis for landslide monitoring base station using GIS-based multicriteria evaluation technique","authors":"I. S. Mustafa, N. M. Din, A. Ismail, R. C. Omar, N. H. N. Khalid","doi":"10.1109/NSITNSW.2015.7176414","DOIUrl":"https://doi.org/10.1109/NSITNSW.2015.7176414","url":null,"abstract":"Landslide monitoring of power transmission towers in the rural areas is a challenging process especially if the slope is at a mountainous terrain and suspected to be insecure and risky. Identification of suitable locations for the landslide monitoring base station is one of the critical issues of network planning. Site suitability analysis has become unavoidable for delineating the appropriate site for planning initiatives, especially in the undulating terrain of the hills. It is important to determine the right location and to decide the optimal network equipment for remote monitoring applications. The study illustrates the use of geographic information system (GIS) and multicriteria evaluation (MCE) technique for selection of suitable sites for landslide monitoring base stations along the transmission tower line in Cameron Highland. Four criteria have been selected for site suitability analysis of the antenna base station (BS) which is tower distance, elevation, communication service coverage and slope. The generated thematic maps of these criteria were standardized using pairwise comparison matrix known as analytical hierarchy process (AHP). A weight for each criterion was generated by comparing them with each other according to their importance. With the help of these weights and criteria, the final site suitability map was prepared.","PeriodicalId":171137,"journal":{"name":"2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW)","volume":"46 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using cloud computing to improve network operations and management 利用云计算改善网络运营和管理
Shakir Khan, Ahmad S. Al-Mogren, M. Alajmi
{"title":"Using cloud computing to improve network operations and management","authors":"Shakir Khan, Ahmad S. Al-Mogren, M. Alajmi","doi":"10.1109/NSITNSW.2015.7176418","DOIUrl":"https://doi.org/10.1109/NSITNSW.2015.7176418","url":null,"abstract":"Virtualization technology in the form of cloud computing is on progressive deployment as more companies adopt it. The innovative technology and its adoption, however, have something in common: reducing challenges associated with managing the operations of conventional in-house systems in firms. This is because, in the conventional form of computing, companies require dedicated IT resources to manage all systems (Networks, Hardware, Software, and IT Services). However, with cloud networking, the cloud network provider thereby offloading internal IT workers to focus on other useful IT functions handles the work of network operations and management. The benefits of using cloud networking cannot be overstated. They include improved security, productivity, scalability, mobility, cost management, and system updating among others. The cloud administrators ensure that the management of fault, accounting, performance, security and configuration are handled for all cloud clients, which allows companies work without worrying about them anymore. The proposed hybrid cloud model ensures maximum benefits from virtualization, fault tolerance, and cost reduction. The model promotes realtime and anywhere access to applications in the cloud with improved performance and reduced overhead costs on scheduling.","PeriodicalId":171137,"journal":{"name":"2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124078092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Synchronization competitive processes of flexible manufacturing system using siphons Petri net 基于虹吸Petri网的柔性制造系统竞争过程同步研究
Mowafak Hassan Abdul-Hussin
{"title":"Synchronization competitive processes of flexible manufacturing system using siphons Petri net","authors":"Mowafak Hassan Abdul-Hussin","doi":"10.1109/NSITNSW.2015.7176395","DOIUrl":"https://doi.org/10.1109/NSITNSW.2015.7176395","url":null,"abstract":"The synchronization competitive processes of the modeling and design of Flexible Manufacturing System (FMS) is propose to solve the deadlock problem for a class of Petri nets, which is used Systems of Simple Sequential Processes with Resources (S3PR) net. In this paper presents a deadlock prevention method of a class of FMS, where the unmarked siphon in their Petri net models causes the deadlocks. Siphons are dividing into elementary and dependent ones. An FMS example is using to represent our application of the proposed deadlock prevention policy, also the competitive processes is provided in S3PRs to show its excellent efficiency. The monitors are using to prevent the presence of unmarked siphons that are direct causes of deadlocks in such a Petri net. The mathematical computations siphon of Petri net is leading to liveness-enforcing Petri net supervisors with behavior that is more permissive. Petri nets are a modeling and simulation formalism for describing concurrency and synchronization in distributed of FMS.","PeriodicalId":171137,"journal":{"name":"2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130248660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Smart mobile robot for security of low visibility environment 用于低能见度环境安全的智能移动机器人
M. Faisal, H. Mathkour, M. Alsulaiman
