首页 > 最新文献

2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)最新文献

英文 中文
Basic Security Challenges in Cloud Computing 云计算中的基本安全挑战
Syed Rizwan, M. Zubair
With the advancement in information technology, everyone moves towards pleasure, ease, and luxury. From which the most advanced and usable field is Cloud Computing which uses the internet and gives access to storing the data to the user. It has many characteristics like elasticity, extensibility, smartness and lower cost, which causes companies to address the clients’ requirements. In spite of this, associations are delayed in accommodating it because of security issues and difficulties related with it. The development of cloud is affected by the security. This paper gives ongoing advances in cloud computing and highlights on some challenges, security issues, and solutions. It also incorporates the basics of cloud computing to make itself contained so that pursuers can have a reasonable comprehension of the subject and cloud computing security.
随着信息技术的进步,每个人都在追求快乐、安逸和奢侈。其中最先进和可用的领域是云计算,它使用互联网并为用户提供存储数据的途径。它具有弹性、可扩展性、智能性和低成本等特点,使企业能够满足客户的需求。尽管如此,由于安全问题和与之相关的困难,协会推迟了接纳它。云的发展受到安全问题的影响。本文给出了云计算的最新进展,并重点介绍了一些挑战、安全问题和解决方案。它还包含了云计算的基础知识,以便读者能够对主题和云计算安全性有一个合理的理解。
{"title":"Basic Security Challenges in Cloud Computing","authors":"Syed Rizwan, M. Zubair","doi":"10.1109/ICEEST48626.2019.8981695","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981695","url":null,"abstract":"With the advancement in information technology, everyone moves towards pleasure, ease, and luxury. From which the most advanced and usable field is Cloud Computing which uses the internet and gives access to storing the data to the user. It has many characteristics like elasticity, extensibility, smartness and lower cost, which causes companies to address the clients’ requirements. In spite of this, associations are delayed in accommodating it because of security issues and difficulties related with it. The development of cloud is affected by the security. This paper gives ongoing advances in cloud computing and highlights on some challenges, security issues, and solutions. It also incorporates the basics of cloud computing to make itself contained so that pursuers can have a reasonable comprehension of the subject and cloud computing security.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133834757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forensic of Things: Revisiting Digital Forensic Investigations in Internet of Things 物联网取证:重新审视物联网中的数字取证调查
Taimur Bakhshi
The emerging paradigm of Internet of Things (IoT) promises automation, real-time monitoring and management of critical infrastructure(s) allowing optimized productivity in consumer and commercial concerns. Diversity in IoT devices, communication protocols, and the extensive data generated by IoT-ware requires robust incident response primitives to counter IoT related cyber-attacks and deter cybercrimes. Although substantial work is underway in improving IoT security, there is a fundamental requirement to address the forensic requisites that may aid forensic investigators and law enforcement agencies (LEAs) in prosecuting IoT related cybercrimes. IoT presents substantial forensic challenges in terms of evidence source identification, artefact acquisition, insufficiency of IoT-specific forensic tools and techniques, and issues in multijurisdictional litigation. To this effect, the present papers comprehensively reviews the applicability of traditional, cloud and network forensics in the IoT domain. State-of-the-art IoT forensic models are critically discussed to highlight their practical applicability. Furthermore, employment of recent enabling technologies including software defined networking and blockchaining is examined in a forensic of things context. The study also discusses and makes recommendations towards the multi-faceted challenges faced by IoT forensic investigators due to non-validated methodologies, leading to deficiencies in operational readiness.
