{"title":"Comparative analysis of different hardware decoder architectures for IEEE 802.11ad LDPC code","authors":"A. Shevchenko, R. Maslennikov, A. Maltsev","doi":"10.1109/MELCON.2014.6820570","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820570","url":null,"abstract":"This paper considers the LDPC code designed for the IEEE 802.11ad WLAN standard and analyzes different architectural options for the hardware decoder. Three decoder architectures are studied that provide different tradeoffs between the throughput and the required amount of the resources for the FPGA implementation. The standard fully parallel decoder is demonstrated to have the maximum throughput of above 6.5 Gbit/s and also the maximum hardware efficiency (a ratio of the decoder throughput to the amount of the consumed hardware logic). The layered decoder architecture allows reusing the hardware check nodes blocks between the sub-iterations to achieve 46% lower hardware resources utilization relative to the fully parallel decoder though at the expense of the 42% lower hardware efficiency and providing the throughput of 2.1 Gbit/s. The serial-parallel decoder architecture exploits the layered and quasi-cyclic properties of the code matrix and occupies only 11% of the hardware resources needed by the fully parallel decoder but with the throughput of only 159 Mbit/s.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125197505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three-level neutral-point-clamped inverters in transformerless PV systems — State of the art","authors":"F. Sebaaly, H. Kanaan, N. Moubayed","doi":"10.1109/MELCON.2014.6820496","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820496","url":null,"abstract":"Nowadays, the three-level neutral point clamped (3L-NPC) inverter has become more attractive among multilevel inverters topologies, especially in transformerless grid connected photovoltaic systems. Due to the unbalance between the two DC load-side capacitor voltages, the development and improvement of such topology were important topics in recent studies. New structures were derived focusing on better distribution of losses, increasing efficiency, decreasing the switching devices losses and the conduction losses. For this reason, seven derived topologies are discussed in this paper and compared among the conventional inverter. In addition, a part of this study focuses on modifying modulation techniques in order to comply with the neutral point fluctuation problem. Several carrier-based PWM and space vector modulation techniques are considered, discussed and compared.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mostafa Radwan, M. Hossam, M. Aboudina, F. Hussien
{"title":"A sub-2dB noise figure, 200–3700 MHz receiver for LTE-A applications","authors":"Mostafa Radwan, M. Hossam, M. Aboudina, F. Hussien","doi":"10.1109/MELCON.2014.6820547","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820547","url":null,"abstract":"A wideband low-noise amplifier (LNA) with an inherent active-balun and a wideband Downconversion Mixer are proposed in this work. For the LNA, a combination of a common-gate (CG) stage and a common-source (CS) stage is used to acquire the differential output signal out of a single-ended input while still maintaining acceptable output balancing. A positive feedback loop is added to increase the degree of freedom in choosing the design parameters. This leads to decreasing the overall noise figure (NF) without affecting the input matching performance. The LNA shows a NF below 1.86dB, gain of 25.9dB, and IIP3 of -8dBm across all band (200-3700 MHz). A minimum NF of 1.75dB was achieved at 400-1500 MHz band. For the Mixer, A dual current bleeding technique is used to maintain the linear operation at high input amplitudes to achieve high linearity reaching a maximum IIP3 value of 9.66dBm. The Mixer shows a NF of 13dB and gain 6dB. The front-end is designed in 0.13μm standard CMOS process. A total minimum NF of 1.9dB was achieved with a gain of 31.9dB.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121224243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum cryptography and chaos for the transmission of security keys in 802.11 networks","authors":"Rabiha Rostom, Bacem Bakhache, Hassan Salami, Abir Awad","doi":"10.1109/MELCON.2014.6820559","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820559","url":null,"abstract":"Quantum cryptography is a promising solution in the problem of communication security. The BB84 quantum protocol is integrated in the 4-way handshake keys establishment protocol of 802.11 networks to ensure an absolute security in keys transmission; BB84 consists of several steps, but the most important step is the reconciliation which consists of permuting the bits of the sequences randomly using the Bellot and Dang (BD) method to detect and correct the errors that could occur from the quantum system. And yet, it presents weaknesses since it didn't correct all the errors in some cases although it necessitates the most of the time and the resources. In this paper, we propose a new method to permute the bits using the quantum cryptography and the chaos. This method enhances the BD method using a chaotic permutation and leads to a new method called OFBD. The simulated results of the new method show the advantage of detecting and correcting all of the existing errors, increasing the efficiency of this method for more than 25% comparing to the existing permutation.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122424968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks","authors":"M. Soleimani, Mahboubeh Kahvand","doi":"10.1109/MELCON.2014.6820561","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820561","url":null,"abstract":"Rapid advances in wireless ad hoc networks lead to increase their applications in real life. Since wireless ad hoc networks have no centralized infrastructure and management, they are vulnerable to several security threats. Malicious packet dropping is a serious attack against these networks. In this attack, an adversary node tries to drop all or partial received packets instead of forwarding them to the next hop through the path. A dangerous type of this attack is called black hole. In this attack, after absorbing network traffic by the malicious node, it drops all received packets to form a denial of service (DOS) attack. In this paper, a dynamic trust model to defend network against this attack is proposed. In this approach, a node trusts all immediate neighbors initially. Getting feedback from neighbors' behaviors, a node updates the corresponding trust value. The simulation results by NS-2 show that the attack is detected successfully with low false positive probability.