首页 > 最新文献

2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)最新文献

英文 中文
Design, simulation and implementation of a self-oscillating control circuit to drive series resonant inverter feeding a brazing induction furnace 一种驱动串联谐振逆变器给焊感应炉自振荡控制电路的设计、仿真与实现
Mohammad Hameed Khazaal, Isam M. Abdulbaqi, R. Thejel
This research deals with the design and simulation of induction furnace power source (inverter) using MATLAB package. This source designed to lock on the resonant frequency of the load by using self-oscillating technique, also it has the capability to control the power supplied to the load using phase shift pulse width modulation (PSPWM) technique. These characteristics used to overcome the load nonlinear behavior during the brazing process and to achieve soft switching of the inverter elements. Also, the inverter has the capability to operate with or without load (workpiece). The implemented prototype operates at a frequency range (50-100)kHz and 10kW was successfully used for brazing two copper workpieces.
本研究利用MATLAB软件包进行感应炉电源(逆变器)的设计与仿真。该源采用自振荡技术锁定负载的谐振频率,并采用相移脉冲宽度调制(PSPWM)技术控制负载的电源供应。这些特性用于克服钎焊过程中负载的非线性行为,实现逆变器元件的软开关。此外,逆变器具有带负载或无负载(工件)运行的能力。实现的原型工作频率范围为(50-100)kHz和10kW,成功地用于钎焊两个铜工件。
{"title":"Design, simulation and implementation of a self-oscillating control circuit to drive series resonant inverter feeding a brazing induction furnace","authors":"Mohammad Hameed Khazaal, Isam M. Abdulbaqi, R. Thejel","doi":"10.1109/AIC-MITCSA.2016.7759932","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759932","url":null,"abstract":"This research deals with the design and simulation of induction furnace power source (inverter) using MATLAB package. This source designed to lock on the resonant frequency of the load by using self-oscillating technique, also it has the capability to control the power supplied to the load using phase shift pulse width modulation (PSPWM) technique. These characteristics used to overcome the load nonlinear behavior during the brazing process and to achieve soft switching of the inverter elements. Also, the inverter has the capability to operate with or without load (workpiece). The implemented prototype operates at a frequency range (50-100)kHz and 10kW was successfully used for brazing two copper workpieces.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125246259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A proposed identification method for multi-user chirp spread spectrum signals based on adaptive Neural-Fuzzy Inference System (ANFIS) 一种基于自适应神经模糊推理系统(ANFIS)的多用户啁啾扩频信号识别方法
S. Sadkhan, Ashwaq Q. Hameed, H. A. Hamed
Automatic identification of digitally modulated signal has to be able to identify the digitally modulated signal correctly and accurately. Importance of automatic identification of digitally modulated signals are rising increasingly. In this paper an advanced technique is presented, that automatically identifies the multi-user chirp modulated signals in Additive White Gaussian Noise (AWGN) channel. The proposed technique is implementing high order moments (fourth, sixth, and eighth) of detail coefficients of discrete wavelet transform (DWT) as a feature extraction set. Adaptive Neural-Fuzzy Inference System (ANFIS) is proposed as a classifier. The proposed identification procedure is capable of identifying multi-user chirp modulated signals with high accuracy at 0dB, 5dB, and 10dB Signal to Noise Ratio (SNR), over AWGN channel.
