首页 > 最新文献

2008 IEEE International Multitopic Conference最新文献

英文 中文
Fuzzy-Fortuna: A fuzzified approach to generation of cryptographically secure pseudo-random numbers 一种生成加密安全伪随机数的模糊化方法
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777738
M. Akbar, M. Z. Khalid
A fuzzy based adaptive algorithm for the reseeding operation of Fortuna is presented. Fortuna is a pseudo-random number generation algorithm, originally suggested by Ferguson and Schneier. The algorithm is specifically designed to be cryptographically secure from known attacks. However the described algorithm suffers from a lack of an algorithm which could adapt the rate of reseeding according to variations in the amount of truly random data being gathered from the environment at any time. The Fortuna algorithm performs the reseeding action after a fixed number of iterations. This paper presents concept as well as software implementation of a novel technique using fuzzy approach to tackle this problem. The resulting algorithm has been named fuzz-Fortuna. Fuzz-Fortuna has been tested using various techniques and has shown considerable improvement in results as compared to the ordinary Fortuna algorithm.
提出了一种基于模糊算法的Fortuna种子重播算法。Fortuna是一种伪随机数生成算法,最初由Ferguson和Schneier提出。该算法是专门设计为加密安全的已知攻击。然而,所描述的算法的缺点是缺乏一种算法,该算法可以根据在任何时候从环境中收集的真正随机数据量的变化来适应重新播种的速率。Fortuna算法在固定次数的迭代后执行重新播种操作。本文提出了一种利用模糊方法解决这一问题的新技术的概念和软件实现。最终的算法被命名为fuzzy - fortuna。fuzzy -Fortuna已经使用各种技术进行了测试,与普通Fortuna算法相比,结果显示出相当大的改进。
{"title":"Fuzzy-Fortuna: A fuzzified approach to generation of cryptographically secure pseudo-random numbers","authors":"M. Akbar, M. Z. Khalid","doi":"10.1109/INMIC.2008.4777738","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777738","url":null,"abstract":"A fuzzy based adaptive algorithm for the reseeding operation of Fortuna is presented. Fortuna is a pseudo-random number generation algorithm, originally suggested by Ferguson and Schneier. The algorithm is specifically designed to be cryptographically secure from known attacks. However the described algorithm suffers from a lack of an algorithm which could adapt the rate of reseeding according to variations in the amount of truly random data being gathered from the environment at any time. The Fortuna algorithm performs the reseeding action after a fixed number of iterations. This paper presents concept as well as software implementation of a novel technique using fuzzy approach to tackle this problem. The resulting algorithm has been named fuzz-Fortuna. Fuzz-Fortuna has been tested using various techniques and has shown considerable improvement in results as compared to the ordinary Fortuna algorithm.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132915278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NROI watermarking of medical images for content authentication 用于医学图像内容认证的NROI水印
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777717
N. Memon, S. Gilani
Medical image is usually comprised of region of interest (ROI) and non region of interest (NROI). ROI is the region that contains the important information from diagnosis point of view so it must be stored without any distortion. We have proposed a digital watermarking technique which avoids the distortion of image in ROI by embedding the watermark information in NROI. The watermark is comprised of patient information, hospital logo and message authentication code, computed using hash function. Earlier BCH encryption of watermark is performed to ensure inaccessibility of embedded data to the adversaries.
