Sanjeev Kumar, J. Buckley, Adolfo Di Serio, B. O’flynn
{"title":"Comparative Analysis of Circuit and Finite Element Models for a Linear Wire Dipole Antenna","authors":"Sanjeev Kumar, J. Buckley, Adolfo Di Serio, B. O’flynn","doi":"10.1109/ISSC.2018.8585353","DOIUrl":"https://doi.org/10.1109/ISSC.2018.8585353","url":null,"abstract":"Antennas are a critical component of an internet of things device and are typically modelled using full-wave electromagnetic (EM) solvers for their optimal design. In this paper, we investigate and compare the impact, accuracy and limitations of three, four and five element equivalent circuit models from the literature to estimate the impedance characteristics of a center-fed linear wire dipole antenna at 2.45 GHz. All the circuit model results are compared against the finite element model. It was found that the three element model is inaccurate in estimating the input impedance of a dipole antenna at the resonant frequency. In comparison to the finite element model, the four element model estimates the input impedance with an error of 3.75 j2.54 Ohms at 2.45 GHz. For the five element model the error−in the input impedance was −6.21+j1.68 Ohms. The input impedance for the both, the four and five element models are in good agreement with the EM model. This approach is shown to enable efficient analysis of antenna impedance for wireless communication systems.","PeriodicalId":174854,"journal":{"name":"2018 29th Irish Signals and Systems Conference (ISSC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114288823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel first order Digital Differentiator for Analog-to-Digital Transform","authors":"T. Bensouici, A. Charef, Assadi Imen","doi":"10.1109/ISSC.2018.8585375","DOIUrl":"https://doi.org/10.1109/ISSC.2018.8585375","url":null,"abstract":"A simple and accurate analog to digital transform (ADT) is employed, to design a first order digital differentiator, which closely approximates the analog one. This transform has a fractional parameter m that our approach design based on. The proposed digital differentiator is obtained by selecting the best parameter m such that the relative error between the analog differentiator s and its equivalent digital one is minimum. Some design examples are illustrated to show the effectiveness of the ADT design technique. The beauty of this design is that it's only of first order and suitable for real-time applications.","PeriodicalId":174854,"journal":{"name":"2018 29th Irish Signals and Systems Conference (ISSC)","volume":"576 2 Pt 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132677453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mr. Shane Coleman, Dr. Pat Doody, Mr. Andrew Shields
{"title":"Machine Learning for Real-Time Data-Driven Security Practices","authors":"Mr. Shane Coleman, Dr. Pat Doody, Mr. Andrew Shields","doi":"10.1109/ISSC.2018.8585360","DOIUrl":"https://doi.org/10.1109/ISSC.2018.8585360","url":null,"abstract":"The risk of cyber-attacks exploiting vulnerable organisations has increased significantly over the past several years. These attacks may combine to exploit a vulnerability breach within a system’s protection strategy, which has the potential for loss, damage or destruction of assets. Consequently, every vulnerability has an accompanying risk, which is defined as the \"intersection of assets, threats, and vulnerabilities\" [1]. This research project aims to experimentally compare the similarity-based ranking of cyber security information utilising a recommendation environment. The Memory-Based Collaborative Filtering technique was employed, specifically the User-Based and Item-Based approaches. These systems utilised information from the National Vulnerability Database, specifically for the identification and similarity-based ranking of cyber-security vulnerability information, relating to hardware and software applications. Experiments were performed using the Item-Based technique, to identify the optimum system parameters, evaluated through the AUC evaluation metric. Once identified, the Item-Based technique was compared with the User-Based technique which utilised the parameters identified from the previous experiments. During these experiments, the Pearson’s Correlation Coefficient and the Cosine similarity measure was used. From these experiments, it was identified that utilised the Item-Based technique which employed the Cosine similarity measure, an AUC evaluation metric of 0.80225 was achieved.","PeriodicalId":174854,"journal":{"name":"2018 29th Irish Signals and Systems Conference (ISSC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126736651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Prevention Security Oriented Mindset in Managing Optical Networks","authors":"Kenza Gaizi, F. Abdi, Kenza Gaizi, F. M. Abbou","doi":"10.1109/ISSC.2018.8585296","DOIUrl":"https://doi.org/10.1109/ISSC.2018.8585296","url":null,"abstract":"Reading the title of this paper, chances are, one cannot help but notice two main axes. The first relates to the prevention