2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)最新文献

筛选
英文 中文
Commercial software companies and open source community reaction to disclosed vulnerabilities: Case of Windows Server 2008 and Linux patching 商业软件公司和开源社区对公开漏洞的反应:以Windows Server 2008和Linux补丁为例
M. Zineddine, C. Alaoui, N. Saidou
{"title":"Commercial software companies and open source community reaction to disclosed vulnerabilities: Case of Windows Server 2008 and Linux patching","authors":"M. Zineddine, C. Alaoui, N. Saidou","doi":"10.1109/WITS.2017.7934677","DOIUrl":"https://doi.org/10.1109/WITS.2017.7934677","url":null,"abstract":"Open source and closed software security has been debated for decades, vulnerabilities reported for both types of software has been under scrutiny for years. In this study, a descriptive and correlation study for two selected systems is conducted using SPSS 19. The results show that the severity score average of Linux kernel vulnerabilities is lower by %30 than the severity score average of vulnerabilities of windows server 2008, and the time required to patch published vulnerabilities is relatively faster for commercial than open source software. However, a positive correlation between Windows server 2008's variables reveal the irony that severity scores and patch delays are moving in the same direction. The contribution of this article is to shed light on the perception about the security divide between open source and closed software under study that is, although the commercial companies respond faster, however, not according to the severity of vulnerabilities disclosed.","PeriodicalId":147797,"journal":{"name":"2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125741156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A wideband low phase noise LC-VCO using output enhancement technique in 130 nm CMOS Technology 基于输出增强技术的130nm CMOS宽带低相位噪声LC-VCO
Abdelhamid Aitoumeri, Abdelmalik Bouyahyaoui, M. Alami, Karim Zouaq
{"title":"A wideband low phase noise LC-VCO using output enhancement technique in 130 nm CMOS Technology","authors":"Abdelhamid Aitoumeri, Abdelmalik Bouyahyaoui, M. Alami, Karim Zouaq","doi":"10.1109/WITS.2017.7934651","DOIUrl":"https://doi.org/10.1109/WITS.2017.7934651","url":null,"abstract":"We present in this paper two LC Voltage Controlled Oscillator (VCO) with an output enhancement technique to achieve better phase noise performance, which is the most critical parameter in VCOs. The two VCOs were designed with TSMC 130 nm CMOS RF Technology. The two VCOs use IMOS varactor configuration. The first VCO with Low Power (LP-VCO) operates at 1.6 GHz with 200 MHz frequency tuning range, the VCO core consume only 725 µW from 1.2 V supply, this VCO achieves a phase noise of −123.2 dBc/Hz and a Figure-of-Merit (FoM) of −185 dBc/Hz at 1 MHz frequency offset. The second VCO was designed to have wide tuning range frequency and low phase noise (WB-VCO). The latter operates from 3.28 GHz to 4.4 GHz and consume 6.7 mW from 1.2 V supply. The WB-VCO design achieves a phase noise of −133 dBc/Hz and −123.4 dBc/Hz at 1 MHz offset from 4.4 GHz and 3.28 GHz carriers, respectively. The calculated FoM and FoMT at 1 MHz offset from 3.28 GHz carrier, are −195 and −204 dBc/Hz, respectively.","PeriodicalId":147797,"journal":{"name":"2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131042682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiband fractal CPW antenna for GPS, WiMAX and IMT applications 用于GPS, WiMAX和IMT应用的多波段分形CPW天线
D. E. Nabaoui, A. Tajmouati, A. Errkik, L. Elabdellaoui, C. Abounaima, M. Latrach
{"title":"Multiband fractal CPW antenna for GPS, WiMAX and IMT applications","authors":"D. E. Nabaoui, A. Tajmouati, A. Errkik, L. Elabdellaoui, C. Abounaima, M. Latrach","doi":"10.1145/3167486.3167494","DOIUrl":"https://doi.org/10.1145/3167486.3167494","url":null,"abstract":"This paper presents a new design of a fractal multiband antenna structure fed by coplanar waveguide (CPW) transmission line. The proposed antenna is optimized by using CST-MW studio. The final validated circuit is designed to operate in the Global Positioning System (GPS 1.57), Worldwide Interoperability for Microwave Access (WiMAX 2.5 – 2.69 / 3.30 – 3.80), and Advanced System of forth generation mobile communication (IMT 3.40 – 4.20 GHZ). Manifestly, it has been found that the radiation patterns of the presented antenna are still similarly to the bidirectional radiation pattern. The properties of the antennas, for instance, return losses and radiation patterns are validated into simulation by using two electromagnetic simulators HFSS and CST-MW Studio.","PeriodicalId":147797,"journal":{"name":"2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130583742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An evolved design of a Zero Bias broadband microstrip Power Limiter 零偏宽带微带功率限制器的改进设计
Khalifa Echchakhaoui, E. Abdelmounim, J. Zbitou, A. Tajmouati, H. Bennis, Mediavialla Angel
