By Topic

Open Systems (ICOS), 2012 IEEE Conference on

Date 21-24 Oct. 2012

Filter Results

Displaying Results 1 - 25 of 55
  • [Front cover]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (147 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (89 KB)  
    Freely Available from IEEE
  • Welcome address

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (190 KB)  
    Freely Available from IEEE
  • Content

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (459 KB)  
    Freely Available from IEEE
  • Using network protocols' fingerprints to efficiently determine the penetration level of open source software in online businesses

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (380 KB) |  | HTML iconHTML  

    The Open Source Software (OSS) philosophy has revolutionized the world of software usage and development by opening the codes. It was accompanied with a number of freedoms that definitely leads to a continuous enhancement and advancement in these software. At the same time, a benefit of this philosophy is that its adoption implies a reduction of software piracy and, in a few decades, perhaps the near extinction of this crime. Furthermore, the evaluation of adoption of OSS by different companies remains a fuzzy one as the most common approach is the use of questionnaires for a survey. In this paper, an automated methodology is proposed so as to evaluate the level of OSS adoption by online businesses. We also demonstrated how network protocols can be used as fingerprints to determine the penetration level of OSS in public hosts. The study was conducted on the public network underlying Mauritius and revealed the extent to which OSS is adopted. The methodology used can be applied to other territories for a similar assessment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • All-pass digital system design using second-order cone programming

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (196 KB) |  | HTML iconHTML  

    In this paper, we propose a new approach for designing an all-pass (AP) digital filter that approximates a given ideal phase response in the minimax error sense. Originally, such a design problem is highly non-linear and difficult to solve. This paper formulates the non-linear problem as a second-order-cone programming (SOCP) problem and then solves the design problem using any SOCP-solver (software). After the SOCP-based design is formulated, the AP filter coefficients can be easily found through solving the SOCP problem. As compared with the existing linear programming (LP) design, the SOCP-based design method achieves more accurate fitting. A design example is given for illustrating the performance improvement of the SOCP-based design approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real time implementation of intrusion detection system with reconfigurable architecture

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (277 KB) |  | HTML iconHTML  

    Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations of computer security policies, or standard security practices. Intrusion detection system identifies possible incidents, logs information and provides report about them. In this article a real time intrusion detection system using SNORT rules and KMP algorithm is implemented in reconfigurable hardware. The parallel structure of this architecture let us to achieve a high real time performance at rate 100Mbps as it is shown by simulation and synthesis results on VIRTEX4. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative analysis of IEEE 802.11g multimedia multicast performance using RTP with an implemented test-bed

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (281 KB) |  | HTML iconHTML  

    In network layer protocols, the most efficient way of sending similar packets to a group of nodes is via multicast. Multicast is a profound concept that has been around for some time and has seen through its implementation in various aspects of today's network access technology. The IEEE 802.11 wireless standards, however, loosely honor IP layer multicast packets by encapsulating them in broadcast frames. This in turn degrades the 802.11 network access bandwidth capacity and further decreases its data transmission reliability. An enhancement workaround which has been devised was to encapsulate multicast packets in a unicast MAC layer frame. In addition, RTP was also observed to be an enabler to better user experience in multicast streaming. In this paper, we investigate the 802.11g multicast performance with and without the enhanced multicast mechanism. We further expand our investigation by implementing RTP during the multimedia multicast stream and without it. Our results lead us to conclude that there are significant advantages of using both the enhanced multicast mechanism and RTP during a multicast streaming via the 802.11g wireless standard. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hands-on undergraduate real-time systems and Hardware-Software development

