Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering最新文献

筛选
英文 中文
A Fast Yield Estimation Approach Considering Foundry Variation for Analog Design 模拟设计中考虑铸造变化的快速良率估算方法
Nguyen Cao Qui, T. Hoan
{"title":"A Fast Yield Estimation Approach Considering Foundry Variation for Analog Design","authors":"Nguyen Cao Qui, T. Hoan","doi":"10.1145/3396730.3396733","DOIUrl":"https://doi.org/10.1145/3396730.3396733","url":null,"abstract":"Herein, we propose a fast yield estimation approach for analog circuits design in which we combine the behavioral model of circuit and the Quasi-Monte Carlo (QMC) sampling technique to accelerate yield estimation process. The behavioral model is constructed in Verilog-A based on the simulation results which are done at transistor-level; then, the accuracy of the model is verified by experimental testing on a specific analog circuit. Furthermore, instead of using random circuit samples, in this work, QMC circuit samples are adopted to obtain faster convergence rates for the yield prediction process. In conventional analog design stage, designers repeat a number of yield estimation process to select the optimal design point. Each yield estimation effort is a time-consuming process since designers have to simulate on a large number of circuits. Unlike the conventional method, in this work, we build a look-up table for constructing behavioral model of any given circuit; then, this table can be reused in repeating the yield-estimation processes. Therefore, the proposed method can significantly reduce the time for the yield estimation process. Experimental results show that the proposed approach can speed-up the yield estimation process 8 times compared to conventional simulation-based methods with a reasonable drop in accuracy (less than 5%).","PeriodicalId":168549,"journal":{"name":"Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127162371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Authentication Mechanism for Automated Teller Machine (ATM) through Implementation of Soft Two-Factor Authentication 实现软双因素认证的ATM机增强认证机制
Muhammad R. Rizqi, Adam Waluyo, Genius M. Edgy, Septia Ulfa Sunaringtyas
{"title":"Enhanced Authentication Mechanism for Automated Teller Machine (ATM) through Implementation of Soft Two-Factor Authentication","authors":"Muhammad R. Rizqi, Adam Waluyo, Genius M. Edgy, Septia Ulfa Sunaringtyas","doi":"10.1145/3396730.3396735","DOIUrl":"https://doi.org/10.1145/3396730.3396735","url":null,"abstract":"The demand of Automated Teller Machine (ATM) is exponentially increase from 2003 to 2018 which makes the ATM as important component in modern banking. The easiness and flexibility to have a transaction at any time without the need to stand in a long queue and dealing with administration make ATM is preferable by a lot of bank customers. However, it is also a big attraction point for criminals and fraudsters. Skimming is one of the threat of ATM service which will allow fraudster to create a clone card through duplication and combination of eavesdropping techniques such as shoulder surfing or installation of miniature video camera, utilization of counterfeit hardware proximity, etc. Therefore, an enhanced method of authentication shall be implemented to maintain the security of ATM service. In this work, we are proposing a new mechanism of ATM authentication which will enhance its security through the use of Soft Two-Factor Authenticator. The analysis of our proposed mechanism is done using NIST SP800-63B to ensure its security against possible techniques for skimming. Henceforth, it provides an additional security against skimming.","PeriodicalId":168549,"journal":{"name":"Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129145107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Enhanced Prony Algorithm for On-line Detection of Small Signal Oscillations for Synchrophasor Application 一种用于同步相量小信号振荡在线检测的改进proony算法
Shekha Rai, Javed M. Borbora, S. Nishar
{"title":"An Enhanced Prony Algorithm for On-line Detection of Small Signal Oscillations for Synchrophasor Application","authors":"Shekha Rai, Javed M. Borbora, S. Nishar","doi":"10.1145/3396730.3396742","DOIUrl":"https://doi.org/10.1145/3396730.3396742","url":null,"abstract":"This paper presents an online detection method of small signal oscillations using an enhanced Prony algorithm. The proposed method has considered the affect of missing measure-ments of phasor measurement units (PMUs) which occurs as a result of network congestion or defect in PMUs or phasor data concentrators (PDCs). In this context, at first, a sequential K nearest neighbours (SKNN) classifier is utilized to provide a robust data set to address such issue. In the second step, improved Prony algorithm is used to identify the oscillatory modes. The proposed approach has been compared to Matrix Pencil, Eigen Realization algorithm (ERA) and improved Prony for generated test signals with missing data at different noise levels. The suitability of the proposed monitoring scheme is further demonstrated on two area network and real PMU measurements derived from the Western Electricity Coordinating Council (WECC).","PeriodicalId":168549,"journal":{"name":"Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131899095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Interpolation Comparative Analysis for Missing Internet Traffic Data 缺失互联网流量数据的插值比较分析