{"title":"An evolved design of a Zero Bias broadband microstrip Power Limiter","authors":"Khalifa Echchakhaoui, E. Abdelmounim, J. Zbitou, A. Tajmouati, H. Bennis, Mediavialla Angel","doi":"10.1109/WITS.2017.7934684","DOIUrl":"https://doi.org/10.1109/WITS.2017.7934684","url":null,"abstract":"In this paper, a new broadband microwave microstrip power limiter is designed and validated into simulation by using ADS (Advanced Design System) from Agilent technologies. The Power Limiter is based on microstrip technology and Zero Bias commercial Schottky diodes HSMS286x associated as a bridge rectifier. The circuit is validated in two steps. The first and basic circuit is formed from one bridge. The second circuit is obtained by concatenating two basic circuits. This circuit shows a quasi ideal power limiter characteristics and it is validated with a threshold input value of 5 dBm up to 30dBm for the maximum input power.","PeriodicalId":147797,"journal":{"name":"2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133081924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Classification of major security attacks against RFID systems 针对RFID系统的主要安全攻击分类
Mohamed El Beqqal, M. Azizi
{"title":"Classification of major security attacks against RFID systems","authors":"Mohamed El Beqqal, M. Azizi","doi":"10.1109/WITS.2017.7934622","DOIUrl":"https://doi.org/10.1109/WITS.2017.7934622","url":null,"abstract":"Thanks to their crucial role in different areas such as supply chain and healthcare, Radio Frequency Identification (RFID) technologies have currently attracted a lot of attention. They are mainly used for identifying objects and people based on a combination of tags and readers. Nevertheless, this identification brings out many challenges and concerns including security which still remains an open issue. In this work, we present a survey of recent works dealing with security and privacy in RFID systems. Particularly, we compare and classify them according to which part of RFID system each solution could be applied, taking into account different requirements and parameters including their conformity to RFID standards. Hence, our comparative study targets to provide a wide and clear vision of these concerns as a dashboard to help determining the most appropriate solutions towards any security problem.","PeriodicalId":147797,"journal":{"name":"2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115925810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Beam-scanning SIW antennas based on association of various shaped slots 基于不同形状槽关联的波束扫描SIW天线
Imane Serhsouh, H. Lebbar, M. Himdi
{"title":"Beam-scanning SIW antennas based on association of various shaped slots","authors":"Imane Serhsouh, H. Lebbar, M. Himdi","doi":"10.1109/WITS.2017.7934600","DOIUrl":"https://doi.org/10.1109/WITS.2017.7934600","url":null,"abstract":"This paper presents a new switched beam antenna array working at 26GHz for future 5G application, based on the sub-arrays containing an association of various shaped slot ( L, U, S) engraved in Substrate Integrated Waveguide (SIW). The phase shift between each slot is obtained by adjusting the position of transversal slots. The beam tilt is obtained by choosing the adequate slots combination. Finally SPDT switches can be used to control the antenna beam in 8 different directions between −46° and 46° in the same plane or to combine different sub-arrays to carry out multi-beams antenna array. Results of simulations (CST Microwave) are given and validate the proposed solution.","PeriodicalId":147797,"journal":{"name":"2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129395111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face detection: Comparing Haar-like combined with cascade classifiers and Edge Orientation Matching 人脸检测:比较Haar-like结合级联分类器和边缘方向匹配
Souhail Guennouni, A. Ahaitouf, A. Mansouri
{"title":"Face detection: Comparing Haar-like combined with cascade classifiers and Edge Orientation Matching","authors":"Souhail Guennouni, A. Ahaitouf, A. Mansouri","doi":"10.1109/WITS.2017.7934604","DOIUrl":"https://doi.org/10.1109/WITS.2017.7934604","url":null,"abstract":"One of the major research areas attracting much interest is face recognition. This is due to the growing need of detection and recognition in the modern days' industrial applications. However, this need is conditioned with the high performance standards that these applications require in terms of speed and accuracy. In this work we present a comparison between two main techniques of face recognition in unconstraint scenes. The first one is Edge-Orientation Matching and the second technique is Haar-like feature selection combined cascade classifiers.","PeriodicalId":147797,"journal":{"name":"2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130438575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Modular energy efficient and solid-state Battery Thermal Management System 模块化节能和固态电池热管理系统
C. Alaoui
