2020 32nd International Conference on Microelectronics (ICM)最新文献

筛选
英文 中文
Comparative Study on Segmentation Techniques for Biomedical Images 生物医学图像分割技术的比较研究
2020 32nd International Conference on Microelectronics (ICM) Pub Date : 2020-12-14 DOI: 10.1109/ICM50269.2020.9331804
Mahmoud ElFiqi, Samar M. Ismail, Mohamed A. Abd El Ghany
{"title":"Comparative Study on Segmentation Techniques for Biomedical Images","authors":"Mahmoud ElFiqi, Samar M. Ismail, Mohamed A. Abd El Ghany","doi":"10.1109/ICM50269.2020.9331804","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331804","url":null,"abstract":"Segmentation is one of the most useful pillars in the medical image processing field, especially for tumors diagnosis and early detection. It is the process of partitioning the image into different regions to extract the object of interest which is the tumor in this work. This paper presents a comparison between different segmentation techniques applied on brain tumor magnetic resonance imaging (MRI) images, as a case study. The techniques under comparison are Region-Growing, Active-Contour, Graph-Cut and Global Thresholding. The performance of these techniques is evaluated based on the Jaccard Index, Dice Index and the F-score, elaborating which one is more accurate than the other.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130620430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA-based Architectures to Recover from Hardware Trojan Horses, Single Event Upsets and Hard Failures 基于fpga的架构从硬件特洛伊木马、单事件中断和硬故障中恢复
2020 32nd International Conference on Microelectronics (ICM) Pub Date : 2020-12-14 DOI: 10.1109/ICM50269.2020.9331812
Maha Shatta, I. Adly, H. Amer, G. Alkady, R. Daoud, S. Hamed, Shahenda Hatem
{"title":"FPGA-based Architectures to Recover from Hardware Trojan Horses, Single Event Upsets and Hard Failures","authors":"Maha Shatta, I. Adly, H. Amer, G. Alkady, R. Daoud, S. Hamed, Shahenda Hatem","doi":"10.1109/ICM50269.2020.9331812","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331812","url":null,"abstract":"Third-party IPs (3PIPs) may have a Hardware Trojan Horse (HTH) that escaped detection during the testing phase. This paper proposes two techniques to recover from a HTH during runtime. In the context of FPGA-based systems, it will be proven that these techniques can simultaneously recover from Single Event Upsets (SEUs), Hard Failures (HFs) as well as HTHs in permanent and temporary modules. The architectures can detect the type of fault and in some cases the identity of the 3PIP with the HTH. A DE10-Standard FPGA development board with Cyclone V devices was used to successfully test and simulate (using Modelsim) the proposed designs and compiled with Quartus v18.1.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131192534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of Material Gate Engineering in Improving Gate All Around Junctionless (GAAJL) MOSFET Reliability Against Hot-Carrier Effects 材料栅极工程在提高栅极无结(GAAJL) MOSFET抗热载子效应可靠性中的作用
2020 32nd International Conference on Microelectronics (ICM) Pub Date : 2020-12-14 DOI: 10.1109/ICM50269.2020.9331788
H. Ferhati, F. Djeffal, T. Bentrcia
{"title":"Role of Material Gate Engineering in Improving Gate All Around Junctionless (GAAJL) MOSFET Reliability Against Hot-Carrier Effects","authors":"H. Ferhati, F. Djeffal, T. Bentrcia","doi":"10.1109/ICM50269.2020.9331788","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331788","url":null,"abstract":"In this paper, dual-material gate engineering aspect is proposed as an efficient way to enhance the Gate All Around Junctionless (GAAJL) MOSFET devices immunity against hot-carrier effects (HCEs). Analytical models concerning the device analog/RF performance metrics including the degradation related to HCE are developed, where a good agreement with TCAD-based numerical data is recorded. The impact of the defects induced by HCEs on the device analog performance is thoroughly analyzed. Interestingly, promising design strategy based on combining Multi-Objective Genetic Algorithms (MOGAs) with gate engineering paradigm was adopted for bridging the gap between analog/RF performance and improved reliability against HCEs. Moreover, this systematic study has enabled exciting possibilities to the designer for acquiring a comprehensive review regarding the GAAJL MOSFET design reliability-analog/RF performance tradeoffs. Therefore, the proposed design methodology offers a sound pathway to designing high-performance and reliable transistors strongly desirable for nanoelectronic applications.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GPS Receiver Frontend Design for Radio Frequency Interferences and Noise Cancellations 射频干扰与噪声消除的GPS接收机前端设计
2020 32nd International Conference on Microelectronics (ICM) Pub Date : 2020-12-14 DOI: 10.1109/ICM50269.2020.9331811
W. Lai
