Visible to the public Biblio

Found 3200 results

Filters: First Letter Of Last Name is K  [Clear All Filters]
2023-01-05
Gupta, Laveesh, Bansal, Manvendra, Meeradevi, Gupta, Muskan, Khaitan, Nishit.  2022.  Blockchain Based Solution to Enhance Drug Supply Chain Management for Smart Pharmaceutical Industry. 2022 IEEE 10th Region 10 Humanitarian Technology Conference (R10-HTC). :330—335.
Counterfeit drugs are an immense threat for the pharmaceutical industry worldwide due to limitations of supply chain. Our proposed solution can overcome many challenges as it will trace and track the drugs while in transit, give transparency along with robust security and will ensure legitimacy across the supply chain. It provides a reliable certification process as well. Fabric architecture is permissioned and private. Hyperledger is a preferred framework over Ethereum because it makes use of features like modular design, high efficiency, quality code and open-source which makes it more suitable for B2B applications with no requirement of cryptocurrency in Hyperledger Fabric. QR generation and scanning are provided as a functionality in the application instead of bar code for its easy accessibility to make it more secure and reliable. The objective of our solution is to provide substantial solutions to the supply chain stakeholders in record maintenance, drug transit monitoring and vendor side verification.
Khodaskar, Manish, Medhane, Darshan, Ingle, Rajesh, Buchade, Amar, Khodaskar, Anuja.  2022.  Feature-based Intrusion Detection System with Support Vector Machine. 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). :1—7.
Today billions of people are accessing the internet around the world. There is a need for new technology to provide security against malicious activities that can take preventive/ defensive actions against constantly evolving attacks. A new generation of technology that keeps an eye on such activities and responds intelligently to them is the intrusion detection system employing machine learning. It is difficult for traditional techniques to analyze network generated data due to nature, amount, and speed with which the data is generated. The evolution of advanced cyber threats makes it difficult for existing IDS to perform up to the mark. In addition, managing large volumes of data is beyond the capabilities of computer hardware and software. This data is not only vast in scope, but it is also moving quickly. The system architecture suggested in this study uses SVM to train the model and feature selection based on the information gain ratio measure ranking approach to boost the overall system's efficiency and increase the attack detection rate. This work also addresses the issue of false alarms and trying to reduce them. In the proposed framework, the UNSW-NB15 dataset is used. For analysis, the UNSW-NB15 and NSL-KDD datasets are used. Along with SVM, we have also trained various models using Naive Bayes, ANN, RF, etc. We have compared the result of various models. Also, we can extend these trained models to create an ensemble approach to improve the performance of IDS.
Bouchiba, Nouha, Kaddouri, Azeddine.  2022.  Fault detection and localization based on Decision Tree and Support vector machine algorithms in electrical power transmission network. 2022 2nd International Conference on Advanced Electrical Engineering (ICAEE). :1—6.
This paper introduces an application of machine learning algorithms. In fact, support vector machine and decision tree approaches are studied and applied to compare their performances in detecting, classifying, and locating faults in the transmission network. The IEEE 14-bus transmission network is considered in this work. Besides, 13 types of faults are tested. Particularly, the one fault and the multiple fault cases are investigated and tested separately. Fault simulations are performed using the SimPowerSystems toolbox in Matlab. Basing on the accuracy score, a comparison is made between the proposed approaches while testing simple faults, on the one hand, and when complicated faults are integrated, on the other hand. Simulation results prove that the support vector machine technique can achieve an accuracy of 87% compared to the decision tree which had an accuracy of 53% in complicated cases.
Singh, Pushpa Bharti, Tomar, Parul, Kathuria, Madhumita.  2022.  Comparative Study of Machine Learning Techniques for Intrusion Detection Systems. 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON). 1:274—283.
Being a part of today’s technical world, we are connected through a vast network. More we are addicted to these modernization techniques we need security. There must be reliability in a network security system so that it is capable of doing perfect monitoring of the whole network of an organization so that any unauthorized users or intruders wouldn’t be able to halt our security breaches. Firewalls are there for securing our internal network from unauthorized outsiders but still some time possibility of attacks is there as according to a survey 60% of attacks were internal to the network. So, the internal system needs the same higher level of security just like external. So, understanding the value of security measures with accuracy, efficiency, and speed we got to focus on implementing and comparing an improved intrusion detection system. A comprehensive literature review has been done and found that some feature selection techniques with standard scaling combined with Machine Learning Techniques can give better results over normal existing ML Techniques. In this survey paper with the help of the Uni-variate Feature selection method, the selection of 14 essential features out of 41 is performed which are used in comparative analysis. We implemented and compared both binary class classification and multi-class classification-based Intrusion Detection Systems (IDS) for two Supervised Machine Learning Techniques Support Vector Machine and Classification and Regression Techniques.
