首页 > 最新文献

2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)最新文献

英文 中文
Design and Performance Analysis of Monopole Antenna for the Detection of Early-Stage Hepatocellular Carcinoma (HCC) in Human Liver 单极天线检测早期肝癌的设计与性能分析
R. Islam, Fardeen Mahbub, Sayed Abdul Kadir Al-Nahiun, MD. Ismail Hossain Rabbi
Liver cancer has become a prevalent cause of mortality in recent decades. Among various kinds of Liver Cancer, Hepatocellular Carcinoma (HCC) or Hepatoma has become very common. In this paper, a detailed analysis has been made about the human liver through detecting the early stage of HCC using a Monopole Antenna, which has been successfully designed in the CST Studio Suite 2019 software. As a part of the valid analysis, a Human Liver phantom has also been developed in the same software, including the combinations of Skin, Fat, Muscle, Liver. Additionally, using various kinds of dielectric properties, a group of tumor cells was created in the Liver Phantom to determine the Antenna model's effectiveness. After that, the performance of the designed Antenna was determined in free space and including the tumor cells as well. Simulation results have been successfully obtained, including Return Loss (S1, 1) of −27.48 dB, VSWR of 1.088, Efficiency of 70.55%, and Specific Absorption Rate (SAR) of 0.665 W/kg, and many more after applying to the Hepatoma-affected liver phantom. Based on the determined results, a detailed performance analysis of the designed Monopole Antenna has been made in this paper, validating the research's effectiveness and objectives.
近几十年来,肝癌已成为一种普遍的死亡原因。在各种类型的肝癌中,肝细胞癌(HCC)或肝癌(Hepatoma)已经变得非常常见。本文通过在CST Studio Suite 2019软件中成功设计的单极子天线(monpole Antenna)检测早期HCC,对人类肝脏进行了详细分析。作为有效分析的一部分,在同一软件中也开发了一个人体肝脏模型,包括皮肤,脂肪,肌肉,肝脏的组合。此外,利用各种介电特性,在肝幻影中创建了一组肿瘤细胞,以确定天线模型的有效性。然后,对设计的天线在自由空间和包括肿瘤细胞在内的情况下的性能进行了测试。仿真结果表明,回波损耗(S1, 1)为−27.48 dB, VSWR为1.088,效率为70.55%,比吸收率(SAR)为0.665 W/kg,应用于肝癌影响的肝模体后,比吸收率(SAR)更高。在此基础上,对设计的单极子天线进行了详细的性能分析,验证了研究的有效性和目的。
{"title":"Design and Performance Analysis of Monopole Antenna for the Detection of Early-Stage Hepatocellular Carcinoma (HCC) in Human Liver","authors":"R. Islam, Fardeen Mahbub, Sayed Abdul Kadir Al-Nahiun, MD. Ismail Hossain Rabbi","doi":"10.1109/iemcon53756.2021.9623174","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623174","url":null,"abstract":"Liver cancer has become a prevalent cause of mortality in recent decades. Among various kinds of Liver Cancer, Hepatocellular Carcinoma (HCC) or Hepatoma has become very common. In this paper, a detailed analysis has been made about the human liver through detecting the early stage of HCC using a Monopole Antenna, which has been successfully designed in the CST Studio Suite 2019 software. As a part of the valid analysis, a Human Liver phantom has also been developed in the same software, including the combinations of Skin, Fat, Muscle, Liver. Additionally, using various kinds of dielectric properties, a group of tumor cells was created in the Liver Phantom to determine the Antenna model's effectiveness. After that, the performance of the designed Antenna was determined in free space and including the tumor cells as well. Simulation results have been successfully obtained, including Return Loss (S1, 1) of −27.48 dB, VSWR of 1.088, Efficiency of 70.55%, and Specific Absorption Rate (SAR) of 0.665 W/kg, and many more after applying to the Hepatoma-affected liver phantom. Based on the determined results, a detailed performance analysis of the designed Monopole Antenna has been made in this paper, validating the research's effectiveness and objectives.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131960874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Blockchain-based Control-data Protection Framework for Trustworthy Smart Grid Operations 基于智能区块链的可信赖智能电网运行控制数据保护框架
Salma Samy, Karim A. Banawan, M. Azab, Mohamed Rizk
The critical nature of smart grids (SGs) attracts various network attacks and malicious manipulations. Existent SG solutions are less capable of ensuring secure and trustworthy operation. This is due to the large-scale nature of SGs and reliance on network protocols for trust management. A particular example of such severe attacks is the false data injection (FDI). FDI refers to a network attack, where meters' measurements are manipulated before being reported in such a way that the energy system takes flawed decisions. In this paper, we exploit the secure nature of blockchains to construct a data management framework based on public blockchain. Our framework enables trustworthy data storage, verification, and exchange between SG components and decision-makers. Our proposed system enables miners to invest their computational power to verify blockchain transactions in a fully distributed manner. The mining logic employs machine learning (ML) techniques to identify the locations of compromised meters in the network, which are responsible for generating FDI attacks. In return, miners receive virtual credit, which may be used to pay their electric bills. Our design circumvents single points of failure and intentional FDI attempts. Our numerical results compare the accuracy of three different ML-based mining logic techniques in two scenarios: focused and distributed FDI attacks for different attack levels. Finally, we proposed a majority-decision mining technique for the practical case of an unknown FDI attack level.