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (570 KB) |  | HTML iconHTML  

    Real-time systems is one of the topic introduced as part of courses taught in most undergraduate engineering and computer science. From industrial perspective, embedded realtime systems discipline deemed to be important and are widely used in industrial applications such as avionics, aerospace, robotics, automobile, and industrial control etc. This paper shares the hands-on laboratory embedded real-time software utilizing Simulation Program with Integrated Circuit Emphasis (SPICE) having Virtual System Modeling (VSM) capabilities together with low cost microcontroller based system. Using these tools students will not only learn real-time and multitask programming but also exposed to the nitty-gritty and challenges of Hardware Software (HW/SW) development which will contribute towards a better understanding and appreciation of embedded real-time systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing and implementation of a real time virtual laboratory based on multi-agents system

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (427 KB) |  | HTML iconHTML  

    E-learning refers to the way to deliver learning content by means of computer technology. E-learning is classified to synchronous and asynchronous; each has its advantages and disadvantages. Virtual lab is an example of an e-learning and it's a simulated environment which enables students and professionals to do the exercises. The aim of this research is to design and implement an architecture of virtual lab based on multi-agents system. The multi-agent system overcomes some limitations of the well known server-client model. Using multi-agents based virtual lab system provides an adaptable, interactive, extensible, distributed, collaborative virtual lab system to effectively realize the learning anytime and anywhere to our approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Field programmable gate array system for real-time IRIS recognition

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (889 KB) |  | HTML iconHTML  

    Iris recognition is one of the most flawless recognition methods in biometrics. However, most of iris recognition algorithms are implemented based on sequential operations running on central processing units (CPUs). In this article we propose a prototype design for iris recognition based on field-programmable gate array (FPGA) in order to improve iris recognition performance by parallel computing. Time-consuming iris recognition sub-processes are fully implemented in parallel to achieve optimum performance. Unlike commonly used iris recognition methods that first capture a single image of an eye and then start the recognition process, we achieved to speed up the iris recognition process by localizing the pupil and the iris boundaries, unwrapping the iris image and extracting features of the iris image while image capturing was in progress. Consequently, live images from human eye can be processed continuously without any delay. We conclude that iris recognition acceleration by parallel computing can be a complete success when it is implemented on low-cost FPGAs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On critical point avoidance among mobile terminals in healthcare monitoring applications: Saving lives through reliable communication software

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (437 KB) |  | HTML iconHTML  

    The advances in Microelectromechanical systems (MEMS), battery life, low powered communication standards, more capable processing units, and hybrid communication have cemented the use of mobile Wireless Body Area Networks (WBAN) in medical informatics. Although the MEMS were used in medical informatics solutions but they were highly localized, rigged, non-cooperative, and particularly non extendable. The interconnectivity of various network interfaces is the main driving force on the modern technology boom. The morphological features of mobile devices and their use in our daily lives create an opportunity to connect medical informatics systems with the main stream. It promise unobtrusive ambulatory health monitoring for a long period of time and provide real-time updates of the patient's status to the physician. When integrated with the WBAN, the mobile devices play the role of localized data diffusion, classification, and broadcast center. In this paper, the criticality of this `single point of failure' is discussed. Often the untapped flow of data to the mobile device can lead to crashing of the network. A computational model is devised in order to pre estimate the device resource availability matrix and data flow management without creating the denial of service. The speed mismatch due to resource binding violation on the part of the hand held device can be reported and capped before the data loss heeds un noticed. The techniques proposed are analyzed and tested on a test bed, specifically designed for monitoring remote patient vitals. The results obtained show marked improvement from the methods proposed in the contemporary systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Malay declarative sentence: Visualization and sentence correction

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (279 KB) |  | HTML iconHTML  

    Language researchers introduced sentence parse tree visualizations to help in understanding sentence structure, especially in English. Among the applications introduced, phpSyntaxTree and RSyntaxTree give users the opportunity to visualize an English sentence through online interaction. In Malaysia, language research in sentence parse tree visualization for Malay (BM) still hasn't attracted enough researchers to produce a prototype as has been done in English. However, several parsers for BM sentences have been introduced. The parsers will produce a parse tree as an output from the parsing process. Based on the parsers, methods can be extended to produce sentence parse tree visualizations for BM. Parsers for checking sentence structure need to be included in visualization methods. Visualization methods involved consist of (1) tokenizing, (2) checking the number of words, (3) assigning word class, (4) checking spelling or conjunctions, (5) checking and matching with formula, (6) suggestion or visualization (7) word attributes and (8) visualization from a corpus. A prototype for the methods introduced is still under the development and improvement process. However output from the development process in validating the sentence, giving corrections for incorrect sentences and creating a parse tree has had good output results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards integrating information of service level agreement and resources as a services (RaaS) for cloud computing environment

