首页 > 最新文献

Electronics最新文献

英文 中文
Functional Exercise Induces Adaptations in Muscle Oxygen Saturation in Division One Collegiate Butterfly Swimmers: A Randomized Controlled Trial 功能性锻炼诱导甲组大学生蝶泳运动员肌肉氧饱和度的适应性变化:随机对照试验
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183680
Jack Grotke, Austin Alcantara, Joe Amitrano, Dhruv R. Seshadri
This study investigates the impact of a five-week functional exercise intervention designed to enhance the muscular endurance of the posterior shoulder musculature, aiming to mitigate shoulder fatigue and overuse injury. Twelve Division I collegiate butterfly swimmers were recruited and evenly randomized into exercise (EX) and control (CTRL) groups. Weekly 100-yard butterfly sprints were performed, with Muscle Oxygen Saturation (SmO2) continuously monitored using a wearable near-infrared spectroscopy (NIRS) device. This study is among the first to utilize wearable NIRS devices to monitor SmO2 underwater during swimming, demonstrating that a targeted 5-week exercise program significantly improves posterior shoulder endurance, as evidenced by increased Posterior Shoulder Endurance Test (PSET) scores and distinctive SmO2 adaptations in the EX-group compared to the CTRL group. These findings suggest that targeted dryland exercises can enhance posterior shoulder endurance with long-term implications for potentially reducing injury risk and improving performance.
本研究调查了为期五周的功能锻炼干预的影响,该干预旨在增强肩部后部肌肉的耐力,从而减轻肩部疲劳和过度使用损伤。研究人员招募了 12 名一级大学蝶泳运动员,并将他们平均随机分为锻炼组(EX)和对照组(CTRL)。每周进行 100 码蝶泳冲刺,并使用可穿戴式近红外光谱仪(NIRS)持续监测肌肉氧饱和度(SmO2)。这项研究是首批利用可穿戴近红外光谱设备监测游泳时水下 SmO2 的研究之一,结果表明,与 CTRL 组相比,EX 组的肩关节后耐力测试 (PSET) 分数提高,SmO2 适应性明显增强,这表明为期 5 周的针对性锻炼计划能显著提高肩关节后耐力。这些研究结果表明,有针对性的旱地锻炼可以增强肩关节后部耐力,对降低受伤风险和提高运动成绩具有长远意义。
{"title":"Functional Exercise Induces Adaptations in Muscle Oxygen Saturation in Division One Collegiate Butterfly Swimmers: A Randomized Controlled Trial","authors":"Jack Grotke, Austin Alcantara, Joe Amitrano, Dhruv R. Seshadri","doi":"10.3390/electronics13183680","DOIUrl":"https://doi.org/10.3390/electronics13183680","url":null,"abstract":"This study investigates the impact of a five-week functional exercise intervention designed to enhance the muscular endurance of the posterior shoulder musculature, aiming to mitigate shoulder fatigue and overuse injury. Twelve Division I collegiate butterfly swimmers were recruited and evenly randomized into exercise (EX) and control (CTRL) groups. Weekly 100-yard butterfly sprints were performed, with Muscle Oxygen Saturation (SmO2) continuously monitored using a wearable near-infrared spectroscopy (NIRS) device. This study is among the first to utilize wearable NIRS devices to monitor SmO2 underwater during swimming, demonstrating that a targeted 5-week exercise program significantly improves posterior shoulder endurance, as evidenced by increased Posterior Shoulder Endurance Test (PSET) scores and distinctive SmO2 adaptations in the EX-group compared to the CTRL group. These findings suggest that targeted dryland exercises can enhance posterior shoulder endurance with long-term implications for potentially reducing injury risk and improving performance.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"19 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Voltage Water Pump System Based on Permanent Magnet Synchronous Motor 基于永磁同步电机的低压水泵系统
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183674
Xinrong Jin, Leifu Zhou, Tingting Lang, Yanbing Jiang
This paper designs a safe, low-cost, and efficient permanent magnet synchronous motor (PMSM) booster pump system. The aim is to enhance the pump’s safety and reduce the incidence of electric shock accidents, while also achieving cost reduction and efficiency improvement. The pump components are made of a plastic material, and a safe voltage of 36 V is used as the operating voltage. Additionally, the PMSM is chosen to replace the induction motor (IM) as the pump’s driving device, utilizing sensorless control and field-weakening control strategies. The study results show that when the flow rate is 1.51 m3/h, the efficiency of the PMSM low-voltage pump can reach up to 20.86%. At the same flow rate of 1 m3/h, compared to other pumps, the PMSM low-voltage pump exhibits higher head, energy savings, and efficiency. The proposed PMSM low-voltage pump offers advantages such as high efficiency, energy savings, safety, and low cost. This study provides a reference for the domestic PMSM pump industry.