Umarani, S., Aruna, R., Kavitha, V..  2022.  Predicting Distributed Denial of Service Attacks in Machine Learning Field. 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). :594—597.
A persistent and serious danger to the Internet is a denial of service attack on a large scale (DDoS) attack using machine learning. Because they originate at the low layers, new Infections that use genuine hypertext transfer protocol requests to overload target resources are more untraceable than application layer-based cyberattacks. Using network flow traces to construct an access matrix, this research presents a method for detecting distributed denial of service attack machine learning assaults. Independent component analysis decreases the number of attributes utilized in detection because it is multidimensional. Independent component analysis can be used to translate features into high dimensions and then locate feature subsets. Furthermore, during the training and testing phase of the updated source support vector machine for classification, their performance it is possible to keep track of the detection rate and false alarms. Modified source support vector machine is popular for pattern classification because it produces good results when compared to other approaches, and it outperforms other methods in testing even when given less information about the dataset. To increase classification rate, modified source support Vector machine is used, which is optimized using BAT and the modified Cuckoo Search method. When compared to standard classifiers, the acquired findings indicate better performance.
Kumar, Marri Ranjith, K.Malathi, Prof..  2022.  An Innovative Method in Classifying and predicting the accuracy of intrusion detection on cybercrime by comparing Decision Tree with Support Vector Machine. 2022 International Conference on Business Analytics for Technology and Security (ICBATS). :1—6.
Classifying and predicting the accuracy of intrusion detection on cybercrime by comparing machine learning methods such as Innovative Decision Tree (DT) with Support Vector Machine (SVM). By comparing the Decision Tree (N=20) and the Support Vector Machine algorithm (N=20) two classes of machine learning classifiers were used to determine the accuracy. The decision Tree (99.19%) has the highest accuracy than the SVM (98.5615%) and the independent T-test was carried out (=.507) and shows that it is statistically insignificant (p\textgreater0.05) with a confidence value of 95%. by comparing Innovative Decision Tree and Support Vector Machine. The Decision Tree is more productive than the Support Vector Machine for recognizing intruders with substantially checked, according to the significant analysis.
Kumar, Marri Ranjith, Malathi, K..  2022.  An Innovative Method in Improving the accuracy in Intrusion detection by comparing Random Forest over Support Vector Machine. 2022 International Conference on Business Analytics for Technology and Security (ICBATS). :1—6.
Improving the accuracy of intruders in innovative Intrusion detection by comparing Machine Learning classifiers such as Random Forest (RF) with Support Vector Machine (SVM). Two groups of supervised Machine Learning algorithms acquire perfection by looking at the Random Forest calculation (N=20) with the Support Vector Machine calculation (N=20)G power value is 0.8. Random Forest (99.3198%) has the highest accuracy than the SVM (9S.56l5%) and the independent T-test was carried out (=0.507) and shows that it is statistically insignificant (p \textgreater0.05) with a confidence value of 95% by comparing RF and SVM. Conclusion: The comparative examination displays that the Random Forest is more productive than the Support Vector Machine for identifying the intruders are significantly tested.
2022-12-23
Marková, Eva, Sokol, Pavol, Kováćová, Kristína.  2022.  Detection of relevant digital evidence in the forensic timelines. 2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). :1–7.
Security incident handling and response are essen-tial parts of every organization's information and cyber security. Security incident handling consists of several phases, among which digital forensic analysis has an irreplaceable place. Due to particular digital evidence being recorded at a specific time, timelines play an essential role in analyzing this digital evidence. One of the vital tasks of the digital forensic investigator is finding relevant records in this timeline. This operation is performed manually in most cases. This paper focuses on the possibilities of automatically identifying digital evidence pertinent to the case and proposes a model that identifies this digital evidence. For this purpose, we focus on Windows operating system and the NTFS file system and use outlier detection (Local Outlier Factor method). Collected digital evidence is preprocessed, transformed to binary values, and aggregated by file system inodes and names. Subsequently, we identify digital records (file inodes, file names) relevant to the case. This paper analyzes the combinations of attributes, aggregation functions, local outlier factor parameters, and their impact on the resulting selection of relevant file inodes and file names.
