{"title":"On the evaluation of geometric localization using Recursive Maximum Likelihood estimation","authors":"Ali Yassin, Youssef Jaffal, Y. Nasser","doi":"10.1109/MELCON.2014.6820560","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820560","url":null,"abstract":"In this paper, we propose a novel positioning algorithm based on hybrid cooperative techniques. The proposed algorithm is divided into two main categories: initial positioning and tracking. After acquiring an estimate about the distances of an un-located mobile terminal (UMT) by measuring the Received Signal Strength (RSS) and Time of Arrival (ToA), we obtain initial position for an UMT via triangulations and Recursive Maximum Likelihood (ML) estimator. The recursive estimation is achieved by dividing the studied region into a grid of possible locations. After having initial estimated measured positions at different time stamps, those positions can be enhanced via an hybrid combination through the Extended Kalman Filter (EKF) proposed in this work for tracking. Simulation results show that the proposed positioning technique performs very well, even in shadowed regions.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116491520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samar Sindian, Ayman Khalil, A. Samhat, M. Crussiére, J. Hélard
{"title":"Resource allocation with differentiation between RT and NRT traffic in IEEE 802.15.5","authors":"Samar Sindian, Ayman Khalil, A. Samhat, M. Crussiére, J. Hélard","doi":"10.1109/MELCON.2014.6820503","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820503","url":null,"abstract":"The IEEE 802.15.5 MAC enables high-rate mesh communications between devices in a wireless personal area network (WPAN). The channel time allocation (CTA) scheduler plays an important role in sizing CTAs within each superframe. In this paper, we propose an efficient admission control and centralized CTA mechanism for a hop-2 mesh communication in the IEEE 802.15.5. The proposed algorithm is executed between the mesh Piconet Coordinators (MPNC)s and their piconets' member mesh devices (MDEV)s s to provides a reliable resource allocation mechanism for the piconets at the hop-2 of the IEEE 802.15.5. This mechanism induces satisfaction and fairness among the requesting hop-2 Real-time (RT) and non-RT (NRT) MDEVs. It introduces the use of a novel priority Flag metric and takes the channel requests rejection rate into consideration. We evaluate the performance of the proposed algorithm through simulations and the results show that the proposed approach achieves good performance in terms of satisfaction and fairness.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132172121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure cloud storage and search scheme for mobile devices","authors":"Abir Awad, Adrian Matthews, Brian Lee","doi":"10.1109/MELCON.2014.6820522","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820522","url":null,"abstract":"In this paper, we consider the problem of securing mobile-cloud storage services. We design and develop a novel and secure searchable encryption scheme for mobile devices. In the proposed algorithm, a content based index is constructed and a locality sensitive hashing is used to allow the user to store his files on the cloud in a secure way and then perform a secure query and a fuzzy search. Moreover, the scheme allows to rank the results while maintaining the privacy and confidentiality of the user and to save storage space and computation resources of his mobile phone. To quantify the performance of the proposed scheme, a range of tests are performed and experimental results demonstrate that the proposed system is suitable for a secure, fast and searchable storage mobile-cloud system.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128217368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-chip safety system for embedded control applications","authors":"A. Hayek, J. Borcsok","doi":"10.1109/MELCON.2014.6820553","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820553","url":null,"abstract":"In this paper nl approach of an on-chip safety system architecture conforming to the second edition of the standard IEC 61508 is presented. The presented chip considers on-chip redundancy with the presence of diagnostic units and is designed to meet the highest possible safety integrity level for on-chip systems. The presented on-chip safety system consists of two redundant processor channels, each of which has a processor unit, data memory, program memory, communication interfaces, inputs and outputs. Furthermore, on-chip diagnosis- and monitoring units and a communication core are integrated. The safety-related implementation of the proposed architecture is introduced in this paper. This includes hardware and software implementation methodologies. Finally, a brief evaluation of the presented architecture is presented.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132981083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D face recognition using stereo images","authors":"Mohammad Dawi, M. A. Al-Alaoui, M. Baydoun","doi":"10.1109/MELCON.2014.6820540","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820540","url":null,"abstract":"Face recognition in still images and video is an important application in computer vision and image processing. This work focuses on extracting 3D or depth information using stereo matching for the purpose of enhancing face recognition. We present a new fast stereo matching algorithm termed stereo cluster search (SCS) that can be performed in real time to generate depth information from the left and right stereo pair of a face image. The depth information is then augmented with the 2D face image information for enhancing recognition using Principal Component Analysis. The work uses a 3D labeled database of face images for testing the proposed method that proves suitable for the recognition problem.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"74 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121951235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kevin El Haddad, R. Mrad, F. Morel, G. Pillonnet, C. Vollaire, A. Nagari
