L. Dumitru, S. Eftimie, M. Mihailescu, Stefania Loredana Nita, V. Opriş, C. Racuciu
{"title":"A novel architecture for authenticating scalable resources in hybrid cloud","authors":"L. Dumitru, S. Eftimie, M. Mihailescu, Stefania Loredana Nita, V. Opriş, C. Racuciu","doi":"10.1109/ICCOMM.2016.7528254","DOIUrl":"https://doi.org/10.1109/ICCOMM.2016.7528254","url":null,"abstract":"The cloud architecture solutions evolve and they are recognized as the next generation computing infrastructure. This paper proposes a novel architecture for authenticating scalable resources in hybrid clouds, to integrate the automation of resource managing with the confirmation of identities by the operators. In order to reach the article's objective several steps were followed: the novel architecture proposed, the type of the messaging system and the infrastructure software agents. The idea shows a significant method for authenticating scalable resources in hybrid clouds, with regards to current solutions.","PeriodicalId":151984,"journal":{"name":"2016 International Conference on Communications (COMM)","volume":"718 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116128122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 2-PPM CMOS modulator for IR-UWB signals","authors":"Adrian Popa, N. Alexandru, R. Bozomitu","doi":"10.1109/ICCOMM.2016.7528303","DOIUrl":"https://doi.org/10.1109/ICCOMM.2016.7528303","url":null,"abstract":"This paper presents an implementation of a binary pulse-position modulator (2-PPM) for impulse-radio ultra-wideband (IR-UWB) systems, capable of producing an appropriate signal to drive the final output stage of an ultra narrow pulse generator. Compared to the usual circuits based on voltage-controlled delay lines, this novel scheme uses digital signal processing of the clock and data signals with a direct implementation in CMOS technology, which makes possible to construct also the UWB pulse generator. Simulations show that the signal obtained as pulse sequences that are delayed using phase modulation can be used to drive an UWB generator that outputs pulses satisfying the requirements regarding the regulated output spectrum.","PeriodicalId":151984,"journal":{"name":"2016 International Conference on Communications (COMM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121316569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A FHE-based evaluation for searching on encrypted data","authors":"Mihai Togan","doi":"10.1109/ICCOMM.2016.7528211","DOIUrl":"https://doi.org/10.1109/ICCOMM.2016.7528211","url":null,"abstract":"The model based on cloud computing provides considerable advantages of cost-quality regarding the access to a range of IT services. The cloud providers must ensure solid security guarantees. One of the critical issues is that of privacy and access rights to data migrated and managed by the cloud. In this sense, one solution is based on encrypting data before its upload in cloud. In this paper we propose a solution to the problem of searching on encrypted data. Our proposal is based on FHE cryptography and allows searching an integer within a set of encrypted values. The search algorithm can be processed on an untrusted entity (e.g. a service in the cloud), it does not require decrypting the data on the server nor intermediary exchanges with the decryption key holder (e.g. the cloud service client). We show a practical implementation for our solution. Experimental results are also presented.","PeriodicalId":151984,"journal":{"name":"2016 International Conference on Communications (COMM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124915572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new bit-level permutation image encryption algorithm","authors":"A. Diaconu, V. Ionescu, J. M. López-Guede","doi":"10.1007/978-3-319-47364-2_58","DOIUrl":"https://doi.org/10.1007/978-3-319-47364-2_58","url":null,"abstract":"","PeriodicalId":151984,"journal":{"name":"2016 International Conference on Communications (COMM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127254687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Flaviu-Ioan Pop, C. Munteanu, A. Racasan, C. Pacurar, Silvan Pruşu, G. Mihai
{"title":"Evaluation of conducted disturbances from LED lamps according to EN 55015","authors":"Flaviu-Ioan Pop, C. Munteanu, A. Racasan, C. Pacurar, Silvan Pruşu, G. Mihai","doi":"10.1109/ICCOMM.2016.7528260","DOIUrl":"https://doi.org/10.1109/ICCOMM.2016.7528260","url":null,"abstract":"In this article the authors have proposed to present the importance of knowing the laws in force in terms of electromagnetic compatibility by studying electromagnetic conduction disturbances in the supply network. This study is based on two types of lamps and how to reduce these interferences using various filters that reduces electromagnetic interference produced by these lamps. The tests were performed at the Electromagnetic Compatibility Laboratory from Technical University of Cluj-Napoca.","PeriodicalId":151984,"journal":{"name":"2016 International Conference on Communications (COMM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128456677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intra-car communications and diagnosis solutions","authors":"Radu-Ovidiu Darlosan, I. Marghescu, C. Lică","doi":"10.1109/ICCOMM.2016.7528270","DOIUrl":"https://doi.org/10.1109/ICCOMM.2016.7528270","url":null,"abstract":"The automotive industry is one of the most diversified, complex and important area into research and development software engineering