首页 > 最新文献

International Journal of Electrical and Computer Engineering最新文献

英文 中文
A miniature tunable quadrature shadow oscillator with orthogonal control 一种具有正交控制的微型可调谐正交影振荡器
Q2 Computer Science Pub Date : 2023-10-01 DOI: 10.11591/ijece.v13i5.pp4966-4978
S. Buakaew, C. Wongtaychatham
This article presents a new design of a quadrature shadow oscillator. The oscillator is realized using one input and two outputs of a second-order filter cell together with external amplifiers in a feedback configuration. The oscillation characteristics are controlled via the external gain without disturbing the internal filter cell, following the concept of the shadow oscillator. The proposed circuit configuration is simple with a small component-count. It consists of, two voltage-different transconductance amplifiers (VDTAs) along with a couple of passive elements. The frequency of oscillation (FO) and the condition of oscillation (CO) are controlled orthogonally via the dc bias current and external gain. Moreover, with the addition of the external gain, the frequency range of oscillation can be further extended. The proposed work is verified by computer simulation with the use of 180 nm complementary metal–oxide–semiconductor (CMOS) model parameters. The simulation gives satisfactory results of two sinusoidal output signals in quadrature with some small total harmonic distortions (THD). In addition, a circuit experiment is performed using the commercial operational transconductance amplifiers LM13700 as the active components. The circuit experiment also demonstrates satisfactory outcome which confirms the validity of the proposed circuit.
本文提出了一种新的正交阴影振荡器的设计。振荡器使用二阶滤波器单元的一个输入和两个输出以及反馈配置中的外部放大器来实现。振荡特性通过外部增益控制,而不干扰内部滤波器单元,遵循阴影振荡器的概念。所提出的电路配置简单,元件数量少。它由两个电压不同的跨导放大器(VDTA)以及一对无源元件组成。振荡频率(FO)和振荡条件(CO)通过直流偏置电流和外部增益进行正交控制。此外,通过增加外部增益,可以进一步扩展振荡的频率范围。使用180 nm互补金属-氧化物-半导体(CMOS)模型参数通过计算机模拟验证了所提出的工作。仿真结果表明,两个正弦正交输出信号具有较小的总谐波失真(THD)。此外,使用商用运算跨导放大器LM13700作为有源部件进行电路实验。电路实验也证明了令人满意的结果,证实了所提出电路的有效性。
{"title":"A miniature tunable quadrature shadow oscillator with orthogonal control","authors":"S. Buakaew, C. Wongtaychatham","doi":"10.11591/ijece.v13i5.pp4966-4978","DOIUrl":"https://doi.org/10.11591/ijece.v13i5.pp4966-4978","url":null,"abstract":"This article presents a new design of a quadrature shadow oscillator. The oscillator is realized using one input and two outputs of a second-order filter cell together with external amplifiers in a feedback configuration. The oscillation characteristics are controlled via the external gain without disturbing the internal filter cell, following the concept of the shadow oscillator. The proposed circuit configuration is simple with a small component-count. It consists of, two voltage-different transconductance amplifiers (VDTAs) along with a couple of passive elements. The frequency of oscillation (FO) and the condition of oscillation (CO) are controlled orthogonally via the dc bias current and external gain. Moreover, with the addition of the external gain, the frequency range of oscillation can be further extended. The proposed work is verified by computer simulation with the use of 180 nm complementary metal–oxide–semiconductor (CMOS) model parameters. The simulation gives satisfactory results of two sinusoidal output signals in quadrature with some small total harmonic distortions (THD). In addition, a circuit experiment is performed using the commercial operational transconductance amplifiers LM13700 as the active components. The circuit experiment also demonstrates satisfactory outcome which confirms the validity of the proposed circuit.","PeriodicalId":38060,"journal":{"name":"International Journal of Electrical and Computer Engineering","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49184780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secured authentication of radio-frequency identification system using PRESENT block cipher 基于PRESENT分组密码的射频识别系统安全认证
Q2 Computer Science Pub Date : 2023-10-01 DOI: 10.11591/ijece.v13i5.pp5462-5471
Bharathi Ramachandra, Smitha Elsa Peter
The internet of things (IoT) is an emerging and robust technology to interconnect billions of objects or devices via the internet to communicate smartly. The radio frequency identification (RFID) system plays a significant role in IoT systems, providing most features like mutual establishment, key establishment, and data confidentiality. This manuscript designed secure authentication of IoT-based RFID systems using the light-weight PRESENT algorithm on the hardware platform. The PRESENT-256 block cipher is considered in this work, and it supports 64-bit data with a 256-key length. The PRESENT-80/128 cipher is also designed along with PRESENT-256 at electronic codebook (ECB) mode for Secured mutual authentication between RFID tag and reader for IoT applications. The secured authentication is established in two stages: Tag recognition from reader, mutual authentication between tag and reader using PRESENT-80/128/256 cipher modules. The complete secured authentication of IoT-based RFID system simulation results is verified using the chip-scope tool with field-programmable gate array (FPGA) results. The comparative results for PRESENT block cipher with existing PRESENT ciphers and other light-weight algorithms are analyzed with resource improvements. The proposed secured authentication work is compared with similar RFID-mutual authentication (MA) approaches with better chip area and frequency improvements.
