IEEE AccessPub Date : 2023-10-13DOI: 10.1109/ACCESS.2023.3322933
Koki Nakamura;Kosuke Sekiyama
{"title":"Robot Symbolic Motion Planning and Task Execution Based on Mixed Reality Operation","authors":"Koki Nakamura;Kosuke Sekiyama","doi":"10.1109/ACCESS.2023.3322933","DOIUrl":"https://doi.org/10.1109/ACCESS.2023.3322933","url":null,"abstract":"With the increasing demand for human–robot collaboration (HRC), intuitive interfaces are essential to connect humans and robots. A promising approach is the use of mixed reality (MR) to enhance spatial understanding through virtual and augmented reality. In this paper, we propose a novel HRC system that extracts human handling procedures and generates concrete motion plans for the robot. The user, wearing an MR device, interacts with virtual objects in the MR space using natural hand motions. These motions and resulting state transitions are abstracted into a symbolic semi-order motion planner represented by the reachability graph (RG). Using the RG, an autonomous behavior tree is generated, considering the robot’s task environment, and the concrete motion plan is executed by the robot. This system allows the robot to take a more flexible approach to user instructions than conventional MR-HRC systems. Moreover, this system translates human orders into plans that are independent of a specific robot, demonstrating considerable development potential.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"11 ","pages":"112753-112763"},"PeriodicalIF":3.9,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285324.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50212166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IEEE AccessPub Date : 2023-10-13DOI: 10.1109/ACCESS.2023.3324547
Alpaslan Demirci
{"title":"Optimal Sizing and Techno-Economic Evaluation of Microgrids Based on 100% Renewable Energy Powered by Second-Life Battery","authors":"Alpaslan Demirci","doi":"10.1109/ACCESS.2023.3324547","DOIUrl":"https://doi.org/10.1109/ACCESS.2023.3324547","url":null,"abstract":"The rapid development of distributed renewable energy has made energy storage essential for demand reliability and flexible energy management. Due to the high investment costs of fresh batteries (FB), achieving a positive and efficient economy takes work. However, second-life batteries (SLB), whose capacity decreases by 20-30% after the first use, can be preferred as alternative energy storage to overcome this challenge. This paper investigates the renewable potential of shared energy storage and the feasibility of FB&SLB for prosumers. In addition, threshold points are determined by examining the financial obligations associated with an increasing share of renewables on the path to 100% renewable energy. Moreover, the impact of carbon taxes on extra CO2 reduction costs is assessed depending on the carbon quota. The results confirm the superiority of SLB, which increases throughput by 11.5% while reducing CO2 by 9.4%. Renewable fractions (RFs) above 59.2% and 87% in optimal hybrid power systems (HPS), in different climate potentials, and for low and high energy tariffs lead to costly investments. Increasing the carbon tax could reduce the cost of CO2 reduction by up to 5.2 \u0000<inline-formula> <tex-math>${$}/kg$ </tex-math></inline-formula>\u0000 in the early stages of carbon limits while avoiding extra costs of up to 2.1 \u0000<inline-formula> <tex-math>${$}/kg$ </tex-math></inline-formula>\u0000 for FB at lower CO2 limits. In contrast, increasing RF from 95% to 100% would increase net present cost (NPC) by up to 122.65%. It will be more critical than ever for governments to support prosumers’ financial trade-offs in the transition to clean energy.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"11 ","pages":"113291-113306"},"PeriodicalIF":3.9,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285096.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50215178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IEEE AccessPub Date : 2023-10-13DOI: 10.1109/ACCESS.2023.3324304
Ujjwal;Rajkishor Kumar;Radhakrishna Bhat
