首页 > 最新文献

Proceedings of the International Conference on Information and Communication Technology - ICICT '19最新文献

英文 中文
Improved group key management with host mobility protocol in wireless mobile environment 改进了无线移动环境下基于主机移动协议的组密钥管理
N. Eya, H. Alhassan, A. Alabdullah, K. Hameed, M. Bin-Melha, R. Abd‐Alhameed
Group communication as an efficient communication mechanism, in recent years has become popular. This is due to the increase in group applications and services. Group communication ensures efficient delivery of packets from one source to multiple recipients or many sources to multiple recipients. Group key management in a wireless environment has been an interesting challenge with group communication because of insecure communication channel. The security and integrity of group communication in a wireless environment is a challenge. One of the challenges with group communication is the mobility of group members. Member mobility is a challenge when designing a group key management scheme. There have been several attempts that have been made to design a secure group key management for wireless environment. Not so many successful attempts have towards wireless mobile environments to explicitly address the various challenges with dynamic mobility issue between multiple networks. This research proposes a GKM scheme that tackles mobility in group communication. The protocol is analyzed to assess security and performance requirements. The size of the group variation, the mobility rate variation are carefully observed to determine the impact on the average of rekeying messages generated at every event and also 1-affects-n phenomenon. The results achieved, shows that the proposed protocol outperforms other popular solutions with less number of rekeying messages per event and also less number of affected members per event. Backward and Forward security are preserved for moving members.
群体沟通作为一种高效的沟通机制,近年来逐渐流行起来。这是由于群组应用程序和服务的增加。组通信可确保从一个源到多个接收方或从多个源到多个接收方的数据包的高效传递。由于通信信道不安全,无线环境下的组密钥管理一直是组通信面临的一个有趣挑战。无线环境下群通信的安全性和完整性是一个挑战。群体沟通的挑战之一是群体成员的流动性。在设计组密钥管理方案时,成员移动性是一个挑战。为了设计一种安全的无线环境组密钥管理系统,已经进行了多次尝试。在无线移动环境中,明确解决多个网络之间动态移动问题的各种挑战的成功尝试并不多。本研究提出一种GKM方案来解决群体沟通中的移动性问题。对协议进行分析以评估安全性和性能需求。仔细观察组的大小变化,移动率变化,以确定对在每个事件中生成的重键消息的平均影响,以及1-影响-n现象。所取得的结果表明,所提出的协议优于其他流行的解决方案,每个事件的更新消息数量较少,每个事件的受影响成员数量也较少。为移动成员保留了向后和向前安全性。
{"title":"Improved group key management with host mobility protocol in wireless mobile environment","authors":"N. Eya, H. Alhassan, A. Alabdullah, K. Hameed, M. Bin-Melha, R. Abd‐Alhameed","doi":"10.1145/3321289.3321301","DOIUrl":"https://doi.org/10.1145/3321289.3321301","url":null,"abstract":"Group communication as an efficient communication mechanism, in recent years has become popular. This is due to the increase in group applications and services. Group communication ensures efficient delivery of packets from one source to multiple recipients or many sources to multiple recipients. Group key management in a wireless environment has been an interesting challenge with group communication because of insecure communication channel. The security and integrity of group communication in a wireless environment is a challenge. One of the challenges with group communication is the mobility of group members. Member mobility is a challenge when designing a group key management scheme. There have been several attempts that have been made to design a secure group key management for wireless environment. Not so many successful attempts have towards wireless mobile environments to explicitly address the various challenges with dynamic mobility issue between multiple networks. This research proposes a GKM scheme that tackles mobility in group communication. The protocol is analyzed to assess security and performance requirements. The size of the group variation, the mobility rate variation are carefully observed to determine the impact on the average of rekeying messages generated at every event and also 1-affects-n phenomenon. The results achieved, shows that the proposed protocol outperforms other popular solutions with less number of rekeying messages per event and also less number of affected members per event. Backward and Forward security are preserved for moving members.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122831738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel wavelet thresholding method for implementation of signal compressor design 一种新的小波阈值法实现信号压缩器设计
Hanan A. R. Akkar, W. A. H. Hadi, Ibraheem H. M. Al-Dosari
The paper deals with a work for unique wavelet shrinkage technique is planned and assessed in comparison with the opposite wavelet shrinkage ways like soft and onerous shrinkages. It's evident that wavelet families have distinctive characteristics and details that successively provide them a unique behavior against an identical wave once they were utilized for a particular procedure. As an example, in signal process applications, like wave compression, a comparative analysis in conjugation with analysis study utilizing economical system was needed to accumulate appropriate results. During this work a wavelets analysis tool was utilized to compress an artificial wave. The purpose of this work is to style and execute another wavelets shrinkage strategy, so valuate it against alternative wavelets shrinkage ways, so as to seek out the best wavelet mum operations among the antecedently mentioned families. Conjointly associate applicable decomposition level has been found to utilize the novel shrinkage technique. This new shrinkage technique is employed to shrink the wavelets coefficients and yield a decent compressed pressure signal before transmit it. There are numerous evaluation parameters to make up the evaluation and analysis method for signal compression. But the additional well-known quantitative measures are: N.M.S.E. (normalized mean sq. error) and E.S.N.R. (enhancement of signal to noise ratio). These on top of mentioned performance indices are utilized to urge the comparison results among completely different shrinkage strategies. The planned shrinkage technique outperformed the opposite standard strategies for all elect decomposition levels and completely different threshold choice rules. As an example Hardy-sine has E.S.N.R. =10.26dB and N.M.S.E. =0.02 that is concerning four improvement in E.S.N.R. for onerous-sine as compared with regular hard technique. Later the conclusion is to highlight that; this planned technique may be utilized for wave compression in more studies.