新兴的物联网(IoT)模式有望实现关键基础设施的自动化、实时监控和管理,从而优化消费者和商业方面的生产力。物联网设备、通信协议和物联网软件生成的大量数据的多样性需要强大的事件响应原语来应对物联网相关的网络攻击和阻止网络犯罪。尽管在提高物联网安全性方面正在进行大量工作,但仍有一个基本要求,即解决可能有助于法医调查人员和执法机构(LEAs)起诉物联网相关网络犯罪的法医必要条件。物联网在证据来源识别、人工制品获取、物联网专用法医工具和技术不足以及多司法管辖区诉讼问题方面提出了实质性的法医挑战。为此,本文全面回顾了传统、云和网络取证在物联网领域的适用性。对最先进的物联网取证模型进行了批判性讨论,以突出其实际适用性。此外,在取证环境中研究了包括软件定义网络和区块链在内的最新使能技术的使用。该研究还讨论了由于未经验证的方法导致操作准备不足而导致物联网取证调查员面临的多方面挑战,并提出了建议。
{"title":"Forensic of Things: Revisiting Digital Forensic Investigations in Internet of Things","authors":"Taimur Bakhshi","doi":"10.1109/ICEEST48626.2019.8981675","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981675","url":null,"abstract":"The emerging paradigm of Internet of Things (IoT) promises automation, real-time monitoring and management of critical infrastructure(s) allowing optimized productivity in consumer and commercial concerns. Diversity in IoT devices, communication protocols, and the extensive data generated by IoT-ware requires robust incident response primitives to counter IoT related cyber-attacks and deter cybercrimes. Although substantial work is underway in improving IoT security, there is a fundamental requirement to address the forensic requisites that may aid forensic investigators and law enforcement agencies (LEAs) in prosecuting IoT related cybercrimes. IoT presents substantial forensic challenges in terms of evidence source identification, artefact acquisition, insufficiency of IoT-specific forensic tools and techniques, and issues in multijurisdictional litigation. To this effect, the present papers comprehensively reviews the applicability of traditional, cloud and network forensics in the IoT domain. State-of-the-art IoT forensic models are critically discussed to highlight their practical applicability. Furthermore, employment of recent enabling technologies including software defined networking and blockchaining is examined in a forensic of things context. The study also discusses and makes recommendations towards the multi-faceted challenges faced by IoT forensic investigators due to non-validated methodologies, leading to deficiencies in operational readiness.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131962056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparative Study Of Classification Techniques On Occurrence Of Breast Cancer Disease 乳腺癌发病分型方法的比较研究
Zia Uddin Siddiqui, I. Ali
This paper presents an integral comparison related to epidemiological data for the most commonly occurring disease among women, the breast cancer. It compares different techniques of linear Classification by using the collected dataset and give the finding regarding the efficiency of one technique over the other. It will help the doctors and experts to take accurate decisions and predict the right stage of the disease. The examination made in the proposal between various procedures to discover which methods will perform all the more precisely then the other to distinguish and give more data with respect to the malignant growth. It can also help to find about the reoccurrence of breast cancer and what treatment must be suggested to the potential patient.
本文提出了一个完整的比较有关的流行病学数据中最常见于妇女,乳腺癌。它通过使用收集的数据集比较了不同的线性分类技术,并给出了关于一种技术优于另一种技术的发现。它将帮助医生和专家做出准确的决定,并预测疾病的正确阶段。在各种程序之间进行的检查,以发现哪种方法将比其他方法更精确地执行,以区分并提供更多关于恶性生长的数据。它还可以帮助发现乳腺癌的复发率以及必须向潜在患者建议的治疗方法。
{"title":"Comparative Study Of Classification Techniques On Occurrence Of Breast Cancer Disease","authors":"Zia Uddin Siddiqui, I. Ali","doi":"10.1109/ICEEST48626.2019.8981706","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981706","url":null,"abstract":"This paper presents an integral comparison related to epidemiological data for the most commonly occurring disease among women, the breast cancer. It compares different techniques of linear Classification by using the collected dataset and give the finding regarding the efficiency of one technique over the other. It will help the doctors and experts to take accurate decisions and predict the right stage of the disease. The examination made in the proposal between various procedures to discover which methods will perform all the more precisely then the other to distinguish and give more data with respect to the malignant growth. It can also help to find about the reoccurrence of breast cancer and what treatment must be suggested to the potential patient.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130285139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Supervisory Control and Data Acquisition - SCADA on a PLC and VFD Controlled Digital Mixing Plant Using TIA Portal 基于TIA的PLC和VFD控制的数字搅拌站监控与数据采集SCADA的实现
B. Hasan, S. S. Mohani, Syed Saiq Hussain, Sajid Yasin, Waqar Ahmed Alvi, Osama Saeed
This paper outlines the design and implementation of SCADA based digital mixer using the Siemens PLC S7-1200 CPU 1214C DC/DC/RLY as the system controller with provision of the algorithm and the equipment needed. This work will give wireless controlling and monitoring [1] of volume, flow rate of liquid tanks and mixer impeller’s frequency in real time. The volume of input liquid given by the user is in litres and the system ensures the flow of same volume as per process requirement. For this purpose a plant is designed consists of a mixing tank and two supply tanks along with flow sensors. The process is controlled by ladder logic diagram and a wireless node i.e. SCADA PC designed on TIA Portal.
