首页 > 最新文献

2015 IEEE International Conference on Electro/Information Technology (EIT)最新文献

英文 中文
Using morphological operations — Erosion based algorithm for edge detection 使用形态学操作-基于侵蚀的边缘检测算法
Pub Date : 2015-05-21 DOI: 10.1109/EIT.2015.7293391
Warqaa Shaher AlAzawee, I. Abdel-Qader, Jareer Abdel-Qader
Edge detection remains a challenging task in many applications even with the abundance of commonly used methods such as Sobel, Robert, Prewitt, Canny, and Cellular Automata. In this paper, a new method is proposed for edge detection using morphological operations and utilizing erosion processes to identify the edges in an image. In this work we propose to use morphological operators of disk shape to detect thin edges from binary images generated using Otsu's thresholding technique. Using several synthetic and real images from a variety of applications, we show that our proposed algorithm provides a robust method in terms of accuracy and computation time, making it suitable for real time processing. The results also show that this algorithm is capable of producing one-pixel-width continuous edges as well as accurate positioning while preserving minute image details. We also present comparison results between our proposed method and Sobel, Robert, Prewitt, Canny and Cellular Automata methods.
即使有大量常用的方法,如Sobel、Robert、Prewitt、Canny和Cellular Automata,边缘检测在许多应用中仍然是一项具有挑战性的任务。本文提出了一种新的边缘检测方法,利用形态学操作和侵蚀过程来识别图像中的边缘。在这项工作中,我们提出使用磁盘形状的形态学算子来检测使用Otsu阈值技术生成的二值图像的薄边缘。通过多种应用的合成图像和真实图像,我们表明我们提出的算法在精度和计算时间方面提供了一种鲁棒的方法,使其适合于实时处理。结果还表明,该算法能够产生1像素宽的连续边缘,并在保持图像微小细节的同时精确定位。我们还提出了我们的方法与Sobel, Robert, Prewitt, Canny和元胞自动机方法之间的比较结果。
{"title":"Using morphological operations — Erosion based algorithm for edge detection","authors":"Warqaa Shaher AlAzawee, I. Abdel-Qader, Jareer Abdel-Qader","doi":"10.1109/EIT.2015.7293391","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293391","url":null,"abstract":"Edge detection remains a challenging task in many applications even with the abundance of commonly used methods such as Sobel, Robert, Prewitt, Canny, and Cellular Automata. In this paper, a new method is proposed for edge detection using morphological operations and utilizing erosion processes to identify the edges in an image. In this work we propose to use morphological operators of disk shape to detect thin edges from binary images generated using Otsu's thresholding technique. Using several synthetic and real images from a variety of applications, we show that our proposed algorithm provides a robust method in terms of accuracy and computation time, making it suitable for real time processing. The results also show that this algorithm is capable of producing one-pixel-width continuous edges as well as accurate positioning while preserving minute image details. We also present comparison results between our proposed method and Sobel, Robert, Prewitt, Canny and Cellular Automata methods.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114925824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A survey on smart grid metering infrastructures: Threats and solutions 智能电网计量基础设施调查:威胁与解决方案
Pub Date : 2015-05-21 DOI: 10.1109/EIT.2015.7293374
Rasel Mahmud, Ranganath Vallakati, Anupam Mukherjee, P. Ranganathan, A. Nejadpak
Without a reliable metering and communication infrastructure, the smart grid could become a catastrophe to national security and economy. A true smart grid infrastructure should detect all existing and predict future threats through intrusion detection methods. Smart grids are susceptible to various physical and cyber-attack as a result of communication, control and computation vulnerabilities employed in the grid. The paper provides a comprehensive study on types of threats and solutions on smart grid communication and metering infrastructures. As a part of this survey, the smart grid metering infrastructures susceptibilities and recommended remedial actions are identified. In addition, the paper details types of known attacks on existing metering infrastructure and defensive methodologies.