本文对一种独特的小波收缩方法进行了规划和评价,并与软收缩和繁重收缩等相反的小波收缩方法进行了比较。很明显,小波族具有独特的特征和细节,一旦它们被用于特定的过程,它们就会对相同的波具有独特的行为。例如,在信号处理应用中,如波压缩,需要结合经济系统的分析研究进行对比分析,以积累合适的结果。在这项工作中,利用小波分析工具来压缩人工波。本工作的目的是设计和执行另一种小波收缩策略,并将其与其他小波收缩方法进行比较,从而在前面提到的家族中寻找最佳的小波收缩操作。找到了适用于新收缩技术的联合关联分解水平。这种新的压缩技术可以在传输前对小波系数进行压缩,得到一个较好的压缩压力信号。信号压缩的评价与分析方法由众多的评价参数组成。但另外一些众所周知的量化指标是:标准化均方(N.M.S.E.)。误差)和essnr(信噪比增强)。在上述性能指标之上,利用这些指标来督促完全不同收缩策略之间的比较结果。对于所有选择的分解水平和完全不同的阈值选择规则,计划收缩技术优于相反的标准策略。例如,Hardy-sine的esn.r =10.26dB, N.M.S.E. =0.02,这与常规硬技术相比,heavy -sine的esn.r提高了四倍。之后的结论是要强调;在更多的研究中,这种计划技术可用于波压缩。
{"title":"A novel wavelet thresholding method for implementation of signal compressor design","authors":"Hanan A. R. Akkar, W. A. H. Hadi, Ibraheem H. M. Al-Dosari","doi":"10.1145/3321289.3321292","DOIUrl":"https://doi.org/10.1145/3321289.3321292","url":null,"abstract":"The paper deals with a work for unique wavelet shrinkage technique is planned and assessed in comparison with the opposite wavelet shrinkage ways like soft and onerous shrinkages. It's evident that wavelet families have distinctive characteristics and details that successively provide them a unique behavior against an identical wave once they were utilized for a particular procedure. As an example, in signal process applications, like wave compression, a comparative analysis in conjugation with analysis study utilizing economical system was needed to accumulate appropriate results. During this work a wavelets analysis tool was utilized to compress an artificial wave. The purpose of this work is to style and execute another wavelets shrinkage strategy, so valuate it against alternative wavelets shrinkage ways, so as to seek out the best wavelet mum operations among the antecedently mentioned families. Conjointly associate applicable decomposition level has been found to utilize the novel shrinkage technique. This new shrinkage technique is employed to shrink the wavelets coefficients and yield a decent compressed pressure signal before transmit it. There are numerous evaluation parameters to make up the evaluation and analysis method for signal compression. But the additional well-known quantitative measures are: N.M.S.E. (normalized mean sq. error) and E.S.N.R. (enhancement of signal to noise ratio). These on top of mentioned performance indices are utilized to urge the comparison results among completely different shrinkage strategies. The planned shrinkage technique outperformed the opposite standard strategies for all elect decomposition levels and completely different threshold choice rules. As an example Hardy-sine has E.S.N.R. =10.26dB and N.M.S.E. =0.02 that is concerning four improvement in E.S.N.R. for onerous-sine as compared with regular hard technique. Later the conclusion is to highlight that; this planned technique may be utilized for wave compression in more studies.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124556800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of vending machine embedded control system using FPGA 利用FPGA设计并实现自动售货机嵌入式控制系统
M. S. Mustafa, M. H. N. Al-Mayyahi, N. H. Barnouti
In modern world, the usage of automated vending machines is increased rapidly as a result of the latest life style. Vending machines can dispense small different products such as beverages, snacks, cigarette, consumer products, lottery tickets, train tickets, gems and even gold to consumers automatically after a currency or credit is inserted by the customer into the machine. The majority of vending machines are implemented using CMOS, SED, Microprocessor and Microcontroller technology that are inefficient in terms of power and speed. Compared to previous technologies, The FPGA based vending machines are reprogrammable, flexible and more advantageous in terms of speed, response and power consumption. FPGA based machine can be reprogrammed without the need to change the whole architecture when enhancing the model of machine. In this paper, FPGA based vending machine is designed and implemented on FPGA board which can provide multiple products. The proposed FPGA based machine supports three items and three currencies and provides products when the required amount is inserted into the machine and returns the change when the amount is further than the price of the product. The machine is supporting cancel function where the consumer is able to ignore the request and the inserted currency any time. The proposed vending machine conceptual model is designed in VHDL and implemented using altera DE2 development board.
