2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)最新文献

筛选
英文 中文
Single input adaptive 50 Hz noise canceller from ECG signal 单输入自适应50hz心电信号降噪
Bashar S. Mohamad-Ali
{"title":"Single input adaptive 50 Hz noise canceller from ECG signal","authors":"Bashar S. Mohamad-Ali","doi":"10.1109/ICECCPCE.2013.6998736","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998736","url":null,"abstract":"Detected bioelectrical signals are usually contaminated with background noise such as mains supply frequency (50Hz), due to the electrically powered surroundings, and the parasitic currents flowing through the patient's body and the connecting cables. Many Authors have suggested an adaptive filters to suppress the 50Hz noise, but with applying the 50Hz as a reference signal together with the contaminated electrocardiogram (ECG) signal to the adaptive filter. This paper suggests a single input adaptive noise canceling (SIANC) scheme in which the adaptive filter has only one input namely the contaminated ECG signal. Using MATLAB simulink, it was possible to show that, in adaptive noise canceling, a reference input was not always necessary to be applied as a second input to the filter. After the application of the proposed scheme a difference of 64 dB was obtained between the 50Hz noise component and the maximum component of ECG.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127260355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving AntNet algorithm in routing protocols to find the optimal path according to time 改进路由协议中的AntNet算法,根据时间寻找最优路径
M. Kashmola, Noor Rafeh Hamza Al-Kadow
{"title":"Improving AntNet algorithm in routing protocols to find the optimal path according to time","authors":"M. Kashmola, Noor Rafeh Hamza Al-Kadow","doi":"10.1109/ICECCPCE.2013.6998738","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998738","url":null,"abstract":"In this study a new algorithm called Improved AntNet has been proposed and applied to enhance the AntNet algorithm by reducing the probability of selecting the optimal path whenever its goodness had decreased and giving a chance to select other paths, as the algorithm observe the traffic dynamic on each link in the network and specify the probability of selecting it according to its goodness. In this way the proposed algorithm solve the stagnation problem. Two models of network have been implemented using OPNET Modeler software, the proposed algorithm has been implemented on these networks and simulated with different traffic patterns. The proposed algorithm performance has been compared with performance of AntNet algorithm and the protocol OSPF. Simulation results showed that the proposed algorithm performance was better in terms of End-to-end Delay, and distributing links utilizations.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130797889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gun detection and classification based on feature extraction from a new sensor array imaging system 基于特征提取的新型传感器阵列成像系统火炮检测与分类
A. Al-qubaa, A. Al-Shiha, G. Tian
{"title":"Gun detection and classification based on feature extraction from a new sensor array imaging system","authors":"A. Al-qubaa, A. Al-Shiha, G. Tian","doi":"10.1109/ICECCPCE.2013.6998740","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998740","url":null,"abstract":"Electromagnetic imaging currently occupies a vital role in various disciplines from engineering to medical applications. These roles are based upon the fundamentals of Electromagnetic (EM) fields and their relationship with the material properties under evaluation. A new system based on a Giant Magneto-Resistive (GMR) sensor array was built to capture the scattered EM signal returned by metallic objects. This paper evaluates the capabilities of the new system based on features extracted from objects response to EM fields. A novel amplitude variation feature is proposed to obtain high classification rates. The selected features of metallic objects are applied to detect and classify `threat' items. A collection of handguns with other commonly used metallic objects are tested. Promising results show that the new system can detect and identify the threat items. This novel procedure has the potential to produce significant improvements in automatic weapon detection and classification.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129577818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An analytical study for security evaluation of cryptosystems used in cloud networking 云网络中密码系统安全评估的分析研究
Sattar B. Sadkan, F. Abdulraheem
{"title":"An analytical study for security evaluation of cryptosystems used in cloud networking","authors":"Sattar B. Sadkan, F. Abdulraheem","doi":"10.1109/ICECCPCE.2013.6998753","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998753","url":null,"abstract":"Cloud networking describes a new model for IT services depending on Internet protocols. It contains provisioning of dynamically scalable usually and often virtualized resources. The cloud computing (Networking) Environments have many applicable cryptosystems, like symmetric (Stream Ciphers, Block ciphers - AES), and asymmetric cryptosystems (RSA, Knapsack, ECC) and others like Homomorphic, Identity Based Encryption, Biometric based cryptography. Simultaneously, there are many evaluation approaches existing for evaluation of any chosen crypto system used in cloud, but there is no unique evaluation method for these Cloud Crypto Systems. This paper provides analytical study to evaluate the performance of certain cryptographic systems used in cloud networking environments, these are Symmetric Searchable Encryption (SSE), Asymmetric Searchable Encryption (ASE), Elliptic Curve Crypto (ECC) system, AES algorithm, Homomorphic Encryption, and Identity Based Encryption. An evaluation table is constructed to display the effective parameters included in each cryptography system from which an evaluation equation is deduced to estimate the location of the system performance from reliable margin.