物联网(IoT)是一种新兴且强大的技术,通过互联网将数十亿个物体或设备互连,以进行智能通信。射频识别(RFID)系统在物联网系统中发挥着重要作用,提供了相互建立、密钥建立和数据保密等大部分功能。本文在硬件平台上使用轻量级的PRESENT算法设计了基于物联网的RFID系统的安全认证。本工作考虑了PRESENT-256分组密码,它支持256密钥长度的64位数据。在电子码本(ECB)模式下,PRESENT-80/128密码也与PRESENT-256一起设计,用于物联网应用的RFID标签和读取器之间的安全相互认证。安全认证分为两个阶段:来自读取器的标签识别,标签和读取器之间使用PRESENT-80/128/256密码模块的相互认证。使用芯片示波器工具和现场可编程门阵列(FPGA)结果验证了基于物联网的RFID系统仿真结果的完整安全认证。分析了PRESENT分组密码与现有PRESENT密码和其他轻量级算法的比较结果,并对资源进行了改进。将所提出的安全认证工作与具有更好芯片面积和频率改进的类似RFID相互认证(MA)方法进行了比较。
{"title":"Secured authentication of radio-frequency identification system using PRESENT block cipher","authors":"Bharathi Ramachandra, Smitha Elsa Peter","doi":"10.11591/ijece.v13i5.pp5462-5471","DOIUrl":"https://doi.org/10.11591/ijece.v13i5.pp5462-5471","url":null,"abstract":"The internet of things (IoT) is an emerging and robust technology to interconnect billions of objects or devices via the internet to communicate smartly. The radio frequency identification (RFID) system plays a significant role in IoT systems, providing most features like mutual establishment, key establishment, and data confidentiality. This manuscript designed secure authentication of IoT-based RFID systems using the light-weight PRESENT algorithm on the hardware platform. The PRESENT-256 block cipher is considered in this work, and it supports 64-bit data with a 256-key length. The PRESENT-80/128 cipher is also designed along with PRESENT-256 at electronic codebook (ECB) mode for Secured mutual authentication between RFID tag and reader for IoT applications. The secured authentication is established in two stages: Tag recognition from reader, mutual authentication between tag and reader using PRESENT-80/128/256 cipher modules. The complete secured authentication of IoT-based RFID system simulation results is verified using the chip-scope tool with field-programmable gate array (FPGA) results. The comparative results for PRESENT block cipher with existing PRESENT ciphers and other light-weight algorithms are analyzed with resource improvements. The proposed secured authentication work is compared with similar RFID-mutual authentication (MA) approaches with better chip area and frequency improvements.","PeriodicalId":38060,"journal":{"name":"International Journal of Electrical and Computer Engineering","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43365832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A thermally aware performance analysis of quantum cellular automata logic gates 量子元胞自动机逻辑门的热感知性能分析
Q2 Computer Science Pub Date : 2023-10-01 DOI: 10.11591/ijece.v13i5.pp4987-4995
Sujatha Kotte, Ganapavarapu Kanaka Durga
The high-performance digital circuits can be constructed at high operating frequency, reduced power dissipation, portability, and large density. Using conventional complementary-metal-oxide-semiconductor (CMOS) design process, it is quite difficult to achieve ultra-high-speed circuits due to scaling problems. Recently quantum dot cellular automata (QCA) are prosed to develop logic circuits at atomic level. In this paper, we analyzed the performance of QCA circuits under different temperature effects and observed that polarization of the cells is highly sensitive to temperature. In case of the 3-input majority gate the cell polarization drops to 50% with an increase in the temperature of 18 K and for 5 input majority gate the cell polarization drops more quickly than the 3-input majority. Further, the performance of majority gates also compared in terms of area and power dissipation. It has been noticed that the proposed logic gates can also be used for developing simple and complex and memory circuits.
