首页 > 最新文献

2023 IEEE International Conference on Electro Information Technology (eIT)最新文献

英文 中文
Cybersecurity Awareness Training: A Use Case Model 网络安全意识培训:一个用例模型
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187349
D. Möller, H. Vakilzadian
Cybersecurity is a computing-based discipline dealing with cyber-attacks that harm organizations. It spans many areas of an organization, including but not limited to data security, cryptography, software and hardware security, network and systems security, and others. Thus, cybersecurity is fundamental to protecting confidential data, business assets, and operations. Therefore, any organization must defend against any unauthorized access by cyber-attackers. Hence, implementing cybersecurity is to ensure a security posture for computers, servers, networks, mobile devices, and the data stored on these devices to protect against potential cyber-attackers' malicious intentions. In this regard, cybersecurity risk is critical for all organizations, requiring awareness for employees, specialists, managers, and others that work with sensitive data, business assets, and operations. Cybersecurity training is essential to provide a certain level of cybersecurity awareness l to support organization staff with a comprehensive perspective on potential cyber-attack risks and skills for risk defense. This requires developing a program in cybersecurity awareness training that empowers individuals and organizations to seize opportunities and tackle cybersecurity challenges with the necessary knowledge, skills, and practices described in the curriculum example for training. This paper focus on training on respective knowledge skills and topics for a cybersecurity program to develop effective and efficient skills for participating personnel, enabling them to identify and defend against malicious cyber-attacks [1].
网络安全是一门以计算机为基础的学科,处理危害组织的网络攻击。它跨越组织的许多领域,包括但不限于数据安全、密码学、软件和硬件安全、网络和系统安全等。因此,网络安全是保护机密数据、业务资产和运营的基础。因此,任何组织都必须防范网络攻击者的任何未经授权的访问。因此,实施网络安全就是确保计算机、服务器、网络、移动设备以及存储在这些设备上的数据处于安全状态,以防范潜在的网络攻击者的恶意企图。在这方面,网络安全风险对所有组织都至关重要,需要员工、专家、管理人员和其他处理敏感数据、业务资产和运营的人员意识到这一点。网络安全培训对于提供一定程度的网络安全意识至关重要,以支持组织员工全面了解潜在的网络攻击风险和风险防御技能。这需要制定一个网络安全意识培训计划,使个人和组织能够利用培训课程示例中描述的必要知识、技能和实践,抓住机遇,应对网络安全挑战。本文重点对网络安全项目的相关知识技能和主题进行培训,为参与人员培养有效和高效的技能,使他们能够识别和防御恶意网络攻击[1]。
{"title":"Cybersecurity Awareness Training: A Use Case Model","authors":"D. Möller, H. Vakilzadian","doi":"10.1109/eIT57321.2023.10187349","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187349","url":null,"abstract":"Cybersecurity is a computing-based discipline dealing with cyber-attacks that harm organizations. It spans many areas of an organization, including but not limited to data security, cryptography, software and hardware security, network and systems security, and others. Thus, cybersecurity is fundamental to protecting confidential data, business assets, and operations. Therefore, any organization must defend against any unauthorized access by cyber-attackers. Hence, implementing cybersecurity is to ensure a security posture for computers, servers, networks, mobile devices, and the data stored on these devices to protect against potential cyber-attackers' malicious intentions. In this regard, cybersecurity risk is critical for all organizations, requiring awareness for employees, specialists, managers, and others that work with sensitive data, business assets, and operations. Cybersecurity training is essential to provide a certain level of cybersecurity awareness l to support organization staff with a comprehensive perspective on potential cyber-attack risks and skills for risk defense. This requires developing a program in cybersecurity awareness training that empowers individuals and organizations to seize opportunities and tackle cybersecurity challenges with the necessary knowledge, skills, and practices described in the curriculum example for training. This paper focus on training on respective knowledge skills and topics for a cybersecurity program to develop effective and efficient skills for participating personnel, enabling them to identify and defend against malicious cyber-attacks [1].","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117258508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segmenting and Genotyping Large, Polymorphic Inversions 大的、多态反转的片段和基因分型
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187331
R. J. Nowling, Samuel H. Keyser, Alex R. Moran, John G. Peters, Daniel Leskiewicz
Large, polymorphic inversions can contribute to population structure and enable mutually-exclusive adaptations to survive in the same population. Current methods for detecting inversions from single-nucleotide polymorphisms (SNPs) called from population genomics data require an experienced, human user to prepare the data and interpret the results. Ideally, these methods would be completely automated yet robust to allow usage by inexperienced users. Towards this goal, automated approaches for segmentation of inversions and inference of sample genotypes are introduced and evaluated on chromosomes from flies, mosquitoes, and prairie sunflowers.
