Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443177
M. Alomari, K. Samsudin, A. Ramli
Securing data stored inside the storage devices is becoming an important concern in computer security now. It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. In this paper, the newly standardized IEEE XTS encryption mode of operation for storage encryption (P1619 standard) has been implemented using parallel design. A performance comparison between the sequential and parallel algorithms of XTS mode has been presented. The parallel XTS algorithm has shown a speedup of 1.80 (with 90% efficiency) faster than the sequential algorithm. In these simulations, AES is used as encryption algorithm with 256-bit encryption key.
{"title":"A parallel XTS encryption mode of operation","authors":"M. Alomari, K. Samsudin, A. Ramli","doi":"10.1109/SCORED.2009.5443177","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443177","url":null,"abstract":"Securing data stored inside the storage devices is becoming an important concern in computer security now. It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. In this paper, the newly standardized IEEE XTS encryption mode of operation for storage encryption (P1619 standard) has been implemented using parallel design. A performance comparison between the sequential and parallel algorithms of XTS mode has been presented. The parallel XTS algorithm has shown a speedup of 1.80 (with 90% efficiency) faster than the sequential algorithm. In these simulations, AES is used as encryption algorithm with 256-bit encryption key.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124636897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5442998
M. T. Askari, M. Kadir, W. Ahmad, M. Izadi
Temperature, especially the hot spot temperature (HST) and top oil temperature (TOT), have played the most effective factor on the insulation life of the transformer. To determine HST and TOT, ambient temperature enter to equation that show the importance of ambient temperature on hot spot temperature of transformers, and Clause 7 (classic model) has been used as a standard thermal model in this research. In this article has been tried to show the effect of the variations of ambient temperature on a power transformer and at last has been compared by situation that the ambient temperature has been assumed constant.
{"title":"Investigate the effect of variations of ambient temperature on HST of transformer","authors":"M. T. Askari, M. Kadir, W. Ahmad, M. Izadi","doi":"10.1109/SCORED.2009.5442998","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5442998","url":null,"abstract":"Temperature, especially the hot spot temperature (HST) and top oil temperature (TOT), have played the most effective factor on the insulation life of the transformer. To determine HST and TOT, ambient temperature enter to equation that show the importance of ambient temperature on hot spot temperature of transformers, and Clause 7 (classic model) has been used as a standard thermal model in this research. In this article has been tried to show the effect of the variations of ambient temperature on a power transformer and at last has been compared by situation that the ambient temperature has been assumed constant.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134500035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443010
M. Norhisam, M. Norafiza, C. Y. Sia
This paper discussed on development of double stator type permanent magnet generator (DSPMG). Basically, the DSPMG is a slot type topology and operated in a single-phase. The DSPMG used a new type of internal permanent magnet topology rotor configuration. The Finite Element Method (FEM) was used to analyze the DSPMG performance and various numbers of poles and rotor size were considered during this analysis. The result shows that the output power of DSPMG is influence by these design parameters. Finally, a new type of DSPMG was developed at end of this research.
{"title":"Double stator type permanent magnet generator","authors":"M. Norhisam, M. Norafiza, C. Y. Sia","doi":"10.1109/SCORED.2009.5443010","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443010","url":null,"abstract":"This paper discussed on development of double stator type permanent magnet generator (DSPMG). Basically, the DSPMG is a slot type topology and operated in a single-phase. The DSPMG used a new type of internal permanent magnet topology rotor configuration. The Finite Element Method (FEM) was used to analyze the DSPMG performance and various numbers of poles and rotor size were considered during this analysis. The result shows that the output power of DSPMG is influence by these design parameters. Finally, a new type of DSPMG was developed at end of this research.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131735795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443165
Ria Candrawati, A. bin Abdullah
This research is made to create methods that capable to regenerate a damaged component of a computer system. These methods are running in the self-regeneration system. This paper analyzed the ability of biologically-inspired from cloning, mutation and adaptability function to create the methods for self-regeneration system. The self-regeneration system implemented the self-healing system to obtain the information of the damaged component and inserted the biologically-inspired methods into the component to make the component regenerates itself from damages. Hence, this paper presents the conceptual model to regenerate the computer system in the self-healing system. To wrap up, with the analysis of the biologically-inspired concept, this paper proposed the methods for the self-regeneration system.
