S. Ogonowski, Z. Ogonowski, M. Swierzy, M. Pawełczyk
{"title":"Control System of Electromagnetic Mill Load","authors":"S. Ogonowski, Z. Ogonowski, M. Swierzy, M. Pawełczyk","doi":"10.1109/ICSEng.2017.23","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.23","url":null,"abstract":"The paper presents control system of a working chamber load of an electromagnetic mill. The mill works in a dry grinding and classification circuit with pneumatic transport. Structure of the circuit is presented in the paper as well as the measurement system. Data acquisition uses direct and indirect measurements. The most challenging are the indirect measurement of the chamber fulfillment and the grinding media load which require special methodology. The proposed approach is explained and exemplary data are presented in the paper. Structure of the control system is described together with the implementation at a semi-industrial plant.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130445365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Comparison of Extended Kalman Filter and Unscented Kalman Filter for the Control Moment Gyroscope Inverted Pendulum","authors":"Jyot R. Buch, Y. Kakad, Yawo H. Amengonu","doi":"10.1109/ICSEng.2017.48","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.48","url":null,"abstract":"This paper investigates the problem of nonlinear state estimation for control moment gyroscope (CMG) inverted pendulum. The dynamics of CMG inverted pendulum result into stiff nonlinearities and are included here. Both Extended Kalman Filter (EKF) and Unscented Kalman Filter (UKF) algorithms are utilized for state estimation to investigate their effectiveness. The computer simulations are included for comparison of the two algorithms. There are inherent difficulties in state estimation for systems with stiff nonlinearities. In this research, the results show that EKF performs far better than UKF in most cases for this system. However, this is an attempt to explore the nonlinear estimation problem for this challenging system.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133775511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Jiang, Z. Chaczko, Firas Al-Doghman, Wilson Narantaka
{"title":"New LQR Protocols with Intrusion Detection Schemes for IOT Security","authors":"J. Jiang, Z. Chaczko, Firas Al-Doghman, Wilson Narantaka","doi":"10.1109/ICSEng.2017.74","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.74","url":null,"abstract":"Link quality protocols employ link quality estimators to collect statistics on the wireless link either independently or cooperatively among the sensor nodes. Furthermore, link quality routing protocols for wireless sensor networks may modify an estimator to meet their needs. Link quality estimators are vulnerable against malicious attacks that can exploit them. A malicious node may share false information with its neighboring sensor nodes to affect the computations of their estimation. Consequently, malicious node may behave maliciously such that its neighbors gather incorrect statistics about their wireless links. This paper aims to detect malicious nodes that manipulate the link quality estimator of the routing protocol. In order to accomplish this task, MINTROUTE and CTP routing protocols are selected and updated with intrusion detection schemes (IDSs) for further investigations with other factors. It is proved that these two routing protocols under scrutiny possess inherent susceptibilities, that are capable of interrupting the link quality calculations. Malicious nodes that abuse such vulnerabilities can be registered through operational detection mechanisms. The overall performance of the new LQR protocol with IDSs features is experimented, validated and represented via the detection rates and false alarm rates.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132874279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and Evaluation of Document Production Support System \"DLO-Editor\" with Obsession Mechanism","authors":"Ziran Fan, T. Fujimoto","doi":"10.1109/ICSEng.2017.34","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.34","url":null,"abstract":"In late years, the effective application of IT for the efficiency of works is required further by the development of IT. The ability of users to carry out works effectively with IT is essential to implement it. This paper considers the work efficiency in people\"fs work style today, and focuses on the task of document producing. The efficiency of document producing is the essential element in all the business activities, and it is the task that everyone can achieve simply. Enhancing the efficiency of document producing is related to the improvement of the work efficiency in users\"f work style. Recently, producing documents at mobile system is becoming more popular by the appearance of tablet computers and large-screen smartphones, the efficiency of document producing is even more required. In this paper, we focus on the most essential point in producing documents, which is \"gto complete within a deadline\". The function that makes users meet the deadline is important for document producing to enhance users\"f work efficiency. To implement that function into the system, we apply a human cognition mechanism for deadlines, such as the mechanism of obsession to deadline. We call it as \"gDeadline Obsession (DLO)\" in this paper and use that cognition mechanism to implement a support system \"gDLO-Editor\" for document producing to improve users\"f work efficiency, and also evaluate the utilization effect of the system.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129334105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Siergiejczyk, K. Krzykowska, A. Rosiński, L. Grieco
