首页 > 最新文献

2014 International Conference on Emerging Technologies (ICET)最新文献

英文 中文
A bi-directional prototype mobile robot to experiment light scale object-transportation schemes 用于实验轻尺度物体运输方案的双向移动机器人原型
Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021030
Muhammad Bilal Khan, Muhammad Awais Hussain, K. Shahzad, Sajid Nawaz, Muhammad Umar Touseef, Raja Jawad Ali Khan
In this paper, we present the control and implementation schemes of a bi-directional prototype mobile robot for doing the repetitive tasks. The robot was built with the fundamental capabilities like autonomous navigation and autonomous decision making during the path planning stages. Different sensors were used for the acquisition of the useful data from the surroundings of the robot. Robot's mechanical structure was supporting the overall scheme of its use as a basic service transportation robot. A solid gripper was used in order to pick desired objects inside an arena. The prototype robot successfully managed to complete the tasks assigned to it with the given scenarios.
在本文中,我们提出了一个双向原型移动机器人的控制和实现方案。该机器人在路径规划阶段具有自主导航和自主决策等基本能力。利用不同的传感器从机器人周围环境中获取有用的数据。机器人的机械结构支撑了其作为基础服务运输机器人使用的总体方案。为了在竞技场中挑选所需的物品,使用了一个坚固的抓手。原型机器人在给定的场景下成功地完成了分配给它的任务。
{"title":"A bi-directional prototype mobile robot to experiment light scale object-transportation schemes","authors":"Muhammad Bilal Khan, Muhammad Awais Hussain, K. Shahzad, Sajid Nawaz, Muhammad Umar Touseef, Raja Jawad Ali Khan","doi":"10.1109/ICET.2014.7021030","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021030","url":null,"abstract":"In this paper, we present the control and implementation schemes of a bi-directional prototype mobile robot for doing the repetitive tasks. The robot was built with the fundamental capabilities like autonomous navigation and autonomous decision making during the path planning stages. Different sensors were used for the acquisition of the useful data from the surroundings of the robot. Robot's mechanical structure was supporting the overall scheme of its use as a basic service transportation robot. A solid gripper was used in order to pick desired objects inside an arena. The prototype robot successfully managed to complete the tasks assigned to it with the given scenarios.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129493212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis of VoIP architecture for identifying SIP vulnerabilities 基于SIP漏洞的VoIP体系结构安全分析
Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021022
U. Rehman, Abdul Ghafoor Abbasi
Voice over Internet Protocol (VoIP) is an emerging technology that changes the way of communication services over IP networks. It provides flexible and low cost services to the users, which make it more popular than the existing Public Switch Telephone Network (PSTN). With the popularity of this technology, it became targeted victim of different attacks. In this paper we analyzed VoIP architecture, both theoretically and practically with more emphasizes on security of Session Initiation Protocol (SIP). In order to analyze theoretically, we performed a literature survey related to SIP security and classified it in term of existing SIP attacks and defenses. Our theoretical analysis reveals that most attacks on VoIP architecture were successful due to weaknesses of SIP, especially the authentication mechanism used in the session establishment phase. For practical analysis, we used open source Asterisk and pen-test it in different attacking scenarios using Kali Linux distribution. Our practical analysis studies revealed that open source asterisk server is still vulnerable to several attacks, which includes eavesdropping, intentional interruption, social threats, interception and modification, and unintentional interruption. We also provide a concise mitigating scheme based on Single Sign-On (SSO), which provides an efficient and reliable authentication mechanism for securing SIP.
