ID int64 0 400k | content stringlengths 97 5.85k |
|---|---|
10,200 | Please write an abstract with title: Fully Automated Pipeline for Body Composition Estimation from 3D Optical Scans using Principal Component Analysis: A Shape Up Study, and key words: Principal component analysis, Estimation, Three-dimensional displays, Legged locomotion, Pipelines, Shape, Biomedical measurement. Abstract: The increasing prevalence and adaptability of 3D optical scan (3DO) technology has invoked many recent studies which use 3DO scanning as a convenient and inexpensive means for predicting body composition and health risks. The Shape Up studies seek a device-agnostic solution for body composition estimation based on principal component analysis (PCA). This paper reports a progress made on Shape Up’s previous work which served as a criterion analysis for PCA-based body composition and health risk prediction. This study presents proof-of-concept for a novel automated landmark detection step that allows for a fully automated PCA-based approach to body composition estimation that facilitates a practical device-agnostic PCA-based solution to body composition estimation from 3DO scans. Our results show that replacing expensive and time-consuming manual point placement with the proposed automated landmarks will not diminish the quality of body composition estimates allowing for a more practical pipeline that can be used in real-world settings. |
10,201 | Please write an abstract with title: Undesired Cross Terms [Lecture Notes], and key words: Random variables, Optimization, Transmitting antennas, Wireless communication, Complexity theory, Distribution functions, Probability density function. Abstract: This lecture note briefly describes two examples in mathematics on how and why cross terms are disliked: orthogonal space-time block code (OSTBC) from orthogonal designs and free probability theory. The first example shows that the elimination of cross terms can significantly simplify the optimization that has many practical applications in, for instance, multiple antenna systems in wireless communications. The second example gives an intuitive and/or fundamental understanding of free probability theory, which has important applications in random matrix theory. |
10,202 | Please write an abstract with title: Measurement-driven Analysis of an Edge-Assisted Object Recognition System, and key words: Delays, Image coding, Servers, Object recognition, Artificial neural networks, Encoding, Transform coding. Abstract: We develop an edge-assisted object recognition system with the aim of studying the system-level trade-offs between end-to-end latency and object recognition accuracy. We focus on developing techniques that optimize the transmission delay of the system and demonstrate the effect of image encoding rate and neural network size on these two performance metrics. We explore optimal trade-offs between these metrics by measuring the performance of our real time object recognition application. Our measurements reveal hitherto unknown parameter effects and sharp trade-offs, hence paving the road for optimizing this key service. Finally, we formulate two optimization problems using our measurement-based models and following a Pareto analysis we find that careful tuning of the system operation yields at least 33% better performance for real time conditions, over the standard transmission method. |
10,203 | Please write an abstract with title: A 60 Channel PCM-ADPCM Converter, and key words: Telephony, Phase change materials, Bit rate, Frequency, Quantization, Telecommunications, Adaptive filters, Degradation, Information rates, Power generation economics. Abstract: Coding techniques based on adaptive linear prediction and quantization are well suited to signals carried by telephone channels and can provide, with a per channel rate of 32 kbits/s, a level of quality compatible with the specifications of the conventional 64 kbit/s rate. The ADPCM technique described in this paper features a simple adaptive quantization scheme and a tenth-order linear prediction adaptive filter realized as a cascade of five second-order sections. Besides superior performance characteristics, the nonaccumulation of degradations in tandem connections is achieved. The implementation is a 60 channel PCM-ADPCM converter, called TMN 162. It is a fully digital equipment which offers a doubling of the capacity of digital links in telephone networks. |
10,204 | Please write an abstract with title: Unsupervised Doppler Radar Based Activity Recognition for e-Healthcare, and key words: Feature extraction, Doppler radar, Principal component analysis, Data visualization, Activity recognition, Discrete cosine transforms, Unsupervised learning. Abstract: Passive radio frequency (RF) sensing and monitoring of human daily activities in elderly care homes is an emerging topic. Micro-Doppler radars are an appealing solution considering their non-intrusiveness, deep penetration, and high-distance range. Unsupervised activity recognition using Doppler radar data has not received attention, in spite of its importance in case of unlabelled or poorly labelled activities in real scenarios. This study proposes two unsupervised feature extraction methods for the purpose of human activity monitoring using Doppler-streams. These include a local Discrete Cosine Transform (DCT)-based feature extraction method and a local entropy-based feature extraction method. In addition, a novel application of Convolutional Variational Autoencoder (CVAE) feature extraction is employed for the first time for Doppler radar data. The three feature extraction architectures are compared with the previously used Convolutional Autoencoder (CAE) and linear feature extraction based on Principal Component Analysis (PCA) and 2DPCA. Unsupervised clustering is performed using K-Means and K-Medoids. The results show the superiority of DCT-based method, entropy-based method, and CVAE features compared to CAE, PCA, and 2DPCA, with more than 5%-20% average accuracy. In regards to computation time, the two proposed methods are noticeably much faster than the existing CVAE. Furthermore, for high-dimensional data visualisation, three manifold learning techniques are considered. The methods are compared for the projection of raw data as well as the encoded CVAE features. All three methods show an improved visualisation ability when applied to the encoded CVAE features. |
10,205 | Please write an abstract with title: IoT Based Smart Plant Irrigation System with Enhanced learning, and key words: Irrigation, Adaptation models, System performance, Data models, Mathematical model, Internet of Things, Regression tree analysis. Abstract: In this study, we propose a smart plant irrigation IoT system that autonomously adapts itself to a defined irrigation habit. The automated plant irrigation systems generally make decisions based on static models derived from the plant's characteristics. In contrast, in our proposed solution, irrigation decisions are dynamically adjusted based on the changing environmental conditions. The learning mechanism of the model reveals the mathematical connections of the environmental variables used in the determination of the irrigation habit and progressively enhances its learning procedure as the irrigation data accumulates in the model. We evaluated the success of our irrigation model with four different supervised machine learning algorithms and adapted the Gradient Boosting Regression Trees(GBRT) method in our IoT solution. We established a test bed for the sensor edge, mobile client, and the decision service on the cloud to analyze the overall system performance. The early results from our prototype system that is tested with two indoor plants; namely Sardinia and Peace-lily are very encouraging. The results reveal that the proposed system can learn the irrigation habits of different plants successfully. |
10,206 | Please write an abstract with title: Forest fire detection system based on Fuzzy Kalman filter, and key words: Fires, Forestry, Kalman filters, Data preprocessing, Fuzzy reasoning, Data integration, Program processors. Abstract: In large forest environment, the factors causing fire are uncertain and non-linear. If only use a single sensor to detect data or simply analyze the data collected by multiple sensors, the detection efficiency is low. In the process of forest fire detection, in order to detect the fire in the first time and fuse the multi-sensor data accurately, we propose a forest fire detection system based on Fuzzy Kalman filter. First of all, we integrate a variety of sensors and embedded processors together into a fire warning device, then we preprocess the collect data and input them into Kalman filter for filter fusion, carry out fuzzy reasoning on the probability of open flame and smoldering fire, and finally output the fire probability to judge whether the fire occur or not. |
10,207 | Please write an abstract with title: Fundamentals of Camera-PPG Based Magnetic Resonance Imaging, and key words: Electrocardiography, Cameras, Biomedical measurement, Magnetic resonance imaging, Forehead, Blood, Skin. Abstract: In Magnetic Resonance Imaging (MRI), cardiac triggering that synchronizes data acquisition with cardiac contractions is an essential technique for acquiring high-quality images. Triggering is typically based on the Electrocardiogram (ECG) signal (e.g. R-peak). Since ECG acquisition involves extra workflow steps like electrode placement and ECG signals are usually disturbed by magnetic fields in high Magnetic Resonance (MR) systems, we explored camera-based photoplethysmography (PPG) as an alternative. We used the in-bore camera of a clinical MR system to investigate the feasibility and challenges of camera-based cardiac triggering. Data from ECG, finger oximeter and camera were synchronously collected. Compared to finger-PPG, camera-based PPG provides a higher availability of the signal and the PPG marker delay relative to the ECG R-peak is considerably less with a camera monitoring the forehead. The insights obtained in this study provide a basis for an envisioned system-design phase. |
10,208 | Please write an abstract with title: Demonstration of Flexible Access in Rate-Adaptive Visible Light Communication System with Constellation Probabilistic Shaping, and key words: Artificial neural networks, Probabilistic logic, Visible light communication. Abstract: Distance-based rate-adaptive visible-light-communication system with probabilistic shaping is proposed and experimentally demonstrated. We achieved flexible access with the net data-rate from 1.84 to 3.27-Gbps for 20 and 1-meter distance, with maximum 28% overall capacity improvement. |
10,209 | Please write an abstract with title: Novel laser spectroscopy based on multi-wavelength and multi-stripe waveguided solid state dye laser, and key words: Solid lasers, Waveguide lasers, Spectroscopy, Solid state circuits, Spectral analysis, Optical arrays, Polymers, Absorption, Atomic beams, Atomic layer deposition. Abstract: Summary form only given. A novel scheme of laser spectroscopy is proposed and demonstrated based on a multi-wavelength dye laser array chip without wavelength scanning. An example is shown of the novel application, where the multi-wavelength output from the waveguided DFB dye laser is used which can be realized by fabricating a DFB structure with different wavelength on each waveguide. Generally the laser wavelength has to be scanned for the spectral analysis application. On the other hand, the proposed scheme with an all-solid-state polymer laser realizes a very fast and digital spectrum analysis without any spectral scan. Since the wavelengths of the waveguides can be programmed as needed, even a nonlinear spectral profile is also possible. A copolymer with rhodamine 6G was used as a core layer of the waveguide. For spectroscopy application, fifteen DFB waveguides were fabricated with a spectral pitch of 0.11 nm in the spectral region from 589.4 nm to 591.0 nm, which can cover the primary absorption D lines of sodium atom. The measurement of D lines using the multi-wavelength DFB dye laser integrated on a single chip has been demonstrated. |
10,210 | Please write an abstract with title: Reduced-Order Feedback Linearization for Independent Torque Control of a Dual Parallel-PMSM System, and key words: Torque, Stator windings, State feedback, Rotors, Inverters, State-space methods, Stability analysis. Abstract: Connecting two PMSMs in parallel to a 2-level 3-leg inverter gives a way to build up a high power-density driving system using existing electronic devices. But this type of system has a nature of nonlinearity that creates an obstacle in high performance control and the original system cannot be feedback-linearized directly. This article presents a reduced-order feedback-linearization method. In the first place, an extra order-reducing step that separates the system as a main system and an auxiliary system is applied. Then a feedback-linearization method is applied to the reduced-order system. With these effort, the original system can be converted into a linear time-invariant system bringing the controller design problem into the linear domain. In the last step, a linear robust state-feedback controller is used to achieve the speed control as well as compensate the unmeasurable external load torque. An extensive experiment is given to verify the feasibility and good performance in a highly unbalanced load torque situation of the designed controller. |
10,211 | Please write an abstract with title: Speculation of Forest Fire Using Spatial and Video Data, and key words: Fires, Forestry, Streaming media, Image color analysis, Temperature sensors. Abstract: Forest fire is a natural calamity which causes immense loss to the ecology. The high severity fire causes most loss to the vegetation. So this fire has to be detected within forest region in order to save vegetation. Currently frameworks are available with the image processing system which does analysis over the static forest fire image which provides information of fire hot spots. The fire motion/movement analysis with forest zone analysis is a challenging task with such static images. This problem can be solved with continuous monitoring of the fire with videos. Hence proposed framework provides novel forest fire flame movement analysis system based on spatiotemporal features using videos. |
