Next Issue
Volume 12, March-2
Previous Issue
Volume 12, February-2
 
 

Electronics, Volume 12, Issue 5 (March-1 2023) – 196 articles

Cover Story (view full-size image): Microwave applications in medicine are gaining interest with a significant trend in healthcare research and development. Artificial intelligence (AI)-assisted microwave applications in medicine are expected to disrupt several areas, namely microwave imaging, dielectric spectroscopy for tissue classification, molecular diagnostics, telemetry, biohazard waste management, diagnostic pathology, biomedical sensor design, drug delivery, ablation treatment, and radiometry. AI-enabled microwave systems can be developed to augment healthcare, including clinical decision making, guiding treatment, and increasing resource-efficient facilities. This contribution outlines a platform for AI-based microwave solutions for future advancements in both clinical and technical aspects to enhance patient care. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
19 pages, 2743 KiB  
Article
A New Hybrid Fault Diagnosis Method for Wind Energy Converters
by Jinping Liang and Ke Zhang
Electronics 2023, 12(5), 1263; https://doi.org/10.3390/electronics12051263 - 6 Mar 2023
Cited by 8 | Viewed by 1619
Abstract
Fault diagnostic techniques can reduce the requirements for the experience of maintenance crews, accelerate maintenance speed, reduce maintenance cost, and increase electric energy production profitability. In this paper, a new hybrid fault diagnosis method based on multivariate empirical mode decomposition (MEMD), fuzzy entropy [...] Read more.
Fault diagnostic techniques can reduce the requirements for the experience of maintenance crews, accelerate maintenance speed, reduce maintenance cost, and increase electric energy production profitability. In this paper, a new hybrid fault diagnosis method based on multivariate empirical mode decomposition (MEMD), fuzzy entropy (FE), and an artificial fish swarm algorithm (AFSA)-support vector machine (SVM) is proposed to identify the faults of a wind energy converter. Firstly, the measured three-phase output voltage signals are processed by MEMD to obtain three sets of intrinsic mode functions (IMFs). The multi-scale analysis tool MEMD is used to extract the common modes matching the timescale. It studies the multi-scale relationship between three-phase voltages, realizes their synchronous analysis, and ensures that the number and frequency of the modes match and align. Then, FE is calculated to describe the IMFs’ complexity, and the IMFs-FE information is taken as fault feature to increase the robustness to working conditions and noise. Finally, the AFSA algorithm is used to optimize SVM parameters, solving the difficulty in selecting the penalty factor and radial basis function kernel. The effectiveness of the proposed method is verified in a simulated wind energy system, and the results show that the diagnostic accuracy for 22 fault modes is 98.7% under different wind speeds, and the average accuracy of 30 running can be maintained above 84% for different noise levels. The maximum, minimum, average, and standard deviation are provided to prove the robust and stable performance. Compared with the other methods, the proposed hybrid method shows excellent performance in terms of high accuracy, strong robustness, and computational efficiency. Full article
Show Figures

Figure 1

22 pages, 7281 KiB  
Article
Statistical Study on the Time Characteristics of the Transient EMD Excitation Current from the Pantograph–Catenary Arcing Discharge
by Mengzhe Jin, Shaoqian Wang, Shanghe Liu, Qingyuan Fang and Weidong Liu
Electronics 2023, 12(5), 1262; https://doi.org/10.3390/electronics12051262 - 6 Mar 2023
Cited by 2 | Viewed by 1654
Abstract
Electromagnetic disturbances (EMDs) resulting from arcing discharge between the pantograph and catenary pose a serious threat to the electromagnetic safety of electrified trains. The time characteristic of EMD excitation current has a significant impact on the generation mechanism and characteristics of electromagnetic emission [...] Read more.
Electromagnetic disturbances (EMDs) resulting from arcing discharge between the pantograph and catenary pose a serious threat to the electromagnetic safety of electrified trains. The time characteristic of EMD excitation current has a significant impact on the generation mechanism and characteristics of electromagnetic emission from pantograph–catenary discharge, but there have been few studies on the topic. In this paper, a large sample of time-domain waveform parameters were collected through laboratory measurements considering the high randomness nature of the arcing discharge. The reference distributions of the waveform parameters were selected using the Kolmogorov–Smirnov test, and the probability density function parameters that vary with applied voltages and discharge gap spacings were examined. Then, a stochastic model for the derivation of the discharge current waveform was proposed based on statistical results using a modified double exponential function whose parameters can be derived from physical properties. Waveforms of the excitation currents representing different EMD severities were generated by adjusting the quantiles of the fitting distributions. The validity of the stochastic model was demonstrated by comparing the measured and simulated waveforms for both single pulses and pulse trains. The proposed method and generated waveforms can help recreate the electromagnetic environment of pantograph–catenary arcing. Full article
(This article belongs to the Topic EMC and Reliability of Power Networks)
Show Figures

Figure 1

16 pages, 2614 KiB  
Article
Two-Axis Optoelectronic Stabilized Platform Based on Active Disturbance Rejection Controller with LuGre Friction Model
by Xueyan Hu, Shunjie Han, Yangyang Liu and Heran Wang
Electronics 2023, 12(5), 1261; https://doi.org/10.3390/electronics12051261 - 6 Mar 2023
Cited by 6 | Viewed by 1925
Abstract
To realize the stable tracking control of the optoelectronic stabilized platform system under nonlinear friction and external disturbance, an active disturbance rejection controller (ADRC) with friction compensation is proposed to improve the target tracking ability and anti-disturbance performance. First, a nonlinear LuGre observer [...] Read more.
To realize the stable tracking control of the optoelectronic stabilized platform system under nonlinear friction and external disturbance, an active disturbance rejection controller (ADRC) with friction compensation is proposed to improve the target tracking ability and anti-disturbance performance. First, a nonlinear LuGre observer is designed to estimate friction behavior and preliminarily suppress the interference of friction torque on the system. Then, an ADRC is introduced to further suppress the residual disturbance after friction compensation, and the stability of the ADRC system is also proved. The effectiveness of this scheme is proved by simulation experiments, and this scheme is compared with conventional ADRC and LuGre friction feedforward compensation. The simulation results show that an ADRC with LuGre friction compensation is better with trajectory tracking performance, which suppresses the influence of disturbance and improves the stability of the optoelectronic stabilized platform system. Full article
(This article belongs to the Special Issue Advanced Control Techniques of Power Electronics)
Show Figures

