首页 > 最新文献

2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)最新文献

英文 中文
EfficientNet for retinal blood vessel segmentation 高效网视网膜血管分割
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340135
M. Mathews, M. AnzarS., R. K. Krishnan, A. Panthakkan
Automated techniques for retinal vessel segmentation is an active research area for the past three decades. Features associated with retinal blood vessels like morphology, area, diameter, tortuosity are important to assess the onset and progression of many eye-related and cardiovascular diseases. For retinal vessel segmentation, we propose two deep neural networks: U-net with EfficientNet as the backbone and EfficientNet encoder with LinkNet decoder. Gamma adjustment and contrast limited histogram equalization is the pre-processing stages adopted. EfficientNetB3 with U-net provide significant improvement. Results are evaluated on benchmark fundus image datasets like DRIVE [1], STARE [2], HRF [3], and CHASE_DB1 [4]. The proposed architecture obtained 96.35% accuracy, 86.35% sensitivity, 97.67% specificity, and an F1 score of 0.8465 on the DRIVE dataset.
视网膜血管分割的自动化技术是近三十年来研究的热点。视网膜血管的形态、面积、直径、弯曲度等特征对于评估许多眼相关疾病和心血管疾病的发生和进展非常重要。对于视网膜血管分割,我们提出了两种深度神经网络:以效率网络为骨干的U-net和以LinkNet为解码器的效率网络编码器。灰度调整和对比度限制直方图均衡化是采用的预处理阶段。使用U-net的EfficientNetB3提供了显著的改进。在DRIVE[1]、STARE[2]、HRF[3]和CHASE_DB1[4]等基准眼底图像数据集上对结果进行评估。该架构在DRIVE数据集上的准确率为96.35%,灵敏度为86.35%,特异性为97.67%,F1得分为0.8465。
{"title":"EfficientNet for retinal blood vessel segmentation","authors":"M. Mathews, M. AnzarS., R. K. Krishnan, A. Panthakkan","doi":"10.1109/ICSPIS51252.2020.9340135","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340135","url":null,"abstract":"Automated techniques for retinal vessel segmentation is an active research area for the past three decades. Features associated with retinal blood vessels like morphology, area, diameter, tortuosity are important to assess the onset and progression of many eye-related and cardiovascular diseases. For retinal vessel segmentation, we propose two deep neural networks: U-net with EfficientNet as the backbone and EfficientNet encoder with LinkNet decoder. Gamma adjustment and contrast limited histogram equalization is the pre-processing stages adopted. EfficientNetB3 with U-net provide significant improvement. Results are evaluated on benchmark fundus image datasets like DRIVE [1], STARE [2], HRF [3], and CHASE_DB1 [4]. The proposed architecture obtained 96.35% accuracy, 86.35% sensitivity, 97.67% specificity, and an F1 score of 0.8465 on the DRIVE dataset.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"80 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125886835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Effect of Obstructive Sleep Apnea on the Cardiovascular Variability 阻塞性睡眠呼吸暂停对心血管变异性的影响
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340127
S. Sani
Sleep apnea is a serious medical condition that influence millions of adults and children in the United States. It is unknown whether or not sleep apnea can cause any abnormalities in cardiovascular variability in patients with no cardiovascular disease. In this study, we investigated new cardiovascular variables which correspond with obstructive sleep apnea. The power spectrum of the electrocardiogram signal (ECG) was studied in healthy aged-matched adults $boldsymbol{(mathrm{n}=15)}$ and patients diagnosed with moderate obstructive sleep apnea $boldsymbol{(mathrm{n}=15)}$. The power spectral analysis was divided into three main frequency bands: very low frequency $boldsymbol{(0.0033sim 0.04mathrm{Hz})}$; low frequency $boldsymbol{(0.04sim 0.15 mathrm{Hz})}$; and high frequency $boldsymbol{(0.15sim 0.4mathrm{Hz})}$. Frequency domain analysis revealed that the very low frequency component of the ECG signal was increased in obstructive sleep apnea patients during episodes of obstructive sleep apnea, whereas other frequencies (low and high frequency) showed no significant changes. This new cardiovascular variable can be used as a new important feature in any comprehensive obstructive sleep apnea prediction model (to increase the accuracy of the model) or in any other noninvasive approaches for diagnosing or monitoring obstructive sleep apnea at home.
