{"title":"Phase aberration correction in minimum variance beamforming of ultrasound imaging","authors":"Mahsa Sotoodeh Ziksari, B. M. Asl","doi":"10.1109/IRANIANCEE.2015.7146176","DOIUrl":"https://doi.org/10.1109/IRANIANCEE.2015.7146176","url":null,"abstract":"One of the best adaptive beamformers in medical ultrasound is the minimum variance (MV) beamformer which presents better resolution and edge definition with respect to the traditional delay-and-sum (DAS) beamformer. In real situations, as a result of variations of density through soft tissue and contradiction of assuming constant sound speed for medical ultrasound imaging systems, phase aberration is made which causes ambiguity in targets' location and degradation in resolution. This effect has influence on MV beamformer as DAS. In this paper, different levels of near field phase screens have been applied to simulate the manner of MV in the presence of phase aberration. In the next step, a conventional phase aberration correction method is performed before beamforming to retrieve the efficiency of the MV beamformer. Simulations are performed in majority resolution which has the lowest robustness. The results show that the correction algorithm improves the performance of the MV in both terms of resolution and contrast, even in the presence of strong aberrations.","PeriodicalId":187121,"journal":{"name":"2015 23rd Iranian Conference on Electrical Engineering","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116321515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of fuzzy logic for selecting the route in AODV routing protocol for vehicular ad hoc networks","authors":"Amin Feyzi, Vahid Sattari-Naeini","doi":"10.1109/IRANIANCEE.2015.7146301","DOIUrl":"https://doi.org/10.1109/IRANIANCEE.2015.7146301","url":null,"abstract":"One of the known routing protocols in vehicular ad hoc networks is AODV routing protocol which usually uses the criterion of the minimum number of hops to select the route. According to frequent change of topology and the rapid movement of vehicles in these networks, considering the criterion of the minimum hops in AODV prevents selecting more stable routes and decreases the network efficiency. The purpose of this paper is to increase the efficiency of AODV routing protocol using fuzzy logic. Three criteria such as speed, direction and distance of vehicles to destination are used as the inputs of fuzzy system. The result of the fuzzy system can be considered as the probability of selecting route. The proposed protocol has been compared with AODV and FCAR. The evaluation results show that the proposed protocol has a lower average end to end delay than AODV. Packet delivery rate has also increased more than AODV and FCAR.","PeriodicalId":187121,"journal":{"name":"2015 23rd Iranian Conference on Electrical Engineering","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systematic design of an optimum FMCW system for medium to long range detection with constant beat frequency technique","authors":"Mohammad Ali Mokri, N. Masoumi, M. M. Tabrizi","doi":"10.1109/IRANIANCEE.2015.7146440","DOIUrl":"https://doi.org/10.1109/IRANIANCEE.2015.7146440","url":null,"abstract":"In this paper design flow of an optimum FMCW system for medium to long range detection has been reviewed. Inadition, a closed-loop synthesizers introduced which uses precise filters to shape up low frequency beat signal. Using the mentioned technique enhances track range of total range detection system. The total system has been designed and implemented using discrete elements. The measurement results show an IF gain of 90dB, -105dBm sensitivity and tracking range of 30m.","PeriodicalId":187121,"journal":{"name":"2015 23rd Iranian Conference on Electrical Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114691802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of radio frequency and stability performance on double-gate extended source tunneling field-effect transistors","authors":"S. Marjani, S. E. Hosseini","doi":"10.1109/IRANIANCEE.2015.7146364","DOIUrl":"https://doi.org/10.1109/IRANIANCEE.2015.7146364","url":null,"abstract":"The radio frequency (RF) and stability performance of double-gate (DG) extended source tunneling field-effect transistors (TFETs) are evaluated by extracting RF parameters like cut-off frequency (ft), maximum oscillation frequency (fmax) and stability factor. In addition, the superb RF performances of double-gate extended source TFETs were obtained by designing gate length. The stability factor and small signal parameters such as gate capacitance and transconductance can be extracted using a non-quasi static small signal model are calculated using Y-parameters from a TCAD simulation. It was confirmed that the double-gate extended source TFET is suitable for RF applications.","PeriodicalId":187121,"journal":{"name":"2015 23rd Iranian Conference on Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123364216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ahmadi, H. Bevrani, Shoresh Shokoohi, Elham Hasanii