Figure 1

12 pages, 648 KiB  
Article
Towards Effective Feature Selection for IoT Botnet Attack Detection Using a Genetic Algorithm
by Xiangyu Liu and Yanhui Du
Electronics 2023, 12(5), 1260; https://doi.org/10.3390/electronics12051260 - 6 Mar 2023
Cited by 22 | Viewed by 3019
Abstract
With the large-scale use of the Internet of Things, security issues have become increasingly prominent. The accurate detection of network attacks in the IoT environment with limited resources is a key problem that urgently needs to be solved. The intrusion detection system based [...] Read more.
With the large-scale use of the Internet of Things, security issues have become increasingly prominent. The accurate detection of network attacks in the IoT environment with limited resources is a key problem that urgently needs to be solved. The intrusion detection system based on network traffic characteristics is one of the solutions for IoT security. However, the intrusion detection system has the problem of a large number of traffic features, which makes training and detection slow. Aiming at this problem, this work proposes a feature selection method based on a genetic algorithm. The experiments performed on the Bot-IoT botnet detection dataset show that this method successfully selects 6 features from the original 40 features, with a detection accuracy of 99.98% and an F1-score of 99.63%. Compared with other methods and without feature selection, this method has advantages in training time and detection accuracy. Full article
(This article belongs to the Special Issue Security Issues in the IoT)
Show Figures

Figure 1

12 pages, 5299 KiB  
Article
Detecting Human Falls in Poor Lighting: Object Detection and Tracking Approach for Indoor Safety
by Xing Zi, Kunal Chaturvedi, Ali Braytee, Jun Li and Mukesh Prasad
Electronics 2023, 12(5), 1259; https://doi.org/10.3390/electronics12051259 - 6 Mar 2023
Cited by 12 | Viewed by 4067
Abstract
Falls are one the leading causes of accidental death for all people, but the elderly are at particularly high risk. Falls are severe issue in the care of those elderly people who live alone and have limited access to health aides and skilled [...] Read more.
Falls are one the leading causes of accidental death for all people, but the elderly are at particularly high risk. Falls are severe issue in the care of those elderly people who live alone and have limited access to health aides and skilled nursing care. Conventional vision-based systems for fall detection are prone to failure in conditions with low illumination. Therefore, an automated system that detects falls in low-light conditions has become an urgent need for protecting vulnerable people. This paper proposes a novel vision-based fall detection system that uses object tracking and image enhancement techniques. The proposed approach is divided into two parts. First, the captured frames are optimized using a dual illumination estimation algorithm. Next, a deep-learning-based tracking framework that includes detection by YOLOv7 and tracking by the Deep SORT algorithm is proposed to perform fall detection. On the Le2i fall and UR fall detection (URFD) datasets, we evaluate the proposed method and demonstrate the effectiveness of fall detection in dark night environments with obstacles. Full article
(This article belongs to the Special Issue Deep Learning in Image Processing and Pattern Recognition)
Show Figures

Figure 1

22 pages, 8167 KiB  
Article
A Novel Hybrid Deep Learning Model for Detecting and Classifying Non-Functional Requirements of Mobile Apps Issues
by Abdulsamad E. Yahya, Atef Gharbi, Wael M. S. Yafooz and Arafat Al-Dhaqm
Electronics 2023, 12(5), 1258; https://doi.org/10.3390/electronics12051258 - 6 Mar 2023
Cited by 19 | Viewed by 2684
Abstract
As a result of the speed and availability of the Internet, mobile devices and apps are in widespread usage throughout the world. Thus, they can be seen in the hands of nearly every person, helping us in our daily activities to accomplish many [...] Read more.
As a result of the speed and availability of the Internet, mobile devices and apps are in widespread usage throughout the world. Thus, they can be seen in the hands of nearly every person, helping us in our daily activities to accomplish many tasks with less effort and without wasting time. However, many issues occur while using mobile apps, which can be considered as issues of functional or non-functional requirements (NFRs). Users can add their comments as a review on the mobile app stores that provide for technical feedback, which can be used to improve the software quality and features of the mobile apps. Minimum attention has been given to such comments by scholars in addressing, detecting, and classifying issues related to NFRs, which are still considered challenging. The purpose of this paper is to propose a hybrid deep learning model to detect and classify NFRs (according to usability, reliability, performance, and supportability) of mobile apps using natural language processing methods. The hybrid model combines three deep learning (DL) architectures: a recurrent neural network (RNN) and two long short-term memory (LSTM) models. It starts with a dataset construction extracted from the user textual reviews that contain significant information in the Arabic language. Several experiments were conducted using machine learning classifiers (MCLs) and DL, such as ANN, LSTM, and bidirectional LSTM architecture to measure the performance of the proposed hybrid deep learning model. The experimental results show that the performance of the proposed hybrid deep learning model outperforms all other models in terms of the F1 score measure, which reached 96%. This model helps mobile developers improve the quality of their apps to meet user satisfaction and expectations by detecting and classifying issues relating to NFRs. Full article
Show Figures

Figure 1

16 pages, 4090 KiB  
Article
Object Detection for Hazardous Material Vehicles Based on Improved YOLOv5 Algorithm
by Pengcheng Zhu, Bolun Chen, Bushi Liu, Zifan Qi, Shanshan Wang and Ling Wang
Electronics 2023, 12(5), 1257; https://doi.org/10.3390/electronics12051257 - 6 Mar 2023
Cited by 9 | Viewed by 2767
Abstract
Hazardous material vehicles are a non-negligible mobile source of danger in transport and pose a significant safety risk. At present, the current detection technology is well developed, but it also faces a series of challenges such as a significant amount of computational effort [...] Read more.
Hazardous material vehicles are a non-negligible mobile source of danger in transport and pose a significant safety risk. At present, the current detection technology is well developed, but it also faces a series of challenges such as a significant amount of computational effort and unsatisfactory accuracy. To address these issues, this paper proposes a method based on YOLOv5 to improve the detection accuracy of hazardous material vehicles. The method introduces an attention module in the YOLOv5 backbone network as well as the neck network to achieve the purpose of extracting better features by assigning different weights to different parts of the feature map to suppress non-critical information. In order to enhance the fusion capability of the model under different sized feature maps, the SPPF (Spatial Pyramid Pooling-Fast) layer in the network is replaced by the SPPCSPC (Spatial Pyramid Pooling Cross Stage Partial Conv) layer. In addition, the bounding box loss function was replaced with the SIoU loss function in order to effectively speed up the bounding box regression and enhance the localization accuracy of the model. Experiments on the dataset show that the improved model has effectively improved the detection accuracy of hazardous chemical vehicles compared with the original model. Our model is of great significance for achieving traffic accident monitoring and effective emergency rescue. Full article
Show Figures