医学图像通常分为感兴趣区域(ROI)和非感兴趣区域(NROI)。从诊断的角度来看,ROI是包含重要信息的区域,因此必须不失真地存储。提出了一种将水印信息嵌入到感兴趣区域的数字水印技术,避免了感兴趣区域图像的失真。水印由患者信息、医院标识和消息认证码组成,采用哈希函数计算。对水印进行早期BCH加密,以确保嵌入的数据无法被攻击者访问。
{"title":"NROI watermarking of medical images for content authentication","authors":"N. Memon, S. Gilani","doi":"10.1109/INMIC.2008.4777717","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777717","url":null,"abstract":"Medical image is usually comprised of region of interest (ROI) and non region of interest (NROI). ROI is the region that contains the important information from diagnosis point of view so it must be stored without any distortion. We have proposed a digital watermarking technique which avoids the distortion of image in ROI by embedding the watermark information in NROI. The watermark is comprised of patient information, hospital logo and message authentication code, computed using hash function. Earlier BCH encryption of watermark is performed to ensure inaccessibility of embedded data to the adversaries.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131878987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Blending Six Sigma and CMMI - an approach to accelerate process improvement in SMEs 融合六西格玛和希迈——一种加速中小企业流程改进的方法
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777768
M. Habib, Sanam Ahmed, Amna Rehmat, M. Khan, S. Shamail
Significant software process improvement (SPI) of any kind requires a substantial investment of effort, time and money on part of organizations that try to follow it. SPI based on capability maturity model integration (CMMI) is no exception and adopting it is even more challenging for many small and medium enterprises (SMEs). However, it is becoming increasingly important for SMEs to get involved in SPI initiatives to gain imperative competitive advantage and survive in the software industry. In this paper, we explain how SMEs can adopt CMMI by first tailoring it to suit their requirements and then blending the cut-down version with Six Sigma's define, measure, analyze, improve, and control (DMAIC) methodology to reduce the time required to attain CMMI maturity level 2 and 3. Moreover, we recommend standard templates and Six Sigma tools to maintain and control CMMI artifacts for different process areas (PAs). We show the effectiveness of our model by applying it on two PAs. Our proposed model is intended to accelerate CMMI adoption by SMEs and to help them compete better in the international market.
任何一种重要的软件过程改进(SPI)都需要对试图遵循它的组织投入大量的精力、时间和金钱。基于能力成熟度模型集成(CMMI)的SPI也不例外,对于许多中小型企业(sme)来说,采用它更具挑战性。然而,对于中小企业来说,参与SPI计划以获得必要的竞争优势并在软件行业中生存变得越来越重要。在本文中,我们解释了中小企业如何采用CMMI,首先对其进行裁剪以适应其需求,然后将缩减版本与六西格玛的定义、测量、分析、改进和控制(DMAIC)方法相结合,以减少达到CMMI成熟度级别2级和3级所需的时间。此外,我们推荐标准模板和六西格玛工具来维护和控制不同过程域(pa)的CMMI工件。我们通过将该模型应用于两个pa来证明该模型的有效性。我们提出的模型旨在加速中小企业对CMMI的采用,并帮助他们在国际市场上更好地竞争。
{"title":"Blending Six Sigma and CMMI - an approach to accelerate process improvement in SMEs","authors":"M. Habib, Sanam Ahmed, Amna Rehmat, M. Khan, S. Shamail","doi":"10.1109/INMIC.2008.4777768","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777768","url":null,"abstract":"Significant software process improvement (SPI) of any kind requires a substantial investment of effort, time and money on part of organizations that try to follow it. SPI based on capability maturity model integration (CMMI) is no exception and adopting it is even more challenging for many small and medium enterprises (SMEs). However, it is becoming increasingly important for SMEs to get involved in SPI initiatives to gain imperative competitive advantage and survive in the software industry. In this paper, we explain how SMEs can adopt CMMI by first tailoring it to suit their requirements and then blending the cut-down version with Six Sigma's define, measure, analyze, improve, and control (DMAIC) methodology to reduce the time required to attain CMMI maturity level 2 and 3. Moreover, we recommend standard templates and Six Sigma tools to maintain and control CMMI artifacts for different process areas (PAs). We show the effectiveness of our model by applying it on two PAs. Our proposed model is intended to accelerate CMMI adoption by SMEs and to help them compete better in the international market.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125978641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Query processing over relational databases with semantic cache: A survey 使用语义缓存的关系数据库上的查询处理:综述
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777801
M. Ahmad, M. Qadir, M. Sanaullah
Data access latency can be reduced for databases by using caching. Semantic caching enhances the performance of normal caching by locally answering the fully as well as partially overlapped queries. Efficient query processing and cache management are major challenges for semantic caching. Semantic caching demands efficient, correct and complete algorithms to process incoming queries. Query processing over semantic cache has been extensively studied by the researchers. In this paper, we have presented the survey of the existing techniques on query processing over semantic cache. We have defined a criterion to evaluate and analyze the query processing techniques. On the basis of defined criterion, analysis matrix is provided for quick insights on prominent features and limitations of query processing techniques. We have concluded that evaluated techniques are not capable of zero level query rejection and have large runtime complexity for handling queries. These deficiencies are the basic factors to decline the efficiency of query processing. The performance comparison of two techniques is also represented.
