{"title":"Fractional-Order Image Segmentation for Security Surveillance","authors":"Samar M. Ismail","doi":"10.1109/ICM50269.2020.9331787","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331787","url":null,"abstract":"The enhancement of image processing techniques related to security surveillance issues is considered a pressing demand nowadays. Everything is now documented by digital images, out of which important information is extracted. In this work, fractional-order edge detection filters are employed in edge-based Active Contour segmentation technique for noisy surveillance images. The fractional-order filters add extra degree of freedom, allowing more details to be detected in images, and enhancing the quality of segmented noisy images. Two types of noise, Salt and Pepper noise as well as Gaussian noise, are applied to test the noise performance of the presented segmentation technique. The superiority of the fractional-based segmentation over the conventional integer-based one was proven visually and numerically using peak signal to noise ratio for both types of noise.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115303527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Rizik, A. Randazzo, R. Vio, A. Delucchi, H. Chible, D. Caviglia
{"title":"Low-Cost FMCW Radar Human-Vehicle Classification Based on Transfer Learning","authors":"Ali Rizik, A. Randazzo, R. Vio, A. Delucchi, H. Chible, D. Caviglia","doi":"10.1109/ICM50269.2020.9331808","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331808","url":null,"abstract":"Detection and classification of moving targets is an essential feature in many applications like road surveillance systems, autonomous cars, and smart gate systems. Multi-chirp sequence Frequency Modulated Continuous Wave (FMCW) radars with a 2D FFT processing can be used to produce a Range-Doppler images (R-D maps) containing the signature of the target. However, in low-cost FMCW radars, these images suffer from many problems like low-resolution and ambiguity. Such problems can make the image look unrealistic as well as hard to process and classify. In this paper, we propose a human-vehicle classification method based on Transfer Learning. The classification is done by processing the R-D maps generated by a low-cost short range 24 GHz FMCW radar with a convolutional Neural Network (CNN). The adopted CNN succeeded to reach a 96.5% accuracy in discriminating humans from vehicles.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Synthesis of Respiratory Rate for Female Patients","authors":"Edder Sebastian Mendoza Garibay, M. S. Ullah","doi":"10.1109/ICM50269.2020.9331782","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331782","url":null,"abstract":"In this paper, a new method for estimating the respiratory rate (RR) signal using pulse oximeter is proposed. The PPG signal acquired from female patients is composed by three main elements which are the PPG signal itself, the motion artifacts and the respiratory rate. This paper analyzes eight (8) female patients from the Beth Israel Deaconess Medical Centre in Boston. The information (data) is collected from ‘physionet.org’. The PPG normally has a significant amount of power ranging from 0 to 10 Hz and the motion artifacts are around 0 to 0.5 Hz. Therefore, the first step is to remove the motion artifacts and then extract the RR from rest of the PPG+RR signal. A record of 480 seconds (8 minutes) is analyzed from each female patient. All operations are performed in time domain digital signal processing. The algorithm performs several operations using median and moving average filters to estimate the RR component. The results give an efficiency of 96.5% considering an average error of +/− 0.62 breathes per minute.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nariman A. Khalil, M. Fouda, L. Said, A. Radwan, A. Soliman
{"title":"On Series Connections of Fractional-Order Elements and Memristive Elements","authors":"Nariman A. Khalil, M. Fouda, L. Said, A. Radwan, A. Soliman","doi":"10.1109/ICM50269.2020.9331507","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331507","url":null,"abstract":"This paper proposes a current-controlled fractional-order memristor emulator based on one active building block. The emulator consists of a multiplication mode current conveyor (MMCC) block with three passive elements. Additionally, the series connection of fractional-order inductor (FOI) and fractional-order capacitor (FOC) with memristive elements in the i – v plane is demonstrated numerically for different cases. Changing the order of the FOC or FOI and its effect on the pinched hysteresis loop area are investigated, which improve the controllability of the double loop area, the location of the pinched point, and the operating frequency range. Numerical, PSPICE simulation results, and experimental verification are investigated for different cases to approve the theoretical findings. Moreover, a sensitivity analysis using Monte Carlo simulations for the tolerance of the discrete components of the memristor emulator is investigated.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121241088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Proposed Methodology for Radiation Hardening By Design of MOS Circuits","authors":"H. H. Shaker, A. Saleh, M. R. Amin, S. Habib","doi":"10.1109/ICM50269.2020.9331495","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331495","url":null,"abstract":"One of the radiation effects on ICs is the Total Ionizing Dose (TID) effects. TID effects are accumulative effects that build up during the exposure time and may cause a functionality failure for the exposed ICs. In this paper, we propose a new systematic methodology for developing a predictive TID-aware models for bulk FETs. TID-aware models developed using our methodology enable circuit designers to predict the expected worst case performance degradation of their circuits if exposed to high radiation doses.