Information Technologies and Electronics Ⅱ

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: closed (31 March 2023) | Viewed by 42745

Special Issue Editor


E-Mail Website
Guest Editor
Department of Complex Information Security of Computer Systems, University of Control Systems and Radioelectronics, Lenin Ave, 40, Tomskaya Oblast, 634050 Tomsk, Russia
Interests: theory and practice of complex information security systems; information security, mathematical modeling of difficult systems; algorithms of processing of big data
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue of the journal Symmetry, entitled "Information Technologies and Electronics", aims to highlight recent advances in:

  • mathematical modeling in control systems;
  • information security;
  • the Internet of Things (IoT);
  • robotics;
  • big data;
  • machine learning;
  • artificial intelligence;
  • automated systems for data processing and control;
  • telecommunications;
  • next-generation communication and telecommunication systems;
  • electronics;
  • and other areas of interest associated with Information Technologies and Electronics.

We welcome articles that present good mathematical or experimental outcomes and a strong substantiation of conclusions and results, and analytical reviews of relevant scientific topics. Submissions are expected to contain original content and have clear scientific novelty. 

Prof. Dr. Alexander Shelupanov
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (14 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

25 pages, 2181 KiB  
Article
MULBER: Effective Android Malware Clustering Using Evolutionary Feature Selection and Mahalanobis Distance Metric
by Pradeepkumar Duraisamy Soundrapandian and Geetha Subbiah
Symmetry 2022, 14(10), 2221; https://doi.org/10.3390/sym14102221 - 21 Oct 2022
Cited by 1 | Viewed by 2125
Abstract
Symmetric and asymmetric patterns are fascinating phenomena that show a level of co-existence in mobile application behavior analyses. For example, static phenomena, such as information sharing through collaboration with known apps, is a good example of a symmetric model of communication, and app [...] Read more.
Symmetric and asymmetric patterns are fascinating phenomena that show a level of co-existence in mobile application behavior analyses. For example, static phenomena, such as information sharing through collaboration with known apps, is a good example of a symmetric model of communication, and app collusion, where apps collaborate dynamically with unknown malware apps, is an example of a serious threat with an asymmetric pattern. The symmetric nature of app collaboration can become vulnerable when a vulnerability called PendingIntent is exchanged during Inter-Component Communication (ICC). The PendingIntent (PI) vulnerability enables a flexible software model, where the PendingIntent creator app can temporarily share its own permissions and identity with the PendingIntent receiving app. The PendingIntent vulnerability does not require approval from the device user or Android OS to share the permissions and identity with other apps. This is called a PI leak, which can lead to malware attacks such as privilege escalation and component hijacking attacks. This vulnerability in the symmetric behavior of an application without validating an app’s privileges dynamically leads to the asymmetric phenomena that can damage the robustness of an entire system. In this paper, we propose MULBER, a lightweight machine learning method for the detection of Android malware communications that enables a cybersecurity system to analyze multiple patterns and learn from them to help prevent similar attacks and respond to changing behavior. MULBER can help cybersecurity teams to be more proactive in preventing dynamic PI-based communication threats and responding to active attacks in real time. MULBER performs a static binary analysis on the APK file and gathers approximately 10,755 features, reducing it to 42 key features by grouping the permissions under the above-mentioned four categories. Finally, MULBER learns from these multivariate features using evolutionary feature selection and the Mahalanobis distance metric and classifies them as either benign or malware apps. In an evaluation of 22,638 malware samples from recent Android APK malware databases such as Drebin and CICMalDroid-2020, MULBER outperformed others by clustering applications based on the Mahalanobis distance metric and detected 95.69% of malware with few false alarms and the explanations provided for each detection revealed the relevant properties of the detected malware. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Graphical abstract