本文设计了一种安全、低成本、高效率的永磁同步电机(PMSM)增压泵系统。目的是提高泵的安全性,减少触电事故的发生,同时降低成本,提高效率。泵部件由塑料材料制成,工作电压采用 36 V 安全电压。此外,选用 PMSM 代替感应电机(IM)作为泵的驱动装置,并采用无传感器控制和磁场削弱控制策略。研究结果表明,当流量为 1.51 m3/h 时,PMSM 低压泵的效率可达 20.86%。在流量为 1 m3/h 的相同条件下,与其他泵相比,PMSM 低压泵扬程更高、更节能、效率更高。所提出的 PMSM 低压泵具有高效、节能、安全和低成本等优点。本研究为国内 PMSM 泵行业提供了参考。
{"title":"Low-Voltage Water Pump System Based on Permanent Magnet Synchronous Motor","authors":"Xinrong Jin, Leifu Zhou, Tingting Lang, Yanbing Jiang","doi":"10.3390/electronics13183674","DOIUrl":"https://doi.org/10.3390/electronics13183674","url":null,"abstract":"This paper designs a safe, low-cost, and efficient permanent magnet synchronous motor (PMSM) booster pump system. The aim is to enhance the pump’s safety and reduce the incidence of electric shock accidents, while also achieving cost reduction and efficiency improvement. The pump components are made of a plastic material, and a safe voltage of 36 V is used as the operating voltage. Additionally, the PMSM is chosen to replace the induction motor (IM) as the pump’s driving device, utilizing sensorless control and field-weakening control strategies. The study results show that when the flow rate is 1.51 m3/h, the efficiency of the PMSM low-voltage pump can reach up to 20.86%. At the same flow rate of 1 m3/h, compared to other pumps, the PMSM low-voltage pump exhibits higher head, energy savings, and efficiency. The proposed PMSM low-voltage pump offers advantages such as high efficiency, energy savings, safety, and low cost. This study provides a reference for the domestic PMSM pump industry.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"14 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Federated Learning: Approaches, Mechanisms and Opportunities 确保联合学习:方法、机制和机遇
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183675
Mohammad Moshawrab, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Ali Raad
With the ability to analyze data, artificial intelligence technology and its offshoots have made difficult tasks easier. The tools of these technologies are now used in almost every aspect of life. For example, Machine Learning (ML), an offshoot of artificial intelligence, has become the focus of interest for researchers in industry, education, healthcare and other disciplines and has proven to be as efficient as, and in some cases better than, experts in answering various problems. However, the obstacles to ML’s progress are still being explored, and Federated Learning (FL) has been presented as a solution to the problems of privacy and confidentiality. In the FL approach, users do not disclose their data throughout the learning process, which improves privacy and security. In this article, we look at the security and privacy concepts of FL and the threats and attacks it faces. We also address the security measures used in FL aggregation procedures. In addition, we examine and discuss the use of homomorphic encryption to protect FL data exchange, as well as other security strategies. Finally, we discuss security and privacy concepts in FL and what additional improvements could be made in this context to increase the efficiency of FL algorithms.