{"title":"An improved droop control for simultaneous voltage and frequency regulation in an AC microgrid using fuzzy logic","authors":"S. Ahmadi, H. Bevrani, Shoresh Shokoohi, Elham Hasanii","doi":"10.1109/IRANIANCEE.2015.7146455","DOIUrl":"https://doi.org/10.1109/IRANIANCEE.2015.7146455","url":null,"abstract":"Voltage and frequency of microgrids (MGs) are strongly impressionable from the active and reactive load fluctuations. There are several voltage source inverters (VSIs) interfaced distributed generations (DGs) by specific local droop characteristics in a MG. Change in load of a MG may lead to imbalance between generation and consumption and it will change the output voltage and frequency of the VSIs according to the droop characteristics. If the load change is adequately large, the DGs may be unable to stabilize the MG. In the present paper, fuzzy logic is used to optimally tune the coefficients of droop control based frequency and voltage regulation in an AC microgrids.","PeriodicalId":187121,"journal":{"name":"2015 23rd Iranian Conference on Electrical Engineering","volume":"49 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123947712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed patching scheme for controlling mobile malware infection","authors":"Alireza Sobhani, A. Keshavarz-Haddad","doi":"10.1109/IRANIANCEE.2015.7146207","DOIUrl":"https://doi.org/10.1109/IRANIANCEE.2015.7146207","url":null,"abstract":"Mobile malware has become a serious security challenge in the world. Google Android dominated the global Smart-phone market in 2014. This popularity makes it easier for the attackers to target larger community of devices. In this paper, we study the dynamics of infection propagation of mobile malware over mobile phones. We construct a framework for simulating peer-to-peer malware infection among mobile users in a community such as students in a campus. Also, we propose a distributed patching scheme for controlling and protecting users in a community against rapid propagation of mobile malware. This technique is effective especially in the underdeveloped countries with expensive and limited mobile Internet services. Using our framework, we simulate the infection rate and performance of patching techniques for a campus area. Our simulation results verify that under certain conditions immunization rate (reaching 90% immunization in the community) in our scheme is 3.5 times faster than the classic centralized scheme. Also, using our scheme would reduce infected devices population in the early stages of malware spreading four times faster.","PeriodicalId":187121,"journal":{"name":"2015 23rd Iranian Conference on Electrical Engineering","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124162735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on heterogeneous access networks: Mobile data offloading","authors":"Golnoosh Elhami, Mona Zehni, Mohammadreza Pakravan","doi":"10.1109/IRANIANCEE.2015.7146244","DOIUrl":"https://doi.org/10.1109/IRANIANCEE.2015.7146244","url":null,"abstract":"In communication technologies, traffic growth and cost reduction constraints, users' demand for new services, and advances in technologies (smarter devices) are three main drivers that cause the evolution of network architecture. Data offloading is one of the proposed architectures and defined as utilizing different access technologies for data delivery in users' access to base station (BS), besides cellular network. Three mentioned drivers can also be considered as main factors for evolution toward data offloading. Mobile data offloading is used to reduce the load and the congestion of cellular network and also utilize network resources more efficiently. Moreover, this technology can provide subscribers with better quality of service. Different access technologies can be utilized to achieve these goals. These alternatives include examples such as ISM band wireless local area networks (WLANs), femtocells, Device-to-Device (D2D) communications and opportunistic communications. In this paper, we review this subject and thoroughly survey the different important offloading approaches. We categorize these approaches in terms of their usage of licensed or unlicensed frequency bands. We also provide some of