ID
int64
0
400k
content
stringlengths
97
5.85k
10,800
Please write an abstract with title: Training-based MIMO channel estimation: a study of estimator tradeoffs and optimal training signals, and key words: MIMO, Channel estimation, Least squares approximation, Transmitters, Receiving antennas, Laser sintering, Statistics, Transceivers, Diversity methods, System testing. Abstract: In this paper, we study the performance of multiple-input multiple-output channel estimation methods using training sequences. We consider the popular linear least squares (LS) and minimum mean-square-error (MMSE) approaches and propose new scaled LS (SLS) and relaxed MMSE techniques which require less knowledge of the channel second-order statistics and/or have better performance than the conventional LS and MMSE channel estimators. The optimal choice of training signals is investigated for the aforementioned techniques. In the case of multiple LS channel estimates, the best linear unbiased estimation (BLUE) scheme for their linear combining is developed and studied.
10,801
Please write an abstract with title: A Distributed Hybrid Load Management Model for Anycast CDNs, and key words: Adaptation models, Schedules, Scheduling algorithms, Computational modeling, Scalability, Load management, User experience. Abstract: Anycast content delivery networks rely on the underlying routing to schedule clients to their nearby service nodes, which however is not natively aware of server load or path latency. Requests burst from some regions may cause overload and hurt user experience. This scenario demands quickly adjusting clients to other nearby servers with available capacity. However, state-of-the-art solutions do not work well. On one hand, native routing-based scheduling is not flexible and precise enough, which may cause cascading damage and interrupt ongoing sessions. On the other hand, centralized algorithm is vulnerable and not responsive due to high complexity. We propose a practical distributed hybrid load management model to solve load burst problem. First, the hybrid mechanism leverages flexible DNS-based redirection, which can schedule at per-request granularity without interrupting ongoing sessions. Second, the distributed model is responsive by reducing computation overhead and theoretically guarantees to converge to the optimal solution. Based on the model, we further propose an cooperative and two heuristic distributed algorithms. At last, using a measurement dataset, we demonstrate their effectiveness and scalability, and illustrate how to adapt them to different scenarios.
10,802
Please write an abstract with title: Research on Tree Classification Algorithm Based on Morphology and Leaf, and key words: Feature extraction, Vegetation, Training, Computational modeling, Convolution, Image recognition, Forestry. Abstract: For a long time, forestry workers carry out forestry field investigation work, when they do not know the tree species, they can only search the relevant literature such as “tree annals”. The query procedure is tedious and the accuracy is not high, which seriously affects the efficiency of forestry production. In this paper, after data augmentation of tree images, GAP (Global Average Pooling) was used to fine-tune Inception-V3, ResNet50 and Xception for transfer learning. Feature vectors of the model were extracted and merged, and two feature vectors of tree overall shape and leaves were obtained through training. After feature fusion, SoftMax was used for classification, and the result of tree species determination was obtained. The practice has proved that the tree classification method proposed in this paper has a great advantage and the accuracy is higher.
10,803
Please write an abstract with title: Psychological models in autonomic computing systems, and key words: Psychology, Humans, Safety, Organisms, Cognition, Stability, Communication system software, Software maintenance, Computer science, Animals. Abstract: This paper considers three psychological theories of motivation with respect to their potential contributions to autonomic systems design. Motivational theories are explored here since they seek to explain the mechanisms by which behaviours in living organisms are initiated. These motivational drives offer an analogy with the management of autonomic functions by modelling the criteria under which autonomic behaviours are controlled. A correlation between the two fields is suggested, raising the possibility of adopting concepts from established psychological theories in the design of autonomic computing systems.
10,804
Please write an abstract with title: Air launched underwater acoustic systems, and key words: Marine vehicles, Aircraft, Transponders, Aerospace electronics, Underwater acoustics, Instruments, Batteries, Educational institutions, Cost function, Oceans. Abstract: Expenditures associated with underwater acoustic systems are sometimes prohibitive owing to ships operating costs to install, maintain and utilize these systems. Launching, maintenance and use of precision long baseline navigation systems from the air are inherently cost effective for specific mission applications. Air launch technology also provides for rapid development of acoustic systems which, in many instances, is mandated. This paper discusses the current technology, methodology and specific products developed and currently in use which are air launched, such as duplex acoustic/RF sonobuoys, transponder systems and the associated navigation systems. Based on the developments to date, additional air launched concepts are discussed. Specific cost tradeoffs are presented depicting amortized savings over typical ship launched and maintained systems. The development cost of these systems are far outweighed by the resultant savings in ship's operating costs. Detailed presentation of two different example development programs provides direct insight into problems typical to these systems and associated methodology unique to air launched problems. The knowledge and understanding obtained via these developments is applicable to a variety of air launchable products typically used by military, commercial and educational institutions. Functional, mathematical, electronic, mechanical, environmental and cost factors are presented and addressed in comparison to more typical systems currently being used. Complete results are also provided for both development and end use testing activities.
10,805
Please write an abstract with title: Multi-Stage Coordination Volt/VAR Control with CVR in Active Distribution Network in presence of Inverter-Based DG Units and Soft Open Points, and key words: Reactive power, Energy loss, Energy consumption, Real-time systems, Mathematical model, Voltage control, Optimization. Abstract: The increasing penetration of renewable energy sources (RES) exacerbates the problems such as voltage rise, higher energy losses and energy consumption. The VAR support provided by inverter based distributed generators (IDG) and soft open points (SOP) devices is emerge as a potential solution for aforementioned problems. Therefore, a multi-stage coordination Volt/VAR control (VVC) with conservation voltage reduction (CVR) methodology incorporating IDG and SOP devices has been proposed in this paper. The proposed methodology includes three different stages namely; day-ahead scheduling stage, inner- day control stage, and real-time dispatch stage. In the day-ahead scheduling stage, a coordination optimisation model considering traditional VVC devices, IDG and SOP has been established; in the inner day control stage, a rolling optimisation control model based on model predictive control (MPC) is built, to reduce the influence of the predicted RES forecasted deviations; in the real-time dispatch stage, voltage violations occurred due to sudden change in generation/load are mitigated by regulating the reactive powers of IDG and SOP. To validate the developed scheme, a real time co-simulation framework using real time digital simulator (RTDS) and MATLAB-GAMS interface has been built. The proposed scheme has been tested and validated on a well-known 33 bus distribution system. The test results demonstrate the significance of the proposed scheme on volt/VAR control problems.
10,806
Please write an abstract with title: Straggler Mitigation through Unequal Error Protection for Distributed Matrix Multiplication, and key words: Training, Analytical models, Machine learning algorithms, Encoding, Linear matrix inequalities, Error correction codes, Sparse matrices. Abstract: Large-scale machine learning and data mining methods routinely distribute computations across multiple agents to parallelize processing. The time required for computation at the agents is affected by the availability of local resources giving rise to the "straggler problem" in which the computation results are held back by unresponsive agents. For this problem, linear coding of the matrix sub-blocks can be used to introduce resilience toward straggling. The Parameter Server (PS) utilizes a channel code and distributes the matrices to the workers for multiplication. It then produces an approximation to the desired matrix multiplication using the results of the computations received at a given deadline. In this paper, we propose to employ Unequal Error Protection (UEP) codes to alleviate the straggler problem. The resiliency level of each sub-block is chosen according to its norm as blocks with larger norms have higher effects on the result of the matrix multiplication. We validate the effectiveness of our scheme both theoretically and through numerical evaluations. We derive a theoretical characterization of the performance of UEP using random linear codes, and compare it the case of equal error protection. We also apply the proposed coding strategy to the computation of the back-propagation step in the training of a Deep Neural Network (DNN), for which we investigate the fundamental trade-off between precision and the time required for the computations.
10,807
Please write an abstract with title: Development of Manhole Cover Detection and Continuous Monitoring of Hazardous Gases using WSN and IoT, and key words: Gases, Wireless sensor networks, Smart cities, Sociology, Maintenance engineering, Real-time systems, Water pollution. Abstract: In many developing countries manholes are not monitored properly, but for the public safety and security the manhole system should be managed in good condition. Continuous monitoring of manholes is important one in smart city implementation. In the present scenario smart cities doesn't only mean smart traffic lights, smart framing, etc. It must also include smart manhole system. Continuous monitoring of sewage gases present in the system is more important in every smart city implementation. Comparing with other countries India is overwhelmed with population and sewages. Also, most of the manhole lids are open and not in proper condition. Due to the improper maintenance of gully pot systems, emission of poisonous gases affects the workers, which leads to losing of their lives and even more causes dangerous disease which can easily spread. This paper presents an essential manhole monitoring and detecting system, where the continuous monitoring of hazardous gases, condition of manhole lid using different sensors. The continuous monitoring of the gas levels and lid open condition are captured by the sensing unit and the sensor data are transferred to Atmega 328p microcontroller unit. The processed data will be stored in the cloud for further processing also sent it to the host station using the long-distance communication LoRa module. According to the received data an alert will be provided to the public regarding the manhole cover condition. The design goal of our system is low cost, low maintenance, implementable, also overflowing of the gully pot system, water contamination, and leakage of dangerous gases and blockage of manholes are detected and the information is sent to the concerned authorities using Wireless Sensor Networks (WSNs) and Internet of Things. The gas levels in the sewage system exceeds the threshold value, the corporation people can take proper measures and appropriate action to maintain the manhole.
10,808
Please write an abstract with title: Robust Information Filtering Under Model Mismatch for Large-Scale Dynamic Systems, and key words: Standards, Covariance matrices, Kalman filters, Dynamical systems, Real-time systems, Predictive models, Optimization. Abstract: The Kalman filter (KF) loses its optimality properties when the system model is misspecified to a certain extent, that is, when the assumed system knowledge does not perfectly match the true system dynamics, which in turn can severely impact its performance in real-life applications. The same goes for its extended counterpart (EKF). Linear constraints were recently shown to be a possible way to mitigate the impact of system model mismatch, which led to the derivation of a linearly constrained KF and EKF (LC-KF and LC-EKF). In this contribution, we build on these new robust filters to provide their information form counterparts, the so-called linearly constrained (extended) information filters (LC-IF and LC-EIF). In the unconstrained case, both IF and EIF are mathematically equivalent to the KF and EKF, respectively, but better suited to systems without priors or with a measurement dimension much larger than the state one. Actually only the IF and EIF can be used for large-scale real-time dynamic systems in which computational time and memory are at a premium. Hence the essential need of IF forms of the LC-KF and LC-EKF for such systems, which are introduced in this article. Furthermore, LC-(E)IF still adapts to systems without priors, even though some restrictions apply. Their computational advantages are shown through representative applications, i.e., large array processing and multi-sensor localisation.
10,809
Please write an abstract with title: Medical Image Registration via Similarity Measure based on Convolutional Neural Network, and key words: Image registration, Cloud computing, Visualization, Biomedical equipment, Medical services, Convolutional neural networks, Biomedical imaging. Abstract: Registration, which is exploited to establish the corresponding relationship between a group of images, is of importance for medical applications. Within the image processing process, a similarity measure is an essential stage. To note that the effectiveness of similarity measure is to evaluate the discrepancy between a set of image slices, which greatly affects the performance of registration. Most of the previous algorithms can be categorized in model-based methods, which rely on their suitability to the images. Meanwhile, these similarity measures can not satisfy the requirements of efficiency and accuracy in medical image registration. To address the above-mentioned problems, one novel similarity measure is presented with a convolutional neural network. Experiments were conducted to evaluate the proposed similarity measure with two public DIARETDB1 and RIRE. The numerical and visual outcome both support our work.