17 pages, 4761 KiB  
Article
Compensation of the Frequency Offset in Communication Systems with LoRa Modulation
by Semen Mukhamadiev, Evgeniy Rogozhnikov and Edgar Dmitriyev
Symmetry 2022, 14(4), 747; https://doi.org/10.3390/sym14040747 - 5 Apr 2022
Cited by 1 | Viewed by 2241
Abstract
This study focused on methods estimation and compensation frequency offset in communication systems with LoRa modulation. LoRa being used in IoT applications rapidly expands its markets. The article discusses three methods for estimation and compensation frequency offset as well as details of the [...] Read more.
This study focused on methods estimation and compensation frequency offset in communication systems with LoRa modulation. LoRa being used in IoT applications rapidly expands its markets. The article discusses three methods for estimation and compensation frequency offset as well as details of the comparative analysis made. Aside from the well-known methods by Ghanaatian and Golden Section Search (GSS), the third method is offered by the authors of the article and represents an improved version of the method proposed by Ghanaatian. The proposed method is based on a symmetric processing signal that is divided into two parts. The advantages and drawbacks of the considered methods are described. As a result of the performed study, a software model was developed, the dependence of the root mean-square error (RMSE) estimation of the frequency offset, and cumulative density function (CDF) of the frequency estimation error was calculated. Modeling was performed under identical conditions. The frequency offset accuracy provided by the proposed method exceeded the accuracy of the considered methods. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

13 pages, 1628 KiB  
Article
Calculating Beamforming Vectors for 5G System Applications
by Edgar Dmitriyev, Eugeniy Rogozhnikov, Natalia Duplishcheva and Serafim Novichkov
Symmetry 2021, 13(12), 2423; https://doi.org/10.3390/sym13122423 - 14 Dec 2021
Cited by 2 | Viewed by 3247
Abstract
The growing demand for broadband Internet services is forcing scientists around the world to seek and develop new telecommunication technologies. With the transition from the fourth generation to the fifth generation wireless communication systems, one of these technologies is beamforming. The need for [...] Read more.
The growing demand for broadband Internet services is forcing scientists around the world to seek and develop new telecommunication technologies. With the transition from the fourth generation to the fifth generation wireless communication systems, one of these technologies is beamforming. The need for this technology was caused by the use of millimeter waves in data transmission. This frequency range is characterized by heavy path loss. The beamforming technology could compensate for this significant drawback. This paper discusses basic beamforming schemes and proposes a model implemented on the basis of QuaDRiGa. The model implements a MIMO channel using symmetrical antenna arrays. In addition, the methods for calculating the antenna weight coefficients based on the channel matrix are compared. The first well-known method is based on the addition of cluster responses to calculate the coefficients. The proposed one uses the singular value decomposition of the channel matrix into clusters to take into account the most correlated information between all clusters when calculating the antenna coefficients. According to the research results, the proposed method for calculating the antenna coefficients allows an increase in the SNR/SINR level by 8–10 dB on the receiving side in the case of analog beamforming with a known channel matrix. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

11 pages, 1665 KiB  
Article
The Fractal Geometry of TiAlNiAu Thin Film Metal System and Its Sheet Resistance (Lateral Size Effect)
by Nikolay Anatolyevich Torkhov, Maxim Pavlovich Evstigneev, Andrey Alexandrocivh Kokolov and Leonid Ivanovich Babak
Symmetry 2021, 13(12), 2391; https://doi.org/10.3390/sym13122391 - 11 Dec 2021
Cited by 4 | Viewed by 2189
Abstract
This paper investigates the relation between the geometry of metric space of a TiAlNiAu thin film metal system and the geometry of normed functional space of its sheet resistances (functionals), which are elements of the functional space. The investigation provides a means to [...] Read more.
This paper investigates the relation between the geometry of metric space of a TiAlNiAu thin film metal system and the geometry of normed functional space of its sheet resistances (functionals), which are elements of the functional space. The investigation provides a means to describe a lateral size effect that involves a dependency in local approximation of sheet resistance Rsq of TiAlNiAu metal film on its lateral linear dimensions (in (x,y) plane). This dependency is defined by fractal geometry of dendrites, or, more specifically, it is a power-law dependency on fractal dimension Df value. The revealed relation has not only fundamental but also a great practical importance both for a precise calculation of thin film metal system Rsq values in designing discreet devices and ICs, and for controlling results at micro- and nanoscale in producing workflow for thin metal films and systems based on them. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

