2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim)最新文献

筛选
英文 中文
Maximizing System Capacity Using Adaptive Coding and Modulation Techniques for Slowly Fading Channels 利用自适应编码和调制技术实现慢衰落信道的系统容量最大化
Faisal M. Alawwad, Y. A. Al-Zahrani, H. Behairy
{"title":"Maximizing System Capacity Using Adaptive Coding and Modulation Techniques for Slowly Fading Channels","authors":"Faisal M. Alawwad, Y. A. Al-Zahrani, H. Behairy","doi":"10.1109/UKSim.2017.45","DOIUrl":"https://doi.org/10.1109/UKSim.2017.45","url":null,"abstract":"In this paper, an adaptive coding and modulation (ACM) technique is introduced in an attempt to maximize the channel throughout. This technique suggests five different pairs of coding and modulation techniques, starting from low modulation orders and code rates going through higher values. Simulation over additive white Gaussian noise (AWGN) of the physical layer of the system is performed using M-phase shift keying (M-PSK) modulation and convolutional codes with soft Viterbi decoding algorithm. In addition, the channel throughput for each Modulation and coding pair is obtained using specific packet retransmission mechanism. An algorithm for adaptive coding and modulation is developed and the overall throughout of the adaptive system is determined with respect to the received Eb/No values.","PeriodicalId":309250,"journal":{"name":"2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124861990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modal Analysis: A Comparison between Finite Element Analysis (FEA) and Practical Laser Doppler Vibrometer (LDV) Testing 模态分析:有限元分析(FEA)与实用激光多普勒测振仪(LDV)测试的比较
L. Pagan, Kelvin Lake
{"title":"Modal Analysis: A Comparison between Finite Element Analysis (FEA) and Practical Laser Doppler Vibrometer (LDV) Testing","authors":"L. Pagan, Kelvin Lake","doi":"10.1109/UKSim.2017.27","DOIUrl":"https://doi.org/10.1109/UKSim.2017.27","url":null,"abstract":"Abstract — Natural frequencies and modal shapes simulated in FE (Finite Element) environments are not simple to validate with physical testing or calculous, especially when relating to complex shaped components. In this paper a Laser Doppler Vibrometer (LDV) system is utilized as an aid in validating the natural frequencies, modes and mode shapes computed from an FEA model of a motorcycle swing arm. The experimental errors observed help to illustrate the difficulty of replicating the correct boundary conditions when dealing with this sort of analysis, due to the fact that the FEA environment is usually ideal. In this case the analyzed component was supported with a very basic set-up; however, slight changes in test configurations and repeat multiple tests assisted in reducing experimental errors ensuring continuity in measurements and the exclusion of non-coherent values which were not relevant. A constant reference surface of the component was used in order to visualize the LDV computed modal shapes, even though the excitation point of the component was varied. This last combination was fundamental for validation.","PeriodicalId":309250,"journal":{"name":"2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123875745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Biometric Liveness Detection Using Trait Randomization Technique 利用特征随机化技术增强生物特征活力检测
Kenneth Okereafor, C. Onime, O. Osuagwu
{"title":"Enhancing Biometric Liveness Detection Using Trait Randomization Technique","authors":"Kenneth Okereafor, C. Onime, O. Osuagwu","doi":"10.1109/UKSim.2017.44","DOIUrl":"https://doi.org/10.1109/UKSim.2017.44","url":null,"abstract":"Biometric Authentication Systems (BAS) have several security benefits over traditional password and token authentication including an inherent difficulty to copy, clone and share or distribute authentication credentials (biometric traits). Spoofing or presentation attack remains a major weakness of biometric systems and tackling it at the trait level is still challenging with several different approaches and methods applied in existing systems. In this paper, we focus on the well-known approach of Suspicious Presentation Detection (SPD) and present the Multi-Modal Random Trait Biometric Liveness Detection System (MMRTBLDS) that further mitigates spoofing or presentations attacks using randomization and combination of several different SPD detection techniques across three different modalities during trait capture. We discuss the detection of life using five distinct properties each from finger, face and eye modalities and present results from a simulation that highlights the improved security based on an impostor’s inability to accurately predict the combination of trait liveness properties the system might prompt and test for during capture.","PeriodicalId":309250,"journal":{"name":"2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127381162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Thermal Infrared Face Recognition: A Review 热红外人脸识别技术综述
K. Kakkirala, S. Chalamala, Santosh Kumar Jami
