MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference最新文献

筛选
英文 中文
Comparative analysis of different hardware decoder architectures for IEEE 802.11ad LDPC code IEEE 802.11ad LDPC码不同硬件解码器架构的比较分析
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference Pub Date : 2014-04-13 DOI: 10.1109/MELCON.2014.6820570
A. Shevchenko, R. Maslennikov, A. Maltsev
{"title":"Comparative analysis of different hardware decoder architectures for IEEE 802.11ad LDPC code","authors":"A. Shevchenko, R. Maslennikov, A. Maltsev","doi":"10.1109/MELCON.2014.6820570","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820570","url":null,"abstract":"This paper considers the LDPC code designed for the IEEE 802.11ad WLAN standard and analyzes different architectural options for the hardware decoder. Three decoder architectures are studied that provide different tradeoffs between the throughput and the required amount of the resources for the FPGA implementation. The standard fully parallel decoder is demonstrated to have the maximum throughput of above 6.5 Gbit/s and also the maximum hardware efficiency (a ratio of the decoder throughput to the amount of the consumed hardware logic). The layered decoder architecture allows reusing the hardware check nodes blocks between the sub-iterations to achieve 46% lower hardware resources utilization relative to the fully parallel decoder though at the expense of the 42% lower hardware efficiency and providing the throughput of 2.1 Gbit/s. The serial-parallel decoder architecture exploits the layered and quasi-cyclic properties of the code matrix and occupies only 11% of the hardware resources needed by the fully parallel decoder but with the throughput of only 159 Mbit/s.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125197505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Three-level neutral-point-clamped inverters in transformerless PV systems — State of the art 无变压器光伏系统中的三电平中性点箝位逆变器
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference Pub Date : 2014-04-13 DOI: 10.1109/MELCON.2014.6820496
F. Sebaaly, H. Kanaan, N. Moubayed
{"title":"Three-level neutral-point-clamped inverters in transformerless PV systems — State of the art","authors":"F. Sebaaly, H. Kanaan, N. Moubayed","doi":"10.1109/MELCON.2014.6820496","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820496","url":null,"abstract":"Nowadays, the three-level neutral point clamped (3L-NPC) inverter has become more attractive among multilevel inverters topologies, especially in transformerless grid connected photovoltaic systems. Due to the unbalance between the two DC load-side capacitor voltages, the development and improvement of such topology were important topics in recent studies. New structures were derived focusing on better distribution of losses, increasing efficiency, decreasing the switching devices losses and the conduction losses. For this reason, seven derived topologies are discussed in this paper and compared among the conventional inverter. In addition, a part of this study focuses on modifying modulation techniques in order to comply with the neutral point fluctuation problem. Several carrier-based PWM and space vector modulation techniques are considered, discussed and compared.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A sub-2dB noise figure, 200–3700 MHz receiver for LTE-A applications 一个低于2db的噪声系数,200-3700 MHz的接收机,用于LTE-A应用
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference Pub Date : 2014-04-13 DOI: 10.1109/MELCON.2014.6820547
Mostafa Radwan, M. Hossam, M. Aboudina, F. Hussien
{"title":"A sub-2dB noise figure, 200–3700 MHz receiver for LTE-A applications","authors":"Mostafa Radwan, M. Hossam, M. Aboudina, F. Hussien","doi":"10.1109/MELCON.2014.6820547","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820547","url":null,"abstract":"A wideband low-noise amplifier (LNA) with an inherent active-balun and a wideband Downconversion Mixer are proposed in this work. For the LNA, a combination of a common-gate (CG) stage and a common-source (CS) stage is used to acquire the differential output signal out of a single-ended input while still maintaining acceptable output balancing. A positive feedback loop is added to increase the degree of freedom in choosing the design parameters. This leads to decreasing the overall noise figure (NF) without affecting the input matching performance. The LNA shows a NF below 1.86dB, gain of 25.9dB, and IIP3 of -8dBm across all band (200-3700 MHz). A minimum NF of 1.75dB was achieved at 400-1500 MHz band. For the Mixer, A dual current bleeding technique is used to maintain the linear operation at high input amplitudes to achieve high linearity reaching a maximum IIP3 value of 9.66dBm. The Mixer shows a NF of 13dB and gain 6dB. The front-end is designed in 0.13μm standard CMOS process. A total minimum NF of 1.9dB was achieved with a gain of 31.9dB.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121224243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantum cryptography and chaos for the transmission of security keys in 802.11 networks 802.11网络中安全密钥传输的量子密码学和混沌
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference Pub Date : 2014-04-13 DOI: 10.1109/MELCON.2014.6820559
Rabiha Rostom, Bacem Bakhache, Hassan Salami, Abir Awad