大的、多态的反转可以促进种群结构,并使在同一种群中生存的互斥适应成为可能。目前用于检测从群体基因组数据中调用的单核苷酸多态性(snp)反转的方法需要有经验的人类用户来准备数据并解释结果。理想情况下,这些方法应该是完全自动化的,并且健壮,允许没有经验的用户使用。为了实现这一目标,引入了自动分割和推断样本基因型的方法,并对来自苍蝇、蚊子和草原向日葵的染色体进行了评估。
{"title":"Segmenting and Genotyping Large, Polymorphic Inversions","authors":"R. J. Nowling, Samuel H. Keyser, Alex R. Moran, John G. Peters, Daniel Leskiewicz","doi":"10.1109/eIT57321.2023.10187331","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187331","url":null,"abstract":"Large, polymorphic inversions can contribute to population structure and enable mutually-exclusive adaptations to survive in the same population. Current methods for detecting inversions from single-nucleotide polymorphisms (SNPs) called from population genomics data require an experienced, human user to prepare the data and interpret the results. Ideally, these methods would be completely automated yet robust to allow usage by inexperienced users. Towards this goal, automated approaches for segmentation of inversions and inference of sample genotypes are introduced and evaluated on chromosomes from flies, mosquitoes, and prairie sunflowers.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"5 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120862281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated Modeling and Optimal Operation of Multi-Energy System for Coastal Community 沿海社区多能源系统集成建模与优化运行
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187307
Yang Chen, Jun Chen, Chen-Zhe Liu, Guodong Liu, Maximiliano F. Ferrari, Aditya Sundararajan
Focusing on remote, isolated, and underserved communities, a multi-energy system is designed in this research which is capable of utilizing different energy sources in a more coordinated and energy-efficient way to support various demands, such as fresh water, electricity, hydrogen, thermal demand, etc. The energy sources considered are renewables (wind, solar, marine) and natural gas. The energy conversion process includes water desalination, gas combustion, water electrolyzation, and different types of storage (hydrogen tank, electricity, thermal, etc.) are designed to serve as buffers in supply-demand balancing. Sets of experiments are designed to demonstrate the effectiveness of the proposed operating model and investigate the impact of uncertainties from renewable generations and demands.
