2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)最新文献

筛选
英文 中文
Development of SCADA Simulator using Omnet++ 利用omnet++开发SCADA模拟器
Zaman Ahmad, M. H. Durad
{"title":"Development of SCADA Simulator using Omnet++","authors":"Zaman Ahmad, M. H. Durad","doi":"10.1109/IBCAST.2019.8667158","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667158","url":null,"abstract":"Industrial control systems (ICS) are used to automate many industries like power generation, petroleum, manufacturing, traffic control etc. Increase in the use of IT (information technology) components in ICS introduces many new vulnerabilities. Security breach in ICS can cause serious damages and is threat to human life. Simulating Security threats and security controls for ICS can help to identify threats and mitigation in advance. This paper explain the construction of open source SCADA simulator which can be used for security testing. Building SCADA simulation using Omnet++ is discussed in detail. We also analyzed TCP Flood DDOS attack on power distribution system as case study.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134465411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparative Analysis of Various Hyperelastic Models for Neoprene Gasket at Ranging Strains 不同应变下氯丁橡胶垫片超弹性模型的对比分析
R. F. Latif, Nadeem Shafi Khan
{"title":"Comparative Analysis of Various Hyperelastic Models for Neoprene Gasket at Ranging Strains","authors":"R. F. Latif, Nadeem Shafi Khan","doi":"10.1109/IBCAST.2019.8667253","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667253","url":null,"abstract":"Leakages not only add to the cost, they are also a great threat to the safety of men, machines and the environment as well. Seals and gaskets have evolved as a perfect solution to the problem of leakages. Amongst the various types of gaskets, hyperelastic gaskets have long maintained their dominance in the industrial as well as domestic appliances because of their characteristic advantages. Hyperelasticity is defined for ideally elastic materials by constitutive models where the relations of stress and strain are derived from the strain energy density function denoted by ‘W’ - a scalar-valued quantity that gives the relationship of a material’s strain energy density to its rate of deformation. The constitutive models that explain hyperelasticity, include older Neo-Hookean, Generalized Rivlin and Mooney-Rivlin models as well as Blatz-Ko, Ogden and Arruda-Boyce models. All these models are expressed through different interpretations of W . The selection of the model to be used amongst the mentioned constitutive models depends upon the types of materials and geometric and loading profiles for effective prediction of behavior and results. An effort has been made to present a comparative analysis of 16 hyperelastic models, which are different variants of Mooney Rivlin, Ogden, Blatz-Ko, Yeoh, Gent, Polynomial and Arruda Boyce models. In this study, the above-mentioned hyperelastic models are applied to examine the behavior of a neoprene gasket under uniaxial tensile loading. The study is concluded with determining a hyperelastic constitutive model that predicts with reasonable exactness and safety margin when less or no experimental data is available for the neoprene gasket.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134041784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Capturing of Shock Wave in Ejector by Numerical Simulations 喷射器激波设计与捕获的数值模拟
A. Zaidi, E. Uddin
{"title":"Design and Capturing of Shock Wave in Ejector by Numerical Simulations","authors":"A. Zaidi, E. Uddin","doi":"10.1109/IBCAST.2019.8667160","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667160","url":null,"abstract":"Series of two convergent-divergent nozzles is called ejector; the first or primary nozzle accelerates high pressure primary fluid to low pressure and at supersonic speed. The low pressure developed at the end of primary nozzle entrains the fluid in the secondary nozzle. Eventually, these two fluid streams meet at constant area section resulting in a shock wave. Afterwards, diffuser increases the pressure to desired range. In this paper, numerical simulations are used for designing and shock capturing in ejector using R134a as a refrigerant. The flow analysis is done by Reynolds averaged Navier Stokes equation (RANS) using k-epsilon turbulence model. At first, simulations are done for each nozzle and later they are combined in case of ejector. In case of ejector, rapid fluctuations in pressure and magnitude of velocity showed that there are series of shock waves that result in increase in pressure in ejector. The pressure and Mach number contours explained the physics behind the suction and entrainment of secondary fluid in ejector.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Direct-Sequence Spread Spectrum with Variable Spreading Sequence for Jamming Immunity 具有可变扩频序列的直接序列扩频抗干扰
M. A. Munir, A. R. Maud
{"title":"Direct-Sequence Spread Spectrum with Variable Spreading Sequence for Jamming Immunity","authors":"M. A. Munir, A. R. Maud","doi":"10.1109/IBCAST.2019.8667119","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667119","url":null,"abstract":"Jamming attacks can limit the availability of wireless networks and can lead to significant re-transmissions and increased power consumption. Over the past decades DSSS has been utilized to consolidate jamming-resistant communication. Such a system is relatively immune to jamming interference when the spreading sequence is unknown to the jammer. However, the cyclostationary behavior of the spreading sequence can be exploited by the jammer to identify the spreading sequence and hence completely jam the system. In this paper, a DSSS system using variable spreading sequence is proposed. The proposed system uses a shared secret key with appropriate ciphers like AES for selection of variable spreading sequence. Each bit is spread by a different spreading sequence resulting in jamming immunity. In addition, the proposed system uses a coarse time and date based plaintext after regular intervals to achieve synchronization between transmitter and receiver. Simulation results show the synchronization and bit error rate performance of the proposed system in the presence of different types of jammers.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Iterative Guidance Scheme for Satellite Launch Vehicles 卫星运载火箭迭代制导方案