在现代世界,由于最新的生活方式,自动售货机的使用迅速增加。自动贩卖机可以在顾客将货币或信用卡插入机器后,自动将饮料、零食、香烟、消费品、彩票、火车票、宝石甚至黄金等小额不同产品分发给消费者。大多数自动售货机采用CMOS, SED,微处理器和微控制器技术,在功率和速度方面效率低下。与以往的自动售货机技术相比,基于FPGA的自动售货机可重新编程,灵活,在速度,响应和功耗方面更具优势。在增强机器模型时,基于FPGA的机器可以在不改变整个体系结构的情况下进行重新编程。本文设计了一种基于FPGA的自动售货机,并在可提供多种产品的FPGA板上实现。所提出的基于FPGA的机器支持三种商品和三种货币,当所需金额插入机器时提供产品,当金额大于产品价格时返回找零。机器支持取消功能,消费者可以随时忽略请求和插入的货币。提出的自动售货机概念模型是用VHDL语言设计的,并使用altera DE2开发板实现。
{"title":"Design and implementation of vending machine embedded control system using FPGA","authors":"M. S. Mustafa, M. H. N. Al-Mayyahi, N. H. Barnouti","doi":"10.1145/3321289.3321314","DOIUrl":"https://doi.org/10.1145/3321289.3321314","url":null,"abstract":"In modern world, the usage of automated vending machines is increased rapidly as a result of the latest life style. Vending machines can dispense small different products such as beverages, snacks, cigarette, consumer products, lottery tickets, train tickets, gems and even gold to consumers automatically after a currency or credit is inserted by the customer into the machine. The majority of vending machines are implemented using CMOS, SED, Microprocessor and Microcontroller technology that are inefficient in terms of power and speed. Compared to previous technologies, The FPGA based vending machines are reprogrammable, flexible and more advantageous in terms of speed, response and power consumption. FPGA based machine can be reprogrammed without the need to change the whole architecture when enhancing the model of machine. In this paper, FPGA based vending machine is designed and implemented on FPGA board which can provide multiple products. The proposed FPGA based machine supports three items and three currencies and provides products when the required amount is inserted into the machine and returns the change when the amount is further than the price of the product. The machine is supporting cancel function where the consumer is able to ignore the request and the inserted currency any time. The proposed vending machine conceptual model is designed in VHDL and implemented using altera DE2 development board.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Speech encryption using finite precision chaotic maps based stream ciphers 基于流密码的有限精度混沌映射语音加密
Zahraa M. Dawood, M. Aboud, F. S. Hasan
Efficient and simple design of speech encryption-based stream cipher is produced and suggested in this paper with name finite precision chaotic map-based stream cipher (FPCM-SC) system. Two pseudo random bits generator (PRBG) are built by hybrid chaotic maps using finite precision format and named finite precision chaotic XOR based PRBG (FPCXOR-BRPB) and finite precision chaotic hopping based PRBG(FPCH-PRBG). The statistical security analysis and speech residual unintelligibility measures are presented for the two proposed systems. The results show that key space for FPCXOR-PRBG is 214*32 and for FPCH-PRBG is 216*32 that are large enough to resist against all kind of brute force attack. Also, residual unintelligibility measures show that the speech signal is unintelligible signal and can't be listen by an attacker.
