首页 > 最新文献

2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)最新文献

英文 中文
Backhaul and performance optimality of joint processing schemes over the cluster area 集群区域联合处理方案的回程和性能最优性
Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010222
M. Kousha, F. Hashim
In this paper, four Joint Processing (JP) schemes have been discussed and evaluated for Dynamic Point Selection (DPS) as well as Joint Transmission (JT) over a cluster of evolved Node B (eNBs) using WINNER II channel model developed for LTE-A. The purpose of this study is developing a cooperative LTE scenario in a fixed cluster of 3 eNBs in order to evaluate and compare the performance of these schemes for both centralized and partial cooperation. It would give us a good insight about choosing the optimum scheme which provides desired performance while putting reasonable amount of burden on the backhaul of the system. Moreover, the location dependency of JP is proved over the cluster area. As a final goal, in real-world networks, exploiting a dynamic joint processing scheme selection strategy would lead to the best performance taking care of backhaul limits. It has been proved through Simulations that, centralized joint processing has better performance for both joint transmission and dynamic point selection in comparison with the partial joint processing. Also, Dynamic point selection schemes follow the performance trend of joint transmission with less performance and lower backhaul load.
本文讨论和评估了四种联合处理(JP)方案,用于动态点选择(DPS)以及使用为LTE-A开发的WINNER II信道模型在演进节点B (enb)集群上的联合传输(JT)。本研究的目的是在一个由3个enb组成的固定集群中开发一个合作LTE场景,以评估和比较这些方案在集中合作和部分合作下的性能。它将给我们提供一个很好的见解,选择最优方案,提供理想的性能,同时在系统的回程上施加合理的负担。此外,还证明了JP在集群区域上的位置依赖性。作为最终目标,在现实网络中,利用动态联合处理方案选择策略可以在考虑回程限制的情况下获得最佳性能。仿真结果表明,与局部关节加工相比,集中关节加工在关节传动和动态点选择方面都具有更好的性能。动态选点方案遵循联合传输的性能趋势,性能更低,回程负载更小。
{"title":"Backhaul and performance optimality of joint processing schemes over the cluster area","authors":"M. Kousha, F. Hashim","doi":"10.1109/ISCAIE.2014.7010222","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010222","url":null,"abstract":"In this paper, four Joint Processing (JP) schemes have been discussed and evaluated for Dynamic Point Selection (DPS) as well as Joint Transmission (JT) over a cluster of evolved Node B (eNBs) using WINNER II channel model developed for LTE-A. The purpose of this study is developing a cooperative LTE scenario in a fixed cluster of 3 eNBs in order to evaluate and compare the performance of these schemes for both centralized and partial cooperation. It would give us a good insight about choosing the optimum scheme which provides desired performance while putting reasonable amount of burden on the backhaul of the system. Moreover, the location dependency of JP is proved over the cluster area. As a final goal, in real-world networks, exploiting a dynamic joint processing scheme selection strategy would lead to the best performance taking care of backhaul limits. It has been proved through Simulations that, centralized joint processing has better performance for both joint transmission and dynamic point selection in comparison with the partial joint processing. Also, Dynamic point selection schemes follow the performance trend of joint transmission with less performance and lower backhaul load.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122913082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0.5-V bulk-driven second-generation current conveyor 0.5 v体积驱动第二代电流输送机
Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010233
M. Kumngern, F. Khateb
This paper presents a new bulk-driven second-generation current conveyor that is capable of ultra-low voltage signal processing applications. The proposed circuit operates under supply voltage of 0.5 V and also offers rail-to-rail input voltage swing. To confirm the operation of the proposed building active block, floating and grounded inductance simulations using the proposed circuits as active elements are presented. The performances of the proposed circuit are demonstrated using PSPICE simulators. The simulation result shows that the power consumption of the proposed circuit is only 4.7 μW.