F. Ashraf, Ashmal Shafique, A. Shahzad
{"title":"Iterative Guidance Scheme for Satellite Launch Vehicles","authors":"F. Ashraf, Ashmal Shafique, A. Shahzad","doi":"10.1109/IBCAST.2019.8667124","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667124","url":null,"abstract":"The purpose of this paper is to implement and ascertain the optimality of the Iterative Guidance Algorithm for higher altitude orbits by comparing it with the Optimal Control Algorithm. The objective of SLV guidance is to ensure that the SLV injects the given payload into its orbit, as specified by its mission profile, that too in the presence of various kind of perturbations and other parametric variations which cannot be reliably anticipated or predicted before the launch. These parametric variations include propulsion system performance, launch day winds, weight and other atmospheric parameters like density and temperature uncertainties. This paper discusses the implementation of iterative algorithm in an exo-atmospheric phase to provide near optimal guidance in real-time. The guidance is carried out in an inertial 2-D reference frame and a closed loop simulation in which inputs are taken from the on-board navigation system; also the guidance is carried out in the last stage of the vehicle. In the algorithm, the equations of motion of the launch vehicle are first taken for a flat earth surface with the gravity field being uniform, then those equations are extended over a spherical earth model where gravity follows the inverse square law. The control vector is computed as a function of the state variables of the vehicle and the guidance commands are updated at the end of each guidance cycle using the current state variables. In order to check the optimality of the algorithm, the same problem is solved using the Optimal Control Theory and the results are compared. The optimal control problem is converted into a two-point boundary value problem using Pontryagin’s Minimum Principle. Both the algorithm’s are implemented on MATLAB/SIMULINK. Simulation results and the comparisons show that the iterative guidance approach gives highly accurate results and retains its optimal properties under any kind of perturbation. Hence, the iterative guidance scheme is a very reliable and effective method of guidance for a launch vehicle in real-time as the results indicate that the execution time that is required for a single guidance loop stays within the domain of real-time implementation.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of Simple TCP and F-TCP for Smooth Connectivity in Wireless Communication 简单TCP和F-TCP在无线通信中平滑连接的性能分析
Shahab-Ul-Islam, Mudassar Ali, A. Ishtiaq, Aasma Khan, Muhammad Hashir
{"title":"Performance Analysis of Simple TCP and F-TCP for Smooth Connectivity in Wireless Communication","authors":"Shahab-Ul-Islam, Mudassar Ali, A. Ishtiaq, Aasma Khan, Muhammad Hashir","doi":"10.1109/IBCAST.2019.8667196","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667196","url":null,"abstract":"In wireless communication many packets may be lost during handoff. In conventional wired networks Transmission Control Protocol (TCP) is used. But in case of wireless communication TCP needs to be modifies according to the environment because if a packet drops during communication it reduces the congestion window sizes excessively due to congestion. To overcome this problem many extension in TCP has been proposed. The purpose of this research is to analyze the performance of TCP and Freeze -TCP in the wireless environment. The simulation was done using Network Simulator-2 (NS-2) for both the TCP and Freeze-TCP for managing the mobility and handoffs and the result was compared according to the performance. The simulation is categorized in to two scenarios Varying Window Size, Varying Segment Size on the basis of window and segment sizes. Each scenario consist of three window sizes and three segment sizes. For each and every scenario the performance of TCP and Freeze-TCP are analyzed and compared. The result shows that for managing the handoffs in mobile wireless communication the F-TCP performs better than that of simple TCP.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126226127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining Mobile Security Concerns and their Solutions 挖掘移动安全问题及其解决方案
Zeeshan Anwar, Nazia Bibi, H. Afzal
{"title":"Mining Mobile Security Concerns and their Solutions","authors":"Zeeshan Anwar, Nazia Bibi, H. Afzal","doi":"10.1109/IBCAST.2019.8667251","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667251","url":null,"abstract":"Mobile devices are now an important part of our lives. In many respect mobile devices make our life easier and increases our working capabilities, but with the increased usage many security concerns are also introduced. Most of these concerns are related to mobile technologies like 3G, 4G etc., and security and privacy of users. In this study, we identified the eleven major security concerns associated with mobile devices that are reported in research literature and performed risk analysis on identified concerns to propose detection and mitigation strategy. Furthermore, we developed the corpus of research literature on mobile devices, security concerns to identify the most important security concerns by using word frequency. The concerns which are most discussed by the researchers are more important. Finally, based results of text mining, we proposed a framework to detect, mitigate and address the security concerns. For benchmarking, we evaluate the proposed framework with the results of various research papers and found that our framework is more effective as it is covering more dimensions of mobile security.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130339916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Public Perception Based Recommendation System for Cryptocurrency 基于公众感知的加密货币推荐系统