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128333057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach","authors":"M. Injadat, Abdallah Moubayed, A. Shami","doi":"10.1109/ICM50269.2020.9331794","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331794","url":null,"abstract":"The increased reliance on the Internet and the corresponding surge in connectivity demand has led to a significant growth in Internet-of-Things (IoT) devices. The continued deployment of IoT devices has in turn led to an increase in network attacks due to the larger number of potential attack surfaces as illustrated by the recent reports that IoT malware attacks increased by 215.7% from 10.3 million in 2017 to 32.7 million in 2018. This illustrates the increased vulnerability and susceptibility of IoT devices and networks. Therefore, there is a need for proper effective and efficient attack detection and mitigation techniques in such environments. Machine learning (ML) has emerged as one potential solution due to the abundance of data generated and available for IoT devices and networks. Hence, they have significant potential to be adopted for intrusion detection for IoT environments. To that end, this paper proposes an optimized ML-based framework consisting of a combination of Bayesian optimization Gaussian Process (BO-GP) algorithm and decision tree (DT) classification model to detect attacks on IoT devices in an effective and efficient manner. The performance of the proposed framework is evaluated using the Bot-IoT-2018 dataset. Experimental results show that the proposed optimized framework has a high detection accuracy, precision, recall, and F-score, highlighting its effectiveness and robustness for the detection of botnet attacks in IoT environments.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126377065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ian Christian Fernandez, M. T. D. Leon, A. Alvarez, M. Rosales
{"title":"An Energy-Efficient Temperature Sensor Using CMOS Thyristor Delay Elements","authors":"Ian Christian Fernandez, M. T. D. Leon, A. Alvarez, M. Rosales","doi":"10.1109/ICM50269.2020.9331790","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331790","url":null,"abstract":"This paper presents a time-based method of measuring temperature using CMOS thyristors and a time-to-digital converter (TDC) akin to algorithmic analog-to-digital converters. By treating time as a signal and as an abundant resource for slow-changing quantities like temperature, slow but energy-efficient topologies like CMOS thyristors could prove useful. Coupled with a TDC that does not scale exponentially with resolution, a significantly lower energy consumption is achieved. This sensor system measures temperature with non-linearity error of ±0.25 °C and resolution of 0.05 °C per LSB from −15 °C to 30 °C while using only 0.4nJ per measurement.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116812567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Goh Yie Yen, S. Z. M. Naziri, R. C. Ismail, M. I. N. Isa, R. Hussin
{"title":"Design of Multiplicative Inverse Value Generator using Logarithm Method for AES Algorithm","authors":"Goh Yie Yen, S. Z. M. Naziri, R. C. Ismail, M. I. N. Isa, R. Hussin","doi":"10.1109/ICM50269.2020.9331497","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331497","url":null,"abstract":"Advanced Encryption Standard (AES) algorithm is one of the most widely used symmetric block cipher that is utilized in data protection through symmetric cryptography algorithm, as it offers high efficiency and ability in securing information. In AES, the SubByte/InvSubByte transformation costs an amount of memories for the lookup tables (LUT) that leads to area usage in hardware. As per mathematical equations, the SubByte/InvSubByte is able to share the same resource which is the multiplicative inverse value table. Instead of using LUTs, the multiplicative inverse values can be generated on-the-fly as needed. Therefore, this paper presents the custom hardware design and implementation of multiplicative inverse value generator using logarithm method specifically for AES algorithm. The logarithm method benefits the usage of antilog and log values in obtaining the multiplicative inverse value. The EDA tools as Intel Quartus Prime, Synopsys Design Compiler and IC Compiler are used to perform functional simulation, on synthesis analysis and block-level implementation. Detailed comparison is made between this work and previous implementation. The newly designed multiplicative inverse value generator has achieved the improvement on speed and area as compared to previous implementation. The area of the design is reduced around 8.5% with current improvement of 63.091 μm2, while the speed has increased to 2.54 ns with a positive slack of 0.11 ns, which is shorter than the previous implementation. The new design also outreached the performance of the common LUT-based design.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123132185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA Implementation of Interval Type-2 Fuzzy System Based on Nie-Tan Algorithm","authors":"R. Maciel, R. Moreno, T. Pimenta, P. Rizol","doi":"10.1109/ICM50269.2020.9331498","DOIUrl":"https://doi.org/10.1109/ICM50269.2020.9331498","url":null,"abstract":"The Interval Type-2 Fuzzy Logic Systems – IT2FLS processors have been widely used in control processes that analyzes uncertain information. The IT2FLS presents a superior performance compared to other methods for high uncertainty applications. In real-time control applications, circuit parallelism strategies increase the number of Fuzzy Logic Inference Per Second (FLIPS). This technique demands more hardware resources compared to sequential processing, which can make it difficult to use platforms that have resource limitations. This article presents an IT2FLS architecture implementation minimizes the use of parallel processing in the implementation in the inference engine and maintains the amount of FLIPS suitable for real-time applications. The proposed IT2FLS architecture is implemented in FPGA. It uses the type reduction circuits based on Nie-Tan algorithm. The hardware consists of two 8-bit inputs with four Gaussian membership functions for each one, sixteen rules and an 8-bit output with seven membership functions. The results of the FPGA implementation are compared with the same architecture implemented in Matlab® using the Toolbox for type-2 fuzzy.","PeriodicalId":243968,"journal":{"name":"2020 32nd International Conference on Microelectronics (ICM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128040758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}