本文概述了采用西门子PLC S7-1200 CPU 1214C DC/DC/RLY作为系统控制器的基于SCADA的数字混频器的设计与实现,并给出了算法和所需设备。本工作将实现对液槽容积、流量和混合器叶轮频率的实时无线控制和监测[1]。用户提供的输入液体的体积以升为单位,系统确保按工艺要求的相同体积的流量。为此目的,设计了一个装置,由一个混合罐和两个供应罐以及流量传感器组成。该过程由梯形逻辑图控制,并在TIA Portal上设计了无线节点SCADA PC。
{"title":"Implementation of Supervisory Control and Data Acquisition - SCADA on a PLC and VFD Controlled Digital Mixing Plant Using TIA Portal","authors":"B. Hasan, S. S. Mohani, Syed Saiq Hussain, Sajid Yasin, Waqar Ahmed Alvi, Osama Saeed","doi":"10.1109/ICEEST48626.2019.8981705","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981705","url":null,"abstract":"This paper outlines the design and implementation of SCADA based digital mixer using the Siemens PLC S7-1200 CPU 1214C DC/DC/RLY as the system controller with provision of the algorithm and the equipment needed. This work will give wireless controlling and monitoring [1] of volume, flow rate of liquid tanks and mixer impeller’s frequency in real time. The volume of input liquid given by the user is in litres and the system ensures the flow of same volume as per process requirement. For this purpose a plant is designed consists of a mixing tank and two supply tanks along with flow sensors. The process is controlled by ladder logic diagram and a wireless node i.e. SCADA PC designed on TIA Portal.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127572023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Application of IoT and Machine Learning to Air Pollution Monitoring in Smart Cities 物联网和机器学习在智慧城市空气污染监测中的应用
Iftikhar ul Samee, Muhammad Taha Jilani, Husna Gul A. Wahab
Exhale and breathe with polluted air causes serious health implications. The effect of air pollution can be minimized by continuous monitoring and track a record of it. Also, timely prediction of pollutants level can help government agencies to take proactive measures to protect the environment. In this paper we have proposed the application of Internet of Things and Machine learning so that air pollution can be monitored within future smart cities. A high correlation between pollutants and weather parameters is determined by using Pearson correlation. In contrary to traditional sensor network, this work utilizes cloud-centric IoT middleware architecture that not only receives data from air pollution sensors but also from existing weather sensors. Thus provides two-fold reliability and reduce the cost substantially. The Artificial Neural Network has been used to predict the level of Sulfur Dioxide (SO2) and Particular Matter (PM2.5). Promising results suggest that ANN is a reliable candidate that can be used in air pollution monitoring and prediction system. Our models have achieved Root Mean Squared Error of 0.0128 and 0.0001 for SO2 and PM2.5, respectively.
