2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)最新文献

筛选
英文 中文
Access point localization using autonomous mobile robot 基于自主移动机器人的接入点定位
F. Awad, Ammar Omar, Muhammad Naserllah, Alaa Abu-Hantash, Abrar Al-Taj
{"title":"Access point localization using autonomous mobile robot","authors":"F. Awad, Ammar Omar, Muhammad Naserllah, Alaa Abu-Hantash, Abrar Al-Taj","doi":"10.1109/AEECT.2017.8257754","DOIUrl":"https://doi.org/10.1109/AEECT.2017.8257754","url":null,"abstract":"Identifying the location of an access point, whether it is legitimate or rogue, is an important research problem due to the wide range of applications that can solve critical security threats or enable a better and more efficient installation of access points within the service area. Though most suggested solutions have proven their efficiency using mathematical modeling and computer simulation, this paper presents a simple and efficient practical approach to identify the location of an access point in an indoor environment using an autonomous mobile robot. The proposed approach is based on taking a relatively small number of the access point's received signal strength samples at known locations. The experimental performance evaluation verified that the proposed approach can identify the location of the access point accurately and efficiently. Comparative analysis demonstrated that the proposed approach outperforms similar existing approaches in both time and accuracy.","PeriodicalId":286127,"journal":{"name":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117215281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and simulation of enhanced 64-bit Vedic multiplier 增强型64位吠陀乘法器的设计与仿真
Syed Zohaib Hassan Naqvi
{"title":"Design and simulation of enhanced 64-bit Vedic multiplier","authors":"Syed Zohaib Hassan Naqvi","doi":"10.1109/AEECT.2017.8257751","DOIUrl":"https://doi.org/10.1109/AEECT.2017.8257751","url":null,"abstract":"Immense growth in technology and ever-increasing computational complexities in image and signal processing algorithms requires robust and efficient hardware software co-design methodologies. Multiplication operation forms the core of such extensively used techniques like correlation, convolution filtering etc. and it is one of the major contributing factors for deteriorating the system performance in terms of latency and throughput. This paper presents a design and implementation framework of enhanced multiplier based on prehistoric “Indian Vedic mathematics sutras”. Presented architecture is based on Vedic multiplication. The computation of partial multiplication is performed in parallel manner and further added to generate the result. In this work, a module of single carry save adder for performance enhancement replaces multiple adders. The partial multiplication terms are accustomed by concatenation. The Proposed design is simulated and implemented using Xilinx ISE Design Suit 14.5. Comparative analysis demonstrates that our proposed architecture for multiplication produce better results even for higher bits in terms of speed.","PeriodicalId":286127,"journal":{"name":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"658 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127543357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Indoor Wi-Fi tracking system using fingerprinting and Kalman filter 使用指纹识别和卡尔曼滤波的室内Wi-Fi跟踪系统
B. Mohd, Ibtehal Amro, A. Alhasani
{"title":"Indoor Wi-Fi tracking system using fingerprinting and Kalman filter","authors":"B. Mohd, Ibtehal Amro, A. Alhasani","doi":"10.1109/AEECT.2017.8257770","DOIUrl":"https://doi.org/10.1109/AEECT.2017.8257770","url":null,"abstract":"Indoor tracking system is an important application to locate and track individuals and objects inside structures. Such systems are very helpful for visitors in campuses and large buildings, e.g. universities, hospitals and shopping malls. In this paper, we present and discuss the design of an Indoor Wi-Fi tracking system. One key advantage of the system is that it employs existing Wireless Local Area Network (WLAN) infrastructure. Using WLAN is attractive because it reduce the total cost of the overall system. The system consists of a mobile device running Android operating system and Wi-Fi Access Points (APs). For tracking and locating, the system applies K-Nearest Neighbor (KNN) based Wi-Fi fingerprinting method. To mitigate computation overheard, the system is partitioned to perform light weight computations at mobile device and execute heavy computations at server side. Several challenges addressed including AP accuracy handled by using stable APs and applying Kalman filter to reduce the signal fluctuation. Using Kalman filter improved the accuracy to 86% within 2m range of error.","PeriodicalId":286127,"journal":{"name":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125083245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Energy harvesting with cooperative networks and adaptive transmission 基于协同网络和自适应传输的能量收集
A. Andrawes, R. Nordin, M. Ismail
