Pub Date : 2015-05-21DOI: 10.1109/EIT.2015.7293391
Warqaa Shaher AlAzawee, I. Abdel-Qader, Jareer Abdel-Qader
Edge detection remains a challenging task in many applications even with the abundance of commonly used methods such as Sobel, Robert, Prewitt, Canny, and Cellular Automata. In this paper, a new method is proposed for edge detection using morphological operations and utilizing erosion processes to identify the edges in an image. In this work we propose to use morphological operators of disk shape to detect thin edges from binary images generated using Otsu's thresholding technique. Using several synthetic and real images from a variety of applications, we show that our proposed algorithm provides a robust method in terms of accuracy and computation time, making it suitable for real time processing. The results also show that this algorithm is capable of producing one-pixel-width continuous edges as well as accurate positioning while preserving minute image details. We also present comparison results between our proposed method and Sobel, Robert, Prewitt, Canny and Cellular Automata methods.
{"title":"Using morphological operations — Erosion based algorithm for edge detection","authors":"Warqaa Shaher AlAzawee, I. Abdel-Qader, Jareer Abdel-Qader","doi":"10.1109/EIT.2015.7293391","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293391","url":null,"abstract":"Edge detection remains a challenging task in many applications even with the abundance of commonly used methods such as Sobel, Robert, Prewitt, Canny, and Cellular Automata. In this paper, a new method is proposed for edge detection using morphological operations and utilizing erosion processes to identify the edges in an image. In this work we propose to use morphological operators of disk shape to detect thin edges from binary images generated using Otsu's thresholding technique. Using several synthetic and real images from a variety of applications, we show that our proposed algorithm provides a robust method in terms of accuracy and computation time, making it suitable for real time processing. The results also show that this algorithm is capable of producing one-pixel-width continuous edges as well as accurate positioning while preserving minute image details. We also present comparison results between our proposed method and Sobel, Robert, Prewitt, Canny and Cellular Automata methods.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114925824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-21DOI: 10.1109/EIT.2015.7293374
Rasel Mahmud, Ranganath Vallakati, Anupam Mukherjee, P. Ranganathan, A. Nejadpak
Without a reliable metering and communication infrastructure, the smart grid could become a catastrophe to national security and economy. A true smart grid infrastructure should detect all existing and predict future threats through intrusion detection methods. Smart grids are susceptible to various physical and cyber-attack as a result of communication, control and computation vulnerabilities employed in the grid. The paper provides a comprehensive study on types of threats and solutions on smart grid communication and metering infrastructures. As a part of this survey, the smart grid metering infrastructures susceptibilities and recommended remedial actions are identified. In addition, the paper details types of known attacks on existing metering infrastructure and defensive methodologies.
{"title":"A survey on smart grid metering infrastructures: Threats and solutions","authors":"Rasel Mahmud, Ranganath Vallakati, Anupam Mukherjee, P. Ranganathan, A. Nejadpak","doi":"10.1109/EIT.2015.7293374","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293374","url":null,"abstract":"Without a reliable metering and communication infrastructure, the smart grid could become a catastrophe to national security and economy. A true smart grid infrastructure should detect all existing and predict future threats through intrusion detection methods. Smart grids are susceptible to various physical and cyber-attack as a result of communication, control and computation vulnerabilities employed in the grid. The paper provides a comprehensive study on types of threats and solutions on smart grid communication and metering infrastructures. As a part of this survey, the smart grid metering infrastructures susceptibilities and recommended remedial actions are identified. In addition, the paper details types of known attacks on existing metering infrastructure and defensive methodologies.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-21DOI: 10.1109/EIT.2015.7293396
D. Möller, T. Deriyenko, H. Vakilzadian
This paper introduces cyber-physical vehicle tracking and the essential requirements with regard to radio-frequency identification (RFID) technology. With the advent of the Internet of Things, the dissemination of RFID technology has been constantly increasing in various applications. Thus, RFID and vehicle tracking can open a broad range of opportunities for applications in the transportation and logistics domain. Therefore, this paper is a systematic consideration of specific requirements inherent to the field of vehicle tracking with the help of RFID technology as part of a cyber-physical systems approach.
