首页 > 最新文献

2022 International Conference on Development and Application Systems (DAS)最新文献

英文 中文
Secure network architecture based on distributed firewalls 基于分布式防火墙的安全网络架构
Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786092
Andrei-Daniel Tudosi, D. Balan, A. Potorac
Firewalls are essential for networking, because they are security devices designed to help protect an infrastructure from unwanted traffic, malicious attacks and outsiders that want to gain unauthorized access. These devices, hardware or software, can provide different levels of protection, depending on the situation where they are used and the entity's security policy. Because to the different network topologies and the evolution of exploits in different forms, classic firewalls can become inefficient. A low budget solution to these problems is a distributed firewall developed with open-source tools, which brings new features and improvements. Our approach in this paper is to propose a distributed firewall that solves problems and improves the overall results in network protection. We suggest the distribution of security policies of a firewall into distributed devices that work together and obtain better performance. The traffic is split between several firewalls that analyze and decide if the incoming packets will enter the network, be dropped, rejected, or redirected to a honeypot. Our proposed distributed firewall has the possibility to be scaled with different numbers of clients and network devices.
防火墙对于网络是必不可少的,因为它们是安全设备,旨在帮助保护基础设施免受不必要的流量、恶意攻击和想要获得未经授权访问的外部人员的攻击。这些设备(硬件或软件)可以提供不同级别的保护,具体取决于使用它们的情况和实体的安全策略。由于不同的网络拓扑结构和不同形式的攻击演变,传统防火墙可能会变得低效。这些问题的低预算解决方案是使用开源工具开发的分布式防火墙,它带来了新的特性和改进。我们在本文中的方法是提出一个分布式防火墙,解决问题,提高网络保护的整体效果。我们建议将防火墙的安全策略分发到协同工作并获得更好性能的分布式设备中。流量在几个防火墙之间分配,这些防火墙分析并决定是否将传入的数据包进入网络、丢弃、拒绝或重定向到蜜罐。我们提出的分布式防火墙可以根据不同数量的客户端和网络设备进行扩展。
{"title":"Secure network architecture based on distributed firewalls","authors":"Andrei-Daniel Tudosi, D. Balan, A. Potorac","doi":"10.1109/DAS54948.2022.9786092","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786092","url":null,"abstract":"Firewalls are essential for networking, because they are security devices designed to help protect an infrastructure from unwanted traffic, malicious attacks and outsiders that want to gain unauthorized access. These devices, hardware or software, can provide different levels of protection, depending on the situation where they are used and the entity's security policy. Because to the different network topologies and the evolution of exploits in different forms, classic firewalls can become inefficient. A low budget solution to these problems is a distributed firewall developed with open-source tools, which brings new features and improvements. Our approach in this paper is to propose a distributed firewall that solves problems and improves the overall results in network protection. We suggest the distribution of security policies of a firewall into distributed devices that work together and obtain better performance. The traffic is split between several firewalls that analyze and decide if the incoming packets will enter the network, be dropped, rejected, or redirected to a honeypot. Our proposed distributed firewall has the possibility to be scaled with different numbers of clients and network devices.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130127238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Zero-Trust Cybersecurity Approach for Dynamic 5G Network Slicing with Network Service Mesh and Segment-Routing over IPv6 基于网络服务网格和IPv6分段路由的动态5G网络切片零信任网络安全方法
Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786074
Bruno Dzogovic, Bernardo Santos, Ismail Hassan, Boning Feng, V. T. Do, Niels Jacot, Thanh van Do
As the 5G mobile networks become widely adopted across various industries and verticals, additional requirements for strengthening their security emerge. Traditional security approaches have been successful in preventing adversarial activities across generic networks and datacenters, but the complexity and extent of the 5G communication systems renders these insufficient. Therein the need for a stringent tactic to ensure the reduction of the attack surface within the 5G core networks. This paper examines the potential threat of Distributed Denial of Service (DDoS) and specifically, flooding attacks that can wreak havoc on the 5G mobile infrastructure as well as design a solution according to the zero-trust security model to ensure the continuity of the service in corresponding disaster scenarios.
