Yu-Jie Chung, Shen-Li Chen, Xing-Chen Mai, Ting-En Lin, Xiu-Yuan Yang
{"title":"ESD-ability Analysis of High Voltage nLDMOSs with the Drain-side Parasitic Schottky/Embedded STI","authors":"Yu-Jie Chung, Shen-Li Chen, Xing-Chen Mai, Ting-En Lin, Xiu-Yuan Yang","doi":"10.1109/ECICE55674.2022.10042875","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042875","url":null,"abstract":"In this paper, the Silvaco TCAD software is used to simulate the 0.18-μm 60V nLDMOS devices with drain-side parasitic Schottky device and embedded STIs. The modulation method is to divide the drain-side into two, four and six segments respectively and modulate in different arrangements. The TCAD simulations are performed at an input current of 1E-3 amps, and the lattice temperatures can be obtained. The high-voltage nLDMOS device will easily generate thermal runaway and other problems, causing the possibility of device damage. The appropriate width of STI on the drain-side can effectively isolate the high temperature generated by parasitic Schottky devices, and owing to the positive temperature coefficient effect of silicon, it will result in the final devcie excellent characteristics under an ESD event.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116134893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feasibility Analysis of Document Legalization Importing Blockchain Technology","authors":"Ke-Jiang Li, Chun-Te Chen, Pi-Wen Wang","doi":"10.1109/ECICE55674.2022.10042944","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042944","url":null,"abstract":"Document verification is time-consuming and labor-intensive. In this study, we use a classic document verifying procedure for literature review, data collection, analysis, and interpretation. We use blockchain and NFT technology to analyze the feasibility of document legalization importing blockchain and NFT technology.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116282502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Research of Network Information Security Evaluation Model Based on Machine Learning Algorithm","authors":"Yuxiao Luo","doi":"10.1109/ECICE55674.2022.10042828","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042828","url":null,"abstract":"Due to the rapid development of network technology and the rapid spread of information through the network, the security of information systems is also threatened in many aspects. The purpose of this study is to build a security evaluation model of network information based on machine learning algorithms and to improve the model and the accuracy of model evaluation. Firstly, a hierarchical network information security assessment index system is constructed. Secondly, to improve the accuracy of security assessment, an improved AFSA algorithm and TWSVM model are introduced for enhancing classification accuracy. A security assessment based on improved AFSA-TWSVM is proposed to evaluate the model. Finally, the experiments are carried out to compare with the AFSA-SVM-based security assessment model and the PSO-LLSVM security assessment model. The experimental results show that the average classification accuracy of the AFSA-SVM-based security assessment model and the PSO-LLSVM-based security assessment model is S7.5 and 83.33%, respectively. The average classification accuracy of the improved AFSA-TWSVM reaches 90%, which is better than the other two evaluation models in classification accuracy. Therefore, the model proposed in this study is more suitable for network information security evaluation.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Postprocessing System for Word-Filling and Quantifiers Based on Chinese Story Generation","authors":"Rong-Guey Chang, Cheng-Yan Siao, Chia-ying Lee","doi":"10.1109/ECICE55674.2022.10042910","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042910","url":null,"abstract":"In recent years, many fields have been related to introducing artificial intelligence to natural language generation. Although these natural language models have excellent results and generate smooth sentences, they are still not effective learning features such as character relationships, especially in the Chinese language. When a sentence is generated, it is necessary to pay attention to the following words to correctly predict and generate, such as quantifiers, which causes the generated words to be inappropriate and then affects the generation of subsequent words. Therefore, we developed a set of attention mechanism enhancement models, aiming at the generative language model that controls the ordering of generated speech parts, revising the different mechanisms of character fighting relationship and quantifier design, and adopting the traditional classification model one-against-all support vector machine training. The results show that the generated sentences are arranged in the same order as the original ones so the generation can be reliably controlled.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125066524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of Outpatient Doctor Allocation in Q Hospital Based on Queuing Theory","authors":"Xue Li","doi":"10.1109/ECICE55674.2022.10042831","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042831","url":null,"abstract":"Medical and health services are important in people's livelihood. Thus, governments attach great importance to the development of medical and health services. In this study, the gynecological outpatient clinic of Q hospital is taken as the research object as Q hospital outpatient operation efficiency still has a lot of problems. A long queue of patients in the hospital shows a problem in receiving medical treatment and low operational efficiency. For doctors on duty in outpatient departments, there are different periods in the day for outpatient departments, so the feature of the queue is different. Therefore, according to the difference, a reasonable arrangement of the number of on-duty doctors in Q hospital is needed for improving the utilization of resources and reducing the operation cost. It also improves the quality of hospital service and the satisfaction of patients.