Pub Date : 2022-07-08DOI: 10.1109/CONECCT55679.2022.9865707
Vandana G S, Bethi Pardhasaradhi, P. Srihari
Target detection and tracking using optical and radar sensors have many applications in surveillance. As the optical sensor helps to visualize the target and the radar can provide its range and velocity, their combination results in useful information for continuous monitoring and coherence. This paper presents a radar-camera experimental setup to detect and track intruders in a restricted area. A real-time experiment with different target speeds and various radar cross-sections(RCS) (1. A person running, 2. A cyclist, and 3. A motorcyclist). We deployed a 77GHz IWR1642BOOST FMCW (Frequency Modulated Continuous Wave) radar module as a radar unit and a phone camera with an aperture of f/1.79 as an optical sensor. The data collected from the radar and camera sensor are applied to detection and tracking modules to obtain target tracks. The radar provides the observations of range, Doppler, and angle information. These observations are used to estimate the state of the target via extended Kalman filtering(EKF), dBscan clustering, and global nearest neighbor(GNN) association, followed by track maintenance. The optical sensor provides video frames as input and output tracks via foreground detection, blob analysis, motion-based detection, Kalman filtering, and track maintenance. The experimental result shows that combining radar and optical sensors accomplishes tracking accuracy and coherence in target detection and tracking.
{"title":"Intruder Detection and Tracking using 77GHz FMCW Radar and Camera Data","authors":"Vandana G S, Bethi Pardhasaradhi, P. Srihari","doi":"10.1109/CONECCT55679.2022.9865707","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865707","url":null,"abstract":"Target detection and tracking using optical and radar sensors have many applications in surveillance. As the optical sensor helps to visualize the target and the radar can provide its range and velocity, their combination results in useful information for continuous monitoring and coherence. This paper presents a radar-camera experimental setup to detect and track intruders in a restricted area. A real-time experiment with different target speeds and various radar cross-sections(RCS) (1. A person running, 2. A cyclist, and 3. A motorcyclist). We deployed a 77GHz IWR1642BOOST FMCW (Frequency Modulated Continuous Wave) radar module as a radar unit and a phone camera with an aperture of f/1.79 as an optical sensor. The data collected from the radar and camera sensor are applied to detection and tracking modules to obtain target tracks. The radar provides the observations of range, Doppler, and angle information. These observations are used to estimate the state of the target via extended Kalman filtering(EKF), dBscan clustering, and global nearest neighbor(GNN) association, followed by track maintenance. The optical sensor provides video frames as input and output tracks via foreground detection, blob analysis, motion-based detection, Kalman filtering, and track maintenance. The experimental result shows that combining radar and optical sensors accomplishes tracking accuracy and coherence in target detection and tracking.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"57 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130696220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-08DOI: 10.1109/CONECCT55679.2022.9865786
Anjali Kadambi, Ravi Kadlimatti
This paper introduces polyphase good code sets based on frequency-shifted linear FM (LFM) waveforms. It is shown that the entire set can be received using a single extended matched filter, constructed by extending the LFM slope on either side and can detect the higher energy distribution within the filter before summation (i.e., the Hadamard product). This higher energy distribution location gives the frequency shift that could identify a particular set member or the Doppler shift of an LFM based polyphase code. The result is Doppler detection of an LFM based polyphase code or detection of a polyphase good code set consisting of frequency-shifted LFM waveforms. The frequency offset between the different members of the set is chosen such that the Doppler shifts of the individual code members could also be detected. It is shown that such good code sets could be constructed with polyphase codes based on up- chirps and down-chirps of varying slopes, which would require a bank of extended matched filters, one for each slope.