{"title":"Reliability and Viewpoints of Selected ITS System","authors":"M. Siergiejczyk, K. Krzykowska, A. Rosiński, L. Grieco","doi":"10.1109/ICSEng.2017.68","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.68","url":null,"abstract":"Intelligent Transportation Systems (ITSs) are built considering numerous legal regulations, organisational conditions, and user needs. For this reason, they cannot be sold as plug & play products and their implementation requires a clear definition of functional and technical requirements. The primary objective of ITSs is to improve the efficiency and safety of road traffic. In fact, nowadays, the number of motorways all over Europe is increasing. The road freight transport is also growing. These are one of some reasons of caused accidents. Solution to this problem may be implementation of ITS systems. But, a reliable work of them is possible when their reliability is at a very high level. The aim of this paper is to present a new model of reliability and operation analysis of the selected ITS system which include continuous provision of power to its elements. The article also contains a logical, functional and physical viewpoint of selected ITS system.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115443885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganographic Image Sharing App","authors":"Raniyah Wazirali, Z. Chaczko, Jack Gibbon","doi":"10.1109/ICSEng.2017.62","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.62","url":null,"abstract":"With the advent of smartphones, many people have the ability to take a photo and upload it to the internet whenever they want. Most smartphones will include basic metadata in the image file; however, this is usually limited to information about the camera itself, and not the content of the photo. This data is also easy to access, as there are many websites and applications that will extract the metadata from an image, thus it is unsuitable for personal information.While there are many applications out there which will allow a user to take and upload photos for their friends or the public to view, such as Facebook or Instagram, these applications rely on information provided along side the image for privacy settings, commenting, and image searching. Other search engines would have difficulty categorising the pictures they find on various sites, and if the image is saved and re-uploaded somewhere else, the information about them would likely be lost.Steganography provides a feasible and viable solution to these problems. By embedding information directly into the image, the information about the image will not be lost, if it is separated from its original source. The aim of the capstone is to demonstrate this aspect via an image sharing app that allows users to exchange messages and personalised information that is embedded in the image such that it is inaccessible without knowing their keys, and metadata that can be used by search engines to categorise the image and its contents. The developed application will provide a platform for users to create an account, share images, embed information within the image, and search for images other users have uploaded.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127101943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganographic Authentication in Cloud Storage for Mitigation of Security Risks","authors":"Raniyah Wazirali, Z. Chaczko, Everlyn Chiang","doi":"10.1109/ICSEng.2017.61","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.61","url":null,"abstract":"Identity theft is a serious crime where the criminals steal user's identity to access their bank accounts, personal hospital records and etc. The usage of cloud storage has allowed the hackers to attack the victims easily by accessing the victim's data stored in a remote location. Cloud storage may be convenient to allow users to store any data files and access those files from different devices and in different locations around the world. However, it can still pose security threats as with a lot of important data stored in one location is very appealing to cunning hackers. The solution of using image steganography application to hide important data or documents under an image before uploading them to the cloud storage will avoid the risks of attracting hackers or outsiders to discover the importance of the data hidden. The application uses one of simplest image steganography approach 'LSB algorithm' to achieve best quality of encoded image/stego-image. Besides, the application can be deployed via offline or online depending whether they want to upload the encoded image/stego-image to the cloud storage.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122311534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontological Metamodel for Consistency of Data Heritage Preservation (DHP)","authors":"L. C. Gordon, Z. Chaczko","doi":"10.1109/ICSEng.2017.67","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.67","url":null,"abstract":"In this stage of Data Preservation the challenge is how to keep the attributes of the data and how to preserve the originality. It is like to keep the living part of the data. It is how the concepts of Heritage have sense. Heritage is the concrete data, it gives the interconnection to other aspects of the reality. Nowadays the physical value and the aspects of items complete the relevance of information. The relation between Preservation and Digital patterns of Heritage is well related because of the two aspects to consider: Accessibility and Context.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132879786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development and Optimization of Wireless Indoor Localization Error Modelling","authors":"Zhengyu Yu, Z. Chaczko, J. Jiang","doi":"10.1109/ICSEng.2017.41","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.41","url":null,"abstract":"this paper introduces a new generation an error modelling of wireless indoor localization. A newly designed algorithm modelling by using Kalman Filter is developed to optimize the wireless indoor localization system based on iBeacon sensors. It is designed to detect and minimize the errors. Matlab simulations, implementation, and validation are presented in the paper.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133356100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing an Air Hockey Game in LabVIEW","authors":"Matthew Bara, Sneha Gollamudi, Samuel Williams","doi":"10.1109/ICSEng.2017.65","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.65","url":null,"abstract":"Air Hockey consists of two players volleying a puck, using mallets, across a low friction table surface. Points are scored when a player lands the puck in the opponent's goal. The game is won by the player with the higher score at the end of the match. Virtual versions of air hockey have been implemented using various game development software. This paper details the implementation of the air hockey game in LabVIEW. This version of the game uses a physics engine and an Artificial Intelligence (AI) player. This effort discusses the steps followed to design the game and the effectiveness of the AI player versus a human player.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130157994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}