高性能的数字电路可以构建在高工作频率,低功耗,便携性和大密度。采用传统的互补金属氧化物半导体(CMOS)设计工艺,由于缩放问题,很难实现超高速电路。近年来,量子点元胞自动机(QCA)被提出用于在原子水平上开发逻辑电路。在本文中,我们分析了QCA电路在不同温度效应下的性能,发现电池的极化对温度非常敏感。在3输入多数门的情况下,随着温度的升高,细胞极化下降到50%,而在5输入多数门的情况下,细胞极化下降的速度比3输入多数更快。此外,在面积和功耗方面也比较了大多数门的性能。已经注意到,所提出的逻辑门也可以用于开发简单和复杂的存储电路。
{"title":"A thermally aware performance analysis of quantum cellular automata logic gates","authors":"Sujatha Kotte, Ganapavarapu Kanaka Durga","doi":"10.11591/ijece.v13i5.pp4987-4995","DOIUrl":"https://doi.org/10.11591/ijece.v13i5.pp4987-4995","url":null,"abstract":"The high-performance digital circuits can be constructed at high operating frequency, reduced power dissipation, portability, and large density. Using conventional complementary-metal-oxide-semiconductor (CMOS) design process, it is quite difficult to achieve ultra-high-speed circuits due to scaling problems. Recently quantum dot cellular automata (QCA) are prosed to develop logic circuits at atomic level. In this paper, we analyzed the performance of QCA circuits under different temperature effects and observed that polarization of the cells is highly sensitive to temperature. In case of the 3-input majority gate the cell polarization drops to 50% with an increase in the temperature of 18 K and for 5 input majority gate the cell polarization drops more quickly than the 3-input majority. Further, the performance of majority gates also compared in terms of area and power dissipation. It has been noticed that the proposed logic gates can also be used for developing simple and complex and memory circuits.","PeriodicalId":38060,"journal":{"name":"International Journal of Electrical and Computer Engineering","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41475013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and risk analysis in the cloud with software defined networking architecture 使用软件定义的网络架构进行云中的安全和风险分析
Q2 Computer Science Pub Date : 2023-10-01 DOI: 10.11591/ijece.v13i5.pp5550-5559
Venkata Nagaraju Thatha, S. Donepudi, M. Safali, S. P. Praveen, Nguyen Trong Tung, Nguyen Ha Huy Cuong
Cloud computing has emerged as the actual trend in business information technology service models, since it provides processing that is both cost-effective and scalable. Enterprise networks are adopting software-defined networking (SDN) for network management flexibility and lower operating costs. Information technology (IT) services for enterprises tend to use both technologies. Yet, the effects of cloud computing and software defined networking on business network security are unclear. This study addresses this crucial issue. In a business network that uses both technologies, we start by looking at security, namely distributed denial-of-service (DDoS) attack defensive methods. SDN technology may help organizations protect against DDoS assaults provided the defensive architecture is structured appropriately. To mitigate DDoS attacks, we offer a highly configurable network monitoring and flexible control framework. We present a dataset shift-resistant graphic model-based attack detection system for the new architecture. The simulation findings demonstrate that our architecture can efficiently meet the security concerns of the new network paradigm and that our attack detection system can report numerous threats using real-world network data.
云计算已经成为业务信息技术服务模型的实际趋势,因为它提供了既经济高效又可扩展的处理。为了提高网络管理的灵活性和降低运营成本,企业网络正在采用软件定义网络(SDN)。面向企业的信息技术(IT)服务倾向于使用这两种技术。然而,云计算和软件定义网络对商业网络安全的影响尚不清楚。这项研究解决了这个关键问题。在使用这两种技术的业务网络中,我们首先查看安全性,即分布式拒绝服务(DDoS)攻击防御方法。如果防御体系结构合理,SDN技术可以帮助组织抵御DDoS攻击。为了减轻DDoS攻击,我们提供了一个高度可配置的网络监控和灵活的控制框架。针对新架构,我们提出了一种抗数据集移位的基于图形模型的攻击检测系统。仿真结果表明,我们的架构可以有效地满足新网络范式的安全问题,并且我们的攻击检测系统可以使用真实网络数据报告多种威胁。
{"title":"Security and risk analysis in the cloud with software defined networking architecture","authors":"Venkata Nagaraju Thatha, S. Donepudi, M. Safali, S. P. Praveen, Nguyen Trong Tung, Nguyen Ha Huy Cuong","doi":"10.11591/ijece.v13i5.pp5550-5559","DOIUrl":"https://doi.org/10.11591/ijece.v13i5.pp5550-5559","url":null,"abstract":"Cloud computing has emerged as the actual trend in business information technology service models, since it provides processing that is both cost-effective and scalable. Enterprise networks are adopting software-defined networking (SDN) for network management flexibility and lower operating costs. Information technology (IT) services for enterprises tend to use both technologies. Yet, the effects of cloud computing and software defined networking on business network security are unclear. This study addresses this crucial issue. In a business network that uses both technologies, we start by looking at security, namely distributed denial-of-service (DDoS) attack defensive methods. SDN technology may help organizations protect against DDoS assaults provided the defensive architecture is structured appropriately. To mitigate DDoS attacks, we offer a highly configurable network monitoring and flexible control framework. We present a dataset shift-resistant graphic model-based attack detection system for the new architecture. The simulation findings demonstrate that our architecture can efficiently meet the security concerns of the new network paradigm and that our attack detection system can report numerous threats using real-world network data.","PeriodicalId":38060,"journal":{"name":"International Journal of Electrical and Computer Engineering","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42735309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying textural Law’s masks to images using machine learning 使用机器学习将纹理定律的掩模应用于图像
