首页 > 最新文献

Annals of Emerging Technologies in Computing最新文献

英文 中文
Detection of Lung Nodules on CT Images based on the Convolutional Neural Network with Attention Mechanism 基于注意机制卷积神经网络的CT肺结节检测
Q2 Computer Science Pub Date : 2021-04-01 DOI: 10.33166/AETIC.2021.02.007
Khai Dinh Lai, T. Nguyen, T. Le
The development of Computer-aided diagnosis (CAD) systems for automatic lung nodule detection through thoracic computed tomography (CT) scans has been an active area of research in recent years. Lung Nodule Analysis 2016 (LUNA16 challenge) encourages researchers to suggest a variety of successful nodule detection algorithms based on two key stages (1) candidates detection, (2) false-positive reduction. In the scope of this paper, a new convolutional neural network (CNN) architecture is proposed to efficiently solve the second challenge of LUNA16. Specifically, we find that typical CNN models pay little attention to the characteristics of input data, in order to address this constraint, we apply the attention-mechanism: propose a technique to attach Squeeze and Excitation-Block (SE-Block) after each convolution layer of CNN to emphasize important feature maps related to the characteristics of the input image - forming Attention sub-Convnet. The new CNN architecture is suggested by connecting the Attention sub-Convnets. In addition, we also analyze the selection of triplet loss or softmax loss functions to boost the rating performance of the proposed CNN. From the study, this is agreed to select softmax loss during the CNN training phase and triplet loss for the testing phase. Our suggested CNN is used to minimize the number of redundant candidates in order to improve the efficiency of false-positive reduction with the LUNA database. The results obtained in comparison to the previous models indicate the feasibility of the proposed model.
通过胸部计算机断层扫描(CT)自动检测肺结节的计算机辅助诊断(CAD)系统的开发是近年来研究的一个活跃领域。肺结节分析2016 (LUNA16挑战赛)鼓励研究人员基于两个关键阶段提出各种成功的结节检测算法(1)候选物检测(2)假阳性降低。在本文的范围内,提出了一种新的卷积神经网络(CNN)架构来有效地解决LUNA16的第二次挑战。具体来说,我们发现典型的CNN模型很少关注输入数据的特征,为了解决这一约束,我们应用了注意机制:提出了一种技术,在CNN的每个卷积层之后附加挤压和激励块(SE-Block),以强调与输入图像形成注意子卷积网络的特征相关的重要特征映射。通过连接注意力子convnets,提出了新的CNN架构。此外,我们还分析了三重损失或softmax损失函数的选择,以提高所提出的CNN的评级性能。从研究中,我们同意在CNN训练阶段选择softmax loss,在测试阶段选择triplet loss。我们建议使用CNN最小化冗余候选者的数量,以提高LUNA数据库的误报降低效率。与以往模型的比较结果表明了所提模型的可行性。
{"title":"Detection of Lung Nodules on CT Images based on the Convolutional Neural Network with Attention Mechanism","authors":"Khai Dinh Lai, T. Nguyen, T. Le","doi":"10.33166/AETIC.2021.02.007","DOIUrl":"https://doi.org/10.33166/AETIC.2021.02.007","url":null,"abstract":"The development of Computer-aided diagnosis (CAD) systems for automatic lung nodule detection through thoracic computed tomography (CT) scans has been an active area of research in recent years. Lung Nodule Analysis 2016 (LUNA16 challenge) encourages researchers to suggest a variety of successful nodule detection algorithms based on two key stages (1) candidates detection, (2) false-positive reduction. In the scope of this paper, a new convolutional neural network (CNN) architecture is proposed to efficiently solve the second challenge of LUNA16. Specifically, we find that typical CNN models pay little attention to the characteristics of input data, in order to address this constraint, we apply the attention-mechanism: propose a technique to attach Squeeze and Excitation-Block (SE-Block) after each convolution layer of CNN to emphasize important feature maps related to the characteristics of the input image - forming Attention sub-Convnet. The new CNN architecture is suggested by connecting the Attention sub-Convnets. In addition, we also analyze the selection of triplet loss or softmax loss functions to boost the rating performance of the proposed CNN. From the study, this is agreed to select softmax loss during the CNN training phase and triplet loss for the testing phase. Our suggested CNN is used to minimize the number of redundant candidates in order to improve the efficiency of false-positive reduction with the LUNA database. The results obtained in comparison to the previous models indicate the feasibility of the proposed model.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48529997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
FPGA Implementations of Algorithms for Preprocessing of High Frame Rate and High Resolution Image Streams in Real Time 高帧率和高分辨率图像流实时预处理算法的FPGA实现
Q2 Computer Science Pub Date : 2021-04-01 DOI: 10.33166/AETIC.2021.02.005
U. Hudomalj, C. Mandla, M. Plattner
This paper presents FPGA implementations of image filtering and image averaging – two widely applied image preprocessing algorithms. The implementations are targeted for real time processing of high frame rate and high resolution image streams. The developed implementations are evaluated in terms of resource usage, power consumption, and achievable frame rates. For the evaluation, Microsemi’s Smartfusion2 Advanced Development Kit is used. It includes a SmartFusion2 M2S150 SoC FPGA. The performance of the developed implementation of image filtering algorithm is compared to a solution provided by MATLAB’s Vision HDL Toolbox, which is evaluated on the same platform. The performance of the developed implementations are also compared with FPGA implementations found in existing publications, although those are evaluated on different FPGA platforms. Difficulties with performance comparison between implementations on different platforms are addressed and limitations of processing image streams with FPGA platforms discussed.