{"title":"Cyber-physical vehicle tracking system: Requirements for using a radio frequency identification technique","authors":"D. Möller, T. Deriyenko, H. Vakilzadian","doi":"10.1109/EIT.2015.7293396","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293396","url":null,"abstract":"This paper introduces cyber-physical vehicle tracking and the essential requirements with regard to radio-frequency identification (RFID) technology. With the advent of the Internet of Things, the dissemination of RFID technology has been constantly increasing in various applications. Thus, RFID and vehicle tracking can open a broad range of opportunities for applications in the transportation and logistics domain. Therefore, this paper is a systematic consideration of specific requirements inherent to the field of vehicle tracking with the help of RFID technology as part of a cyber-physical systems approach.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116485517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As one of the most popular industrial network protocol used in the energy distribution field, the security, especially vulnerability of Modbus-TCP protocol has attracted great attentions from both academic and industrial field. Due to the Particularity of Modbus-TCP, traditional fuzzing framework for vulnerability detecting cannot work efficiently. To overcome this drawback, a special smart fuzzing technology for Modbus-TCP is proposed, the architecture is described in detail, an adaptive algorithm for test case generating and the workflow of the testing process are presented, which can smartly generate test case according to the feedback from target. The result of the simulation experiment show that the mechanism described can satisfy the requirement of the vulnerability detecting for Modbus-TCP well. What's more, compared with traditional fuzzing framework, the quality of the test case and the efficiency of the process are apparently improved without losing the coverage.
{"title":"A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism","authors":"Qi Xiong, Hui Liu, Yuan Xu, Huayi Rao, Shengwei Yi, Baofeng Zhang, Wei Jia, Hui Deng","doi":"10.1109/EIT.2015.7293376","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293376","url":null,"abstract":"As one of the most popular industrial network protocol used in the energy distribution field, the security, especially vulnerability of Modbus-TCP protocol has attracted great attentions from both academic and industrial field. Due to the Particularity of Modbus-TCP, traditional fuzzing framework for vulnerability detecting cannot work efficiently. To overcome this drawback, a special smart fuzzing technology for Modbus-TCP is proposed, the architecture is described in detail, an adaptive algorithm for test case generating and the workflow of the testing process are presented, which can smartly generate test case according to the feedback from target. The result of the simulation experiment show that the mechanism described can satisfy the requirement of the vulnerability detecting for Modbus-TCP well. What's more, compared with traditional fuzzing framework, the quality of the test case and the efficiency of the process are apparently improved without losing the coverage.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132251609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-21DOI: 10.1109/EIT.2015.7293414
Sirinda Palahan
This work presents a hybrid sampling method that mixes a non-backtracking random walk and a variation of random walk with jump. We show that the proposed method combines the strengths of both random walks. In particular, the walker of our method will not backtrack to the previously visited vertex so it is likely to produce less number of duplicate samples than the simple random walk. Moreover, the walker's ability to jump ensures that it will explore a network faster. We applied our method on six real world online networks where some of the networks contain millions of vertices. The experimental results show that our method outperformed a non-backtracking random walk and a random walk with jump on estimating degree distributions.
{"title":"Estimating degree distributions of large networks using non-backtracking random walk with non-uniform jump","authors":"Sirinda Palahan","doi":"10.1109/EIT.2015.7293414","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293414","url":null,"abstract":"This work presents a hybrid sampling method that mixes a non-backtracking random walk and a variation of random walk with jump. We show that the proposed method combines the strengths of both random walks. In particular, the walker of our method will not backtrack to the previously visited vertex so it is likely to produce less number of duplicate samples than the simple random walk. Moreover, the walker's ability to jump ensures that it will explore a network faster. We applied our method on six real world online networks where some of the networks contain millions of vertices. The experimental results show that our method outperformed a non-backtracking random walk and a random walk with jump on estimating degree distributions.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133960490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-21DOI: 10.1109/EIT.2015.7293380
Z. Hemmat, E. Moreno, Farhood Rasouli, S. Alizad
In this paper, the effect of radial structure on the performance of a linear-lateral GaAs high power photoconductive semiconductor switch (PCSS) is investigated. For this purpose a three-dimensional device modeling is used to model the optically initiated GaAs switch. In this simulation a p-type device with carbon as shallow acceptor is compensated by deep donor EL2 level as a trap level. The PCSS device is designed in a back-triggered, radially symmetric switch structure which extends the blocking voltage by reducing the peak electric field near the electrodes. Device modeling was performed and the effect of different trap concentrations on dark I-V characteristics has been investigated. In this paper effect of device thickness, different bias voltages and optical power density on transient simulation is reported.