10,212 | Please write an abstract with title: Research on Networking Technology of Digital Terrestrial Television Single Frequency Network, and key words: TV, Satellite broadcasting, IP networks, Optical transmitters, Radio transmitters, Clocks. Abstract: China has promulgated a national standard for digital terrestrial television (DTT) transmission systems in 2006. In order to save radio frequency resources effectively, the current DTT single frequency network (SFN) has been widely used. The successful establishing of DTT SFN requires the frequency, time, and bits synchronization, however, China has a vast territory, and the programs broadcast by TV stations in different places are different. Therefore, the DTT coverage network must take into account the coverage needs of national, provincial, prefecture-level, and county-level programs, which poses a challenge to local governments' successfully establishing DTT SFN. This paper studies the SFN construction in complex transmission interconnections. It is proposed to add a cyclic redundancy check (CRC) word in the second-frame initialization packet (SIP) to enhance its accuracy and a new empty packet format is proposed in the SFN adapter to increase the stability of the SFN transmission stream. In addition, the current methods and key technologies of using satellite links, Internet protocol (IP) fiber optic and microwave links, and coaxial cable links to transmit programs and construct DTT SFN in China is analyzed. Finally, experiments are conducted to verify the feasibility of the above methods. |
10,213 | Please write an abstract with title: Implementation of Computer Vision in Detecting Human Poses, and key words: Muscles, Software, Companies, Standards, Detectors, Information systems, Education. Abstract: Developing strong core muscles are important for children. Children with strong core muscles allow them to do any kinds of activities that mostly involve physical movement. The work tested on an education organisation that aims to strengthen core muscles by providing yoga-like poses. There are certified trainers that will coach the students along the way. However, mistakes could be made during the coaching because of different trainer's justification and whether the coaching processes were done correctly. Therefore, a solution is proposed to develop a computerized pose detector package which allows the trainers to improve the coaching with the students. The result is promising where the standardized pose could be implemented and compared to observed students' poses, however it is found that due to the uniqueness of the poses, it generates several unidentified results. |
10,214 | Please write an abstract with title: SCT: an approach for testing and configuring nanoscale devices, and key words: Nanoscale devices, Circuit testing, Nanowires, Electronic equipment testing, Integrated circuit interconnections, Switching circuits, Switches, Built-in self-test, Nanostructures, Assembly. Abstract: Molecular electronics-based devices are assumed to include at least 10 gate-equivalents/cm and defect densities as high as 10%; novel test strategies are necessary to efficiently test and diagnose these nanoscale devices. Configuration time, test time and defect map size are among the major challenges for these new devices. In this paper, we propose a new approach that simultaneously configures and tests nano devices. A new built-in self-test (BIST) scheme for testing and defect tolerance of nanoscale devices is proposed. The proposed procedure is based on testing reconfigurable nanoblocks at the time of implementing a function of a desired application on that block. This simultaneous configuration and test (SCT) procedure considerably reduces the test and configuration time. It also eliminates the need for storing the location of the defects in the defect map on/off-chip. The presented probabilistic analyses results show the effectiveness of this process in terms of test and configuration time for architectures with rich interconnect resources |
10,215 | Please write an abstract with title: Weighted Response Time Algorithm for Web Server Load Balancing in Software Defined Network, and key words: Costs, Software algorithms, Web and internet services, Load management, Throughput, Web servers, Time factors. Abstract: Large number of internet accesses in recent years has caused some network services to require a load balancing scheme. Software-Defined Network (SDN) offers a solution for load balancing on a traditional network that requires a lot of costs. One of the load balancing algorithms on SDN discussed in previous research is the server's response time-based algorithm, but this algorithm does not count the specifications of the server. Meanwhile, in the real implementation of internet services, it is possible if the servers used have different specifications. Therefore, in this study, a weighted response time algorithm is proposed. This algorithm divides the server load based on the ratio of response time and weight values that represent server specifications. In the weighted response time algorithm, client requests are directed to the server with the lowest ratio of weight and response time values. The results of this study showed that a network that implemented a weighted response time algorithm requires less response time and produces better throughput than a network with the previous algorithm, namely response time-based algorithms. Based on testing, a network with a weighted response time algorithm requires the lowest response time of 2.17 ms and resulting highest throughput of 100.70 KB/s. |
10,216 | Please write an abstract with title: Memory Linked Anomaly Metric Learning of Thermography Rail Defects Detection System, and key words: Rails, Feature extraction, Cameras, Surface cracks, Testing, Training, Fatigue. Abstract: With the development of railway, high speed and intensive rolling will significantly increase the probability of fatigue damage and they lay a hidden danger for major safety accidents. Therefore, it is vital to detect defects of the rail. The commonly used algorithms mostly trained with the defect samples whereas this data is rare and cannot cover all types of defects. On the contrary, the background samples are relatively easy to obtain. In this work, a new algorithm is proposed which models the background of rail samples with memory items in order to exploit the full use of the background information. The samples that do not fit with the models are considered as defect candidates. Our model is only trained with the normal samples and a small amount of defect samples. When new patterns occur, they will be considered as defect candidates and the model is not limited to the known defect patterns. Additionally, the proposed metric learning modules enable the model to learn representative memory items, and enlarges the feature space distance between defect and normal samples as well as reducing the influence of disturbance. In order to show the efficacy of the proposed algorithm, it has been validated with various types of rail defects, ranging from the visually apparent defects to visually weak defects. In the experiments, the thermography inspection system scans at a constant speed while inductively heats the rail tracks continuously to record the infrared thermal image sequences from the rail surface. Recent anomaly detection algorithms are used as platform for objective performance evaluation. The algorithms are evaluated quantitatively based on Area under ROC curve (AUC) at both image level and pixel level along with the visual comparative analysis. |
10,217 | Please write an abstract with title: Optimal Sampling for Data Freshness: Unreliable Transmissions With Random Two-Way Delay, and key words: Delays, Information age, Reliability, Real-time systems, Noise measurement, Mathematical models, IEEE transactions. Abstract: In this paper, we aim to design an optimal sampler for a system in which fresh samples of a signal (source) are sent through an unreliable channel to a remote estimator, and acknowledgments are sent back over a feedback channel. Both the forward and feedback channels could have random transmission times due to time varying channel conditions. Motivated by distributed sensing, the estimator can estimate the real-time value of the source signal by combining the signal samples received through the channel and the noisy signal observations collected from a local sensor. We prove that the estimation error is a non-decreasing function of the Age of Information (AoI) for the received signal samples and design an optimal sampling strategy that minimizes the long-term average estimation error subject to a sampling rate constraint. The sampling strategy is also optimal for minimizing the long-term average of general non-decreasing functions of the AoI. The optimal sampler design follows a randomized threshold strategy: If the last transmission was successful, the source waits until the expected estimation error upon delivery exceeds a threshold and then sends out a new sample. If the last transmission fails, the source immediately sends out a new sample without waiting. The threshold is the root of a fixed-point equation and can be solved with low complexity (e.g., by bisection search). The optimal sampling strategy holds for general transmission time distributions of the forward and feedback channels. Numerical simulations are provided to compare different sampling policies. |
10,218 | Please write an abstract with title: Thermal wavelength shifts with Q-switched diode-pumped Yb:KGW, and key words: Diodes, Slabs, Temperature dependence, Pulse amplifiers, Ytterbium, Solid lasers, Absorption, Bandwidth, Optical amplifiers, Semiconductor process modeling. Abstract: Low duty cycle Q-switch pulses of 28 mJ are demonstrated in diode-pumped Yb:KGW crystal. Furthermore we demonstrate that free running wavelength of Yb:KGW depends on crystal temperature. |
10,219 | Please write an abstract with title: Nonlinear Control Design for Voltage Source Converters in Weak AC Grids, and key words: Sensitivity, Control design, Power system stability, Stability analysis, Feedback linearization, Power conversion, Impedance. Abstract: Massive integration of converter-based renewable energy sources into power systems through weak AC grid has become a dilemma in recent years. This paper investigates the design of a robust nonlinear multi-input-multi-output (MIMO) controller for voltage source converters (VSCs) connected to weak AC grids. Feedback linearization method is used to find the controller equations and design the inputs to regulate the active power and output voltage of the converter. With this approach, the controller is designed in a way that the grid impedance impact on the stability of the converter system is significantly reduced. The robustness of the proposed controller is evaluated using time-domain simulations of a grid-connected VSC enhanced with the nonlinear controller in various case studies. The results illustrate a significant improvement compared to existing approaches. |
10,220 | Please write an abstract with title: Numerical Studies on Antiresonant Waveguide Assisted Metasurface and Its Application, and key words: Optical waveguides, Metasurfaces, Electromagnetic waveguides, Optical fibers, Silicon, Optical fiber polarization, Optical polarization. Abstract: The growth of the nanotechnology and intense studies on subwavelength nanophotonics has facilitated research in the field of metamaterials and metasurfaces. Optical waveguides has been a proper platform for metasurface applications because of its versatility and numerous infrastructure. In this paper, a metasurface interconnection method via attaching antiresonant waveguide is introduced. The antiresonant waveguide allows all-waveguide type inline metasurface schematic. Numerical calculations verified that the antiresonant fiber is capable of metasurface interconnection. In addition, an inline optical transmission modulator has been proposed by filling liquid crystal inside the hollow region. A liquid crystal device with on- state transmittance of 93.64%, and off-state transmittance of 0.96% with a smooth transient region are achieved. |
10,221 | Please write an abstract with title: A Broadband, Solid State Millimeter-Wave Synthesizer, and key words: Solid state circuits, Oscillators, Bandwidth, Frequency synthesizers, Phase noise, Gunn devices, Klystrons, Delay, Phase locked loops, Transfer functions. Abstract: A microprocessor controlled, low noise, millimeter-wave IMPATT frequency synthesizer has been developed. The IMPATT is phase locked to a crystal reference and covers greater than a 10 GHz band. |
10,222 | Please write an abstract with title: Burn scar detection in southern Africa using a bi-directional reflectance model based approach, and key words: Africa, Bidirectional control, Reflectivity, Change detection algorithms, Spatial resolution, Satellites, Remote sensing, Testing, Signal resolution, MODIS. Abstract: A new generic approach to change detection is presented. Applicable to high temporal and moderate spatial resolution satellite data, the method identifies the location, the start and the duration of surface change. The algorithm described exploits the information content of the remote sensing signal as a result of angular variations, and employs a statistical measure to differentiate between short term and persistent surface change. In the context of the current research, the algorithm has been applied to the detection and mapping of burned areas, and has been tested on high temporal resolution MODIS data for an area of southern Africa for the 2001 burn season. |
10,223 | Please write an abstract with title: Robust and Accurate Multi-Agent SLAM with Efficient Communication for Smart Mobiles, and key words: Simultaneous localization and mapping, Mobile agents, Collaboration, Estimation, Packet loss, Bandwidth, Robustness. Abstract: In a long-term large-scenario application, the multi-agent collaborative SLAM is expected to improve the robustness and efficiency of executing tasks for mobile agents. In this paper, a multi-agent collaborative visual-inertial SLAM system is proposed based on a centralized client-server (CS) architecture, where the clients run on smart mobiles. In general, multi-agent collaborative SLAM relies on robust and precise experience sharing and efficient communication among agents. The experience sharing requires the place recognition with a high recall and accuracy, the precise estimation of transformation between looping frames, and the map fusion with globally consistency. To this end, we devise an enhanced geometric verification, a re-projection optimization based on the error-aware weighting strategy, and a strategy of flexible fusion to meet these requirements. In addition, the multi-agent collaborative SLAM needs to exchange abundant information, which requires the efficient communication. Therefore, we design a CS collaborative loop detection mechanism which is more robust to network transmission. We perform extensive experiments on the EuRoc dataset and in real environments. Experimental results show that the proposed system achieves better results than state-of-the-art methods. Furthermore, we demonstrate the stability of the proposed collaborative SLAM in real environments with a bandwidth of 7.55Mbps. |