VoIP (Voice over Internet Protocol)是一种改变IP网络通信方式的新兴技术。它为用户提供灵活和低成本的服务,使其比现有的PSTN (Public Switch Telephone Network)更受欢迎。随着这项技术的普及,它成为了各种攻击的目标。本文从理论和实践两方面分析了VoIP的体系结构,重点分析了SIP协议的安全性。为了从理论上进行分析,我们对SIP安全的相关文献进行了调查,并根据现有的SIP攻击和防御进行了分类。我们的理论分析表明,由于SIP的弱点,特别是在会话建立阶段使用的身份验证机制,大多数对VoIP架构的攻击都是成功的。为了进行实际分析,我们使用了开源的Asterisk,并使用Kali Linux发行版在不同的攻击场景中对其进行了渗透测试。我们的实际分析研究表明,开源星号服务器仍然容易受到多种攻击,包括窃听、故意中断、社会威胁、拦截和修改以及无意中断。我们还提供了一种简洁的基于单点登录(SSO)的缓解方案,该方案为保护SIP提供了一种高效可靠的身份验证机制。
{"title":"Security analysis of VoIP architecture for identifying SIP vulnerabilities","authors":"U. Rehman, Abdul Ghafoor Abbasi","doi":"10.1109/ICET.2014.7021022","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021022","url":null,"abstract":"Voice over Internet Protocol (VoIP) is an emerging technology that changes the way of communication services over IP networks. It provides flexible and low cost services to the users, which make it more popular than the existing Public Switch Telephone Network (PSTN). With the popularity of this technology, it became targeted victim of different attacks. In this paper we analyzed VoIP architecture, both theoretically and practically with more emphasizes on security of Session Initiation Protocol (SIP). In order to analyze theoretically, we performed a literature survey related to SIP security and classified it in term of existing SIP attacks and defenses. Our theoretical analysis reveals that most attacks on VoIP architecture were successful due to weaknesses of SIP, especially the authentication mechanism used in the session establishment phase. For practical analysis, we used open source Asterisk and pen-test it in different attacking scenarios using Kali Linux distribution. Our practical analysis studies revealed that open source asterisk server is still vulnerable to several attacks, which includes eavesdropping, intentional interruption, social threats, interception and modification, and unintentional interruption. We also provide a concise mitigating scheme based on Single Sign-On (SSO), which provides an efficient and reliable authentication mechanism for securing SIP.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132022171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Oppel-2: A new family of FCSR-based stream ciphers Oppel-2:一个新的基于fcsr的流密码家族
Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021020
Arshad Ali
This paper presents a new family of secure, small and fast stream ciphers referred to as Oppel-2. Oppel-2 uses Feedback with Carry Shift Registers in combination with an output function to produce pseudorandom keystream. Members of Oppel-2 family of ciphers can also be tailored for different applications to meet their implementation constraints while providing required level of security. The paper defines three instances of Oppel-2, which are referred to as Oppel-2 V0, Oppel-2 V1 and Oppel-2 V2. These instances of Oppel-2 provide security of 264, 280 and 2128 primitive operations, respectively. The paper also shows that Oppel-2 is immune to linearisation attacks, which are considered as most effective attacks against those ciphers whose theory depends upon properties of 2-adic numbers. In addition the paper also presents a security strength analysis of Oppel-2 against various other types of attacks. This analysis shows that Oppel-2 family of ciphers is suitable for implementation in practical applications.
本文提出了一种新的安全、小巧、快速的流密码,称为Oppel-2。Oppel-2使用带有进位移位寄存器的反馈与输出函数相结合来产生伪随机密钥流。Oppel-2密码家族的成员还可以针对不同的应用程序进行定制,以满足其实现限制,同时提供所需的安全级别。本文定义了Oppel-2的三个实例,分别称为Oppel-2 V0、Oppel-2 V1和Oppel-2 V2。Oppel-2的这些实例分别提供264、280和2128个基本操作的安全性。本文还证明了Oppel-2不受线性化攻击的影响,线性化攻击被认为是针对那些理论依赖于2进数性质的密码的最有效攻击。此外,本文还对Oppel-2在各种攻击下的安全强度进行了分析。分析表明,Oppel-2系列密码适合在实际应用中实现。
{"title":"Oppel-2: A new family of FCSR-based stream ciphers","authors":"Arshad Ali","doi":"10.1109/ICET.2014.7021020","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021020","url":null,"abstract":"This paper presents a new family of secure, small and fast stream ciphers referred to as Oppel-2. Oppel-2 uses Feedback with Carry Shift Registers in combination with an output function to produce pseudorandom keystream. Members of Oppel-2 family of ciphers can also be tailored for different applications to meet their implementation constraints while providing required level of security. The paper defines three instances of Oppel-2, which are referred to as Oppel-2 V0, Oppel-2 V1 and Oppel-2 V2. These instances of Oppel-2 provide security of 264, 280 and 2128 primitive operations, respectively. The paper also shows that Oppel-2 is immune to linearisation attacks, which are considered as most effective attacks against those ciphers whose theory depends upon properties of 2-adic numbers. In addition the paper also presents a security strength analysis of Oppel-2 against various other types of attacks. This analysis shows that Oppel-2 family of ciphers is suitable for implementation in practical applications.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Throughput optimization for Cognitive Radio while bulwarking Primary User 认知无线电的吞吐量优化,同时保护主用户
Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021025
Zunnorain Amer Ali Baig, A. Malik, I. Qureshi
Electromagnetic spectrum, a natural limited resource, with the boom in applications of wireless communications, that limited resource is becoming congested more and more and the only solution for efficient spectrum utilization is Cognitive Radios, moreover spectrum sensing is the most irrefutably functionality in CRs and with spectrum sensing, throughput for secondary user's transmission plays an important role. In this paper after performing spectrum sensing using energy detection scheme, we have achieved the optimized throughput for Secondary User by ensuring the protection of Primary User's rights. For a total time in a frame, least time for sensing is desired and the residual time in that frame is used for transmission. Two parameters related to sensing are fallacious alarm probability and detection probability pertaining to secondary and primary users correspondingly, greater the probability of detection, more the licensed user's rights are protected, smaller the fallacious alarm probability, greater chance of using the underutilized band, applying the most famous technique known as energy detection scheme. In this paper we studied the problem of conniving sensing time in order to achieve maximum and optimal transmission time for secondary user keeping the restraint that licensed user is adequately bulwarked. Maximum achievable throughput was achieved with least sensing time, not achieved in previous work.