通过使用缓存可以减少数据库的数据访问延迟。语义缓存通过本地响应完全和部分重叠的查询来增强普通缓存的性能。高效的查询处理和缓存管理是语义缓存面临的主要挑战。语义缓存需要高效、正确和完整的算法来处理传入的查询。基于语义缓存的查询处理已经被研究者广泛研究。本文综述了基于语义缓存的查询处理技术。我们已经定义了一个标准来评估和分析查询处理技术。在定义标准的基础上,提供了分析矩阵,以便快速了解查询处理技术的突出特征和局限性。我们得出的结论是,评估的技术不能零级拒绝查询,并且在处理查询时具有很大的运行时复杂性。这些缺陷是导致查询处理效率下降的基本因素。并对两种技术的性能进行了比较。
{"title":"Query processing over relational databases with semantic cache: A survey","authors":"M. Ahmad, M. Qadir, M. Sanaullah","doi":"10.1109/INMIC.2008.4777801","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777801","url":null,"abstract":"Data access latency can be reduced for databases by using caching. Semantic caching enhances the performance of normal caching by locally answering the fully as well as partially overlapped queries. Efficient query processing and cache management are major challenges for semantic caching. Semantic caching demands efficient, correct and complete algorithms to process incoming queries. Query processing over semantic cache has been extensively studied by the researchers. In this paper, we have presented the survey of the existing techniques on query processing over semantic cache. We have defined a criterion to evaluate and analyze the query processing techniques. On the basis of defined criterion, analysis matrix is provided for quick insights on prominent features and limitations of query processing techniques. We have concluded that evaluated techniques are not capable of zero level query rejection and have large runtime complexity for handling queries. These deficiencies are the basic factors to decline the efficiency of query processing. The performance comparison of two techniques is also represented.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127494858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Investigating models of computational learning theory 研究计算学习理论的模型
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777774
S. Hussain
This paper presents some of the important models (frameworks) in computational learning theory such as learning in the limit, learning from queries and entailment and probably approximately correct learning.
本文介绍了计算学习理论中一些重要的模型(框架),如极限学习、查询学习和蕴涵学习以及近似正确学习。
{"title":"Investigating models of computational learning theory","authors":"S. Hussain","doi":"10.1109/INMIC.2008.4777774","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777774","url":null,"abstract":"This paper presents some of the important models (frameworks) in computational learning theory such as learning in the limit, learning from queries and entailment and probably approximately correct learning.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125677892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A simulation study of Block Acknowledgements and TXOPs under varying channel conditions 不同信道条件下块确认和TXOPs的仿真研究
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777750
R. Faruqui, S. Ghani
The acknowledgment schemes of legacy 802.11 do not support optimized performance due to high overheads. The performance further deteriorates for real time traffic. Transmission opportunity (TXOP) mechanism and Block Acknowledgements (Acks) were later introduced to facilitate improved performance in 802.11e. In this paper we aim to prove the effectiveness of both TXOP and Block Ack and analyze their effects under varying channel conditions through simulations carried out in NS-2.