本文提出了一种新型的可用于超低电压信号处理的体积驱动型第二代电流输送装置。所提出的电路在0.5 V的电源电压下工作,并且还提供轨到轨的输入电压摆动。为了验证所提出的建筑有源模块的运行,采用所提出的电路作为有源元件进行了浮动和接地电感模拟。利用PSPICE仿真器验证了所提电路的性能。仿真结果表明,该电路的功耗仅为4.7 μW。
{"title":"0.5-V bulk-driven second-generation current conveyor","authors":"M. Kumngern, F. Khateb","doi":"10.1109/ISCAIE.2014.7010233","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010233","url":null,"abstract":"This paper presents a new bulk-driven second-generation current conveyor that is capable of ultra-low voltage signal processing applications. The proposed circuit operates under supply voltage of 0.5 V and also offers rail-to-rail input voltage swing. To confirm the operation of the proposed building active block, floating and grounded inductance simulations using the proposed circuits as active elements are presented. The performances of the proposed circuit are demonstrated using PSPICE simulators. The simulation result shows that the power consumption of the proposed circuit is only 4.7 μW.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124645627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of CAN-based 2-DOF SCARA robot performance under work control 工作控制下基于can的2-DOF SCARA机器人性能分析
Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010231
A. A. Dahalan, A. R. Husain, M. Shah
Distributed control applications required a reliable network for information exchange. In this paper a networked control system of direct-drive 2-DOF SCARA Robot are developed based on Controller Area Network (CAN) where PD controller is adapted to form the closed loop system. The network system which consists of two sensor nodes, two actuator nodes and two controller nodes performs data exchange in CAN 2.0A data frames under various CAN speeds. The performance of the system under communication delay and data priority is analyzed. The simulation is performed by using Matiab/Simulink with TrueTime Toolbox. The result shows that the optimized system performance can be achieved under proper sampling time and CAN speed associated to the dynamic of the system.
分布式控制应用需要可靠的信息交换网络。本文提出了一种基于控制器局域网(CAN)的直接驱动2-DOF SCARA机器人网络控制系统,采用PD控制器构成闭环系统。该网络系统由两个传感器节点、两个执行器节点和两个控制节点组成,在不同的CAN速度下,以CAN 2.0A数据帧进行数据交换。分析了系统在通信延迟和数据优先级下的性能。仿真是通过使用Matiab/Simulink和TrueTime工具箱进行的。结果表明,在适当的采样时间和与系统动态相关的can速度下,可以达到优化的系统性能。
{"title":"Analysis of CAN-based 2-DOF SCARA robot performance under work control","authors":"A. A. Dahalan, A. R. Husain, M. Shah","doi":"10.1109/ISCAIE.2014.7010231","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010231","url":null,"abstract":"Distributed control applications required a reliable network for information exchange. In this paper a networked control system of direct-drive 2-DOF SCARA Robot are developed based on Controller Area Network (CAN) where PD controller is adapted to form the closed loop system. The network system which consists of two sensor nodes, two actuator nodes and two controller nodes performs data exchange in CAN 2.0A data frames under various CAN speeds. The performance of the system under communication delay and data priority is analyzed. The simulation is performed by using Matiab/Simulink with TrueTime Toolbox. The result shows that the optimized system performance can be achieved under proper sampling time and CAN speed associated to the dynamic of the system.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130304833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and analysis of a two-stage CMOS op-amp using Silterra's 0.13 μm technology 采用Silterra的0.13 μm技术设计和分析两级CMOS运算放大器
Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010209
Mohd Haidar Hamzah, A. B. Jambek, U. Hashim
This paper presents the design and analysis of a high-gain, low-power, two-stage CMOS operational amplifier (op-amp) for a sigma-delta ADC. Op-amp topologies, such as folded cascade, telescopic and two-stage, are discussed in this paper. The theoretical and topological analyses of each design are highlighted in detail, including the tradeoff among various parameters such as gain, noise, output swings and power consumption. The designs have been simulated using 0.13 μm CMOS technology from Silterra (Malaysia) with Cadence EDA tools. From the simulation results, the two-stage amplifier gives better performance compared to other topologies, especially in terms of gain, output swing, slew rate and CMRR. The circuit is able to achieve 85.93 dB gain, a 1.1 V output swing, a 44.29 V/μs slew rate and a CMRR of 61 dB with a power supply voltage of 1.2 V.