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127795357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Synthesis of wide beam array patterns using random phase weights 利用随机相位权值合成宽波束阵列方向图
Khalil H. Sayidmarie, Qusai H. Sultan
{"title":"Synthesis of wide beam array patterns using random phase weights","authors":"Khalil H. Sayidmarie, Qusai H. Sultan","doi":"10.1109/ICECCPCE.2013.6998734","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998734","url":null,"abstract":"Synthesis of wide beam array antennas is investigated using phase-only excitations for uniform amplitude array. In this approach random phase distribution is proposed. Symmetrical and asymmetrical distributions of the random phase are considered. The obtained patterns are assessed by comparing beam width and maximum level of the radiated field with those obtainable from the conventional broadside array. The obtained results showed many fold increase in the -10 dB beam width, and a reduction of up to 8.5 dB in the maximum level of the pattern as compared to the case of broadside array. The proposed technique offers a simple method to synthesize arrays of wide beam, where only (N/2-1), and (N-1)/2 for even, and odd number of elements N respectively are required for an N-element array.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130100242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Key note lecture - Microprocessors evolution 重点演讲-微处理器的发展
Basial S. Mahmmod
{"title":"Key note lecture - Microprocessors evolution","authors":"Basial S. Mahmmod","doi":"10.1109/ICECCPCE.2013.6998772","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998772","url":null,"abstract":"Summary form only given. The Lecture Provides a breief Knowledge about the Microprocessor Evolution, taking into considerations the Microprocessor history, and different types of microprocessors and parallel processing aspect. Aso a brief introduction to data movement instructions. With the history of Microprocessor the lecture stops with the followings: INTEL 4004; INTEL 4040; INTEL 8008; INTEL 8080; INTEL 8085; INTEL 8086; INTEL 8088; INTEL 80186 & 80188; INTEL 80286; INTEL 80386; INTEL 80486; INTEL PENTIUM; INTEL PENTIUM PRO; INTEL PENTIUM II; INTEL PENTIUM II XEON; INTEL PENTIUM III; INTEL PENTIUM IV; INTEL DUAL CORE ; INTEL CORE 2; INTEL CORE I7; INTEL CORE I5; and INTEL CORE I3. With the Microprocessor Architecture; the lecture explain: Non-Pipelined Processors(Intel 4004, Intel 8080, Intel 8085, Motorola 6800, Z80 ), Pipelined Processors (Intel 8086, Intel 80386, Pentium Processors, DSP, Network Processors, Graphics Processors) Harvard Architecture, RISC Processors, Multithread Processors. Multicore Processors. Multiengine Processors. Also the lecture give an information about the types of Microprocessors: General Purpose Processors (Pentium Processors, Motorola 68040, AMD Processors, etc. ). Graphics Processors (GeForce Series, Tesla Series, ATI Radeon Series). Network Processors. Digital Signal Processors (DSP) (TMS320VC5402). Input /Output Processors, Arithmetic Coprocessors. Microcontrollers, and Parallel Processors. Finally the lecture stop on the Microprocessor Applications with :Starts from Washing Machine to missile guidance, to intelligent robot. Scientific Applications. Health Care Applications. Welfare Applications. (Home, Cars, Airplanes, Traffic). Communication Application. Artificial Intelligence. Industrial Applications. Administration and Management And many more.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126749591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient joint carrier offset and channel estimator for T-OFDM system T-OFDM系统的有效载波偏移和信道联合估计
M. S. Ahmed, S. Al-Iesawi
{"title":"Efficient joint carrier offset and channel estimator for T-OFDM system","authors":"M. S. Ahmed, S. Al-Iesawi","doi":"10.1109/ICECCPCE.2013.6998762","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998762","url":null,"abstract":"The high sensitivity of multicarriers systems to the channel estimation errors, transceiver oscillators mismatch and/or Doppler effect has received a considerable attention in the recent studies. In this work, a new two semi-blind and data-aided techniques are proposed to achieve an accurate carrier frequency offset (CFO) and flat fading channel estimation in the orthogonal frequency division multiplexing (OFDM) based T-transform (T-OFDM) system. The semi-blind is utilised only two trial values to achieve joint CFO and channel estimation. Also, a new data-aided CFO estimator over the additive white Gaussian noise is proposed. The two proposed techniques are based on a low computational complexity T-transform, which was developed formally to combine the Walsh-Hadamard transform and inverse discrete Fourier transform into a single unitary transform. The unique butterfly structure of the T-transform can be exploited in the semi-blind joint CFO and channel estimator by utilizing only two trial samples from the T-OFDM symbol. This technique is able to estimate the CFO mismatch and the flat fading channel varying in every transmitted frame. The main advantages of the proposed techniques over the existing schemes are lower computational complexity, lower data rate losses, and an accurate estimation for the fine CFO and the coefficients of the flat fading channels.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129487484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Block cipher security evaluation based on fuzzy logic 基于模糊逻辑的分组密码安全性评价