13 pages, 2889 KiB  
Article
Symbol Error-Rate Analytical Expressions for a Two-User PD-NOMA System with Square QAM
by Yakov V. Kryukov, Dmitriy A. Pokamestov and Serafim A. Novichkov
Symmetry 2021, 13(11), 2153; https://doi.org/10.3390/sym13112153 - 11 Nov 2021
Cited by 4 | Viewed by 2172
Abstract
Power domain non-orthogonal multiple access (PD-NOMA) is one of the most perspective multiplexing technologies that allows improving the capacity of actual networks. Unlike orthogonal multiple access (OMA), the PD-NOMA non-orthogonally schedules multiple users in the power domain in the same orthogonal time-spectrum resource [...] Read more.
Power domain non-orthogonal multiple access (PD-NOMA) is one of the most perspective multiplexing technologies that allows improving the capacity of actual networks. Unlike orthogonal multiple access (OMA), the PD-NOMA non-orthogonally schedules multiple users in the power domain in the same orthogonal time-spectrum resource segment. Thus, a non-orthogonal multiplexed signal is a combination of several user signals (usually, modulation and coding schemes (MCS) based on quadrature amplitude modulation) with different power weights. The symbol error rate (SER) and bit error rate (BER) performances are one of the main quality characteristics of any commutation channel. The issue is that a known analytical expression for BER and SER calculation for conventional OMA cannot be applied in terms of the PD-NOMA. In the following work, we have derived the SER and BER analytical expressions for gray-coded square quadrature amplitude modulation (QAM) user channels that are transmitted in two-user PD-NOMA channel under additive white Gaussian noise (AWGN). Through the simulation, the verification of the provided expressions is presented for four multiplexing configurations with various user power weights and QAM order combinations. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

21 pages, 2947 KiB  
Article
Enhancement of an Optimized Key for Database Sanitization to Ensure the Security and Privacy of an Autism Dataset
by Md. Mokhlesur Rahman, Ravie Chandren Muniyandi, Shahnorbanun Sahran and Suziyani Mohamed
Symmetry 2021, 13(10), 1912; https://doi.org/10.3390/sym13101912 - 11 Oct 2021
Cited by 4 | Viewed by 2174
Abstract
Interrupting, altering, or stealing autism-related sensitive data by cyber attackers is a lucrative business which is increasing in prevalence on a daily basis. Enhancing the security and privacy of autism data while adhering to the symmetric encryption concept is a critical challenge in [...] Read more.
Interrupting, altering, or stealing autism-related sensitive data by cyber attackers is a lucrative business which is increasing in prevalence on a daily basis. Enhancing the security and privacy of autism data while adhering to the symmetric encryption concept is a critical challenge in the field of information security. To identify autism perfectly and for its data protection, the security and privacy of these data are pivotal concerns when transmitting information over the Internet. Consequently, researchers utilize software or hardware disk encryption, data backup, Data Encryption Standard (DES), TripleDES, Advanced Encryption Standard (AES), Rivest Cipher 4 (RC4), and others. Moreover, several studies employ k-anonymity and query to address security concerns, but these necessitate a significant amount of time and computational resources. Here, we proposed the sanitization approach for autism data security and privacy. During this sanitization process, sensitive data are concealed, which avoids the leakage of sensitive information. An optimal key was generated based on our improved meta-heuristic algorithmic framework called Enhanced Combined PSO-GWO (Particle Swarm Optimization-Grey Wolf Optimization) framework. Finally, we compared our simulation results with traditional algorithms, and it achieved increased output effectively. Therefore, this finding shows that data security and privacy in autism can be improved by enhancing an optimal key used in the data sanitization process to prevent unauthorized access to and misuse of data. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