本文介绍了一种用于σ - δ ADC的高增益、低功耗、两级CMOS运算放大器的设计与分析。本文讨论了折叠级联、伸缩级和两级运放拓扑结构。详细介绍了每种设计的理论和拓扑分析,包括增益、噪声、输出摆动和功耗等各种参数之间的权衡。这些设计采用了马来西亚Silterra公司的0.13 μm CMOS技术和Cadence EDA工具进行仿真。从仿真结果来看,与其他拓扑结构相比,两级放大器具有更好的性能,特别是在增益、输出摆幅、摆幅率和CMRR方面。该电路在1.2 V电源电压下,增益为85.93 dB,输出摆幅为1.1 V,摆幅为44.29 V/μs, CMRR为61 dB。
{"title":"Design and analysis of a two-stage CMOS op-amp using Silterra's 0.13 μm technology","authors":"Mohd Haidar Hamzah, A. B. Jambek, U. Hashim","doi":"10.1109/ISCAIE.2014.7010209","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010209","url":null,"abstract":"This paper presents the design and analysis of a high-gain, low-power, two-stage CMOS operational amplifier (op-amp) for a sigma-delta ADC. Op-amp topologies, such as folded cascade, telescopic and two-stage, are discussed in this paper. The theoretical and topological analyses of each design are highlighted in detail, including the tradeoff among various parameters such as gain, noise, output swings and power consumption. The designs have been simulated using 0.13 μm CMOS technology from Silterra (Malaysia) with Cadence EDA tools. From the simulation results, the two-stage amplifier gives better performance compared to other topologies, especially in terms of gain, output swing, slew rate and CMRR. The circuit is able to achieve 85.93 dB gain, a 1.1 V output swing, a 44.29 V/μs slew rate and a CMRR of 61 dB with a power supply voltage of 1.2 V.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121411349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Danger theory based node replication attacks detection in mobile wireless sensor network 基于危险理论的移动无线传感器网络节点复制攻击检测
Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010202
H. R. Shaukat, F. Hashim, A. Sali
Mobile wireless sensor networks (MWSNs) are commonly deployed in a harsh climate, notably unattended without any tamper-resistant tools; thereby an attacker can easily capture the sensor nodes in a very limited time. Once captured, the attacker can duplicate the sensor and subsequently deploys numerous clone nodes into the network in minimum time duration. This new breed of attack is called node replication attack, and while several solutions have been proposed to address such a security threat, they are mainly centralized and somewhat limited to static WSN. In this paper, we propose a hybrid (centralized and distributed) node replication attack detection method for MWSN, which operates based on Danger Theory in human immune system. As depicted in Danger Theory, the proposed method consists of two main security approaches, namely attack detection and security control. These approaches perform a multi-level detection, which is not only responsible to identify but also to verify the existence of clone nodes in the network. Performance evaluation demonstrates the efficiency (in terms of true and false positives) of the proposed detection method in detecting clone nodes in MWSN environment.
