2014 IEEE 5th Control and System Graduate Research Colloquium最新文献

筛选
英文 中文
HOME FADS: A dedicated fire alert detection system using ZigBee wireless network HOME FADS:使用 ZigBee 无线网络的专用火灾警报探测系统
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908695
Mohd Faris Mohd Fuzi, A. F. Ibrahim, Mohammad Hafiz Ismail, Nur Syakira Ab Halim
{"title":"HOME FADS: A dedicated fire alert detection system using ZigBee wireless network","authors":"Mohd Faris Mohd Fuzi, A. F. Ibrahim, Mohammad Hafiz Ismail, Nur Syakira Ab Halim","doi":"10.1109/ICSGRC.2014.6908695","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908695","url":null,"abstract":"This paper describes the development of innovative low-cost home dedicated fire alert detection system (FADS) using ZigBee wireless network. Our home FADS system are consists of an Arduino Uno Microcontroller, Xbee wireless module (Zigbee wireless), Arduino digital temperature sensor, buzzer alarm and X-CTU software. Arduino and wireless ZigBee has advantages in terms of its long battery life and much cheaper compared to the others wireless sensor network. There are several objectives that need to be accomplished in developing this project which are to develop fire alert detection system (FADS) for home user using ZigBee wireless network and to evaluate the effectiveness of the home FADS by testing it in different distances and the functionality of heat sensor. Based from the experiments, the results show that the home FADS could function as expected. It also could detect heat and alarm triggered when temperature is above particular value. Furthermore, this project provides a guideline for implementing and applying home FADS at home and recommendation on future studies for home FADS in monitoring the temperature on the web server.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127960803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Analysis on the parameters of selected mapping without side information on PAPR performances 无侧信息选择映射参数对PAPR性能的影响分析
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908693
S. Razavi, N. Sulaiman, R. Sidek, S. Mohammady, P. Varahram
{"title":"Analysis on the parameters of selected mapping without side information on PAPR performances","authors":"S. Razavi, N. Sulaiman, R. Sidek, S. Mohammady, P. Varahram","doi":"10.1109/ICSGRC.2014.6908693","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908693","url":null,"abstract":"Nowadays, the OFDM support the growing request of higher data rate transportation in both wired and wireless communication. The SLM technique is recognized as one of the most capable methods which are applied in OFDM system in order to reduce the problem of high PAPR. However the major drawback of SLM is transmission of side information which has negative result on data rate and bandwidth efficiency. Accordingly the SLM method without sending side information has been proposed. Therefore this paper investigates how the parameters in SLM techniques without Side Information (SI), could have effects on the PAPR performances of the method.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134472603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Black-box modeling of steam distillation pilot-scale using M-level PRS perturbation 利用m级PRS扰动的蒸汽蒸馏中试黑箱模型
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908701
Haslizamri Md Shariff, M. Rahiman
{"title":"Black-box modeling of steam distillation pilot-scale using M-level PRS perturbation","authors":"Haslizamri Md Shariff, M. Rahiman","doi":"10.1109/ICSGRC.2014.6908701","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908701","url":null,"abstract":"This paper is proposed to model the steam temperature of steam distillation pilot-scale using system identification. Multi-level Pseudo Random Sequence (M-level PRS) has been implemented to this system to perturb the input of the system. The linear and nonlinear Auto Regressive with Exogenous input (ARX) model structures are used to estimate and validate the model output of steam distillation pilot plant. Both models will be compared to study the performance and flexibility. The validation test is performed by using auto-correlation function (ACF), cross-correlation function (CCF), model fit and Root Mean Square Error (RMSE) to validate the estimated both ARX models.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtual desktop environment on Cloud computing platform 云计算平台上的虚拟桌面环境
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908700
Mohd Faris Mohd Fuzi, R. S. Hamid, Muhammad Akram Ahmad
{"title":"Virtual desktop environment on Cloud computing platform","authors":"Mohd Faris Mohd Fuzi, R. S. Hamid, Muhammad Akram Ahmad","doi":"10.1109/ICSGRC.2014.6908700","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908700","url":null,"abstract":"This paper describes about the virtual desktop environment on Cloud computing. In the modern world, the tasks become more complex and difficult to accomplish which causes the existing of heavy load applications in an educational environment. The limitation of computer's specification in the school and universities' laboratory will affect the learning process. Therefore, this paper proposed development of a cloud server machine by using cloud computing platform. The cloud computing is a technology or distributed architecture that used software and desktop Virtualization concept to separates the desktop environment, store data, run applications and allow people to access it remotely. The objectives of this project are to develop a cloud server machine for the thin client computers to be able to access the different operating systems, run heavier load applications, and conduct testing on the effectiveness which include performance level for different operating systems by running the applications using Virtualization concept. The result shows that the thin client computer may access the server machine and different operating systems remotely. In addition, the result shows that the Ubuntu 12.04 has the lowest response time compared with Windows 7 from the server to the thin client computer. Then, the thin client computer can run heavier load applications virtually and it has determined the Ubuntu 12.04 is the best operating system compared to Windows 7 in order to run applications on the Xen Cloud Platform.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121717830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A survey on wireless mesh networks: Architecture, specifications and challenges 无线网状网络调查:架构、规范和挑战