智能电网的关键特性吸引了各种网络攻击和恶意操纵。现有的SG解决方案无法保证安全可靠的运行。这是由于SGs的大规模性质和信任管理对网络协议的依赖。这种严重攻击的一个特殊示例是虚假数据注入(FDI)。FDI指的是一种网络攻击,即电表的测量数据在报告之前被操纵,从而导致能源系统做出错误的决策。在本文中,我们利用区块链的安全性来构建一个基于公有区块链的数据管理框架。我们的框架支持SG组件和决策者之间可信的数据存储、验证和交换。我们提出的系统使矿工能够以完全分布式的方式投入他们的计算能力来验证区块链交易。挖掘逻辑采用机器学习(ML)技术来识别网络中受损仪表的位置,这些仪表负责产生FDI攻击。作为回报,矿工获得虚拟信用,可以用来支付电费。我们的设计避免了单点故障和有意的FDI尝试。我们的数值结果比较了三种不同的基于ml的挖掘逻辑技术在两种情况下的准确性:针对不同攻击级别的集中和分布式FDI攻击。最后,针对未知FDI攻击水平的实际情况,我们提出了一种多数决策挖掘技术。
{"title":"Smart Blockchain-based Control-data Protection Framework for Trustworthy Smart Grid Operations","authors":"Salma Samy, Karim A. Banawan, M. Azab, Mohamed Rizk","doi":"10.1109/iemcon53756.2021.9623202","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623202","url":null,"abstract":"The critical nature of smart grids (SGs) attracts various network attacks and malicious manipulations. Existent SG solutions are less capable of ensuring secure and trustworthy operation. This is due to the large-scale nature of SGs and reliance on network protocols for trust management. A particular example of such severe attacks is the false data injection (FDI). FDI refers to a network attack, where meters' measurements are manipulated before being reported in such a way that the energy system takes flawed decisions. In this paper, we exploit the secure nature of blockchains to construct a data management framework based on public blockchain. Our framework enables trustworthy data storage, verification, and exchange between SG components and decision-makers. Our proposed system enables miners to invest their computational power to verify blockchain transactions in a fully distributed manner. The mining logic employs machine learning (ML) techniques to identify the locations of compromised meters in the network, which are responsible for generating FDI attacks. In return, miners receive virtual credit, which may be used to pay their electric bills. Our design circumvents single points of failure and intentional FDI attempts. Our numerical results compare the accuracy of three different ML-based mining logic techniques in two scenarios: focused and distributed FDI attacks for different attack levels. Finally, we proposed a majority-decision mining technique for the practical case of an unknown FDI attack level.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133399382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Traffic Prediction for a Software Defined Network Based Virtualized Security Functions Platform 基于软件定义网络的虚拟化安全功能平台网络流量预测
D. Jayasinghe, W. Rankothge, N. Gamage, T. Gamage, S. Uwanpriya, D. Amarasinghe
Software-Defined Networking (SDN) has become a popular and widely used approach with Cloud Service Providers (CSPs). With the introduction of Virtualized Security Functions (VSFs), and offering them as a service, CSPs are exploring effective and efficient approaches for resource management in the cloud infrastructure, considering specific requirements of VSFs. Network traffic prediction is an important component of cloud resource management, as prediction helps CSPs to take necessary proactive management actions, specifically for VSFs. This research focuses on introducing an algorithm to predict the network traffic traverse via a cloud platform where VSFs are offered as a service, by using the Auto-Regressive Integrated Moving Average (ARIMA) model. In this paper, the implementation and performance of the traffic prediction algorithm are presented. The results show that the network traffic in cloud environments can be effectively predicted by using the introduced algorithm with an accuracy of 96.49%.