睡眠呼吸暂停是一种严重的疾病,影响着美国数百万成年人和儿童。目前尚不清楚睡眠呼吸暂停是否会导致无心血管疾病患者的心血管变异性异常。在这项研究中,我们研究了与阻塞性睡眠呼吸暂停相关的新的心血管变量。研究年龄匹配的健康成人$boldsymbol{( mathm {n}=15)}$和诊断为中度阻塞性睡眠呼吸暂停$boldsymbol{( mathm {n}=15)}$的心电图信号功率谱。功率谱分析分为三个主要频段:极低频$boldsymbol{(0.0033sim 0.04mathrm{Hz})}$;低频$boldsymbol{(0.04sim 0.15 mathm {Hz})}$;高频$boldsymbol{(0.15sim 0.4 mathm {Hz})}$。频域分析显示,阻塞性睡眠呼吸暂停患者在发作期间心电信号的极低频分量增加,而其他频率(低频和高频)无明显变化。这一新的心血管变量可以作为任何综合性阻塞性睡眠呼吸暂停预测模型(以提高模型的准确性)或任何其他无创方法在家中诊断或监测阻塞性睡眠呼吸暂停的一个新的重要特征。
{"title":"The Effect of Obstructive Sleep Apnea on the Cardiovascular Variability","authors":"S. Sani","doi":"10.1109/ICSPIS51252.2020.9340127","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340127","url":null,"abstract":"Sleep apnea is a serious medical condition that influence millions of adults and children in the United States. It is unknown whether or not sleep apnea can cause any abnormalities in cardiovascular variability in patients with no cardiovascular disease. In this study, we investigated new cardiovascular variables which correspond with obstructive sleep apnea. The power spectrum of the electrocardiogram signal (ECG) was studied in healthy aged-matched adults $boldsymbol{(mathrm{n}=15)}$ and patients diagnosed with moderate obstructive sleep apnea $boldsymbol{(mathrm{n}=15)}$. The power spectral analysis was divided into three main frequency bands: very low frequency $boldsymbol{(0.0033sim 0.04mathrm{Hz})}$; low frequency $boldsymbol{(0.04sim 0.15 mathrm{Hz})}$; and high frequency $boldsymbol{(0.15sim 0.4mathrm{Hz})}$. Frequency domain analysis revealed that the very low frequency component of the ECG signal was increased in obstructive sleep apnea patients during episodes of obstructive sleep apnea, whereas other frequencies (low and high frequency) showed no significant changes. This new cardiovascular variable can be used as a new important feature in any comprehensive obstructive sleep apnea prediction model (to increase the accuracy of the model) or in any other noninvasive approaches for diagnosing or monitoring obstructive sleep apnea at home.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fighting Deepfake by Residual Noise Using Convolutional Neural Networks 利用卷积神经网络残差噪声对抗深度造假
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340138
M. Rai, Hussain Al-Ahmad, O. Gouda, Dina Jamal, M. A. Talib, Q. Nasir
In the last few years, the easy access to images and videos shared online have been continuously increased. The generative adversarial networks using deep learning leads to create very realistic deepfake videos by playing with the digital content of images and videos. The spread of such deepfake videos on social media networks urged the international community to consider seriously its danger and accordingly encouraged the researchers around the world to develop powerful deepfake detection methods. Many approaches are available in the recent literature. In this paper, the proposed approach is based on exploiting the residual noise which is the difference between original image and its denoised version. The study of residual noise has shown effectiveness in deep-fake detection with regards to its distinctive and discriminative features which can be effectively captured by convolutional neural networks with transfer learning. The performance of our approach is evaluated on two datasets: low-resolution video sequences of the FaceForensics++ and high-resolution videos from Kaggle Deepfake Detection challenge (DFDC). The obtained results show relevant accuracy in comparison with other competitive methods.