电磁频谱是一种天然有限的资源,随着无线通信应用的蓬勃发展,有限的资源越来越拥挤,有效利用频谱的唯一解决方案是认知无线电,而频谱感知是CRs中最重要的功能,有了频谱感知,二次用户的传输吞吐量就起着重要的作用。本文采用能量检测方案进行频谱感知,在保证主用户权益保护的前提下,实现了从用户吞吐量的优化。对于一帧中的总时间,期望用于传感的时间最少,并将该帧中的剩余时间用于传输。与传感相关的两个参数分别是辅助用户和主用户的误报概率和检测概率,检测概率越大,授权用户的权利越受保护,误报概率越小,使用未充分利用的频带的机会越大,应用了最著名的能量检测方案。本文研究了在充分保护许可用户约束的前提下,为实现二次用户的最大和最优传输时间而控制感知时间的问题。以最少的感知时间实现了最大可达吞吐量,这是以往工作所没有的。
{"title":"Throughput optimization for Cognitive Radio while bulwarking Primary User","authors":"Zunnorain Amer Ali Baig, A. Malik, I. Qureshi","doi":"10.1109/ICET.2014.7021025","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021025","url":null,"abstract":"Electromagnetic spectrum, a natural limited resource, with the boom in applications of wireless communications, that limited resource is becoming congested more and more and the only solution for efficient spectrum utilization is Cognitive Radios, moreover spectrum sensing is the most irrefutably functionality in CRs and with spectrum sensing, throughput for secondary user's transmission plays an important role. In this paper after performing spectrum sensing using energy detection scheme, we have achieved the optimized throughput for Secondary User by ensuring the protection of Primary User's rights. For a total time in a frame, least time for sensing is desired and the residual time in that frame is used for transmission. Two parameters related to sensing are fallacious alarm probability and detection probability pertaining to secondary and primary users correspondingly, greater the probability of detection, more the licensed user's rights are protected, smaller the fallacious alarm probability, greater chance of using the underutilized band, applying the most famous technique known as energy detection scheme. In this paper we studied the problem of conniving sensing time in order to achieve maximum and optimal transmission time for secondary user keeping the restraint that licensed user is adequately bulwarked. Maximum achievable throughput was achieved with least sensing time, not achieved in previous work.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129786502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vibration-based electromagnetic type energy harvester for bridge monitoring sensor application 基于振动的电磁式能量采集器用于桥梁监测传感器
Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021029
F. Khan, I. Ahmad
Fabrication and experimentation of vibration-based electromagnetic energy harvester is reported in this research paper. Energy harvester with both planar and wound coils have been developed and characterized under sinusoidal excitation. Energy harvester consists of two permanent magnets residing on a Latex membrane, two double sided PCB fabricated planar coils, Teflon spacers for providing gap between the permanent magnets and planar coils, and wound coils mounted on sides of Teflon spacers. When the harvester is subjected to vibration, due to the relative movement between the magnets and coils, the coils experience the change in magnetic flux density which causes an emf to generate at the coils terminals. Energy harvester has a dimension of 18 mm × 18 mm. Prototype has been characterized under sinusoidal excitation and are subjected to frequency sweep from 10 to 80 Hz at acceleration levels of 0.3 g, 0.5 g, 1 g, 2 g and 3 g. Single planar and wound coil of prototype generates an open circuit voltage of 15.7 mV and 11.05 mV respectively at 3 g and at resonant frequency 27 Hz. When excited at resonance and 3 g base acceleration a load power of 1.8 μW and 2.1 μW is obtained from single planar and wound coil respectively under matching impedance conditions for prototype.