10,224 | Please write an abstract with title: Pairs of Pilots Design for Preamble-Based Channel Estimation in OQAM/FBMC Systems, and key words: Interference, Channel estimation, Time-frequency analysis, Optimization, OFDM, Wireless communication, Prototypes. Abstract: In this letter, we propose an improved pairs of pilots (POP) design method for channel estimation in offset quadrature amplitude modulation based filter bank multicarrier (OQAM/FBMC) systems. Based on an error analysis of the conventional POP channel estimation method, we first develop a heuristic pilot design in which each pilot pair is inserted at two consecutive subcarriers. Besides, we further propose to build a preamble by quartet of subcarriers and conduct a pilot optimization subject to a pilot power constraint, aiming to suppress the noise effect as much as possible. To obtain its optimal solution, we convert the original non-convex pilot optimization problem into a convex semidefinite programming problem, which is shown to be computationally efficient and readily solvable. Numerical simulations validate the effectiveness and superiority of the proposed pilot design method compared to the conventional POP and interference approximation methods. |
10,225 | Please write an abstract with title: Comparing Machine Learning Techniques for Zeek Log Analysis, and key words: Training, Resistance, Analytical models, Training data, Intrusion detection, Machine learning, Organizations. Abstract: Network logs from intrusion detection and prevention systems such as Zeek provide a plethora of information to help network analysts identify malicious activity. However, the volume of data collected necessitates an automated way to filter it. Traditional signature-based “misuse detection” is unable to detect previously unseen malicious activity. In contrast, machine learning methods can suggest classifying network activity as normal or malicious by learning hard-to-define patterns that discriminate between the two classes. Previous work has applied a variety of machine learning techniques to this problem with some success, but the proprietary nature of real-world data often makes accurately comparing the performance of different techniques impossible. In this paper, we compare the performance of eight machine learning models on the same real-world dataset comprised of HTTP log data gathered over six months from an enterprise network. Our experiments show that, when trained and tested on the same data, <tex>$k$</tex> Nearest Neighbors results in 90.3% accuracy and outperforms the others in several ways. |
10,226 | Please write an abstract with title: Learning a Tree-Structured Channel-Wise Refinement Network for Efficient Image Deraining, and key words: Fuses, Stacking, Neural networks, Network architecture, Feature extraction, Inference algorithms, Decoding. Abstract: Significant advances have been made in image deraining due to the use of kinds of deep neural networks. However, existing deep neural network-based methods usually contain significant abundant network parameters and thus leads to expensive computation cost, which limits the application of deraining technology in high-level vision tasks. In this paper, we propose a compact and flexible Tree-structured Channel-wise Refinement Block (TCRB) for efficient image deraining, which contains augmentation, refinement, and aggregation modules to better explore features. Specifically, the refinement module can progressively extract groups of more discriminative features from the channel augmented inputs, and then the aggregation module adaptively fuses features from the refinement module to preserve image details by leveraging the Enhanced Channel Attention (ECA) method. Moreover, we present a Tree-structured Channel-wise Refinement Network (TCRN) by stacking multiple TCRBs, which could achieve competitive performance as the complicated networks. We embed the TCRB into a Multi-scale Tree-structured Channel-wise Refinement Network (MTCRN) based on an encoder and decoder network architecture and show that it performs favorably against state-of-the-art deraining algorithms on both synthetic datasets and real-world rainy images, while reaching a better trade-off in terms of model parameters and inference time. |
10,227 | Please write an abstract with title: Discovery of Prokaryotic Relationships through Latent Structure of Correlated Nucleotide Sequences, and key words: Sequences, Genomics, Bioinformatics, Organisms, Phylogeny, Genetics, Proteins, DNA, Artificial intelligence, Information retrieval. Abstract: This paper describes an application of statistical techniques that have yielded fruitful results in many fields including artificial intelligence and information retrieval to the problem of establishing relationships among organisms. A combination of these techniques constitutes a new method of comparing organisms based on their whole genomic sequences. The method represents genomes as sets of short overlapping nucleotide subsequences and employs latent structure modeling to capture correlations in the observed patterns of their distribution. Factor scores computed to measure the correlations serve as the input to a Ward’s hierarchical cluster analysis method, which produces a tree of their relationships. The runtime results indicate that this method allows for the fast and efficient comparison that scales well as the number of organisms increases. |
10,228 | Please write an abstract with title: Mathematical Model of the Lifting Working Mode of a a Mobile Platform with Hydraulic Drive, and key words: Analytical models, Phase measurement, Hydraulic drives, Oils, Energy measurement, Ordinary differential equations, Bladder. Abstract: The paper presents the mathematical model of the hydraulic drive of a mobile platform. The mobile platform hydraulic drive is designed to work with saving and reuse of energy by introducing in the hydraulic system of a hydraulic bladder accumulator and a hydraulic pressure amplifier. The mathematical model refers only to the lifting operating phase of the mobile platform where the accumulator is no active in the driven system. The aim of the paper is to find analytical solutions in the design of the lifting platform hydraulic system. The experimental measurements made it in the lifting phase are used to identify the parameters used in the model. |
10,229 | Please write an abstract with title: Surface micromachined fabrication of piezoelectric AlN unimorph suspension devices for rf resonator applications, and key words: Fabrication, Piezoelectric devices, Sputtering, Piezoelectric films, Micromachining, Aluminum nitride, Thin film devices, Piezoelectric actuators, Chromium, Electrodes. Abstract: We report a surface micromachining process for aluminum nitride (AlN) thin films to fabricate piezoelectric unimorph suspension devices for actuator applications. Polysilicon is used as a structural layer. Highly c-axis oriented AlN thin films 1 /spl mu/m thick are deposited by rf reactive sputtering. Thin layers of chromium on either side of the AIN are used as top and bottom electrodes and also used as a mask to etch the AlN layer. Scattering parameters are measured in fabricated samples using a vector network analyzer. Results show resonant frequencies of devices in the range of (1-2) GHz with an effective electromechanical coupling factor K/sup 2//sub eff/ /spl ap/ 1.7 %. |
10,230 | Please write an abstract with title: Investigation of blind source separation methods for extraction of fetal ECG, and key words: Blind source separation, Electrocardiography, Skin, Electrodes, Biomedical measurements, Source separation, Algorithm design and analysis, Noise robustness, Additive white noise, Signal to noise ratio. Abstract: Extraction of fetal electrocardiogram (FECG) from maternal skin electrode measurements needs a robust technique. This problem can be modeled from the perspective of blind source separation (BSS) and so the problem reduces to the estimation of the independent sources of fetal and maternal cardiac activity. In this paper, analysis and study of some major algorithms like Bell and Sejnowski's infomax algorithm, Cardoso's joint approximate diagonalization of eigen matrices (JADE) algorithm, Hyvarinen's fixed-point algorithm and Comon's algorithm, was made for this important biomedical application. For robustness, two scenarios, i.e, (a) different amplitude ratios of simulated maternal and fetal ECG and (b) different values of additive white Gaussian noise, were investigated. It was observed that if the ratio of the amplitude of maternal to fetal ECG is 10:1 with an input SNR of 2 dB, all four algorithms were able to extract the fetal ECG. The signal-to-error (SER) ratios of the extracted maternal and fetal ECG were around 3 dB and 1 dB, respectively. |
10,231 | Please write an abstract with title: Resource reservation in call admission control schemes for CDMA systems with non-uniform traffic distribution among cells, and key words: Call admission control, Multiaccess communication, Telecommunication traffic, Multimedia communication, Multimedia systems, Wireless communication, Bandwidth, Communication system control, Control systems, Sun. Abstract: In this paper, we propose the reservation type call admission control (CAC) scheme for CDMA systems with non-uniform traffic distribution among cells to resolve the intercell unbalanced traffic problem. Differently from a conventional CAC scheme where the system resource is fully allocated to the local users in home cell, the proposed CAC scheme reserves small portion of the system resource for new calls occurring in the neighboring cells instead of fully allowing the local users in home cell to occupy the system resource. As a result, the proposed CAC scheme improves the overall call blocking probability when traffics are non-uniformly distributed among cells. More specifically, the proposed CAC scheme improves the overall call blocking probability by 15% when one cell has 67% more traffic than its surrounding cells. |
10,232 | Please write an abstract with title: Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis, and key words: ISO Standards, IEC Standards, Information security, Standards organizations, Organizations, Environmental management. Abstract: In the light of digitalization and recent EU policy initiatives, information is an important asset that organizations of all sizes and from all sectors should secure. However, in order to provide common requirements for the implementation of an information security management system, the internationally well-accepted ISO/IEC 27001 standard has not shown the expected growth rate since its publication more than a decade ago. In this article, we apply web mining to explore the adoption of ISO/IEC 27001 through a series of 2664 out of more than 900 000 German firms from the Mannheim Enterprise Panel dataset that refers to this standard on their websites. As a result, we present a ``landscape'' of ISO/IEC 27001 in Germany, which shows that firms not only seek certifications themselves but often refer on their websites to partners who are certified instead. Consequently, we estimate a probit model and find that larger and more innovative firms are more likely to be certified to ISO/IEC 27001 and that almost half of all certified firms belong to the information and communications technology (ICT) service sector. Based on our findings, we derive implications for policy makers and management and critically assess the suitability of web mining to explore the adoption of management system standards. |
10,233 | Please write an abstract with title: Predictive Stator Current Control of a Five-Phase Motor Using a Hybrid Control Set, and key words: Torque, Stator windings, Mathematical models, Harmonic analysis, Voltage control, Rotors, Predictive control. Abstract: Finite state model predictive control (FSMPC) of multiphase drives can use an extra number of inverter configurations compared with the three-phase case. This, however, requires more computing power for the optimization phase. The application time of each selected voltage vector (VV) is then increased, which can result in higher harmonic content. Reducing the allowed VVs can speed up the computations, thus ameliorating the current tracking/regulation in different orthogonal subspaces. However, the flexibility offered by the reduced set of VVs is less than that of the full set. Furthermore, a lower sampling time can result in an increase in the switching frequency, especially for some speed-load combinations. This article proposes the use of a hybrid scheme where the set of allowed VVs is not fixed but rather selected on-line according to the actual speed and torque producing stator current which are computed by the outer loop. A five-phase induction machine (IM) is used as a test bed for the proposal, showing improved results with respect to the nonhybrid case. |
10,234 | Please write an abstract with title: The comparison of forecasting analysis based on the ARIMA-LSTM hybrid models, and key words: Temperature measurement, Analytical models, Temperature distribution, Predictive models, Market research, Data models, Electronic commerce. Abstract: For ARIMA-LSTM hybrid model, it can be mixed in different ways. Because ARIMA model can be separated into three parts: trend, seasonality, and residuals. One way is that using LSTM model to forecast residuals of ARIMA model, while another way is that using LSTM model to forecast seasonality and residuals of ARIMA model, RMSE, MAE, MAPE are used to measure the fit of two different ARIMA-LSTM hybrid models with the data of 2010–2020 Shenzhen maximum temperature every 3 hours. In result, it is concluded that using LSTM model to forecast residuals of ARIMA model is a better way to forecast than another |
10,235 | Please write an abstract with title: Step-by-step system construction technique with assurance technology-evaluation measure for step-by-step system constructioni, and key words: Application software, System testing, Information processing, Control systems, Business, Maintenance, Phase measurement, Buildings, Transportation, Distributed computing. Abstract: Recently the system needs of growing systems including heterogeneous functions and operations have increased. An assurance system that achieves high reliability and high availability is very important for such systems. In order to realize a high assurance system, we researched the step-by-step construction technique with assurance technology. In this paper we mainly discuss the evaluated measure for step-by-step construction. Functional reliability and online functional availability are the best measures for deciding the order of step-by-step system construction. According to the measure, functional group construction is the best solution. |