34 pages, 4372 KiB  
Article
Feature Selection and Ensemble-Based Intrusion Detection System: An Efficient and Comprehensive Approach
by Ebrima Jaw and Xueming Wang
Symmetry 2021, 13(10), 1764; https://doi.org/10.3390/sym13101764 - 22 Sep 2021
Cited by 43 | Viewed by 6095
Abstract
The emergence of ground-breaking technologies such as artificial intelligence, cloud computing, big data powered by the Internet, and its highly valued real-world applications consisting of symmetric and asymmetric data distributions, has significantly changed our lives in many positive aspects. However, it equally comes [...] Read more.
The emergence of ground-breaking technologies such as artificial intelligence, cloud computing, big data powered by the Internet, and its highly valued real-world applications consisting of symmetric and asymmetric data distributions, has significantly changed our lives in many positive aspects. However, it equally comes with the current catastrophic daily escalating cyberattacks. Thus, raising the need for researchers to harness the innovative strengths of machine learning to design and implement intrusion detection systems (IDSs) to help mitigate these unfortunate cyber threats. Nevertheless, trustworthy and effective IDSs is a challenge due to low accuracy engendered by vast, irrelevant, and redundant features; inept detection of all types of novel attacks by individual machine learning classifiers; costly and faulty use of labeled training datasets cum significant false alarm rates (FAR) and the excessive model building and testing time. Therefore, this paper proposed a promising hybrid feature selection (HFS) with an ensemble classifier, which efficiently selects relevant features and provides consistent attack classification. Initially, we harness the various strengths of CfsSubsetEval, genetic search, and a rule-based engine to effectively select subsets of features with high correlation, which considerably reduced the model complexity and enhanced the generalization of learning algorithms, both of which are symmetry learning attributes. Moreover, using a voting method and average of probabilities, we present an ensemble classifier that used K-means, One-Class SVM, DBSCAN, and Expectation-Maximization, abbreviated (KODE) as an enhanced classifier that consistently classifies the asymmetric probability distributions between malicious and normal instances. HFS-KODE achieves remarkable results using 10-fold cross-validation, CIC-IDS2017, NSL-KDD, and UNSW-NB15 datasets and various metrics. For example, it outclassed all the selected individual classification methods, cutting-edge feature selection, and some current IDSs techniques with an excellent performance accuracy of 99.99%, 99.73%, and 99.997%, and a detection rate of 99.75%, 96.64%, and 99.93% for CIC-IDS2017, NSL-KDD, and UNSW-NB15, respectively based on only 11, 8, 13 selected relevant features from the above datasets. Finally, considering the drastically reduced FAR and time, coupled with no need for labeled datasets, it is self-evident that HFS-KODE proves to have a remarkable performance compared to many current approaches. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

20 pages, 1059 KiB  
Article
Building a Fuzzy Classifier Based on Whale Optimization Algorithm to Detect Network Intrusions
by Nikolay Koryshev, Ilya Hodashinsky and Alexander Shelupanov
Symmetry 2021, 13(7), 1211; https://doi.org/10.3390/sym13071211 - 6 Jul 2021
Cited by 11 | Viewed by 2789
Abstract
The quantity of network attacks and the harm from them is constantly increasing, so the detection of these attacks is an urgent task in the information security field. In this paper, we investigate an approach to building intrusion detection systems using a classifier [...] Read more.
The quantity of network attacks and the harm from them is constantly increasing, so the detection of these attacks is an urgent task in the information security field. In this paper, we investigate an approach to building intrusion detection systems using a classifier based on fuzzy rules. The process of creating a fuzzy classifier based on a given set of input and output data can be presented as a solution to the problems of clustering, informative features selection, and the parameters of the rule antecedents optimization. To solve these problems, the whale optimization algorithm is used. The performance of algorithms for constructing a fuzzy classifier based on this metaheuristic is estimated using the KDD Cup 1999 intrusion detection dataset. On average, the resulting classifiers have a type I error of 0.92% and a type II error of 1.07%. The obtained results are also compared with the results of other classifiers. The comparison shows the competitiveness of the proposed method. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

22 pages, 3958 KiB  
Article
Switching Order after Failures in Symmetric Protective Electrical Circuits with Triple Modal Reservation
by Anton O. Belousov, Artem V. Medvedev, Evgeniya B. Chernikova, Talgat R. Gazizov and Alexander M. Zabolotsky
Symmetry 2021, 13(6), 1074; https://doi.org/10.3390/sym13061074 - 16 Jun 2021
Cited by 10 | Viewed by 1914
Abstract
This work is devoted to the research of new asymmetry effects in symmetric protective structures with triple modal reservation. We analyzed the structures with different cross-sectional locations of the reference conductor: in the center (unshielded structure), around (shielded structure), at the top and [...] Read more.
This work is devoted to the research of new asymmetry effects in symmetric protective structures with triple modal reservation. We analyzed the structures with different cross-sectional locations of the reference conductor: in the center (unshielded structure), around (shielded structure), at the top and bottom (multilayer printed circuit board), and in the form of side polygons (double-sided printed circuit board). First, a preliminary quasi-static simulation was performed in the range of parameters. It was revealed that in all structures, except for the shielded one (in the form of a cable), the deviations of the output voltage amplitude, bandwidth, and frequency of the first resonance were insignificant, whereas in the shielded structure there were significant deviations in the time and frequency responses. The attenuation of the output voltage in relation to the input for each structure was also estimated. In addition, we performed a parametric optimization of the structures under consideration using a heuristic search, which made it possible to improve their characteristics. Finally, the switching order between the conductors in these structures with the original and optimized parameter sets was investigated in detail. The optimal conductor switching order in the case of a component failure was determined, and the best (according to protective characteristics) parameter configuration for each structure was found. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

