Filters
total: 369
Search results for: EXPERIMENTAL SCHEME
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublicationIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...
-
Incorporating Iris, Fingerprint and Face Biometric for Fraud Prevention in e-Passports Using Fuzzy Vault
PublicationA unified frame work which provides a higher security level to e-passports is proposed. This framework integrates face, iris and fingerprint images. It involves three layers of security: the first layer maps a biometric image to another biometric image which is called biostego image. Three mapping schemes are proposed: the first scheme maps single biometric image to single biostego image, the second scheme maps dual biometric images...
-
Long-distance quantum communication over noisy networks without long-time quantum memory
PublicationThe problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Modified SPWM Technique with Zero-Sequence Voltage Injection for a Five-Phase, Three-Level NPC Inverter
PublicationThis article presents a modified sinusoidal pulse-width modulation (SPWM) scheme for a five-phase, three-level neutral-point-clamped inverter. The modulation scheme deploys a modified min–max function to inject the zero-sequence components into the reference modulating signals; hence enabling the effective utilization of the DC-link voltage. Balanced split-input DC-link voltages were achieved through further incorporation of adjustable...
-
Network Graph Transformation Providing Fast Calculation of Paths for Resilient Routing
PublicationProtection of transmission against failures can be appropriately dealt with by alternative paths. However, common schemes (e.g., Bhandaris scheme) are characterized by a remarkable delay while determining the transmission paths. This in turn may have a serious impact on serving dynamic demands (characterized by relatively short duration time). As a remedy to this problem, we introduce an approach to pre-compute the sets of disjoint...
-
Comparative analysis of numerical with optical soliton solutions of stochastic Gross–Pitaevskii equation in dispersive media
PublicationThis article deals with the stochastic Gross–Pitaevskii equation (SGPE) perturbed with multiplicative time noise. The numerical solutions of the governing model are carried out with the proposed stochastic non-standard finite difference (SNSFD) scheme. The stability of the scheme is proved by using the Von-Neumann criteria and the consistency is shown in the mean square sense. To seek exact solutions, we applied the Sardar subequation...
-
MODELLING OF TRANSIENT FLOW IN STORM SEWERS
PublicationThe paper focuses on the assessment of second-order explicit numerical scheme for unsteady flows in sewers. In order to simulate the pressurized flow the 'Preissmann slot' concept is implemented. For simulation of the transcritical flow the original and improved McCormack scheme is used. The calculated results are compared with numerical solutions and laboratory measurements published in the technical literature. Moreover, the...
-
Straightened characteristics of McKendrick-von Foerster equation
PublicationWe study the McKendrick-von Foerster equation with renewal (that is the age-structured model, with total population dependent coefficient and nonlinearity). By using a change of variables, the model is then transformed to a standard age-structured model in which the total population dependent coefficient of the transport term reduces to a constant 1. We use this transformation to get existence, uniqueness of solutions of the problem...
-
Underfrequency Load Shedding: An Innovative Algorithm Based on Fuzzy Logic
PublicationIn contemporary power systems, the load shedding schemes are typically based on disconnecting a pre-specified amount of load after the frequency drops below a predetermined value. The actual conditions at the time of disturbance may largely dier from the assumptions, which can lead to non-optimal or ineective operation of the load shedding scheme. For many years, increasing the eectiveness of the underfrequency load shedding (UFLS)...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublicationAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Digital Fingerprinting based on Quaternion Encryption for Image Transmission
PublicationIn this paper a new digital fingerprinting scheme for images is proposed. A proposed method is based on quaternion encryption with Cipher Block Chaining (CBC) mode of operation. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm is designed for grey-tone images. For purpose of encryption, the algorithm uses the rotation of data vectors presented...
-
Image Processing Techniques for Distributed Grid Applications
PublicationParallel approaches to 2D and 3D convolution processing of series of images have been presented. A distributed, practically oriented, 2D spatial convolution scheme has been elaborated and extended into the temporal domain. Complexity of the scheme has been determined and analysed with respect to coefficients in convolution kernels. Possibilities of parallelisation of the convolution operations have been analysed and the results...