凭借分析数据的能力,人工智能技术及其分支使困难的任务变得更加容易。现在,这些技术的工具几乎应用于生活的方方面面。例如,机器学习(ML)作为人工智能的一个分支,已成为工业、教育、医疗保健和其他学科研究人员关注的焦点,并被证明在回答各种问题时与专家一样有效,甚至在某些情况下优于专家。然而,阻碍人工智能发展的障碍仍在探索之中,而联邦学习(FL)被认为是解决隐私和保密问题的一种方法。在联邦学习方法中,用户在整个学习过程中都不会公开自己的数据,从而提高了隐私性和安全性。在本文中,我们将探讨 FL 的安全和隐私概念及其面临的威胁和攻击。我们还讨论了 FL 聚合程序中使用的安全措施。此外,我们还研究和讨论了使用同态加密来保护 FL 数据交换以及其他安全策略。最后,我们讨论了 FL 中的安全和隐私概念,以及在此背景下还可以做出哪些改进来提高 FL 算法的效率。
{"title":"Securing Federated Learning: Approaches, Mechanisms and Opportunities","authors":"Mohammad Moshawrab, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Ali Raad","doi":"10.3390/electronics13183675","DOIUrl":"https://doi.org/10.3390/electronics13183675","url":null,"abstract":"With the ability to analyze data, artificial intelligence technology and its offshoots have made difficult tasks easier. The tools of these technologies are now used in almost every aspect of life. For example, Machine Learning (ML), an offshoot of artificial intelligence, has become the focus of interest for researchers in industry, education, healthcare and other disciplines and has proven to be as efficient as, and in some cases better than, experts in answering various problems. However, the obstacles to ML’s progress are still being explored, and Federated Learning (FL) has been presented as a solution to the problems of privacy and confidentiality. In the FL approach, users do not disclose their data throughout the learning process, which improves privacy and security. In this article, we look at the security and privacy concepts of FL and the threats and attacks it faces. We also address the security measures used in FL aggregation procedures. In addition, we examine and discuss the use of homomorphic encryption to protect FL data exchange, as well as other security strategies. Finally, we discuss security and privacy concepts in FL and what additional improvements could be made in this context to increase the efficiency of FL algorithms.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"34 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guard Band Protection Scheme to Facilitate Coexistence of 5G Base Stations and Radar Altimeters 促进 5G 基站与雷达高度计共存的护带保护计划
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183681
Jiaqi Li, Seung-Hoon Hwang
Reformation of the 3.7–4.0 GHz band to expand 5G communication deployment poses a risk of 5G signals disrupting radar altimeter operation, leading to data loss or inaccuracies. Thus, this paper proposes a guard band protection method to facilitate the coexistence of 5G base stations and radar altimeters operating in the 4.2–4.4 GHz band. To enhance the adjacent channel leakage ratio (ACLR), we implemented spectral regrowth on an oversampled waveform using a high-power amplifier model, filtering out-of-band spectral emissions. The results demonstrated that a 150 MHz guard band enables coexistence, except in the case of the 16-by-16 antenna array in rural environments. Notably, for the 4-by-4 antenna array in urban environments, coexistence can be achieved using a 50 MHz guard band. The proposed mitigation techniques may also be extended to promote coexistence between non-terrestrial networks and 5G communication systems, including satellites, unmanned aerial vehicles, and hot air balloons.
为扩大 5G 通信部署而对 3.7-4.0 GHz 频段进行的改革会带来 5G 信号干扰雷达高度计工作的风险,导致数据丢失或不准确。因此,本文提出了一种护带保护方法,以促进在 4.2-4.4 GHz 频段工作的 5G 基站和雷达高度计的共存。为了提高相邻信道泄漏比(ACLR),我们使用高功率放大器模型在过采样波形上实现了频谱再生,过滤了带外频谱发射。结果表明,除农村环境中 16×16 天线阵列的情况外,150 MHz 的保护带可实现共存。值得注意的是,对于城市环境中的 4×4 天线阵列,使用 50 MHz 的保护带可实现共存。拟议的缓解技术还可扩展到促进非地面网络与 5G 通信系统之间的共存,包括卫星、无人驾驶飞行器和热气球。
{"title":"Guard Band Protection Scheme to Facilitate Coexistence of 5G Base Stations and Radar Altimeters","authors":"Jiaqi Li, Seung-Hoon Hwang","doi":"10.3390/electronics13183681","DOIUrl":"https://doi.org/10.3390/electronics13183681","url":null,"abstract":"Reformation of the 3.7–4.0 GHz band to expand 5G communication deployment poses a risk of 5G signals disrupting radar altimeter operation, leading to data loss or inaccuracies. Thus, this paper proposes a guard band protection method to facilitate the coexistence of 5G base stations and radar altimeters operating in the 4.2–4.4 GHz band. To enhance the adjacent channel leakage ratio (ACLR), we implemented spectral regrowth on an oversampled waveform using a high-power amplifier model, filtering out-of-band spectral emissions. The results demonstrated that a 150 MHz guard band enables coexistence, except in the case of the 16-by-16 antenna array in rural environments. Notably, for the 4-by-4 antenna array in urban environments, coexistence can be achieved using a 50 MHz guard band. The proposed mitigation techniques may also be extended to promote coexistence between non-terrestrial networks and 5G communication systems, including satellites, unmanned aerial vehicles, and hot air balloons.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"167 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hessian-Based Deep Learning Preprocessing Method for Coronary Angiography Image Analysis 基于黑森深度学习的冠状动脉造影图像分析预处理方法
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183676
Yanjun Li, Takaaki Yoshimura, Yuto Horima, Hiroyuki Sugimori
Leveraging its high accuracy and stability, deep-learning-based coronary artery detection technology has been extensively utilized in diagnosing coronary artery diseases. However, traditional algorithms for localizing coronary stenosis often fall short when detecting stenosis in branch vessels, which can pose significant health risks due to factors like imaging angles and uneven contrast agent distribution. To tackle these challenges, we propose a preprocessing method that integrates Hessian-based vascular enhancement and image fusion as prerequisites for deep learning. This approach enhances fuzzy features in coronary angiography images, thereby increasing the neural network’s sensitivity to stenosis characteristics. We assessed the effectiveness of this method using the latest deep learning networks, such as YOLOv10, YOLOv9, and RT-DETR, across various evaluation metrics. Our results show that our method improves AP50 accuracy by 4.84% and 5.07% on RT-DETR R101 and YOLOv10-X, respectively, compared to images without special pre-processing. Furthermore, our analysis of different imaging angles on stenosis localization detection indicates that the left coronary artery zero is the most suitable for detecting stenosis with a AP50(%) value of 90.5. The experimental results have revealed that the proposed method is effective as a preprocessing technique for deep-learning-based coronary angiography image processing and enhances the model’s ability to identify stenosis in small blood vessels.