Figure 1

16 pages, 21467 KiB  
Article
SDRC-YOLO: A Novel Foreign Object Intrusion Detection Algorithm in Railway Scenarios
by Caixia Meng, Zhaonan Wang, Lei Shi, Yufei Gao, Yongcai Tao and Lin Wei
Electronics 2023, 12(5), 1256; https://doi.org/10.3390/electronics12051256 - 6 Mar 2023
Cited by 17 | Viewed by 3208
Abstract
Foreign object intrusion detection is vital to ensure the safety of railway transportation. Recently, object detection algorithms based on deep learning have been applied in a wide range of fields. However, in complex and volatile railway environments, high false detection, missed detection, and [...] Read more.
Foreign object intrusion detection is vital to ensure the safety of railway transportation. Recently, object detection algorithms based on deep learning have been applied in a wide range of fields. However, in complex and volatile railway environments, high false detection, missed detection, and poor timeliness still exist in traditional object detection methods. To address these problems, an efficient railway foreign object intrusion detection approach SDRC-YOLO is proposed. First, a hybrid attention mechanism that fuses local representation ability is proposed to improve the identification accuracy of small targets. Second, DW-Decoupled Head is proposed to construct a mixed feature channel to improve localization and classification ability. Third, a large convolution kernel is applied to build a larger receptive field and improve the feature extraction capability of the network. In addition, the lightweight universal upsampling operator CARAFE is employed to sample the size and proportion of the intruding foreign body features in order to accelerate the convergence speed of the network. Experimental results show that, compared with the baseline YOLOv5s algorithm, SDRC-YOLO improved the mean average precision (mAP) by 2.8% and 1.8% on datasets RS and Pascal VOC 2012, respectively. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

14 pages, 1760 KiB  
Article
A Network Intrusion Detection Method Based on Domain Confusion
by Yanze Qu, Hailong Ma, Yiming Jiang and Youjun Bu
Electronics 2023, 12(5), 1255; https://doi.org/10.3390/electronics12051255 - 6 Mar 2023
Cited by 4 | Viewed by 1549
Abstract
Network intrusion detection models based on deep learning encounter problems in the migration application. The performance is not as good as expected. In this paper, a network intrusion detection method based on domain confusion is proposed to improve the migration performance of the [...] Read more.
Network intrusion detection models based on deep learning encounter problems in the migration application. The performance is not as good as expected. In this paper, a network intrusion detection method based on domain confusion is proposed to improve the migration performance of the model. A domain confusion network is designed for feature transformation based on the idea of domain adaptation, mapping the traffic data in different network environments to the same feature space. Meanwhile, a regularizer is proposed to control the information loss in the mapping process to ensure that the transformed feature obtains enough information for intrusion detection. The experiment results show that the detection performance of the model in this paper is similar to or even better than the traditional models, and the migration performance in different network environments is better than the traditional models. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

18 pages, 890 KiB  
Article
Intelligent Computation Offloading Mechanism with Content Cache in Mobile Edge Computing
by Feixiang Li, Chao Fang, Mingzhe Liu, Ning Li and Tian Sun
Electronics 2023, 12(5), 1254; https://doi.org/10.3390/electronics12051254 - 6 Mar 2023
Cited by 4 | Viewed by 1835
Abstract
Edge computing is a promising technology to enable user equipment to share computing resources for task offloading. Due to the characteristics of the computing resource, how to design an efficient computation incentive mechanism with the appropriate task offloading and resource allocation strategies is [...] Read more.
Edge computing is a promising technology to enable user equipment to share computing resources for task offloading. Due to the characteristics of the computing resource, how to design an efficient computation incentive mechanism with the appropriate task offloading and resource allocation strategies is an essential issue. In this manuscript, we proposed an intelligent computation offloading mechanism with content cache in mobile edge computing. First, we provide the network framework for computation offloading with content cache in mobile edge computing. Then, by deriving necessary and sufficient conditions, an optimal contract is designed to obtain the joint task offloading, resource allocation, and a computation strategy with an intelligent mechanism. Simulation results demonstrate the efficiency of our proposed approach. Full article
(This article belongs to the Special Issue Resource Allocation in Cloud–Edge–End Cooperation Networks)
Show Figures

Figure 1

22 pages, 3274 KiB  
Article
A Coverless Audio Steganography Based on Generative Adversarial Networks
by Jing Li, Kaixi Wang and Xiaozhu Jia
Electronics 2023, 12(5), 1253; https://doi.org/10.3390/electronics12051253 - 5 Mar 2023
Cited by 5 | Viewed by 3286
Abstract
Traditional audio steganography by cover modification causes changes to the cover features during the embedding of a secret, which is easy to detect with emerging neural-network steganalysis tools. To address the problem, this paper proposes a coverless audio-steganography model to conceal a secret [...] Read more.
Traditional audio steganography by cover modification causes changes to the cover features during the embedding of a secret, which is easy to detect with emerging neural-network steganalysis tools. To address the problem, this paper proposes a coverless audio-steganography model to conceal a secret audio. In this method, the stego-audio is directly synthesized by our model, which is based on the WaveGAN framework. An extractor is meticulously designed to reconstruct the secret audio, and it contains resolution blocks to learn the different resolution features. The method does not perform any modification to an existing or generated cover, and as far as we know, this is the first directly generated stego-audio. The experimental results also show that it is difficult for the current steganalysis methods to detect the existence of a secret in the stego-audio generated by our method because there is no cover audio. The MOS metric indicates that the generated stego-audio has high audio quality. The steganography capacity can be measured from two perspectives, one is that it can reach 50% of the stego-audio from the simple size perspective, the other is that 22–37 bits can be hidden in a two-second stego-audio from the semantic. In addition, we prove using spectrum diagrams in different forms that the extractor can reconstruct the secret audio successfully on hearing, which guarantees complete semantic transmission. Finally, the experiment of noise impacts on the stego-audio transmission shows that the extractor can still completely reconstruct the semantics of the secret audios, which indicates that the proposed method has good robustness. Full article
(This article belongs to the Special Issue AI-Driven Network Security and Privacy)
Show Figures