呼气和呼吸被污染的空气会对健康造成严重影响。空气污染的影响可以通过持续监测和跟踪记录来最小化。此外,及时预测污染物水平可以帮助政府机构采取积极措施保护环境。在本文中,我们提出了物联网和机器学习的应用,以便在未来的智慧城市中监测空气污染。利用Pearson相关法确定了污染物与天气参数之间的高度相关性。与传统的传感器网络不同,这项工作利用以云为中心的物联网中间件架构,不仅可以接收来自空气污染传感器的数据,还可以接收来自现有天气传感器的数据。从而提供了双倍的可靠性,并大大降低了成本。人工神经网络已被用于预测二氧化硫(SO2)和特殊物质(PM2.5)的水平。结果表明,人工神经网络是一种可靠的候选方法,可用于大气污染监测和预报系统。我们的模型对二氧化硫和PM2.5的均方根误差分别为0.0128和0.0001。
{"title":"An Application of IoT and Machine Learning to Air Pollution Monitoring in Smart Cities","authors":"Iftikhar ul Samee, Muhammad Taha Jilani, Husna Gul A. Wahab","doi":"10.1109/ICEEST48626.2019.8981707","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981707","url":null,"abstract":"Exhale and breathe with polluted air causes serious health implications. The effect of air pollution can be minimized by continuous monitoring and track a record of it. Also, timely prediction of pollutants level can help government agencies to take proactive measures to protect the environment. In this paper we have proposed the application of Internet of Things and Machine learning so that air pollution can be monitored within future smart cities. A high correlation between pollutants and weather parameters is determined by using Pearson correlation. In contrary to traditional sensor network, this work utilizes cloud-centric IoT middleware architecture that not only receives data from air pollution sensors but also from existing weather sensors. Thus provides two-fold reliability and reduce the cost substantially. The Artificial Neural Network has been used to predict the level of Sulfur Dioxide (SO2) and Particular Matter (PM2.5). Promising results suggest that ANN is a reliable candidate that can be used in air pollution monitoring and prediction system. Our models have achieved Root Mean Squared Error of 0.0128 and 0.0001 for SO2 and PM2.5, respectively.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125240349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Proposed Model for Controlling Distributed Denial of Service Attack on Cloud Computing 一种基于云计算的分布式拒绝服务攻击控制模型
E. Ahmed, Huma Ali Ahmed
Cloud computing is another innovation among many other latest technologies that enables the customers to get access to the services as per their demand. Cloud computing is getting success due to its self service nature and on demand services. It provides great flexibility to its customers as they have to pay only for those services which they are in need to use without getting worried to pay the cost of hardware and software maintenance. This characteristic of cloud computing makes it affordable for those organizations that are not ready to spend heavy amounts to get the licensed software and also on the deployment of hardware in their premises. Instead of many advantages of using cloud computing, security is still a major concern which creates an obstruction in the rapid development of cloud computing. Most of the users share their data by using cloud services so the major concern in cloud computing is the availability of data but it is observed that due to certain attacks data is not readily available when it is needed by the users. We are basically focusing on denial of service (DOS) in this research paper which is one of the popular attacks. It is a major reason of the inaccessibility of services and resources to the users by flooding the network and generating a lot of requests with invalid return addresses. We are going to propose a model to control DOS attack so the users will get an environment where their data is available over the cloud.
云计算是许多其他最新技术中的另一项创新,它使客户能够根据自己的需求访问服务。云计算由于其自助服务的特性和随需应变的服务而获得成功。它为客户提供了很大的灵活性,因为他们只需要为他们需要使用的服务付费,而不必担心支付硬件和软件维护的成本。云计算的这一特性使得那些不准备花费大量资金购买许可软件和在其内部部署硬件的组织能够负担得起云计算。云计算虽然有很多优点,但安全性仍然是阻碍云计算快速发展的主要问题。大多数用户通过使用云服务共享他们的数据,因此云计算中的主要问题是数据的可用性,但据观察,由于某些攻击,当用户需要数据时,数据并不容易获得。本文主要研究的是拒绝服务攻击(DOS),这是一种流行的攻击方式。这是导致用户无法访问服务和资源的主要原因,因为网络中充斥着大量无效返回地址的请求。我们将提出一个控制DOS攻击的模型,这样用户将获得一个环境,他们的数据可以在云上使用。
{"title":"A Proposed Model for Controlling Distributed Denial of Service Attack on Cloud Computing","authors":"E. Ahmed, Huma Ali Ahmed","doi":"10.1109/ICEEST48626.2019.8981709","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981709","url":null,"abstract":"Cloud computing is another innovation among many other latest technologies that enables the customers to get access to the services as per their demand. Cloud computing is getting success due to its self service nature and on demand services. It provides great flexibility to its customers as they have to pay only for those services which they are in need to use without getting worried to pay the cost of hardware and software maintenance. This characteristic of cloud computing makes it affordable for those organizations that are not ready to spend heavy amounts to get the licensed software and also on the deployment of hardware in their premises. Instead of many advantages of using cloud computing, security is still a major concern which creates an obstruction in the rapid development of cloud computing. Most of the users share their data by using cloud services so the major concern in cloud computing is the availability of data but it is observed that due to certain attacks data is not readily available when it is needed by the users. We are basically focusing on denial of service (DOS) in this research paper which is one of the popular attacks. It is a major reason of the inaccessibility of services and resources to the users by flooding the network and generating a lot of requests with invalid return addresses. We are going to propose a model to control DOS attack so the users will get an environment where their data is available over the cloud.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123246952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain based Automated Formal Model for Safety and Security in Smart Parking System 基于区块链的智能停车系统安全自动化形式化模型
M. Afzaal, Aniqa Rehman, Saba Latif, N. Zafar
Blockchain technology is being implemented in security systems because of its decentralization and security assurances attributes. In this work, blockchain based smart parking system is presented to overcome the data security and vehicle safety issues. We integrate blockchain technology with Internet of Things (IoT) to make the system reliable. The blockchain-based smart parking system behavior is described using Unified Modeling Language (UML). We automate our system using Non-Deterministic Finite Automata (NFA) to show the system working in the form of states and transactions. The NFA is used in this paper because of its abstract power of modelling using the systems. Formal method-based technique, i.e., Vienna Development Method-Specification Language (VDM-SL) is used to formally verify the system. The system correctness is verified using VDM-SL toolbox through its various available facilities.
