Pub Date : 2009-12-18DOI: 10.1109/ISIEA.2009.5356490
P. Sedtheetorn
In this paper, we propose a joint throughput maximisation design across Physical (PHY) and Call admission control (CAC) layer for multi-class VSG CDMA systems in a Rayleigh fading environment. The system model is accurately analysed and a new exact closed form of the PHY-layer constraint is derived. We show that it is possible to transform the set of the non-linear PHY-layer constraints into linear expressions of the admission region of CAC layer. This facilitates formulating a linear cost function, which is modeled by semi-Markov decision processes (SMDPs), and results in an accurate cross-layer optimisation design. With the proposed design, the maximum throughput is achieved by linear-programming approach as well as the QoS requirements of both layers are guaranteed. Based on the numerical results, the system performance are improved up to 50% in terms of throughput and blocking probability.
{"title":"Cross-layer optimization for multi-class VSG CDMA in Rayleigh fading","authors":"P. Sedtheetorn","doi":"10.1109/ISIEA.2009.5356490","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356490","url":null,"abstract":"In this paper, we propose a joint throughput maximisation design across Physical (PHY) and Call admission control (CAC) layer for multi-class VSG CDMA systems in a Rayleigh fading environment. The system model is accurately analysed and a new exact closed form of the PHY-layer constraint is derived. We show that it is possible to transform the set of the non-linear PHY-layer constraints into linear expressions of the admission region of CAC layer. This facilitates formulating a linear cost function, which is modeled by semi-Markov decision processes (SMDPs), and results in an accurate cross-layer optimisation design. With the proposed design, the maximum throughput is achieved by linear-programming approach as well as the QoS requirements of both layers are guaranteed. Based on the numerical results, the system performance are improved up to 50% in terms of throughput and blocking probability.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"10 1","pages":"165-169"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82705558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-18DOI: 10.1109/ISIEA.2009.5356483
R. Baharom, M. K. Hamzah, M. Seroji, M. K. Mohd Salleh
This paper describes implementation of safe-commutation switching sequence for controlled rectifier operation of Single-Phase Matrix Converter (SPMC). Pulse Width Modulation (PWM) technique was used to calculate the switch duty ratio to synthesize the output. The switching sequence is arranged by providing a continuous path for current flow during switch transition to avoid voltage spikes due to the use of inductive load. A computer simulation model was developed to investigate the behaviour using MATLAB/Simulink (MLS) and PSpice. An experimental test-rig was then used to verify operation; incorporated with control electronics, gate drives, and power circuits. Selected simulations and experimental results are presented to verify operation.
{"title":"Studies on safe-commutation switching sequence for controlled rectifier operation of Single-Phase Matrix Converter","authors":"R. Baharom, M. K. Hamzah, M. Seroji, M. K. Mohd Salleh","doi":"10.1109/ISIEA.2009.5356483","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356483","url":null,"abstract":"This paper describes implementation of safe-commutation switching sequence for controlled rectifier operation of Single-Phase Matrix Converter (SPMC). Pulse Width Modulation (PWM) technique was used to calculate the switch duty ratio to synthesize the output. The switching sequence is arranged by providing a continuous path for current flow during switch transition to avoid voltage spikes due to the use of inductive load. A computer simulation model was developed to investigate the behaviour using MATLAB/Simulink (MLS) and PSpice. An experimental test-rig was then used to verify operation; incorporated with control electronics, gate drives, and power circuits. Selected simulations and experimental results are presented to verify operation.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"23 1","pages":"128-133"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84488347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-18DOI: 10.1109/ISIEA.2009.5356373
M. F. Abdullah, L. Khuan, N. K. Madzhi, M. Masrie, A. Ahmad
This paper concerns the development of a potentiometric transduction circuit for a piezoresistive MEMS sensor to detect human stress. The biosensor is comprised of a bioreceptor and a transducer. The sensing principle is based on immobilization of the bioreceptor to produce a biochemical reaction. The novel piezoresistive microcantilever sensor integrated with a transduction circuit converts this biochemical event into a measurable electrical signal. From previous work, it has been found that the level of alpha amylase activity corresponds to human stress. The piezoresistive MEMS sensing and transduction method are described, with enzyme concentration as the input and voltage as the output. The transduction circuit designed enables the small change in resistivity due to the enzymatic reaction to be detected. The circuit has been designed and tested through theoretical, simulation and experimental studies. It has been found that for a sensor input range of 1.2 to 1.3 kilo ohms, an output range of −100 to +100 millivolts is obtained. A discrepancy within 3.69% is found between simulation and experimental results, on the average. The null bridge condition is designed at 1.2 kilo ohms while the offset rate is found to be 10 millivolts per ohm.
