2015 Tenth International Conference on Computer Engineering & Systems (ICCES)最新文献

筛选
英文 中文
Constrained Kalman filter based detection and isolation of sensor faults in a wind turbine 基于约束卡尔曼滤波的风力发电机传感器故障检测与隔离
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393020
Essam Nabil, Abdel-Azem Sobaih, B. Abou-Zalam
{"title":"Constrained Kalman filter based detection and isolation of sensor faults in a wind turbine","authors":"Essam Nabil, Abdel-Azem Sobaih, B. Abou-Zalam","doi":"10.1109/ICCES.2015.7393020","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393020","url":null,"abstract":"Reliability, Survivability, Cost efficiency and high performance are required for modern wind turbines to be competitive within the energy market. In this paper, a viable model-based fault detection and isolation (FDI) technique is designed to detect different sensor fault scenarios of the benchmark model of horizontal-axis standard modern wind turbines. A model-based fault detection and isolation (FDI) technique is developed with deeper insight into the process behavior by using a set of constrained Kalman filters, and then estimating the effectiveness factor for the faulty sensor in the presence of system disturbances and random noise. The effectiveness of the proposed scheme has justified by simulation result on a 4.8 MW, variable-speed, variable-pitch wind turbine model.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124503120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MRC and selection combining in dual-hop AF systems with Rician fading 具有梯度衰落的双跳AF系统的MRC和选择组合
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393066
Samy S. Soliman
{"title":"MRC and selection combining in dual-hop AF systems with Rician fading","authors":"Samy S. Soliman","doi":"10.1109/ICCES.2015.7393066","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393066","url":null,"abstract":"Maximum ratio combining (MRC) and selection combining (SC) are studied for multi-branch dual-hop amplify-and-forward relaying systems. Expressions for the statistical metrics, such as the probability density function, cumulative distribution function and the moment generating function are obtained for systems operating over independent but non-identically distributed Rician fading links. Such systems can be used to model heterogeneous indoor environments where a number of relay nodes are available for line-of-sight cooperative communications. Performance metrics, such as the average error probabilities and outage probabilities, are evaluated for the systems under study to investigate the effects of the link fading parameters as well as the number of available relays on system performance. It is shown that, while the diversity order of such combining systems does not depend on the line-of-sight parameter, it is proportional to the number of available relays, for MRC systems as well as for SC systems.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128601000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An attribute based classification of hardware trojans 基于属性的硬件木马分类
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393074
Samer Moein, Salman Khan, T. Gulliver, F. Gebali, M. El-Kharashi
{"title":"An attribute based classification of hardware trojans","authors":"Samer Moein, Salman Khan, T. Gulliver, F. Gebali, M. El-Kharashi","doi":"10.1109/ICCES.2015.7393074","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393074","url":null,"abstract":"This paper considers the classification of hardware trojans in semiconductor chips. The phases of the chip production life-cycle are reviewed and opportunities for trojan insertion are discussed. Trojans are classified using a comprehensive attribute taxonomy based on eight categories. A matrix describing the relationships between these attributes is defined which can be used to identify hardware trojans.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131160764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Quadrotor unmanned aerial vehicle controller design and synthesis 四旋翼无人机控制器设计与综合
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393019
M. Mahfouz, S. A. Kader
{"title":"Quadrotor unmanned aerial vehicle controller design and synthesis","authors":"M. Mahfouz, S. A. Kader","doi":"10.1109/ICCES.2015.7393019","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393019","url":null,"abstract":"The field of UAVs is quit rich of applications and it can be considered as one of the major fields that can have great future potential. For the four motors vertical take-off and landing (VTOL) aircraft known as the quadcopter specially. it have drawn great attention of the scientific researchers nowadays. It is considered as a prospective solution to a quit variety of applications. This paper is concerned with modeling and control basics that are of huge concern due to unmanned aerial vehicle model complications, nonlinearity, coupling, inherent instability and parameter