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908725
M. Eslami, Omidreza Karimi, T. Khodadadi
{"title":"A survey on wireless mesh networks: Architecture, specifications and challenges","authors":"M. Eslami, Omidreza Karimi, T. Khodadadi","doi":"10.1109/ICSGRC.2014.6908725","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908725","url":null,"abstract":"Wireless Mesh Network (WMN) is an emerging and practical wireless solution for metropolitan area networks to provide community broadband Internet access services by organizing and configuring nodes in the network efficiently and dynamically. In this survey, the concept of wireless mesh network has been described briefly as an emerging technology to provide Internet in large areas. Accordingly, the architecture of these networks has been explained regarding to the client meshing backbone, characteristics and advantages of wireless mesh networks have been specified, and the performance of different layers in during communication in these networks has been described. In addition, due to the performance of wireless mesh networks various issues and challenges are raised. Thus, these challenges have been specified in this paper and related research areas were proposed to solve defined challenges.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133908237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Mobile botnet detection: Proof of concept 移动僵尸网络检测:概念验证
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908733
Zubaile Abdullah, M. Saudi, N. B. Anuar
{"title":"Mobile botnet detection: Proof of concept","authors":"Zubaile Abdullah, M. Saudi, N. B. Anuar","doi":"10.1109/ICSGRC.2014.6908733","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908733","url":null,"abstract":"Nowadays mobile devices such as smartphones had widely been used. People use smartphones not limited for phone calling or sending messages but also for web browsing, social networking and online banking transaction. To certain extend, all confidential information are kept in their smartphone. As a result, smartphones became as one of the cyber-criminal main target especially through an installation of mobile botnet. Eurograbber is an example of mobile botnet that being installed via infected mobile application without victim knowledge. It will pretense as mobile banking application software and steal financial transaction information from victim's smartphone. In 2012, Eurograbber had caused a total loss of USD 47 Million accumulatively all over the world. Based on the implications posed by this botnet, this is the urge where this research comes in. This paper presents a proof of concept on how the botnet works and the ongoing research to detect and respond to the mobile botnet efficiently. Detection of botnet malicious activity is done through an analysis of Crusewind Botnet code using reverse engineering process and static analysis technique.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134609571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
UAA: User authentication agent for managing user identities in cloud computing environments UAA:用户身份验证代理,用于管理云计算环境中的用户身份
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908723
Faraz Fatemi Moghaddam, Nasrin Khanezaei, S. Manavi, M. Eslami, Alireza Samar
{"title":"UAA: User authentication agent for managing user identities in cloud computing environments","authors":"Faraz Fatemi Moghaddam, Nasrin Khanezaei, S. Manavi, M. Eslami, Alireza Samar","doi":"10.1109/ICSGRC.2014.6908723","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908723","url":null,"abstract":"Cloud computing is the realization for a long-held dream of computing as utility of establishment of on-demand IT services. The considerable specifications of this emerging technology have attracted attentions of many users and enterprises in various industries. However, there are some considerable concerns that reduce reliability of cloud-based services. Managing user identities in clouds is one of the most challenging security issues that has led to many performed researches in this area. Hence, an agent-based user authentication model has been presented in this paper to enhance security of cloud computing environments. A unique extension has been provided in the proposed model is to identify the ownership of private individual devices and to establish a reasonable and logical dependency between cloud servers and clients. Furthermore, a provisional access permission algorithm has been presented for un-registered devices to investigate and verify authenticity and correctness of one-time access requests by a higher level of security in comparison with current models. The proposed model has been introduced and evaluated regarding to three main parameters: performance, security, and scalability. The analysis of user authentication agent shows that this model enhances the rate of security and reliability in cloud computing environments without affecting the rate of energy and time consumption, and scalability.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133498104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Capacity improvement for heterogeneous LTE network by using Fractional Frequency Reuse method 基于分数频率复用方法的异构LTE网络容量改进