由于开销高,遗留802.11的确认方案不支持优化的性能。对于实时流量,性能进一步恶化。后来引入了传输机会(TXOP)机制和块确认(ack),以促进802.11e中的性能改进。在本文中,我们旨在通过在NS-2中进行的仿真来证明TXOP和Block Ack的有效性,并分析它们在不同信道条件下的效果。
{"title":"A simulation study of Block Acknowledgements and TXOPs under varying channel conditions","authors":"R. Faruqui, S. Ghani","doi":"10.1109/INMIC.2008.4777750","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777750","url":null,"abstract":"The acknowledgment schemes of legacy 802.11 do not support optimized performance due to high overheads. The performance further deteriorates for real time traffic. Transmission opportunity (TXOP) mechanism and Block Acknowledgements (Acks) were later introduced to facilitate improved performance in 802.11e. In this paper we aim to prove the effectiveness of both TXOP and Block Ack and analyze their effects under varying channel conditions through simulations carried out in NS-2.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133006813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Observer-based fuzzy control of a three phase four wire PWM inverter 基于观测器的三相四线PWM逆变器模糊控制
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777702
Abolfazl Jalilvand, M. Kiamini, H. Moradipour
It is necessary for control of a PWM inverter to consider the sinusoidal transient effect and the load unbalances distribution. This paper propose a new control method for a three phase four wire PWM inverter having an output LC filter to achieve the three phase sinusoidal voltage. An observer used to predict and estimate the state variables for one step ahead. A fuzzy controller has been used to improve the performance of the inverter and to eliminate the disturbance. The simulation results for various operation conditions demonstrate the superior performance of the proposed technique.
PWM逆变器的控制必须考虑正弦暂态效应和负载不平衡分布。本文提出了一种采用输出LC滤波器的三相四线PWM逆变器控制三相正弦电压的新方法。一种用于预测和估计前一步状态变量的观测器。为了提高逆变器的性能并消除干扰,采用了模糊控制器。各种工况下的仿真结果表明了该技术的优越性。
{"title":"Observer-based fuzzy control of a three phase four wire PWM inverter","authors":"Abolfazl Jalilvand, M. Kiamini, H. Moradipour","doi":"10.1109/INMIC.2008.4777702","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777702","url":null,"abstract":"It is necessary for control of a PWM inverter to consider the sinusoidal transient effect and the load unbalances distribution. This paper propose a new control method for a three phase four wire PWM inverter having an output LC filter to achieve the three phase sinusoidal voltage. An observer used to predict and estimate the state variables for one step ahead. A fuzzy controller has been used to improve the performance of the inverter and to eliminate the disturbance. The simulation results for various operation conditions demonstrate the superior performance of the proposed technique.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121235811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of switch resistance on comparator-based switched-capacitor circuits 开关电阻对比较器开关电容电路的影响
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777792
F. A. Parsan, A. Ayatollahi
Effect of switch resistance on comparator-based switched-capacitor (CBSC) circuits is investigated. It is shown that the switch size is a critical issue in CBSC circuits due to the uncontinuous nature of their charge transfer phase. The problem that arises from switches with high resistivity is described and a simple circuit-based solution is provided to obviate this problem.
研究了开关电阻对基于比较器的开关电容(CBSC)电路的影响。研究表明,由于电荷转移相位的不连续特性,开关尺寸在CBSC电路中是一个关键问题。描述了由高电阻率开关引起的问题,并提供了一种简单的基于电路的解决方案来避免这个问题。
{"title":"Effect of switch resistance on comparator-based switched-capacitor circuits","authors":"F. A. Parsan, A. Ayatollahi","doi":"10.1109/INMIC.2008.4777792","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777792","url":null,"abstract":"Effect of switch resistance on comparator-based switched-capacitor (CBSC) circuits is investigated. It is shown that the switch size is a critical issue in CBSC circuits due to the uncontinuous nature of their charge transfer phase. The problem that arises from switches with high resistivity is described and a simple circuit-based solution is provided to obviate this problem.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114300636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-part: A technique for privacy protection in databases 数据部分:一种在数据库中保护隐私的技术
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777735
A. Gupta, A. Sunsunwal, S. Singhal
In order to protect individuals' privacy, the technique of k-anonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. Datafly is one such technique which generalizes the information up to a level in such a way that each individual is hidden among at least k-1 other individuals. But this technique sometimes over distorts the data which may render it useless for statistical and research purposes. In this paper, we present a method called ldquoData-Partrdquo, based on ldquoDataflyrdquo, but with certain modifications, which tries to minimize the distortion of data while still maintaining adequate privacy protection. We prove it through results and experiments at the end of this paper.