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130231138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ham or spam? A comparative study for some content-based classification algorithms for email filtering","authors":"Salwa Adriana Saab, Nicholas Mitri, M. Awad","doi":"10.1109/MELCON.2014.6820574","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820574","url":null,"abstract":"Spam emails are widely spreading to constitute a significant share of everyone's daily inbox. Being a source of financial loss and inconvenience for the recipients, spam emails have to be filtered and separated from legitimate ones. This paper presents a survey of some popular filtering algorithms that rely on text classification to decide whether an email is unsolicited or not. A comparison among them is performed on the SpamBase dataset to identify the best classification algorithm in terms of accuracy, computational time, and precision/recall rates.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved authenticated key agreement protocol for low power networks","authors":"Elie El-Hamawi, B. Bakhache, Rabiha Rostom","doi":"10.1109/MELCON.2014.6820572","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820572","url":null,"abstract":"Providing fast and robust mutual authentication and key establishment for wireless networks was a priority for the security researchers in the last years. In this paper, an improved Elliptic Curve based Fast and Secure Authenticated Key Agreement (FS-AKA) protocol is presented. All the essential security services are provided by the proposed protocol. In addition, it is quick and light since it reduces the computational load (number of exponentiations and hash functions), therefore, it is suitable to low power networks and real time applications. The proposed protocol ensures also an excellent robustness against the famous attacks. In other words, the FS-AKA achieves a compromise between the robustness and the rapidity. The power of this new protocol is the high performance enhancement in terms of computational and communication load, compared with the known key agreement protocols.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125590145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hassan Wehbe, Houssein Hajj-Hassan, H. Khachfe, M. Hajj-Hassan, Sara Mally, J. Charara
{"title":"Fabrication of nanotextured porous polymer using porous silicon scaffolds","authors":"Hassan Wehbe, Houssein Hajj-Hassan, H. Khachfe, M. Hajj-Hassan, Sara Mally, J. Charara","doi":"10.1109/MELCON.2014.6820543","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820543","url":null,"abstract":"Porous polymers are gaining increased interest in several areas due to their large surface area and unique physiochemical properties. Porous polymers are conventionally manufactured using specific processes related to the chemical structure of each polymer. In this paper, we report a generic fabrication process that can be applied to all liquid polymers to texture their outer surfaces with a desired porosity. The process is based on two micromolding steps. Porous silicon (ps) template, fabricated using a xenon difluoride (XeF2) dry etching technique, is used in the first step to form a polymeric complement (pc) of porous silicon. Pc, in turn, is used as template to form the final porous polymer. This leads to a final polymeric structure similar to the porous silicon one. The proposed process offers flexibility in terms of tailoring the texture of the final polymer by simply using porous silicon templates with different pore sizes and configurations. The proposed process was successfully implemented to texture Poly-ethyl hydrosiloxane (PMHS) using porous silicon and Poly-methyl methacrylate (PMMA) scaffolds.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126974681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic optimal placement of EV parking considering different operation strategies","authors":"M. R. Aghaebrahimi, M. M. Ghasemipour, A. Sedghi","doi":"10.1109/MELCON.2014.6820516","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820516","url":null,"abstract":"In near future, electrification of transportation fleet will become an important solution to reduce environmental pollution. By employing various strategies for electric vehicle operation, electric vehicle parking lots (EVP) play two roles as the load and the energy generating source for distribution networks. So, the location of these parking lots is very important for the distribution companies from the losses and network voltage points of view. Power characteristic of electric vehicle parking lots has a non-deterministic and probabilistic nature. On the other hand, the power injected by them could shift peak load hours of the system. So, the optimal placement of EVP based on the peak load of the system would not result in actual solution of the problem. In this paper, the effect of different electric vehicle operating strategies on placement of administrative and residential parking lots, losses and distribution network's voltage has been investigated. The optimal placement of EVP has been carried out based on probabilistic load and generation models of parking lots and a proper approximation of annual hourly load. A novel hybrid method, based on cuckoo's optimization algorithm and sequential Monte Carlo simulation, has been used for optimization.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"4 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116786886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of WRR scheduling algorithm frame size impact on CQ switch performance","authors":"I. Radusinović, M. Radonjić, M. Pejanovic","doi":"10.1109/MELCON.2014.6820568","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820568","url":null,"abstract":"In this paper we study the influence of Weighted Round Robin (WRR) scheduling algorithm frame size to the performance of Crosspoint Queued (CQ) crossbar switch. In order to show that throughput and cell delay can be adjusted with appropriate WRR frame size, we analyzed switch for different values of frame size and under the unbalanced bursty traffic. We show that WRR scheduling algorithm achieve throughput similar to Output Queued switch when frame size is low. Also, with an increase of the frame size, the delay decreases.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123574858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}