Q2 Computer Science Pub Date : 2023-10-01 DOI: 10.11591/ijece.v13i5.pp5569-5575
G. Abdikerimova, M. Yessenova, A.Ye. Yerzhanova, Zhanat Manbetova, G. Murzabekova, D. Kaibassova, Roza Bekbayeva, Madina Aldashova
Currently, artificial neural networks are experiencing a rebirth, which is primarily due to the increase in the computing power of modern computers and the emergence of very large training data sets available in global networks. The article considers Laws texture masks as weights for a machine-learning algorithm for clustering aerospace images. The use of Laws texture masks in machine learning can help in the analysis of the textural characteristics of objects in the image, which are further identified as pockets of weeds. When solving problems in applied areas, in particular in the field of agriculture, there are often problems associated with small sample sizes of images obtained from aerospace and unmanned aerial vehicles and insufficient quality of the source material for training. This determines the relevance of research and development of new methods and algorithms for classifying crop damage. The purpose of the work is to use the method of texture masks of Laws in machine learning for automated processing of high-resolution images in the case of small samples using the example of problems of segmentation and classification of the nature of damage to crops.
目前,人工神经网络正在经历重生,这主要是由于现代计算机计算能力的提高以及全球网络中出现了非常大的训练数据集。本文将Laws纹理掩模视为用于航空航天图像聚类的机器学习算法的权重。在机器学习中使用Laws纹理掩模可以帮助分析图像中物体的纹理特征,这些物体被进一步识别为杂草袋。在解决应用领域,特别是农业领域的问题时,经常会出现从航空航天和无人机获得的图像样本量小以及训练源材料质量不足的问题。这决定了研究和开发新的作物损伤分类方法和算法的相关性。这项工作的目的是利用机器学习中的纹理掩模方法,在小样本的情况下,以作物损伤性质的分割和分类问题为例,自动处理高分辨率图像。
{"title":"Applying textural Law’s masks to images using machine learning","authors":"G. Abdikerimova, M. Yessenova, A.Ye. Yerzhanova, Zhanat Manbetova, G. Murzabekova, D. Kaibassova, Roza Bekbayeva, Madina Aldashova","doi":"10.11591/ijece.v13i5.pp5569-5575","DOIUrl":"https://doi.org/10.11591/ijece.v13i5.pp5569-5575","url":null,"abstract":"Currently, artificial neural networks are experiencing a rebirth, which is primarily due to the increase in the computing power of modern computers and the emergence of very large training data sets available in global networks. The article considers Laws texture masks as weights for a machine-learning algorithm for clustering aerospace images. The use of Laws texture masks in machine learning can help in the analysis of the textural characteristics of objects in the image, which are further identified as pockets of weeds. When solving problems in applied areas, in particular in the field of agriculture, there are often problems associated with small sample sizes of images obtained from aerospace and unmanned aerial vehicles and insufficient quality of the source material for training. This determines the relevance of research and development of new methods and algorithms for classifying crop damage. The purpose of the work is to use the method of texture masks of Laws in machine learning for automated processing of high-resolution images in the case of small samples using the example of problems of segmentation and classification of the nature of damage to crops.","PeriodicalId":38060,"journal":{"name":"International Journal of Electrical and Computer Engineering","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48012010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Brain cone beam computed tomography image analysis using ResNet50 for collateral circulation classification 使用ResNet50进行侧支循环分类的脑锥束计算机断层扫描图像分析
Q2 Computer Science Pub Date : 2023-10-01 DOI: 10.11591/ijece.v13i5.pp5843-5852
Nur Hasanah Ali, A. Abdullah, N. Saad, A. Muda
Treatment of stroke patients can be effectively carried out with the help of collateral circulation performance. Collateral circulation scoring as it is now used is dependent on visual inspection, which can lead to an inter- and intra-rater discrepancy. In this study, a collateral circulation classification using the ResNet50 was analyzed by using cone beam computed tomography (CBCT) images for the ischemic stroke patient. The remarkable performance of deep learning classification helps neuroradiologists with fast image classification. A pre-trained deep network ResNet50 was applied to extract robust features and learn the structure of CBCT images in their convolutional layers. Next, the classification layer of the ResNet50 was performed into binary classification as “good” and “poor” classes. The images were divided by 80:20 for training and testing. The empirical results support the claim that the application of ResNet50 offers consistent accuracy, sensitivity, and specificity values. The performance value of the classification accuracy was 76.79%. The deep learning approach was employed to unveil how biological image analysis could generate incredibly dependable and repeatable outcomes. The experiments performed on CBCT images evidenced that the proposed ResNet50 using convolutional neural network (CNN) architecture is indeed effective in classifying collateral circulation.