values ambiguity. Two types of controllers are designed to reach a stable compensated system around the hovering point. Enhanced PID controller is designed first for the unmanned quadcopter aerial vehicle. Then, Adaptive Neuro Fuzzy Inference controller (ANFIS) is refined for the nonlinear system. Input-output data of the enhanced PID controlled among the entire range of operation are gathered. These informations are used for the ANFIS controller design as learning and checking data. The controller achieved using ANFIS, as a nonlinear controller, are correlated with the enhanced PID controller results achieved at the hovering point of operation. The conclusion from these results affirm the efficiency of the ANFIS as quadcopter nonlinear controller.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A comparison on VANET authentication schemes: Public Key vs. Symmetric Key VANET认证方案的比较:公钥与对称密钥
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393072
Safi Ibrahim, M. Hamdy
{"title":"A comparison on VANET authentication schemes: Public Key vs. Symmetric Key","authors":"Safi Ibrahim, M. Hamdy","doi":"10.1109/ICCES.2015.7393072","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393072","url":null,"abstract":"Vehicular Ad Hoc Networks (VANETs) is a type of Ad Hoc Networks in which mobile nodes are vehicles. VANET architecture consists of vehicles, Road Side Units (RSUs) and a Certificate Authority. RSUs are located at certain points on the road network similar to access points in wireless networks. Certificate Authority coordinates offering security services to the whole network scale. In VANETs, vehicles may communicate with each other Vehicle-to-Vehicle (V2V) mode, or with Infrastructure Vehicle-to-Infrastructure (V2I) mode. VANETs can provide safety, traffic related and entertainment applications. Exchanging safety (life-critical) messages requires message integrity, sender authentication and privacy for participants. In this paper, a comparison is held between Public key Schemes and Symmetric Key Schemes in supporting security for VANETs.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Energy efficient cooperation scheme for self-organized femtocells 自组织飞蜂窝的节能合作方案
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393067
M. M. Mohamed, F. Newagy, A. Zekry
{"title":"Energy efficient cooperation scheme for self-organized femtocells","authors":"M. M. Mohamed, F. Newagy, A. Zekry","doi":"10.1109/ICCES.2015.7393067","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393067","url":null,"abstract":"Cooperation among self-organized femtocells (SOFs) becomes an optimization technique to induce a fair resource allocation. However, cooperation performance is restricted by backhaul limitations. In this paper, an energy efficient system design for cooperative SOFs is proposed. A new spectral resource management is used to avoid the uplink co-tier interference depending on less signaling overhead resulting from cooperation organization among SOFs. A model is built to the cooperation among the SOFs for resource allocation with minimum backhaul signaling traffic. The simulation results show that the proposed model guarantees different radio blocks allocation for femto-users affected by the co-tier interference. In addition, the proposed model will reduce the traffic of the cooperation by 45% of that of the conventional model. Finally, the proposed model performance in terms of latency and power consumption for different backhaul technologies is simulated. It is found that the signaling power consumption can be reduced from 814w to 159w. Therefore, our proposed cooperation model can be considered energy efficient.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HMM based automatic Arabic sign language translator using Kinect 基于HMM的自动阿拉伯手语翻译使用Kinect
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393081
Omar Amin, Hazem Said, Ahmed E. Samy, H. K. Mohammed
{"title":"HMM based automatic Arabic sign language translator using Kinect","authors":"Omar Amin, Hazem Said, Ahmed E. Samy, H. K. Mohammed","doi":"10.1109/ICCES.2015.7393081","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393081","url":null,"abstract":"In this paper, a new Arabic sign language automatic translator is presented. The translator is based on Hidden Markov Models (HMM's). The features used in recognition are 3D information detected using Microsoft Kinect Sensor depth camera. The system was trained to recognize 40 signs from standard Arabic sign language. A go-stop scheme is presented to handle sequences of signs which construct sentences in real-time. The recognition success rate based on the new methodology is above 90 percent with real time performance on a PC.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129609631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhancing DCCP-TCP-like mechanism for Wireless Sensor Networks 无线传感器网络中DCCP-TCP-like机制的增强
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393052
