Pub Date : 2019-06-11DOI: 10.1109/IACS.2019.8809172
Georgios A. Dafoulas, Ariadni Tsiakara, C. Maia, David Neilson
Increasingly augmented reality becomes an integrated component of modern learning environments. This paper builds on previous work to focus on the evaluation of how augmented reality and in particular the use of an Optical Head Mounted Display (OHMD) for the creation of learning portfolios. Emphasis is given on the evaluation of the use of such tools for different learning activities. The paper provides an in depth analysis of how the technology is evaluated by using Belbin’s team role theory for classifying participants’ responses. The paper’s final contribution is in the form of a discussion of a range of issues associated with privacy and security of personal information collected with the use of OHMD in learning environments.
{"title":"Evaluating the use of augmented reality in learning portfolios for different team roles","authors":"Georgios A. Dafoulas, Ariadni Tsiakara, C. Maia, David Neilson","doi":"10.1109/IACS.2019.8809172","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809172","url":null,"abstract":"Increasingly augmented reality becomes an integrated component of modern learning environments. This paper builds on previous work to focus on the evaluation of how augmented reality and in particular the use of an Optical Head Mounted Display (OHMD) for the creation of learning portfolios. Emphasis is given on the evaluation of the use of such tools for different learning activities. The paper provides an in depth analysis of how the technology is evaluated by using Belbin’s team role theory for classifying participants’ responses. The paper’s final contribution is in the form of a discussion of a range of issues associated with privacy and security of personal information collected with the use of OHMD in learning environments.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125752372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-11DOI: 10.1109/IACS.2019.8809134
G. Saldamli, Harsha Sanjeeva, Karthik Siddalingaapa, Ruthra Vadivel Murugesan, L. Ertaul
Stability and security are the most important two release requirements of a modern application development process. As the number of users of an application increases, the network traffic grows. This results in an increase in the server load as well as the threats. If this traffic is not nicely controlled the user would experience a mitigation in application’s performance. To provide a continuous and secure service, the load on the system must be optimally distributed among multiple servers. In the literature, there are various algorithms that are proposed to balance the load on a system. In this study, we introduce a load balancing module for a generic web application to distribute the load optimally using Software Defined Networking (SDN) controllers. The proposed system employs a round-robin scheme for server allocation and implements an open-source SDN controller that runs inside a docker container. To provide reliability, the web application is developed using the ReactJS and NodeJS. The privacy and data confidentiality is provided by using the NISTs new format preserving encryption standard. The proposed method is suitable for real world applications as shown in the performance profiling that we carried using Openload toolset.
{"title":"A Secure Collaborative Module on Distributed SDN","authors":"G. Saldamli, Harsha Sanjeeva, Karthik Siddalingaapa, Ruthra Vadivel Murugesan, L. Ertaul","doi":"10.1109/IACS.2019.8809134","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809134","url":null,"abstract":"Stability and security are the most important two release requirements of a modern application development process. As the number of users of an application increases, the network traffic grows. This results in an increase in the server load as well as the threats. If this traffic is not nicely controlled the user would experience a mitigation in application’s performance. To provide a continuous and secure service, the load on the system must be optimally distributed among multiple servers. In the literature, there are various algorithms that are proposed to balance the load on a system. In this study, we introduce a load balancing module for a generic web application to distribute the load optimally using Software Defined Networking (SDN) controllers. The proposed system employs a round-robin scheme for server allocation and implements an open-source SDN controller that runs inside a docker container. To provide reliability, the web application is developed using the ReactJS and NodeJS. The privacy and data confidentiality is provided by using the NISTs new format preserving encryption standard. The proposed method is suitable for real world applications as shown in the performance profiling that we carried using Openload toolset.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123349964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-11DOI: 10.1109/IACS.2019.8809169
Sari Awwad
Arabic word term stem became an essential part of any text processing algorithms and information retrieval. The big challenge is how to distinguish between affixes and original characters in Arabic term, where some characters become affixes in Arabic terms and become original in other Arabic terms. The goal of this research is to discover what extent depends on affix stripping to find Arabic term stem. The contribution consists of two parts, starting with removing all kinds of affixes from Arabic term, it has been done by constructing affixes hash tables. The second part is producing 24 possible stems for the same Arabic term by using 24 stripping orders.The experiments proved that there is at least one correct stem out of 24 possible stems. The conclusion is that the most efficient stripping orders are those that begin by removing prefixes followed by removing infixes, and then removing suffixes. The dataset that is used for testing consists of four different subject documents with 2000 Arabic words. The final results after using stripping orders has reached up to 86% of correctness which is the highest percentage comparing to other stripping orders.