{"title":"GPS Receiver Frontend Design for Radio Frequency Interferences and Noise Cancellations","authors":"W. Lai","doi":"10.1109/ICM50269.2020.9331811","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331811","url":null,"abstract":"This article proposes integrated GPS receiver frontend design, performance optimization and low power dissipation. The proposed frequency synthesizer with a cross coupled negative-resistance multiple-gated circuit (NRMGC) voltage-controlled oscillator (VCO) by employing a transformer-based LC-tank achieves low phase noise. The proposed design chooses decoupling effect to decrease coupling inductances and then decrease quality factors to obtain higher oscillation frequency and wide tuning range. The eye pattern measured results demonstrate that receiver frontend for radio frequency interferences achieves optimized GPS (global positioning system) performance.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130022817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of WSN Network Lifetime WSN网络生存期的增强
2020 32nd International Conference on Microelectronics (ICM) Pub Date : 2020-12-14 DOI: 10.1109/ICM50269.2020.9331817
Fatima Abu Akleek, Rawaa Alquraan, M. Shurman
{"title":"Enhancement of WSN Network Lifetime","authors":"Fatima Abu Akleek, Rawaa Alquraan, M. Shurman","doi":"10.1109/ICM50269.2020.9331817","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331817","url":null,"abstract":"Extending WSN lifetime is a crucial problem, designing, developing, and implementing energy-efficient protocols for WSNs is one of the most research challenges. Researchers went toward finding more efficient solutions by proposing new routing protocols or enhancing existing protocols to extend the network/battery lifetime. In this paper, we propose an AI enhancement for the LEACH protocol using supercluster head (SCH) and integrate the proposed enhancement with Consume Power Fairly (CPF) protocol to find the optimal path from source to destination. Our simulation results demonstrate 40% improvement in network lifetime.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Swarm Robotics meets Blockchain to deploy Surveillance missions 蜂群机器人遇见b区块链部署监视任务
2020 32nd International Conference on Microelectronics (ICM) Pub Date : 2020-12-14 DOI: 10.1109/ICM50269.2020.9331824
G. Saldamli, Ardalan Razavi, L. Tawalbeh
{"title":"Swarm Robotics meets Blockchain to deploy Surveillance missions","authors":"G. Saldamli, Ardalan Razavi, L. Tawalbeh","doi":"10.1109/ICM50269.2020.9331824","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331824","url":null,"abstract":"Swarm Robotics can be used in many applications. But they suffer from certain limitations that make them undesirable in Surveillance applications. Among their limitations is the absence of scalability and security. Currently, these robots do not have framework that allows it to communicate with each other to execute missions autonomously and transparently. Blockchain is the new technology for distributed autonomous systems by providing set of computer nodes for data storage and distribution among the nodes in the system. Each participating node can protect and validate the data in the blockchain system. No modifications can be performed on the data records due to the fact that it is been watched by all the users. Based on the blockchain features, we focus on this research how blockchain applications can make swarm robots securely connected using Ethereum smart contracts. Starting with surveillance missions deployment task, we propose a decentralized application (DApp) for that. Then, blockchain is used by the swarms to establish the Ethereum private networks that allows them to communicate and carry out tasks. We set a test swarm robotics system and evaluate the blockchain for its performance, scalability, recoverability, and responsiveness. In conclusion, we found that blockchain enables a swarm to be globally securely connected, but there are still need for performance enhancement.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123694922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimized Random Forest Model for Botnet Detection Based on DNS Queries 基于DNS查询的僵尸网络检测优化随机森林模型
2020 32nd International Conference on Microelectronics (ICM) Pub Date : 2020-12-14 DOI: 10.1109/ICM50269.2020.9331819
Abdallah Moubayed, M. Injadat, A. Shami
{"title":"Optimized Random Forest Model for Botnet Detection Based on DNS Queries","authors":"Abdallah Moubayed, M. Injadat, A. Shami","doi":"10.1109/ICM50269.2020.9331819","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331819","url":null,"abstract":"The Domain Name System (DNS) protocol plays a major role in today’s Internet as it translates between website names and corresponding IP addresses. However, due to the lack of processes for data integrity and origin authentication, the DNS protocol has several security vulnerabilities. This often leads to a variety of cyber-attacks, including botnet network attacks. One promising solution to detect DNS-based botnet attacks is adopting machine learning (ML) based solutions. To that end, this paper proposes a novel optimized ML-based framework to detect botnets based on their corresponding DNS queries. More specifically, the framework consists of using information gain as a feature selection method and genetic algorithm (GA) as a hyper-parameter optimization model to tune the parameters of a random forest (RF) classifier. The proposed framework is evaluated using a state-of-the-art TI-2016 DNS dataset. Experimental results show that the proposed optimized framework reduced the feature set size by up to 60%. Moreover, it achieved a high detection accuracy, precision, recall, and F-score compared to the default classifier. This highlights the effectiveness and robustness of the proposed framework in detecting botnet attacks.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123649011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Security Qualification Matrix to Efficiently Measure Security in Cyber-Physical Systems 一种有效度量网络物理系统安全性的安全资格矩阵
