Abstract: Nowadays, keyless entry systems are widely adopted
for vehicle immobilizer systems due to both advantages of security and
convenience. Keyless entry systems could overcome brute-force key
guessing attack, statistics attack and masquerade attack, however,
they can't prevent from thieves stealing behavior. In this paper, we
proposed a new architecture try to improve the existent flaws. The
integration of the keyless entry system and the fingerprint
identification technology is more suitable to implement on the
portable transponder to achieve higher security needs. We also adopt
and modify AES security protocol for life expectancy and security of
the portable transponder. In addition, the identification of a driver's
fingerprint makes the service of automatic reinstatement of a driver's
preferences become possible. Our design can satisfy not only the three
kinds of previous illegal attacks, but also the stealing situation.
Furthermore, many practical factors, such as costs, life expectancy and
performance, have been well considered in the design of portable
transponder.
Abstract: Pulse code modulation is a widespread technique
in digital communication with significant impact on existing
modern and proposed future communication technologies. Its
widespread utilization is due to its simplicity and attractive
spectral characteristics. In this paper, we present a new
approach to the spectral analysis of PCM signals using
Riemann-Stieltjes integrals, which is very accurate for high bit
rates. This approach can serve as a model for similar spectral
analysis of other competing modulation schemes.
Abstract: Open Agent System platform based on High Level
Architecture is firstly proposed to support the application involving
heterogeneous agents. The basic idea is to develop different wrappers
for different agent systems, which are wrapped as federates to join a
federation. The platform is based on High Level Architecture and the
advantages for this open standard are naturally inherited, such as
system interoperability and reuse. Especially, the federal architecture
allows different federates to be heterogeneous so as to support the
integration of different agent systems. Furthermore, both implicit
communication and explicit communication between agents can be
supported. Then, as the wrapper RTI_JADE an example, the
components are discussed. Finally, the performance of RTI_JADE is
analyzed. The results show that RTI_JADE works very efficiently.
Abstract: We discuss the signal detection through nonlinear
threshold systems. The detection performance is assessed by the
probability of error Per . We establish that: (1) when the signal is
complete suprathreshold, noise always degrades the signal detection
both in the single threshold system and in the parallel array of
threshold devices. (2) When the signal is a little subthreshold, noise
degrades signal detection in the single threshold system. But in the
parallel array, noise can improve signal detection, i.e., stochastic
resonance (SR) exists in the array. (3) When the signal is predominant
subthreshold, noise always can improve signal detection and SR
always exists not only in the single threshold system but also in the
parallel array. (4) Array can improve signal detection by raising the
number of threshold devices. These results extend further the
applicability of SR in signal detection.
Abstract: management of medical devices in hospitals includes
the planning of medical equipment acquisition and maintenance. The
presence of critical and non-critical areas together with technological
proliferation render the management of medical devices very
complex. This study creates an easy and objective methodology for
the analysis of medical equipment maintenance, that makes the
management of medical devices more feasible. The study has been
carried out at Florence Hospital Careggi and it aims to help the
clinical engineering department to manage medical equipment by
clarifying the hospital situation through a characterization of the
different areas, technologies and fault typologies.
Abstract: Home Automation is a field that, among other
subjects, is concerned with the comfort, security and energy
requirements of private homes. The configuration of automatic
functions in this type of houses is not always simple to its inhabitants
requiring the initial setup and regular adjustments. In this work, the
ubiquitous computing system vision is used, where the users- action
patterns are captured, recorded and used to create the contextawareness
that allows the self-configuration of the home automation
system. The system will try to free the users from setup adjustments
as the home tries to adapt to its inhabitants- real habits. In this paper
it is described a completely automated process to determine the light
state and act on them, taking in account the users- daily habits.
Artificial Neural Network (ANN) is used as a pattern recognition
method, classifying for each moment the light state. The work
presented uses data from a real house where a family is actually
living.
Abstract: Image registration plays an important role in the
diagnosis of dental pathologies such as dental caries, alveolar bone
loss and periapical lesions etc. This paper presents a new wavelet
based algorithm for registering noisy and poor contrast dental x-rays.
Proposed algorithm has two stages. First stage is a preprocessing
stage, removes the noise from the x-ray images. Gaussian filter has
been used. Second stage is a geometric transformation stage.