本文报道了基于振动的电磁能量采集器的研制与实验。研制了平面线圈和绕线线圈两种能量采集器,并对其在正弦激励下的特性进行了表征。能量收集器由两个位于乳胶膜上的永磁体、两个双面PCB制造的平面线圈、用于在永磁体和平面线圈之间提供间隙的特氟龙垫片以及安装在特氟龙垫片两侧的缠绕线圈组成。当收割机受到振动时,由于磁铁和线圈之间的相对运动,线圈经历磁通量密度的变化,导致在线圈端子处产生电动势。能量采集器的尺寸为18毫米× 18毫米。原型在正弦激励下进行了表征,并在0.3 g, 0.5 g, 1 g, 2 g和3 g的加速度水平下进行了10至80 Hz的频率扫描。样机的单平面线圈和绕线线圈在3g和谐振频率27 Hz时分别产生15.7 mV和11.05 mV的开路电压。在与样机阻抗匹配的条件下,以共振和3g基极加速度激励时,单平面线圈和绕线线圈的负载功率分别为1.8 μW和2.1 μW。
{"title":"Vibration-based electromagnetic type energy harvester for bridge monitoring sensor application","authors":"F. Khan, I. Ahmad","doi":"10.1109/ICET.2014.7021029","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021029","url":null,"abstract":"Fabrication and experimentation of vibration-based electromagnetic energy harvester is reported in this research paper. Energy harvester with both planar and wound coils have been developed and characterized under sinusoidal excitation. Energy harvester consists of two permanent magnets residing on a Latex membrane, two double sided PCB fabricated planar coils, Teflon spacers for providing gap between the permanent magnets and planar coils, and wound coils mounted on sides of Teflon spacers. When the harvester is subjected to vibration, due to the relative movement between the magnets and coils, the coils experience the change in magnetic flux density which causes an emf to generate at the coils terminals. Energy harvester has a dimension of 18 mm × 18 mm. Prototype has been characterized under sinusoidal excitation and are subjected to frequency sweep from 10 to 80 Hz at acceleration levels of 0.3 g, 0.5 g, 1 g, 2 g and 3 g. Single planar and wound coil of prototype generates an open circuit voltage of 15.7 mV and 11.05 mV respectively at 3 g and at resonant frequency 27 Hz. When excited at resonance and 3 g base acceleration a load power of 1.8 μW and 2.1 μW is obtained from single planar and wound coil respectively under matching impedance conditions for prototype.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126651180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A novel vehicle-to-grid technology with constraint analysis-a review 一种基于约束分析的车辆到电网新技术综述
Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021019
S. Habib, M. Kamran
This paper presents a detailed review of a vehicle-to-grid (V2G) technology, and analyzes its impacts on power distribution networks. It is shown in this study that a vehicle, equipped with the ability of a V2G application, offers various features such as regulation of active power, support for reactive power, load balancing, current harmonics filtering etc. These features can enable ancillary services including, spinning reserve and control of voltage and frequency. However, the technology of V2G also creates challenging issues, for instance, degradation of batteries, communication overhead between an EV and a grid, changes in whole infrastructure of a distribution network (DN). This paper shows the present scenarios and analyze the impact of implementation V2G & G2V modes on DNs. V2G system have an impact on major factors of electric grid like reliability, efficiency, losses, and system stability. Our study also shows that the economic benefits of a V2G technology heavily depend on the strategies of charging and vehicle aggregation.
