{"title":"Tracking of the internal jugular vein in ultrasound images using optical flow","authors":"E. Karami, M. Shehata, Andrew J. Smith","doi":"10.1109/CCECE.2017.7946589","DOIUrl":"https://doi.org/10.1109/CCECE.2017.7946589","url":null,"abstract":"Detection of relative changes in circulating blood volume is important to guide resuscitation and manage variety of medical conditions including sepsis, trauma, dialysis and congestive heart failure. Recent studies have shown that estimates of circulating blood volume can be obtained from ultrasound imagery of the of the internal jugular vein (IJV). However, segmentation and tracking of the IJV is significantly influenced by speckle noise and shadowing which introduce uncertainty in the boundaries of the vessel. In this paper, we investigate the use of optical flow algorithms for segmentation and tracking of the IJV and show that the classical Lucas-Kanade (LK) algorithm provides the best performance among well-known flow tracking algorithms.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122977024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A ZigBee-based framework for approximating sensor range and bearing","authors":"Kyle Hevrdejs, J. Knoll, Md. Suruz Miah","doi":"10.1109/CCECE.2017.7946789","DOIUrl":"https://doi.org/10.1109/CCECE.2017.7946789","url":null,"abstract":"An open hardware framework for approximating range and bearing of radio frequency (RF) sensors is presented. The current work has an immediate application in solving the simultaneous localization and mapping problem which is one of the challenging problems in the field of robotics. In this work, a set of RF sensors utilizing the ZigBee protocol are placed in an indoor environment and a base RF sensor is mounted within a rotating parabolic reflector on a mobile robot. The proposed range and bearing approximation framework works in two cascaded phases. In the first phase, the base RF sensor sends an RF signal to all other RF sensors within its operating range. These RF sensors then respond to the base RF module where ZigBee packets are parsed to store raw data for approximating range. In the second phase, a stepper motor is employed to rotate the parabolic reflector and the base RF sensor mounted on the robot. These two phases continue until a full revolution of 360° has been achieved. The data is processed for approximating the bearing of each RF sensor with respect to the mobile robot's heading angle, as well as the distance (range) to the RF sensor at its associated bearing. The proposed hardware setup is validated through a set of experimental results gathered in an indoor environment.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126567175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bloom filter acceleration: A high level synthesis approach","authors":"Reem Khairy, M. Safar, M. El-Kharashi","doi":"10.1109/CCECE.2017.7946725","DOIUrl":"https://doi.org/10.1109/CCECE.2017.7946725","url":null,"abstract":"The Bloom filter is used in a wide range of applications as a preprocessing stage for input data matching; especially with application to large data sets. Accelerating the Bloom filter can improve the performance of such applications. This paper represents the first trial, to our knowledge, to accelerate the Bloom filter using high level synthesis. This approach introduces a portable solution, which can be integrated in many applications, taking the advantage of the Bloom filter scalability and high performance, as well as the high level synthesis power in designing complex systems. The proposed approach is illustrated in the acceleration of BLASTN, a fundamental algorithm in bioinformatics. Experimental results show a speedup of around 3× is achievable. We conclude that the high level synthesis seems to be an appealing approach to accelerate the Bloom filter to satisfy the high performance need of some time-critical applications.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"633 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116207406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimizing CO2 emissions of Photovoltaic Thermal model in North America","authors":"S. Shehadeh, H. Aly, M. El-Hawary","doi":"10.1109/CCECE.2017.7946737","DOIUrl":"https://doi.org/10.1109/CCECE.2017.7946737","url":null,"abstract":"In this paper, CO2 emission reduction of Photovoltaic Thermal model for residential load has been investigated and evaluated for four different PV coverage area cases of PVT (20%, 40%, 60% and 80%). The analysis is conducted by using a data set of weather conditions of a city in North America over one year.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115643018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Orozco-Tupacyupanqui, A. Peralta-Sevilla, H. Meana, M. Nakano-Miyatake
{"title":"Performance analysis of adaptive widely linear beamformers","authors":"W. Orozco-Tupacyupanqui, A. Peralta-Sevilla, H. Meana, M. Nakano-Miyatake","doi":"10.1109/CCECE.2017.7946673","DOIUrl":"https://doi.org/10.1109/CCECE.2017.7946673","url":null,"abstract":"In this paper, we consider the problem of enhancing the filtering capacity of single standard beamformers for real base-band signals. Unfortunately, the standard smart arrays are not able to effectively minimize the effects of the complex noise in the array. In order to solve this problem, we analyze a parallel adaptive beamforming system based on complex nonlinear adaptive filters. In this design, the smart array is used as a widely linear (WL) system in which the second order statistical information of the signals is exploited by using the covariance and pseudo-covariance matrices. The simulations results show this architecture has a lead filtering capability as well as an outstanding generation of the radiation patterns. Furthermore, this parallel hybrid array showed to have a better filtering capacity than the standard arrays LMS, NLMS and RLS. General equations for the optimal weight vector are derived for this augmented complex (AC) smart array or widely linear beamforming.