{"title":"Development of a transduction circuit for piezoresistive MEMS sensor for biosensing","authors":"M. F. Abdullah, L. Khuan, N. K. Madzhi, M. Masrie, A. Ahmad","doi":"10.1109/ISIEA.2009.5356373","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356373","url":null,"abstract":"This paper concerns the development of a potentiometric transduction circuit for a piezoresistive MEMS sensor to detect human stress. The biosensor is comprised of a bioreceptor and a transducer. The sensing principle is based on immobilization of the bioreceptor to produce a biochemical reaction. The novel piezoresistive microcantilever sensor integrated with a transduction circuit converts this biochemical event into a measurable electrical signal. From previous work, it has been found that the level of alpha amylase activity corresponds to human stress. The piezoresistive MEMS sensing and transduction method are described, with enzyme concentration as the input and voltage as the output. The transduction circuit designed enables the small change in resistivity due to the enzymatic reaction to be detected. The circuit has been designed and tested through theoretical, simulation and experimental studies. It has been found that for a sensor input range of 1.2 to 1.3 kilo ohms, an output range of −100 to +100 millivolts is obtained. A discrepancy within 3.69% is found between simulation and experimental results, on the average. The null bridge condition is designed at 1.2 kilo ohms while the offset rate is found to be 10 millivolts per ohm.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"15 2 1","pages":"679-683"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85043815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-18DOI: 10.1109/ISIEA.2009.5356505
Sarat Yoowattana, C. Nantajiwakornchai, M. Sangworasil
A design of the various control devices with a DMX512 Protocol is widely used in many areas, such as decorative lighting for both inside and outside of the building, or stage lighting and equipment control, such as spot light, smoke machine, strobe light, moving light. This article presents the creation of Embedded DMX512 Controller using FPGA with Real Time Operating System (RTOS). This creation enables us to build multiple channels of DMX Controller within a single device and to control DMX Controller through the TCP/IP. Thus we can control or update the data through the internet.
{"title":"A design of embedded dmx512 controller using FPGA and XILKernel","authors":"Sarat Yoowattana, C. Nantajiwakornchai, M. Sangworasil","doi":"10.1109/ISIEA.2009.5356505","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356505","url":null,"abstract":"A design of the various control devices with a DMX512 Protocol is widely used in many areas, such as decorative lighting for both inside and outside of the building, or stage lighting and equipment control, such as spot light, smoke machine, strobe light, moving light. This article presents the creation of Embedded DMX512 Controller using FPGA with Real Time Operating System (RTOS). This creation enables us to build multiple channels of DMX Controller within a single device and to control DMX Controller through the TCP/IP. Thus we can control or update the data through the internet.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"100 1","pages":"73-77"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76491957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-18DOI: 10.1109/ISIEA.2009.5356464
Wenchuan Yang, Chao Dong, Jie Cheng, Fang Fang
The telecommunication network has a large scale and an intense complexity. Agents distributed over diverse network elements have collected an immense number of KPI data, the key indicators of network performance. These time series data can have mutual impact. This paper puts forward an improved algorithm named AFP-Growth to mine association rules of inter-transaction time series in the telecommunication field. Based on improvements of the conventional FP-Growth algorithm without Conditional sub-tree Generation, this algorithm has introduced a new correlation measure, that is, all confidence, thus resolving the problems of null-transaction and negative correlation in mining telecommunication data. In addition, by utilizing the features of all confidence, this algorithm has improved the pruning rule of FP-Tree, and enhanced the effectiveness of FP-Tree search, thus increasing the time and space efficiency.
{"title":"The research into an improved algorithm of telecommunication inter-transactional association rules based on time series of all confidence","authors":"Wenchuan Yang, Chao Dong, Jie Cheng, Fang Fang","doi":"10.1109/ISIEA.2009.5356464","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356464","url":null,"abstract":"The telecommunication network has a large scale and an intense complexity. Agents distributed over diverse network elements have collected an immense number of KPI data, the key indicators of network performance. These time series data can have mutual impact. This paper puts forward an improved algorithm named AFP-Growth to mine association rules of inter-transaction time series in the telecommunication field. Based on improvements of the conventional FP-Growth algorithm without Conditional sub-tree Generation, this algorithm has introduced a new correlation measure, that is, all confidence, thus resolving the problems of null-transaction and negative correlation in mining telecommunication data. In addition, by utilizing the features of all confidence, this algorithm has improved the pruning rule of FP-Tree, and enhanced the effectiveness of FP-Tree search, thus increasing the time and space efficiency.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"48 1","pages":"192-196"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75542192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-18DOI: 10.1109/ISIEA.2009.5356324
Y. Touati, A. Ali-Chérif, B. Achili
Several works for handicapped people's help and assistance have been investigated in the last decade and particularly those concerning hardware and software architectures design related to automated wheelchairs. Thus, make a wheelchair intelligent and autonomous, leads to develop new strategies taking into account in one hand, environment dynamics, and in other hand, recent communication technologies such as ad hoc radio networks, sensor networks, wireless mesh networks, etc. The aim of this paper is to present new hardware and software architecture of an intelligent system called LIASD-Wheelchair. This system is a kind of home welfare tools used to assists and help the handicapped and elderly people to gain mobility and lead to independent life. The developed wheelchair moves fully autonomously according to environment changes and uses a multimode communication for its maneuverability and localization via Wi-Fi communication network. To test the effectiveness of the developed system, an experiment is designed in this respect.
