By Topic

Control and System Graduate Research Colloquium (ICSGRC), 2012 IEEE

Date 16-17 July 2012

Filter Results

Displaying Results 1 - 25 of 83
  • [Title page]

    Publication Year: 2012 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (834 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012 , Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (834 KB)  
    Freely Available from IEEE
  • Organizing committee

    Publication Year: 2012 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (32 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (39 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012 , Page(s): v - x
    Save to Project icon | Request Permissions | PDF file iconPDF (103 KB)  
    Freely Available from IEEE
  • Research for security strategy of cloud service based on system survivability

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (720 KB) |  | HTML iconHTML  

    Along with the ragingly increasing concern about cloud computing due to its appalling potential merits, not only do we envision its blossom prospect, but we also realize that the importance and the major traits of system survivability in cloud computing. Therefore, this paper firstly discusses the basic concept and main characteristics of cloud computing. And in sequence it summarizes the definition and strategies of system survivability in traditional secure engineering. What is more important is that, basing on the analysis system survivability in such nascent progressing trend, this paper proposes certain security strategies and model of cloud service in order to maintain and propel system survivability in cloud computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The analysis and design of trusted computing applied into cloud

    Publication Year: 2012 , Page(s): 5 - 9
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (746 KB) |  | HTML iconHTML  

    Although making changes in hardware is not the only means to enhance security, it still holds the undefeatable advantages for security comparing with software. Trusted computing is such a kind of security technology that relies on the basis of making changes in hardware. Moreover, thus technology is already developed relevant standard specifications and it owns advantages of stronger security and more efficiency in information communications. In the cloud computing era, whose environment requires high security for information and services, trusted computing is proposed by this paper with objective analysis, original improvement and novel evolvement by adding two new modules: Service Authentication List Management (SAL), and Configuration Dynamic Update Module, (CUM). We also present and illustrate an abstract model for Trusted Computing Applied into the Cloud. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feed-forward control of non-minimum phase XY table system using Trajectory Fuzzy-RLS Hybrid ZPETC

    Publication Year: 2012 , Page(s): 10 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (797 KB) |  | HTML iconHTML  

    A tracking control for non-minimum phase (NMP) XY Table could not use directly the inverse closed-loop transfer function as the feed-forward controller. This is due to unstable zeros of the closed-loop transfer function will become unstable poles at the feed-forward controller. Thus, ZPETC was introduced to encounter this unstable zeros problem. The ZPETC that was introduced by Tomizuka has unity gain for low frequencies, but not at high frequencies. Hence, this paper proposed a scheme called Trajectory Fuzzy-RLS Hybrid ZPETC without factorization of zeros polynomial where the optimum controller parameters are obtained offline using recursive least square (RLS) method and further retune online through fuzzy inference system (FIS). The tracking performance was compared with the design using Trajectory-Adaptive ZPETC. The simulation and real-time controls of the NMP XY Table show that the tracking performances for circular movement are significantly improved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time control of non-minimum phase XY table system using trajectory-adaptive ZPETC

    Publication Year: 2012 , Page(s): 16 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (764 KB) |  | HTML iconHTML  

    In XY Table system, perfect tracking control (PTC) with zero tracking error is desired. This can be achieved by introducing a feed-forward controller that acts as an inverse of the system closed-loop transfer function and cancelling all poles and zeros of the closed-loop system. Adding feed-forward controller in axis controller can prompt the response of the single axis. Consequently, minimize the tracking error of each individual axis. This result an overall transfer functions of unity between the desired output and the actual output. In non-minimum phase (NMP) system where one of the zeros located outside the unit circle, unfortunately, this feed-forward controller could not be implemented as this would result an unstable tracking control. Thus, this paper proposes a Trajectory-Adaptive ZPETC without factorization of zeros polynomial scheme in which the optimum set of αk are automatically tuned online to reduce this NMP zeros problem. Simulation and experimental results of the real-time control of XY Table show that the tracking performance for lemniscates movement is significantly improved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flood water level modelling and prediction using artificial neural network: Case study of Sungai Batu Pahat in Johor

    Publication Year: 2012 , Page(s): 22 - 25
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (736 KB) |  | HTML iconHTML  

