Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377278
A. N. Harun, R. Ahmad, N. Mohamed
This study was performed to investigate the best practise on using LED light to optimum growth to reduce turn around time using different kind of photoperiod study and using Wireless Sensor Network (WSN) technology as remote monitoring system has been conducted. Growth performance of Brassica Chinensis under two different wavelengths (blue and red) 16:4 as light source has been used to determine plant growth performance and phytochemicals aspect of plant characteristics. Two experiments were conducted which is the pulse treatment (1 hour light and 1 hour dark) and continuous light (CL) photoperiod treatment in both trials. Observation such as leaves count, height, dry weight and chlorophyll of both plant were analysed. It was noted that the CL photoperiod has significant effect on overall growth performance and remarkably lead to improve the efficiency of the plant factory. In order to reason on data and monitor the environmental parameters of the plant factory, an intelligent system using embedded system has been developed to automate the LED control and manipulation. The result shows that the system is stable and has referential significantly in the area of plant factory or indoor farming system.
{"title":"WSN application in LED plant factory using continuous lighting (CL) method","authors":"A. N. Harun, R. Ahmad, N. Mohamed","doi":"10.1109/ICOS.2015.7377278","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377278","url":null,"abstract":"This study was performed to investigate the best practise on using LED light to optimum growth to reduce turn around time using different kind of photoperiod study and using Wireless Sensor Network (WSN) technology as remote monitoring system has been conducted. Growth performance of Brassica Chinensis under two different wavelengths (blue and red) 16:4 as light source has been used to determine plant growth performance and phytochemicals aspect of plant characteristics. Two experiments were conducted which is the pulse treatment (1 hour light and 1 hour dark) and continuous light (CL) photoperiod treatment in both trials. Observation such as leaves count, height, dry weight and chlorophyll of both plant were analysed. It was noted that the CL photoperiod has significant effect on overall growth performance and remarkably lead to improve the efficiency of the plant factory. In order to reason on data and monitor the environmental parameters of the plant factory, an intelligent system using embedded system has been developed to automate the LED control and manipulation. The result shows that the system is stable and has referential significantly in the area of plant factory or indoor farming system.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126502565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377287
Amir Negametzyanov, Sian Lun Lau, Chin Fei Ng
Self-service Kiosks are found in many public areas such as banks, retail offices, hospitals etc. The creation and deployment of forms for a kiosk usually requires programming and this is a task performed by programmers with technical know-how. This paper presents Web-based Interactive Form Generator (WebIFGen), a prototype system. WebIFGen is a web-based system that allows creation and deployment of forms without any technical know-how. This is achieved by abstracting essential components and processed identified from common kiosk systems. The paper elaborates the design and implementation of the system and discusses on the lesson learned.
{"title":"Web-based Interactive Form Generator for public Kiosks","authors":"Amir Negametzyanov, Sian Lun Lau, Chin Fei Ng","doi":"10.1109/ICOS.2015.7377287","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377287","url":null,"abstract":"Self-service Kiosks are found in many public areas such as banks, retail offices, hospitals etc. The creation and deployment of forms for a kiosk usually requires programming and this is a task performed by programmers with technical know-how. This paper presents Web-based Interactive Form Generator (WebIFGen), a prototype system. WebIFGen is a web-based system that allows creation and deployment of forms without any technical know-how. This is achieved by abstracting essential components and processed identified from common kiosk systems. The paper elaborates the design and implementation of the system and discusses on the lesson learned.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"36 Suppl 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121693244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377290
Fakhrul Hazman Bin Yusoff, M. A. Azhar, Marina Ismail
Waiting room is defined as a room or part of the building that is dedicated for people to wait until the specified event occurs. As the name implies, the main concern of this room to people is how they would cope with the dull, noisy, crowded and long queue environment. Furthermore, lengthy waiting time can create an anxiety which may be happen especially waiting for a result or for uncertain waiting time. Some of the service only provided seating without any substance that can help to occupy the waiting time. Despite having traditional visual aid such poster and pamphlets, these materials are repetitive and outdated in terms of content. Meanwhile, visual illustration is considered important for most people to keep their eye on any information display. Our prior study found in recent years, there is a few researchers have taking the concept of incorporating therapy in waiting room. However, the study of keeping uncertainty of waiting time in check is still under-researched. Hence, the proposed research taking advantage of the focus in principle of keeping-up with user uncertainty waiting time and aware about their status using real-time status-graphic.
