Taking into account the constraints introduced by the advanced nodes in use nowadays, this paper describes a new methodology for dummy filling. Using a reliable grid-based engine, this new technique allows the complete customization of the dummy filling process according to design constraints, and even goes one step further, as it is not limited to filling geometries but can be used for many other steps of the whole flow, such as Critical Dimension metrology, Curvilinear drawing of dummy geometries or Guard Ring generation. We will also show, as an added benefit, that giving analog designers full control over dummy filling allows to reduce its impact on the layout performances. This paper first discusses the many benefits of a grid-based strategy for dummy filling, and the dummy map that can be generated as a foundation of further customization. It then introduces the special python environment that allows such customization, with an easy-to-use interface for efficient manipulation. Since the full flow has been implemented, based on existing tools and the python programming language, it demonstrates that the methodology is already operational and well suited for the most advanced technology nodes and large dies. As an example, several applications are considered, based on real use-cases, and sample customization programs are proposed. Benchmarking shows that the run-time performance of the whole engine is extremely interesting, and allows it to be used even in the most demanding cases.
{"title":"Design Driven Dummy Filling","authors":"F. Brault, P. Morey-Chaisemartin","doi":"10.1145/3459104.3459175","DOIUrl":"https://doi.org/10.1145/3459104.3459175","url":null,"abstract":"Taking into account the constraints introduced by the advanced nodes in use nowadays, this paper describes a new methodology for dummy filling. Using a reliable grid-based engine, this new technique allows the complete customization of the dummy filling process according to design constraints, and even goes one step further, as it is not limited to filling geometries but can be used for many other steps of the whole flow, such as Critical Dimension metrology, Curvilinear drawing of dummy geometries or Guard Ring generation. We will also show, as an added benefit, that giving analog designers full control over dummy filling allows to reduce its impact on the layout performances. This paper first discusses the many benefits of a grid-based strategy for dummy filling, and the dummy map that can be generated as a foundation of further customization. It then introduces the special python environment that allows such customization, with an easy-to-use interface for efficient manipulation. Since the full flow has been implemented, based on existing tools and the python programming language, it demonstrates that the methodology is already operational and well suited for the most advanced technology nodes and large dies. As an example, several applications are considered, based on real use-cases, and sample customization programs are proposed. Benchmarking shows that the run-time performance of the whole engine is extremely interesting, and allows it to be used even in the most demanding cases.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"153 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115981797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Rajesh, B. MohammedIsmail., Mansoor Alam, M. Tahernezhadi, A. Monika
Network forensics is a focus on collecting, monitoring, reporting Network log analysis and investigation success or failure in a network. Major goal of security provided to the network is to protect sensitive customer information online, Lateral movement with RDP (Remote Desktop Protocol), Ransomware running on an endpoint, large Data exfiltration from multiple endpoints, malicious attacks etc, degrade Network Performance. but crime scenario starts to identify crimes and evidence network attack digital device or another component. Network access logs analysis main part in the investigation. Network forensic is an offset of digital forensics used for the monitoring and analysis of computer network traffic intended for collecting information, lawful proof against illegal activity, or intrusion detection on the network. Network examination manages unstable and persuasive data. The project is intended to deliver the device relying upon the point of view of Network investigation in Virtual Data Canters. Proposed methodology is based on ELK Stack (Elasticsearch, Logstash, and Kibana) to collecting, monitoring, reporting Network log analysis and Machine learning Techniques to automate the cron job process. It additionally helps in law requirement investigation. Data center is using virtual networks have problem for log analysis and real time log in time stamp based analysis using network forensics approaches. Network forensics investigation in virtual data-center is an art and science seeking to make sense out of computer- generated records. Network forensics investigation is a process to identify suspected logs in a network. Data center have huge amount of log file generated Esxi server, VCenter, VMware.