为了保护个人隐私,提出了k-匿名化技术,将敏感属性从对应的标识符中去关联。Datafly就是这样一种技术,它将信息一般化到一定程度,使每个个体都隐藏在至少k-1个其他个体中。但这种技术有时会过度扭曲数据,使其对统计和研究目的毫无用处。在本文中,我们提出了一种名为ldquoData-Partrdquo的方法,该方法基于ldquoDataflyrdquo,但进行了一定的修改,试图在保持足够隐私保护的同时最小化数据失真。本文最后通过结果和实验证明了这一点。
{"title":"Data-part: A technique for privacy protection in databases","authors":"A. Gupta, A. Sunsunwal, S. Singhal","doi":"10.1109/INMIC.2008.4777735","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777735","url":null,"abstract":"In order to protect individuals' privacy, the technique of k-anonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. Datafly is one such technique which generalizes the information up to a level in such a way that each individual is hidden among at least k-1 other individuals. But this technique sometimes over distorts the data which may render it useless for statistical and research purposes. In this paper, we present a method called ldquoData-Partrdquo, based on ldquoDataflyrdquo, but with certain modifications, which tries to minimize the distortion of data while still maintaining adequate privacy protection. We prove it through results and experiments at the end of this paper.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122936895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterization of waveguide slots using full wave EM analysis software HFSS 利用全波电磁分析软件HFSS表征波导槽
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777713
S.H. Dar, Z. Ahmed, M. bin Ihsan
In this paper design curves have been investigated for broad wall longitudinal radiating slot and centered-inclined coupling slot in a Ku-band waveguide WR51 using an FEM based full wave EM analysis software, HFSS. These curves have application in the design of waveguide slot arrays. Two waveguide-fed planar slot arrays have been designed using these curves and HFSS was used to simulate the performances of these array antennas before experimental testing. Measured gain pattern and input return loss of the arrays are in good agreement with those simulated by HFSS. The performance of these arrays validates the design curves and also depicts the power of HFSS. In waveguide-fed planar slot arrays designed in standard waveguide WR51 the coupling slots could not be spaced lambdag/2 apart because of physical constraints; which limits the bandwidth of the array antenna. Therefore, for larger bandwidth applications it is necessary to overcome this physical constraint. Accurate centre frequency and enhanced bandwidth has been achieved by designing an array antenna in a custom waveguide.
本文利用基于有限元的全波电磁分析软件HFSS对ku波段波导WR51宽壁纵向辐射槽和中心倾斜耦合槽的设计曲线进行了研究。这些曲线在波导缝隙阵列的设计中具有一定的应用价值。利用这些曲线设计了两种波导馈电平面缝隙阵列,并在实验测试前利用HFSS对阵列天线的性能进行了仿真。测量的阵列增益图和输入回波损耗与HFSS模拟结果吻合较好。这些阵列的性能验证了设计曲线,也描述了HFSS的功率。在标准波导WR51设计的波导馈电平面槽阵中,由于物理条件的限制,耦合槽不能以λ /2为间隔;这限制了阵列天线的带宽。因此,对于较大带宽的应用,有必要克服这个物理限制。通过在定制波导中设计阵列天线,实现了精确的中心频率和增强的带宽。
{"title":"Characterization of waveguide slots using full wave EM analysis software HFSS","authors":"S.H. Dar, Z. Ahmed, M. bin Ihsan","doi":"10.1109/INMIC.2008.4777713","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777713","url":null,"abstract":"In this paper design curves have been investigated for broad wall longitudinal radiating slot and centered-inclined coupling slot in a Ku-band waveguide WR51 using an FEM based full wave EM analysis software, HFSS. These curves have application in the design of waveguide slot arrays. Two waveguide-fed planar slot arrays have been designed using these curves and HFSS was used to simulate the performances of these array antennas before experimental testing. Measured gain pattern and input return loss of the arrays are in good agreement with those simulated by HFSS. The performance of these arrays validates the design curves and also depicts the power of HFSS. In waveguide-fed planar slot arrays designed in standard waveguide WR51 the coupling slots could not be spaced lambdag/2 apart because of physical constraints; which limits the bandwidth of the array antenna. Therefore, for larger bandwidth applications it is necessary to overcome this physical constraint. Accurate centre frequency and enhanced bandwidth has been achieved by designing an array antenna in a custom waveguide.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114172826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2008 IEEE International Multitopic Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1