2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)最新文献

筛选
英文 中文
Design, simulation and implementation of a self-oscillating control circuit to drive series resonant inverter feeding a brazing induction furnace 一种驱动串联谐振逆变器给焊感应炉自振荡控制电路的设计、仿真与实现
Mohammad Hameed Khazaal, Isam M. Abdulbaqi, R. Thejel
{"title":"Design, simulation and implementation of a self-oscillating control circuit to drive series resonant inverter feeding a brazing induction furnace","authors":"Mohammad Hameed Khazaal, Isam M. Abdulbaqi, R. Thejel","doi":"10.1109/AIC-MITCSA.2016.7759932","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759932","url":null,"abstract":"This research deals with the design and simulation of induction furnace power source (inverter) using MATLAB package. This source designed to lock on the resonant frequency of the load by using self-oscillating technique, also it has the capability to control the power supplied to the load using phase shift pulse width modulation (PSPWM) technique. These characteristics used to overcome the load nonlinear behavior during the brazing process and to achieve soft switching of the inverter elements. Also, the inverter has the capability to operate with or without load (workpiece). The implemented prototype operates at a frequency range (50-100)kHz and 10kW was successfully used for brazing two copper workpieces.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125246259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A proposed identification method for multi-user chirp spread spectrum signals based on adaptive Neural-Fuzzy Inference System (ANFIS) 一种基于自适应神经模糊推理系统(ANFIS)的多用户啁啾扩频信号识别方法
S. Sadkhan, Ashwaq Q. Hameed, H. A. Hamed
{"title":"A proposed identification method for multi-user chirp spread spectrum signals based on adaptive Neural-Fuzzy Inference System (ANFIS)","authors":"S. Sadkhan, Ashwaq Q. Hameed, H. A. Hamed","doi":"10.1109/AIC-MITCSA.2016.7759940","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759940","url":null,"abstract":"Automatic identification of digitally modulated signal has to be able to identify the digitally modulated signal correctly and accurately. Importance of automatic identification of digitally modulated signals are rising increasingly. In this paper an advanced technique is presented, that automatically identifies the multi-user chirp modulated signals in Additive White Gaussian Noise (AWGN) channel. The proposed technique is implementing high order moments (fourth, sixth, and eighth) of detail coefficients of discrete wavelet transform (DWT) as a feature extraction set. Adaptive Neural-Fuzzy Inference System (ANFIS) is proposed as a classifier. The proposed identification procedure is capable of identifying multi-user chirp modulated signals with high accuracy at 0dB, 5dB, and 10dB Signal to Noise Ratio (SNR), over AWGN channel.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125244564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Using only two states of discrete HMM for high-speed face recognition 利用两种状态的离散HMM进行高速人脸识别
Hameed R. Farhan, Mahmuod H. Al-Muifraje, Thamir R. Saeed
{"title":"Using only two states of discrete HMM for high-speed face recognition","authors":"Hameed R. Farhan, Mahmuod H. Al-Muifraje, Thamir R. Saeed","doi":"10.1109/AIC-MITCSA.2016.7759939","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759939","url":null,"abstract":"This paper presents a simple and fast face recognition system based on two states of discrete Hidden Markov Model (HMM). The minimization in the number of states leads to high processing speed and less memory occupation. Median filter is applied to each image under process, where it is the most suitable filter used to eliminate the effect of noise on images, and thereby enhancing the performance of the system. The features are extracted from reduced size images using a combination of maximum variance and Singular Value Decomposition (SVD). More reduction in processing data is achieved by assigning a single value to each feature vector. This process greatly speeds up the training and classification steps, where a discrete type of left-to-right HMM is used in this work. Experimental results verify that the proposed work is superior to previous approaches of HMM face recognition, where it achieves 100% recognition rate, high speed, and extremely low memory usage.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125690969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Microcontroller — Controlled security door based on speech recognition 基于语音识别的单片机控制防盗门
Mohammed E. Safi, E. Abbas
