首页 > 最新文献

2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)最新文献

英文 中文
FPGA Implementation of High Speed 64-Bit Data Width True Random Number Generator using Clock Managers With Metastability 基于亚稳态时钟管理器的高速64位数据宽度真随机数发生器的FPGA实现
C. Marimuthu, B. Priyanka
Currently, cybersecurity plays a crucial role in various fields to ensure secure data communication. True Random Number Generators (TRNGs) are crucial components for many critical security applications. While analog-based entropy sources are often used in digital-based solutions, there is a high demand for digital-based solutions, especially for Field Programmable Gate Array (FPGA)-based digital systems. A unique technique has been developed to simplify the design of TRNGs on FPGA devices. This technique utilizes the runtime capabilities of the hardware primitives provided by the Digital Clock Manager (DCM) to adjust the phase shift between two clock signals. An auto-tuning approach automatically adjusts the phase difference between the clock signals to force one or more flip-flops (FFs) to enter the metastability zone, which is used as a source of unpredictability in the system. Additionally, the fast carry-chain hardware primitive is uniquely used to further enhance the randomness of the generated bits. Lastly, a powerful on-chip post-processing strategy is employed to prevent any interference with the TRNG output. This work was implemented in verilog HDL, with 32 and 64 data width, and synthesized in Xilinx Zynq FPGA. The characteristics of the TRNG design were evaluated based on area, delay, and power consumption.
目前,网络安全在各个领域发挥着至关重要的作用,以确保数据通信的安全。真随机数生成器(trng)是许多关键安全应用程序的关键组件。虽然基于模拟的熵源通常用于基于数字的解决方案,但对基于数字的解决方案的需求很高,特别是基于现场可编程门阵列(FPGA)的数字系统。本文提出了一种独特的技术来简化FPGA器件上trng的设计。该技术利用数字时钟管理器(DCM)提供的硬件原语的运行时功能来调整两个时钟信号之间的相移。自动调谐方法自动调整时钟信号之间的相位差,以迫使一个或多个触发器(ff)进入亚稳区,这是系统中不可预测性的来源。此外,快速携带链硬件基元被独特地用于进一步增强生成比特的随机性。最后,采用强大的片上后处理策略来防止对TRNG输出的任何干扰。该工作在verilog HDL语言中实现,数据宽度为32和64,在Xilinx Zynq FPGA中合成。基于面积、延迟和功耗对TRNG设计的特性进行了评估。
{"title":"FPGA Implementation of High Speed 64-Bit Data Width True Random Number Generator using Clock Managers With Metastability","authors":"C. Marimuthu, B. Priyanka","doi":"10.1109/ICECCT56650.2023.10179671","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179671","url":null,"abstract":"Currently, cybersecurity plays a crucial role in various fields to ensure secure data communication. True Random Number Generators (TRNGs) are crucial components for many critical security applications. While analog-based entropy sources are often used in digital-based solutions, there is a high demand for digital-based solutions, especially for Field Programmable Gate Array (FPGA)-based digital systems. A unique technique has been developed to simplify the design of TRNGs on FPGA devices. This technique utilizes the runtime capabilities of the hardware primitives provided by the Digital Clock Manager (DCM) to adjust the phase shift between two clock signals. An auto-tuning approach automatically adjusts the phase difference between the clock signals to force one or more flip-flops (FFs) to enter the metastability zone, which is used as a source of unpredictability in the system. Additionally, the fast carry-chain hardware primitive is uniquely used to further enhance the randomness of the generated bits. Lastly, a powerful on-chip post-processing strategy is employed to prevent any interference with the TRNG output. This work was implemented in verilog HDL, with 32 and 64 data width, and synthesized in Xilinx Zynq FPGA. The characteristics of the TRNG design were evaluated based on area, delay, and power consumption.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LRDADF: An AI Enabled Framework for Detecting Low-Rate DDoS Attacks in Cloud Computing Environments LRDADF:基于AI的云计算环境下低速率DDoS攻击检测框架
V. Venkateshwarlu, Durgunala Ranjith, Amireddy Raju