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (230 KB) |  | HTML iconHTML  

    Cloud computing describes services and applications that are extended to be accessible through the Internet. Service Level Agreement (SLA) is a contractual agreement that has been established between the members of Cloud Service Provider (CSP) that consists of the service provider and its recipient for a specific application of services based on its allocating and sharing Resources as a Service (RaaS). In this context, there are many parties who are very concerning about it, but unfortunately there is lack of a common mapping of SLA information and RaaS of best practice as a guideline that can be used by CSP in making decision for the future purposes in engaging with services in the cloud computing environment. Therefore, the main goal of this paper is to integrate information of SLA and RaaS in order to ensure everybody who are providing and receiving the services in the cloud particularly will be satisfied and getting the best maximum Return Of the Investment (ROI) in allocating and sharing resources among the providers and recipients in cloud computing environment. As a result, some attributes such as reliability, readability and standardization of Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) are found to be high. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Android-based automotive middleware architecture for plug-and-play of applications

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1413 KB) |  | HTML iconHTML  

    Modern vehicles are getting increasingly smarter and evolving to become new mobile computing platforms. As the software platformization of vehicles advances, the demands for reconfigurable cars, installing and upgrading vehicle software as plug-and-play have also grown. However, the existing automotive software platforms are not designed for dynamic reconfiguration and plug-and-play. This paper addresses the plug-and-play challenge in the recent automotive systems. Drawing from recent advancements in the mobile phone operating systems, we propose an Android-based software architecture which supports the play-and-play in automotive systems. In our architecture, an application can be downloaded from cloud services and executed on ECUs in a distributed fashion. Before installing an application, our system performs schedulability analysis to check real-time performance requirements for recent vehicles. We also present a model-based development tool for designing a workflow of automotive applications for our system. We implement a prototype and demonstrate the feasibility of our approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bio-inspired trust management in distributed systems — A critical review

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (222 KB) |  | HTML iconHTML  

    Distributed computing has grown rapidly in the recent years. In addition to the increase in the size of individual networks, new types of networks have also emerged providing different types of services to clients. While these systems provide an invaluable service, they also face certain practical issues. Security is one of the most important issues, that must be dealt with by the implementers in order to provide a satisfactory service. Trust and trust management have been drawing the attention of security researchers in order to identify the malicious nodes and separate them from good benevolent nodes and also to quantify the quality of services provided by the nodes in a system. Several trust computing models have been proposed for distributed systems by various researchers. These models are based on different approaches from fuzzy logic, Bayesian model, social networking to bio-inspired mechanisms. In this paper, the authors take a critical look at the bio-inspired trust models reported in the literature with respect to their principles, advantages and disadvantages. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion and latency in symmetric interconnection topology

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (432 KB) |  | HTML iconHTML  

    Interconnection network topologies are those networks which are used in parallel, distributed system or cluster system to provide the communication among multiple processors or nodes. Interconnection network topologies play a big rule in performance of the system. There are many issues regarding interconnection network topologies. In this paper, congestion and latency point of view have been discussed among three different topologies that are Mesh/Torus, Hypercube and Chordal Ring interconnection topology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of virtual machine scalability on distributed multi/many-core processors for big data analytics

