2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)最新文献

筛选
英文 中文
Magnetic field analysis of solid insulation generator enclosed bus with amorphous alloy shielding layer 带非晶合金屏蔽层的固体绝缘发电机封闭母线磁场分析
2013 IEEE International Conference of IEEE Region 10 (TENCON 2013) Pub Date : 2013-10-01 DOI: 10.1109/TENCON.2013.6718986
Guoqing Yang, Deyi Wang, Zhe Sun, R. Zhang, Xiaochun Zou, Guangcheng Zhang
{"title":"Magnetic field analysis of solid insulation generator enclosed bus with amorphous alloy shielding layer","authors":"Guoqing Yang, Deyi Wang, Zhe Sun, R. Zhang, Xiaochun Zou, Guangcheng Zhang","doi":"10.1109/TENCON.2013.6718986","DOIUrl":"https://doi.org/10.1109/TENCON.2013.6718986","url":null,"abstract":"Magnetic shielding scheme of enclosed bus is a key problem in hydroelectric design fields. In this paper, amorphous alloy is used as magnetic shielding material of a 10.5 kV 5 kA hydropower generator bus. By comparison with magnetic field analysis of copper, the effect and advantages of amorphous alloy shielding material is discussed. The finite element analysis shows, as to lower frequency magnetic shielding, amorphous alloy can brings less residual magnetic field in outside air of conductors and bus coat. Furthermore, the relationship between thickness of shielding layer and shielding effect is researched, and the results suggest 5 mm should be optimal thickness of this hydroelectric enclosed tube bus.","PeriodicalId":425023,"journal":{"name":"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)","volume":"451 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122485999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel compact monopole antenna with super wide bandwidth 一种新型的超宽带单极天线
2013 IEEE International Conference of IEEE Region 10 (TENCON 2013) Pub Date : 2013-10-01 DOI: 10.1109/TENCON.2013.6718964
J. Qiu, Yuanqing Zhao
{"title":"A novel compact monopole antenna with super wide bandwidth","authors":"J. Qiu, Yuanqing Zhao","doi":"10.1109/TENCON.2013.6718964","DOIUrl":"https://doi.org/10.1109/TENCON.2013.6718964","url":null,"abstract":"In this paper, a novel monopole antenna with a compact configuration is proposed, which can operate in the frequency range from 6.8GHz to 37.8GHz. The antenna consists of two main components. One is the two orthogonal half discs with a cavity inside each of them. The other is the circular metallic ground. Firstly, according to the traditonal theory [1], the dimension of each half disc can be determined preliminarily. Then, a cavity is set inside each disc. By using CST simulation software, the opitmal scales of the antenna, at last, can be obtained. From the simulated results, it can be seen that the bandwidth of the antenna is from 6.8GHz to 37.8GHz, meanwhile, the radiation patterns of the antenna stay almost contant over the entire bandwidth. More importantly, there is a dramatic decrease in the dimension of the proposed antenna, compared to the antennas reported in [2]. Hence, the strengths mentioned above contribute to a much wider range of potential application, especially the application in the radio spectrum detection, which demands the bandwidth of antennas to be as wide as possible.","PeriodicalId":425023,"journal":{"name":"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122610266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobility enhancement on Vertical Strained-SiGe Impact Ionization MOSFET incorporating Dielectric Pocket (VESIMOS-DP) 介电袋(VESIMOS-DP)增强垂直应变-冲击电离MOSFET的迁移率
2013 IEEE International Conference of IEEE Region 10 (TENCON 2013) Pub Date : 2013-10-01 DOI: 10.1109/TENCON.2013.6718843
I. Saad, H. M. Zuhir, C. B. Seng, A. R. A. Bakar, N. Bolong, A. M. Khairul, B. Ghosh, R. Ismail