In cloud computing environment DDoS attacks are continually evolving with intelligent strategies. Low-rate DDoS attack is one such strategy that make it difficult to detect attack. At the same time, cloud infrastructure is also evolving rapidly. Container based technology enables cloud computing to have lightweight approaches in resource utilization and flexibility in scaling services. The existing DDoS attack detection methods used in cloud computing are not adequate when adversaries employ the modality known low-rate DDoS attack. There is need for an approach that not only detects the attack but also defeat the attack as much as possible. Towards this end, in this paper, we proposed a framework named Low-Rate DDoS Attack Detection Framework (LRDADF). Since low-rate DDoS attacks are difficult to be defeated, we proposed a mathematical model to realize mitigation strategy besides employing deep learning methods to have effective means of detecting such attacks. We proposed an algorithm named Hybrid Approach for Low-Rate DDoS Detection (HA-LRDD). The algorithm uses an Artificial Intelligence (AI) enabled methods comprising of deep Convolutional Neural Network (CNN) and deep autoencoder. Another algorithm known as Dynamic Low-Rate DDoS Mitigation (DLDM) is used to minimize the effect of the attack after detection or even defeat the attack by ensuring the smooth functioning of cloud infrastructure which is under attack. Extensive simulation study revealed that the proposed framework is able to detect low-rate DDoS attacks and also mitigate the attacks to ensure there is acceptable quality of service in cloud computing environments.
在云计算环境下,DDoS攻击随着策略的智能化不断发展。低速率DDoS攻击就是这样一种使攻击难以检测的策略。与此同时,云基础设施也在快速发展。基于容器的技术使云计算在资源利用和扩展服务方面具有轻量级方法和灵活性。当攻击者采用已知的低速率DDoS攻击方式时,云计算中使用的现有DDoS攻击检测方法是不够的。我们需要一种既能检测到攻击,又能尽可能打败攻击的方法。为此,本文提出了一个低速率DDoS攻击检测框架(LRDADF)。由于低速率DDoS攻击难以被击败,我们提出了一个数学模型来实现缓解策略,并采用深度学习方法来有效检测此类攻击。我们提出了一种低速率DDoS检测的混合方法(HA-LRDD)。该算法采用了由深度卷积神经网络(CNN)和深度自编码器组成的人工智能(AI)方法。另一种称为动态低速率DDoS缓解(DLDM)的算法用于在检测到攻击后最大限度地减少攻击的影响,甚至通过确保受到攻击的云基础设施的顺利运行来击败攻击。广泛的模拟研究表明,所提出的框架能够检测低速率DDoS攻击,并减轻攻击,以确保云计算环境中存在可接受的服务质量。
{"title":"LRDADF: An AI Enabled Framework for Detecting Low-Rate DDoS Attacks in Cloud Computing Environments","authors":"V. Venkateshwarlu, Durgunala Ranjith, Amireddy Raju","doi":"10.1109/ICECCT56650.2023.10179834","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179834","url":null,"abstract":"In cloud computing environment DDoS attacks are continually evolving with intelligent strategies. Low-rate DDoS attack is one such strategy that make it difficult to detect attack. At the same time, cloud infrastructure is also evolving rapidly. Container based technology enables cloud computing to have lightweight approaches in resource utilization and flexibility in scaling services. The existing DDoS attack detection methods used in cloud computing are not adequate when adversaries employ the modality known low-rate DDoS attack. There is need for an approach that not only detects the attack but also defeat the attack as much as possible. Towards this end, in this paper, we proposed a framework named Low-Rate DDoS Attack Detection Framework (LRDADF). Since low-rate DDoS attacks are difficult to be defeated, we proposed a mathematical model to realize mitigation strategy besides employing deep learning methods to have effective means of detecting such attacks. We proposed an algorithm named Hybrid Approach for Low-Rate DDoS Detection (HA-LRDD). The algorithm uses an Artificial Intelligence (AI) enabled methods comprising of deep Convolutional Neural Network (CNN) and deep autoencoder. Another algorithm known as Dynamic Low-Rate DDoS Mitigation (DLDM) is used to minimize the effect of the attack after detection or even defeat the attack by ensuring the smooth functioning of cloud infrastructure which is under attack. Extensive simulation study revealed that the proposed framework is able to detect low-rate DDoS attacks and also mitigate the attacks to ensure there is acceptable quality of service in cloud computing environments.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124230828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-band Patch Antenna for Next Generation Indoor Access Point Receiver 新一代室内接入点接收机的双频贴片天线
Thirunavukkuarasu G, Nithin R, N. S, Rajalingam J
The access points used for indoor applications with WLAN and WiFi uses 2.45 GHz band nowadays. In the next generation wireless communication, it is proposed to use sub-6 GHz band also for indoor radio coverage. It requires upgraded hardware and coverage. This project work proposes a design of dual band microstrip patch antenna to use this band and also the existing band for radio communication at indoors. The objective of this project is to design a dual band antenna for indoor access point (AP) receiver. The proposed antenna design works in the frequency range of 1–3 GHz and 5–7 GHz with one narrow band frequency and another a wide band frequency. The antenna is designed and the simulation results shows that it is resonating at 2.6 GHz, 3.24 GHz, 5.42 GHz and 6.7 GHz.