Figure 1

17 pages, 2372 KiB  
Article
RESTful API Analysis, Recommendation, and Client Code Retrieval
by Shang-Pin Ma, Ming-Jen Hsu, Hsiao-Jung Chen and Chuan-Jie Lin
Electronics 2023, 12(5), 1252; https://doi.org/10.3390/electronics12051252 - 5 Mar 2023
Viewed by 3550
Abstract
Numerous companies create innovative software systems using Web APIs (Application Programming Interfaces). API search engines and API directory services, such as ProgrammableWeb, Rapid API Hub, APIs.guru, and API Harmony, have been developed to facilitate the utilization of various APIs. Unfortunately, most API systems [...] Read more.
Numerous companies create innovative software systems using Web APIs (Application Programming Interfaces). API search engines and API directory services, such as ProgrammableWeb, Rapid API Hub, APIs.guru, and API Harmony, have been developed to facilitate the utilization of various APIs. Unfortunately, most API systems provide only superficial support, with no assistance in obtaining relevant APIs or examples of code usage. To better realize the “FAIR” (Findability, Accessibility, Interoperability, and Reusability) features for the usage of Web APIs, in this study, we developed an API inspection system (referred to as API Prober) to provide a new API directory service with multiple supplemental functionalities. To facilitate the findability and accessibility of APIs, API Prober transforms OAS (OpenAPI Specifications) into a graph structure and automatically annotates the semantic concepts using LDA (Latent Dirichlet Allocation) and WordNet. To enhance interoperability, API Prober also classifies APIs by clustering OAS documents and recommends alternative services to be substituted or merged with the target service. Finally, to support reusability, API Prober makes it possible to retrieve examples of API utilization code in Java by parsing source code in GitHub. The experimental results demonstrate the effectiveness of the API Prober in recommending relevant services and providing usage examples based on real-world client code. This research contributes to providing viable methods to appropriately analyze and cluster Web APIs, and recommend APIs and client code examples. Full article
(This article belongs to the Special Issue Feature Papers in Computer Science & Engineering)
Show Figures

Figure 1

19 pages, 7357 KiB  
Article
Multi-Inverter Resonance Modal Analysis Based on Decomposed Conductance Model
by Lin Chen, Yonghai Xu, Shun Tao, Tianze Wang and Shuguang Sun
Electronics 2023, 12(5), 1251; https://doi.org/10.3390/electronics12051251 - 5 Mar 2023
Cited by 2 | Viewed by 1597
Abstract
The Norton equivalent model based on the transfer function and the frequency domain analysis method for inverter resonance analysis lacks a comprehensive analysis of the resonant characteristics, and more information about the resonant key components and the degree of participation cannot be obtained. [...] Read more.
The Norton equivalent model based on the transfer function and the frequency domain analysis method for inverter resonance analysis lacks a comprehensive analysis of the resonant characteristics, and more information about the resonant key components and the degree of participation cannot be obtained. In this paper, a decomposed conductance model is proposed to characterize the resonance characteristics of the multi-inverter grid-connected system and the effect of the equivalent control link of the inverter on the resonance in more detail by combining the modal analysis method and the sensitivity analysis method. Firstly, based on αβ coordinates, the conductance division is carried out for the dual-loop inverter control link with the voltage external loop and current internal loop using capacitor-current feedback damping, and the inverter model based on the decomposition conductance is derived. The mathematical model of the multi-inverter grid-connected system is then established. Secondly, the resonance characteristics of the system are analyzed by combining the modal and frequency domain analysis methods when the number of inverters, inverter parameters, and grid-side impedance are changed. Thirdly, the degree of involvement of the system components, especially the equivalent control link of the inverter in resonance conditions, is determined in combination with the proposed model and the sensitivity analysis method, which is the basis for proposing an effective suppression strategy. Finally, a simulation model is built to verify the proposed method and the analysis results. Full article
(This article belongs to the Special Issue Application of Power Electronics Technology in Energy System)
Show Figures

Figure 1

36 pages, 3268 KiB  
Article
Federated Learning-Based Lightweight Two-Factor Authentication Framework with Privacy Preservation for Mobile Sink in the Social IoMT
by B. D. Deebak and Seong Oun Hwang
Electronics 2023, 12(5), 1250; https://doi.org/10.3390/electronics12051250 - 5 Mar 2023
Cited by 5 | Viewed by 3605
Abstract
The social Internet of Medical Things (S-IoMT) highly demands dependable and non-invasive device identification and authentication and makes data services more prevalent in a reliable learning system. In real time, healthcare systems consistently acquire, analyze, and transform a few operational intelligence into actionable [...] Read more.
The social Internet of Medical Things (S-IoMT) highly demands dependable and non-invasive device identification and authentication and makes data services more prevalent in a reliable learning system. In real time, healthcare systems consistently acquire, analyze, and transform a few operational intelligence into actionable forms through digitization to capture the sensitive information of the patient. Since the S-IoMT tries to distribute health-related services using IoT devices and wireless technologies, protecting the privacy of data and security of the device is so crucial in any eHealth system. To fulfill the design objectives of eHealth, smart sensing technologies use built-in features of social networking services. Despite being more convenient in its potential use, a significant concern is a security preventing potential threats and infringement. Thus, this paper presents a lightweight two-factor authentication framework (L2FAK) with privacy-preserving functionality, which uses a mobile sink for smart eHealth. Formal and informal analyses prove that the proposed L2FAK can resist cyberattacks such as session stealing, message modification, and denial of service, guaranteeing device protection and data integrity. The learning analysis verifies the features of the physical layer using federated learning layered authentication (FLLA) to learn the data characteristics by exploring the learning framework of neural networks. In the evaluation, the core scenario is implemented on the TensorFlow Federated framework to examine FLLA and other relevant mechanisms on two correlated datasets, namely, MNIST and FashionMNIST. The analytical results show that the proposed FLLA can analyze the protection of privacy features effectively in order to guarantee an accuracy 89.83% to 93.41% better than other mechanisms. Lastly, a real-time testbed demonstrates the significance of the proposed L2FAK in achieving better quality metrics, such as transmission efficiency and overhead ratio than other state-of-the-art approaches. Full article
Show Figures

Figure 1

16 pages, 2805 KiB  
Article
Robust Subspace Clustering with Block Diagonal Representation for Noisy Image Datasets
by Qiang Li, Ziqi Xie and Lihong Wang
Electronics 2023, 12(5), 1249; https://doi.org/10.3390/electronics12051249 - 5 Mar 2023
Cited by 2 | Viewed by 1562
Abstract
As a relatively advanced method, the subspace clustering algorithm by block diagonal representation (BDR) will be competent in performing subspace clustering on a dataset if the dataset is assumed to be noise-free and drawn from the union of independent linear subspaces. Unfortunately, this [...] Read more.
As a relatively advanced method, the subspace clustering algorithm by block diagonal representation (BDR) will be competent in performing subspace clustering on a dataset if the dataset is assumed to be noise-free and drawn from the union of independent linear subspaces. Unfortunately, this assumption is far from reality, since the real data are usually corrupted by various noises and the subspaces of data overlap with each other, the performance of linear subspace clustering algorithms, including BDR, degrades on the real complex data. To solve this problem, we design a new objective function based on BDR, in which l2,1 norm of the reconstruction error is introduced to model the noises and improve the robustness of the algorithm. After optimizing the objective function, we present the corresponding subspace clustering algorithm to pursue a self-expressive coefficient matrix with a block diagonal structure for a noisy dataset. An affinity matrix is constructed based on the coefficient matrix, and then fed to the spectral clustering algorithm to obtain the final clustering results. Experiments on several artificial noisy image datasets show that the proposed algorithm has robustness and better clustering performance than the compared algorithms. Full article
(This article belongs to the Special Issue Advances in Spatiotemporal Data Management and Analytics)
Show Figures