{"title":"Generation of Broadband Optical Frequency Comb by Interfering Dual Lasers in Electro-Optic Modulators","authors":"Ujjwal;Rajkishor Kumar;Radhakrishna Bhat","doi":"10.1109/ACCESS.2023.3324304","DOIUrl":"https://doi.org/10.1109/ACCESS.2023.3324304","url":null,"abstract":"In this article, we proposed two schemes for generating a broadband optical frequency comb (OFC) source using dual laser sources. In the first proposed technique, the OFC is generated using a cascaded single-drive Mach-Zehnder modulator (MZM) and dual-drive Mach-Zehnder modulator (DD-MZM). Here, the two CW light sources are modulated by each of the MZM, respectively. The first single-drive MZM generates the subcarriers, while The second DD-MZM carries out intensity modulation on the output spectrum generated by the MZM, ensuring that the power fluctuations of both even and odd sidebands are adjusted to an equal level. The second approach involves replacing the single-drive MZM with a phase modulator (PM). The center frequencies of laser 1 and laser 2 must be carefully set to achieve a non-overlapping or gap-free comb spectrum. The frequency of the RF signal driving the modulators determines the spacing between the laser frequencies. In order to illustrate this aspect, we have utilized three distinct RF signal frequencies: 10 GHz, 16 GHz, and 20 GHz. Furthermore, we have examined the constraints that impact the estimation of the center frequency of laser 2, aiming for a non-overlapping and gap-free comb spectrum. By considering these constraints, we can ensure the successful generation of a uniform and stable comb spectrum with the desired characteristics in our proposed approach. The theoretical and primary analysis of cascaded single-drive MZM and DD-MZM, as well as cascaded PM and DD-MZM, is also investigated, and simulation results confirm the findings. By employing our proposed approach, OFC achieves a significant number of comb lines while exhibiting a power deviation of \u0000<inline-formula> <tex-math>$sim $ </tex-math></inline-formula>\u0000 2 dB in comparison to single laser configurations.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"11 ","pages":"113064-113076"},"PeriodicalIF":3.9,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285061.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50212155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IEEE AccessPub Date : 2023-10-13DOI: 10.1109/ACCESS.2023.3324609
Rashid Baembitov;Mladen Kezunovic
{"title":"State of Risk Prediction for Management and Mitigation of Vegetation and Weather Caused Outages in Distribution Networks","authors":"Rashid Baembitov;Mladen Kezunovic","doi":"10.1109/ACCESS.2023.3324609","DOIUrl":"https://doi.org/10.1109/ACCESS.2023.3324609","url":null,"abstract":"The paper proposes a novel approach for the outage State of Risk (SoR) assessment caused by weather and vegetation in the distribution grid. Machine Learning prediction algorithm is used in conjunction with GIS application for mapping the SoR for the entire network. The proposed optimization approach leads to the specification of the mitigation strategies that utility staff and customers can coordinate to minimize the impact of outages. The resulting SoR assessment enables the implementation of an innovative decision-making solution for utility operators, represented in the form of risk maps. Additionally, utilizing the SoR assessments, a Customer Notification System (CNS) is introduced to enhance customer awareness and facilitate the adoption of mitigation measures. This holistic approach shifts outage management from a reactive process to a proactive initiative, promoting grid resilience and reliability through planned outage mitigation.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"11 ","pages":"113864-113875"},"PeriodicalIF":3.9,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285092.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50215073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IEEE AccessPub Date : 2023-10-13DOI: 10.1109/ACCESS.2023.3324456
Eran Rosenberg;Yoav Koral;Achimeir Mekeyess;Moshe Mizrachi;Doron Solomon;Eldad Holdengreber;Shmuel E. Schacham;Eliyahu Farber
{"title":"Low Loss Multi-Channel Communication Combiner for Cellular Applications","authors":"Eran Rosenberg;Yoav Koral;Achimeir Mekeyess;Moshe Mizrachi;Doron Solomon;Eldad Holdengreber;Shmuel E. Schacham;Eliyahu Farber","doi":"10.1109/ACCESS.2023.3324456","DOIUrl":"https://doi.org/10.1109/ACCESS.2023.3324456","url":null,"abstract":"The increasing demand for cellular communication channels calls for multichannel solutions. Using one antenna for each channel results in a high density of antennas at the compact cellular station front, which generates inter-channel interference. This may result in distractive interference and significant losses at the output and input of the channels. To overcome these drawbacks, we propose a technology that combines several channels into a single antenna. We implemented a frequency-tuned, multi-channel phase control system with a phase shifter connected to each channel, with low insertion loss and low return loss. The phase shifter is composed of an