提出了一种高效、简单的基于语音加密的流密码设计方案,即有限精度混沌映射流密码(FPCM-SC)系统。利用有限精度格式的混合混沌映射构建了两个伪随机比特发生器(PRBG),分别命名为基于有限精度混沌异或的PRBG(FPCXOR-BRPB)和基于有限精度混沌跳变的PRBG(FPCH-PRBG)。给出了两种系统的统计安全性分析和语音残留不可解度度量。结果表明,FPCXOR-PRBG的密钥空间为214*32,FPCH-PRBG的密钥空间为216*32,足以抵御各种暴力破解。残差不可理解度测量表明,语音信号是不可理解的信号,攻击者无法监听。
{"title":"Speech encryption using finite precision chaotic maps based stream ciphers","authors":"Zahraa M. Dawood, M. Aboud, F. S. Hasan","doi":"10.1145/3321289.3321322","DOIUrl":"https://doi.org/10.1145/3321289.3321322","url":null,"abstract":"Efficient and simple design of speech encryption-based stream cipher is produced and suggested in this paper with name finite precision chaotic map-based stream cipher (FPCM-SC) system. Two pseudo random bits generator (PRBG) are built by hybrid chaotic maps using finite precision format and named finite precision chaotic XOR based PRBG (FPCXOR-BRPB) and finite precision chaotic hopping based PRBG(FPCH-PRBG). The statistical security analysis and speech residual unintelligibility measures are presented for the two proposed systems. The results show that key space for FPCXOR-PRBG is 214*32 and for FPCH-PRBG is 216*32 that are large enough to resist against all kind of brute force attack. Also, residual unintelligibility measures show that the speech signal is unintelligible signal and can't be listen by an attacker.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132472175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy and RSSI based fuzzy inference system for cluster head selection in wireless sensor networks 基于能量和RSSI的无线传感器网络簇头选择模糊推理系统
H. Al-Kashoash, Zain-Aldeen S. A. Rahman, E. Alhamdawee
Wireless sensor network (WSN) composes of randomly and uniformly deployed sensors to sense and monitor condition changing e.g. temperature and pass the data to a base station. As sensor node operates on a limited power battery where it is difficult to recharge or replace it, the main challenge in WSNs is energy conservation. Clustering is a technique in which nodes are grouped together into a number of clusters to maximize energy saving and prolong nodes lifespan. In this paper, we design a fuzzy logic controller and propose a clustering algorithm for selecting a cluster head (CH) depend on node's residual energy and RSSI. The proposed algorithm is simulated in Castalia simulator and compared with LEACH protocol. The simulation results show that our proposal performs better than LEACH with regards to nodes lifetime, energy consumption and number of sent packets.
无线传感器网络(WSN)由随机和均匀部署的传感器组成,用于感知和监测温度等条件的变化,并将数据传递给基站。由于传感器节点在有限的动力电池上工作,难以充电或更换,因此无线传感器网络面临的主要挑战是节能。集群是一种将节点分组到多个集群中的技术,以最大限度地节省能源并延长节点的使用寿命。本文设计了一个模糊逻辑控制器,并提出了一种基于节点剩余能量和RSSI的聚类算法来选择簇头。在Castalia模拟器上对该算法进行了仿真,并与LEACH协议进行了比较。仿真结果表明,该算法在节点寿命、能耗和发送数据包数量等方面都优于LEACH算法。
{"title":"Energy and RSSI based fuzzy inference system for cluster head selection in wireless sensor networks","authors":"H. Al-Kashoash, Zain-Aldeen S. A. Rahman, E. Alhamdawee","doi":"10.1145/3321289.3321319","DOIUrl":"https://doi.org/10.1145/3321289.3321319","url":null,"abstract":"Wireless sensor network (WSN) composes of randomly and uniformly deployed sensors to sense and monitor condition changing e.g. temperature and pass the data to a base station. As sensor node operates on a limited power battery where it is difficult to recharge or replace it, the main challenge in WSNs is energy conservation. Clustering is a technique in which nodes are grouped together into a number of clusters to maximize energy saving and prolong nodes lifespan. In this paper, we design a fuzzy logic controller and propose a clustering algorithm for selecting a cluster head (CH) depend on node's residual energy and RSSI. The proposed algorithm is simulated in Castalia simulator and compared with LEACH protocol. The simulation results show that our proposal performs better than LEACH with regards to nodes lifetime, energy consumption and number of sent packets.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114850871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secret key generation in wireless sensor network using public key encryption 基于公钥加密的无线传感器网络密钥生成
Manar Hamza Bashaa, S. Al-Alak, A. Idrees
In the last years, Wireless Sensor Networks (WSNs) are widely used in many applications in the real life. The sensor devices in WSNs are resource-constrained in terms of computation, energy, and memory. This makes the Key establishment and refreshment lead to increase the communication cost and consumed energy thus minimize the network lifetime in WSNs. Therefore, it is a challenging problem to design an energy efficient Secret key establishment and refreshment protocol in WSNs. In this paper, a Secret Key Generation (SKG) protocol is proposed to improve the network lifetime while maintaining the security of the WSN. SKG protocol distributes part of the secret key on the sensor nodes in the network while another part would be kept inside the nodes of the WSN. Each node in the network generates the secret keys by using the two parts. The suggested protocol is evaluated using NS2 network simulator and the conducted results show that the SKG protocol can increase throughput by the rate 17.36 b/s and decrease the consumed power for key distribution by the rate 4.3152 w thus extend the lifetime of the WSN.