20 pages, 1956 KiB  
Article
High Area-Efficient Parallel Encoder with Compatible Architecture for 5G LDPC Codes
by Yufei Zhu, Zuocheng Xing, Zerun Li, Yang Zhang and Yifan Hu
Symmetry 2021, 13(4), 700; https://doi.org/10.3390/sym13040700 - 16 Apr 2021
Cited by 5 | Viewed by 2330
Abstract
This paper presents a novel parallel quasi-cyclic low-density parity-check (QC-LDPC) encoding algorithm with low complexity, which is compatible with the 5th generation (5G) new radio (NR). Basing on the algorithm, we propose a high area-efficient parallel encoder with compatible architecture. The proposed encoder [...] Read more.
This paper presents a novel parallel quasi-cyclic low-density parity-check (QC-LDPC) encoding algorithm with low complexity, which is compatible with the 5th generation (5G) new radio (NR). Basing on the algorithm, we propose a high area-efficient parallel encoder with compatible architecture. The proposed encoder has the advantages of parallel encoding and pipelined operations. Furthermore, it is designed as a configurable encoding structure, which is fully compatible with different base graphs of 5G LDPC. Thus, the encoder architecture has flexible adaptability for various 5G LDPC codes. The proposed encoder was synthesized in a 65 nm CMOS technology. According to the encoder architecture, we implemented nine encoders for distributed lifting sizes of two base graphs. The eperimental results show that the encoder has high performance and significant area-efficiency, which is better than related prior art. This work includes a whole set of encoding algorithm and the compatible encoders, which are fully compatible with different base graphs of 5G LDPC codes. Therefore, it has more flexible adaptability for various 5G application scenarios. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

16 pages, 4251 KiB  
Article
Weight Queue Dynamic Active Queue Management Algorithm
by Mahmoud Baklizi
Symmetry 2020, 12(12), 2077; https://doi.org/10.3390/sym12122077 - 14 Dec 2020
Cited by 17 | Viewed by 3618
Abstract
The current problem of packets generation and transformation around the world is router congestion, which then leads to a decline in the network performance in term of queuing delay (D) and packet loss (PL). The existing active queue management (AQM) algorithms [...] Read more.
The current problem of packets generation and transformation around the world is router congestion, which then leads to a decline in the network performance in term of queuing delay (D) and packet loss (PL). The existing active queue management (AQM) algorithms do not optimize the network performance because these algorithms use static techniques for detecting and reacting to congestion at the router buffer. In this paper, a weight queue active queue management (WQDAQM) based on dynamic monitoring and reacting is proposed. Queue weight and the thresholds are dynamically adjusted based on the traffic load. WQDAQM controls the queue within the router buffer by stabilizing the queue weight between two thresholds dynamically. The WQDAQM algorithm is simulated and compared with the existing active queue management algorithms. The results reveal that the proposed method demonstrates better performance in terms mean queue length, D, PL, and dropping probability, compared to gentle random early detection (GRED), dynamic GRED, and stabilized dynamic GRED in both heavy or no-congestion cases. In detail, in a heavy congestion status, the proposed algorithm overperformed dynamic GRED (DGRED) by 13.3%, GRED by 19.2%, stabilized dynamic GRED (SDGRED) by 6.7% in term of mean queue length (mql). In terms of D in a heavy congestion status, the proposed algorithm overperformed DGRED by 13.3%, GRED by 19.3%, SDGRED by 6.3%. As for PL, the proposed algorithm overperformed DGRED by 15.5%, SDGRED by 19.8%, GRED by 86.3% in term of PL. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

