2014 IEEE 5th Control and System Graduate Research Colloquium最新文献

筛选
英文 中文
Assessment of AC coupling PV hybrid system in Malaysia 马来西亚交流耦合光伏混合系统的评估
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908689
N. Mohamed, A. M. Omar, A. H. Faranadia
{"title":"Assessment of AC coupling PV hybrid system in Malaysia","authors":"N. Mohamed, A. M. Omar, A. H. Faranadia","doi":"10.1109/ICSGRC.2014.6908689","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908689","url":null,"abstract":"This paper presents the evaluation performance of 15kWp hybrid power system based on AC Coupled PV Diesel Hybrid power system in Malaysia. The system consists of 15 kWp of Photovoltaic (PV) array, 11.4 kW of inverter, 36000 AH of total battery capacity, 10kW bi-directional (BD) inverter and 12 kVA of diesel generator (DG). The system provides electricity to one of remote schools in Sabah, East Malaysia. Seven months data were analyzed and evaluated based on Malaysian Standard, MS IEC 61724. The performance indices give indicator the condition of the system during the analysis period.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121820089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An acoustic ground discrimination system to mapping sea-bed feature classes 一种用于海底地物分类制图的声学地面识别系统
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908702
Nur Fadillah Ab Aziz, Othman Mohd Yusof, Rozaimi Che Hasaan, Saiful Aman Hj Sulaiman, M. A. Shah Said
{"title":"An acoustic ground discrimination system to mapping sea-bed feature classes","authors":"Nur Fadillah Ab Aziz, Othman Mohd Yusof, Rozaimi Che Hasaan, Saiful Aman Hj Sulaiman, M. A. Shah Said","doi":"10.1109/ICSGRC.2014.6908702","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908702","url":null,"abstract":"An Acoustic Ground Discrimination System (AGDS) able to extract an information of the nature of the feature on the seabed. AGDS compared with satellite imagery are abnormally and rarely used in tropical environments although is easier to operate and friendly produces an amount of digital data. This study aimed to assess acoustic survey of sea-bed benthic classes using RoxAnn™ AGDS in the north of Langkawi Island. Sea-bed benthic classes were categorized into six levels of classes using hierarchical classification of field data. Using the independent data, classes and signal of the nature seabed were identified (library) of RoxAnn™ created and represent by number coding. These accuracies are assumed are conservative because of constraints during this study including quantitative data for discriminating class types. The class type changes between AGDS and accuracy assessments surveys and environments condition. Despite these limitation, AGDS accuracy level are high and more accurate compare to those satellite achievement and it has advantages including greater water penetration and unaffected from cloud cover. An Acoustic data are useful tools for mapping the tropical habitat and complementary to satellite data.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"41 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127269927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative study of time management and energy consumption in mobile cloud computing 移动云计算中时间管理和能源消耗的比较研究
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908721
M. Ahmadi, Nasrin Khanezaei, S. Manavi, Faraz Fatemi Moghaddam, T. Khodadadi
{"title":"A comparative study of time management and energy consumption in mobile cloud computing","authors":"M. Ahmadi, Nasrin Khanezaei, S. Manavi, Faraz Fatemi Moghaddam, T. Khodadadi","doi":"10.1109/ICSGRC.2014.6908721","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908721","url":null,"abstract":"The effectiveness and influence rate of cloud computing services in devices with limited power and computation resources (e.g. mobile devices) has been considered by many researchers and has led to many performed researches and IT products for these devices. One of the most challenging issues during migration of applications and processes to clouds is the rate energy consumption and time management in comparison with local applications. In this paper, a comparative experimental study has been presented to compare the rate of energy consumption and total execution time in mobile cloud computing and local devices. Hence, three cloud-based environments and two mobile devices with various computation resources were selected to host a cryptography application. Furthermore, cloud-based servers were selected in several places with different distance from the experiment site to investigate the effect of distance and number of hops in the performance of application. The application was run 25 times with different size of plain text to determine the performance of each environment during various workloads. The results showed that the rate of energy consumption and execution time were reduced significantly in cloud-based environments regarding to limited computation resources of mobile devices. This decrease was more considerable when the number of workloads had been increased.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126170757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Emotional identification during mobile RF Radiation 移动射频辐射中的情感识别
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908738
Y. P. Ma, M. H. Haron, M. Taib, R. Jailani