-
SONIC - Self-optimizing narrowband interference canceler: comparison of two frequency tracking strategies
PublicationThis paper presents a new approach to rejection of complex-valued sinusoidal disturbances acting at the output of a discrete-time linear stable plant with unknown and possibly time-varying dynamics. It is assumed that both the instantaneous frequency of the sinusoidal disturbance and its amplitude may be slowly varying with time and that the output signal is contaminated with wideband measurement noise. The proposed disturbance...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublicationIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
MEMORY EFFECT ANALYSIS USING PIECEWISE CUBIC B-SPLINE OF TIME FRACTIONAL DIFFUSION EQUATION
PublicationThe purpose of this work is to study the memory effect analysis of Caputo–Fabrizio time fractional diffusion equation by means of cubic B-spline functions. The Caputo–Fabrizio interpretation of fractional derivative involves a non-singular kernel that permits to describe some class of material heterogeneities and the effect of memory more effectively. The proposed numerical technique relies on finite difference approach and cubic...
-
Bayesian Optimization for solving high-frequency passive component design problems
PublicationIn this paper, the performance of the Bayesian Optimization (BO) technique applied to various problems of microwave engineering is studied. Bayesian optimization is a novel, non-deterministic, global optimization scheme that uses machine learning to solve complex optimization problems. However, each new optimization scheme needs to be evaluated to find its best application niche, as there is no universal technique that suits all...
-
Greedy Multipoint Model-Order Reduction Technique for Fast Computation of Scattering Parameters of Electromagnetic Systems
PublicationThis paper attempts to develop a new automated multipoint model-order reduction (MOR) technique, based on matching moments of the system input–output function, which would be suited for fast and accurate computation of scattering parameters for electromagnetic (EM) systems over a wide frequency band. To this end, two questions are addressed. Firstly, the cost of the wideband reduced model generation is optimized by automating a...
-
Thermal ablation modeling via bioheat equation
PublicationWe consider Pennes’ bioheat equation and discuss an implicit numerical scheme which has better stability properties than other approaches. Our discussion concerns Carthesian geometry problems, however it carries over to spherical geometry models and more complicated shapes.
-
Deformation of the Structural Details of the Components Created by the Rapid Prototyping Method
PublicationThe paper present the results of preliminary research and describes the deformation of construction details within the process of producing small element employing a stereography system. The article discuses a scheme for changes in data conversion. Variation in construction details have been described on the basis of analysing photographs.
-
Application analysis of a hybrid solid oxide fuel cell-gas turbine system for marine power plants
PublicationThe results of theoretical studies of the possibilities of using hybrid solid oxide fuel cell–gas turbine (SOFC-GT) systems for marine power plants are presented. A 500 kW auxiliary marine power plant scheme using stacks of SOFCs in combination with a regenerative gas turbine operating with over-expansion based on our recent patent application is proposed. The results of mathematical modelling showed the opportunity to obtain a...
-
High Efficiency Dual-Active-Bridge Converter with Triple-Phase-Shift Control for Battery Charger of Electric Vehicles
PublicationAn optimal modulation scheme with triple-phase-shift (TPS) control could increase the efficiency in the entire load range for a dual-active-bridge (DAB) converter under wide output voltage range conditions. Therefore, this study proposes a convergent approach to TPS mode selection, coupled with an optimal modulation scheme, ensuring the circuit’s efficiency over the entire range in the realm of a high-power and high-efficiency...
-
Numerical solutions for blood flow in elastic vessels
PublicationWe consider the differential–algebraic system for the blood flow and pressure in the systemic arteries. By the operator splitting method, we transform the system into the hyperbolic one, introduce the bicharacteristics, and perform the time–space nonuniform discretization, obtaining the innovative difference scheme. Our results are illustrated with numerical experiments.
-
Thermal ablation modeling via the bioheat equation and its numerical treatment
PublicationThe phenomenon of thermal ablation is described by Pennes’ bioheat equation. This model is based on Newton’s law of cooling. Many approximate methods have been considered because of the importance of this issue. We propose an implicit numerical scheme which has better stability properties than other approaches.
-
Testing for conformance of parallel programming pattern languages
PublicationThis paper reports on the project being run by TUG and IMAG, aimed at reducing the volume of tests required to exercise parallel programming language compilers and libraries. The idea is to use the ISO STEP standard scheme for conformance testing of software products. A detailed example illustrating the ongoing work is presented.
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Generative Process Planning with Reasoning based on Geometrical Product Specification
PublicationThe focus of this paper is on computer aided process planning for parts manufacture in systems of definite process capabilities, involving the use of multi-axis machining centers for parts shaping and grinding machines for finishing. It presents in particular a decision making scheme for setup determination as a part of generative process planning. The planning procedurę consists of two stages. The first stage is associated with...