软件定义网络(SDN)已经成为云服务提供商(csp)广泛使用的一种流行方法。随着虚拟化安全功能(vfs)的引入,并将其作为一种服务提供,云计算服务提供商(csp)正在考虑vfs的特定需求,探索云基础设施中有效和高效的资源管理方法。网络流量预测是云资源管理的一个重要组成部分,因为预测可以帮助云服务提供商(csp)采取必要的主动管理行动,特别是针对vfs。本研究重点介绍了一种算法,通过使用自回归综合移动平均(ARIMA)模型,通过云平台预测网络流量穿越,其中VSFs作为一种服务提供。本文给出了流量预测算法的实现和性能。结果表明,该算法可以有效地预测云环境下的网络流量,预测准确率达到96.49%。
{"title":"Network Traffic Prediction for a Software Defined Network Based Virtualized Security Functions Platform","authors":"D. Jayasinghe, W. Rankothge, N. Gamage, T. Gamage, S. Uwanpriya, D. Amarasinghe","doi":"10.1109/iemcon53756.2021.9623169","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623169","url":null,"abstract":"Software-Defined Networking (SDN) has become a popular and widely used approach with Cloud Service Providers (CSPs). With the introduction of Virtualized Security Functions (VSFs), and offering them as a service, CSPs are exploring effective and efficient approaches for resource management in the cloud infrastructure, considering specific requirements of VSFs. Network traffic prediction is an important component of cloud resource management, as prediction helps CSPs to take necessary proactive management actions, specifically for VSFs. This research focuses on introducing an algorithm to predict the network traffic traverse via a cloud platform where VSFs are offered as a service, by using the Auto-Regressive Integrated Moving Average (ARIMA) model. In this paper, the implementation and performance of the traffic prediction algorithm are presented. The results show that the network traffic in cloud environments can be effectively predicted by using the introduced algorithm with an accuracy of 96.49%.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133599267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Double-State-Temporal Difference Learning for Resource Provisioning in Uncertain Fog Computing Environment 不确定雾计算环境下资源分配的双状态-时间差分学习
B. K. Murthy, S. Shiva
The Internet of Things (IoT) has evolved at a faster rate in recent years. Fog computing can perform a substantial amount of computation at a faster rate and is capable of dealing with IoT applications with huge traffic demands and stringent Quality of Service (QoS) requirements. Resource provisioning issues in fog computing are addressed using double-state-temporal difference learning. By considering double Q-states while propagating the temporal difference error, high quality resource provisioning policies can be formed. The proposed resource-provisioning scheme outperforms one of the recent works in terms of the performance metrics such as execution time, learning rate, accuracy and resource utilization rate under varying uncertainties of the task and grid resource parameters.
近年来,物联网(IoT)以更快的速度发展。雾计算可以以更快的速度执行大量计算,能够处理具有巨大流量需求和严格服务质量(QoS)要求的物联网应用。雾计算中的资源供应问题使用双状态-时间差分学习来解决。通过在传播时间差误差时考虑双q状态,可以形成高质量的资源供应策略。本文提出的资源分配方案在任务和网格资源参数变化不确定性的情况下,在执行时间、学习率、准确率和资源利用率等性能指标上都优于最近的一项工作。
{"title":"Double-State-Temporal Difference Learning for Resource Provisioning in Uncertain Fog Computing Environment","authors":"B. K. Murthy, S. Shiva","doi":"10.1109/iemcon53756.2021.9623085","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623085","url":null,"abstract":"The Internet of Things (IoT) has evolved at a faster rate in recent years. Fog computing can perform a substantial amount of computation at a faster rate and is capable of dealing with IoT applications with huge traffic demands and stringent Quality of Service (QoS) requirements. Resource provisioning issues in fog computing are addressed using double-state-temporal difference learning. By considering double Q-states while propagating the temporal difference error, high quality resource provisioning policies can be formed. The proposed resource-provisioning scheme outperforms one of the recent works in terms of the performance metrics such as execution time, learning rate, accuracy and resource utilization rate under varying uncertainties of the task and grid resource parameters.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114458097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MACHINE LEARNING ALGORITHMS AND THEIR APPLICATIONS IN CLASSIFYING CYBER-ATTACKS ON A SMART GRID NETWORK 机器学习算法及其在智能电网网络网络攻击分类中的应用
Adedayo Aribisala, Mohammad S. Khan, G. Husari
Smart grid architecture and Software-defined Networking (SDN) have evolved into a centrally controlled infrastructure that captures and extracts data in real-time through sensors, smart-meters, and virtual machines. These advances pose a risk and increase the vulnerabilities of these infrastructures to sophisticated cyberattacks like distributed denial of service (DDoS), false data injection attack (FDIA), and Data replay. Integrating machine learning with a network intrusion detection system (NIDS) can improve the system's accuracy and precision when detecting suspicious signatures and network anomalies. Analyzing data in real-time using trained and tested hyperparameters on a network traffic dataset applies to most network infrastructures. The NSL-KDD dataset implemented holds various classes, attack types, protocol suites like TCP, HTTP, and POP, which are critical to packet transmission on a smart grid network. In this paper, we leveraged existing machine learning (ML) algorithms, Support vector machine (SVM), K-nearest neighbor (KNN), Random Forest (RF), Naïve Bayes (NB), and Bagging; to perform a detailed performance comparison of selected classifiers. We propose a multi-level hybrid model of SVM integrated with RF for improved accuracy and precision during network filtering. The hybrid model SVM-RF returned an average accuracy of 94% in 10-fold cross-validation and 92.75%in an 80-20% split during class classification.