本文详细介绍了车辆到电网(V2G)技术,并分析了其对配电网的影响。本研究表明,配备V2G应用程序能力的车辆提供各种功能,如有功功率调节,无功功率支持,负载平衡,电流谐波滤波等。这些功能可以实现辅助服务,包括旋转储备和控制电压和频率。然而,V2G技术也带来了一些具有挑战性的问题,例如,电池的退化、电动汽车和电网之间的通信开销、配电网络(DN)整体基础设施的变化。本文展示了目前的场景,并分析了实施V2G和G2V模式对DNs的影响。V2G系统对电网的可靠性、效率、损耗和系统稳定性等主要因素产生影响。我们的研究还表明,V2G技术的经济效益在很大程度上取决于充电和车辆聚集的策略。
{"title":"A novel vehicle-to-grid technology with constraint analysis-a review","authors":"S. Habib, M. Kamran","doi":"10.1109/ICET.2014.7021019","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021019","url":null,"abstract":"This paper presents a detailed review of a vehicle-to-grid (V2G) technology, and analyzes its impacts on power distribution networks. It is shown in this study that a vehicle, equipped with the ability of a V2G application, offers various features such as regulation of active power, support for reactive power, load balancing, current harmonics filtering etc. These features can enable ancillary services including, spinning reserve and control of voltage and frequency. However, the technology of V2G also creates challenging issues, for instance, degradation of batteries, communication overhead between an EV and a grid, changes in whole infrastructure of a distribution network (DN). This paper shows the present scenarios and analyze the impact of implementation V2G & G2V modes on DNs. V2G system have an impact on major factors of electric grid like reliability, efficiency, losses, and system stability. Our study also shows that the economic benefits of a V2G technology heavily depend on the strategies of charging and vehicle aggregation.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125623560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The Internet of Things: Challenges & security issues 物联网:挑战与安全问题
Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021016
G. Matharu, Priyanka Upadhyay, Lalita Chaudhary
Propelled by large-scale advances in wireless technologies, sensing technologies and communication technologies, the transformation of the Internet into an integrated network of things termed as Internet of Things is rapidly unfolding. The Internet of Things enabled by Wireless Sensor Networks (WSN) and RFID sensors finds a plethora of applications in almost all the fields such as health, education, transportation and agriculture. This paper briefs the idea of Internet of Things (IoT) and the challenges to its future growth. Also, this paper describes the general layered architecture of IoT along with its constituent elements. Further, the paper provides for a secure construction of the IoT architecture, by tackling security issues at each layer of the architecture. The paper concludes by mentioning the potential applications of the IoT technologies in fields ranging from intelligent transportation to smart home to e-health care and green agriculture.
在无线技术、传感技术、通信技术大规模发展的推动下,互联网向物联网(Internet of things)的转变正在迅速展开。无线传感器网络(WSN)和RFID传感器支持的物联网在医疗、教育、交通和农业等几乎所有领域都有大量应用。本文简要介绍了物联网(IoT)的概念及其未来发展面临的挑战。此外,本文还描述了物联网的一般分层架构及其组成元素。此外,本文通过解决架构每层的安全问题,提供了物联网架构的安全构建。文章最后提到了物联网技术在智能交通、智能家居、电子医疗和绿色农业等领域的潜在应用。
{"title":"The Internet of Things: Challenges & security issues","authors":"G. Matharu, Priyanka Upadhyay, Lalita Chaudhary","doi":"10.1109/ICET.2014.7021016","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021016","url":null,"abstract":"Propelled by large-scale advances in wireless technologies, sensing technologies and communication technologies, the transformation of the Internet into an integrated network of things termed as Internet of Things is rapidly unfolding. The Internet of Things enabled by Wireless Sensor Networks (WSN) and RFID sensors finds a plethora of applications in almost all the fields such as health, education, transportation and agriculture. This paper briefs the idea of Internet of Things (IoT) and the challenges to its future growth. Also, this paper describes the general layered architecture of IoT along with its constituent elements. Further, the paper provides for a secure construction of the IoT architecture, by tackling security issues at each layer of the architecture. The paper concludes by mentioning the potential applications of the IoT technologies in fields ranging from intelligent transportation to smart home to e-health care and green agriculture.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131185111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Electro-textile based wearable patch antenna on biodegradable poly lactic acid (PLA) plastic substrate for 2.45 GHz, ISM band applications 基于可降解聚乳酸(PLA)塑料基板的可穿戴贴片天线,适用于2.45 GHz ISM频段
Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021036
Haroon, S. Ullah, J. Flint
Biodegradable polymers and plastics are environment friendly because they decrease environmental pollution, conserve resources and reduce non-recyclable waste. Poly lactic acid (PLA) is a biodegradable plant derived polymer. Their properties are improved by copolymerization, blending, plasticization, polymer alloy technology and by development of composites techniques. These polymers can be used in computers, mobile phones, housing, textiles, optical, packaging films and bags. In this paper the feasibility of 1.7 and 3 mm thicker PLA as a substrate in wearable patch antenna is investigated. For comparison patch antenna on identically thicker (1.7 and 3 mm) FR-4 substrate is also simulated under the same conditions in CST Microwave Studio. The return loss, gain, directivity and efficiency of both antennas were compared on operating frequency of 2.45GHz. The proposed antenna employing PLA substrates give return losses of -21 and -22dB, gain of 6 and 6.14 dBi, directivity of 7.58 and 7.54dBi and efficiency of 59 and 70% on 1.7and 3mm thicker substrates respectively, while reference antenna using FR4 substrates results in return losses of -19 and -19.3dB, gain of 2.7 and 3.45dBi, directivity of 7.02 and 6.92 dBi and efficiency of 35and 43% for 1.7 and 3 mm thicker FR4 substrates.
