2017 IEEE National Aerospace and Electronics Conference (NAECON)最新文献

筛选
英文 中文
Medical applications of conformai flexible antennas 保形柔性天线的医疗应用
2017 IEEE National Aerospace and Electronics Conference (NAECON) Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268776
A. Ferendeci
{"title":"Medical applications of conformai flexible antennas","authors":"A. Ferendeci","doi":"10.1109/NAECON.2017.8268776","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268776","url":null,"abstract":"Flexible conformai antennas are developed for medical applications. The overall antenna thicknesses are thin and processed on flexible substrates. In addition to normal metallic antennas, slotted versions are developed so that they can be more flexible and cover wider frequency ranges. Various antenna configurations such as Composite Right/Left-Handed (CRLH), fractal, elongated circular and logarithmic spiral antennas were processed. Possible applications are listed.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"79 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129792695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The use of automated theorem proving for error analysis and removal in safety critical embedded system specifications 在安全关键嵌入式系统规范中使用自动化定理证明进行错误分析和消除
2017 IEEE National Aerospace and Electronics Conference (NAECON) Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268802
Jonathan Lockhart, C. Purdy, P. Wilsey
{"title":"The use of automated theorem proving for error analysis and removal in safety critical embedded system specifications","authors":"Jonathan Lockhart, C. Purdy, P. Wilsey","doi":"10.1109/NAECON.2017.8268802","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268802","url":null,"abstract":"As embedded systems increase in complexity, more and more functionality is being migrated to software. Much of the migrated software is critical to the well-being of the system and users. Thus, methods to produce high quality software are needed. Software development today focuses on taking requirements and producing software as fast as possible. Traditional methods have been augmented or replaced with new, agile methods (like SCRUM) designed to produce bits of code as quickly and cheaply as possible. Unfortunately many of these methods ignore standard testing procedures and rely on reported errors to drive corrections in future releases. Traditional methods require exhaustive testing to eliminate a majority of errors. Both processes are time intensive and in the long run cost the project more to correct errors. This paper demonstrates that errors in requirements and design can be discovered and eliminated prior to implementation with the use of automated theorem provers for formal methods. This illustration is key to saving time and costs in the software development life cycle.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132638835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Electricity theft concerns within advanced energy technologies 先进能源技术中的窃电问题
2017 IEEE National Aerospace and Electronics Conference (NAECON) Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268784
Trevor J. Bihl, Salam Hajjar
{"title":"Electricity theft concerns within advanced energy technologies","authors":"Trevor J. Bihl, Salam Hajjar","doi":"10.1109/NAECON.2017.8268784","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268784","url":null,"abstract":"Developments in ambient energy and radio frequency (RF) energy harvesting have the potential to provide in situ power for sensor systems; however, they also have the potential to illicitly collect generated energy. Additionally, new methods of electricity theft have appeared with the introduction of smart grid components. This paper provides an understanding of electricity theft as it relates to advanced energy applications, e.g. energy harvesting and the smart grid. A discussion is also provided of the interdisciplinary, ethical and education issues of electricity theft as it relates to these domains.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130950884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhancing FPGA security through Trojan resilient IP creation 通过木马弹性IP创建增强FPGA安全性
2017 IEEE National Aerospace and Electronics Conference (NAECON) Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268803
Noor Ahmad Hazari, M. Niamat