Proposed work uses two levels of affine transformation. Wavelet
coefficients are correlated instead of gray values. Algorithm has been
applied on number of pre and post RCT (Root canal treatment)
periapical radiographs. Root Mean Square Error (RMSE) and
Correlation coefficients (CC) are used for quantitative evaluation.
Proposed technique outperforms conventional Multiresolution
strategy based image registration technique and manual registration
technique.
Abstract: In this paper, a technique is proposed to implement
an artificial voltage-controlled capacitance or inductance which can
replace the well-known varactor diode in many applications. The
technique is based on injecting the current of a voltage-controlled
current source onto a fixed capacitor or inductor. Then, by controlling
the transconductance of the current source by an external bias voltage,
a voltage-controlled capacitive or inductive reactance is obtained.
The proposed voltage-controlled reactance devices can be designed
to work anywhere in the frequency spectrum. Practical circuits for the
proposed voltage-controlled reactances are suggested and simulated.
Abstract: The recognition of human faces, especially those with
different orientations is a challenging and important problem in image
analysis and classification. This paper proposes an effective scheme
for rotation invariant face recognition using Log-Polar Transform and
Discrete Cosine Transform combined features. The rotation invariant
feature extraction for a given face image involves applying the logpolar
transform to eliminate the rotation effect and to produce a row
shifted log-polar image. The discrete cosine transform is then applied
to eliminate the row shift effect and to generate the low-dimensional
feature vector. A PSO-based feature selection algorithm is utilized to
search the feature vector space for the optimal feature subset.
Evolution is driven by a fitness function defined in terms of
maximizing the between-class separation (scatter index).
Experimental results, based on the ORL face database using testing
data sets for images with different orientations; show that the
proposed system outperforms other face recognition methods. The
overall recognition rate for the rotated test images being 97%,
demonstrating that the extracted feature vector is an effective rotation
invariant feature set with minimal set of selected features.
Abstract: This paper presents the results related to the
interference reduction technique in multistage multiuser detector for
asynchronous DS-CDMA system. To meet the real-time
requirements for asynchronous multiuser detection, a bit streaming,
cascade architecture is used. An asynchronous multiuser detection
involves block-based computations and matrix inversions. The paper
covers iterative-based suboptimal schemes that have been studied to
decrease the computational complexity, eliminate the need for matrix
inversions, decreases the execution time, reduces the memory
requirements and uses joint estimation and detection process that
gives better performance than the independent parameter estimation
method. The stages of the iteration use cascaded and bits processed
in a streaming fashion. The simulation has been carried out for
asynchronous DS-CDMA system by varying one parameter, i.e.,
number of users. The simulation result exhibits that system gives
optimum bit error rate (BER) at 3rd stage for 15-users.
Abstract: An on chip low drop out voltage regulator that
employs elegant compensation scheme is presented in this paper. The
novelty in this design is that the device parasitic capacitances are
exploited for compensation at different loads. The proposed LDO is
designed to provide a constant voltage of 1.2V and is implemented in
UMC 180 nano meter CMOS technology. The voltage regulator
presented improves stability even at lighter loads and enhances line
and load regulation.
Abstract: 'Secure routing in Mobile Ad hoc networks' and
'Internet connectivity to Mobile Ad hoc networks' have been dealt
separately in the past research. This paper proposes a light weight
solution for secure routing in integrated Mobile Ad hoc Network
(MANET)-Internet. The proposed framework ensures mutual
authentication of Mobile Node (MN), Foreign Agent (FA) and Home
Agent (HA) to avoid various attacks on global connectivity and
employs light weight hop-by-hop authentication and end-to-end
integrity to protect the network from most of the potential security
attacks. The framework also uses dynamic security monitoring
mechanism to monitor the misbehavior of internal nodes. Security
and performance analysis show that our proposed framework
achieves good security while keeping the overhead and latency
minimal.