可生物降解聚合物和塑料是环境友好型的,因为它们减少了环境污染,节约了资源,减少了不可回收的废物。聚乳酸(PLA)是一种可生物降解的植物衍生聚合物。通过共聚、共混、增塑、聚合物合金技术和复合材料技术的发展,提高了其性能。这些聚合物可用于电脑、移动电话、住房、纺织品、光学、包装薄膜和袋子。本文研究了1.7 mm和3mm厚PLA作为衬底用于可穿戴贴片天线的可行性。为了比较,在相同条件下,在CST Microwave Studio中对相同厚度(1.7 mm和3mm) FR-4基板上的贴片天线进行了仿真。在2.45GHz工作频率下,比较了两种天线的回波损耗、增益、指向性和效率。采用PLA基板的天线在1.7和3mm厚的基板上回波损耗分别为-21和-22dB,增益分别为6和6.14 dBi,方向性分别为7.58和7.54dBi,效率分别为59和70%,而采用FR4基板的参考天线在1.7和3mm厚的FR4基板上回波损耗分别为-19和-19.3dB,增益分别为2.7和3.45dBi,方向性分别为7.02和6.92 dBi,效率分别为35和43%。
{"title":"Electro-textile based wearable patch antenna on biodegradable poly lactic acid (PLA) plastic substrate for 2.45 GHz, ISM band applications","authors":"Haroon, S. Ullah, J. Flint","doi":"10.1109/ICET.2014.7021036","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021036","url":null,"abstract":"Biodegradable polymers and plastics are environment friendly because they decrease environmental pollution, conserve resources and reduce non-recyclable waste. Poly lactic acid (PLA) is a biodegradable plant derived polymer. Their properties are improved by copolymerization, blending, plasticization, polymer alloy technology and by development of composites techniques. These polymers can be used in computers, mobile phones, housing, textiles, optical, packaging films and bags. In this paper the feasibility of 1.7 and 3 mm thicker PLA as a substrate in wearable patch antenna is investigated. For comparison patch antenna on identically thicker (1.7 and 3 mm) FR-4 substrate is also simulated under the same conditions in CST Microwave Studio. The return loss, gain, directivity and efficiency of both antennas were compared on operating frequency of 2.45GHz. The proposed antenna employing PLA substrates give return losses of -21 and -22dB, gain of 6 and 6.14 dBi, directivity of 7.58 and 7.54dBi and efficiency of 59 and 70% on 1.7and 3mm thicker substrates respectively, while reference antenna using FR4 substrates results in return losses of -19 and -19.3dB, gain of 2.7 and 3.45dBi, directivity of 7.02 and 6.92 dBi and efficiency of 35and 43% for 1.7 and 3 mm thicker FR4 substrates.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122486511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A semantic rules & reasoning based approach for Diet and Exercise management for diabetics 基于语义规则和推理的糖尿病患者饮食和运动管理方法
Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021023
Irshad Faiz, H. Mukhtar, A. M. Qamar, Sharifullah Khan
Diabetes is a serious chronic disease and balance diet as well as regular exercise are leading important factors for diabetes control. Management of healthy diet and proper exercise involve many decision variables from different domains such as gender, weight, height, age, needed calories and nutrition values, preferences about food and exercise, clinical guidelines and current vital signs etc. We have implemented a semantic rules and reasoning based approach that generates diet and exercise recommendations for diabetes patients. The developed prototype application is named Semantic Healthcare Assistant for Diet and Exercise (SHADE). Individual ontologies are defined for different domains (person, disease, food and exercise) along with SWRL rules and then imported all into an integrated ontology. The integrated ontology semantically generates the recommendations as inferences based on data and rules by using Pellet reasoner. Each generated meal menu is a list of food items along with portion size such that food items are user's preferred and menu is personalized, healthy and balanced diet. Finally, SHADE recommends user's preferred activities as exercises along with duration and intensity.