目前用于室内应用的无线局域网和WiFi接入点使用2.45 GHz频段。在下一代无线通信中,建议使用6ghz以下频段也用于室内无线电覆盖。它需要升级硬件和覆盖范围。本课题提出了一种双频微带贴片天线的设计,利用该频段和现有的频段进行室内无线电通信。本课题的目标是设计一种用于室内接入点(AP)接收器的双频天线。所提出的天线设计工作在1-3 GHz和5-7 GHz的频率范围内,其中一个是窄带频率,另一个是宽带频率。对天线进行了设计,仿真结果表明,天线在2.6 GHz、3.24 GHz、5.42 GHz和6.7 GHz频段均有谐振。
{"title":"Dual-band Patch Antenna for Next Generation Indoor Access Point Receiver","authors":"Thirunavukkuarasu G, Nithin R, N. S, Rajalingam J","doi":"10.1109/ICECCT56650.2023.10179703","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179703","url":null,"abstract":"The access points used for indoor applications with WLAN and WiFi uses 2.45 GHz band nowadays. In the next generation wireless communication, it is proposed to use sub-6 GHz band also for indoor radio coverage. It requires upgraded hardware and coverage. This project work proposes a design of dual band microstrip patch antenna to use this band and also the existing band for radio communication at indoors. The objective of this project is to design a dual band antenna for indoor access point (AP) receiver. The proposed antenna design works in the frequency range of 1–3 GHz and 5–7 GHz with one narrow band frequency and another a wide band frequency. The antenna is designed and the simulation results shows that it is resonating at 2.6 GHz, 3.24 GHz, 5.42 GHz and 6.7 GHz.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New versions Elliptic Curve Group Ring Public Key Cryptosystems 新版本椭圆曲线群环公钥密码系统
Qasim Mohsin Luhaib, R. K. Ajeena
In this work, a group ring (GR), which is defined on an elliptic curve over a prime field, is used to create new versions of public key cryptosystems. First version is elliptic curve group ring ElGamal public key (ECGR-EPKC). On the ECGR- EPKC, a public key, ciphertext and decrypting a plaintext are computing in according to the scalar multiplication that defined on the ECGR over a prime field. Two cases have been considered on the proposed ECGR-EPKC. First case, with an order of ring is less than or equal to the elliptic curve group (ECG). Whereas, on second case, an order of a ring is greater than the order of ECG. Also, the hybrid algorithm of RSA and EPKC based on the ECGR is proposed. The security of the proposed versions, ECGR-EPKE and RSA-EPKC based on ECGR are determined. The proposed RSA-EPKC based on ECGR considers as a more secure for communication schemes in compare with the proposed ECGR-EPKC in two cases and with original algorithms of EPKC and RSA alone.