{"title":"A review of user aware infographic display system in waiting room area","authors":"Fakhrul Hazman Bin Yusoff, M. A. Azhar, Marina Ismail","doi":"10.1109/ICOS.2015.7377290","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377290","url":null,"abstract":"Waiting room is defined as a room or part of the building that is dedicated for people to wait until the specified event occurs. As the name implies, the main concern of this room to people is how they would cope with the dull, noisy, crowded and long queue environment. Furthermore, lengthy waiting time can create an anxiety which may be happen especially waiting for a result or for uncertain waiting time. Some of the service only provided seating without any substance that can help to occupy the waiting time. Despite having traditional visual aid such poster and pamphlets, these materials are repetitive and outdated in terms of content. Meanwhile, visual illustration is considered important for most people to keep their eye on any information display. Our prior study found in recent years, there is a few researchers have taking the concept of incorporating therapy in waiting room. However, the study of keeping uncertainty of waiting time in check is still under-researched. Hence, the proposed research taking advantage of the focus in principle of keeping-up with user uncertainty waiting time and aware about their status using real-time status-graphic.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130453186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377291
Bukhary Ikhwan Ismail, Ehsan Mostajeran Goortani, Mohd Bazli Ab Karim, Wong Ming Tat, S. Setapa, Jing-Yuan Luke, Ong Hong Hoe
High latency, network congestion and network bottleneck are some of problems in cloud computing. Moving from centralized to decentralized paradigm, Edge computing could offload the processing to the edge which indirectly reduces application response time and improves overall user experience. This paper evaluate Docker, a container based technology as a platform for Edge Computing. 4 fundamental criteria were evaluated 1) deployment and termination, 2) resource & service management, 3) fault tolerance and 4) caching. Based on our evaluation and experiment Docker provides fast deployment, small footprint and good performance which make it potentially a viable Edge Computing platform.
{"title":"Evaluation of Docker as Edge computing platform","authors":"Bukhary Ikhwan Ismail, Ehsan Mostajeran Goortani, Mohd Bazli Ab Karim, Wong Ming Tat, S. Setapa, Jing-Yuan Luke, Ong Hong Hoe","doi":"10.1109/ICOS.2015.7377291","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377291","url":null,"abstract":"High latency, network congestion and network bottleneck are some of problems in cloud computing. Moving from centralized to decentralized paradigm, Edge computing could offload the processing to the edge which indirectly reduces application response time and improves overall user experience. This paper evaluate Docker, a container based technology as a platform for Edge Computing. 4 fundamental criteria were evaluated 1) deployment and termination, 2) resource & service management, 3) fault tolerance and 4) caching. Based on our evaluation and experiment Docker provides fast deployment, small footprint and good performance which make it potentially a viable Edge Computing platform.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123685726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377285
Babak Taraghi, M. Babaei
Using Wearable devices have recently become a common trend. Having a joyful and efficient interaction with the surrounding environment is one of the main goals of using these new technologies. Object and gesture detection on wearables as primary steps to achieve this goal are big challenges and critical features to prepare them for every-day uses. This research aims to study object detection with see-through wearable devices, such as Google Glass. A combination of vision-based techniques has been used to train the Computer Vision Library for object detection with the Google Glass. The result of this research can be applied widely on see-through head-mounted wearable devices for detecting objects and help people for monitoring purposes.
{"title":"Object detection using Google Glass","authors":"Babak Taraghi, M. Babaei","doi":"10.1109/ICOS.2015.7377285","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377285","url":null,"abstract":"Using Wearable devices have recently become a common trend. Having a joyful and efficient interaction with the surrounding environment is one of the main goals of using these new technologies. Object and gesture detection on wearables as primary steps to achieve this goal are big challenges and critical features to prepare them for every-day uses. This research aims to study object detection with see-through wearable devices, such as Google Glass. A combination of vision-based techniques has been used to train the Computer Vision Library for object detection with the Google Glass. The result of this research can be applied widely on see-through head-mounted wearable devices for detecting objects and help people for monitoring purposes.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123707260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377281
D. Vashisth, Himanshu Sharma, Jyoti
Assembling and scrutinizing of on-going communicational-follow in general public enables us to figure behavioral structure of its individuals. Reality-Mining the center idea to bolster this empowers us to gather advanced breadcrumbs left by individuals while they perform their daily routine. Gathering of these signs through sociometric identifications and afterward detailing them for a visual perspective is indicated in the further segment of this paper. The model proposed in this paper is taking into account multi-level information gathering and filtration framework. In this model society is divided in groups on the premise of their intra-group and inter-group interactions. It determines the sequestered group and the speediest data disseminating group. This filtration is handled on the server and all the information exchanges are refined with secure protocols. For gathering of communicational traces we argue utilization of cell phones as sensors, which process information to further server. Further inclusion of influential model and centrality methodologies empower us to recognize most compelling individual in the sub-group. Usage of web based multi-level architecture permits simple expansion, more extensive territory scope, storing and handling huge log records and simple integration with pre-existing communication network.