移动无线传感器网络(mwsn)通常部署在恶劣的气候条件下,特别是无人值守,没有任何防篡改工具;因此,攻击者可以在非常有限的时间内轻松捕获传感器节点。一旦被捕获,攻击者就可以复制传感器,然后在最短的时间内将大量克隆节点部署到网络中。这种新型攻击被称为节点复制攻击,虽然已经提出了几种解决方案来解决这种安全威胁,但它们主要集中在静态WSN上。本文提出了一种基于人体免疫系统危险理论的多wsn混合(集中式和分布式)节点复制攻击检测方法。正如Danger Theory中所描述的那样,所提出的方法主要包括两种安全方法,即攻击检测和安全控制。这些方法执行多级检测,不仅负责识别而且验证网络中是否存在克隆节点。性能评估证明了该检测方法在MWSN环境中检测克隆节点的效率(以真阳性和假阳性为衡量标准)。
{"title":"Danger theory based node replication attacks detection in mobile wireless sensor network","authors":"H. R. Shaukat, F. Hashim, A. Sali","doi":"10.1109/ISCAIE.2014.7010202","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010202","url":null,"abstract":"Mobile wireless sensor networks (MWSNs) are commonly deployed in a harsh climate, notably unattended without any tamper-resistant tools; thereby an attacker can easily capture the sensor nodes in a very limited time. Once captured, the attacker can duplicate the sensor and subsequently deploys numerous clone nodes into the network in minimum time duration. This new breed of attack is called node replication attack, and while several solutions have been proposed to address such a security threat, they are mainly centralized and somewhat limited to static WSN. In this paper, we propose a hybrid (centralized and distributed) node replication attack detection method for MWSN, which operates based on Danger Theory in human immune system. As depicted in Danger Theory, the proposed method consists of two main security approaches, namely attack detection and security control. These approaches perform a multi-level detection, which is not only responsible to identify but also to verify the existence of clone nodes in the network. Performance evaluation demonstrates the efficiency (in terms of true and false positives) of the proposed detection method in detecting clone nodes in MWSN environment.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130050607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design of configurable, network based interconnection modules for communication centric System-on-Chip applications 为以通信为中心的片上系统应用设计可配置的、基于网络的互连模块
Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010212
P. Mishra, A. Nidhi, J. Kishore, Chetan Kotturshettar
In recent years, System-on-Chip design architectures have increasingly become communication centric. To support such designs, a configurable and scalable interconnect backbone is required. Intellectual Property cores for on chip communication, provided by major field programmable gate array vendors are limited to shared bus or point to point interconnect protocols. To provide network oriented interconnect fabric, we propose a configurable and scalable, network based interconnect module. The interconnections can be configured to four popular on-chip network topologies: mesh, torus, ring and fat-tree. A parameterized and customizable wormhole router is designed, with variable number of ports and link width to support the four networks. A hardware simulator has been designed for in-situ testing of the interconnect module. Two state of art implementation platforms viz Virtex-6 Field programmable gate array and a full custom implementation using 32nm CMOS process has been used to characterize the module. We report area and power dissipation of the module configured to the four topologies, in the two platforms.
近年来,片上系统设计架构越来越以通信为中心。为了支持这样的设计,需要一个可配置和可扩展的互连骨干网。主要现场可编程门阵列供应商提供的用于片上通信的知识产权内核仅限于共享总线或点对点互连协议。为了提供面向网络的互连结构,我们提出了一个可配置和可扩展的基于网络的互连模块。互连可以配置为四种流行的片上网络拓扑结构:网状,环面,环形和胖树。设计了一个参数化的、可定制的虫洞路由器,具有可变的端口数量和链路宽度,以支持四种网络。设计了硬件模拟器,对互连模块进行了现场测试。两个最先进的实现平台,即Virtex-6现场可编程门阵列和使用32nm CMOS工艺的完全定制实现,已被用于表征该模块。我们报告了在两种平台中配置为四种拓扑的模块的面积和功耗。
{"title":"Design of configurable, network based interconnection modules for communication centric System-on-Chip applications","authors":"P. Mishra, A. Nidhi, J. Kishore, Chetan Kotturshettar","doi":"10.1109/ISCAIE.2014.7010212","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010212","url":null,"abstract":"In recent years, System-on-Chip design architectures have increasingly become communication centric. To support such designs, a configurable and scalable interconnect backbone is required. Intellectual Property cores for on chip communication, provided by major field programmable gate array vendors are limited to shared bus or point to point interconnect protocols. To provide network oriented interconnect fabric, we propose a configurable and scalable, network based interconnect module. The interconnections can be configured to four popular on-chip network topologies: mesh, torus, ring and fat-tree. A parameterized and customizable wormhole router is designed, with variable number of ports and link width to support the four networks. A hardware simulator has been designed for in-situ testing of the interconnect module. Two state of art implementation platforms viz Virtex-6 Field programmable gate array and a full custom implementation using 32nm CMOS process has been used to characterize the module. We report area and power dissipation of the module configured to the four topologies, in the two platforms.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126280332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SUAS: Scalable user authentication scheme for secure accessing to cloud-based environments SUAS:用于安全访问基于云的环境的可扩展用户身份验证方案
Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010205