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (251 KB) |  | HTML iconHTML  

    Cloud computing makes data analytics an attractive preposition for small and medium organisations that need to process large datasets and perform fast queries. The remarkable aspect of cloud system is that a nonexpert user can provision resources as virtual machines (VMs) of any size on the cloud within minutes to meet his/her data-processing needs. In this paper, we demonstrate the applicability of running large-scale distributed data analysis in virtualised environment. In achieving this, a series of experiments are conducted to measure and analyze performance of the virtual machine scalability on multi/many-core processors using realistic financial workloads. Our experimental results demonstrate it is crucial to minimise the number of VMs deployed for each application due to high overhead of running parallel tasks on VMs on multicore machines. We also found out that our applications perform significantly better when equipped with sufficient memory and reasonable number of cores. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and development of intelligent university program ranking system using JEE frameworks

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (635 KB) |  | HTML iconHTML  

    Web based systems have become the common medium of delivering software applications. Thus, developing web based systems has become a major concern for developers due to the large number of technologies, tools and techniques available today. Developers are often faced with the dilemma of choosing the best technology for their projects especially when developing a high quality system that must comply with certain standards. Enterprise developers often use development frameworks to simplify development job, and to insure that their code follows proven development methodologies. In this paper we describe our approach for developing an intelligent university program ranking system, using a JEE web application framework that has been developed utilizing industry standards and best practices. The development has been done using a well designed JEE web application framework and REpresentational State Transfer (REST) web services to minimize the development time and effort. The system which uses the powerful Adaptive Neuro-Fuzzy Inference System (ANFIS) algorithm for its AI engine is developed using the SEAM framework and RESTEasy web services framework. SEAM has been chosen due to its power and integration capabilities while RESTEasy framework is chosen for its seamless integration with JBoss SEAM. The developed system known as i-Selangkah is divided into two major components; a web based control panel to administer and modify the system as well as the programs fuzzy rules, and a web services interface to provide the existing Selangkah system with the ranking services. i-Selangkah has been successfully implemented, integrated and tested with the existing Selangkah system developed by UiTM. The tests showed that the system can effectively be used together with Selangkah to provide better program advising to these potential applicants with respect to their merit points, the specific and ever-changing program requirements and more significantly, the past intake trends. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptation of the web-based system architecture in the development of the online attendance system

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (911 KB) |  | HTML iconHTML  

    Students' attendance records are important documents for academic institutions that reflect the students' performances and the credibility of the academic institutions. Nevertheless, the process of managing these documents had been done manually, by pen and papers thus making it less efficient. This paper discusses about the development of the new Online Attendance System as the enhancement of the previous developed system named Attendance Register System for higher academic institutions in Malaysia. The new online system is being developed by adapting the concept of the web-based system architecture. The web-based system architecture used in the development of this system involves integration of various open source web-based technologies such as MySQL, PHP and Apache Web Server hence making the Online Attendance System more efficient and cost effective. The development of the Online Attendance System involves four main phases which are the construction of the conceptual framework where the scopes and requirements as well as the target users of the system had been identified, developing the proposed system's architecture by adapting to the web-based architecture, and the construction of the logical design and the physical design. The Online Attendance System consists of automated processes such as able to generate online attendance reports, warning letters and graph charts thus making the processes of recording and reporting the students' attendances more efficient and well-organized. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent system for predicting wireless sensor network performance in on-demand deployments

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (526 KB) |  | HTML iconHTML  

    The need for advanced tools that provide efficient design and planning of on-demand deployment of wireless sensor networks (WSN) is critical for meeting our nation's demand for increased intelligence, reconnaissance, and surveillance in numerous safety-critical applications. For practical applications, WSN deployments can be time-consuming and error-prone, since they have the utmost challenge of guaranteeing connectivity and proper area coverage upon deployment. This creates an unmet demand for decision-support systems that help manage this complex process. This paper presents research-in-progress to develop an advanced decision-support system for predicting the optimal deployment of wireless sensor nodes within an area of interest. The proposed research will have significant impact on the future application of WSN technology, specifically in the emergency response, environmental quality, national security, and engineering education domains. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Long term latitudinal variation of minimum Outgoing Longwave Radiation over South East Asia