数字调制信号的自动识别必须能够正确、准确地识别数字调制信号。数字调制信号自动识别的重要性日益凸显。提出了一种自动识别加性高斯白噪声(AWGN)信道中多用户啁啾调制信号的方法。该技术将离散小波变换(DWT)细节系数的高阶矩(第四阶、第六阶和第八阶)作为特征提取集。提出了自适应神经模糊推理系统(ANFIS)作为分类器。所提出的识别程序能够在AWGN信道上以0dB、5dB和10dB的信噪比(SNR)高精度识别多用户啁啾调制信号。
{"title":"A proposed identification method for multi-user chirp spread spectrum signals based on adaptive Neural-Fuzzy Inference System (ANFIS)","authors":"S. Sadkhan, Ashwaq Q. Hameed, H. A. Hamed","doi":"10.1109/AIC-MITCSA.2016.7759940","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759940","url":null,"abstract":"Automatic identification of digitally modulated signal has to be able to identify the digitally modulated signal correctly and accurately. Importance of automatic identification of digitally modulated signals are rising increasingly. In this paper an advanced technique is presented, that automatically identifies the multi-user chirp modulated signals in Additive White Gaussian Noise (AWGN) channel. The proposed technique is implementing high order moments (fourth, sixth, and eighth) of detail coefficients of discrete wavelet transform (DWT) as a feature extraction set. Adaptive Neural-Fuzzy Inference System (ANFIS) is proposed as a classifier. The proposed identification procedure is capable of identifying multi-user chirp modulated signals with high accuracy at 0dB, 5dB, and 10dB Signal to Noise Ratio (SNR), over AWGN channel.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125244564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Using only two states of discrete HMM for high-speed face recognition 利用两种状态的离散HMM进行高速人脸识别
Hameed R. Farhan, Mahmuod H. Al-Muifraje, Thamir R. Saeed
This paper presents a simple and fast face recognition system based on two states of discrete Hidden Markov Model (HMM). The minimization in the number of states leads to high processing speed and less memory occupation. Median filter is applied to each image under process, where it is the most suitable filter used to eliminate the effect of noise on images, and thereby enhancing the performance of the system. The features are extracted from reduced size images using a combination of maximum variance and Singular Value Decomposition (SVD). More reduction in processing data is achieved by assigning a single value to each feature vector. This process greatly speeds up the training and classification steps, where a discrete type of left-to-right HMM is used in this work. Experimental results verify that the proposed work is superior to previous approaches of HMM face recognition, where it achieves 100% recognition rate, high speed, and extremely low memory usage.
提出了一种基于离散隐马尔可夫模型(HMM)两种状态的简单快速人脸识别系统。状态数量的最小化导致高处理速度和更少的内存占用。中值滤波器应用于处理中的每张图像,它是用来消除噪声对图像影响的最合适的滤波器,从而提高系统的性能。利用最大方差和奇异值分解(SVD)相结合的方法从缩小尺寸的图像中提取特征。通过为每个特征向量分配单个值,可以进一步减少处理数据。这个过程大大加快了训练和分类步骤,其中在这项工作中使用了离散类型的从左到右HMM。实验结果表明,该方法优于现有的HMM人脸识别方法,实现了100%的识别率、高速度和极低的内存占用。
{"title":"Using only two states of discrete HMM for high-speed face recognition","authors":"Hameed R. Farhan, Mahmuod H. Al-Muifraje, Thamir R. Saeed","doi":"10.1109/AIC-MITCSA.2016.7759939","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759939","url":null,"abstract":"This paper presents a simple and fast face recognition system based on two states of discrete Hidden Markov Model (HMM). The minimization in the number of states leads to high processing speed and less memory occupation. Median filter is applied to each image under process, where it is the most suitable filter used to eliminate the effect of noise on images, and thereby enhancing the performance of the system. The features are extracted from reduced size images using a combination of maximum variance and Singular Value Decomposition (SVD). More reduction in processing data is achieved by assigning a single value to each feature vector. This process greatly speeds up the training and classification steps, where a discrete type of left-to-right HMM is used in this work. Experimental results verify that the proposed work is superior to previous approaches of HMM face recognition, where it achieves 100% recognition rate, high speed, and extremely low memory usage.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125690969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Microcontroller — Controlled security door based on speech recognition 基于语音识别的单片机控制防盗门
Mohammed E. Safi, E. Abbas
This paper introduced an approach to design and implement a system to control opening of security door by means of the human voice to recognize the password. The aim of this paper is to recognize the speaker and the word to open the door to obtain more security by high recognition rate. This paper proposes Mel-Frequency Cepstral Coefficient (MFCC) technique as feature extraction combined with its first and second derivative including power computation of the speech frames that yields the total multi-dimensional of features, and classification or features matching using Dynamic Time Warping (DTW) which is a good method for computing the similarity between two sequences. The system was trained with three speakers each one have a private password and the test was conducted at twenty two different speakers. The recognition rate performance properly is 100 percent in the real time tests.
