{"title":"A Novel Design of a High Gain Step-Up Converter Using Switched-Capacitors/Switched-Inductors Cells","authors":"A. Alateeq, M. Matin","doi":"10.1109/EIT.2018.8500201","DOIUrl":"https://doi.org/10.1109/EIT.2018.8500201","url":null,"abstract":"This paper addresses a two level power switched capacitors boost converter (PSC-boost) for high voltage gain applications. The difficulty to provide a high voltage gain by the conventional boost converter is the main purpose behind this design. The proposed design is an integration of a PSC converter and a conventional boost converter. The PSC switched-capacitors and the conventional boost converter are respectively cascaded as a primary and a secondary side of the proposed converter. Without alerting the secondary side (conventional boost), the conversion ratio can be increased by adding more switched-capacitors cells. The proposed converter similarly acts as a multilevel boost converter (MBC); however, the MBC converter fails at a higher duty cycle. Determining the proposed converter's ability at a higher duty cycle manner shows a subtle difference between the simulated and calculated results. Another implementation to the proposed converter is by inserting a switched inductor model instead of the secondary side's inductor. Five switches, five capacitors, seven diodes and three inductors are needed to build a PSC-boost switched-inductor converter. The PSC-boost converter's parameters are the input voltage, the output voltage, primary side switching frequency and the secondary side switching frequency which are chosen as 12 V, 192 V, 200 KHz and 100 KHz respectively. The MATLAB/SIMULINK and the LTspice simulators were used to determine the proposed model.","PeriodicalId":188414,"journal":{"name":"2018 IEEE International Conference on Electro/Information Technology (EIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying EMAT for Ultrasonic Communication Through Steel Plates and Pipes","authors":"Xin Huang, J. Saniie, S. Bakhtiari, A. Heifetz","doi":"10.1109/EIT.2018.8500148","DOIUrl":"https://doi.org/10.1109/EIT.2018.8500148","url":null,"abstract":"Ultrasonic communication methods have been used for sending data through elastic solids such as steel pipes or plates to overcome physical hurdles that hamper the conventional communication methods (wired and RF wireless). EMAT (Electro Magnetic Acoustic Transducer), an ultrasonic signal generation technique that generates different modes of waveform, is particularly useful for hot, cold, or dry environments, which overcome many of the issues faced by conventional PZT ultrasonic probes. In this paper, EMAT is used as the transmitter for noncontact ultrasonic signal generation and PZT is used as the receiver for the communication system. This system is designed to assess the efficiency of Lamb waves and to examine Bit Error Rate (BER) of digital communication. The communication system was configured using National Instrument arbitrary waveform generator (AWG) and PXI digital oscilloscope. The accuracy of transmitted information is tested on a 5-foot long stainless-steel plate and pipe. The system operates with the frequency of 414 kHz signal and uses Amplitude-Shift Keying (ASK) modulation for transmission. This method can transfer digital data in presence of undesirable multipath effect with bit rates of 20 kbps and 40 kbps without any error.","PeriodicalId":188414,"journal":{"name":"2018 IEEE International Conference on Electro/Information Technology (EIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130289304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cloud-Based Smart Expiry System Using QR Code","authors":"T. Khan","doi":"10.1109/EIT.2018.8500140","DOIUrl":"https://doi.org/10.1109/EIT.2018.8500140","url":null,"abstract":"In this paper, a novel cloud-based smart expiry system is proposed which sends an automatic notification to customer's smartphone several days before the purchased food expires. The checkout operator app in the store generates a table containing product names with expiry dates and it is uploaded to the cloud. The customer scans a single Quick Response (QR) code printed on the purchase receipt with a smartphone. The table is then downloaded from the cloud to the smartphone automatically and the customer is be all set to receive the expiry date reminders and notifications. Compared with other works, the proposed method does not need tedious manual entry of each product name and expiration date into the smartphone app, rather scanning a single QR code will be sufficient.","PeriodicalId":188414,"journal":{"name":"2018 IEEE International Conference on Electro/Information Technology (EIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125084117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heterogeneous-Aware