如果没有可靠的计量和通信基础设施,智能电网将成为国家安全和经济的灾难。一个真正的智能电网基础设施应该通过入侵检测方法检测所有现有的威胁并预测未来的威胁。由于电网中的通信、控制和计算漏洞,智能电网容易受到各种物理和网络攻击。本文对智能电网通信和计量基础设施的威胁类型和解决方案进行了全面研究。作为调查的一部分,智能电网计量基础设施的脆弱性和建议的补救措施被确定。此外,本文还详细介绍了针对现有计量基础设施和防御方法的已知攻击类型。
{"title":"A survey on smart grid metering infrastructures: Threats and solutions","authors":"Rasel Mahmud, Ranganath Vallakati, Anupam Mukherjee, P. Ranganathan, A. Nejadpak","doi":"10.1109/EIT.2015.7293374","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293374","url":null,"abstract":"Without a reliable metering and communication infrastructure, the smart grid could become a catastrophe to national security and economy. A true smart grid infrastructure should detect all existing and predict future threats through intrusion detection methods. Smart grids are susceptible to various physical and cyber-attack as a result of communication, control and computation vulnerabilities employed in the grid. The paper provides a comprehensive study on types of threats and solutions on smart grid communication and metering infrastructures. As a part of this survey, the smart grid metering infrastructures susceptibilities and recommended remedial actions are identified. In addition, the paper details types of known attacks on existing metering infrastructure and defensive methodologies.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Cyber-physical vehicle tracking system: Requirements for using a radio frequency identification technique 网络物理车辆跟踪系统:使用射频识别技术的要求
Pub Date : 2015-05-21 DOI: 10.1109/EIT.2015.7293396
D. Möller, T. Deriyenko, H. Vakilzadian
This paper introduces cyber-physical vehicle tracking and the essential requirements with regard to radio-frequency identification (RFID) technology. With the advent of the Internet of Things, the dissemination of RFID technology has been constantly increasing in various applications. Thus, RFID and vehicle tracking can open a broad range of opportunities for applications in the transportation and logistics domain. Therefore, this paper is a systematic consideration of specific requirements inherent to the field of vehicle tracking with the help of RFID technology as part of a cyber-physical systems approach.
本文介绍了网络物理车辆跟踪技术及其对射频识别技术的基本要求。随着物联网的到来,RFID技术在各种应用中的传播也在不断增加。因此,RFID和车辆跟踪可以为运输和物流领域的应用提供广泛的机会。因此,本文系统地考虑了在RFID技术的帮助下,作为网络物理系统方法的一部分,车辆跟踪领域固有的特定要求。
{"title":"Cyber-physical vehicle tracking system: Requirements for using a radio frequency identification technique","authors":"D. Möller, T. Deriyenko, H. Vakilzadian","doi":"10.1109/EIT.2015.7293396","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293396","url":null,"abstract":"This paper introduces cyber-physical vehicle tracking and the essential requirements with regard to radio-frequency identification (RFID) technology. With the advent of the Internet of Things, the dissemination of RFID technology has been constantly increasing in various applications. Thus, RFID and vehicle tracking can open a broad range of opportunities for applications in the transportation and logistics domain. Therefore, this paper is a systematic consideration of specific requirements inherent to the field of vehicle tracking with the help of RFID technology as part of a cyber-physical systems approach.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116485517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism 基于智能模糊机制的Modbus-TCP漏洞检测方法
Pub Date : 2015-05-21 DOI: 10.1109/EIT.2015.7293376
Qi Xiong, Hui Liu, Yuan Xu, Huayi Rao, Shengwei Yi, Baofeng Zhang, Wei Jia, Hui Deng
As one of the most popular industrial network protocol used in the energy distribution field, the security, especially vulnerability of Modbus-TCP protocol has attracted great attentions from both academic and industrial field. Due to the Particularity of Modbus-TCP, traditional fuzzing framework for vulnerability detecting cannot work efficiently. To overcome this drawback, a special smart fuzzing technology for Modbus-TCP is proposed, the architecture is described in detail, an adaptive algorithm for test case generating and the workflow of the testing process are presented, which can smartly generate test case according to the feedback from target. The result of the simulation experiment show that the mechanism described can satisfy the requirement of the vulnerability detecting for Modbus-TCP well. What's more, compared with traditional fuzzing framework, the quality of the test case and the efficiency of the process are apparently improved without losing the coverage.