随着5G移动网络在各个行业和垂直领域的广泛采用,加强其安全性的额外要求出现了。传统的安全方法在防止跨通用网络和数据中心的对抗性活动方面取得了成功,但5G通信系统的复杂性和范围使这些方法不足。因此,需要严格的策略来确保减少5G核心网络内的攻击面。本文研究了分布式拒绝服务(DDoS)的潜在威胁,特别是对5G移动基础设施造成严重破坏的洪水式攻击,并根据零信任安全模型设计了解决方案,以确保相应灾难场景下的服务连续性。
{"title":"Zero-Trust Cybersecurity Approach for Dynamic 5G Network Slicing with Network Service Mesh and Segment-Routing over IPv6","authors":"Bruno Dzogovic, Bernardo Santos, Ismail Hassan, Boning Feng, V. T. Do, Niels Jacot, Thanh van Do","doi":"10.1109/DAS54948.2022.9786074","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786074","url":null,"abstract":"As the 5G mobile networks become widely adopted across various industries and verticals, additional requirements for strengthening their security emerge. Traditional security approaches have been successful in preventing adversarial activities across generic networks and datacenters, but the complexity and extent of the 5G communication systems renders these insufficient. Therein the need for a stringent tactic to ensure the reduction of the attack surface within the 5G core networks. This paper examines the potential threat of Distributed Denial of Service (DDoS) and specifically, flooding attacks that can wreak havoc on the 5G mobile infrastructure as well as design a solution according to the zero-trust security model to ensure the continuity of the service in corresponding disaster scenarios.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115595883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ADLS Gen 2 for web server log data analysis ADLS Gen 2用于web服务器日志数据分析
Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786071
Elisabeta Zagan, M. Danubianu
Before the advent of Big Data, there were few possibilities for processing TB of data sets or more. As data generation capacity has grown, so has the need to store and process large volumes of data. The web server log files contain important and valuable information about events related to customer activities in the online environment, server activities and its response to customer requests, and much more. It is well known that web server log files are files that contain large volumes of data and grow very quickly in size, servers having to delete them once they reach a certain size. Thus, many valuable data are lost, data on which various analyzes can be made in order to obtain valuable information that will later lead to improvements on several levels. It is important to find cost-effective and easily accessible techniques for storing and analyzing these files, which are also considered to be of a high privacy level holding information classified as personal data. The main objective is the research for the development and implementation of an innovative solution for storing and analyzing large volumes of web server log files using cloud storage - ADLS Gen2.
在大数据出现之前,几乎没有处理TB或更多数据集的可能性。随着数据生成能力的增长,存储和处理大量数据的需求也在增长。web服务器日志文件包含与在线环境中的客户活动、服务器活动及其对客户请求的响应等相关的事件的重要且有价值的信息。众所周知,web服务器日志文件是包含大量数据的文件,其大小增长非常快,一旦达到一定大小,服务器就必须删除它们。因此,许多有价值的数据丢失了,可以对这些数据进行各种分析,以获得有价值的信息,这些信息将在以后的几个层面上导致改进。重要的是找到成本效益高且易于访问的技术来存储和分析这些文件,这些文件也被认为是具有高度隐私级别的文件,其中包含归类为个人数据的信息。主要目标是研究开发和实施一种创新的解决方案,用于使用云存储- ADLS Gen2存储和分析大量web服务器日志文件。
{"title":"ADLS Gen 2 for web server log data analysis","authors":"Elisabeta Zagan, M. Danubianu","doi":"10.1109/DAS54948.2022.9786071","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786071","url":null,"abstract":"Before the advent of Big Data, there were few possibilities for processing TB of data sets or more. As data generation capacity has grown, so has the need to store and process large volumes of data. The web server log files contain important and valuable information about events related to customer activities in the online environment, server activities and its response to customer requests, and much more. It is well known that web server log files are files that contain large volumes of data and grow very quickly in size, servers having to delete them once they reach a certain size. Thus, many valuable data are lost, data on which various analyzes can be made in order to obtain valuable information that will later lead to improvements on several levels. It is important to find cost-effective and easily accessible techniques for storing and analyzing these files, which are also considered to be of a high privacy level holding information classified as personal data. The main objective is the research for the development and implementation of an innovative solution for storing and analyzing large volumes of web server log files using cloud storage - ADLS Gen2.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128248260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tensor-Based and Projection-Based Methods for Dimensionality Reduction of Hyperspectral Images 基于张量和投影的高光谱图像降维方法
Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786148
Laura-Bianca Bilius, S. Pentiuc
Inasmuch as the hyperspectral images are represented by large amounts of data it is necessary to adopt an appropriate method to reduce their size without affecting the quality of their processing results. This paper addresses the use of Tucker1 decomposition for tensor compression and dimensionality reduction, followed by a projection-based method, Principal Component Analysis (PCA). After dimensional reduction, some classifications were performed using the features extracted. Various supervised learning algorithms were used for which we calculated k-fold cross-validation loss. We made a comparison of these methods in terms of the classification results obtained. According to the results, at the same size of the transformed data, PCA features have led to lower accuracy than Tucker1 ones, and the original data.