2022-12-20
Song, Suhwan, Hur, Jaewon, Kim, Sunwoo, Rogers, Philip, Lee, Byoungyoung.  2022.  R2Z2: Detecting Rendering Regressions in Web Browsers through Differential Fuzz Testing. 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE). :1818–1829.
A rendering regression is a bug introduced by a web browser where a web page no longer functions as users expect. Such rendering bugs critically harm the usability of web browsers as well as web applications. The unique aspect of rendering bugs is that they affect the presented visual appearance of web pages, but those web pages have no pre-defined correct appearance. Therefore, it is challenging to automatically detect errors in their appearance. In practice, web browser vendors rely on non-trivial and time-prohibitive manual analysis to detect and handle rendering regressions. This paper proposes R2Z2, an automated tool to find rendering regressions. R2Z2 uses the differential fuzz testing approach, which repeatedly compares the rendering results of two different versions of a browser while providing the same HTML as input. If the rendering results are different, R2Z2 further performs cross browser compatibility testing to check if the rendering difference is indeed a rendering regression. After identifying a rendering regression, R2Z2 will perform an in-depth analysis to aid in fixing the regression. Specifically, R2Z2 performs a delta-debugging-like analysis to pinpoint the exact browser source code commit causing the regression, as well as inspecting the rendering pipeline stages to pinpoint which pipeline stage is responsible. We implemented a prototype of R2Z2 particularly targeting the Chrome browser. So far, R2Z2 found 11 previously undiscovered rendering regressions in Chrome, all of which were confirmed by the Chrome developers. Importantly, in each case, R2Z2 correctly reported the culprit commit. Moreover, R2Z2 correctly pin-pointed the culprit rendering pipeline stage in all but one case.
ISSN: 1558-1225
Hassanshahi, Behnaz, Lee, Hyunjun, Krishnan, Paddy.  2022.  Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications. 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). :618–629.
Modern web applications are getting more sophisticated by using frameworks that make development easy, but pose challenges for security analysis tools. New analysis techniques are needed to handle such frameworks that grow in number and popularity. In this paper, we describe Gelato that addresses the most crucial challenges for a security-aware client-side analysis of highly dynamic web applications. In particular, we use a feedback-driven and state-aware crawler that is able to analyze complex framework-based applications automatically, and is guided to maximize coverage of security-sensitive parts of the program. Moreover, we propose a new lightweight client-side taint analysis that outperforms the state-of-the-art tools, requires no modification to browsers, and reports non-trivial taint flows on modern JavaScript applications. Gelato reports vulnerabilities with higher accuracy than existing tools and achieves significantly better coverage on 12 applications of which three are used in production.
ISSN: 1534-5351
Do, Quoc Huy, Hosseyni, Pedram, Küsters, Ralf, Schmitz, Guido, Wenzler, Nils, Würtele, Tim.  2022.  A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification. 2022 IEEE Symposium on Security and Privacy (SP). :215–234.
Payment is an essential part of e-commerce. Merchants usually rely on third-parties, so-called payment processors, who take care of transferring the payment from the customer to the merchant. How a payment processor interacts with the customer and the merchant varies a lot. Each payment processor typically invents its own protocol that has to be integrated into the merchant’s application and provides the user with a new, potentially unknown and confusing user experience.Pushed by major companies, including Apple, Google, Master-card, and Visa, the W3C is currently developing a new set of standards to unify the online checkout process and “streamline the user’s payment experience”. The main idea is to integrate payment as a native functionality into web browsers, referred to as the Web Payment APIs. While this new checkout process will indeed be simple and convenient from an end-user perspective, the technical realization requires rather significant changes to browsers.Many major browsers, such as Chrome, Firefox, Edge, Safari, and Opera, already implement these new standards, and many payment processors, such as Google Pay, Apple Pay, or Stripe, support the use of Web Payment APIs for payments. The ecosystem is constantly growing, meaning that the Web Payment APIs will likely be used by millions of people worldwide.So far, there has been no in-depth security analysis of these new standards. In this paper, we present the first such analysis of the Web Payment APIs standards, a rigorous formal analysis. It is based on the Web Infrastructure Model (WIM), the most comprehensive model of the web infrastructure to date, which, among others, we extend to integrate the new payment functionality into the generic browser model.Our analysis reveals two new critical vulnerabilities that allow a malicious merchant to over-charge an unsuspecting customer. We have verified our attacks using the Chrome implementation and reported these problems to the W3C as well as the Chrome developers, who have acknowledged these problems. Moreover, we propose fixes to the standard, which by now have been adopted by the W3C and Chrome, and prove that the fixed Web Payment APIs indeed satisfy strong security properties.