近年来,无线传感器网络(WSNs)在现实生活中得到了广泛应用。无线传感器网络中的传感器设备在计算、能量和内存方面受到资源限制。这使得密钥的建立和更新增加了无线传感器网络的通信成本和能量消耗,从而使网络生存时间最小化。因此,设计一种节能的无线传感器网络密钥建立和更新协议是一个具有挑战性的问题。为了在保证无线传感器网络安全的同时提高网络的生存期,本文提出了一种密钥生成(SKG)协议。SKG协议将一部分密钥分发到网络中的传感器节点上,而另一部分则保存在WSN的节点内部。网络中的每个节点都使用这两部分生成密钥。在NS2网络模拟器上对所提出的协议进行了评估,结果表明,SKG协议的吞吐量提高了17.36 b/s,密钥分配功耗降低了4.3152 w,从而延长了WSN的寿命。
{"title":"Secret key generation in wireless sensor network using public key encryption","authors":"Manar Hamza Bashaa, S. Al-Alak, A. Idrees","doi":"10.1145/3321289.3321320","DOIUrl":"https://doi.org/10.1145/3321289.3321320","url":null,"abstract":"In the last years, Wireless Sensor Networks (WSNs) are widely used in many applications in the real life. The sensor devices in WSNs are resource-constrained in terms of computation, energy, and memory. This makes the Key establishment and refreshment lead to increase the communication cost and consumed energy thus minimize the network lifetime in WSNs. Therefore, it is a challenging problem to design an energy efficient Secret key establishment and refreshment protocol in WSNs. In this paper, a Secret Key Generation (SKG) protocol is proposed to improve the network lifetime while maintaining the security of the WSN. SKG protocol distributes part of the secret key on the sensor nodes in the network while another part would be kept inside the nodes of the WSN. Each node in the network generates the secret keys by using the two parts. The suggested protocol is evaluated using NS2 network simulator and the conducted results show that the SKG protocol can increase throughput by the rate 17.36 b/s and decrease the consumed power for key distribution by the rate 4.3152 w thus extend the lifetime of the WSN.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Pole placement control of a ball and beam system a graphical user interface (GUI) approach 球梁系统的杆位控制采用图形用户界面(GUI)方法
Ahmed Alkamachi
The ball and beam (B&B) system is widely used as a laboratory equipment to study control systems engineering since it represents one of the most easy to understand and important system. In this work, a step by step Lagrangian model for the B&B system has been obtained. Afterward, a pole placement controller has been designed for trajectory tracking and disturbance rejection purpose. The derived model and the controller has been demonstrated in Simulink environment. The paper also investigates the controller robustness in the existence of sensor noise and external disturbances. For the purpose of better understanding of the relationship between the set of placed poles, the system response plot and the physical system behavior, a visualized model for the B&B system has been built using Matlab graphical user interface (GUI) platform. The GUI platform present a helpful tool in understanding the ball and beam system mechanical behavior with different placed poles' positions. It will also minify the need for an actual B&B laboratory experimental set.
球梁(B&B)系统是控制系统工程中最容易理解和最重要的系统之一,被广泛用作研究控制系统工程的实验室设备。在这项工作中,得到了B&B系统的逐级拉格朗日模型。然后,设计了一种用于轨迹跟踪和抗干扰的极点控制器。在Simulink环境下对所建立的模型和控制器进行了验证。本文还研究了存在传感器噪声和外部干扰时控制器的鲁棒性。为了更好地理解放置极点集、系统响应图和系统物理行为之间的关系,利用Matlab图形用户界面(GUI)平台建立了B&B系统的可视化模型。GUI平台为理解球梁系统在不同杆位下的力学行为提供了一个有用的工具。它还将减少对实际的B&B实验室实验装置的需求。
{"title":"Pole placement control of a ball and beam system a graphical user interface (GUI) approach","authors":"Ahmed Alkamachi","doi":"10.1145/3321289.3321305","DOIUrl":"https://doi.org/10.1145/3321289.3321305","url":null,"abstract":"The ball and beam (B&B) system is widely used as a laboratory equipment to study control systems engineering since it represents one of the most easy to understand and important system. In this work, a step by step Lagrangian model for the B&B system has been obtained. Afterward, a pole placement controller has been designed for trajectory tracking and disturbance rejection purpose. The derived model and the controller has been demonstrated in Simulink environment. The paper also investigates the controller robustness in the existence of sensor noise and external disturbances. For the purpose of better understanding of the relationship between the set of placed poles, the system response plot and the physical system behavior, a visualized model for the B&B system has been built using Matlab graphical user interface (GUI) platform. The GUI platform present a helpful tool in understanding the ball and beam system mechanical behavior with different placed poles' positions. It will also minify the need for an actual B&B laboratory experimental set.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129358532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proposal for encryption by using modified play fair algorithm and bioinformatics techniques 提出了一种利用改良公平算法和生物信息学技术进行加密的方案
Rasha S. Ali, Rajaa Kadhom Hassoun, I. F. Jaleel, Noor Subhi Ali