Faraz Fatemi Moghaddam, Rama Roshan Ravan, T. Khodadadi, Yashar Javadianasl, Abbasali Halalzadeh
Cloud computing is an emerging technology that uses the concepts of virtualization, storage, and sharing to store and share resources between users and enterprises. This newfound technology is still unclear to many security problems and one of the most challenging issues in these environments is the reliability of the user authentication process. Therefore, this paper offers an efficient and scalable user authentication scheme for cloud-based environments. The proposed model uses the concepts of agents, cryptography, and key exchanging to enhance and improve the performance of the user authentication and the rate of scalability in cloud-based environments respectively. For achieving to this purpose, the proposed model has been presented based on three main agents: first user authentication agent, second user authentication agent and key manager agent. These agents have divided the process of user authentication and managing keys into several parts to improve the rate of efficiency in this process. Furthermore, the suggested model tries to resist against possible attacks. SUAS, as the suggested model was introduced and simulated in this paper for evaluating the performance and security of the scheme. In overall, the results show that the proposed model has considerable advantages for using in cloud-based environment to increase the salacity, reliability and efficiency of cloud computing models as an emerging technology.
云计算是一种新兴技术,它使用虚拟化、存储和共享的概念在用户和企业之间存储和共享资源。这种新发现的技术在许多安全问题上仍然不清楚,在这些环境中最具挑战性的问题之一是用户身份验证过程的可靠性。因此,本文为基于云的环境提供了一种高效且可扩展的用户身份验证方案。提出的模型使用代理、加密和密钥交换的概念,分别增强和改进基于云的环境中用户身份验证的性能和可扩展性。为了实现这一目标,提出了基于三个主要代理的模型:第一用户认证代理、第二用户认证代理和密钥管理代理。这些代理将用户身份验证和密钥管理过程分成几个部分,以提高该过程的效率。此外,建议的模型试图抵抗可能的攻击。本文介绍了SUAS模型,并对其进行了仿真,以评估该方案的性能和安全性。总体而言,结果表明,所提出的模型在云环境中使用具有相当大的优势,可以提高云计算模型作为一种新兴技术的容量、可靠性和效率。
{"title":"SUAS: Scalable user authentication scheme for secure accessing to cloud-based environments","authors":"Faraz Fatemi Moghaddam, Rama Roshan Ravan, T. Khodadadi, Yashar Javadianasl, Abbasali Halalzadeh","doi":"10.1109/ISCAIE.2014.7010205","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010205","url":null,"abstract":"Cloud computing is an emerging technology that uses the concepts of virtualization, storage, and sharing to store and share resources between users and enterprises. This newfound technology is still unclear to many security problems and one of the most challenging issues in these environments is the reliability of the user authentication process. Therefore, this paper offers an efficient and scalable user authentication scheme for cloud-based environments. The proposed model uses the concepts of agents, cryptography, and key exchanging to enhance and improve the performance of the user authentication and the rate of scalability in cloud-based environments respectively. For achieving to this purpose, the proposed model has been presented based on three main agents: first user authentication agent, second user authentication agent and key manager agent. These agents have divided the process of user authentication and managing keys into several parts to improve the rate of efficiency in this process. Furthermore, the suggested model tries to resist against possible attacks. SUAS, as the suggested model was introduced and simulated in this paper for evaluating the performance and security of the scheme. In overall, the results show that the proposed model has considerable advantages for using in cloud-based environment to increase the salacity, reliability and efficiency of cloud computing models as an emerging technology.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114284965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments GD2SA:用于安全访问云计算环境的地理检测和数字签名授权
Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010206
Faraz Fatemi Moghaddam, Shirin Dabbaghi Varnosfaderani, Soroush Mobedi, Iman Ghavam, R. Khaleghparast
Cloud computing is a new paradigm and emerged technology for hosting and delivering resources over a network such as internet by using concepts of virtualization, processing power and storage. However, many challenging issues are still unclear in cloud-based environments and decrease the rate of reliability and efficiency for service providers and users. User Authentication is one of the most challenging issues in cloud-based environments and according to this issue this paper proposes an efficient user authentication model that involves both of defined phases during registration and accessing processes. Geo Detection and Digital Signature Authorization (GD2SA) is a user authentication tool for provisional access permission in cloud computing environments. The main aim of GD2SA is to compare the location of an un-registered device with the location of the user by using his belonging devices (e.g. smart phone). In addition, this authentication algorithm uses the digital signature of account owner to verify the identity of applicant. This model has been evaluated in this paper according to three main parameters: efficiency, scalability, and security. In overall, the theoretical analysis of the proposed model showed that it can increase the rate of efficiency and reliability in cloud computing as an emerging technology.