{"title":"Revamp social neural network application of Reality Mining","authors":"D. Vashisth, Himanshu Sharma, Jyoti","doi":"10.1109/ICOS.2015.7377281","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377281","url":null,"abstract":"Assembling and scrutinizing of on-going communicational-follow in general public enables us to figure behavioral structure of its individuals. Reality-Mining the center idea to bolster this empowers us to gather advanced breadcrumbs left by individuals while they perform their daily routine. Gathering of these signs through sociometric identifications and afterward detailing them for a visual perspective is indicated in the further segment of this paper. The model proposed in this paper is taking into account multi-level information gathering and filtration framework. In this model society is divided in groups on the premise of their intra-group and inter-group interactions. It determines the sequestered group and the speediest data disseminating group. This filtration is handled on the server and all the information exchanges are refined with secure protocols. For gathering of communicational traces we argue utilization of cell phones as sensors, which process information to further server. Further inclusion of influential model and centrality methodologies empower us to recognize most compelling individual in the sub-group. Usage of web based multi-level architecture permits simple expansion, more extensive territory scope, storing and handling huge log records and simple integration with pre-existing communication network.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131309701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mariayee Doraisamy, Suhaimi bin Ibrahim, M. N. Mahrin
Successful implementation of software projects development are entirely depending upon successful monitoring and controlling mechanism on software project management. Development of metrics for each element in a software project development will lead the software projects to achieve its objectives. The aim of this study is to formulate a Metric based Software Project Performance Monitoring Model which consists of performance criteria and metrics that involves in a software projects development. This model formulation is consists of five processes: metrics integration, metrics validation, metrics description, metrics categorization and metrics threshold. Generally, this model will be a guideline for project managers to monitor and manage software projects particularly in the perspectives of the public sectors. This proposes model also will help the project manager to evaluate the performance of each criteria and metrics by quantitatively. This model may assist the organization to monitor the software projects development more closely which may reduce the software projects failures. In order to demonstrate the applicability of this model, currently we are validating this model by conducting multiple case studies at various departments at Malaysian Public Sector. This model has significant bearing on the similar kind of software projects development undertaken in other developing countries like Malaysia.
{"title":"Metric based Software Project Performance Monitoring Model","authors":"Mariayee Doraisamy, Suhaimi bin Ibrahim, M. N. Mahrin","doi":"10.11113/JT.V78.10022","DOIUrl":"https://doi.org/10.11113/JT.V78.10022","url":null,"abstract":"Successful implementation of software projects development are entirely depending upon successful monitoring and controlling mechanism on software project management. Development of metrics for each element in a software project development will lead the software projects to achieve its objectives. The aim of this study is to formulate a Metric based Software Project Performance Monitoring Model which consists of performance criteria and metrics that involves in a software projects development. This model formulation is consists of five processes: metrics integration, metrics validation, metrics description, metrics categorization and metrics threshold. Generally, this model will be a guideline for project managers to monitor and manage software projects particularly in the perspectives of the public sectors. This proposes model also will help the project manager to evaluate the performance of each criteria and metrics by quantitatively. This model may assist the organization to monitor the software projects development more closely which may reduce the software projects failures. In order to demonstrate the applicability of this model, currently we are validating this model by conducting multiple case studies at various departments at Malaysian Public Sector. This model has significant bearing on the similar kind of software projects development undertaken in other developing countries like Malaysia.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126694598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377282
Nurazzah Abd Rahman, Nursyahidah Alias, N. K. Ismail, Zulhilmi bin Mohamed Nor, M. N. Alias
Name is regarded as important to human. A person's name can give impact to him/her either positively or negatively. It is important to recognize or match a person's name with the right person. To do this on the computer, we need to develop a rule so that the computer will be able to recognize the right name with the right person. Before developing the rule, the features about the person's name itself need to be identified. So far, there has been very little work on recognizing a person's name in the Malay texts. This research identifies features of authentic narrator's name in the Malay hadith texts. We extracted the authentic narrators' names manually from hadith texts in the purpose of identifying the features of the names. We extracted manually 455 narrator's name from 150 Malay hadith texts. From the extracted name, exist same person of narrator's name with different types of spelling. There are also many forms of the narrator's names which refers to one person. We also identify the name manner in the Malay hadith texts and added 3 more name manners. Then, we developed the rule to recognize the narrators' names in the Malay hadith texts based on the identified features.
