Thursday, December 30, 2021

VLSI Design of Low Power High Speed 4 Bit Resolution Pipeline ADC In Submicron CMOS Technology

 

Author :  Ms. Rita M. Shende and Prof. Pritesh R. Gumble

Affiliation :  Sipna’s College of Engineering & Technology Amravati

Country :  India

Category :  Digital Signal & Image Processing

Volume, Issue, Month, Year :  2, 4, December, 2011

Abstract :


Analog-to-digital converters (ADCs) are key design blocks and are currently adopted in many application fields to improve digital systems, which achieve superior performances with respect to analog solutions. Application such as wireless communication and digital audio and video have created the need for costeffective data converters that will achieve higher speed and resolution. Widespread usage confers great importance to the design activities, which nowadays largely contributes to the production cost in integrated circuit devices (ICs). Various examples of ADC applications can be found in data acquisition systems, measurement systems and digital communication systems also imaging, instrumentation systems.

Keyword :  ADC, PIPELINE, CMOS


For More Details:https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5252

Tuesday, December 28, 2021

Information and Communication Security Mechanisms For Microservices-based Systems

 

Author :  Lenin Leines-Vite

Affiliation :  Universidad Veracruzana

Country :  Mexico

Category :  Networks & Communications

Volume, Issue, Month, Year :  13, 6, November, 2021

Abstract :


Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security,

Keyword :  Microservices, Software architecture, Secure communication, Information security.

For More Details:https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5248

Comparative Review of Malware Analysis Methodologies

 

Author :  Ioannis G. Kiachidis

Affiliation :  International Hellenic University

Country :  Greece

Category :  Networks & Communications

Volume, Issue, Month, Year :  13, 6, November, 2021

Abstract :


To fight against the evolution of malware and its development, the specific methodologies that are applied by the malware analysts are crucial. Yet, this is something often overlooked in the relevant bibliography or in the formal and informal training of the relevant professionals. There are only two generic and allencompassing structured methodologies for Malware Analysis (MA) – SAMA and MARE. The question is whether they are adequate and there is no need for another one or whether there is no such need at all. This paper will try to answer the above and it will contribute in the following ways: it will present, compare and dissect those two malware analysis methodologies, it will present their capacity for analysing modern malware by applying them on a random modern specimen and finally, it will conclude on whether there is a procedural optimization for malware analysis over the evolution of these two methodologies.

Keyword :  Malware Analysis, SAMA, MARE, Methodology, Review, Comparison

For More Details:https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5250

Sunday, December 26, 2021

Post-Segmentation Approach for Lossless Region of Interest Coding

 

Author :  Ji Hyun Lee and Jung H. Kim

Affiliation :  Tuskegee University

Category :  Digital Signal & Image Processing

Volume, Issue, Month, Year :  2, 4, December, 2011

Abstract :


This paper presents a lossless region of interest coding technique that is suitable for interactive telemedicine over networks. The new encoding scheme allows a server to transmit only a part of a compressed image data progressively as a client requests it. This technique is different from region scalable coding in JPEG2000 since it does not define region of interest (ROI) when encoding occurs. In the proposed method, the image is fully encoded and stored in the server. It also allows a user to select a ROI after the compression is done. This feature is the main contribution of research. The proposed coding method achieves the region scalable coding by using the integer wavelet lifting, successive quantization, and partitioning that rearranges the wavelet coefficients into subsets. Each subset that represents a local area in an image is then separately coded using run-length and entropy coding. In this paper, we will show the benefits of using the proposed technique with examples and simulation results.

Keyword :  Region Of Interest, Post-Segmentation, & Integer Wavelet Lifting


For More Details:https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5231

Thursday, December 23, 2021

A Novel Approach to Minimize Spare Cell Leakage Power Consumption During Physical Design Implementation

 

Author :  Vasantha Kumar B.V.P, Dr. N. S. Murthy Sharma, Dr. K. Lal Kishore and Jibanjeet Mishra

Affiliation :  Synopsys (India) Pvt. Ltd

Country :  India

Category :  Digital Signal & Image Processing

Volume, Issue, Month, Year :  2, 4, December, 2011

Abstract :


In IC designs leakage power constitutes significant amount power dissipation because CMOS gates are not perfect switches. The leakage power in CMOS gates is dependent on the states of the inputs. This leakage power will get dissipated even when the gates are in idle conditions. Traditionally ECO cells (or) spare cells remain idle in the design and thus contributes to significant state dependent leakage power consumption. In this paper we proposed novel solution to minimize the state dependent leakage power dissipation of the spare cells.