Modbus-TCP协议作为能源分配领域中应用最广泛的工业网络协议之一,其安全性,尤其是其存在的漏洞受到了学术界和工业界的高度关注。由于Modbus-TCP协议的特殊性,传统的漏洞检测模糊框架无法有效地进行漏洞检测。针对这一缺点,提出了一种针对Modbus-TCP的专用智能模糊测试技术,详细描述了该技术的体系结构,给出了一种自适应的测试用例生成算法和测试过程的工作流程,能够根据目标的反馈智能地生成测试用例。仿真实验结果表明,所描述的机制能够很好地满足Modbus-TCP漏洞检测的要求。并且,与传统的模糊测试框架相比,测试用例的质量和过程的效率得到了明显的提高,同时又不损失测试的覆盖率。
{"title":"A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism","authors":"Qi Xiong, Hui Liu, Yuan Xu, Huayi Rao, Shengwei Yi, Baofeng Zhang, Wei Jia, Hui Deng","doi":"10.1109/EIT.2015.7293376","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293376","url":null,"abstract":"As one of the most popular industrial network protocol used in the energy distribution field, the security, especially vulnerability of Modbus-TCP protocol has attracted great attentions from both academic and industrial field. Due to the Particularity of Modbus-TCP, traditional fuzzing framework for vulnerability detecting cannot work efficiently. To overcome this drawback, a special smart fuzzing technology for Modbus-TCP is proposed, the architecture is described in detail, an adaptive algorithm for test case generating and the workflow of the testing process are presented, which can smartly generate test case according to the feedback from target. The result of the simulation experiment show that the mechanism described can satisfy the requirement of the vulnerability detecting for Modbus-TCP well. What's more, compared with traditional fuzzing framework, the quality of the test case and the efficiency of the process are apparently improved without losing the coverage.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132251609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Estimating degree distributions of large networks using non-backtracking random walk with non-uniform jump 基于非均匀跳变的非回溯随机漫步估计大型网络的度分布
Pub Date : 2015-05-21 DOI: 10.1109/EIT.2015.7293414
Sirinda Palahan
This work presents a hybrid sampling method that mixes a non-backtracking random walk and a variation of random walk with jump. We show that the proposed method combines the strengths of both random walks. In particular, the walker of our method will not backtrack to the previously visited vertex so it is likely to produce less number of duplicate samples than the simple random walk. Moreover, the walker's ability to jump ensures that it will explore a network faster. We applied our method on six real world online networks where some of the networks contain millions of vertices. The experimental results show that our method outperformed a non-backtracking random walk and a random walk with jump on estimating degree distributions.
本文提出了一种混合非回溯随机行走和带跳跃的随机行走变体的混合抽样方法。我们表明,所提出的方法结合了两种随机漫步的优势。特别是,我们的方法的步行者不会回溯到之前访问的顶点,所以它可能比简单的随机漫步产生更少的重复样本。此外,步行者的跳跃能力确保了它能更快地探索网络。我们将我们的方法应用于六个真实的在线网络,其中一些网络包含数百万个顶点。实验结果表明,该方法在估计度分布上优于非回溯随机漫步和带跳跃随机漫步。
{"title":"Estimating degree distributions of large networks using non-backtracking random walk with non-uniform jump","authors":"Sirinda Palahan","doi":"10.1109/EIT.2015.7293414","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293414","url":null,"abstract":"This work presents a hybrid sampling method that mixes a non-backtracking random walk and a variation of random walk with jump. We show that the proposed method combines the strengths of both random walks. In particular, the walker of our method will not backtrack to the previously visited vertex so it is likely to produce less number of duplicate samples than the simple random walk. Moreover, the walker's ability to jump ensures that it will explore a network faster. We applied our method on six real world online networks where some of the networks contain millions of vertices. The experimental results show that our method outperformed a non-backtracking random walk and a random walk with jump on estimating degree distributions.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133960490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effect of radial structure on the performance of lateral high-power GaAs photoconductive switch 径向结构对横向大功率砷化镓光导开关性能的影响
Pub Date : 2015-05-21 DOI: 10.1109/EIT.2015.7293380
Z. Hemmat, E. Moreno, Farhood Rasouli, S. Alizad
In this paper, the effect of radial structure on the performance of a linear-lateral GaAs high power photoconductive semiconductor switch (PCSS) is investigated. For this purpose a three-dimensional device modeling is used to model the optically initiated GaAs switch. In this simulation a p-type device with carbon as shallow acceptor is compensated by deep donor EL2 level as a trap level. The PCSS device is designed in a back-triggered, radially symmetric switch structure which extends the blocking voltage by reducing the peak electric field near the electrodes. Device modeling was performed and the effect of different trap concentrations on dark I-V characteristics has been investigated. In this paper effect of device thickness, different bias voltages and optical power density on transient simulation is reported.
