{"title":"Human Localization by acceleration sensors located on the floor in a home environment","authors":"K. Oguchi, Shun Kawamoto, Y. Taniura","doi":"10.1109/ICSGRC.2017.8070601","DOIUrl":"https://doi.org/10.1109/ICSGRC.2017.8070601","url":null,"abstract":"Recent advances in information communication technologies have yielded a variety of new services. Location based services are attractive as they offer so many new functionalities. However, if they are used indoors, location recognition is essential because the global positioning system, the preferred choice outdoors, cannot be used indoors. Therefore, this paper proposes an indoor human location recognition method that uses the vibration signals captured by acceleration sensors placed on the floor. The user does not wear any device. Preliminary experiments show that signal magnitude corresponds to the distance between the sensor and the point of pressure which indicates the feasibility of the proposal. Another experiment with walking subjects showed that for subject-sensor distances of 1 to 5 m, the proposed method could recognize subject location with 68 % accuracy at distances of 1 m or better tolerance and 87 % at distances of 2 m or better tolerance. These results verify the feasibility of the proposed system.","PeriodicalId":182418,"journal":{"name":"2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120950746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ahsan, M. Sabilah, Md Abdullah Al Imran, M. Idris
{"title":"Searchable encryption using polynomial function and modular arithmetic","authors":"M. Ahsan, M. Sabilah, Md Abdullah Al Imran, M. Idris","doi":"10.1109/ICSGRC.2017.8070589","DOIUrl":"https://doi.org/10.1109/ICSGRC.2017.8070589","url":null,"abstract":"With the advent of cloud computing more and more IT and business organizations are migrating to cloud for its entrancing features of computing and storage infrastructure. At the same, security, privacy of cloud computing is not at satisfactory level. To make things worse, clouds inherent nature brought new set of security issues. Specially, the cloud storage causes dilemma between two important factors: confidentiality and search facility. To preserve the confidentiality of data, user encrypts before outsourcing to cloud which deters user to search on encrypted data. An appropriate solution to the problem is searchable encryption (SE). In this paper, we study existing schemes of SE and enlist two security requirements: secure tag (or trapdoor) irreversibility and dynamic update of index. Lastly, we propose a searchable encryption scheme based on polynomial function and modular arithmetic. Our security analysis shows that, proposed scheme holds the necessary properties for SE.","PeriodicalId":182418,"journal":{"name":"2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121466370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chin-Kit Ng, S. Cheong, Erfan Hajimohammadhosseinmemar, Wen-Jiun Yap
{"title":"Mobile outdoor parking space detection application","authors":"Chin-Kit Ng, S. Cheong, Erfan Hajimohammadhosseinmemar, Wen-Jiun Yap","doi":"10.1109/ICSGRC.2017.8070573","DOIUrl":"https://doi.org/10.1109/ICSGRC.2017.8070573","url":null,"abstract":"Finding a vacant parking space in outdoor parking lots is a daily concern of most vehicle drivers during rush hours, especially in the urban context. In this paper, an outdoor parking space vacancy detection system is proposed, using mobile devices to improve parking space searching experience for vehicle drivers by providing them with the location and occupancy information of parking spaces. The system uses state-of-the-art image recognition algorithm, namely Convolutional Neural Network with a Raspberry Pi to identify vacant parking spaces from a parking lot image retrieved in real time via an IP camera. A university parking lot has been chosen as the test bed to deploy the proposed system for real time parking space vacancy detection. An Android smartphone application called Driver App is developed to enable ubiquitous visualization of real time outdoor parking spaces occupancy information for vehicle drivers. Evaluation outcomes based on the responses to System Usability Scale (SUS) questionnaire revealed high usability of the Driver App as a tool that provides smart parking service to assist vehicle drivers in searching for a vacant parking space.","PeriodicalId":182418,"journal":{"name":"2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128372916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of wireless sensor network and Web of Things: Security perspective","authors":"Azhari Salleh, K. Mamat, M. Y. Darus","doi":"10.1109/ICSGRC.2017.8070583","DOIUrl":"https://doi.org/10.1109/ICSGRC.2017.8070583","url":null,"abstract":"Wireless Sensor Network (WSN) are spread everywhere throughout the world and are ordinarily used to gather physical data from the encompassing scene. WSN play a focal part in the Internet of Things (IoT) vision. WSN is rising as a noticeable component in the middleware connecting together the Internet of Things (IoT) and