本研究针对偏远、隔离和服务不足的社区,设计了一种多能源系统,能够以更协调和节能的方式利用不同的能源,以支持各种需求,如淡水、电力、氢气、热需求等。考虑的能源是可再生能源(风能、太阳能、海洋)和天然气。能源转换过程包括海水淡化、气体燃烧、水电解,不同类型的储存(氢罐、电、热等)被设计为供需平衡的缓冲。设计了一系列实验来证明所提出的运行模型的有效性,并研究了来自可再生能源发电和需求的不确定性的影响。
{"title":"Integrated Modeling and Optimal Operation of Multi-Energy System for Coastal Community","authors":"Yang Chen, Jun Chen, Chen-Zhe Liu, Guodong Liu, Maximiliano F. Ferrari, Aditya Sundararajan","doi":"10.1109/eIT57321.2023.10187307","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187307","url":null,"abstract":"Focusing on remote, isolated, and underserved communities, a multi-energy system is designed in this research which is capable of utilizing different energy sources in a more coordinated and energy-efficient way to support various demands, such as fresh water, electricity, hydrogen, thermal demand, etc. The energy sources considered are renewables (wind, solar, marine) and natural gas. The energy conversion process includes water desalination, gas combustion, water electrolyzation, and different types of storage (hydrogen tank, electricity, thermal, etc.) are designed to serve as buffers in supply-demand balancing. Sets of experiments are designed to demonstrate the effectiveness of the proposed operating model and investigate the impact of uncertainties from renewable generations and demands.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125146796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heterogeneity Tolerance in IoT Botnet Attack Classification 物联网僵尸网络攻击分类中的异构容忍
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187264
Samuel Kalenowski, David Arnold, M. Gromov, J. Saniie
Due to the rapid adoption of Internet of Things (IoT) technologies, many networks are composed of a patchwork of devices designed by different software and hardware developers. In addition to the heterogeneity of IoT networks, the general rush-to-market produced products with poor adherence to core cybersecurity principles. Coupled together, these weaknesses leave organizations vulnerable to attack by botnets, such as Mirai and Gafgyt. Infected devices pose a threat to both internal and external devices as they attempt to add new devices to the collective or to perpetrate targeted attacks within the network or against third parties. Artificial Intelligence (AI) tools for intrusion detection are popular platforms for detecting indicators of botnet infiltration. However, when training AI tools, the heterogeneity of the network hampers detection and classification accuracy due to the differences in device architecture and network layout. To investigate this challenge, we explored the application of a Neural Network (NN) to the N-BaIoT dataset. The NN achieved 94% classification accuracy when trained using data from all devices in the network. Further, we examined the model's transferability by training on a single device and applying it to data from all devices. This resulted in a noticeable decline in classification accuracy. However, when considering cyberattack detection the model retained a very high true positive rate of 99.6%.
由于物联网(IoT)技术的快速采用,许多网络由不同的软件和硬件开发人员设计的设备拼凑而成。除了物联网网络的异质性外,一般匆忙上市的产品也没有遵守核心网络安全原则。这些弱点加在一起,使组织容易受到Mirai和Gafgyt等僵尸网络的攻击。受感染的设备对内部和外部设备都构成威胁,因为它们试图向集体添加新设备,或在网络内或针对第三方实施有针对性的攻击。人工智能(AI)入侵检测工具是检测僵尸网络渗透指标的热门平台。然而,在训练AI工具时,由于设备架构和网络布局的差异,网络的异构性影响了检测和分类的准确性。为了研究这一挑战,我们探索了神经网络(NN)在N-BaIoT数据集上的应用。当使用网络中所有设备的数据进行训练时,神经网络达到了94%的分类准确率。此外,我们通过在单个设备上进行训练并将其应用于所有设备的数据来检查模型的可移植性。这导致了分类精度的明显下降。然而,当考虑网络攻击检测时,该模型保留了99.6%的非常高的真阳性率。
{"title":"Heterogeneity Tolerance in IoT Botnet Attack Classification","authors":"Samuel Kalenowski, David Arnold, M. Gromov, J. Saniie","doi":"10.1109/eIT57321.2023.10187264","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187264","url":null,"abstract":"Due to the rapid adoption of Internet of Things (IoT) technologies, many networks are composed of a patchwork of devices designed by different software and hardware developers. In addition to the heterogeneity of IoT networks, the general rush-to-market produced products with poor adherence to core cybersecurity principles. Coupled together, these weaknesses leave organizations vulnerable to attack by botnets, such as Mirai and Gafgyt. Infected devices pose a threat to both internal and external devices as they attempt to add new devices to the collective or to perpetrate targeted attacks within the network or against third parties. Artificial