R. Radzuan, M. Salleh, Mohd Azril Ab Raop, M. N. Seroji, M. K. Hamzah
{"title":"An optimization model of the input current for a variable input voltage in CMOS AC/DC converter","authors":"R. Radzuan, M. Salleh, Mohd Azril Ab Raop, M. N. Seroji, M. K. Hamzah","doi":"10.1109/ISCAIE.2014.7010220","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010220","url":null,"abstract":"An optimization model of the input current for a variable input voltage in CMOS AC/DC converter is proposed in order to achieve regulation control of an AC/DC converter. An input current model of CMOS converter is obtained by applying an average method in converter circuit over one's switching period. This model is implemented in Pspice circuit simulation tool to verify an averaged model of the input current. The results show that the input current exhibits an increasing response to input voltage variation from 0.3 to 1.5 V. The validity of the proposed steady-state model is verified by the given simulation results for a specified design of CMOS converter. A good agreement is obtained between steady-state model and simulation results.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A low computational method of secure video streaming in mobile system","authors":"M. Saleh, H. Hashim, N. Tahir","doi":"10.1109/ISCAIE.2014.7010236","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010236","url":null,"abstract":"Huge revolution in mobile systems opens the field toward exploit of video streaming, enabling broadcasting a real time video through the network, also live event can be seen from anywhere, the video data has to be compressed before transmitting, in addition to that, the encryption process is compulsory in order to secure a transmitted data stream. This leads to increase the resource consumption requirements such as computational overhead. Hence, in this paper, an overview of video streaming security in limited resources devices is presented, a new method for secure video streaming. In the proposed method, we will focus on: The data structure of video streaming, explaining the encryption and decryption process that performed in a video transmitting, and to exploit the structure of the H.264/AVC standard for encrypting a specific syntaxes. The method will be performed in two phases; (1) encoding video streaming and (2) decode video bitstream, in the first phase, the encryption for a specific part of encoded video data will be performed using AES algorithm, in the second phase, the encrypted syntaxes of the bitstream will be decrypted. By APPLYING this method; the technique for securing the video stream in a limited resource device will be enhanced, mitigate the effects of compression and encryption process on the computational overhead during real-time multimedia transmission. This method is capable to prevent attacks on video streaming data, as well as the compliance format between the encoder and decoder will be maintained.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125125527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"0.5-V bulk-driven fully differential current conveyor","authors":"M. Kumngern, F. Khateb","doi":"10.1109/ISCAIE.2014.7010234","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010234","url":null,"abstract":"This paper presents a new low-voltage supply and low-power consumption bulk-driven fully differential current conveyor (BD-FDCCII) which is suitable for low-voltage signal processing applications. The bulk-driven MOS technique is used to achieve a low-voltage supply as low as a 0.5V, also, a rail-to-rail input voltage swing. As an example application, a voltage-mode biquadratic filter using BD-FDCCII is presented. The proposed BD-FDCCII is simulated by PSPICE simulators using TSMC 0.18 μm n-well CMOS technology.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121169022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zeyid T. Ibraheem, Md. Mijanur Rahman, S. Yaakob, M. S. Razalli, R. A. Kadhim
{"title":"Effect of partition length variability on the performance of adjacent partitioing PTS in papr reduction of OFDM systems","authors":"Zeyid T. Ibraheem, Md. Mijanur Rahman, S. Yaakob, M. S. Razalli, R. A. Kadhim","doi":"10.1109/ISCAIE.2014.7010203","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010203","url":null,"abstract":"Peak-to-Average Power Ratio (PAPR) reduction is an attractive research topic among the OFDM transmission research communities. Partial Transmit Sequence (PTS) has been a promising candidate out of the proposed PAPR reduction techniques without any distortion. In any PTS system, partitioning of the OFDM frame into disjoint sub-blocks is a crucial step. Adjacent partitioning (AP) is a rather simple partitioning scheme achieving attractive PAPR reduction performance. In this paper, we investigate effects of the length variability of disjoint sub-blocks on AP based PTS systems. In order to compare performance of variable length adjacent partitioning with the ordinary PTS scheme, we simulated other partitioning schemes, namely, interleaved, pseudorandom and fixed length adjacent partitioning for various types of modulation. Simulation results showed that the variable length adjacent partitioning is better than interleaved partitioning. However, it has worse PAPR reduction performance compared to the traditional adjacent and pseudorandom techniques.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nurul Izzati Mohammad Noh, K. A. Yusof, A. Abdullah, S. H. Herman, Wan Fazlida, H. Abdullah