10,810
Please write an abstract with title: Lightweight Network Based Real-time Anomaly Detection Method for Caregiving at Home, and key words: Costs, Collaboration, Medical services, Real-time systems, Sensors, Reliability, Older adults. Abstract: Using data-driven technologies to support the healthcare of the elderly has been largely celebrated as an effective means. This paper focuses on the issue of using video-based sensing technologies to remotely monitor the activities and conditions of the elderly. Although it is a widely explored field, the high cost and high infrastructural requirements of most existing technologies usually challenge their effectiveness and efficiency in practical caregiving context. To address these challenges, we propose a lightweight network based real-time anomaly detection system, which consists of video-based ADL sensing and pre-processing, AI streaming aggregating and cluster computing. We examine our method by implementing and deploying it into a real-world care facility for the elderly in Shanghai China. The results show that our method has good performance in expansibility, reliability, bandwidth availability, accuracy and privacy protection.
10,811
Please write an abstract with title: A profile-based strategy for managing user mobility in third-generation mobile systems, and key words: Communication system traffic control, Resource management, Costs, Artificial neural networks, Neurons, Iterative algorithms, Intelligent networks, Paging strategies, Mobile radio mobility management, Routing. Abstract: Several strategies have been proposed recently to improve the performance of the location management scheme in mobile systems, the influence of mobility on network performance must be reduced, mainly due to the huge number of mobile hosts in conjunction with the small cell size. In this article we present a profile-based strategy (PBS) to reduce location update signaling cost by increasing the intelligence of the location procedure. This strategy associates with each user a list of cells where she is likely to be at a given probability in each time interval. The implementation of this strategy has been subject to extensive evaluation. The results obtained confirm the effectiveness of PBS in significantly reducing the costs of both location updates and call delivery procedures when compared to IS-41 and other well-known strategies in the literature.
10,812
Please write an abstract with title: Guest Editorial: Fuzzy Systems Toward Human-Explainable Artificial Intelligence and Their Applications, and key words: Special issues and sections, Fuzzy systems, Artificial intelligence, Decision making, Benchmark testing, Human factors. Abstract: This special issue explores foundation methodologies, the latest directions, and emerging applications in a new generation of fuzzy systems related to human-explainable AI. The presented studies offer a snapshot of the latest advances in human-centric intelligence and interdisciplinary research, including computational behavioral science, learning methods for interpretable models, theoretical approaches and knowledge representation to explainability, decision support systems, and fuzzy control systems to explain robot behavior. They provided comprehensible explanations of AI decisions that enhanced the training performance on the benchmarks and the transparency through an interface to the end-users and engineers.
10,813
Please write an abstract with title: Convergence analysis of high-order commutator-free quasi-Magnus exponential integrators for nonautonomous linear Schrödinger equations, and key words: nonautonomous linear evolution equations, Schrödinger equations, quantum systems, time integration methods, exponential integrators, Magnus integrators, commutator-free quasi-Magnus exponential integrators, stability, local error, convergence. Abstract: This work is devoted to the derivation of a convergence result for high-order commutator-free quasi-Magnus (CFQM) exponential integrators applied to nonautonomous linear Schrödinger equations; a detailed stability and local error analysis is provided for the relevant special case where the Hamilton operator comprises the Laplacian and a regular space-time-dependent potential. In the context of nonautonomous linear ordinary differential equations, CFQM exponential integrators are composed of exponentials involving linear combinations of certain values of the associated time-dependent matrix; this approach extends to nonautonomous linear evolution equations given by unbounded operators. An inherent advantage of CFQM exponential integrators over other time integration methods such as Runge–Kutta methods or Magnus integrators is that structural properties of the underlying operator family are well preserved; this characteristic is confirmed by a theoretical analysis ensuring unconditional stability in the underlying Hilbert space and the full order of convergence under low regularity requirements on the initial state. Due to the fact that convenient tools for products of matrix exponentials such as the Baker–Campbell–Hausdorff formula involve infinite series and thus cannot be applied in connection with unbounded operators, a certain complexity in the investigation of higher-order CFQM exponential integrators for Schrödinger equations is related to an appropriate treatment of compositions of evolution operators; an effective concept for the derivation of a local error expansion relies on suitable linearisations of the evolution equations for the exact and numerical solutions, representations by the variation-of-constants formula and Taylor series expansions of parts of the integrands, where the arising iterated commutators determine the regularity requirements on the problem data.
10,814
Please write an abstract with title: Instability in active balancing control of dc bus voltages in VSC converters interconnected via multi-winding transformers, and key words: Couplings, Reactive power, Switching frequency, Windings, Switches, Pulse width modulation, Transformers. Abstract: In high power applications, 3-phase ac/dc Voltage Source Converters (VSCs) are paralleled to increase the overall aggregated converter power rating, number of voltage steps, effective switching frequency and control bandwidth. For this, the interleaved Pulse Width Modulation (PWM) and current limiting converter paralleling inductors are utilized. Interphase Transformers (ITRs) or Multi-Winding Transformers (MWTs) are often adopted for the converter paralleling because they provide large inductances for the currents flowing among the converters while introduce relatively lower leakage inductances for the currents flowing from the converters to the power grid. However, large asymmetries in the inductances created by magnetic coupling in these transformers make it difficult to independently control active power flows in the converters. Thus, if the converter dc buses are not interconnected, instabilities in the active balancing control of the converter dc bus voltages are possible in certain operational conditions. In this paper MWT model and effects of magnetic coupling introduced by it on controllability of the power flows among the converters are presented. Operational condition leading to instability of the active balancing control is theoretically defined and validated in simulations.
10,815
Please write an abstract with title: A coaxial-waveguide cyclotron autoresonance maser (CARM) amplifier, and key words: Coaxial components, Cyclotrons, Masers, Electron beams, Magnetic fields, Eigenvalues and eigenfunctions, Equations, Cutoff frequency, Gyrotrons, Postal services. Abstract: A new concept of gyro-devices in the form of a coaxial-waveguide cyclotron autoresonance maser (CARM) is proposed, which may be well suited for operation at both high power and ultrahigh gain in the millimeter wave and far infrared regions. Example is presented for a coaxial configuration - with outer and inner radii of 1.83 cm and 0.50 cm - designed to operate in the TE/sub 28,16/ mode at 335 GHz, yielding a gain of 64 dB on using a 90 keV and 50 A electron beam confined by a 9.35 T magnetic field. Nonlinear simulation demonstrates the possibility of power enhancement via a tapered magnetic field and the suppression of the degenerate mode as well as the absolute instability.
10,816
Please write an abstract with title: Spanning the 4 kbps divide using pulse modeled residual, and key words: Speech synthesis, Pulse shaping methods, Scalability, Compression algorithms, Switches, Speech analysis, Laboratories, Australia, Noise shaping, Acoustical engineering. Abstract: This paper reports a scalable method for coding the LP residual. The scalable method is capable of increasing the accuracy of the reconstructed speech from a parametric representation at low rates to a more accurate waveform matched representation at higher rates. The method entails pitch length segmentation, decomposition into pulsed and noise components and modeling of the pulsed components using a fixed shape pulse model in a closed-loop, analysis by synthesis system.
10,817
Please write an abstract with title: Novel Results on Global Robust Stability Analysis for Dynamical Delayed Neural Networks Under Parameter Uncertainties, and key words: Artificial neural networks, Upper bound, Mathematical model, Delay effects, Robust stability, Neurons, Stability analysis. Abstract: In this paper, we focus on the global stability analysis with respect to dynamical delayed neural networks (NNs) that contain parameter uncertainties. Many investigations on the sufficient conditions utilizing different upper bounds for the norm of interconnection matrices pertaining to the global asymptotic robust stability of delayed NNs have been conducted. In this study, a new upper bound of the norm of connection weight matrices is derived for the delayed NNs under parameter uncertainties. The key focus is on how the new upper bound is able to yield minimum result with respects to some of the existing upper bounds. We demonstrate that the new upper bound can lead to some new sufficient conditions with respect to the global asymptotic robust stability of equilibrium point of the delayed NNs. The slope bounded activation functions and Lyapunov-Krasovskii functionals (LKFs) are employed for formulating the sufficient conditions of the equilibrium point of NNs. Moreover, the derived sufficient conditions are independent on the time delay parameter. Numerical examples are provided and the outcomes obtained are compared with those of the existing results subject to different network parameters.
10,818
Please write an abstract with title: A study of recent research trends and experimental guidelines in mobile ad-hoc network, and key words: Guidelines, Ad hoc networks, Mobile ad hoc networks, Analytical models, Libraries, IEL, Routing, Energy management, Fault tolerance, Scalability. Abstract: This work investigates and analyzes recent research trends and presents experimental guidelines on MANETs. More than 1,300 MANET related papers in IEEE/IEE Electronic Library (IEL Online) from 1998 to 2003 were collected and surveyed. The research trends, qualitative analysis and simulation guidelines from fifteen major MANET issues are investigated to assist the user in conducting MANET research. Based on recent six year trends we found that some issues such as routing and power management attracted much attention. We also found that some issues have potential study value, such as IP addressing and fault tolerance. In the qualitative analysis, we found that some factors such as scalability, stability, and reliability attracted much attention in major MANET issues. The essential simulation metrics for various MANET issues are identified and listed for experimental guidelines. The analysis results demonstrate the utilization trends for various MANET simulators.
10,819
Please write an abstract with title: Regulation of Voltage and Reactive Power in AC Microgrid, and key words: Reactive power, Technological innovation, Microgrids, Power system stability, Control systems, Throughput, Regulation. Abstract: The research is aimed at developing effective solutions for creating Microgrid and integrating them with external power systems. One of the important technological tasks in this case is the regulation of the voltage when the Microgrid is synchronized with the external power system and the parallel voltage operation mode is implemented with the difference in the levels of the desired voltages in the Microgrid network and the external power network. To solve the problem, it is proposed to use innovative patented devices- normalizers of alternating voltage NORMEL™ on Microgrid connections with the external electrical network. The paper presents the results of the analysis of the conditions and possibilities of voltage and reactive power regulation, modeling Microgrid modes exclusively of alternating current, both in terms of generation and the electrical network, including synchronous connections with the external power system. The results are based on the experience of creating such Microgrids based on cogeneration power plants with the capacity of up to 25 MW with gas reciprocating.
10,820
Please write an abstract with title: Event-Triggered Feedback Control for Continuous-Time Switched Affine Systems, and key words: Asymptotic stability, Sufficient conditions, State feedback, Conferences, Optimal control, Switches, Control systems. Abstract: In this paper, the problem of event-triggered control for continuous-time switched affine systems is investigated. The asynchronous switching occurs because the event-triggered sampling mechanism causes the mismatch between the active subsystem and the controller. Based on the asynchronous event-triggered sampling condition, sufficient conditions are provided for the asymptotic stability of switched affine systems to the equilibrium points. These conditions are formulated in the form of linear matrix inequalities (LMIs). Then, a quadratic cost function for optimizing control performance is formulated. Finally, an example is given to illustrate the advantages of our established results.
10,821
Please write an abstract with title: Humanitarian Technologists as Prototypical V-Shaped Professionals, and key words: Training, Ethics, Databases, Conferences, Employment, Organizations, Resource management. Abstract: A decade of success for the Institute of Electrical and Electronic Engineers (IEEE) Global Humanitarian Technology Conference (GHTC) points to the need to consider important ontological questions, such as, “what does it mean to be employed in the occupation of humanitarian technologist?” To answer this important question, definitions of humanitarianism as well as I-shaped, T-shaped, and V-shaped professionals are provided, and an occupation description following the format used by the United States Bureau of Labor Statistics is proposed. Implications for prototypical V-shaped descriptions of humanitarian technologists are described, including how convergence can be used to solve complex problems that meet societal needs such as disaster response, disaster risk reduction, and sustainable development. In this article, it is proposed that the work of humanitarian technologists supports the welfare of individuals and the public through a fair allocation of emergency and preventative resources, which contribute to global sustainable development.