Intelligence (AI) tools for intrusion detection are popular platforms for detecting indicators of botnet infiltration. However, when training AI tools, the heterogeneity of the network hampers detection and classification accuracy due to the differences in device architecture and network layout. To investigate this challenge, we explored the application of a Neural Network (NN) to the N-BaIoT dataset. The NN achieved 94% classification accuracy when trained using data from all devices in the network. Further, we examined the model's transferability by training on a single device and applying it to data from all devices. This resulted in a noticeable decline in classification accuracy. However, when considering cyberattack detection the model retained a very high true positive rate of 99.6%.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126720354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Microwave Resonant Cavity Flowmeter Design for High Temperature Fluid Sensing Applications 用于高温流体传感的微波谐振腔流量计的优化设计
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187362
Tianyang Fang, J. Saniie, S. Bakhtiari, A. Heifetz
This paper investigates optimization of parameters to enhance performance of a microwave resonant cavity transducer for high temperature fluid flow sensing in advanced reactors. The cylindrical microwave cavity flowmeter is a novel sensor that measures fluid flow velocity through deflection of the cavity wall due to dynamic fluid pressure. This sensor is designed to operate in harsh environments of a nuclear reactor because sensor material is resilient to high temperatures, ionizing radiation, and corrosion. Parameters that determine performance characteristics of the transducer include dimensions of the microwave cavity, cavity electromagnetic excitation method, and cavity material. We investigate transducer design through computer simulations, with the objective of maximizing cavity Q-factor.
本文研究了一种用于先进反应堆高温流体传感的微波谐振腔换能器的参数优化问题。圆柱形微波腔流量计是一种利用动流体压力引起的腔壁偏转来测量流体流速的新型传感器。该传感器设计用于在核反应堆的恶劣环境中工作,因为传感器材料对高温、电离辐射和腐蚀具有弹性。决定换能器性能特性的参数包括微波腔的尺寸、腔电磁激励方法和腔材料。我们通过计算机模拟研究换能器的设计,以最大化腔q因子为目标。
{"title":"Optimization of Microwave Resonant Cavity Flowmeter Design for High Temperature Fluid Sensing Applications","authors":"Tianyang Fang, J. Saniie, S. Bakhtiari, A. Heifetz","doi":"10.1109/eIT57321.2023.10187362","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187362","url":null,"abstract":"This paper investigates optimization of parameters to enhance performance of a microwave resonant cavity transducer for high temperature fluid flow sensing in advanced reactors. The cylindrical microwave cavity flowmeter is a novel sensor that measures fluid flow velocity through deflection of the cavity wall due to dynamic fluid pressure. This sensor is designed to operate in harsh environments of a nuclear reactor because sensor material is resilient to high temperatures, ionizing radiation, and corrosion. Parameters that determine performance characteristics of the transducer include dimensions of the microwave cavity, cavity electromagnetic excitation method, and cavity material. We investigate transducer design through computer simulations, with the objective of maximizing cavity Q-factor.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"369 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-Enabled Smart Bike Helmet with an AI-Driven Collision Avoidance System 具有人工智能防撞系统的物联网智能自行车头盔
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187299
Jacob Solus, Maureen Rakotondraibe, Xinrui Yu, Won-Jae Yi, M. Gromov, J. Saniie
This paper presents a system design for a smart bike helmet with multiple safety features that are intended to empower bicycle riders to proactively avoid potential sources of danger or injury. A Smart Sensor/Actuator Node (SSAN), driven by an Arduino Uno single-board microcontroller, contains input sensors and actuators to provide riders the ability to send and receive warnings promptly on their helmet. A Vision Node, driven by an NVIDIA Jetson Nano and a cable pin-connected camera, executes AI object detection algorithms for any dangerous objects that are out of sight of the rider and sends alerts to the SSAN as needed. By combining safety features of the SSAN and Vision Node while continuously sending data to an IoT-enabled backend web server, the safety operation of a typical bike ride can be substantially improved.