ultra-wideband coupler and a computer-controlled capacitor. To obtain low insertion loss of the phase shifter, typically 1.5 dB, we designed a planar tandem hybrid coupler for the desired frequency range. We used a capacitor bank of varactor diodes for frequency tuning. The capacitance of these diodes was controlled by the applied reverse bias voltage generated by a D/A converter. The control computer received the digital input to the converter through a serial communication line. The channels were simultaneously phase matched to minimize channel losses. We performed an extensive theoretical analysis of a multi-channel frequency combiner. Based on the simulation results, a three-channel multi-coupler was implemented. The high performance of the system was demonstrated experimentally.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"11 ","pages":"114316-114321"},"PeriodicalIF":3.9,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285107.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50214514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IEEE AccessPub Date : 2023-10-13DOI: 10.1109/ACCESS.2023.3324536
Michal R. Wróbel;Jaroslaw Szymukowicz;Pawel Weichbroth
{"title":"Using Continuous Integration Techniques in Open Source Projects—An Exploratory Study","authors":"Michal R. Wróbel;Jaroslaw Szymukowicz;Pawel Weichbroth","doi":"10.1109/ACCESS.2023.3324536","DOIUrl":"https://doi.org/10.1109/ACCESS.2023.3324536","url":null,"abstract":"For a growing number of software projects, continuous integration (CI) techniques are becoming an essential part of the process. However, the maturity of their adoption in open source projects varies. In this paper, we present an empirical study on GitHub repositories to explore the use of continuous integration techniques in open source projects. Following the Goal-Question-Metric (GQM) approach, 3 research questions and 7 metrics were defined for such a goal. We mined 10 repositories of open source projects with 101,149 pull requests, 399,671 commits from 20,432 developers. This was followed by exploratory data analysis for each metric. In summary, our results indicate that (RQ1) most failed CI builds required a small change in the pull request to fix the code; (RQ2) CI builds of smaller pull requests are more likely to succeed than larger ones; (RQ3) there was no correlation found between developer experience in committing to the project and the success rate of CI builds. Most of the projects studied have not yet developed a mature approach to using continuous integration techniques. In these cases, developers do not thoroughly test code before submitting pull requests. Furthermore, the results of the study confirmed that developers tend to submit pull requests with small amounts of new or modified code.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"11 ","pages":"113848-113863"},"PeriodicalIF":3.9,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285080.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50362818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IEEE AccessPub Date : 2023-10-13DOI: 10.1109/ACCESS.2023.3324597
Alireza Asadi;Mohammad Saleh Karimzadeh;Xiaodong Liang;Mohammad Saeed Mahdavi;Gevork B. Gharehpetian
{"title":"A Novel Control Approach for a Single-Inductor Multi-Input Single-Output DC–DC Boost Converter for PV Applications","authors":"Alireza Asadi;Mohammad Saleh Karimzadeh;Xiaodong Liang;Mohammad Saeed Mahdavi;Gevork B. Gharehpetian","doi":"10.1109/ACCESS.2023.3324597","DOIUrl":"https://doi.org/10.1109/ACCESS.2023.3324597","url":null,"abstract":"In this paper, a single-inductor multi-input single-output (SI-MISO) DC-DC boost converter is used for solar photovoltaic (PV) systems in DC or AC grids. The converter with N number of inputs combines energy from PV panels along with fuel cells (FCs) to maintain stability. By implementing a new switching algorithm in the converter, the output voltage of the converter and the power absorbed from each source can be controlled independently, resulting in a simple and unique controller. In addition, the multivariable control system can be controlled as N number of single-input single-output (SISO) systems without any delay between switches due to the small-signal model of the converter and the proposed proportional-integral-derivative (PID) cascade control scheme. For each PV source, an independent maximum power point tracking (MPPT) algorithm can be employed, and the current sharing among different sources can be achieved independently. The converter’s operating modes and the designed controller are present in the paper. Experimental results using a 100-W prototype converter validate the accuracy and efficiency of the proposed control scheme.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"11 ","pages":"114753-114764"},"PeriodicalIF":3.9,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285063.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50364120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IEEE AccessPub Date : 2023-10-13DOI: 10.1109/ACCESS.2023.3324371