{"title":"Mobility enhancement on Vertical Strained-SiGe Impact Ionization MOSFET incorporating Dielectric Pocket (VESIMOS-DP)","authors":"I. Saad, H. M. Zuhir, C. B. Seng, A. R. A. Bakar, N. Bolong, A. M. Khairul, B. Ghosh, R. Ismail","doi":"10.1109/TENCON.2013.6718843","DOIUrl":"https://doi.org/10.1109/TENCON.2013.6718843","url":null,"abstract":"The Vertical Strained Silicon Germanium (SiGe) Impact Ionization MOSFET with Dielectric Pocket (VESIMOS-DP) has been successfully developed and analyzed in this paper. The electron mobility in the VESIMOS-DP (~1440m2/V-s), was found to be increased by 4% in comparison to VESIMOS (~1386 m2/V-s) device. The mobilities in strained layer is depends on the transport direction, either parallel to the original SiGe growth interface or in the perpendicular direction. Carrier mobilities in strained SiGe layer is also based on the local distortion due to the strain effects which contribute to the alloy scattering on the carriers. With the vicinity of DP, the carrier scattering effect has reduced which merits the introduction of DP on the device. Due to the DP layer, improve stability of threshold voltage, VTH and subthreshold slope, S was found for VESIMOS-DP device of various size ranging from 20nm to 80nm justified the vicinity of the DP on improving the performance of the device.","PeriodicalId":425023,"journal":{"name":"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure authorization for controlling access via key management scheme 通过密钥管理方案控制访问的安全授权
2013 IEEE International Conference of IEEE Region 10 (TENCON 2013) Pub Date : 2013-10-01 DOI: 10.1109/TENCON.2013.6719045
T. Hsiao, Tzer-Long Chen, Chih-Sheng Chen, Fu-Sheng Xu, Starlition Tsui, Yu-Fang Chung, Tzer-Shyong Chen
{"title":"Secure authorization for controlling access via key management scheme","authors":"T. Hsiao, Tzer-Long Chen, Chih-Sheng Chen, Fu-Sheng Xu, Starlition Tsui, Yu-Fang Chung, Tzer-Shyong Chen","doi":"10.1109/TENCON.2013.6719045","DOIUrl":"https://doi.org/10.1109/TENCON.2013.6719045","url":null,"abstract":"With the rapid development of the Internet, many users start to take action putting personal or company information on it, and share with everyone. The Internet is public as it were, if we do not control its limit of authority to assure security, it's possible that those attackers do illegal access of important information and destroy them. Not only personal privacy is invaded, but the mass property damage. Therefore, effective access control system has been more and more emphasized these days. To fight against these network attacks, it is necessary to establish an effective and safe access control system; here we proposed a scheme, a key management which called Lagrange interpolation mainly takes access control model as framework, and use Elliptic Curve Cryptography system to enhance security. The fact we choose Lagrange interpolation is the key we use is randomized, no relationship between each key, so is relatively hard. As Elliptic Curve Cryptography system, we want attackers to encounter Elliptic Curve Discrete Logarithm Problem. Once the prime number is big enough, attackers will have trouble deciphering the key. Access control is so comprehensive, such as electronic documents, online television system sand wireless networks and so on, from previous literature; mobile agent technology applied in access control and key management would waste space and do exist some flaws in security, also we still have a lot of works to do on medical application. Hence, we propose these schemes in mobile agent in order to reach improvement, and then analyze of security and try to simulate what attackers will do. We conclude four common attacks: External Collective Attack, Internal Attack, Collusion Attacks and Equation Breaking Attack. As results, attackers are hard to decipher the key because of no relationship between each key and will face Elliptic Curve Discrete Logarithm Problem. We confirm that the proposed schemes can be more efficiently and safety to protect mobile agent.","PeriodicalId":425023,"journal":{"name":"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)","volume":"917 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126982021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FPGA implementation of novel fast confluence adaptive independent component analysis for mixture of sub and supergaussian signal 基于FPGA的亚高斯和超高斯混合信号快速融合自适应独立分量分析
2013 IEEE International Conference of IEEE Region 10 (TENCON 2013) Pub Date : 2013-10-01 DOI: 10.1109/TENCON.2013.6719002
Jayasanthi Ranjith, N. Muniraj