ISSN: 2375-1207
Siewert, Hendrik, Kretschmer, Martin, Niemietz, Marcus, Somorovsky, Juraj.  2022.  On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers. 2022 IEEE Security and Privacy Workshops (SPW). :342–352.

Web browsers are among the most important but also complex software solutions to access the web. It is therefore not surprising that web browsers are an attractive target for attackers. Especially in the last decade, security researchers and browser vendors have developed sandboxing mechanisms like security-relevant HTTP headers to tackle the problem of getting a more secure browser. Although the security community is aware of the importance of security-relevant HTTP headers, legacy applications and individual requests from different parties have led to possible insecure configurations of these headers. Even if specific security headers are configured correctly, conflicts in their functionalities may lead to unforeseen browser behaviors and vulnerabilities. Recently, the first work which analyzed duplicated headers and conflicts in headers was published by Calzavara et al. at USENIX Security [1]. The authors focused on inconsistent protections by using both, the HTTP header X-Frame-Options and the framing protection of the Content-Security-Policy.We extend their work by analyzing browser behaviors when parsing duplicated headers, conflicting directives, and values that do not conform to the defined ABNF metalanguage specification. We created an open-source testbed running over 19,800 test cases, at which nearly 300 test cases are executed in the set of 66 different browsers. Our work shows that browsers conform to the specification and behave securely. However, all tested browsers behave differently when it comes, for example, to parsing the Strict-Transport-Security header. Moreover, Chrome, Safari, and Firefox behave differently if the header contains a character, which is not allowed by the defined ABNF. This results in the protection mechanism being fully enforced, partially enforced, or not enforced and thus completely bypassable.

ISSN: 2770-8411

Singh, Inderjeet, Araki, Toshinori, Kakizaki, Kazuya.  2022.  Powerful Physical Adversarial Examples Against Practical Face Recognition Systems. 2022 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW). :301–310.
It is well-known that the most existing machine learning (ML)-based safety-critical applications are vulnerable to carefully crafted input instances called adversarial examples (AXs). An adversary can conveniently attack these target systems from digital as well as physical worlds. This paper aims to the generation of robust physical AXs against face recognition systems. We present a novel smoothness loss function and a patch-noise combo attack for realizing powerful physical AXs. The smoothness loss interjects the concept of delayed constraints during the attack generation process, thereby causing better handling of optimization complexity and smoother AXs for the physical domain. The patch-noise combo attack combines patch noise and imperceptibly small noises from different distributions to generate powerful registration-based physical AXs. An extensive experimental analysis found that our smoothness loss results in robust and more transferable digital and physical AXs than the conventional techniques. Notably, our smoothness loss results in a 1.17 and 1.97 times better mean attack success rate (ASR) in physical white-box and black-box attacks, respectively. Our patch-noise combo attack furthers the performance gains and results in 2.39 and 4.74 times higher mean ASR than conventional technique in physical world white-box and black-box attacks, respectively.
ISSN: 2690-621X
Levina, Alla, Kamnev, Ivan.  2022.  Protection Metric Model of White-Box Algorithms. 2022 11th Mediterranean Conference on Embedded Computing (MECO). :1–3.
Systems based on WB protection have a limited lifetime, measured in months and sometimes days. Unfortunately, to understand for how long the application will be uncompromised, if possible, only empirically. However, it is possible to make a preliminary assessment of the security of a particular implementation, depending on the methods and their number used in the implementation, it will allow reallocating resources to more effective means of protection.
Kawade, Alisa, Chujo, Wataru, Kobayashi, Kentaro.  2022.  Smartphone screen to camera uplink communication with enhanced physical layer security by low-luminance space division multiplexing. 2022 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS). :176–180.
To achieve secure uplink communication from smartphones’ screen to a telephoto camera at a long distance of 3.5 meters, we demonstrate that low-luminance space division multiplexing screen is effective in enhancement of the physical layer security. First, a numerical model shows that the spatial inter-symbol interference caused by space division multiplexing prevents eavesdropping from a wide angle by the camera. Second, wide-angle characteristics of the symbol error rate and the pixel value distribution are measured to verify the numerical analysis. We experimentally evaluate the difference in the performances from a wide angle depending on the screen luminance and color. We also evaluate the performances at a long distance in front of the screen and a short distance from a wider angle.
Kabir, Alamgir, Ahammed, Md. Tabil, Das, Chinmoy, Kaium, Mehedi Hasan, Zardar, Md. Abu, Prathibha, Soma.  2022.  Light Fidelity (Li-Fi) based Indoor Communication System. 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI). :1–5.
Wireless-fidelity (Wi-Fi) and Bluetooth are examples of modern wireless communication technologies that employ radio waves as the primary channel for data transmission. but it ought to find alternatives over the limitation and interference in the radio frequency (RF) band. For viable alternatives, visible light communication (VLC) technology comes to play as Light Fidelity (Li-Fi) which uses visible light as a channel for delivering very high-speed communication in a Wi-Fi way. In terms of availability, bandwidth, security and efficiency, Li-Fi is superior than Wi-Fi. In this paper, we present a Li-Fi-based indoor communication system. prototype model has been proposed for single user scenario using visible light portion of electromagnetic spectrum. This system has been designed for audio data communication in between the users in transmitter and receiver sections. LED and photoresistor have been used as optical source and receiver respectively. The electro-acoustic transducer provides the required conversion of electrical-optical signal in both ways. This system might overcome problems like radio-frequency bandwidth scarcity However, its major problem is that it only works when it is pointed directly at the target.
2022-12-09
Joseph, Abin John, Sani, Nidhin, V, Vineeth M., Kumar, K. Suresh, Kumar, T. Ananth, Nishanth, R..  2022.  Towards a Novel and Efficient Public Key Management for Peer-Peer Security in Wireless Ad-Hoc/sensor Networks. 2022 International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN). :1—4.
Key management for self-organized wireless ad-hoc networks using peer-to-peer (P2P) keys is the primary goal of this article (SOWANs). Currently, wireless networks have centralized security architectures, making them difficult to secure. In most cases, ad-hoc wireless networks are not connected to trusted authorities or central servers. They are more prone to fragmentation and disintegration as a result of node and link failures. Traditional security solutions that rely on online trusted authorities do not work together to protect networks that are not planned. With open wireless networks, anyone can join or leave at any time with the right equipment, and no third party is required to verify their identity. These networks are best suited for this proposed method. Each node can make, distribute, and revoke its keying material in this paper. A minimal amount of communication and computation is required to accomplish this task. So that they can authenticate one another and create shared keys, nodes in the self-organized version of the system must communicate via a secure side channel between the users' devices.
Kuri, Sajib Kumar, Islam, Tarim, Jaskolka, Jason, Ibnkahla, Mohamed.  2022.  A Threat Model and Security Recommendations for IoT Sensors in Connected Vehicle Networks. 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring). :1—5.
Intelligent transportation systems, such as connected vehicles, are able to establish real-time, optimized and collision-free communication with the surrounding ecosystem. Introducing the internet of things (IoT) in connected vehicles relies on deployment of massive scale sensors, actuators, electronic control units (ECUs) and antennas with embedded software and communication technologies. Combined with the lack of designed-in security for sensors and ECUs, this creates challenges for security engineers and architects to identify, understand and analyze threats so that actions can be taken to protect the system assets. This paper proposes a novel STRIDE-based threat model for IoT sensors in connected vehicle networks aimed at addressing these challenges. Using a reference architecture of a connected vehicle, we identify system assets in connected vehicle sub-systems such as devices and peripherals that mostly involve sensors. Moreover, we provide a prioritized set of security recommendations, with consideration to the feasibility and deployment challenges, which enables practical applicability of the developed threat model to help specify security requirements to protect critical assets within the sensor network.
Hussain, Karrar, Vanathi, D., Jose, Bibin K, Kavitha, S, Rane, Bhuvaneshwari Yogesh, Kaur, Harpreet, Sandhya, C..  2022.  Internet of Things- Cloud Security Automation Technology Based on Artificial Intelligence. 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC). :42—47.
The development of industrial robots, as a carrier of artificial intelligence, has played an important role in promoting the popularisation of artificial intelligence super automation technology. The paper introduces the system structure, hardware structure, and software system of the mobile robot climber based on computer big data technology, based on this research background. At the same time, the paper focuses on the climber robot's mechanism compound method and obstacle avoidance control algorithm. Smart home computing focuses on “home” and brings together related peripheral industries to promote smart home services such as smart appliances, home entertainment, home health care, and security monitoring in order to create a safe, secure, energy-efficient, sustainable, and comfortable residential living environment. It's been twenty years. There is still no clear definition of “intelligence at home,” according to Philips Inc., a leading consumer electronics manufacturer, which once stated that intelligence should comprise sensing, connectedness, learning, adaption, and ease of interaction. S mart applications and services are still in the early stages of development, and not all of them can yet exhibit these five intelligent traits.
Pandey, Amit, Genale, Assefa Senbato, Janga, Vijaykumar, Sundaram, B. Barani, Awoke, Desalegn, Karthika, P..  2022.  Analysis of Efficient Network Security using Machine Learning in Convolutional Neural Network Methods. 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC). :170—173.
Several excellent devices can communicate without the need for human intervention. It is one of the fastest-growing sectors in the history of computing, with an estimated 50 billion devices sold by the end of 2020. On the one hand, IoT developments play a crucial role in upgrading a few simple, intelligent applications that can increase living quality. On the other hand, the security concerns have been noted to the cross-cutting idea of frameworks and the multidisciplinary components connected with their organization. As a result, encryption, validation, access control, network security, and application security initiatives for gadgets and their inherent flaws cannot be implemented. It should upgrade existing security measures to ensure that the ML environment is sufficiently protected. Machine learning (ML) has advanced tremendously in the last few years. Machine insight has evolved from a research center curiosity to a sensible instrument in a few critical applications.
2022-12-07
Leiko, Oleksandr, Derepa, Anatolii, Pozdniakova, Olha, Kocharian, Oksana.  2022.  On the Influence of the Acoustic Interaction of Cylindrical Piezoceramic Radiators in Planar Systems on their Physical Fields. 2022 IEEE 41st International Conference on Electronics and Nanotechnology (ELNANO). :617—622.
Recently, in solving problems of sound radiation by systems of piezoceramic radiators, new approaches have emerged, which make it possible to significantly approximate the design parameters of systems to the actually measured ones. These approaches are associated with taking into account the specific features of these systems performing two functions - the function of converting electrical energy into acoustic energy and the function of forming the latter in the surrounding space. The peculiarity of the first function is the interconnection of the electric, mechanical and acoustic fields during energy conversion. The peculiarity of the second function is the interaction of the radiators in the system during the formation of its acoustic field. The aim of the work is to study the effect of acoustic interaction of cylindrical piezoceramic radiators in the composition of flat systems on their physical fields. Using the method of coupled fields in multiply connected domains, using the addition theorems for cylindrical wave functions, we obtain analytical relations that allow one to calculate the numerical results for the parameters of three interconnected physical fields that ensure the emission of sound by plane systems. Their analysis showed that with the radial symmetry of electrical excitation of cylindrical radiators, the conversion of electrical energy into mechanical energy is carried out on one - zero mode of oscillation. The placement of the radiators in the composition of the flat systems leads to the appearance of the effect of acoustic interaction between them in an external field, due to the multiple exchange of radiated and scattered waves. This effect destroys the radial symmetry of the acoustic loading of a single radiator. The violation of symmetry in the conversion of mechanical energy into acoustic energy leads to the appearance of oscillations that follow the zero mode. As a result, there is an effective redistribution of energy “pumped” into the radiators in the zero mode, between subsequent oscillations of the radiators. In turn, the emergence of new modes changes the acoustic field of a flat system. The results show the need to take into account the above features of the physical fields of the radiators in the composition of flat systems when choosing methods and developing methods for measuring field characteristics.