区块链技术由于其去中心化和安全保证属性,正在安全系统中实现。本文提出了基于区块链的智能停车系统,以克服数据安全和车辆安全问题。我们将区块链技术与物联网(IoT)相结合,使系统可靠。使用统一建模语言(UML)描述基于区块链的智能停车系统行为。我们使用非确定性有限自动机(NFA)自动化系统,以状态和事务的形式显示系统工作。本文之所以使用NFA,是因为它具有用系统进行建模的抽象能力。采用基于形式化方法的技术,即维也纳开发方法规范语言(VDM-SL)对系统进行形式化验证。通过VDM-SL工具箱的各种可用功能,验证了系统的正确性。
{"title":"Blockchain based Automated Formal Model for Safety and Security in Smart Parking System","authors":"M. Afzaal, Aniqa Rehman, Saba Latif, N. Zafar","doi":"10.1109/ICEEST48626.2019.8981673","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981673","url":null,"abstract":"Blockchain technology is being implemented in security systems because of its decentralization and security assurances attributes. In this work, blockchain based smart parking system is presented to overcome the data security and vehicle safety issues. We integrate blockchain technology with Internet of Things (IoT) to make the system reliable. The blockchain-based smart parking system behavior is described using Unified Modeling Language (UML). We automate our system using Non-Deterministic Finite Automata (NFA) to show the system working in the form of states and transactions. The NFA is used in this paper because of its abstract power of modelling using the systems. Formal method-based technique, i.e., Vienna Development Method-Specification Language (VDM-SL) is used to formally verify the system. The system correctness is verified using VDM-SL toolbox through its various available facilities.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123565652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ultra-low power small size RF Transceiver module for 5G/LTE applications 超低功耗小尺寸射频收发模块,适用于5G/LTE应用
M. Faheem, Shun'an Zhong, Xinghua Wang, Sadique Ahmad, Muhammad Basit Azeem, Ilyas Younus Essani
RF transceiver has been achieved notable technological advancement since the last couple of decades. However, it’s not accurate in terms of size, energy, and time consumption. The number of designs has been proposed to make it energy-efficient and time-efficient, but still, an error-free and 5G application compatible RF transceiver module are required. In which we have the accurate conversion form analog-to-digital and digital-to-analog. To this end, we are proposing an improved time-efficient RF transceiver module which includes the 11-bit SAR ADC, DAC, and RF transceiver. The operating voltage of RF transceiver and SAR-ADC is 1.2V. Where the operating frequency is 5.8GHz. 90nm CMOS technology used for the implementation of the proposed solution. The Error Vector Magnitude (EVM) of transmitting and receiving mode is around 3.31% and 2.8%, respectively.