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124797281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filtering Analysis of a Wet Scrubber with Computational Fluid Dynamics Simulation","authors":"Shih-Chia Wang, Dena Gabriela","doi":"10.1109/ECICE55674.2022.10042826","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042826","url":null,"abstract":"Environmental rules that restrict pollution emissions into the atmosphere are getting stricter. Therefore, it is essential to create new air pollution control technologies and enhance those that presently exist. A wet scrubber system is one of the most practical systems to control and remove pollutants that is used fluid mechanics and a little bit of propulsion system on its operation. The operation of a wet scrubber mainly concentrates on the water flow performance and filter design to capture the dust particles. This study focuses on analyzing the appropriate waterflow that will deliver a consistent flow through the filter at a specific velocity and briefly discusses the available filter performance for efficiency. Solid Works ST’s computer-aided drawing (CAD) program is used to design the pieces for 3D printing. In order to achieve the desired design, this study uses Computational Fluid Dynamic (CFD) simulation software (COMSOL Multiphysics 5.5) to evaluate the water tank design and filter performance in order to take the models’ accuracy and efficiency into account before they are combined to create a prototype and carry out the model’s experiment. The efficiency of filter with certain velocity if water flow is expected to be more than 70% on capturing the dust particles.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128648449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kuan-Yu Lu, Gadi Ashok Kumar Reddy, Nguyen Ngoc Thai, K. Lee
{"title":"Design of a Micro-hole Array Device for Picking the Micro Lenses","authors":"Kuan-Yu Lu, Gadi Ashok Kumar Reddy, Nguyen Ngoc Thai, K. Lee","doi":"10.1109/ECICE55674.2022.10042934","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042934","url":null,"abstract":"Lenses are widely used in many areas mostly in mobile cameras and security cameras. Before installation, inspection is very important to check the lenses condition like dust particles and any other damages. lenses are very sensitive and easy to scratch when using clamping device to pick up lenses. So, we use vacuum to provide suction to pick up the lenses to avoid wear and scratches. In this study, combined servo motor with EDM to create micro-hole array, to place the lenses. User interface helps the user to control the XY-Table for exact coordinate location to make fine hole array. In the experiment, it shows that by adjusting the gap voltage, pulse on-time, pulse off-time and outlet water pressure, the machining speed can be controlled without reaming and scorching. The average error during machining operation to make a micro-hole array is 0.00405 mm. User interface application save a lot of time and helps to improve accuracy to make fine hole.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122164685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trajectory Tracking Control of Autonomous Lawn Mower Based on ANSMC","authors":"Hung-Yih Tsai, Kuo-Ching Chiu, Kuen-Bao Sheu, Chien-Chang Lai, Yi-Fan Wu","doi":"10.1109/ECICE55674.2022.10042956","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042956","url":null,"abstract":"For weeding in an open area, an automatic lawnmower is used. However, the positioning accuracy of the GPS used by the automatic lawn mower currently only reaches the meter level. Inertial positioning accumulates errors and causes control path errors, thus making the grass cannot be completely removed. Thus, this study is conducted to develop a lawn mower system with remote monitoring and automatic tracking control. The system uses a Dual Wheels electric transporter to set up the lawn mower pole while controlled by the rotation of the two wheels so that the lawn mower moves forward, turns, and moves backward. The positioning adopts simple RTK-GPS, including the base station and mobile station. It provides centimeter-level positioning accuracy. The movement trajectory planned with the computer is sent to the automatic lawn mower through the Lora wireless communication interface. The lawn mower follows the trajectory tracking control. The tracking control method of the lawn mower is based on Adaptive Neural Sliding Mode Control (ANSMC). The results show the maximum error of the tracking control of the automatic lawn mower is 10 cm. The computer monitors the condition of the lawn mower in real time and stores the tracking history to be checked. In the study, the prototype of the lawn mower is suitable for applications in open fields.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114485055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Songhua Hu, J. Bao, Chunhao Yang, Zuwei Hu, Xinbo Zhou, Nan Pan
{"title":"Optimization of Driving Energy Consumption for Wearable Industrial Lower Limb Exoskeleton Based on Improved Chameleon Algorithm and Human-machine Dynamics","authors":"Songhua Hu, J. Bao, Chunhao Yang, Zuwei Hu, Xinbo Zhou, Nan Pan","doi":"10.1109/ECICE55674.2022.10042852","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042852","url":null,"abstract":"In order to optimize the range of the wearable industrial lower limb exoskeleton during operation, firstly, the kinematic analysis of the lower limb exoskeleton is carried out, and the driving force model of each joint is derived through Lagrange ’s equation. Secondly, the motion stability constraint is derived by combining ZMP theory and D’Alembert’s principle. Finally, an optimization model with the optimal joint driving energy consumption as the objective function is constructed based on the continuous periodic motion of the lower limb exoskeleton. An improved Chameleon Swarm Algorithm (TNECSA) based on Tent chaos mapping, Niching behavior, and elite perturbation mechanism is designed to solve the model. Firstly, the Tent chaos mapping is used to generate high-quality initial feasible solutions. The small habitat technique is introduced to maintain the diversity of the population and expand the search range. Based on the elite perturbation mechanism, the elite individuals are perturbed by the sine cosine search operator to avoid the algorithm from falling into the local optimum. The designed algorithm is compared with other cutting-edge population intelligence algorithms in cross-sectional simulations respectively. The results validate the feasibility of the developed model and the improved algorithm in the human-machine dynamics optimization problem of exoskeleton robots.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121905503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Analysis of Attentional Biases on Clinical Depression: Eye Tracking Study","authors":"Meng Zhang, Yue Chen, Shuo Tang, Ting Zhou, Zheng Huang","doi":"10.1109/ECICE55674.2022.10042888","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042888","url":null,"abstract":"We investigated the different effects of mood induction in depressed and healthy people through an eyetracking study. In the early stage of attention, negative mood induction affects the speed and time of the attention focus of depressed people, while the control group is not be affected. However, in the late stage of attention, depressed people are less affected by emotional stimulation, while the healthy control group shows protective and attentional bias.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}