-
A Triplet-Learnt Coarse-to-Fine Reranking for Vehicle Re-identification
PublicationVehicle re-identification refers to the task of matching the same query vehicle across non-overlapping cameras and diverse viewpoints. Research interest on the field emerged with intelligent transportation systems and the necessity for public security maintenance. Compared to person, vehicle re-identification is more intricate, facing the challenges of lower intra-class and higher inter-class similarities. Motivated by deep...
-
A new quaternion-based encryption method for DICOM images
PublicationIn this paper, a new quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We have scrutinized and slightly modified the concept of the DICOM network to point out the best location for the proposed encryption scheme, which significantly improves speed of DICOM images encryption in comparison with those originally embedded into DICOM advanced encryption standard...
-
An extended basis inexact shift–invert Lanczos for the efficient solution of large-scale generalized eigenproblems
PublicationThis paper proposes a technique, based on the Inexact Shift–Invert Lanczos (ISIL) method with Inexact Jacobi Orthogonal Component Correction (IJOCC) refinement, and a preconditioned conjugate-gradient (PCG) linear solver with multilevel preconditioner, for finding several eigenvalues for generalized symmetric eigenproblems. Several eigenvalues are found by constructing (with the ISIL process) an extended projection basis. Presented...
-
Waveform design for fast clutter cancellation in noise radars
PublicationCanceling clutter is an important, but computation-ally intensive part of signal processing in noise radars. It is shown that considerable improvements can be made to a simple least squares canceler if minor constraints are imposed onto noise waveform. The proposed scheme is potentially capable of canceling clutter in real-time, even for high sampling rates.
-
Wireless LAN with noncooperative anonymous stations: QOS provisioning via war of attrition
PublicationMAC-layer QoS provision necessitates an admission scheme to grant a requested QoS notwithstanding subse-quent requests. For an ad hoc WLAN with anonymous stations, we assume a degree of power awareness to propose a session- rather than frame-level bidding for bandwidth. Next we analyze the underlying Bayesian war of attrition game.
-
Parametrized Local Reduced-Order Models With Compressed Projection Basis for Fast Parameter-Dependent Finite-Element Analysis
PublicationThis paper proposes an automated parametric local model-order reduction scheme for the expedited design of microwave devices using the full-wave finite-element method (FEM). The approach proposed here results in parameterized reduced-order models (ROMs) that account for the geometry and material variation in the selected subregion of the structure. In each subregion, a parameter-dependent projection basis is generated by concatenating...
-
Indirect adaptive controller based on a self-structuring fuzzy system for nonlinear modeling and control
PublicationIn this paper, a unified nonlinear modeling and control scheme is presented. A self-structuring Takagi-Sugeno (T-S) fuzzymodel is used to approximate the unknown nonlinear plant based on I/O data collected on-line. Both the structure and theparameters of the T-S fuzzy model are updated by an on-line clustering method and a recursive least squares estimation(RLSE) algorithm. The rules of the fuzzy model can be added, replaced or...
-
Coupled Urban Areas Inundation Model with Interaction Between Storm Water System and Surface Flow - Case Study of Sea Level Impact on Seaside Areas Flooding
PublicationInundations are becoming more frequent than ever. What is connected with increasing area of impervious surface in cities. This makes predicting urban flooding and its scale especially important. At the seaside we observe additional conditions such as sea level that makes accurate numerical modelling of issue even harder. With complex approach to the matter which is simultaneous calculation of storm water conduit flow and overland...
-
Two-Stage Identification of Locally Stationary Autoregressive Processes and its Application to the Parametric Spectrum Estimation
PublicationThe problem of identification of a nonstationary autoregressive process with unknown, and possibly time-varying, rate of parameter changes, is considered and solved using the parallel estimation approach. The proposed two-stage estimation scheme, which combines the local estimation approach with the basis function one, offers both quantitative and qualitative improvements compared with the currently used single-stage methods.
-
Fast clutter cancellation for noise radars via waveform design
PublicationCanceling clutter is an important, but very expensive part of signal processing in noise radars. It is shown that considerable improvements can be made to a simple least squares canceler if minor constraints are imposed onto noise waveform. Using a combination of FPGA and CPU, the proposed scheme is capable of canceling both stationary clutter and moving targets in real-time, even for high sampling rates.
-
New approach to noncausal identification of nonstationary stochastic systems subject to both smooth and abrupt parameter changes
PublicationIn this paper we consider the problem of finiteintervalparameter smoothing for a class of nonstationary linearstochastic systems subject to both smooth and abrupt parameterchanges. The proposed parallel estimation scheme combines theestimates yielded by several exponentially weighted basis functionalgorithms. The resulting smoother automatically adjustsits smoothing bandwidth to the type and rate of nonstationarityof the identified...
-
Some new soliton solutions to the higher dimensional Burger–Huxley and Shallow water waves equation with couple of integration architectonic
PublicationIn this paper, we retrieve some traveling wave, periodic solutions, bell shaped, rational, kink and anti-kink type and Jacobi elliptic functions of Burger’s equation and Shallow water wave equation with the aid of various integration schemes like improved -expansion scheme and Jacobi elliptic function method respectively. We also present our solutions graphically in various dimensions.
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Network-aware Data Prefetching Optimization of Computations in a Heterogeneous HPC Framework
PublicationRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
Hybrid quantum-classical approach for atomistic simulation of metallic systems
PublicationThe learn-on-the-fly (LOTF) method [G. Csanyi et al., Phys. Rev. Lett. 93, 175503 (2004)] serves to seamlessly embed quantum-mechanical computations within a molecular-dynamics framework by continual local retuning of the potential's parameters so that it reproduces the quantum-mechanical forces. In its current formulation, it is suitable for systems where the interaction is short-ranged, such as covalently bonded semiconductors....
-
Impact of the Finite Element Mesh Structure on the Solution Accuracy of a Two-Dimensional Kinematic Wave Equation
PublicationThe paper presents the influence of the finite element mesh structure on the accuracy of the numerical solution of a two-dimensional linear kinematic wave equation. This equation was solved using a two-level scheme for time integration and a modified finite element method with triangular elements for space discretization. The accuracy analysis of the applied scheme was performed using a modified equation method for three different...
-
An isogeometric finite element formulation for boundary and shell viscoelasticity based on a multiplicative surface deformation split
PublicationThis work presents a numerical formulation to model isotropic viscoelastic material behavior for membranes and thin shells. The surface and the shell theory are formulated within a curvilinear coordinate system,which allows the representation of general surfaces and deformations. The kinematics follow from Kirchhoff–Love theory and the discretization makes use of isogeometric shape functions. A multiplicative split of the surface...
-
Numerical and quantitative analysis of HIV/AIDS model with modified Atangana-Baleanu in Caputo sense derivative
PublicationFractional calculus plays an important role in the development of control strategies, the study of the dynamical transmission of diseases, and some other real-life problems nowadays. The time-fractional HIV/AIDS model is examined using a novel method in this paper. Based on the Atangana-concept Baleanu’s of a derivative in the Caputo sense, the current modified fractional derivative operator uses singular and non-local kernels....
-
Identification of nonstationary processes using noncausal bidirectional lattice filtering
PublicationThe problem of off-line identification of a nonstationary autoregressive process with a time-varying order and a time-varying degree of nonstationarity is considered and solved using the parallel estimation approach. The proposed parallel estimation scheme is made up of several bidirectional (noncausal) exponentially weighted lattice algorithms with different estimation memory and order settings. It is shown that optimization of...
-
Elastoplastic material law in 6-parameter nonlinear shell theory
PublicationWe develop the elastoplastic constitutive relations for nonlinear exact 6-parameter shell theory. A J2-type theory with strain hardening is formulated that takes into account asymmetric membrane strain measures. The incremental equations are solved using implicit Euler scheme with closest point projection algorithm. The presented test example shows the correctness of the proposed approach. Influence of micropolar material parameters...
-
Advanced Macromodel Matrix Structure Cloning for FDTD
PublicationWe propose an improved macromodel-based techniquefor efficient analysis of the structures based on PhotonicCrystals (PhC). The technique involves a new structure of thecoupling matrix and advanced cloning of not only the macromodel matrices, but also the coupling matrices SE and SH.The method allows one to shorten considerably the preprocessingtime, the RAM usage and also the iterating speed of performingFDTD. With this...
-
Reception of GNSS Signals Under Jamming Conditions
PublicationThe article focuses on performance of Global Navigation Satellite System receivers in environment where intentional interference is present. First part is a general description of GNSS systems. Secondly, types of positioning service disturbances are specified. In the third part authors present a scheme of measurement stand which is used to evaluate the influence of interference on reception of navigation signals. Next, research...
-
Evaluation of time-efficiency of disjoint paths calculation schemes
PublicationThe concept of alternate paths has been shown in the literature to provide fast response of a network to failures of its elements (nodes/links) affecting flows along the primary communication paths. Various approaches have been proposed to reduce the time necessary to redirect the respective flows onto the alternate paths. In this paper, we focus on another important objective, that so far has not received much attention, i.e.,...