在过去的几年里,在网上分享图像和视频的方便访问不断增加。使用深度学习的生成式对抗网络可以通过处理图像和视频的数字内容来创建非常逼真的深度假视频。这种深度造假视频在社交网络上的传播,促使国际社会认真考虑其危险性,并相应地鼓励世界各地的研究人员开发强大的深度造假检测方法。在最近的文献中有许多可用的方法。本文提出的方法是基于利用残差噪声,即原始图像与去噪后的图像之间的差异。残差噪声的研究表明,残差噪声具有明显的判别性,可以通过卷积神经网络的迁移学习有效地捕获残差噪声。我们的方法在两个数据集上进行了性能评估:face取证++的低分辨率视频序列和Kaggle Deepfake Detection挑战(DFDC)的高分辨率视频。所得结果与其他竞争方法相比具有一定的准确性。
{"title":"Fighting Deepfake by Residual Noise Using Convolutional Neural Networks","authors":"M. Rai, Hussain Al-Ahmad, O. Gouda, Dina Jamal, M. A. Talib, Q. Nasir","doi":"10.1109/ICSPIS51252.2020.9340138","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340138","url":null,"abstract":"In the last few years, the easy access to images and videos shared online have been continuously increased. The generative adversarial networks using deep learning leads to create very realistic deepfake videos by playing with the digital content of images and videos. The spread of such deepfake videos on social media networks urged the international community to consider seriously its danger and accordingly encouraged the researchers around the world to develop powerful deepfake detection methods. Many approaches are available in the recent literature. In this paper, the proposed approach is based on exploiting the residual noise which is the difference between original image and its denoised version. The study of residual noise has shown effectiveness in deep-fake detection with regards to its distinctive and discriminative features which can be effectively captured by convolutional neural networks with transfer learning. The performance of our approach is evaluated on two datasets: low-resolution video sequences of the FaceForensics++ and high-resolution videos from Kaggle Deepfake Detection challenge (DFDC). The obtained results show relevant accuracy in comparison with other competitive methods.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130125636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Trusted Security Model for IDS Using Deep Learning 基于深度学习的IDS可信安全模型
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340136
K. Makdi, Frederick T. Sheldon, A. A. Hussein
Contemporarily, cloud computing is becoming the most preferred choice for IT firms because it offers flexibility and pay-per-use services. Nonetheless, privacy and security issues are significant challenges in the successful deployment of cloud computing attributed to its distributed and open architectures that are exposed to intrusions. The open and distributed structures of cloud computing are increasingly appealing to potential cybercriminals. Conventional intrusion detection systems are largely ineffective in the cloud computing environment because of their openness. This paper examines the deployment of novel intrusion detection systems involving a trust-based adaptive security model for intrusion detection through deep learning.
目前,云计算正成为IT公司的首选,因为它提供了灵活性和按使用付费的服务。尽管如此,隐私和安全问题是成功部署云计算的重大挑战,因为云计算的分布式和开放架构容易受到入侵。云计算的开放和分布式结构对潜在的网络罪犯越来越有吸引力。传统的入侵检测系统由于其开放性,在云计算环境下大多是无效的。本文研究了新型入侵检测系统的部署,其中包括基于信任的自适应安全模型,通过深度学习进行入侵检测。
{"title":"Trusted Security Model for IDS Using Deep Learning","authors":"K. Makdi, Frederick T. Sheldon, A. A. Hussein","doi":"10.1109/ICSPIS51252.2020.9340136","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340136","url":null,"abstract":"Contemporarily, cloud computing is becoming the most preferred choice for IT firms because it offers flexibility and pay-per-use services. Nonetheless, privacy and security issues are significant challenges in the successful deployment of cloud computing attributed to its distributed and open architectures that are exposed to intrusions. The open and distributed structures of cloud computing are increasingly appealing to potential cybercriminals. Conventional intrusion detection systems are largely ineffective in the cloud computing environment because of their openness. This paper examines the deployment of novel intrusion detection systems involving a trust-based adaptive security model for intrusion detection through deep learning.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128584572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Introducing a Mobile App to Increase Cybersecurity Awareness in MENA 引入移动应用程序以提高中东和北非地区的网络安全意识
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340128
Hadeel Mohammed Jawad, Samir Tout
Cybersecurity experts predict that cybersecurity is going to be the new cold war. Arab countries are exposed to cyber-attacks that are aimed at stealing personal data and trade secrets. Furthermore, statistics show that women in such countries are exposed to different forms of cyber violence. This paper introduces a new mobile app in the Arabic language to educate Arab-speaking people in the Middle East and North Africa (MENA) about cybersecurity and to increase their awareness of information assurance and cybercrimes. The app was developed for Android and iOS devices and it includes multiple-choice information assurance questions, terms, and articles. Examples of the term definitions are Two-Factor Authentication, Ethical Hacking, and Honeypot. The app data could be increased in the next update of the app.