{"title":"Light effect characterization of ISFET based pH sensor with Si3N4 gate insulator","authors":"Nurul Izzati Mohammad Noh, K. A. Yusof, A. Abdullah, S. H. Herman, Wan Fazlida, H. Abdullah","doi":"10.1109/ISCAIE.2014.7010214","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010214","url":null,"abstract":"The performance of ISFET based pH sensor device in testing and characterization process of light effect has been successfully done. The experimental setup was carried out by Agilent Technologies B1500A Semiconductor Device Analyzer with an additional readout interfacing circuit (ROIC). This paper reports the electrical characterization test i.e. current-voltage (I-V) measurement and sensitivity, drift and hysteresis test of the fabricated sensor. The I-V measurement was done in light and dark conditions but the drift and hysteresis characterizations were done in dark condition to avoid the influence of light. This experiment used the standard buffer solution to observe the characteristic of the device. From the experimental result, it found that the sensor performance has a light effect due to the light exposure. Drift and hysteresis test using the ROIC showed a good performance in term of the durability, reliability and accuracy of the sensor. The discussion of the light effect on the sensor performance is presented.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114946234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Template matching using multiple templates weighted normalised cross correlation","authors":"Ze-Hao Wong, K. Abdullah, C. J. Wong","doi":"10.1109/ISCAIE.2014.7010224","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010224","url":null,"abstract":"Template matching is an image comparison technique which played an important role in machine vision. In this research, a different approach to multi-template matching technique with more robust and intuitive similarity measure is described. In many studies, a numerous templates are presented to handle pattern variation while Normalised Cross Correlation (NCC) remains as the popular similarity measure. A new approach using the idea of generalised template with Weighted Normalised Cross Correlation (WNCC) based on the pixel standard deviations of templates is proposed. This approach is tested using real electronic component and similarity measure is compared with NCC in term of quality. The proposed method is found to be effective, robust and intuitive comparatively.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130367219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faraz Fatemi Moghaddam, Soroush Mobedi, Iman Ghavam, Shirin Dabbaghi, T. Khodadadi
{"title":"A theoretical cloud-based model for establishment of united caring framework","authors":"Faraz Fatemi Moghaddam, Soroush Mobedi, Iman Ghavam, Shirin Dabbaghi, T. Khodadadi","doi":"10.1109/ISCAIE.2014.7010207","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010207","url":null,"abstract":"The rapid growth of using cloud computing and virtualization technologies in different industries and environment is an impossible fact to be denied as it has increased the efficiency and reliability especially in recent years. Accordingly, this paper proposed an efficient health care framework based on cloud computing concepts. United Caring Framework (UCF) as the suggested framework has been presented in this paper and various algorithms, tools, and techniques have been described according to the main aim of this research which is to design a United Caring Framework for increasing the efficiency and performance of health care processes with using benefits of cloud computing concepts. Furthermore, the performance and security of the suggested model has been analyzed and the specifications of the framework have been evaluated by appropriate tools and techniques to investigate the effects of developing and establishing this cloud-based framework on an efficient health care industry and sub-industries in three main areas: development, infrastructure, and ease of use. The theoretical analysis of the proposed model shows that this framework could be effective in health care industry and meet all of defined objectives about this research.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120892409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. N. Mohamed, H. Hashim, Y. M. Yussoff, M. Isa, S. F. S. Adnan