本文介绍了一种通过人声识别密码来控制防盗门开启的系统的设计与实现方法。本文的目的是通过对说话人和开门词的识别,以获得更高的识别率,从而获得更高的安全性。本文提出了Mel-Frequency Cepstral Coefficient (MFCC)技术作为一阶导数和二阶导数相结合的特征提取技术,包括对语音帧进行功率计算,得到特征的总多维度,并使用动态时间扭曲(DTW)进行分类或特征匹配,这是一种计算两个序列之间相似度的好方法。该系统由三个扬声器进行训练,每个扬声器都有一个私人密码,测试在22个不同的扬声器上进行。在实时测试中,识别率表现良好,达到100%。
{"title":"Microcontroller — Controlled security door based on speech recognition","authors":"Mohammed E. Safi, E. Abbas","doi":"10.1109/AIC-MITCSA.2016.7759909","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759909","url":null,"abstract":"This paper introduced an approach to design and implement a system to control opening of security door by means of the human voice to recognize the password. The aim of this paper is to recognize the speaker and the word to open the door to obtain more security by high recognition rate. This paper proposes Mel-Frequency Cepstral Coefficient (MFCC) technique as feature extraction combined with its first and second derivative including power computation of the speech frames that yields the total multi-dimensional of features, and classification or features matching using Dynamic Time Warping (DTW) which is a good method for computing the similarity between two sequences. The system was trained with three speakers each one have a private password and the test was conducted at twenty two different speakers. The recognition rate performance properly is 100 percent in the real time tests.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129007757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A helical-shaped slot microstrip band pass filter based on SIW technology for WLAN and Bluetooth applications 一种基于SIW技术的螺旋形槽微带带通滤波器,用于WLAN和蓝牙应用
Aya N. Alkhafaji, A. Salim
A new compact wideband Substrate Integrated Waveguide (SIW) band pass filter utilizing of a helical-shaped slot is presented. This filter is consisting of four slots such that each one occupies a corner. Construction and evaluation of the proposed model have been done using the EM simulator of microwave studio suite from computer simulation technology (CST). The overall size of filter is 10 mm × 10 mm using a substrate with relative permittivity of 6 and height of 0.254 mm. This filter is designed to meet compact size, good return loss and low insertion loss. The obtained results exhibit a return loss below -40 dB and insertion loss approaching to 0 dB over the passband with a -3 dB fractional bandwidth of about 70% centered at 2.4 GHz. The simplicity gained with this structure led to freely control the position of the pass band through doing simple alterations of the helical-slots dimensions. As a result, this make the proposed filter candidate for operating in wireless applications like wireless local area network (WLAN) and Bluetooth applications.