Mai Ibrahim, Dina M. Ibrahim, A. Sarhan
{"title":"Enhancing DCCP-TCP-like mechanism for Wireless Sensor Networks","authors":"Mai Ibrahim, Dina M. Ibrahim, A. Sarhan","doi":"10.1109/ICCES.2015.7393052","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393052","url":null,"abstract":"Congestion is a significant problem that faces streaming media applications in Wireless Sensor Networks (WSN). This problem occurs when the sensor receives traffic that exceeds its maximum forwarding rate causing more packet loss, more delay and overall quality degradation. The Datagram Congestion Control Protocol (DCCP) is a congestion control protocol that works on the transport layer and is suitable for use by multimedia applications. DCCP supports many congestion control mechanisms that the application can choose among them according to the type of data being transmitted. In this paper, we propose an algorithm to enhance the performance of DCCP-TCP-like mechanism by adapting slow start threshold (ssthresh) and congestion window (cwnd) with respect to the reset function. The proposed algorithm is analyzed with respect to some important metrics like: packet loss, time delay and consumed energy using the NS-2 simulator. The simulation results indicate that the proposed algorithm can achieve better results than the native mechanisms. We found, during our experiments, that the initial values of ssthresh, cwnd and Retransmission Time Out (RTO) during the reset function have significant effect on the packet delivery ratio (or packet loss). So, determining these values is vital for the stability of the network.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114302633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New methodology for digital design properties extraction from simulation traces 从仿真轨迹中提取数字设计属性的新方法
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393026
M. Hanafy, H. Said, A. Wahba
{"title":"New methodology for digital design properties extraction from simulation traces","authors":"M. Hanafy, H. Said, A. Wahba","doi":"10.1109/ICCES.2015.7393026","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393026","url":null,"abstract":"This paper introduces a new methodology for digital design properties extraction from simulation traces. The innovated methodology is based on a new data mining technique guided with static analysis of the intended design. The mining engine of the proposed methodology is based on innovated Breadth-First Decision Tree (BF-DT) search algorithm. The data structure of each node in the decision tree is handled to well present sub-space of the input simulation traces data space. Besides, new features are added to BF-DT to enhance its performance in both output sequential assertions and time of search. A new static analysis technique is innovated to extract all the combinational and sequential data dependencies between the digital design signals. The mining engine is guided with these data dependencies to extract complete combinational and sequential design properties relating signals desired to extract properties for and their cone of interest signals. The contributed mining technique has been tested for bit-level designs with different sizes. The design properties generated from the mining engine completely match with all design properties covered in the input simulation traces. Plus, the generated properties are at the highest possible level of abstraction leading to the best coverage for the input data space. The simulation results show that the proposed methodology has proven superior efficiency in extracting bit-level assertions of digital design in a feasible time. The next challenge is to include word-level assertions as well.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124922653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Classification of hardware trojan detection techniques 分类硬件木马检测技术
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393075
Samer Moein, Jayaram Subramnian, T. Gulliver, F. Gebali, M. El-Kharashi
{"title":"Classification of hardware trojan detection techniques","authors":"Samer Moein, Jayaram Subramnian, T. Gulliver, F. Gebali, M. El-Kharashi","doi":"10.1109/ICCES.2015.7393075","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393075","url":null,"abstract":"The majority of techniques that have been developed to detect hardware trojans are based on only specific attributes. Further, the ad hoc approaches that have been employed to design methods for trojan detection are largely ineffective. These trojans have a number of attributes which can be used in a systematic way to develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques and the characteristics of existing hardware trojans is presented. This is used to develop a new approach to hardware trojan identification and classification.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121802397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信