Mohd Faris Mohd Fuzi, A. F. Ibrahim, Mohammad Hafiz Ismail, Nur Syakira Ab Halim
{"title":"HOME FADS: A dedicated fire alert detection system using ZigBee wireless network","authors":"Mohd Faris Mohd Fuzi, A. F. Ibrahim, Mohammad Hafiz Ismail, Nur Syakira Ab Halim","doi":"10.1109/ICSGRC.2014.6908695","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908695","url":null,"abstract":"This paper describes the development of innovative low-cost home dedicated fire alert detection system (FADS) using ZigBee wireless network. Our home FADS system are consists of an Arduino Uno Microcontroller, Xbee wireless module (Zigbee wireless), Arduino digital temperature sensor, buzzer alarm and X-CTU software. Arduino and wireless ZigBee has advantages in terms of its long battery life and much cheaper compared to the others wireless sensor network. There are several objectives that need to be accomplished in developing this project which are to develop fire alert detection system (FADS) for home user using ZigBee wireless network and to evaluate the effectiveness of the home FADS by testing it in different distances and the functionality of heat sensor. Based from the experiments, the results show that the home FADS could function as expected. It also could detect heat and alarm triggered when temperature is above particular value. Furthermore, this project provides a guideline for implementing and applying home FADS at home and recommendation on future studies for home FADS in monitoring the temperature on the web server.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127960803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Razavi, N. Sulaiman, R. Sidek, S. Mohammady, P. Varahram
{"title":"Analysis on the parameters of selected mapping without side information on PAPR performances","authors":"S. Razavi, N. Sulaiman, R. Sidek, S. Mohammady, P. Varahram","doi":"10.1109/ICSGRC.2014.6908693","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908693","url":null,"abstract":"Nowadays, the OFDM support the growing request of higher data rate transportation in both wired and wireless communication. The SLM technique is recognized as one of the most capable methods which are applied in OFDM system in order to reduce the problem of high PAPR. However the major drawback of SLM is transmission of side information which has negative result on data rate and bandwidth efficiency. Accordingly the SLM method without sending side information has been proposed. Therefore this paper investigates how the parameters in SLM techniques without Side Information (SI), could have effects on the PAPR performances of the method.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134472603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Black-box modeling of steam distillation pilot-scale using M-level PRS perturbation","authors":"Haslizamri Md Shariff, M. Rahiman","doi":"10.1109/ICSGRC.2014.6908701","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908701","url":null,"abstract":"This paper is proposed to model the steam temperature of steam distillation pilot-scale using system identification. Multi-level Pseudo Random Sequence (M-level PRS) has been implemented to this system to perturb the input of the system. The linear and nonlinear Auto Regressive with Exogenous input (ARX) model structures are used to estimate and validate the model output of steam distillation pilot plant. Both models will be compared to study the performance and flexibility. The validation test is performed by using auto-correlation function (ACF), cross-correlation function (CCF), model fit and Root Mean Square Error (RMSE) to validate the estimated both ARX models.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohd Faris Mohd Fuzi, R. S. Hamid, Muhammad Akram Ahmad
{"title":"Virtual desktop environment on Cloud computing platform","authors":"Mohd Faris Mohd Fuzi, R. S. Hamid, Muhammad Akram Ahmad","doi":"10.1109/ICSGRC.2014.6908700","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908700","url":null,"abstract":"This paper describes about the virtual desktop environment on Cloud computing. In the modern world, the tasks become more complex and difficult to accomplish which causes the existing of heavy load applications in an educational environment. The limitation of computer's specification in the school and universities' laboratory will affect the learning process. Therefore, this paper proposed development of a cloud server machine by using cloud computing platform. The cloud computing is a technology or distributed architecture that used software and desktop Virtualization concept to separates the desktop environment, store data, run applications and allow people to access it remotely. The objectives of this project are to develop a cloud server machine for the thin client computers to be able to access the different operating systems, run heavier load applications, and conduct testing on the effectiveness which include performance level for different operating systems by running the applications using Virtualization concept. The result shows that the thin client computer may access the server machine and different operating systems remotely. In addition, the result shows that the Ubuntu 12.04 has the lowest response time compared with Windows 7 from the server to the thin client computer. Then, the thin client computer can run heavier load applications virtually and it has determined the Ubuntu 12.04 is the best operating system compared to Windows 7 in order to run applications on the Xen Cloud Platform.