本文介绍了图像滤波和图像平均这两种广泛应用的图像预处理算法的FPGA实现。实现的目标是实时处理高帧率和高分辨率的图像流。开发的实现根据资源使用、功耗和可实现的帧速率进行评估。为了进行评估,使用了Microsemi的smartfusion高级开发工具包。它包括一个SmartFusion2 M2S150 SoC FPGA。将所开发的图像滤波算法的性能与MATLAB的Vision HDL工具箱提供的解决方案进行了比较,并在同一平台上进行了评估。开发的实现的性能也与现有出版物中的FPGA实现进行了比较,尽管这些实现是在不同的FPGA平台上进行评估的。讨论了不同平台上实现之间性能比较的困难,并讨论了FPGA平台处理图像流的局限性。
{"title":"FPGA Implementations of Algorithms for Preprocessing of High Frame Rate and High Resolution Image Streams in Real Time","authors":"U. Hudomalj, C. Mandla, M. Plattner","doi":"10.33166/AETIC.2021.02.005","DOIUrl":"https://doi.org/10.33166/AETIC.2021.02.005","url":null,"abstract":"This paper presents FPGA implementations of image filtering and image averaging – two widely applied image preprocessing algorithms. The implementations are targeted for real time processing of high frame rate and high resolution image streams. The developed implementations are evaluated in terms of resource usage, power consumption, and achievable frame rates. For the evaluation, Microsemi’s Smartfusion2 Advanced Development Kit is used. It includes a SmartFusion2 M2S150 SoC FPGA. The performance of the developed implementation of image filtering algorithm is compared to a solution provided by MATLAB’s Vision HDL Toolbox, which is evaluated on the same platform. The performance of the developed implementations are also compared with FPGA implementations found in existing publications, although those are evaluated on different FPGA platforms. Difficulties with performance comparison between implementations on different platforms are addressed and limitations of processing image streams with FPGA platforms discussed.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42699029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Support Vector Regression in Krylov Solvers 支持向量回归在Krylov解算器中的应用
Q2 Computer Science Pub Date : 2021-03-20 DOI: 10.33166/AETIC.2021.05.022
Rehana Thalib, M. Bakar, Nur Fadhilah Ibrahim
Support vector regression (SVR) is well known as a regression or prediction tool under the Machine Learning (ML) which preserves all the key features through the training data. Different from general prediction, here, we proposed SVR to predict the new approximate solutions after we generated some iterates using an iterative method called Lanczos algorithm, one class of Krylov solvers. As we know that all Krylov solvers, including Lanczos methods, for solving the high dimensions of systems of linear equations (SLEs) problems experiences breakdown which causes the sequence of the iterates is incomplete, or the good approximate solution is never reached. By assuming that some iterates exist after the breakdown, then we could predict what they are. It is realized by learning the previous iterates generated by the Lanczos solvers, which is also called the training data. The SVR is then used to predict the next iterate which is expected the sequence now has similar property as the previous one before breaking down. Furthermore, we implemented the hybrid SVR-Lanczos (or SVR-L) in the restarting frame work, then it is called as hybrid restarting-SVR-L. The idea behind the restarting is that one time running hybrid SVR-L cannot obtain a good approximate solution with small residual norm. By taking one iterate which is resulted by the hybrid SVR-L, putting it as the initial guess, will give us the better solution. To test our idea of prediction of SLEs solutions, we also used the regular regression and compared with the SVR. Numerical results are presented and compared between these two predictors. Lastly, we compared our proposed method with existing interpolation and extrapolation methods to predict the approximate solution of SLEs. The results showed that our restarting SVR-L performed better compared with the regular regression.