本文研究了径向结构对线侧向砷化镓高功率光导半导体开关(PCSS)性能的影响。为此,采用三维器件建模方法对光引发砷化镓开关进行建模。在这个模拟中,以碳作为浅受体的p型器件由深供体EL2电平作为陷阱电平补偿。PCSS器件采用反向触发的径向对称开关结构,通过降低电极附近的峰值电场来延长阻塞电压。进行了器件建模,并研究了不同陷阱浓度对暗I-V特性的影响。本文报道了器件厚度、不同偏置电压和光功率密度对瞬态仿真的影响。
{"title":"Effect of radial structure on the performance of lateral high-power GaAs photoconductive switch","authors":"Z. Hemmat, E. Moreno, Farhood Rasouli, S. Alizad","doi":"10.1109/EIT.2015.7293380","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293380","url":null,"abstract":"In this paper, the effect of radial structure on the performance of a linear-lateral GaAs high power photoconductive semiconductor switch (PCSS) is investigated. For this purpose a three-dimensional device modeling is used to model the optically initiated GaAs switch. In this simulation a p-type device with carbon as shallow acceptor is compensated by deep donor EL2 level as a trap level. The PCSS device is designed in a back-triggered, radially symmetric switch structure which extends the blocking voltage by reducing the peak electric field near the electrodes. Device modeling was performed and the effect of different trap concentrations on dark I-V characteristics has been investigated. In this paper effect of device thickness, different bias voltages and optical power density on transient simulation is reported.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127387376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing carry-lookahead logic through a comparison of PMOS and NMOS block inversions 通过PMOS和NMOS块反转的比较优化进位前瞻逻辑
Pub Date : 2015-05-21 DOI: 10.1109/EIT.2015.7293410
M. Binggeli, Spencer Denton, Naga Spandana Muppaneni, Steve Chiu
The fast performance of a carry-lookahead adder (CLA) comes from the ability to input a carry signal into each full adder block that depends on all preceding adder blocks. While the translation of this carry signal logic into CMOS transistors has a unique solution, this paper demonstrates that there are four different ways to connect the PMOS and NMOS transistors to Vdd, ground, and the output. Each method is analyzed according to its speed performance to find the most desirable CMOS configuration. This configuration is further improved through transistor sizing to achieve the most optimized CLA carry circuit. The result is given as a schematic, as well as a stick diagram.
进位前瞻加法器(CLA)的快速性能来自于将进位信号输入到依赖于所有前加法器块的每个完整加法器块的能力。虽然将这种进位信号逻辑转换为CMOS晶体管具有独特的解决方案,但本文演示了将PMOS和NMOS晶体管连接到Vdd,地和输出的四种不同方法。根据每种方法的速度性能对其进行分析,以找到最理想的CMOS配置。这种配置通过晶体管尺寸进一步改进,以实现最优化的CLA进位电路。结果以示意图和简图的形式给出。
{"title":"Optimizing carry-lookahead logic through a comparison of PMOS and NMOS block inversions","authors":"M. Binggeli, Spencer Denton, Naga Spandana Muppaneni, Steve Chiu","doi":"10.1109/EIT.2015.7293410","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293410","url":null,"abstract":"The fast performance of a carry-lookahead adder (CLA) comes from the ability to input a carry signal into each full adder block that depends on all preceding adder blocks. While the translation of this carry signal logic into CMOS transistors has a unique solution, this paper demonstrates that there are four different ways to connect the PMOS and NMOS transistors to Vdd, ground, and the output. Each method is analyzed according to its speed performance to find the most desirable CMOS configuration. This configuration is further improved through transistor sizing to achieve the most optimized CLA carry circuit. The result is given as a schematic, as well as a stick diagram.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129271054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Quantifying abnormal QRS peaks using a novel time-domain peak detection algorithm: Application in patients with cardiomyopathy at risk of sudden death 用一种新的时域峰检测算法量化异常QRS峰:在有猝死危险的心肌病患者中的应用
Pub Date : 2015-05-21 DOI: 10.1109/EIT.2015.7293317
A. Suszko, R. Dalvi, M. Das, V. Chauhan
Abnormal components in the QRS complex on the surface electrocardiogram have been used to predict sudden cardiac death in patients with heart disease. We propose a novel method to automate detection of abnormal peaks within the QRS complex. The approach involves identification of such peaks from consecutive unfiltered 10-beat QRS averages. A simulation using synthetic QRS peaks is conducted to assess the methods robustness to noise. The performance of the method is tested using high-resolution precordial lead electrocardiograms recorded from normal subjects and patients with cardiomyopathy. The 10-beat average performance is compared to a 100-beat average, as is commonly used in other state-of-the-art QRS component algorithms, and shown to be more sensitive in detecting abnormal QRS peaks. The clinical performance is tested amongst the cardiomyopathy patients and the method is shown to discriminate those at risk of sudden cardiac death with high sensitivity and specificity.