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121717830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on wireless mesh networks: Architecture, specifications and challenges","authors":"M. Eslami, Omidreza Karimi, T. Khodadadi","doi":"10.1109/ICSGRC.2014.6908725","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908725","url":null,"abstract":"Wireless Mesh Network (WMN) is an emerging and practical wireless solution for metropolitan area networks to provide community broadband Internet access services by organizing and configuring nodes in the network efficiently and dynamically. In this survey, the concept of wireless mesh network has been described briefly as an emerging technology to provide Internet in large areas. Accordingly, the architecture of these networks has been explained regarding to the client meshing backbone, characteristics and advantages of wireless mesh networks have been specified, and the performance of different layers in during communication in these networks has been described. In addition, due to the performance of wireless mesh networks various issues and challenges are raised. Thus, these challenges have been specified in this paper and related research areas were proposed to solve defined challenges.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133908237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile botnet detection: Proof of concept","authors":"Zubaile Abdullah, M. Saudi, N. B. Anuar","doi":"10.1109/ICSGRC.2014.6908733","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908733","url":null,"abstract":"Nowadays mobile devices such as smartphones had widely been used. People use smartphones not limited for phone calling or sending messages but also for web browsing, social networking and online banking transaction. To certain extend, all confidential information are kept in their smartphone. As a result, smartphones became as one of the cyber-criminal main target especially through an installation of mobile botnet. Eurograbber is an example of mobile botnet that being installed via infected mobile application without victim knowledge. It will pretense as mobile banking application software and steal financial transaction information from victim's smartphone. In 2012, Eurograbber had caused a total loss of USD 47 Million accumulatively all over the world. Based on the implications posed by this botnet, this is the urge where this research comes in. This paper presents a proof of concept on how the botnet works and the ongoing research to detect and respond to the mobile botnet efficiently. Detection of botnet malicious activity is done through an analysis of Crusewind Botnet code using reverse engineering process and static analysis technique.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134609571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faraz Fatemi Moghaddam, Nasrin Khanezaei, S. Manavi, M. Eslami, Alireza Samar
{"title":"UAA: User authentication agent for managing user identities in cloud computing environments","authors":"Faraz Fatemi Moghaddam, Nasrin Khanezaei, S. Manavi, M. Eslami, Alireza Samar","doi":"10.1109/ICSGRC.2014.6908723","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908723","url":null,"abstract":"Cloud computing is the realization for a long-held dream of computing as utility of establishment of on-demand IT services. The considerable specifications of this emerging technology have attracted attentions of many users and enterprises in various industries. However, there are some considerable concerns that reduce reliability of cloud-based services. Managing user identities in clouds is one of the most challenging security issues that has led to many performed researches in this area. Hence, an agent-based user authentication model has been presented in this paper to enhance security of cloud computing environments. A unique extension has been provided in the proposed model is to identify the ownership of private individual devices and to establish a reasonable and logical dependency between cloud servers and clients. Furthermore, a provisional access permission algorithm has been presented for un-registered devices to investigate and verify authenticity and correctness of one-time access requests by a higher level of security in comparison with current models. The proposed model has been introduced and evaluated regarding to three main parameters: performance, security, and scalability. The analysis of user authentication agent shows that this model enhances the rate of security and reliability in cloud computing environments without affecting the rate of energy and time consumption, and scalability.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133498104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rosdi, A. L. Yusof, M. Ali, N. Ya'acob, M. Ismail, M. A. Zainali, Mohd Saufi NasroAli, B. Abu Bakar