基于深度学习的冠状动脉检测技术具有高准确性和稳定性,已被广泛应用于冠状动脉疾病的诊断。然而,由于成像角度和造影剂分布不均等因素,传统的冠状动脉狭窄定位算法在检测分支血管狭窄时往往存在不足,这可能会对健康造成重大风险。为了应对这些挑战,我们提出了一种预处理方法,将基于黑森的血管增强和图像融合作为深度学习的先决条件。这种方法增强了冠状动脉造影图像中的模糊特征,从而提高了神经网络对血管狭窄特征的敏感性。我们使用最新的深度学习网络(如 YOLOv10、YOLOv9 和 RT-DETR)评估了该方法在各种评价指标上的有效性。结果表明,与未经特殊预处理的图像相比,我们的方法在 RT-DETR R101 和 YOLOv10-X 上将 AP50 的准确率分别提高了 4.84% 和 5.07%。此外,我们还分析了不同成像角度对狭窄定位检测的影响,结果表明左冠状动脉零点最适合检测狭窄,AP50(%) 值为 90.5。实验结果表明,所提出的方法作为基于深度学习的冠状动脉造影图像处理的预处理技术是有效的,并增强了模型识别小血管狭窄的能力。
{"title":"A Hessian-Based Deep Learning Preprocessing Method for Coronary Angiography Image Analysis","authors":"Yanjun Li, Takaaki Yoshimura, Yuto Horima, Hiroyuki Sugimori","doi":"10.3390/electronics13183676","DOIUrl":"https://doi.org/10.3390/electronics13183676","url":null,"abstract":"Leveraging its high accuracy and stability, deep-learning-based coronary artery detection technology has been extensively utilized in diagnosing coronary artery diseases. However, traditional algorithms for localizing coronary stenosis often fall short when detecting stenosis in branch vessels, which can pose significant health risks due to factors like imaging angles and uneven contrast agent distribution. To tackle these challenges, we propose a preprocessing method that integrates Hessian-based vascular enhancement and image fusion as prerequisites for deep learning. This approach enhances fuzzy features in coronary angiography images, thereby increasing the neural network’s sensitivity to stenosis characteristics. We assessed the effectiveness of this method using the latest deep learning networks, such as YOLOv10, YOLOv9, and RT-DETR, across various evaluation metrics. Our results show that our method improves AP50 accuracy by 4.84% and 5.07% on RT-DETR R101 and YOLOv10-X, respectively, compared to images without special pre-processing. Furthermore, our analysis of different imaging angles on stenosis localization detection indicates that the left coronary artery zero is the most suitable for detecting stenosis with a AP50(%) value of 90.5. The experimental results have revealed that the proposed method is effective as a preprocessing technique for deep-learning-based coronary angiography image processing and enhances the model’s ability to identify stenosis in small blood vessels.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"19 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced K-Means Clustering Algorithm for Phishing Attack Detections 用于网络钓鱼攻击检测的增强型 K-Means 聚类算法
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183677
Abdallah Al-Sabbagh, Khalil Hamze, Samiya Khan, Mahmoud Elkhodr
Phishing attacks continue to pose a significant threat to cybersecurity, employing increasingly sophisticated techniques to deceive victims into revealing sensitive information or downloading malware. This paper presents a comprehensive study on the application of Machine Learning (ML) techniques for identifying phishing websites, with a focus on enhancing detection accuracy and efficiency. We propose an approach that integrates the CfsSubsetEval attribute evaluator with the K-Means Clustering algorithm to improve phishing detection capabilities. Our method was evaluated using datasets of varying sizes (2000, 7000, and 10,000 samples) from a publicly available repository. Simulation results demonstrate that our approach achieves an accuracy of 89.2% on the 2000-sample dataset, outperforming the traditional kernel K-Means algorithm, which achieved an accuracy of 51.5%. Further analysis using precision, recall, and F1-score metrics corroborates the effectiveness of our method. We also discuss the scalability and real-world applicability of our approach, addressing limitations and proposing future research directions. This study contributes to the ongoing efforts to develop robust, efficient, and adaptable phishing detection systems in the face of evolving cyber threats.