Figure 1

13 pages, 2044 KiB  
Article
Energy Efficient Data Dissemination for Large-Scale Smart Farming Using Reinforcement Learning
by Muhammad Yasir Ali, Abdullah Alsaeedi, Syed Atif Ali Shah, Wael M. S. Yafooz and Asad Waqar Malik
Electronics 2023, 12(5), 1248; https://doi.org/10.3390/electronics12051248 - 5 Mar 2023
Cited by 4 | Viewed by 1760
Abstract
Smart farming is essential to increasing crop production, and there is a need to consider the technological advancements of this era; modern technology has helped us to gain more accuracy in fertilizing, watering, and adding pesticides to the crops, as well as monitoring [...] Read more.
Smart farming is essential to increasing crop production, and there is a need to consider the technological advancements of this era; modern technology has helped us to gain more accuracy in fertilizing, watering, and adding pesticides to the crops, as well as monitoring the conditions of the environment. Nowadays, more and more sophisticated sensors are being developed, but on a larger scale, agricultural networks and the efficient management of them is very crucial in order to obtain proper benefits from technology. Our idea is to achieve sustainability in large-scale farms by improving communication between wireless sensor nodes and base stations. We want to increase communication efficiency by introducing machine learning algorithms. Reinforcement learning is the area of machine learning which is concerned with how involved agents are supposed to take action in specified environments to maximize reward and achieve a common goal. In our network, a large number of sensors are being deployed on large-scale fields; reinforcement learning is used to find the optimal set of paths towards the base station. After a number of successful paths have been developed, they are then used to transmit the sensed data from the fields. The simulation results have shown that in larger scales, our proposed model had less transmission delay than the shortest path transmission model and broadcasting techniques that were tested against the data transmission paths developed by reinforcement learning. Full article
(This article belongs to the Special Issue Real-Time Digital Control Technologies and Applications)
Show Figures

Figure 1

25 pages, 453 KiB  
Article
Exploring Personal Data Processing in Video Conferencing Apps
by Georgios Achilleos, Konstantinos Limniotis and Nicholas Kolokotronis
Electronics 2023, 12(5), 1247; https://doi.org/10.3390/electronics12051247 - 5 Mar 2023
Cited by 3 | Viewed by 2363
Abstract
The use of video conferencing applications has increased tremendously in recent years, particularly due to the COVID-19 pandemic and the associated restrictions on movements. As a result, the corresponding smart apps have also seen increased usage, leading to a surge in downloads of [...] Read more.
The use of video conferencing applications has increased tremendously in recent years, particularly due to the COVID-19 pandemic and the associated restrictions on movements. As a result, the corresponding smart apps have also seen increased usage, leading to a surge in downloads of video conferencing apps. However, this trend has generated several data protection and privacy challenges inherent in the smart mobile ecosystem. This paper aims to study data protection issues in video conferencing apps by statistically and dynamically analyzing the most common such issues in real-time operation on Android platforms. The goal is to determine what these applications do in real time and verify whether they provide users with sufficient information regarding the underlying personal data processes. Our results illustrate that there is still room for improvement in several aspects, mainly because the relevant privacy policies do not always provide users with sufficient information about the underlying personal data processes (especially with respect to data leaks to third parties), which, in turn, raises concerns about compliance with data protection by design and default principles. Specifically, users are often not informed about which personal data are being processed, for what purposes, and whether these processes are necessary (and, if yes, why) or based on their consent. Furthermore, the permissions required by the apps during runtime are not always justified. Full article
(This article belongs to the Special Issue Next Generation Networks and Systems Security)
Show Figures

Figure 1

13 pages, 1069 KiB  
Article
Non-Linear Adapted Spatio-Temporal Filter for Single-Trial Identification of Movement-Related Cortical Potential
by Luca Mesin, Usman Ghani and Imran Khan Niazi
Electronics 2023, 12(5), 1246; https://doi.org/10.3390/electronics12051246 - 5 Mar 2023
Cited by 4 | Viewed by 1537
Abstract
The execution or imagination of a movement is reflected by a cortical potential that can be recorded by electroencephalography (EEG) as Movement-Related Cortical Potentials (MRCPs). The identification of MRCP from a single trial is a challenging possibility to get a natural control of [...] Read more.
The execution or imagination of a movement is reflected by a cortical potential that can be recorded by electroencephalography (EEG) as Movement-Related Cortical Potentials (MRCPs). The identification of MRCP from a single trial is a challenging possibility to get a natural control of a Brain–Computer Interface (BCI). We propose a novel method for MRCP detection based on optimal non-linear filters, processing different channels of EEG including delayed samples (getting a spatio-temporal filter). Different outputs can be obtained by changing the order of the temporal filter and of the non-linear processing of the input data. The classification performances of these filters are assessed by cross-validation on a training set, selecting the best ones (adapted to the user) and performing a majority voting from the best three to get an output using test data. The method is compared to another state-of-the-art filter recently introduced by our group when applied to EEG data recorded from 16 healthy subjects either executing or imagining 50 self-paced upper-limb palmar grasps. The new approach has a median accuracy on the overall dataset of 80%, which is significantly better than that of the previous filter (i.e., 63%). It is feasible for online BCI system design with asynchronous, self-paced applications. Full article
Show Figures

Figure 1

10 pages, 8297 KiB  
Communication
One-Step, In Situ Hydrothermal Fabrication of Cobalt-Doped ZnO/CdS Nanosheets for Optoelectronic Applications
by Lakshmiprasad Maddi, Khidhirbrahmendra Vinukonda, Thirumala Rao Gurugubelli and Ravindranadh Koutavarapu
Electronics 2023, 12(5), 1245; https://doi.org/10.3390/electronics12051245 - 5 Mar 2023
Cited by 4 | Viewed by 1633
Abstract
An in-situ hydrothermal process was used to create Co-doped ZnO/CdS nanosheets in order to examine the effects of the divalent impurity (Co) ions on the structural, morphological, optical, and magnetic characteristics of the test material. For both ZnO and CdS, XRD verified the [...] Read more.
An in-situ hydrothermal process was used to create Co-doped ZnO/CdS nanosheets in order to examine the effects of the divalent impurity (Co) ions on the structural, morphological, optical, and magnetic characteristics of the test material. For both ZnO and CdS, XRD verified the development of a hexagonal wurtzite structure. SEM, TEM, and HR-TEM studies produced sheet-like morphology. Elemental mapping and XPS examination verified the presence of essential elements (S, Cd, O, Co, and Zn). Co-doping dramatically increased the nanosheets’ ability to absorb light in the visible area. Comparing the bandgap energy to pure ZnO and ZnO/CdS nanocomposites, the bandgap energy (2.59 eV) was well-regulated. The PL spectrum at 577 nm showed a prominent yellow emission band that was attributed to the 4A2g(F) → 4T1g(F) transition. Improvement in the room temperature ferromagnetic properties was observed due to doping of Co2+ ions. Warm white light harvesting was confirmed by the estimated CCT value (3540 K). The test material appears to be suitable for the creation of next-generation optoelectronic devices. Full article
Show Figures