众所周知,支持向量回归(SVR)是机器学习(ML)下的一种回归或预测工具,它通过训练数据保留所有关键特征。与一般的预测不同,在这里,我们使用一种称为Lanczos算法的迭代方法(一类Krylov解算器)生成一些迭代后,提出了SVR来预测新的近似解。众所周知,所有用于求解高维线性方程组(SLEs)问题的Krylov解算器,包括Lanczos方法,都会经历崩溃,这会导致迭代序列不完整,或者永远无法达到良好的近似解。通过假设一些迭代在崩溃后存在,那么我们可以预测它们是什么。它是通过学习Lanczos解算器生成的先前迭代(也称为训练数据)来实现的。然后使用SVR来预测下一次迭代,预计序列现在与分解前的序列具有相似的属性。此外,我们在重启框架中实现了混合SVR-Lanczos(或SVR-L),称之为混合重启-SVR-L。重新启动背后的思想是,一次运行的混合SVR-L无法获得具有小残差范数的良好近似解。通过对混合SVR-L产生的一次迭代,将其作为初始猜测,将为我们提供更好的解决方案。为了验证我们对SLEs解的预测思想,我们还使用了正则回归并与SVR进行了比较。给出了这两个预测因子的数值结果并进行了比较。最后,我们将我们提出的方法与现有的插值和外推方法进行了比较,以预测SLEs的近似解。结果表明,与常规回归相比,我们的重新启动SVR-L表现更好。
{"title":"Application of Support Vector Regression in Krylov Solvers","authors":"Rehana Thalib, M. Bakar, Nur Fadhilah Ibrahim","doi":"10.33166/AETIC.2021.05.022","DOIUrl":"https://doi.org/10.33166/AETIC.2021.05.022","url":null,"abstract":"Support vector regression (SVR) is well known as a regression or prediction tool under the Machine Learning (ML) which preserves all the key features through the training data. Different from general prediction, here, we proposed SVR to predict the new approximate solutions after we generated some iterates using an iterative method called Lanczos algorithm, one class of Krylov solvers. As we know that all Krylov solvers, including Lanczos methods, for solving the high dimensions of systems of linear equations (SLEs) problems experiences breakdown which causes the sequence of the iterates is incomplete, or the good approximate solution is never reached. By assuming that some iterates exist after the breakdown, then we could predict what they are. It is realized by learning the previous iterates generated by the Lanczos solvers, which is also called the training data. The SVR is then used to predict the next iterate which is expected the sequence now has similar property as the previous one before breaking down. Furthermore, we implemented the hybrid SVR-Lanczos (or SVR-L) in the restarting frame work, then it is called as hybrid restarting-SVR-L. The idea behind the restarting is that one time running hybrid SVR-L cannot obtain a good approximate solution with small residual norm. By taking one iterate which is resulted by the hybrid SVR-L, putting it as the initial guess, will give us the better solution. To test our idea of prediction of SLEs solutions, we also used the regular regression and compared with the SVR. Numerical results are presented and compared between these two predictors. Lastly, we compared our proposed method with existing interpolation and extrapolation methods to predict the approximate solution of SLEs. The results showed that our restarting SVR-L performed better compared with the regular regression.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43615902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Machine Learning Approach for Improving the Performance of Network Intrusion Detection Systems 一种提高网络入侵检测系统性能的机器学习方法
Q2 Computer Science Pub Date : 2021-03-20 DOI: 10.33166/AETIC.2021.05.025
Adnan Helmi Azizan, S. Mostafa, Aida Mustapha, Cik Feresa Mohd Foozy, M. Wahab, M. Mohammed, Bashar Ahmad Khalaf
Intrusion detection systems (IDS) are used in analyzing huge data and diagnose anomaly traffic such as DDoS attack; thus, an efficient traffic classification method is necessary for the IDS. The IDS models attempt to decrease false alarm and increase true alarm rates in order to improve the performance accuracy of the system. To resolve this concern, three machine learning algorithms have been tested and evaluated in this research which are decision jungle (DJ), random forest (RF) and support vector machine (SVM). The main objective is to propose a ML-based network intrusion detection system (ML-based NIDS) model that compares the performance of the three algorithms based on their accuracy and precision of anomaly traffics. The knowledge discovery in databases (KDD) methodology and intrusion detection evaluation dataset (CIC-IDS2017) are used in the testing which both are considered as a benchmark in the evaluation of IDS. The average accuracy results of the SVM is 98.18%, RF is 96.76% and DJ is 96.50% in which the highest accuracy is achieved by the SVM. The average precision results of the SVM is 98.74, RF is 97.96 and DJ is 97.82 in which the SVM got a higher average precision compared with the other two algorithms. The average recall results of the SVM is 95.63, RF is 97.62 and DJ is 95.77 in which the RF achieves the highest average of recall than SVM and DJ. In overall, the SVM algorithm is found to be the best algorithm that can be used to detect an intrusion in the system.