{"title":"Microcontroller — Controlled security door based on speech recognition","authors":"Mohammed E. Safi, E. Abbas","doi":"10.1109/AIC-MITCSA.2016.7759909","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759909","url":null,"abstract":"This paper introduced an approach to design and implement a system to control opening of security door by means of the human voice to recognize the password. The aim of this paper is to recognize the speaker and the word to open the door to obtain more security by high recognition rate. This paper proposes Mel-Frequency Cepstral Coefficient (MFCC) technique as feature extraction combined with its first and second derivative including power computation of the speech frames that yields the total multi-dimensional of features, and classification or features matching using Dynamic Time Warping (DTW) which is a good method for computing the similarity between two sequences. The system was trained with three speakers each one have a private password and the test was conducted at twenty two different speakers. The recognition rate performance properly is 100 percent in the real time tests.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129007757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A helical-shaped slot microstrip band pass filter based on SIW technology for WLAN and Bluetooth applications 一种基于SIW技术的螺旋形槽微带带通滤波器,用于WLAN和蓝牙应用
Aya N. Alkhafaji, A. Salim
{"title":"A helical-shaped slot microstrip band pass filter based on SIW technology for WLAN and Bluetooth applications","authors":"Aya N. Alkhafaji, A. Salim","doi":"10.1109/AIC-MITCSA.2016.7759952","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759952","url":null,"abstract":"A new compact wideband Substrate Integrated Waveguide (SIW) band pass filter utilizing of a helical-shaped slot is presented. This filter is consisting of four slots such that each one occupies a corner. Construction and evaluation of the proposed model have been done using the EM simulator of microwave studio suite from computer simulation technology (CST). The overall size of filter is 10 mm × 10 mm using a substrate with relative permittivity of 6 and height of 0.254 mm. This filter is designed to meet compact size, good return loss and low insertion loss. The obtained results exhibit a return loss below -40 dB and insertion loss approaching to 0 dB over the passband with a -3 dB fractional bandwidth of about 70% centered at 2.4 GHz. The simplicity gained with this structure led to freely control the position of the pass band through doing simple alterations of the helical-slots dimensions. As a result, this make the proposed filter candidate for operating in wireless applications like wireless local area network (WLAN) and Bluetooth applications.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129801145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A multi-purpose watermarking scheme based on hybrid of lifting wavelet transform and Arnold transform 一种基于提升小波变换和阿诺德变换混合的多用途水印方案
N. Abbas, S. M. S. Ahmad, Abd Rahman Bin Ramli, S. Parveen
{"title":"A multi-purpose watermarking scheme based on hybrid of lifting wavelet transform and Arnold transform","authors":"N. Abbas, S. M. S. Ahmad, Abd Rahman Bin Ramli, S. Parveen","doi":"10.1109/AIC-MITCSA.2016.7759937","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759937","url":null,"abstract":"This paper introduces a new multi-purpose image watermarking algorithm which based on a hybrid of lifting wavelet transform (LWT) and Arnold transform for copyright protection and image authentication. In the proposed scheme, the original image is first decomposed by LWT into four subbands. Then the robust watermark which is a binary logo image is decomposed by Discrete Wavelet Transform (DWT) as such only the high frequency subband of the watermark are embedded in the low frequency subband of the original image. The fragile watermark is block wise self-generated from the original image and scrambled using Arnold transform which is later embedded in the spatial domain of the robust watermarked image. Self-generated fragile watermark supports self-authentication with high localization, whereas scrambling the fragile watermark increases the security of the algorithm. On the other hand, the lifting scheme approaches have almost one half the amounts of operations compared to the DWT based approaches. The overall system has been tested against various attacks and the results demonstrated that the robust watermark can be decoded successively under each attack. In addition, the proposed algorithm can detect any tampering attempts.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131169571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Security evaluation of cryptosystems used in cloud networks 云网络中使用的密码系统的安全性评估
S. Sadkhan, F. Abdulraheem
{"title":"Security evaluation of cryptosystems used in cloud networks","authors":"S. Sadkhan, F. Abdulraheem","doi":"10.1109/AIC-MITCSA.2016.7759955","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759955","url":null,"abstract":"Cloud networking is the next generation architecture of IT. Clouds are very complex architectures. They have a replicated thousands of times, and common functional units and can be reduced to simple primitives. many issues related to security were created by complexity of cloud networking as well as all aspects of Cloud networking. Data security is one of the most important issues. The Cloud usually has a one security architecture but has many customers with variety requests. There are new risks introduced by clouds, like multi-tenancy, virtualization and data outsourcing in additional to existing security risks related to Cloud service providers (CSPs) and