{"title":"Network Forensics Investigation in Virtual Data Centers Using ELK","authors":"P. Rajesh, B. MohammedIsmail., Mansoor Alam, M. Tahernezhadi, A. Monika","doi":"10.1145/3459104.3459135","DOIUrl":"https://doi.org/10.1145/3459104.3459135","url":null,"abstract":"Network forensics is a focus on collecting, monitoring, reporting Network log analysis and investigation success or failure in a network. Major goal of security provided to the network is to protect sensitive customer information online, Lateral movement with RDP (Remote Desktop Protocol), Ransomware running on an endpoint, large Data exfiltration from multiple endpoints, malicious attacks etc, degrade Network Performance. but crime scenario starts to identify crimes and evidence network attack digital device or another component. Network access logs analysis main part in the investigation. Network forensic is an offset of digital forensics used for the monitoring and analysis of computer network traffic intended for collecting information, lawful proof against illegal activity, or intrusion detection on the network. Network examination manages unstable and persuasive data. The project is intended to deliver the device relying upon the point of view of Network investigation in Virtual Data Canters. Proposed methodology is based on ELK Stack (Elasticsearch, Logstash, and Kibana) to collecting, monitoring, reporting Network log analysis and Machine learning Techniques to automate the cron job process. It additionally helps in law requirement investigation. Data center is using virtual networks have problem for log analysis and real time log in time stamp based analysis using network forensics approaches. Network forensics investigation in virtual data-center is an art and science seeking to make sense out of computer- generated records. Network forensics investigation is a process to identify suspected logs in a network. Data center have huge amount of log file generated Esxi server, VCenter, VMware.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117211275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enterprise Resource Planning (ERP) systems have become the most important part of enterprises’ information systems. Moreover, evolvability is widely considered to be an important concern for the design and development of software architectures. Normalized Systems (NS) theory has been proposed with the purpose of incorporate evolvability of Information systems (IS). The purpose of this research is to explore the potential for improvement in evolvability based on Normalized Systems theory. More specifically, the research question is formulated as “How can the evolvability of open-source ERP systems be improved based on Normalized Systems theory?”. To answer the research question, the design science research approach is chosen as the methodology for the research.
{"title":"The Development of Evolvable Open Source ERP Systems Based on Normalized Systems Theory","authors":"Ornchanok Chongsombut, J. Verelst","doi":"10.1145/3459104.3459205","DOIUrl":"https://doi.org/10.1145/3459104.3459205","url":null,"abstract":"Enterprise Resource Planning (ERP) systems have become the most important part of enterprises’ information systems. Moreover, evolvability is widely considered to be an important concern for the design and development of software architectures. Normalized Systems (NS) theory has been proposed with the purpose of incorporate evolvability of Information systems (IS). The purpose of this research is to explore the potential for improvement in evolvability based on Normalized Systems theory. More specifically, the research question is formulated as “How can the evolvability of open-source ERP systems be improved based on Normalized Systems theory?”. To answer the research question, the design science research approach is chosen as the methodology for the research.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115510953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Connected and autonomous vehicles are equipped with a large number of sensors, absorbing information from the vehicles and as well as from the environment. Handling and processing this vast amount of generated data is a big challenge. The first objective of this paper is to present a flexible framework for vehicle data processing, including driving behavior analysis. The framework is based on Apache Spark, a widely used big data engine. Secondly, the paper shows that the frameworks scales almost linearly with distributed big data analytics, and also performs well on a stand-alone multi-core machine.
{"title":"A Scalable Data Analytics Framework for Connected Vehicles Using Apache Spark","authors":"Shumail Mohyuddin, C. Prehofer","doi":"10.1145/3459104.3459156","DOIUrl":"https://doi.org/10.1145/3459104.3459156","url":null,"abstract":"Connected and autonomous vehicles are equipped with a large number of sensors, absorbing information from the vehicles and as well as from the environment. Handling and processing this vast amount of generated data is a big challenge. The first objective of this paper is to present a flexible framework for vehicle data processing, including driving behavior analysis. The framework is based on Apache Spark, a widely used big data engine. Secondly, the paper shows that the frameworks scales almost linearly with distributed big data analytics, and also performs well on a stand-alone multi-core machine.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126000477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Babaev, N. Krinitsyn, N. Laptev, E. Stolov, Denis Harchenko
Robotic grinding and polishing of materials has its own specifics related to the requirements for constant pressing force maintaining, a movement trajectory and duration of processing. Constant contact force is needed to form a surface with desired roughness. Positioning with an industrial manipulator ensures precision accuracy of products achievement with lower processing time. Obtaining of the required characteristics is impossible without a high-quality calibration of pieces. The paper describes a precise pieces positioning method for grinding and polishing operations.