Distributed Clustering for Wireless Sensor Networks","authors":"Areej Alsaafin, Z. Aghbari, A. Khedr","doi":"10.1109/EIT.2018.8500313","DOIUrl":"https://doi.org/10.1109/EIT.2018.8500313","url":null,"abstract":"With rapidly increasing data, clustering techniques are becoming very useful tools for analyzing data in modern research. Clustering has proven to be an effective technique for data aggregation in wireless sensor networks (WSNs). Classical clustering algorithms perform all computations in one central location such as the sink, which has a full knowledge of the network. These algorithms lead to excessive energy consumption as they rely on broadcast communication. This also leads to high data delivery latency since the sink is the only node responsible for handling all network decisions. In this paper, we propose a heterogeneous-aware distributed clustering (HADC) algorithm for WSNs. The proposed algorithm takes advantage of the presence of node heterogeneity in terms of energy in order to prolong the network lifetime. We select cluster heads (CHs) based on an effective cost function that considers residual energy and node load. In addition, HADC aims to balance load in the network and reduce energy consumption of sensor nodes by making a trade-off between node degree and distance towards potential CHs. Simulations demonstrate that HADC can achieve efficient performance in terms of several metrics as compared with HEED and LEACH. Furthermore, we conduct experiments to study the effect of nodes' heterogeneity in clustered WSNs.","PeriodicalId":188414,"journal":{"name":"2018 IEEE International Conference on Electro/Information Technology (EIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128199144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Alignment for Inertial System in Vibration Environment Based on Improved EEMD","authors":"Wei Wang, Xiyuan Chen","doi":"10.1109/EIT.2018.8500183","DOIUrl":"https://doi.org/10.1109/EIT.2018.8500183","url":null,"abstract":"Vibration is an important error source of inertial system. Eliminating vibration is important for improving the performance of initial alignment. In this paper, the improved Ensemble Empirical Mode Decomposition (IEEMD) and permutation entropy are used to eliminate the noises and the vibrations. Firstly, on the basis of the research on the influence of the frequency of artificial noise on the Empirical Mode Decomposition (EMD) decomposition, an improved EEMD is proposed to ensure that the vibration signal can be accurately decomposed. Second, the noise-related Intrinsic Mode Functions (IMFs), vibration-related IMFs and signal-related IMFs are separated according to the permutation entropy of each IMF. Finally, to achieve the purpose of eliminating noise and vibration interference, the signal-related IMFs are acted as the output of fiber optic gyroscopes and accelerometers. The experimental results show that the proposed method can effectively reduce the vibration and improve the efficiency and accuracy of the initial alignment.","PeriodicalId":188414,"journal":{"name":"2018 IEEE International Conference on Electro/Information Technology (EIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128441375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use","authors":"Bhargav Pingle, Aakif Mairaj, A. Javaid","doi":"10.1109/EIT.2018.8500082","DOIUrl":"https://doi.org/10.1109/EIT.2018.8500082","url":null,"abstract":"Cybersecurity is becoming more significant with the increased reliance on the internet; and wireless networks like Bluetooth and Wi-Fi. There are many vulnerabilities in the cyber world which the attackers are exploiting. One such attack is Man-In-The-Middle (MITM) attack. Man-In-The-Middle (MITM) is one of the primary attacks employed in computer-based hacking. In this paper, we will discuss how the attacker performs the Man-in-the-middle (MITM) attack using the open source Ettercap tool in Kali Linux environment. Ettercap tool is a sniffing tool available in the Kali Linux operating system. It is used to perform sniffing, using Man-in-the-middle attack and other attacks like DDOS attack, packet filtering, DNS spoofing, etc. This paper attempts to implement this attack for instructional use in an academic setup for teaching a foundational cybersecurity course.","PeriodicalId":188414,"journal":{"name":"2018 IEEE International Conference on Electro/Information Technology (EIT)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115538125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Random Forest Classifier in SDN Framework for User-Based Indoor Localization","authors":"Rahul Gomes, M. Ahsan, A. Denton","doi":"10.1109/EIT.2018.8500111","DOIUrl":"https://doi.org/10.1109/EIT.2018.8500111","url":null,"abstract":"Wireless