网络钓鱼攻击继续对网络安全构成重大威胁,它利用日益复杂的技术欺骗受害者,使其泄露敏感信息或下载恶意软件。本文全面研究了机器学习(ML)技术在识别网络钓鱼网站中的应用,重点是提高检测的准确性和效率。我们提出了一种将 CfsSubsetEval 属性评估器与 K-Means 聚类算法相结合的方法,以提高网络钓鱼的检测能力。我们使用公开资料库中不同规模(2000、7000 和 10,000 个样本)的数据集对我们的方法进行了评估。模拟结果表明,在 2000 个样本的数据集上,我们的方法达到了 89.2% 的准确率,超过了传统内核 K-Means 算法 51.5% 的准确率。使用精确度、召回率和 F1 分数指标进行的进一步分析证实了我们方法的有效性。我们还讨论了我们方法的可扩展性和实际应用性,解决了局限性问题,并提出了未来的研究方向。面对不断发展的网络威胁,我们正在努力开发稳健、高效和适应性强的网络钓鱼检测系统,本研究为这一努力做出了贡献。
{"title":"An Enhanced K-Means Clustering Algorithm for Phishing Attack Detections","authors":"Abdallah Al-Sabbagh, Khalil Hamze, Samiya Khan, Mahmoud Elkhodr","doi":"10.3390/electronics13183677","DOIUrl":"https://doi.org/10.3390/electronics13183677","url":null,"abstract":"Phishing attacks continue to pose a significant threat to cybersecurity, employing increasingly sophisticated techniques to deceive victims into revealing sensitive information or downloading malware. This paper presents a comprehensive study on the application of Machine Learning (ML) techniques for identifying phishing websites, with a focus on enhancing detection accuracy and efficiency. We propose an approach that integrates the CfsSubsetEval attribute evaluator with the K-Means Clustering algorithm to improve phishing detection capabilities. Our method was evaluated using datasets of varying sizes (2000, 7000, and 10,000 samples) from a publicly available repository. Simulation results demonstrate that our approach achieves an accuracy of 89.2% on the 2000-sample dataset, outperforming the traditional kernel K-Means algorithm, which achieved an accuracy of 51.5%. Further analysis using precision, recall, and F1-score metrics corroborates the effectiveness of our method. We also discuss the scalability and real-world applicability of our approach, addressing limitations and proposing future research directions. This study contributes to the ongoing efforts to develop robust, efficient, and adaptable phishing detection systems in the face of evolving cyber threats.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"374 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zadoff–Chu Sequence Pilot for Time and Frequency Synchronization in UWA OFDM System 用于 UWA OFDM 系统时间和频率同步的 Zadoff-Chu 序列先导
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183679
Seunghwan Seol, Yongcheol Kim, Minho Kim, Jaehak Chung
In underwater communications for 6G, Doppler effects cause the coherent time to become similar to or shorter than the orthogonal frequency division multiplexing (OFDM) symbol length. Conventional time and frequency synchronization methods require additional training symbols for synchronization, which reduces the traffic data rate. This paper proposes the Zadoff–Chu sequence (ZCS) pilot-based OFDM for time and frequency synchronization. The proposed method transmits ZCS as a pilot for OFDM symbols and simultaneously transmits traffic data to increase the traffic data rate while estimating the CFO at each coherence time. For time–frequency synchronization, the correlation of the ZCS pilot is used to perform coarse and fine time and frequency synchronization in two stages. Since the traffic data cause interference with the correlation of ZCS pilots, we theoretically analyzed the relationship between the amount of traffic data and interference and verified it through computer simulations. The synchronization and BER performance of the proposed ZCS pilot-based OFDM were evaluated by conduction computer simulations and a practical ocean experiment. Compared to the methods of Ren, Yang, and Avrashi, the proposed method demonstrated a 6.3% to 14.3% increase in traffic data rate with similar BER performance and a 2 dB to 3.8 dB SNR gain for a 14.3% to 23.8% decrease in traffic data rate.
