Pub Date : 2012-12-01DOI: 10.1109/ICCSII.2012.6454560
F. Sibai, H. Trigui, P. C. Zanini, A. R. Al-Odail
Mobile robot localization is an important operation used in several applications. For instance, the location of the mobile robot can be used to associate environment data captured by the robot with the location where this data is captured, or to issue robot commands dependent on location and remaining battery energy. We explore three localization methods for indoor robots: optical wheel encode, ultrasonic sensors, and received WiFi signal strength. We experiment with these localization methods on a National Instruments wheeled DANI robot, compare their accuracies, and evaluate their merits.
{"title":"Evaluation of indoor mobile robot localization techniques","authors":"F. Sibai, H. Trigui, P. C. Zanini, A. R. Al-Odail","doi":"10.1109/ICCSII.2012.6454560","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454560","url":null,"abstract":"Mobile robot localization is an important operation used in several applications. For instance, the location of the mobile robot can be used to associate environment data captured by the robot with the location where this data is captured, or to issue robot commands dependent on location and remaining battery energy. We explore three localization methods for indoor robots: optical wheel encode, ultrasonic sensors, and received WiFi signal strength. We experiment with these localization methods on a National Instruments wheeled DANI robot, compare their accuracies, and evaluate their merits.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134397296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCSII.2012.6454454
A. Darwish, A. Zarka, F. Aloul
Today it is known that the weakest link in the cyber security chain is the computer user. Social engineering attacks are commonly used to deceive computer users to perform actions that could leak private information. Such attacks psychologically manipulate the computer users to reveal his/her confidential information. Therefore, the computer user has been carefully studied by security researchers to understand the relationship between cyber security incidents and the victim background. In this paper, we present a breadth-first survey of recent studies that aim to understand the relationship between victims' backgrounds and phishing attacks. We summarize the characteristics of the phishing victims, following a review of their demographic and personality traits.
{"title":"Towards understanding phishing victims' profile","authors":"A. Darwish, A. Zarka, F. Aloul","doi":"10.1109/ICCSII.2012.6454454","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454454","url":null,"abstract":"Today it is known that the weakest link in the cyber security chain is the computer user. Social engineering attacks are commonly used to deceive computer users to perform actions that could leak private information. Such attacks psychologically manipulate the computer users to reveal his/her confidential information. Therefore, the computer user has been carefully studied by security researchers to understand the relationship between cyber security incidents and the victim background. In this paper, we present a breadth-first survey of recent studies that aim to understand the relationship between victims' backgrounds and phishing attacks. We summarize the characteristics of the phishing victims, following a review of their demographic and personality traits.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132336112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCSII.2012.6454344
Dina Younes, P. Steffan
This paper presents a comparative study on different moduli sets that are used in the Residue Number System (RNS). Choosing a proper moduli set is one of the most important issues in RNS. It greatly affects the performance of the whole system. Many moduli sets have been introduced recently, each of them has its own advantages and disadvantages. Therefore, the necessity to a survey and a comparison between these sets is obvious. This paper demonstrates a detailed study on time and hardware requirements of residue-to-binary converters (RC) and residue arithmetic units (RAU), based on each of the studied sets, categorized by the dynamic range (DR) they provide. Then, the most efficient moduli set for each DR is suggested. The effect of moduli number on the system's performance and complexity is also discussed. Our research is aimed for designs whose main goal and strategy is balanced.
{"title":"A comparative study on different moduli sets in residue number system","authors":"Dina Younes, P. Steffan","doi":"10.1109/ICCSII.2012.6454344","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454344","url":null,"abstract":"This paper presents a comparative study on different moduli sets that are used in the Residue Number System (RNS). Choosing a proper moduli set is one of the most important issues in RNS. It greatly affects the performance of the whole system. Many moduli sets have been introduced recently, each of them has its own advantages and disadvantages. Therefore, the necessity to a survey and a comparison between these sets is obvious. This paper demonstrates a detailed study on time and hardware requirements of residue-to-binary converters (RC) and residue arithmetic units (RAU), based on each of the studied sets, categorized by the dynamic range (DR) they provide. Then, the most efficient moduli set for each DR is suggested. The effect of moduli number on the system's performance and complexity is also discussed. Our research is aimed for designs whose main goal and strategy is balanced.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCSII.2012.6454419
Yucel Tas, A. Yesildirek, A. Sertbas
This paper reports a network based computer simulation and control platform for an unmanned aerial vehicle (UAV). The complete platform has been built by a complex software integration in NIST/ECMA model having user interfaces on distributed platforms, open-source and educational vertical tools accessing public domain maps, satellite images and tool libraries. Entire platform is setup to use UDP for interprocess message communication. Successful integration is illustrated for a UAV and simulation results are presented.