本文利用定义在素数域上的椭圆曲线上的群环(GR)来创建新版本的公钥密码系统。第一个版本是椭圆曲线群环ElGamal公钥(ECGR-EPKC)。在ECGR- EPKC上,公钥、密文和明文的解密都是根据ECGR上定义的素域上的标量乘法进行计算的。拟议的ECGR-EPKC审议了两个案例。第一种情况,用一个环的阶数小于或等于椭圆曲线群(ECG)。而在第二种情况下,环的阶数大于ECG的阶数。提出了基于ECGR的RSA和EPKC混合算法。确定了基于ECGR的ECGR- epke和RSA-EPKC版本的安全性。本文提出的基于ECGR的RSA-EPKC在两种情况下都比ECGR-EPKC更安全,并且与原有的EPKC和RSA算法单独比较。
{"title":"New versions Elliptic Curve Group Ring Public Key Cryptosystems","authors":"Qasim Mohsin Luhaib, R. K. Ajeena","doi":"10.1109/ICECCT56650.2023.10179798","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179798","url":null,"abstract":"In this work, a group ring (GR), which is defined on an elliptic curve over a prime field, is used to create new versions of public key cryptosystems. First version is elliptic curve group ring ElGamal public key (ECGR-EPKC). On the ECGR- EPKC, a public key, ciphertext and decrypting a plaintext are computing in according to the scalar multiplication that defined on the ECGR over a prime field. Two cases have been considered on the proposed ECGR-EPKC. First case, with an order of ring is less than or equal to the elliptic curve group (ECG). Whereas, on second case, an order of a ring is greater than the order of ECG. Also, the hybrid algorithm of RSA and EPKC based on the ECGR is proposed. The security of the proposed versions, ECGR-EPKE and RSA-EPKC based on ECGR are determined. The proposed RSA-EPKC based on ECGR considers as a more secure for communication schemes in compare with the proposed ECGR-EPKC in two cases and with original algorithms of EPKC and RSA alone.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114905387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of GeoSpatial Artificial Intelligence technologies for city planning and development 城市规划与发展的地理空间人工智能技术综述
Hafsa Ouchra, A. Belangour, Allae Erraissi
Geo-spatial artificial intelligence (GeoAI) is an interdisciplinary field that combines techniques and methods from engineering, computer science, statistics, and space science to analyze and model spatial and temporal phenomena using artificial intelligence (AI) methods. This subject has a large influence on society and the economy since it focuses on real-world challenges. Artificial intelligence is fast developing in the automatic recognition of characteristics in geospatial data such as satellite photos, aerial photographs, etc. The computer community is very interested in satellite imagery because it wants to help machines understand their surroundings by analyzing satellite data. This type of treatment has the potential to test large areas at low cost. Remote sensing and geographic data enable collection, analysis, and processing of global observation data for civilian and military applications. This document provides an overview of GeoAI methods in urban planning, including the definition of GeoSpatial Artificial Intelligence and the distinctions between GeoAI and traditional AI. Different types of geospatial data satellites are also depicted. Integrating Geographic Information System (GIS) with Artificial Intelligence and using GeoAI tools and techniques are critical steps in successful geographic data analysis.