在面向 6G 的水下通信中,多普勒效应会导致相干时间变得与正交频分复用(OFDM)符号长度相似或更短。传统的时间和频率同步方法需要额外的训练符号进行同步,从而降低了通信数据传输速率。本文提出了基于 Zadoff-Chu 序列(ZCS)先导的 OFDM 时间和频率同步方法。该方法将 ZCS 作为 OFDM 符号的先导进行传输,并同时传输流量数据,以提高流量数据传输速率,同时估计每个相干时间的 CFO。在时频同步方面,利用 ZCS 先导的相关性分两个阶段进行粗、细时间和频率同步。由于流量数据会对 ZCS 先导相关性产生干扰,我们从理论上分析了流量数据量与干扰之间的关系,并通过计算机仿真进行了验证。通过计算机仿真和实际海洋实验,评估了所提出的基于 ZCS 试点的 OFDM 的同步和误码率性能。与 Ren、Yang 和 Avrashi 的方法相比,所提出的方法在误码率性能相似的情况下,流量数据率提高了 6.3% 至 14.3%;在流量数据率降低 14.3% 至 23.8% 的情况下,信噪比增益为 2 dB 至 3.8 dB。
{"title":"Zadoff–Chu Sequence Pilot for Time and Frequency Synchronization in UWA OFDM System","authors":"Seunghwan Seol, Yongcheol Kim, Minho Kim, Jaehak Chung","doi":"10.3390/electronics13183679","DOIUrl":"https://doi.org/10.3390/electronics13183679","url":null,"abstract":"In underwater communications for 6G, Doppler effects cause the coherent time to become similar to or shorter than the orthogonal frequency division multiplexing (OFDM) symbol length. Conventional time and frequency synchronization methods require additional training symbols for synchronization, which reduces the traffic data rate. This paper proposes the Zadoff–Chu sequence (ZCS) pilot-based OFDM for time and frequency synchronization. The proposed method transmits ZCS as a pilot for OFDM symbols and simultaneously transmits traffic data to increase the traffic data rate while estimating the CFO at each coherence time. For time–frequency synchronization, the correlation of the ZCS pilot is used to perform coarse and fine time and frequency synchronization in two stages. Since the traffic data cause interference with the correlation of ZCS pilots, we theoretically analyzed the relationship between the amount of traffic data and interference and verified it through computer simulations. The synchronization and BER performance of the proposed ZCS pilot-based OFDM were evaluated by conduction computer simulations and a practical ocean experiment. Compared to the methods of Ren, Yang, and Avrashi, the proposed method demonstrated a 6.3% to 14.3% increase in traffic data rate with similar BER performance and a 2 dB to 3.8 dB SNR gain for a 14.3% to 23.8% decrease in traffic data rate.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"46 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoFL: Clustered Federated Learning Based on Dual Clustering for Heterogeneous Data SoFL:基于双重聚类的异构数据聚类联合学习
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183682
Jianfei Zhang, Zhiming Qiao
Federated Learning (FL) is an emerging privacy-preserving technology that enables training a global model beneficial to all participants without sharing their data. However, differences in data distributions among participants may undermine the stability and accuracy of the global model. To address this challenge, recent research proposes client clustering based on data distribution similarity, generating independent models for each cluster in order to enhance FL performance. Nevertheless, due to the uncertainty of participant identities, FL struggles to rapidly and accurately determine the clusters. Most of the existing algorithms distinguish clients by iterative clustering, which not only increases the computing cost of the server but also affects the convergence speed of the federation model. To address these shortcomings, in this paper, we propose a novel clustering-based FL method, SoFL. SoFL introduces SOM networks, improves the quality of cluster data, and eliminates redundant categories through secondary clustering, encouraging more similar clients to train together. Through this mechanism, SoFL completes the clustering task in one round of communication and speeds up the convergence of federated model training. Simulation results demonstrate that SoFL accurately and swiftly adapts to determine the clusters. In different non-IID settings, SoFL’s model accuracy improvements ranged from 9 to 18% compared to FedAvg and FedProx.