{"title":"Quantum cryptography and chaos for the transmission of security keys in 802.11 networks","authors":"Rabiha Rostom, Bacem Bakhache, Hassan Salami, Abir Awad","doi":"10.1109/MELCON.2014.6820559","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820559","url":null,"abstract":"Quantum cryptography is a promising solution in the problem of communication security. The BB84 quantum protocol is integrated in the 4-way handshake keys establishment protocol of 802.11 networks to ensure an absolute security in keys transmission; BB84 consists of several steps, but the most important step is the reconciliation which consists of permuting the bits of the sequences randomly using the Bellot and Dang (BD) method to detect and correct the errors that could occur from the quantum system. And yet, it presents weaknesses since it didn't correct all the errors in some cases although it necessitates the most of the time and the resources. In this paper, we propose a new method to permute the bits using the quantum cryptography and the chaos. This method enhances the BD method using a chaotic permutation and leads to a new method called OFBD. The simulated results of the new method show the advantage of detecting and correcting all of the existing errors, increasing the efficiency of this method for more than 25% comparing to the existing permutation.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122424968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks 基于动态信任模型的无线自组网丢包攻击防御
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference Pub Date : 2014-04-13 DOI: 10.1109/MELCON.2014.6820561
M. Soleimani, Mahboubeh Kahvand
{"title":"Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks","authors":"M. Soleimani, Mahboubeh Kahvand","doi":"10.1109/MELCON.2014.6820561","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820561","url":null,"abstract":"Rapid advances in wireless ad hoc networks lead to increase their applications in real life. Since wireless ad hoc networks have no centralized infrastructure and management, they are vulnerable to several security threats. Malicious packet dropping is a serious attack against these networks. In this attack, an adversary node tries to drop all or partial received packets instead of forwarding them to the next hop through the path. A dangerous type of this attack is called black hole. In this attack, after absorbing network traffic by the malicious node, it drops all received packets to form a denial of service (DOS) attack. In this paper, a dynamic trust model to defend network against this attack is proposed. In this approach, a node trusts all immediate neighbors initially. Getting feedback from neighbors' behaviors, a node updates the corresponding trust value. The simulation results by NS-2 show that the attack is detected successfully with low false positive probability.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130231138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Ham or spam? A comparative study for some content-based classification algorithms for email filtering 火腿还是午餐肉?几种基于内容的邮件过滤分类算法的比较研究
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference Pub Date : 2014-04-13 DOI: 10.1109/MELCON.2014.6820574
Salwa Adriana Saab, Nicholas Mitri, M. Awad
{"title":"Ham or spam? A comparative study for some content-based classification algorithms for email filtering","authors":"Salwa Adriana Saab, Nicholas Mitri, M. Awad","doi":"10.1109/MELCON.2014.6820574","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820574","url":null,"abstract":"Spam emails are widely spreading to constitute a significant share of everyone's daily inbox. Being a source of financial loss and inconvenience for the recipients, spam emails have to be filtered and separated from legitimate ones. This paper presents a survey of some popular filtering algorithms that rely on text classification to decide whether an email is unsolicited or not. A comparison among them is performed on the SpamBase dataset to identify the best classification algorithm in terms of accuracy, computational time, and precision/recall rates.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
An improved authenticated key agreement protocol for low power networks 一种改进的低功耗网络认证密钥协议
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference Pub Date : 2014-04-13 DOI: 10.1109/MELCON.2014.6820572
Elie El-Hamawi, B. Bakhache, Rabiha Rostom
{"title":"An improved authenticated key agreement protocol for low power networks","authors":"Elie El-Hamawi, B. Bakhache, Rabiha Rostom","doi":"10.1109/MELCON.2014.6820572","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820572","url":null,"abstract":"Providing fast and robust mutual authentication and key establishment for wireless networks was a priority for the security researchers in the last years. In this paper, an improved Elliptic Curve based Fast and Secure Authenticated Key Agreement (FS-AKA) protocol is presented. All the essential security services are provided by the proposed protocol. In addition, it is quick and light since it reduces the computational load (number of exponentiations and hash functions), therefore, it is suitable to low power networks and real time applications. The proposed protocol ensures also an excellent robustness against the famous attacks. In other words, the FS-AKA achieves a compromise between the robustness and the rapidity. The power of this new protocol is the high performance enhancement in terms of computational and communication load, compared with the known key agreement protocols.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125590145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fabrication of nanotextured porous polymer using porous silicon scaffolds 利用多孔硅支架制备纳米多孔聚合物