10,822
Please write an abstract with title: Blockchain-Enabled Internet of Medical Things to Combat COVID-19, and key words: Blockchain, COVID-19, Security, Privacy, Edge computing, Medical diagnostic imaging, Coronaviruses, Pandemics. Abstract: We are experiencing an unprecedented healthcare crisis caused by newly discovered coronavirus disease (COVID-19). The outbreaks of COVID-19 reveal the frailties of existing healthcare systems. Therefore, the digital transformation of healthcare systems becomes an inevitable trend. During this process, the Internet of Medical Things (IoMT) plays a crucial role, while intrinsic vulnerabilities of security and privacy deter the wide adoption of IoMT. In this article, we present a blockchain-enabled IoMT to address the security and privacy concerns of IoMT systems. We also discuss the solutions brought by blockchain-enabled IoMT to COVID-19 from five different perspectives. Moreover, we outline the open challenges and future directions of blockchain-enabled IoMT.
10,823
Please write an abstract with title: Research on Internal Temperature Field and Hydrogen Diffusion Characteristics of Inverted Oil-Immersed Current Transformer, and key words: Partial discharge measurement, Temperature distribution, Power measurement, Current transformers, Oils, Hydrogen, Windings. Abstract: The current transformer converts the large current in the primary system into a small current for secondary measurement and protection in the power system. It has an indispensable effect on the stable operation and fault current measurement of the power system. During the online operation, the abnormal increase in gas of the oil inside the current transformer caused by partial discharge, heat failure, etc., caused the internal pressure to increase sharply, which easily caused insulation damage and explosion. In addition, the studies have shown that hydrogen is considered an early signal of equipment failure. In order to study the internal temperature field distribution of the current transformer and the influence factors of hydrogen diffusion, this paper uses ANSYS Fluent software simulation to establish a 110kV inverted oil-immersed current transformer model. The finite element analysis method was used to obtain the internal temperature field and hydrogen diffusion characteristics of the inverted oil-immersed current transformer, and the inverted oil-immersed current transformer test platform was established to verify the effectiveness of the simulation.
10,824
Please write an abstract with title: The real frequency technique applied to narrow-band MMIC multi-stage optical modulator drivers, and key words: Optical modulation, Frequency, Narrowband, MMICs, Bandwidth, Stimulated emission, Optical amplifiers, Amplitude modulation, Fading, Chromatic dispersion. Abstract: For the recent OSSB (optical single side band) systems, modulator drivers need only a narrow bandwidth (2 GHz bandwidth at 40 GHz) to convert electric signals into optical ones. Indeed, one of the most simple ways to eliminate the periodic fading due to chromatic dispersion is to use an optical single side band signal. In accordance with this principle, this paper presents two highly linear multistage MMIC amplifiers. For the design of the matching networks, the real-frequency technique has been successfully applied to 26.5-29.5 GHz and 40.5-42.5 GHz amplifiers.
10,825
Please write an abstract with title: Calculation and measurement of electromechanical coupling coefficient of capacitive micromachined ultrasonic transducers, and key words: Ultrasonic variables measurement, Ultrasonic transducers, Biomembranes, Voltage, Electrodes, Mechanical energy, Parasitic capacitance, Piezoelectric transducers, Bandwidth, Capacitors. Abstract: The electromechanical coupling coefficient is an important figure of merit of ultrasonic transducers. The transducer bandwidth is determined by the electromechanical coupling efficiency. The coupling coefficient is, by definition, the ratio of delivered mechanical energy to the stored total energy in the transducer. In this paper, we present the calculation and measurement of coupling coefficient for capacitive micromachined ultrasonic transducers (CMUTs). The finite element method (FEM) is used for our calculations, and the FEM results are compared with the analytical results obtained with parallel plate approximation. The effect of series and parallel capacitances in the CMUT also is investigated. The FEM calculations of the CMUT indicate that the electromechanical coupling coefficient is independent of any series capacitance that may exist in the structure. The series capacitance, however, alters the collapse voltage of the membrane. The parallel parasitic capacitance that may exist in a CMUT or is external to the transducer reduces the coupling coefficient at a given bias voltage. At the collapse, regardless of the parasitics, the coupling coefficient reaches unity. Our experimental measurements confirm a coupling coefficient of 0.85 before collapse, and measurements are in agreement with theory.
10,826
Please write an abstract with title: Owl Eyes: Spotting UI Display Issues via Visual Understanding, and key words: Computer bugs, Visual effects, Software, User experience, Mobile applications, Usability, Graphical user interfaces. Abstract: Graphical User Interface (GUI) provides a visual bridge between a software application and end users, through which they can interact with each other. With the development of technology and aesthetics, the visual effects of the GUI are more and more attracting. However, such GUI complexity posts a great challenge to the GUI implementation. According to our pilot study of crowdtesting bug reports, display issues such as text overlap, blurred screen, missing image always occur during GUI rendering on different devices due to the software or hardware compatibility. They negatively influence the app usability, resulting in poor user experience. To detect these issues, we propose a novel approach, OwlEye, based on deep learning for modelling visual information of the GUI screenshot. Therefore, OwlEye can detect GUIs with display issues and also locate the detailed region of the issue in the given GUI for guiding developers to fix the bug. We manually construct a large-scale labelled dataset with 4,470 GUI screenshots with UI display issues and develop a heuristics-based data augmentation method for boosting the performance of our OwlEye. The evaluation demonstrates that our OwlEye can achieve 85% precision and 84% recall in detecting UI display issues, and 90% accuracy in localizing these issues. We also evaluate OwlEye with popular Android apps on Google Play and F-droid, and successfully uncover 57 previously-undetected UI display issues with 26 of them being confirmed or fixed so far.
10,827
Please write an abstract with title: A Novel Hyperspectral Image Change Detection Framework Based on 3D-Wavelet Domain Active Convolutional Neural Network, and key words: Training, Geoscience and remote sensing, Transforms, Feature extraction, Convolutional neural networks, Data mining, Hyperspectral imaging. Abstract: Change detection techniques of hyperspectral images(HSI) has witnessed great improvements with the applications of deep convolutional networks (CNN). In this paper, we propose a novel HSI change detection framework based on 3D-Wavelet domain active convolutional neural network. First, the bi-temporal hyperspectral difference image is decomposed into directional subbands by the discrete 3D-Wavelet transform, which is capable of suppressing the noise information of the HSIs. Then, to enhance the change discrimination ability of the primary features, the directional subbands are concatenated from coarse to fine scales to form the initial 3D-Wavelet feature map. In the conventional implementation, active learning strategy is iteratively adopted to extract the deep features of the constructed feature map, in each active learning round, the most informative unlabeled samples will be selected to enlarge the training set, which greatly reduces the labor of annoteing data. Results on two realworld hyperspectral change detection datasets demonstrates the effectiveness of the proposed approach.
10,828
Please write an abstract with title: Efficiency Evaluation of Boost Converter and Three-phase Current Source Inverter with SiC Devices, and key words: Inverters, Insulated gate bipolar transistors, Silicon carbide, Switches, Delays, Switching frequency, Power generation. Abstract: This paper deals with efficiency evaluation of boost converter and three-phase current source inverter (CSI) with SiC Devices. This research target is an efficiency improvement for an induction motor drive with variable frequency system. A boost converter topology for applying the device to the current source is proposed, and the experimental evaluation of Si and SiC devices under static load is shown. Furthermore, the efficiency characteristic improvements are shown when SiC-MOSFET device is applied to a current source inverter under the static load.
10,829
Please write an abstract with title: A mismatch-dependent power allocation technique for match-line sensing in content-addressable memories, and key words: Computer aided manufacturing, CADCAM, Pattern matching, Multilevel systems, CMOS process, Multivalued logic, CMOS logic circuits, Neural networks, Network address translation, Pattern recognition. Abstract: In the conventional content-addressable memory (CAM), equal power is consumed to determine if a stored word is matched to a search word or mismatched, independent of the number of mismatched bits. This paper presents a match-line (ML) sensing scheme that allocates less power to match decisions involving a larger number of mismatched bits. Since the majority of CAM words are mismatched, this scheme results in a significant CAM power reduction. The proposed ML sensing scheme is implemented in a 256 × 144-bit ternary CAM for a 0.13-μm 1.2-V CMOS logic process. For a 2-ns search time on a 144-bit word, the proposed scheme saves 60% of the power consumed by the conventional sensing scheme.
10,830
Please write an abstract with title: Microwave Detection of Cancer-Cell Using FDTD Half-Space<sup>*</sup>, and key words: API, Cancer, EM imaging, FDTD, Scattering. Abstract: This paper presents a radar-based microwave imaging of breast cancer by scanning the internal organs' tissues with contrast in their dielectric properties. A python API-based 3D FDTD code reduces human intervention for such a complex study. The details of the findings will be presented at the conference.
10,831
Please write an abstract with title: Lightweight Action Recognition with Sequence-Specific Global Context, and key words: Convolution, Three-dimensional displays, Two dimensional displays, Context modeling, Spatiotemporal phenomena, Computational modeling, Feature extraction. Abstract: With the emergence of a large number of video resources, video action recognition is attracting much attention. Recently, realizing the outstanding performance of three-dimensional (3D) convolutional neural networks (CNNs), many works have began to apply them for action recognition and obtained satisfactory results. However, high computational over-heads greatly reduce the efficiency of 3D CNNs. To make up for the shortcoming, in this paper, we first propose two innovations - the Xwise Separable Convolution and the SS block, both of which are lightweight. Then we build an efficient 3D CNN called the XwiseNet based on our innovations. Our work aims to make 3D CNNs lightweight without reducing the recognition accuracy. The key idea of the Xwise Separable Convolution is extremely decoupling the 3D convolution in channel, spatial, and temporal dimensions. The SS block can capture temporal long-range dependencies via aggregating sequence-specific global context to each sequence feature. Experiments have verified that our XwiseNet achieves competitive performance with the least computational overhead.
10,832
Please write an abstract with title: Embedding video in stand alone test equipment to eliminate training for low-volume, high mix manufacturing and field diagnostics, and key words: Test equipment, Manufacturing, System testing, Costs, User interfaces, Operating systems, Software tools, Animation, Codecs, Personnel. Abstract: A common problem in supporting system readiness is the training required to operate test and diagnostic systems. Newly enlisted personnel, or multinationals not fluent in English, are often called upon to operate and maintain complex, high-value, low-volume systems with a minimum of training. Cost and availability of highly skilled technicians versus user interface development is frequently a major consideration in test system design. The latest generation of commercially available test equipment is being built around popular operating systems to enhance connectivity and code transportability. One of the new operating system benefits is built-in support for multimedia presentations. It is now possible for the test professional to embed custom application-specific video interfaces on stand-alone commercial test equipment. This enables the end user's application instructions to be delivered directly from the screen of instruments like oscilloscopes, spectrum analyzers and network analyzers in the form of a video. These videos can be used to virtually eliminate the requirement for highly skilled operators with intimate system knowledge. Key to putting custom step-by-step video operating instructions on to the newest generation of test equipment is the approach used for content development. The recent revolution in video cameras, high-speed IEEE 1394 interconnections, nonlinear video editing software, animation software and codecs have greatly reduced the cost of developing highly effective user interfaces, and are fast becoming an essential part of the test engineer's development tools. This paper covers a unique approach to capturing video instructions, animating block diagrams and multilingual narration for inexpensive 'on-screen' delivery to the test operator. The appropriate software development tools and codecs are reviewed, as well as common mistakes in assimilating video technology in large organizations. Additionally, the media considerations necessary for a downloadable architecture in an Internet distributed-test environment are also suggested.
