Visible to the public Biblio

Found 6023 results

Filters: Keyword is Scalability  [Clear All Filters]
2022-12-20
Siewert, Hendrik, Kretschmer, Martin, Niemietz, Marcus, Somorovsky, Juraj.  2022.  On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers. 2022 IEEE Security and Privacy Workshops (SPW). :342–352.

Web browsers are among the most important but also complex software solutions to access the web. It is therefore not surprising that web browsers are an attractive target for attackers. Especially in the last decade, security researchers and browser vendors have developed sandboxing mechanisms like security-relevant HTTP headers to tackle the problem of getting a more secure browser. Although the security community is aware of the importance of security-relevant HTTP headers, legacy applications and individual requests from different parties have led to possible insecure configurations of these headers. Even if specific security headers are configured correctly, conflicts in their functionalities may lead to unforeseen browser behaviors and vulnerabilities. Recently, the first work which analyzed duplicated headers and conflicts in headers was published by Calzavara et al. at USENIX Security [1]. The authors focused on inconsistent protections by using both, the HTTP header X-Frame-Options and the framing protection of the Content-Security-Policy.We extend their work by analyzing browser behaviors when parsing duplicated headers, conflicting directives, and values that do not conform to the defined ABNF metalanguage specification. We created an open-source testbed running over 19,800 test cases, at which nearly 300 test cases are executed in the set of 66 different browsers. Our work shows that browsers conform to the specification and behave securely. However, all tested browsers behave differently when it comes, for example, to parsing the Strict-Transport-Security header. Moreover, Chrome, Safari, and Firefox behave differently if the header contains a character, which is not allowed by the defined ABNF. This results in the protection mechanism being fully enforced, partially enforced, or not enforced and thus completely bypassable.

ISSN: 2770-8411

Gracia, Mulumba Banza, Malele, Vusumuzi, Ndlovu, Sphiwe Promise, Mathonsi, Topside Ehleketani, Maaka, Lebogang, Muchenje, Tonderai.  2022.  6G Security Challenges and Opportunities. 2022 IEEE 13th International Conference on Mechanical and Intelligent Manufacturing Technologies (ICMIMT). :339–343.
The Sixth Generation (6G) is currently under development and it is a planned successor of the Fifth Generation (5G). It is a new wireless communication technology expected to have a greater coverage area, significant fast and a higher data rate. The aim of this paper is to examine the literature on challenges and possible solutions of 6G's security, privacy and trust. It uses the systematic literature review technique by searching five research databases for search engines which are precise keywords like “6G,” “6G Wireless communication,” and “sixth generation”. The latter produced a total of 1856 papers, then the security, privacy and trust issues of the 6G wireless communication were extracted. Two security issues, the artificial intelligence and visible light communication, were apparent. In conclusion, there is a need for new paradigms that will provide a clear 6G security solutions.
Zahiri-Rad, Saman, Salem, Ziad, Weiss, Andreas P., Leitgeb, Erich.  2022.  An Optimal Solution for a Human Wrist Rotation Recognition System by Utilizing Visible Light Communication. 2022 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom). :1–8.
Wrist-worn devices enable access to essential information and they are suitable for a wide range of applications, such as gesture and activity recognition. Wrist-worn devices require appropriate technologies when used in sensitive areas, overcoming vulnerabilities in regard to security and privacy. In this work, we propose an approach to recognize wrist rotation by utilizing Visible Light Communication (VLC) that is enabled by low-cost LEDs in an indoor environment. In this regard, we address the channel model of a VLC communicating wristband (VLCcw) in terms of the following factors. The directionality and the spectral composition of the light and the corresponding spectral sensitivity and the directional characteristics of the utilized photodiode (PD). We verify our VLCcw from the simulation environment by a small-scale experimental setup. Then, we analyze the system when white and RGBW LEDs are used. In addition, we optimized the VLCcw system by adding more receivers for the purpose of reducing the number of LEDs on VLCcw. Our results show that the proposed approach generates a feasible real-world simulation environment.