{"title":"Capacity improvement for heterogeneous LTE network by using Fractional Frequency Reuse method","authors":"M. Rosdi, A. L. Yusof, M. Ali, N. Ya'acob, M. Ismail, M. A. Zainali, Mohd Saufi NasroAli, B. Abu Bakar","doi":"10.1109/ICSGRC.2014.6908692","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908692","url":null,"abstract":"In cellular network, it is predictable that 2/3 of calls and more 90% data services take place indoors. Because of that reasons, the User Equipment (UE) will having serious problem regarding on capacity achieving in indoors place. Due to this scenario, the femtocell is deployed in order to provide a good indoor coverage. However, deployment of femtocells pose a number of challenges and one of it is how to handle the co-channel interference. Co-channel interference occurs due to the femtocells sharing the same frequency band allocating as macrocells. To resolve this issue, a method called Fractional Frequency Reuse (FFR) is proposed in this paper in order to reduce the interferences in macrocell and femtocell hence the higher capacity network can be achieved. The method focuses on the analyzing and improving the macrocell user's capacity and maximizes the femtocell capacity. The simulation results show that choosing the fraction of center system bandwidth and fraction of center radius becomes important since the proper resource partitioning and interference coordination can be achieved so that it can increasing the user's capacity in network.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116809662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siti Asmaa' Hasshim, Azman A. Rahman, Mazzueen Mat Kalid, A. Samad
{"title":"Public perspective on economic value of landscape characteristics in spatial planning at Langkawi","authors":"Siti Asmaa' Hasshim, Azman A. Rahman, Mazzueen Mat Kalid, A. Samad","doi":"10.1109/ICSGRC.2014.6908704","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908704","url":null,"abstract":"Landscape conservation in rural area is not the crucial element to be considered under the development planning of Malaysia. It is because the public believe that the characteristics of landscape in rural area are the way forward to become a developed country. This approach will result in the disappearance of its own identity in Malaysia. So that, addressing the conservation of landscape in rural area is very significant to ensure that it will not be taken up by rapid development, threats, climate change and others. This study is conducted to advance fundamental knowledge about landscape characteristics conservation in rural area. The purposed of this study is to explore the public perspectives on economic value of landscape characteristics in spatial planning. The area under this study is in a rural area of Langkawi Island. The methodology that used in this study is adopted a mix method approach (qualitative as a core) to analyses the landscape characteristics conservation. Meanwhile, to analyses the economic value of landscape characteristics in rural areas were estimated by the more commonly use Contingent Valuation Method (CVM).","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121830199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. A. Sulaiman, N. F. A. Aziz, Nazirah Md Tarmizi, A. Samad, W. Z. Jaafar
{"title":"Integration of Geographic Information System (GIS) and hydraulic modelling to simulate floodplain inundation level for Bandar Segamat","authors":"N. A. Sulaiman, N. F. A. Aziz, Nazirah Md Tarmizi, A. Samad, W. Z. Jaafar","doi":"10.1109/ICSGRC.2014.6908706","DOIUrl":"https://doi.org/10.1109/ICSGRC.2014.6908706","url":null,"abstract":"Flooding is an unavoidable disaster. However, the impact and the risk to be affected by flooding can be reduced. Recently, floodplain modeling known as new method applied in river engineering modeling and has been used by many researchers in determining flood prone area, The objective of this research is to explore the integration of Geographic Information System (GIS) and hydraulic simulation model, Hydrologic Engineering Centers River Analysis System (HEC RAS) in determining the steady flow simulation model and possibility flooding areas for Bandar Segamat Johor. The methodology of this research is divided into 5 stages, include study area identification, data acquisition, data processing (spatial data generation), data processing (simulation), result and analysis. In this research, steady flow for Segamat River and Kapeh River was simulated. Flood map was produced by integrating both GIS and HEC RAS analysis. The results suggest that the integration of HEC RAS and GIS analysis can lead to a better visualization for flood mapping to be used by the society and considered to be helpful for future development.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131571593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}