云计算是一种新的范例和新兴技术,通过使用虚拟化、处理能力和存储的概念,在互联网等网络上托管和交付资源。然而,在基于云的环境中,许多具有挑战性的问题仍然不清楚,并降低了服务提供商和用户的可靠性和效率。用户认证是云环境中最具挑战性的问题之一,针对这一问题,本文提出了一种高效的用户认证模型,该模型包括注册和访问过程中的定义阶段。GD2SA (Geo Detection and Digital Signature Authorization)是云计算环境下的用户临时访问权限认证工具。GD2SA的主要目的是通过使用用户所属的设备(例如智能手机)将未注册设备的位置与用户的位置进行比较。此外,该认证算法使用帐户所有者的数字签名来验证申请人的身份。本文根据三个主要参数对该模型进行了评估:效率、可扩展性和安全性。总体而言,对所提出模型的理论分析表明,它可以提高云计算作为一种新兴技术的效率和可靠性。
{"title":"GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments","authors":"Faraz Fatemi Moghaddam, Shirin Dabbaghi Varnosfaderani, Soroush Mobedi, Iman Ghavam, R. Khaleghparast","doi":"10.1109/ISCAIE.2014.7010206","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010206","url":null,"abstract":"Cloud computing is a new paradigm and emerged technology for hosting and delivering resources over a network such as internet by using concepts of virtualization, processing power and storage. However, many challenging issues are still unclear in cloud-based environments and decrease the rate of reliability and efficiency for service providers and users. User Authentication is one of the most challenging issues in cloud-based environments and according to this issue this paper proposes an efficient user authentication model that involves both of defined phases during registration and accessing processes. Geo Detection and Digital Signature Authorization (GD2SA) is a user authentication tool for provisional access permission in cloud computing environments. The main aim of GD2SA is to compare the location of an un-registered device with the location of the user by using his belonging devices (e.g. smart phone). In addition, this authentication algorithm uses the digital signature of account owner to verify the identity of applicant. This model has been evaluated in this paper according to three main parameters: efficiency, scalability, and security. In overall, the theoretical analysis of the proposed model showed that it can increase the rate of efficiency and reliability in cloud computing as an emerging technology.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114555274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Time delay estimation for strain imaging using the phase of the complex envelope of RF signal 基于射频信号复包络相位的应变成像时延估计
Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010223
Safayat Bin Hakim, Kazi Khairul Islam
Time Delay Estimation is a basic technique used for locating and tracking radiating acoustic source. TDE process is common for studying signal-to-noise ratio, input signals and systems that are common in process industry. The delay estimate is acquired using the generalized cross-correlation function applied between the original and the time-lagged filtered version of the received signal. In recent years ultrasound elastography proved as a successful alternative of the invasive biopsy. The fundamental necessity lies in estimating the strain for which time delay estimation is a pre-requisite step. Taking the phase of the complex envelope of the pre and post compression RF echo signals it is possible to successfully compute the time delay between them. The ultimate target of an Elastographic process is the noiseless Elastogram which is used to identify the suspected nodules embedded into the deep of tissue column. In this paper the strain information acquired from the phase of complex envelope and the same is used to analyze the quality of Elastograms studying mainly two parameters strain and sampling frequency.
