{"title":"Build Testbenches for Verification in Shift Register ICs using SystemVerilog","authors":"Widianto, H.M. Chasrun, Robert Lis","doi":"10.24425/ijet.2022.141281","DOIUrl":"https://doi.org/10.24425/ijet.2022.141281","url":null,"abstract":"— A testbench is built to verify a functionality of a shift register IC (Integrated Circuit) from stuck-at-faults, stuck-at-1 as well as stuck-at-0. The testbench is supported by components, i.e., generator, interface, driver, monitor, scoreboard, environment, test, and testbench top. The IC consists of sequential logic circuits of D-type flip-flops. The faults may occur at interconnects between the circuits inside the IC. In order to examine the functionality from the faults, both the testbench and the IC are designed using SystemVerilog and simulated using Questasim simulator. Simulation results show the faults may be detected by the testbench. Moreover, the detected faults may be indicated by error statements in transcript results of the simulator .","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135545588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AH Method: a Novel Routine for Vicinity Examination of the Optimum Found with a Genetic Algorithm","authors":"","doi":"10.24425/ijet.2022.141291","DOIUrl":"https://doi.org/10.24425/ijet.2022.141291","url":null,"abstract":"— The paper presents a novel heuristic procedure (further called the AH Method) to investigate function shape in the direct vicinity of the found optimum solution. The survey is conducted using only the space sampling collected during the optimization process with an evolutionary algorithm. For this purpose the finite model of point-set is considered. The statistical analysis of the sampling quality based upon the coverage of the points in question over the entire attraction region is exploited. The tolerance boundaries of the parameters are determined for the user-specified increase of the objective function value above the found minimum. The presented test-case data prove that the proposed approach is comparable to other optimum neighborhood examination algorithms. Also, the AH Method requires noticeably shorter computational time than its counterparts. This is achieved by a repeated, second use of points from optimization without additional objective function calls, as well as significant repository size reduction during preprocessing.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135679663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Compute an Isogeny on the Extended Jacobi Quartic Curves?","authors":"","doi":"10.24425/ijet.2022.139890","DOIUrl":"https://doi.org/10.24425/ijet.2022.139890","url":null,"abstract":"—Computing isogenies between elliptic curves is a significant part of post-quantum cryptography with many practical applications (for example, in SIDH, SIKE, B-SIDH, or CSIDH algorithms). Comparing to other post-quantum algorithms, the main advantages of these protocols are smaller keys, the similar idea as in the ECDH, and a large basis of expertise about elliptic curves. The main disadvantage of the isogeny-based cryptosystems is their computational efficiency - they are slower than other post-quantum algorithms (e.g., lattice-based). That is why so much effort has been put into improving the hitherto known methods of computing isogenies between elliptic curves. In this paper, we present new formulas for computing isogenies between elliptic curves in the extended Jacobi quartic form with two methods: by transforming such curves into the short Weierstrass model, computing an isogeny in this form and then transforming back into an initial model or by computing an isogeny directly between two extended Jacobi quartics.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135635071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Implementation of Efficient Inline DDoS Detector Based on AATAC Algorithm","authors":"","doi":"10.24425/ijet.2022.143899","DOIUrl":"https://doi.org/10.24425/ijet.2022.143899","url":null,"abstract":"— Distributed Denial of Service (DDoS) attacks constitute a major threat in the current Internet. These cyber-attacks aim to flood the target system with tailored malicious network traffic overwhelming its service capacity and consequently severely limiting legitimate users from using the service. This paper builds on the state-of-the-art AATAC algorithm (Autonomous Algorithm for Traffic Anomaly Detection) and provides a concept of a dedicated inline DDoS detector capable of real-time monitoring of network traffic and near-real-time anomaly detection. The inline DDoS detector consists of two main elements: 1) inline probe(s) responsible for link-rate real-time processing and monitoring of network traffic with custom-built packet feature counters, and 2) an analyser that performs the near-real-time statistical analysis of these counters for anomaly detection. These elements communicate asynchronously via the Redis database, facilitating a wide range of deployment scenarios. The inline probes are based on COTS servers and utilise the DPDK framework (Data Plane Development Kit) and parallel packet processing on multiple CPU cores to achieve link rate traffic analysis, including tailored DPI analysis.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135679085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Simulation of 2×2 Micro Strip Circular Patch Antenna Array at 28 GHz for 5G Mobile Station Application","authors":"","doi":"10.24425/ijet.2022.143878","DOIUrl":"https://doi.org/10.24425/ijet.2022.143878","url":null,"abstract":"— This paper proposes the design and simulation of 2 × 𝟐 circular patch antenna array working at 28 GHz by using four inset feed micro strip circular patch antennas to achieve beam forming with directivity around 13dB which is required to overcome part of high path loss challenge for high data rate mm-5G mobile station application. Four element 2x2 array consists of two 1x2 circular patch antenna arrays based on power divider and quarter wavelength transition lines as a matching circuit. The designed antenna array is simulated on RT/duroid 5880 dielectric substrate with properties of 0.5mm thickness, dielectric constant 𝝐 𝒓 =2.2, and tangent loss of 0.0009 by using Computer System Technology (CST) software. The performances in terms of return loss, 3D – radiation pattern is evaluated at 28 GHz frequency band. The design also includes the possibility of inserting four identical 2x2 antenna arrays at four edges of mobile station substrate to achieve broad space coverage by steering the beams of the mobile station arrays.