2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)最新文献

筛选
英文 中文
Backhaul and performance optimality of joint processing schemes over the cluster area 集群区域联合处理方案的回程和性能最优性
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010222
M. Kousha, F. Hashim
{"title":"Backhaul and performance optimality of joint processing schemes over the cluster area","authors":"M. Kousha, F. Hashim","doi":"10.1109/ISCAIE.2014.7010222","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010222","url":null,"abstract":"In this paper, four Joint Processing (JP) schemes have been discussed and evaluated for Dynamic Point Selection (DPS) as well as Joint Transmission (JT) over a cluster of evolved Node B (eNBs) using WINNER II channel model developed for LTE-A. The purpose of this study is developing a cooperative LTE scenario in a fixed cluster of 3 eNBs in order to evaluate and compare the performance of these schemes for both centralized and partial cooperation. It would give us a good insight about choosing the optimum scheme which provides desired performance while putting reasonable amount of burden on the backhaul of the system. Moreover, the location dependency of JP is proved over the cluster area. As a final goal, in real-world networks, exploiting a dynamic joint processing scheme selection strategy would lead to the best performance taking care of backhaul limits. It has been proved through Simulations that, centralized joint processing has better performance for both joint transmission and dynamic point selection in comparison with the partial joint processing. Also, Dynamic point selection schemes follow the performance trend of joint transmission with less performance and lower backhaul load.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122913082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0.5-V bulk-driven second-generation current conveyor 0.5 v体积驱动第二代电流输送机
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010233
M. Kumngern, F. Khateb
{"title":"0.5-V bulk-driven second-generation current conveyor","authors":"M. Kumngern, F. Khateb","doi":"10.1109/ISCAIE.2014.7010233","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010233","url":null,"abstract":"This paper presents a new bulk-driven second-generation current conveyor that is capable of ultra-low voltage signal processing applications. The proposed circuit operates under supply voltage of 0.5 V and also offers rail-to-rail input voltage swing. To confirm the operation of the proposed building active block, floating and grounded inductance simulations using the proposed circuits as active elements are presented. The performances of the proposed circuit are demonstrated using PSPICE simulators. The simulation result shows that the power consumption of the proposed circuit is only 4.7 μW.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124645627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of CAN-based 2-DOF SCARA robot performance under work control 工作控制下基于can的2-DOF SCARA机器人性能分析
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010231
A. A. Dahalan, A. R. Husain, M. Shah
{"title":"Analysis of CAN-based 2-DOF SCARA robot performance under work control","authors":"A. A. Dahalan, A. R. Husain, M. Shah","doi":"10.1109/ISCAIE.2014.7010231","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010231","url":null,"abstract":"Distributed control applications required a reliable network for information exchange. In this paper a networked control system of direct-drive 2-DOF SCARA Robot are developed based on Controller Area Network (CAN) where PD controller is adapted to form the closed loop system. The network system which consists of two sensor nodes, two actuator nodes and two controller nodes performs data exchange in CAN 2.0A data frames under various CAN speeds. The performance of the system under communication delay and data priority is analyzed. The simulation is performed by using Matiab/Simulink with TrueTime Toolbox. The result shows that the optimized system performance can be achieved under proper sampling time and CAN speed associated to the dynamic of the system.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130304833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and analysis of a two-stage CMOS op-amp using Silterra's 0.13 μm technology 采用Silterra的0.13 μm技术设计和分析两级CMOS运算放大器
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010209
Mohd Haidar Hamzah, A. B. Jambek, U. Hashim
{"title":"Design and analysis of a two-stage CMOS op-amp using Silterra's 0.13 μm technology","authors":"Mohd Haidar Hamzah, A. B. Jambek, U. Hashim","doi":"10.1109/ISCAIE.2014.7010209","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010209","url":null,"abstract":"This paper presents the design and analysis of a high-gain, low-power, two-stage CMOS operational amplifier (op-amp) for a sigma-delta ADC. Op-amp topologies, such as folded cascade, telescopic and two-stage, are discussed in this paper. The theoretical and topological analyses of each design are highlighted in detail, including the tradeoff among various parameters such as gain, noise, output swings and power consumption. The designs have been simulated using 0.13 μm CMOS technology from Silterra (Malaysia) with Cadence EDA tools. From the simulation results, the two-stage amplifier gives better performance compared to other topologies, especially in terms of gain, output swing, slew rate and CMRR. The circuit is able to achieve 85.93 dB gain, a 1.1 V output swing, a 44.29 V/μs slew rate and a CMRR of 61 dB with a power supply voltage of 1.2 V.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121411349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Danger theory based node replication attacks detection in mobile wireless sensor network 基于危险理论的移动无线传感器网络节点复制攻击检测
