2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)最新文献

筛选
英文 中文
An optimization model of the input current for a variable input voltage in CMOS AC/DC converter 可变输入电压下CMOS AC/DC变换器输入电流的优化模型
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010220
R. Radzuan, M. Salleh, Mohd Azril Ab Raop, M. N. Seroji, M. K. Hamzah
{"title":"An optimization model of the input current for a variable input voltage in CMOS AC/DC converter","authors":"R. Radzuan, M. Salleh, Mohd Azril Ab Raop, M. N. Seroji, M. K. Hamzah","doi":"10.1109/ISCAIE.2014.7010220","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010220","url":null,"abstract":"An optimization model of the input current for a variable input voltage in CMOS AC/DC converter is proposed in order to achieve regulation control of an AC/DC converter. An input current model of CMOS converter is obtained by applying an average method in converter circuit over one's switching period. This model is implemented in Pspice circuit simulation tool to verify an averaged model of the input current. The results show that the input current exhibits an increasing response to input voltage variation from 0.3 to 1.5 V. The validity of the proposed steady-state model is verified by the given simulation results for a specified design of CMOS converter. A good agreement is obtained between steady-state model and simulation results.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A low computational method of secure video streaming in mobile system 移动系统中安全视频流的低计算方法
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010236
M. Saleh, H. Hashim, N. Tahir
{"title":"A low computational method of secure video streaming in mobile system","authors":"M. Saleh, H. Hashim, N. Tahir","doi":"10.1109/ISCAIE.2014.7010236","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010236","url":null,"abstract":"Huge revolution in mobile systems opens the field toward exploit of video streaming, enabling broadcasting a real time video through the network, also live event can be seen from anywhere, the video data has to be compressed before transmitting, in addition to that, the encryption process is compulsory in order to secure a transmitted data stream. This leads to increase the resource consumption requirements such as computational overhead. Hence, in this paper, an overview of video streaming security in limited resources devices is presented, a new method for secure video streaming. In the proposed method, we will focus on: The data structure of video streaming, explaining the encryption and decryption process that performed in a video transmitting, and to exploit the structure of the H.264/AVC standard for encrypting a specific syntaxes. The method will be performed in two phases; (1) encoding video streaming and (2) decode video bitstream, in the first phase, the encryption for a specific part of encoded video data will be performed using AES algorithm, in the second phase, the encrypted syntaxes of the bitstream will be decrypted. By APPLYING this method; the technique for securing the video stream in a limited resource device will be enhanced, mitigate the effects of compression and encryption process on the computational overhead during real-time multimedia transmission. This method is capable to prevent attacks on video streaming data, as well as the compliance format between the encoder and decoder will be maintained.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125125527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0.5-V bulk-driven fully differential current conveyor 0.5 v散装驱动全差动电流输送机
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010234
M. Kumngern, F. Khateb
{"title":"0.5-V bulk-driven fully differential current conveyor","authors":"M. Kumngern, F. Khateb","doi":"10.1109/ISCAIE.2014.7010234","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010234","url":null,"abstract":"This paper presents a new low-voltage supply and low-power consumption bulk-driven fully differential current conveyor (BD-FDCCII) which is suitable for low-voltage signal processing applications. The bulk-driven MOS technique is used to achieve a low-voltage supply as low as a 0.5V, also, a rail-to-rail input voltage swing. As an example application, a voltage-mode biquadratic filter using BD-FDCCII is presented. The proposed BD-FDCCII is simulated by PSPICE simulators using TSMC 0.18 μm n-well CMOS technology.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121169022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Effect of partition length variability on the performance of adjacent partitioing PTS in papr reduction of OFDM systems 分割长度可变性对OFDM系统减纸中相邻分割PTS性能的影响
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010203
Zeyid T. Ibraheem, Md. Mijanur Rahman, S. Yaakob, M. S. Razalli, R. A. Kadhim