智能电网架构和软件定义网络(SDN)已经发展成为一种中央控制的基础设施,通过传感器、智能电表和虚拟机实时捕获和提取数据。这些进步带来了风险,并增加了这些基础设施面对复杂网络攻击的脆弱性,如分布式拒绝服务(DDoS)、虚假数据注入攻击(FDIA)和数据重放。将机器学习与网络入侵检测系统(NIDS)相结合,可以提高系统在检测可疑签名和网络异常时的准确性和精密度。在网络流量数据集上使用经过训练和测试的超参数实时分析数据适用于大多数网络基础设施。实现的NSL-KDD数据集包含各种类、攻击类型和协议套件,如TCP、HTTP和POP,这些对智能电网网络上的数据包传输至关重要。在本文中,我们利用了现有的机器学习(ML)算法、支持向量机(SVM)、k近邻(KNN)、随机森林(RF)、Naïve贝叶斯(NB)和Bagging;对所选分类器进行详细的性能比较。为了提高网络滤波的准确度和精度,我们提出了一种将支持向量机与射频相结合的多级混合模型。混合模型SVM-RF在10次交叉验证中平均准确率为94%,在分类过程中80-20%的分割中平均准确率为92.75%。
{"title":"MACHINE LEARNING ALGORITHMS AND THEIR APPLICATIONS IN CLASSIFYING CYBER-ATTACKS ON A SMART GRID NETWORK","authors":"Adedayo Aribisala, Mohammad S. Khan, G. Husari","doi":"10.1109/iemcon53756.2021.9623067","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623067","url":null,"abstract":"Smart grid architecture and Software-defined Networking (SDN) have evolved into a centrally controlled infrastructure that captures and extracts data in real-time through sensors, smart-meters, and virtual machines. These advances pose a risk and increase the vulnerabilities of these infrastructures to sophisticated cyberattacks like distributed denial of service (DDoS), false data injection attack (FDIA), and Data replay. Integrating machine learning with a network intrusion detection system (NIDS) can improve the system's accuracy and precision when detecting suspicious signatures and network anomalies. Analyzing data in real-time using trained and tested hyperparameters on a network traffic dataset applies to most network infrastructures. The NSL-KDD dataset implemented holds various classes, attack types, protocol suites like TCP, HTTP, and POP, which are critical to packet transmission on a smart grid network. In this paper, we leveraged existing machine learning (ML) algorithms, Support vector machine (SVM), K-nearest neighbor (KNN), Random Forest (RF), Naïve Bayes (NB), and Bagging; to perform a detailed performance comparison of selected classifiers. We propose a multi-level hybrid model of SVM integrated with RF for improved accuracy and precision during network filtering. The hybrid model SVM-RF returned an average accuracy of 94% in 10-fold cross-validation and 92.75%in an 80-20% split during class classification.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117066222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Blockchain-Based Software Always-On System 基于区块链的软件永远在线系统
Hung-Chin Jang, Ying-Tzu Chen
Moving towards Industry 5.0, the Industrial Internet of Things (IIoT) has become an indispensable role. IIoT devices could help manufacturing companies to observe various production statuses hence improving production efficiency. However, its limitation on resources and features makes robust security implementation a big challenge. Implementing a secure, general and scalable system to adopt across industries is one of the most critical topics for IIoT. This paper proposed a blockchain-based system architecture to auto-update, monitor, and fix the IIoT devices' software. We take the software status snapshots and store them as a blockchain ledger to protect the software's integrity and the software from unauthorized modification. To achieve auto-update and auto fix, we also simulate the concept of a blockchain contract to create the ledger whenever there are changes. As a result, the changes could continuously be tracked. The performance and scalability are also evaluated. The result shows that the system could also be deployed in larger-scale IIoT devices. The software update and fix could be guaranteed authenticated, and the unauthorized software could be monitored and detected.