Keyword :  Engineering Change Order (ECO), ECO cell, Spare cell, State dependent, leakage power and switching probability.

For More Details:https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5247

Tuesday, December 21, 2021

Research on the Model of Interaction and Coupling Relationship between Standard System Construction and Process Management

 

Author :  Wang Chaofan、 Chen Xinyue

Affiliation :  1North China Electric Power University, School of Economics and Management, Wang Chaofan, Beijing, China 2Qingdao University,

Country :  People's Republic of China

Category :  Business Management

Volume, Issue, Month, Year :  7th Intern, MaVaS 2021, December, 2021

Abstract :


The fundamental motivation for enterprises to build a standard system is to meet the subjective needs of the unique use nature of standards, such as benchmarking and criteria, from input to output in the baseline relationship of all their business processes. How to guess the credibility and value of the standard system requires collaborative and mature processes to mediate cognition. Firstly, this paper clarifies the philosophical relationship between standard system construction and process management by using the general system structure theory. Secondly, it systematically summarizes the interaction mechanism between the two from the perspective of methodology. Finally, it designs a conceptual model with the "human regulation" composite system as the core and the coupling between standard system construction and the outer edge of process management, In order to provide a new integration idea for enterprise standardization management and process management to jointly realize the optimal value utility.

Keyword :  Standardization Discipline, Construction of Standard system, Process Management; Coupling Model

For More Details:https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5243

Monday, December 20, 2021

A Novel Attention-Based Network for Fast Salient Object Detection

 

Author :  Bin Zhang, Yang Wu, Xiaojing Zhang and Ming Ma

Affiliation :  Inner Mongolian University

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 22, December, 2021

Abstract :


In the current salient object detection network, the most popular method is using U-shape structure. However, the massive number of parameters leads to more consumption of computing and storage resources which are not feasible to deploy on the limited memory device. Some others shallow layer network will not maintain the same accuracy compared with U-shape structure and the deep network structure with more parameters will not converge to a global minimum loss with great speed. To overcome all of these disadvantages, we propose a new deep convolution network architecture with three contributions: (1) using smaller convolution neural networks (CNNs) to compress the model in our improved salient object features compression and reinforcement extraction module (ISFCREM) to reduce parameters of the model. 

Keyword :  Salient Object Detection, Optimization Strategy, Deep Learning, Model Compression, Vision Attention

For More Details:https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5242

EMERGENCY MANAGEMENT SYSTEM FOR COLLEGE STUDENTS BASED ON BIG DATA PROCESSING TECHNOLOGY

Author :  Ziyue wang

Affiliation :  Hubei University of Technology

Country :  China

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 16, October, 2021

Abstract :

Since 2020, the epidemic of Corona Virus Disease 2019 has swept the world, which has had a great impact on people's life. Especially for college campus life. This paper presents an emergency management system for college students. We use Java Web, big data processing and other technologies to develop, implement and test the system. The system integrates daily management and emergency management, which can meet the basic needs of teachers and students on campus. We hope to provide convenience for students and teachers in learning and management.

Keyword :  Web System, Stream Data Processing, Data visualization, Internet Worm.

For More Details https://aircconline.com/csit/papers/vol11/csit111601.pdf

Sunday, December 19, 2021

UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWORK ANOMALY DETECTION WITH SHAPLEY ADDITIVE EXPLANATION(SHAP)

 

Author :  Khushnaseeb Roshan

Affiliation :  Aligarh Muslim Univesity

Country :  India

Category :  Soft Computing

Volume, Issue, Month, Year :  13, 6, November, 2021

Abstract :