Figure 1

16 pages, 8756 KiB  
Communication
Research on Improved Wavelet Threshold Denoising Method for Non-Contact Force and Magnetic Signals
by Xiaoxiao Li, Kexi Liao, Guoxi He and Jianhua Zhao
Electronics 2023, 12(5), 1244; https://doi.org/10.3390/electronics12051244 - 4 Mar 2023
Cited by 5 | Viewed by 2743
Abstract
In order to solve the problem of noise interference in the collected magneto mechanical signals, a new wavelet shrinkage threshold based on adaptive estimation is proposed. Based on the shortcomings of the traditional threshold function, an improved threshold function is proposed, and the [...] Read more.
In order to solve the problem of noise interference in the collected magneto mechanical signals, a new wavelet shrinkage threshold based on adaptive estimation is proposed. Based on the shortcomings of the traditional threshold function, an improved threshold function is proposed, and the parameters of the threshold function are solved by the improved genetic algorithm, and the optimal denoising effect is finally obtained. The new threshold function can not only make up the defects of each threshold function, ensure the continuity of threshold function, but also flexibly adjust the threshold to adapt to different noise conditions, and solve the deviation caused by inherent threshold function, and protect the useful information with noise signals. Full article
Show Figures

Figure 1

15 pages, 3336 KiB  
Article
High-Performance Embedded System for Offline Signature Verification Problem Using Machine Learning
by Umair Tariq, Zonghai Hu, Rokham Tariq, Muhammad Shahid Iqbal and Muhammad Sadiq
Electronics 2023, 12(5), 1243; https://doi.org/10.3390/electronics12051243 - 4 Mar 2023
Cited by 1 | Viewed by 2757
Abstract
This paper proposes a high-performance embedded system for offline Urdu handwritten signature verification. Though many signature datasets are publicly available in languages such as English, Latin, Chinese, Persian, Arabic, Hindi, and Bengali, no Urdu handwritten datasets were available in the literature. So, in [...] Read more.
This paper proposes a high-performance embedded system for offline Urdu handwritten signature verification. Though many signature datasets are publicly available in languages such as English, Latin, Chinese, Persian, Arabic, Hindi, and Bengali, no Urdu handwritten datasets were available in the literature. So, in this work, an Urdu handwritten signature dataset is created. The proposed embedded system is then used to distinguish genuine and forged signatures based on various features, such as length, pattern, and edges. The system consists of five steps: data acquisition, pre-processing, feature extraction, signature registration, and signature verification. A majority voting (MV) algorithm is used for improved performance and accuracy of the proposed embedded system. In feature extraction, an improved sinusoidal signal multiplied by a Gaussian function at a specific frequency and orientation is used as a 2D Gabor filter. The proposed framework is tested and compared with existing handwritten signature verification methods. Our test results show accuracies of 66.8% for ensemble, 86.34% for k-nearest neighbor (KNN), 93.31% for support vector machine (SVM), and 95.05% for convolutional neural network (CNN). After applying the majority voting algorithm, the overall accuracy can be improved to 95.13%, with a false acceptance rate (FAR) of 0.2% and a false rejection rate (FRR) of 41.29% on private dataset. To test the generalization ability of the proposed model, we also test it on a public dataset of English handwritten signatures and achieve an overall accuracy of 97.46%. Full article
(This article belongs to the Special Issue High-Performance Embedded Computing)
Show Figures

Figure 1

21 pages, 3292 KiB  
Article
A New Social Media-Driven Cyber Threat Intelligence
by Fahim Sufi
Electronics 2023, 12(5), 1242; https://doi.org/10.3390/electronics12051242 - 4 Mar 2023
Cited by 8 | Viewed by 5568
Abstract
Cyber threats are projected to cause USD 10.5 trillion in damage to the global economy in 2025. Comprehending the level of threat is core to adjusting cyber posture at the personal, organizational, and national levels. However, representing the threat level with a single [...] Read more.
Cyber threats are projected to cause USD 10.5 trillion in damage to the global economy in 2025. Comprehending the level of threat is core to adjusting cyber posture at the personal, organizational, and national levels. However, representing the threat level with a single score is a daunting task if the scores are generated from big and complex data sources such as social media. This paper harnesses the modern technological advancements in artificial intelligence (AI) and natural language processing (NLP) to comprehend the contextual information of social media posts related to cyber-attacks and electronic warfare. Then, using keyword-based index generation techniques, a single index is generated at the country level. Utilizing a convolutional neural network (CNN), the innovative process automatically detects any anomalies within the countrywide threat index and explains the root causes. The entire process was validated with live Twitter feeds from 14 October 2022 to 27 December 2022. During these 75 days, AI-based language detection, translation, and sentiment analysis comprehended 15,983 tweets in 47 different languages (while most of the existing works only work in one language). Finally, 75 daily cyber threat indexes with anomalies were generated for China, Australia, Russia, Ukraine, Iran, and India. Using this intelligence, strategic decision makers can adjust their cyber preparedness for mitigating the detrimental damages afflicted by cyber criminals. Full article
(This article belongs to the Special Issue Machine Learning (ML) and Software Engineering)
Show Figures