{"title":"Proposed methods for self-regeneration system","authors":"Ria Candrawati, A. bin Abdullah","doi":"10.1109/SCORED.2009.5443165","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443165","url":null,"abstract":"This research is made to create methods that capable to regenerate a damaged component of a computer system. These methods are running in the self-regeneration system. This paper analyzed the ability of biologically-inspired from cloning, mutation and adaptability function to create the methods for self-regeneration system. The self-regeneration system implemented the self-healing system to obtain the information of the damaged component and inserted the biologically-inspired methods into the component to make the component regenerates itself from damages. Hence, this paper presents the conceptual model to regenerate the computer system in the self-healing system. To wrap up, with the analysis of the biologically-inspired concept, this paper proposed the methods for the self-regeneration system.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132061424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5442985
A. Gheitasi, Mahmoud Moghavvemi, R. Omar
Motor current signature analysis is defined as a strategy to diagnose the motors significant events by locating a set of frequency components using pattern recognition. However there is no index to give a clear idea about the fault extension and advise the deadline time and protection action on the situation. In this paper a new definition for protection levels based on dynamic of faults is presented. Here the main point is to have a clear alert for the system operators and buy a proper time to do the corrective action before a hazardous failure going to be unreturnable.
{"title":"Automatic protection system for slow rate events in power systems","authors":"A. Gheitasi, Mahmoud Moghavvemi, R. Omar","doi":"10.1109/SCORED.2009.5442985","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5442985","url":null,"abstract":"Motor current signature analysis is defined as a strategy to diagnose the motors significant events by locating a set of frequency components using pattern recognition. However there is no index to give a clear idea about the fault extension and advise the deadline time and protection action on the situation. In this paper a new definition for protection levels based on dynamic of faults is presented. Here the main point is to have a clear alert for the system operators and buy a proper time to do the corrective action before a hazardous failure going to be unreturnable.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"7 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132547109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443365
Yaghoub Mollaei
Adaptive filter is one of the most important areas in digital signal processing. This paper seeks to use this area to remove noise from noise corrupted audio signals. An adaptive FIR filter with normalized LMS algorithm is designed to cancel the noise. A SIMULINK model is created and linked to TI TMS320C6711 digital signal processor through embedded target for TI C6000 SIMULINK toolbox and REAL-TIME workshop to perform hardware adaptive noise cancellation. The result is a noise free audio signal in the DSP board output.
{"title":"Hardware implementation of adaptive filters","authors":"Yaghoub Mollaei","doi":"10.1109/SCORED.2009.5443365","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443365","url":null,"abstract":"Adaptive filter is one of the most important areas in digital signal processing. This paper seeks to use this area to remove noise from noise corrupted audio signals. An adaptive FIR filter with normalized LMS algorithm is designed to cancel the noise. A SIMULINK model is created and linked to TI TMS320C6711 digital signal processor through embedded target for TI C6000 SIMULINK toolbox and REAL-TIME workshop to perform hardware adaptive noise cancellation. The result is a noise free audio signal in the DSP board output.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132954307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443349
C. Kotchasarn
This paper presents an analysis of cooperative direct-sequence code division multiple access (DS-CDMA) relay communications with one source terminal and two relay nodes with multiuser detection over the frequency-flat fading channel for uplink transmission where the decode-and-forward (DF) protocol is employed at the relay nodes. We analyze for synchronous transmission with binary phase shift keying (BPSK) modulation. Bit error rate (BER) performance expressions are derived. In the analysis, we assume that the relay nodes correctly decode information and at BER 10−2 improvement is acquired at Eb/N0 = 16 dB. The effect various processing gain (N) is simulated. Numerical results show that the BER can be improved by increasing the processing gain and BER expressions are obtained by assuming that the relay nodes forwards information only if they correctly decode information and we assume that perfect cyclic redundancy check (CRC) is applied at the relays.
{"title":"Cooperative diversity for synchronous uplink DS-CDMA transmission over Rayleigh frequency flat fading channel","authors":"C. Kotchasarn","doi":"10.1109/SCORED.2009.5443349","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443349","url":null,"abstract":"This paper presents an analysis of cooperative direct-sequence code division multiple access (DS-CDMA) relay communications with one source terminal and two relay nodes with multiuser detection over the frequency-flat fading channel for uplink transmission where the decode-and-forward (DF) protocol is employed at the relay nodes. We analyze for synchronous transmission with binary phase shift keying (BPSK) modulation. Bit error rate (BER) performance expressions are derived. In the analysis, we assume that the relay nodes correctly decode information and at BER 10−2 improvement is acquired at Eb/N0 = 16 dB. The effect various processing gain (N) is simulated. Numerical results show that the BER can be improved by increasing the processing gain and BER expressions are obtained by assuming that the relay nodes forwards information only if they correctly decode information and we assume that perfect cyclic redundancy check (CRC) is applied at the relays.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132967671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443289
Yusuf Sani, Ahmed Mohamedou, Khalid Ali, Anahita Farjamfar, Mohamed Azman, S. Shamsuddin
With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems.