{"title":"Enhancing FPGA security through Trojan resilient IP creation","authors":"Noor Ahmad Hazari, M. Niamat","doi":"10.1109/NAECON.2017.8268803","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268803","url":null,"abstract":"In recent years FPGAs have become vulnerable to hardware Trojan attacks due to their increased use in different applications like defense, automotive, image processing, etc. Among several types of hardware Trojan attacks in FPGAs, one of them is implanting hardware Trojans using the bitstream modification. These types of hardware Trojans exploit the empty resources in FPGA by modifying the original design by bitstream modification. In this paper, Trojan Resilient IP is created by adding original design with the dummy logic design in order to provide security and trust for FPGA-based designs. Covering the unused resources with dummy logic design incurs power and delay overhead for FPGA design when the dummy logic circuit is in operation. This paper also addresses the power and delay overhead for Trojan Resilient IP Creation using different ISACS'89 benchmark circuits.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115551652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A signal processing and data analysis technique for accurate extraction and estimation of FTIR signal aberrations in microsphere-lens-enhanced MWIR photo detectors via system transfer functions mathematical modeling 基于系统传递函数数学建模的微球透镜增强MWIR光电探测器中FTIR信号像差的精确提取和估计的信号处理和数据分析技术
2017 IEEE National Aerospace and Electronics Conference (NAECON) Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268768
D. Megherbi, J. DiZoglio, P. Mack, M. I. Vakil, N. Limberopoulos, A. Urbas
{"title":"A signal processing and data analysis technique for accurate extraction and estimation of FTIR signal aberrations in microsphere-lens-enhanced MWIR photo detectors via system transfer functions mathematical modeling","authors":"D. Megherbi, J. DiZoglio, P. Mack, M. I. Vakil, N. Limberopoulos, A. Urbas","doi":"10.1109/NAECON.2017.8268768","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268768","url":null,"abstract":"In this paper we focus on using signal processing techniques and mathematically-derived photo-detector models, with or without microsphere-lens-enhancement, to analyze, characterize and estimate the effect of integrated aberrations on microsphere-lens-enhanced single photo-detector sensitivity. One of the difficulties here relates to the noisy nature of detector FTIR experimental signals in the MWIR band. We show how modeling of the detector spectral response signal, combined with signal boundary-absorption partial replacement, is successfully effective in estimating integrated detector system aberrations. With the detector FTIR spectral data, considered, our findings show that (a) not all four microsphere materials, considered in this work, namely, Sapphire, SLG (Soda, Lime Glass), PS (Polystyrene) and BTG (Barium Titanate Glass) necessarily result in detector sensitivity increase at all MWIR wavelengths. The PS-microsphere-lens-enhanced detector sensitivity turns out to be less than that of the detector without enhancement in the 2700–3200 wavenumber band. This is due to the fact at this band the PS material exhibits additional significant spectral absorptions. (b) there seems to exist some global detector integrated aberrations introduced by factors such as the microsphere lens material and misalignment, silicone-or-rubber adhesive materiel, photo-detector system and others, that we globally extracted/estimated using the detector experimental FTIR spectral responses and their corresponding generated detector mathematical models. (c) comparison of single detector raw experimental spectral responses (with and without microsphere-lenses of different sizes and material types) to their respective resulting models, shows realistic synthesized detector FTIR data models. With the help of theses resulting detector FTIR response models, we are able to confirm our findings that, relatively independently of the increase in the sensitivity, the microsphere lens significantly decreases the sphere-enhanced-detector Noise to Signal Ratio (NSR), including in spectral bands of high absorption, noise, and aberration. That is, based on the data considered, (1) the resulting microsphere-enhanced photo-detector is generally less sensitive to noise in the MWIR than the mesa and (2) this, seemingly is so, independently of the detector sensitivity increase, for example, due to the microsphere size of a certain material type.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121136880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implementation of a customized encryption algorithm for authentication and secure communication between devices 设计和实现一种自定义的加密算法,用于设备之间的认证和安全通信
2017 IEEE National Aerospace and Electronics Conference (NAECON) Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268781
Bhavana Daddala, Hong Wang, A. Javaid