the important technical challenges of these techniques and review some of the proposed solutions.","PeriodicalId":187121,"journal":{"name":"2015 23rd Iranian Conference on Electrical Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125429236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Networked IDS configuration in heterogeneous networks — A game theory approach","authors":"Mohsen Ghorbani, M. Hashemi","doi":"10.1109/IRANIANCEE.2015.7146357","DOIUrl":"https://doi.org/10.1109/IRANIANCEE.2015.7146357","url":null,"abstract":"Intrusion Detection Systems (IDSs) are an essential component of any network security architecture. Their importance is emphasized in today's heterogeneous and complex networks, where a variety of network assets are constantly subject to a large number of attacks. As the network traffic increases, the importance of proper IDS configuration is reinforced. For instance, the larger the number of detection libraries are, the larger number of attacks is expected to be detected. A larger number of libraries implies that the computational complexity is increased, which may reduce system performance. There is always a tradeoff between security enforcement level and system performance. Many papers in the literature have exploited Game theory to address this problem by including different factors in their proposed models. In this paper, we propose a game theoretic approach to determine the networked IDS configuration in heterogeneous networks. We utilize a more efficient way to tune IDS configuration, including library selection, based on the type and value of protected network assets; the interdependencies between assets are considered in the model. Unlike most existing methods, in the proposed game model the impact of each particular attack is considered to be different for each asset. The problem has been modeled as a non-cooperative multi-person nonzero-sum stochastic game. The existence of stationary Nash equilibrium for this game has been demonstrated.","PeriodicalId":187121,"journal":{"name":"2015 23rd Iranian Conference on Electrical Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124965206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Shahnazi, Qing Zhao, Adel Haghani Abandan Sari, T. Jeinsch
{"title":"Dynamic nonlinear unknown input observer for fault detection of induction motors","authors":"R. Shahnazi, Qing Zhao, Adel Haghani Abandan Sari, T. Jeinsch","doi":"10.1109/IRANIANCEE.2015.7146326","DOIUrl":"https://doi.org/10.1109/IRANIANCEE.2015.7146326","url":null,"abstract":"Induction motors are widely adopted and can be found in many industrial plants. Early detection and diagnosis of faults for them are of great importance. In this paper, the model-based approach is used to detect the incipient faults as early as possible and to ensure the asymptotic convergence. The proposed method is used to detect changes in stator and rotor resistances which can be caused by stator winding short-circuit fault and broken rotor bars, respectively. To cope with the nonlinearities and at the same time load disturbances dynamic nonlinear unknown input observer (DNUIO) is used. In this paper, also a less conservative method is proposed to find Lipschitz constant for induction motors.","PeriodicalId":187121,"journal":{"name":"2015 23rd Iranian Conference on Electrical Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115740488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 1-volt temperature sensor with duty-cycle-modulated output in 0.18 μm CMOS technology","authors":"M. Abdollahpour, A. Heidari","doi":"10.1109/IRANIANCEE.2015.7146374","DOIUrl":"https://doi.org/10.1109/IRANIANCEE.2015.7146374","url":null,"abstract":"This paper describes the design of a low-voltage, energy-efficient smart temperature sensor to be implemented in 0.18μm standard CMOS technology. The BJT-based sensor converts the PTAT and CTAT currents to a square-wave output with a duty cycle proportional to the temperature. The main limitations of the integrated interface for low-voltage design is found from an approximating analytical calculation, which shows that the minimum supply voltage was 1.5 V. Next, the design was modified to make our principle working for a 1V supply. Simulation results of the complete sensor show that the error in temperature range of -40°C to 110°C is less than 0.5°C. However, due to the influence of leakage currents, this error rises to about 3°C for 130°C.","PeriodicalId":187121,"journal":{"name":"2015 23rd Iranian Conference on Electrical Engineering","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130466022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}