I. D. Irawati, A. B. Suksmono, Ian Joseph Matheus Edward
{"title":"An Interpolation Comparative Analysis for Missing Internet Traffic Data","authors":"I. D. Irawati, A. B. Suksmono, Ian Joseph Matheus Edward","doi":"10.1145/3396730.3396740","DOIUrl":"https://doi.org/10.1145/3396730.3396740","url":null,"abstract":"In this paper, we compared interpolation techniques for fixing the missing of internet traffic data. These techniques consist of 2-D interpolation, k-nearest neighbors (KNN), and correlation. We test various types of missing data with missing probability of 0.02 and 0.98. The interpolation technique performance is shown using Normalized Mean Square Error (NMSE) parameters. Simulation results show that all interpolation methods have the ability to recover lost information. 2-D interpolation and KNN suitable for small probability of missing while correlation is suitable for large probability of missing.","PeriodicalId":168549,"journal":{"name":"Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121372582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Health Data Resource Integration Method Based on Hybrid Cloud and Fog Computing 基于云与雾混合计算的大健康数据资源整合方法
Xiaodong Zhang, Xiaojun Xia, Miao Leng
{"title":"Big Health Data Resource Integration Method Based on Hybrid Cloud and Fog Computing","authors":"Xiaodong Zhang, Xiaojun Xia, Miao Leng","doi":"10.1145/3396730.3396737","DOIUrl":"https://doi.org/10.1145/3396730.3396737","url":null,"abstract":"Aiming at the problems of high latency and poor accuracy of retrieval response in current health data integration related research, this paper presents a health data resource integration method based on Hybrid Cloud and Fog Computing. Based on the general model of health data resource service platform, the framework of large health data resource integration is constructed. Sample reduction and dimension reduction are used to reduce big health data. The field matching method based on participle and weight is used to clean data resources and calculate the field matching degree. When the matching degree is larger than a threshold value, the fields to be matched are similar duplicate records, and the redundant data is removed. The weight of resource data is calculated by Hybrid Cloud and Fog Computing, and the big health data is arranged according to the weight value, so as to realize the classification and integration of health data.The experimental results show that the proposed method has good performance, low data redundancy, low retrieval response delay and high classification integration accuracy.","PeriodicalId":168549,"journal":{"name":"Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125093054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Random Access Protocol Based on Idle Pilot Reallocation for Crowded Massive MIMO Systems 拥挤大规模MIMO系统中基于空闲导频再分配的随机接入协议
Lin Yang, J. Du, Hongyu Yang
{"title":"A Random Access Protocol Based on Idle Pilot Reallocation for Crowded Massive MIMO Systems","authors":"Lin Yang, J. Du, Hongyu Yang","doi":"10.1145/3396730.3396741","DOIUrl":"https://doi.org/10.1145/3396730.3396741","url":null,"abstract":"As the occurrence of massive machine type communication (mMTC), the requirements for the performance of random access in crowded massive multiple-input multiple-output (MIMO) systems are increasing. To improve the access performance, a novel random access protocol called strongest-user collision resolution combined idle pilot reallocation (SUCR-IPRA) scheme is proposed. Through the idle pilot reallocation strategy, the utilization of idle pilots can be significantly improved, and its expression is derived in this letter. Numerical results show that the proposed scheme observably outperform the existing strongest-user collision resolution (SUCRe) and SUCR combined idle pilot access (SUCR-IPA) schemes in terms of increasing the efficiency and success rate during the random access process.","PeriodicalId":168549,"journal":{"name":"Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132875699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Salp Swarm Algorithm-Based Nonlinear Robust Control of Magnetic Levitation System Using Feedback Linearization Approach 基于Salp群算法的反馈线性化磁悬浮系统非线性鲁棒控制
Omar Yaseen Ismael, M. Qasim, Mohanad N. Noaman, A. Kurniawan
{"title":"Salp Swarm Algorithm-Based Nonlinear Robust Control of Magnetic Levitation System Using Feedback Linearization Approach","authors":"Omar Yaseen Ismael, M. Qasim, Mohanad N. Noaman, A. Kurniawan","doi":"10.1145/3396730.3396734","DOIUrl":"https://doi.org/10.1145/3396730.3396734","url":null,"abstract":"This paper presents a robust nonlinear controller design for a magnetic levitation system (MLS). The feedback linearization method is utilized to transform the nonlinear model of MLS into the controller form. The controller is then designed and its parameters are optimized by the Salp Swarm Algorithm (SSA). Extensive MATLAB simulations are performed to evaluate the performance of the proposed controller as well as to compare it with PID and LQR controllers which are optimized by the SSA as well. Obtained results demonstrate that the proposed controller successfully tracks different kinds of reference signals (step, sine, and square) even in the presence of the system parameter perturbations and outperforms the PID and LQR controllers.","PeriodicalId":168549,"journal":{"name":"Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116256342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automation of a Valve Manufacturing Process with 7 Mechatronic Stations and a Robotic Arm through a Network of Profibus DP Industrial Protocol with Master-Slave Configuration 基于Profibus DP工业协议网络主从配置的7个机电站和机械臂的阀门制造过程自动化