表面心电图上QRS复合体的异常成分已被用于预测心脏病患者的心源性猝死。我们提出了一种新的方法来自动检测QRS复合体中的异常峰。该方法涉及从连续未过滤的10拍QRS平均值中识别此类峰值。利用合成QRS峰进行了仿真,以评估该方法对噪声的鲁棒性。使用正常受试者和心肌病患者记录的高分辨率心前导联心电图来测试该方法的性能。将10拍平均性能与其他最先进的QRS分量算法中常用的100拍平均性能进行比较,并显示在检测异常QRS峰值时更加敏感。对心肌病患者的临床表现进行了测试,结果表明该方法对心源性猝死的高危人群具有较高的敏感性和特异性。
{"title":"Quantifying abnormal QRS peaks using a novel time-domain peak detection algorithm: Application in patients with cardiomyopathy at risk of sudden death","authors":"A. Suszko, R. Dalvi, M. Das, V. Chauhan","doi":"10.1109/EIT.2015.7293317","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293317","url":null,"abstract":"Abnormal components in the QRS complex on the surface electrocardiogram have been used to predict sudden cardiac death in patients with heart disease. We propose a novel method to automate detection of abnormal peaks within the QRS complex. The approach involves identification of such peaks from consecutive unfiltered 10-beat QRS averages. A simulation using synthetic QRS peaks is conducted to assess the methods robustness to noise. The performance of the method is tested using high-resolution precordial lead electrocardiograms recorded from normal subjects and patients with cardiomyopathy. The 10-beat average performance is compared to a 100-beat average, as is commonly used in other state-of-the-art QRS component algorithms, and shown to be more sensitive in detecting abnormal QRS peaks. The clinical performance is tested amongst the cardiomyopathy patients and the method is shown to discriminate those at risk of sudden cardiac death with high sensitivity and specificity.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"89 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129976411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Virtual machine placement optimization in SDN-aware federated clouds 支持sdn的联邦云中的虚拟机布局优化
Pub Date : 2015-05-21 DOI: 10.1109/EIT.2015.7293373
T. Somasundaram, K. Govindarajan
The cloud providers provide computing, storage and network resources in an on-demand manner and pay as per usage mode. Nevertheless, the cloud consumers are facing issue to find out the suitable cloud resources that will meet their application requirements. Hence, the proposed research work introduces the cloud brokering concept that acts as the mediator between the user and the cloud provider to perform the mapping between the user application requirements with the available cloud resources. In addition to that, in this research paper, we introduced Software-Defined Networking (SDN) based networking to manage and configure the networks in a dynamic manner. However, the conventional cloud brokering concepts selects the resources from a single cloud provider; in some circumstances, it fails to satisfy the user requests in a single cloud provider. Henceforth, the cloud broker selects the cloud resources across the multiple cloud resources known as federated clouds. In these scenarios, the placement of virtual machines is the most challenging and complex issue, hence, in this research work, a Multiple Knapsack Problem (MKP) has been designed to solve the complex virtual machine placement problem in the SDN-aware federated clouds. It is simulated and tested based on the real-world application traces and the various performance metrics such as execution time, execution cost, and user satisfaction values are measured.