10,236 | Please write an abstract with title: Control of a multilevel converter using resultant theory, and key words: Pulse width modulation inverters, Voltage, Switching converters, Traction motors, Pulse width modulation, Variable speed drives, Harmonic analysis, Fuel cells, Vehicle driving, Switches. Abstract: In this work, a method is given to compute the switching angles in a multilevel converter to produce the required fundamental voltage while at the same time cancel out specified higher order harmonics. Specifically, a complete analysis is given for a seven-level converter (three dc sources), where it is shown that for a range of the modulation index m/sub I/, the switching angles can be chosen to produce the desired fundamental V/sub 1/=m/sub I/(s4V/sub dc///spl pi/) while making the fifth and seventh harmonics identically zero. |
10,237 | Please write an abstract with title: Location-Aware Reinforcement Learning-Based Live Virtual Machine Migration in Fog Computing, and key words: Live virtual machine migration, reinforcement learning (RL), zones, heterogeneity, homogeneity. Abstract: One of the most existing problems in live virtual machine migration in a fog environment is the type of devices. The studies assume that all fog nodes in the fog layer are homogeneous and dedicated to fog functionality. However, fog nodes can be implemented over different types of devices (routers, switches, servers, etc.). They are naturally heterogeneous and originally erected to do specific functions. This would create an issue while migrating the virtual machines. Appropriate destinations should be chosen before the migration to avoid any delay in accomplishing the time-critical tasks and to increase the success rate of migrations. Further, fog nodes are location-aware devices. This feature needs to be incorporated while modeling any VM migration solution. To address these challenges, we propose a novel approach to live VM migration in a fog environment that employs Reinforcement Learning (RL). Extensive experiments show that our approach significantly reduces the latency of time- critical applications. Our proposed system, called EVM_MIG, outperforms other models in terms of reduced latency by approximately 50% and this proved that considering device type, function, and location in deciding VM migration in a fog environment can effectively reduce the response time in time- critical applications. |
10,238 | Please write an abstract with title: Diagnosing Musculoskeletal Disorders from Shoulder Radiographs Using Deep Learning Models, and key words: Deep learning, Musculoskeletal system, Analytical models, Sensitivity, Shoulder, Medical services, Data models. Abstract: In recent years, exploring how Artificial Intelligence, especially deep learning algorithms, may be used to analyse healthcare data has become crucial. Deep learning can be employed for assisting the doctor and supplementing the process of diagnosing diseases. Early diagnosing of the problems of the shoulder, a vital body part will be useful to manage or solve the shoulder pain with efficacy. Our study has utilized deep learning to diagnose abnormalities from radiographs of the upper extremity, specifically the shoulder. The abnormality in the shoulder has been detected from the radiographs of the shoulder using four pre-trained Convolutional neural networks (CNN) models such as VGG-16, DenseNet-201, ResNet-50, and EfficientNet-B1. We have also calculated the accuracy, precision, recall, specificity, sensitivity, Flscore, and area under the receiver operating characteristic (AUROC). Shoulder radiographs from the MURA dataset were used to test the four CNN models. From the experiments conducted, both ResNet-50 and VGG-16 had the maximum accuracy of 81%; ResNet50 had the best AUC score of 0.74 and it outperformed the other three models. |
10,239 | Please write an abstract with title: A routing algorithm for irregular channel based on MD model, and key words: Routing, Pins, Wire, Delay, Fabrication, Art, Greedy algorithms. Abstract: It is well known that non-Manhattan channel routing always gives a better result than that yielded from a Manhattan router in a given channel. The paper proposes a new greedy non-Manhattan channel routing algorithm based on a Manhattan-diagonal (MD) model. The router uses h track for any channel without cyclic vertical constraints, and d<h<d+1, where d is the channel density. The proposed algorithm is able to deal with both the regular and irregular channel routing cases, and can further be extended to handle the L-shaped channel, where the irregular channel and L-shaped channel often occur in a BBL layout. The effectiveness of the algorithm is verified by some examples. |
10,240 | Please write an abstract with title: Dictionary Learning With Low-Rank Coding Coefficients for Tensor Completion, and key words: Tensors, Encoding, Transforms, Dictionaries, Discrete Fourier transforms, Machine learning, Electron tubes. Abstract: In this article, we propose a novel tensor learning and coding model for third-order data completion. The aim of our model is to learn a data-adaptive dictionary from given observations and determine the coding coefficients of third-order tensor tubes. In the completion process, we minimize the low-rankness of each tensor slice containing the coding coefficients. By comparison with the traditional predefined transform basis, the advantages of the proposed model are that: 1) the dictionary can be learned based on the given data observations so that the basis can be more adaptively and accurately constructed and 2) the low-rankness of the coding coefficients can allow the linear combination of dictionary features more effectively. Also we develop a multiblock proximal alternating minimization algorithm for solving such tensor learning and coding model and show that the sequence generated by the algorithm can globally converge to a critical point. Extensive experimental results for real datasets such as videos, hyperspectral images, and traffic data are reported to demonstrate these advantages and show that the performance of the proposed tensor learning and coding method is significantly better than the other tensor completion methods in terms of several evaluation metrics. |
10,241 | Please write an abstract with title: Minimizing power consumption in scan testing: pattern generation and DFT techniques, and key words: Energy consumption, Power generation, Test pattern generators, Design for testability, Production, Power demand, Clocks, Logic testing, Lifting equipment, Instruments. Abstract: It is a well-known phenomenon that test power consumption may exceed that of functional operation. ICs have been observed to fail at specified minimum operating voltages during structured at-speed testing while passing all other forms of test. Methods exist to reduce power without dramatically increasing pattern volume for a given coverage. We present case study information on ATPG- and DFT-based solutions for test power reduction. |
10,242 | Please write an abstract with title: Horizontal sea surface temperature gradients: MODIS satellite observations versus Reynolds analysis, and key words: Ocean temperature, Sea surface, MODIS, Satellite broadcasting, Instruments, Image analysis, Temperature sensors, Interpolation, Atmosphere, Atmospheric measurements. Abstract: This study compares horizontal gradients of sea surface temperature (SST) observed by the Moderate Resolution Imaging Spectroradiometer (MODIS) instrument onboard of Terra satellite with those in the Reynolds analysis. Large differences exists in the horizontal gradients between the two SST products, suggesting that existing surface heat balance analyses based on the Reynolds SST analysis is inaccurate. Impact of the inaccuracies on the surface heat balance of the equatorial Pacific region during 2001-02 is estimated. Sensitivity of the SST horizontal gradients with respect to the grid resolution of the data is also studied and the importance of horizontal diffusion in surface heat balance of the coarse-resolution grid is suggested. |
10,243 | Please write an abstract with title: Improving Weakly Supervised Object Localization by Uncertainty Estimation of pseudo supervision, and key words: Location awareness, Training, Uncertainty, Conferences, Neural networks, Estimation, Noise measurement. Abstract: Pseudo bounding box supervision is a promising approach for weakly supervised object localization (WSOL) with only image-level labels. However, the generated pseudo bounding boxes may be inaccurate or even completely non-overlapped with the objects of interest. In this paper, we propose to estimate the uncertainty of pseudo bounding boxes such that the negative impact caused by inaccurate estimation of pseudo supervision could be alleviated for better WSOL. The refined bounding boxes and corresponding variance uncertainties are learned by training a neural network regressor to penalize the erroneous estimations. To the best of our knowledge, this is the first work to incorporate uncertainty information of pseudo bounding boxes for WSOL. Experimental results show that our method not only outperforms previous state-of-the-art methods in CUB-200-2011 and ILSVRC datasets but also gives more precise bounding box prediction when the IoU threshold is higher. |
10,244 | Please write an abstract with title: Transient analysis of grounding electrodes using pocket calculator, and key words: Transient analysis, Grounding, Electrodes, Frequency, EMTP, Transient response, Power system transients, Electromagnetic transients, Distributed parameter circuits, Soil. Abstract: Grounding electrodes, being the basic component of any grounding system, need to be accurately modeled in transient analysis. Accurate determination of their impulse response has been the objective of many studies in the past. This work presents a novel and easy-to-apply methodology, based on a distributed model of the electrode. In the middle stages, closed-form mathematical expressions are used for the solution of telegraphy equations that describe the propagation of voltage and current waves along the electrode. The final expressions include few terms, so they are suitable for calculations using a pocket calculator. Comparison of results to those from EMTP for fast and slow excitation show good agreement. The performance of the method is investigated at various application cases. Validation of the proposed methodology is achieved in particular cases by comparison with calculation results available in literature. |
10,245 | Please write an abstract with title: An efficient FPGA overlay for MPI-2 RMA parallel applications, and key words: Productivity, Software algorithms, Computer architecture, Feature extraction, Software, Hardware, IP networks. Abstract: Design productivity issues, including difficult hardware design and long compile times, are major barriers to the widespread adoption of FPGA-based accelerations in main-stream computing. Enabling virtualized execution of software and hardware tasks on FPGA platforms make them more accessible would to application developers accustomed to software API abstractions such as MPI and fast development cycles. In this work, we show that the MATIP platform provides a viable and efficient FPGA overlay architecture for the design of MPI parallel applications. We support this with a parallel model implementation of a feature extraction algorithm for tone language recognition, which is shown to be at least 7 times more efficient than a C++ MPI-2 RMA implementation of the same parallel model on a CPU and almost 3 times more efficient than a naive FPGA IP implementation. |
10,246 | Please write an abstract with title: Real-Time Outdoor Air Quality Monitoring System, and key words: Smart cities, Air pollution, Real-time systems, Sensor systems, Mobile applications, Solar system, Indexes. Abstract: Air pollution has harmed human health as a human cannot live without breathing. Even more worrying is that air pollution seems to be increasing day by day due to man-made pollution or natural pollution like a massive forest fire. Due to no real-time monitoring device being implemented, the authorities are unaware of the real-time conditions of air quality. Therefore, this project is aimed to give real-time air quality and location data by designing and developing a portable device and mobile app capable of producing and broadcasting real-time Air Pollutant Index (API) and GPS coordinates. In this work, various air pollutant gases and problems of the present air quality monitoring system have been reviewed. Two different pollutant gas sensors, i.e., Carbon Monoxide (CO) and Nitrogen Dioxide (NO2) sensors, and NEO-6M Global Positioning System (GPS) module, have been proposed. Air Pollutant Index (API) value and location data are determined by the system and uploaded to the cloud database. The developed mobile app retrieves the data, and anyone with the mobile app can get information about the location and its air quality in real-time. The system has been tested at two different places, and the results were compared with existing air-quality websites that were available online. Results showed that the system provides a 92.3% accuracy that is 5.1% more accurate than other systems. The proposed system could provide an important building block for smart city development. |
10,247 | Please write an abstract with title: Integrating cache coherence protocols for heterogeneous multiprocessor systems. 1, and key words: Multiprocessing systems, Embedded system, Real time systems, Design methodology, Operating systems, Access protocols, GSM, Baseband, Large-scale systems, Communication networks. Abstract: This systematic methodology maintains cache coherency in a heterogeneous shared-memory multiprocessor system on a chip. It works with any combination of processors that support any invalidation-based protocol, and experiments have demonstrated up to a 51 percent performance improvement, compared to a pure software solution. |
10,248 | Please write an abstract with title: Exact estimations of empirical risk bias for discrete feature, and key words: Robustness, Loss measurement, State estimation, Error probability, Multidimensional systems, Data mining, Pattern recognition, Artificial intelligence, Virtual colonoscopy, Erbium. Abstract: The work is devoted to a problem of statistical robustness of deciding functions, or risk estimation. By risk we mean some measure of decision function prediction quality, for example, an error probability. For the case of discrete "independent" variable the dependence of average risk on empirical risk for the "worst" distribution ("strategies of nature") is obtained. The result gives exact value of empirical risk bias that allows evaluating an accuracy of Vapnik-Chervonenkis risk estimations. To find a distribution providing maximum of empirical risk bias one need to solve an optimization problem on function space. The problem being very complicate in general case appears to be solvable when the "independent" feature is a space of isolated points. The space has low practical use but it allows scaling well-known estimations by Vapnik and Chervonenkis. A heuristic approach for using the obtained results for estimating a quality of deciding functions in general case (multidimensional space of discrete and continuous features) is also suggested. |