the Web of Things (WoT). But the integration of WSN to WoT brings new challenges that cannot be solved in a satisfactory way with traditional layer of security. This paper examined the security issue of integration between WSN and WoT, aiming to shed light on how the WSN and WoT security issue are understood and applied, both in academia and industries. This paper introduces security perfective of integration WSN to WoT which offers capabilities to identify and connect worldwide physical objects into a unified system. As a part of the integration, serious concerns are raised over access of personal information pertaining to device (smart thing) and individual privacy. The motivation of this paper is to summarizes the security threats of the integration and suggestion to mitigate the threat.","PeriodicalId":182418,"journal":{"name":"2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129913406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RUKITON — Smart queue reservation system for medical center","authors":"F. Maulana, Hanif Adi Nugroho, Handri Santoso","doi":"10.1109/ICSGRC.2017.8070587","DOIUrl":"https://doi.org/10.1109/ICSGRC.2017.8070587","url":null,"abstract":"Technology nowadays is growing very rapidly, so many systems have been digitized. Most of the digitization of this system leads to the development of web-based systems, it's also combined with embedded systems, to create a system called Web of Things. Besides, digitalization will be very useful if applied to the public service system, one of which is the queuing system. In this research, we are making and implementing Smart queue system to the medical centers. Our system is built by some software including PHP, CodeIgniter Framework with MySQL Database, MQTT, responsive design, and cloud-based storage. An IoT-based system is provided in medical centers, and it's synchronized with the web-based app, so it's possible to make a queue system that has two methods for reservation, it's online and offline method. This system can make the queue time more effective and efficient.","PeriodicalId":182418,"journal":{"name":"2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Farzamnia, L. Zhen, Liau Chung Fan, Md. Nazrul Islam
{"title":"Investigation on decoding failure probability in erasure network coded channels","authors":"A. Farzamnia, L. Zhen, Liau Chung Fan, Md. Nazrul Islam","doi":"10.1109/ICSGRC.2017.8070603","DOIUrl":"https://doi.org/10.1109/ICSGRC.2017.8070603","url":null,"abstract":"In this paper wireless communications network is considered to transmit source information to destination. N number sources transmitting data to a destination receiver, through M relays nodes by employing random linear network coding (RLNC). Two methods of failure decoding probability on performance of wireless communication are explained and discussed in this paper. The major parameter that will impact on the decoding probability of RLNC are quantity of relays, a finite field size, and erasure probability. The comparison of two old bounds method (Seong's approach) and new bounds method (from Khan's approach) is explored in this research. Simulation results, shows that new bounds method on probability of decoding failure having better simulation results compared to old bound method. It is also concluded that calculating the bounds of the decoding probability is an easy method to analyze failure decoding probability compared to Chiasserini's approach method which is based on network coded matrix.","PeriodicalId":182418,"journal":{"name":"2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121884931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel image steganography technique based on similarity of bits pairs","authors":"Danish Shehzad, T. Dag","doi":"10.1109/ICSGRC.2017.8070576","DOIUrl":"https://doi.org/10.1109/ICSGRC.2017.8070576","url":null,"abstract":"Steganography is one of the most important information hiding mechanism, which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text, image, audio and video for hiding secret information. In the case of image medium, mostly least significant bits of pixels of a cover image are used for hiding secret information. In this paper, a new technique based on pairs matching is proposed, data bits of the message to be secured are arranged in pairs and image pixel bits are also arranged pairwise. The pixel bits are represented in forms of pairs as, 7th and 6th bits makes 3rd pair, 6th and 5th bits are named as 2nd pair, while 5th and 4th bits are denoted with 1st pair and the last one 4th and 3rd pair represented as the 0th pair. The secret message bits are compared with all pairs and replace the least two significant bits with respective matched pair number. If no pair is matched, then replace the 0th pair with message bits, and replace two LSB with pair no 0. The proposed technique shows good quality of stego image, along with acceptable PSNR and also carries the high capacity of secret message. By comparing the results with existing techniques, the proposed technique shows good results.","PeriodicalId":182418,"journal":{"name":"2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122717024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. I. Osman, F. H. Hashim, Wan Mimi Diyana Wan Zaki, A. B. Huddin