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010202
H. R. Shaukat, F. Hashim, A. Sali
{"title":"Danger theory based node replication attacks detection in mobile wireless sensor network","authors":"H. R. Shaukat, F. Hashim, A. Sali","doi":"10.1109/ISCAIE.2014.7010202","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010202","url":null,"abstract":"Mobile wireless sensor networks (MWSNs) are commonly deployed in a harsh climate, notably unattended without any tamper-resistant tools; thereby an attacker can easily capture the sensor nodes in a very limited time. Once captured, the attacker can duplicate the sensor and subsequently deploys numerous clone nodes into the network in minimum time duration. This new breed of attack is called node replication attack, and while several solutions have been proposed to address such a security threat, they are mainly centralized and somewhat limited to static WSN. In this paper, we propose a hybrid (centralized and distributed) node replication attack detection method for MWSN, which operates based on Danger Theory in human immune system. As depicted in Danger Theory, the proposed method consists of two main security approaches, namely attack detection and security control. These approaches perform a multi-level detection, which is not only responsible to identify but also to verify the existence of clone nodes in the network. Performance evaluation demonstrates the efficiency (in terms of true and false positives) of the proposed detection method in detecting clone nodes in MWSN environment.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130050607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design of configurable, network based interconnection modules for communication centric System-on-Chip applications 为以通信为中心的片上系统应用设计可配置的、基于网络的互连模块
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010212
P. Mishra, A. Nidhi, J. Kishore, Chetan Kotturshettar
{"title":"Design of configurable, network based interconnection modules for communication centric System-on-Chip applications","authors":"P. Mishra, A. Nidhi, J. Kishore, Chetan Kotturshettar","doi":"10.1109/ISCAIE.2014.7010212","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010212","url":null,"abstract":"In recent years, System-on-Chip design architectures have increasingly become communication centric. To support such designs, a configurable and scalable interconnect backbone is required. Intellectual Property cores for on chip communication, provided by major field programmable gate array vendors are limited to shared bus or point to point interconnect protocols. To provide network oriented interconnect fabric, we propose a configurable and scalable, network based interconnect module. The interconnections can be configured to four popular on-chip network topologies: mesh, torus, ring and fat-tree. A parameterized and customizable wormhole router is designed, with variable number of ports and link width to support the four networks. A hardware simulator has been designed for in-situ testing of the interconnect module. Two state of art implementation platforms viz Virtex-6 Field programmable gate array and a full custom implementation using 32nm CMOS process has been used to characterize the module. We report area and power dissipation of the module configured to the four topologies, in the two platforms.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126280332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SUAS: Scalable user authentication scheme for secure accessing to cloud-based environments SUAS:用于安全访问基于云的环境的可扩展用户身份验证方案
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010205
Faraz Fatemi Moghaddam, Rama Roshan Ravan, T. Khodadadi, Yashar Javadianasl, Abbasali Halalzadeh
{"title":"SUAS: Scalable user authentication scheme for secure accessing to cloud-based environments","authors":"Faraz Fatemi Moghaddam, Rama Roshan Ravan, T. Khodadadi, Yashar Javadianasl, Abbasali Halalzadeh","doi":"10.1109/ISCAIE.2014.7010205","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010205","url":null,"abstract":"Cloud computing is an emerging technology that uses the concepts of virtualization, storage, and sharing to store and share resources between users and enterprises. This newfound technology is still unclear to many security problems and one of the most challenging issues in these environments is the reliability of the user authentication process. Therefore, this paper offers an efficient and scalable user authentication scheme for cloud-based environments. The proposed model uses the concepts of agents, cryptography, and key exchanging to enhance and improve the performance of the user authentication and the rate of scalability in cloud-based environments respectively. For achieving to this purpose, the proposed model has been presented based on three main agents: first user authentication agent, second user authentication agent and key manager agent. These agents have divided the process of user authentication and managing keys into several parts to improve the rate of efficiency in this process. Furthermore, the suggested model tries to resist against possible attacks. SUAS, as the suggested model was introduced and simulated in this paper for evaluating the performance and security of the scheme. In overall, the results show that the proposed model has considerable advantages for using in cloud-based environment to increase the salacity, reliability and efficiency of cloud computing models as an emerging technology.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114284965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments GD2SA:用于安全访问云计算环境的地理检测和数字签名授权