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135679688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Template Matching Using Improved Rotations Fourier Transform Method","authors":"","doi":"10.24425/ijet.2022.143898","DOIUrl":"https://doi.org/10.24425/ijet.2022.143898","url":null,"abstract":"—Template matching is a process to identify and localize a template image on an original image. Several methods are commonly used for template matching, one of which uses the Fourier transform. This study proposes a modification of the method by adding an improved rotation to the Fourier transform. Improved rotation in this study uses increment rotation and three shear methods for the template image rotation process. The three shear rotation method has the advantage of precise and noise-free rotation results, making the template matching process even more accurate. Based on the experimental results, the use of 10°angle increments has increased template matching accuracy. In addition, the use of three shear rotations can improve the accuracy of template matching by 13% without prolonging the processing time.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135679718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Propagation and Network Analysis for a Dipole Based Massive Mimo Antenna for 5G Base Stations","authors":"","doi":"10.24425/ijet.2022.141268","DOIUrl":"https://doi.org/10.24425/ijet.2022.141268","url":null,"abstract":"—In today’s fast -paced world, where everyone/everything is moving towards an online platform, the need to provide high-speed data to all is inevitable. Hence, introducing the emerging 5G technology with orthogonal frequency division multiplexing integrated with massive MIMO technology is the need of the hour. A 640 port Massive MIMO (m-MIMO) antenna with high evenly spread gain and very low delay, along with a practically possible data rate operating in the mm waveband, is proposed for a 5G base station. The individual antenna element consists of a dipole (λ=0.5cm) designed to opera te at 57GHz. Placing the cylindrical MIMO antenna array (8x20) facing the four directions forming the m-MIMO antenna (160x4) at the height of 3m from ground level for simulation. Achievement of a maximum gain of 23.14dBi (θ=90▫) and a minimum data rate of 1.44Gbps with -10dB bandwidth of 2.1GHz (256-QAM) approximately a distance of 478m from the 5G Base station. The m-MIMO structure gives an Envelope Correlation Coefficient of 0.015. The propagation analysis is carried out to substantiate the performance of the proposed system based on field strength and received power. Network Analysis for better reception performance is carried out by changing the antenna height placement, altering the down tilt of the antenna array, and sweeping the polarization angle of the antenna array.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135680034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Second-cycle Electronics and Telecommunications Program with Project Based Learning Approach","authors":"Ewa Raj, Krzysztof Tomalczyk","doi":"10.24425/ijet.2022.141267","DOIUrl":"https://doi.org/10.24425/ijet.2022.141267","url":null,"abstract":"— The paper presents a new second-cycle Electronics and Telecommunications study program that has been running in Lodz University of Technology since 2020. The concept of the program uses the Project Based Learning approach and it is based on three main projects implemented throughout the curriculum. The inspiration was the programs of three foreign universities and extensive research of various groups of stakeholders. The initial evaluation of the program first semester proves high acceptance and satisfaction of the students.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135545564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wesam F. Swedan, Huthifa A. Al_Issa, Ayat Aloqoul, Hadeel Alkofahi, Rahaf Obeidat
{"title":"An Interactive Graphical User Interface Module for Soldier Health and Position Tracking System","authors":"Wesam F. Swedan, Huthifa A. Al_Issa, Ayat Aloqoul, Hadeel Alkofahi, Rahaf Obeidat","doi":"10.24425/ijet.2022.141276","DOIUrl":"https://doi.org/10.24425/ijet.2022.141276","url":null,"abstract":"— Soldiers are the backbone of any armed force. They usually lose their lives due to the lack of medical assistance in emergency situations. Furthermore, army bases face problems due to the inability to track soldiers’ locations in the field. Hence, this paper proposes an interactive graphical user interface module (IGUIM) for soldiers’ bioinformatics acquisition and emergency reaction during combat, a global positioning system (GPS) is used to track soldiers’ locations through a device carried by the soldier . Soldiers’ bioinformatics are gathered using health monitoring biosensors, bidirectional communication between the soldiers and the army base is established via a global system for mobile (GSM). The proposed interactive module aims to enumerate the soldiers on the battlefield within a database that easily facilitates health monitoring, position tracking and bidirectional communication with each soldier through their identification number. The proposed IGUIM will increase the rate of soldiers’ survival in emergencies, which contributes to preserving the human resources of the army during combat.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135584697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}