{"title":"Smart Wheelchair design and monitoring via wired and wireless networks","authors":"Y. Touati, A. Ali-Chérif, B. Achili","doi":"10.1109/ISIEA.2009.5356324","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356324","url":null,"abstract":"Several works for handicapped people's help and assistance have been investigated in the last decade and particularly those concerning hardware and software architectures design related to automated wheelchairs. Thus, make a wheelchair intelligent and autonomous, leads to develop new strategies taking into account in one hand, environment dynamics, and in other hand, recent communication technologies such as ad hoc radio networks, sensor networks, wireless mesh networks, etc. The aim of this paper is to present new hardware and software architecture of an intelligent system called LIASD-Wheelchair. This system is a kind of home welfare tools used to assists and help the handicapped and elderly people to gain mobility and lead to independent life. The developed wheelchair moves fully autonomously according to environment changes and uses a multimode communication for its maneuverability and localization via Wi-Fi communication network. To test the effectiveness of the developed system, an experiment is designed in this respect.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"18 1","pages":"920-925"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78943928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-18DOI: 10.1109/ISIEA.2009.5356353
Y. Benabderrahmane, D. O'Shaughnessy, S. Selouani
During recent decades, much attention has been given to the separation of mixed sources, in particular for the blind case where both the sources and the mixing process are unknown and only recordings of the mixtures are available. In several situations it is desirable to recover all sources from the recorded mixtures, or at least to segregate a particular source. Furthermore, it may be useful to identify the mixing process itself to reveal information about the physical mixing system. This paper deals with blind speech separation of instantaneous mixtures of two noisy speech signals. The separation criterion is based on Oriented Principal Components Analysis (OPCA) method. OPCA is a (second order) extension of standard Principal Component Analysis (PCA) aiming at maximizing the power ratio of a pair of signals. It is shown that OPCA, preceded by almost arbitrary temporal filtering, can be used for blindly separating temporally signals from their linear instantaneous mixtures. The advantage over other second order techniques is the lack of the pre-whitening (or sphering) step. OPCA models proposed earlier are used in simulations to separate a number of artificial sources demonstrating the validity of the method [1].
{"title":"Blind speech separation using OPCA method","authors":"Y. Benabderrahmane, D. O'Shaughnessy, S. Selouani","doi":"10.1109/ISIEA.2009.5356353","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356353","url":null,"abstract":"During recent decades, much attention has been given to the separation of mixed sources, in particular for the blind case where both the sources and the mixing process are unknown and only recordings of the mixtures are available. In several situations it is desirable to recover all sources from the recorded mixtures, or at least to segregate a particular source. Furthermore, it may be useful to identify the mixing process itself to reveal information about the physical mixing system. This paper deals with blind speech separation of instantaneous mixtures of two noisy speech signals. The separation criterion is based on Oriented Principal Components Analysis (OPCA) method. OPCA is a (second order) extension of standard Principal Component Analysis (PCA) aiming at maximizing the power ratio of a pair of signals. It is shown that OPCA, preceded by almost arbitrary temporal filtering, can be used for blindly separating temporally signals from their linear instantaneous mixtures. The advantage over other second order techniques is the lack of the pre-whitening (or sphering) step. OPCA models proposed earlier are used in simulations to separate a number of artificial sources demonstrating the validity of the method [1].","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"1 1","pages":"743-747"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76186801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-18DOI: 10.1109/ISIEA.2009.5356394
N. K, L. Vachhani, Rajarao M.V., S. K.
Autonomous robotic navigation and mapping have been of tremendous interest during the last decade. While several approaches have been presented, little is known about performing these tasks when constraints are placed on the processing resources and sensors. This paper studies the effectiveness in performing a few high level tasks when a mobile robot is equipped merely with a low-end microcontroller and four ultrasonic sensors. It is shown that the data memory on the microcontroller plays a crucial role in map construction of indoor environment. Four sensors are shown to be adequate for good quality map construction and for following a wall reasonably well. Experiments on map construction and wall following in an indoor environment using a mobile robot equipped with merely an Atmel 89C52 (and no external memory) are presented.