{"title":"Effect of partition length variability on the performance of adjacent partitioing PTS in papr reduction of OFDM systems","authors":"Zeyid T. Ibraheem, Md. Mijanur Rahman, S. Yaakob, M. S. Razalli, R. A. Kadhim","doi":"10.1109/ISCAIE.2014.7010203","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010203","url":null,"abstract":"Peak-to-Average Power Ratio (PAPR) reduction is an attractive research topic among the OFDM transmission research communities. Partial Transmit Sequence (PTS) has been a promising candidate out of the proposed PAPR reduction techniques without any distortion. In any PTS system, partitioning of the OFDM frame into disjoint sub-blocks is a crucial step. Adjacent partitioning (AP) is a rather simple partitioning scheme achieving attractive PAPR reduction performance. In this paper, we investigate effects of the length variability of disjoint sub-blocks on AP based PTS systems. In order to compare performance of variable length adjacent partitioning with the ordinary PTS scheme, we simulated other partitioning schemes, namely, interleaved, pseudorandom and fixed length adjacent partitioning for various types of modulation. Simulation results showed that the variable length adjacent partitioning is better than interleaved partitioning. However, it has worse PAPR reduction performance compared to the traditional adjacent and pseudorandom techniques.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Light effect characterization of ISFET based pH sensor with Si3N4 gate insulator 基于Si3N4栅极绝缘体的ISFET pH传感器的光效表征
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010214
Nurul Izzati Mohammad Noh, K. A. Yusof, A. Abdullah, S. H. Herman, Wan Fazlida, H. Abdullah
{"title":"Light effect characterization of ISFET based pH sensor with Si3N4 gate insulator","authors":"Nurul Izzati Mohammad Noh, K. A. Yusof, A. Abdullah, S. H. Herman, Wan Fazlida, H. Abdullah","doi":"10.1109/ISCAIE.2014.7010214","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010214","url":null,"abstract":"The performance of ISFET based pH sensor device in testing and characterization process of light effect has been successfully done. The experimental setup was carried out by Agilent Technologies B1500A Semiconductor Device Analyzer with an additional readout interfacing circuit (ROIC). This paper reports the electrical characterization test i.e. current-voltage (I-V) measurement and sensitivity, drift and hysteresis test of the fabricated sensor. The I-V measurement was done in light and dark conditions but the drift and hysteresis characterizations were done in dark condition to avoid the influence of light. This experiment used the standard buffer solution to observe the characteristic of the device. From the experimental result, it found that the sensor performance has a light effect due to the light exposure. Drift and hysteresis test using the ROIC showed a good performance in term of the durability, reliability and accuracy of the sensor. The discussion of the light effect on the sensor performance is presented.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114946234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Template matching using multiple templates weighted normalised cross correlation 模板匹配使用多个模板加权归一化互相关
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010224
Ze-Hao Wong, K. Abdullah, C. J. Wong
{"title":"Template matching using multiple templates weighted normalised cross correlation","authors":"Ze-Hao Wong, K. Abdullah, C. J. Wong","doi":"10.1109/ISCAIE.2014.7010224","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010224","url":null,"abstract":"Template matching is an image comparison technique which played an important role in machine vision. In this research, a different approach to multi-template matching technique with more robust and intuitive similarity measure is described. In many studies, a numerous templates are presented to handle pattern variation while Normalised Cross Correlation (NCC) remains as the popular similarity measure. A new approach using the idea of generalised template with Weighted Normalised Cross Correlation (WNCC) based on the pixel standard deviations of templates is proposed. This approach is tested using real electronic component and similarity measure is compared with NCC in term of quality. The proposed method is found to be effective, robust and intuitive comparatively.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130367219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A theoretical cloud-based model for establishment of united caring framework 基于云的统一关怀框架构建理论模型
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010207
Faraz Fatemi Moghaddam, Soroush Mobedi, Iman Ghavam, Shirin Dabbaghi, T. Khodadadi
{"title":"A theoretical cloud-based model for establishment of united caring framework","authors":"Faraz Fatemi Moghaddam, Soroush Mobedi, Iman Ghavam, Shirin Dabbaghi, T. Khodadadi","doi":"10.1109/ISCAIE.2014.7010207","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010207","url":null,"abstract":"The rapid growth of using cloud computing and virtualization technologies in different industries and environment is an impossible fact to be denied as it has increased the efficiency and reliability especially in recent years. Accordingly, this paper proposed an efficient health care framework based on cloud computing concepts. United Caring Framework (UCF) as the suggested framework has been presented in this paper and various algorithms, tools, and techniques have been described according to the main aim of this research which is to design a United Caring Framework for increasing the efficiency and performance of health care processes with using benefits of cloud computing concepts. Furthermore, the performance and security of the suggested model has been analyzed and the specifications of the framework have been evaluated by appropriate tools and techniques to investigate the effects of developing and establishing this cloud-based framework on an efficient health care industry and sub-industries in three main areas: development, infrastructure, and ease of use. The theoretical analysis of the proposed model shows that this framework could be effective in health care industry and meet all of defined objectives about this research.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120892409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compression and encryption technique on securing TFTP packet TFTP包安全的压缩加密技术