{"title":"Compression and encryption technique on securing TFTP packet","authors":"N. N. Mohamed, H. Hashim, Y. M. Yussoff, M. Isa, S. F. S. Adnan","doi":"10.1109/ISCAIE.2014.7010237","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010237","url":null,"abstract":"Data compression technique such as Huffman coding, arithmetic coding, Lempel-Ziv-Welch (LZW) method and others has been playing a vital role in the area of data transmission for reducing time usage during retrieving and transmitting data. However, this technique does not prevent data which contain secret information from being tampered or hacked by malicious attacks even in limited area network environment. Apart from the need of reducing data volume, an implementation of encryption is an important concern in order to transmit data over perfect security. This paper presents feasible approach in minimizing quantity of data and ensuring its security; data is compressed using a lossless algorithm, i.e. Huffman coding and then the compressed data is encrypted using symmetric encryption, AES algorithm. In this work, key exchange concept is also proposed based on Diffie Hellman Key Exchange (DHKE) which is used to exchange secret key for data encryption and decryption. The data is transferred in a local network between two computers through simple file transfer protocol known as Trivial File Transfer Protocol (TFTP). This protocol has been used widely for updating and transferring files especially to embedded devices and it would provide more benefit if security features were incorporated into this protocol. Thus, a lightweight security strategy which includes compression and encryption is an efficient solution to the security issue and to reducing file sizes in this type of environment. Experimental results based on proposed methodology are provided to analyze execution time of transmitting compressed-encrypted data and percentage reduction of file space.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114516401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohd Saharul Nizam Abdul Rahim, L. Mazalan, S. F. S. Adnan
{"title":"Analysis on parallelism between CPU and GPGPU processing on cluster computing","authors":"Mohd Saharul Nizam Abdul Rahim, L. Mazalan, S. F. S. Adnan","doi":"10.1109/ISCAIE.2014.7010238","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010238","url":null,"abstract":"Computer cluster is a collection of multiple computers connected together so that it can be viewed and perform as a single computer using an interconnected device. Graphical Processing Unit is a specialized hardware used to accelerate the creation of an image by manipulating and altering the memory to help CPU to produce an image. Previously, only CPU is used to perform the task execution in a cluster, however since the advancement of technology in cluster computing, GPU's can now be used as alternative processor to perform execution of a task or job. Due to its relatively cheap in Flops/price ratio, GPGPU cluster system has gained a lot of popularity, however, the real world performance for both CPU cluster system and GPGPU cluster system has not been widely tested. In this paper, the performance between CPU cluster system and GPGPU cluster system simulating proteins using GROMACS 4.6.5 will be measured and analyzed, and how the parallelism between the two will be evaluate by comparing two set of tasks. The cluster's protein folding performance is measured in ns/day, average CPU utilization, average memory usage, and average network bandwidth will be taken into account in this simulation.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127301337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manish Gupta, G. Parmar, Rajeev Gupta, M. Saraswat
{"title":"Digital image watermarking using uncorrelated color space","authors":"Manish Gupta, G. Parmar, Rajeev Gupta, M. Saraswat","doi":"10.1109/ISCAIE.2014.7010229","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010229","url":null,"abstract":"The exponential growths in electronic data over internet have increase the demand of a robust and high quality watermarking method for authentication and copyright protection. The available digital image watermarking methods generally use the correlated color spaces which impose the limitations to researchers for using only one color component at a time for embedding the watermark. Therefore, in this paper, a novel DWT based digital image watermarking method has been proposed which embeds the gray scale watermark into color host image using uncorrelated color space (UCS) and genetic algorithm (GA) method. The result shows that the proposed method outperforms other existing methods against the various signal processing attacks. The proposed method is a first inline report which uses uncorrelated color space for digital image watermarking.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126710201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}