{"title":"Effect of radial structure on the performance of lateral high-power GaAs photoconductive switch","authors":"Z. Hemmat, E. Moreno, Farhood Rasouli, S. Alizad","doi":"10.1109/EIT.2015.7293380","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293380","url":null,"abstract":"In this paper, the effect of radial structure on the performance of a linear-lateral GaAs high power photoconductive semiconductor switch (PCSS) is investigated. For this purpose a three-dimensional device modeling is used to model the optically initiated GaAs switch. In this simulation a p-type device with carbon as shallow acceptor is compensated by deep donor EL2 level as a trap level. The PCSS device is designed in a back-triggered, radially symmetric switch structure which extends the blocking voltage by reducing the peak electric field near the electrodes. Device modeling was performed and the effect of different trap concentrations on dark I-V characteristics has been investigated. In this paper effect of device thickness, different bias voltages and optical power density on transient simulation is reported.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127387376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-21DOI: 10.1109/EIT.2015.7293410
M. Binggeli, Spencer Denton, Naga Spandana Muppaneni, Steve Chiu
The fast performance of a carry-lookahead adder (CLA) comes from the ability to input a carry signal into each full adder block that depends on all preceding adder blocks. While the translation of this carry signal logic into CMOS transistors has a unique solution, this paper demonstrates that there are four different ways to connect the PMOS and NMOS transistors to Vdd, ground, and the output. Each method is analyzed according to its speed performance to find the most desirable CMOS configuration. This configuration is further improved through transistor sizing to achieve the most optimized CLA carry circuit. The result is given as a schematic, as well as a stick diagram.
{"title":"Optimizing carry-lookahead logic through a comparison of PMOS and NMOS block inversions","authors":"M. Binggeli, Spencer Denton, Naga Spandana Muppaneni, Steve Chiu","doi":"10.1109/EIT.2015.7293410","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293410","url":null,"abstract":"The fast performance of a carry-lookahead adder (CLA) comes from the ability to input a carry signal into each full adder block that depends on all preceding adder blocks. While the translation of this carry signal logic into CMOS transistors has a unique solution, this paper demonstrates that there are four different ways to connect the PMOS and NMOS transistors to Vdd, ground, and the output. Each method is analyzed according to its speed performance to find the most desirable CMOS configuration. This configuration is further improved through transistor sizing to achieve the most optimized CLA carry circuit. The result is given as a schematic, as well as a stick diagram.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129271054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-21DOI: 10.1109/EIT.2015.7293317
A. Suszko, R. Dalvi, M. Das, V. Chauhan
Abnormal components in the QRS complex on the surface electrocardiogram have been used to predict sudden cardiac death in patients with heart disease. We propose a novel method to automate detection of abnormal peaks within the QRS complex. The approach involves identification of such peaks from consecutive unfiltered 10-beat QRS averages. A simulation using synthetic QRS peaks is conducted to assess the methods robustness to noise. The performance of the method is tested using high-resolution precordial lead electrocardiograms recorded from normal subjects and patients with cardiomyopathy. The 10-beat average performance is compared to a 100-beat average, as is commonly used in other state-of-the-art QRS component algorithms, and shown to be more sensitive in detecting abnormal QRS peaks. The clinical performance is tested amongst the cardiomyopathy patients and the method is shown to discriminate those at risk of sudden cardiac death with high sensitivity and specificity.