Playfair cipher is a classic encryption technique that is hard to be manipulated manually but apart from the advantages found in playfair cipher there are also many weakness, can be solved by using modern cryptographic algorithms. This work is about securing text by using modified Play fair algorithm. The encryption and decryption processes are done by using secret key and message provided by the user. The encryption and decryption process depended on using same key. The proposed modified Play fair algorithm depended on using biomolecular computing. The strength of this work represented by encrypting any type of characters or numbers and symbols by using the proposed method comparative to the previous works which is used to encrypt only English characters with some numbers. The strength of this work represented by encrypting any type of characters or numbers and symbols by using the proposed method comparative to the previous works which is used to encrypt only English characters with some numbers. The proposed technique depended on using modern cryptographic methods like bioinformatics technique. The generated key depended on using secure lock up table which is generated from another secure lock up table. Also the insertion process between duplicated character is removed, so this is saved the time and storage space. The size of the proposed modified Play fair matrix includes 4 columns and 16 rows instead of 5*5 matrix of conventional method. In this work the matrix of equal dimensions was not required; the amino acid codes(mRNA codes) are used in this work. The amino acid codes are also converted to special symbols; this means instead of using triple replacement of amino acid codes the triple characters are converted to one symbol. A single replacement was used, by this the size of encrypted text was decreased to 1:3 of using triple replacement. Each three character of amino acid codes is become represented by one character and this is also leading to save memory storage 3 times of using original representation of amino acid codes. The experimental results showed that the proposed method achieves good results; it was passed a proximity 13 tests of 14 NIST tests. The other 2 NIST tests are not worked from the original software of 16 NIST tests so 14 NIST tests are used in this paper. the proposed method overcomes the limitation of the previous methods in terms of encrypting any data types in Arabic, English, Latin language, numbers and symbols. Also the experiments show that the proposed method consumed few milliseconds in the encryption and decryption process and there is 75% changes in the cipher texts when using keys different in only one bit.
公平密码是一种难以人工操作的经典加密技术,但除了公平密码的优点外,它也有许多缺点,可以通过现代密码算法来解决。这项工作是关于使用改进的公平游戏算法来保护文本。加密和解密过程通过使用用户提供的密钥和消息来完成。加密和解密过程依赖于使用相同的密钥。提出的改进Play fair算法依赖于使用生物分子计算。与以往只对英文字符加一些数字进行加密的方法相比,采用本文提出的方法加密任何类型的字符或数字和符号所代表的强度。与以往只对英文字符加一些数字进行加密的方法相比,采用本文提出的方法加密任何类型的字符或数字和符号所代表的强度。所提出的技术依赖于使用现代密码方法,如生物信息学技术。生成的密钥依赖于使用从另一个安全锁表生成的安全锁表。另外,删除了重复字符之间的插入过程,节省了时间和存储空间。改进的公平矩阵的大小为4列16行,而不是传统方法的5*5矩阵。在这项工作中,不需要等维矩阵;在这项工作中使用了氨基酸编码(mRNA编码)。氨基酸编码也被转换成特殊的符号;这意味着不使用氨基酸代码的三重替换,而是将三个字符转换为一个符号。使用单个替换,这样加密文本的大小减少到使用三重替换的1:3。氨基酸码每三个字符变成一个字符表示,这也导致使用原始氨基酸码表示节省3倍的内存存储。实验结果表明,该方法取得了较好的效果;它通过了14项NIST测试中的近距离测试。另外2个NIST测试不是从原来的16个NIST测试软件中进行的,所以本文使用了14个NIST测试。该方法克服了以往方法在加密阿拉伯语、英语、拉丁语、数字和符号等任何数据类型方面的局限性。实验还表明,该方法在加解密过程中只消耗了几毫秒的时间,并且当使用的密钥仅相差1位时,密文的变化率为75%。
{"title":"Proposal for encryption by using modified play fair algorithm and bioinformatics techniques","authors":"Rasha S. Ali, Rajaa Kadhom Hassoun, I. F. Jaleel, Noor Subhi Ali","doi":"10.1145/3321289.3321321","DOIUrl":"https://doi.org/10.1145/3321289.3321321","url":null,"abstract":"Playfair cipher is a classic encryption technique that is hard to be manipulated manually but apart from the advantages found in playfair cipher there are also many weakness, can be solved by using modern cryptographic algorithms. This work is about securing text by using modified Play fair algorithm. The encryption and decryption processes are done by using secret key and message provided by the user. The encryption and decryption process depended on using same key. The proposed modified Play fair algorithm depended on using biomolecular computing. The strength of this work represented by encrypting any type of characters or numbers and symbols by using the proposed method comparative to the previous works which is used to encrypt only English characters with some numbers. The strength of this work represented by encrypting any type of characters or numbers and symbols by using the proposed method comparative to the previous works which is used to encrypt only English characters with some numbers. The proposed technique depended on using modern cryptographic methods like bioinformatics technique. The generated key depended on using secure lock up table which is generated from another secure lock up table. Also the insertion process between duplicated character is removed, so this is saved the time and storage space. The size of the proposed modified Play fair matrix includes 4 columns and 16 rows instead of 5*5 matrix of conventional method. In this work the matrix of equal dimensions was not required; the amino acid codes(mRNA codes) are used in this work. The amino acid codes are also converted to special symbols; this means instead of using triple replacement of amino acid codes the triple characters are converted to one symbol. A single replacement was used, by this the size of encrypted text was decreased to 1:3 of using triple replacement. Each three character of amino acid codes is become represented by one character and this is also leading to save memory storage 3 times of using original representation of amino acid codes. The experimental results showed that the proposed method achieves good results; it was passed a proximity 13 tests of 14 NIST tests. The other 2 NIST tests are not worked from the original software of 16 NIST tests so 14 NIST tests are used in this paper. the proposed method overcomes the limitation of the previous methods in terms of encrypting any data types in Arabic, English, Latin language, numbers and symbols. Also the experiments show that the proposed method consumed few milliseconds in the encryption and decryption process and there is 75% changes in the cipher texts when using keys different in only one bit.