{"title":"Design and implementation of a customized encryption algorithm for authentication and secure communication between devices","authors":"Bhavana Daddala, Hong Wang, A. Javaid","doi":"10.1109/NAECON.2017.8268781","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268781","url":null,"abstract":"In the current world, encryption plays a significant role in securing relevant information from attackers. The applications of such protocols fall under numerous categories ranging from internet banking to Internet of Things (IoT). Many standards and developed encryption protocols are available as resources and are used based on the requirements. If the attacker has access to shared keys between devices, it doesn't take long to decrypt the information by using any of the standard encryption algorithms. Therefore, there is a necessity to build strong and complex encryption algorithms. In this paper, we propose a customized encryption algorithm and an authentication scheme to safely transfer information. This algorithm is a variation of Advanced Encryption Standard (AES) and devises a new protocol for key establishment. The implementation of communication protocol between two devices, with a prospect of working with multiple devices using a centralized server is presented. The outcome is to establish a different approach towards encryption and enhance security by providing protection against Man-in-the-Middle attacks. The customized algorithms are implemented using Python.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122946953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
OPIR video preprocessing and compression for on-board aerospace computing 面向机载航天计算的OPIR视频预处理与压缩
2017 IEEE National Aerospace and Electronics Conference (NAECON) Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268759
Eric Shea, Alan D. George
{"title":"OPIR video preprocessing and compression for on-board aerospace computing","authors":"Eric Shea, Alan D. George","doi":"10.1109/NAECON.2017.8268759","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268759","url":null,"abstract":"Increasing bit-depth of new image sensors presents many challenges on resource-limited, on-board processors in aerospace. This paper provides new results, analysis, and insight with our novel methods for preprocessing with compression of an Overhead Persistent InfraRed (OPIR) image sensor on embedded processors including Xilinx Zynq-7020 and Amlogic S905.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The response to arbitrarily bandlimited Gaussian noise of the complex stretch processor using certain range-sidelobe-reduction windows 利用一定的距离旁瓣减小窗口研究了复杂拉伸处理器对任意带限高斯噪声的响应
2017 IEEE National Aerospace and Electronics Conference (NAECON) Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268779
John N. Spitzmiller
{"title":"The response to arbitrarily bandlimited Gaussian noise of the complex stretch processor using certain range-sidelobe-reduction windows","authors":"John N. Spitzmiller","doi":"10.1109/NAECON.2017.8268779","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268779","url":null,"abstract":"This paper derives the response of the complex stretch processor to bandlimited Gaussian noise having arbitrary center frequency and bandwidth. The complex stretch processor uses a range-sidelobe-reduction window with a specific but common mathematical form. The paper then identifies three jamming-related applications of the derived characterization. Digital simulation results for the three identified jamming applications, assuming the complex stretch processor uses a Hamming or Hann window, verify the derivation's correctness.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127854604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robust multi-view pedestrian tracking using neural networks 基于神经网络的鲁棒多视角行人跟踪
2017 IEEE National Aerospace and Electronics Conference (NAECON) Pub Date : 2017-04-21 DOI: 10.1109/NAECON.2017.8268718
Md. Zahangir Alom, T. Taha
{"title":"Robust multi-view pedestrian tracking using neural networks","authors":"Md. Zahangir Alom, T. Taha","doi":"10.1109/NAECON.2017.8268718","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268718","url":null,"abstract":"In this paper, we present a real-time robust multi-view pedestrian detection and tracking system for video using neural networks which can be used in dynamic environments. The proposed system consists of two phases: multi-view pedestrian detection and tracking. First, pedestrian detection utilizes background subtraction to segment the foreground objects. An adaptive background subtraction method where each of the pixel of input image models as a mixture of Gaussians and uses an on-line approximation to update the model applies to extract the foreground region. The Gaussian distributions are then evaluated to determine which are most likely to result from a background process. This method produces a steady, real-time tracker in indoor and outdoor environment that consistently deals with changes of lighting condition, and long-term scene change. Second, the tracking is performed at two steps: pedestrian classification and tracking of the individual subject. A sliding window technique is used on foreground binary image which uses for determining the input target patches from input frame. The neural networks is applied for classification with PHOG features of the target patches. Finally, a Kalman filter is applied to calculate the subsequent step for tracking that aims at finding the exact position of pedestrians in an input video frames. The experimental result shows that the proposed approach yields promising performance on multi-view pedestrian detection and tracking on different benchmark datasets.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信