Shaista Bibi, Shahid Hussain, Muhammad Imran Faisal
{"title":"Public Perception Based Recommendation System for Cryptocurrency","authors":"Shaista Bibi, Shahid Hussain, Muhammad Imran Faisal","doi":"10.1109/IBCAST.2019.8667123","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667123","url":null,"abstract":"Cryptocurrency is one of the emerging online currency of the modern era. Big companies are investing in this technology. However, some established companies still hesitate to use it. According to them, it is a volatile trend which will fade up eventually. There is no such authority which will provide them feasibility information. So, investors can be helped by providing them feasibility information about locations for cryptocurrency investment around the world. This paper aims to provide the aforementioned information to the investors. The proposed methodology is based on Topic modeling along with public opinion mining about cryptocurrencies, blockchain network, bitcoin, litecoin, and ethereum. The crawled data for other cryptocurrencies are much insufficient, so that are excluded from the study. In the proposed methodology, the top locations where cryptocurrency is widely used are identified, then in that particular locations' users concerns along with their sentiment analyses are investigated. Top locations are identified such as Australia, Denmark, Netherlands, and the USA etc. Almost 83.7% tweets of Sweden show positive sentiment for cryptocurrency investment which ranks as the highest having friendly environment for cryptocurrency investment. Similarly, the UK shows the least positive perception of cryptocurrency and blockchain technology usage. Some of the noteworthy terms found are legitimacy, authorization rules, volatility, profit, investment, and fluctuations. Which describe the users’ concerns/ interests’ about cryptocurrency. Investors can focus on all these areas during business. These subtopics can help business experts to evolve their businesses’ and to make them more sustainable on the basis of public perception.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132194550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance Analysis of Multi-User Polar Coded CDMA system 多用户极化编码CDMA系统性能分析
Rida Tahir, S. Ejaz, Sobia Jangsher, Saqib Ali
{"title":"Performance Analysis of Multi-User Polar Coded CDMA system","authors":"Rida Tahir, S. Ejaz, Sobia Jangsher, Saqib Ali","doi":"10.1109/IBCAST.2019.8667181","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667181","url":null,"abstract":"It is a well-known fact that as the number of users increase in a CDMA system, the bit error rate (BER) performance drops drastically. To overcome, such problems, forward error correction codes come to aid and BER performance is significantly improved. Recently, polar codes have gained much attention in the research which approach theoretical Shannon’s limit after turbo and low density and parity check (LDPC) codes. To the best of our knowledge, this paper presents the use of state of-the-art Polar codes in conjunction with CDMA system for the first time. It is observed that the polar coded CDMA systems outperform convolutional coded CDMA by the margin of more than 4dB under identical conditions. Successive cancellation (SC) decoder is used at the receiver nodes which has low decoding complexity and thus reduces receiver’s complexity.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131662260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Synthesis and Characterization of ZnO-ZnS Nanoflowers for Enhanced Photocatalytic Performance : ZnS Decorated ZnO Nanoflowers 增强光催化性能的ZnO-ZnS纳米花的合成与表征:ZnS修饰ZnO纳米花
Talha Farooq Khan, Mohsin Muhyuddin, S. Husain, Muhammad Abdul Basit
{"title":"Synthesis and Characterization of ZnO-ZnS Nanoflowers for Enhanced Photocatalytic Performance : ZnS Decorated ZnO Nanoflowers","authors":"Talha Farooq Khan, Mohsin Muhyuddin, S. Husain, Muhammad Abdul Basit","doi":"10.1109/IBCAST.2019.8667220","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667220","url":null,"abstract":"Metal oxide nanomaterials exhibit high chemical and physical stability, non-toxic nature, and attractive biological properties, hence they are part of one of the most important classes of materials. Zinc oxide is a very commonly used semiconductor, having potential applications in optoelectronics, ultraviolet lasers and detectors, sensors, photovoltaic cells, photo-electrochemical cells and photocatalysts [1] – [5] . Most of these applications involve the ability of ZnO nanostructures to utilize light and effectively separate the photogenerated electrons and holes. Being a wide bandgap semiconductor (3.37 eV) [6] , ZnO is only able to harvest light in the ultraviolet (UV) region. In order to make sure that the visible light is also effectively utilized, the most common strategy is to functionalize the surface of ZnO with other semiconductors. For this reason, researchers have successfully functionalized the surface of ZnO nanostructures with narrow bandgap semiconductors such as CdS [7] , Cu 2 O [8] , CdSe [9] , CdTe [10] – [12] , etc. which act as sensitizer to absorb light with a greater spectrum range [13] . Similarly, ZnO has also been incorporated with wide bandgap semiconductors such as TiO 2 , SnO 2, and ZnS in order to improve utilization of ultraviolet (UV) spectrum of solar light. Fabrication of ZnO-TiO 2 architectures resulted in an increased light absorption, higher photo-induced current, and more effective charge separation [14] , [15] . Synthesis of ZnO coupled with SnO 2 produced unique luminescence properties and improved photocatalytic performance [16] – [18] .","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133053669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信