Kawade, Alisa, Chujo, Wataru, Kobayashi, Kentaro.  2022.  Smartphone screen to camera uplink communication with enhanced physical layer security by low-luminance space division multiplexing. 2022 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS). :176–180.
To achieve secure uplink communication from smartphones’ screen to a telephoto camera at a long distance of 3.5 meters, we demonstrate that low-luminance space division multiplexing screen is effective in enhancement of the physical layer security. First, a numerical model shows that the spatial inter-symbol interference caused by space division multiplexing prevents eavesdropping from a wide angle by the camera. Second, wide-angle characteristics of the symbol error rate and the pixel value distribution are measured to verify the numerical analysis. We experimentally evaluate the difference in the performances from a wide angle depending on the screen luminance and color. We also evaluate the performances at a long distance in front of the screen and a short distance from a wider angle.
Albayrak, Cenk, Arslan, Hüseyin, Türk, Kadir.  2022.  Physical Layer Security for Visible Light Communication in the Presence of ISI and NLoS. 2022 IEEE International Conference on Communications Workshops (ICC Workshops). :469–474.
Visible light communication (VLC) is an important alternative and/or complementary technology for next generation indoor wireless broadband communication systems. In order to ensure data security for VLC in public areas, many studies in literature consider physical layer security (PLS). These studies generally neglect the reflections in the VLC channel and assume no inter symbol interference (ISI). However, increasing the data transmission rate causes ISI. In addition, even if the power of the reflections is small compared to the line of sight (LoS) components, it can affect the secrecy rate in a typical indoor VLC system. In this study, we investigate the effects of ISI and reflected channel components on secrecy rate in multiple-input single-output (MISO) VLC scenario utilized null-steering (NS) and artificial noise (AN) PLS techniques.
ISSN: 2694-2941
Hasan, Syed Rakib, Chowdhury, Mostafa Zaman, Saiam, Md..  2022.  A New Quantum Visible Light Communication for Future Wireless Network Systems. 2022 International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE). :1–4.
In the near future, the high data rate challenge would not be possible by using the radio frequency (RF) only. As the user will increase, the network traffic will increase proportionally. Visible light communication (VLC) is a good solution to support huge number of indoor users. VLC has high data rate over RF communication. The way internet users are increasing, we have to think over VLC technology. Not only the data rate is a concern but also its security, cost, and reliability have to be considered for a good communication network. Quantum technology makes a great impact on communication and computing in both areas. Quantum communication technology has the ability to support better channel capacity, higher security, and lower latency. This paper combines the quantum technology over the existing VLC and compares the performance between quantum visible light communication performance (QVLC) over the existing VLC system. Research findings clearly show that the performance of QVLC is better than the existing VLC system.
Hussain, G K Jakir, Shruthe, M, Rithanyaa, S, Madasamy, Saravana Rajesh, Velu, Nandagopal S.  2022.  Visible Light Communication using Li-Fi. 2022 6th International Conference on Devices, Circuits and Systems (ICDCS). :257–262.
Over earlier years of huge technical developments, the need for a communication system has risen tremendously. Inrecent times, public realm interaction has been a popular area, hence the research group is emphasizing the necessity of quick and efficient broadband speeds, as well as upgraded security protocols. The main objective of this project work is to combine conventional Li-Fi and VLC techniques for video communication. VLC is helping to deliver fast data speeds, bandwidth efficiency, and a relatively secure channel of communication. Li-Fi is an inexpensive wireless communication (WC) system. Li-Fi can transmit information (text, audio, and video) to any electronic device via the LEDs that are positioned in the space to provide lighting. Li-Fi provides more advantages than Wi-Fi, such as security, high efficiency, speed, throughput, and low latency. The information can be transferred based on the flash property of the LED. Communication is accomplished by turning on and off LED lights at a faster pace than the human visual system can detect.