Figure 1

13 pages, 774 KiB  
Article
A Next POI Recommendation Based on Graph Convolutional Network by Adaptive Time Patterns
by Jiang Wu, Shaojie Jiang and Lei Shi
Electronics 2023, 12(5), 1241; https://doi.org/10.3390/electronics12051241 - 4 Mar 2023
Cited by 3 | Viewed by 2158
Abstract
Users’ activities in location-based social networks (LBSNs) can be naturally transformed into graph structural data, and more advanced graph representation learning techniques can be adopted for analyzing user preferences, which benefits a variety of real-world applications. This paper focuses on the next point-of-interest [...] Read more.
Users’ activities in location-based social networks (LBSNs) can be naturally transformed into graph structural data, and more advanced graph representation learning techniques can be adopted for analyzing user preferences, which benefits a variety of real-world applications. This paper focuses on the next point-of-interest (POI) recommendation task in LBSNs. We argue that existing graph-based POI recommendation methods only consider user preferences from several individual contextual factors, ignoring the influence of interactions between different contextual information. This practice leads to the suboptimal learning of user preferences. To address this problem, we propose a novel method called hierarchical attention-based graph convolutional network (HAGCN) for the next POI recommendation, a technique which leverages graph convolutional networks to extract the representations of POIs from predefined graphs via different time patterns and develops a hierarchical attention mechanism to adaptively learn user preferences from the interactions between different contextual data. Moreover, HAGCN uses a dynamic preference estimation to precisely learn user preferences. We conduct extensive experiments on real-world datasets to evaluate the performance of HAGCN against representative baseline models in the field of next POI recommendation. The experimental results demonstrate the superiority of our proposed method on the next POI recommendation task. Full article
(This article belongs to the Special Issue Mechanism and Modeling of Graph Convolutional Networks)
Show Figures

Figure 1

21 pages, 1957 KiB  
Article
Software-Defined Radio Implementation and Performance Evaluation of Frequency-Modulated Antipodal Chaos Shift Keying Communication System
by Arturs Aboltins and Nikolajs Tihomorskis
Electronics 2023, 12(5), 1240; https://doi.org/10.3390/electronics12051240 - 4 Mar 2023
Cited by 4 | Viewed by 3911
Abstract
This paper is devoted to software-defined radio (SDR) implementation of frequency modulated antipodal chaos shift keying (FM-ACSK) transceiver and presents results of prototype testing in real conditions. This novel and perspective class of spread-spectrum communication systems employs chaotic synchronization for the acquisition and [...] Read more.
This paper is devoted to software-defined radio (SDR) implementation of frequency modulated antipodal chaos shift keying (FM-ACSK) transceiver and presents results of prototype testing in real conditions. This novel and perspective class of spread-spectrum communication systems employs chaotic synchronization for the acquisition and tracking of the analog chaotic spreading code and does not need resource-demanding cross-correlation. The main motivation of the given work is to assess the performance of FM-ACSK in real conditions and demonstrate that chaotic synchronization can be considered an efficient spread-spectrum demodulation method. The work focuses on the real-time implementation aspects of the modulation-demodulation algorithms, forward error correction (FEC) and symbol timing synchronization approach in MATLAB Simulink. The performance of the presented prototype is assessed via extensive testing, which includes measurement of bit error ratio (BER) in single-user and multi-user scenarios, estimation of carrier frequency offset (CFO) impact and image transmission over-the-air between two independent sites and comparison with classical frequency hopping spread spectrum (FHSS). The paper shows that the presented class of the spread spectrum communication systems demonstrates good performance in low signal-to-noise ratio (SNR) conditions and in terms of BER significantly outperforms the classic spread-spectrum modulation schemes which employ correlation-based detection. Full article
(This article belongs to the Special Issue Electronic Systems with Dynamic Chaos: Design and Applications)
Show Figures

Graphical abstract

22 pages, 1343 KiB  
Article
Unmanned-Aircraft-System-Assisted Early Wildfire Detection with Air Quality Sensors
by Doaa Rjoub, Ahmad Alsharoa and Ala’eddin Masadeh
Electronics 2023, 12(5), 1239; https://doi.org/10.3390/electronics12051239 - 4 Mar 2023
Cited by 5 | Viewed by 2636
Abstract
Numerous hectares of land are destroyed by wildfires every year, causing harm to the environment, the economy, and the ecology. More than fifty million acres have burned in several states as a result of recent forest fires in the Western United States and [...] Read more.
Numerous hectares of land are destroyed by wildfires every year, causing harm to the environment, the economy, and the ecology. More than fifty million acres have burned in several states as a result of recent forest fires in the Western United States and Australia. According to scientific predictions, as the climate warms and dries, wildfires will become more intense and frequent, as well as more dangerous. These unavoidable catastrophes emphasize how important early wildfire detection and prevention are. The energy management system described in this paper uses an unmanned aircraft system (UAS) with air quality sensors (AQSs) to monitor spot fires before they spread. The goal was to develop an efficient autonomous patrolling system that detects early wildfires while maximizing the battery life of the UAS to cover broad areas. The UAS will send real-time data (sensor readings, thermal imaging, etc.) to a nearby base station (BS) when a wildfire is discovered. An optimization model was developed to minimize the total amount of energy used by the UAS while maintaining the required levels of data quality. Finally, the simulations showed the performance of the proposed solution under different stability conditions and for different minimum data rate types. Full article
Show Figures

Figure 1

34 pages, 1856 KiB  
Article
Security Quantification of Container-Technology-Driven E-Government Systems
by Subrota Kumar Mondal, Tian Tan, Sadia Khanam, Keshav Kumar, Hussain Mohammed Dipu Kabir and Kan Ni
Electronics 2023, 12(5), 1238; https://doi.org/10.3390/electronics12051238 - 4 Mar 2023
Cited by 5 | Viewed by 2263
Abstract
With the rapidly increasing demands of e-government systems in smart cities, a myriad of challenges and issues are required to be addressed. Among them, security is one of the prime concerns. To this end, we analyze different e-government systems and find that an [...] Read more.
With the rapidly increasing demands of e-government systems in smart cities, a myriad of challenges and issues are required to be addressed. Among them, security is one of the prime concerns. To this end, we analyze different e-government systems and find that an e-government system built with container-based technology is endowed with many features. In addition, overhauling the architecture of container-technology-driven e-government systems, we observe that securing an e-government system demands quantifying security issues (vulnerabilities, threats, attacks, and risks) and the related countermeasures. Notably, we find that the Attack Tree and Attack–Defense Tree methods are state-of-the-art approaches in these aspects. Consequently, in this paper, we work on quantifying the security attributes, measures, and metrics of an e-government system using Attack Trees and Attack–Defense Trees—in this context, we build a working prototype of an e-government system aligned with the United Kingdom (UK) government portal, which is in line with our research scope. In particular, we propose a novel measure to quantify the probability of attack success using a risk matrix and normal distribution. The probabilistic analysis distinguishes the attack and defense levels more intuitively in e-government systems. Moreover, it infers the importance of enhancing security in e-government systems. In particular, the analysis shows that an e-government system is fairly unsafe with a 99% probability of being subject to attacks, and even with a defense mechanism, the probability of attack lies around 97%, which directs us to pay close attention to e-government security. In sum, our implications can serve as a benchmark for evaluation for governments to determine the next steps in consolidating e-government system security. Full article
(This article belongs to the Special Issue Big Data and Cloud Computing: Innovations and Challenges)
Show Figures