{"title":"Energy harvesting with cooperative networks and adaptive transmission","authors":"A. Andrawes, R. Nordin, M. Ismail","doi":"10.1109/AEECT.2017.8257749","DOIUrl":"https://doi.org/10.1109/AEECT.2017.8257749","url":null,"abstract":"Cooperative relaying and adaptive modulation are the most widespread techniques used to meet the main requirements of Fourth Generation (4G) systems and potential Fifth Generation (5G) networks. This study primarily aims to compare the performance of adaptive modulation for the direct path, dual-hop relaying, cooperative relaying, and energy-harvesting relay, by computing the exact probability density function (PDF) of end-to-end signal to noise ratio (SNR). Energy harvesting relaying is optimized and compared with conventional cooperative relaying. Results also shown the performance of next green cooperative systems compared with conventional cooperative relaying ones. The simulation demonstrates that using green cooperative systems degrades spectral efficiency by only 5%.","PeriodicalId":286127,"journal":{"name":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116153175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Preventing identity theft using biometrics based authentication system 利用基于生物特征的认证系统防止身份盗窃
Lamjed Zahrouni, D. Blackwood, Syed Rizvi, Joseph Gualdoni, Muder Almiani
{"title":"Preventing identity theft using biometrics based authentication system","authors":"Lamjed Zahrouni, D. Blackwood, Syed Rizvi, Joseph Gualdoni, Muder Almiani","doi":"10.1109/AEECT.2017.8257767","DOIUrl":"https://doi.org/10.1109/AEECT.2017.8257767","url":null,"abstract":"Identity Theft is a growing problem in this modern world due to the continued reliance on computers and technology. It continues to grow everyday as technology advances. The best way to stop Identity Theft is for the users to be aware of dangerous activities that can increase their chances of having their identity stolen. Today, most identity theft protection businesses simply offer identity prevention programs as security measure. However, such preventive measures do not help stop the problem since they usually act after the Identity is stolen and an attempt of using it happened. In this paper we are offering an Identity theft protection system based on the use of the biometric Identifications of the users. Banks and credit card companies could use the proposed protection system. Our primary research goal is to create a software which could also be used as an app for a user's mobile devices that acts as an additional “door” to the bank accounts, this will allow users to control how much money can be spent at one time, where it can be spent, and even what stores it can be spent at. To show the practicality of our proposed scheme, we present a case study that covers multiple threat scenarios, attackers' goals and motives, and our security defense.","PeriodicalId":286127,"journal":{"name":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"17 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123035420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A spectral clustering approach to determine the relationship between technology use and academic performance 光谱聚类方法,以确定技术使用和学业成绩之间的关系
Nazir S. Hawi, Maya Samaha
{"title":"A spectral clustering approach to determine the relationship between technology use and academic performance","authors":"Nazir S. Hawi, Maya Samaha","doi":"10.1109/AEECT.2017.8257774","DOIUrl":"https://doi.org/10.1109/AEECT.2017.8257774","url":null,"abstract":"A worldwide concern has been escalating due to uninformed users on proper usage of technologies. In particular, researchers from various disciplines are more and more concerned about the impact of excessive screen time on children as it is becoming a major and real concern for parents and educators. In this study, spectral clustering is used to identify groups of third grade children of similar behavior in relation to screen time and academic performance. Indeed, two distinctive clusters have emerged from the data. One cluster grouped students with high screen time and low academic grade, whereas the second cluster grouped students with low screen time and high academic grade. The results should help in establishing guidelines for the amount of screen time in relation to the academic performance, a problem that is facing our developing world.","PeriodicalId":286127,"journal":{"name":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximum allowable delay bound estimation using Lambert W function 用Lambert W函数估计最大允许延迟界
Asma Alfergani, A. Khalil, Zakariya Rajab, Mohammad Zuheir, A. Asheibi, Sheroz Khan
{"title":"Maximum allowable delay bound estimation using Lambert W function","authors":"Asma Alfergani, A. Khalil, Zakariya Rajab, Mohammad Zuheir, A. Asheibi, Sheroz Khan","doi":"10.1109/AEECT.2017.8257755","DOIUrl":"https://doi.org/10.1109/AEECT.2017.8257755","url":null,"abstract":"The widespread of communication networks make them very promising to play a great role in future control systems. The communication networks will be present in the feedback control system which makes it a kind of time delay system. Closing the feedback system through a communication network introduces many challenges for the controller designers. Communication networks induce inherent time delay and some of the data may be lost which can destabilize the control system or result in poor system performance. It is important to identify the maximum time delay that the control system can withstand. In this paper, we report the application of the Lambert W function for calculating the maximum allowable delay bound in linear time delay control systems. The results of the calculation are compared with the most widely used Linear Matrix Inequalities based method.","PeriodicalId":286127,"journal":{"name":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129507741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Microstrip antenna for radiation pattern reconfigurability 用于辐射方向图可重构的微带天线
Shumo'a Hamdan, Amani Nofal, Rawda Al Nawaiseh, Yanal S. Faouri
{"title":"Microstrip antenna for radiation pattern reconfigurability","authors":"Shumo'a Hamdan, Amani Nofal, Rawda Al Nawaiseh, Yanal S. Faouri","doi":"10.1109/AEECT.2017.8257750","DOIUrl":"https://doi.org/10.1109/AEECT.2017.8257750","url":null,"abstract":"A microstrip patch Antenna with different radiation patterns reconfigurability is proposed. The antenna operates at a resonant frequency of 2.4 GHz and consists of two layers of Rogers TMM4 with a relative permittivity of 4.5 and loss tangent of 0.002. The substrate size is 100 × 116 mm2 and the height of each substrate is 1.524 mm. The results investigate the scattering parameter S11 and the radiation patterns due to different combinations of the operating diodes that are biased. The antenna could switch between three different pattern shapes with different beam orientation and power levels and achieve a maximum gain of 6.9 dB.","PeriodicalId":286127,"journal":{"name":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129316432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Developing a secondary mobile network in the Palestinian GSM band using cognitive radio 利用认知无线电在巴勒斯坦GSM频段开发二级移动网络
A. Abdou, Osama Najajri, Ali Jamoos
{"title":"Developing a secondary mobile network in the Palestinian GSM band using cognitive radio","authors":"A. Abdou, Osama Najajri, Ali Jamoos","doi":"10.1109/AEECT.2017.8257748","DOIUrl":"https://doi.org/10.1109/AEECT.2017.8257748","url":null,"abstract":"In this paper, we study the feasibility of implementing a secondary overlay cognitive radio (CR) network in the primary Palestinian global system for mobile communications (GSM) 900MHz band. In particular, the existing second generation (2G) GSM mobile system is considered as the primary system (PS) whereas a fourth generation (4G) mobile system based on orthogonal frequency division multiplexing (OFDM) is suggested as an overlay secondary system (SS). The interference expression due to the SS at the PS receiver and the interference expression due to the PS at the SS receiver are firstly derived. Then, to eliminate these interferences, a pre-coding technique based on zero forcing beamforming (ZFBF) is inserted at the SS transmitter, while a post-coding is introduced at the SS receiver. To illustrate the performance of the proposed CR system, a comparative simulation study is carried-out with existing CR based on OFDM system for both the PS and SS. It is confirmed that the proposed CR system can utilize the available spectrum efficiently and limit interference levels, and consequently can improve system capacity.","PeriodicalId":286127,"journal":{"name":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123230117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance evaluation of stand alone WECS three phase diode clamped inverter based on level shifted carriers PWM techniques 基于电平移载波PWM技术的独立WECS三相二极管箝位逆变器性能评价
Anas Baayou, A. Sultan, A. Hammoda, Adel Ibrahem
{"title":"Performance evaluation of stand alone WECS three phase diode clamped inverter based on level shifted carriers PWM techniques","authors":"Anas Baayou, A. Sultan, A. Hammoda, Adel Ibrahem","doi":"10.1109/AEECT.2017.8257777","DOIUrl":"https://doi.org/10.1109/AEECT.2017.8257777","url":null,"abstract":"Wind energy conversion systems (WECS) are one of the fastest growing renewable energy technologies throughout world. Part of that expansion is taking a place in the power electronic converters used in different models of WECS. This paper will focus on multilevel inverters which are the most critical power electronic converters in wind energy systems, high and mixed switching frequency techniques were practically applied on a three phase five level diode clamped inverter and the outcome results were close to the simulation results using MATLAB Simulink model. A comparison between different modulation techniques based on the total harmonic distortion (THD) in the output voltage. Additionally, resistive and inductive loading tests were performed in order to evaluate the inverter response under different circumstances.","PeriodicalId":286127,"journal":{"name":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124541218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信