Zhi Qiang Wang;Abdulmotaleb El Saddik
{"title":"DTITD: An Intelligent Insider Threat Detection Framework Based on Digital Twin and Self-Attention Based Deep Learning Models","authors":"Zhi Qiang Wang;Abdulmotaleb El Saddik","doi":"10.1109/ACCESS.2023.3324371","DOIUrl":"https://doi.org/10.1109/ACCESS.2023.3324371","url":null,"abstract":"Recent statistics and studies show that the loss generated by insider threats is much higher than that generated by external attacks. More and more organizations are investing in or purchasing insider threat detection systems to prevent insider risks. However, the accurate and timely detection of insider threats faces significant challenges. In this study, we proposed an intelligent insider threat detection framework based on Digital Twins and self-attentions based deep learning models. First, this paper introduces insider threats and the challenges in detecting them. Then this paper presents recent related works on solving insider threat detection problems and their limitations. Next, we propose our solutions to address these challenges: building an innovative intelligent insider threat detection framework based on Digital Twin (DT) and self-attention based deep learning models, performing insight analysis of users’ behavior and entities, adopting contextual word embedding techniques using Bidirectional Encoder Representations from Transformers (BERT) model and sentence embedding technique using Generative Pre-trained Transformer 2 (GPT-2) model to perform data augmentation to overcome significant data imbalance, and adopting temporal semantic representation of users’ behaviors to build user behavior time sequences. Subsequently, this study built self-attention-based deep learning models to quickly detect insider threats. This study proposes a simplified transformer model named DistilledTrans and applies the original transformer model, DistilledTrans, BERT + final layer, Robustly Optimized BERT Approach (RoBERTa) + final layer, and a hybrid method combining pre-trained (BERT, RoBERTa) with a Convolutional Neural Network (CNN) or Long Short-term Memory (LSTM) network model to detect insider threats. Finally, this paper presents experimental results on a dense dataset CERT r4.2 and augmented sporadic dataset CERT r6.2, evaluates their performance, and performs a comparison analysis with state-of-the-art models. Promising experimental results show that 1) contextual word embedding insert and substitution predicted by the BERT model, and context embedding sentences predicted by the GPT-2 model are effective data augmentation approaches to address high data imbalance; 2) DistilledTrans trained with sporadic dataset CERT r6.2 augmented by the contextual embedding sentence method predicted by GPT-2, outperforms the state-of-the-art models in terms of all evaluation metrics, including accuracy, precision, recall, F1-score, and Area Under the ROC Curve (AUC). Additionally, its structure is much simpler, and thus training time and computing cost are much less than those of recent models; 3) when trained with the dense dataset CERT r4.2, pre-trained models BERT plus a final layer or RoBERTa plus a final layer can achieve significantly higher performance than the current models with a very little sacrifice of precision. However, complex hybrid methods may n","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"11 ","pages":"114013-114030"},"PeriodicalIF":3.9,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285086.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50363736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IEEE AccessPub Date : 2023-10-13DOI: 10.1109/ACCESS.2023.3324420
Po-Yu Kuo;Tai-Hui Wang;Ming-Tai Hsu;Chi-Han Liao