{"title":"Emotional identification during mobile RF Radiation","authors":"Y. P. Ma, M. H. Haron, M. Taib, R. Jailani","doi":"10.1109/ICSGRC.2014.6908738","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908738","url":null,"abstract":"This paper presents emotional identification of 62 healthy subjects under Mobile Radio Frequency Radiation (MRFR). Electroencephalography (EEG) at awake and rest status with eyes closed, particularly on Alpha and Beta wave will be investigated. 31 subjects were strapped with mobile phone at the left ear, and name them as LE (Left Exposure) group, meanwhile, another 31 subjects were named as RE (Right Exposure) group with mobile phone on the right ear. Each group has 3 sessions of EEG recordings, such as Before, During and After Exposure of mobile phone, each session takes 5 minutes and 1 minute rest is applied between sessions. The study proposes index of human brain activities as an indicator of human emotion under mobile RF Radiation using EEG power spectrum, and brainwave signals were employed using nonparametric method. The results of the study established 2 types of indexes according to the trend of Frontal Hemispheric Energy Spectral Density (ESD) between 2 different sessions (from Before session to During session, and from During session to After session) which present human's brain activities.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115093601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Mysql Injector vulnerability checker tool (Mysql Injector) using inference binary search algorithm for blind timing-based attack 增强Mysql注入器漏洞检查工具(Mysql注入器)使用推理二分搜索算法进行盲计时攻击
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908694
A. Liban, Shadi M. S. Hilles
{"title":"Enhancing Mysql Injector vulnerability checker tool (Mysql Injector) using inference binary search algorithm for blind timing-based attack","authors":"A. Liban, Shadi M. S. Hilles","doi":"10.1109/ICSGRC.2014.6908694","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908694","url":null,"abstract":"Securing the database against frequent attacks is a big concern; attackers usually intend to snitch private information and damage databases. These days, web applications are widely used as a meddler between computer users. Web applications are also used mostly by e-commerce companies, and these types of applications need a secured database in order to keep sensitive and confidential information. Since Blind SQL injection attacks occurred as a new way of accessing database through the application rather than directly through the database itself, they have become popular among hackers and malicious users. Many detection tools are developed to handle this problem but they have limitations. This study enhances SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks (MYSQL Injector) using time-based attack with Inference Binary Search Algorithm. It covers four types of blind SQL injection attacks, true/false, true error, time-based and order by attacks. This tool will automate the process of the blind SQL injection attacks to check the blind SQL injection vulnerability in the PHP-based websites that use MySQL databases. Forty four vulnerable websites and thirty non vulnerable websites were tested to ensure the accuracy of the tool. The result shows 93% accuracy for detecting the vulnerability while MySQL injector performs 84%.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128225443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Energy efficient cooperative cell control of LTE-Advanced cellular networks LTE-Advanced蜂窝网络的节能协同蜂窝控制
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908734
Yuan Gao, Yi Li, Hongyi Yu, Xianfeng Wang, Shihai Gao
{"title":"Energy efficient cooperative cell control of LTE-Advanced cellular networks","authors":"Yuan Gao, Yi Li, Hongyi Yu, Xianfeng Wang, Shihai Gao","doi":"10.1109/ICSGRC.2014.6908734","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908734","url":null,"abstract":"To reduce energy waste in future cellular networks, the most effective and reliable method is to close idle base stations when not needed, but how to find the proper and optimal method to control the target cell and the adjacent ones are still blank according to recent researches. In this work, we extend our research in cooperative scheme, and figure out a heuristic control method of eNodeBs in GREEN mode. We first define the energy efficient controls of LTE-Advanced cells in cooperative mode and raise a heuristic algorithm to support the on-off optimal control of LTE-Advanced cooperative eNodeBs, especially when and which eNodeB will be changed into sleep mode and which one(s) need to be waken up. Compared with no shut down methods, we have obtained about six times of the total savings by adopting our control method with the cost of less than 6% of the system overall QoS under both theoretical and LTE-Advanced system level simulation platform.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detecting worm attacks in cloud computing environment: Proof of concept 在云计算环境中检测蠕虫攻击:概念证明
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908732
Hasan Mahmoud Kanaker, M. Saudi, M. F. Marhusin
{"title":"Detecting worm attacks in cloud computing environment: Proof of concept","authors":"Hasan Mahmoud Kanaker, M. Saudi, M. F. Marhusin","doi":"10.1109/ICSGRC.2014.6908732","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908732","url":null,"abstract":"Cloud computing technology is a concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to users. Users can request cloud services via a web browser or web service. Cloud computing consists of valuable resources, such as, networks, servers, applications, storage and services with a shared network. By using cloud computing, users can save cost of hardware deployment, software licenses and system maintenance. Many security risks such as worm can interrupt cloud computing services; damage the spiteful service, application or virtual in the cloud structure. Nowadays the worm attacks are becoming more sophisticated and intelligent, makes it is harder to be detected than before. Based on the implications posed by this worm, this is the urge where this research comes in. This paper aims to build a new model to detect worm attacks in cloud computing environment based on worm signature extraction and features behavioral using dynamic analysis. Furthermore this paper presents a proof of concept on how the worm works and discusses the future challenges and the ongoing research to detect worm attacks in cloud computing efficiently.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123637161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Femtocell geo-location challenge: DSL approach as solution Femtocell地理定位挑战:DSL方法作为解决方案