    Flood water level prediction has long been the earliest forecasting problems that have attracted the interest of many researchers. Accurate prediction of flood water level is extremely importance as an early warning system to the public to inform them about the possible incoming flood disaster. Using the collected data at the upstream and downstream station of a river, this paper proposes a modelling of flood water level at downstream station using back propagation neural network (BPN). In order to improve the prediction values, an extended Kalman filter was introduced at the output of the BPN. The introduction of extended Kalman filter at the output of BPN shows significant improvement to the prediction and tracking performance of the actual flood water level. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of ODFC for angular position control of cart-pendulum dynamic model

    Publication Year: 2012 , Page(s): 26 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (767 KB) |  | HTML iconHTML  

    This paper investigates the implementation of output delayed feedback control (ODFC) technique for controlling the pendulum sway angle of a cart-pendulum control system. Linearized mathematical model of the cart control in state space form is considered for the investigation. The designed ODFC has undergone complete stability analysis with two different approaches for a given controller gain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heading direction anticipation using visual feedback system

    Publication Year: 2012 , Page(s): 32 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (856 KB) |  | HTML iconHTML  

    This paper presents a technique of visual feedback system application to interpret heading direction which can be adapted to a moving system such as walking mobile robot. An optical flow is used to extract information obtained from generation of images sequence from the visual feedback system. The generation of optical flow is done by differential based method and the heading direction is represented by angle estimation. The technique was tested in two conditions in which a situation of a static camera with moving object and in a situation where moving camera with static environment. The efficiency of the visual feedback system is evaluated using root mean square error (RMSE) in order to determine the performance of proposed method in angle representation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customized instruction set simulation for soft-core RISC processor

    Publication Year: 2012 , Page(s): 38 - 42
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (856 KB) |  | HTML iconHTML  

    This paper presents the instruction set simulation process for soft-core Reduced Instruction Set Computer (RISC) processor. The aim of this paper is to provide reliable simulation platform in creating customizable instruction set for Application Specific Instruction Set Processor (ASIP). The targeted RISC processor is based on basic 8-bit PIC16C5X-compatible processor where the architecture is reconfigurable through Hardware Description Language (HDL). Instruction set architecture (ISA) has been modified in term of instruction width and machine instruction. Memory address remapping algorithm is introduced to remap the memory address to correct physical memory address due to memory banking scheme being applied. A total number of 34 instruction sets are simulated and verified its operations. Selected instruction set has been reconfigured from its original operation to demonstrate the ability to modify current instruction set to suit certain specialized application. The simulation is done using a Java-based CPU architecture simulation program and data movements at file register array and memory registers are monitored to verify the correct working operation of each instruction set. The instruction set simulation process is proved capable to be the starting point in creating a reconfigurable RISC processor with customized instruction set, inline with ASIP methodology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GMT feature extraction for representation of BIM sign language

    Publication Year: 2012 , Page(s): 43 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1144 KB) |  | HTML iconHTML  

    This paper focuses on the features extraction from the hand region segmentation involved in the earlier pre-processing module for Bahasa Isyarat Malaysia (BIM) sign language recognition. This Human Computer Interaction (HCI) research intention is to provide a system for aiding those with impaired hearing community to communicate with the public community in Malaysia specifically. Vision based technique has been proposed for data collection technique. Gestural Motion Trajectories (GMT) are used to keep track the movement of the hand. The objectives of this paper is to determine whether the feature extraction methods used can produced good features to get the discriminate value to distinguish each sign language. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New hybrid model reference adaptive supervisory fuzzy logic controller for shell-and-tube heat exchanger temperature system

    Publication Year: 2012 , Page(s): 49 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (950 KB) |  | HTML iconHTML  

    The control of the outlet temperature of a co-current shell-and-tube heat exchanger with the new hybrid model reference adaptive supervisory fuzzy controller (MRASFC) is presented in this paper. The outlet temperature of the cold fluid is controlled by manipulate the flow of the hot fluid while both temperature fluids keep constant. The shell-and-tube heat exchanger system is modeled mathematically and simulated using MATLAB/Simulink software. The Fuzzy Inference Structure (FIS) used is Sugeno-type. The normalized fuzzy controller using Gaussian membership function (MF) with 3×3 rule bases while hybrid MRAFC also using Gaussian MF with 3×3 rule bases. The performances on set point test of the fuzzy logic controllers with and without hybrid design are compared to PID controller based on maximum overshoot, settling time, number of oscillations and IAE. The results showed that MRASFC produced reduced overshoot, shorter settling time with less oscillation and minimum IAE compare to fuzzy and PID controller. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GUI system for enhancing blood vessels segmentation in digital fundus images