网络安全专家预测,网络安全将成为新的冷战。阿拉伯国家面临着旨在窃取个人数据和商业机密的网络攻击。此外,统计数据显示,这些国家的妇女面临不同形式的网络暴力。本文介绍了一款新的阿拉伯语移动应用程序,用于教育中东和北非(MENA)的阿拉伯人有关网络安全的知识,并提高他们对信息保障和网络犯罪的认识。这款应用是为安卓和iOS设备开发的,它包括多项选择题、术语和文章。这些术语定义的例子有双因素认证、道德黑客和蜜罐。应用数据可能会在下次更新时增加。
{"title":"Introducing a Mobile App to Increase Cybersecurity Awareness in MENA","authors":"Hadeel Mohammed Jawad, Samir Tout","doi":"10.1109/ICSPIS51252.2020.9340128","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340128","url":null,"abstract":"Cybersecurity experts predict that cybersecurity is going to be the new cold war. Arab countries are exposed to cyber-attacks that are aimed at stealing personal data and trade secrets. Furthermore, statistics show that women in such countries are exposed to different forms of cyber violence. This paper introduces a new mobile app in the Arabic language to educate Arab-speaking people in the Middle East and North Africa (MENA) about cybersecurity and to increase their awareness of information assurance and cybercrimes. The app was developed for Android and iOS devices and it includes multiple-choice information assurance questions, terms, and articles. Examples of the term definitions are Two-Factor Authentication, Ethical Hacking, and Honeypot. The app data could be increased in the next update of the app.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116425305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability Assessment for IoT Nodes Using OpenBTS and Software Defined Radios 使用OpenBTS和软件定义无线电的物联网节点脆弱性评估
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340151
José de Jesús Rugeles Uribe, E. Guillén
Large-scale cyber attacks using IoT devices have increased in recent years. One of the strategies to deal with this problem is the use of penetration test techniques. The aim of this study was to develop a vulnerability assessment for an IoT M2M node that uses GSM technology. A test scenario was designed consisting of a GMS network created using USRP N210 and OpenBTS radios in a multicell configuration. An IoT-GSM node was designed from a sim8001 radio module, used in several M2M devices. The IoT node stores the measurements of the radio bases operational parameters that make up the GSM network. An algorithm for controlling an attacking base radio was designed using the OpenBTS API, which allows the deployment of a “man in the middle” attack. The entire test deployment can be carried out remotely. Analysis of the results of the measurements obtained lets us understand the attack's behavior in detail and determine the IoT-GSM node's vulnerability. The results obtained show the potential of SDR and OpenBTS technology as penetration test tools to analyze vulnerabilities of IoT systems.