{"title":"Thermal Infrared Face Recognition: A Review","authors":"K. Kakkirala, S. Chalamala, Santosh Kumar Jami","doi":"10.1109/UKSim.2017.38","DOIUrl":"https://doi.org/10.1109/UKSim.2017.38","url":null,"abstract":"Visible light face recognition has been well researched but still its performance is limited by varying illumination conditions. Illumination conditions are major source of the uncertainty in face recognition systems performance when it is used in outdoor setting. In order to augment the performance of visible light face recognition system's performance, infrared facial images as a new modality has been used in the literature. The other intriguing factor in using the infrared, especially thermal infrared imaging for facial recognition is the night time surveillance with little or no light to illuminate the faces. Thermal facial recognition is used in several covert military applications. The covert data acquisition has its own environmental constraints. The choice of infrared makes the system less dependent on external light sources and more robust with respect to incident angle and light variations. In this paper we focus on reviewing recent developments in thermal IR face recognition and suggest the approaches that could be useful in matching visible and thermal IR images.","PeriodicalId":309250,"journal":{"name":"2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126704370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Modeling Isolated Traffic Control Strategies in TraffSim 基于TraffSim的孤立交通控制策略建模
Manuel Lindorfer, Christian Backfrieder, C. Mecklenbräuker, G. Ostermayer
{"title":"Modeling Isolated Traffic Control Strategies in TraffSim","authors":"Manuel Lindorfer, Christian Backfrieder, C. Mecklenbräuker, G. Ostermayer","doi":"10.1109/UKSim.2017.12","DOIUrl":"https://doi.org/10.1109/UKSim.2017.12","url":null,"abstract":"Traffic signal controls have become an integral part of urban traffic management and operations and play a crucial role in both mitigating congestion and reducing or eliminating conflicts at intersections. Starting with the installation of the first traffic signal in London, England in the nineteenth century, signal control technology has evolved steadily. Nowadays, traffic signal controls are not only used to provide the right-of-way at intersections, but also to improve traffic efficiency by means of minimizing waiting times and optimizing traffic flow. In this paper we present recent efforts to introduce different types of traffic signal control for isolated intersections into the microscopic traffic simulator TraffSim. The developed traffic control model supports both time-based and actuated control strategies, and allows for a straightforward configuration of customized control logic. Furthermore, it provides the possibility to easily add new control strategies on demand, owing to a flexible data model. We demonstrate the applicability of selected control strategies by simulating a signalized four-way intersection under varying traffic flows.","PeriodicalId":309250,"journal":{"name":"2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122098631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A New Approach to Generation and Analysis of Gradient Methods Based on Relaxation Function 基于松弛函数的梯度法生成与分析新方法
Igor Chernorutskiy, P. Drobintsev, V. Kotlyarov, Nikita Voinov
{"title":"A New Approach to Generation and Analysis of Gradient Methods Based on Relaxation Function","authors":"Igor Chernorutskiy, P. Drobintsev, V. Kotlyarov, Nikita Voinov","doi":"10.1109/UKSim.2017.14","DOIUrl":"https://doi.org/10.1109/UKSim.2017.14","url":null,"abstract":"The goal of this article is to inform English-speaking computer mathematicians about some optimization technique results obtained in publications [1-3]. For the class of matrix gradient methods a new concept of relaxation function is suggested. This concept allows to evaluate an effectiveness of each gradient optimization procedure, and to synthesize new methods for special classes of non-convex optimization problems. According to suggested approach, it is possible to build relevant gradient method for any given relaxation function. The theorem of relaxation conditions for each matrix gradient method is proven. Based on the concept of relaxation functions it is given geometric interpretation of relaxation properties of gradient methods. According to this interpretation it is possible to build a relaxation area, and to evaluate the speed of objective function values decreasing. The analysis of classical matrix gradient schemes such as simple gradient method, Newton's methods, Levenberg-Marquardt method is given. It is shown that relaxation function and its geometric interpretation give almost full information about properties and capabilities of relevant gradient optimization methods.","PeriodicalId":309250,"journal":{"name":"2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128307265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Calibration of the Gordon-Loeb Models for the Probability of Security Breaches 安全漏洞概率的Gordon-Loeb模型的校正