地理空间人工智能(GeoAI)是一个跨学科领域,它结合了工程学、计算机科学、统计学和空间科学的技术和方法,利用人工智能(AI)方法分析和建模时空现象。这门学科对社会和经济有很大的影响,因为它关注的是现实世界的挑战。人工智能在卫星照片、航空照片等地理空间数据特征自动识别方面发展迅速。计算机界对卫星图像非常感兴趣,因为它希望通过分析卫星数据来帮助机器了解周围环境。这种类型的处理有潜力以低成本测试大面积。遥感和地理数据能够为民用和军事应用收集、分析和处理全球观测数据。本文概述了GeoAI在城市规划中的应用,包括GeoSpatial人工智能的定义以及GeoAI与传统人工智能的区别。还介绍了不同类型的地理空间数据卫星。将地理信息系统(GIS)与人工智能相结合并使用GeoAI工具和技术是成功进行地理数据分析的关键步骤。
{"title":"An overview of GeoSpatial Artificial Intelligence technologies for city planning and development","authors":"Hafsa Ouchra, A. Belangour, Allae Erraissi","doi":"10.1109/ICECCT56650.2023.10179796","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179796","url":null,"abstract":"Geo-spatial artificial intelligence (GeoAI) is an interdisciplinary field that combines techniques and methods from engineering, computer science, statistics, and space science to analyze and model spatial and temporal phenomena using artificial intelligence (AI) methods. This subject has a large influence on society and the economy since it focuses on real-world challenges. Artificial intelligence is fast developing in the automatic recognition of characteristics in geospatial data such as satellite photos, aerial photographs, etc. The computer community is very interested in satellite imagery because it wants to help machines understand their surroundings by analyzing satellite data. This type of treatment has the potential to test large areas at low cost. Remote sensing and geographic data enable collection, analysis, and processing of global observation data for civilian and military applications. This document provides an overview of GeoAI methods in urban planning, including the definition of GeoSpatial Artificial Intelligence and the distinctions between GeoAI and traditional AI. Different types of geospatial data satellites are also depicted. Integrating Geographic Information System (GIS) with Artificial Intelligence and using GeoAI tools and techniques are critical steps in successful geographic data analysis.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123596601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Performance Analysis of CBIR using Wavelet and Contourlet Transform 基于小波变换和Contourlet变换的CBIR性能对比分析
Parmeshwar Birajadar, Abhijit Shete
In the literature various algorithms for content based image retrieval (CBIR) were proposed on different variety of databases such as texture, face, and medical images. It is observed that the CBIR performance strongly depends on effective extraction of image features such as color, texture, and shape. In the proposed research work, contourlet transform based CBIR system is proposed for texture images. Similar to wavelets, texture images can be characterized via marginal distributions of subband coefficients of recently introduced contourlets. In addition, contourlets have two new properties namely directionality and anisotropy which makes them powerful in efficient representation of natural texture images. Hence, in the proposed research work, we have analyzed and compared the performance of both wavelet and contourlet schemes for content based texture image retrieval. It is observed that contourlet based method outperforms the wavelet method for highly texture images in terms of retrieval efficiency.
在文献中,基于内容的图像检索(CBIR)算法被提出用于不同类型的数据库,如纹理、人脸和医学图像。观察到,CBIR的性能在很大程度上取决于图像特征(如颜色、纹理和形状)的有效提取。在本文的研究工作中,提出了基于contourlet变换的纹理图像CBIR系统。与小波相似,纹理图像可以通过最近引入的轮廓波的子带系数的边缘分布来表征。此外,轮廓波还具有方向性和各向异性两个特性,这使得轮廓波能够有效地表示自然纹理图像。因此,在提出的研究工作中,我们分析和比较了小波和contourlet两种方案在基于内容的纹理图像检索中的性能。结果表明,基于contourlet的方法在高纹理图像的检索效率上优于小波方法。
{"title":"A Comparative Performance Analysis of CBIR using Wavelet and Contourlet Transform","authors":"Parmeshwar Birajadar, Abhijit Shete","doi":"10.1109/ICECCT56650.2023.10179614","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179614","url":null,"abstract":"In the literature various algorithms for content based image retrieval (CBIR) were proposed on different variety of databases such as texture, face, and medical images. It is observed that the CBIR performance strongly depends on effective extraction of image features such as color, texture, and shape. In the proposed research work, contourlet transform based CBIR system is proposed for texture images. Similar to wavelets, texture images can be characterized via marginal distributions of subband coefficients of recently introduced contourlets. In addition, contourlets have two new properties namely directionality and anisotropy which makes them powerful in efficient representation of natural texture images. Hence, in the proposed research work, we have analyzed and compared the performance of both wavelet and contourlet schemes for content based texture image retrieval. It is observed that contourlet based method outperforms the wavelet method for highly texture images in terms of retrieval efficiency.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Time Slotted Channel Scheduling for Constrained Networks 约束网络的改进时隙信道调度
N. Pradhan, B. Chaudhari, P. Khandekar
Recent years show the rapid adoption of Industrial Internet of Things (IIoT) technologies in automation and manufacturing. The IEEE 802.15.4e has evolved the industry in many different ways. Its time synchronization and channel hopping techniques are crucial for reliable operations in resource-constrained networks. With the advent of the 6TiSCH, it became feasible to connect industrial operational technology with an IPv6 network. It enabled determinism and quality of service in IIoT. Several 6TiSCH scheduling functions are being developed, optimizing different performance metrics. Network traffic and topology are the challenges in designing an efficient schedule. In this paper, the performance of the traffic-aware schedule has been analysed under different network scenarios. This technique designs a slotframe by considering the node's location and the traffic condition in the network. The result shows that the end-to-end latency in this technique is reduced up to 14% with similar throughput compared to the existing techniques.