联合学习(FL)是一种新兴的隐私保护技术,它能在不共享参与者数据的情况下训练出对所有参与者都有利的全局模型。然而,参与者之间数据分布的差异可能会破坏全局模型的稳定性和准确性。为了应对这一挑战,最近的研究提出了基于数据分布相似性的客户端聚类,为每个聚类生成独立的模型,以提高 FL 性能。然而,由于参与者身份的不确定性,FL 难以快速准确地确定聚类。现有算法大多通过迭代聚类来区分客户端,这不仅增加了服务器的计算成本,也影响了联盟模型的收敛速度。针对这些不足,本文提出了一种新颖的基于聚类的 FL 方法 SoFL。SoFL 引入了 SOM 网络,提高了聚类数据的质量,并通过二次聚类消除了冗余类别,鼓励更多相似的客户端一起训练。通过这种机制,SoFL 在一轮通信中就完成了聚类任务,加快了联合模型训练的收敛速度。仿真结果表明,SoFL 能准确、迅速地确定聚类。在不同的非 IID 设置中,与 FedAvg 和 FedProx 相比,SoFL 的模型准确率提高了 9% 到 18%。
{"title":"SoFL: Clustered Federated Learning Based on Dual Clustering for Heterogeneous Data","authors":"Jianfei Zhang, Zhiming Qiao","doi":"10.3390/electronics13183682","DOIUrl":"https://doi.org/10.3390/electronics13183682","url":null,"abstract":"Federated Learning (FL) is an emerging privacy-preserving technology that enables training a global model beneficial to all participants without sharing their data. However, differences in data distributions among participants may undermine the stability and accuracy of the global model. To address this challenge, recent research proposes client clustering based on data distribution similarity, generating independent models for each cluster in order to enhance FL performance. Nevertheless, due to the uncertainty of participant identities, FL struggles to rapidly and accurately determine the clusters. Most of the existing algorithms distinguish clients by iterative clustering, which not only increases the computing cost of the server but also affects the convergence speed of the federation model. To address these shortcomings, in this paper, we propose a novel clustering-based FL method, SoFL. SoFL introduces SOM networks, improves the quality of cluster data, and eliminates redundant categories through secondary clustering, encouraging more similar clients to train together. Through this mechanism, SoFL completes the clustering task in one round of communication and speeds up the convergence of federated model training. Simulation results demonstrate that SoFL accurately and swiftly adapts to determine the clusters. In different non-IID settings, SoFL’s model accuracy improvements ranged from 9 to 18% compared to FedAvg and FedProx.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"6 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Combinatorial Strategy for API Completion: Deep Learning and Heuristics 完成 API 的组合策略:深度学习与启发式方法
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-15 DOI: 10.3390/electronics13183669
Yi Liu, Yiming Yin, Jia Deng, Weimin Li, Zhichao Peng
Remembering software library components and mastering their application programming interfaces (APIs) is a daunting task for programmers, due to the sheer volume of available libraries. API completion tools, which predict subsequent APIs based on code context, are essential for improving development efficiency. Existing API completion techniques, however, face specific weaknesses that limit their performance. Pattern-based code completion methods that rely on statistical information excel in extracting common usage patterns of API sequences. However, they often struggle to capture the semantics of the surrounding code. In contrast, deep-learning-based approaches excel in understanding the semantics of the code but may miss certain common usages that can be easily identified by pattern-based methods. Our insight into overcoming these challenges is based on the complementarity between these two types of approaches. This paper proposes a combinatorial method of API completion that aims to exploit the strengths of both pattern-based and deep-learning-based approaches. The basic idea is to utilize a confidence-based selector to determine which type of approach should be utilized to generate predictions. Pattern-based approaches will only be applied if the frequency of a particular pattern exceeds a pre-defined threshold, while in other cases, deep learning models will be utilized to generate the API completion results. The results showed that our approach dramatically improved the accuracy and mean reciprocal rank (MRR) in large-scale experiments, highlighting its utility.