M. Naldi, M. Flamini
{"title":"Calibration of the Gordon-Loeb Models for the Probability of Security Breaches","authors":"M. Naldi, M. Flamini","doi":"10.1109/UKSim.2017.18","DOIUrl":"https://doi.org/10.1109/UKSim.2017.18","url":null,"abstract":"Security breaches provoke increasingly high economic losses, requiring higher investment in security. The models by Gordon and Loeb are the most prominent tool employed to assess the impact of security investments on the probability of security breaches, but the estimation of their parameters remains an elusive issue. In this paper the impact of the investment productivity parameters in both Gordon- Loeb models is investigated, and a method is proposed for their estimation. The method employs a least-squares procedure and requires the amount of investments in security over period and the corresponding observed loss due to security breaches.","PeriodicalId":309250,"journal":{"name":"2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128816865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Adaptive Preemption of Traffic for Emergency Vehicles 应急车辆交通自适应抢占
V. Paruchuri
{"title":"Adaptive Preemption of Traffic for Emergency Vehicles","authors":"V. Paruchuri","doi":"10.1109/UKSim.2017.34","DOIUrl":"https://doi.org/10.1109/UKSim.2017.34","url":null,"abstract":"Minimizing travel time is critical for the successful operation of emergency vehicles. Preemption can significantly help emergency vehicles reach the intended destination faster. Majority of the current studies focus on minimizing and/or eliminating delays for EVs and do not consider the negative impacts of preemption on urban traffic. One primary negative impact is extended delays for non-EV traffic due to preemption that is addressed in this paper. We propose an Adaptive Preemption of Traffic (APT) system for Emergency Vehicles in an Intelligent Transportation System. We utilize the knowledge of current traffic conditions in the transportation system to adaptively preempt traffic at signals along the path of EVs so as to minimize, if not eliminate stopped delays for EVs while simultaneously minimizing the delays for non-emergency vehicles in the system. Through extensive simulation results, we show substantial reduction in delays for both EVs.","PeriodicalId":309250,"journal":{"name":"2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126382651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Optical Hard-Limiter for All-Optical Signal Processing 用于全光信号处理的光硬限幅器
S. Abdollahi, H. Al-Raweshidy, T. Owens, A. Ahmadinia
{"title":"An Optical Hard-Limiter for All-Optical Signal Processing","authors":"S. Abdollahi, H. Al-Raweshidy, T. Owens, A. Ahmadinia","doi":"10.1109/UKSim.2017.29","DOIUrl":"https://doi.org/10.1109/UKSim.2017.29","url":null,"abstract":"An optical hard limiter can be used for several applications in all optical signal processing, such as optical data converters, regenerators, attenuators, and comparators. In this paper an optical hard limiter is proposed based on using Highly NonLinear Fibre (HNLF) that can be used as a key component for all optical signal processing and data regeneration. Simulation results demonstrate that the optical hard limiter transfer function slope relates to the fibre nonlinearity, optical amplifier gain and the optical filter bandwidth.","PeriodicalId":309250,"journal":{"name":"2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131647814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Prototype Wireless Controller System Based on Raspberry Pi and Arduino for Engraving Machine 基于树莓派和Arduino的雕刻机无线控制器原型系统
Saif Aldeen Saad Obayes, Ibtesam R. K. Al-Saedi, F. Mohammed
{"title":"Prototype Wireless Controller System Based on Raspberry Pi and Arduino for Engraving Machine","authors":"Saif Aldeen Saad Obayes, Ibtesam R. K. Al-Saedi, F. Mohammed","doi":"10.1109/UKSim.2017.20","DOIUrl":"https://doi.org/10.1109/UKSim.2017.20","url":null,"abstract":"This paper aims to explore the theories and techniques behind procedures of wireless controller system for mini CNC milling machine. The developed controller enables the machine tool to be controlled based on wireless communication and NC data generated from CAD/CAM systems. Then, a computer vision component using a web camera is proposed for the NC machine tool monitoring. It is explained the position on the machining table. This newly designed wireless controller system can be widely used in electrical and medical industry for making small parts and engraving small features. Fabricated prototype wireless controller system was calibrated and tested under various self-testing procedures to meet industrial standard. Comprehensive cost analysis and profit estimation was conducted after completion of the prototype.","PeriodicalId":309250,"journal":{"name":"2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信