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010237
N. N. Mohamed, H. Hashim, Y. M. Yussoff, M. Isa, S. F. S. Adnan
{"title":"Compression and encryption technique on securing TFTP packet","authors":"N. N. Mohamed, H. Hashim, Y. M. Yussoff, M. Isa, S. F. S. Adnan","doi":"10.1109/ISCAIE.2014.7010237","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010237","url":null,"abstract":"Data compression technique such as Huffman coding, arithmetic coding, Lempel-Ziv-Welch (LZW) method and others has been playing a vital role in the area of data transmission for reducing time usage during retrieving and transmitting data. However, this technique does not prevent data which contain secret information from being tampered or hacked by malicious attacks even in limited area network environment. Apart from the need of reducing data volume, an implementation of encryption is an important concern in order to transmit data over perfect security. This paper presents feasible approach in minimizing quantity of data and ensuring its security; data is compressed using a lossless algorithm, i.e. Huffman coding and then the compressed data is encrypted using symmetric encryption, AES algorithm. In this work, key exchange concept is also proposed based on Diffie Hellman Key Exchange (DHKE) which is used to exchange secret key for data encryption and decryption. The data is transferred in a local network between two computers through simple file transfer protocol known as Trivial File Transfer Protocol (TFTP). This protocol has been used widely for updating and transferring files especially to embedded devices and it would provide more benefit if security features were incorporated into this protocol. Thus, a lightweight security strategy which includes compression and encryption is an efficient solution to the security issue and to reducing file sizes in this type of environment. Experimental results based on proposed methodology are provided to analyze execution time of transmitting compressed-encrypted data and percentage reduction of file space.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114516401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis on parallelism between CPU and GPGPU processing on cluster computing 集群计算中CPU与GPGPU并行性分析
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010238
Mohd Saharul Nizam Abdul Rahim, L. Mazalan, S. F. S. Adnan
{"title":"Analysis on parallelism between CPU and GPGPU processing on cluster computing","authors":"Mohd Saharul Nizam Abdul Rahim, L. Mazalan, S. F. S. Adnan","doi":"10.1109/ISCAIE.2014.7010238","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010238","url":null,"abstract":"Computer cluster is a collection of multiple computers connected together so that it can be viewed and perform as a single computer using an interconnected device. Graphical Processing Unit is a specialized hardware used to accelerate the creation of an image by manipulating and altering the memory to help CPU to produce an image. Previously, only CPU is used to perform the task execution in a cluster, however since the advancement of technology in cluster computing, GPU's can now be used as alternative processor to perform execution of a task or job. Due to its relatively cheap in Flops/price ratio, GPGPU cluster system has gained a lot of popularity, however, the real world performance for both CPU cluster system and GPGPU cluster system has not been widely tested. In this paper, the performance between CPU cluster system and GPGPU cluster system simulating proteins using GROMACS 4.6.5 will be measured and analyzed, and how the parallelism between the two will be evaluate by comparing two set of tasks. The cluster's protein folding performance is measured in ns/day, average CPU utilization, average memory usage, and average network bandwidth will be taken into account in this simulation.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127301337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital image watermarking using uncorrelated color space 使用不相关色彩空间的数字图像水印
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010229
Manish Gupta, G. Parmar, Rajeev Gupta, M. Saraswat
{"title":"Digital image watermarking using uncorrelated color space","authors":"Manish Gupta, G. Parmar, Rajeev Gupta, M. Saraswat","doi":"10.1109/ISCAIE.2014.7010229","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010229","url":null,"abstract":"The exponential growths in electronic data over internet have increase the demand of a robust and high quality watermarking method for authentication and copyright protection. The available digital image watermarking methods generally use the correlated color spaces which impose the limitations to researchers for using only one color component at a time for embedding the watermark. Therefore, in this paper, a novel DWT based digital image watermarking method has been proposed which embeds the gray scale watermark into color host image using uncorrelated color space (UCS) and genetic algorithm (GA) method. The result shows that the proposed method outperforms other existing methods against the various signal processing attacks. The proposed method is a first inline report which uses uncorrelated color space for digital image watermarking.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126710201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信