迈向工业5.0,工业物联网(IIoT)已成为不可或缺的角色。工业物联网设备可以帮助制造企业观察各种生产状态,从而提高生产效率。然而,它在资源和特性上的限制使得健壮的安全实现成为一个巨大的挑战。实现安全、通用和可扩展的系统以跨行业采用是工业物联网最关键的主题之一。本文提出了一种基于区块链的系统架构,用于自动更新、监控和修复IIoT设备的软件。我们获取软件状态快照并将其存储为区块链分类账,以保护软件的完整性和软件免受未经授权的修改。为了实现自动更新和自动修复,我们还模拟了区块链合约的概念,以便在发生变化时创建分类账。因此,可以持续跟踪更改。并对其性能和可扩展性进行了评估。结果表明,该系统也可以部署在更大规模的工业物联网设备中。软件的更新和修复可以保证身份验证,并且可以监视和检测未经授权的软件。
{"title":"A Blockchain-Based Software Always-On System","authors":"Hung-Chin Jang, Ying-Tzu Chen","doi":"10.1109/iemcon53756.2021.9623179","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623179","url":null,"abstract":"Moving towards Industry 5.0, the Industrial Internet of Things (IIoT) has become an indispensable role. IIoT devices could help manufacturing companies to observe various production statuses hence improving production efficiency. However, its limitation on resources and features makes robust security implementation a big challenge. Implementing a secure, general and scalable system to adopt across industries is one of the most critical topics for IIoT. This paper proposed a blockchain-based system architecture to auto-update, monitor, and fix the IIoT devices' software. We take the software status snapshots and store them as a blockchain ledger to protect the software's integrity and the software from unauthorized modification. To achieve auto-update and auto fix, we also simulate the concept of a blockchain contract to create the ledger whenever there are changes. As a result, the changes could continuously be tracked. The performance and scalability are also evaluated. The result shows that the system could also be deployed in larger-scale IIoT devices. The software update and fix could be guaranteed authenticated, and the unauthorized software could be monitored and detected.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123679106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Analysis of a Practical RMS Power Detector Using Power MOSFET 基于功率MOSFET的实用均方根功率检测器的设计与分析
Jules Guiliary Ravanne, Y. L. Then, H. T. Su, I. Hijazin
Power detector chip design and fabrication have experienced significant advancement with the emergence of various technological processes such as BiCMOS and CMOS. With the continuous downscaling of semiconductor devices, chip fabrication has become more complex and less accessible. This paper investigates the design and analysis of RMS power detectors using power MOSFET. A BSIM3 model developed from extracted parameters of the power MOSFET datasheet was employed to design and simulate the RMS power detector. A cascode structure with a current-source load was used to realize high conversion gain and sensitivity. RMS detection is realized by exploiting the square-law principles of MOS transistors in the strong inversion region. The proposed RMS detector targets practical applications in the agricultural sector and educational institutions. The RMS power detector was fabricated using FR4 PCB substrate. The measurement results at 2 GHz suggest that the RMS power detector employed using power MOSFET on FR4 PCB substrate can detect RF power.
随着BiCMOS和CMOS等各种工艺的出现,功率探测器芯片的设计和制造取得了重大进展。随着半导体器件的不断缩小,芯片制造变得越来越复杂,越来越难实现。本文研究了基于功率MOSFET的RMS功率检测器的设计与分析。利用功率MOSFET数据表中提取的参数建立BSIM3模型,对RMS功率检测器进行了设计和仿真。采用电流源负载级联结构,实现了较高的转换增益和灵敏度。在强反转区利用MOS晶体管的平方定律原理实现均方根值检测。所提出的RMS检测器的目标是在农业部门和教育机构的实际应用。采用FR4基板制作RMS功率检测器。在2ghz频段的测量结果表明,基于功率MOSFET的RMS功率检测器可以检测射频功率。
{"title":"Design and Analysis of a Practical RMS Power Detector Using Power MOSFET","authors":"Jules Guiliary Ravanne, Y. L. Then, H. T. Su, I. Hijazin","doi":"10.1109/iemcon53756.2021.9623258","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623258","url":null,"abstract":"Power detector chip design and fabrication have experienced significant advancement with the emergence of various technological processes such as BiCMOS and CMOS. With the continuous downscaling of semiconductor devices, chip fabrication has become more complex and less accessible. This paper investigates the design and analysis of RMS power detectors using power MOSFET. A BSIM3 model developed from extracted parameters of the power MOSFET datasheet was employed to design and simulate the RMS power detector. A cascode structure with a current-source load was used to realize high conversion gain and sensitivity. RMS detection is realized by exploiting the square-law principles of MOS transistors in the strong inversion region. The proposed RMS detector targets practical applications in the agricultural sector and educational institutions. The RMS power detector was fabricated using FR4 PCB substrate. The measurement results at 2 GHz suggest that the RMS power detector employed using power MOSFET on FR4 PCB substrate can detect RF power.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121939082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of SD-WAN Deployment for XYZ Enterprise Company in Indonesia 印尼XYZ企业SD-WAN部署绩效评估
Gemilang Kurniawan Soejantono, M. I. Nashiruddin, S. N. Hertiana, M. Nugraha
Internet use has been exceptional during the previous several decades. As a result, Wide Area Network (WAN), employed in all types of inter-data center, enterprise, and carrier networks, has become a vital infrastructure since it serves as one of the internet's most crucial transmission mediums. However, due to the transfer of enterprise data to the cloud, internet traffic in the future is changing. As a result, traditional WAN connectivity will be inadequate. One of the viable solutions to this is to implement Software-Defined WAN (SD-WAN) for enterprises, particularly in Business-to-Business (B2B). SD-WAN replaces existing Multi-Protocol Label Switching (MPLS) with multi-broadband internet with high bandwidth, encrypted with Virtual Private Network (VPN) IP Sec standard, and simplifies branch management with a single dashboard covering multiple branches. This study aims to evaluate the performance of deploying SD-WAN on mining enterprises' public links such as Direct Internet Access (DIA), fixed broadband, and 4G LTE, and private links, namely, Very Small Aperture Terminal (VSAT) and Multi-Protocol Layer Switching (MPLS), by utilizing SD-WAN's architecture and scenarios testing with the head office in Jakarta and branch office in Balikpapan. The results obtained that SD-WAN works appropriately when one of the multiple links is down. Meanwhile, when multiple links are down, the SD-WAN can still access a Voice over IP (VoIP) and video conference between the head office in Jakarta and a branch office in Balikpapan.