10,249 | Please write an abstract with title: Self-pumped wide range wavelength converter, and key words: Bragg gratings, Semiconductor optical amplifiers, Fiber gratings, Optical fiber polarization, Optical wavelength conversion, Wavelength conversion, Stimulated emission, Optical pumping, Optical refraction, Optical variables control. Abstract: A new broadband orthogonal pump (BOP) four wave mixing (FWM) wavelength conversion scheme was demonstrated. The implemented set up shown conversion efficiencies higher than -20 dB and with less than 3 dB variation, for different conversion wavelengths. It is also more stable and cost effective when comparing to other BOP FWM wavelength conversion techniques, due to the reduction of the number of devices needed. The tunability of the HiBi fibre ring cavity Bragg grating structure (FBGS) along with the bit-error rate measurements for this wavelength converter is under investigation and will be reported. |
10,250 | Please write an abstract with title: Exploring Design Attributes and Development of an Acoustic VR Game to Improve Ethical Values of Visually Impaired People, and key words: Ethics, Visualization, Databases, Conferences, Games, Virtual reality, Particle measurements. Abstract: Despite having a strong desire to understand and mix up with the normal flow in a society, visually impaired people lack the required knowledge of ethical values due to their visual limitations. The objective of this research is to develop an acoustic virtual reality (VR) game to improve the ethical values of visually impaired people. To achieve this objective, user requirements are collected using a semi-structured interview approach. Then, an android based acoustic and interactive VR game is developed using android studio and cloud database. Finally, an evaluation study is conducted involving visually impaired users to validate the performance of the game by measuring the effectiveness and efficiency of the game along with the satisfaction of the users. Evaluation study reveals a moderate effectiveness and efficiency score of the developed game while 87% of participants like to recommend the game to other users. The developed game is expected to be very useful to improve the ethical values of visually impaired people and provide them with the knowledge for better situational awareness. |
10,251 | Please write an abstract with title: Research on Spam Web Page Detection Based on Unbalanced Data Processing, and key words: Ranking (statistics), Computer science, Correlation, Web pages, Optimization methods, Training data, Search engines. Abstract: Most Internet users are used to paying attention to a few websites with the top ranking of search engines. According to statistics, 95% of users are only interested in the search results of the first five pages, and a large number of websites with the lower ranking are selectively ignored by users. The purpose of this paper is to make use of the discrimination results of multiple classifiers, and build an effective combination classifier for spam web page recognition from several aspects such as feature selection, feature segmentation and classifier difference measurement. The new two-view features are combined in different ways to generate single-view data, and this set of data is used as training data to construct classification algorithm. Experimental results show that the proposed method can effectively identify illegal publishers who commit fraudulent clicks, and meet the requirements of click fraud detection in online advertising. |
10,252 | Please write an abstract with title: Design of a Planar Array of Microstrip Antennas with Reduced Mutual Coupling for Medical Imaging, and key words: microwave breast imaging, microstrip antenna, microstrip array, multiband, mutual coupling. Abstract: This paper introduces a design of planar array of multiband microstrip antennas for purposes of medical microwave imaging. The target application is breast microwave tomography. The proposed array achieves low level mutual coupling between its elements which is an important parameter for signal integrity during imaging process. Measurements done in the near field regions as in the case of medical imaging are affected greatly by the elements mutual coupling. The proposed array satisfies that requirement. The achieved low coupling level is reached through suitable orientation of each individual element and a wise choice of elements separation and array geometry. |
10,253 | Please write an abstract with title: A traveling wave fault location system based on wavelet transformation, and key words: Fault location, Wavelet transforms, Power transmission lines, Relays, Time-frequency analysis, Circuit faults. Abstract: Fast and accurate location of faults on long transmission lines is essential for modern grid. In this paper, a double-ended traveling wave fault location system based on FPGA and DSP is designed as a plugin to be integrated into the protection relays. Traveling wave signal is captured from the existing sampling circuit of the protection relays and fault location is achieved using wavelet transformation. Simulation data generated by RTDS simulator is used to verify the performance of the system. The results show that the system can locate the fault accurately. |
10,254 | Please write an abstract with title: Numerical Study Concerning Longitudinal Dynamic of a Canard UAV with Vectored Thrust, and key words: Elevators. Abstract: This work presents a study concerning the possibilities to improve the longitudinal dynamic of a canard UAV using vectored thrust. It is followed to harness the advantages of canard configuration of UAV and to obtain further a better longitudinal dynamic, able to fulfil more complex missions than canard UAV without vectored thrust. |
10,255 | Please write an abstract with title: The creative flow, and key words: Psychology, Monitoring, Lighting, Testing, IEEE members, Speech. Abstract: This paper describes how creative thinking involves inductive reasoning (going from specific facts or observations to general principles) and deductive reasoning (going from general principles to specific situations). It requires logical processing (going from given information to new conclusions based on explicit rules) and illogical processing (intuitive, associative or personal). |
10,256 | Please write an abstract with title: Study of defects in MOS structures using HfAlO<sub>x</sub> gate dielectric by means of positron annihilation, and key words: Positrons, High K dielectric materials, CMOS technology, High-K gate dielectrics, Materials science and technology, Semiconductor films, Electrons, Personal digital assistants, Atmospheric measurements, Energy measurement. Abstract: In this article, we used monoenergetic positron beams to study defects in thin HfAlO/sub x/ films deposited on Si substrates. The positrons implanted into HfAlO/sub x/ were found to annihilate from the trapped state in open spaces; the size of the open spaces was larger than that of point defects such as monovacancies or divacancies. |
10,257 | Please write an abstract with title: Development of Advanced HTS Onboard Ka-band Antennas for Engineering Test Satellite 9, and key words: Satellite antennas, High-temperature superconductors, Satellites, Shape, Transmitting antennas, Throughput, Antenna feeds. Abstract: We have developed the advanced onboard antennas for High Throughput Satellite (HTS). They are three types of the antennas utilizing Ka-band frequencies to aim in-orbit verification by the Japanese Engineering Test Satellite 9 (ETS-9). First antenna is the fixed multi-beam antenna (Fixed MBA) employing the miniaturized and integrated feeder unit to enable dense allocation of multi beams for improvement of spectrum efficiency. Second antenna is the Digital Beam Forming antenna (DBF-ANT) to enable flexible beam shape. Third antenna is the common communications system antenna (CCS-ANT) transmitting broad beam which has beacon transmission function etc. |
10,258 | Please write an abstract with title: Molecular electronics by the numbers, and key words: Molecular electronics, Physics, Nanoelectronics, Extraterrestrial measurements, Electrodes, Astronomy, Current measurement, Quantum computing, Tunneling, Nanoscale devices. Abstract: Molecules are an attractive option to develop nanoscale electronic devices. Experimental measurements of current-voltage characteristics of individual molecules have been possible for several years and have revealed rich structure and diverse behavior. This paper reviews recent theoretical work by the authors in which current-voltage characteristics of individual molecules are computed using a fully quantum-mechanical parameter-free method. The results provide detailed understanding of transport in molecules in the context of data and go further by obtaining information about the role of molecule-electrode contacts and predicting the behavior of three-terminal molecular devices and the factors that control their performance. |
10,259 | Please write an abstract with title: Reliable algorithms for ray intersection in computer graphics based on interval arithmetic, and key words: Computer graphics, Digital arithmetic, TV, Layout, Ray tracing, Visualization, Computer architecture, Robustness, Production, Image generation. Abstract: We study the reliability and performance of interval arithmetic for ray tracing implicit surfaces. We analyze when and how to use interval arithmetic as an alternative to the methods used in POV-Ray for ray intersection. Interval methods are applied as robust approaches for solving the ray-surface intersection problem; i.e. to find the minimal root in a set of analytic functions. POV-Ray is able to solve this problem efficiently for relatively simple objects (objects that can be bounded in a box). Interval based algorithms can speed up the rendering process for scenes with some infinite implicit surfaces, including nondifferentiable ones, where the automatic bounding box cannot be applied. Interval methods have the advantage of not needing to provide the interval guess of the maximum gradient, as recursive subdivision equipotential methods (used by POV-Ray) does. Experimental results were obtained from the evaluation of our interval algorithms and the methods used in POV-Ray in scenes with single objects and in complex scenes with several objects. |
10,260 | Please write an abstract with title: A 1.5 kW Radio-Frequency Tunable Matching Network Based on Phase-Switched Impedance Modulation, and key words: Capacitance, Impedance, Radio frequency, Capacitors, Frequency modulation, Switches, Plasmas. Abstract: Dynamically-tunable impedance matching is a key feature in numerous radio-frequency (RF) applications at high frequencies (10 s of MHz) and power levels (100s-1000 s of Watts and above). This work develops techniques that enable the design of high power tunable matching networks (TMN) that can be tuned orders of magnitude faster than with conventional tunable impedance matching techniques, while realizing the high power levels required for many industrial applications. This is achieved by leveraging an emerging technique - known as phase-switched impedance modulation (PSIM), which involves switching passive elements at the rf operating frequency - that has previously been demonstrated at rf frequencies at up to a few hundred Watts. In this paper, we develop design approaches that enable it to be practically used at up to many kilowatts of power at frequencies in the 10 s of MHz. A detailed analysis of the factors affecting the losses as well as the tradeoffs of a basic PSIM-based element is provided. Furthermore, it is shown how incorporating additional stages to the PSIM-based element, including impedance scaling and / or the addition of series or shunt passive elements, influences the losses and enables the efficient processing of high power levels given the limitations of available switches. A PSIM-based TMN that matches load impedances to 50Ω and delivers up to 1.5 kW of power at frequencies centered around 13.56 MHz is implemented and tested over a load impedance range suitable for various industrial plasma processes. |
10,261 | Please write an abstract with title: Reliability Analysis of Centralized and Decentralized Controls of Microgrid, and key words: Computer science, Renewable energy sources, Decentralized control, Power quality, Microgrids, Power system stability, Power system reliability. Abstract: With the recent developments in power system and computer science, transforming the traditional grid in to smart grid is inevitable. Microgrids are accepted as one of the key elements of smart grids. Especially, distributed energy sources in microgrids are increasing, electrical and communications interactions are increasing and sophisticated more than ever. These type of energy sources have low inertia and therefore, it may lead to instability of the grid, decreasing in power quality, decreased reliability, operational failures and possible blackouts. Also, since microgrid is very small scale the prediction of load demand becomes harder and it leads to some problems on the grid. For these reasons, it is necessary to conduct reliability assessment on microgrid. There are two types to control microgrid. These are centralized and decentralized controllers. In this paper, reliability analysis of microgrid is reviewed for both centralized and decentralized controller. Various possible analysis and methods which is fit to apply on microgrid centralized and decentralized controller are explained. |
10,262 | Please write an abstract with title: Proceedings at the three hundred and forty-seventh general meeting, and key words: Obituaries, Kelvin, Compounds, Business. Abstract: The President (L. H. L. Badham) was in the Chair, and there were present 72 members and visitors, and the Secretary. |
10,263 | Please write an abstract with title: Model-based head pose tracking with stereovision, and key words: Head, Tracking, Image motion analysis, Cameras, Videoconference, Deformable models, Image generation, Color, Histograms, Solid modeling. Abstract: We present a robust model-based stereo head tracking algorithm that operates in real time on a commodity PC. The use of an individualized three-dimensional head model, coupled with the epipolar constraint from the stereo image pair greatly improves the robustness of the tracking. Experimental results have shown that our method is able to track all the six degrees of freedom of the rigid part of head motions, over an extended period of time, in the presence of large angular and translational head motions, partial occlusions, and/or dramatic facial expression changes. Applications include human-computer interaction and eye-gaze correction for videoconferencing. |
