Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686225
J. AlMutawa
In this paper, we develop a subspace system identification algorithm for the Errors-In-Variables (EIV) model subject to observation noise with outliers. To this end, we proposed the random search algorithm in order to solve the Minimum-Covariance-Determinant (MCD) problem. By using the MCD, we identify and delete the outliers, and then we apply the classical EIV subspace system identification algorithms to get state space model. In addition, we show that the problem of detecting the outliers in the closed loop systems is especial case of the EIV model. The propose algorithm has been applied to heat exchanger data.
{"title":"Identification of errors-in-variables model with observation outlier based on MCD","authors":"J. AlMutawa","doi":"10.1109/IEEEGCC.2006.5686225","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686225","url":null,"abstract":"In this paper, we develop a subspace system identification algorithm for the Errors-In-Variables (EIV) model subject to observation noise with outliers. To this end, we proposed the random search algorithm in order to solve the Minimum-Covariance-Determinant (MCD) problem. By using the MCD, we identify and delete the outliers, and then we apply the classical EIV subspace system identification algorithms to get state space model. In addition, we show that the problem of detecting the outliers in the closed loop systems is especial case of the EIV model. The propose algorithm has been applied to heat exchanger data.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115302516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686252
A. Vallavaraj, B. Stewart, D. K. Harrison, F. G. McIntosh
In this paper various phasing schemes that reduce the Peak-to-Average Power Ratio (PAPR) within OFDM systems are discussed. Simulation results on the effect of these phasing schemes in reducing PAPR are also presented. Companding OFDM symbols prior to transmission using the μ-Law has also been shown in previous papers to further reduce the PAPR. This paper now presents the results of combining both companding with various phasing schemes. The Bit-Error Rate (BER) performance of various PAPR reduction techniques in an Additive White Gaussian Noise (AWGN) channel is also presented. It is shown that combining companding and the application of phasing schemes can significantly improve further PAPR reduction as well as improve the BER performance.
{"title":"Reduction of Peak-to-Average Power Ratio of OFDM symbols using phasing schemes combined with companding","authors":"A. Vallavaraj, B. Stewart, D. K. Harrison, F. G. McIntosh","doi":"10.1109/IEEEGCC.2006.5686252","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686252","url":null,"abstract":"In this paper various phasing schemes that reduce the Peak-to-Average Power Ratio (PAPR) within OFDM systems are discussed. Simulation results on the effect of these phasing schemes in reducing PAPR are also presented. Companding OFDM symbols prior to transmission using the μ-Law has also been shown in previous papers to further reduce the PAPR. This paper now presents the results of combining both companding with various phasing schemes. The Bit-Error Rate (BER) performance of various PAPR reduction techniques in an Additive White Gaussian Noise (AWGN) channel is also presented. It is shown that combining companding and the application of phasing schemes can significantly improve further PAPR reduction as well as improve the BER performance.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122657596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686250
M N Noaman, A. M. Omar
The design of fuzzy controller can be supported by comparing the signal with the neural network controller. Such approaches are usually called hybrid neural - fuzzy controller or multi controller. The hybrid model is able to compare the signal from the fuzzy controller and neural network learning with back propagation method. In this paper the plant is a DC motor base assembly with Pittman gear head servomotor using in robot and another applications, in order to evaluate the system performance when the motor load is changing. Due to this change the speed of the motor will be decreasing and the plant parameter is changed. Therefore, adaptive hybrid neural fuzzy controller is designed to adapt this system change using augmented error method.
{"title":"Adaptive hybrid neural fuzzy controller using augmented error method","authors":"M N Noaman, A. M. Omar","doi":"10.1109/IEEEGCC.2006.5686250","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686250","url":null,"abstract":"The design of fuzzy controller can be supported by comparing the signal with the neural network controller. Such approaches are usually called hybrid neural - fuzzy controller or multi controller. The hybrid model is able to compare the signal from the fuzzy controller and neural network learning with back propagation method. In this paper the plant is a DC motor base assembly with Pittman gear head servomotor using in robot and another applications, in order to evaluate the system performance when the motor load is changing. Due to this change the speed of the motor will be decreasing and the plant parameter is changed. Therefore, adaptive hybrid neural fuzzy controller is designed to adapt this system change using augmented error method.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686257
A. Farah, H. Khali
This paper presents a scheme for joint signing/verifying a message by many signers to provide data authenticity, integrity, and non-repudiation for a group of people. The signature security is based on the computational intractability of the discrete logarithm problem (DLP) in prime order subgroup of Z*p as in Digital Signature Algorithm (DSA) scheme. The proposed scheme is an extension of DSA to a group of signers who jointly sign the message. The Signature of a message can be verified individually for each signer, or collectively for a subgroup or entire group. Moreover, the scheme can be used for group membership authentication. Finally, the proposed scheme can be used in many applications, such as E-commerce and E-government.