糖尿病是一种严重的慢性疾病,平衡饮食和经常锻炼是控制糖尿病的重要因素。健康饮食和适当运动的管理涉及许多不同领域的决策变量,如性别、体重、身高、年龄、所需热量和营养价值、对食物和运动的偏好、临床指南和当前生命体征等。我们已经实现了一种基于语义规则和推理的方法,为糖尿病患者提供饮食和运动建议。开发的原型应用程序被命名为饮食和运动语义医疗保健助手(SHADE)。为不同的领域(人、疾病、食物和运动)定义单独的本体以及SWRL规则,然后将它们导入到集成的本体中。集成的本体使用Pellet推理器基于数据和规则在语义上生成推荐作为推理。每个生成的膳食菜单都是一个食物列表,以及食物的份量,这样的食物是用户的首选,菜单是个性化的,健康和均衡的饮食。最后,SHADE会推荐用户喜欢的运动以及持续时间和强度。
{"title":"A semantic rules & reasoning based approach for Diet and Exercise management for diabetics","authors":"Irshad Faiz, H. Mukhtar, A. M. Qamar, Sharifullah Khan","doi":"10.1109/ICET.2014.7021023","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021023","url":null,"abstract":"Diabetes is a serious chronic disease and balance diet as well as regular exercise are leading important factors for diabetes control. Management of healthy diet and proper exercise involve many decision variables from different domains such as gender, weight, height, age, needed calories and nutrition values, preferences about food and exercise, clinical guidelines and current vital signs etc. We have implemented a semantic rules and reasoning based approach that generates diet and exercise recommendations for diabetes patients. The developed prototype application is named Semantic Healthcare Assistant for Diet and Exercise (SHADE). Individual ontologies are defined for different domains (person, disease, food and exercise) along with SWRL rules and then imported all into an integrated ontology. The integrated ontology semantically generates the recommendations as inferences based on data and rules by using Pellet reasoner. Each generated meal menu is a list of food items along with portion size such that food items are user's preferred and menu is personalized, healthy and balanced diet. Finally, SHADE recommends user's preferred activities as exercises along with duration and intensity.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127907064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On the controllability of a sampled-data system under nonuniform sampling 非均匀采样下采样数据系统的可控性
Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021018
Muhammad Niaz Ahmad, G. Mustafa, Abdul Qayyum Khan, M. Rehan
In this paper, controllability of a sampled-data system under nonuniform sampling is investigated. The problem is motivated with the widespread networked and embedded control systems in which sampling periods may be varying and exact sampling instants are unknown. The continuous-time system is assumed to be controllable and a condition is derived for sampling intervals under which the resulting sampled-data system will also be controllable. The proposed condition requires lesser number of samples to make sampled system controllable as compared with the existing results.
研究了非均匀采样条件下采样数据系统的可控性问题。这个问题是由广泛的网络和嵌入式控制系统引起的,在这些系统中,采样周期可能是变化的,精确的采样时刻是未知的。假设连续时间系统是可控的,并推导了采样间隔的条件,在此条件下,所得到的采样数据系统也是可控的。与现有的结果相比,所提出的条件需要较少的样本数量来使被采样系统可控。
{"title":"On the controllability of a sampled-data system under nonuniform sampling","authors":"Muhammad Niaz Ahmad, G. Mustafa, Abdul Qayyum Khan, M. Rehan","doi":"10.1109/ICET.2014.7021018","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021018","url":null,"abstract":"In this paper, controllability of a sampled-data system under nonuniform sampling is investigated. The problem is motivated with the widespread networked and embedded control systems in which sampling periods may be varying and exact sampling instants are unknown. The continuous-time system is assumed to be controllable and a condition is derived for sampling intervals under which the resulting sampled-data system will also be controllable. The proposed condition requires lesser number of samples to make sampled system controllable as compared with the existing results.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"79 15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117245431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2014 International Conference on Emerging Technologies (ICET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1