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1367 KB) |  | HTML iconHTML  

    Ten years of latitudinal variation of minimum Outgoing Longwave Radiation (OLR) over South East Asia was examined by using weekly OLR data from National Oceanic and Atmospheric Administration (NOAA) polar-orbiting satellites. The study was carried out using data collected from January 2000 to December 2010 which covered a region from longitudes 95°E-110°E; latitudes 20°N-20°S. Fourier function fitting was used to show the annual propagation of minimum OLR and created a new model of latitudinal variation of minimum OLR. The created model can be used to examine the latitude where minimum OLR occur. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognition of geological rocks at the bedded-infiltration uranium fields by using neural networks

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1451 KB) |  | HTML iconHTML  

    Interpretation geophysical data is one of the important factors affecting the economic indicators of mining process. The mining process depend on the speed and accuracy of geophysical data interpretation, but the process of logging data interpretation can not be strictly formalized. Therefore, computer interpretation methods on the basis of expert estimates are necessary. The method is based on expert opinion are widely used in weakly formalized tasks. Mention may be made of the system based on rules, fuzzy logic, Bayesian decision-making systems, artificial neural networks (ANN). ANN have already been used for solving a wide range of recognition problems. The paper analyzes the quality of network's data interpretation essentially depending on its configuration parameters, methods of data preprocessing and learning samples. About 2000 calculation experiments have been made, software and templates for preprocessing of data and interpretation findings have been developed. These experiments showed the effectiveness of neural network approach to solving the problem of geological rocks recognition in stratum-infiltration uranium deposits. Further research in this area will raise the recognition process automation and its accuracy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Derivation of aerosol loading from visibility range in Penang Island using atmospheric model

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (293 KB) |  | HTML iconHTML  

    Atmospheric aerosol has influenced many atmospheric processes including cloud formation, visibility variation and solar radiation transfer. Atmospheric aerosol plays as an important indicator of visibility distance range because it will obscure the objects that can be seen. Visibility degradation has become an environmental topic of community concern in most urban areas because of low visibility range will lead to the deterioration of air quality. In this study, the atmospheric aerosol loading from the image was retrieved by using urban and maritime with visibility range at the distance of 10 km up to 50 km which are later converted into (%) reflectance. Later the works is established the relationship between aerosol loading and visibility was produced using urban and maritime models. To accommodate with the intention research works, Penang Island has been chosen. This is because of the strategic location of Penang Island which located close to the sea and recognized as one of main urbanized city in Malaysia. Results were indicated that visibility was inversely correlated with aerosol loading, the farthest the visibility range, the lower the aerosol loading. Result also showed that the urban aerosol loading estimated is higher than maritime aerosol. This may influence by meteorological factor such as the higher temperatures in urban could lead to higher rate of smog formation. Lower wind speeds will contribute which it may tend to keep pollutants concentrated over urban areas. Atmospheric urban model can derive the estimated minimum aerosol loading (12.1%) when the visibility range is about 30 km can be used to determine the minimum. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prototype selection for training artificial neural networks based on Fast Condensed Nearest Neighbor rule

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4750 KB) |  | HTML iconHTML  

    This paper presents new method for training intelligent networks such as Multi-Layer Perceptron (MLP) and Neuro-Fuzzy Networks (NFN) with prototypes selected via Fast Condensed Nearest Neighbor (FCNN) rule. By applying FCNN, condensed subsets with instances close to the decision boundary are obtained. We call these points High-Priority Prototypes (HPPs) and the network is trained by them. The main objective of this approach is to improve the performance of the classification by boosting the quality of the training-set. The experimental results on several standard classification databases illustrated the power of the proposed method. In comparison to previous approaches which select prototypes randomly, training with HPPs performs better in terms of classification accuracy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.