{"title":"FPGA implementation of novel fast confluence adaptive independent component analysis for mixture of sub and supergaussian signal","authors":"Jayasanthi Ranjith, N. Muniraj","doi":"10.1109/TENCON.2013.6719002","DOIUrl":"https://doi.org/10.1109/TENCON.2013.6719002","url":null,"abstract":"Independent component analysis (ICA) is a technique that separates the independent source signals from their mixtures by minimizing the statistical dependence between components. This paper presents a low-power FPGA implementation of a novel 2-channel fast confluence adaptive independent component analysis (FCAICA) technique for mixture of sub-gaussian and super-gaussian signals. The proposed FCAICA consumes less power and provides the high convergence speed. The reduction in power is achieved by hardware optimization and high convergence (confluence) speed is achieved by a novel optimization scheme that adaptively changes the weight vector based on the kurtosis value. To increase the number precision and dynamic range of the signal, the floating-point (FP) arithmetic units are used. To validate the performance of the proposed ICA, simulation and synthesis are performed with sub and super-gaussian mixtures and experimental results are compared with Fast ICA and SFLO ICA (Shuffled frog Leap Optimization ICA). The proposed low power ICA processor separates the mixture of super and sub-Gaussian signals with maximum operating frequency of 2.91MHz.The FCA ICA, Fast ICA and SFLO ICA algorithms converge to optimal solution at 300ps, 200ps and 500ps, with power consumption of 246.94 mW, 270.76mW and 307.27 mW respectively.","PeriodicalId":425023,"journal":{"name":"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132637740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Single image super-resolution using self-similarity and generalized nonlocal mean 基于自相似和广义非局部均值的单幅图像超分辨率
2013 IEEE International Conference of IEEE Region 10 (TENCON 2013) Pub Date : 2013-10-01 DOI: 10.1109/TENCON.2013.6718930
Wei Wu, Chenglin Zheng
{"title":"Single image super-resolution using self-similarity and generalized nonlocal mean","authors":"Wei Wu, Chenglin Zheng","doi":"10.1109/TENCON.2013.6718930","DOIUrl":"https://doi.org/10.1109/TENCON.2013.6718930","url":null,"abstract":"In this paper, a super-resolution method based self-similarity and generalized nonlocal mean is proposed. The proposed method not only adopts the self-similarity of image to build a self-example training set but also exploits generalized nonlocal mean to improve the quality of the resultant image. In the proposed method, difference of Gaussians of the input low-resolution image is extracted firstly, and then a generalized nonlocal mean algorithm is proposed to estimate the missing high-frequency details of the low image. The experimental results show that the proposed algorithm has a good performance, and the high-resolution image generated by the proposed method is with better subjective and objective quality compared with other methods.","PeriodicalId":425023,"journal":{"name":"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133198091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Vertical handoff with predictive RSS and dwell time 具有预测RSS和停留时间的垂直切换
2013 IEEE International Conference of IEEE Region 10 (TENCON 2013) Pub Date : 2013-10-01 DOI: 10.1109/TENCON.2013.6718529
S. Kunarak, Raungrong Sulessathira, E. Dutkiewicz
{"title":"Vertical handoff with predictive RSS and dwell time","authors":"S. Kunarak, Raungrong Sulessathira, E. Dutkiewicz","doi":"10.1109/TENCON.2013.6718529","DOIUrl":"https://doi.org/10.1109/TENCON.2013.6718529","url":null,"abstract":"In this paper, multiple handoff decision criteria to permit connectivity across UMTS and WLAN/WiMAX under the mobile IP regional registration (MIP-RR) are presented. Handoff decision is based on the predicted received signal strength (RSS) of neighbor networks and dwell time. The merit values of candidate networks are compared to select an optimal network. RSS prediction and handoff decision performances are evaluated. The results illustrate that the proposed vertical handoff decision algorithm and network selection outperforms the other two approaches in reducing voice and data packet delay and increasing the throughput of WLAN/WiMAX.","PeriodicalId":425023,"journal":{"name":"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133272572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
R-bar guidance strategy design for the final translation of space rendezvous and docking 空间交会对接最终平移的r杆制导策略设计
