2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)最新文献

筛选
英文 中文
Implementing SOLID principles for IoT Arduino sensor code 实现SOLID原理的物联网Arduino传感器代码
Elisha Elikem Kofi Senoo, Ebenezer Akansah, Israel Mendonça, M. Aritsugi
{"title":"Implementing SOLID principles for IoT Arduino sensor code","authors":"Elisha Elikem Kofi Senoo, Ebenezer Akansah, Israel Mendonça, M. Aritsugi","doi":"10.1109/JAC-ECC56395.2022.10043950","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043950","url":null,"abstract":"Performance, energy efficiency, and other run-time attributes are usually prioritized by stakeholders in the embedded software industry as evaluation metrics, which often results in a trade-off of maintainability, reusability and other design-time qualities. But the need for shorter maintenance cycles is becoming more and more important, as more IoT devices and systems get adopted. Object-oriented programming (OOP) SOLID principles are well adopted practices in software development projects in achieving design-time qualities including maintainability and reusability. Despite the fact that maintainability and reusability are the design-time qualities that drive embedded software refactoring, the absence of a standard embedded software framework results in redundant and wasted development effort. In this study, we apply OOP SOLID principles to implement selected sensors to create an open-source library. This work can help beginners to quickly get started with sensors, and also help embedded software developers to build highly scalable and maintainable systems.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132410522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Low Power Posit Arithmetic Unit for Efficient Hardware Accelerators 高效硬件加速器低功耗位置运算单元的设计与实现
Mohammed Essam, A. Shalaby, M. Taher
{"title":"Design and Implementation of Low Power Posit Arithmetic Unit for Efficient Hardware Accelerators","authors":"Mohammed Essam, A. Shalaby, M. Taher","doi":"10.1109/JAC-ECC56395.2022.10043893","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043893","url":null,"abstract":"There is an increasing interest in hardware accelerators, both in academia and industry. The industry invests in application-level accelerators, like Graphics Processing Units (GPUs) or Field programmable Gate Array (FPGA) accelerators connected to the PCIe bus. Hardware accelerators outperform general purpose Central Processing Units (CPUs) in terms of power consumption and performance. Hardware accelerators seek to optimize arithmetic operations, since it is the heart of the computation circuitry in different algorithms and applications. In this context, posit is proposed to replace IEEE Standard 754-2008 floating point and offers more efficient arithmetic units in terms of accuracy and Power-Performance-Area (PPA) matrix. In this paper, we introduce a low power Verilog HDL design and implementation of Posit Arithmetic Unit (PAU) for efficient hardware accelerators. Our regular proposed PAU is synthesized on Xilinx ZYNQ-7000. The results show34% area improvement and 14% power saving, while our compact PAU achieves 25% area reduction and 45% power saving.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125361046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arabic handwritten digit classification without gradients: Pseudoinverse Learners 没有梯度的阿拉伯手写数字分类:伪逆学习器
Mohammed A. B. Mahmoud
{"title":"Arabic handwritten digit classification without gradients: Pseudoinverse Learners","authors":"Mohammed A. B. Mahmoud","doi":"10.1109/JAC-ECC56395.2022.10043938","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043938","url":null,"abstract":"The topic of handwritten digit recognition (HDR) has drawn more and more attention in recent years. The biggest drawback of HDR is the lack of an efficient model that can categorise the handwritten numbers that users present via digital devices. Various methods have been developed to enhance HDR in Arabic, using on sophisticated deep learning techniques such convolution neural networks (CNNs), which are learning using a backpropagation algorithm that has many drawbacks, including: 1) Local minima possibility, 2) long learning time, 3) Non-assured convergence, 4) Selective learning data and 5) Black box: the inner mapping techniques of the BP are remaining unclear and not grasped. To overcome these limitations, this paper introduces the use of pseudoinverse learning autoencoder (PILAE) algorithm. The PILAE is not a gradient descent strategy; however, it is not required to specify the learning rate or suggest the quantity of hidden layers and the drawback of gradient vanishing. According to experimental findings, the introduced technique improves test accuracy while maximising computational efficiency.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123464596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Classification Process using Supervised Deep Learning and Robot Positioning based on Embedded PD-FLC 基于嵌入式PD-FLC的有监督深度学习和机器人定位的高效分类过程
Emad A. Elsheikh