2020 32nd International Conference on Microelectronics (ICM) Pub Date : 2020-12-14 DOI: 10.1109/ICM50269.2020.9331797
A. Aigner, Abdelmajid Khelil
{"title":"A Security Qualification Matrix to Efficiently Measure Security in Cyber-Physical Systems","authors":"A. Aigner, Abdelmajid Khelil","doi":"10.1109/ICM50269.2020.9331797","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331797","url":null,"abstract":"Implementations of Cyber-Physical Systems (CPS), like the Internet of Things, Smart Factories or Smart Grid gain more and more impact in their fields of application, as they extend the functionality and quality of the offered services significantly. However, the coupling of safety-critical embedded systems and services of the cyber-space domain introduce many new challenges for system engineers. Especially, the goal to achieve a high level of security throughout CPS presents a major challenge. However, it is necessary to develop and deploy secure CPS, as vulnerabilities and threats may lead to a non- or maliciously modified functionality of the CPS. This could ultimately cause harm to life of involved actors, or at least sensitive information can be leaked or lost. Therefore, it is essential that system engineers are aware of the level of security of the deployed CPS. For this purpose, security metrics and security evaluation frameworks can be utilized, as they are able to quantitatively express security, based on different measurements and rules. However, existing security scoring solutions may not be able to generate accurate security scores for CPS, as they insufficiently consider the typical CPS characteristics, like the communication of heterogeneous systems of physical- and cyber-space domain in an unpredictable manner. Therefore, we propose a security analysis framework, called Security Qualification Matrix (SQM). The SQM is capable to analyses multiple attacks on a System-of-Systems level simultaneously. With this approach, dependencies, potential side effects and the impact of mitigation concepts can quickly be identified and evaluated.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"536 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128778794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application for automatic placement of hardware modules in layout form 用于自动放置硬件模块的布局形式
2020 32nd International Conference on Microelectronics (ICM) Pub Date : 2020-12-14 DOI: 10.1109/ICM50269.2020.9331499
Konstantinos Velonis, Theodoros Simopoulos, G. Alexiou
{"title":"Application for automatic placement of hardware modules in layout form","authors":"Konstantinos Velonis, Theodoros Simopoulos, G. Alexiou","doi":"10.1109/ICM50269.2020.9331499","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331499","url":null,"abstract":"This work presents an application for automatically placing sub-modules of an ALU to create a layout design. This process is made as easy to use as possible by utilizing a webpage environment as the user interface. The user is offered a selection of available modules and can place them on a grid, creating a final design with the desired characteristics. This application, although a bit limited on its own, stands as a proof of concept for a future project with a bigger scope, even on the CPU core level.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of Terahertz Broadband Antennas for Rectenna Applications 用于整流天线的太赫兹宽带天线仿真
2020 32nd International Conference on Microelectronics (ICM) Pub Date : 2020-12-14 DOI: 10.1109/ICM50269.2020.9331800
M. B. M. Mokhar, S. R. Kasjoo, N. Juhari
{"title":"Simulation of Terahertz Broadband Antennas for Rectenna Applications","authors":"M. B. M. Mokhar, S. R. Kasjoo, N. Juhari","doi":"10.1109/ICM50269.2020.9331800","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331800","url":null,"abstract":"In this paper, we designed and simulated several self-complimentary broadband antennas for the use in rectenna applications at terahertz frequencies. Rectenna that consists of two-terminal planar nanodiode such as self-switching diode is considered as a requirement in designing the broadband antennas. Antenna’s performance is then compared in terms of its return loss, gain, directivity and radiation efficiency.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115736952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信