S. A. Mohammed, S. Sadkhan
{"title":"Block cipher security evaluation based on fuzzy logic","authors":"S. A. Mohammed, S. Sadkhan","doi":"10.1109/ICECCPCE.2013.6998756","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998756","url":null,"abstract":"The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security contributes directly to increase level of trust between users by providing an assurance of confidentiality, integrity, and availability of sensitive information of the network. In this paper, evaluations analysis of RC5, Blowfish and DES block cipher algorithms have been done on the basis of block size, numbers of round, and key size of evaluation modeling based on fuzzy logic tool of MATLAB 2012a. Three metrics are considered for using crypto algorithms for wireless network security. These three algorithms have a variable block size, number of rounds and a variable key size in their structure. Performances of RC5, Blowfish and DES algorithms have been evaluated on variables range of metrics of key size, number of rounds, and block size in this paper. Presents the results of evaluation for security level of crypto have shown the security level depending on the structure of algorithm.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123555524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
FPGA implementation of modified fractional wavelet transforms 改进分数阶小波变换的FPGA实现
J. Abdul-Jabbar, Sara W. Abboodi
{"title":"FPGA implementation of modified fractional wavelet transforms","authors":"J. Abdul-Jabbar, Sara W. Abboodi","doi":"10.1109/ICECCPCE.2013.6998741","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998741","url":null,"abstract":"Source coding of robust communication and network transmission of images usually needs the applications of wavelet-based algorithms. Although wireless multimedia sensors are widely used to deliver multimedia content due to the availability of inexpensive CMOS cameras, their computational and memory resources are still typically very limited. It is known that allowing a low-cost camera sensor node with limited RAM size to perform a multi-level wavelet transform, will in turn limit the size of the acquired image. Recently, fractional wavelet filters technique became an interesting solution to reduce communication burden and wireless bandwidth, for resource-constrained devices. Classical fractional wavelet transforms can achieve much reduction in the required memory at the expense of the reconstructed image quality. In this paper, two new modified fractional wavelet transforms are proposed to reduce boundaries artifacts caused by the previous fractional wavelets. In the first proposed technique, the average of the last and the first rows and the average of the row before the last one and the second row of any two successive fractions are obtained and, respectively located at the same rows of the same fractions. In the second proposed technique, the average of the last and the first rows of any two successive fractions is obtained and then, respectively located at the same rows of the same fractions. The resulting reconstructed images of the later technique highlight the promising performance of its applications on different types of images with different sizes using Haar and bio 5/3 wavelet filters. FPGA implementations of such techniques indicate that the later one is also superior.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114416164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing FPGA based VGA system to display the component of synthesized electrical circuits using embedded design techniqus 采用嵌入式设计技术,设计了基于FPGA的VGA系统来显示合成电路的元件
M. R. Khalil, S. Ali
{"title":"Designing FPGA based VGA system to display the component of synthesized electrical circuits using embedded design techniqus","authors":"M. R. Khalil, S. Ali","doi":"10.1109/ICECCPCE.2013.6998747","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998747","url":null,"abstract":"Synthesis techniques of passive or active circuits require a media to display the inferred form of the realized filters and their components. The work forwards anew methodology to draw the form of the synthesized filter on screen connected to a soft-core processor system. VGA controller IP core is added to a processor system using embedded design techniques. The processor system is programmed to analyze the transfer function of the filters, infer its form with components and draw the resultant circuit on the screen. Spartan 3E FPGA slice is used in the work.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123159180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信