近年来,工业物联网(IIoT)技术在自动化和制造业中的应用迅速发展。IEEE 802.15.4e以许多不同的方式推动了该行业的发展。它的时间同步和信道跳变技术对资源受限网络的可靠运行至关重要。随着6TiSCH的出现,将工业操作技术与IPv6网络连接起来变得可行。它实现了工业物联网中的确定性和服务质量。正在开发几个6TiSCH调度功能,以优化不同的性能指标。网络流量和拓扑结构是设计高效调度的挑战。本文分析了交通感知调度在不同网络场景下的性能。该技术通过考虑节点的位置和网络中的流量状况来设计槽帧。结果表明,与现有技术相比,该技术的端到端延迟减少了14%,吞吐量相似。
{"title":"Enhanced Time Slotted Channel Scheduling for Constrained Networks","authors":"N. Pradhan, B. Chaudhari, P. Khandekar","doi":"10.1109/ICECCT56650.2023.10179825","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179825","url":null,"abstract":"Recent years show the rapid adoption of Industrial Internet of Things (IIoT) technologies in automation and manufacturing. The IEEE 802.15.4e has evolved the industry in many different ways. Its time synchronization and channel hopping techniques are crucial for reliable operations in resource-constrained networks. With the advent of the 6TiSCH, it became feasible to connect industrial operational technology with an IPv6 network. It enabled determinism and quality of service in IIoT. Several 6TiSCH scheduling functions are being developed, optimizing different performance metrics. Network traffic and topology are the challenges in designing an efficient schedule. In this paper, the performance of the traffic-aware schedule has been analysed under different network scenarios. This technique designs a slotframe by considering the node's location and the traffic condition in the network. The result shows that the end-to-end latency in this technique is reduced up to 14% with similar throughput compared to the existing techniques.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129698698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Design of PI-PD Controller based on Smith Predictor for Integrating Processes with Time Delay 基于Smith预测器的PI-PD控制器对时滞过程集成的改进设计
V. Sreevalli, M. Rathaiah, R. Kiranmayi, P. Bharath Kumar, K. Nagabhushanam, Ahamadia. K Firdouse Kowsar
Proportional-Integral-Derivative (PID) controller is the most popular technique used in several industrial applications and has done more research work throughout many years. Being popular, the PID controller exhibits undesirable output response for some open loop unstable process such as integrating ones. This paper projects a design of smith predictor with an outer loop Proportional-Integral (PI) controller and interior loop Proportional-Derivative (PD) controller. The smith predictor uses plant process as a predictive model and it eliminates the delay part of the closed loop characteristic equation. Three various examples of integrating plants with time delay are carried out in simulation study to evaluate the obtained performance of projected method. The results from the simulation study are compared with the optimal PI-PD method. To illustrate the robustness of projected method, parameter uncertainties are included to the process and the following results are exhibited. The projected method is more robust to such dissimilarities. Disturbance of magnitude 0.1 and a white noise of 0.0001 magnitude are added to the system and the improved performance are shown in the simulation results. The proposed control algorithm will be designed and implemented in MATLAB/SIMULINK environment.