10,833
Please write an abstract with title: Location-Allocation Model for the Design of Guidance Signage Systems for Pedestrian Wayfinding in Public Spaces, and key words: Design methodology, Microscopy, Rail transportation, Vehcile safety, Location awareness. Abstract: This paper investigates a design method for guidance signage systems in public spaces. A guidance graph method is proposed based on a combination of the shortest path algorithm and the proposed limited penetrable MAKLINK graph (LPMG) to determine the sets of guidance demand points and potential sign locations. The memory duration of pedestrians is measured in a cognitive experiment to determine the expected distance between guidance points. To reasonably estimate the coverage of guidance signs, a multifeature fusion-based interaction (MFI) model is proposed. Then, a binary linear programming formulation of a location-allocation model is proposed based on the MFI model. The proposed model can suggest the optimal orientations of signs in addition to their optimal number and locations. Finally, the effectiveness of the proposed method is illustrated through a real-world case study. The case study shows that the proposed model can produce a much more economical and pedestrian-friendly location-allocation plan than previous methods. A sensitivity analysis shows that the number of signs is a piecewise decreasing function with respect to the letter height and the expected distance between guidance points.
10,834
Please write an abstract with title: Conversational Music Recommendation based on Bandits, and key words: Recommender systems, Real-time systems, Heuristic algorithms, Rocks, Task analysis, Sun, Learning (artificial intelligence). Abstract: Music is one of the most popular products in the recommender system, and there have been many various methods of exploring music recommendations. Traditional music recommendations commonly collect users' feedbacks in limited ways for preference analysis. The text dialogue is a direct and natural interactive mode, providing diversified information. In this paper, we discuss the music recommendation in an innovative scenario - a conversational music recommendation model, which integrates the advantages both from the recommender system and dialog system. This paper adopts a ”user ask, system respond” interactive way to obtain users' real-time requirements, and users are allowed to express their requirements on music in free text. In order to face the fast-changing music preferences, this paper adopts the bandit-based algorithm to absorb users' attitudes to the current recommendation, and the results show these methods achieve better performance than baselines. Besides, it also constructs a music-domain knowledge graph to support the richer users' musical expressions with millions of music items and tens of millions of relations.
10,835
Please write an abstract with title: 3-D Visual Servoing of Magnetic Miniature Swimmers Using Parallel Mobile Coils, and key words: Mobile robots, Magnetic resonance imaging, Steering systems, Three-dimensional displays, Micromagnetics, Electromagnetics, Coils. Abstract: Untethered magnetic microrobots can be remotely controlled by dynamic magnetic fields. The ability to pass through complex and narrow regions makes them have great potential in biomedical applications. To date, various magnetic actuation systems and control methods have been developed to drive these tiny agents. However, steering their 3D locomotion at the human scale using electromagnetic systems is still challenging. In this regard, this article explores a closed-loop control strategy that guides swimming of magnetic microrobots at low Reynolds numbers in a large workspace. An eye-in-hand stereo-vision mobile-coil system is adopted to provide required dynamic magnetic fields and vision information. Both corkscrew-type and flexible-oar-type swimmers are analyzed, and a unified kinematic model is established. Based on the system and model, a triple-loop visual servoing scheme is proposed to fulfill simultaneous mechanism tracking and swimmer steering. Two different scaled-up untethered microrobots are employed in the path following experiment. Our prototype magnetic actuation system reaches a cylindrical workspace of diameter over 200 mm, and the mean error of path tracking is within 2 mm. These results provide a preliminary study for dexterous magnetic actuation of miniature robots for medical treatment.
10,836
Please write an abstract with title: Optimal design and implementation of fuzzy fractional order PID controller for AGC study, and key words: Symbiosis, Transient response, Process control, Automatic generation control, Reliability engineering, Robustness, Organisms. Abstract: To deliver good quality of electric power to the consumers in an interconnected power system automatic generation control (AGC) shows a significant role. Hence in this paper, a novel Fuzzy Fractional Order Proportional-Integral (FFOPI) controller is proposed for AGC of two equal area multi source power system. The effectiveness of the proposed controller is established by comparing its performance with that of Proportional-integral-Derivative (PID), and Fuzzy-PI controllers. The gain parameters of the controllers are tuned by using an efficient optimization technique called Symbiotic Organism Search (SOS) optimisation Algorithm. Integral Time Absolute Error (ITAE) is used as the objective function for reducing the Area Control Error (ACE) in the optimisation process. Further, the robustness of the recommended controller is justified by inserting a random load in area-1. Hence, to supply reliable and quality electricity, the designed controller is found to be better and more efficient.
10,837
Please write an abstract with title: Excitation system parameter setting for power system planning, and key words: Power system planning, Power system modeling, Power system simulation, Power system dynamics, Power system stability, Voltage, Power system transients, Synchronous machines, Signal processing, System testing. Abstract: A method for setting parameters of excitation systems is proposed in this paper. There are two steps in the method. Firstly, large signal performance is tested with some large signal objective indexes, and then parameters of the excitation system are identified. Secondly, the parameters of the excitation system are optimized through small signal performance test with the ITAE criterion. Several studied cases such as standard excitation systems of IEEE type AC1, AC2 and ST1 are presented. Simulation results show the method developed in the paper is effective in parameter setting of excitation systems.
10,838
Please write an abstract with title: Field information system using an agricultural helicopter towards precision farming, and key words: Information systems, Helicopters, Crops, Agriculture, Satellites, Agricultural engineering, Image sensors, Remote sensing, Food technology, Distortion measurement. Abstract: The objective of this study is to develop the system that can generate a map regarding field information such as crop status and land topographical feature obtained by an imaging sensor and laser range finder mounted on an unmanned helicopter. To generate a precise map, accurate measurement of helicopter's position and posture are essential, because the geometric distortions occur in the image taken from the helicopter due to variations of the sensing position and posture. In the research, an RTK-GPS was adopted as a positioning sensor and the helicopter's posture was obtained by an INS. Furthermore, the encoders can measure the imaging sensor's motion. The transformation method to generate a map using these parameters was developed. And a topographic map of a field was generated by adopting laser range finder as another sensor.
10,839
Please write an abstract with title: Identifying Vulnerable Critical Infrastructure Zones in Smart Cities, and key words: Critical infrastructure, Communication networks, Measurement, Reliability engineering, Smart cities. Abstract: Emerging smart cities are leveraging technologies to create smart critical infrastructures with the goal of improving the quality of life. These smart infrastructures introduce new vulnerabilities to the failure of ICT and electric power. Hence there is a need for holistic analysis of critical infrastructures incorporating power and communications with other infrastructures when determining weak points. Here we propose a framework for identifying the most important geographical zones within a city from a critical infrastructure viewpoint. The framework combines multiple metrics including societal, geographic and network science based, as well as including power requirements. Furthermore it enables analyst to study both networked critical infrastructure and standalone critical infrastructure. A case study of four critical infrastructures in the city of Pittsburgh, Pennsylvania is given illustrating the approach. The results show that considering the infrastructures as a group in a holistic fashion yields much different results when compared with studying each infrastructure individually. Further, we demonstrate how the results of the holistic analysis can be incorporated into a risk analysis.
10,840
Please write an abstract with title: The impact of TiN capping Layer on NiSi, CoSi/sub 2/, and Co/sub x/Ni/sub 1-x/Si/sub 2/ FUSI metal gate work function adjustment, and key words: Semiconductor device doping, Electron emission, Titanium materials/devices, Nickel materials/devices, Cobalt materials/devices, Boron materials/devices. Abstract: The impact of TiN capping layer on dual work functions of Ni, Co, and Co-Ni fully silicided (FUSI) metal gates was investigated. It was found that the TiN capping layer significantly altered the distribution of both n- and p-dopants during the FUSI process, which in turn changed the work functions of both As-doped and B-doped in the three FUSI metal gate systems. The work function tuning was found to have a linear relationship with the change of dopant level at the silicides/dielectric interface after adding TiN capping layer. The investigation of TiN capping layer on FUSI provided some insights on work function tuning mechanism in FUSI systems. This work also suggested a new methodology for optimizing the nMOS and pMOS work functions for CMOS device applications.
10,841
Please write an abstract with title: Cantilever sensor with stress-concentrating piezoresistor design, and key words: Piezoresistance, Silicon, Structural beams, Wet etching, Micromachining, Anisotropic magnetoresistance, Sensor phenomena and characterization, Stress, Finite element methods, Force sensors. Abstract: A novel approach for enhancing the sensitivity of piezoresistive cantilever sensors is presented. Thin piezoresistive clamped-clamped silicon beams are released on the surface of the cantilever by a micromachining process sequence combining deep-reactive ion etching and anisotropic wet etching of silicon. A deflection of the cantilever sensor yields a stress concentration in these micromachined piezoresistive structures. Finite element simulations indicate an increase in both force and displacement sensitivity compared to a conventional cantilever beam with the same thickness. Devices have been fabricated and initial characterization has been performed. Under constant tip deflection of the cantilever, the new piezoresistor design shows an increase in the relative resistance change by a factor of 5.2 compared to a cantilever with the same thickness and conventional piezoresistor design
10,842
Please write an abstract with title: CMOS bulk input technique, and key words: CMOS technology, CMOS logic circuits, Logic devices, Logic circuits, Latches, Power amplifiers, DC generators, Power generation, Signal generators, Power dissipation. Abstract: In this work, we present a new CMOS circuit with a bulk input technique called bulk input differential logic (BIDL). A boost circuit is connected to the bulk terminal of the input device to control the substrate bias and generate current difference between the two sides of the differential logic network. A current latch sense amplifier is used to generate a pair of full-swing output signals without DC power dissipation. The logic network is designed without cascoding of devices. Thus a lower resistive path results in the speed improvement. Simulation results show that the BIDL has better speed and power performance compared to conventional differential logic circuits.
10,843
Please write an abstract with title: Uncertainty EM Scattering Prediction for Inhomogeneous Dielectric Bodies of Revolution, and key words: Uncertainty, Splines (mathematics), Shape, Surface topography, Surface reconstruction, Scattering, Random variables. Abstract: A perturbed volumetric integral equation is fabricated to predict the uncertain scattering characteristics for the in-homogeneous dielectric bodies of revolution (BoRs) targets. The transverse surface of the body of revolution is discretized in terms of the rectangular and triangular basis functions. In this way, all the unknowns are assigned to the electric flux density and the governing equation can be solved mode by mode. Both the geometrical and dielectric uncertainties are taken into consideration for EM scattering characteristics. On one hand, the geometrical shape uncertainty is described with the nonuniform rational B-spline surface by using several independent random variables. On the other hand, the dielectric uncertainty is represented by the perturbed permittivity. Thus, the volume integral equation is reconstructed by the perturbed electric flux density. Both the mean value and variance of the radar cross Section can be derived to account for the geometrical and dielectric uncertainties. Numerical results are given to show that the calculation efficiency of the proposed method is higher than that of the traditional Monte Carlo method.