由于高光谱图像由大量数据表示,因此有必要采用适当的方法在不影响处理结果质量的情况下减小高光谱图像的尺寸。本文介绍了使用Tucker1分解进行张量压缩和降维,然后使用基于投影的方法,主成分分析(PCA)。降维后,利用提取的特征进行分类。我们使用了各种监督学习算法来计算k倍交叉验证损失。我们对这些方法的分类结果进行了比较。结果表明,在同样大小的变换数据下,PCA特征导致的准确率低于Tucker1特征和原始数据。
{"title":"Tensor-Based and Projection-Based Methods for Dimensionality Reduction of Hyperspectral Images","authors":"Laura-Bianca Bilius, S. Pentiuc","doi":"10.1109/DAS54948.2022.9786148","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786148","url":null,"abstract":"Inasmuch as the hyperspectral images are represented by large amounts of data it is necessary to adopt an appropriate method to reduce their size without affecting the quality of their processing results. This paper addresses the use of Tucker1 decomposition for tensor compression and dimensionality reduction, followed by a projection-based method, Principal Component Analysis (PCA). After dimensional reduction, some classifications were performed using the features extracted. Various supervised learning algorithms were used for which we calculated k-fold cross-validation loss. We made a comparison of these methods in terms of the classification results obtained. According to the results, at the same size of the transformed data, PCA features have led to lower accuracy than Tucker1 ones, and the original data.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":" 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of the fuzzy logic module to determine the expediency of event selection 开发模糊逻辑模块,确定事件选择的便捷性
Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786119
Zakusylo M. Taras, V. Mesyura
To ensure personal success it is important to maintain balance between professional achievements, health, family wellbeing, etc. It is never an easy task. But that is where the essence of effectiveness lies, balance is the key to efficiency of the short term plans and long term goals. An approach is offered to find balance between the wish to see a child clean, and the building of relationship with said child in which he or she maintains own hygiene without the need for reminders. Unfortunately such an approach may cause an issue of overload, when the desire of accomplishing everything negatively affects the ability to focus, and causes burnout. To avoid the issue of overload it is recommended to use the software that will give advice on even selection based on the rules of balance and the matrix of Eisenhower. To automate the process of decision making in terms of the expediency of even selection and their inclusion in the long term plans on the basis of the matrix of Eisenhower it is suggested to use Mamdani fuzzy model. Representation of the individual interests of the users, their preferences and expectations by use of linguistic variables, allows the opportunity to build the most effective route to success. The linguistic variables for the indicator of expediency of event selection such as urgency, importance, overload, rest, motivation are reviewed. Examples of rules for determining the task expediency indicator and the part of the knowledge base of the fuzzy system are presented. An example of the application of fuzzy logic to the event of employee training is given and it is shown that the event corresponds to a sufficient level of expediency of the event selection.