射频收发器已经取得了显着的技术进步,因为过去的几十年。然而,它在大小、能量和时间消耗方面并不准确。已经提出了许多设计,以使其节能和省时,但仍然需要一个无错误和5G应用兼容的射频收发器模块。其中我们有精确的转换从模拟到数字和数字到模拟。为此,我们提出了一种改进的高效射频收发模块,该模块包括11位SAR ADC, DAC和射频收发器。射频收发器和SAR-ADC的工作电压为1.2V。其中工作频率为5.8GHz。采用90nm CMOS技术实现所提出的解决方案。发射和接收模式的误差矢量幅值(EVM)分别约为3.31%和2.8%。
{"title":"Ultra-low power small size RF Transceiver module for 5G/LTE applications","authors":"M. Faheem, Shun'an Zhong, Xinghua Wang, Sadique Ahmad, Muhammad Basit Azeem, Ilyas Younus Essani","doi":"10.1109/ICEEST48626.2019.8981698","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981698","url":null,"abstract":"RF transceiver has been achieved notable technological advancement since the last couple of decades. However, it’s not accurate in terms of size, energy, and time consumption. The number of designs has been proposed to make it energy-efficient and time-efficient, but still, an error-free and 5G application compatible RF transceiver module are required. In which we have the accurate conversion form analog-to-digital and digital-to-analog. To this end, we are proposing an improved time-efficient RF transceiver module which includes the 11-bit SAR ADC, DAC, and RF transceiver. The operating voltage of RF transceiver and SAR-ADC is 1.2V. Where the operating frequency is 5.8GHz. 90nm CMOS technology used for the implementation of the proposed solution. The Error Vector Magnitude (EVM) of transmitting and receiving mode is around 3.31% and 2.8%, respectively.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122234061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Varient for FOC-based Adaptive Filter for Chaotic Time Series Prediction 基于foc自适应滤波器的改进方差混沌时间序列预测
Syed Saiq Hussain, Muhammad Kashif Majeedy, M. A. Abbasi, M. H. S. Siddiqui, Zaheer Abbas Baloch, Muhammad Ahmed Khan
An improved normalized fractional least mean square (iNFLMS) has been proposed in this study. Least mean square (LMS) and fractional LMS (FLMS) are both prone to the problem of sensitivity to the input. In the proposed algorithm, the sensitivity of the FLMS to the input is reduced by normalization. The summation of the fractional and conventional gradients is made convex to obtain better convergence rate and keeping minimum error in steady state. To make the algorithm less computationally expensive, the gamma function is now absorbed into the fractional learning rate. Through the experiment it is quite clear that the efficacy of the proposed method is promising considering the parameters of steady-state error and convergence rate when compared to that of LMS, FLMS, MFLMS and NFLMS algorithm.
本文提出了一种改进的归一化分数最小均方(iNFLMS)算法。最小均方(LMS)和分数均方(FLMS)都容易出现对输入敏感的问题。在该算法中,通过归一化降低了FLMS对输入的灵敏度。将分数阶梯度与常规梯度的和作凸求和,以获得更好的收敛速度和保持稳态误差最小。为了降低算法的计算成本,伽马函数现在被吸收到分数学习率中。通过实验,对比LMS、FLMS、MFLMS和NFLMS算法的稳态误差和收敛速率参数,表明本文方法的有效性是有希望的。
{"title":"Improved Varient for FOC-based Adaptive Filter for Chaotic Time Series Prediction","authors":"Syed Saiq Hussain, Muhammad Kashif Majeedy, M. A. Abbasi, M. H. S. Siddiqui, Zaheer Abbas Baloch, Muhammad Ahmed Khan","doi":"10.1109/ICEEST48626.2019.8981686","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981686","url":null,"abstract":"An improved normalized fractional least mean square (iNFLMS) has been proposed in this study. Least mean square (LMS) and fractional LMS (FLMS) are both prone to the problem of sensitivity to the input. In the proposed algorithm, the sensitivity of the FLMS to the input is reduced by normalization. The summation of the fractional and conventional gradients is made convex to obtain better convergence rate and keeping minimum error in steady state. To make the algorithm less computationally expensive, the gamma function is now absorbed into the fractional learning rate. Through the experiment it is quite clear that the efficacy of the proposed method is promising considering the parameters of steady-state error and convergence rate when compared to that of LMS, FLMS, MFLMS and NFLMS algorithm.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131985429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Use of Macro/Micro Models and Business Intelligence tools for Energy Assessment and Scenario based Modeling 使用宏观/微观模型和商业智能工具进行能源评估和基于场景的建模
U. Zia, M. Zulfiqar, Usama Azram, M. Haris, Mudassar Khan, M. Zahoor
