Amrutha M. Raghukumar, Gayathri Narayanan, Somanathanm Geethu Remadevi
{"title":"Optimized Supervised ML for Medicinal Plant Detection - An FPGA Implementation","authors":"Amrutha M. Raghukumar, Gayathri Narayanan, Somanathanm Geethu Remadevi","doi":"10.24425/ijet.2024.149576","DOIUrl":"https://doi.org/10.24425/ijet.2024.149576","url":null,"abstract":"Medicinal plants have a huge significance today as it is the root resource to treat several ailments and medical disorders that do not find a satisfactory cure using allopathy. The manual and physical identification of such plants requires experience and expertise and it can be a gradual and cumbersome task, in addition to resulting in inaccurate decisions. In an attempt to automate this decision making, a data set of leaves of 10 medicinal plant species were prepared and the Gray-level Co-occurence Matrix (GLCM) features were extracted. From our earlier implementations of the several machine learning algorithms, the k-nearest neighbor (KNN) algorithm was identified as best suited for classification using MATLAB 2019a and has been adopted here. Based on the confusion matrices for various k values, the optimum k was selected and the hardware implementation was implemented for the classifier on FPGA in this work. An accuracy of 88.3% was obtained for the classifier from the confusion chart. A custom intellectual property (IP) for the design is created and its verification is done on the ZedBoard for three classes of plants.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Lakhno, Nurgazy Kurbaiyazov, Miroslav Lakhno, Olena Kryvoruchko, A. Desiatko, Svitlana Tsiutsiura, Mykola Tsiutsiura
{"title":"Analysis of digital footprints associated with cybersecurity behavior patterns of users of University Information and Education Systems","authors":"V. Lakhno, Nurgazy Kurbaiyazov, Miroslav Lakhno, Olena Kryvoruchko, A. Desiatko, Svitlana Tsiutsiura, Mykola Tsiutsiura","doi":"10.24425/ijet.2024.149596","DOIUrl":"https://doi.org/10.24425/ijet.2024.149596","url":null,"abstract":"The analysis of digital footprints (DF) related to the cybersecurity (cyber risk) user behavior of university information and education systems (UIES) involves the study and evaluation of various aspects of activity in the systems. In particular, such analysis includes the study of typical patterns (patterns) of access to UIES, password usage, network activity, compliance with security policies, identification of anomalous behavior, and more. It is shown that user behavior in UIES is represented by sequences of actions and can be analyzed using the sequential analysis method. Such analysis will allow information security (IS) systems of UIES to efficiently process categorical data associated with sequential patterns of user actions. It is shown that analyzing sequential patterns of cyberthreatening user behavior will allow UIES IS systems to identify more complex threats that may be hidden in chains of actions, not just individual events. This will allow for more effective identification of potential threats and prevention of security incidents in the UIES.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complete synthesis of identity templates for quantum and reversible logic MCT circuits using SAT-solvers and proposal of suboptimality witness notion","authors":"Adam Jagielski","doi":"10.24425/ijet.2024.149602","DOIUrl":"https://doi.org/10.24425/ijet.2024.149602","url":null,"abstract":"In this study, we introduce a procedural generation technique for Identity Templates applicable to quantum and reversible logic circuits. These templates are recognized for their significant role in enhancing the efficiency of quantum and reversible logic optimization. Our approach enables the exhaustive synthesis of all potential templates up to a specified size. Leveraging the power of SAT-solver technology, we have verified the comprehensiveness of our template collections by confirming the full exploration of the search space. Additionally, we propose an innovative concept of Suboptimality Witnesses, which we anticipate will be instrumental in streamlining the search process in formal methods, akin to SAT-solvers, for the synthesis of reversible logic circuits.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Musab T. S. Al-Kaltakchi, R. Al-Nima, Azza Alhialy
{"title":"Estimating risk levels for blood pressure and thyroid hormone using artificial intelligence methods","authors":"Musab T. S. Al-Kaltakchi, R. Al-Nima, Azza Alhialy","doi":"10.24425/ijet.2024.149595","DOIUrl":"https://doi.org/10.24425/ijet.2024.149595","url":null,"abstract":"In this work, artificial intelligence methods are designed and adopted for evaluating various risk levels of thyroid hormone and blood pressure in humans. Fuzzy Logic (FL) method is firstly exploited to provide the risk levels. Additionally, a machine learning was proposed using the Adaptive Neuron- Fuzzy Inference System (ANFIS) to learn and assess the risk levels by fusing a multiple-layer Neural Network (NN) with the FL. The data are collected for standard risk levels from real medical centers. The results lead to well ANFIS design based on the FL, which can generate such interesting outcomes for predicting risk levels for thyroid hormone and blood pressure. Both proposed methods of the FL and ANFIS can be exploited for medical applications.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Vitulyova, K. Kadyrzhan, Aruzhan Kadyrzhan, I. Suleimenov