为了确保个人成功,在职业成就、健康、家庭幸福等方面保持平衡是很重要的。这从来都不是一件容易的事。但这就是效率的本质所在,平衡是短期计划和长期目标效率的关键。我们提供了一种方法,在看到孩子干净的愿望和与孩子建立关系之间找到平衡,在这种关系中,他或她保持自己的卫生,而不需要提醒。不幸的是,这种方法可能会导致超负荷的问题,当想要完成所有事情的欲望对集中注意力的能力产生负面影响时,就会导致倦怠。为了避免过载问题,建议使用基于平衡规则和艾森豪威尔矩阵的偶数选择建议软件。在艾森豪威尔矩阵的基础上,为了实现决策过程的自动化,使均匀选择的便捷性和纳入长期计划,建议使用Mamdani模糊模型。通过使用语言变量来表达用户的个人兴趣、他们的偏好和期望,使我们有机会建立通往成功的最有效途径。对事件选择权宜性指标的语言变量,如紧迫性、重要性、过载、休息、动机等进行了综述。给出了确定任务便利度指标的规则示例和模糊系统知识库的组成部分。最后给出了模糊逻辑在员工培训事件中的应用实例,结果表明该事件符合事件选择的充分权宜性。
{"title":"Development of the fuzzy logic module to determine the expediency of event selection","authors":"Zakusylo M. Taras, V. Mesyura","doi":"10.1109/DAS54948.2022.9786119","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786119","url":null,"abstract":"To ensure personal success it is important to maintain balance between professional achievements, health, family wellbeing, etc. It is never an easy task. But that is where the essence of effectiveness lies, balance is the key to efficiency of the short term plans and long term goals. An approach is offered to find balance between the wish to see a child clean, and the building of relationship with said child in which he or she maintains own hygiene without the need for reminders. Unfortunately such an approach may cause an issue of overload, when the desire of accomplishing everything negatively affects the ability to focus, and causes burnout. To avoid the issue of overload it is recommended to use the software that will give advice on even selection based on the rules of balance and the matrix of Eisenhower. To automate the process of decision making in terms of the expediency of even selection and their inclusion in the long term plans on the basis of the matrix of Eisenhower it is suggested to use Mamdani fuzzy model. Representation of the individual interests of the users, their preferences and expectations by use of linguistic variables, allows the opportunity to build the most effective route to success. The linguistic variables for the indicator of expediency of event selection such as urgency, importance, overload, rest, motivation are reviewed. Examples of rules for determining the task expediency indicator and the part of the knowledge base of the fuzzy system are presented. An example of the application of fuzzy logic to the event of employee training is given and it is shown that the event corresponds to a sufficient level of expediency of the event selection.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129865333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phase Shift Effects Analysis on Radiation Pattern of a Ground Plane Antenna Array 地平面天线阵辐射方向图的相移效应分析
Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786221
Cezar-Ion Adomnitei, C. Lesanu, Adrian Done, M. Dimian, Iuliana Chiuchisan, A. Yu
This paper presents an analysis on the effect of the controlled phase shift introduced between feeding signals of an antenna array elements on modifying its radiation pattern shape. Following the idea of increasing measurements accuracy on phased antenna arrays, it was designed and built an antenna array containing two radiating telescopic elements located on a contiguous metal ground plane. All the hardware related to the functionality of the phased array was placed on the bottom of the ground plane. Even though the array was designed for the 915 MHz band, allocated to various useful satellite services, it is easily tunable in a wide range of other frequencies and also easily modifiable in a multi-element array, due to the design of the ground plane. This paper also shows a good agreement between the experimental results and those obtained from numerical simulations.
