N. Wahab, Zulkifli Bin Maslan, W. N. W. Muhamad, Norhayati Hamzah
{"title":"Microstrip Rectangular 4x1 Patch Array Antenna at 2.5GHz for WiMax Application","authors":"N. Wahab, Zulkifli Bin Maslan, W. N. W. Muhamad, Norhayati Hamzah","doi":"10.1109/CICSyN.2010.73","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.73","url":null,"abstract":"This paper presents the design of microstrip rectangular patch antenna with center frequency at 2.5GHz for WiMAX application. The array of four by one (4x1) patch array microstrip rectangular antenna with microstrip line feeding based on quarter wave impedance matching technique was designed and simulated using Computer Simulation Tool (CST) Microwave Environment software. The performance of the designed antenna was than compared with the single patch rectangle antenna in term of return loss, Voltage Standing Wave Ratio (VSWR), bandwidth, directivity, radiation pattern and gain. The array antenna was then fabricated on the substrate type FR-4 with dielectric constant of 4.9 and thickness of 1.6mm respectively. The array antenna was measured in the laboratory using Vector Network Analyzer (VNA) and the results show good agreement with the array antenna simulated performances.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127947459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsupervised Artificial Neural Nets for Modeling Movie Sentiment","authors":"W. Claster, Dinh Quoc Hung, S. Shanmuganathan","doi":"10.1109/CICSyN.2010.23","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.23","url":null,"abstract":"Sentiment mining aims at extracting features on which users express their opinions in order to determine the user’s sentiment towards the query object. Movie sentiment in Twitter provides an excellent base upon which to evaluate sentiment mining methodologies both because of the pervasiveness of discussions devoted to movie topics and because of the brevity of expression induced by twitter's 140 word limitation. In this paper we explore movie sentiment expressed in Twitter microblogs. A multi-knowledge based approach is proposed using, Self-Organizing Maps and movie knowledge in order to model opinion across a multi-dimensional sentiment space. We develop a visual model to express this taxonomy of sentiment vocabulary and then apply this model in test data. The results show the effectiveness of the proposed visualization in mining sentiment in the domain of Twitter tweets.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116061413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Performance of Some Typical Tag Collision Avoidance Algorithms","authors":"Jiang-Jie Gu, Zhiying Yang","doi":"10.1109/CICSyN.2010.35","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.35","url":null,"abstract":"In RFID systems, when more than one tag responds to the request of reader simultaneously, tag collision would happen. This will cause the reader fail to identify any tag within its interrogation zone. Extensive research on tag collision avoidance have been performed recently. In this paper, we study on the performance of several typical tag collision avoidance algorithms in RFID systems. Lots of simulation experiments have been conducted in order to compare these algorithms’ performance, such as the runninng time and the power consumed. Based on the optimal tree search algorithm, we propose a new tag collision avoidance algorithm OTSA. In algorithm OTSA, we estimate the number of tags within the reader’s interrogation zone first, then we call the optimal tree algorithm to identify the tags. The results of simulation experiments show that algorithm OTSA has better performance when the number of tags within the reader’s interrogation zone getting larger.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120991722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of SQL Injection Detection and Prevention Techniques","authors":"A. Tajpour, M. Shooshtari","doi":"10.1109/CICSyN.2010.55","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.55","url":null,"abstract":"Database driven web application are threaten by SQL Injection Attacks (SQLIAs) because this type of attack can compromise confidentiality and integrity of information in databases. Actually, an attacker intrudes to the web application database and consequently, access to data. For stopping this type of attack different approaches have been proposed by researchers but they are not enough because usually they have limitations. Indeed, some of these approaches have not implemented yet and also most of implemented approaches cannot stop all type of attacks. In this paper all type of SQL injection attack and also different approaches which can detect or prevent them are presented. Finally we evaluate these approaches against all types of SQL injection attacks and deployment requirements.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122826780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Wong, Kok-Soon Chai, S. Ramadass, Nicolas Vavasseur
{"title":"Expert-Aware Approach: A New Approach to Improve Network Security Visualization Tool","authors":"D. Wong, Kok-Soon Chai, S. Ramadass, Nicolas Vavasseur","doi":"10.1109/CICSyN.2010.64","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.64","url":null,"abstract":"Nowadays, many computers have been infected with the computer anomalies or viruses. The availability of network security visualization tools greatly facilitate to detect, perceive and defend computer users from being affected by these anomalies. Many of the network security visualization tools are designed particularly for users with advanced network security awareness even though the tools are indispensable by various types of computer users. We proposed an expert-aware approach to designing a system which formulated with a large amount of network data or high-dimensional data and adaptive for different types of users. In the preliminary phase, we proposed and implemented initial pre-expertise classification system which provides a default setting for the expert-aware network security visualization tool. The tool will learn from continual user feedbacks in order to statistically satisfy the needs of majority tool users. The expert-aware approach looks at the users’ expertise level in network security and adapts the visualization views that are best suitable for the user. Initial results of the implementation of the system show that it is capable of representing several of network security data not only on two-dimensional space on a computer but also beyond that space. Systems features, such as system effectiveness and efficiency of data visualization have been improved. Our experiments in a network lab suggest that the tool can be further improved as the tool for distribution to a wide range of computer user.