在过去的几十年里,互联网的使用一直是例外。因此,广域网(WAN)作为互联网最重要的传输媒介之一,已成为重要的基础设施,用于所有类型的数据中心间、企业和运营商网络。然而,由于企业数据向云的传输,未来的互联网流量正在发生变化。因此,传统的广域网连接将是不够的。一个可行的解决方案是为企业实现软件定义广域网(SD-WAN),特别是在企业对企业(B2B)中。SD-WAN以高带宽的多宽带互联网取代现有的多协议标签交换(MPLS),使用虚拟专用网(VPN) IP Sec标准加密,并通过单个仪表板覆盖多个分支机构来简化分支机构管理。本研究旨在通过SD-WAN的架构和在雅加达总部和巴厘巴潘分公司的场景测试,评估SD-WAN在矿业企业直接互联网接入(DIA)、固定宽带和4G LTE等公共链路以及在甚小孔径终端(VSAT)和多协议层交换(MPLS)等私有链路上部署的性能。结果表明,当多条链路中有一条链路断开时,SD-WAN可以正常工作。同时,当多条链路中断时,SD-WAN仍然可以访问雅加达总部和巴厘巴盘分支机构之间的VoIP和视频会议。
{"title":"Performance Evaluation of SD-WAN Deployment for XYZ Enterprise Company in Indonesia","authors":"Gemilang Kurniawan Soejantono, M. I. Nashiruddin, S. N. Hertiana, M. Nugraha","doi":"10.1109/iemcon53756.2021.9623170","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623170","url":null,"abstract":"Internet use has been exceptional during the previous several decades. As a result, Wide Area Network (WAN), employed in all types of inter-data center, enterprise, and carrier networks, has become a vital infrastructure since it serves as one of the internet's most crucial transmission mediums. However, due to the transfer of enterprise data to the cloud, internet traffic in the future is changing. As a result, traditional WAN connectivity will be inadequate. One of the viable solutions to this is to implement Software-Defined WAN (SD-WAN) for enterprises, particularly in Business-to-Business (B2B). SD-WAN replaces existing Multi-Protocol Label Switching (MPLS) with multi-broadband internet with high bandwidth, encrypted with Virtual Private Network (VPN) IP Sec standard, and simplifies branch management with a single dashboard covering multiple branches. This study aims to evaluate the performance of deploying SD-WAN on mining enterprises' public links such as Direct Internet Access (DIA), fixed broadband, and 4G LTE, and private links, namely, Very Small Aperture Terminal (VSAT) and Multi-Protocol Layer Switching (MPLS), by utilizing SD-WAN's architecture and scenarios testing with the head office in Jakarta and branch office in Balikpapan. The results obtained that SD-WAN works appropriately when one of the multiple links is down. Meanwhile, when multiple links are down, the SD-WAN can still access a Voice over IP (VoIP) and video conference between the head office in Jakarta and a branch office in Balikpapan.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129531125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Softmax Pooling for Super Visual Semantic Embedding* 用于超视觉语义嵌入的Softmax池*
Zhixian Zeng, Jianjun Cao, Nianfeng Weng, Guoquan Jiang, Yizhuo Rao, Yuxin Xu
The purpose of visual-semantic embedding is to respectively map image and text to a common embedding space and perform cross-modal semantic alignment learning. Image-text matching is also the main research content of visual semantic embedding. Existing researches have confirmed that in visual-semantic embedding, a simple pooling strategy can also achieve a good performance. However, the existing visual semantic pooling strategies (aggregators) generally have some problems, including adding additional training parameters, increasing training time, ignoring intra-modal semantic-related information, and so on. In this paper, we propose a Super Visual Semantic Embedding (SVSE) Model based on Softmax Pooling (SoftPool). We introduced the softmax pooling strategy into visual semantic embedding for the first time. SoftPool is not only simple to implement but also doesn't introduce new additional training parameters. It can adaptively calculate the weights between different feature values and preserve more intra-modal correlation information between different features. At the same time, we combine the enhanced semantic representation module and our softmax pooling strategy to construct the intra-modal semantic association, which is used to improve the performance of the visual semantic embedding in image-text matching. Undoubtedly, our proposed method possesses a higher engineering application value than other methods. Experiments are conducted on two widely used cross-modal image-text datasets, namely MS-COCO and Flickr-30K. Comparing with the best pooling strategy, our proposed softmax pooling strategy not only is better in training time but also outperforms by 0.48% (5K) on MS-COCO and 1.95% on Flickr-30K at R@1 (image retrieval). Moreover, comparing with the best visual semantic embedding model, our proposed SVSE outperforms by 2.83% (5K) on MS-COCO and 4.89% (1K) on Flickr-30K at R@1 (image retrieval), respectively. Our code is available at https://github.com/zengzhixian/SoftPool_SVSE.git.