{"title":"Arabic Word stemming Based on Pattern Affixes Removal","authors":"Sari Awwad","doi":"10.1109/IACS.2019.8809169","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809169","url":null,"abstract":"Arabic word term stem became an essential part of any text processing algorithms and information retrieval. The big challenge is how to distinguish between affixes and original characters in Arabic term, where some characters become affixes in Arabic terms and become original in other Arabic terms. The goal of this research is to discover what extent depends on affix stripping to find Arabic term stem. The contribution consists of two parts, starting with removing all kinds of affixes from Arabic term, it has been done by constructing affixes hash tables. The second part is producing 24 possible stems for the same Arabic term by using 24 stripping orders.The experiments proved that there is at least one correct stem out of 24 possible stems. The conclusion is that the most efficient stripping orders are those that begin by removing prefixes followed by removing infixes, and then removing suffixes. The dataset that is used for testing consists of four different subject documents with 2000 Arabic words. The final results after using stripping orders has reached up to 86% of correctness which is the highest percentage comparing to other stripping orders.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-11DOI: 10.1109/IACS.2019.8809109
Hadeel Alazzam, W. Almobaideen
Selecting the localization of sensors in Wireless Sensor Networks (WSNs) is a big challenge, especially in a wide area. In this paper, a new method is proposed to place sensors using hybrid approach where a large portion of sensors is distributed randomly, while a smaller portion of about 10% of the total number of sensors is distributed in a managed way based on the results of a genetic searching algorithm. Two fitness functions are used for comparison purposes, and Omnet++ simulator was used to conduct the experiment designed to evaluate the proposed method effect on the lifetime of the WSN. Results show that the proposed method increases the lifetime and the throughput of WSN significantly.
{"title":"Enhancing The Lifetime of Wireless Sensor Network using Genetic Algorithm","authors":"Hadeel Alazzam, W. Almobaideen","doi":"10.1109/IACS.2019.8809109","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809109","url":null,"abstract":"Selecting the localization of sensors in Wireless Sensor Networks (WSNs) is a big challenge, especially in a wide area. In this paper, a new method is proposed to place sensors using hybrid approach where a large portion of sensors is distributed randomly, while a smaller portion of about 10% of the total number of sensors is distributed in a managed way based on the results of a genetic searching algorithm. Two fitness functions are used for comparison purposes, and Omnet++ simulator was used to conduct the experiment designed to evaluate the proposed method effect on the lifetime of the WSN. Results show that the proposed method increases the lifetime and the throughput of WSN significantly.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133861819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-11DOI: 10.1109/IACS.2019.8809175
Mohammed Sajedur Rahman
Patients’ acceptance of healthcare-technology is crucial for better and more affordable healthcare. However, there is evidence that some patients believe using healthcare-technology is a threat to the privacy of their health-related information. Privacy calculus is a widely accepted theory to explain technology adoption behavior when it involves disclosure of personal information. The applicability and effectiveness of privacy calculus model in explaining healthcare technology adoption behavior is still unknown and requires further investigation. In this study, we propose an extended privacy calculus model incorporating health condition emotion as an additional factor that interplays with the two privacy calculus factors. We tested our model with responses from 239 participants. The results revealed that health emotion related to individuals’ on-going health condition interact with the privacy calculus components to influence their health-related technology adoption decisions. The results have important implications for both theory and practice in healthcare domain.
{"title":"Does Privacy Matters When We are Sick? An Extended Privacy Calculus Model for Healthcare Technology Adoption Behavior","authors":"Mohammed Sajedur Rahman","doi":"10.1109/IACS.2019.8809175","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809175","url":null,"abstract":"Patients’ acceptance of healthcare-technology is crucial for better and more affordable healthcare. However, there is evidence that some patients believe using healthcare-technology is a threat to the privacy of their health-related information. Privacy calculus is a widely accepted theory to explain technology adoption behavior when it involves disclosure of personal information. The applicability and effectiveness of privacy calculus model in explaining healthcare technology adoption behavior is still unknown and requires further investigation. In this study, we propose an extended privacy calculus model incorporating health condition emotion as an additional factor that interplays with the two privacy calculus factors. We tested our model with responses from 239 participants. The results revealed that health emotion related to individuals’ on-going health condition interact with the privacy calculus components to influence their health-related technology adoption decisions. The results have important implications for both theory and practice in healthcare domain.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-11DOI: 10.1109/IACS.2019.8809119
Georgios A. Dafoulas, Ariadni Tsiakara, Jerome Samuels-Clarke, C. Maia, David Neilson, Almaas A. Ali
The Internet of Things (IoT) is based on the use of interconnected device for data transfer. This paper describes findings from current work that uses a range of sensors that are connected together in collecting biometric data from learners. The research is focused on assessing learners’ state during different learning activities by using different biometric data. The paper investigates certain patterns of emotion, expressions and Galvanic Skin Response (GSR) (i.e. sweat levels) amongst participants. The findings are discussed under the prism of learner classification against a number of criteria including learning styles, project management preference, team profile and personality type. The paper contributes in understanding how we can monitor individuals’ state and behaviour during different learning activities and identify predominant patterns.