mindset, while the second is about network management within the context of Optical Networks. The paper aims to address this over four stages. In the first stage, we present a research inventory covering recent studies on preventative mindset characteristics within psychology, and behavioral science domains. In the second stage, we perform, yet another research inventory, but this time on papers related to network management in general, and optical networks in particular. In the third stage, we present the latest optical networks characteristics, applications, and industry trends. While in the last stage, we analyze, synthesize, and propose a novel behav-realistic framework, designed based on recent psychology and behavioral science research on prevention mindset, as well as the latest characteristics, applications, and industry trends associated with optical networks and their management. The combination of these two areas of \"behavioral\" science and \"realistic\" expectations based on recent trends is what inspired us to call this novel framework a \"behav-realistic\" framework, which we’ll be presenting in this work.","PeriodicalId":174854,"journal":{"name":"2018 29th Irish Signals and Systems Conference (ISSC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129253875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Identification of Piecewise Constant LTV Systems Using a Double Periodic System Model","authors":"Tim Poguntke, K. Ochs","doi":"10.1109/ISSC.2018.8585342","DOIUrl":"https://doi.org/10.1109/ISSC.2018.8585342","url":null,"abstract":"Identifying linear time-variant (LTV) systems has been of great interest for many decades already and an important problem in many engineering applications. This paper proposes to use a double periodic system approximation for the characterization of LTV radar channels. Hereby, a two-dimensional Fourier series is used to approximate the time-variant transfer function in both time and frequency domain. By observing the system’s response corresponding to an appropriate input signal, this paper presents a mathematical derivation of how to determine the Fourier coefficients. In practice, these Fourier coefficients are often approximated by assuming the LTV system to be piecewise constant in time domain. This paper establishes an analytical relationship between the original Fourier coefficients and the approximated ones and it investigates how the Fourier coefficients get distorted due to this assumption. Further, this paper provides practical measures to evaluate and control the degree of distortion in advance by adjusting the input signal modulation. This is illustrated by simulation results that are carried out for a double periodic system model with fictitious Fourier coefficients. Consequently, it is shown how the provided results are applied to chirp sequence modulated radar systems and how the radar signals can be interpreted from a system-theoretical perspective.","PeriodicalId":174854,"journal":{"name":"2018 29th Irish Signals and Systems Conference (ISSC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Extended Pruning on Object Detection Neural Networks","authors":"Simon O'Keeffe, Rudi C. Villing","doi":"10.1109/ISSC.2018.8585345","DOIUrl":"https://doi.org/10.1109/ISSC.2018.8585345","url":null,"abstract":"CNNs are the state-of-the-art for many computer vision problems, including object detection. However, reducing the computational complexity of a CNN is a key prerequisite to deploying state-of-the-art deep learning networks in many low power embedded real-time robotic applications. Pruning has been shown to be an effective method to reduce the computational complexity of a Convolutional Neural Network (CNN) while maintaining accuracy. In the literature, accuracy lost through pruning is recovered with extended fine-tuning of the pruned network at the end of the pruning procedure, but further pruning is not conducted after extended fine-tuning. In this work we modify the pruning procedure to incorporate extended fine-tuning at intervals during the procedure to maintain network accuracy while pruning further than would otherwise be possible. We evaluate this procedure on a small scale custom object detection dataset and the more challenging standard PASCAL VOC dataset. On the former the new procedure achieves a 19.6× reduction in FLOPS for a drop of only 0.4% mean Average Precision (mAP) while the latter achieves only a 1.8× reduction in FLOPS for a drop of 0.8% mAP. The results indicate differing levels of parameter redundancy in the initial networks.","PeriodicalId":174854,"journal":{"name":"2018 29th Irish Signals and Systems Conference (ISSC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125380315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Block-based Classification Method for Computer Screen Image Compression","authors":"Kai Wu, Richard Gahan, Patricia O'Friel","doi":"10.1109/ISSC.2018.8585352","DOIUrl":"https://doi.org/10.1109/ISSC.2018.8585352","url":null,"abstract":"In this paper, a high accuracy and reduced processing time block based