视觉语义嵌入的目的是将图像和文本分别映射到一个共同的嵌入空间,并进行跨模态语义对齐学习。图像-文本匹配也是视觉语义嵌入的主要研究内容。已有研究证实,在视觉语义嵌入中,简单的池化策略也能取得良好的性能。然而,现有的视觉语义池策略(聚合器)普遍存在一些问题,包括增加额外的训练参数、增加训练时间、忽略模态内语义相关信息等。本文提出了一种基于Softmax池(SoftPool)的超视觉语义嵌入(SVSE)模型。首次将softmax池化策略引入到视觉语义嵌入中。SoftPool不仅易于实现,而且不会引入新的额外训练参数。它可以自适应计算不同特征值之间的权重,并保留更多不同特征之间的模态内相关信息。同时,我们将增强的语义表示模块与softmax池化策略相结合,构建模态内语义关联,用于提高图像-文本匹配中视觉语义嵌入的性能。毫无疑问,我们提出的方法比其他方法具有更高的工程应用价值。在MS-COCO和Flickr-30K两种广泛使用的跨模态图像-文本数据集上进行了实验。与最佳池化策略相比,我们提出的softmax池化策略不仅在训练时间上更好,而且在R@1(图像检索)上在MS-COCO上的性能优于0.48% (5K),在Flickr-30K上的性能优于1.95%。此外,与最佳视觉语义嵌入模型相比,我们提出的SVSE在MS-COCO和Flickr-30K上分别优于2.83% (5K)和4.89% (1K) (R@1(图像检索)。我们的代码可在https://github.com/zengzhixian/SoftPool_SVSE.git上获得。
{"title":"Softmax Pooling for Super Visual Semantic Embedding*","authors":"Zhixian Zeng, Jianjun Cao, Nianfeng Weng, Guoquan Jiang, Yizhuo Rao, Yuxin Xu","doi":"10.1109/iemcon53756.2021.9623131","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623131","url":null,"abstract":"The purpose of visual-semantic embedding is to respectively map image and text to a common embedding space and perform cross-modal semantic alignment learning. Image-text matching is also the main research content of visual semantic embedding. Existing researches have confirmed that in visual-semantic embedding, a simple pooling strategy can also achieve a good performance. However, the existing visual semantic pooling strategies (aggregators) generally have some problems, including adding additional training parameters, increasing training time, ignoring intra-modal semantic-related information, and so on. In this paper, we propose a Super Visual Semantic Embedding (SVSE) Model based on Softmax Pooling (SoftPool). We introduced the softmax pooling strategy into visual semantic embedding for the first time. SoftPool is not only simple to implement but also doesn't introduce new additional training parameters. It can adaptively calculate the weights between different feature values and preserve more intra-modal correlation information between different features. At the same time, we combine the enhanced semantic representation module and our softmax pooling strategy to construct the intra-modal semantic association, which is used to improve the performance of the visual semantic embedding in image-text matching. Undoubtedly, our proposed method possesses a higher engineering application value than other methods. Experiments are conducted on two widely used cross-modal image-text datasets, namely MS-COCO and Flickr-30K. Comparing with the best pooling strategy, our proposed softmax pooling strategy not only is better in training time but also outperforms by 0.48% (5K) on MS-COCO and 1.95% on Flickr-30K at R@1 (image retrieval). Moreover, comparing with the best visual semantic embedding model, our proposed SVSE outperforms by 2.83% (5K) on MS-COCO and 4.89% (1K) on Flickr-30K at R@1 (image retrieval), respectively. Our code is available at https://github.com/zengzhixian/SoftPool_SVSE.git.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128420938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mobile Application Based Teli-nutrition System for Covid-19 Pandemic 基于移动应用的Covid-19疫情远程营养系统
Taslima Akter Tamanna, S. Choudhury, Afsana, Mohammad Monirujjaman Khan