{"title":"Spatial Positioning Accuracy Improving Robotic Grinding of Steel Pieces","authors":"A. Babaev, N. Krinitsyn, N. Laptev, E. Stolov, Denis Harchenko","doi":"10.1145/3459104.3459105","DOIUrl":"https://doi.org/10.1145/3459104.3459105","url":null,"abstract":"Robotic grinding and polishing of materials has its own specifics related to the requirements for constant pressing force maintaining, a movement trajectory and duration of processing. Constant contact force is needed to form a surface with desired roughness. Positioning with an industrial manipulator ensures precision accuracy of products achievement with lower processing time. Obtaining of the required characteristics is impossible without a high-quality calibration of pieces. The paper describes a precise pieces positioning method for grinding and polishing operations.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126009691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiang Li, Xiaoshan Zhao, Ya Lu, Tao Xu, Pengyu Hou, Xiaomeng Cui
Generalized projective synchronization and generalized dislocation projective synchronization are proposed for the synchronization of fractional-order chaotic systems with different orders. The synchronization problem of fractional-order systems with different orders is transformed into the synchronization problem of equal order systems. The synchronization of fractional-order financial chaotic systems with different orders is realized by using this method, and its feasibility is verified by theoretical calculation and numerical simulation.
{"title":"Generalized Projection Synchronization and Generalized Dislocation Synchronization of Fractional-order Financial Chaotic Systems with Different Orders","authors":"Xiang Li, Xiaoshan Zhao, Ya Lu, Tao Xu, Pengyu Hou, Xiaomeng Cui","doi":"10.1145/3459104.3459206","DOIUrl":"https://doi.org/10.1145/3459104.3459206","url":null,"abstract":"Generalized projective synchronization and generalized dislocation projective synchronization are proposed for the synchronization of fractional-order chaotic systems with different orders. The synchronization problem of fractional-order systems with different orders is transformed into the synchronization problem of equal order systems. The synchronization of fractional-order financial chaotic systems with different orders is realized by using this method, and its feasibility is verified by theoretical calculation and numerical simulation.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122761236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
400Hz inverters are usually connected to work in parallel to provide larger power. Considering the suppression of circulating current, LCL filter is a desirable selection and widely applied in parallel inverter systems. Whereas, when connecting with nonlinear loads, the harmonic currents through the load-side inductor will lead to a severe distortion on the output voltage of the inverter. After a detailed analysis of the inverter impedance, it reveals that although the output voltage feedback control can reduce harmonics, the suppression of circulating current also weakens. To improve the output voltage quality, an impedance reshaping method realized by multiple proportional and resonant(MPR) control and load current feed-forward is proposed, with which the inverter impedance appears very small at low-order harmonic frequencies and much larger at high-order harmonic frequencies. Applying the method, the suppression of both harmonic voltages and circulating current can be obtained. Finally, a prototype is built and tested, and the experimental results validated the effectiveness of the proposed control method.
{"title":"Voltage Quality Improvement Method for 400Hz LCL-type Inverter","authors":"Haichun Liu, Tao Fei, Pengzhao Wen, Shaojun Xie","doi":"10.1145/3459104.3459159","DOIUrl":"https://doi.org/10.1145/3459104.3459159","url":null,"abstract":"400Hz inverters are usually connected to work in parallel to provide larger power. Considering the suppression of circulating current, LCL filter is a desirable selection and widely applied in parallel inverter systems. Whereas, when connecting with nonlinear loads, the harmonic currents through the load-side inductor will lead to a severe distortion on the output voltage of the inverter. After a detailed analysis of the inverter impedance, it reveals that although the output voltage feedback control can reduce harmonics, the suppression of circulating current also weakens. To improve the output voltage quality, an impedance reshaping method realized by multiple proportional and resonant(MPR) control and load current feed-forward is proposed, with which the inverter impedance appears very small at low-order harmonic frequencies and much larger at high-order harmonic frequencies. Applying the method, the suppression of both harmonic voltages and circulating current can be obtained. Finally, a prototype is built and tested, and the experimental results validated the effectiveness of the proposed control method.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122055267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Subrt, M. Bodlák, V. Jarý, A. Kveton, J. Nový, M. Virius, M. Zemko
Recently, a successful data taking in high energy physics experiments heavily relies on a stability of Data Acquisition System (DAQ). The paper deals with the Load Balancing (LB) problem of the intelligent, FPGA-based Data Acquisition System (iFDAQ) of the COMPASS experiment at CERN and presents two approaches –Dynamic Programming (DP) and Greedy Heuristic (GH) – applied in finding LB optimal solution. DP represents a pure mathematical approach in terms of a mathematical optimization and GH is a representative belonging to a class of heuristics. Therefore, the mutual comparison is worth investigating. In order to demonstrate the performance of the proposed DP and GH approaches, three LB test cases are examined and the numerical results are compared with other LB solution methods.