近年来,使用物联网设备的大规模网络攻击有所增加。处理这个问题的策略之一是使用渗透测试技术。本研究的目的是为使用GSM技术的物联网M2M节点开发漏洞评估。设计了一个测试场景,包括在多小区配置中使用USRP N210和OpenBTS无线电创建的GMS网络。基于sim8001无线电模块设计了一个IoT-GSM节点,用于多个M2M设备。物联网节点存储构成GSM网络的无线电基站操作参数的测量值。使用OpenBTS API设计了一种控制攻击基础无线电的算法,该算法允许部署“中间人”攻击。整个测试部署可以远程执行。对获得的测量结果进行分析,可以让我们详细了解攻击行为,并确定IoT-GSM节点的脆弱性。获得的结果表明,SDR和OpenBTS技术作为渗透测试工具分析物联网系统漏洞的潜力。
{"title":"Vulnerability Assessment for IoT Nodes Using OpenBTS and Software Defined Radios","authors":"José de Jesús Rugeles Uribe, E. Guillén","doi":"10.1109/ICSPIS51252.2020.9340151","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340151","url":null,"abstract":"Large-scale cyber attacks using IoT devices have increased in recent years. One of the strategies to deal with this problem is the use of penetration test techniques. The aim of this study was to develop a vulnerability assessment for an IoT M2M node that uses GSM technology. A test scenario was designed consisting of a GMS network created using USRP N210 and OpenBTS radios in a multicell configuration. An IoT-GSM node was designed from a sim8001 radio module, used in several M2M devices. The IoT node stores the measurements of the radio bases operational parameters that make up the GSM network. An algorithm for controlling an attacking base radio was designed using the OpenBTS API, which allows the deployment of a “man in the middle” attack. The entire test deployment can be carried out remotely. Analysis of the results of the measurements obtained lets us understand the attack's behavior in detail and determine the IoT-GSM node's vulnerability. The results obtained show the potential of SDR and OpenBTS technology as penetration test tools to analyze vulnerabilities of IoT systems.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130066574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Discrete-Time Model of Fractional-Order PLL 分数阶锁相环的一种新的离散时间模型
Pub Date : 2020-11-25 DOI: 10.1109/icspis51252.2020.9340137
R. El-Khazali, S. Momani, I. Batiha
this work presents a new discrete-time fractional-order phase-locked loop (DTFoPLL). The new model is developed by introducing a 1st-order z-transfer function that approximates a dynamic fractional-order discrete-time integrator that depends on its fractional order. Such structure is used to realize both the discrete-time fractional-order filter (DTFoF) and a fractional-order digital controlled-oscillator (FoDCO) of the PLL. The flexibility of the design follows from choosing low-order PLLs (between $boldsymbol{0.1leqalphaleq 0.2)}$ that provides wider bandwidth and requires lower gains than its integer-order counter parts. The main points of this work are illustrated via numerical simulation.
提出了一种新的离散分数阶锁相环(DTFoPLL)。新模型是通过引入一阶z传递函数开发的,该函数近似于依赖于分数阶的动态分数阶离散时间积分器。该结构用于实现锁相环的离散分数阶滤波器(dtof)和分数阶数字控制振荡器(FoDCO)。设计的灵活性来自于选择低阶锁相环(在$boldsymbol{0.1leqalphaleq 0.2)}$之间),它提供更宽的带宽,并且需要比其整数阶计数器部件更低的增益。通过数值模拟说明了本文工作的要点。
{"title":"A New Discrete-Time Model of Fractional-Order PLL","authors":"R. El-Khazali, S. Momani, I. Batiha","doi":"10.1109/icspis51252.2020.9340137","DOIUrl":"https://doi.org/10.1109/icspis51252.2020.9340137","url":null,"abstract":"this work presents a new discrete-time fractional-order phase-locked loop (DTFoPLL). The new model is developed by introducing a 1st-order z-transfer function that approximates a dynamic fractional-order discrete-time integrator that depends on its fractional order. Such structure is used to realize both the discrete-time fractional-order filter (DTFoF) and a fractional-order digital controlled-oscillator (FoDCO) of the PLL. The flexibility of the design follows from choosing low-order PLLs (between $boldsymbol{0.1leqalphaleq 0.2)}$ that provides wider bandwidth and requires lower gains than its integer-order counter parts. The main points of this work are illustrated via numerical simulation.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"482 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116526590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1