提出了一种利用螺旋槽的新型紧凑型宽带基片集成波导(SIW)带通滤波器。该过滤器由四个槽组成,每个槽占据一个角落。利用计算机仿真技术(CST)的微波工作室套件的电磁模拟器对所提出的模型进行了构建和评估。滤波器的总体尺寸为10mm × 10mm,采用相对介电常数为6,高度为0.254 mm的衬底。该滤波器具有体积小、回波损耗好、插入损耗低的特点。结果表明,在2.4 GHz处,回波损耗低于-40 dB,插入损耗接近于0 dB, -3 dB分数带宽约为70%。这种结构的简单性使得通过简单地改变螺旋槽的尺寸就可以自由地控制通带的位置。因此,这使得所提出的滤波器可以在无线局域网(WLAN)和蓝牙应用等无线应用中运行。
{"title":"A helical-shaped slot microstrip band pass filter based on SIW technology for WLAN and Bluetooth applications","authors":"Aya N. Alkhafaji, A. Salim","doi":"10.1109/AIC-MITCSA.2016.7759952","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759952","url":null,"abstract":"A new compact wideband Substrate Integrated Waveguide (SIW) band pass filter utilizing of a helical-shaped slot is presented. This filter is consisting of four slots such that each one occupies a corner. Construction and evaluation of the proposed model have been done using the EM simulator of microwave studio suite from computer simulation technology (CST). The overall size of filter is 10 mm × 10 mm using a substrate with relative permittivity of 6 and height of 0.254 mm. This filter is designed to meet compact size, good return loss and low insertion loss. The obtained results exhibit a return loss below -40 dB and insertion loss approaching to 0 dB over the passband with a -3 dB fractional bandwidth of about 70% centered at 2.4 GHz. The simplicity gained with this structure led to freely control the position of the pass band through doing simple alterations of the helical-slots dimensions. As a result, this make the proposed filter candidate for operating in wireless applications like wireless local area network (WLAN) and Bluetooth applications.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129801145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A multi-purpose watermarking scheme based on hybrid of lifting wavelet transform and Arnold transform 一种基于提升小波变换和阿诺德变换混合的多用途水印方案
N. Abbas, S. M. S. Ahmad, Abd Rahman Bin Ramli, S. Parveen
This paper introduces a new multi-purpose image watermarking algorithm which based on a hybrid of lifting wavelet transform (LWT) and Arnold transform for copyright protection and image authentication. In the proposed scheme, the original image is first decomposed by LWT into four subbands. Then the robust watermark which is a binary logo image is decomposed by Discrete Wavelet Transform (DWT) as such only the high frequency subband of the watermark are embedded in the low frequency subband of the original image. The fragile watermark is block wise self-generated from the original image and scrambled using Arnold transform which is later embedded in the spatial domain of the robust watermarked image. Self-generated fragile watermark supports self-authentication with high localization, whereas scrambling the fragile watermark increases the security of the algorithm. On the other hand, the lifting scheme approaches have almost one half the amounts of operations compared to the DWT based approaches. The overall system has been tested against various attacks and the results demonstrated that the robust watermark can be decoded successively under each attack. In addition, the proposed algorithm can detect any tampering attempts.
提出了一种基于提升小波变换和阿诺德变换的多用途图像水印算法,用于版权保护和图像认证。在该方案中,首先通过LWT将原始图像分解为四个子带。然后利用离散小波变换(DWT)对二值标志图像进行鲁棒水印分解,使水印的高频子带嵌入到原图像的低频子带中;脆弱水印是由原始图像分块自生成的,并使用阿诺德变换进行置乱,然后嵌入到鲁棒水印图像的空域中。自生成脆弱水印支持自认证,具有较高的定位能力,而对脆弱水印进行置乱则提高了算法的安全性。另一方面,与基于DWT的方法相比,举升方案方法的操作量几乎是前者的一半。整个系统对各种攻击进行了测试,结果表明,在各种攻击下,鲁棒水印都能被连续解码。此外,该算法可以检测到任何篡改企图。
{"title":"A multi-purpose watermarking scheme based on hybrid of lifting wavelet transform and Arnold transform","authors":"N. Abbas, S. M. S. Ahmad, Abd Rahman Bin Ramli, S. Parveen","doi":"10.1109/AIC-MITCSA.2016.7759937","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759937","url":null,"abstract":"This paper introduces a new multi-purpose image watermarking algorithm which based on a hybrid of lifting wavelet transform (LWT) and Arnold transform for copyright protection and image authentication. In the proposed scheme, the original image is first decomposed by LWT into four subbands. Then the robust watermark which is a binary logo image is decomposed by Discrete Wavelet Transform (DWT) as such only the high frequency subband of the watermark are embedded in the low frequency subband of the original image. The fragile watermark is block wise self-generated from the original image and scrambled using Arnold transform which is later embedded in the spatial domain of the robust watermarked image. Self-generated fragile watermark supports self-authentication with high localization, whereas scrambling the fragile watermark increases the security of the algorithm. On the other hand, the lifting scheme approaches have almost one half the amounts of operations compared to the DWT based approaches. The overall system has been tested against various attacks and the results demonstrated that the robust watermark can be decoded successively under each attack. In addition, the proposed algorithm can detect any tampering attempts.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131169571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Internet of Things (IoT): Architecture and design 物联网(IoT):架构和设计
Ali A. Abed
IoT means making some of the things that we are using has the ability of Internet access (smart things). Anything that can be joined to it processing unit (microcontroller) and connected to the Internet is considered as things in the world of IoT. In IoT, the interconnected products should always be low-cost, so that we can flood the planet with IoT devices. The first step in building an IoT device is to figure out how it will communicate with the rest of the world. For example: A factory would need a large number of connected sensors and actuators scattered over a wide area. A wireless technology would be the best fit.