{"title":"Performing high level tasks with a sole microcontroller-based mobile robot - issues, algorithms and experiments","authors":"N. K, L. Vachhani, Rajarao M.V., S. K.","doi":"10.1109/ISIEA.2009.5356394","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356394","url":null,"abstract":"Autonomous robotic navigation and mapping have been of tremendous interest during the last decade. While several approaches have been presented, little is known about performing these tasks when constraints are placed on the processing resources and sensors. This paper studies the effectiveness in performing a few high level tasks when a mobile robot is equipped merely with a low-end microcontroller and four ultrasonic sensors. It is shown that the data memory on the microcontroller plays a crucial role in map construction of indoor environment. Four sensors are shown to be adequate for good quality map construction and for following a wall reasonably well. Experiments on map construction and wall following in an indoor environment using a mobile robot equipped with merely an Atmel 89C52 (and no external memory) are presented.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"55 1","pages":"620-625"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81485605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-18DOI: 10.1109/ISIEA.2009.5356303
A. A. Khan, S. Irteza, Farhan Khawar, Momin Shahab, S. I. Shah
The promise of substantial capacity increase by exploiting spatial diversity has made MIMO systems a new frontier in wireless communication research, but this performance gain is theoretical and does not take real world impairments like channel correlation into account. A lot of work has been done on MIMO detectors. However performance analysis in spatially correlated channels in real world scenarios is lacking. In this paper, we investigate the effects of channel correlation on the performance of existing MIMO detectors like linear detectors (ZF), non-linear detectors (V-BLAST) and exact decoders (Sphere Decoders).
{"title":"Performance analysis of detection schemes in MIMO spatially correlated channels","authors":"A. A. Khan, S. Irteza, Farhan Khawar, Momin Shahab, S. I. Shah","doi":"10.1109/ISIEA.2009.5356303","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356303","url":null,"abstract":"The promise of substantial capacity increase by exploiting spatial diversity has made MIMO systems a new frontier in wireless communication research, but this performance gain is theoretical and does not take real world impairments like channel correlation into account. A lot of work has been done on MIMO detectors. However performance analysis in spatially correlated channels in real world scenarios is lacking. In this paper, we investigate the effects of channel correlation on the performance of existing MIMO detectors like linear detectors (ZF), non-linear detectors (V-BLAST) and exact decoders (Sphere Decoders).","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"65 1","pages":"968-972"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81511594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-18DOI: 10.1109/ISIEA.2009.5356382
I. Ahmad, A. Abdullah, Abdullah S Alghamdi
The prevention of any type of cyber attack is indispensable because a single attack may break the security of computer and network systems. The hindrance of such attacks is entirely dependent on their detection. The detection is a major part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), check points and firewalls. Consequently, in this paper, we are contemplating the feasibility of an approach to probing attacks that are the basis of others attacks in computer network systems. Our approach adopts a supervised neural network phenomenon that is majorly used for detecting security attacks. The proposed system takes into account Multiple Layered Perceptron (MLP) architecture and resilient backpropagation for its training and testing. The system uses sampled data from Kddcup99 dataset, an attack database that is a standard for evaluating the security detection mechanisms. The developed system is applied to different probing attacks. Furthermore, its performance is compared to other neural networks' approaches and the results indicate that our approach is more precise and accurate in case of false positive, false negative and detection rate.
{"title":"Application of artificial neural network in detection of probing attacks","authors":"I. Ahmad, A. Abdullah, Abdullah S Alghamdi","doi":"10.1109/ISIEA.2009.5356382","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356382","url":null,"abstract":"The prevention of any type of cyber attack is indispensable because a single attack may break the security of computer and network systems. The hindrance of such attacks is entirely dependent on their detection. The detection is a major part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), check points and firewalls. Consequently, in this paper, we are contemplating the feasibility of an approach to probing attacks that are the basis of others attacks in computer network systems. Our approach adopts a supervised neural network phenomenon that is majorly used for detecting security attacks. The proposed system takes into account Multiple Layered Perceptron (MLP) architecture and resilient backpropagation for its training and testing. The system uses sampled data from Kddcup99 dataset, an attack database that is a standard for evaluating the security detection mechanisms. The developed system is applied to different probing attacks. Furthermore, its performance is compared to other neural networks' approaches and the results indicate that our approach is more precise and accurate in case of false positive, false negative and detection rate.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"108 1","pages":"557-562"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81599139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}