{"title":"Doppler Detection Capable Polyphase Good Code Sets Based on Linear FM Waveforms for MIMO Radar","authors":"Anjali Kadambi, Ravi Kadlimatti","doi":"10.1109/CONECCT55679.2022.9865786","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865786","url":null,"abstract":"This paper introduces polyphase good code sets based on frequency-shifted linear FM (LFM) waveforms. It is shown that the entire set can be received using a single extended matched filter, constructed by extending the LFM slope on either side and can detect the higher energy distribution within the filter before summation (i.e., the Hadamard product). This higher energy distribution location gives the frequency shift that could identify a particular set member or the Doppler shift of an LFM based polyphase code. The result is Doppler detection of an LFM based polyphase code or detection of a polyphase good code set consisting of frequency-shifted LFM waveforms. The frequency offset between the different members of the set is chosen such that the Doppler shifts of the individual code members could also be detected. It is shown that such good code sets could be constructed with polyphase codes based on up- chirps and down-chirps of varying slopes, which would require a bank of extended matched filters, one for each slope.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Conventional squint mode ω-k algorithm requires higher memory and processing time to generate synthetic aperture radar (SAR) images in the case of a large range to scene center, high squint, and large swath. The high memory and processing time requirements make the algorithm the least preferred solution to implement in real-time SAR image generation on multi-core processor hardware. This paper presents various real-time implementation problems associated with conventional squint mode ω-k algorithm implementation. This paper presents a squint ω-k algorithm with a modified time-domain reference function generation approach to mitigate the multi-core processor’s processing time and memory requirement problems for real-time SAR image generation. The proposed method is implemented on real-time hardware and validated on real SAR data for 1-meter and 3-meter resolutions.
{"title":"Squint SAR Algorithm for Real-Time SAR Imaging","authors":"Peeyush Sahay, Vaidya DhavalKumar B., Kadali Lokesh Kiran","doi":"10.1109/CONECCT55679.2022.9865811","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865811","url":null,"abstract":"Conventional squint mode ω-k algorithm requires higher memory and processing time to generate synthetic aperture radar (SAR) images in the case of a large range to scene center, high squint, and large swath. The high memory and processing time requirements make the algorithm the least preferred solution to implement in real-time SAR image generation on multi-core processor hardware. This paper presents various real-time implementation problems associated with conventional squint mode ω-k algorithm implementation. This paper presents a squint ω-k algorithm with a modified time-domain reference function generation approach to mitigate the multi-core processor’s processing time and memory requirement problems for real-time SAR image generation. The proposed method is implemented on real-time hardware and validated on real SAR data for 1-meter and 3-meter resolutions.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130048907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-08DOI: 10.1109/CONECCT55679.2022.9865814
Sarosh Ahmad, Shuvra Barua, Y. A. Sheikh
The notion of a compressed size wearable flexible antenna for off-body links for wireless body area network (WBAN) applications is presented in this study. This proposed antenna resonates at 24.125GHz in the industrial, scientific and medical (ISM) band. The proposed antenna is a monopole antenna mounted on a Roger substrate with a modified ground that compresses the antenna profile. The ISM band was chosen because of its flexibility in terms of large bandwidth and modest antenna size. This antenna's key feature is its tiny size and flexibility, which makes it ideal for off-body transmission. The Rogers RO3010 is utilized as a substrate with dimensions of (8×6×0.12) mm3 and a loss tangent of 0.0022. When an antenna is placed near a human body, its performance, such as S11 and bandwidth, is reduced, and the results show that the compressed size antenna has a negligible influence when compared to rectangular antennas. This antenna has been shrunk and built for use in off-body communications. Furthermore, we will aim to improve the proposed antenna's gain and bandwidth, as well as the return loss when it is near a real phantom.