物联网意味着让我们使用的一些东西具有上网的能力(智能东西)。任何可以连接到它的处理单元(微控制器)并连接到互联网的东西都被认为是物联网世界中的东西。在物联网中,相互连接的产品应该始终是低成本的,这样我们就可以用物联网设备淹没地球。构建物联网设备的第一步是弄清楚它将如何与世界其他地方进行通信。例如:工厂需要大量的连接传感器和执行器,分散在广阔的区域。无线技术将是最合适的选择。
{"title":"Internet of Things (IoT): Architecture and design","authors":"Ali A. Abed","doi":"10.1109/AIC-MITCSA.2016.7759958","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759958","url":null,"abstract":"IoT means making some of the things that we are using has the ability of Internet access (smart things). Anything that can be joined to it processing unit (microcontroller) and connected to the Internet is considered as things in the world of IoT. In IoT, the interconnected products should always be low-cost, so that we can flood the planet with IoT devices. The first step in building an IoT device is to figure out how it will communicate with the rest of the world. For example: A factory would need a large number of connected sensors and actuators scattered over a wide area. A wireless technology would be the best fit.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Security evaluation of cryptosystems used in cloud networks 云网络中使用的密码系统的安全性评估
S. Sadkhan, F. Abdulraheem
Cloud networking is the next generation architecture of IT. Clouds are very complex architectures. They have a replicated thousands of times, and common functional units and can be reduced to simple primitives. many issues related to security were created by complexity of cloud networking as well as all aspects of Cloud networking. Data security is one of the most important issues. The Cloud usually has a one security architecture but has many customers with variety requests. There are new risks introduced by clouds, like multi-tenancy, virtualization and data outsourcing in additional to existing security risks related to Cloud service providers (CSPs) and cloud customers (CCs). information security and their conformity with cloud networking security challenges targeted by Several international and industrial standards. Since there is a continuous increase in the field of communication regarding advanced data, there is an increase in need for time and statistical overhead that is associated with the application of cryptographic. Parallelizing the computation of cryptographic algorithms on many-core computing platforms can be a promising approach to reduce the execution time and eventually the energy consumption of such algorithms. In this paper we will analyze and compare a some of cryptosystems security evaluation approaches worked in cloud networking environment and depended on variety parameters to explain these approaches and show how it work in the few last years with the great modifying in cloud and great data growing.