In Bangladesh, there is a shortage of legitimate nourishment data frameworks that can give fitting sustenance messages dependent on various rules for pregnant ladies and newborn children. Lack of healthy sustenance devastatingly affects people's wellbeing and prosperity and the monetary improvement of nations. Conversely, essential or tertiary health laborers couldn't offer vital assistance to them. With so many people becoming ill from the (COVID-19), poor weight control plans exacerbate pre-existing conditions, putting them at greater risk. Individuals living with chronic illnesses who have been diagnosed with COVID-19 must improve their mental health and count calories to ensure that they remain in good health. Look for direct and psychosocial support from suitably prepared wellbeing care experts, including community-based lay and peer guides. Venturing into nourishment counsel, advancing breastfeeding, and battling deception around COVID-19 transmission will offer assistance to protect the role of nutritious nourishment as a partner against sickness. Any health worker in Bangladesh can easily use this application. Our health laborers regularly neglect to convey legitimate nourishment data to moms. Such an instrument can be helpful in giving a proper method to show particular nourishment messages to mothers dependent on their wellbeing stages and dependent on their baby's age. The design of this application can provide a legitimate office for conveying sustenance messages to mothers and workers. This framework may have to be examined occasionally to meet the progression of client prerequisites and be applied properly.
在孟加拉国,缺乏合法的营养数据框架,无法根据各种规则为孕妇和新生儿提供合适的营养信息。缺乏健康的食物严重影响人们的福祉和繁荣以及国家的货币改善。相反,初级或三级卫生工作者无法为他们提供重要的帮助。随着如此多的人因COVID-19而生病,糟糕的体重控制计划加剧了已有的疾病,使他们面临更大的风险。被诊断患有COVID-19的慢性疾病患者必须改善心理健康并计算卡路里,以确保他们保持良好的健康。寻求准备适当的健康护理专家的直接和心理社会支持,包括以社区为基础的外行和同伴指导。开展营养咨询、促进母乳喂养和打击围绕COVID-19传播的欺骗行为,将有助于保护营养作为对抗疾病伙伴的作用。孟加拉国的任何卫生工作者都可以很容易地使用这个应用程序。我们的卫生工作者经常忽视向母亲传达合法的营养数据。这种工具可以帮助提供一种适当的方法,根据母亲的健康阶段和婴儿的年龄,向母亲显示特定的营养信息。该应用程序的设计可以为向母亲和工人传递营养信息提供一个合法的办公室。可能需要偶尔检查此框架,以满足客户端先决条件的进展并正确应用。
{"title":"Mobile Application Based Teli-nutrition System for Covid-19 Pandemic","authors":"Taslima Akter Tamanna, S. Choudhury, Afsana, Mohammad Monirujjaman Khan","doi":"10.1109/iemcon53756.2021.9623177","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623177","url":null,"abstract":"In Bangladesh, there is a shortage of legitimate nourishment data frameworks that can give fitting sustenance messages dependent on various rules for pregnant ladies and newborn children. Lack of healthy sustenance devastatingly affects people's wellbeing and prosperity and the monetary improvement of nations. Conversely, essential or tertiary health laborers couldn't offer vital assistance to them. With so many people becoming ill from the (COVID-19), poor weight control plans exacerbate pre-existing conditions, putting them at greater risk. Individuals living with chronic illnesses who have been diagnosed with COVID-19 must improve their mental health and count calories to ensure that they remain in good health. Look for direct and psychosocial support from suitably prepared wellbeing care experts, including community-based lay and peer guides. Venturing into nourishment counsel, advancing breastfeeding, and battling deception around COVID-19 transmission will offer assistance to protect the role of nutritious nourishment as a partner against sickness. Any health worker in Bangladesh can easily use this application. Our health laborers regularly neglect to convey legitimate nourishment data to moms. Such an instrument can be helpful in giving a proper method to show particular nourishment messages to mothers dependent on their wellbeing stages and dependent on their baby's age. The design of this application can provide a legitimate office for conveying sustenance messages to mothers and workers. This framework may have to be examined occasionally to meet the progression of client prerequisites and be applied properly.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127326729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1