Machine learning (ML) and Deep Learning (DL) methods are being adopted rapidly, especially in computer network security, such as fraud detection, network anomaly detection, intrusion detection, and much more. However, the lack of transparency of ML and DL based models is a major obstacle to their implementation and criticized due to its black-box nature, even with such tremendous results. Explainable Artificial Intelligence (XAI) is a promising area that can improve the trustworthiness of these models by giving explanations and interpreting its output. If the internal working of the ML and DL based models is understandable, then it can further help to improve its performance. The objective of this paper is to show that how XAI can be used to interpret the results of the DL model, the autoencoder in this case. And, based on the interpretation, we improved its performance for computer network anomaly detection. The kernel SHAP method, 

Keyword :  Network Anomaly Detection, Network Security, Autoencoder, Shapley Additive Explanation, Explainable AI (XAI), Machine Learning

For More Details:https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5235

Friday, December 17, 2021

Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Discrete Wavelet Transform

 Author : Mohsen Zare Baghbidi, Kamal Jamshidi, Ahmad Reza Naghsh Nilchi and Saeid Homayouni


Affiliation : University of Isfahan

Country : Iran

Category : Digital Signal & Image Processing

Volume, Issue, Month, Year : 2, 4, December, 2011

Abstract :


Recently anomaly detection (AD) has become an important application for target detection in hyperspectral remotely sensed images. In many applications, in addition to high accuracy of detection we need a fast and reliable algorithm as well. This paper presents a novel method to improve the performance of current AD algorithms. The proposed method first calculates Discrete Wavelet Transform (DWT) of every pixel vector of image using Daubechies4 wavelet. Then, AD algorithm performs on four bands of “Wavelet transform” matrix which are the approximation of main image. In this research some benchmark AD algorithms including Local RX, DWRX and DWEST have been implemented on Airborne Visible/Infrared Imaging Spectrometer (AVIRIS) hyperspectral datasets. Experimental results demonstrate significant improvement of runtime in proposed method. In addition, this method improves the accuracy of AD algorithms because of DWT’s power in extracting approximation coefficients of signal, which contain the main behaviour of signal, and abandon the redundant information in hyperspectral image data.

Keyword : Hyperspectral Remote Sensing, Anomaly Detection, Discrete Wavelet Transform, ROC Curve, RX.

For More Details:https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5239

Thursday, December 16, 2021

Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer

 Author : Raed Al-hamarneh


Affiliation : University of Almaarefa

Country : Kingdom of Saudi Arabia

Category : Networks & Communications

Volume, Issue, Month, Year : 13, 6, November, 2021

Abstract :


Smart cities are expected to significantly improve people's quality of life, promote sustainable development, and enhance the efficiency of operations. With the implementation of many smart devices, c problems have become a serious challenge that needs strong treatments, especially the cyber-attack, which most countries suffer from it. My study focuses on the security of smart city systems, which include equipment like air conditioning, alarm systems, lighting, and doors. Some of the difficulties that arise daily may be found in the garage. This research aims to come up with a simulation of smart devices that can be and reduce cyber attach. Use of Cisco Packet tracer Features Simulated smart home and c devices are monitored. Simulation results show that smart objects can be connected to the home portal and objects can be successfullymonitored which leads to the idea of real-life implementation and see. In my research make manysolutions for attachingissues,which was great, and apply some wirelessprotocol.

Keyword : Smart cities, smart devices, security issue, cyber-attack, Cisco Packet tracer, Cisco Packet tracer

For More Details:https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5238

Wednesday, December 15, 2021

BLOCKCHAIN DECENTRALIZED VOTING FOR VERIFIED USERS WITH A FOCUS ON ANONYMITY

 Author : Piotr Pospiech


Affiliation : Wroclaw University of Science and Technology

Country : Poland

Category : Computer Science & Information Technology

Volume, Issue, Month, Year : 11, 08, June, 2021

Abstract :


The paper presents decentralized voting scheme for verified users while maintaining their anonymity. A blockchain network was applied, which is a decentralized and distributed database based on the Peer-to-Peer architecture. During the implementation, the Ethereum network was used. Thanks to this, it is possible to code the terms of the contract required to perform the transaction. Ethereum and the use of smart contracts were also discussed in paper. The implementation uses the blind signature protocol by David Chaum and encryption with the Rivest-Shamir-Adleman (RSA) algorithm. Presented in this paper scheme for blockchain decentralized voting for verified users with focus on anonymity is then fully implemented and identified potential issues are analysed and discussed.