ISSN: 2644-1802
Sliti, Maha.  2022.  MIMO Visible Light Communication System. 2022 27th Asia Pacific Conference on Communications (APCC). :538–543.
The expanding streaming culture of large amounts of data, as well as the requirement for faster and more reliable data transport systems, necessitates the development of innovative communication technologies such as Visible Light Communication (VLC). Nonetheless, incorporating VLC into next-generation networks is challenging due to technological restrictions such as air absorption, shadowing, and beam dispersion. One technique for addressing some of the challenges is to use the multiple input multiple output (MIMO) technique, which involves the simultaneous transmission of data from several sources, hence increasing data rate. In this work, the data transmission performance of the MIMO-VLC system is evaluated using a variety of factors such as distance from the source, data bit rate, and modulation method.
ISSN: 2163-0771
Kabir, Alamgir, Ahammed, Md. Tabil, Das, Chinmoy, Kaium, Mehedi Hasan, Zardar, Md. Abu, Prathibha, Soma.  2022.  Light Fidelity (Li-Fi) based Indoor Communication System. 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI). :1–5.
Wireless-fidelity (Wi-Fi) and Bluetooth are examples of modern wireless communication technologies that employ radio waves as the primary channel for data transmission. but it ought to find alternatives over the limitation and interference in the radio frequency (RF) band. For viable alternatives, visible light communication (VLC) technology comes to play as Light Fidelity (Li-Fi) which uses visible light as a channel for delivering very high-speed communication in a Wi-Fi way. In terms of availability, bandwidth, security and efficiency, Li-Fi is superior than Wi-Fi. In this paper, we present a Li-Fi-based indoor communication system. prototype model has been proposed for single user scenario using visible light portion of electromagnetic spectrum. This system has been designed for audio data communication in between the users in transmitter and receiver sections. LED and photoresistor have been used as optical source and receiver respectively. The electro-acoustic transducer provides the required conversion of electrical-optical signal in both ways. This system might overcome problems like radio-frequency bandwidth scarcity However, its major problem is that it only works when it is pointed directly at the target.
Çetindere, Besra, Albayrak, Cenk, Türk, Kadir.  2022.  Physical Layer Security For Indoor Multicolor Visible Light Communication. 2022 30th Signal Processing and Communications Applications Conference (SIU). :1–4.
Visible light communication (VLC) is a short-range wireless optical communication that can transmit data by switching lighting elements at high speeds in indoor areas. In common areas, VLC can provide data security at every layer of communication by using physical layer security (PLS) techniques as well as existing cryptography-based techniques. In the literature, PLS techniques have generally been studied for monochrome VLC systems, and multicolor VLC studies are quite limited. In this study, to the best of authors’ knowledge, null steering (NS) and artificial noise (AN), which are widely used PLS methods, have been applied to multi-colored LED-based VLC systems for the first time in the literature and the achievable secrecy rate has been calculated.
ISSN: 2165-0608
2022-12-09
Han, Wendie, Zhang, Rui, Zhang, Lei, Wang, Lulu.  2022.  A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks. 2022 IEEE Wireless Communications and Networking Conference (WCNC). :986—991.

Mobile Ad-hoc Networks (MANETs) have attracted lots of concerns with its widespread use. In MANETs, wireless nodes usually self-organize into groups to complete collaborative tasks and communicate with one another via public channels which are vulnerable to attacks. Group key management is generally employed to guarantee secure group communication in MANETs. However, most existing group key management schemes for MANETs still suffer from some issues, e.g., receiver restriction, relying on a trusted dealer and heavy certificates overheads. To address these issues, we propose a group key management scheme for MANETs based on an identity-based authenticated dynamic contributory broadcast encryption (IBADConBE) protocol which builds on an earlier work. Our scheme abandons the certificate management and does not need a trusted dealer to distribute a secret key to each node. A set of wireless nodes are allowed to negotiate the secret keys in one round while forming a group. Besides, our scheme is receiver-unrestricted which means any sender can flexibly opt for any favorable nodes of a group as the receivers. Further, our scheme satisfies the authentication, confidentiality of messages, known-security, forward security and backward security concurrently. Performance evaluation shows our scheme is efficient.