Kramer, Jack, Lee, Daehun, Cho, Sinwoo, Jahanbani, Shahin, Lai, Keji, Lu, Ruochen.  2022.  Acoustic Wave Focusing Lens at Radio Frequencies in Thin-Film Lithium Niobate. 2022 IEEE MTT-S International Conference on Microwave Acoustics and Mechanics (IC-MAM). :9—12.
Expanding techniques for chip-scale acoustic wave focusing would open doors for advancements in signal processing and quantum electromechanical microsystems. In this paper, we present a method for acoustic wave focusing and wavefront shaping at radio frequencies (RF), validated with thin-film lithium niobite on a low-loss and high coupling silicon carbide (LiNbO3-on-SiC) testbed. By depositing a metal layer, we can mitigate the piezoelectric stiffening effect, and reduce the acoustic wave speed in a patterned area. Employing a design analogous to geometric optical systems, efficient acoustic wave focusing is experimentally observed. With more development, this technique could be employed in emerging acoustic microsystems.
Kawasaki, Shinnosuke, Yeh, Jia–Jun, Saccher, Marta, Li, Jian, Dekker, Ronald.  2022.  Bulk Acoustic Wave Based Mocrfluidic Particle Sorting with Capacitive Micromachined Ultrasonic Transducers. 2022 IEEE 35th International Conference on Micro Electro Mechanical Systems Conference (MEMS). :908—911.
The main limitation of acoustic particle separation for microfluidic application is its low sorting efficiency. This is due to the weak coupling of surface acoustic waves (SAWs) into the microchannel. In this work, we demonstrate bulk acoustic wave (BAW) particle sorting using capacitive micromachined ultrasonic transducers (CMUTs) for the first time. A collapsed mode CMUT was driven in air to generate acoustic pressure within the silicon substrate in the in-plane direction of the silicon die. This acoustic pressure was coupled into a water droplet, positioned at the side of the CMUT die, and measured with an optical hydrophone. By using a beam steering approach, the ultrasound generated from 32 CMUT elements were added in-phase to generate a maximum peak-to-peak pressure of 0.9 MPa. Using this pressure, 10 µm latex beads were sorted almost instantaneously.
Suzuki, Ryoto, Suzuki, Masashi, Kakio, Shoji, Kimura, Noritoshi.  2022.  Shear-Horizontal Surface Acoustic Wave on Ca3TaGa3Si2O14 Piezoelectric Single Crystal. 2022 Joint Conference of the European Frequency and Time Forum and IEEE International Frequency Control Symposium (EFTF/IFCS). :1—2.
SummaryIn this study, the propagation and resonance properties of shear-horizontal surface acoustic waves (SH SAWs) on a rotated Y-cut 90°X propagating Ca3TaGa3Si2O14 (CTGS) with a Au- or Al-interdigital transducer (IDT) were investigated theoretically and experimentally. It was found that not only a high-density Au-IDT but also a conventional Al-IDT enables the energy trapping of SH SAW in the vicinity of the surface. For both IDTs, the effective electromechanical coupling factor of about 1.2% and the zero temperature coefficient of frequency can be simultaneously obtained by adjusting the cut angle of CTGS and the electrode film thickness.
Chedurupalli, Shivakumar, Karthik Reddy, K, Akhil Raman, T S, James Raju, K.C.  2022.  High Overtone Bulk Acoustic Resonator with improved effective coupling coefficient. 2022 IEEE International Symposium on Applications of Ferroelectrics (ISAF). :1—4.
A High Overtone Bulk Acoustic Wave Resonator (HBAR) is fabricated with the active material being Ba0.5Sr0.5TiO3 (BST). Owing to its strong electrostrictive property, the BST needs an external dc voltage to yield an electromechanical coupling. The variations in resonances with respect to varying dc fields are noted and analyzed with the aid of an Resonant Spectrum Method (RSM) model. Effective coupling coefficient \$(\textbackslashmathrmK\_\textbackslashmathrme\textbackslashmathrmf\textbackslashmathrmfˆ2(%))\$ in the case of employed MIM based structure is observed and the comparisons are drawn with the corresponding values of the CPC structures. An improvement of 70% in the value of \$\textbackslashmathrmK\_\textbackslashmathrme\textbackslashmathrmf\textbackslashmathrmfˆ2\$(%)at 1.34 GHz is witnessed in MIM structures because of direct access to the bottom electrode of the structure.