10,844
Please write an abstract with title: Generalized Imperfect D2D Associations in Spectrum-Shared Cellular Networks Under Transmit Power and Interference Constraints, and key words: Device-to-device communication, Receivers, Downlink, Transmitters, Cellular networks, Interference constraints. Abstract: This paper studies imperfect underlay device-to-device (D2D) association in spectrum-shared cellular networks. It addresses important system and design interference constraints, processing load limitations and transmit power constraints at D2D terminals. The paper proposes decentralized schemes for D2D communication between D2D terminals when downlink channel resources can be reused in the D2D network. The D2D transmitters are characterized considering their processing load limitation and allocated transmit power constraints. Moreover, the downlink channels that can be reused in the D2D network are quantified while meeting interference constraints imposed by the primary cellular network. Two schemes to identify reusable channels, which vary in terms of their efficiency, communication overhead requirement and implementation complexity, are described. Moreover, two D2D association schemes, namely the simultaneous and sequential D2D associations, are proposed and both aim to concurrently maximize the desired link quality and minimize the effect of interference effect at D2D receivers. Generalized analytical results that are applicable for various imperfect association scenarios are presented. The findings are applicable for any D2D channel models and performance metrics. They provide insights into various imperfect underlay D2D association scenarios under the practical system and design constraints.
10,845
Please write an abstract with title: Frequency Security Assessment of Power System Under Random Excitation Based on the Time Beyond Security Range, and key words: random excitation, frequency security, stochastic differential equation(SDE), Monte Carlo simulation, the time beyond security range. Abstract: With the large-scale access of renewable energy generation such as wind and solar energy and new power loads such as electric vehicles, the unbalanced power fluctuations of the power grid, i.e., random excitations, are increasing, and the impact of random excitations, on the dynamic security of power system frequencies cannot be ignored. In this paper, the dynamic response behavior of the power system frequency under random excitation is modeled as a stochastic differential equation (SDE). Using the numerical solution method of SDE, the dynamic process of the frequency response of the system is solved and analyzed. On this basis, the critical excitation intensity and the time beyond security range are proposed to evaluate the system frequency security under random excitation. Through Monte Carlo simulation and analytical methods, this paper solves the time beyond the security range, and the results are in good agreement with each other.
10,846
Please write an abstract with title: Asymptotic Waveform Evaluation With Higher Order Poles, and key words: Mathematical model, RLC circuits, Taylor series, Markov processes, Laplace equations, Integrated circuit modeling, Analytical models. Abstract: The research generalizes the traditional asymptotic waveform evaluation method only with first order poles to the method with higher order poles case. We discuss the invertibility of the induced generalized Vandermonde matrix with the determinant formula of the matrix. Via establishing the equivalence of the multiplicity of the poles and the coefficients of the introduced matrix, the generalized asymptotic waveform evaluation algorithm is built. Then the real system realization of the lower order poles-residues form is asserted. At last two experiments are provided to check the validity of our algorithm.
10,847
Please write an abstract with title: Advanced defect characterization by combining temperature- and injection-dependent lifetime spectroscopy (TDLS and IDLS), and key words: Spectroscopy, Temperature dependence, Charge carrier lifetime, Lifetime estimation, Energy states, Radiative recombination, Energy measurement, Energy capture, Charge carrier processes, Silicon. Abstract: Apart from detecting the presence of electrically active defects, lifetime measurements allow for a direct identification of defects if the injection and temperature dependence is analyzed. Recent studies have revealed that Temperature Dependent Lifetime Spectroscopy (TDLS) and Injection Dependent Lifetime Spectroscopy (IDLS) are complementary: while the energy level Et is more easily gained from TDLS, IDLS is more adequate to determine the capture cross section ratio k = /spl sigma//sub n///spl sigma//sub p/. The present work demonstrates on intentionally metal-contaminated silicon that a complete defect characterization is achievable by combining IDLS and TDLS. Additionally, it is shown for the first time that k and the band half of the defect location can often be determined from TDLS alone if the entire TDLS-curve is modeled.
10,848
Please write an abstract with title: Transient Control Parameter Identification of Double-Fed Wind Turbine Model Based on Chaotic Particle Swarm Optimization Algorithm, and key words: Double-fed wind turbine, low voltage ride through, parameter identification, chaotic particle swarm optimization. Abstract: Wind power integration transient simulation requires accurate wind turbine transient model and control parameters. However, the specificity of control parameters of wind turbine manufacturers makes it difficult to obtain accurate parameters, and the accuracy of simulation results can not be guaranteed. To obtain accurate parameters of the transient simulation model of doubly fed induction generator(DFIG), a stepwise parameters identification method for the transient simulation model of doubly fed induction generator considering active power recovery process was proposed. First, based on the LVRT curve analysis of the doubly fed induction generator, the LVRT control equation of the doubly fed nduction generator is established, and the necessity of identifying LVRT parameters on the turbine side is analyzed. Secondly, because of the coupling relationship among LVRT parameters, propose a stepwise identification strategy on the basis of chaotic particle swarm, and the optimal identification conditions of each parameters are obtained based on sensitivity analysis. Finally, the proposed algorithm is used to identify the LVRT control parameters.
10,849
Please write an abstract with title: Model based requirements engineering for embedded software, and key words: Embedded software, Automotive engineering, Unified modeling language, Software systems, Design engineering, Software development management, Corporate acquisitions, Engineering management, Concrete, US Department of Defense. Abstract: Summary form only given. Software and systems development within the embedded area is dominated by model based design techniques. These techniques are commonly aligned to standard. modeling languages such as UML. Along with software and systems design techniques the concern of requirements management methodologies has been continuously increasing, with the aim of improving the overall development process. As a combination of both model based design techniques and requirements management methodologies, a new kind of requirements engineering methodology has been established. However, due to the complexity of this methodology and the high degree of informal aspects a unique and integrated methodology for requirements engineering is still needed. This presentation gives a survey of existing requirements classifications and motivates the use of model based requirements classification techniques. The transition of informal requirements to first models is illustrated.
10,850
Please write an abstract with title: Hydroponics Soilless Smart Farming in Improving Productivity of Crop Using Intelligent Smart Systems, and key words: Smart Farming, Hydroponics, Crop, Intelligent smart System. Abstract: With growing population there is a great demand for land to make accommodations which in turn decreases the availability of agricultural land. The unavailability of agricultural land may lead to a shortage of food in the future. The food shortage problem can be resolved using the Soilless Smart Farming technique. Soilless Smart Farming basically means growing crops like grain, vegetables, fruits, and seeds without soil. Soilless Smart Farming can also be termed Hydroponics; here word Hydro refers to water and Ponics indicates the flow of solution to plants without soil. The advantages of using Soilless Farming are higher crop yield, less water required, low risk of parasites attack, and continuous growth throughout the year. It becomes possible to grow a variety of crops in a small area as compared with the traditional way of farming where soil plays a measure role in cultivation. In Soilless Smart Farming IoT sensors can be used for measuring the temperature, and pH labels of the crops. The data is collected with the help of IoT sensors and collected data is sent to the cloud service to check whether the pH label is stable or not and whether the temperature is ideal for crop cultivation. The maintenance cost is reduced by using IOT sensors as it makes it easier to monitor the crop condition and take necessary steps when required.
10,851
Please write an abstract with title: Design and Performance Evaluation of a Planar Bi-Quad Antenna Operating at 2.4GHz, and key words: Antenna measurements, Performance evaluation, Fabrication, Bandwidth, Antenna radiation patterns, Testing. Abstract: This paper presents the design and fabrication of a Planar Bi-Quad Antenna operating at 2. 45GHz. The modeling and simulation of the antenna is done using the CST Studio Suite (Student Edition) and the testing of the fabricated antenna is done using the Antenna Measurement System Kit (AMS Kit) developed by Akademica. This antenna shows improved bandwidth and characteristics over conventional wired Bi-quad antennas. Various antenna parameters such as Radiation Pattern, Directivity, VSWR, S11, etc. are calculated. A close agreement is found between the simulation and the experimental results.
10,852
Please write an abstract with title: IoT-Based Dynamic Map Attributes for Connected and Autonomous Vehicles, and key words: Location awareness, Cloud computing, Connected vehicles, Roads, Stability analysis, Trajectory, Internet of Things. Abstract: The Internet of Things (IoT) is of paramount importance in the smart automotive industry, the growth of IoT has been exponential, where it enables greater transportations mobility and management efficiency through its framework. The IoT is paving the way for Connected and Autonomous Vehicles (CAVs) in the subsequent economy, through advanced networking communication capabilities. The autonomous driving systems, especially, integrate sensing, localization, perception, decision-making technologies smoothly iterated through the cloud platforms for dynamic map generation and data upload and storage. As a part of the intelligent vehicles' integration, the localization unit acts as an intermediary to communicate a large amount of data between the CAVs and the cloud. In this work, we analyze the IoT reliability in CAVs situation, applying the dynamic map as up-to-date data that guides the vehicle during a road scenario by generating a secure path. We use the Frenet frame approach that ought to emulate human behavior while driving. The approach is used to generate a velocity profile that is critical for updating dynamic map information communicated through the cloud. We put in evidence, the velocities differences in the two extreme cases, by generating the data set required for an automated vehicle using the dynamic map characteristics, as a guideline on the road. We emphasize, through the generated profiles, the stability of the test case that uses the dynamic map as a guideline to generate the most robust automated path as safety wise. The emulated information could be implemented in the CAVs to avoid accidents on the road.
10,853
Please write an abstract with title: ADUS: indirect generation of user interfaces on wireless devices, and key words: User interfaces, Mobile agents, Graphical user interfaces, Computer architecture, Java, HTML, Antarctica, Computerized monitoring, Visualization, Pervasive computing. Abstract: Nowadays, there exists a great interest in wireless and mobile devices. However, the development of graphical user interfaces (GUIs) for applications in these environments must consider new problems: 1) different device capabilities and 2) automatic monitoring of user interfaces. In this paper, we present an architecture that solves previous problems. We advocate the use of specifications of GUIs and the dynamic generation of the adequate visualization for a specific device without reimplementing each GUI for different devices.
10,854
Please write an abstract with title: How digitalization is perceived from Moroccan students: A Sentiment analysis study, and key words: Feature extraction, Sentiment analysis, Support vector machines, Social networking (online), Machine learning algorithms, Random forests, Classification algorithms. Abstract: Sentiment analysis is broadly used to assess student's opinions and reviews about different aspects related to education and problems encountered in student life. The proliferation of social media and internet expend offer a large amount of data to researchers in order to perform a set of experiments. We present in this study an optimized sentiment analysis approach based on the Information Gain filter method which aims at selecting the most relevant features to increase the accuracy given by three experimented supervised algorithms: SVM, Naive Bayes and Random Forest. Our study was carried out on 415 student's opinions written in Moroccan Dialect about digitization services in university, case of University Hassan 1st of Settat. The findings show that the SVM yields best accuracy for both the systems before feature selection and after feature selection.
10,855
Please write an abstract with title: A Quality-Related Fault Detection Method Based on the Dynamic Data-Driven Algorithm for Industrial Systems, and key words: Fault detection, Kernel, Monitoring, Nonlinear dynamical systems, Entropy, Principal component analysis. Abstract: For nearly a decade, quality-related fault detection algorithms have been widely used in industrial systems. However, the majority of these detection strategies rely on static assumptions of the operating environment. In this paper, taking the time series of variables into consideration, a dynamic kernel entropy component regression (DKECR) framework is proposed to address the instability of quality-related fault detection due to the existing dynamic characteristics. Compared with the typical kernel entropy component analysis method, the proposed method constructs the relationship between process states and quality states to further interpret the direct effect on the product taken by the fault. In the proposed approach, process measurements are converted to a lower-dimensional subspace with a specific angular structure that is more comprehensive than traditional subspace approaches. In addition, the angular statistics and their relevant thresholds are exploited to enhance the quality-related fault detection performance. Finally, the proposed method will be compared with three methods by means of a numerical example and two industrial scenarios to demonstrate its practicality and effectiveness. Note to Practitioners—This paper studies a quality-related fault detection problem for the dynamic nonlinear industrial system. Controlling and measuring the quality state is challenging for the high-level monitoring system of the manufacturing process due to the nonlinear dynamic feature in states. This paper proposes a new data-driven method based on the kernel entropy component analysis method to assess the correlation between the quality and fault in the industrial system, reducing unnecessary overhaul and maintenance. Based on the autoregressive moving average exogenous algorithm, the proposed method captures the dynamic interaction between the process states to decrease false alarms. In the experimental section, the DKECR method outperforms the compared approaches, which can provide stable fault detection results. Additionally, the unique angle structure of the proposed method can supply more information for engineers’ monitoring needs.