{"title":"An overview of neural networks use in anomaly Intrusion Detection Systems","authors":"Yusuf Sani, Ahmed Mohamedou, Khalid Ali, Anahita Farjamfar, Mohamed Azman, S. Shamsuddin","doi":"10.1109/SCORED.2009.5443289","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443289","url":null,"abstract":"With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121811956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5443402
Waqas Ali Khan, Talha Khan, Shahid Abbas, S. Danish, M. Ali
Wireless Personal Area Network System becomes popular in replacing a wire technologies for short area range communication system. Technologies such as Bluetooth, Wi-Fi and ZigBee are used for this purpose but due to their low transfer data rates they are unable to handle all those applications which need high transfer rate like transfer of files which has a size in GB's. Ultra Wide Band is such a wireless promising technology which covers all these aspects by using its MBOFDM Infrastructure. MBOFDM structure supports data rate up to 0.5 Gbps by dividing the 7.5 GHz broad frequency spectrum of UWB into sub bands. Baseband portion of UWB Transmitter is modeled in this paper which proves to be helpful in the evaluation of various parameters of UWB.
{"title":"MBOFDM Transmitter Baseband physical layer modeling and simulation in MATLAB","authors":"Waqas Ali Khan, Talha Khan, Shahid Abbas, S. Danish, M. Ali","doi":"10.1109/SCORED.2009.5443402","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5443402","url":null,"abstract":"Wireless Personal Area Network System becomes popular in replacing a wire technologies for short area range communication system. Technologies such as Bluetooth, Wi-Fi and ZigBee are used for this purpose but due to their low transfer data rates they are unable to handle all those applications which need high transfer rate like transfer of files which has a size in GB's. Ultra Wide Band is such a wireless promising technology which covers all these aspects by using its MBOFDM Infrastructure. MBOFDM structure supports data rate up to 0.5 Gbps by dividing the 7.5 GHz broad frequency spectrum of UWB into sub bands. Baseband portion of UWB Transmitter is modeled in this paper which proves to be helpful in the evaluation of various parameters of UWB.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122135487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/SCORED.2009.5442945
M. Isa, N. Ibrahim, R. Shamsudin, Mohammd Hamiruce Marhaban
Determination of sugar content in 10 matured red seedless watermelons by measuring the dielectric properties is described in this paper. The determination is made based on the comparison of watermelon juice and water with sugar mixture. The dielectric properties of both the extracted watermelon juice and water with sugar mixture are measured over the frequency range from 200 MHz to 20 GHz and permittivity data at frequency 10.45 GHz is highlighted using an open-ended coaxial-line probe and network analyzer. Measurements are made at room temperature ± 27 °C; 70–80% RH. The sugar content was the most significant factor affecting the maturity of watermelon. Dielectric properties of watermelon juice and water with sugar mixture were measured and the dielectric properties of both liquids were compared. In this study, data obtained suggests that dielectric properties shows strong relation with sugar content. The dielectric constant is inversely proportional with increment of sugar content. From the dielectric properties measured, the sugar content in the watermelon is predicted. In additional, the standard sugar content measurement, HPLC method is also measured and result of the study is reported in this paper. Dielectric measurement of watermelon juice and water with sugar mixture are presented graphically to show their relationships.
{"title":"Sugar content in watermelon juice based on dielectric properties at 10.45GHz","authors":"M. Isa, N. Ibrahim, R. Shamsudin, Mohammd Hamiruce Marhaban","doi":"10.1109/SCORED.2009.5442945","DOIUrl":"https://doi.org/10.1109/SCORED.2009.5442945","url":null,"abstract":"Determination of sugar content in 10 matured red seedless watermelons by measuring the dielectric properties is described in this paper. The determination is made based on the comparison of watermelon juice and water with sugar mixture. The dielectric properties of both the extracted watermelon juice and water with sugar mixture are measured over the frequency range from 200 MHz to 20 GHz and permittivity data at frequency 10.45 GHz is highlighted using an open-ended coaxial-line probe and network analyzer. Measurements are made at room temperature ± 27 °C; 70–80% RH. The sugar content was the most significant factor affecting the maturity of watermelon. Dielectric properties of watermelon juice and water with sugar mixture were measured and the dielectric properties of both liquids were compared. In this study, data obtained suggests that dielectric properties shows strong relation with sugar content. The dielectric constant is inversely proportional with increment of sugar content. From the dielectric properties measured, the sugar content in the watermelon is predicted. In additional, the standard sugar content measurement, HPLC method is also measured and result of the study is reported in this paper. Dielectric measurement of watermelon juice and water with sugar mixture are presented graphically to show their relationships.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124353790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}