{"title":"An identification of authentic narrator's name features in Malay hadith texts","authors":"Nurazzah Abd Rahman, Nursyahidah Alias, N. K. Ismail, Zulhilmi bin Mohamed Nor, M. N. Alias","doi":"10.1109/ICOS.2015.7377282","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377282","url":null,"abstract":"Name is regarded as important to human. A person's name can give impact to him/her either positively or negatively. It is important to recognize or match a person's name with the right person. To do this on the computer, we need to develop a rule so that the computer will be able to recognize the right name with the right person. Before developing the rule, the features about the person's name itself need to be identified. So far, there has been very little work on recognizing a person's name in the Malay texts. This research identifies features of authentic narrator's name in the Malay hadith texts. We extracted the authentic narrators' names manually from hadith texts in the purpose of identifying the features of the names. We extracted manually 455 narrator's name from 150 Malay hadith texts. From the extracted name, exist same person of narrator's name with different types of spelling. There are also many forms of the narrator's names which refers to one person. We also identify the name manner in the Malay hadith texts and added 3 more name manners. Then, we developed the rule to recognize the narrators' names in the Malay hadith texts based on the identified features.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124961610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377275
Burhan Ul Islam Khan, R. F. Olanrewaju, A. Baba, Sajad Ahmad Lone, N. F. Zulkurnain
With the advancement of cloud storage services the vulnerabilities associated with cloud-related data has increased. It affects the cloud distributed data servers that are not only used for data storage, but also used for managing a huge amount of data with distributed file structures in collaborative sharing. The data sharing processes of cloud computing infrastructure are susceptible to various kinds of attacks where many traditional cryptographic techniques fail to provide a proper and efficient authentication mechanism. In this paper, a novel approach namely Secure-Split-Merge (SSM) is introduced for the security of data. The proposed SSM scheme uses a unique mechanism of performing splitting of data using AES 128 bit encryption key. The chunks of encrypted splits are being maintained on various rack servers of different types of cloud zones. The comparative analysis shows that the proposed system gives effective outcomes as compared to various existing and traditional security standards.
{"title":"SSM: Secure-Split-Merge data distribution in cloud infrastructure","authors":"Burhan Ul Islam Khan, R. F. Olanrewaju, A. Baba, Sajad Ahmad Lone, N. F. Zulkurnain","doi":"10.1109/ICOS.2015.7377275","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377275","url":null,"abstract":"With the advancement of cloud storage services the vulnerabilities associated with cloud-related data has increased. It affects the cloud distributed data servers that are not only used for data storage, but also used for managing a huge amount of data with distributed file structures in collaborative sharing. The data sharing processes of cloud computing infrastructure are susceptible to various kinds of attacks where many traditional cryptographic techniques fail to provide a proper and efficient authentication mechanism. In this paper, a novel approach namely Secure-Split-Merge (SSM) is introduced for the security of data. The proposed SSM scheme uses a unique mechanism of performing splitting of data using AES 128 bit encryption key. The chunks of encrypted splits are being maintained on various rack servers of different types of cloud zones. The comparative analysis shows that the proposed system gives effective outcomes as compared to various existing and traditional security standards.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130068099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377277
Mohamed Elhefhawy, W. Ismail
The utilization of a Linear Frequency Modulated Continuous Wave (LFM-CW) signal with Synthetic Aperture Radar (SAR) systems provides the possibility to obtain a small, low-cost and high resolution imaging radar. In this paper, a strip-map mode of LFM-CW broadside SAR is considered at X-band. The Range-Migration Algorithm (RMA) for processing LFM-CW SAR is investigated and analytically developed. The simulation results indicate the resolution improvement introduced with RMA; and also emphasize the effects of different parameters such as RF bandwidth and size of an antenna in cross-range direction on the performance of LFM-CW SAR system.
{"title":"Study of short-range synthetic aperture radar system","authors":"Mohamed Elhefhawy, W. Ismail","doi":"10.1109/ICOS.2015.7377277","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377277","url":null,"abstract":"The utilization of a Linear Frequency Modulated Continuous Wave (LFM-CW) signal with Synthetic Aperture Radar (SAR) systems provides the possibility to obtain a small, low-cost and high resolution imaging radar. In this paper, a strip-map mode of LFM-CW broadside SAR is considered at X-band. The Range-Migration Algorithm (RMA) for processing LFM-CW SAR is investigated and analytically developed. The simulation results indicate the resolution improvement introduced with RMA; and also emphasize the effects of different parameters such as RF bandwidth and size of an antenna in cross-range direction on the performance of LFM-CW SAR system.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122144751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}