入侵检测系统(IDS)用于分析海量数据和诊断DDoS攻击等异常流量;因此,一种有效的流量分类方法对于IDS来说是必要的。IDS模型试图减少误报并提高真实报警率,以提高系统的性能准确性。为了解决这一问题,本研究对决策丛林(DJ)、随机森林(RF)和支持向量机(SVM)三种机器学习算法进行了测试和评估。主要目标是提出一种基于ML的网络入侵检测系统(ML based NIDS)模型,该模型基于三种算法对异常流量的准确性和精度来比较它们的性能。测试中使用了数据库中的知识发现(KDD)方法和入侵检测评估数据集(CIC-IDS2017),这两种方法都被视为IDS评估的基准。SVM的平均准确率为98.18%,RF为96.76%,DJ为96.50%,其中SVM的准确率最高。SVM的平均精度为98.74,RF为97.96,DJ为97.82,与其他两种算法相比,SVM获得了更高的平均精度。SVM的平均召回率为95.63,RF为97.62,DJ为95.77,其中RF的召回率平均值高于SVM和DJ。总体而言,SVM算法是可用于检测系统中入侵的最佳算法。
{"title":"A Machine Learning Approach for Improving the Performance of Network Intrusion Detection Systems","authors":"Adnan Helmi Azizan, S. Mostafa, Aida Mustapha, Cik Feresa Mohd Foozy, M. Wahab, M. Mohammed, Bashar Ahmad Khalaf","doi":"10.33166/AETIC.2021.05.025","DOIUrl":"https://doi.org/10.33166/AETIC.2021.05.025","url":null,"abstract":"Intrusion detection systems (IDS) are used in analyzing huge data and diagnose anomaly traffic such as DDoS attack; thus, an efficient traffic classification method is necessary for the IDS. The IDS models attempt to decrease false alarm and increase true alarm rates in order to improve the performance accuracy of the system. To resolve this concern, three machine learning algorithms have been tested and evaluated in this research which are decision jungle (DJ), random forest (RF) and support vector machine (SVM). The main objective is to propose a ML-based network intrusion detection system (ML-based NIDS) model that compares the performance of the three algorithms based on their accuracy and precision of anomaly traffics. The knowledge discovery in databases (KDD) methodology and intrusion detection evaluation dataset (CIC-IDS2017) are used in the testing which both are considered as a benchmark in the evaluation of IDS. The average accuracy results of the SVM is 98.18%, RF is 96.76% and DJ is 96.50% in which the highest accuracy is achieved by the SVM. The average precision results of the SVM is 98.74, RF is 97.96 and DJ is 97.82 in which the SVM got a higher average precision compared with the other two algorithms. The average recall results of the SVM is 95.63, RF is 97.62 and DJ is 95.77 in which the RF achieves the highest average of recall than SVM and DJ. In overall, the SVM algorithm is found to be the best algorithm that can be used to detect an intrusion in the system.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45043426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Research Strategy: A Constructive Play for Anatomy Learning System Based on Human Finger Gestures on Holographic Display 研究策略:基于全息显示人体手指手势的解剖学学习系统的构建
Q2 Computer Science Pub Date : 2021-03-20 DOI: 10.33166/AETIC.2021.05.015
Ahmad Affandi Supli
Human anatomy is a biology field that studies human body which consists of intricate and complex piece of engineering in which every assembly has an important role. This subject is considered to be very complex and thus need an advanced technology to help users learning this course more effectively. In this study, we propose and report our research strategy and progress to build a constructive play on human anatomy system based on finger motion gesture of Leap Motion controller (LMC). This LMC device can detect hand gestures and fingers’ motion and translate it into interaction input. Then, we utilize holographic display to portray our 3D human anatomy as its output. In detail, the research strategy of this paper consists of research plan, general framework and general architecture of the developed system. Then, we also present our current development of constructive anatomy learning system. In this future, we will discuss in more detail about the development stage.