{"title":"A Simple Monopole ISM Band Antenna for On-body Wireless Communication in the Milimetre-Wave range","authors":"Sarosh Ahmad, Shuvra Barua, Y. A. Sheikh","doi":"10.1109/CONECCT55679.2022.9865814","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865814","url":null,"abstract":"The notion of a compressed size wearable flexible antenna for off-body links for wireless body area network (WBAN) applications is presented in this study. This proposed antenna resonates at 24.125GHz in the industrial, scientific and medical (ISM) band. The proposed antenna is a monopole antenna mounted on a Roger substrate with a modified ground that compresses the antenna profile. The ISM band was chosen because of its flexibility in terms of large bandwidth and modest antenna size. This antenna's key feature is its tiny size and flexibility, which makes it ideal for off-body transmission. The Rogers RO3010 is utilized as a substrate with dimensions of (8×6×0.12) mm3 and a loss tangent of 0.0022. When an antenna is placed near a human body, its performance, such as S11 and bandwidth, is reduced, and the results show that the compressed size antenna has a negligible influence when compared to rectangular antennas. This antenna has been shrunk and built for use in off-body communications. Furthermore, we will aim to improve the proposed antenna's gain and bandwidth, as well as the return loss when it is near a real phantom.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-08DOI: 10.1109/CONECCT55679.2022.9865753
G. S, Akshat Anand, Astha Vijayvargiya, Pushpalatha M, Vaishnavi Moorthy, Sumit Kumar, Harichandana Bss
Smart wearables have played an integral part in our day to day life.From recording ECG signals to analysing body fat composition,the smart wearables can do it all. The smart devices encompass various sensors which can be employed to derive meaningful information regarding the user’s physical and psychological conditions.Our approach focuses on employing such sensors to identify and obtain the variations in the mood of a user at a given instance through the use of supervised ma-chine learning techniques.The study examines the performance of various supervised learning models such as Decision Trees, Random Forests, XGBoost, LightGBM on the dataset. With our proposed model, we obtained a high recognition rate of 92.5% using XGBoost and LightGBM for 9 different emotion classes.By utilizing this, we aim to improvise and suggest methods to aid emotion recognition for better mental health analysis and mood monitoring.
{"title":"EmoSens: Emotion Recognition based on Sensor data analysis using LightGBM","authors":"G. S, Akshat Anand, Astha Vijayvargiya, Pushpalatha M, Vaishnavi Moorthy, Sumit Kumar, Harichandana Bss","doi":"10.1109/CONECCT55679.2022.9865753","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865753","url":null,"abstract":"Smart wearables have played an integral part in our day to day life.From recording ECG signals to analysing body fat composition,the smart wearables can do it all. The smart devices encompass various sensors which can be employed to derive meaningful information regarding the user’s physical and psychological conditions.Our approach focuses on employing such sensors to identify and obtain the variations in the mood of a user at a given instance through the use of supervised ma-chine learning techniques.The study examines the performance of various supervised learning models such as Decision Trees, Random Forests, XGBoost, LightGBM on the dataset. With our proposed model, we obtained a high recognition rate of 92.5% using XGBoost and LightGBM for 9 different emotion classes.By utilizing this, we aim to improvise and suggest methods to aid emotion recognition for better mental health analysis and mood monitoring.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-08DOI: 10.1109/CONECCT55679.2022.9865817
Arunabha Majumder, Debadrata Sarkar, Sagnik Chakraborty, Abhijit Singh, S. Roy, Aman Arora
The pneumatic artificial muscle (PAM) is considered one of the most preferred actuators in a variety of robotic and industrial applications. However, due to their inherent nonlinearities and hysteretic properties, they are difficult to model and the controller’s design becomes more sophisticated. The position control problem of a PAM having different regions of operations at various axial loads is considered in this paper. A neural network-based gain scheduled proportional-integral-derivative (PID-NN) control scheme has been synthesized and compared to the classical linear PID controllers. The PID gains for different operating regions at different loads are determined using Zeigler Nichols sustained oscillation method. These sets of PID gains are then used to determine the neural network (NN) model that schedules them based on the region of operations and axial loads. To validate the efficacy of the proposed control scheme with regards to different step inputs and a sinusoidal input reference tracking performance, experimental studies are conducted, and comparisons have been made with the PID controller. The experimental results for position control confirm the efficacy of the proposed control strategy.