    Publication Year: 2012 , Page(s): 55 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1013 KB) |  | HTML iconHTML  

    An automated image processing system has the potential to aid ophthalmologist in diagnosing eye retinopathy diseases by presenting changes of retina features. One of the algorithms involved in the process is blood vessels segmentation. This paper proposes development of a Graphical User Interface (GUI) system that produces enhancement of blood vessels segmentation in digital fundus images. The system can help ophthalmologist in improving morphological procedures by observing significant features in the processed images for early diagnosis. The process of GUI creation is by using Qt Creator software while blood vessels segmentation methods utilize Canny and other morphology-based techniques. The outcome is a better processed image that can be the basis for further image enhancement so that eventually a diagnostic tool for diabetic retinopathy can be produced. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing cavity-enclosed microstrip antenna for gain enhancement

    Publication Year: 2012 , Page(s): 60 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1102 KB) |  | HTML iconHTML  

    The antenna has been designed to observe and analyze the effect of the addition of perfect electric conductive (PEC) cavity-enclosed to a rectangular microstrip antenna. The calculated parameters have been optimized using Computer Simulation Technology (CST) software. The design prototype has been fabricated and the output was measured using Vector Network Analyzer (VNA). The simulated and measured results are then compared. It is observed that the gain is improved when PEC cavity is added to the microstrip antenna. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer security self-efficacy effect: An extention of Technology-to-Performance chain model

    Publication Year: 2012 , Page(s): 64 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1329 KB) |  | HTML iconHTML  

    Given a paucity of research and apparent lack of coherence in information system research, it seems that there is no consensus in the information system field as to how security fits into the information system acceptance, usage, success, utilization, and/or performance impact (effectiveness, efficiency, and satisfaction). This paper is part of an ongoing research project designed to extend the Technology-to-Performance Chain (TPC) model by including the Computer Security Self-Efficacy (CSSE) construct, a strategy of model extension suggested by several researchers. This project aims to examine the research conducted in the last decade in information system journals regarding security issues then based on social cognitive theory, to propose a construct to measure individuals' computer security self-efficacy. Based on the Technology-to-Performance Chain (TPC) model, this study design expected to models and tests relationship among computer security self-efficacy and secures online banking system performance impact. The study will try to answer the question “to what extent has the computer security self-efficacy affected user's perception of secure online banking system effectiveness”. After this research finished, the researcher assume that this study findings will provides an initial step towards understanding of the applicability of social cognitive theory in information system security domain and helps information security professionals design information systems considering the effect of computer security self-efficacy on secure information system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of a log periodic antenna by using proximity fed network

    Publication Year: 2012 , Page(s): 70 - 75
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1070 KB) |  | HTML iconHTML  

    Log periodic antenna (LPA) has been designed using rectangular microstrip patches with inset feed using five elements. The antenna elements and feeding networks is designed using Computer Simulation Technology (CST) Microwave Environment software. The manipulative variable is the spacing between the patches. The simulated and measured results are compared and it is observed that the value of return loss, VSWR and gain of the LPA improved when the value of spacing between patches, d is decreased. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing large dynamic set-point change tracking of MRAC by exploiting fuzzy logic based automatic gain tuning

    Publication Year: 2012 , Page(s): 76 - 81
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1186 KB) |  | HTML iconHTML  

    A Model reference adaptive control (MRAC) belongs to the class of adaptive servo system in which the desired performance is expressed with the help of a reference model. MRAC aims to create a closed loop controller with parameters that can change the response of the system to mimic a desired response. However, analysis unravels that there is a tolerance band for the set point change which defines the effectiveness of a particular adaptive gain (γ). Any changes in the set point which is beyond this band calls for a γ-readjustment. We propose a method which aims to overcome this pitfall in conventional MRAC by fusing fuzzy logic to dynamically vary γ. In essence, a fixed γ which fails to stabilize the system response in the advent of a large change in the average value of the set point shall be empowered with fuzzy logic to do the needful. Also, this concept never requires human interference for gain adjustment. A second order Linear Time Invariant system has been considered for all illustration. The results show considerable improvement in performance over the existing conventional MRAC system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rainfall prediction model using artificial neural network