10,264 | Please write an abstract with title: Introduction to D2D Communications, and key words: Device-to-device communication, Interference, OFDM, Frequency modulation, Frequency conversion, Frequency control, Wireless communication. Abstract: Device‐to‐device (D2D) communication enables researchers to merge together the achievements of long‐term development in previously two disjoint networking techniques, that is, ad‐hoc networking and centralized networking. D2D can support local area services such as content distribution, local advertisement, and location aware services very effectively through unicast, groupcast, and broadcast transmission. The diversity of cellular communication provides lots of flexibility for D2D communication in terms of link establishment, resource allocation, energy efficiency, as well as applications and services. D2D communication in cellular spectrum enables direct communication between devices that are in close proximity, and it is an exciting and innovative feature for next generation of cellular networks. In terms of spectrum usage, D2D is primarily classified into two categories, in‐band and out‐band. D2D provides benefit in terms of performance improvement, spectral, and energy efficiency, but there are few challenges while integrating D2D in long term evolution‐advanced network. |
10,265 | Please write an abstract with title: Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems, and key words: Integrated circuits, Measurement, Uncertainty, Taxonomy, Estimation, Control systems, Security. Abstract: Cyber threats directly affect the critical reliability and availability of modern Industry Control Systems (ICS) in respects of operations and processes. Where there are a variety of vulnerabilities and cyber threats, it is necessary to effectively evaluate cyber security risks, and control uncertainties of cyber environments, and quantitative evaluation can be helpful. To effectively and timely control the spread and impact produced by attacks on ICS networks, a probabilistic Multi-Attribute Vulnerability Criticality Analysis (MAVCA) model for impact estimation and prioritised remediation is presented. This offer a new approach for combining three major attributes: vulnerability severities influenced by environmental factors, the attack probabilities relative to the vulnerabilities, and functional dependencies attributed to vulnerability host components. A miniature ICS testbed evaluation illustrates the usability of the model for determining the weakest link and setting security priority in the ICS. This work can help create speedy and proactive security response. The metrics derived in this work can serve as sub-metrics inputs to a larger quantitative security metrics taxonomy; and can be integrated into the security risk assessment scheme of a larger distributed system. |
10,266 | Please write an abstract with title: Evolving System Services to Meet Application Requirements, and key words: Application software, System software, Computer architecture, Yarn, Software architecture, Sockets, Computer science, Web server, Embedded system, Computer languages. Abstract: An increasingly common server deployment scenario involves dedicated servers supporting single applications. In such cases, system software need not be concerned with fairness between applications, but should instead focus on serving the precise needs of one particular application. To meet this goal, system software must permit applications to express their needs and must evolve to meet those needs. The fixed abstractions in conventional systems software militate against both expression of applications’ needs and against restructuring of system components to meet those needs. The compliant systems architecture (CSA) is a novel language-based software architecture that promises to enhance the extent to which system software is compliant to the applications it supports. Using our CSA instantiation, we identify several tactics for evolving system software to enhance compliance. The principal contribution of this paper is practical validation of CSA, via case studies of these tactics, demonstrating improved system services for an application. |
10,267 | Please write an abstract with title: Reduction of Current and Voltage Distortions under Overmodulation for Matrix Converters, and key words: Modulation, Matrix converters, Switches, Pulse width modulation, Simulation, Power generation, Harmonic analysis. Abstract: This paper presents a new method to reduce current and voltage distortions for matrix converters in the overmodulation range. Analytical overmodulation conditions for both the input currents and the output voltages are derived. A carrier-based overmodulation method is then proposed to reduce the distortions by appropriately adjusting the reference voltages. Simulation results confirm that the distortions of input currents and output voltages can be improved by the proposed method. |
10,268 | Please write an abstract with title: Vacuum arc plasma source, and key words: Vacuum arcs, Plasma sources, Plasma transport processes, Anodes, Magnetic fields, Cathodes, Plasma confinement, Ducts, Plasma stability, Magnetic separation. Abstract: Comparative performance and stability properties of a cathodic vacuum arc plasma source based on dc arc discharge with a magnetic confinement of a cathode spot and plasma stream focusing are presented in case with grid insert placed within the hollow anode and without it. The arc stability becomes worse while the magnetic field increases, and at magnetic field strength above 7-8 mT in case without insert the discharge extinguishes. Use of the anode insert makes it possible to provide stable arc operation in the magnetic field up to 20 mT and increase the output ion current to 8.5 A at an arc current of 100 A. |
10,269 | Please write an abstract with title: Vacuum Fluxless Reflow Technology for Fine Pitch First Level Interconnect Bumping Applications, and key words: Vacuum systems, High performance computing, Wires, Process control, Electronic components, Bandwidth, Computer architecture. Abstract: Heterogeneous integration has become an important performance enabler as high-performance computing (HPC) demands continue to rise. The focus to enable heterogeneous integration scaling is to push interconnect density limit with increased bandwidth and improved power efficiency. Many different advanced packaging architectures have been deployed to increase I/O wire / area density for higher data bandwidth requirements, and to enable more effective die disaggregation. Embedded Multi-die Interconnect Bridge (EMIB) technology is an advanced, cost-effective approach to in-package high density interconnect of heterogeneous chips, providing high density I/O, and controlled electrical interconnect paths between multiple dice in a package.In emerging architectures, it is required to scale down the EMIB die bump pitch in order to further increase the die-to-die (D2D) communication bandwidth. Aa a result, bump pitch scaling poses significant challenges in the plated solder bump reflow process, e.g., bump height / coplanarity control, solder wicking control, and bump void control. It’s crucial to ensure a high-quality solder bump reflow process to meet the final product reliability requirements. In this paper, a combined formic acid based fluxless and vacuum assisted reflow process is developed for fine pitch plated solder bumping application. A high-volume production (HVM) ready tool has been developed for this process. |
10,270 | Please write an abstract with title: Scores for Hesitant Fuzzy Sets: Aggregation Functions and Generalized Integrals, and key words: Fuzzy sets, Standards, Distortion measurement, Particle measurements, Indexes, Atmospheric measurements, Additives. Abstract: There are several extensions of fuzzy sets. Hesitant fuzzy sets are one of them. They are defined in terms of a set of membership degrees. For a typical hesitant fuzzy set, this set of membership degrees has a finite number of values. One of the motivations to introduce score functions was to rank alternatives. In this case, as the membership degrees are a set, the comparison of membership values does not lead, in general, to a total order. Score functions can be seen as functions that transform the set of membership degrees into a single membership value. In this way, we can construct the total order. In this article, we propose a general framework to define score functions for hesitant fuzzy sets based on fuzzy integrals. This framework permits to see most relevant indices as particular cases. Moreover, previous approaches focused on typical hesitant fuzzy sets. Our approach is more general in the sense that we can process both typical hesitant fuzzy sets and the nontypical ones (with membership values that are not finite). We also frame the problem into a more general setting. That is, the problem of hesitant fuzzy set transformation. Score functions can be seen as functions that transform a hesitant fuzzy set into a standard fuzzy set. Similarly, we can consider its transformation to interval-valued fuzzy sets and type-2 fuzzy sets. Aggregation functions can also be used for the same purpose. |
10,271 | Please write an abstract with title: Seismic Data Compression Using Deep Learning, and key words: Data compression, Feature extraction, Decoding, Convolution, Deep learning, Image reconstruction, Data models. Abstract: The exponential growth of the size of seismic data recorded in seismic surveys and real time data monitoring makes seismic data compression strongly demanded. Furthermore, compression will lead to an efficient use of the bandwidth assigned for the communication link between the seismic stations and the main center. In this paper, two convolutional autoencoders (CAEs) are proposed for seismic data compression. The two algorithms are mainly based on the convolutional neural network (CNN), which has the capability to compress the seismic data into feature representations, thereby allowing the decoder to perfectly reconstruct the input seismic data. The results show that the first model is efficient at low compression ratios (CRs), while the second model improves the signal-to-noise ratio (SNR) from about 3 dB to 12 dB compared to the other benchmark algorithms at moderate and high CRs. |
10,272 | Please write an abstract with title: Crosstalk Mitigation for Enabling DDR4 3.2Gbps External Memory Interface in FPGA with Optimized Package-Board Co-Design, and key words: Crosstalk, Couplings, Routing, Electronics packaging, Timing, Magnetic fields. Abstract: Crosstalk mitigation with package-board co-design enhancements is needed for enabling DDR4 3.2Gbps. The proposed optimized 4:1 IO:GND package ball arrangement with alternated deep-shallow board vias can be used as an optimal solution for enabling DDR4 3.2 Gbps without cost adder. This scheme effectively reduces the signals coupling of horizontal and vertical routing structure in package and board design. The results show that we able to gain 50% of channel margin with the proposed solution. |
10,273 | Please write an abstract with title: Automated System for Detection of Suspicious Activity in Examination Hall, and key words: Support vector machines, Histograms, Webcams, Face recognition, Visual analytics, Writing, Streaming media. Abstract: One among the curses in the education institution of the country is malpractice during written examination, either online or off line. Some of the suspicious activities during written examination includes, copying from neighbouring candidates, other written materials, exchange of answer scripts, etc. These activities lead to physical movement of the face and other parts of the body than the normal writing posture of the candidate(s) seen at the initial stage of the examination. Any deviation to normal posture can be an indicative of suspicious activities. Main objective of this work is to build a real time edge computing-based video analytics and techniques to identify the suspicious activities relating to malpractice case booking as evidence and proofs during written examination. The proposed model includes a low-cost webcam video frame capturing and edge computing for analytics to detect the face and behaviour recognition using the following techniques. Firstly, the CNN is used to detect human faces. Secondly, candidates are recognised using YOLO and features are extracted using Local Binary Patterns Histogram (LBPH). After feature extraction, the activity classification is performed and is used to detect whether the activity is suspicious or not based on the face movement, hand contact detection and body posture using SVM. Lastly, the system will set an alert based on the threshold set for movement pattern of the candidate(s) in the given area focussed by the web cam or any other camera used in an examination centre or for individual online examination for suspicious activities. |
10,274 | Please write an abstract with title: Application of IoT and Cloud Storage in Android-Based Smart Home Technology, and key words: Fans, Prototypes, Smart homes, Detectors, Sensor systems, Internet of Things, Servers. Abstract: Smart Home is an application of the Internet of Things that can maximize monitoring, control, and home security. User Interface of Smart Home Apps is part of the design to fulfill the requirement. To make it happen, the researcher created an intelligent home system using the NodeMCU ESP8266 microcontroller, which is connected to the android application on the smartphone. This system is connected to Firebase as a real-time database server using an internet connection. This system has several sensors such as PIR, LDR, and MQ-2 sensors. The PIR sensor functions as a motion detector in the room. The LDR sensor functions as a light detector, where if the light is detected in the room, lights 1 and 2 will turn off, and if not, lights 1 and 2 will turn on. The MQ-2 sensor functions as a flammable gas detector where if it is detected, the DC fan (blower) will turn on; if not, the DC fan (blower) will turn off. This system is equipped with a Secure Mode feature where when an unwanted movement (thief) is detected or flammable gas is seen, the buzzer (alarm) will light up. All components are placed in a prototype house measuring 40 x 25 cm. The method used in the design of the intelligent home system prototype method. While in the creation of innovative home applications using the waterfall method. Based on the test results, it can be concluded that the system works well. The response speed between the design and the android application on the smartphone depends on the internet connection, which in this test itself takes an average of 3 seconds. |