人体解剖学是研究人体的一个生物学领域,人体是由错综复杂的工程部件组成的,其中每个部件都起着重要的作用。这个主题被认为是非常复杂的,因此需要一个先进的技术来帮助用户更有效地学习这门课程。在本研究中,我们提出并报告了我们的研究策略和进展,以建立一个基于Leap motion controller (LMC)手指运动手势的人体解剖学系统。这个LMC设备可以检测手势和手指的运动,并将其转化为交互输入。然后,我们利用全息显示来描绘我们的3D人体解剖作为其输出。具体而言,本文的研究策略包括研究计划、总体框架和开发系统的总体架构。在此基础上,介绍了我国建构性解剖学学习系统的发展现状。在未来,我们将更详细地讨论开发阶段。
{"title":"Research Strategy: A Constructive Play for Anatomy Learning System Based on Human Finger Gestures on Holographic Display","authors":"Ahmad Affandi Supli","doi":"10.33166/AETIC.2021.05.015","DOIUrl":"https://doi.org/10.33166/AETIC.2021.05.015","url":null,"abstract":"Human anatomy is a biology field that studies human body which consists of intricate and complex piece of engineering in which every assembly has an important role. This subject is considered to be very complex and thus need an advanced technology to help users learning this course more effectively. In this study, we propose and report our research strategy and progress to build a constructive play on human anatomy system based on finger motion gesture of Leap Motion controller (LMC). This LMC device can detect hand gestures and fingers’ motion and translate it into interaction input. Then, we utilize holographic display to portray our 3D human anatomy as its output. In detail, the research strategy of this paper consists of research plan, general framework and general architecture of the developed system. Then, we also present our current development of constructive anatomy learning system. In this future, we will discuss in more detail about the development stage.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42128831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emerging Technologies in Computing: 4th EAI/IAER International Conference, iCETiC 2021, Virtual Event, August 18–19, 2021, Proceedings 计算中的新兴技术:第四届EAI/IAER国际会议,iCETiC 2021,虚拟事件,2021年8月18-19日,论文集
Q2 Computer Science Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-90016-8
{"title":"Emerging Technologies in Computing: 4th EAI/IAER International Conference, iCETiC 2021, Virtual Event, August 18–19, 2021, Proceedings","authors":"","doi":"10.1007/978-3-030-90016-8","DOIUrl":"https://doi.org/10.1007/978-3-030-90016-8","url":null,"abstract":"","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":"307 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83329998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Study of Various Parameters during Speed Control of Three-phase Induction Motor Using GPIC and LabVIEW 基于GPIC和LabVIEW的三相异步电动机调速过程中各种参数的实验研究
Q2 Computer Science Pub Date : 2021-01-01 DOI: 10.33166/10.33166/aetic.2021.01.005
Adnan Ahmed, Abdul Majeed Shaikh, Muhammad Fawad Shaikh, S. Shaikh, J. Soomro
Induction motors are widely used from home to industrial applications. Speed of induction motor plays important role, so to control the speed of induction motor various techniques are adopted and one of these techniques is V/F control, which is adopted in this paper. This technique helps to control the speed in open control system in RPM. Moreover, Control is designed in LabVIEW, it is quite helpful to develop the circuit graphically and code is automatically written in the background to run on Field Programmable Gate Array (FPGA). The aim of this research is to study the impacts on diverse parameters during speed control of three phase induction machine with manipulation of GPIC. Solar technology is used as input source to drive the General-Purpose Inverter Controller (GPIC). Apart of this, impacts of modulation index and carrier frequency influencing the active, reactive and apparent power, temperature and power quality and current overshoot is analysed. MATLAB/Simulink and LabVIEW tools are used for simulation and results along with GPIC, Induction motor and solar panel as hardware.