{"title":"An Efficient Classification Process using Supervised Deep Learning and Robot Positioning based on Embedded PD-FLC","authors":"Emad A. Elsheikh","doi":"10.1109/JAC-ECC56395.2022.10043954","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043954","url":null,"abstract":"Recently, computer vision has grown considerably in roboticsarms such as packaging and sorting for Industrial applications. The real challenge is how to improve the present sorting system based on artificial intelligence (AI) in the four points to identify, manipulate, select, and sort objects depending on their features. Therefore, this paper proposes an automatic sorting system based on Deep Learning (DL) and control in a robotic arm using an embedded PD-FLC. The proposed algorithm is divided into three stages; The first stage introduces building a Model for the identification and classification of fruits using the concept of Supervised deep learning (SDL) using the convolution neural network (CNN) algorithm. The model is trained using our data set of images that consider 12 classes of fruits named (Fruits-dataset). The second stage uses the pre-trained model and a web camera to automatically identify and classify the detected objects into 12 categories of fruits in real-time. The third stage uses an embedded proportional derivative fuzzy logic controller (PDFLC) to control the position of a 3DOF robotic arm to locate the classified object in the desired location. Our proposed SDLCNN model is tested to classify the fruits under different environment states (outdoor and indoor) in different color modes and intensities. The proposed SDL-CNN algorithm is compared with different state-of-the-art methods. Correspondingly, the obtained results show the effectiveness, high accuracy, and low cost of the developed design with the capability of real-time identifying and classifying the fruits.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126524481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing an Efficient Secure Query Processing Algorithm for Unstructured Data on Encrypted Databases 加密数据库中非结构化数据的高效安全查询处理算法
Mohamed Abdel Fouly, T. Soliman, A. Taloba
{"title":"Developing an Efficient Secure Query Processing Algorithm for Unstructured Data on Encrypted Databases","authors":"Mohamed Abdel Fouly, T. Soliman, A. Taloba","doi":"10.1109/JAC-ECC56395.2022.10043877","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043877","url":null,"abstract":"A few years ago, information size increased unexpectedly and a data explosion happened. In this world of growing information, a change in database generation may also be required. Historically, we used a structured query language that works best with structured data. Now, we want to work with unstructured data as well as with structured data. The solution is to use not only SQL (NoSQL) database, this means not only structured query language. Recently, NoSQL databases are widely used in many organizations. Moreover, the data is kept in external services like Database as a Service (DaaS), where server-side and client-side security concerns are created. Additionally, the database’s query processing by several clients using complicated techniques and a shared resource environment may lead to ineffective data processing and retrieval. An effective data processing technique among several customers can be used to retrieve data in a secure and effective manner. In this paper, we present an Efficient Secure Query Processing Algorithm for Unstructured Data (ESQPA_U) for efficient query processing by applying data compression techniques before transferring the encrypted results from the server to clients. We have solved security concerns by using CryptDB to encrypt a database on the server to protect the data. Encryption methods have recently been suggested to give customers secrecy in cloud storage. The queries can be processed using encrypted data using this technique without having to first decrypt it. In order to evaluate ESQPA_U performance, it is contrasted with CryptDB existing query processing method. According to results, storage space is more effective and can save up to 57% of its original space.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133832661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simultaneous Operation of Photonic Crystal ORXOR- NOT Gates with Minimum Size and High Bit Rate Ring Resonator-Interference Based Structure 基于小尺寸和高比特率环形谐振腔干涉结构的光子晶体ORXOR- NOT门的同时操作
Tamer S. Mostafa, Shaimaa A. Kroush, El- Sayed M. El- Rabaie
{"title":"Simultaneous Operation of Photonic Crystal ORXOR- NOT Gates with Minimum Size and High Bit Rate Ring Resonator-Interference Based Structure","authors":"Tamer S. Mostafa, Shaimaa A. Kroush, El- Sayed M. El- Rabaie","doi":"10.1109/JAC-ECC56395.2022.10044036","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10044036","url":null,"abstract":"The OR-XOR-NOT gates are considered in this paper. They can be constructed in different topologies such as ring resonator, self-collimation, waveguide, and cavity-based structures. Linear and nonlinear materials are used to implement these gates in literature. In this paper, the proposed design is formed in a linear photonic crystal square lattice floor with ring resonator topology and interference based operation. By applying sensitivity analysis and by organizing the location of some rods; the OR-XOR NOT gates are verified. Simultaneous operation, minimum area structure and high bit rate are the remarkable figures of merits for this design. The minimum size of $56.16mathrm{mu m}^{2}$ is obtained. The bit rates of $5.02mathrm{~Tb}/mathrm{s}$, and 3.1Tpbs are calculated for OR, and XOR respectively. As the NOT-gate operation is a part of the XOR; so, it can be verified in this paper. The phase shift between the input powers and their effect are examined carefully. The threshold power level is considered as 0.3. Comparative tables are organized for both gates based on ring resonator topology. The fabrication methods are discussed and evaluated. These structures are designed, simulated and optimized at $1.55mumathrm{m}$ wavelength to verify OR-XOR-NOT gates.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133625107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Armed Bandit based Capacity Enhancement Approach for Reconfigurable Intelligent Surface Assisted Multi-cell System. 基于多臂强盗的可重构智能表面辅助多单元系统容量增强方法。