10,275 | Please write an abstract with title: An Improved AP Clustering Algorithm Based Critical Nodes Identification for Distribution Network With High PV Penetration, and key words: Network topology, Clustering algorithms, Voltage control, Optimal scheduling, Feature extraction, Real-time systems, Classification algorithms. Abstract: The power flow of the distributed network (DN) with high penetration of distributed PV changes significantly, such as bidirectional power flow and larger deviation of voltage magnitude, under the variation of PV power output, and the number and the position of critical nodes would change accordingly. Hence, a data-driven nodes clustering and critical node identification method is proposed in this paper. Since the relationship between different nodes are nonlinear, the autoencoder method is firstly applied to obtain the unified features of the nodes connected with different number of branches. Using the unified features, the Frechet distance is calculated to demonstrate the similarity between any two nodes. The improved affinity propagation (AP) clustering algorithm is also proposed to classify the nodes into different clusters, and the number the clusters and the critical nodes in different clusters could be obtained automatically. The electrical distance is considered in the improved AP clustering algorithm, so that nodes in different branches with similar features are avoided to be classified into one cluster. The simulations are carried out on the IEEE 123-bus system and an actual DN system, the effectiveness and efficiency of proposed critical node identification method are verified. |
10,276 | Please write an abstract with title: Design considerations for a new solid-state gamma-camera: Soltice, and key words: Solid state circuits, Detectors, Collimators, Energy resolution, Cameras, Geometry, Image reconstruction, Nuclear medicine, System performance, Spatial resolution. Abstract: This paper presents an alternative to a conventional gamma camera. The proposed system is based on the combination of a new detection material - CZT - and a new acquisition geometry - 1D detector with slat collimator. The slat collimator offers a better compromise to the usual sensitivity-resolution tradeoff. Solid-state detection offers significantly improved energy resolution. The combination of the two elements, and the development of better reconstruction tools, has the potential of bringing a new level of performance to nuclear medicine imaging. The targeted system performance includes a spatial resolution of 5 mm FWHM at 10 cm from the detector surface and an energy resolution better than 5% FWHM, both at 140 keV. While the results are still preliminary and incomplete, they more than justify further investigation. |
10,277 | Please write an abstract with title: Synthesis of undercoat with high temperature and humidity resistance for resistor, and key words: Temperature, Humidity, Resistors, Epoxy resins, Electric resistance, Testing, Scanning electron microscopy, Curing, Acceleration, Infrared spectra. Abstract: Epoxy resin undercoat, with high temperature and humidity resistance, for resistor was prepared by curing of acid anhydride and accelerating of glycol with proper nano-SiO/sub 2/ added at 80/spl deg/C. The properties of undercoat prepared were characterized by electrical tests, infrared spectra (IR), thermogravimetric analysis (TGA) and scanning electron microscopy (SEM). The results showed more compact and steady inter-crosslinked network structure was formed in the modified epoxy resins undercoat with nano-SiO/sub 2/ added, which leaded to the performance of modified epoxy resin undercoat improved greatly. The undercoat with nano-SiO/sub 2/ 2.68wt%, kept for six months at room temperature without flocculating and aggregating, is of good stability. The varying ratio of resistance with such undercoat painted is less than 1% after high temperature and humidity resistance test. In this work, an attempt has been made to prepare undercoat, with high temperature and humidity resistance, for resistor by modifying epoxy resin using nano-SiO/sub 2/. |
10,278 | Please write an abstract with title: Performance Analysis of Semi-Supervised Learning Methods under Different Missing Label Patterns, and key words: Principal component analysis, Support vector machines, Art, Semisupervised learning, Two dimensional displays, Reactive power, Performance analysis. Abstract: In this study, we analyze the performance of semi-supervised learning methods under different missing label patterns and missing label proportions. Some semi-supervised learning methods make several assumptions about the missingness mechanism or data characteristics to promote performance improvement compared to supervised techniques. On the other hand, some works do not even consider the underlying patterns of missing labels. To investigate the behavior of these methods or to verify their assumptions, we constructed partially labeled datasets virtually through simulating different missingness patterns over fully labeled datasets. We analyze the performance of support vector machines with self-training (SVM-ST) and Gaussian mixture models with semi-supervised expectation maximization (GMMSSEM). We also compare these methods with their supervised counterparts in terms of performance. Results show that missing label patterns and proportions have significant effects on performance. |
10,279 | Please write an abstract with title: An E-ABAC-Based SDN Access Control Method, and key words: SDN, Access Control, ABAC, Security. Abstract: In order to solve the problem of resource security access control in SDN (Software Define Network), the idea of mandatory access control is introduced, and E-ABAC (Extended Attributes Based Access Control) model based on security level is designed to realize confidentiality and integrity in the access process. SDN switch security level is regarded as the attribute of access control environment, and a secure path planning method based on PSO (Particle Swarm Optimization) algorithm is designed to ensure the security of access data flow. The experimental results show that the proposed method can implement fine-grained mandatory access control in SDN, and has little effect on the response time of concurrent requests. |
10,280 | Please write an abstract with title: FaCT-LSTM: Fast and Compact Ternary Architecture for LSTM Recurrent Neural Networks, and key words: Encoding, Computer architecture, Quantization (signal), Logic gates, Computational modeling, Multiplexing, Long short term memory, Neural networks, Wearable computers. Abstract: This article proposes a Fast and Compact Ternary LSTM (FaCTLSTM), which bridges the accuracy gap between the full-precision and quantized neural networks. |
10,281 | Please write an abstract with title: Prediction of Fan-out Panel Level Warpage using Neural Network Model with Edge Detection Enhancement, and key words: Finite element analysis, Databases, Machine learning, Artificial neural networks, Predictive models. Abstract: In recent years' fan-out panel level package (FOPLP) is playing a most important role in electronics packaging industry due to lower cost, thinner profile, better electrical and thermal performance. However, thermally induced warpage is the critical issue for each and every researcher's problem. Using larger wafer and panel size, and mismatch of coefficient of thermal expansion (CTE) among the constituent material, the thermally induced warpage is occurred which needs to be controlled effectively for fan-out package industry. In this work, finite element method (FEM) is used to build the FOPLP by considering equivalent CTE of molding material and then thermally induced warpage issue in the molding process is investigated. To reduce the experimental time and cost, FEM is the best method to simulate and analysis of warpage in FOPLP. Simulation can build a set of warpage result database of different geometric structures of panel level package (PLP). In addition to that, this work has been introduced Artificial Intelligence (AI) approach and the main purpose of this AI technique is to build a best model for warpage analysis by considering the design parameters like chip size, chip thickness, gap between the chips, thin film thick and so on. The best part of AI model is that, if numbers of different geometric parameters are used in this model then AI can predict the better warpage value without the help of FEM simulation. The implementation of machine learning concept which is an AI technique is to train the model from the different geometric model related to warpage datasets which are generated by FEM simulation. Convolution Neural Network (CNN) algorithm is applied to learn the relationship between geometry and amount of warpage occurred from the generated database. To enhance the training process, it has also considered Edge Detection technique. Eventually, this AI approach is successfully used to remove data points with so many similar warpage values and it could reduce training data as well as training time. Moreover, this paper successfully digitized warpage model obtained by the FEM and also successfully used the Artificial Neural Network (ANN) to train the database to learn and estimate the warpage for FOPLP. |
10,282 | Please write an abstract with title: Feeder State Evaluation for distribution network based on Set Pair Analysis, and key words: Indexes, Distribution networks, Entropy, Smart grids, Oil insulation, Maintenance engineering, Real-time systems. Abstract: Most of the equipment evaluations of distribution network use the deduction method, and the evaluation object is for the single device. Namely, the overall risk of the distribution network equipment group is not considered. In this paper, feeder state evaluation for distribution network based on set pair analysis is proposed. First, a feeder evaluation index system is established based on multi-source data, and the system has four parts: power grid, equipment, environment, and users. Then the entropy weight method is used to calculate the weight of evaluation index. Finally, according to the different threshold characteristics of the indicators, different set pair analysis methods are used to evaluate the comprehensive state of the feeders. According to the actual data in a certain area, the feeder evaluation results are obtained, which can provide the guidance for daily operation and maintenance of the feeders. |
10,283 | Please write an abstract with title: Receiver-initiated group membership protocol (RGMP): a new group management protocol for IP multicasting, and key words: Multicast protocols, Internet, Routing protocols, Scalability, Information filtering, Information filters, Authentication, Robustness, National security, Permission. Abstract: This paper proposes a new group management protocol called Received-initiated Group Membership Protocol (RGMP) for IP multicasting. The dominant group management protocol on the Internet to date is the Internet Group Management Protocol (IGMP). Unlike IGMP based on a query/reply model, an RGMP host actively takes responsibility to refresh group membership on the neighboring multicast routers. Each RGMP host maintains a "refresh" timer per group. The refresh timer is reset once the suppression rule holds true for a received report message, where the report may be a join, departure, state change, or refresh message. The RGMP refresh timer is adjusted in a way to be adaptive and self-synchronized. This receiver-initiated, self-synchronized approach makes the RGMP suppression mechanism superior to that of IGMP v1/v2, because the latter can be applied only to periodical refresh messages. As a result, RGMP protocol overhead is significantly reduced over a wide variety of service scenarios compared to IGMP v3. In addition to the reduced protocol overhead, RGMP is robust, scalable and adaptive to serve as a group management protocol. |
10,284 | Please write an abstract with title: Development of synthesis of granular ZSM-5 with a hierarchical porous structure, and key words: Scanning electron microscopy, Temperature distribution, Temperature dependence, X-ray scattering, Morphology, Crystallization, Production. Abstract: Most of the methods described in the literature for the preparation of pentasil-containing catalysts involves the synthesis of highly dispersed zeolite ZSM-5 in the required cation-decationized forms and subsequent molding in a mixture with a binder material into granules. Information on available and promising for industrial implementation methods for the synthesis of granular materials based on high crystallinity ZSM-5 zeolite with a hierarchical porous structure is absent in the literature. As a result of the studies, a method for the synthesis of granular zeolite ZSM-5 of high phase purity and degree of crystallinity of -100% using tetrabutylammonium bromide as a template was proposed. The method includes the stages of mixing powdered zeolite ZSM-s5 and amorphous alumino silicate, moistening the mixture with water and mechanical granulation, drying and crystallizing the resulting granules. Chemical and X-ray diffraction examination XRD, low temperature N 2 adsorption and SEM (scanning electron microscopy) were utilized to determine the chemical and phase compositions, characteristics of the porous structure, and the morphology of granular ZSM-5 zeolites with a crystallinity of-100%. |
10,285 | Please write an abstract with title: A generalized decision logic language for granular computing, and key words: Logic, Fuzzy sets, Information analysis, Computer science, Information science, Quantization, Set theory, Data analysis, Machine learning, Databases. Abstract: A generalized decision logic (GDL) language is proposed for granular computing (GrC) in Tarski's style through the notions of a model and satisfiability. The model is an information table consisting of a finite set of objects described by a finite set Of attributes. A concept or a granule is characterized by a pair consisting of the intension of the concept, a formula of the language GDL, and the extension of the concept, a subset of the universe. We discuss the application of GDL in formal concepts and decision rules. The former deals with the description and interpretation of granules, and the latter deals with the relationships between granules. |
10,286 | Please write an abstract with title: Diamond Schottky p-i-n Diodes: DC, Small-Signal and Large-Signal Behavior for RF Applications, and key words: Radio frequency, Schottky diodes, Semiconductor device measurement, Photonic band gap, Diamonds, Plasma measurements, Loss measurement. Abstract: The paper features the fabrication, characterization, and modeling of diamond Schottky p-i-n diodes grown by plasma enhanced chemical vapor deposition. The electrical measurements are used to extract the parameters for a unified lumped-element SPICE model. The sub-circuit model accurately reproduces the forward and reverse bias DC characteristics, the capacitance-voltage and S-parameter measurements, as well as the large-signal, non-linear properties of the diodes. An early insertion point for diamond electronics will be high power RF passive systems such as receiver protectors and mixers. We validate the model by comparing it to the measured non-linearities produced by the diode in a single-ended unbalanced RF mixer configuration. |