感应电动机从家庭到工业应用都有广泛的应用。感应电动机的转速起着重要的作用,因此,为了控制感应电动机的速度,采用了各种技术,其中一种技术就是本文所采用的V/F控制。该技术有助于在转速为RPM的开放式控制系统中控制转速。此外,Control是在LabVIEW中设计的,它有助于图形化地开发电路,并在后台自动编写代码以在现场可编程门阵列(FPGA)上运行。本研究的目的是研究GPIC操作对三相异步电机速度控制过程中各种参数的影响。太阳能技术被用作驱动通用逆变器控制器(GPIC)的输入源。此外,还分析了调制指数和载波频率对有功、无功和视在功率、温度和电能质量以及电流过冲的影响。使用MATLAB/Simulink和LabVIEW工具,以GPIC、感应电机和太阳能电池板为硬件进行仿真和结果分析。
{"title":"Experimental Study of Various Parameters during Speed Control of Three-phase Induction Motor Using GPIC and LabVIEW","authors":"Adnan Ahmed, Abdul Majeed Shaikh, Muhammad Fawad Shaikh, S. Shaikh, J. Soomro","doi":"10.33166/10.33166/aetic.2021.01.005","DOIUrl":"https://doi.org/10.33166/10.33166/aetic.2021.01.005","url":null,"abstract":"Induction motors are widely used from home to industrial applications. Speed of induction motor plays important role, so to control the speed of induction motor various techniques are adopted and one of these techniques is V/F control, which is adopted in this paper. This technique helps to control the speed in open control system in RPM. Moreover, Control is designed in LabVIEW, it is quite helpful to develop the circuit graphically and code is automatically written in the background to run on Field Programmable Gate Array (FPGA). The aim of this research is to study the impacts on diverse parameters during speed control of three phase induction machine with manipulation of GPIC. Solar technology is used as input source to drive the General-Purpose Inverter Controller (GPIC). Apart of this, impacts of modulation index and carrier frequency influencing the active, reactive and apparent power, temperature and power quality and current overshoot is analysed. MATLAB/Simulink and LabVIEW tools are used for simulation and results along with GPIC, Induction motor and solar panel as hardware.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42416437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel DDoS Attack-aware Smart Backup Controller Placement in SDN Design SDN设计中一种新的DDoS攻击感知智能备份控制器布局
Q2 Computer Science Pub Date : 2020-12-20 DOI: 10.33166/aetic.2020.05.005
Muhammad Reazul Haque, S. C. Tan, Z. Yusoff, K. Nisar, C. K. Lee, R. Kaspin, B. S. Chowdhry, S. Ali, Shuaib K. Memon
Security issues like Distributed Denial of Service (DDoS) attacks are becoming the main threat for Software-Defined Networking (SDN). Controller placement is a fundamental factor in the design and planning of SDN infrastructure. The controller could be seen as a single dot of failure for the whole SDN and it's the alluring point for DDoS attack. Single controller placement implies a single point of SDN control. So, there is a very high chance to fail the entire network topology as the controller associated with all switches. As a result, legitimate clients won't have the capacity to use SDN services. This is the reason why the controller is the suitable center dot of attack for the aggressor. To protect SDN from this type of single purpose of failure, it is essential to place multiple smart backup controllers to guarantee the SDN operation. In this paper, we propose a novel Integer Linear Programming (ILP) model to optimize the security issue by placing powerful smart backup controller. Result obtained from the simulation shows that our proposed novel ILP model can suggest single or multiple smart backup controller placement to support several ordinary victim controllers which has the capacity to save the cost of multiple ordinary controllers by sharing link, maximum new flows per second of controller and port, etc.