{"title":"Neural Network-Based Gain Scheduled Position Control of a Pneumatic Artificial Muscle","authors":"Arunabha Majumder, Debadrata Sarkar, Sagnik Chakraborty, Abhijit Singh, S. Roy, Aman Arora","doi":"10.1109/CONECCT55679.2022.9865817","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865817","url":null,"abstract":"The pneumatic artificial muscle (PAM) is considered one of the most preferred actuators in a variety of robotic and industrial applications. However, due to their inherent nonlinearities and hysteretic properties, they are difficult to model and the controller’s design becomes more sophisticated. The position control problem of a PAM having different regions of operations at various axial loads is considered in this paper. A neural network-based gain scheduled proportional-integral-derivative (PID-NN) control scheme has been synthesized and compared to the classical linear PID controllers. The PID gains for different operating regions at different loads are determined using Zeigler Nichols sustained oscillation method. These sets of PID gains are then used to determine the neural network (NN) model that schedules them based on the region of operations and axial loads. To validate the efficacy of the proposed control scheme with regards to different step inputs and a sinusoidal input reference tracking performance, experimental studies are conducted, and comparisons have been made with the PID controller. The experimental results for position control confirm the efficacy of the proposed control strategy.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127643479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-08DOI: 10.1109/CONECCT55679.2022.9865113
Dhruti Ranjan Gaan, M. Kumar, Dinakarn E, S. S
Stepper motors are widely used in precise positioning applications because of their ease of use, open loop control, almost constant torque output throughout the operating range and simplified control circuitry. A lot of improvement has been done in drive schemes of these stepper motors; implementation of microstepping to improve positional accuracy and to reduce disturbance torque in compared to full step; Pulse Width Modulation (PWM) mode of current control to counter back Electro-Motive-Force (EMF) voltage loss etc. In microstepping mode, stepper motor is driven with quantized sine and cosine currents. Due to these varying current generations, signal integrity issues within its own circuitry as well as to the neighboring circuits come to forefront. This paper describes PWM mode of microstepping drive using Field Programmable Gate Array (FPGA), N-MOSFET (Metal-Oxide- Semiconductor-Field-Effect-Transistor) & MOSFET drivers, signal integrity issues observed during motor operations & high current switching and best practices to tackle these issues. Logic signals are generated in FPGA. Microstepping current amplitude values are stored in PROM which are being accessed by FPGA and written to DAC for voltage reference. This paper presents the design, layout implementation, analysis, signal integrity issues, mitigation techniques and experimental results of multiple motor drives.
{"title":"Signal Integrity Issues in FPGA based multi-motor microstepping Drives","authors":"Dhruti Ranjan Gaan, M. Kumar, Dinakarn E, S. S","doi":"10.1109/CONECCT55679.2022.9865113","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865113","url":null,"abstract":"Stepper motors are widely used in precise positioning applications because of their ease of use, open loop control, almost constant torque output throughout the operating range and simplified control circuitry. A lot of improvement has been done in drive schemes of these stepper motors; implementation of microstepping to improve positional accuracy and to reduce disturbance torque in compared to full step; Pulse Width Modulation (PWM) mode of current control to counter back Electro-Motive-Force (EMF) voltage loss etc. In microstepping mode, stepper motor is driven with quantized sine and cosine currents. Due to these varying current generations, signal integrity issues within its own circuitry as well as to the neighboring circuits come to forefront. This paper describes PWM mode of microstepping drive using Field Programmable Gate Array (FPGA), N-MOSFET (Metal-Oxide- Semiconductor-Field-Effect-Transistor) & MOSFET drivers, signal integrity issues observed during motor operations & high current switching and best practices to tackle these issues. Logic signals are generated in FPGA. Microstepping current amplitude values are stored in PROM which are being accessed by FPGA and written to DAC for voltage reference. This paper presents the design, layout implementation, analysis, signal integrity issues, mitigation techniques and experimental results of multiple motor drives.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"79 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113991687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-08DOI: 10.1109/CONECCT55679.2022.9865841
Arjun Thangaraju, Cory E. Merkel
The paper aims to take a deep dive into one of the emerging fields in Deep Learning namely, Adversarial attacks and defenses. We will first see what we mean when we talk of Adversarial examples and learn why they are important? After this, we will explore different types of Adversarial attacks and defenses. Here, we specifically tackle the cases associated with Image Classification. This is done by delving into their respective concepts along with understanding the tools and frameworks required to execute them. The implementation of the FGSM (Fast Gradient Signed Method) attack and the effectiveness of the Adversarial training defense to combat it are discussed. This is done by first analyzing the drop in accuracy from performing the FGSM attack on a MNIST CNN (Convolutional Neural Network) classifier followed by an improvement in the same accuracy metric by defending against the attack using the Adversarial training defense.