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference Pub Date : 2014-04-13 DOI: 10.1109/MELCON.2014.6820543
Hassan Wehbe, Houssein Hajj-Hassan, H. Khachfe, M. Hajj-Hassan, Sara Mally, J. Charara
{"title":"Fabrication of nanotextured porous polymer using porous silicon scaffolds","authors":"Hassan Wehbe, Houssein Hajj-Hassan, H. Khachfe, M. Hajj-Hassan, Sara Mally, J. Charara","doi":"10.1109/MELCON.2014.6820543","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820543","url":null,"abstract":"Porous polymers are gaining increased interest in several areas due to their large surface area and unique physiochemical properties. Porous polymers are conventionally manufactured using specific processes related to the chemical structure of each polymer. In this paper, we report a generic fabrication process that can be applied to all liquid polymers to texture their outer surfaces with a desired porosity. The process is based on two micromolding steps. Porous silicon (ps) template, fabricated using a xenon difluoride (XeF2) dry etching technique, is used in the first step to form a polymeric complement (pc) of porous silicon. Pc, in turn, is used as template to form the final porous polymer. This leads to a final polymeric structure similar to the porous silicon one. The proposed process offers flexibility in terms of tailoring the texture of the final polymer by simply using porous silicon templates with different pore sizes and configurations. The proposed process was successfully implemented to texture Poly-ethyl hydrosiloxane (PMHS) using porous silicon and Poly-methyl methacrylate (PMMA) scaffolds.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126974681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic optimal placement of EV parking considering different operation strategies 考虑不同运营策略的电动汽车停车概率最优布局
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference Pub Date : 2014-04-13 DOI: 10.1109/MELCON.2014.6820516
M. R. Aghaebrahimi, M. M. Ghasemipour, A. Sedghi
{"title":"Probabilistic optimal placement of EV parking considering different operation strategies","authors":"M. R. Aghaebrahimi, M. M. Ghasemipour, A. Sedghi","doi":"10.1109/MELCON.2014.6820516","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820516","url":null,"abstract":"In near future, electrification of transportation fleet will become an important solution to reduce environmental pollution. By employing various strategies for electric vehicle operation, electric vehicle parking lots (EVP) play two roles as the load and the energy generating source for distribution networks. So, the location of these parking lots is very important for the distribution companies from the losses and network voltage points of view. Power characteristic of electric vehicle parking lots has a non-deterministic and probabilistic nature. On the other hand, the power injected by them could shift peak load hours of the system. So, the optimal placement of EVP based on the peak load of the system would not result in actual solution of the problem. In this paper, the effect of different electric vehicle operating strategies on placement of administrative and residential parking lots, losses and distribution network's voltage has been investigated. The optimal placement of EVP has been carried out based on probabilistic load and generation models of parking lots and a proper approximation of annual hourly load. A novel hybrid method, based on cuckoo's optimization algorithm and sequential Monte Carlo simulation, has been used for optimization.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"4 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116786886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Analysis of WRR scheduling algorithm frame size impact on CQ switch performance 分析WRR调度算法帧大小对CQ交换机性能的影响
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference Pub Date : 2013-09-01 DOI: 10.1109/MELCON.2014.6820568
I. Radusinović, M. Radonjić, M. Pejanovic
{"title":"Analysis of WRR scheduling algorithm frame size impact on CQ switch performance","authors":"I. Radusinović, M. Radonjić, M. Pejanovic","doi":"10.1109/MELCON.2014.6820568","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820568","url":null,"abstract":"In this paper we study the influence of Weighted Round Robin (WRR) scheduling algorithm frame size to the performance of Crosspoint Queued (CQ) crossbar switch. In order to show that throughput and cell delay can be adjusted with appropriate WRR frame size, we analyzed switch for different values of frame size and under the unbalanced bursty traffic. We show that WRR scheduling algorithm achieve throughput similar to Output Queued switch when frame size is low. Also, with an increase of the frame size, the delay decreases.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123574858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信