由于可用库数量庞大,记住软件库组件并掌握其应用编程接口(API)对程序员来说是一项艰巨的任务。根据代码上下文预测后续 API 的 API 补全工具对于提高开发效率至关重要。然而,现有的应用程序接口补全技术面临着限制其性能的特定弱点。基于模式的代码完成方法依赖于统计信息,在提取 API 序列的常见使用模式方面表现出色。但是,它们往往难以捕捉到周围代码的语义。相比之下,基于深度学习的方法在理解代码语义方面表现出色,但可能会遗漏某些基于模式的方法可以轻松识别的常见用法。我们对克服这些挑战的见解基于这两类方法之间的互补性。本文提出了一种完成 API 的组合方法,旨在利用基于模式的方法和基于深度学习的方法的优势。其基本思想是利用基于置信度的选择器来确定应采用哪种方法来生成预测。只有当特定模式的频率超过预先设定的阈值时,才会应用基于模式的方法,而在其他情况下,将利用深度学习模型生成 API 完成结果。结果表明,在大规模实验中,我们的方法显著提高了准确率和平均倒数等级(MRR),凸显了其实用性。
{"title":"A Combinatorial Strategy for API Completion: Deep Learning and Heuristics","authors":"Yi Liu, Yiming Yin, Jia Deng, Weimin Li, Zhichao Peng","doi":"10.3390/electronics13183669","DOIUrl":"https://doi.org/10.3390/electronics13183669","url":null,"abstract":"Remembering software library components and mastering their application programming interfaces (APIs) is a daunting task for programmers, due to the sheer volume of available libraries. API completion tools, which predict subsequent APIs based on code context, are essential for improving development efficiency. Existing API completion techniques, however, face specific weaknesses that limit their performance. Pattern-based code completion methods that rely on statistical information excel in extracting common usage patterns of API sequences. However, they often struggle to capture the semantics of the surrounding code. In contrast, deep-learning-based approaches excel in understanding the semantics of the code but may miss certain common usages that can be easily identified by pattern-based methods. Our insight into overcoming these challenges is based on the complementarity between these two types of approaches. This paper proposes a combinatorial method of API completion that aims to exploit the strengths of both pattern-based and deep-learning-based approaches. The basic idea is to utilize a confidence-based selector to determine which type of approach should be utilized to generate predictions. Pattern-based approaches will only be applied if the frequency of a particular pattern exceeds a pre-defined threshold, while in other cases, deep learning models will be utilized to generate the API completion results. The results showed that our approach dramatically improved the accuracy and mean reciprocal rank (MRR) in large-scale experiments, highlighting its utility.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"31 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technology Keyword Analysis Using Graphical Causal Models 利用图形因果模型进行技术关键词分析
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-15 DOI: 10.3390/electronics13183670
Sunghae Jun
Technology keyword analysis (TKA) requires a different approach compared to general keyword analysis. While general keyword analysis identifies relationships between keywords, technology keyword analysis must find cause–effect relationships between technology keywords. Because the development of new technologies depends on previously researched and developed technologies, we need to build a causal inference model, in which the previously developed technology is the cause and the newly developed technology is the effect. In this paper, we propose a technology keyword analysis method using casual inference modeling. To understand the causal relationships between technology keywords, we constructed a graphical causal model combining a graph structure with causal inference. To show how the proposed model can be applied to the practical domains, we collected the patent documents related to the digital therapeutics technology from the world patent databases and analyzed them by the graphical causal model. We expect that our research contributes to various aspects of technology management, such as research and development planning.
与一般关键字分析相比,技术关键字分析 (TKA) 需要一种不同的方法。一般关键词分析确定的是关键词之间的关系,而技术关键词分析必须找到技术关键词之间的因果关系。由于新技术的开发依赖于之前研究和开发的技术,我们需要建立一个因果推理模型,在这个模型中,之前开发的技术是因,新开发的技术是果。本文提出了一种利用随意推理建模的技术关键词分析方法。为了理解技术关键词之间的因果关系,我们构建了一个图式因果模型,将图式结构与因果推理相结合。为了说明所提出的模型如何应用于实际领域,我们从世界专利数据库中收集了与数字治疗技术相关的专利文献,并利用图形因果模型对其进行了分析。我们希望我们的研究能为技术管理的各个方面做出贡献,比如研发规划。
{"title":"Technology Keyword Analysis Using Graphical Causal Models","authors":"Sunghae Jun","doi":"10.3390/electronics13183670","DOIUrl":"https://doi.org/10.3390/electronics13183670","url":null,"abstract":"Technology keyword analysis (TKA) requires a different approach compared to general keyword analysis. While general keyword analysis identifies relationships between keywords, technology keyword analysis must find cause–effect relationships between technology keywords. Because the development of new technologies depends on previously researched and developed technologies, we need to build a causal inference model, in which the previously developed technology is the cause and the newly developed technology is the effect. In this paper, we propose a technology keyword analysis method using casual inference modeling. To understand the causal relationships between technology keywords, we constructed a graphical causal model combining a graph structure with causal inference. To show how the proposed model can be applied to the practical domains, we collected the patent documents related to the digital therapeutics technology from the world patent databases and analyzed them by the graphical causal model. We expect that our research contributes to various aspects of technology management, such as research and development planning.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"3 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Electronics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1