{"title":"Development of a networked control system platform for unmanned aerial vehicles","authors":"Yucel Tas, A. Yesildirek, A. Sertbas","doi":"10.1109/ICCSII.2012.6454419","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454419","url":null,"abstract":"This paper reports a network based computer simulation and control platform for an unmanned aerial vehicle (UAV). The complete platform has been built by a complex software integration in NIST/ECMA model having user interfaces on distributed platforms, open-source and educational vertical tools accessing public domain maps, satellite images and tool libraries. Entire platform is setup to use UDP for interprocess message communication. Successful integration is illustrated for a UAV and simulation results are presented.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132873938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCSII.2012.6454337
E. M. Sahly, O. Sallabi
Design patterns represent a highly effective way to improve the quality of software system, due to its ability to capture the best practices and design knowledge; this enable software engineer to develop their applications. Unfortunately, choosing suitable patterns to specific design problems are difficult task for novice. Over the past years of research in the field of software engineering several conferences and workshops are focused on writing and publishing patterns; this increases the degree of challenges that face the developer in determining the suitable design patterns. This paper presents method to facilitate and assist the designers in selecting the suitable patterns for their problems. We propose a strategy method to obtain the appropriate recommendation.
{"title":"Design pattern selection: A solution strategy method","authors":"E. M. Sahly, O. Sallabi","doi":"10.1109/ICCSII.2012.6454337","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454337","url":null,"abstract":"Design patterns represent a highly effective way to improve the quality of software system, due to its ability to capture the best practices and design knowledge; this enable software engineer to develop their applications. Unfortunately, choosing suitable patterns to specific design problems are difficult task for novice. Over the past years of research in the field of software engineering several conferences and workshops are focused on writing and publishing patterns; this increases the degree of challenges that face the developer in determining the suitable design patterns. This paper presents method to facilitate and assist the designers in selecting the suitable patterns for their problems. We propose a strategy method to obtain the appropriate recommendation.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116199736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCSII.2012.6454599
R. Adhami
An autonomous structural monitoring system (ASMS) is a functional unit capable of sensing and assessing the health of a structure and reporting the status to a maintenance center for appropriate action. In this paper, such a system is presented. The main components of an ASMA are: power meter, broadband optical source, twin-core fiber, spring, fiber Bragg grating (FBG), and a wired or wireless transmitter. It has been shown that FBG has applications in strain and temperature measurements. A newly developed sensing head has been built and tested which consists of a spring and FBG and is used to sense displacement or cracks in various structures such as buildings, bridges, pipelines, ships..., etc. Here, the new sensing head is adapted to integrate the functions of the sensing head FBG and spring with an optical coupler and twin-core fiber into a displacement sensor unit. The proposed ASMS can be tuned for different structures and specifications.
{"title":"Autonomous structural monitoring using fiber Bragg grating","authors":"R. Adhami","doi":"10.1109/ICCSII.2012.6454599","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454599","url":null,"abstract":"An autonomous structural monitoring system (ASMS) is a functional unit capable of sensing and assessing the health of a structure and reporting the status to a maintenance center for appropriate action. In this paper, such a system is presented. The main components of an ASMA are: power meter, broadband optical source, twin-core fiber, spring, fiber Bragg grating (FBG), and a wired or wireless transmitter. It has been shown that FBG has applications in strain and temperature measurements. A newly developed sensing head has been built and tested which consists of a spring and FBG and is used to sense displacement or cracks in various structures such as buildings, bridges, pipelines, ships..., etc. Here, the new sensing head is adapted to integrate the functions of the sensing head FBG and spring with an optical coupler and twin-core fiber into a displacement sensor unit. The proposed ASMS can be tuned for different structures and specifications.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127368183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}