Tariq, Usman.  2022.  Security-Aware Malicious Event Detection using Multivariate Deep Regression Setup for Vehicular Ad hoc Network Aimed at Autonomous Transportation System. 2022 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET). :354—358.
Vehicular Ad-hoc Networks (VANET) are capable of offering inter and intra-vehicle wireless communication among mobility aware computing systems. Nodes are linked by applying concepts of mobile ad hoc networks. VANET uses cases empower vehicles to link to the network to aggregate and process messages in real-time. The proposed paper addresses a security vulnerability known as Sybil attack, in which numerous fake nodes broadcast false data to the neighboring nodes. In VANET, mobile nodes continuously change their network topology and exchange location sensor-generated data in real time. The basis of the presented technique is source testing that permits the scalable identification of Sybil nodes, without necessitating any pre-configuration, which was conceptualized from a comparative analysis of preceding research in the literature.
Janani, V.S., Devaraju, M..  2022.  An Efficient Distributed Secured Broadcast Stateless Group Key Management Scheme for Mobile Ad Hoc Networks. 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI). :1—5.

This paper addresses the issues in managing group key among clusters in Mobile Ad hoc Networks (MANETs). With the dynamic movement of the nodes, providing secure communication and managing secret keys in MANET is difficult to achieve. In this paper, we propose a distributed secure broadcast stateless groupkey management framework (DSBS-GKM) for efficient group key management. This scheme combines the benefits of hash function and Lagrange interpolation polynomial in managing MANET nodes. To provide a strong security mechanism, a revocation system that detects and revokes misbehaviour nodes is presented. The simulation results show that the proposed DSBS-GKM scheme attains betterments in terms of rekeying and revocation performance while comparing with other existing key management schemes.

Nisansala, Sewwandi, Chandrasiri, Gayal Laksara, Prasadika, Sonali, Jayasinghe, Upul.  2022.  Microservice Based Edge Computing Architecture for Internet of Things. 2022 2nd International Conference on Advanced Research in Computing (ICARC). :332—337.
Distributed computation and AI processing at the edge has been identified as an efficient solution to deliver real-time IoT services and applications compared to cloud-based paradigms. These solutions are expected to support the delay-sensitive IoT applications, autonomic decision making, and smart service creation at the edge in comparison to traditional IoT solutions. However, existing solutions have limitations concerning distributed and simultaneous resource management for AI computation and data processing at the edge; concurrent and real-time application execution; and platform-independent deployment. Hence, first, we propose a novel three-layer architecture that facilitates the above service requirements. Then we have developed a novel platform and relevant modules with integrated AI processing and edge computer paradigms considering issues related to scalability, heterogeneity, security, and interoperability of IoT services. Further, each component is designed to handle the control signals, data flows, microservice orchestration, and resource composition to match with the IoT application requirements. Finally, the effectiveness of the proposed platform is tested and have been verified.
2022-12-07
Yan, Huang, Zhu, Hanhao, Cui, Zhiqiang, Chai, Zhigang, Wang, Qile, Wang, Yize.  2022.  Effect of seamount on low frequency acoustic propagation based on time domain. 2022 3rd International Conference on Geology, Mapping and Remote Sensing (ICGMRS). :780—783.
From the perspective of time domain, the propagation characteristics of sound waves in seawater can be seen more intuitively. In order to study the influence and characteristics of seamount on low frequency acoustic propagation, the research of this paper used the Finite Element Method (FEM) based on time domain to set up a full-waveguide low-frequency acoustic propagation simulation model, and discussed the influencing laws about acoustic propagation on seamount. The simulation results show that Seamounts can hinder the propagation of sound waves, weaken the energy of sound waves. The topographic changes of seamounts can cause the coupling and transformation of acoustic signals during the propagation which can stimulate the seabed interface wave.