本文提出了一种具有多种安全功能的智能自行车头盔的系统设计,旨在使自行车骑行者能够主动避开潜在的危险或伤害源。智能传感器/执行器节点(SSAN),由Arduino Uno单板微控制器驱动,包含输入传感器和执行器,为骑手提供在头盔上及时发送和接收警告的能力。视觉节点由NVIDIA Jetson Nano和电缆引脚连接的摄像头驱动,执行人工智能物体检测算法,检测驾驶员视线之外的任何危险物体,并根据需要向SSAN发送警报。通过结合SSAN和Vision Node的安全功能,同时不断向支持物联网的后端web服务器发送数据,可以大大提高典型自行车骑行的安全性。
{"title":"IoT-Enabled Smart Bike Helmet with an AI-Driven Collision Avoidance System","authors":"Jacob Solus, Maureen Rakotondraibe, Xinrui Yu, Won-Jae Yi, M. Gromov, J. Saniie","doi":"10.1109/eIT57321.2023.10187299","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187299","url":null,"abstract":"This paper presents a system design for a smart bike helmet with multiple safety features that are intended to empower bicycle riders to proactively avoid potential sources of danger or injury. A Smart Sensor/Actuator Node (SSAN), driven by an Arduino Uno single-board microcontroller, contains input sensors and actuators to provide riders the ability to send and receive warnings promptly on their helmet. A Vision Node, driven by an NVIDIA Jetson Nano and a cable pin-connected camera, executes AI object detection algorithms for any dangerous objects that are out of sight of the rider and sends alerts to the SSAN as needed. By combining safety features of the SSAN and Vision Node while continuously sending data to an IoT-enabled backend web server, the safety operation of a typical bike ride can be substantially improved.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speed-Optimized Implementation of Fast Chirplet Decomposition Algorithm on FPGA-SoC 快速小波分解算法在FPGA-SoC上的速度优化实现
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187330
A. Fite, M. Gromov, Tianyang Fang, J. Saniie
In ultrasonic nondestructive evaluation (NDE) of materials an essential step in characterizing an ultrasonic signal is decomposing the patterns of multiple interfering echoes. The Chirplet Transform (CT) is a powerful method to analyze the echoes in an ultrasonic signal. However, CT analysis is computationally heavy and impractical. Motivated by achieving real-time execution of the CT this research presents a speed-optimized implementation of the chirplet functions on FPGA. Chirplet echo generation used in Fast Chirplet Decomposition (FCD) Algorithm for ultrasonic signal analysis necessitates the frequent generation of chirplet functions with a 6-degree of freedom associated with chirplet parameters including the amplitude scaler; the time of arrival; the Gaussian envelope scaler; the phase of the chirplet; the center frequency and the frequency sweep. By minimizing the processing time of the chirplet generation, the FCD algorithm can be implemented efficiently on FPGA System-on-Chip (SoC). This study presents the hardware realization of the chirplet function on FPGA which is 37 times faster compared to using a Teensy 4.0 microcontroller, and 146 times faster than a highly popular Raspberry Pi 4.0 single board computer.
