Mohammad Alzorgan, Abdel Rahman Alzorgan, A. Aljaafreh
This paper describes details of the design and instrumentation of an automated system for irrigation and frost protection, comprising a soil moisture sensor and a temperature sensor, two water tanks wherein one of them is connected to a heating system, two water level sensors; one in each tank, a pump with automated switching system, two solenoid valves between the pump and each of the tanks, a control unit, an array of sprinklers and at least one solenoid valve between the pump and the sprinklers. The system is also provided with means for emitting acoustical and visual alarms.
{"title":"An Automated System for Irrigation and Frost Protection","authors":"Mohammad Alzorgan, Abdel Rahman Alzorgan, A. Aljaafreh","doi":"10.5383/JUSPN.03.01.003","DOIUrl":"https://doi.org/10.5383/JUSPN.03.01.003","url":null,"abstract":"This paper describes details of the design and instrumentation of an automated system for irrigation and frost protection, comprising a soil moisture sensor and a temperature sensor, two water tanks wherein one of them is connected to a heating system, two water level sensors; one in each tank, a pump with automated switching system, two solenoid valves between the pump and each of the tanks, a control unit, an array of sprinklers and at least one solenoid valve between the pump and the sprinklers. The system is also provided with means for emitting acoustical and visual alarms.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125956176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the multi-path time delay estimation problem for a Slow Frequency Hopping (SFH) system using the Propagator Method (PM) is considered. Two novel techniques are proposed. The first technique is developed by applying the Propagator Method (PM) in association with the well-known MUSIC algorithm. Based on the proposed technique a highly efficient estimator has been achieved. The second technique is a simple closed-form expression which is obtained by applying PM and Eigen Value Decomposition (EVD) of the projection matrix. The proposed techniques generate estimates of the unknown parameters. Such estimates are based on the observation and/or covariance matrices. Moreover, the PM itself does not require the EVD or Singular Value Decomposition (SVD) of the Cross-Spectral Matrix (CSM) of received signals. As a result, a significant improvement in computational load is achieved. Computer simulations are also included to demonstrate the effectiveness of the proposed methods.
{"title":"An Efficient Channel Estimator for Frequency Hopping System via Propagator Method","authors":"M. Qasaymeh, Tayem Nizar, A. Musa","doi":"10.5383/JUSPN.03.01.005","DOIUrl":"https://doi.org/10.5383/JUSPN.03.01.005","url":null,"abstract":"In this paper, the multi-path time delay estimation problem for a Slow Frequency Hopping (SFH) system using the Propagator Method (PM) is considered. Two novel techniques are proposed. The first technique is developed by applying the Propagator Method (PM) in association with the well-known MUSIC algorithm. Based on the proposed technique a highly efficient estimator has been achieved. The second technique is a simple closed-form expression which is obtained by applying PM and Eigen Value Decomposition (EVD) of the projection matrix. The proposed techniques generate estimates of the unknown parameters. Such estimates are based on the observation and/or covariance matrices. Moreover, the PM itself does not require the EVD or Singular Value Decomposition (SVD) of the Cross-Spectral Matrix (CSM) of received signals. As a result, a significant improvement in computational load is achieved. Computer simulations are also included to demonstrate the effectiveness of the proposed methods.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116713094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. J. Garcia-Villalba, J. G. Matesanz, A. S. Orozco, José René Fuentes Cortez
{"title":"An Extension Proposal of D2HCP for Network Merging","authors":"L. J. Garcia-Villalba, J. G. Matesanz, A. S. Orozco, José René Fuentes Cortez","doi":"10.5383/JUSPN.03.01.007","DOIUrl":"https://doi.org/10.5383/JUSPN.03.01.007","url":null,"abstract":"","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125892856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection for Ubiquitous & Pervasive Environments using Plan Recognition","authors":"J. Walker, Travis Jones, R. Blount, Kemal Aydin","doi":"10.5383/JUSPN.03.01.001","DOIUrl":"https://doi.org/10.5383/JUSPN.03.01.001","url":null,"abstract":"","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116033608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedded Feature Selection using PSO-kNN: Shape-Based Diagnosis of Microcalcification Clusters in Mammography","authors":"I. Zyout, I. Abdel-Qader, Christina Jacobs","doi":"10.5383/JUSPN.03.01.002","DOIUrl":"https://doi.org/10.5383/JUSPN.03.01.002","url":null,"abstract":"","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117320713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Georg Macher, H. Sporer, E. Brenner, Christian Kreiner
An important trend in the automotive domain is to adapt established functional safety processes and methods for security engineering. Although functional safety and cyber-security engineering have a considerable overlap, the trend of adapting methods from one domain to the other is often challenged by non-domain experts. Just as safety became a critical part of the development in the late 20th century, modern vehicles are now required to become resilient against cyber-attacks. As vehicle providers gear up for this challenge, they can capitalize on experiences from many other domains, but must also face several unique challenges. Such as, that cyber-security engineering will now join reliability and safety as a cornerstone for success in the automotive industry and approaches need to be integrated into the mainly safety oriented development lifecycle of the domain. The recently released SAE J3061 guidebook for cyber-physical vehicle systems focus on designing cyber-security aware systems in close relation to the automotive safety standard ISO 26262. The key contribution of this paper is to analyse a method to identify attack vectors on complex automotive systems via signal interfaces and propose a security classification scheme and protection mechanisms on signal layer. To that aim, the hardware-software interface (HSI), a central development artefact of the ISO 26262 functional safety development process, is used and extended to support the cyber-security engineering process and provide cyber-security countermeasures on signal layer.