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132524430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Genetic-fuzzy algorithm based suboptimum partial transmit sequences scheme for peak-to-average power ratio reduction in MIMO-OFDM systems 基于遗传模糊算法的MIMO-OFDM系统次优部分发射序列降低峰均功率比方案
Zainab Abdulameer Hassan, Alaa A. Hasan
Increased peak-to-average power ratio (PAPR) of its transmit sequence represents the main problem of the orthogonal frequency division multiplexing (OFDM) technology, as large signal peaks lead to power inefficiency of the amplifiers. In this study, a new combination based on the use of two intelligent techniques: fuzzy logic as well as genetic algorithm (GA) with the proposition of a popular reduction technique, partial transmit sequences (PTS) is presented here to decrease the probability of high PAPR appearance in multiple input-multiple output OFDM (MIMO-OFDM) system over Rayleigh fading channel. The PTS scheme is utilized in a space time block coding (STBC) model where the nominated signal for transmission has lowest PAPR. Without increasing computation, numerical results verify the competition of the presented algorithm as compared to some published studies.
正交频分复用(OFDM)技术的主要问题是其发射序列的峰值平均功率比(PAPR)的提高,因为信号峰值过大导致放大器的功率效率低下。本文提出了一种基于模糊逻辑和遗传算法两种智能技术的新组合,并提出了一种流行的约简技术,即部分发射序列(PTS),以降低多输入多输出OFDM (MIMO-OFDM)系统在瑞利衰落信道上出现高PAPR的概率。PTS方案用于空时分组编码(STBC)模型,其中指定的传输信号具有最低的PAPR。在不增加计算量的情况下,数值结果验证了本文算法与一些已发表的研究相比的竞争力。
{"title":"Genetic-fuzzy algorithm based suboptimum partial transmit sequences scheme for peak-to-average power ratio reduction in MIMO-OFDM systems","authors":"Zainab Abdulameer Hassan, Alaa A. Hasan","doi":"10.1145/3321289.3321328","DOIUrl":"https://doi.org/10.1145/3321289.3321328","url":null,"abstract":"Increased peak-to-average power ratio (PAPR) of its transmit sequence represents the main problem of the orthogonal frequency division multiplexing (OFDM) technology, as large signal peaks lead to power inefficiency of the amplifiers. In this study, a new combination based on the use of two intelligent techniques: fuzzy logic as well as genetic algorithm (GA) with the proposition of a popular reduction technique, partial transmit sequences (PTS) is presented here to decrease the probability of high PAPR appearance in multiple input-multiple output OFDM (MIMO-OFDM) system over Rayleigh fading channel. The PTS scheme is utilized in a space time block coding (STBC) model where the nominated signal for transmission has lowest PAPR. Without increasing computation, numerical results verify the competition of the presented algorithm as compared to some published studies.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127940571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and investigation of configurable photonics true time delay line-based beamsteering network 基于可配置光子真时间延迟线的波束导向网络设计与研究
D. A. Aljaf, R. Fyath
Recently there is increasing interest in microwave photonics (MWP) to process wideband microwave signals using photonic technology. Beam-steering and -forming networks for phase array antennas (PAAs) have been successfully and efficiently implemented using MWP incorporating a photonic true time delay line (TTDL). The delay line is designed according to the operating microwave frequency fmw and number of radiating elements N of the PAA and cannot be adopted efficiently for other PAAs operating at different parameters values. Future wireless communication base stations will deal with PAAs having different values of fmw and N. Therefore, it is essential to design a configurable MWP-based beamsteering and -forming networks. In this paper, a configurable photonic TTDL is proposed for beamsteering network. The delay line consists of cascaded linearly chirped fiber Bragg gratings (LCFBGs) whose number is adopted according to the operating frequency, number of radiating elements, and steering angle. The simulation results reveal that a fiber Bragg grating (FBG) designed with 80 mm length and modified Gaussian apodization offers a 562.12 ps time delay difference across its reflectively spectrum bandwidth (4.07 nm). The steering network uses 3, 2, and 1 LCFBGs for 8-PAAs operating with 2.4, 5.8, and 10 GHz, respectively. Then three patch radiating elements operating at 2.4, and 5.8 GHz are designed and experimentally fabricated. The radiation pattern performance of these radiating elements are simulated and the results are found to be closed to experimental data. Accordingly, three PAAs incorporating these radiating elements are designed and their scanning capabilities based on the proposed configurable steering network are investigated for N= 4, 8, and 16. The results demonstrate the capability of the proposed configurable beamsteering network in controlling the steering angle of the designed PAAs.