中风患者的治疗可以在侧支循环功能的帮助下有效地进行。现在使用的侧支循环评分依赖于视觉检查,这可能导致评分者之间和评分者内部的差异。在这项研究中,使用ResNet50对缺血性中风患者的侧支循环分类进行了分析,方法是使用锥形束计算机断层扫描(CBCT)图像。深度学习分类的显著性能有助于神经放射科医生进行快速图像分类。应用预先训练的深度网络ResNet50来提取稳健特征,并学习CBCT图像在其卷积层中的结构。接下来,ResNet50的分类层被执行为“好”和“差”类的二进制分类。以80:20对图像进行分割以进行训练和测试。经验结果支持ResNet50的应用提供了一致的准确性、敏感性和特异性值的说法。分类准确率的性能值为76.79%。采用深度学习方法来揭示生物图像分析如何产生令人难以置信的可靠和可重复的结果。在CBCT图像上进行的实验证明,所提出的使用卷积神经网络(CNN)架构的ResNet50在分类侧支循环方面确实有效。
{"title":"Brain cone beam computed tomography image analysis using ResNet50 for collateral circulation classification","authors":"Nur Hasanah Ali, A. Abdullah, N. Saad, A. Muda","doi":"10.11591/ijece.v13i5.pp5843-5852","DOIUrl":"https://doi.org/10.11591/ijece.v13i5.pp5843-5852","url":null,"abstract":"Treatment of stroke patients can be effectively carried out with the help of collateral circulation performance. Collateral circulation scoring as it is now used is dependent on visual inspection, which can lead to an inter- and intra-rater discrepancy. In this study, a collateral circulation classification using the ResNet50 was analyzed by using cone beam computed tomography (CBCT) images for the ischemic stroke patient. The remarkable performance of deep learning classification helps neuroradiologists with fast image classification. A pre-trained deep network ResNet50 was applied to extract robust features and learn the structure of CBCT images in their convolutional layers. Next, the classification layer of the ResNet50 was performed into binary classification as “good” and “poor” classes. The images were divided by 80:20 for training and testing. The empirical results support the claim that the application of ResNet50 offers consistent accuracy, sensitivity, and specificity values. The performance value of the classification accuracy was 76.79%. The deep learning approach was employed to unveil how biological image analysis could generate incredibly dependable and repeatable outcomes. The experiments performed on CBCT images evidenced that the proposed ResNet50 using convolutional neural network (CNN) architecture is indeed effective in classifying collateral circulation.","PeriodicalId":38060,"journal":{"name":"International Journal of Electrical and Computer Engineering","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42458538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early detection of dysphoria using electroencephalogram affective modelling 使用脑电图情感模型早期检测焦虑症
Q2 Computer Science Pub Date : 2023-10-01 DOI: 10.11591/ijece.v13i5.pp5874-5884
N. Kamaruddin, Mohd Hafiz Mohd Nasir, A. Wahab, Frederick C. Harris Jr.
Dysphoria is a trigger point for maladjusted individuals who cannot cope with disappointments and crushed expectations, resulting in negative emotions if it is not detected early. Individuals who suffer from dysphoria tend to deny their mental state. They try to hide, suppress, or ignore the symptoms, making one feel worse, unwanted, and unloved. Psychologists and psychiatrists identify dysphoria using standardized instruments like questionnaires and interviews. These methods can boast a high success rate. However, the limited number of trained psychologists and psychiatrists and the small number of health institutions focused on mental health limit access to early detection. In addition, the negative connotation and taboo about dysphoria discourage the public from openly seeking help. An alternative approach to collecting ‘pure’ data is proposed in this paper. The brain signals are captured using the electroencephalogram as the input to the machine learning approach to detect negative emotions. It was observed from the experimental results that participants who scored severe dysphoria recorded ‘fear’ emotion even before stimuli were presented during the eyes-close phase. This finding is crucial to further understanding the effect of dysphoria and can be used to study the correlation between dysphoria and negative emotions.
味觉障碍是适应不良的人的一个触发点,他们无法应对失望和破碎的期望,如果不及早发现,就会产生负面情绪。患有焦虑症的人往往否认自己的精神状态。他们试图隐藏、抑制或忽视症状,让人感觉更糟、不受欢迎和不被爱。心理学家和精神病学家使用问卷和访谈等标准化工具来识别焦虑症。这些方法的成功率很高。然而,受过培训的心理学家和精神病学家数量有限,专注于心理健康的卫生机构数量很少,限制了早期检测的机会。此外,焦虑症的负面内涵和禁忌阻碍了公众公开寻求帮助。本文提出了一种收集“纯”数据的替代方法。使用脑电图作为机器学习方法的输入来捕获大脑信号,以检测负面情绪。从实验结果中观察到,即使在闭眼阶段出现刺激之前,患有严重焦虑症的参与者也会记录到“恐惧”情绪。这一发现对进一步理解焦虑的影响至关重要,可用于研究焦虑与负面情绪之间的相关性。
{"title":"Early detection of dysphoria using electroencephalogram affective modelling","authors":"N. Kamaruddin, Mohd Hafiz Mohd Nasir, A. Wahab, Frederick C. Harris Jr.","doi":"10.11591/ijece.v13i5.pp5874-5884","DOIUrl":"https://doi.org/10.11591/ijece.v13i5.pp5874-5884","url":null,"abstract":"Dysphoria is a trigger point for maladjusted individuals who cannot cope with disappointments and crushed expectations, resulting in negative emotions if it is not detected early. Individuals who suffer from dysphoria tend to deny their mental state. They try to hide, suppress, or ignore the symptoms, making one feel worse, unwanted, and unloved. Psychologists and psychiatrists identify dysphoria using standardized instruments like questionnaires and interviews. These methods can boast a high success rate. However, the limited number of trained psychologists and psychiatrists and the small number of health institutions focused on mental health limit access to early detection. In addition, the negative connotation and taboo about dysphoria discourage the public from openly seeking help. An alternative approach to collecting ‘pure’ data is proposed in this paper. The brain signals are captured using the electroencephalogram as the input to the machine learning approach to detect negative emotions. It was observed from the experimental results that participants who scored severe dysphoria recorded ‘fear’ emotion even before stimuli were presented during the eyes-close phase. This finding is crucial to further understanding the effect of dysphoria and can be used to study the correlation between dysphoria and negative emotions.","PeriodicalId":38060,"journal":{"name":"International Journal of Electrical and Computer Engineering","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43640564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A deep reinforcement learning strategy for autonomous robot flocking 自主机器人群集的深度强化学习策略
Q2 Computer Science Pub Date : 2023-10-01 DOI: 10.11591/ijece.v13i5.pp5707-5716
Fredy H. Martínez, Holman Montiel, Luis Wanumen
Social behaviors in animals such as bees, ants, and birds have shown high levels of intelligence from a multi-agent system perspective. They present viable solutions to real-world problems, particularly in navigating constrained environments with simple robotic platforms. Among these behaviors is swarm flocking, which has been extensively studied for this purpose. Flocking algorithms have been developed from basic behavioral rules, which often require parameter tuning for specific applications. However, the lack of a general formulation for tuning has made these strategies difficult to implement in various real conditions, and even to replicate laboratory behaviors. In this paper, we propose a flocking scheme for small autonomous robots that can self-learn in dynamic environments, derived from a deep reinforcement learning process. Our approach achieves flocking independently of population size and environmental characteristics, with minimal external intervention. Our multi-agent system model considers each agent’s action as a linear function dynamically adjusting the motion according to interactions with other agents and the environment. Our strategy is an important contribution toward real-world flocking implementation. We demonstrate that our approach allows for autonomous flocking in the system without requiring specific parameter tuning, making it ideal for applications where there is a need for simple robotic platforms to navigate in dynamic environments.