{"title":"Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition","authors":"Georg Macher, H. Sporer, E. Brenner, Christian Kreiner","doi":"10.5383/JUSPN.10.01.001","DOIUrl":"https://doi.org/10.5383/JUSPN.10.01.001","url":null,"abstract":"An important trend in the automotive domain is to adapt established functional safety processes and methods for security engineering. Although functional safety and cyber-security engineering have a considerable overlap, the trend of adapting methods from one domain to the other is often challenged by non-domain experts. Just as safety became a critical part of the development in the late 20th century, modern vehicles are now required to become resilient against cyber-attacks. As vehicle providers gear up for this challenge, they can capitalize on experiences from many other domains, but must also face several unique challenges. Such as, that cyber-security engineering will now join reliability and safety as a cornerstone for success in the automotive industry and approaches need to be integrated into the mainly safety oriented development lifecycle of the domain. The recently released SAE J3061 guidebook for cyber-physical vehicle systems focus on designing cyber-security aware systems in close relation to the automotive safety standard ISO 26262. The key contribution of this paper is to analyse a method to identify attack vectors on complex automotive systems via signal interfaces and propose a security classification scheme and protection mechanisms on signal layer. To that aim, the hardware-software interface (HSI), a central development artefact of the ISO 26262 functional safety development process, is used and extended to support the cyber-security engineering process and provide cyber-security countermeasures on signal layer.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128616465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The number of mobile phone users has grown surpassing the PC users due to its mobility and handiness, increasing of its processing power and memory, continuous growth of its applications and operating system’s capabilities. Calendar is one of the common applications that are made available to these devices. Users are more dependent in using calendar to plan their daily activities. In a long term, the aggregation of these accounts can be the source of information in analyzing an individual’s favorites, routines events, social contacts or personal beliefs. We developed a system to deliver the Mobile News Content (MNC) to individuals based on the information extracted from the calendar. The key capability of MNC is the ability to deliver news relevant to the current context of the individual with respect to the event, social and time. We propose an integrated suite that consists of event-capturing engine, news content controller and context calendar to enhance the news delivery capabilities. The event-capturing engine senses the actual activity that takes place and synchronizes with the context calendar automatically. The news content controller manages the delivery of news based on the event being sensed and the planned activity extracted from the context calendar. This paper discusses the components of the suite, system architecture and the system workflow of the suite
{"title":"Context-based Integrated Suites for News Delivery System","authors":"S. Mustapha","doi":"10.5383/JUSPN.02.01.003","DOIUrl":"https://doi.org/10.5383/JUSPN.02.01.003","url":null,"abstract":"The number of mobile phone users has grown surpassing the PC users due to its mobility and handiness, increasing of its processing power and memory, continuous growth of its applications and operating system’s capabilities. Calendar is one of the common applications that are made available to these devices. Users are more dependent in using calendar to plan their daily activities. In a long term, the aggregation of these accounts can be the source of information in analyzing an individual’s favorites, routines events, social contacts or personal beliefs. We developed a system to deliver the \u0000Mobile News Content (MNC) to individuals based on the information extracted from the calendar. The key capability of MNC is the ability to deliver news relevant to the current context of the individual with respect to the event, social and time. We propose an integrated suite that consists of event-capturing engine, news content controller and context \u0000calendar to enhance the news delivery capabilities. The event-capturing engine senses the actual activity that takes place and synchronizes with the context calendar automatically. The news content controller manages the delivery of news based on the event being sensed and the planned activity extracted from the context calendar. This paper discusses the components of the suite, system architecture and the system workflow of the suite","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125613652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}