10,856
Please write an abstract with title: Development of non-invasive optical transcutaneous pCO/sub 2/ gas sensor and analytic equipment, and key words: Optical filters, Optical sensors, Optical signal processing, Wavelength measurement, Gas detectors, Dispersion, Fluid flow measurement, Weight control, Temperature control, Skin. Abstract: We have studied the development of an optical transcutaneous pCO/sub 2/ gas sensor and analyzer using a non-invasive method. The basic principle of the pCO/sub 2/ measurement adapted Beer-Lambert's law and the embodied system using the NDIR (non dispersive infrared) method. CO/sub 2/ gas reacts with a 4.3 /spl mu/m wavelength, so we selected this wavelength by an optical filter, and used energy decrease by molecule oscillations. We measured the CO/sub 2/ concentration using the MFC (mass flow controller) in basic steps instead of the pCO/sub 2/ gas that can collect by inflicting heat on the outer skin. This measuring system consisted of an IR lamp, an optical filter, an optical reaction chamber, a pyroelectric sensor and a signal processing system. We minimized the volume of the optical reaction chamber in order to make the sensor portable. We made an optical reaction chamber with a Si wafer using MEMS technology and it was shortened to 1 mm. We carried out an experiment in photoreaction length variation from 1 mm to 10 mm. We confirmed the linear graph of CO/sub 2/ concentration variation from 1,000 ppm (parts per million) to 100,000 ppm at 1 mm photoreaction length. The response time of this system was within 2 seconds, which is fairly fast.
10,857
Please write an abstract with title: Machine Understandable Contracts with Deep Learning, and key words: Deep learning, Scientific computing, Computational modeling, Bit error rate, Natural language processing, Data models, Task analysis. Abstract: This research investigates the automatic translation of contracts to computer understandable rules trough Natural Language Processing. The most challenging aspect, which is studied throughout this paper, is to understand the meaning of the contract and express it into a structured format. This problem can be reduced to the Named Entity Recognition and Rule Extraction tasks, the latter handles the extraction of terms and conditions. These two problems are difficult, but deep learning models can tackle them. We think that this paper is the first work to approach Rule Extraction with deep learning. This method is data-hungry, so the research also introduces data sets for these two tasks. Additionally, it contributes to the literature by introducing Law-Bert, a model based on BERT which is pre-trained on unlabelled contracts. The results obtained on Named Entity Recognition and Rule Extraction show that pre-training on contracts has a positive effect on performance for the downstream tasks.
10,858
Please write an abstract with title: Self-adaptive Threshold Traffic Anomaly Detection Based on <tex>$\varphi$</tex>-Entropy and the Improved EWMA Model, and key words: Entropy, Anomaly detection, Correlation, Telecommunication traffic, Adaptation models, Denial-of-service attack, Measurement. Abstract: Information entropy is an important method for network traffic anomaly detection. φ-Entropy is a kind of information entropy which has better performance than Shannon Entropy and Rényi Entropy. In this paper, we correct some flaws in φ-Entropy and use φ-Entropy to describe the correlation between network traffic. Most of traffic anomaly detection algorithms use a fixed threshold for anomaly judgment, but these methods cannot keep a high detection accuracy in numerous cases. Aiming at this problem, this paper proposes a method to generate a self-adaptive threshold based on the improved Exponentially Weighted Moving Average (EWMA) model. The method predicts the value of φ-Entropy at the next moment and further generate the threshold. Results of simulation and experiment show that the algorithm can effectively detect abnormal network traffic.
10,859
Please write an abstract with title: An evolution simulation framework for ecological structure of crowd networks, and key words: Analytical models, Biological system modeling, Heuristic algorithms, Ecosystems, Complex networks, Mathematical models, Data models. Abstract: Purpose – This paper aims to obtain optimal specialization mode and level for complex network or system structures. In the e-commerce system, this paper studies the changes of each transaction subject in the process of ecological structure based on the income level of each transaction subject. Design/methodology/approach – This paper aims to research the change of transaction efficiency evolution process of intermediaries. With the improvement of transaction efficiency, intermediaries interact with other transaction subjects at given modes in e-commerce systems. This paper analyzes the relationship between the factors of production and trade and explains the quantitative relationship between them in the form of mathematical modeling. An evolution simulation framework is established to elaborate the simulation process and method of crowd network in e-commerce ecosystem and then sets up the simulation experiment. Findings – During simulation processes, the changes of data are observed and analyzed to obtain the optimal evolution paths and specialization modes. Furthermore, this paper provides solid supports for the research of the quantitative analysis of ecological structure evolutions. Originality/value – Evolution simulation of ecological structure is first proposed in the topic of crowd network. It is with the aid of the concept of ecology, the theory and method, simulation of complex network structure and system structure. This paper analyses and researches the evolution process of optimal specialization modes and intelligent level of crowd networks with transaction efficiency changing. The ecological structure optimal evolution paths can be obtained by trend of simulations.
10,860
Please write an abstract with title: A Triple-Band GNSS Receiver for High Accuracy Automotive Applications, and key words: Global navigation satellite system, Target tracking, Key performance indicator, Signal processing algorithms, Receivers, Software, Timing. Abstract: Among on-board sensors, the Global Navigation Satellite System (GNSS) receiver plays a key role because of its unique capability of absolute and precise localization. Autonomous vehicles guidance and assistance, resilient timing and an increased demand for higher safety levels are motivating a rapid evolution toward multi-band GNSS receivers in the automotive (and industrial) segments. Triple-band GNSS has gained interest in the past years and found application in professional receivers and reference stations, mostly because of faster carrier-phase ambiguity resolution, stronger integrity constraints over linear combinations and higher signal availability for Real-Time Kinematic (RTK) algorithms. The deployment of new services for high-accuracy positioning, like Galileo HAS, BeiDou PPP-B2b and Quasi Zenith Satellite System (QZSS) CLAS is also taking benefit from the availability of multiple bands. In this latest applicative scenario, the third frequency plays a different role, acting as an additional downstream channel for the GNSS correction data. Signal modernization is definitely another strong enabler for the adoption of triple-band. With specific reference to system design and signal processing aspects, this article discloses a new compact GNSS chipset for automotive, capable to generate coherent triple band observables and correction data streams, including a demodulator for QZSS Code Shift Keying (CSK). The frequency plans, the supported mix of legacy and modernized signals and relevant Key Performance Indicators (KPI) are discussed for selected configurations, typically encountered in automotive precise-positioning and timing.
10,861
Please write an abstract with title: Learning continuous time Markov chains from sample executions, and key words: Stochastic systems, Hidden Markov models, System testing, Software systems, Performance analysis, Computer bugs, Machine learning algorithms, Computer science, Stochastic processes, Algebra. Abstract: Continuous-time Markov Chains (CTMCs) are an important class of stochastic models that have been used to model and analyze a variety of practical systems. In this paper we present an algorithm to learn and synthesize a CTMC model from sample executions of a system. Apart from its theoretical interest, we expect our algorithm to be useful in verifying black-box probabilistic systems and in compositionally verifying stochastic components interacting with unknown environments. We have implemented the algorithm and found it to be effective in learning CTMCs underlying practical systems from sample runs.
10,862
Please write an abstract with title: Ternarized TCN for <tex>$\mu \mathrm{J}/\text{Inference}$</tex> Gesture Recognition from DVS Event Frames, and key words: Energy consumption, Machine learning algorithms, Image edge detection, Neural networks, Pipelines, Gesture recognition, Vision sensors. Abstract: Dynamic Vision Sensors (DVS) offer the opportunity to scale the energy consumption in image acquisition proportionally to the activity in the captured scene by only transmitting data when the captured image changes. Their potential for energy-proportional sensing makes them highly attractive for severely energy-constrained sensing nodes at the edge. Most approaches to the processing of DVS data employ Spiking Neural Networks to classify the input from the sensor. In this paper, we propose an alternative, event frame-based approach to the classification of DVS video data. We assemble ternary video frames from the event stream and process them with a fully ternarized Temporal Convolutional Network which can be mapped to CUTIE, a highly energy-efficient Ternary Neural Network accelerator. The network mapped to the accelerator achieves a classification accuracy of 94.5 %, matching the state of the art for embedded implementations. We implement the processing pipeline in a modern 22 nm FDX technology and perform post-synthesis power simulation of the network running on the system, achieving an inference energy of 1.7 μJ, which is 647× lower than previously reported results based on Spiking Neural Networks.
10,863
Please write an abstract with title: Research on Location Selection of Charging Stations under the Condition of Urban Facilities in Cold Regions, and key words: Greedy algorithms, Computers, Analytical models, Urban areas, Layout, Charging stations, Electric vehicles. Abstract: This paper analyzes the facilities in cold areas to determine the factors that affect the location of charging stations. According to the operating characteristics of pure electric vehicles in cold areas and the service coverage of charging stations, a service model for charging stations based on the shortest possible mileage of remaining power is constructed. With the charging station service model based on the shortest mileage of the remaining power, and the greedy algorithm is used to solve the problem to determine the location of the charging station. Finally, based on the data related to the operation of pure electric vehicles in Urumqi and the service coverage radius of the charging station, the charging station in Urumqi was deployed.
10,864
Please write an abstract with title: Correlation Metric Selection based Correlation Alignment for Cross-project Defect Prediction, and key words: Measurement, Correlation, Quality assurance, Software metrics, Transforms, Predictive models, Prediction algorithms. Abstract: Cross-project defect prediction (CPDP) aims to identify defective software modules in a target project by using historical defect data from other source projects. Recently, CPDP has attracted much more research interest. However, existing CPDP models are parametric methods, which usually require intensive parameter selection and tuning to achieve better prediction performance. Moreover, software metrics (features) usually have strong correlation among themselves and this is detrimental to build prediction models. However, most CPDP methods don't consider to reduce correlated metrics, which may bring negative effect on the performance of CPDP. In the article, we proposed a new Correlation Metric Selection based Correlation Alignment (CMSCA) approach for CPDP to address the above concerns. Specifically, CMSCA is a non-parametric algorithm, which can perform knowledge transfer across projects without the need for parameter selection and tuning. It is simple but effective. Through an empirical investigation of 5 publicly-available defect datasets, experimental results demonstrate that the proposed CMSCA model outperforms or has comparable to the related CPDP models.