{"title":"Quantifying abnormal QRS peaks using a novel time-domain peak detection algorithm: Application in patients with cardiomyopathy at risk of sudden death","authors":"A. Suszko, R. Dalvi, M. Das, V. Chauhan","doi":"10.1109/EIT.2015.7293317","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293317","url":null,"abstract":"Abnormal components in the QRS complex on the surface electrocardiogram have been used to predict sudden cardiac death in patients with heart disease. We propose a novel method to automate detection of abnormal peaks within the QRS complex. The approach involves identification of such peaks from consecutive unfiltered 10-beat QRS averages. A simulation using synthetic QRS peaks is conducted to assess the methods robustness to noise. The performance of the method is tested using high-resolution precordial lead electrocardiograms recorded from normal subjects and patients with cardiomyopathy. The 10-beat average performance is compared to a 100-beat average, as is commonly used in other state-of-the-art QRS component algorithms, and shown to be more sensitive in detecting abnormal QRS peaks. The clinical performance is tested amongst the cardiomyopathy patients and the method is shown to discriminate those at risk of sudden cardiac death with high sensitivity and specificity.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"89 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129976411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-21DOI: 10.1109/EIT.2015.7293373
T. Somasundaram, K. Govindarajan
The cloud providers provide computing, storage and network resources in an on-demand manner and pay as per usage mode. Nevertheless, the cloud consumers are facing issue to find out the suitable cloud resources that will meet their application requirements. Hence, the proposed research work introduces the cloud brokering concept that acts as the mediator between the user and the cloud provider to perform the mapping between the user application requirements with the available cloud resources. In addition to that, in this research paper, we introduced Software-Defined Networking (SDN) based networking to manage and configure the networks in a dynamic manner. However, the conventional cloud brokering concepts selects the resources from a single cloud provider; in some circumstances, it fails to satisfy the user requests in a single cloud provider. Henceforth, the cloud broker selects the cloud resources across the multiple cloud resources known as federated clouds. In these scenarios, the placement of virtual machines is the most challenging and complex issue, hence, in this research work, a Multiple Knapsack Problem (MKP) has been designed to solve the complex virtual machine placement problem in the SDN-aware federated clouds. It is simulated and tested based on the real-world application traces and the various performance metrics such as execution time, execution cost, and user satisfaction values are measured.
{"title":"Virtual machine placement optimization in SDN-aware federated clouds","authors":"T. Somasundaram, K. Govindarajan","doi":"10.1109/EIT.2015.7293373","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293373","url":null,"abstract":"The cloud providers provide computing, storage and network resources in an on-demand manner and pay as per usage mode. Nevertheless, the cloud consumers are facing issue to find out the suitable cloud resources that will meet their application requirements. Hence, the proposed research work introduces the cloud brokering concept that acts as the mediator between the user and the cloud provider to perform the mapping between the user application requirements with the available cloud resources. In addition to that, in this research paper, we introduced Software-Defined Networking (SDN) based networking to manage and configure the networks in a dynamic manner. However, the conventional cloud brokering concepts selects the resources from a single cloud provider; in some circumstances, it fails to satisfy the user requests in a single cloud provider. Henceforth, the cloud broker selects the cloud resources across the multiple cloud resources known as federated clouds. In these scenarios, the placement of virtual machines is the most challenging and complex issue, hence, in this research work, a Multiple Knapsack Problem (MKP) has been designed to solve the complex virtual machine placement problem in the SDN-aware federated clouds. It is simulated and tested based on the real-world application traces and the various performance metrics such as execution time, execution cost, and user satisfaction values are measured.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129690598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-21DOI: 10.1109/EIT.2015.7293332
S. Faruque
This paper shows that in every propagation environment, there is a free space propagation medium, due to the existence of Fresnel Zones. This gives rise to Fresnel zone break point do, where do is the distance between the transmitter and the receiver. Radio frequency propagation within do is similar to free space propagation. This enables us to design low power small cells to conserve energy, thereby reducing RF & CO2 pollution. With this foundation in mind, we will develop a hierarchical cellular structure for the next generation green cellular network comprising Macrocell, Microcell, Picocell and Femtocell.
{"title":"Transition to green cellular network","authors":"S. Faruque","doi":"10.1109/EIT.2015.7293332","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293332","url":null,"abstract":"This paper shows that in every propagation environment, there is a free space propagation medium, due to the existence of Fresnel Zones. This gives rise to Fresnel zone break point do, where do is the distance between the transmitter and the receiver. Radio frequency propagation within do is similar to free space propagation. This enables us to design low power small cells to conserve energy, thereby reducing RF & CO2 pollution. With this foundation in mind, we will develop a hierarchical cellular structure for the next generation green cellular network comprising Macrocell, Microcell, Picocell and Femtocell.","PeriodicalId":415614,"journal":{"name":"2015 IEEE International Conference on Electro/Information Technology (EIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129894571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}