10 pages, 5754 KiB  
Article
Technological Development of an InP-Based Mach–Zehnder Modulator
by Sergey Ishutkin, Vadim Arykov, Igor Yunusov, Mikhail Stepanenko, Pavel Troyan and Yury Zhidik
Symmetry 2020, 12(12), 2015; https://doi.org/10.3390/sym12122015 - 6 Dec 2020
Cited by 2 | Viewed by 2503
Abstract
This paper presents the results of the development of a technology for manufacturing electro-optical Mach–Zehnder modulators based on InP. The key features of the technology are the use of one SiNx double-patterned dielectric mask with two sequential inductively coupled plasma (ICP) etchings [...] Read more.
This paper presents the results of the development of a technology for manufacturing electro-optical Mach–Zehnder modulators based on InP. The key features of the technology are the use of one SiNx double-patterned dielectric mask with two sequential inductively coupled plasma (ICP) etchings of the heterostructure for the simultaneous formation of active and passive sections of the modulator’s optical waveguides. This prevents misalignment errors at the borders. The planarization of the wafer surface was performed using photosensitive benzocyclobutene (BCB) films in a combined scheme. Windows in the BCB film to the bottom ohmic contact and at the die boundaries were formed by lithography, and then the excess thickness of the BCB film was removed by ICP etching until the p-InGaAs contact regions of the p-i-n heterostructure were exposed. The deposition and annealing of the top ohmic contact Ti/Pt/Au (50/25/400 nm) to p-InGaAs was carried out after the surface planarization, with the absence of both deformation and cracking of the planarizing film. A new approach to the division of the wafers into single dies is presented in this paper. The division was carried out in two stages: first, grooves were formed by dicing or deep wet etching, and then cleaving was performed along the formed grooves. The advantages of these techniques are that it allows the edges of the waveguides at the optical input/outputs to be formed and the antireflection coating to be deposited simultaneously on all dies on the wafer, before it is divided. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

25 pages, 4181 KiB  
Article
Metric of Highlighting the Synchronicity of Time Series and Its Application in Analyzing the Fundamental Frequencies of the Speaker’s Speech Signal
by Elena Kataeva, Alexey Yakimuk, Anton Konev and Alexander Shelupanov
Symmetry 2020, 12(12), 1943; https://doi.org/10.3390/sym12121943 - 25 Nov 2020
Cited by 1 | Viewed by 1826
Abstract
As part of the study, the problem of developing and applying a metric for assessing the degree of similarity of time series is considered, which makes it possible to consider the assumptions about the model of a series when comparing, as well as [...] Read more.
As part of the study, the problem of developing and applying a metric for assessing the degree of similarity of time series is considered, which makes it possible to consider the assumptions about the model of a series when comparing, as well as to compare the values of the corresponding characteristics of the series. Characteristics can be values that describe the structure of a series, or directly the values of the approximating function, which can be obtained using nonparametric statistics methods. One of the directions in which this approach can be applied to assessing the similarity of time series is the study of vocal performances. In practice, the degree of similarity in the performance of melodies by several speakers was analyzed. It was determined that, using the synchronicity metric, it is possible to implement an exercise in which students need to repeat the melody after the teacher. In addition, this approach was applied in the segment identification module with an abrupt change in the sounding of the fundamental frequency. This work is devoted to the modification of the program complex for vocal recognition in order to identify notes with a sharp change in the fundamental frequency. The complex is aimed at carrying out additional independent training in teaching vocals. The use of the software package will allow, in real time, providing feedback to the user with an assessment of the quality of their singing. This should allow students to study not only under the supervision of a teacher, but also independently in the early stages of learning. The basic algorithm of the program recognizes notes without sharp changes in frequencies with high accuracy, which is confirmed by experiments. In order to recognize by the algorithms of the program notes sung vibrato and glissando in singing, a new analysis method based on the metric of time series synchronicity is proposed. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

Review

Jump to: Research

17 pages, 4100 KiB  
Review
Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges
by Zuriati Ahmad Zukarnain, Amgad Muneer and Mohd Khairulanuar Ab Aziz
Symmetry 2022, 14(4), 821; https://doi.org/10.3390/sym14040821 - 14 Apr 2022
Cited by 16 | Viewed by 5825
Abstract
Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most regular [...] Read more.
Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most regular mobile users’ authentication methods used are passwords and short messages. However, numerous security vulnerabilities are inherent in various authentication schemes. Fingerprint identification and face recognition technology sparked a massive wave of adoption a few years back. The international mobile equipment identity (IMEI) and identity-based public key cryptography (ID-based PKC) have also become widely used options. More complex methods have been introduced, such as the management flow that combines transaction key creation, encryption, and decryption in processing users’ personal information and biometric features. There is also a combination of multiple user-based authentications, such as user’s trip routes initialization with the coordinates of home and office to set template trajectories and stay points for authentication. Therefore, this research aimed to identify the issues with the available authentication methods and the best authentication solution while overcoming the challenges. Full article
(This article belongs to the Special Issue Information Technologies and Electronics Ⅱ)
Show Figures

Figure 1

Back to TopTop