{"title":"Dynamic Programming and Greedy Heuristic in the Load Balancing Problem for the iFDAQ of the COMPASS Experiment at CERN","authors":"O. Subrt, M. Bodlák, V. Jarý, A. Kveton, J. Nový, M. Virius, M. Zemko","doi":"10.1145/3459104.3459151","DOIUrl":"https://doi.org/10.1145/3459104.3459151","url":null,"abstract":"Recently, a successful data taking in high energy physics experiments heavily relies on a stability of Data Acquisition System (DAQ). The paper deals with the Load Balancing (LB) problem of the intelligent, FPGA-based Data Acquisition System (iFDAQ) of the COMPASS experiment at CERN and presents two approaches –Dynamic Programming (DP) and Greedy Heuristic (GH) – applied in finding LB optimal solution. DP represents a pure mathematical approach in terms of a mathematical optimization and GH is a representative belonging to a class of heuristics. Therefore, the mutual comparison is worth investigating. In order to demonstrate the performance of the proposed DP and GH approaches, three LB test cases are examined and the numerical results are compared with other LB solution methods.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126439803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When forming a work team, the choice of its members is a key step. We believe that a recommender system could help to select the members of a team by taking into account individual competences criteria, as well as the relationships between people. One important aspect of this relationship is the trust that members have with each other. However, this concept of trust remains difficult to be used because it is subject to many definitions and is complex to grasp. We try in this research to shed some light on the notion of trust. In particular, we study if there is a correspondence between a previously declared trust (off-line) and an actual trust put into practice during an experiment. To use the trust to recommend profiles of competences that stem from a wider and more reliable social network, we also investigate if the use of transitivity and reciprocity for trust makes sense.
{"title":"Trust-aware Recommendations","authors":"C. Courtin, M. Tomasena","doi":"10.1145/3459104.3459207","DOIUrl":"https://doi.org/10.1145/3459104.3459207","url":null,"abstract":"When forming a work team, the choice of its members is a key step. We believe that a recommender system could help to select the members of a team by taking into account individual competences criteria, as well as the relationships between people. One important aspect of this relationship is the trust that members have with each other. However, this concept of trust remains difficult to be used because it is subject to many definitions and is complex to grasp. We try in this research to shed some light on the notion of trust. In particular, we study if there is a correspondence between a previously declared trust (off-line) and an actual trust put into practice during an experiment. To use the trust to recommend profiles of competences that stem from a wider and more reliable social network, we also investigate if the use of transitivity and reciprocity for trust makes sense.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128309247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper addresses a servomechanism design for achieving robust output voltage regulation of single-phase uninterruptible power supply (UPS) inverters. We present an internal model principle approach for the problem by dynamic error-voltage feedback. We also perform both simulation and experiment to verify the efficacy of the proposed results.
{"title":"Servomechanism Design for Robust Voltage Regulation of Single-Phase UPS Inverters","authors":"Pingping Huang, Yunjian Peng, Tong Lin, Jia Yao, Yi Cheng, Dabo Xu","doi":"10.1145/3459104.3459161","DOIUrl":"https://doi.org/10.1145/3459104.3459161","url":null,"abstract":"This paper addresses a servomechanism design for achieving robust output voltage regulation of single-phase uninterruptible power supply (UPS) inverters. We present an internal model principle approach for the problem by dynamic error-voltage feedback. We also perform both simulation and experiment to verify the efficacy of the proposed results.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134397554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}