{"title":"Investigating patterns of emotion and expressions using smart learning spaces","authors":"Georgios A. Dafoulas, Ariadni Tsiakara, Jerome Samuels-Clarke, C. Maia, David Neilson, Almaas A. Ali","doi":"10.1109/IACS.2019.8809119","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809119","url":null,"abstract":"The Internet of Things (IoT) is based on the use of interconnected device for data transfer. This paper describes findings from current work that uses a range of sensors that are connected together in collecting biometric data from learners. The research is focused on assessing learners’ state during different learning activities by using different biometric data. The paper investigates certain patterns of emotion, expressions and Galvanic Skin Response (GSR) (i.e. sweat levels) amongst participants. The findings are discussed under the prism of learner classification against a number of criteria including learning styles, project management preference, team profile and personality type. The paper contributes in understanding how we can monitor individuals’ state and behaviour during different learning activities and identify predominant patterns.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115222024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-11DOI: 10.1109/IACS.2019.8809156
Hafed Zarzour, Ziad Al-Sharif, Y. Jararweh
The success of applying deep learning to many domains has gained strong interest in developing new revolutionary recommender systems. However, there are little works studying these systems that employ deep learning; additionally, there is no study showing how to combine the users and items embedding with deep learning to enhance the effectiveness of the recommender systems. Therefore, this paper proposes a novel approach called RecDNNing with a combination of embedded users and items combined with deep neural network. The proposed recommendation approach consists of two phases. In the first phase, we create a dens numeric representation for each user and item, called user embedding and item embedding, respectively. Following that, the items and users embedding are averaged and then concatenated before being fed into the deep neural network. In the second phase, we use the model of the deep neural network to take the concatenated users and items embedding as the inputs in order to predict the scores of rating by applying the forward propagation algorithm. The experimental results on MovieLens show that the proposed RecDNNing outperforms state-of-the-art algorithms.
{"title":"RecDNNing: a recommender system using deep neural network with user and item embeddings","authors":"Hafed Zarzour, Ziad Al-Sharif, Y. Jararweh","doi":"10.1109/IACS.2019.8809156","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809156","url":null,"abstract":"The success of applying deep learning to many domains has gained strong interest in developing new revolutionary recommender systems. However, there are little works studying these systems that employ deep learning; additionally, there is no study showing how to combine the users and items embedding with deep learning to enhance the effectiveness of the recommender systems. Therefore, this paper proposes a novel approach called RecDNNing with a combination of embedded users and items combined with deep neural network. The proposed recommendation approach consists of two phases. In the first phase, we create a dens numeric representation for each user and item, called user embedding and item embedding, respectively. Following that, the items and users embedding are averaged and then concatenated before being fed into the deep neural network. In the second phase, we use the model of the deep neural network to take the concatenated users and items embedding as the inputs in order to predict the scores of rating by applying the forward propagation algorithm. The experimental results on MovieLens show that the proposed RecDNNing outperforms state-of-the-art algorithms.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124649030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-11DOI: 10.1109/IACS.2019.8809179
A. Kazim, Fadya Almaeeni, Shamsah Al Ali, Farkhund Iqbal, Khalil Al-Hussaeni
In this pervasive digital world, we are witnessing an era where cybercriminals are improving their abilities in taking advantage of wide-spread digital devices to perform various malicious activities. By utilizing anti-forensic techniques, cybercriminals are able to erase or alter digital evidence that can otherwise be used against them in court. One of the most critical sources of digital evidence that forensic investigators examine is the physical memory of a digital device, i.e., Random Access Memory (RAM). RAM is a volatile memory containing data that might be of significant value to forensic investigation. RAM, which stores data about recent activities, stores data only when the device is powered on. Once the device powers off, all the data stored in the RAM is lost permanently. Forensic investigators find great value in RAM data and thus need to preserve such data without harming the integrity of the collected evidence. Many existing tools provide the ability to acquire and analyze images of the data stored in RAM. This paper tackles the fundamental topic of security, privacy, and digital forensics. Specifically, this paper examines memory dumps of 4GB Windows 7 computers with the objective of identifying an instant messaging tool and recovering its chat messages, and recovering master encryption keys of volumes encrypted by BitLocker and TrueCrypt. Throughout this paper, we utilize two widely-used tools, namely Volatility and WinHex, due to their various functionalities designed specifically for memory forensic investigation.