从多主体系统的角度来看,蜜蜂、蚂蚁和鸟类等动物的社会行为已经显示出高水平的智能。它们为现实世界的问题提供了可行的解决方案,特别是在使用简单的机器人平台导航受限环境时。在这些行为中有一种是蜂群行为,这一行为已被广泛研究。群集算法是从基本的行为规则发展而来的,这些规则通常需要针对特定的应用程序进行参数调整。然而,由于缺乏通用的调整公式,使得这些策略难以在各种实际条件下实施,甚至难以复制实验室行为。在本文中,我们提出了一种基于深度强化学习过程的小型自主机器人群集方案,该方案可以在动态环境中进行自我学习。我们的方法在最小的外部干预下实现了独立于人口规模和环境特征的群集。我们的多智能体系统模型将每个智能体的行为视为一个线性函数,根据与其他智能体和环境的相互作用动态调整运动。我们的策略是对现实世界群集实现的重要贡献。我们证明,我们的方法允许在不需要特定参数调整的情况下在系统中自动群集,使其成为需要简单机器人平台在动态环境中导航的应用的理想选择。
{"title":"A deep reinforcement learning strategy for autonomous robot flocking","authors":"Fredy H. Martínez, Holman Montiel, Luis Wanumen","doi":"10.11591/ijece.v13i5.pp5707-5716","DOIUrl":"https://doi.org/10.11591/ijece.v13i5.pp5707-5716","url":null,"abstract":"Social behaviors in animals such as bees, ants, and birds have shown high levels of intelligence from a multi-agent system perspective. They present viable solutions to real-world problems, particularly in navigating constrained environments with simple robotic platforms. Among these behaviors is swarm flocking, which has been extensively studied for this purpose. Flocking algorithms have been developed from basic behavioral rules, which often require parameter tuning for specific applications. However, the lack of a general formulation for tuning has made these strategies difficult to implement in various real conditions, and even to replicate laboratory behaviors. In this paper, we propose a flocking scheme for small autonomous robots that can self-learn in dynamic environments, derived from a deep reinforcement learning process. Our approach achieves flocking independently of population size and environmental characteristics, with minimal external intervention. Our multi-agent system model considers each agent’s action as a linear function dynamically adjusting the motion according to interactions with other agents and the environment. Our strategy is an important contribution toward real-world flocking implementation. We demonstrate that our approach allows for autonomous flocking in the system without requiring specific parameter tuning, making it ideal for applications where there is a need for simple robotic platforms to navigate in dynamic environments.","PeriodicalId":38060,"journal":{"name":"International Journal of Electrical and Computer Engineering","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44765051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
U-Net transfer learning backbones for lesions segmentation in breast ultrasound images U-Net迁移学习主干在乳腺超声图像病变分割中的应用
Q2 Computer Science Pub Date : 2023-10-01 DOI: 10.11591/ijece.v13i5.pp5747-5754
Mohamed Bal-Ghaoui, My Hachem El Yousfi Alaoui, A. Jilbab, Abdennacer Bourouhou
Breast ultrasound images are highly valuable for the early detection of breast cancer. However, the drawback of these images is low-quality resolution and the presence of speckle noise, which affects their interpretability and makes them radiologists’ expertise-dependent. As medical images, breast ultrasound datasets are scarce and imbalanced, and annotating them is tedious and time-consuming. Transfer learning, as a deep learning technique, can be used to overcome the dataset deficiency in available images. This paper presents the implementation of transfer learning U-Net backbones for the automatic segmentation of breast ultrasound lesions and implements a threshold selection mechanism to deliver optimal generalized segmentation results of breast tumors. The work uses the public breast ultrasound images (BUSI) dataset and implements ten state-of-theart candidate models as U-Net backbones. We have trained these models with a five-fold cross-validation technique on 630 images with benign and malignant cases. Five out of ten models showed good results, and the best U-Net backbone was found to be DenseNet121. It achieved an average Dice coefficient of 0.7370 and a sensitivity of 0.7255. The model’s robustness was also evaluated against normal cases, and the model accurately detected 72 out of 113 images, which is higher than the four best models.
乳腺超声图像对于癌症的早期检测具有很高的价值。然而,这些图像的缺点是低质量分辨率和斑点噪声的存在,这影响了它们的可解释性,并使它们依赖于放射科医生的专业知识。作为医学图像,乳腺超声数据集稀缺且不平衡,对其进行注释既繁琐又耗时。迁移学习作为一种深度学习技术,可以用来克服现有图像中数据集的不足。本文介绍了用于乳腺超声病变自动分割的迁移学习U-Net主干的实现,并实现了阈值选择机制,以提供乳腺肿瘤的最佳广义分割结果。该工作使用公共乳腺超声图像(BUSI)数据集,并实现了十个最先进的候选模型作为U-Net骨干。我们在630张良性和恶性病例的图像上使用五倍交叉验证技术训练了这些模型。十个模型中有五个显示出良好的结果,发现最好的U-Net主干是DenseNet121。它获得了0.7370的平均Dice系数和0.7255的灵敏度。该模型的稳健性也针对正常情况进行了评估,该模型准确地检测到113张图像中的72张,高于四个最佳模型。
{"title":"U-Net transfer learning backbones for lesions segmentation in breast ultrasound images","authors":"Mohamed Bal-Ghaoui, My Hachem El Yousfi Alaoui, A. Jilbab, Abdennacer Bourouhou","doi":"10.11591/ijece.v13i5.pp5747-5754","DOIUrl":"https://doi.org/10.11591/ijece.v13i5.pp5747-5754","url":null,"abstract":"Breast ultrasound images are highly valuable for the early detection of breast cancer. However, the drawback of these images is low-quality resolution and the presence of speckle noise, which affects their interpretability and makes them radiologists’ expertise-dependent. As medical images, breast ultrasound datasets are scarce and imbalanced, and annotating them is tedious and time-consuming. Transfer learning, as a deep learning technique, can be used to overcome the dataset