本文分析了天线阵元馈入信号间引入可控相移对天线阵元辐射方向图形状的影响。为了提高相控天线阵列的测量精度,设计并建造了一个包含两个辐射伸缩元件的天线阵列,该天线阵列位于相邻的金属接地面上。所有与相控阵功能相关的硬件都放置在接地面的底部。尽管该阵列是为915mhz频段设计的,分配给各种有用的卫星服务,但由于地平面的设计,它很容易在其他频率的大范围内进行调谐,也很容易在多元素阵列中进行修改。实验结果与数值模拟结果吻合较好。
{"title":"Phase Shift Effects Analysis on Radiation Pattern of a Ground Plane Antenna Array","authors":"Cezar-Ion Adomnitei, C. Lesanu, Adrian Done, M. Dimian, Iuliana Chiuchisan, A. Yu","doi":"10.1109/DAS54948.2022.9786221","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786221","url":null,"abstract":"This paper presents an analysis on the effect of the controlled phase shift introduced between feeding signals of an antenna array elements on modifying its radiation pattern shape. Following the idea of increasing measurements accuracy on phased antenna arrays, it was designed and built an antenna array containing two radiating telescopic elements located on a contiguous metal ground plane. All the hardware related to the functionality of the phased array was placed on the bottom of the ground plane. Even though the array was designed for the 915 MHz band, allocated to various useful satellite services, it is easily tunable in a wide range of other frequencies and also easily modifiable in a multi-element array, due to the design of the ground plane. This paper also shows a good agreement between the experimental results and those obtained from numerical simulations.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"30 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131805080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of a new spectrum sensing technique for Internet of Things: An AI approach 一种新的物联网频谱传感技术评估:一种人工智能方法
Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786101
Partemie-Marian Mutescu, A. Lavric, A. Petrariu, V. Popa
In the last decade we observed a great demand for wireless sensor applications as the connectivity of objects related to the Internet of Things concept increased. The growing number of wireless sensors leads to more spectrum demand and eventually to collisions due to overcrowding, causing a decrease in their performance level. Thus, to avoid collisions, detailed knowledge of the radio spectrum is required such as the degree of spectrum occupancy and the radio modulations used. This paper presents an analysis of the impact of different radio signal representations (I/Q coordinates, polar coordinates, and Fast Fourier Transform) on the performance level of machine learning algorithms in spectrum sensing classification. Our results shown that machine learning algorithms achieve a higher classification accuracy when the FFT representation of the radio signal is used, with a classification accuracy of 98.6%. When using the time series, the I/Q representation of the radio signal obtained an accuracy of 68.6% on the test dataset meanwhile the polar coordinates achieved an accuracy of 90%, respectively.
在过去的十年中,随着与物联网概念相关的物体的连接增加,我们观察到对无线传感器应用的巨大需求。越来越多的无线传感器导致更多的频谱需求,并最终由于过度拥挤而导致碰撞,导致其性能水平下降。因此,为了避免碰撞,需要详细了解无线电频谱,例如频谱占用程度和所使用的无线电调制。本文分析了不同的无线电信号表示(I/Q坐标、极坐标和快速傅立叶变换)对频谱感知分类中机器学习算法性能水平的影响。我们的研究结果表明,当使用无线电信号的FFT表示时,机器学习算法实现了更高的分类精度,分类精度为98.6%。当使用时间序列时,无线电信号的I/Q表示在测试数据集中获得了68.6%的精度,而极坐标的精度分别达到了90%。
{"title":"Evaluation of a new spectrum sensing technique for Internet of Things: An AI approach","authors":"Partemie-Marian Mutescu, A. Lavric, A. Petrariu, V. Popa","doi":"10.1109/DAS54948.2022.9786101","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786101","url":null,"abstract":"In the last decade we observed a great demand for wireless sensor applications as the connectivity of objects related to the Internet of Things concept increased. The growing number of wireless sensors leads to more spectrum demand and eventually to collisions due to overcrowding, causing a decrease in their performance level. Thus, to avoid collisions, detailed knowledge of the radio spectrum is required such as the degree of spectrum occupancy and the radio modulations used. This paper presents an analysis of the impact of different radio signal representations (I/Q coordinates, polar coordinates, and Fast Fourier Transform) on the performance level of machine learning algorithms in spectrum sensing classification. Our results shown that machine learning algorithms achieve a higher classification accuracy when the FFT representation of the radio signal is used, with a classification accuracy of 98.6%. When using the time series, the I/Q representation of the radio signal obtained an accuracy of 68.6% on the test dataset meanwhile the polar coordinates achieved an accuracy of 90%, respectively.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126911768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CPU Execution Time Analysis based on RISC-V ISA Simulators: A Survey 基于RISC-V ISA模拟器的CPU执行时间分析综述
Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786163
Nicolai Iuga, I. Zagan, V. Gaitan
Multiple components affect the behavior of CPU execution tasks, mainly mutual exclusion during access to the shared resources and synchronous transmissions between tasks that require specific priorities. Referring to real-time task scheduling, the most important issues addressed are monitoring the deadline of the tasks, the probability of non-compliance with the deadline and ensuring that they are completed within the deadline imposed by the controlled system. This leads to the fact that a tasks set is feasible if the system has adequate resources to execute the tasks without losing any deadlines. To approach this challenge, this article addresses the feasibility analysis of runtime for real-time tasks to be performed in a virtual space before applying to a real embedded device. These processes take place offline, even before a system executes a set of tasks. In order to perform the feasibility analysis of the system, efforts are being made to provide virtual environments and simulators, such as the RISC-V ISA simulator and the WCET (Worst Case Execution Time) measurement, subsequently. These simulators have application-specific requirements, with their own advantages.