云提供商以按需方式提供计算、存储和网络资源,并按使用模式付费。然而,云用户面临的问题是找到适合其应用程序需求的云资源。因此,建议的研究工作引入了云代理概念,它作为用户和云提供商之间的中介,执行用户应用程序需求与可用云资源之间的映射。此外,在本研究论文中,我们引入了基于软件定义网络(SDN)的网络,以动态的方式管理和配置网络。然而,传统的云代理概念是从单个云提供商中选择资源;在某些情况下,它无法满足单个云提供商中的用户请求。从此以后,云代理跨称为联邦云的多个云资源选择云资源。在这些场景中,虚拟机的放置是最具挑战性和最复杂的问题,因此,在本研究工作中,设计了一个多背包问题(Multiple backpack Problem, MKP)来解决sdn感知的联邦云中复杂的虚拟机放置问题。它是基于实际应用程序跟踪和各种性能指标(如执行时间、执行成本和用户满意度值)进行模拟和测试的。
{"title":"Virtual machine placement optimization in SDN-aware federated clouds","authors":"T. Somasundaram, K. Govindarajan","doi":"10.1109/EIT.2015.7293373","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293373","url":null,"abstract":"The cloud providers provide computing, storage and network resources in an on-demand manner and pay as per usage mode. Nevertheless, the cloud consumers are facing issue to find out the suitable cloud resources that will meet their application requirements. Hence, the proposed research work introduces the cloud brokering concept that acts as the mediator between the user and the cloud provider to perform the mapping between the user application requirements with the available cloud resources. In addition to that, in this research paper, we introduced Software-Defined Networking (SDN) based networking to manage and configure the networks in a dynamic manner. However, the conventional cloud brokering concepts selects the resources from a single cloud provider; in some circumstances, it fails to satisfy the user requests in a single cloud provider. Henceforth, the cloud broker selects the cloud resources across the multiple cloud resources known as federated clouds. In these scenarios, the placement of virtual machines is the most challenging and complex issue, hence, in this research work, a Multiple Knapsack Problem (MKP) has been designed to solve the complex virtual machine placement problem in the SDN-aware federated clouds. It is simulated and tested based on the real-world application traces and the various performance metrics such as execution time, execution cost, and user satisfaction values are measured.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129690598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transition to green cellular network 向绿色蜂窝网络过渡
Pub Date : 2015-05-21 DOI: 10.1109/EIT.2015.7293332
S. Faruque
This paper shows that in every propagation environment, there is a free space propagation medium, due to the existence of Fresnel Zones. This gives rise to Fresnel zone break point do, where do is the distance between the transmitter and the receiver. Radio frequency propagation within do is similar to free space propagation. This enables us to design low power small cells to conserve energy, thereby reducing RF & CO2 pollution. With this foundation in mind, we will develop a hierarchical cellular structure for the next generation green cellular network comprising Macrocell, Microcell, Picocell and Femtocell.
本文表明,由于菲涅耳带的存在,在每一个传播环境中都存在一个自由空间传播介质。这就产生了菲涅耳带断点do,其中do是发射器和接收器之间的距离。无线电频率在do内传播类似于自由空间传播。这使我们能够设计低功耗的小型电池来节约能源,从而减少射频和二氧化碳污染。在此基础上,我们将为下一代绿色蜂窝网络开发包含Macrocell, Microcell, Picocell和Femtocell的分层蜂窝结构。
{"title":"Transition to green cellular network","authors":"S. Faruque","doi":"10.1109/EIT.2015.7293332","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293332","url":null,"abstract":"This paper shows that in every propagation environment, there is a free space propagation medium, due to the existence of Fresnel Zones. This gives rise to Fresnel zone break point do, where do is the distance between the transmitter and the receiver. Radio frequency propagation within do is similar to free space propagation. This enables us to design low power small cells to conserve energy, thereby reducing RF & CO2 pollution. With this foundation in mind, we will develop a hierarchical cellular structure for the next generation green cellular network comprising Macrocell, Microcell, Picocell and Femtocell.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129894571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 IEEE International Conference on Electro/Information Technology (EIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1