{"title":"Modular energy efficient and solid-state Battery Thermal Management System","authors":"C. Alaoui","doi":"10.1109/WITS.2017.7934608","DOIUrl":"https://doi.org/10.1109/WITS.2017.7934608","url":null,"abstract":"The lithium-iron-phosphate (LiFePO4) battery is becoming the favored choice of electrochemical energy storage for electric vehicles (EV) and hybrid vehicles (HV) due to its high energy density and low self-discharge. However, battery operating temperature plays a vital role on the reliability, lifespan, safety and performance of EV and HV. Battery Thermal Management System (BTMS) must keep the operating temperature of the battery pack between 20 °C and 40 °C in order to achieve good performances and long lifespan. To this day, this task remains a challenging subject for the electric vehicle (EV) development. BTMS consumes energy from the on-board battery pack, thus reducing the range of the vehicle. In order to reduce this adverse impact, this paper presents a novel approach that takes advantage of the non-uniform surface distribution of li-ion battery cell, which results from complex reactions inside the cell. First, li-ion hotspots were identified and found next to the positive and negative tabs. Then, thermoelectric coolers (TEC) are mounted next to the tabs and in the center of the li-ion battery. The control circuit is designed to turn on and off TECs in order to reduce the parasitic power feeding the BTMS. Experimental results show the feasibility of this system.","PeriodicalId":147797,"journal":{"name":"2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127123363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lightweight authentication-based scheme for AODV in ad-hoc networks ad-hoc网络中AODV的轻量级基于身份验证的方案
Nabil Nissar, N. Naja, A. Jamali
{"title":"Lightweight authentication-based scheme for AODV in ad-hoc networks","authors":"Nabil Nissar, N. Naja, A. Jamali","doi":"10.1109/WITS.2017.7934616","DOIUrl":"https://doi.org/10.1109/WITS.2017.7934616","url":null,"abstract":"A mobile ad hoc network is a group of wireless mobile nodes with no infrastructure, in which individual mobile nodes are able to self organize and self configure in order to communicate within a direct wireless transmission range. However, the vulnerable nature of the mobile ad hoc networks (MANETs) makes them very prone to an adversary's malicious attacks such as dropping data or sending fake data etc. As the demand of MANETs is increasing day by day, the problem of security especially in the network layer must be solved appropriately and in accordance with the special characteristics of MANETs. In this paper, we present some attacks against routing in MANETs, and we focus on analyzing the working process of AODV routing protocol which is a representative protocol of on-demand routing protocols in ad-hoc. Then we propose an enhancement design to AODV based on authentication, using digital signatures, in order to prevent potential routing attacks against this protocol from intruders and malicious nodes. Finally, we compare the effectiveness of our improved protocol with some related secure routing protocols from literature, and against some well known attacks.","PeriodicalId":147797,"journal":{"name":"2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130823510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A low cost miniature UHF RFID tag antenna using paper substrate 一种基于纸基板的低成本微型超高频RFID标签天线
A. El Hamraoui, E. Abdelmounim, J. Zbitou, H. Bennis, M. Latrach, A. Errkik
{"title":"A low cost miniature UHF RFID tag antenna using paper substrate","authors":"A. El Hamraoui, E. Abdelmounim, J. Zbitou, H. Bennis, M. Latrach, A. Errkik","doi":"10.1109/WITS.2017.7934685","DOIUrl":"https://doi.org/10.1109/WITS.2017.7934685","url":null,"abstract":"This paper presents a new design of a low cost passive UHF RFID tag antenna using paper substrate. The design is based on a short dipole loaded at both ends with a pair of triangles and four arms in order to reduce the size of the design. By choosing a proper dimension of the short dipole and the T-matching network, a good and broadband impedance matching can be achieved. The simulation results carried out by ADS from Agilent technologies and CST Microwave Studio electromagnetic solvers, demonstrate that we have good performances in term of return loss, gain, radiation pattern and read range for the desired frequency bands. This antenna has a total area of 80×34 mm2 and mounted on a paper substrate. With a constant dielectric permittivity, equal to 3.3, a thickness of 0.5 mm and a loss tangent of 0.04. The simulated bandwidth at the UHF RFID band is about 56 MHz, which covers the North and South American UHF RFID band (894–950 MHz). The gain obtained into simulation of this antenna is 1.88 dB at 915 MHz and the simulated read range is 5.78 m.","PeriodicalId":147797,"journal":{"name":"2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115307060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信