10,865
Please write an abstract with title: The Laboratory Stand for the Evaluation of Heat Dissipation from the Power Cable in a Casing Pipe, and key words: Temperature measurement, Temperature sensors, Temperature distribution, Power measurement, Power cables, Current measurement, Filling. Abstract: The current carrying capacity of a power cable determines its efficiency, which depends on its capability to dissipate heat produced inside the cable, as a result of current flow, into the surrounding. The studies were conducted to determine how the characteristics of the medium around the cable affected its temperature and, as a result, its ability to transport electricity. The experimentation in the lab and real measurements of the temperature values at various locations in the casing pipe constitute the article's uniqueness. The article presents an innovative concept of a laboratory stand, designed to measure the dissipation of heat emitted by a cable in separated casing pipes with the content of various filling materials. The assessment of heat removal is made based on the recorded distribution of temperatures in individual casing pipes. The experimental setup was suitably compatible with the assumptions used for the research, according to the early findings of comparison investigations. It has been demonstrated for the instance under investigation that using the right fillers around the cable may reduce cable temperature, boost the cable's current carrying capability, and provide more efficient heat dissipation.
10,866
Please write an abstract with title: Research on Optimization Algorithm Based on PDOA, and key words: Sensitivity, Chaotic communication, Simulation, Conferences, Estimation, Stability analysis, Communications technology. Abstract: Based on the research of angle of arrival (AOA) positioning technology, this paper analyzes the optimization of phase difference of arrival (pdoa) algorithm based on AOA. Pdoa algorithm does not need strict clock synchronization, and has no offset error. It has excellent anti multipath ability, high time resolution and high precision. At the same time, chaos particle swarm optimization algorithm is used to optimize it, which can not only prevent it from falling into the local optimal solution, but also improve the performance and effect of optimization. In the experiment and simulation analysis, the chaotic particle swarm optimization algorithm is compared with the basic particle swarm optimization algorithm. The results show that the method can effectively improve the tracking accuracy of pdoa positioning and enhance the stability of the positioning system.
10,867
Please write an abstract with title: Gamified platform to aid physiotherapeutic treatment of epicondylitis, and key words: Games, Muscles, Calibration, Force, Pain, Medical treatment. Abstract: The physiotherapeutic process is widely discussed and of fundamental importance for the recovery of patients who suffer from any injury or adverse muscle condition. For best results, it is of primary importance that the patient maintains a pace of treatment and remains engaged in the activities required by the Physiotherapist. In this context, an approach that improves such engagement with concern for usability and acceptance by patients is explored in this article. A gamified platform was created, capable of capturing the time of exposure to the movement of squeezing a handgrip and expressing the patient's results in a swordsman-themed versus game, through the reading of neuromuscular signals captured by a MYO armband.
10,868
Please write an abstract with title: Variational Manifold Learning From Incomplete Data: Application to Multislice Dynamic MRI, and key words: Magnetic resonance imaging, Manifolds, Three-dimensional displays, Data models, Time series analysis, Convolutional neural networks, Volume measurement. Abstract: Current deep learning-based manifold learning algorithms such as the variational autoencoder (VAE) require fully sampled data to learn the probability density of real-world datasets. However, fully sampled data is often unavailable in a variety of problems, including the recovery of dynamic and high-resolution magnetic resonance imaging (MRI). We introduce a novel variational approach to learn a manifold from undersampled data. The VAE uses a decoder fed by latent vectors, drawn from a conditional density estimated from the fully sampled images using an encoder. Since fully sampled images are not available in our setting, we approximate the conditional density of the latent vectors by a parametric model whose parameters are estimated from the undersampled measurements using back-propagation. We use the framework for the joint alignment and recovery of multi-slice free breathing and ungated cardiac MRI data from highly undersampled measurements. Experimental results demonstrate the utility of the proposed scheme in dynamic imaging alignment and reconstructions.
10,869
Please write an abstract with title: Analysis of Professor Lei Zhang’s Medical Records of Banxia XieXin Decoction Analogous Prescriptions Based on Principle of attribute partial ordering, and key words: Medical diagnostic imaging, Stomach, Heating systems, Drugs, Diseases, Data mining, Tongue. Abstract: Objective: To summarize and analyze the addition and subtraction rules and applicable symptom clusters of Banxia xiexin decoction Decoction by Professor Lei Zhang, so as to provide references for doctors with insufficient clinical experience and to pass on the experience of famous doctors. Methods: from professor Zhang from 2006 to 2017, 11038 a basis to establish the database, according to the inclusion criteria extraction using Banxia xiexin Decoction, 268 cases of heart, based on the theory of formal concept analysis, using the attribute partial order principle to differentiate different types of prescription, it is concluded that Banxia xiexin Decoction add and subtract method, analysis of Banxia xiexin Decoction applicable symptom clusters. Results: In this paper, it was concluded that there were 7 kinds of symptom clusters and 6 kinds of prescription addition and subtraction. Conclusion: Professor Lei Zhang makes good use of Banxia xiexin Decoction to treat diseases such as distention and fullness, abdominal distension, stomachache, oral soreness and insomnia.
10,870
Please write an abstract with title: Cell-Free mMIMO Systems with Dynamic TDD, and key words: Vehicular and wireless technologies, Time-frequency analysis, Heuristic algorithms, Simulation, Interference, Delays, Central Processing Unit. Abstract: Cell-free massive multi-input multi-output (CF-mMIMO) systems assume that a single central processing unit (CPU) communicates with a large number of user equipments (UEs) using the same time-frequency resources. However, allocating the same frame configuration to all the UEs makes it difficult to meet the traffic demands of each individual UE. In this paper, we propose using dynamic-time division duplex (D-TDD) in CF-mMIMO systems. To mitigate the cross-link interference (CLI), we propose a new UE-grouping algorithm. Simulation results show that the implementation of D-TDD reduces the median value of the UL packet delay and the DL packet delay by up to 75% and 30% respectively. Furthermore, the proposed UE-grouping reduces the average packet delay by 50% compared to static-TDD (S-TDD).
10,871
Please write an abstract with title: Reflections on Work Instructions of Assembly Tasks, and key words: Task analysis, Prototypes, Companies, Manufacturing, Interviews, Tutorials, Usability. Abstract: For assembly workers, the quality of their work instructions is essential. A high quality instruction can significantly contribute to work efficiency and quality of the result. However, oftentimes it is not obvious what aspects of an instruction make it well applicable for the respective setting. This paper focuses on the uncovering of shortcomings and challenges in work instructions. To this end, we conducted fieldwork in the day-to-day work of assembly workers in the shop floor environment of manufacturing companies. Different empirical methods were used to gather data for analysis. Based on the findings, an interactive prototype built upon real-world instructions was developed and evaluated iteratively using a multiple-case study. The results discuss key findings concerning the interaction with, and usability and user experience of digital work instructions.
10,872
Please write an abstract with title: Radar-Based Face Recognition: One-Shot Learning Approach, and key words: Radar, Face recognition, Radar antennas, Sensors, Radar detection, Receiving antennas, Time-frequency analysis. Abstract: In this paper, we propose a method for recognizing human faces by applying one-shot learning to radar sensor data. First, we use a small-sized radar sensor with a center frequency of 61 GHz and accumulate radar signals reflected from different human faces. Different spatial characteristics of each human face are reflected in the signals received through multiple receiving channels. Then, we apply the one-shot learning approach for obtaining effective recognition performance even on small data sets, to distinguish different faces. The one-shot learning method has the advantages for extracting feature information from small labelled samples and adapting to new sample not studied previously. To generate the input of the one-shot learning model, the signals received from the multiple channels are concatenated in parallel. The proposed one-shot learning method based on a Siamese network shows a recognition accuracy of almost 97.6% and demonstrates a better recognition performance than the conventional deep neural networks, when applied to the radar signal data of eight different faces.
10,873
Please write an abstract with title: Fast Processing Approach for Near-Field Terahertz Imaging With Linear Sparse Periodic Array, and key words: Imaging, Image reconstruction, Noise measurement, Radar imaging, Apertures, Phased arrays, Terahertz wave imaging. Abstract: The benefits of terahertz (THz) radiation have increased its use, especially in imaging systems. Recently, the use of a linear sparse periodic array (SPA) has been proposed as an effective solution for two-dimensional (2D) scanning in THz imaging systems. However, the special multistatic structure of the SPA is such that it is not possible to apply fast Fourier transform-based techniques directly in the near-field (NF). Therefore, in this paper, a fast processing approach based on two Fourier techniques compatible with linear SPA is presented for NF THz imaging. In this approach, we first employ a multistatic-to-monostatic conversion to reduce phase errors due to NF multistatic imaging. Then, to improve the quality of the results, we mathematically derive an interpolation formula to counteract the non-uniform spacing of the virtual array. The modified data is then processed by three rapid techniques (fast Fourier transform (FFT)-inverse fast Fourier transform, matched filtering and a novel 1D FFT-based technique with low computational complexity) to obtain reconstructed images of the scene. Numerical and experimental results confirm the satisfactory performance of the proposed approach in terms of both the computational time and the quality of the reconstructed images.
10,874
Please write an abstract with title: MEC Resource Offloading for QoE-Aware HAS Video Streaming, and key words: Fuzzy logic, Simulation, Streaming media, Load management, Real-time systems, Quality of experience, Particle swarm optimization. Abstract: With the popularity of mobile edge computing (MEC), video streaming's peer-offloading strategy significantly affects the Quality of Experience (QoE) performance of video streaming for mobile users (MUs). Improving the service quality regarding the MUs' demand has become a vital challenge, reflected by QoE. This paper proposes a QoE-aware MEC-based peer-offloading method for HAS-based video streaming, called QOMECS. The proposed method considers dynamic MUs' demands and corresponding QoE requirements. We categorize the QoE KPIs into perceptual and systemic sectors. We formulate the corresponding transmission, computation, and offloading for MEC-based HAS into a QoE maximization problem. We propose a reverse-fuzzied particle swarm optimization (R-FPSO), to solve the highly nonlinear and perceptual-oriented optimization formulation. Unlike conventional fuzzy logic, R-FPSO reverses the fuzzification process by fuzzifying PSO's output (i.e. translated QoE KPIs into satisfactory levels) and further updates the particle values and velocities in the PSO process. Simulation results show that the proposed QOMECS dramatically improves the edge computing efficiency, with optimized QoE performance.
10,875
Please write an abstract with title: Output Thresholding for Ensemble Learners and Imbalanced Big Data, and key words: Measurement, Training, Systematics, Machine learning algorithms, Conferences, Training data, Probabilistic logic. Abstract: Class imbalance is a common problem in many real-world machine learning applications that has been shown to significantly degrade classification performance. This is especially true in the context of big data, where large volumes of data from the majority class dominate training processes and bias learning algorithms. Of the various methods for treating class imbalance, output thresholding is one technique that improves classification performance by tuning the decision threshold that is used to assign class labels to class probabilities. While thresholding techniques have been successful, systematic studies within big and imbalanced data applications are limited. In this study, we compare four popular thresholding strategies using two big and imbalanced fraud classification data sets. We focus specifically on tree-based ensemble learners, and employ four popular bagging and boosting ensemble learners that are well known for achieving state-of-the-art performance. Overall classification is measured using the Geometric Mean (G-Mean) and F-Measure metrics and class-wise performance tradeoffs are compared using the true positive rate (TPR) and true negative rate (TNR). The average threshold values of each strategy are compared, and statistical tests are provided to illustrate the importance of careful threshold tuning. Results show that the G-Mean and F-Measure metrics provide misleading results, and careful validation of TPR and TNR is necessary for selecting optimal thresholds. Furthermore, we show how small changes to decision thresholds yield significant changes to classification performance. Our comparison of popular thresholding techniques on both big and highly-imbalanced data makes this a unique contribution in the area of output thresholding with ensemble learners and big data.
10,876
Please write an abstract with title: Use of Multivariate Statistical Techniques to Associate Biologically Active Stressors with Observed Effects in Multiple Stressor Situations, and key words: Pollution measurement, Animals, Organisms, Stress measurement, Biochemistry, Hydrocarbons, Environmental factors, Educational institutions, Laboratories, Monitoring. Abstract: Simultaneous observations of stress effects and body burden of potential stressors yield data that may be amenable to analysis by multiple regression techniques. Provided that the data meet certain requirements, multiple regression techniques are useful in identifying those stressors which are associated with stress responses in experimental animals.