分布式拒绝服务(DDoS)攻击等安全问题正成为软件定义网络(SDN)的主要威胁。控制器布局是SDN基础设施设计和规划的一个基本因素。控制器可以被视为整个SDN的一个故障点,这是DDoS攻击的诱惑点。单控制器布局意味着SDN控制的单点。因此,作为与所有交换机相关联的控制器,整个网络拓扑发生故障的可能性非常高。因此,合法客户端将无法使用SDN服务。这就是为什么控制器是侵略者合适的攻击中心点的原因。为了保护SDN免受这种单一目的故障的影响,必须放置多个智能备份控制器来保证SDN的运行。在本文中,我们提出了一种新的整数线性规划(ILP)模型,通过放置强大的智能备份控制器来优化安全问题。仿真结果表明,我们提出的新ILP模型可以建议放置单个或多个智能备份控制器来支持几个普通的受害控制器,该模型通过共享链路、控制器和端口的每秒最大新流量等方式来节省多个普通控制器的成本。
{"title":"A Novel DDoS Attack-aware Smart Backup Controller Placement in SDN Design","authors":"Muhammad Reazul Haque, S. C. Tan, Z. Yusoff, K. Nisar, C. K. Lee, R. Kaspin, B. S. Chowdhry, S. Ali, Shuaib K. Memon","doi":"10.33166/aetic.2020.05.005","DOIUrl":"https://doi.org/10.33166/aetic.2020.05.005","url":null,"abstract":"Security issues like Distributed Denial of Service (DDoS) attacks are becoming the main threat for Software-Defined Networking (SDN). Controller placement is a fundamental factor in the design and planning of SDN infrastructure. The controller could be seen as a single dot of failure for the whole SDN and it's the alluring point for DDoS attack. Single controller placement implies a single point of SDN control. So, there is a very high chance to fail the entire network topology as the controller associated with all switches. As a result, legitimate clients won't have the capacity to use SDN services. This is the reason why the controller is the suitable center dot of attack for the aggressor. To protect SDN from this type of single purpose of failure, it is essential to place multiple smart backup controllers to guarantee the SDN operation. In this paper, we propose a novel Integer Linear Programming (ILP) model to optimize the security issue by placing powerful smart backup controller. Result obtained from the simulation shows that our proposed novel ILP model can suggest single or multiple smart backup controller placement to support several ordinary victim controllers which has the capacity to save the cost of multiple ordinary controllers by sharing link, maximum new flows per second of controller and port, etc.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46671309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed Intelligence at the Edge on IoT Networks 物联网网络边缘的分布式智能
Q2 Computer Science Pub Date : 2020-12-20 DOI: 10.33166/aetic.2020.05.001
Tanweer Alam, Baha Rababah, Arshad Ali, S. Qamar
The Internet of Things (IoT) has revolutionized innovation to collect and store the information received from physical objects or sensors. The smart devices are linked to a repository that stores intelligent information executed by sensors on IoT-based smart objects. Now, the IoT is shifted from knowledge-based technologies to operational-based technologies. The IoT integrates sensors, smart devices, and a smart grid of implementations to deliver smart strategies. Nowadays, the IoT has been pondered to be an essential technology. The transmission of information to or from the cloud has recently been found to cause many network problems to include latency, power usage, security, privacy, etc. The distributed intelligence enables IoT to help the correct communication available at the correct time and correct place. Distributed Intelligence could strengthen the IoT in a variety of ways, including evaluating the integration of different big data or enhancing efficiency and distribution in huge IoT operations. While evaluating distributed intelligence in the IoT paradigm, the implementation of distributed intelligence services should take into consideration the transmission delay and bandwidth requirements of the network. In this article, the distributed intelligence at the Edge on IoT Networks, applications, opportunities, challenges and future scopes have been presented.
物联网(IoT)在收集和存储从物理对象或传感器接收的信息方面进行了革命性的创新。智能设备链接到一个存储库,该存储库存储由基于物联网的智能对象上的传感器执行的智能信息。现在,物联网正从基于知识的技术转向基于操作的技术。物联网集成了传感器、智能设备和智能实施网格,以提供智能战略。如今,物联网被认为是一项必不可少的技术。最近发现,云之间的信息传输会导致许多网络问题,包括延迟、功耗、安全性、隐私等。分布式智能使物联网能够帮助在正确的时间和地点进行正确的通信。分布式智能可以通过多种方式加强物联网,包括评估不同大数据的集成,或提高大型物联网运营的效率和分布。在物联网范式中评估分布式智能时,分布式智能服务的实施应考虑网络的传输延迟和带宽要求。本文介绍了物联网网络边缘的分布式智能、应用、机遇、挑战和未来范围。