deficiency in available images. This paper presents the implementation of transfer learning U-Net backbones for the automatic segmentation of breast ultrasound lesions and implements a threshold selection mechanism to deliver optimal generalized segmentation results of breast tumors. The work uses the public breast ultrasound images (BUSI) dataset and implements ten state-of-theart candidate models as U-Net backbones. We have trained these models with a five-fold cross-validation technique on 630 images with benign and malignant cases. Five out of ten models showed good results, and the best U-Net backbone was found to be DenseNet121. It achieved an average Dice coefficient of 0.7370 and a sensitivity of 0.7255. The model’s robustness was also evaluated against normal cases, and the model accurately detected 72 out of 113 images, which is higher than the four best models.","PeriodicalId":38060,"journal":{"name":"International Journal of Electrical and Computer Engineering","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46089661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Convolutional auto-encoded extreme learning machine for incremental learning of heterogeneous images 用于异构图像增量学习的卷积自编码极限学习机
Q2 Computer Science Pub Date : 2023-10-01 DOI: 10.11591/ijece.v13i5.pp5853-5864
S. Madhusudhanan, S. Jaganathan, Dattuluri Venkatavara Prasad
In real-world scenarios, a system's continual updating of learning knowledge becomes more critical as the data grows faster, producing vast volumes of data. Moreover, the learning process becomes complex when the data features become varied due to the addition or deletion of classes. In such cases, the generated model should learn effectively. Incremental learning refers to the learning of data which constantly arrives over time. This learning requires continuous model adaptation but with limited memory resources without sacrificing model accuracy. In this paper, we proposed a straightforward knowledge transfer algorithm (convolutional auto-encoded extreme learning machine (CAE-ELM)) implemented through the incremental learning methodology for the task of supervised classification using an extreme learning machine (ELM). Incremental learning is achieved by creating an individual train model for each set of homogeneous data and incorporating the knowledge transfer among the models without sacrificing accuracy with minimal memory resources. In CAE-ELM, convolutional neural network (CNN) extracts the features, stacked autoencoder (SAE) reduces the size, and ELM learns and classifies the images. Our proposed algorithm is implemented and experimented on various standard datasets: MNIST, ORL, JAFFE, FERET and Caltech. The results show a positive sign of the correctness of the proposed algorithm.
在现实世界中,随着数据增长速度的加快,系统对学习知识的持续更新变得越来越重要,从而产生大量的数据。此外,由于类的增加或删除,数据特征会发生变化,学习过程也会变得复杂。在这种情况下,生成的模型应该有效地学习。增量学习是指对随着时间的推移不断到达的数据进行学习。这种学习需要持续的模型适应,但在不牺牲模型准确性的情况下,内存资源有限。在本文中,我们提出了一种简单的知识转移算法(卷积自编码极限学习机(CAE-ELM)),该算法通过增量学习方法实现了使用极限学习机(ELM)进行监督分类的任务。增量学习是通过为每组同构数据创建一个单独的训练模型来实现的,并在模型之间结合知识转移,而不牺牲准确性和最小的内存资源。在CAE-ELM中,卷积神经网络(CNN)提取特征,堆叠自编码器(SAE)减小尺寸,ELM对图像进行学习和分类。我们提出的算法在不同的标准数据集上实现和实验:MNIST, ORL, JAFFE, FERET和Caltech。结果表明了所提算法的正确性。
{"title":"Convolutional auto-encoded extreme learning machine for incremental learning of heterogeneous images","authors":"S. Madhusudhanan, S. Jaganathan, Dattuluri Venkatavara Prasad","doi":"10.11591/ijece.v13i5.pp5853-5864","DOIUrl":"https://doi.org/10.11591/ijece.v13i5.pp5853-5864","url":null,"abstract":"In real-world scenarios, a system's continual updating of learning knowledge becomes more critical as the data grows faster, producing vast volumes of data. Moreover, the learning process becomes complex when the data features become varied due to the addition or deletion of classes. In such cases, the generated model should learn effectively. Incremental learning refers to the learning of data which constantly arrives over time. This learning requires continuous model adaptation but with limited memory resources without sacrificing model accuracy. In this paper, we proposed a straightforward knowledge transfer algorithm (convolutional auto-encoded extreme learning machine (CAE-ELM)) implemented through the incremental learning methodology for the task of supervised classification using an extreme learning machine (ELM). Incremental learning is achieved by creating an individual train model for each set of homogeneous data and incorporating the knowledge transfer among the models without sacrificing accuracy with minimal memory resources. In CAE-ELM, convolutional neural network (CNN) extracts the features, stacked autoencoder (SAE) reduces the size, and ELM learns and classifies the images. Our proposed algorithm is implemented and experimented on various standard datasets: MNIST, ORL, JAFFE, FERET and Caltech. The results show a positive sign of the correctness of the proposed algorithm.","PeriodicalId":38060,"journal":{"name":"International Journal of Electrical and Computer Engineering","volume":"101 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65382831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Electrical and Computer Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1