{"title":"Exploring Adversarial Attacks and Defenses in Deep Learning","authors":"Arjun Thangaraju, Cory E. Merkel","doi":"10.1109/CONECCT55679.2022.9865841","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865841","url":null,"abstract":"The paper aims to take a deep dive into one of the emerging fields in Deep Learning namely, Adversarial attacks and defenses. We will first see what we mean when we talk of Adversarial examples and learn why they are important? After this, we will explore different types of Adversarial attacks and defenses. Here, we specifically tackle the cases associated with Image Classification. This is done by delving into their respective concepts along with understanding the tools and frameworks required to execute them. The implementation of the FGSM (Fast Gradient Signed Method) attack and the effectiveness of the Adversarial training defense to combat it are discussed. This is done by first analyzing the drop in accuracy from performing the FGSM attack on a MNIST CNN (Convolutional Neural Network) classifier followed by an improvement in the same accuracy metric by defending against the attack using the Adversarial training defense.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121932319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-08DOI: 10.1109/CONECCT55679.2022.9865743
Ravish Kumar Ojha, Koduru Suresh
Scanning devices are commonly used in warehouses or POS [Point of Sale terminals] to speed up data entry tasks and to minimize manual errors while recording the entries into the system. Users working with scanning devices to scan materials or packages usually perform the scanning activity in a large set of transactions each workday. The person working with the scanning device needs to do this activity in a repeated manner, continuously and with minimal deviations to optimize the performance output and efficiently manage the workload. Organizations look for ways to further optimize the processing time(s) to move the inventory faster while reducing the number of steps [iterations] to complete the scanning activity for a given set of activities. In this paper, a methodology that is designed and developed to optimize the scanning activity is being highlighted. Furthermore, an efficient way to pack, move the inventory faster, reduce the number of iterations and a performance evaluation is carried out with traditional approaches.
{"title":"Efficient Scanning and Packaging of Shipments in Industries","authors":"Ravish Kumar Ojha, Koduru Suresh","doi":"10.1109/CONECCT55679.2022.9865743","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865743","url":null,"abstract":"Scanning devices are commonly used in warehouses or POS [Point of Sale terminals] to speed up data entry tasks and to minimize manual errors while recording the entries into the system. Users working with scanning devices to scan materials or packages usually perform the scanning activity in a large set of transactions each workday. The person working with the scanning device needs to do this activity in a repeated manner, continuously and with minimal deviations to optimize the performance output and efficiently manage the workload. Organizations look for ways to further optimize the processing time(s) to move the inventory faster while reducing the number of steps [iterations] to complete the scanning activity for a given set of activities. In this paper, a methodology that is designed and developed to optimize the scanning activity is being highlighted. Furthermore, an efficient way to pack, move the inventory faster, reduce the number of iterations and a performance evaluation is carried out with traditional approaches.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128498406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-08DOI: 10.1109/CONECCT55679.2022.9865767
S. Sayeeshwari, E. Prabhu
Buffer overflow attack in FPGAs is a persisting problem in the industry and various solutions to mitigate these vulnerabilities are continuously being addressed by manufacturers. A simple and effective mitigation method is proposed and simulated in Vivado using Verilog codes. Checking of bounds of the buffer memory, accompanied by using minimalistic number of logic gates as an encryption method, was simulated and demonstrated to successfully function as a strong countermeasure to this vulnerability.
{"title":"A simple countermeasure to mitigate buffer overflow attack using minimalistic hardware-integrated software simulation for FPGA","authors":"S. Sayeeshwari, E. Prabhu","doi":"10.1109/CONECCT55679.2022.9865767","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865767","url":null,"abstract":"Buffer overflow attack in FPGAs is a persisting problem in the industry and various solutions to mitigate these vulnerabilities are continuously being addressed by manufacturers. A simple and effective mitigation method is proposed and simulated in Vivado using Verilog codes. Checking of bounds of the buffer memory, accompanied by using minimalistic number of logic gates as an encryption method, was simulated and demonstrated to successfully function as a strong countermeasure to this vulnerability.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128722057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}