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116597573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A content-based data masking technique for a built-in framework in Business Intelligence platform","authors":"Osama Ali, Abdelkader H. Ouda","doi":"10.1109/CCECE.2017.7946661","DOIUrl":"https://doi.org/10.1109/CCECE.2017.7946661","url":null,"abstract":"The implementation of a Business Intelligence (BI) platform in different types of organizations including healthcare, has become an important project. One common implementation is to extract sensitive data from production databases and then load them into an enterprise Data Warehouse (DW). However, the internal privacy breach that occurs when developers, researchers, and testers access the DW is a serious threat that should be taken into consideration.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133583620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A PIWM-FSK transmitter for implantable wireless neural recording microsystems","authors":"Sirous Farsiani, A. M. Sodagar","doi":"10.1109/CCECE.2017.7946782","DOIUrl":"https://doi.org/10.1109/CCECE.2017.7946782","url":null,"abstract":"In this paper, a wireless telemetry unit for implantable neural recording microsystems is presented, which is designed based on pulse interval and width modulation. Variable-time coding nature of this technique leads to a reduction in symbol length of the coded signal, which consequently results in doubling the maximum possible data rate of the transmitter (in comparison with traditional pulse width modulation based transceivers). This allows for the expansion of the capacity (number of channels) of the neural recording implant by almost a factor of two. Based on the proposed idea, a transmitter is designed in a 0.18-µm standard CMOS technology. According to simulation results, the transmitter works with a data rate of 18.7 Mb/s and consumes 1.9 mW of power from a 1.8-V power supply.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126977969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating the effect of arc perturbation on SIW cavity backed slot antenna","authors":"Elham Baghernia, M. R. Chaharmir, A. Sebak","doi":"10.1109/CCECE.2017.7946607","DOIUrl":"https://doi.org/10.1109/CCECE.2017.7946607","url":null,"abstract":"In this paper, the effect of using square cavity with two arc corners on a SIW cavity backed slot antenna is presented. The arc perturbation technique is used to separate the resonant frequencies of two degenerated modes in a square SIW cavity. The behavior of an individual SIW cavity with 2 different arc corners is discussed. The bandwidth improvement is achieved using an arc perturbation technique in the SIW square cavity compared to conventional SIW cavity backed slot antenna. The simulated results show the impedance bandwidth for reflection coefficient less than −10 dB, is 3%. Furthermore, the presented antenna exhibits good radiation performance of unidirectional pattern, high Gain and FTBR of 5.2 dBi and −27 dB, respectively. Moreover, the proposed antenna benefits from advantages, including compact size, light weight, easy fabrication with low cost and convenient integration with planar circuits.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133297077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative analysis of AES common modes of operation","authors":"Sultan Almuhammadi, I. Al-Hejri","doi":"10.1109/CCECE.2017.7946655","DOIUrl":"https://doi.org/10.1109/CCECE.2017.7946655","url":null,"abstract":"With the rapid increase of the Internet users, network security becomes very essential. Cryptography plays a major role in network security. However, cryptographic systems consume considerable amounts of resources, like memory, CPU time, encryption and decryption time. In this paper, we compared the most common block cipher modes of operation on AES according to the recommendations of the National Institute of Standards and Technology (NIST). The comparison is done in terms of encryption time, decryption time, and throughput with variable data packet sizes. The results of the comparison are summarized and our observations are highlighted to help making informative decision when choosing the mode of operations for different applications with symmetric-key ciphers.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133412037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMRP: Interference-aware multicast routing for Wireless Mesh Networks","authors":"B. Farmani, M. Jaseemuddin, O. Batarfi","doi":"10.1109/CCECE.2017.7946683","DOIUrl":"https://doi.org/10.1109/CCECE.2017.7946683","url":null,"abstract":"In this paper, we propose an interference-aware multicast routing scheme for a single-radio Wireless Mesh Networks carrying multiple multicast flows. We focus on multicast routing over WMNs with stationary nodes, such as community wireless networks. We present a new metric that is based on three components: Path Interference Cost (Ip), Broadcast Benefit Factor (BF), and Hop Count (HC). We proposed a formula to compute Link Interference Cost that is aggregated into Ip. The goal of our metric is to choose a join path to multicast tree for a new receiver node that causes lower intra-flow and inter-flow interferences. The benefit of the proposed metric is to improve flow throughput. We also proposed a route discovery scheme for discovering the join path, computing metric, and making route selection. We evaluated the performance of our scheme through simulation under variety of network conditions.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133941922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}