solutions. Multimedia and infotainment systems, from nowadays cars, require more and more software and hardware resources which bring about the adaptation of the existing communication and diagnosis standards. The market wishes are moving towards wireless, affordable and easy-to-use solutions. Even the well-known and powerful standards as CAN in case of communication and UDS for diagnosis services, are starting to not fulfill all OEMs needs. The integration of a new concept for intra-car communications and diagnosis services is required and one of most promising is the Remote Diagnosis. The paper presents a new Remote Diagnosis technology, enhanced with a remote gateway device which handles the communication and diagnosis services. This wireless solution satisfies multiple needs such as: analyze and fix car's issue remotely, providing software updates in a remote way and more others. The integration of Remote Diagnosis into the existing systems is also feasible.","PeriodicalId":151984,"journal":{"name":"2016 International Conference on Communications (COMM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130333121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Side lobes level reduction in planar array antenna using two-dimensional window functions","authors":"Daniel Depărăţeanu, T. Oroian, F. Enache","doi":"10.1109/ICCOMM.2016.7528330","DOIUrl":"https://doi.org/10.1109/ICCOMM.2016.7528330","url":null,"abstract":"Antenna directivity characteristic depends on the geometrical dimensions of the antenna, the geometrical configuration, the excitation amplitude and the excitation phase of the individual elements and the radiation pattern of the individual elements. The directivity properties of antennas are improved by using array antennas. In this paper it is presented a solution for side lobes level reduction in planar array antenna using two-dimensional window functions. The beamwidth and side lobes level of the antenna radiation pattern are analysed.","PeriodicalId":151984,"journal":{"name":"2016 International Conference on Communications (COMM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129223870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic propagation model tuning process in TETRA networks","authors":"Ion Grecu, Mircea Nicolaescu","doi":"10.1109/ICCOMM.2016.7528340","DOIUrl":"https://doi.org/10.1109/ICCOMM.2016.7528340","url":null,"abstract":"This paper is about tuning a propagation model based on free space propagation model and also propagation by diffraction using measurements of signal strength of TETRA radio network. The purpose was to determine a set of coefficients that added to the model itself, will be able to provide a adapted propagation model that can be used for providing radio coverage predictions and also in future for expanding radio coverage of the TETRA national network in areas that in present are not covered.","PeriodicalId":151984,"journal":{"name":"2016 International Conference on Communications (COMM)","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116343893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nabil Abdoun, S. E. Assad, M. A. Taha, R. Assaf, O. Déforges, Mohamad Khalil
{"title":"Secure Hash Algorithm based on Efficient Chaotic Neural Network","authors":"Nabil Abdoun, S. E. Assad, M. A. Taha, R. Assaf, O. Déforges, Mohamad Khalil","doi":"10.1109/ICCOMM.2016.7528304","DOIUrl":"https://doi.org/10.1109/ICCOMM.2016.7528304","url":null,"abstract":"Secure Hash Algorithm (SHA) is the most popular standard of Cryptographic Hash functions. Several security protocols use SHA to provide message integrity, authentication and digital signature. Nowadays, a new technology based on Chaotic Neural Networks is used to design Hash functions due to the following important properties of Chaos and Neural Networks: non-linearity, compression, confusion and diffusion. Compared to existing Hash functions based on Chaotic Neural Networks, the proposed structure integrates a strong Chaotic generator into neurons instead of using simple Chaotic maps. In fact, simple chaotic maps are not very robust, even against some statistical attacks (Uniformity and NIST). To also reduce the complexity of hash function proposed in ICITST conference (2015), while maintaining strength, we present in this paper a new structure of Hash function. The theoretical analysis and the obtained experimental performances demonstrate the efficiency o f the implemented structure in terms of strong Collision Resistance and High Message Sensitivity compared to SHA-2 and some Chaos-based Hash functions.","PeriodicalId":151984,"journal":{"name":"2016 International Conference on Communications (COMM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121493134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Norm-minimized scattering data from intensities","authors":"A. Seel, A. Davtyan, U. Pietsch, O. Loffeld","doi":"10.1109/ICCOMM.2016.7528205","DOIUrl":"https://doi.org/10.1109/ICCOMM.2016.7528205","url":null,"abstract":"We apply the ℓ1 minimizing technique of compressive sensing (CS) to non-linear quadratic observations. For the example of coherent X-ray scattering we provide the formulae for a Kalman filter approach to quadratic CS and show how to reconstruct the scattering data from their spatial intensity distribution.","PeriodicalId":151984,"journal":{"name":"2016 International Conference on Communications (COMM)","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124491757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}