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010206
Faraz Fatemi Moghaddam, Shirin Dabbaghi Varnosfaderani, Soroush Mobedi, Iman Ghavam, R. Khaleghparast
{"title":"GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments","authors":"Faraz Fatemi Moghaddam, Shirin Dabbaghi Varnosfaderani, Soroush Mobedi, Iman Ghavam, R. Khaleghparast","doi":"10.1109/ISCAIE.2014.7010206","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010206","url":null,"abstract":"Cloud computing is a new paradigm and emerged technology for hosting and delivering resources over a network such as internet by using concepts of virtualization, processing power and storage. However, many challenging issues are still unclear in cloud-based environments and decrease the rate of reliability and efficiency for service providers and users. User Authentication is one of the most challenging issues in cloud-based environments and according to this issue this paper proposes an efficient user authentication model that involves both of defined phases during registration and accessing processes. Geo Detection and Digital Signature Authorization (GD2SA) is a user authentication tool for provisional access permission in cloud computing environments. The main aim of GD2SA is to compare the location of an un-registered device with the location of the user by using his belonging devices (e.g. smart phone). In addition, this authentication algorithm uses the digital signature of account owner to verify the identity of applicant. This model has been evaluated in this paper according to three main parameters: efficiency, scalability, and security. In overall, the theoretical analysis of the proposed model showed that it can increase the rate of efficiency and reliability in cloud computing as an emerging technology.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114555274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Time delay estimation for strain imaging using the phase of the complex envelope of RF signal 基于射频信号复包络相位的应变成像时延估计
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010223
Safayat Bin Hakim, Kazi Khairul Islam
{"title":"Time delay estimation for strain imaging using the phase of the complex envelope of RF signal","authors":"Safayat Bin Hakim, Kazi Khairul Islam","doi":"10.1109/ISCAIE.2014.7010223","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010223","url":null,"abstract":"Time Delay Estimation is a basic technique used for locating and tracking radiating acoustic source. TDE process is common for studying signal-to-noise ratio, input signals and systems that are common in process industry. The delay estimate is acquired using the generalized cross-correlation function applied between the original and the time-lagged filtered version of the received signal. In recent years ultrasound elastography proved as a successful alternative of the invasive biopsy. The fundamental necessity lies in estimating the strain for which time delay estimation is a pre-requisite step. Taking the phase of the complex envelope of the pre and post compression RF echo signals it is possible to successfully compute the time delay between them. The ultimate target of an Elastographic process is the noiseless Elastogram which is used to identify the suspected nodules embedded into the deep of tissue column. In this paper the strain information acquired from the phase of complex envelope and the same is used to analyze the quality of Elastograms studying mainly two parameters strain and sampling frequency.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and speed estimation of a faulty 3-phase induction motor by using extended Kalman filter 基于扩展卡尔曼滤波的三相异步电动机故障建模与转速估计
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010213
M. Jannati, S. Asgari, A. Monadi, N. R. N. Idr, M. J. Aziz, D. Dehghani, A. Faudzi
{"title":"Modeling and speed estimation of a faulty 3-phase induction motor by using extended Kalman filter","authors":"M. Jannati, S. Asgari, A. Monadi, N. R. N. Idr, M. J. Aziz, D. Dehghani, A. Faudzi","doi":"10.1109/ISCAIE.2014.7010213","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010213","url":null,"abstract":"This paper presents a modeling technique for a faulty 3-phase Induction Motor (3-phase Induction Motor IM under open-phase fault). The developed model has the same structure of equations as the balanced 3-phase model. It is shown that the model can be utilized to estimate the speed of a faulty IM based on an Extended Kalman Filter (EKF) estimation technique, which was developed for a balanced 3-phase IM. Simulation and experimental results are presented to show the validity of the proposed techniques.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115245857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信