{"title":"Joint Multiple signature scheme for group-oriented authentication and non-repudiation","authors":"A. Farah, H. Khali","doi":"10.1109/IEEEGCC.2006.5686257","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686257","url":null,"abstract":"This paper presents a scheme for joint signing/verifying a message by many signers to provide data authenticity, integrity, and non-repudiation for a group of people. The signature security is based on the computational intractability of the discrete logarithm problem (DLP) in prime order subgroup of Z*p as in Digital Signature Algorithm (DSA) scheme. The proposed scheme is an extension of DSA to a group of signers who jointly sign the message. The Signature of a message can be verified individually for each signer, or collectively for a subgroup or entire group. Moreover, the scheme can be used for group membership authentication. Finally, the proposed scheme can be used in many applications, such as E-commerce and E-government.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133523434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686177
W. Aljaism, M. Nagrial, J. Rizk
This paper presents the results of an investigation of torque development in the air gap of a 6/4 and 8/6 switched reluctance machines (SRM). Due to the force components acting on the rotor enables us to provide more accurate picture of the torque generation and vibration in this family of electric machines. The analysis for the torque is computed by finite element method. The torque optimisation is investigated by changing the pole arc/pole pitch ratio (y) of the stator, rotor and yoke dimensions.
{"title":"Investigation of torque development in SRM under single phase excitation","authors":"W. Aljaism, M. Nagrial, J. Rizk","doi":"10.1109/IEEEGCC.2006.5686177","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686177","url":null,"abstract":"This paper presents the results of an investigation of torque development in the air gap of a 6/4 and 8/6 switched reluctance machines (SRM). Due to the force components acting on the rotor enables us to provide more accurate picture of the torque generation and vibration in this family of electric machines. The analysis for the torque is computed by finite element method. The torque optimisation is investigated by changing the pole arc/pole pitch ratio (y) of the stator, rotor and yoke dimensions.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133830391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686242
D. Boughaci, H. Drias
Electronic commerce is an Internet-based business transactions performed electronically by individuals, companies, corporations and governments utilizing information and communication technologies. The most important obstacle to further expansion for e-commerce has been the lack of adequate security protections. When sending secure data via the Web, four items, no provided by Internet, are needed: confidentiality, Integrity, Authentication, and non-repudiability. This paper describes them, briefly summarizes some relevant cryptographic technologies and proposes a novel cryptographic-based model to support a secure e-commerce. More precisely, our proposed model uses XML combined with cryptographic techniques to create a secure session between partners in which the traffic between the partners is encrypted and only the adequate participants can decrypt it, to transmit structured data across the Web and to further improve the security of the exchanged documents.
{"title":"A secure e-transaction model for e-commerce","authors":"D. Boughaci, H. Drias","doi":"10.1109/IEEEGCC.2006.5686242","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686242","url":null,"abstract":"Electronic commerce is an Internet-based business transactions performed electronically by individuals, companies, corporations and governments utilizing information and communication technologies. The most important obstacle to further expansion for e-commerce has been the lack of adequate security protections. When sending secure data via the Web, four items, no provided by Internet, are needed: confidentiality, Integrity, Authentication, and non-repudiability. This paper describes them, briefly summarizes some relevant cryptographic technologies and proposes a novel cryptographic-based model to support a secure e-commerce. More precisely, our proposed model uses XML combined with cryptographic techniques to create a secure session between partners in which the traffic between the partners is encrypted and only the adequate participants can decrypt it, to transmit structured data across the Web and to further improve the security of the exchanged documents.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134604323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686237
M. Mir, T. Sharif, Z. Ahmadian, A. Hassanpour
This paper describes the development and testing of a web-based remote laboratory for performing experiments in basic electrical engineering courses. The prototype experiments are from a variety of courses including circuit analysis, logic design, analog electronics, digital electronics, and industrial control. In addition to observing the waveforms and reading the measured voltage and current values, the remote user can also change certain parameters of the experiment such as signal frequency, amplitude, gain, and digital inputs. A digital camera in the laboratory provides the remote user updated video images of the experimental setup. Audio instructions about the selected experiment are also provided. Some test results are described and limitations of the presented laboratory setup are discussed.