Leiko, Oleksandr, Derepa, Anatolii, Pozdniakova, Olha, Kocharian, Oksana.  2022.  On the Influence of the Acoustic Interaction of Cylindrical Piezoceramic Radiators in Planar Systems on their Physical Fields. 2022 IEEE 41st International Conference on Electronics and Nanotechnology (ELNANO). :617—622.
Recently, in solving problems of sound radiation by systems of piezoceramic radiators, new approaches have emerged, which make it possible to significantly approximate the design parameters of systems to the actually measured ones. These approaches are associated with taking into account the specific features of these systems performing two functions - the function of converting electrical energy into acoustic energy and the function of forming the latter in the surrounding space. The peculiarity of the first function is the interconnection of the electric, mechanical and acoustic fields during energy conversion. The peculiarity of the second function is the interaction of the radiators in the system during the formation of its acoustic field. The aim of the work is to study the effect of acoustic interaction of cylindrical piezoceramic radiators in the composition of flat systems on their physical fields. Using the method of coupled fields in multiply connected domains, using the addition theorems for cylindrical wave functions, we obtain analytical relations that allow one to calculate the numerical results for the parameters of three interconnected physical fields that ensure the emission of sound by plane systems. Their analysis showed that with the radial symmetry of electrical excitation of cylindrical radiators, the conversion of electrical energy into mechanical energy is carried out on one - zero mode of oscillation. The placement of the radiators in the composition of the flat systems leads to the appearance of the effect of acoustic interaction between them in an external field, due to the multiple exchange of radiated and scattered waves. This effect destroys the radial symmetry of the acoustic loading of a single radiator. The violation of symmetry in the conversion of mechanical energy into acoustic energy leads to the appearance of oscillations that follow the zero mode. As a result, there is an effective redistribution of energy “pumped” into the radiators in the zero mode, between subsequent oscillations of the radiators. In turn, the emergence of new modes changes the acoustic field of a flat system. The results show the need to take into account the above features of the physical fields of the radiators in the composition of flat systems when choosing methods and developing methods for measuring field characteristics.
Cejas, José Manuel Carmona, Mirea, Teona, Clement, Marta, Olivares, Jimena.  2022.  Solidly Mounted Resonators Based on ZnO/SiO2 Acoustic Reflectors and Their Performance After High-temperature Exposure. 2022 Joint Conference of the European Frequency and Time Forum and IEEE International Frequency Control Symposium (EFTF/IFCS). :1—3.
Solidly mounted resonators (SMRs) built on dielectric acoustic reflectors can save several fabrication steps as well as avoid undesired parasitic effects when exciting extended electrodes via capacitive coupling. In this work we manufacture and measure the frequency response of AlN-based SMRs built on 7-layer ZnO/SiO2 acoustic reflectors with SiO2 working as low impedance material and ZnO as high impedance material. After applying a 700°C treatment, their frequency response is measured again and compared with the pre-treatment measurements.
Kramer, Jack, Lee, Daehun, Cho, Sinwoo, Jahanbani, Shahin, Lai, Keji, Lu, Ruochen.  2022.  Acoustic Wave Focusing Lens at Radio Frequencies in Thin-Film Lithium Niobate. 2022 IEEE MTT-S International Conference on Microwave Acoustics and Mechanics (IC-MAM). :9—12.
Expanding techniques for chip-scale acoustic wave focusing would open doors for advancements in signal processing and quantum electromechanical microsystems. In this paper, we present a method for acoustic wave focusing and wavefront shaping at radio frequencies (RF), validated with thin-film lithium niobite on a low-loss and high coupling silicon carbide (LiNbO3-on-SiC) testbed. By depositing a metal layer, we can mitigate the piezoelectric stiffening effect, and reduce the acoustic wave speed in a patterned area. Employing a design analogous to geometric optical systems, efficient acoustic wave focusing is experimentally observed. With more development, this technique could be employed in emerging acoustic microsystems.
