首页 > 最新文献

Infocommunications Journal最新文献

英文 中文
Evaluation of different extractors of features at the level of sentiment analysis 在情感分析水平上对不同特征提取器的评价
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2022-01-01 DOI: 10.36244/icj.2022.2.9
Fatima Es-Sabery, Khadija Es-Sabery, Hamid Garmani, Junaid Qadir, Abdellatif Hair
Sentiment analysis is the process of recognizing and categorizing the emotions being expressed in a textual source. Tweets are commonly used to generate a large amount of sentiment data after they are analyzed. These feelings data help to learn about people's thoughts on a various range of topics. People are typically attracted for researching positive and negative reviews, which contain dislikes and likes, shared by the consumers concerning the features of a certain service or product. Therefore, the aspects or features of the product/ service play an important role in opinion mining. Furthermore to enough work being carried out in text mining, feature extraction in opinion mining is presently becoming a hot research field. In this paper, we focus on the study of feature extractors because of their importance in classification performance. The feature extraction is the most critical aspect of opinion classification since classification efficiency can be degraded if features are not properly chosen. A few scientific researchers have addressed the issue of feature extraction. And we found in the literature that almost every article deals with one or two feature extractors. For that, we decided in this paper to cover all the most popular feature extractors which are BOW, N-grams, TF-IDF, Word2vec, GloVe and FastText. In general, this paper will discuss the existing feature extractors in the opinion mining domain. Also, it will present the advantages and the inconveniences of each extractor. Moreover, a comparative study is performed for determining the most efficient combination CNN/extractor in terms of accuracy, precision, recall, and F1 measure.
情感分析是对文本中所表达的情感进行识别和分类的过程。Tweets通常被用于分析后生成大量的情绪数据。这些情感数据有助于了解人们对各种话题的想法。人们通常会被研究积极和消极的评论所吸引,这些评论包含了消费者对某种服务或产品的特点所分享的不喜欢和喜欢。因此,产品/服务的方面或特征在意见挖掘中起着重要的作用。此外,随着文本挖掘的深入,观点挖掘中的特征提取也逐渐成为研究的热点。由于特征提取器对分类性能的重要性,本文重点研究了特征提取器。特征提取是意见分类中最关键的方面,如果特征选择不当会降低分类效率。一些科研人员已经解决了特征提取的问题。我们在文献中发现几乎每篇文章都涉及到一个或两个特征提取器。为此,我们决定在本文中涵盖所有最流行的特征提取器,即BOW, N-grams, TF-IDF, Word2vec, GloVe和FastText。总的来说,本文将讨论意见挖掘领域中现有的特征提取器。并介绍了各种萃取器的优缺点。此外,在准确度、精密度、召回率和F1度量方面,进行了比较研究,以确定最有效的CNN/提取器组合。
{"title":"Evaluation of different extractors of features at the level of sentiment analysis","authors":"Fatima Es-Sabery, Khadija Es-Sabery, Hamid Garmani, Junaid Qadir, Abdellatif Hair","doi":"10.36244/icj.2022.2.9","DOIUrl":"https://doi.org/10.36244/icj.2022.2.9","url":null,"abstract":"Sentiment analysis is the process of recognizing and categorizing the emotions being expressed in a textual source. Tweets are commonly used to generate a large amount of sentiment data after they are analyzed. These feelings data help to learn about people's thoughts on a various range of topics. People are typically attracted for researching positive and negative reviews, which contain dislikes and likes, shared by the consumers concerning the features of a certain service or product. Therefore, the aspects or features of the product/ service play an important role in opinion mining. Furthermore to enough work being carried out in text mining, feature extraction in opinion mining is presently becoming a hot research field. In this paper, we focus on the study of feature extractors because of their importance in classification performance. The feature extraction is the most critical aspect of opinion classification since classification efficiency can be degraded if features are not properly chosen. A few scientific researchers have addressed the issue of feature extraction. And we found in the literature that almost every article deals with one or two feature extractors. For that, we decided in this paper to cover all the most popular feature extractors which are BOW, N-grams, TF-IDF, Word2vec, GloVe and FastText. In general, this paper will discuss the existing feature extractors in the opinion mining domain. Also, it will present the advantages and the inconveniences of each extractor. Moreover, a comparative study is performed for determining the most efficient combination CNN/extractor in terms of accuracy, precision, recall, and F1 measure.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"62 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90687913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Management and Standard Compliance for Cyber-Physical Systems of Systems 系统的网络物理系统的风险管理和标准遵从
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2021-01-01 DOI: 10.36244/icj.2021.2.5
George Matta, Sebastian Chlup, A. Shaaban, Christoph Schmittner, Andreas Pinzenöhler, Elke Szalai, Markus Tauber
The Internet of Things (IoT) and cloud technologies are increasingly implemented in the form of Cyber-Physical Systems of Systems (CPSoS) for the railway sector. In order to satisfy the security requirements of Cyber-Physical Systems (CPS), domainspecific risk identification assessment procedures have been developed. Threat modelling is one of the most commonly used methods for threat identification for the security analysis of CPSoS and is capable of targeting various domains. This paper reports our experience of using a risk management framework identify the most critical security vulnerabilities in CPSoS in the domain and shows the broader impact this work can have on the domain of safety and security management. Moreover, we emphasize the application of common analytical methods for cyber-security based on international industry standards to identify the most vulnerable assets. These will be applied to a meta-model for automated railway systems in the concept phase to support the development and deployment of these systems. Furthermore, it is the first step to create a secure and standard complaint system by design.
物联网(IoT)和云技术越来越多地以网络物理系统(cpso)的形式应用于铁路部门。为了满足信息物理系统(CPS)的安全要求,开发了特定领域的风险识别评估程序。威胁建模是cpso安全分析中最常用的威胁识别方法之一,能够针对不同的领域。本文报告了我们使用风险管理框架的经验,确定了该领域cpso中最关键的安全漏洞,并展示了这项工作对安全和安全管理领域的更广泛影响。此外,我们强调基于国际行业标准的网络安全通用分析方法的应用,以识别最脆弱的资产。这些将在概念阶段应用于自动化铁路系统的元模型,以支持这些系统的开发和部署。此外,从设计上建立一个安全、规范的投诉系统是第一步。
{"title":"Risk Management and Standard Compliance for Cyber-Physical Systems of Systems","authors":"George Matta, Sebastian Chlup, A. Shaaban, Christoph Schmittner, Andreas Pinzenöhler, Elke Szalai, Markus Tauber","doi":"10.36244/icj.2021.2.5","DOIUrl":"https://doi.org/10.36244/icj.2021.2.5","url":null,"abstract":"The Internet of Things (IoT) and cloud technologies are increasingly implemented in the form of Cyber-Physical Systems of Systems (CPSoS) for the railway sector. In order to satisfy the security requirements of Cyber-Physical Systems (CPS), domainspecific risk identification assessment procedures have been developed. Threat modelling is one of the most commonly used methods for threat identification for the security analysis of CPSoS and is capable of targeting various domains. This paper reports our experience of using a risk management framework identify the most critical security vulnerabilities in CPSoS in the domain and shows the broader impact this work can have on the domain of safety and security management. Moreover, we emphasize the application of common analytical methods for cyber-security based on international industry standards to identify the most vulnerable assets. These will be applied to a meta-model for automated railway systems in the concept phase to support the development and deployment of these systems. Furthermore, it is the first step to create a secure and standard complaint system by design.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"1 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88317159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Developing a macroscopic model based on fuzzy cognitive map for road traffic flow simulation 建立了一种基于模糊认知地图的道路交通流仿真宏观模型
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2021-01-01 DOI: 10.36244/icj.2021.3.2
Mehran Amini, Hatwagn Miklos F., G. Mikulai, L. Kóczy
Fuzzy cognitive maps (FCM) have been broadly employed to analyze complex and decidedly uncertain systems in modeling, forecasting, decision making, etc. Road traffic flow is also notoriously known as a highly uncertain nonlinear and complex system. Even though applications of FCM in risk analysis have been presented in various engineering fields, this research aims at modeling road traffic flow based on macroscopic characteristics through FCM. Therefore, a simulation of variables involved with road traffic flow carried out through FCM reasoning on historical data collected from the e-toll dataset of Hungarian networks of freeways. The proposed FCM model is developed based on 58 selected freeway segments as the “concepts” of the FCM; moreover, a new inference rule for employing in FCM reasoning process along with its algorithms have been presented. The results illustrate FCM representation and computation of the real segments with their main road traffic-related characteristics that have reached an equilibrium point. Furthermore, a simulation of the road traffic flow by performing the analysis of customized scenarios is presented, through which macroscopic modeling objectives such as predicting future road traffic flow state, route guidance in various scenarios, freeway geometric characteristics indication, and effectual mobility can be evaluated.
模糊认知图(FCM)在建模、预测、决策等方面被广泛应用于分析复杂且绝对不确定的系统。众所周知,道路交通流是一个高度不确定的非线性复杂系统。尽管FCM在风险分析中的应用已经出现在各个工程领域,但本研究的目的是通过FCM基于宏观特征对道路交通流进行建模。因此,通过FCM推理,对从匈牙利高速公路网络的电子收费数据集收集的历史数据进行了与道路交通流相关的变量的模拟。提出的FCM模型是基于58个选定的高速公路段作为FCM的“概念”;此外,还提出了一种新的用于FCM推理过程的推理规则及其算法。结果说明了达到平衡点的具有主要道路交通相关特征的真实路段的FCM表示和计算。在此基础上,通过对定制场景的分析,对道路交通流进行仿真,从而对未来道路交通流状态预测、不同场景下的路径引导、高速公路几何特征指示、有效机动性等宏观建模目标进行评估。
{"title":"Developing a macroscopic model based on fuzzy cognitive map for road traffic flow simulation","authors":"Mehran Amini, Hatwagn Miklos F., G. Mikulai, L. Kóczy","doi":"10.36244/icj.2021.3.2","DOIUrl":"https://doi.org/10.36244/icj.2021.3.2","url":null,"abstract":"Fuzzy cognitive maps (FCM) have been broadly employed to analyze complex and decidedly uncertain systems in modeling, forecasting, decision making, etc. Road traffic flow is also notoriously known as a highly uncertain nonlinear and complex system. Even though applications of FCM in risk analysis have been presented in various engineering fields, this research aims at modeling road traffic flow based on macroscopic characteristics through FCM. Therefore, a simulation of variables involved with road traffic flow carried out through FCM reasoning on historical data collected from the e-toll dataset of Hungarian networks of freeways. The proposed FCM model is developed based on 58 selected freeway segments as the “concepts” of the FCM; moreover, a new inference rule for employing in FCM reasoning process along with its algorithms have been presented. The results illustrate FCM representation and computation of the real segments with their main road traffic-related characteristics that have reached an equilibrium point. Furthermore, a simulation of the road traffic flow by performing the analysis of customized scenarios is presented, through which macroscopic modeling objectives such as predicting future road traffic flow state, route guidance in various scenarios, freeway geometric characteristics indication, and effectual mobility can be evaluated.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"64 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90370960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Double-View Matching Network for Few-Shot Learning to Classify Covid-19 in X-ray images 基于双视图匹配网络的x射线图像中Covid-19的少镜头学习分类
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2021-01-01 DOI: 10.36244/ICJ.2021.1.4
G. Szűcs, Marcell Németh
The research topic presented in this paper belongs to small training data problem in machine learning (especially in deep learning), it intends to help the work of those working in medicine by analyzing pathological X-ray recordings, using only very few images. This scenario is a particularly hot issue nowadays: how could a new disease for which only limited data are available be diagnosed using features of previous diseases? In this problem, so-called few-shot learning, the difficulty of the classification task is to learn the unique feature characteristics associated with the classes. Although there are solutions, but if the images come from different views, they will not handle these views well. We proposed an improved method, so-called Double-View Matching Network (DVMN based on the deep neural network), which solves the few-shot learning problem as well as the different views of the pathological recordings in the images. The main contribution of this is the convolutional neural network for feature extraction and handling the multi-view in image representation. Our method was tested in the classification of images showing unknown COVID-19 symptoms in an environment designed for learning a few samples, with prior meta-learning on images of other diseases only. The results show that DVMN reaches better accuracy on multi-view dataset than simple Matching Network without multi-view handling.
本文提出的研究课题属于机器学习(尤其是深度学习)中的小训练数据问题,它旨在通过分析病理x射线记录,仅使用很少的图像来帮助医学工作者的工作。这种情况是当今一个特别热门的问题:如何利用以前疾病的特征来诊断一种只有有限数据的新疾病?在这个所谓的few-shot学习问题中,分类任务的难点在于学习与类相关的唯一特征特征。虽然有解决方案,但如果图像来自不同的视图,它们将无法很好地处理这些视图。我们提出了一种改进的方法,即基于深度神经网络的双视图匹配网络(Double-View Matching Network, DVMN),解决了图像中少镜头学习问题以及病理记录的不同视图问题。其中的主要贡献是卷积神经网络在图像表示中的特征提取和多视图处理。我们的方法在为学习少数样本而设计的环境中对显示未知COVID-19症状的图像进行了分类测试,仅对其他疾病的图像进行了先前的元学习。结果表明,与不进行多视图处理的简单匹配网络相比,DVMN在多视图数据集上的准确率更高。
{"title":"Double-View Matching Network for Few-Shot Learning to Classify Covid-19 in X-ray images","authors":"G. Szűcs, Marcell Németh","doi":"10.36244/ICJ.2021.1.4","DOIUrl":"https://doi.org/10.36244/ICJ.2021.1.4","url":null,"abstract":"The research topic presented in this paper belongs to small training data problem in machine learning (especially in deep learning), it intends to help the work of those working in medicine by analyzing pathological X-ray recordings, using only very few images. This scenario is a particularly hot issue nowadays: how could a new disease for which only limited data are available be diagnosed using features of previous diseases? In this problem, so-called few-shot learning, the difficulty of the classification task is to learn the unique feature characteristics associated with the classes. Although there are solutions, but if the images come from different views, they will not handle these views well. We proposed an improved method, so-called Double-View Matching Network (DVMN based on the deep neural network), which solves the few-shot learning problem as well as the different views of the pathological recordings in the images. The main contribution of this is the convolutional neural network for feature extraction and handling the multi-view in image representation. Our method was tested in the classification of images showing unknown COVID-19 symptoms in an environment designed for learning a few samples, with prior meta-learning on images of other diseases only. The results show that DVMN reaches better accuracy on multi-view dataset than simple Matching Network without multi-view handling.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"27 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75223963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Improved Model for Indoor Propagation Loss in the 5G FR2 Frequency Band 5G FR2频段室内传播损耗改进模型
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2021-01-01 DOI: 10.36244/ICJ.2021.1.1
Árpád László Makara, L. Csurgai-Horváth
One of the latest developments today is the 5G, or 5th generation mobile network. In addition to a number of innovations, the new system also includes millimeter-wavelength frequency ranges denoted with FR2, that formerly not applied for these specific purposes. Proper management of the transmitter and receiver antenna beams is required for efficient communication in this frequency range. For future use, the simplest implementation way is electronically shaping the antenna beams by an algorithm to orient the antennas in the best possible direction. The prerequisites for these algorithms are appropriate propagation models, which are currently lacking, and those that publicly available are not accurate enough for practical use.
今天的最新发展之一是5G,即第五代移动网络。除了一些创新之外,新系统还包括以FR2表示的毫米波长频率范围,这在以前并不适用于这些特定目的。要在该频率范围内实现有效的通信,需要对发射机和接收机天线波束进行适当的管理。为了将来的使用,最简单的实现方法是通过一种算法以电子方式塑造天线波束,使天线在尽可能好的方向上定向。这些算法的先决条件是适当的传播模型,这是目前缺乏的,而且那些公开可用的模型对于实际使用来说不够准确。
{"title":"Improved Model for Indoor Propagation Loss in the 5G FR2 Frequency Band","authors":"Árpád László Makara, L. Csurgai-Horváth","doi":"10.36244/ICJ.2021.1.1","DOIUrl":"https://doi.org/10.36244/ICJ.2021.1.1","url":null,"abstract":"One of the latest developments today is the 5G, or 5th generation mobile network. In addition to a number of innovations, the new system also includes millimeter-wavelength frequency ranges denoted with FR2, that formerly not applied for these specific purposes. Proper management of the transmitter and receiver antenna beams is required for efficient communication in this frequency range. For future use, the simplest implementation way is electronically shaping the antenna beams by an algorithm to orient the antennas in the best possible direction. The prerequisites for these algorithms are appropriate propagation models, which are currently lacking, and those that publicly available are not accurate enough for practical use.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"11 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84484062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security and Autonomic Management in System of Systems 系统中的安全与自治管理
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2021-01-01 DOI: 10.36244/icj.2021.3.7
Silia Maksuti, Mario Zsilak, Markus Tauber, J. Delsing
A system of systems integrates systems that function independently but are networked together for a period of time to achieve a higher goal. These systems evolve over time and have emergent properties. Therefore, even with security controls in place, it is difficult to maintain a required level of security for the system of systems as a whole because uncertainties may arise at runtime. Uncertainties can occur from internal factors, such as malfunctions of a system, or from external factors, such as malicious attacks. Self-adaptation is an approach that allows a system to adapt in the face of such uncertainties without human intervention. This work outlines the progress made towards security mitigation in system of systems using a generic autonomic management system to assist engineers in developing self-adaptive systems. The manuscript describes the proposed system design, its implementation as part of the Eclipse Arrowhead framework, and its functionality in a smart agriculture use case. The system is designed and implemented in such a way that it can be reused and extended for a variety of use cases without requiring major changes.
一个由多个系统组成的系统将独立运行但在一段时间内联网在一起以实现更高的目标。这些系统随着时间的推移而进化,并具有涌现的特性。因此,即使有了适当的安全控制,也很难为整个系统的系统维护所需的安全级别,因为在运行时可能会出现不确定性。不确定性可能来自内部因素,如系统故障,也可能来自外部因素,如恶意攻击。自适应是一种允许系统在没有人为干预的情况下适应这种不确定性的方法。这项工作概述了在使用通用自主管理系统的系统安全缓解方面取得的进展,以协助工程师开发自适应系统。手稿描述了建议的系统设计,它作为Eclipse箭头框架的一部分的实现,以及它在智能农业用例中的功能。系统以这样一种方式设计和实现,即它可以为各种用例重用和扩展,而不需要进行重大更改。
{"title":"Security and Autonomic Management in System of Systems","authors":"Silia Maksuti, Mario Zsilak, Markus Tauber, J. Delsing","doi":"10.36244/icj.2021.3.7","DOIUrl":"https://doi.org/10.36244/icj.2021.3.7","url":null,"abstract":"A system of systems integrates systems that function independently but are networked together for a period of time to achieve a higher goal. These systems evolve over time and have emergent properties. Therefore, even with security controls in place, it is difficult to maintain a required level of security for the system of systems as a whole because uncertainties may arise at runtime. Uncertainties can occur from internal factors, such as malfunctions of a system, or from external factors, such as malicious attacks. Self-adaptation is an approach that allows a system to adapt in the face of such uncertainties without human intervention. This work outlines the progress made towards security mitigation in system of systems using a generic autonomic management system to assist engineers in developing self-adaptive systems. The manuscript describes the proposed system design, its implementation as part of the Eclipse Arrowhead framework, and its functionality in a smart agriculture use case. The system is designed and implemented in such a way that it can be reused and extended for a variety of use cases without requiring major changes.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"69 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79557968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
AI-Based Electrode Optimisation for Small Satellite Ion Thrusters 基于人工智能的小型卫星离子推进器电极优化
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2021-01-01 DOI: 10.36244/icj.2021.4.1
Árpád László Makara, A. Reichardt, L. Csurgai-Horváth
Computing capacities for numerical modelling are available to an unprecedented extent today. The spread of various artificial intelligence (AI) -based solutions (which in many cases are also resource-intensive operations) is also facilitated by this increase in capacity, which offers several new opportunities in this area. On the one hand, optimization tasks can be done quickly, on the other hand, it is also possible to solve (estimate) problems where we cannot (for some reason) create a model for the initial problem. In our article, we investigate how to apply artificial intelligence-based solutions to electromagnetic field computing tasks as efficiently as possible. The required theoretical summary presents an implemented application: optimization of electrostatic ion engine accelerator electrodes for orbit correction operations. To solve each problem, we used methods from the supervised machine learning toolkit, usually along with LMS (least mean square method) update steps. All inputs required for AI were solved by numerical space calculation (primarily using the finite element method). The data input required to optimize the electrodes of an ion thruster can come from two sources: measurement data or simulation results. Given that the operating environment of a satellite can be modelled in a vacuum chamber, it is a particularly difficult issue to perform the measurement, but even more difficult in the case of optimisation. Therefore, an effective solution to the problem can only be achieved by simulation. The primary goal of this research is to optimise the fuel (in this case, the number of ions) during operation, with the stated aim of maximising the time of operation of the spacecraft.
今天,数值模拟的计算能力达到了前所未有的程度。这种能力的增加也促进了各种基于人工智能(AI)的解决方案(在许多情况下也是资源密集型操作)的传播,这为该领域提供了一些新的机会。一方面,优化任务可以快速完成,另一方面,它也可以解决(估计)我们无法(出于某种原因)为初始问题创建模型的问题。在我们的文章中,我们研究了如何尽可能高效地将基于人工智能的解决方案应用于电磁场计算任务。所需要的理论总结提出了一个实际应用:优化静电离子发动机加速器电极轨道校正操作。为了解决每个问题,我们使用了来自监督机器学习工具包的方法,通常伴随着LMS(最小均方方法)更新步骤。人工智能所需的所有输入都通过数值空间计算(主要使用有限元法)来求解。优化离子推力器电极所需的数据输入可以来自两个来源:测量数据或模拟结果。考虑到卫星的运行环境可以在真空室中建模,执行测量是一个特别困难的问题,但在优化的情况下更加困难。因此,只有通过仿真才能有效地解决这一问题。这项研究的主要目标是在运行期间优化燃料(在这种情况下,离子的数量),以最大限度地提高航天器的运行时间。
{"title":"AI-Based Electrode Optimisation for Small Satellite Ion Thrusters","authors":"Árpád László Makara, A. Reichardt, L. Csurgai-Horváth","doi":"10.36244/icj.2021.4.1","DOIUrl":"https://doi.org/10.36244/icj.2021.4.1","url":null,"abstract":"Computing capacities for numerical modelling are available to an unprecedented extent today. The spread of various artificial intelligence (AI) -based solutions (which in many cases are also resource-intensive operations) is also facilitated by this increase in capacity, which offers several new opportunities in this area. On the one hand, optimization tasks can be done quickly, on the other hand, it is also possible to solve (estimate) problems where we cannot (for some reason) create a model for the initial problem. In our article, we investigate how to apply artificial intelligence-based solutions to electromagnetic field computing tasks as efficiently as possible. The required theoretical summary presents an implemented application: optimization of electrostatic ion engine accelerator electrodes for orbit correction operations. To solve each problem, we used methods from the supervised machine learning toolkit, usually along with LMS (least mean square method) update steps. All inputs required for AI were solved by numerical space calculation (primarily using the finite element method). The data input required to optimize the electrodes of an ion thruster can come from two sources: measurement data or simulation results. Given that the operating environment of a satellite can be modelled in a vacuum chamber, it is a particularly difficult issue to perform the measurement, but even more difficult in the case of optimisation. Therefore, an effective solution to the problem can only be achieved by simulation. The primary goal of this research is to optimise the fuel (in this case, the number of ions) during operation, with the stated aim of maximising the time of operation of the spacecraft.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"258 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83504985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Embeddings for MIMO Channel Decoding on Quantum Annealers 量子退火炉上MIMO信道解码的嵌入研究
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2021-01-01 DOI: 10.36244/ICJ.2021.1.2
Ádám Marosits, Zsolt Tabi, Zsófia Kallus, Péter Vaderna, I. Gódor, Z. Zimborás
Quantum Annealing provides a heuristic method leveraging quantum mechanics for solving Quadratic Unconstrained Binary Optimization problems. Existing Quantum Annealing processing units are readily available via cloud platform access for a wide range of use cases. In particular, a novel device, the D-Wave Advantage has been recently released. In this paper, we study the applicability of Maximum Likelihood (ML) Channel Decoder problems for MIMO scenarios in centralized RAN. The main challenge for exact optimization of ML decoders with ever-increasing demand for higher data rates is the exponential increase of the solution space with problem sizes. Since current 5G solutions can only use approximate methodologies, Kim et al. [1] leveraged Quantum Annealing for large MIMO problems with phase shift keying and quadrature amplitude modulation scenarios. Here, we extend upon their work and present embedding limits for both more complex modulation and higher receiver / transmitter numbers using the Pegasus P16 topology of the D-Wave Advantage system.
量子退火提供了一种利用量子力学求解二次型无约束二元优化问题的启发式方法。现有的量子退火处理单元可以通过云平台访问,用于广泛的用例。特别是最近推出的新产品“D-Wave Advantage”。在本文中,我们研究了最大似然(ML)信道解码器问题在集中式无线局域网中MIMO场景的适用性。随着对更高数据速率的需求不断增长,精确优化ML解码器的主要挑战是解决方案空间随着问题规模的指数增长。由于目前的5G解决方案只能使用近似方法,Kim等人利用量子退火来解决具有相移键控和正交调幅场景的大型MIMO问题。在这里,我们扩展了他们的工作,并使用D-Wave Advantage系统的Pegasus P16拓扑,提出了更复杂的调制和更高的接收器/发射器数量的嵌入限制。
{"title":"Exploring Embeddings for MIMO Channel Decoding on Quantum Annealers","authors":"Ádám Marosits, Zsolt Tabi, Zsófia Kallus, Péter Vaderna, I. Gódor, Z. Zimborás","doi":"10.36244/ICJ.2021.1.2","DOIUrl":"https://doi.org/10.36244/ICJ.2021.1.2","url":null,"abstract":"Quantum Annealing provides a heuristic method leveraging quantum mechanics for solving Quadratic Unconstrained Binary Optimization problems. Existing Quantum Annealing processing units are readily available via cloud platform access for a wide range of use cases. In particular, a novel device, the D-Wave Advantage has been recently released. In this paper, we study the applicability of Maximum Likelihood (ML) Channel Decoder problems for MIMO scenarios in centralized RAN. The main challenge for exact optimization of ML decoders with ever-increasing demand for higher data rates is the exponential increase of the solution space with problem sizes. Since current 5G solutions can only use approximate methodologies, Kim et al. [1] leveraged Quantum Annealing for large MIMO problems with phase shift keying and quadrature amplitude modulation scenarios. Here, we extend upon their work and present embedding limits for both more complex modulation and higher receiver / transmitter numbers using the Pegasus P16 topology of the D-Wave Advantage system.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"30 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80146916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identification of the Possible Security Issues of the 464XLAT IPv6 Transition Technology 464XLAT IPv6转换技术可能存在的安全问题分析
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2021-01-01 DOI: 10.36244/icj.2021.4.2
A. Al-Azzawi, G. Lencse
This paper focuses on one of the most prominent IPv6 transition technologies named 464XLAT. The aim is to analyze the security threats that this technology might face. After carrying out the threat analysis using STRIDE method that stands for Spoofing, Tampering, Repudiation, Information Disclosure and Elevation of Privilege, and using DFD (Data-Flow Diagram) as a core for the analysis, we summarized the security vulnerabilities and attack points possibilities within this infrastructure. We have also built a testbed for 464XLAT topology using several virtual machines, which were created using Debian image. We used our testbed to perform DoS (Denial of Service) attack against the PLAT (provider-side translator) and monitor PLAT’s performance and the number of packets being translated under attack by different number of clients using the hping3 command.
本文重点介绍了目前最突出的IPv6转换技术之一——464XLAT。目的是分析该技术可能面临的安全威胁。在使用STRIDE方法(Spoofing, tampening, Repudiation, Information Disclosure and Elevation of Privilege)进行威胁分析后,我们以DFD (Data-Flow Diagram)为分析核心,总结了该基础架构中的安全漏洞和攻击点可能性。我们还使用几个虚拟机为464XLAT拓扑构建了一个测试平台,这些虚拟机是使用Debian映像创建的。我们使用我们的测试平台对PLAT(提供端转换器)执行DoS(拒绝服务)攻击,并使用hping3命令监控PLAT的性能和在不同数量的客户端攻击下被翻译的数据包数量。
{"title":"Identification of the Possible Security Issues of the 464XLAT IPv6 Transition Technology","authors":"A. Al-Azzawi, G. Lencse","doi":"10.36244/icj.2021.4.2","DOIUrl":"https://doi.org/10.36244/icj.2021.4.2","url":null,"abstract":"This paper focuses on one of the most prominent IPv6 transition technologies named 464XLAT. The aim is to analyze the security threats that this technology might face. After carrying out the threat analysis using STRIDE method that stands for Spoofing, Tampering, Repudiation, Information Disclosure and Elevation of Privilege, and using DFD (Data-Flow Diagram) as a core for the analysis, we summarized the security vulnerabilities and attack points possibilities within this infrastructure. We have also built a testbed for 464XLAT topology using several virtual machines, which were created using Debian image. We used our testbed to perform DoS (Denial of Service) attack against the PLAT (provider-side translator) and monitor PLAT’s performance and the number of packets being translated under attack by different number of clients using the hping3 command.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"15 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78415679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel UWB Monopole Antenna with Reconfigurable Band Notch Characteristics Based on PIN Diodes 一种基于PIN二极管的可重构带陷波特性超宽带单极天线