{"title":"A web-based remote laboratory for performing experiments in basic electrical engineering courses","authors":"M. Mir, T. Sharif, Z. Ahmadian, A. Hassanpour","doi":"10.1109/IEEEGCC.2006.5686237","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686237","url":null,"abstract":"This paper describes the development and testing of a web-based remote laboratory for performing experiments in basic electrical engineering courses. The prototype experiments are from a variety of courses including circuit analysis, logic design, analog electronics, digital electronics, and industrial control. In addition to observing the waveforms and reading the measured voltage and current values, the remote user can also change certain parameters of the experiment such as signal frequency, amplitude, gain, and digital inputs. A digital camera in the laboratory provides the remote user updated video images of the experimental setup. Audio instructions about the selected experiment are also provided. Some test results are described and limitations of the presented laboratory setup are discussed.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131803662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686202
M. Khurram, S. H. Mirza
Using the processing power of multi-gigahertz general purpose processors (GPP) to perform radio functions can be a better and economical option to design a software defined radio (SDR) system. An efficient SDR system with multiple protocol support can be designed by identifying different blocks in the channel processing stream of different wireless protocols that can be mapped on GPP and field programmable gate arrays (FPGAs) processing platforms depending on throughput requirements of the corresponding protocol. This paper presents the ongoing research work in designing a novel architecture to prototype and develop efficient SDR systems using GPP as main digital signal processing (DSP) platform along with FPGAs to perform realtime signal processing tasks that can not be handled by GPPs. In this research project, a software defined radio is designed for the physical layer of WLAN standard IEEE 802.11a receiver. Different sub-systems of the channel processing stream of IEEE 802.11a OFDM receiver are mapped on GPP of a PC and a PCI board containing fast ADCs to receive the received analog signal from the RF front-end. The software radio architecture discussed in this paper is a scaled down version of the software radio that has to be developed as the research project for M. Engg. by research at NED University by the principal author.
{"title":"A general purpose processor based IEEE802.11a compatible OFDM receiver design","authors":"M. Khurram, S. H. Mirza","doi":"10.1109/IEEEGCC.2006.5686202","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686202","url":null,"abstract":"Using the processing power of multi-gigahertz general purpose processors (GPP) to perform radio functions can be a better and economical option to design a software defined radio (SDR) system. An efficient SDR system with multiple protocol support can be designed by identifying different blocks in the channel processing stream of different wireless protocols that can be mapped on GPP and field programmable gate arrays (FPGAs) processing platforms depending on throughput requirements of the corresponding protocol. This paper presents the ongoing research work in designing a novel architecture to prototype and develop efficient SDR systems using GPP as main digital signal processing (DSP) platform along with FPGAs to perform realtime signal processing tasks that can not be handled by GPPs. In this research project, a software defined radio is designed for the physical layer of WLAN standard IEEE 802.11a receiver. Different sub-systems of the channel processing stream of IEEE 802.11a OFDM receiver are mapped on GPP of a PC and a PCI board containing fast ADCs to receive the received analog signal from the RF front-end. The software radio architecture discussed in this paper is a scaled down version of the software radio that has to be developed as the research project for M. Engg. by research at NED University by the principal author.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116596984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686239
A. Glass, N. Abdulaziz, E. Bastaki
A novel slope line code for data transmission and storage on digital communication systems has been proposed. The new line code operates on the principle of slope coding. The slope encoder transmits alternative slopes (stair-step-like pulses) for the transmission of the 1s and 0s of the input binary data. The decoder detects the received signal using correlative slope technique in order to extract the transmitted binary 1s and 0s from the incoming symbols. The encoder and decoder operation were described. The encoder circuit is designed and simulated using MultiSim software. The results show a thorough match with the theory. The new line code has many desirable properties which makes it attractive and a suitable for data transmission and storage on different types of telecommunication networks and multimedia.
{"title":"The slope line code for digital communication systems","authors":"A. Glass, N. Abdulaziz, E. Bastaki","doi":"10.1109/IEEEGCC.2006.5686239","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686239","url":null,"abstract":"A novel slope line code for data transmission and storage on digital communication systems has been proposed. The new line code operates on the principle of slope coding. The slope encoder transmits alternative slopes (stair-step-like pulses) for the transmission of the 1s and 0s of the input binary data. The decoder detects the received signal using correlative slope technique in order to extract the transmitted binary 1s and 0s from the incoming symbols. The encoder and decoder operation were described. The encoder circuit is designed and simulated using MultiSim software. The results show a thorough match with the theory. The new line code has many desirable properties which makes it attractive and a suitable for data transmission and storage on different types of telecommunication networks and multimedia.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121386663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686211
K. Al-Dhmani, M. Al-Mualla
The Barni method has been proposed in the literature for watermarking still images. In our previous work, we have extended this method to work for image sequences (video). However, it was found that this extended frame-based version fails under video compression attacks. In this paper, we present a block-based version to improve robustness against such attacks.
{"title":"A block-based Barni watermarking method for improved robustness under video compression attacks","authors":"K. Al-Dhmani, M. Al-Mualla","doi":"10.1109/IEEEGCC.2006.5686211","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686211","url":null,"abstract":"The Barni method has been proposed in the literature for watermarking still images. In our previous work, we have extended this method to work for image sequences (video). However, it was found that this extended frame-based version fails under video compression attacks. In this paper, we present a block-based version to improve robustness against such attacks.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124717162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}