{"title":"Development of a Flexible Printed Circuit Board-Based Potentiometric Urea Biosensor Combined With Power Management Circuit Chip","authors":"Po-Yu Kuo;Tai-Hui Wang;Ming-Tai Hsu;Chi-Han Liao","doi":"10.1109/ACCESS.2023.3324420","DOIUrl":"https://doi.org/10.1109/ACCESS.2023.3324420","url":null,"abstract":"This study proposes a power management circuit integrated with a readout circuit for measuring urea biosensors. The proposed power management circuit replaces the bulky power supply traditionally used in measurement systems. It operates with only a single 3V button cell for voltage reduction and stabilization. We have designed and manufactured a printed circuit board (PCB) that integrates passive components and power management readout circuit chip for measuring a urea biosensor. A RuO2 thin film was prepared on a flexible printed circuit board (FPCB) through radio frequency (RF) sputtering. To fabricate the urea sensor, we used 3-Aminopropyltriethoxysilane (\u0000<inline-formula> <tex-math>$gamma $ </tex-math></inline-formula>\u0000-APTES), glutaraldehyde, and urease. The average sensitivity of the urea sensor was evaluated to be 3.121 (mV/(mg/dL)), with a linearity of 0.994 and a reproducibility of 2.59 %. These results confirm the stability and reliability of the sensor architecture.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"11 ","pages":"113694-113703"},"PeriodicalIF":3.9,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285089.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50215064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IEEE AccessPub Date : 2023-10-13DOI: 10.1109/ACCESS.2023.3324612
Victor R. Kebande
{"title":"Extended-Chacha20 Stream Cipher With Enhanced Quarter Round Function","authors":"Victor R. Kebande","doi":"10.1109/ACCESS.2023.3324612","DOIUrl":"https://doi.org/10.1109/ACCESS.2023.3324612","url":null,"abstract":"Chacha20 is a widely used stream cipher known for using permutation functions to enhance resistance against cryptanalysis. Although the existing literature highlights its strengths, it is worth further exploring its potential susceptibility to differential attacks. This paper proposes an Extended Chacha20 (EChacha20) stream cipher, which offers a slight improvement of Chacha20. It incorporates enhanced Quarter Round Functions \u0000<inline-formula> <tex-math>$QR-F$ </tex-math></inline-formula>\u0000 with 32-bit input words and \u0000<inline-formula> <tex-math>$Add $ </tex-math></inline-formula>\u0000, \u0000<inline-formula> <tex-math>$Rotate $ </tex-math></inline-formula>\u0000, and \u0000<inline-formula> <tex-math>$XOR (ARX)$ </tex-math></inline-formula>\u0000 operations on 16, 12, 8, 7, 4, and 2 constants. Using these improved \u0000<inline-formula> <tex-math>$QR-Fs$ </tex-math></inline-formula>\u0000, we expect EChacha20 to be more secure and effective against attacks than Chacha20. The threat model leveraged in this paper considers attacker assumptions based on the Bellare-Rogaway Model (B-RM) and the Chosen Plaintext Attack (CPA) to assess the potential security weaknesses. Then, the study analyzes the EChacha20 cipher using the NIST Statistical Test Suite (NSTS) and demonstrates its effectiveness against differential cryptanalysis. A differential attack addresses this challenge, where the study comprehensively analyses the differences between original and flipped bits. The NSTS has been used to statistically analyze the outcome for uniformity and evaluate the randomness of generating sequences of tests considering 1000 tests based on a range of \u0000<inline-formula> <tex-math>$[{0,1}]$ </tex-math></inline-formula>\u0000. Uniformity is evaluated based on the \u0000<inline-formula> <tex-math>$p-values$ </tex-math></inline-formula>\u0000 test against a battery of passing sequences, and 100% is achieved from \u0000<inline-formula> <tex-math>$Runs$ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$Serial (2): Test 1$ </tex-math></inline-formula>\u0000, respectively. The performance evaluation metrics leveraged include encryption speed, decryption speed, and memory usage. Based on the test conducted, it has been observed that with increased \u0000<inline-formula> <tex-math>$QR-F$ </tex-math></inline-formula>\u0000, EChacha20 maintains a good balance in speed although slightly higher than Chacha20; however, with also slightly high memory usage compared to Chacha20. Despite that, a comparative study has been conducted against state-of-the-art studies, and the outcome has been reported to show the significance of the current study. Ultimately, the outcome indicates that the EChacha20 cipher has improved \u0000<inline-formula> <tex-math>$QR-F$ </tex-math></inline-formula>\u0000 and security properties compared to Chacha20 and may provide a more robust encryption solution for various applications.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"11 ","pages":"114220-114237"},"PeriodicalIF":3.9,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285091.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50214477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}