在材料的超声无损检测中,表征超声信号的一个重要步骤是分解多重干扰回波的模式。小波变换(CT)是一种分析超声回波信号的有效方法。然而,CT分析计算量大且不切实际。为了实现CT的实时执行,本研究在FPGA上提出了一种速度优化的小波函数实现。用于超声信号分析的快速啁啾分解(FCD)算法中的啁啾回波生成需要频繁生成具有6个自由度的啁啾函数,该函数与包括幅度标度在内的啁啾参数相关;到达时间;高斯包络标量;啁啾的相位;中心频率和扫频。通过最小化小波产生的处理时间,FCD算法可以在FPGA片上有效地实现。本研究提出了在FPGA上实现啁啾功能的硬件实现,比使用Teensy 4.0微控制器快37倍,比非常流行的树莓派4.0单板计算机快146倍。
{"title":"Speed-Optimized Implementation of Fast Chirplet Decomposition Algorithm on FPGA-SoC","authors":"A. Fite, M. Gromov, Tianyang Fang, J. Saniie","doi":"10.1109/eIT57321.2023.10187330","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187330","url":null,"abstract":"In ultrasonic nondestructive evaluation (NDE) of materials an essential step in characterizing an ultrasonic signal is decomposing the patterns of multiple interfering echoes. The Chirplet Transform (CT) is a powerful method to analyze the echoes in an ultrasonic signal. However, CT analysis is computationally heavy and impractical. Motivated by achieving real-time execution of the CT this research presents a speed-optimized implementation of the chirplet functions on FPGA. Chirplet echo generation used in Fast Chirplet Decomposition (FCD) Algorithm for ultrasonic signal analysis necessitates the frequent generation of chirplet functions with a 6-degree of freedom associated with chirplet parameters including the amplitude scaler; the time of arrival; the Gaussian envelope scaler; the phase of the chirplet; the center frequency and the frequency sweep. By minimizing the processing time of the chirplet generation, the FCD algorithm can be implemented efficiently on FPGA System-on-Chip (SoC). This study presents the hardware realization of the chirplet function on FPGA which is 37 times faster compared to using a Teensy 4.0 microcontroller, and 146 times faster than a highly popular Raspberry Pi 4.0 single board computer.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117039878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low-rate GPS Coordinate Communication Protocol Embedded into VHF Beacon for Animal Tracking 嵌入甚高频信标的低速率GPS坐标通信协议用于动物跟踪
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187273
Jesse Holwerda, B. Dunne, Paul W. Keenlance
Traditional animal tracking radio collars employ a low-duty cycle VHF radio beacon for directional antenna-based tracking and collar retrieval. With the advent of compact GPS receivers, an efficient method to transmit GPS coordinates while minimizing weight, power consumption and cost is desired. A protocol is described based on the modulation of the existing VHF beacon to achieve the GPS coordinate communication while meeting the desired metrics. The implementation utilizes the LimeSDR mini interfaced to a Raspberry PI. Discussed within are the communication protocol, algorithm implementation and device field application.
传统的动物跟踪无线电项圈采用低占空比甚高频无线电信标进行定向天线跟踪和项圈检索。随着紧凑型GPS接收机的出现,需要一种有效的方法来传输GPS坐标,同时最小化重量,功耗和成本。描述了一种基于现有VHF信标调制的协议,以实现GPS坐标通信,同时满足所需的度量。该实现利用了与树莓派相连的LimeSDR mini接口。讨论了通信协议、算法实现和设备现场应用。
{"title":"Low-rate GPS Coordinate Communication Protocol Embedded into VHF Beacon for Animal Tracking","authors":"Jesse Holwerda, B. Dunne, Paul W. Keenlance","doi":"10.1109/eIT57321.2023.10187273","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187273","url":null,"abstract":"Traditional animal tracking radio collars employ a low-duty cycle VHF radio beacon for directional antenna-based tracking and collar retrieval. With the advent of compact GPS receivers, an efficient method to transmit GPS coordinates while minimizing weight, power consumption and cost is desired. A protocol is described based on the modulation of the existing VHF beacon to achieve the GPS coordinate communication while meeting the desired metrics. The implementation utilizes the LimeSDR mini interfaced to a Raspberry PI. Discussed within are the communication protocol, algorithm implementation and device field application.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126818362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fire Security Systems Analysis and Internet of Things Implications 消防安全系统分析和物联网影响
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187236
Susana Rodriguez Fuerte, Xinrui Yu, J. Saniie
This paper presents the current use of the Internet of Things (IoT) in fire evacuation and extinction. It examines the different approaches to the problem and technologies like Building Information Modeling (BIM) and mathematical algorithms that can be used to determine the optimal evacuation route. It also evaluates existing fire security solutions such as smoke, flame, motion, and gas sensors, LED lights, buzzers, and SMS modules. Entities that specialize in Residential and Commercial Security Systems and Home Automation are also discussed, along with the services they offer. The main objective of this study is to understand current systems and resources regarding fire evacuation and extinction systems and to analyze different developments in smart buildings to create an efficient system for fire detection and evacuation.