{"title":"Ferrite bead effect on Class-D amplifier audio quality","authors":"Kevin El Haddad, R. Mrad, F. Morel, G. Pillonnet, C. Vollaire, A. Nagari","doi":"10.1109/MELCON.2014.6820510","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820510","url":null,"abstract":"This paper studies the effect of ferrite beads on the audio quality of Class-D audio amplifiers. This latter is a switching circuit which creates high frequency harmonics. Generally, a filter is used at the amplifier output for the sake of electromagnetic compatibility (EMC). So often, in integrated solutions, this filter contains ferrite beads which are magnetic components and present nonlinear behavior. Time domain measurements and their equivalence in frequency domain are presented. Total Harmonic Distortion (THD) measurements according to the audio signal frequency and amplitude are exposed and discussed. It is shown that ferrite beads introduce up to 30 dB of additional THD which prove the negative effect of the ferrite bead on the amplifier audio quality.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122252407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Metwally, A. Al-Badi, A. Al-Hinai, M. Al-Mayasi, A. Al-Harthi, K. Al-Hashmi, I. Al-Zaabi
{"title":"Reduction of electric-field intensification and hot-spot formation inside cable terminations","authors":"I. Metwally, A. Al-Badi, A. Al-Hinai, M. Al-Mayasi, A. Al-Harthi, K. Al-Hashmi, I. Al-Zaabi","doi":"10.1109/MELCON.2014.6820530","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820530","url":null,"abstract":"This paper presents a 2d finite-element analysis for a 33-kV, three-phase, three-core cross-linked polyethylene (XLPE) power cable termination. To enhance the cable termination lifetime, many factors are examined to reduce the electric-field intensification and the induced current density in the copper sheath. The aim of this simulation is to investigate how the electric and the induced current density distributions can be reduced to avoid partial discharge activities and hot spot formation, respectively. In the electrostatic analysis, the electric-field distributions are studied for unpolluted and polluted cases and with different relative permittivities of each layer. In addition, two methods of stress relief are also investigated, namely, the stress control cone and stress control tube. In the magnetic analysis, three cases are investigated at the rated ampacity of the cable, namely, balanced, unbalanced and single phasing, where the induced current density distributions are laterally computed.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125858166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Kvascev, Ž. Đurović, B. Kovacevic, I. Kovacevic
{"title":"Adaptive estimation of time-varying parameters in AR models with variable forgetting factor","authors":"G. Kvascev, Ž. Đurović, B. Kovacevic, I. Kovacevic","doi":"10.1109/MELCON.2014.6820509","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820509","url":null,"abstract":"A new method for estimating time-varying parameters of nonstationary AR signal models, based on adaptive recursive least squares with variable forgetting factors, is described. The adaptive estimator differs from the conventional one by the simultaneously estimation of AR model parameters and scale factor of prediction residuals, while the variable forgetting factor values are adapted to the nonstationary signal via a new extended prediction error detection scheme. The method has good adaptability in the non-stationary situations, and gives low bias and low variance at the stationary situations. The feasibility of the approach is demonstrated with simulations.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130056553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication schemes for wireless sensor networks","authors":"Ayman Tajeddine, A. Kayssi, A. Chehab, I. Elhajj","doi":"10.1109/MELCON.2014.6820562","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820562","url":null,"abstract":"In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor networks. We divide such techniques into three main categories based on symmetric cryptography, asymmetric cryptography, and hybrid techniques using both cryptographic methods. We discuss each category and deduce the best cipher for each, namely, RC5 and IBE-ECC to be applied in a WSN. We also specify the factors affecting the decision of which category is best to use and the different parameters affecting the network in each category. Finally, we give a real network example and discuss the appropriate choice of the authentication scheme based on the particular WSN needs.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"C-33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126488927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Equation-based phase-noise optimization technique for MOS LC-VCOs","authors":"B. Fahs, H. Kassem, A. Harb","doi":"10.1109/MELCON.2014.6820548","DOIUrl":"https://doi.org/10.1109/MELCON.2014.6820548","url":null,"abstract":"This paper presents an equation-based phase noise optimization technique for MOS LC-VCOs in contrast with feedback-based optimization architectures. The proposed technique relies on a simplified equation relating the bias current to the oscillation amplitude and the equivalent tank losses. The applied technique takes also into account the tank losses dependency on frequency setting in wideband LC-VCOs. The control algorithm aims to predict by feed-forward action the optimal bias current giving the optimum phase noise performance. Performed simulations are based on a 0.13 μm CMOS implementation for the oscillator part while the control algorithm is implemented using behavioral blocks. Simulation results show equivalent phase noise control accuracy to automatic amplitude control (AAC) architectures, while achieving superior performance in terms of control speed, parasitic load and extra noise-sources elimination.","PeriodicalId":103316,"journal":{"name":"MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127849346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}