云网络是下一代IT架构。云是非常复杂的架构。它们具有数千次的复制,并且具有共同的功能单元,并且可以简化为简单的原语。许多与安全相关的问题是由云网络的复杂性以及云网络的所有方面造成的。数据安全是最重要的问题之一。云通常只有一个安全架构,但有许多客户,他们有各种各样的要求。除了与云服务提供商(csp)和云客户(cc)相关的现有安全风险之外,云还带来了新的风险,如多租户、虚拟化和数据外包。信息安全及其与多项国际和行业标准所针对的云网络安全挑战。由于与高级数据相关的通信领域不断增加,因此需要增加与加密应用相关的时间和统计开销。在多核计算平台上并行化加密算法的计算可能是一种很有前途的方法,可以减少此类算法的执行时间并最终减少能耗。在本文中,我们将分析和比较一些在云网络环境下工作的密码系统安全评估方法,并依赖于各种参数来解释这些方法,并展示它在过去几年随着云环境的巨大变化和大数据的增长是如何工作的。
{"title":"Security evaluation of cryptosystems used in cloud networks","authors":"S. Sadkhan, F. Abdulraheem","doi":"10.1109/AIC-MITCSA.2016.7759955","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759955","url":null,"abstract":"Cloud networking is the next generation architecture of IT. Clouds are very complex architectures. They have a replicated thousands of times, and common functional units and can be reduced to simple primitives. many issues related to security were created by complexity of cloud networking as well as all aspects of Cloud networking. Data security is one of the most important issues. The Cloud usually has a one security architecture but has many customers with variety requests. There are new risks introduced by clouds, like multi-tenancy, virtualization and data outsourcing in additional to existing security risks related to Cloud service providers (CSPs) and cloud customers (CCs). information security and their conformity with cloud networking security challenges targeted by Several international and industrial standards. Since there is a continuous increase in the field of communication regarding advanced data, there is an increase in need for time and statistical overhead that is associated with the application of cryptographic. Parallelizing the computation of cryptographic algorithms on many-core computing platforms can be a promising approach to reduce the execution time and eventually the energy consumption of such algorithms. In this paper we will analyze and compare a some of cryptosystems security evaluation approaches worked in cloud networking environment and depended on variety parameters to explain these approaches and show how it work in the few last years with the great modifying in cloud and great data growing.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114777557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Minimizing energy consumption in wireless sensor networks using modified genetic algorithm and an energy balance filter 利用改进的遗传算法和能量平衡滤波器最小化无线传感器网络的能量消耗
Zainab T. Alisa, Hussein A. Nassrullah
Clustering model in wireless sensor network is an efficient way to reduce the consumed power during the transmission of sensed data to the Base Station (BS). In this paper, an intelligent clustering protocol is proposed to minimize energy consumption and prolong network lifetime. The proposed protocol performs clustering with dynamic number of clusters depending on the nodes distribution and the field dimensions. The process of selecting the optimum number of clusters and electing the suitable cluster heads (CH) is done by using modified genetic algorithm. This work proposed a method to modify the genetic algorithm. The target of the genetic algorithm (fitness function) is to minimize the total energy consumed by all nodes in the round. Balancing the residual energy between the nodes is an important factor to prolong network lifetime. To ensure balancing in the sensors network, an energy filter was proposed to block low energy nodes from acting as cluster heads and select the remaining nodes as candidate CHs then the modified genetic system chooses the optimum CHs from the candidate CHs. The simulation results demonstrate that the proposed algorithm outperform the common clustering protocol in terms of network lifetime and energy consumption.