时延估计是定位和跟踪辐射声源的一项基本技术。TDE过程通常用于研究过程工业中常见的信噪比、输入信号和系统。延迟估计是利用接收信号的原始和滞后滤波版本之间的广义互相关函数来获得的。近年来,超声弹性成像被证明是一种成功的替代有创活检的方法。其根本必要性在于应变的估计,而延迟估计是应变估计的先决步骤。利用压缩前后射频回波信号的复杂包络的相位,可以成功地计算出它们之间的时间延迟。弹性成像过程的最终目标是无噪声弹性图,用于识别嵌入组织柱深处的可疑结节。本文利用复合包络线相位获取的应变信息,对弹性图质量进行了分析,主要研究了应变和采样频率两个参数。
{"title":"Time delay estimation for strain imaging using the phase of the complex envelope of RF signal","authors":"Safayat Bin Hakim, Kazi Khairul Islam","doi":"10.1109/ISCAIE.2014.7010223","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010223","url":null,"abstract":"Time Delay Estimation is a basic technique used for locating and tracking radiating acoustic source. TDE process is common for studying signal-to-noise ratio, input signals and systems that are common in process industry. The delay estimate is acquired using the generalized cross-correlation function applied between the original and the time-lagged filtered version of the received signal. In recent years ultrasound elastography proved as a successful alternative of the invasive biopsy. The fundamental necessity lies in estimating the strain for which time delay estimation is a pre-requisite step. Taking the phase of the complex envelope of the pre and post compression RF echo signals it is possible to successfully compute the time delay between them. The ultimate target of an Elastographic process is the noiseless Elastogram which is used to identify the suspected nodules embedded into the deep of tissue column. In this paper the strain information acquired from the phase of complex envelope and the same is used to analyze the quality of Elastograms studying mainly two parameters strain and sampling frequency.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and speed estimation of a faulty 3-phase induction motor by using extended Kalman filter 基于扩展卡尔曼滤波的三相异步电动机故障建模与转速估计
Pub Date : 2014-04-07 DOI: 10.1109/ISCAIE.2014.7010213
M. Jannati, S. Asgari, A. Monadi, N. R. N. Idr, M. J. Aziz, D. Dehghani, A. Faudzi
This paper presents a modeling technique for a faulty 3-phase Induction Motor (3-phase Induction Motor IM under open-phase fault). The developed model has the same structure of equations as the balanced 3-phase model. It is shown that the model can be utilized to estimate the speed of a faulty IM based on an Extended Kalman Filter (EKF) estimation technique, which was developed for a balanced 3-phase IM. Simulation and experimental results are presented to show the validity of the proposed techniques.
提出了一种故障三相异步电动机(开相故障下的三相异步电动机)的建模方法。所建立的模型具有与平衡三相模型相同的方程结构。结果表明,基于扩展卡尔曼滤波(EKF)估计技术,该模型可用于估计故障IM的速度,该技术是针对平衡三相IM开发的。仿真和实验结果表明了所提方法的有效性。
{"title":"Modeling and speed estimation of a faulty 3-phase induction motor by using extended Kalman filter","authors":"M. Jannati, S. Asgari, A. Monadi, N. R. N. Idr, M. J. Aziz, D. Dehghani, A. Faudzi","doi":"10.1109/ISCAIE.2014.7010213","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010213","url":null,"abstract":"This paper presents a modeling technique for a faulty 3-phase Induction Motor (3-phase Induction Motor IM under open-phase fault). The developed model has the same structure of equations as the balanced 3-phase model. It is shown that the model can be utilized to estimate the speed of a faulty IM based on an Extended Kalman Filter (EKF) estimation technique, which was developed for a balanced 3-phase IM. Simulation and experimental results are presented to show the validity of the proposed techniques.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115245857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1