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2021-01-01 DOI: 10.36244/icj.2021.3.4
Yahieal Alnaiemy, L. Nagy
Our design for a novel UWB monopole antenna structure with reconfigurable band notch characteristics based on PIN diodes is presented in this paper. The proposed antenna is comprised of a modified circular patch and a partial ground plane. The band-notch characteristics are achieved by etching a slot on the partial ground plane and inserting three PIN diodes into the slots for adjusting the operating antenna bands. The reconfigurability is achieved by adding three PIN diodes to obtain eight states with UWB, dual and triple operating bands which can be obtained by changing the PIN state from ON to OFF, and vice versa. The proposed design shows a simple biasing process to switch the frequency bands with insignificant gain variation and low radiation efficiency reduction. The reconfigurability of the frequency is accomplished by adjusting the effective slot length through modifying the PIN diodes states at the desired operating bands. The desired operating frequency bands can be obtained by switching the diodes. A systematic parametric study based on a numerical analysis is invoked to verify and refine the proposed performance. The proposed antenna is fabricated on FR-4 substrate with dimensions of 50×60×1 mm3. The proposed antenna performance was tested experimentally and compared to the simulated results from CSTMW based on FIT. Experimental results were in concordance with simulated results. We found that the proposed antenna design had simple geometry and it was easy to control the frequency bands to suit the applications of WiMAX and WiFi systems.
本文设计了一种基于PIN二极管的具有可重构带陷波特性的超宽带单极天线结构。所提出的天线由改进的圆形贴片和部分地平面组成。通过在部分接平面上刻蚀一个槽并将三个PIN二极管插入该槽中以调整操作天线频带来实现带缺口特性。可重构性是通过增加3个PIN二极管获得8个超宽带、双频段和三频段的状态来实现的,这些状态可以通过将PIN状态从ON变为OFF来获得,反之亦然。该设计显示了一个简单的偏置过程来切换频段,增益变化小,辐射效率降低低。频率的可重构性是通过修改PIN二极管在所需工作频带上的状态来调整有效槽长度来实现的。通过开关二极管可以获得所需的工作频带。通过基于数值分析的系统参数研究来验证和改进所提出的性能。该天线在FR-4衬底上制作,尺寸为50×60×1 mm3。实验验证了该天线的性能,并与基于FIT的CSTMW仿真结果进行了比较。实验结果与模拟结果吻合较好。我们发现所提出的天线设计具有简单的几何形状,并且易于控制频段以适应WiMAX和WiFi系统的应用。
{"title":"A Novel UWB Monopole Antenna with Reconfigurable Band Notch Characteristics Based on PIN Diodes","authors":"Yahieal Alnaiemy, L. Nagy","doi":"10.36244/icj.2021.3.4","DOIUrl":"https://doi.org/10.36244/icj.2021.3.4","url":null,"abstract":"Our design for a novel UWB monopole antenna structure with reconfigurable band notch characteristics based on PIN diodes is presented in this paper. The proposed antenna is comprised of a modified circular patch and a partial ground plane. The band-notch characteristics are achieved by etching a slot on the partial ground plane and inserting three PIN diodes into the slots for adjusting the operating antenna bands. The reconfigurability is achieved by adding three PIN diodes to obtain eight states with UWB, dual and triple operating bands which can be obtained by changing the PIN state from ON to OFF, and vice versa. The proposed design shows a simple biasing process to switch the frequency bands with insignificant gain variation and low radiation efficiency reduction. The reconfigurability of the frequency is accomplished by adjusting the effective slot length through modifying the PIN diodes states at the desired operating bands. The desired operating frequency bands can be obtained by switching the diodes. A systematic parametric study based on a numerical analysis is invoked to verify and refine the proposed performance. The proposed antenna is fabricated on FR-4 substrate with dimensions of 50×60×1 mm3. The proposed antenna performance was tested experimentally and compared to the simulated results from CSTMW based on FIT. Experimental results were in concordance with simulated results. We found that the proposed antenna design had simple geometry and it was easy to control the frequency bands to suit the applications of WiMAX and WiFi systems.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"13 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79070230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Infocommunications Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1