无线传感器网络中的聚类模型是一种有效降低感知数据向基站传输过程中功耗的方法。本文提出了一种最小化网络能耗和延长网络生命周期的智能聚类协议。该协议根据节点的分布和字段的维数动态地进行聚类。采用改进的遗传算法进行最优簇数的选择和簇首的选择。本文提出了一种改进遗传算法的方法。遗传算法(适应度函数)的目标是使回合中所有节点消耗的总能量最小。平衡节点间的剩余能量是延长网络寿命的重要因素。为了保证传感器网络的平衡,提出了一种能量滤波器,阻止低能量节点作为簇头,并选择剩余节点作为候选CHs,然后从候选CHs中选择最优CHs。仿真结果表明,该算法在网络生存时间和能耗方面都优于常用的聚类协议。
{"title":"Minimizing energy consumption in wireless sensor networks using modified genetic algorithm and an energy balance filter","authors":"Zainab T. Alisa, Hussein A. Nassrullah","doi":"10.1109/AIC-MITCSA.2016.7759947","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759947","url":null,"abstract":"Clustering model in wireless sensor network is an efficient way to reduce the consumed power during the transmission of sensed data to the Base Station (BS). In this paper, an intelligent clustering protocol is proposed to minimize energy consumption and prolong network lifetime. The proposed protocol performs clustering with dynamic number of clusters depending on the nodes distribution and the field dimensions. The process of selecting the optimum number of clusters and electing the suitable cluster heads (CH) is done by using modified genetic algorithm. This work proposed a method to modify the genetic algorithm. The target of the genetic algorithm (fitness function) is to minimize the total energy consumed by all nodes in the round. Balancing the residual energy between the nodes is an important factor to prolong network lifetime. To ensure balancing in the sensors network, an energy filter was proposed to block low energy nodes from acting as cluster heads and select the remaining nodes as candidate CHs then the modified genetic system chooses the optimum CHs from the candidate CHs. The simulation results demonstrate that the proposed algorithm outperform the common clustering protocol in terms of network lifetime and energy consumption.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Optimization of continuous sacrificial protection based using intelligent programming technique 基于智能编程技术的连续牺牲保护优化
M. Hafiz
The most effective method to overcome corrosion problem is Cathodic Protection (CP) which represents a control method in the steel piling corrosion. In this work the response surface methodology (RSM) of Intelligent Programming Technique is used to model the Cathodic Protection System (CPS) to predict the potential protected by finding the optimum factor levels of protection potential in Umm-Qasr port which satisfy the maximum potential protected. The RSM suggested Box-Behnken (BB) Design matrix structure for protection potential is output dependent variable and four input independent variables (resistivity, sacrificial anode alloy, distance between anode and cathode and cathode surface area), this matrix structure is statistically chosen. The optimum design of experiment (DOE) for steel wall was to carry out 27 experiment runs. This design can be used to assess the effect of factors on protection potential for SCPS and its reliable. This design can be used to predict the potential protected with optimum factor levels. The results shown the values of predicted potential which is obtained by the current technique less than the ideal value which required to protect the steel pilling of the port.
克服腐蚀问题最有效的方法是阴极保护,它代表了钢桩腐蚀的一种控制方法。本文采用智能编程技术的响应面法(RSM)对阴极保护系统(CPS)进行建模,通过寻找满足最大保护电位的Umm-Qasr端口保护电位的最佳因子水平来预测保护电位。RSM建议Box-Behnken (BB)设计矩阵结构,保护电位为输出因变量和4个输入自变量(电阻率、牺牲阳极合金、阳极阴极间距和阴极表面积),统计选择该矩阵结构。钢壁试验优化设计(DOE)进行了27次试验。该设计可用于评估影响SCPS防护潜力的因素及其可靠性。该设计可用于预测具有最佳因子水平的潜在保护。结果表明,目前技术所得到的预测电位值低于保护港口钢起球所需的理想电位值。
{"title":"Optimization of continuous sacrificial protection based using intelligent programming technique","authors":"M. Hafiz","doi":"10.1109/AIC-MITCSA.2016.7759923","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759923","url":null,"abstract":"The most effective method to overcome corrosion problem is Cathodic Protection (CP) which represents a control method in the steel piling corrosion. In this work the response surface methodology (RSM) of Intelligent Programming Technique is used to model the Cathodic Protection System (CPS) to predict the potential protected by finding the optimum factor levels of protection potential in Umm-Qasr port which satisfy the maximum potential protected. The RSM suggested Box-Behnken (BB) Design matrix structure for protection potential is output dependent variable and four input independent variables (resistivity, sacrificial anode alloy, distance between anode and cathode and cathode surface area), this matrix structure is statistically chosen. The optimum design of experiment (DOE) for steel wall was to carry out 27 experiment runs. This design can be used to assess the effect of factors on protection potential for SCPS and its reliable. This design can be used to predict the potential protected with optimum factor levels. The results shown the values of predicted potential which is obtained by the current technique less than the ideal value which required to protect the steel pilling of the port.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133722389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1