cloud customers (CCs). information security and their conformity with cloud networking security challenges targeted by Several international and industrial standards. Since there is a continuous increase in the field of communication regarding advanced data, there is an increase in need for time and statistical overhead that is associated with the application of cryptographic. Parallelizing the computation of cryptographic algorithms on many-core computing platforms can be a promising approach to reduce the execution time and eventually the energy consumption of such algorithms. In this paper we will analyze and compare a some of cryptosystems security evaluation approaches worked in cloud networking environment and depended on variety parameters to explain these approaches and show how it work in the few last years with the great modifying in cloud and great data growing.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114777557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Internet of Things (IoT): Architecture and design 物联网(IoT):架构和设计
Ali A. Abed
{"title":"Internet of Things (IoT): Architecture and design","authors":"Ali A. Abed","doi":"10.1109/AIC-MITCSA.2016.7759958","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759958","url":null,"abstract":"IoT means making some of the things that we are using has the ability of Internet access (smart things). Anything that can be joined to it processing unit (microcontroller) and connected to the Internet is considered as things in the world of IoT. In IoT, the interconnected products should always be low-cost, so that we can flood the planet with IoT devices. The first step in building an IoT device is to figure out how it will communicate with the rest of the world. For example: A factory would need a large number of connected sensors and actuators scattered over a wide area. A wireless technology would be the best fit.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Minimizing energy consumption in wireless sensor networks using modified genetic algorithm and an energy balance filter 利用改进的遗传算法和能量平衡滤波器最小化无线传感器网络的能量消耗
Zainab T. Alisa, Hussein A. Nassrullah
{"title":"Minimizing energy consumption in wireless sensor networks using modified genetic algorithm and an energy balance filter","authors":"Zainab T. Alisa, Hussein A. Nassrullah","doi":"10.1109/AIC-MITCSA.2016.7759947","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759947","url":null,"abstract":"Clustering model in wireless sensor network is an efficient way to reduce the consumed power during the transmission of sensed data to the Base Station (BS). In this paper, an intelligent clustering protocol is proposed to minimize energy consumption and prolong network lifetime. The proposed protocol performs clustering with dynamic number of clusters depending on the nodes distribution and the field dimensions. The process of selecting the optimum number of clusters and electing the suitable cluster heads (CH) is done by using modified genetic algorithm. This work proposed a method to modify the genetic algorithm. The target of the genetic algorithm (fitness function) is to minimize the total energy consumed by all nodes in the round. Balancing the residual energy between the nodes is an important factor to prolong network lifetime. To ensure balancing in the sensors network, an energy filter was proposed to block low energy nodes from acting as cluster heads and select the remaining nodes as candidate CHs then the modified genetic system chooses the optimum CHs from the candidate CHs. The simulation results demonstrate that the proposed algorithm outperform the common clustering protocol in terms of network lifetime and energy consumption.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multi-layer feed forward neural network application in adaptive beamforming of smart antenna system 多层前馈神经网络在智能天线系统自适应波束形成中的应用
A. Sallomi, Sulaiman Ahmed
{"title":"Multi-layer feed forward neural network application in adaptive beamforming of smart antenna system","authors":"A. Sallomi, Sulaiman Ahmed","doi":"10.1109/AIC-MITCSA.2016.7759925","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759925","url":null,"abstract":"In this paper an artificial Feed Forward Neural Network (FFNN) is applied for smart antenna adaptive beamforming. The neural network is used to calculate the optimum weights of the uniform linear antenna array to steer the radiation pattern of the toward the desired users and make nulling in the direction of interference sources. Levenberg Marquardt (LM) algorithm and Resilient Backpropagation (Rprop) algorithm are used to train the FFNN. Five element uniform linear array is used with spacing between element equal to the half wavelength. The simulation results of FFNN training using LM and Rprop algorithms showed that the Neural Network (NN) trained by LM training algorithm gives better performance than Rprop training algorithm, since it considers the fastest backpropagation training algorithm but it takes more memory than other algorithms.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127674722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信