{"title":"Entryway detection algorithm using Kinect's depth camera for UAV application","authors":"H. I. Osman, F. H. Hashim, Wan Mimi Diyana Wan Zaki, A. B. Huddin","doi":"10.1109/ICSGRC.2017.8070572","DOIUrl":"https://doi.org/10.1109/ICSGRC.2017.8070572","url":null,"abstract":"Small unmanned aerial vehicles (UAVs) are gaining popularity in aiding search and rescue teams in the wake of a disaster. When searching through ruins such as a collapsed building or a building under fire, it is almost impossible for the first rescue team to navigate inside the ruins in search for survivors. Small UAVs such as the quadcopter which is equipped with autonomous capabilities has the potential to navigate through the unknown ruins. One of the basic building blocks for any autonomous vehicle is a fast-detection sensor for detection and avoidance of obstacles. Payload and cost should also be considered when choosing the right sensor. In this study, a feature extraction algorithm using Microsoft Kinect depth camera is presented for application on a quadcopter operating in an indoor environment. The main objective of this project is to develop an algorithm that could detect entryway openings, based on the inputs from a Microsoft Kinect camera that will be mounted on a quadcopter. The algorithm is tested in a T-junction corridor of an office building, with objects such as walls, doors, glass, corridors, and fire extinguisher boxes occupying the space. The algorithm successfully detects all objects by using the depth information of each pixel in relative to other pixels. The ratio of each depth area is calculated to differentiate the entryway from the rest of the objects. The analysis reveals that the accepted ratio for entryway detection is 0.701 with +−5% error while values not within this range are considered as obstacles.","PeriodicalId":182418,"journal":{"name":"2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124737103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ainnur Eiza Azhar, A. L. Yusof, A. Idris, Norsuzila Ya’acob
{"title":"An enhancement of direct sequence spread spectrum (DSSS) technique in LTE and Wi-Fi coexistence technologies","authors":"Ainnur Eiza Azhar, A. L. Yusof, A. Idris, Norsuzila Ya’acob","doi":"10.1109/ICSGRC.2017.8070606","DOIUrl":"https://doi.org/10.1109/ICSGRC.2017.8070606","url":null,"abstract":"This paper presented an enhanced of SINR based on serving and neighboring path loss to mitigate co-channel interference by using DSSS technique in LTE-Wi-Fi network. The proposed technique is the continuity from the earlier work which enhanced the DSSS with new coefficient: chip rate coefficient and radius fraction coefficient. The earlier works only consider its serving BS for path losses values. In this paper, an enhance DSSS technique is proposed which considers path losses for both serving and its neighbouring base stations in the network. The purpose of the proposed technique is to improve the signal-interference-to-noise ratio (SINR) value at UEs. The proposed technique applied delta path loss which is the path loss difference between the serving and the neighbours BSs. As the results, the SINR at MUE using the proposed technique gives better SINR around 66%∼72% improvements. On the other hand, the SINR at WUE using the proposed technique also gives better SINR around 155%∼170% improvements.","PeriodicalId":182418,"journal":{"name":"2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC)","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124790522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of converted parallel plug-in hybrid electric vehicle","authors":"P. K. Gujarathi, Varsha A. Shah, M. Lokhande","doi":"10.1109/ICSGRC.2017.8070593","DOIUrl":"https://doi.org/10.1109/ICSGRC.2017.8070593","url":null,"abstract":"The paper presents a performance analysis for Tata Indica diesel vehicle converted to the parallel plug-in hybrid electric vehicle. The performance of fuel consumption and all emissions is analyzed by considering sample urban and highway Indian driving cycle. The complete vehicle is simulated using an ADvanced VehIcle SimulatOR (ADVISOR) simulation software with MATLAB Simulink for simulation of a rule-based and fuzzy logic based optimized control strategy for converted PHEV. The performance characteristics are plotted, analyzed along with the efficiency and emission mapping. The results of converted PHEV obtained for both control strategy are compared with conventional one for both driving cycles for analysis of the fuel consumption and emissions considering real-time benchmarking norms. The simulation results indicate that the fuzzy strategy leads to lower pollution while simple on/off strategy gives least fuel consumption.","PeriodicalId":182418,"journal":{"name":"2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132766675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}