近年来,利用光子技术对宽带微波信号进行处理的微波光子学研究日益受到人们的关注。利用结合光子真时间延迟线(TTDL)的MWP,成功有效地实现了相控阵天线(PAAs)的波束引导和形成网络。延迟线是根据PAA的工作微波频率fmw和辐射元数N来设计的,不能有效地用于其他PAA在不同参数值下工作。未来的无线通信基站将处理具有不同fmw和n值的PAAs,因此设计一个可配置的基于mwp的波束引导和形成网络至关重要。本文提出了一种用于波束导向网络的可配置光子TTDL。延迟线由级联线性啁啾光纤布拉格光栅(LCFBGs)组成,其数量根据工作频率、辐射元件数量和转向角度而定。仿真结果表明,长度为80 mm的光纤布拉格光栅(FBG)在其反射频谱带宽(4.07 nm)上具有562.12 ps的时延差。8-PAAs分别使用3、2和1个LCFBGs,工作频率分别为2.4、5.8和10 GHz。然后设计和实验制作了工作在2.4 GHz和5.8 GHz的三个贴片辐射元件。对这些辐射元件的辐射方向图性能进行了模拟,结果与实验数据接近。因此,设计了三个包含这些辐射元件的PAAs,并基于所提出的可配置转向网络研究了N= 4、8和16时它们的扫描能力。实验结果验证了所提出的可配置波束转向网络在控制PAAs转向角方面的能力。
{"title":"Design and investigation of configurable photonics true time delay line-based beamsteering network","authors":"D. A. Aljaf, R. Fyath","doi":"10.1145/3321289.3321299","DOIUrl":"https://doi.org/10.1145/3321289.3321299","url":null,"abstract":"Recently there is increasing interest in microwave photonics (MWP) to process wideband microwave signals using photonic technology. Beam-steering and -forming networks for phase array antennas (PAAs) have been successfully and efficiently implemented using MWP incorporating a photonic true time delay line (TTDL). The delay line is designed according to the operating microwave frequency fmw and number of radiating elements N of the PAA and cannot be adopted efficiently for other PAAs operating at different parameters values. Future wireless communication base stations will deal with PAAs having different values of fmw and N. Therefore, it is essential to design a configurable MWP-based beamsteering and -forming networks. In this paper, a configurable photonic TTDL is proposed for beamsteering network. The delay line consists of cascaded linearly chirped fiber Bragg gratings (LCFBGs) whose number is adopted according to the operating frequency, number of radiating elements, and steering angle. The simulation results reveal that a fiber Bragg grating (FBG) designed with 80 mm length and modified Gaussian apodization offers a 562.12 ps time delay difference across its reflectively spectrum bandwidth (4.07 nm). The steering network uses 3, 2, and 1 LCFBGs for 8-PAAs operating with 2.4, 5.8, and 10 GHz, respectively. Then three patch radiating elements operating at 2.4, and 5.8 GHz are designed and experimentally fabricated. The radiation pattern performance of these radiating elements are simulated and the results are found to be closed to experimental data. Accordingly, three PAAs incorporating these radiating elements are designed and their scanning capabilities based on the proposed configurable steering network are investigated for N= 4, 8, and 16.\u0000 The results demonstrate the capability of the proposed configurable beamsteering network in controlling the steering angle of the designed PAAs.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131533438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the International Conference on Information and Communication Technology - ICICT '19
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1