{"title":"Application of focusing systems to the protection of information during data transmission in the zone of direct radio visibility","authors":"Y. Vitulyova, K. Kadyrzhan, Aruzhan Kadyrzhan, I. Suleimenov","doi":"10.24425/ijet.2024.149599","DOIUrl":"https://doi.org/10.24425/ijet.2024.149599","url":null,"abstract":"It is shown that focusing systems built on the basis of a system of radio receivers spaced apart in space and simulating the operation of a lens can be used to ensure the protection of information during data transmission in the direct radio visibility zone. The synthesis of the lens equivalent in this case is carried out by using a system of phase shifters that change the phase of the oscillations arriving at each of the receivers, so that the receiving system is tuned to a radio wave source located at a specific point in space. In this case, information protection is provided according to the “friend or foe” principle, and any commands coming from other areas of space, except for the point where the authorized operator is located, are ignored. The advantage of this approach is the ability to partially or completely abandon the use of cryptographic methods. It is shown that the proposed approach is of considerable interest for ensuring the stable operation of groups of unmanned aerial vehicles from the point of view of the possibility of intercepting control using electronic warfare methods.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a system to analyse the performance of certified measuring instruments","authors":"Jacek Wójcik, M. Piasecka, Marzena Mięsikowska","doi":"10.24425/ijet.2024.149590","DOIUrl":"https://doi.org/10.24425/ijet.2024.149590","url":null,"abstract":"The aim of this article is to present modern methods for analysing the performance of certified measuring instruments. The design of a system for analysing the performance of certified measuring instruments is presented. In the first part, the traditional process of certification of measuring instruments and methods of market surveillance are described. The other part proposes an electronic solution to support the certification process by supervising the correct operation of measuring instruments.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141805854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information technologies in higher education teaching in the opinions of academic teachers","authors":"M. W. Romaniuk, J. Łukasiewicz-Wieleba","doi":"10.24425/ijet.2024.149608","DOIUrl":"https://doi.org/10.24425/ijet.2024.149608","url":null,"abstract":"The article analyzes the opinions of academic teachers on the use of information technologies (ICT) in higher education teaching. Key conclusions from the study indicate the need to ensure a stable Internet connection and access to functional computer equipment and projectors in each classroom. Teachers emphasize the importance of financing the software and its systematic updating. The university's technical support is also important, including quick response to problems and the availability of the technical department. The respondents point out the need to increase the number of training courses on new tools and AI, which will allow for better adaptation to the needs of students. They also point to the need to equip classrooms with equipment for hybrid classes and support students by providing them with laptops and specialized software.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crowd noise spectra for the calculation of the speech transmission index for public address systems","authors":"P. Dziechciński","doi":"10.24425/ijet.2024.149586","DOIUrl":"https://doi.org/10.24425/ijet.2024.149586","url":null,"abstract":"Knowledge of interfering noise is necessary for the correct design of a public address system. Noise sound levels can be obtained, for example, from BS 5389-1. It is more difficult to acquire knowledge of the interfering noise spectra, and the spectrum is also important for calculating speech intelligibility. As shown in the paper, for crowd noise, it is possible to determine the spectrum by pairing the level of noise to the speech spectrum for appropriate vocal effort. The error in determining the speech transmission index for public address systems for such selected noise spectra, relative to values for measurement-acquired noise spectra, is acceptable.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Origin and properties of own error signals of the discrete wavelet transform algorithms","authors":"Łukasz Dróżdż, Jerzy Roj","doi":"10.24425/ijet.2024.149591","DOIUrl":"https://doi.org/10.24425/ijet.2024.149591","url":null,"abstract":"The article presents a method for analyzing the own errors of the discrete wavelet transform algorithms, which are introduced by these algorithms into the output quantities. The presented considerations include determining the origin of the error signals in question and determining their parameters. Both errors resulting from imperfections in the transmittance of the algorithm and those resulting from its implementation in the actual measurement chain were considered.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Noise spectra for calculation the speech transmission index in public address systems","authors":"P. Dziechciński","doi":"10.24425/ijet.2024.149578","DOIUrl":"https://doi.org/10.24425/ijet.2024.149578","url":null,"abstract":"To precision calculate the speech transmission index (STI), it is necessary to know the level and spectrum of the interfering noise. Simplified design methods used in public address systems are limited to obtaining an appropriate signal-to-noise ratio based on A weighted sound levels. For this reason, among others, guidelines for designers usually contain information on typical interfering noise levels and do not provide information on the noise spectrum. As shown in the paper, the effect of the noise spectrum on STI can be very high, and when such spectrum cannot be obtained by measurement or computation, standardised spectra appropriate for a given type of noise can be used for STI calculations.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}