Ariturk, Gokhan, Almuqati, Nawaf R., Yu, Yao, Yen, Ernest Ting-Ta, Fruehling, Adam, Sigmarsson, Hjalti H..  2022.  Wideband Hybrid Acoustic-Electromagnetic Filters with Prescribed Chebyshev Functions. 2022 IEEE/MTT-S International Microwave Symposium - IMS 2022. :887—890.
The achievable bandwidth in ladder acoustic filters is strictly limited by the electromechanical coupling coefficient (k;) in conventional ladder-acoustic filters. Furthermore, their out-of-band rejection is inherently weak due to the frequency responses of the shunt or series-connected acoustic resonators. This work proposes a coupling-matrix-based solution for both issues by employing acoustic and electromagnetic resonators within the same filter prototype using prescribed Chebyshev responses. It has been shown that significantly much wider bandwidths, that cannot be achieved with acoustic-only filters, can be obtained. An important strength of the proposed method is that a filter with a particular FBW can be designed with a wide range of acoustic resonators with different k; values. An 14 % third-order asymmetrical-response filter is designed and fabricated using electromagnetic resonators and an acoustic resonator with a k; of 3.5 %.
Kawasaki, Shinnosuke, Yeh, Jia–Jun, Saccher, Marta, Li, Jian, Dekker, Ronald.  2022.  Bulk Acoustic Wave Based Mocrfluidic Particle Sorting with Capacitive Micromachined Ultrasonic Transducers. 2022 IEEE 35th International Conference on Micro Electro Mechanical Systems Conference (MEMS). :908—911.
The main limitation of acoustic particle separation for microfluidic application is its low sorting efficiency. This is due to the weak coupling of surface acoustic waves (SAWs) into the microchannel. In this work, we demonstrate bulk acoustic wave (BAW) particle sorting using capacitive micromachined ultrasonic transducers (CMUTs) for the first time. A collapsed mode CMUT was driven in air to generate acoustic pressure within the silicon substrate in the in-plane direction of the silicon die. This acoustic pressure was coupled into a water droplet, positioned at the side of the CMUT die, and measured with an optical hydrophone. By using a beam steering approach, the ultrasound generated from 32 CMUT elements were added in-phase to generate a maximum peak-to-peak pressure of 0.9 MPa. Using this pressure, 10 µm latex beads were sorted almost instantaneously.
Suzuki, Ryoto, Suzuki, Masashi, Kakio, Shoji, Kimura, Noritoshi.  2022.  Shear-Horizontal Surface Acoustic Wave on Ca3TaGa3Si2O14 Piezoelectric Single Crystal. 2022 Joint Conference of the European Frequency and Time Forum and IEEE International Frequency Control Symposium (EFTF/IFCS). :1—2.
SummaryIn this study, the propagation and resonance properties of shear-horizontal surface acoustic waves (SH SAWs) on a rotated Y-cut 90°X propagating Ca3TaGa3Si2O14 (CTGS) with a Au- or Al-interdigital transducer (IDT) were investigated theoretically and experimentally. It was found that not only a high-density Au-IDT but also a conventional Al-IDT enables the energy trapping of SH SAW in the vicinity of the surface. For both IDTs, the effective electromechanical coupling factor of about 1.2% and the zero temperature coefficient of frequency can be simultaneously obtained by adjusting the cut angle of CTGS and the electrode film thickness.
İnce, Talha, Çakir, Sertaç.  2022.  Tightly and Loosely Coupled Architectures for Inertial Navigation System and Doppler Velocity Log Integration at Autonomous Underwater Vehicles. 2022 30th Signal Processing and Communications Applications Conference (SIU). :1—4.