classification method for computer screen images is presented. This method classifies blocks into five types: smooth, sparse, fuzzy, text and picture blocks. In a computer screen compression application, the choice of block compression algorithm is made based on these block types. The classification method presented has four novel features. The first novel feature is a combination of Discrete Wavelet Transform (DWT) and colour counting classification methods. Both of these methods have only been used for computer image compression in isolation in previous publications but this paper shows that combined together more accurate results are obtained overall. The second novel feature is the classification of the image blocks into five block types. The addition of the fuzzy and sparse block types make the use of optimum compression methods possible for these blocks. The third novel feature is block type prediction. The prediction algorithm is applied to a current block when the blocks on the top and the left of the current block are text blocks or smooth blocks. This new algorithm is designed to exploit the correlation of adjacent blocks and reduces the overall classification processing time by 33%. The fourth novel feature is down sampling of the pixels in each block which reduces the classification processing time by 62%. When both block prediction and down sampling are enabled, the classification time is reduced by 74% overall. The overall classification accuracy is 98.46%.","PeriodicalId":174854,"journal":{"name":"2018 29th Irish Signals and Systems Conference (ISSC)","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122807596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dáire Canavan, F. Callaly, Aidan Boyd, Declan O’Loughlin, Jeremy Audiger, Yohan Boyer, Niall Timlin-Canning, Marion Bertrand, Joan Espanol, F. Morgan, L. Bakó, Szabolcs Hajdú
{"title":"Audio DSP remote hardware prototyping and console creation","authors":"Dáire Canavan, F. Callaly, Aidan Boyd, Declan O’Loughlin, Jeremy Audiger, Yohan Boyer, Niall Timlin-Canning, Marion Bertrand, Joan Espanol, F. Morgan, L. Bakó, Szabolcs Hajdú","doi":"10.1109/ISSC.2018.8585383","DOIUrl":"https://doi.org/10.1109/ISSC.2018.8585383","url":null,"abstract":"This paper presents the use of the viciLogic viciLab tool suite for prototyping of audio digital signal processing (DSP) hardware on remote or locally connected PYNQ Systems on Chip (SoCs), along with flexible computer control software interfaces. The tool suite enables rapid prototyping of DSP hardware components, including demonstration, control and visualisation of components on local or remote hardware. Hardware components can be developed directly in existing hardware description languages (HDLs) or using higher-level design interfaces such as MathWorks HDL coder. Two configurable software control interfaces are presented: a low-level console builder facilitating fast graphical user interface (GUI) creation for hardware interaction, along with script-based automation; and a high-level Python-based GUI console creator integrates audio sampling, automated DSP hardware effect selection and SoC control, audio streaming and playback, and real-time waveform graphing. The two interfaces presented in this paper are illustrated through a series of DSP examples of increasing complexity: 8- and 16-tap FIR filters (with user-created VHDL model source); distortion and tremolo DSP functions (developed MathWorks HDL coder VHDL model source); and combinations of these components.","PeriodicalId":174854,"journal":{"name":"2018 29th Irish Signals and Systems Conference (ISSC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124608195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Micro-Benchmarking Property Preserving Encryption: Balancing Performance, Security and Functionality","authors":"Daniela Becker, Andrew Hines","doi":"10.1109/ISSC.2018.8585377","DOIUrl":"https://doi.org/10.1109/ISSC.2018.8585377","url":null,"abstract":"Practical encryption systems with new and more flexible capabilities have been enabled by recent advances in computing hardware performance and Property Preserving Encryption (PPE) schemes. PPE schemes allow limited and preselected operations to be performed on encrypted data allowing system designers to trade-off between performance, security and functionality. This paper uses micro-benchmark to evaluate three interdependent factors of PPE: performance, security and functionality. The findings validate the efficacy of this technique and provide guidance to application designers and technology evaluators seeking to understand these interdependent relationships for PPE database applications. Experiments were performed using the CryptDB research system. Results validate the previous assessments of CryptDB and provide supplemental detail on performance, security and functionality.","PeriodicalId":174854,"journal":{"name":"2018 29th Irish Signals and Systems Conference (ISSC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134187657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}