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908692
M. Rosdi, A. L. Yusof, M. Ali, N. Ya'acob, M. Ismail, M. A. Zainali, Mohd Saufi NasroAli, B. Abu Bakar
{"title":"Capacity improvement for heterogeneous LTE network by using Fractional Frequency Reuse method","authors":"M. Rosdi, A. L. Yusof, M. Ali, N. Ya'acob, M. Ismail, M. A. Zainali, Mohd Saufi NasroAli, B. Abu Bakar","doi":"10.1109/ICSGRC.2014.6908692","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908692","url":null,"abstract":"In cellular network, it is predictable that 2/3 of calls and more 90% data services take place indoors. Because of that reasons, the User Equipment (UE) will having serious problem regarding on capacity achieving in indoors place. Due to this scenario, the femtocell is deployed in order to provide a good indoor coverage. However, deployment of femtocells pose a number of challenges and one of it is how to handle the co-channel interference. Co-channel interference occurs due to the femtocells sharing the same frequency band allocating as macrocells. To resolve this issue, a method called Fractional Frequency Reuse (FFR) is proposed in this paper in order to reduce the interferences in macrocell and femtocell hence the higher capacity network can be achieved. The method focuses on the analyzing and improving the macrocell user's capacity and maximizes the femtocell capacity. The simulation results show that choosing the fraction of center system bandwidth and fraction of center radius becomes important since the proper resource partitioning and interference coordination can be achieved so that it can increasing the user's capacity in network.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116809662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Public perspective on economic value of landscape characteristics in spatial planning at Langkawi 兰卡威空间规划中景观特征的经济价值的公众视角
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908704
Siti Asmaa' Hasshim, Azman A. Rahman, Mazzueen Mat Kalid, A. Samad
{"title":"Public perspective on economic value of landscape characteristics in spatial planning at Langkawi","authors":"Siti Asmaa' Hasshim, Azman A. Rahman, Mazzueen Mat Kalid, A. Samad","doi":"10.1109/ICSGRC.2014.6908704","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908704","url":null,"abstract":"Landscape conservation in rural area is not the crucial element to be considered under the development planning of Malaysia. It is because the public believe that the characteristics of landscape in rural area are the way forward to become a developed country. This approach will result in the disappearance of its own identity in Malaysia. So that, addressing the conservation of landscape in rural area is very significant to ensure that it will not be taken up by rapid development, threats, climate change and others. This study is conducted to advance fundamental knowledge about landscape characteristics conservation in rural area. The purposed of this study is to explore the public perspectives on economic value of landscape characteristics in spatial planning. The area under this study is in a rural area of Langkawi Island. The methodology that used in this study is adopted a mix method approach (qualitative as a core) to analyses the landscape characteristics conservation. Meanwhile, to analyses the economic value of landscape characteristics in rural areas were estimated by the more commonly use Contingent Valuation Method (CVM).","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121830199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integration of Geographic Information System (GIS) and hydraulic modelling to simulate floodplain inundation level for Bandar Segamat 结合地理资讯系统(GIS)及水力模型,模拟西加马港洪泛区淹没水位
2014 IEEE 5th Control and System Graduate Research Colloquium Pub Date : 2014-09-25 DOI: 10.1109/ICSGRC.2014.6908706
N. A. Sulaiman, N. F. A. Aziz, Nazirah Md Tarmizi, A. Samad, W. Z. Jaafar
{"title":"Integration of Geographic Information System (GIS) and hydraulic modelling to simulate floodplain inundation level for Bandar Segamat","authors":"N. A. Sulaiman, N. F. A. Aziz, Nazirah Md Tarmizi, A. Samad, W. Z. Jaafar","doi":"10.1109/ICSGRC.2014.6908706","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908706","url":null,"abstract":"Flooding is an unavoidable disaster. However, the impact and the risk to be affected by flooding can be reduced. Recently, floodplain modeling known as new method applied in river engineering modeling and has been used by many researchers in determining flood prone area, The objective of this research is to explore the integration of Geographic Information System (GIS) and hydraulic simulation model, Hydrologic Engineering Centers River Analysis System (HEC RAS) in determining the steady flow simulation model and possibility flooding areas for Bandar Segamat Johor. The methodology of this research is divided into 5 stages, include study area identification, data acquisition, data processing (spatial data generation), data processing (simulation), result and analysis. In this research, steady flow for Segamat River and Kapeh River was simulated. Flood map was produced by integrating both GIS and HEC RAS analysis. The results suggest that the integration of HEC RAS and GIS analysis can lead to a better visualization for flood mapping to be used by the society and considered to be helpful for future development.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131571593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信