Mahmoud ElFiqi, Samar M. Ismail, Mohamed A. Abd El Ghany
{"title":"Comparative Study on Segmentation Techniques for Biomedical Images","authors":"Mahmoud ElFiqi, Samar M. Ismail, Mohamed A. Abd El Ghany","doi":"10.1109/ICM50269.2020.9331804","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331804","url":null,"abstract":"Segmentation is one of the most useful pillars in the medical image processing field, especially for tumors diagnosis and early detection. It is the process of partitioning the image into different regions to extract the object of interest which is the tumor in this work. This paper presents a comparison between different segmentation techniques applied on brain tumor magnetic resonance imaging (MRI) images, as a case study. The techniques under comparison are Region-Growing, Active-Contour, Graph-Cut and Global Thresholding. The performance of these techniques is evaluated based on the Jaccard Index, Dice Index and the F-score, elaborating which one is more accurate than the other.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130620430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maha Shatta, I. Adly, H. Amer, G. Alkady, R. Daoud, S. Hamed, Shahenda Hatem
{"title":"FPGA-based Architectures to Recover from Hardware Trojan Horses, Single Event Upsets and Hard Failures","authors":"Maha Shatta, I. Adly, H. Amer, G. Alkady, R. Daoud, S. Hamed, Shahenda Hatem","doi":"10.1109/ICM50269.2020.9331812","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331812","url":null,"abstract":"Third-party IPs (3PIPs) may have a Hardware Trojan Horse (HTH) that escaped detection during the testing phase. This paper proposes two techniques to recover from a HTH during runtime. In the context of FPGA-based systems, it will be proven that these techniques can simultaneously recover from Single Event Upsets (SEUs), Hard Failures (HFs) as well as HTHs in permanent and temporary modules. The architectures can detect the type of fault and in some cases the identity of the 3PIP with the HTH. A DE10-Standard FPGA development board with Cyclone V devices was used to successfully test and simulate (using Modelsim) the proposed designs and compiled with Quartus v18.1.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131192534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of Material Gate Engineering in Improving Gate All Around Junctionless (GAAJL) MOSFET Reliability Against Hot-Carrier Effects","authors":"H. Ferhati, F. Djeffal, T. Bentrcia","doi":"10.1109/ICM50269.2020.9331788","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331788","url":null,"abstract":"In this paper, dual-material gate engineering aspect is proposed as an efficient way to enhance the Gate All Around Junctionless (GAAJL) MOSFET devices immunity against hot-carrier effects (HCEs). Analytical models concerning the device analog/RF performance metrics including the degradation related to HCE are developed, where a good agreement with TCAD-based numerical data is recorded. The impact of the defects induced by HCEs on the device analog performance is thoroughly analyzed. Interestingly, promising design strategy based on combining Multi-Objective Genetic Algorithms (MOGAs) with gate engineering paradigm was adopted for bridging the gap between analog/RF performance and improved reliability against HCEs. Moreover, this systematic study has enabled exciting possibilities to the designer for acquiring a comprehensive review regarding the GAAJL MOSFET design reliability-analog/RF performance tradeoffs. Therefore, the proposed design methodology offers a sound pathway to designing high-performance and reliable transistors strongly desirable for nanoelectronic applications.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GPS Receiver Frontend Design for Radio Frequency Interferences and Noise Cancellations","authors":"W. Lai","doi":"10.1109/ICM50269.2020.9331811","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331811","url":null,"abstract":"This article proposes integrated GPS receiver frontend design, performance optimization and low power dissipation. The proposed frequency synthesizer with a cross coupled negative-resistance multiple-gated circuit (NRMGC) voltage-controlled oscillator (VCO) by employing a transformer-based LC-tank achieves low phase noise. The proposed design chooses decoupling effect to decrease coupling inductances and then decrease quality factors to obtain higher oscillation frequency and wide tuning range. The eye pattern measured results demonstrate that receiver frontend for radio frequency interferences achieves optimized GPS (global positioning system) performance.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130022817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of WSN Network Lifetime","authors":"Fatima Abu Akleek, Rawaa Alquraan, M. Shurman","doi":"10.1109/ICM50269.2020.9331817","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331817","url":null,"abstract":"Extending WSN lifetime is a crucial problem, designing, developing, and implementing energy-efficient protocols for WSNs is one of the most research challenges. Researchers went toward finding more efficient solutions by proposing new routing protocols or enhancing existing protocols to extend the network/battery lifetime. In this paper, we propose an AI enhancement for the LEACH protocol using supercluster head (SCH) and integrate the proposed enhancement with Consume Power Fairly (CPF) protocol to find the optimal path from source to destination. Our simulation results demonstrate 40% improvement in network lifetime.