indoor localization has gained importance over the past few years. Its application ranges from turning on entertainment devices when we walk in a room to complementing biometric security systems. While present technology employing radio-frequency exists for indoor positioning, deploying these systems can be expensive and consume a lot of power. As smart systems make their way in our daily life, there is a need to develop models that can integrate with existing technology without the need of specialized hardware. We propose a random forest approach for indoor localization using a Software Defined Network (SDN) framework. This model uses random forest based cross validation to train itself and perform indoor localization. The SDN framework is responsible for coordinating the IoT devices and monitoring security threats. The system is tested using Wi-Fi signals obtained from seven different routers. The highest accuracy of 98.3% is achieved using k-fold cross validation of 3 and mtry = 2. To verify its applicability, the model was tested against other algorithms such as kNN, Support Vector Machines and Neural Networks. Random forest performs best in this scenario.","PeriodicalId":188414,"journal":{"name":"2018 IEEE International Conference on Electro/Information Technology (EIT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Programming Course Using Video Game Design with Platform Projects","authors":"Christopher Hideg, D. Debnath","doi":"10.1109/EIT.2018.8500103","DOIUrl":"https://doi.org/10.1109/EIT.2018.8500103","url":null,"abstract":"Video game principles are used in virtual reality scenarios and military training applications. Video games are an alternate approach that colleges should consider for programming courses. This paper will offer a flexible course design and features several code examples and platform applications to assist in the course design.","PeriodicalId":188414,"journal":{"name":"2018 IEEE International Conference on Electro/Information Technology (EIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128683831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information-Theoretic Security and Energy Efficiency for Information and Power Transfer in Two-Hop Wireless Relay Networks","authors":"R. Zhu, Huirong Fu, Tao Shu","doi":"10.1109/EIT.2018.8500123","DOIUrl":"https://doi.org/10.1109/EIT.2018.8500123","url":null,"abstract":"In this paper, we study the problem of power allocation to maximize the transmission energy efficiency (TEE), while satisfying the security requirements in a wireless relay network. To the best of our knowledge, this is the first work that jointly consider the energy efficiency and security requirements in two-hop wireless secure communication. A linear relaxation method and iterative algorithm are proposed to solve this optimization problem and obtain approximation of the optimal solution. We perform simulations to investigate the TEE performance under different power allocation and antennas deployment strategies. The numerical results verify the effectiveness of our optimization.","PeriodicalId":188414,"journal":{"name":"2018 IEEE International Conference on Electro/Information Technology (EIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Dai, V. Vijayarajan, Xuan Peng, Li Tan, Jean Jiang
{"title":"Speech Recognition Using Sparse Discrete Wavelet Decomposition Feature Extraction","authors":"J. Dai, V. Vijayarajan, Xuan Peng, Li Tan, Jean Jiang","doi":"10.1109/EIT.2018.8500254","DOIUrl":"https://doi.org/10.1109/EIT.2018.8500254","url":null,"abstract":"In this paper, a new feature extraction algorithm for speech recognition using sparse discrete wavelet decomposition (SDWD) is proposed. The recognition system contains the following stages: speech data acquisition and preprocessing, speech signal decomposition using the SDWD, feature extraction, and artificial neural network (ANN) classifier. The task of the developed SDWD is to decompose speech signal into band signals based on on the Mel filter bank frequency specifications. Similar to the Mel frequency cepstral coefficient (MFCC) method, the logarithmic values of the filter bank energies are computed and then a discrete cosine transform (DCT) is applied to these logarithmic values to extract the feature. Our experimental results using the ANN classifier demonstrate that our proposed SDWD feature extraction algorithm outperforms over the MFCC and discrete wavelet packet transform (DWPT) algorithms.","PeriodicalId":188414,"journal":{"name":"2018 IEEE International Conference on Electro/Information Technology (EIT)","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132793608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}