    Publication Year: 2012 , Page(s): 82 - 87
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1551 KB) |  | HTML iconHTML  

    The multilayered artificial neural network with learning by back-propagation algorithm configuration is the most common in use, due to of its ease in training. It is estimated that over 80% of all the neural network projects in development use back-propagation. In back-propagation algorithm, there are two phases in its learning cycle, one to propagate the input patterns through the network and other to adapt the output by changing the weights in the network. The back-propagation-feed forward neural network can be used in many applications such as character recognition, weather and financial prediction, face detection etc. The paper implements one of these applications by building training and testing data sets and finding the number of hidden neurons in these layers for the best performance. In the present research, possibility of predicting average rainfall over Udupi district of Karnataka has been analyzed through artificial neural network models. In formulating artificial neural network based predictive models three layered network has been constructed. The models under study are different in the number of hidden neurons. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sizing ratio of inverter and PV array for a-Si FS GCPV system in Malaysia's perspectives

    Publication Year: 2012 , Page(s): 88 - 93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (884 KB) |  | HTML iconHTML  

    System design's sizing and natural environmental analysis are two common issues and considered to be among the most crucial part of the study with the objective of enhancing the Grid-connected Photovoltaic (GCPV) performance in Malaysia's perspective. This a-Si GCPV system located near to the Green Energy Research Centre (GERC) Building at Universiti Teknologi MARA (UiTM), Shah Alam, Malaysia. This a-Si GCPV system installation was referred to Malaysian Standard MS1837:2010 and designed based on initial data values of PV module characteristics. To date, most of GCPV system applications using thin-film (TF) PV module technologies in Malaysia were designed at stabilized data values. So, this system is conducted to study the derating factor for matching inverter and PV array sizing and behavior of a-Si FS GCPV system under Malaysia's real condition. The P-V analysis fully utilizes the infield data as a guideline for sizing inverter and PV array, with the aim of guiding the system designer during initial design stage for Malaysia's climate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Femtocell interference mitigation

    Publication Year: 2012 , Page(s): 94 - 99
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1256 KB) |  | HTML iconHTML  

    The demand for the Femtocells deployment is in the rise since it enhances the wireless link and increase the capacity for the wireless network. Femtocell is a home base station designed for use in residential and business areas such as houses, apartments, offices, schools, and markets. It connects to the service provider's network via broadband and normally supports 2 to 6 mobile phones in a small area. Using femtocell will enhance the indoor coverage, save power since it reduces the transmitted power, and in the same time reduce the traffic on microcell. However, the most important challenge in femtocell deployment is interference mitigation and management. In this paper, a state of the art literature review on mitigating interference is presented. First, interference in femtocell environment is classified from different point of views. Then, open issues for femtocell interference research are discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical analysis on human body radiation points

    Publication Year: 2012 , Page(s): 100 - 105
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (804 KB) |  | HTML iconHTML  

    Recently, there has been an increasing concern about scientific investigations of the endogenous electromagnetic fields generated by and contained within the human body. Chakra points are defined as focal spots for reception, absorption and transmission of radiation wave of the human body. Meanwhile brain regions are defined as areas of the brain that represent the cerebrum, cerebellum and brainstem. This paper discusses on frequency characteristic of human body radiation through chakra points and brain regions. A total of 9 sites were investigated for the measurements. The readings from each site were recorded via a frequency counter. A total of 34 healthy subjects comprising of 17 males and 17 females were used in the study. Data analyses were conducted using exploratory and descriptive statistics. Results show that out of the nine sites, three were found to be significant. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BER performance of LBC coded OFDM in different channels

    Publication Year: 2012 , Page(s): 106 - 110
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (613 KB) |  | HTML iconHTML  

    Orthogonal Frequency Division Multiplexing (OFDM) has attracted lot of attention of researchers because of its vital role of it in wireless communication technology. This paper discusses the Bit Error Rate (BER) performance of OFDM system using Differential Phase Shift Keying (DPSK) under various channel conditions. It is seen that coding improves BER performance of OFDM and hence in this work Linear Block coding (LBC) is used for improvement purpose. The reason of selecting differential detection modulation scheme is its receiver structure is simple. The simulation is carried out in MATLAB simulink. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.