在这个无处不在的数字世界里,我们正在见证一个网络犯罪分子利用广泛的数字设备进行各种恶意活动的能力不断提高的时代。通过利用反取证技术,网络犯罪分子能够删除或修改可能在法庭上对他们不利的数字证据。法医调查人员检查的最重要的数字证据来源之一是数字设备的物理内存,即随机存取存储器(RAM)。RAM是一种易失性存储器,其中包含的数据可能对法医调查有重要价值。存储最近活动数据的RAM仅在设备上电时存储数据。一旦设备断电,存储在RAM中的所有数据将永久丢失。法医调查人员在RAM数据中发现了巨大的价值,因此需要在不损害所收集证据完整性的情况下保存这些数据。许多现有的工具提供了获取和分析存储在RAM中的数据映像的能力。本文讨论了安全、隐私和数字取证的基本主题。具体而言,本文研究了4GB Windows 7计算机的内存转储,目的是识别即时通讯工具并恢复其聊天消息,并恢复由BitLocker和TrueCrypt加密的卷的主加密密钥。在本文中,我们使用了两个广泛使用的工具,即波动性和WinHex,因为它们具有专门为内存取证调查设计的各种功能。
{"title":"Memory Forensics: Recovering Chat Messages and Encryption Master Key","authors":"A. Kazim, Fadya Almaeeni, Shamsah Al Ali, Farkhund Iqbal, Khalil Al-Hussaeni","doi":"10.1109/IACS.2019.8809179","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809179","url":null,"abstract":"In this pervasive digital world, we are witnessing an era where cybercriminals are improving their abilities in taking advantage of wide-spread digital devices to perform various malicious activities. By utilizing anti-forensic techniques, cybercriminals are able to erase or alter digital evidence that can otherwise be used against them in court. One of the most critical sources of digital evidence that forensic investigators examine is the physical memory of a digital device, i.e., Random Access Memory (RAM). RAM is a volatile memory containing data that might be of significant value to forensic investigation. RAM, which stores data about recent activities, stores data only when the device is powered on. Once the device powers off, all the data stored in the RAM is lost permanently. Forensic investigators find great value in RAM data and thus need to preserve such data without harming the integrity of the collected evidence. Many existing tools provide the ability to acquire and analyze images of the data stored in RAM. This paper tackles the fundamental topic of security, privacy, and digital forensics. Specifically, this paper examines memory dumps of 4GB Windows 7 computers with the objective of identifying an instant messaging tool and recovering its chat messages, and recovering master encryption keys of volumes encrypted by BitLocker and TrueCrypt. Throughout this paper, we utilize two widely-used tools, namely Volatility and WinHex, due to their various functionalities designed specifically for memory forensic investigation.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"570 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126104859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/iacs.2019.8809130
{"title":"ICICS 2019 Sponsors","authors":"","doi":"10.1109/iacs.2019.8809130","DOIUrl":"https://doi.org/10.1109/iacs.2019.8809130","url":null,"abstract":"","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121335249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/IACS.2019.8809167
Y. M. Al-Rawashdeh, S. E. Ferik, M. A. Abido
In this paper, a robust full-car active suspension system is designed. All parameters involved, except those related to the chassis of the car, are considered uncertain and the center of gravity position is assumed to be fixed. The resulting uncertain system constitutes of many uncertain parameters and the robust problem is found to be non-convex. Particle Swarm Optimization technique is devised to solve this problem resulting in an iterative PSO/LMI optimization algorithm. SimMechanics is used to build the nonlinear full-car model and to allow future extensions such that complex cases can be considered, i.e., the passengers, goods, or the like might be uncertain or having their own dynamics onboard.
{"title":"Robust Full-Car Active Suspension System","authors":"Y. M. Al-Rawashdeh, S. E. Ferik, M. A. Abido","doi":"10.1109/IACS.2019.8809167","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809167","url":null,"abstract":"In this paper, a robust full-car active suspension system is designed. All parameters involved, except those related to the chassis of the car, are considered uncertain and the center of gravity position is assumed to be fixed. The resulting uncertain system constitutes of many uncertain parameters and the robust problem is found to be non-convex. Particle Swarm Optimization technique is devised to solve this problem resulting in an iterative PSO/LMI optimization algorithm. SimMechanics is used to build the nonlinear full-car model and to allow future extensions such that complex cases can be considered, i.e., the passengers, goods, or the like might be uncertain or having their own dynamics onboard.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124803116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}