2013 IEEE International Conference of IEEE Region 10 (TENCON 2013) Pub Date : 2013-10-01 DOI: 10.1109/TENCON.2013.6718941
Gong Baichun, Lu Jianjun, Ma Yue
{"title":"R-bar guidance strategy design for the final translation of space rendezvous and docking","authors":"Gong Baichun, Lu Jianjun, Ma Yue","doi":"10.1109/TENCON.2013.6718941","DOIUrl":"https://doi.org/10.1109/TENCON.2013.6718941","url":null,"abstract":"Aimed at the problem of forced motion along Line of sight of final translation phase of space rendezvous and docking, straight line guidance algorithms of R-bar based on Clohessy-Wiltshire equation are investigated. The guidance laws using impulsive propulsion and finite thrust are designed, and the guidance conditions for optimal-fuel are obtained. Numerical simulation is done to illustrate and analyze the guidance algorithms, and simulation results show that the proposed approaches are simple and efficient, and the guidance law using impulsive thrust costs less fuel and time than that using finite thrust.","PeriodicalId":425023,"journal":{"name":"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)","volume":"161 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133588473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic reactive power and voltage control for regional power grid based on SVM 基于支持向量机的区域电网无功电压自动控制
2013 IEEE International Conference of IEEE Region 10 (TENCON 2013) Pub Date : 2013-10-01 DOI: 10.1109/TENCON.2013.6718482
Xiangxing Meng, Guozhong Sun, Jianxiang Li, Haibo Liu
{"title":"Automatic reactive power and voltage control for regional power grid based on SVM","authors":"Xiangxing Meng, Guozhong Sun, Jianxiang Li, Haibo Liu","doi":"10.1109/TENCON.2013.6718482","DOIUrl":"https://doi.org/10.1109/TENCON.2013.6718482","url":null,"abstract":"In this paper, the traditional reactive power and voltage control problem is regarded as a multi-class classification problem, and a novel approach based on Support Vector Machine (SVM) classifier is proposed. According to the approach, the power grid operating status is classified according to the power factor and voltage at each substation and the corresponding control strategy is selected to control the capacitors and transformer taps. A naive progressive learning strategy is also presented to make sure the classifier can keep learning in the operation process. The approach is suitable for online operation. The decision results are robust and coordination operation between the substations can be achieved. A simple radial system containing three substations is used for case study. The results illustrate the effectiveness of the proposed approach.","PeriodicalId":425023,"journal":{"name":"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133986455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation studies of three intrusion detection systems under various attacks and rule sets 三种入侵检测系统在不同攻击和规则集下的评估研究
2013 IEEE International Conference of IEEE Region 10 (TENCON 2013) Pub Date : 2013-10-01 DOI: 10.1109/TENCON.2013.6718975
Kittikhun Thongkanchorn, S. Ngamsuriyaroj, V. Visoottiviseth
{"title":"Evaluation studies of three intrusion detection systems under various attacks and rule sets","authors":"Kittikhun Thongkanchorn, S. Ngamsuriyaroj, V. Visoottiviseth","doi":"10.1109/TENCON.2013.6718975","DOIUrl":"https://doi.org/10.1109/TENCON.2013.6718975","url":null,"abstract":"This paper investigates the performance and the detection accuracy of three popular open-source intrusion detection systems: Snort, Suricata and Bro. We evaluate all systems using various attack types including DoS attack, DNS attack, FTP attack, Scan port attack, and SNMP attack. The experiments were run under different traffic rates and different sets of active rules. The performance metrics used are the CPU utilization, the number of packets lost, and the number of alerts. The results illustrated that each attack type had significant effects on the IDS performance. But, Bro showed better performance than other IDS systems when evaluated under different attack types and using a specific set of rules. The results also indicated the drop of the accuracy when the three IDS tools activate the full rule set.","PeriodicalId":425023,"journal":{"name":"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133070830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信