Figure 1

21 pages, 30012 KiB  
Article
SODAS: Smart Open Data as a Service for Improving Interconnectivity and Data Usability
by Heesun Won, Jiwoo Han, Myeong-Seon Gil and Yang-Sae Moon
Electronics 2023, 12(5), 1237; https://doi.org/10.3390/electronics12051237 - 4 Mar 2023
Cited by 2 | Viewed by 1906
Abstract
In this study, we proposed Smart Open Data as a Service (SODAS) as a new open data platform based on the international standards Data Catalog Vocabulary (DCAT) and Comprehensive Knowledge Archive Network (CKAN) to facilitate the release and sharing of data. We first [...] Read more.
In this study, we proposed Smart Open Data as a Service (SODAS) as a new open data platform based on the international standards Data Catalog Vocabulary (DCAT) and Comprehensive Knowledge Archive Network (CKAN) to facilitate the release and sharing of data. We first analyze the five problems in the legacy CKAN and then draw up corresponding solutions through three core strategies: CKAN expansion, DCATv2 support, and extendable DataMap. We then define four components and nine function blocks of SODAS for each core strategy. As a result, SODAS drives Open Data Portal, Open Data Reference Model, DataMap Publisher, and Analytics and Development Environment (ADE) Provisioning for connecting the defined function blocks. We confirm that each function works correctly through the SODAS Web portal, and then we apply SODAS to actual data distribution sites to prove its efficiency and practical use. SODAS is the first open data platform that provides secure interoperability between heterogeneous platforms based on international standards, and it enables domain-free data management with flexible metadata. Full article
(This article belongs to the Special Issue Multi-Service Cloud-Based IoT Platforms)
Show Figures

Figure 1

17 pages, 22335 KiB  
Review
A Synthesis of Algorithms Determining a Safe Trajectory in a Group of Autonomous Vehicles Using a Sequential Game and Neural Network
by Józef Lisowski
Electronics 2023, 12(5), 1236; https://doi.org/10.3390/electronics12051236 - 4 Mar 2023
Cited by 4 | Viewed by 1570
Abstract
This paper presents a solution to the problem of providing an autonomous vehicle with a safe control task when moving around many other autonomous vehicles. This is achieved by developing an appropriate computer control algorithm that takes into account the possible risk of [...] Read more.
This paper presents a solution to the problem of providing an autonomous vehicle with a safe control task when moving around many other autonomous vehicles. This is achieved by developing an appropriate computer control algorithm that takes into account the possible risk of a collision resulting from both the impact of environmental disturbances and the imperfection of the rules of maneuvering in situations where many vehicles pass each other, giving the control process a decisive character. For this purpose, three types of algorithms were synthesized: kinematic and dynamic optimization with neural domains, as well as sequential game control of an autonomous vehicle. The control algorithms determine a safe trajectory, which is implemented by the actuators of the autonomous vehicle. Computer simulations of the control algorithms in the Matlab/Simulink software allow for their comparative analysis in terms of meeting the criteria for the optimality and safety of an autonomous vehicle when passing a larger number of other autonomous vehicles. For this purpose, scenarios of multidirectional and one-way traffic of autonomous vehicles were used. Full article
(This article belongs to the Special Issue Feature Papers in Electrical and Autonomous Vehicles)
Show Figures

Figure 1

21 pages, 667 KiB  
Article
Towards High-Performance Supersingular Isogeny Cryptographic Hardware Accelerator Design
by Guantong Su and Guoqiang Bai
Electronics 2023, 12(5), 1235; https://doi.org/10.3390/electronics12051235 - 4 Mar 2023
Cited by 1 | Viewed by 1572
Abstract
Cryptosystems based on supersingular isogeny are a novel tool in post-quantum cryptography. One compelling characteristic is their concise keys and ciphertexts. However, the performance of supersingular isogeny computation is currently worse than that of other schemes. This is primarily due to the following [...] Read more.
Cryptosystems based on supersingular isogeny are a novel tool in post-quantum cryptography. One compelling characteristic is their concise keys and ciphertexts. However, the performance of supersingular isogeny computation is currently worse than that of other schemes. This is primarily due to the following factors. Firstly, the underlying field is a quadratic extension of the finite field, resulting in higher computational complexity. Secondly, the strategy for large-degree isogeny evaluation is complex and dependent on the elementary arithmetic units employed. Thirdly, adapting the same hardware to different parameters is challenging. Considering the evolution of similar curve-based cryptosystems, we believe proper algorithm optimization and hardware acceleration will reduce its speed overhead. This paper describes a high-performance and flexible hardware architecture that accelerates isogeny computation. Specifically, we optimize the design by creating a dedicated quadratic Montgomery multiplier and an efficient scheduling strategy that are suitable for supersingular isogeny. The multiplier operates on Fp2 under projective coordinate formulas, and the scheduling is tailored to it. By exploiting additional parallelism through replicated multipliers and concurrent isogeny subroutines, our 65 nm SMIC technology cryptographic accelerator can generate ephemeral public keys in 2.40 ms for Alice and 2.79 ms for Bob with a 751-bit prime setting. Sharing the secret key costs another 2.04 ms and 2.35 ms, respectively. Full article
Show Figures

Figure 1

25 pages, 2636 KiB  
Article
The BciAi4SLA Project: Towards a User-Centered BCI
by Cristina Gena, Dize Hilviu, Giovanni Chiarion, Silvestro Roatta, Francesca M. Bosco, Andrea Calvo, Claudio Mattutino and Stefano Vincenzi
Electronics 2023, 12(5), 1234; https://doi.org/10.3390/electronics12051234 - 4 Mar 2023
Cited by 5 | Viewed by 2350
Abstract
The brain–computer interfaces (BCI) are interfaces that put the user in communication with an electronic device based on signals originating from the brain. In this paper, we describe a proof of concept that took place within the context of BciAi4Sla, a multidisciplinary project [...] Read more.
The brain–computer interfaces (BCI) are interfaces that put the user in communication with an electronic device based on signals originating from the brain. In this paper, we describe a proof of concept that took place within the context of BciAi4Sla, a multidisciplinary project involving computer scientists, physiologists, biomedical engineers, neurologists, and psychologists with the aim of designing and developing a BCI system following a user-centered approach, involving domain experts and users since initial prototyping steps in a design–test–redesign development cycle. The project intends to develop a software platform able to restore a communication channel in patients who have compromised their communication possibilities due to illness or accidents. The most common case is the patients with amyotrophic lateral sclerosis (ALS). In this paper, we describe the background and the main development steps of the project, also reporting some initial and promising user evaluation results, including real-time performance classification and a proof-of-concept prototype. Full article
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop