126 research outputs found

    ISAR Image formation with a combined Empirical Mode Decomposition and Time-Frequency Representation

    No full text
    International audienceIn this paper, a method for Inverse Synthetic Aperture Radar (ISAR) image formation based on the use of the Complex Empirical Mode Decomposition (CEMD) is proposed. The CEMD [1] which based on the Empirical Mode Decomposition (EMD) is used in conjunction with a Time-Frequency Representation (TFR) to estimate a 3-D time-range-Doppler Cubic image, which we can use to effectively extract a sequence of ISAR 2-D range-Doppler images. The potential of the proposed method to construct ISAR image is illustrated by simulations results performed on synthetic data and compared to 2-D Fourier Transform and TFR methods. The simulation results indicate that this method can provide ISAR images with a good resolution. These results demonstrate the potential application of the proposed method for ISAR image formation

    Synthesis, crystal structures and spectroscopic investigation of new Cu/Schiff-base complexes

    Get PDF
    Three novel Copper complexes, [Cu(L1)2][CuCl2] (1),  [Cu(L2)Cl] (2) and [Cu2(L3)3Cl2] (3), have been prepared by reaction of CuCl with the Schiff-base ligands L1: N,N’-bis(thiophen-2-ylmethylene)-ethane-1,2-diamine, L2: N,N’-bis(1H-pyrrol-2-ylmethylene)ethane-1,2-diamine and L3: N,N’-bis(2-nitrobenzylidene)-ethane-1,2-diamine in acetonitrile. The solid-state structures of these complexes were determined by X-ray diffraction from single crystal data and characterized by 1H and 13C NMR, IR and UV/Vis spectroscopies. This study shows that (1) is an ionic complex with a Cu(I)-centered cation and an isolated linear dichlorocuprate(I) anion, (3) is a dinuclear neutral complex of Cu(I) while (2)  is a mononuclear neutral complex of Cu(II). In the three complexes, Cu is tetracordinated in different geometrical environments. The atomic arrangements and spectroscopic properties of the three complexes are reported. Complexes 1-3 exhibit, in the solid state at room temperature, photoluminescence between 320 and 550 nm

    Cooperative Trust Framework for Cloud Computing Based on Mobile Agents

    Get PDF
    Cloud computing opens doors to the multiple, unlimited venues from elastic computing to on demand provisioning to dynamic storage, reduce the potential costs through optimized and efficient computing. To provide secure and reliable services in cloud computing environment is an important issue. One of the security issues is how to reduce the impact of for any type of intrusion in this environment. To counter these kinds of attacks, a framework of cooperative Hybrid intrusion detection system (Hy-IDS) and Mobile Agents is proposed. This framework allows protection against the intrusion attacks. Our Hybrid IDS is based on two types of IDS, the first for the detection of attacks at the level of virtual machines (VMs), the second for the network attack detection and Mobile Agents. Then, this framework unfolds in three phases: the first, detection intrusion in a virtual environment using mobile agents for collected malicious data. The second, generating new signatures from malicious data, which were collected in the first phase. The third, dynamic deployment of updates between clusters in a cloud computing, using the newest signatures previously created. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively. In this paper, we develop a collaborative approach based on Hy-IDS and Mobile Agents in Cloud Environment, to define a dynamic context which enables the detection of new attacks, with much detail as possible

    Grossesse molaire partielle avec fœtus diploïde vivant: à propos d’un cas et revue de la littérature

    Get PDF
    La môle hydatiforme partielle (MHP) fait partie des maladies trophoblastiques gestationnelles. Appelée également môle embryonnée, il s’agit d’un œuf humain pathologique comportant des villosités en transformation vésiculaire, mais conservant une forme placentaire reconnaissable et une cavité amniotique avec un fœtus. La circonstance diagnostique la plus commune étant le tableau d’avortement spontané au premier trimestre. Rarement les môles partielles persistent au-delà du premier trimestre et sont alors source de complications maternelles et fœtales et de confusion diagnostique. L’origine génétique des MHP correspond à une conception triploïde avec un lot chromosomique supplémentaire d’origine paternelle. La coexistence d’un fœtus de caryotype normal avec une MHP est une situation exceptionnelle. Nous rapportons un cas rare de grossesse molaire partielle avec fœtus vivant diploïde à 27 semaines d’aménorrhée (SA) chez une femme âgée de 36 ans dont le diagnostic est porté à l’occasion d’une menace d’accouchement prématurée associée à un placenta prævia

    Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment

    Get PDF
    Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, with the enormous use of Cloud, the probability of occurring intrusion also increases. There is a major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To address this issue, a security solution is proposed in this paper. We provide a collaborative framework between our Hybrid Intrusion Detection System (Hy-IDS) based on Mobile Agents and virtual firewalls. Therefore, our hybrid intrusion detection system consists of three types of IDS namely IDS-C, IDS-Cr and IDS-M, which are dispatched over three layer of cloud computing. In the first layer, we use IDS-C over our framework to collect, analyze and detect malicious data using Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures using IDS-Cr, which is based on a Signature Generation Algorithm (SGA) and network intrusion detection system (NIDS). Finally, through an IDS-M placed in the third layer, the new signatures will be used to update the database NIDS belonging to IDS-Cr, then the database to NIDS belonging of IDS-Cr the cluster neighboring and also their IDS-C. Hardware firewall is unable to control communication between virtual machines on the same hypervisor. Moreover, they are blind to virtual traffic. Mostly, they are deployed at Virtual Machine Monitor- level (VMM) under Cloud provider’s control. Equally, the mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts, transfer data malicious and transfer update of a database of neighboring IDS in the cloud. With this technique, the neighboring IDS will use these new signatures to protect their area of control against the same type of attack. By this type of close-loop control, the collaborative network security management framework can identify and address new distributed attacks more quickly and effectively

    Robust Fuzzy Sliding Mode Controller for Discrete Nonlinear Systems

    Get PDF
    In this work we are interested to discrete robust fuzzy sliding mode control. The discrete SISO nonlinear uncertain system is presented by the Takgi- Sugeno type fuzzy model state. We recall the principle of the sliding mode control theory then we combine the fuzzy systems with the sliding mode control technique to compute at each sampling time the control law. The control law comports two terms: equivalent control law and switching control law which has a high frequency. The uncertainty is replaced by its upper bound. Inverted pendulum and mass spring dumper are used to check performance of the proposed fuzzy robust sliding mode control scheme

    Robust Control of Series Active Power Filters for Power Quality Enhancement in Distribution Grids: Simulation and Experimental Validation

    Get PDF
    © 2020 Elsevier Ltd. All rights reserved. This manuscript is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Licence http://creativecommons.org/licenses/by-nc-nd/4.0/.This paper presents a simulation study and an experimental implementation of a single-phase Series Active Power Filter (SAPF) for the mitigation of harmonics in the load voltage. The aim is to regulate the injection voltage of the SAPF to compensate the grid voltage via the injection transformer in addition to maintaining the load voltage stable. The control strategies investigated in this work include Backstepping Sliding Mode Control (BSMC) and a neuro-fuzzy controller based on ANFIS (Adaptive Neuro-Fuzzy Inference System) l. The proposed control strategies for the single-phase SAPF are initially evaluated in simulations under MATLAB/Simulink and then validated on a laboratory-scale hardware experimental set up consisting of a source and a single-phase SAPF. A comparative study of these controllers with respect to their performance and robustness in mitigating power quality against voltage disturbances and harmonics is presented. Both simulation and experimental results have demonstrated that ANFIS-based controller was able to achieve superior performance and a lower total harmonic distortion (THD) as compared to the other control methods.Peer reviewedFinal Accepted Versio
    • …
    corecore