多个组件影响CPU执行任务的行为,主要是访问共享资源期间的互斥,以及需要特定优先级的任务之间的同步传输。在实时任务调度中,最重要的问题是监控任务的截止日期、不符合截止日期的概率,并确保任务在被控系统规定的截止日期内完成。这导致这样一个事实,即如果系统有足够的资源来执行任务而不丢失任何截止日期,则任务集是可行的。为了应对这一挑战,本文讨论了在应用于实际嵌入式设备之前,在虚拟空间中执行实时任务的运行时可行性分析。这些过程脱机进行,甚至在系统执行一组任务之前。为了对系统进行可行性分析,我们正在努力提供虚拟环境和模拟器,例如RISC-V ISA模拟器和WCET(最坏情况执行时间)测量。这些模拟器具有特定于应用程序的要求,具有各自的优势。
{"title":"CPU Execution Time Analysis based on RISC-V ISA Simulators: A Survey","authors":"Nicolai Iuga, I. Zagan, V. Gaitan","doi":"10.1109/DAS54948.2022.9786163","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786163","url":null,"abstract":"Multiple components affect the behavior of CPU execution tasks, mainly mutual exclusion during access to the shared resources and synchronous transmissions between tasks that require specific priorities. Referring to real-time task scheduling, the most important issues addressed are monitoring the deadline of the tasks, the probability of non-compliance with the deadline and ensuring that they are completed within the deadline imposed by the controlled system. This leads to the fact that a tasks set is feasible if the system has adequate resources to execute the tasks without losing any deadlines. To approach this challenge, this article addresses the feasibility analysis of runtime for real-time tasks to be performed in a virtual space before applying to a real embedded device. These processes take place offline, even before a system executes a set of tasks. In order to perform the feasibility analysis of the system, efforts are being made to provide virtual environments and simulators, such as the RISC-V ISA simulator and the WCET (Worst Case Execution Time) measurement, subsequently. These simulators have application-specific requirements, with their own advantages.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126630634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Section method for monitoring the surface shape of a radiation spot in real time 实时监测辐射点表面形状的切片方法
Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786114
L. Tymchenko, N. Kokriatska, Volodymyr Tverdomed, Yurii Kutaev, Dmytro Zhuk
An approach to solving the problem of monitoring the surface shape of a radiation spot in real life. The analysis of the use of the section method for monitoring the shape of the surface of the radiation spot in real time is carried out. Considered the possibility of using aspect ratio to solve a given problem. Experimental studies of the method of sections and form factor.
一种解决现实生活中辐射斑表面形状监测问题的方法。对利用截面法实时监测辐射斑表面形状进行了分析。考虑使用纵横比来解决给定问题的可能性。截面法和形状因子的实验研究。
{"title":"Section method for monitoring the surface shape of a radiation spot in real time","authors":"L. Tymchenko, N. Kokriatska, Volodymyr Tverdomed, Yurii Kutaev, Dmytro Zhuk","doi":"10.1109/DAS54948.2022.9786114","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786114","url":null,"abstract":"An approach to solving the problem of monitoring the surface shape of a radiation spot in real life. The analysis of the use of the section method for monitoring the shape of the surface of the radiation spot in real time is carried out. Considered the possibility of using aspect ratio to solve a given problem. Experimental studies of the method of sections and form factor.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126119344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Development and Application Systems (DAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1