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908729
L. M. Abdullah, M. Dani Baba, Sinan Ghassan Abid Ali, A. Lim, Yasuo Tan
{"title":"Femtocell geo-location challenge: DSL approach as solution","authors":"L. M. Abdullah, M. Dani Baba, Sinan Ghassan Abid Ali, A. Lim, Yasuo Tan","doi":"10.1109/ICSGRC.2014.6908729","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908729","url":null,"abstract":"Femtocell or Home eNode cell in LTE is a home base station that anticipated to be deployed in very large numbers with fully automated manner. Femtocell provides enhanced coverage for in-building cellular services. The enhanced data rates enable new multimedia services which in turn generate new revenue. However, with all the convenience such device can provide, locating the user's geographic location represents a great deal of challenge for law enforcement and operators alike. In this work we propose a simple and direct approach that does not require any changes in the network or in the femtocell standard design by exploiting the connection between the femtocell and the network operator through the DSL backhaul. Result shows the proposed approach has achieved successfully the goal of locating the geographic location of the femtocell user precisely.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129828446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling and control design for rotary crane system using MATLAB Simscape Toolbox 利用MATLAB Simscape工具箱对旋转起重机系统进行建模与控制设计
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908716
R. S. Arvin, M. I. Solihin, F. Heltha, R. Tan, A. Ammar
{"title":"Modeling and control design for rotary crane system using MATLAB Simscape Toolbox","authors":"R. S. Arvin, M. I. Solihin, F. Heltha, R. Tan, A. Ammar","doi":"10.1109/ICSGRC.2014.6908716","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908716","url":null,"abstract":"Rotary crane system is extensively used in many applications to carry payload from one position to another position. The cart and jib of the crane will start to accelerate in linear and rotational motions respectively when input signal to the crane system is applied. This will cause the swinging or swaying of the payload. Therefore, an anti-swing for automatic crane is usually proposed. This project presents the modeling and intelligent control system design for a rotary crane. The modeling and simulation was done using MATLAB Simscape Toolbox which is physical approach of modeling. The mathematical model of the crane was also derived for comparison. The intelligent control system is implemented as Fuzzy-PID controller. The physical modeling approach using MATLAB Simscape Toolbox can ease the modeling process since mathematical modeling approach is usually tedious. The results obtained in the simulation shows that the implemented fuzzy-PID controller is capable of suppressing the sway angle of the load and fast settling time can be observed.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131041863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Auditory evoked potential based detection of hearing loss: A prototype system 基于听觉诱发电位的听力损失检测:一个原型系统
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908715
M. Paulraj, K. Subramaniam, S. Yaccob, A. H. Adom, C. Hema
{"title":"Auditory evoked potential based detection of hearing loss: A prototype system","authors":"M. Paulraj, K. Subramaniam, S. Yaccob, A. H. Adom, C. Hema","doi":"10.1109/ICSGRC.2014.6908715","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908715","url":null,"abstract":"Hearing loss has been the most prevalent sensory disability throughout the world. Over 275 million people around the world are affected by various hearing related problems. A conventional hearing screening test's applicability is limited as it requires a feedback response from the subject under test. To overcome such problems, the primary focus of this study is to develop an intelligent hearing ability level assessment system using auditory evoked potential signals (AEP). AEP signal is an electrical potential signal elicited from the brain while an auditory stimulus is presented in a time-locked manner. The AEP responses of normal hearing and abnormal hearing subjects were administered to fixed acoustic stimulus intensity in order to detect the hearing threshold level. The detrended fluctuation analysis (DFA) has been used to estimate the fractal values of the normal and abnormal hearing subjects. The extracted fractal features were then associated to hearing threshold level of the subjects. Feed-forward and feedback neural networks are employed to distinguish normal and abnormal hearing subjects. The classification performance of the proposed intelligent hearing ability level assessment system is in the range of 85-90%. This study indicates that mean fractal values of the abnormal hearing subjects are relatively higher while compared with the mean fractal values of the normal hearing subjects.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"668 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130647193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信