{"title":"Smart mobile robot for security of low visibility environment","authors":"M. Faisal, H. Mathkour, M. Alsulaiman","doi":"10.1109/NSITNSW.2015.7176432","DOIUrl":"https://doi.org/10.1109/NSITNSW.2015.7176432","url":null,"abstract":"The field of robotics has apparently appeared to replace jobs that humans usually dislike to do, jobs that have low tolerance for faults and risks or jobs for which human resource is not available. For these reasons, many types of robot have appeared, such as man-like robots, car-like robots and mobile robots. Mobile robots have become a target for many applications, such as security patrolling, manufacturing, materials handling in the warehouse, and many others applications. In the last decade, mobile robots have become an important topic in the security field. Several methods have been introduced to deal with mobile robot and security. Nevertheless, most of these methods are not smart enough to work in low visibility environments. In this paper, we are going to introduce a novel smart security system, which uses a mobile robot as a security patrol in dark environment. The proposed system is a non-vision based system and designed to deal with the dark environments using artificial intelligence methods (Neural Network NN and Fuzzy Logic FL). The proposed system includes a motion control model, which is responsible for the navigation operation in the monitoring area. The NN and FL techniques are used to smartly determine the abnormal situation in the monitoring area. Many levels of alarms are used to tackle the deferent level of dangers.","PeriodicalId":171137,"journal":{"name":"2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121900652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Smart fuzzy querying based on user's profile and context: A critical care planning system case study 基于用户档案和上下文的智能模糊查询:重症监护计划系统案例研究
Firas Saidi, J. Akaichi
{"title":"Smart fuzzy querying based on user's profile and context: A critical care planning system case study","authors":"Firas Saidi, J. Akaichi","doi":"10.1109/NSITNSW.2015.7176404","DOIUrl":"https://doi.org/10.1109/NSITNSW.2015.7176404","url":null,"abstract":"Due to the hugeness of information stored in Web-databases, an overload phenomenon is often comes across when looking for sought after data. This phenomenon arises for instance when users, for example potential mobile physicians searching for adequate health care institutions for their patients in emergency cases, submit queries to old-fashioned recommender systems. To overcome this problem, we propose a new type of recommender systems that take both user profile and contextual preferences into account in order to retrieve and provide the best items to users' interrogations. In this work, we use gradual queries which are based on fuzzy sets to model user's preferences and context and a fuzzy inference machine to deduct new preferences. A case study related to a health care retrieval system is used to illustrate our proposal.","PeriodicalId":171137,"journal":{"name":"2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134338654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One time password authentication scheme based on elliptic curves for Internet of Things (IoT) 基于椭圆曲线的物联网一次性密码认证方案
V. Shivraj, M. Rajan, M. Singh, P. Balamuralidhar
{"title":"One time password authentication scheme based on elliptic curves for Internet of Things (IoT)","authors":"V. Shivraj, M. Rajan, M. Singh, P. Balamuralidhar","doi":"10.1109/NSITNSW.2015.7176384","DOIUrl":"https://doi.org/10.1109/NSITNSW.2015.7176384","url":null,"abstract":"Establishing end-to-end authentication between devices and applications in Internet of Things (IoT) is a challenging task. Due to heterogeneity in terms of devices, topology, communication and different security protocols used in IoT, existing authentication mechanisms are vulnerable to security threats and can disrupt the progress of IoT in realizing Smart City, Smart Home and Smart Infrastructure, etc. To achieve end-to-end authentication between IoT devices/applications, the existing authentication schemes and security protocols require a two-factor authentication mechanism. Therefore, as part of this paper we review the suitability of an authentication scheme based on One Time Password (OTP) for IoT and proposed a scalable, efficient and robust OTP scheme. Our proposed scheme uses the principles of lightweight Identity Based Elliptic Curve Cryptography scheme and Lamport's OTP algorithm. We evaluate analytically and experimentally the performance of our scheme and observe that our scheme with a smaller key size and lesser infrastructure performs on par with the existing OTP schemes without compromising the security level. Our proposed scheme can be implemented in real-time IoT networks and is the right candidate for two-factor authentication among devices, applications and their communications in IoT.","PeriodicalId":171137,"journal":{"name":"2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122803207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
IR coding design and implementation for autonomous in-door mobile robot localization 自主室内移动机器人定位的红外编码设计与实现
T. O. Barayyan
{"title":"IR coding design and implementation for autonomous in-door mobile robot localization","authors":"T. O. Barayyan","doi":"10.1109/NSITNSW.2015.7176424","DOIUrl":"https://doi.org/10.1109/NSITNSW.2015.7176424","url":null,"abstract":"This paper proposes a new design for in-door autonomous artificial landmark, named IR Coding. The main objective of using this design is to offer auto-calibration for mobile robot, and reduce the computational and hardware cost. Also, the design does not require any start-up configurations. Moreover, a numerical sequence can be obtained from the IR coding directly rather than computing it by the robot which is useful in detecting different kinds of error like miss-reading and missing landmark error. Furthermore, a comparison is done between other artificial landmark designs and IR coding in order to show the advantages of IR coding design.","PeriodicalId":171137,"journal":{"name":"2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133701289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书