{"title":"Distributed Intelligence at the Edge on IoT Networks","authors":"Tanweer Alam, Baha Rababah, Arshad Ali, S. Qamar","doi":"10.33166/aetic.2020.05.001","DOIUrl":"https://doi.org/10.33166/aetic.2020.05.001","url":null,"abstract":"The Internet of Things (IoT) has revolutionized innovation to collect and store the information received from physical objects or sensors. The smart devices are linked to a repository that stores intelligent information executed by sensors on IoT-based smart objects. Now, the IoT is shifted from knowledge-based technologies to operational-based technologies. The IoT integrates sensors, smart devices, and a smart grid of implementations to deliver smart strategies. Nowadays, the IoT has been pondered to be an essential technology. The transmission of information to or from the cloud has recently been found to cause many network problems to include latency, power usage, security, privacy, etc. The distributed intelligence enables IoT to help the correct communication available at the correct time and correct place. Distributed Intelligence could strengthen the IoT in a variety of ways, including evaluating the integration of different big data or enhancing efficiency and distribution in huge IoT operations. While evaluating distributed intelligence in the IoT paradigm, the implementation of distributed intelligence services should take into consideration the transmission delay and bandwidth requirements of the network. In this article, the distributed intelligence at the Edge on IoT Networks, applications, opportunities, challenges and future scopes have been presented.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41800740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Hybrid Intrusion Detection System (IDS) for the Detection of Internet of Things (IoT) Network Attacks 一种用于检测物联网网络攻击的新型混合入侵检测系统
Q2 Computer Science Pub Date : 2020-12-20 DOI: 10.33166/aetic.2020.05.004
R. Ramadan, Kusum Yadav
Nowadays, IoT has been widely used in different applications to improve the quality of life. However, the IoT becomes increasingly an ideal target for unauthorized attacks due to its large number of objects, openness, and distributed nature. Therefore, to maintain the security of IoT systems, there is a need for an efficient Intrusion Detection System (IDS). IDS implements detectors that continuously monitor the network traffic. There are various IDs methods proposed in the literature for IoT security. However, the existing methods had the disadvantages in terms of detection accuracy and time overhead. To enhance the IDS detection accuracy and reduces the required time, this paper proposes a hybrid IDS system where a pre-processing phase is utilized to reduce the required time and feature selection as well as the classification is done in a separate stage. The feature selection process is done by using the Enhanced Shuffled Frog Leaping (ESFL) algorithm and the selected features are classified using Light Convolutional Neural Network with Gated Recurrent Neural Network (LCNN-GRNN) algorithm. This two-stage method is compared to up-to-date methods used for intrusion detection and it over performs them in terms of accuracy and running time due to the light processing required by the proposed method.
如今,物联网已被广泛应用于不同的应用中,以提高生活质量。然而,物联网由于其对象数量大、开放性和分布式特性,越来越成为未经授权攻击的理想目标。因此,为了维护物联网系统的安全,需要一种高效的入侵检测系统(IDS)。IDS实现了持续监控网络流量的检测器。文献中提出了各种用于物联网安全的ID方法。然而,现有的方法在检测精度和时间开销方面存在缺点。为了提高IDS检测的准确性并减少所需的时间,本文提出了一种混合IDS系统,其中利用预处理阶段来减少所需时间,并在单独的阶段中进行特征选择和分类。特征选择过程通过使用增强的Shuffled Frog Leaping(ESFL)算法来完成,并且所选择的特征使用带有门控递归神经网络的光卷积神经网络(LCNN-GRNN)算法来分类。将这种两阶段方法与用于入侵检测的最新方法进行了比较,并且由于所提出的方法所需的光处理,它在准确性和运行时间方面优于它们。
{"title":"A Novel Hybrid Intrusion Detection System (IDS) for the Detection of Internet of Things (IoT) Network Attacks","authors":"R. Ramadan, Kusum Yadav","doi":"10.33166/aetic.2020.05.004","DOIUrl":"https://doi.org/10.33166/aetic.2020.05.004","url":null,"abstract":"Nowadays, IoT has been widely used in different applications to improve the quality of life. However, the IoT becomes increasingly an ideal target for unauthorized attacks due to its large number of objects, openness, and distributed nature. Therefore, to maintain the security of IoT systems, there is a need for an efficient Intrusion Detection System (IDS). IDS implements detectors that continuously monitor the network traffic. There are various IDs methods proposed in the literature for IoT security. However, the existing methods had the disadvantages in terms of detection accuracy and time overhead. To enhance the IDS detection accuracy and reduces the required time, this paper proposes a hybrid IDS system where a pre-processing phase is utilized to reduce the required time and feature selection as well as the classification is done in a separate stage. The feature selection process is done by using the Enhanced Shuffled Frog Leaping (ESFL) algorithm and the selected features are classified using Light Convolutional Neural Network with Gated Recurrent Neural Network (LCNN-GRNN) algorithm. This two-stage method is compared to up-to-date methods used for intrusion detection and it over performs them in terms of accuracy and running time due to the light processing required by the proposed method.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48889018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Annals of Emerging Technologies in Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1