比例-积分-导数(PID)控制器是目前工业上应用最广泛的一种控制方法,多年来得到了较多的研究。对于一些开环不稳定过程(如积分过程),PID控制器表现出不良的输出响应。本文提出了一种带有外环比例积分控制器和内环比例导数控制器的smith预测器的设计。smith预测器采用对象过程作为预测模型,消除了闭环特征方程的延迟部分。仿真研究了3个不同类型的带时滞目标集成实例,对投影方法的性能进行了评价。仿真研究结果与最优PI-PD方法进行了比较。为了说明投影方法的鲁棒性,在过程中考虑了参数的不确定性,并展示了以下结果。投影方法对这种差异具有更强的鲁棒性。在系统中加入0.1级的扰动和0.0001级的白噪声,仿真结果显示了系统性能的改善。所提出的控制算法将在MATLAB/SIMULINK环境下设计和实现。
{"title":"Enhanced Design of PI-PD Controller based on Smith Predictor for Integrating Processes with Time Delay","authors":"V. Sreevalli, M. Rathaiah, R. Kiranmayi, P. Bharath Kumar, K. Nagabhushanam, Ahamadia. K Firdouse Kowsar","doi":"10.1109/ICECCT56650.2023.10179733","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179733","url":null,"abstract":"Proportional-Integral-Derivative (PID) controller is the most popular technique used in several industrial applications and has done more research work throughout many years. Being popular, the PID controller exhibits undesirable output response for some open loop unstable process such as integrating ones. This paper projects a design of smith predictor with an outer loop Proportional-Integral (PI) controller and interior loop Proportional-Derivative (PD) controller. The smith predictor uses plant process as a predictive model and it eliminates the delay part of the closed loop characteristic equation. Three various examples of integrating plants with time delay are carried out in simulation study to evaluate the obtained performance of projected method. The results from the simulation study are compared with the optimal PI-PD method. To illustrate the robustness of projected method, parameter uncertainties are included to the process and the following results are exhibited. The projected method is more robust to such dissimilarities. Disturbance of magnitude 0.1 and a white noise of 0.0001 magnitude are added to the system and the improved performance are shown in the simulation results. The proposed control algorithm will be designed and implemented in MATLAB/SIMULINK environment.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128540429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Batch Normalized Siamese Network Deep Learning Based Image Similarity Estimation 基于批归一化Siamese网络深度学习的图像相似度估计
M. Devi, J. Pandian, Aparna Joshi, Yeluri Praveen
The assessment of how two distinct images are equal are indeed called image similarity and consistency. In other words, it measures how much the intensity patterns in two images are comparable to one another. In order to achieve this, researchers examine the image descriptors recursively in order to identify descriptor pairs that are comparable. The two images are deemed comparable if the number of related descriptors exceeds a predetermined threshold and both images exhibit the very same entity. The computation of image similarity is used for various applications which graves to be the mandatory process for production of the application. With this intent, the Fashion MNIST dataset from KAGGLE is used for implementing the image similarity estimation. This paper proposes Batch Normalized Siamese Network (BNSN) deep learning based model for computing the image similarity. The BNSN model is designed with two subnetworks that generates feature vectors of two input images. The lambda batch normalization is performed with single dense layer to predict the image similarity with label 0 indicating the identical images and label 1 denoting the different images. The 30,000 training images were fitted with BNSN and tested with 30,000 images. Python was implemented on a Geforce Tesla V100 NVidia Graphics card webserver with a batch size of 64 and 30 training epochs. The training images are also tested with traditional image similarity method and implementation of proposed BNSN shows the accuracy of 91.91%, Precision of 92.93%, Recall of 90.72% and FScore of 91.81%.