The Inertial Navigation System(INS) and Doppler Velocity Logs(DVL) which are used frequently on autonomous underwater vehicles can be fused under different types of integration architectures. These architectures differ in terms of algorithm requirements and complexity. DVL may experience acoustic beam losses during operation due to environmental factors and abilities of the sensor. In these situations, radial velocity information cannot be received from lost acoustic beam. In this paper, the performances of INS and DVL integration under tightly and loosely coupled architectures are comparatively presented with simulations. In the tightly coupled approach, navigation filter is updated with solely available beam measurements by using sequential measurement update method, and the sensitivity of this method is investigated for acoustic beam losses.
Acosta, L., Guerrero, E., Caballero, C., Verdú, J., de Paco, P..  2022.  Synthesis of Acoustic Wave Multiport Functions by using Coupling Matrix Methodologies. 2022 IEEE MTT-S International Conference on Microwave Acoustics and Mechanics (IC-MAM). :56—59.
Acoustic wave (AW) synthesis methodologies have become popular among AW filter designers because they provide a fast and precise seed to start with the design of AW devices. Nowadays, with the increasing complexity of carrier aggregation, there is a strong necessity to develop synthesis methods more focused on multiport filtering schemes. However, when dealing with multiport filtering functions, numerical accuracy plays an important role to succeed with the synthesis process since polynomial degrees are much higher as compared to the standalone filter case. In addition to polynomial degree, the number set of polynomial coefficients is also an important source of error during the extraction of the circuital elements of the filter. Nonetheless, in this paper is demonstrated that coupling matrix approaches are the best choice when the objective is to synthesize filtering functions with complex roots in their characteristic polynomials, which is the case of the channel polynomials of the multiport device.
Chedurupalli, Shivakumar, Karthik Reddy, K, Akhil Raman, T S, James Raju, K.C.  2022.  High Overtone Bulk Acoustic Resonator with improved effective coupling coefficient. 2022 IEEE International Symposium on Applications of Ferroelectrics (ISAF). :1—4.
A High Overtone Bulk Acoustic Wave Resonator (HBAR) is fabricated with the active material being Ba0.5Sr0.5TiO3 (BST). Owing to its strong electrostrictive property, the BST needs an external dc voltage to yield an electromechanical coupling. The variations in resonances with respect to varying dc fields are noted and analyzed with the aid of an Resonant Spectrum Method (RSM) model. Effective coupling coefficient \$(\textbackslashmathrmK\_\textbackslashmathrme\textbackslashmathrmf\textbackslashmathrmfˆ2(%))\$ in the case of employed MIM based structure is observed and the comparisons are drawn with the corresponding values of the CPC structures. An improvement of 70% in the value of \$\textbackslashmathrmK\_\textbackslashmathrme\textbackslashmathrmf\textbackslashmathrmfˆ2\$(%)at 1.34 GHz is witnessed in MIM structures because of direct access to the bottom electrode of the structure.
2022-12-01
Srikanth, K S, Ramesh, T K, Palaniswamy, Suja, Srinivasan, Ranganathan.  2022.  XAI based model evaluation by applying domain knowledge. 2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). :1—6.
Artificial intelligence(AI) is used in decision support systems which learn and perceive features as a function of the number of layers and the weights computed during training. Due to their inherent black box nature, it is insufficient to consider accuracy, precision and recall as metrices for evaluating a model's performance. Domain knowledge is also essential to identify features that are significant by the model to arrive at its decision. In this paper, we consider a use case of face mask recognition to explain the application and benefits of XAI. Eight models used to solve the face mask recognition problem were selected. GradCAM Explainable AI (XAI) is used to explain the state-of-art models. Models that were selecting incorrect features were eliminated even though, they had a high accuracy. Domain knowledge relevant to face mask recognition viz., facial feature importance is applied to identify the model that picked the most appropriate features to arrive at the decision. We demonstrate that models with high accuracies need not be necessarily select the right features. In applications requiring rapid deployment, this method can act as a deciding factor in shortlisting models with a guarantee that the models are looking at the right features for arriving at the classification. Furthermore, the outcomes of the model can be explained to the user enhancing their confidence on the AI model being deployed in the field.