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Swarm Robotics meets Blockchain to deploy Surveillance missions","authors":"G. Saldamli, Ardalan Razavi, L. Tawalbeh","doi":"10.1109/ICM50269.2020.9331824","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331824","url":null,"abstract":"Swarm Robotics can be used in many applications. But they suffer from certain limitations that make them undesirable in Surveillance applications. Among their limitations is the absence of scalability and security. Currently, these robots do not have framework that allows it to communicate with each other to execute missions autonomously and transparently. Blockchain is the new technology for distributed autonomous systems by providing set of computer nodes for data storage and distribution among the nodes in the system. Each participating node can protect and validate the data in the blockchain system. No modifications can be performed on the data records due to the fact that it is been watched by all the users. Based on the blockchain features, we focus on this research how blockchain applications can make swarm robots securely connected using Ethereum smart contracts. Starting with surveillance missions deployment task, we propose a decentralized application (DApp) for that. Then, blockchain is used by the swarms to establish the Ethereum private networks that allows them to communicate and carry out tasks. We set a test swarm robotics system and evaluate the blockchain for its performance, scalability, recoverability, and responsiveness. In conclusion, we found that blockchain enables a swarm to be globally securely connected, but there are still need for performance enhancement.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123694922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized Random Forest Model for Botnet Detection Based on DNS Queries","authors":"Abdallah Moubayed, M. Injadat, A. Shami","doi":"10.1109/ICM50269.2020.9331819","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331819","url":null,"abstract":"The Domain Name System (DNS) protocol plays a major role in today’s Internet as it translates between website names and corresponding IP addresses. However, due to the lack of processes for data integrity and origin authentication, the DNS protocol has several security vulnerabilities. This often leads to a variety of cyber-attacks, including botnet network attacks. One promising solution to detect DNS-based botnet attacks is adopting machine learning (ML) based solutions. To that end, this paper proposes a novel optimized ML-based framework to detect botnets based on their corresponding DNS queries. More specifically, the framework consists of using information gain as a feature selection method and genetic algorithm (GA) as a hyper-parameter optimization model to tune the parameters of a random forest (RF) classifier. The proposed framework is evaluated using a state-of-the-art TI-2016 DNS dataset. Experimental results show that the proposed optimized framework reduced the feature set size by up to 60%. Moreover, it achieved a high detection accuracy, precision, recall, and F-score compared to the default classifier. This highlights the effectiveness and robustness of the proposed framework in detecting botnet attacks.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123649011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security Qualification Matrix to Efficiently Measure Security in Cyber-Physical Systems","authors":"A. Aigner, Abdelmajid Khelil","doi":"10.1109/ICM50269.2020.9331797","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331797","url":null,"abstract":"Implementations of Cyber-Physical Systems (CPS), like the Internet of Things, Smart Factories or Smart Grid gain more and more impact in their fields of application, as they extend the functionality and quality of the offered services significantly. However, the coupling of safety-critical embedded systems and services of the cyber-space domain introduce many new challenges for system engineers. Especially, the goal to achieve a high level of security throughout CPS presents a major challenge. However, it is necessary to develop and deploy secure CPS, as vulnerabilities and threats may lead to a non- or maliciously modified functionality of the CPS. This could ultimately cause harm to life of involved actors, or at least sensitive information can be leaked or lost. Therefore, it is essential that system engineers are aware of the level of security of the deployed CPS. For this purpose, security metrics and security evaluation frameworks can be utilized, as they are able to quantitatively express security, based on different measurements and rules. However, existing security scoring solutions may not be able to generate accurate security scores for CPS, as they insufficiently consider the typical CPS characteristics, like the communication of heterogeneous systems of physical- and cyber-space domain in an unpredictable manner. Therefore, we propose a security analysis framework, called Security Qualification Matrix (SQM). The SQM is capable to analyses multiple attacks on a System-of-Systems level simultaneously. With this approach, dependencies, potential side effects and the impact of mitigation concepts can quickly be identified and evaluated.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"536 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128778794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konstantinos Velonis, Theodoros Simopoulos, G. Alexiou
{"title":"Application for automatic placement of hardware modules in layout form","authors":"Konstantinos Velonis, Theodoros Simopoulos, G. Alexiou","doi":"10.1109/ICM50269.2020.9331499","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331499","url":null,"abstract":"This work presents an application for automatically placing sub-modules of an ALU to create a layout design. This process is made as easy to use as possible by utilizing a webpage environment as the user interface. The user is offered a selection of available modules and can place them on a grid, creating a final design with the desired characteristics. This application, although a bit limited on its own, stands as a proof of concept for a future project with a bigger scope, even on the CPU core level.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of Terahertz Broadband Antennas for Rectenna Applications","authors":"M. B. M. Mokhar, S. R. Kasjoo, N. Juhari","doi":"10.1109/ICM50269.2020.9331800","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331800","url":null,"abstract":"In this paper, we designed and simulated several self-complimentary broadband antennas for the use in rectenna applications at terahertz frequencies. Rectenna that consists of two-terminal planar nanodiode such as self-switching diode is considered as a requirement in designing the broadband antennas. Antenna’s performance is then compared in terms of its return loss, gain, directivity and radiation efficiency.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115736952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}