Keyword : Blockchain, e-voting, Ethereum.

For More Details: https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5236

Monday, December 13, 2021

Improving Security and Fairness in Federated Learning Systems

 Author : Andrew R. Short

Affiliation : 

University of West Attica

Country : Greece

Category : Networks & Communications

Volume, Issue, Month, Year : 13, 6, November, 2021
Abstract :
The ever-increasing use of Artificial Intelligence applications has made apparent that the quality of the training datasets affects the performance of the models. To this end, Federated Learning aims to engage multiple entities to contribute to the learning process with locally maintained data, without requiring them to share the actual datasets. Since the parameter server does not have access to the actual training datasets, it becomes challenging to offer rewards to users by directly inspecting the dataset quality. Instead, this paper focuses on ways to strengthen user engagement by offering “fair” rewards, proportional to the model improvement (in terms of accuracy) they offer. Furthermore, to enable objective judgment of the quality of contribution, we devise a point system to record user performance assisted by blockchain technologies. More precisely, we have developed a verification algorithm that evaluates the performance of users’ contributions by comparing the resulting accuracy of the global model against a verification dataset and we demonstrate how this metric can be used to offer security improvements in a Federated Learning process. Further on, we implement the solution in a simulation environment in order to assess the feasibility and collect baseline results using datasets of varying quality.

Keyword : Incentive schemes, Federated Learning, Blockchain, Rewards, Incentive schemes

For More Details:https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5237

BLOCKCHAIN DECENTRALIZED VOTING FOR VERIFIED USERS WITH A FOCUS ON ANONYMITY

Author :  Piotr Pospiech

Affiliation :  Wroclaw University of Science and Technology

Country :  Poland

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 08, June, 2021

Abstract :

The paper presents decentralized voting scheme for verified users while maintaining their anonymity. A blockchain network was applied, which is a decentralized and distributed database based on the Peer-to-Peer architecture. During the implementation, the Ethereum network was used. Thanks to this, it is possible to code the terms of the contract required to perform the transaction. Ethereum and the use of smart contracts were also discussed in paper. The implementation uses the blind signature protocol by David Chaum and encryption with the Rivest-Shamir-Adleman (RSA) algorithm. Presented in this paper scheme for blockchain decentralized voting for verified users with focus on anonymity is then fully implemented and identified potential issues are analysed and discussed.

Keyword :  Blockchain, e-voting, Ethereum.

For More Details https://aircconline.com/csit/papers/vol11/csit110805.pdff

Sunday, December 12, 2021

Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET

 Author : Ruo Ando


Affiliation : National Institute of Informatics

Country : Japan

Category : Networks & Communications

Volume, Issue, Month, Year : 13, 6, November, 2021

Abstract :


Recently, APT (Advanced Persistent Threats) groups are using the COVID-19 pandemic as part of their cyber operations. In response to cyber threat actors, IoCs (Indicators of Compromise) are being provided to help us take some countermeasures. In this paper, we analyse how the coronavirus-based cyber attack unfolded on the academic infrastructure network SINET (The Science Information Network) based on the passive measurement with IoC. SINET is Japan's academic information infrastructure network. To extract and analyze the traffic patterns of the COVID-19 attacker group, we implemented a data flow pipeline for handling huge session traffic data observed on SINET. The data flow pipeline provides three functions: (1) identification the direction of the traffic, (2) filtering the port numbers, and (3) generation of the time series data. From the output of our pipeline, it is clear that the attacker's traffic can be broken down into several patterns. To name a few, we have witnessed (1) huge burstiness (port 25: FTP and high port applications), (3) diurnal patterns (port 443: SSL), and (3) periodic patterns with low amplitude (port 25: SMTP) We can conclude that some unveiled patterns by our pipeline are informative to handling security operations of the academic backbone network. Particularly, we have found burstiness of high port and unknown applications with the number of session data ranging from 10,000 to 35,000. For understanding the traffic patterns on SINET, our data flow pipeline can utilize any IoC based on the list of IP address for traffic ingress/egress identification and port filtering.

Keyword : COVID-19 related IoC, traffic patterns, data flow pipeline, port filtering, SINET, high port application

For More Details:https://allconferencecfpalerts.com/cfp/view-paper.php?eno=5233