Alex Junior Valdez De la Cruz, J. H. G. Gamarra, Santiago L. Rubiños-Jimenez
{"title":"Automation of a Valve Manufacturing Process with 7 Mechatronic Stations and a Robotic Arm through a Network of Profibus DP Industrial Protocol with Master-Slave Configuration","authors":"Alex Junior Valdez De la Cruz, J. H. G. Gamarra, Santiago L. Rubiños-Jimenez","doi":"10.1145/3396730.3396738","DOIUrl":"https://doi.org/10.1145/3396730.3396738","url":null,"abstract":"This paper consists of providing an industrial approach to a valve manufacturing system that covers 7 mechatronic stations and a robotic arm, whose connections between each station are conventional point-to-point (PPI) transmissions. To obtain reliable digital and analog data in real-time both at the field and cell level it is essential to use industrial protocols backed by the IEC 61158 standard. For this reason, the Profibus DP (Decentralized Periphery) protocol is optimal for this application as it can transmit data at a greater distance than another communication protocol and high transmission speed, therefore this protocol is still used in most industrial plants in the world. On this occasion, a bus-type topology with master-slave configuration is used for the realization of this document.","PeriodicalId":168549,"journal":{"name":"Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128212153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Tajweed Al-Qur'an on Images Applied Varying Normalized Distance Formulas 应用变归一化距离公式对古兰经图像进行分类
Al Khowarizmi, Akhm, M. Lubis, Arif Ridho Lubis
{"title":"Classification of Tajweed Al-Qur'an on Images Applied Varying Normalized Distance Formulas","authors":"Al Khowarizmi, Akhm, M. Lubis, Arif Ridho Lubis","doi":"10.1145/3396730.3396739","DOIUrl":"https://doi.org/10.1145/3396730.3396739","url":null,"abstract":"Al-Qur'an is a Muslim holy book which is written originally in Arabic where the way of reading it should be aligned with the pronunciation and spelling of the messenger and companion in the time of revelation. It is very important to follow the rule of its reading to avoid misinterpretation of the verses, which the existence of artificial neural networks and image processing can be used to classify various type of Tajweed as the reading discipline of Al-Quran in order to support the readers in term of pronunciation and interpretation. In this classification, the recitation of Al-Qur'an in the form of a number of normalized distance formulas in order to obtain the right optimization for the classification namely normalized Manhattan distance which is consistent at a value <0.5 and one that is not applied in the case of Tajweed Al-Qur'an is normalized hamming distance because the value generated is 1.","PeriodicalId":168549,"journal":{"name":"Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133102822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Support Tool for Rapid Deployment of Large Scale Distributed Sensing Systems 大规模分布式传感系统快速部署的支持工具
T. Truong
{"title":"A Support Tool for Rapid Deployment of Large Scale Distributed Sensing Systems","authors":"T. Truong","doi":"10.1145/3396730.3396731","DOIUrl":"https://doi.org/10.1145/3396730.3396731","url":null,"abstract":"Distributed sensing systems are spatially distributed autonomous sensing devices for environmental observation purposes in large areas. In recent years, the innovation of embedded sensing devices and wireless communication have been developed rapidly. It allows for improving the capability of processing and reducing energy consumption for a long time, wireless sensor networks (WSNs) in order to meet a wide range of applications. Besides wide-range coverage, LoRa technology also provides the benefits of low power consumption, scalability and interference immunity for wireless links. This paper proposes a support tool for the rapid deployment of large scale distributed sensing systems based on LoRa technology. The major motivation behinds this work is to help designer select the proper set of parameters for improving the performance of LoRa systems taking into account the strong impact of geographic topology. The experiments on a star LoRa network for environmental data dissemination was done to evaluate the effectiveness of the tool on the reduction of packet transmission time, known as time-on-air (ToA).","PeriodicalId":168549,"journal":{"name":"Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133847747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信