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114562590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-Aware News Recommender in Mobile Hybrid P2P Network","authors":"K. Yeung, Yanyan Yang, D. Ndzi","doi":"10.1109/CICSyN.2010.48","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.48","url":null,"abstract":"With the emergence of pervasive environment, mobile recommender needs to make use of user in-time contextual information to provide personalized recommendation. In this paper, a proactive context-aware news recommender in mobile hybrid P2P network is designed and implemented. We develop a general Analytic Hierarchy Process (AHP) model through empirical studies. We discuss how the relative weight of each AHP criteria can be computed via user assignment and user history. We combine both Contend-based filtering and Collaborative filtering approach to predict user interest using Bayesian Network. The experiments show the system can recommend real time news stories that satisfy the user.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114698953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some Recent Major Events and Considerations for Modelling and Simulation","authors":"R. Zobel","doi":"10.1109/CICSyN.2010.68","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.68","url":null,"abstract":"Large scale natural events are relatively rare,have a large to massive impact locally and globally overshort or long time periods. They may have enormousconsequences for the survival of the human race. Theycan be due to natural or human causes. This paperaddresses some of the major causes and considers howmodelling and simulation may be used to minimize theireffects and raises validation and verification issues forsuch models.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125033875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Darwish, W. M. Zaki, O. Saad, Nadia M. Nassar, G. Schaefer
{"title":"Human Authentication Using Face and Fingerprint Biometrics","authors":"A. Darwish, W. M. Zaki, O. Saad, Nadia M. Nassar, G. Schaefer","doi":"10.1109/CICSyN.2010.40","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.40","url":null,"abstract":"Multimodal biometric approaches are growing in importance for personal verification and identification, since they provide better recognition results and hence improve security compared to biometrics based on a single modality. In this paper, we present a multimodal biometric system that is based on the fusion of face and fingerprint biometrics. For face recognition, we employ uniform local binary patterns (ULBP), while minutiae extraction is used for fingerprint recognition. Fusion at matching score level is then applied to enhance recognition performance. In particular, we employ the product rule in our investigation. The final identification is then performed using a nearest neighbour classifier which is fast and effective. Experimental results confirm that our approach achieves excellent recognition performance, and that the fusion approach outperforms biometric identification based on single modalities.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122555467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rouhani, Mohammad Rasoul Tanhatalab, Ali Shokohi-Rostami
{"title":"Nonlinear Neural Network Congestion Control Based on Genetic Algorithm for TCP/IP Networks","authors":"M. Rouhani, Mohammad Rasoul Tanhatalab, Ali Shokohi-Rostami","doi":"10.1109/CICSyN.2010.21","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.21","url":null,"abstract":"Active Queue Management (AQM) has been widely used for congestion avoidance in TCP networks. Although numerous AQM schemes have been proposed to regulate a queue size close to a reference level as RED, PI controller, PID Controller, Adaptive prediction controller(APC) and neural network using the Back-Propagation (BP) most of them are incapable of adequately adapting to TCP network dynamics due to TCP’s non-linearity and time-varying stochastic properties. In this paper, we design a nonlinear neural network controller using the non-linear model of TCP network. Genetic algorithms are used to train the nonlinear neural controller. We evaluate the performances of the proposed neural network AQM approach via simulation experiments. The proposed approach yields superior performance with faster transient response, larger throughput, and higher link utilization, as compared to other schemes.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129971881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Isa, S. Omar, Z. Saad, Norhayati Mohamad Noor, M. K. Osman
{"title":"Weather Forecasting Using Photovoltaic System and Neural Network","authors":"I. Isa, S. Omar, Z. Saad, Norhayati Mohamad Noor, M. K. Osman","doi":"10.1109/CICSyN.2010.63","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.63","url":null,"abstract":"This paper presents the applicability of Artificial Neural Network (ANN) for weather forecasting using a Photovoltaic system. The main objective is to predict daily weather conditions based on various measured parameters gained from the PV system. In this work, Multiple Multilayer Perceptron (MMLP) network with majority voting technique was used and trained using Levenberg Marquardt (LM) algorithm. Voting technique is widely used in many applications to solve real world problem. Different techniques of voting are used such as majority rules, decision making, consensus democracy, consensus government and supermajority. The way of the voting technique is different depending on the problem involved. Majority voting technique was applied in the study so that the performance of MMLP can be approved as compared to single MLP network. The proposed work has been used to classify four weather conditions; rain, cloudy, dry day and storm. The system can be used to represent a warning system for likely adverse conditions. Experimental results demonstrate that the applied technique gives better performance than the conventional ANN concept of choosing an MLP with least number of hidden neurons.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128904259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}