Energy assessment and scenario based modeling needs a large quantitative information for providing an accurate analysis. This requires a need of computer model to analyze them. These models (financial, economic, or etc.) often employ scenario analysis to investigate different assumptions about the technical and economical conditions at play. Hence, a large number of software tools, techniques and modeling approaches are used, some better than the other. A wide range of techniques are employed, ranging from broadly economic to broadly engineering. Mathematical optimization is often used to determine the least-cost in some sense. Models can be international, regional, national, municipal, or stand-alone in scope. However, the choice of a suitable model is highly complex since a wrong choice will cost industry a significant amount of time and money only to end up with some inaccurate or wrong results. The initial part of this study analyze different approaches for energy modeling and which software tool will be most feasible to use under those conditions. The outputs from these models may include the system feasibility, greenhouse gas emissions, cumulative financial costs, natural resource use, and energy efficiency of the system under investigation. Hence, even after careful selection of a modeling tool, the interpretation of output data is still a complex task since it requires handling a large amount of data. Thus, the second part of this study deals with business intelligence tools that can be used to handle and properly interpret that data. Especially in the context of scenario based modeling, these tools can provide graphical representation of different dynamics just by using simple clicks once the model is ready. This analysis will help industries and R&D departments through performing better assessments and ease of data handling.
能源评估和基于情景的建模需要大量的定量信息来提供准确的分析。这就需要一个计算机模型来分析它们。这些模型(金融、经济等)通常采用情景分析来研究有关技术和经济条件的不同假设。因此,使用了大量的软件工具、技术和建模方法,其中一些比另一些更好。所采用的技术范围广泛,从广泛的经济到广泛的工程。数学优化通常用于确定某种意义上的最小成本。模型的范围可以是国际的、区域的、国家的、城市的或独立的。然而,选择一个合适的模型是非常复杂的,因为一个错误的选择将花费大量的时间和金钱,最终只会得到一些不准确或错误的结果。本研究的第一部分分析了能源建模的不同方法,以及哪种软件工具在这些条件下最可行。这些模型的输出可能包括系统可行性、温室气体排放、累积财务成本、自然资源使用和被调查系统的能源效率。因此,即使在仔细选择建模工具之后,输出数据的解释仍然是一项复杂的任务,因为它需要处理大量数据。因此,本研究的第二部分涉及可用于处理和正确解释该数据的商业智能工具。特别是在基于场景的建模上下文中,这些工具可以在模型准备好后通过简单的单击提供不同动态的图形化表示。这种分析将有助于行业和研发部门进行更好的评估和简化数据处理。
{"title":"Use of Macro/Micro Models and Business Intelligence tools for Energy Assessment and Scenario based Modeling","authors":"U. Zia, M. Zulfiqar, Usama Azram, M. Haris, Mudassar Khan, M. Zahoor","doi":"10.1109/ICEEST48626.2019.8981691","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981691","url":null,"abstract":"Energy assessment and scenario based modeling needs a large quantitative information for providing an accurate analysis. This requires a need of computer model to analyze them. These models (financial, economic, or etc.) often employ scenario analysis to investigate different assumptions about the technical and economical conditions at play. Hence, a large number of software tools, techniques and modeling approaches are used, some better than the other. A wide range of techniques are employed, ranging from broadly economic to broadly engineering. Mathematical optimization is often used to determine the least-cost in some sense. Models can be international, regional, national, municipal, or stand-alone in scope. However, the choice of a suitable model is highly complex since a wrong choice will cost industry a significant amount of time and money only to end up with some inaccurate or wrong results. The initial part of this study analyze different approaches for energy modeling and which software tool will be most feasible to use under those conditions. The outputs from these models may include the system feasibility, greenhouse gas emissions, cumulative financial costs, natural resource use, and energy efficiency of the system under investigation. Hence, even after careful selection of a modeling tool, the interpretation of output data is still a complex task since it requires handling a large amount of data. Thus, the second part of this study deals with business intelligence tools that can be used to handle and properly interpret that data. Especially in the context of scenario based modeling, these tools can provide graphical representation of different dynamics just by using simple clicks once the model is ready. This analysis will help industries and R&D departments through performing better assessments and ease of data handling.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132905774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1