10,287 | Please write an abstract with title: Outlining the Landscape of Personalized Lung Cancer Treatment in the Era of Cyber-Physical Systems, and key words: Toxicology, Medical treatment, Lung cancer, Lung, Predictive models, Size measurement, Mathematical models. Abstract: Lung cancer treatment management has always been at the interface of medicine, biology, and physics. Rapid progress is being made in the direction of new high-precision technology developments that emerge toward more patient- specific therapies with lower toxicity. This paper provides a complete generic framework of lung tumor targeting and patient individualization, thereby allowing a rational choice of tumor- specific dose and type of treatment. Possible comprehensive strategies including radiotherapy, immunotherapy, and targeted therapy drug (antiangiogenic), coupled with mathematical modeling of tumor dynamics and respiratory mechanics would bring considerable progress in the area of prediction models for treatment outcomes. The therapy becomes model-based predicted and leads to personalized radiotherapy with optimal doses, decreasing the risks of normal-tissue effects and costs as well. To maximize the success of the treatment in an individual, clinicians need to be aware of both tumor characteristics and lung tissue properties (assessed with a forced oscillation technique device). |
10,288 | Please write an abstract with title: Equivalence of 0 and -1 Space Harmonics in Helical Antenna Operation (Correspondence), and key words: Helical antennas, Antennas and propagation, Conductors, Electromagnetic propagation, Electromagnetic scattering, Bandwidth, Periodic structures, Books, Antenna theory, Contracts. Abstract: In considering the propagation of electromagnetic waves along helical conductors using the Tape Helix approximation, it is well known that the solution contains an infinite number of space harmonics. |
10,289 | Please write an abstract with title: Digital Machine Learning Circuit for Real-Time Stress Detection from Wearable ECG Sensor, and key words: Feature extraction, Stress, Time-domain analysis, Electrocardiography, Frequency-domain analysis, Radio frequency, Biomedical monitoring. Abstract: This paper presents a digital machine learning circuit for classifying stress condition from chest ECG signal from a wearable sensor. To minimize hardware cost, we use only 5 time-domain features that have much lower area and power consumption than frequency domain or combination of time and frequency domain features as is used conventionally. We test the time-domain features on several machine learning algorithms. Random Forest classifier shows the best classification accuracy of 0.96 with the time-domain features at an estimated power consumption of only 1.16mW at 65nm CMOS process which demonstrates feasibility of embedding a machine learning classifier in a wearable ECG sensor for real-time, continuous stress detection. |
10,290 | Please write an abstract with title: EMRNet: End-to-End Electrical Model Restoration Network, and key words: Conductivity, Electromagnetics, Data models, Rocks, Predictive models, Training, Image reconstruction. Abstract: The traditional method to improve the resolution in electromagnetic inversion is increasing the number of iterations, which displays poor nonlinear mapping and strong nonuniqueness. To meet this challenge, a new strategy is proposed via reconstructing the geoelectric model for traditional inversion results through a deep neural network (DNN). DNN possesses the advantage of establishing an uncertain mapping between low-resolution images and high-resolution target images. To recover the high-precision geoelectric model, we propose an end-to-end electromagnetic recovery network (EMRNet) with novel components to adequately use the geoelectric model data of traditional inversion. Specifically, EMRNet uses the codec structure from U-Net, whereby a cross-scale feature attention module (CSFA Block) is incorporated into the decoding process to make full use of feature information of different scales. The superiority of EMRNet is validated on both the synthetic and measured data. The predicted geoelectric models of EMRNet are more consistent with the target from the aspects of resistivity values, overall structure, and resolution. In addition, the geoelectric model predicted by EMRNet agrees well with the real geological background data, and the corresponding response data are closer to the measured data. |
10,291 | Please write an abstract with title: Design and operating experience with fast acting load shedding scheme in the Entergy system to prevent voltage collapse, and key words: Voltage, Stability, Power generation, Steady-state, Load flow analysis, Helium, Power industry, SCADA systems, Relays, Automatic generation control. Abstract: This work describes the design and development of load shedding scheme for South Mississippi region and discusses the operating experience with load shed scheme in the Western region. This scheme is fully automated and utilizes the SCADA system to perform load shedding without any manual intervention. The load, bus voltages and over excitation relay controls of the generating units have been considered in the decision logic. Similar UVLS scheme was implemented in the Western region of the Entergy system. The main difference between two schemes is that one monitors transformer loading and status while the other monitors over excitation relay operation at the generating unit. This type of scheme is designed to handle any abnormal condition that might cause voltage collapse. |
10,292 | Please write an abstract with title: Siamese tracker based on motion potential energy, and key words: Potential energy, Visualization, Target tracking, Object detection, Benchmark testing, Signal processing, Search problems. Abstract: Siamese trackers have been widely concerned recently. Though many trackers have obtained better performance when the target encounter fast motion or changes the direction of motion, most trackers still utilize the previous frame’s center to generate the center of the search box in the current frame, which may lead to loss of the tracked target. In this paper, we utilize the potential energy to the expended target detection region. Specially, we predict the search area of the current frame by analyzing the potential energy of the object’s historical frame. Abundant experiments show that our tracker with better robustness than most trackers on tracking benchmarks. Especially, the compared results show our tracker has an excellent performance in the fast motion challenge. |
10,293 | Please write an abstract with title: Modeling of RF heating due to metal implants in MRI, and key words: Radio frequency, Implants, Magnetic resonance imaging, Safety devices, Electromagnetic heating, Electromagnetic coupling, Electromagnetic fields, Hazards, Surgery, Electromagnetic devices. Abstract: Metal implants, even if non-ferromagnetic, may couple with the radiofrequency (RF) electromagnetic field used in magnetic resonance imaging (MRI) and cause a heating hazard. With the development of MRI as a tool for image-guided surgery, metal devices (e.g. guidewires) are being used in patients during MRI scans. This paper reviews the electromagnetic and bioheat transfer methods we have used to evaluate the safety of metal devices in MRI with respect to RF heating. We recommend updated regulatory guidelines to deal with the highly localized heating encountered with metal implants. We also recommend the use of the safety index as a useful measure of the RF safety of a device. |
10,294 | Please write an abstract with title: Push yoUr Password: Secure and Fast WiFi Connection for IoT Devices, and key words: Performance evaluation, Correlation, Computer hacking, Conferences, User experience, Security, Internet of Things. Abstract: Internet of things (IoT) is an indispensable paradigm in today's industrial change. IoT interconnects appliances around us through the Internet, and user's private information is deeply placed inside the network. Nonetheless, security vulnerabilities in IoT have not been addressed appropriately so far due to various reasons. Even in the initial WiFi connection procedures of IoT devices, WiFi credentials can be leaked, making the WiFi access point (AP) a hacking path. We propose a secure connection scheme, termed PUP, that aims to securely and quickly connect an IoT device to the AP in proximity while improving the user experience. PUP shows perfect security performance, enabling connection time within 11 s. |
10,295 | Please write an abstract with title: Faster Region-based Convolutional Neural Network for Mask Face Detection, and key words: Training, Face detection, Proposals, Convolutional neural networks, Informatics, Faces. Abstract: We present two-stage detection approach, Faster Region-based Convolutional Network, Faster R-CNN for masked face detection. In this face detection, we localize the face object in the image and classify the face object based on mask occlusion on the face. There are three classes: a face without any mask, the second is an incorrectly masked face, and the third is a face with correctly masking. The first stage of the detection is finding the candidate regions of the target object. This stage uses the Region Proposal Network (RPN). Then, the candidate regions are fed into the last pooling layer of the Faster R-CNN identified as the ROI Pooling layer. The model is trained using MAFA and AFLW datasets. The mean Average Precision of trained model for all classes is 0.73, with the highest accuracy is obtained by the face without mask class, and the lowest accuracy is the incorrectly masked face class. |
10,296 | Please write an abstract with title: Research and Implementation of Chinese Couplet Generation System With Attention-Based Transformer Mechanism, and key words: Decoding, Computational modeling, Dictionaries, Computers, Recurrent neural networks, Telecommunications, Semantics. Abstract: Couplet is a unique art form in Chinese traditional culture. The development of deep neural network (DNN) technology makes it possible for computers to automatically generate couplets. Especially, Transformer is a DNN-based “Encoder–Decoder” framework, and widely used in natural language processing (NLP). However, the existed Transformer mechanism cannot fully exploit the essential linguistic knowledge in Chinese, including the special format and requirements of Chinese couplets. Therefore, this article adapts the Transformer mechanism to generate meaningful Chinese couplets. Specifically, the contributions of our work are threefold. First, considering the fact that the words in the corresponding positions of the antecedent clause and the subsequent clause in a Chinese couplet always have same part-of-speech (pos, i.e., word class), pos information is intentionally added into the Transformer to improve the accuracy of the conceived couplet. Second, to deal with the large number of unregistered and low-frequency words in Chinese couplet, a specific unregistered/low-frequency word processing mechanism (UWP) is designed and combined with the Transformer model. Third, to further improve the coherence of couplets, we incorporate the polish mechanisms (PMs) into Transformer model. In terms of three evaluation criteria including bilingual evaluation understudy (BLEU), perplexity, and human evaluation, the experimental results demonstrate the effectiveness of our designed Chinese couplet generation system. |
10,297 | Please write an abstract with title: Negative differential conductance in silicon nanocrystal single-electron devices, and key words: Silicon, Nanocrystals, Single electron devices, Quantum dots, Tunneling, Voltage, Metal-insulator structures, Insulation, CMOS technology, Shape. Abstract: The current-voltage I(V) characteristics of metal-insulator-Si quantum dot-insulator-metal (MISiIM) structures are numerically simulated to investigate the dimensioning and the possible applications of single-electron devices taking advantage of the Coulomb blockade phenomenon. These simulations are based on a physical description of the devices and depend only on fundamental parameters of the system. The originality of this work lies in the accurate calculation of tunneling rates including the effect of bias voltage on the wave-functions in the quantum dot. As a main result, we show the appearance of negative differential conductance effects, depending on the design of the structure. |
10,298 | Please write an abstract with title: Concept of transformer-feedback degeneration of low-noise amplifiers, and key words: Low-noise amplifiers, Inductance, Radiofrequency amplifiers, Topology, Degradation, Feedback, Inductors, Noise level, Impedance matching, Linearity. Abstract: Owing to its well-known properties of possible power-noise match as well as superior noise performance, the inductively-degenerated low-noise amplifier is nowadays the most-widely used RF pre-amplifier topology. However, there is not much flexibility when setting the amplifier's input impedance to match the source impedance, as for a given biasing condition, matching is achievable only for a particular value of the degenerative inductance. Moreover, to cancel the imaginary part of the input impedance, a particular excess inductance is necessary at the input of the amplifier, directly degrading the over-all amplifier performance. On the other hand, the transformer-feedback degeneration, introduced in this paper, offers the possibility, for low-noise amplifiers, of simultaneous matching to the source impedance of both the imaginary and the real part of the input impedance, in an orthogonal way. What is more, by controlling the amount of feedback, the amplifier is relieved from the burden of having the lossy input inductor. Detailed analysis shows a novel representation of the input impedance as well as a novel power-matching scheme of the transformer-feedback degenerated low-noise amplifier. |
10,299 | Please write an abstract with title: A Study on Adaptive Range Digital Beam-Forming Method for Ka-band Automotive SAR, and key words: Filtering, System performance, Imaging, Interference, Real-time systems, Data models, Synthetic aperture radar. Abstract: The verification of digital beam-forming technology using vehicle based Ka-SAR will easily lead to directional deviation due to the low height of the vehicle. DBF weight coefficients calculated using scan-on-receive(SCORE) algorithm exist deviation, which make synthetic beam pattern deviate from the ideal state and reduce the system performance. In this paper, an adaptive range DBF processing algorithm based on multi-channel SAR is proposed. The DBF weighting coefficients are adaptively generated by interference processing and phase extraction, which improved the receive gain. The adaptive algorithm has the advantages of high precision, simple processing flow, light computation load and real-time. Finally, the effectiveness of the algorithm is verified based on simulation and the real echo data. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.