Mariam Abdelrahman, Ahmed Nasser, Ahmed Magdy, M. Elsabrouty
{"title":"Multi-Armed Bandit based Capacity Enhancement Approach for Reconfigurable Intelligent Surface Assisted Multi-cell System.","authors":"Mariam Abdelrahman, Ahmed Nasser, Ahmed Magdy, M. Elsabrouty","doi":"10.1109/JAC-ECC56395.2022.10043873","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043873","url":null,"abstract":"In this paper, the capacity enhancement problem in multi-user networks is considered through the assistance of reconfigurable intelligent surfaces (RIS). RIS can manage the interference among cells by optimizing its phase and amplitude reflection coefficients, which is a non-convex problem. For an improved solution, we propose a Multi-armed Bandit (MAB) based technique to optimize the RIS phase shift for interference management while preserving users’ quality of service. In the proposed MAB, RIS phase shifts represent the arms, and the sum rate represents the corresponding reward. Two MAB algorithms are utilized to select the suitable arm from the available space, namely, the $epsilon-$Greedy and the Decaying $epsilon-$Greedy. The simulation results prove that the adopted RIS with phase shift optimization can significantly improve the rate for all users compared to the traditional network.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123908356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CAD Tool of Adaptive Coverage Exclusions for Complex Industrial HDL Designs 复杂工业HDL设计的自适应覆盖排除CAD工具
Ahmed Magdy, Mostafa Khamis
{"title":"A CAD Tool of Adaptive Coverage Exclusions for Complex Industrial HDL Designs","authors":"Ahmed Magdy, Mostafa Khamis","doi":"10.1109/JAC-ECC56395.2022.10043907","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043907","url":null,"abstract":"Functional simulation is still the primary workhorse for verifying the correctness of hardware designs. Code coverage is a key contributor to any verification process, as it is strongly correlated to test-bench quality metering and effectiveness of the whole verification flow. It also measures the extent of design verification provided by a set of functional simulation vectors which should compute the statement execution counts (controllability information). Code coverage exclusion has always been associated with the verification process to have reasonable coverage results and for the purpose of debugging a particular segment of the design. Keeping tracing of the excluded parts along with the frequent editing has become a hurdle to a lot of designers. In this paper, we present a novel adaptive exclusion methodology based on source code annotation. This tool acts as a third-party tool that works side by side with any functional simulation tool. Furthermore, the reliability of the tool for any source modifications and its performance overhead were evaluated empirically through extensive simulations over very large industrial projects, showing that the average execution time overhead for 10 million lines of code project is on average 0.4% only.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125833558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Stochastic Dispatch of Combined Heat Power System with Guaranteed Heat Trading 保证热交易的热电联产系统最优随机调度
Hussein Abdeltawab
{"title":"Optimal Stochastic Dispatch of Combined Heat Power System with Guaranteed Heat Trading","authors":"Hussein Abdeltawab","doi":"10.1109/JAC-ECC56395.2022.10043939","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043939","url":null,"abstract":"Combined Heat and Power (CHP) is an excellent method for maximizing the efficiency of a multicarrier energy system. Generated heat from a CHP can be used to supply a thermal load or storage. Since the CHP-generated heat depends on the generated electric power, some excessive heat may be wasted if storage is not a viable option. This work proposes a day-ahead energy management system (EMS) with redundant heat trading. The system contains Electric Vehicle (EV), Photovoltaic (PV), hot water tank storage, gas boiler, and Electric heater to meet the electric and thermal energy demands in a multicarrier energy system. To account for uncertainties, various scenarios for the electrical/thermal load, PV power, and temperature are considered. A Monte-Carlo-based two-level EMS is developed to calculate the required heat reserve to trade heat while accounting for all uncertainties. Simulation results show that the proposed EMS can predict the necessary reserve for guaranteeing reliable day-ahead heat commitment.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Triple Band Wireless Power Transfer (TB-WPT) system for Multiple Applications 多用途三波段无线电力传输(TB-WPT)系统的设计
H. Atallah, R. Hussein, Adel B. Abdelrahman
{"title":"Design of a Triple Band Wireless Power Transfer (TB-WPT) system for Multiple Applications","authors":"H. Atallah, R. Hussein, Adel B. Abdelrahman","doi":"10.1109/JAC-ECC56395.2022.10043958","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043958","url":null,"abstract":"In this paper, a triple band wireless power transfer (TB-WPT) system is presented using coupled spirals defected ground structures (Ss-DGSs) band stop filter (BSF). The simulated efficiencies are 98 %, 99 %, and 89 % at 0.26 GHz, 0.37 GHz, and 0.56 GHz, respectively. The suggested work has a size of 30×15mm2 with a transmission distance of 9 mm. Due to its compact size and satisfactory performance, the design can be useful for modern wireless communication technology.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信