本文介绍了物联网(IoT)在火灾疏散和灭火中的应用现状。它探讨了解决问题的不同方法和技术,如建筑信息模型(BIM)和数学算法,可用于确定最佳疏散路线。它还评估了现有的火灾安全解决方案,如烟雾、火焰、运动和气体传感器、LED灯、蜂鸣器和SMS模块。专门从事住宅和商业安全系统和家庭自动化的实体也被讨论,以及他们提供的服务。本研究的主要目的是了解有关火灾疏散和灭火系统的当前系统和资源,并分析智能建筑的不同发展,以创建一个有效的火灾探测和疏散系统。
{"title":"Fire Security Systems Analysis and Internet of Things Implications","authors":"Susana Rodriguez Fuerte, Xinrui Yu, J. Saniie","doi":"10.1109/eIT57321.2023.10187236","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187236","url":null,"abstract":"This paper presents the current use of the Internet of Things (IoT) in fire evacuation and extinction. It examines the different approaches to the problem and technologies like Building Information Modeling (BIM) and mathematical algorithms that can be used to determine the optimal evacuation route. It also evaluates existing fire security solutions such as smoke, flame, motion, and gas sensors, LED lights, buzzers, and SMS modules. Entities that specialize in Residential and Commercial Security Systems and Home Automation are also discussed, along with the services they offer. The main objective of this study is to understand current systems and resources regarding fire evacuation and extinction systems and to analyze different developments in smart buildings to create an efficient system for fire detection and evacuation.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130963347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Raspberry Pi Based Computing Prototypes: Design, Implementation and Performance Analysis 基于树莓派的计算原型:设计、实现和性能分析
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187384
Seth Wolfgang, Xiang Cao
Nowadays, in Internet of Things (IoT) applications, IoT devices generate and gather data. These data can be handled in different ways. They can be processed by IoT devices directly, by the Cloud, or by the edge servers. In recent years, Raspberry Pi has been developed as a small IoT device for many applications. In this paper, we design and implement various computing models, i.e., Cloud Computing, Edge Computing, and computing on IoT devices, using Raspberry Pis as prototypes. We deploy multiple applications, run hands-on experiments, and analyze the results accordingly. We also compare the performances of these different computing paradigms, and take advantage of the parallel processing capability of Raspberry Pi devices to demonstrate the effectiveness of improving the prototype performance.
如今,在物联网(IoT)应用中,物联网设备生成和收集数据。这些数据可以用不同的方式处理。它们可以由物联网设备直接处理,也可以由云或边缘服务器处理。近年来,树莓派已被开发为许多应用的小型物联网设备。在本文中,我们以树莓派为原型,设计并实现了各种计算模型,即云计算,边缘计算和物联网设备上的计算。我们部署多个应用程序,运行动手实验,并相应地分析结果。我们还比较了这些不同计算范式的性能,并利用树莓派器件的并行处理能力来证明改进原型性能的有效性。
{"title":"Raspberry Pi Based Computing Prototypes: Design, Implementation and Performance Analysis","authors":"Seth Wolfgang, Xiang Cao","doi":"10.1109/eIT57321.2023.10187384","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187384","url":null,"abstract":"Nowadays, in Internet of Things (IoT) applications, IoT devices generate and gather data. These data can be handled in different ways. They can be processed by IoT devices directly, by the Cloud, or by the edge servers. In recent years, Raspberry Pi has been developed as a small IoT device for many applications. In this paper, we design and implement various computing models, i.e., Cloud Computing, Edge Computing, and computing on IoT devices, using Raspberry Pis as prototypes. We deploy multiple applications, run hands-on experiments, and analyze the results accordingly. We also compare the performances of these different computing paradigms, and take advantage of the parallel processing capability of Raspberry Pi devices to demonstrate the effectiveness of improving the prototype performance.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115366748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE International Conference on Electro Information Technology (eIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1