Abstract: In this paper, optimal generation expansion planning (GEP) is investigated considering purchase prices, profits of independent power producers (IPPs) and reliability criteria using a new method based on hybrid coded Genetic Algorithm (GA) and Particle Swarm Optimization (PSO). In this approach, optimal purchase price of each IPP is obtained by HCGA and reliability criteria are calculated by PSO technique. It should be noted that reliability criteria and the rate of carbon dioxide (CO2) emission have been considered as constraints of the GEP problem. Finally, the proposed method has been tested on the case study system. The results evaluation show that the proposed method can simply obtain optimal purchase prices of IPPs and is a fast method for calculation of reliability criteria in expansion planning. Also, considering the optimal purchase prices and profits of IPPs in generation expansion planning are caused that the expansion costs are decreased and the problem is solved more exactly.
Abstract: In this paper we present a novel design of a wearable
electronic textile. After defining a special application, we used the
specifications of some low power, tiny elements including sensors,
microcontrollers, transceivers, and a fault tolerant special topology to
have the most reliability as well as low power consumption and
longer lifetime. We have considered two different conditions as
normal and bodily critical conditions and set priorities for using
different sensors in various conditions to have a longer effective
lifetime.
Abstract: We present a low frequency watermarking method
adaptive to image content. The image content is analyzed and
properties of HVS are exploited to generate a visual mask of the
same size as the approximation image. Using this mask we embed the
watermark in the approximation image without degrading the image
quality. Watermark detection is performed without using the original
image. Experimental results show that the proposed watermarking
method is robust against most common image processing operations,
which can be easily implemented and usually do not degrade the
image quality.
Abstract: A special case of floating point data representation is block
floating point format where a block of operands are forced to have a joint
exponent term. This paper deals with the finite wordlength properties of
this data format. The theoretical errors associated with the error model for
block floating point quantization process is investigated with the help of error
distribution functions. A fast and easy approximation formula for calculating
signal-to-noise ratio in quantization to block floating point format is derived.
This representation is found to be a useful compromise between fixed point
and floating point format due to its acceptable numerical error properties over
a wide dynamic range.
Abstract: In this paper, the hardware implementation of the
RSA public-key cryptographic algorithm is presented. The RSA
cryptographic algorithm is depends on the computation of repeated
modular exponentials.
The Montgomery algorithm is used and modified to reduce
hardware resources and to achieve reasonable operating speed for
FPGA. An efficient architecture for modular multiplications based on
the array multiplier is proposed. We have implemented a RSA
cryptosystem based on Montgomery algorithm. As a result, it is
shown that proposed architecture contributes to small area and
reasonable speed.
Abstract: This paper presents a web based remote access
microcontroller laboratory. Because of accelerated development in
electronics and computer technologies, microcontroller-based devices
and appliances are found in all aspects of our daily life. Before the
implementation of remote access microcontroller laboratory an
experiment set is developed by teaching staff for training
microcontrollers. Requirement of technical teaching and industrial
applications are considered when experiment set is designed.
Students can make the experiments by connecting to the experiment
set which is connected to the computer that set as the web server. The
students can program the microcontroller, can control digital and
analog inputs and can observe experiment. Laboratory experiment
web page can be accessed via www.elab.aku.edu.tr address.
Abstract: As mobile ad hoc networks (MANET) have different
characteristics from wired networks and even from standard wireless
networks, there are new challenges related to security issues that
need to be addressed. Due to its unique features such as open nature,
lack of infrastructure and central management, node mobility and
change of dynamic topology, prevention methods from attacks on
them are not enough. Therefore intrusion detection is one of the
possible ways in recognizing a possible attack before the system
could be penetrated. All in all, techniques for intrusion detection in
old wireless networks are not suitable for MANET. In this paper, we
classify the architecture for Intrusion detection systems that have so
far been introduced for MANETs, and then existing intrusion
detection techniques in MANET presented and compared. We then
indicate important future research directions.
Abstract: Condition monitoring of electrical power equipment
has attracted considerable attention for many years. The aim of this
paper is to use Labview with Fuzzy Logic controller to build a
simulation system to diagnose transformer faults and monitor its
condition. The front panel of the system was designed using
LabVIEW to enable computer to act as customer-designed
instrument. The dissolved gas-in-oil analysis (DGA) method was
used as technique for oil type transformer diagnosis; meanwhile
terminal voltages and currents analysis method was used for dry type
transformer. Fuzzy Logic was used as expert system that assesses all
information keyed in at the front panel to diagnose and predict the
condition of the transformer. The outcome of the Fuzzy Logic
interpretation will be displayed at front panel of LabVIEW to show
the user the conditions of the transformer at any time.