对两幅不同的图像如何相等的评估确实被称为图像相似性和一致性。换句话说,它测量的是两幅图像的强度模式之间的可比性。为了实现这一点,研究人员递归地检查图像描述符,以识别具有可比性的描述符对。如果相关描述符的数量超过预定的阈值并且两个图像显示非常相同的实体,则认为这两个图像具有可比性。图像相似度的计算用于各种应用程序,这是应用程序生产的强制性过程。出于这个目的,我们使用KAGGLE的Fashion MNIST数据集来实现图像相似性估计。提出了一种基于Batch Normalized Siamese Network (BNSN)深度学习的图像相似度计算模型。BNSN模型设计了两个子网络,分别生成两个输入图像的特征向量。用单致密层进行lambda批处理归一化来预测图像的相似度,标签0表示相同图像,标签1表示不同图像。对3万张训练图像进行BNSN拟合,用3万张图像进行测试。Python在Geforce Tesla V100 NVidia显卡web服务器上实现,批处理大小为64个,训练epoch为30个。采用传统的图像相似度方法对训练图像进行测试,结果表明,BNSN的准确率为91.91%,精密度为92.93%,查全率为90.72%,FScore为91.81%。
{"title":"Batch Normalized Siamese Network Deep Learning Based Image Similarity Estimation","authors":"M. Devi, J. Pandian, Aparna Joshi, Yeluri Praveen","doi":"10.1109/ICECCT56650.2023.10179689","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179689","url":null,"abstract":"The assessment of how two distinct images are equal are indeed called image similarity and consistency. In other words, it measures how much the intensity patterns in two images are comparable to one another. In order to achieve this, researchers examine the image descriptors recursively in order to identify descriptor pairs that are comparable. The two images are deemed comparable if the number of related descriptors exceeds a predetermined threshold and both images exhibit the very same entity. The computation of image similarity is used for various applications which graves to be the mandatory process for production of the application. With this intent, the Fashion MNIST dataset from KAGGLE is used for implementing the image similarity estimation. This paper proposes Batch Normalized Siamese Network (BNSN) deep learning based model for computing the image similarity. The BNSN model is designed with two subnetworks that generates feature vectors of two input images. The lambda batch normalization is performed with single dense layer to predict the image similarity with label 0 indicating the identical images and label 1 denoting the different images. The 30,000 training images were fitted with BNSN and tested with 30,000 images. Python was implemented on a Geforce Tesla V100 NVidia Graphics card webserver with a batch size of 64 and 30 training epochs. The training images are also tested with traditional image similarity method and implementation of proposed BNSN shows the accuracy of 91.91%, Precision of 92.93%, Recall of 90.72% and FScore of 91.81%.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"65 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129817669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Accessible Video Games for Children with an Autism Spectrum Disorder 为患有自闭症谱系障碍的儿童制作无障碍电子游戏
Akash Bagchi, Akshaya Nadathur, Pranjal Padakannaya, Siddiq Khan, Siddiq Khan
Young children, especially those on the autistic spectrum, often do not learn educational subjects and life skills in the same manner as neurotypicals. Recreational activities like games, puzzles and co-curriculars are known to provide additional opportunities for learning while also engaging the child. The proposed project is aimed to design and implement an interactive game that will help shape the behavioral, cognitive and/or life skills of children with Autism Spectrum Disorders (ASD). Such an implementation will be carried out using the Unity engine, which utilizes the language C# for the source code. The final result is expected to be a working solution of a game that will aid healthy development of autistic patients in early childhood, and will be deployed for public use.
年幼的孩子,尤其是那些患有自闭症的孩子,通常不像正常人那样学习教育科目和生活技能。众所周知,游戏、拼图和课外活动等娱乐活动可以提供额外的学习机会,同时也能吸引孩子。该项目旨在设计和实施一个互动游戏,以帮助塑造自闭症谱系障碍(ASD)儿童的行为、认知和/或生活技能。这样的实现将使用Unity引擎进行,该引擎使用c#语言编写源代码。最终结果有望成为帮助自闭症患者早期健康发展的游戏解决方案,并将用于公共用途。
{"title":"Building Accessible Video Games for Children with an Autism Spectrum Disorder","authors":"Akash Bagchi, Akshaya Nadathur, Pranjal Padakannaya, Siddiq Khan, Siddiq Khan","doi":"10.1109/ICECCT56650.2023.10179616","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179616","url":null,"abstract":"Young children, especially those on the autistic spectrum, often do not learn educational subjects and life skills in the same manner as neurotypicals. Recreational activities like games, puzzles and co-curriculars are known to provide additional opportunities for learning while also engaging the child. The proposed project is aimed to design and implement an interactive game that will help shape the behavioral, cognitive and/or life skills of children with Autism Spectrum Disorders (ASD). Such an implementation will be carried out using the Unity engine, which utilizes the language C# for the source code. The final result is expected to be a working solution of a game that will aid healthy development of autistic patients in early childhood, and will be deployed for public use.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127545441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1