10,877
Please write an abstract with title: Automatically acquiring part of speech correcting rules of multi-category words based on incomplete decision tables, and key words: Tagging, Set theory, Speech processing, Information processing, Large-scale systems, Statistics, Context modeling, Mathematics, Information technology, Testing. Abstract: Part of speech (POS) tagging is a basic subject for Chinese information processing. In general, the existence of multi-category words greatly affects the processing quality of corpora. High efficient methods and automatically correcting techniques for multi-category word tagging are the keys for improving tagging precision. In this paper, for part of speech correcting of multi-category word, a modeling method is introduced based on an incomplete decision table and two algorithms for attribute reduction and object reduction used for automatically acquiring correcting rules are presented based on attribute significance. The results of testing show the validity of our method for improving part of speech tagging precision in large corpora engineering.
10,878
Please write an abstract with title: Features of Robotic Automation of Auxiliary Processes of Enterprises in the Electrical and Electronic Industry during the Pandemic, and key words: COVID-19, Automation, Service robots, Pandemics, Conferences, Electronics industry, Complexity theory. Abstract: In a pandemic, the need to automate supporting business processes is increasing. However, enterprises of the electromechanical and electronic industry of the Russian Federation are usually large, are part of holdings and corporations, which significantly increases the complexity and duration of the implementation of automation of auxiliary activities. The solution to the problem can be robotic process automation (RPA) technology, as it is faster in terms of implementation time and cheaper than automation.The article considers the features of robotic automation of auxiliary processes in the activities of enterprises of the Electromechanical and electronic industries of the Russian Federation, proposes the stages of the project for the implementation of robotization considering these features. The factors influencing the successful robotization are determined and recommendations are given for its implementation in the context of the coronavirus pandemic.
10,879
Please write an abstract with title: Lifetime improvement of a visible multiline CO laser, and key words: Optical pulses, Gas lasers, Boring, Stimulated emission, Power lasers, Quantum capacitance, Carbon dioxide, Electron emission, Voltage, Power generation. Abstract: The influence of charge capacitance, tube bore, and oxygen addition on the lifetime of a sealed-off visible carbon monoxide pulsed laser is reported. The results extend previous studies on the CW IR sealed-off CO laser.
10,880
Please write an abstract with title: 3-D Mesh Watermarking Based on Optimized Multiple Histograms, and key words: Watermarking, Histograms, Visualization, Solid modeling, Robustness, Shape, Computational modeling. Abstract: In this paper, we discuss a 3-D mesh watermarking scheme with optimized multiple histograms. Watermarking algorithms exist as one of technologies used to protect a copyright of digital data. The conventional methods choose embedded bins in the histogram without accounting for the number of elements, and lead to decrease a robustness or increase a visual change.Our method introduces multiple histograms from a host 3-D mesh for selecting bins with a smaller number of elements in the multiple histograms. In the proposed approach, we utilize a cylindrical coordinate system instead of the Cartesian coordinate to generate two histograms. This modification reduces the total distance of moved vertices by watermark embedding. As a results, the proposed watermarking gives a superior visual quality to other previous watermarking with a single histogram.
10,881
Please write an abstract with title: Standby Switching Stations Dynamic Prominence Ranking Based on Multi-Criteria Decision-Making using TOPSIS Technique, and key words: Sensitivity, Uncertainty, Urban areas, Power system dynamics, Transportation, Switches, Analytic hierarchy process. Abstract: To provide an effective and efficient response to diverse switching stations in emergencies, optimal coordination and resource allocation must be taken into account. Managing facility location, transportation, and ranking of those stations in a multi-driving distance, multi-load sensitivity, and multi-network architecture with uncontrolled uncertainty rendered judgments to be unthoughtful decisions. In this study, 30 switching stations in Al Ain city, UAE, that are connected to backup generators in addition to the main source and serve VIP locations, were put into a competition to be ranked based on their importance in a dynamic manner that can be updated monthly. Several criteria were used to make a determined decision to rank the stations based on factors such as the number of incomers, driving distance from the main office, load sensitivity, generation-to-diversified load percentage, and location accessibility. The technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) was used, and the results were analyzed using Multi-Criteria Decision-Making (MCDM). The resulting ranking can be used to make decisions about how to best allocate resources, especially when there is a shortage of manpower and end-user demand fluctuates. Several scenarios were studied in order to evaluate and assess the impact of dynamic changes that can occur in real situations. The cases involve adding or removing in-site operators, inducing interruptions, and linking stations to the monitoring room. Results showed the superior impact of operators shifting due to high given weight; however, distance impact was minimal in case of added interruptions or remote monitoring.
10,882
Please write an abstract with title: Service disciplines performance for GPRS with link adaptation and heterogeneous traffic, and key words: Ground penetrating radar, Quality of service, Packet radio networks, Packet switching, GSM, Scheduling algorithm, Protection, Message service, Electronic mail, Throughput. Abstract: The general packet radio service (GPRS) system provides a packet switched data service with quality of service (QoS) over a GSM infrastructure. In order to cope with the QoS requirements, packet scheduling strategies are used. On the other hand, GPRS introduces four coding schemes with different degrees of data protection according to the radio channel conditions. The selection of an appropriate coding scheme according to the time variant channel conditions can lead to a substantial increment of the QoS. Two scheduling policies, namely MED (modified earliest deadline) and MLT (minimum laxity threshold) are evaluated, assuming both link adaptation (LA) strategy, based on BLER (block erasure rate) estimation, and heterogeneous traffic. Web browsing, fleet management, SMS (short message service) and e-mail services are assumed. The performance of the proposed scheduling policies is evaluated in terms of throughput and delay. For urban environments with high load conditions, the obtained results show that a simple LA enhances QoS system performances, even though there is a trade-off with respect to the network packet loss.
10,883
Please write an abstract with title: Detecting Attack Surface With Full-System Taint Analysis, and key words: Conferences, Software quality, Fuzzing, Virtual machining, Software reliability, Security, Task analysis. Abstract: Attack surface detection for the complex software is needed to find targets for the fuzzing, because testing the whole system with many inputs is not realistic. Researchers that previously applied taint analysis for dealing with different security tasks in the virtual machines did not examined how to apply it for attack surface detection. I.e., getting the program modules and functions, that may be affected by input data. We propose using taint tracking within a virtual machine and virtual machine introspection to create a new approach that can detect the internal module interfaces that can be fuzz tested to assure that software is safe or find the vulnerabilities.
10,884
Please write an abstract with title: Unitraveling-Carrier-Photodiode-Integrated High-Electron-Mobility Transistor for Photonic Double-Mixing, and key words: HEMTs, High-speed optical techniques, Optical mixing, Photonics, Standards, Optical modulation, Logic gates. Abstract: We newly propose and experimentally investigate an InGaAs-channel high-electron-mobility transistor integrated with a unitraveling-carrier photodiode (UTC-PD) structure on its source side for an efficient optical-to-wireless carrier frequency downconversion utilizing its photonic double-mixing functionality. It is demonstrated that the double-mixing conversion gain is significantly enhanced by 20 dB compared with a standard HEMT, owing to the integration of the UTC-PD structure. The device operation principle expected from the device structure is confirmed through measured DC characteristics and photomixing/double-mixing characteristics in the millimeter-wave region. The feasibility of the device for practical use in future optical-wireless convergence networks is addressed.
10,885
Please write an abstract with title: A Highly Efficient Layout-Aware FPGA Overlay Accelerator Mapping Method, and key words: Performance evaluation, Multicore processing, Layout, Systolic arrays, Energy efficiency, Table lookup, Reconfigurable architectures. Abstract: FPGAs are gathering traction as a platform for the acceleration of applications requiring both high performance and specialization. However, exploiting the maximum compute potential of FPGAs remains a critical and time-consuming task, usually requiring expert knowledge. Typically, designers seek to maximize the usage of hardened arithmetic blocks (DSP, such as DSP48 in Xilinx devices), but as their number is limited, the critical path quickly increases when portions are mapped to lookup tables (LUT). To mitigate the DSP limitation and to maximize FPGA utilization, we propose combining FPGA overlay accelerators and a mapping method that efficiently exploits the FPGA's layout information and its resources. This mapping method relies on a two-step process: 1. extraction of architectural and layout information of the FPGA, 2. optimized placement of the processing elements (PEs) of the accelerator onto the FPGA resources. The placement step maps the PEs to DSPs and LUTs to reduce the critical path among PEs. We applied our method to implement a systolic array, a multiplier array, and a coarse-grained reconfigurable architecture (CGRA) on a Xilinx FPGA. The proposed method achieves more than 14 x performance and energy efficiency increase over the vendor tool mapping while equally maximizing FPGA utilization by more than 1.5 x compared to DSP limited mappings.
10,886
Please write an abstract with title: Transfer Learning for Macroeconomic Forecasting, and key words: Deep learning, Input variables, Transfer learning, Time series analysis, Data models, Macroeconomics, Forecasting. Abstract: In this paper we present a novel approach to macroeconomic forecasting based on transfer learning using normalizing flows conditioned on LSTM-based encoder-decoder as building blocks. The approach consists of two steps: (1) pretraining and (2) fine-tuning. At the pre-training step, we train a model based on macroeconomic data of many different countries. The obtained pre-trained model can capture hidden patterns in temporal changes of macroeconomic indicators. The pre-trained model is then fine-tuned on macroeconomic data of the target country. In the approach, LSTM-based encoder-decoder aims at learning vector representations of the input data. The obtained representations are then transformed by using conditional normalizing flows so that the distribution of the data encoded in the representations is transformed into a more complex distribution. We evaluate the proposed approach on seventeen macroeconomic variables of a public dataset. The experimental results show that transfer learning using normalizing flows conditioned on LSTM-based encoder-decoder as building blocks significantly improves the performance of macroeconomic forecasting with one-step ahead forecasts. To the best of our knowledge, this is the first time neural transfer learning has been successfully applied to forecast many macroeconomic variables simultaneously.
10,887
Please write an abstract with title: GPDP: Game-Enhanced Personalized Differentially Private Smart Community, and key words: Differential privacy, Privacy, Sensitivity, Smart cities, Computational modeling, Bandwidth, Data models. Abstract: Smart community, as a key component of Internet of Things (IoT), is experiencing fast booming, which significantly enhances residents' quality of life. Using fog computing to establish a smart community is an effective way to further develop smart and sustainable cities due to the reduction of bandwidth consumption and latency. However, privacy issues are emerging because the continuous attacks are putting sensitive information under great threats. Motivated by this, we propose a differentially private smart community model with personalized privacy protection. Differential privacy is deployed in a personalized way while a logarithmic function is leveraged to map data sensitivity to privacy protection level. Extensive evaluation results show the advantages of the proposed model from the perspective of the optimized trade-off between personalized privacy protection and data utility.
10,888
Please write an abstract with title: Macro-Scale Tread Patterns for Traction in the Intestine, and key words: Colon, Intestines, Friction, Substrates, Cancer, Robots, Endoscopes. Abstract: Goal: Tread patterns are widely used to increase traction on different substrates, with the tread scale, geometry and material being tailored to the application. This work explores the efficacy of using macro-scale tread patterns for a medical application involving a colon substrate - renowned for its low friction characteristics. Methods: Current literature was first summarized before an experimental approach was used, based on a custom test rig with ex vivo porcine colon, to assess different macro-scale tread patterns. Performance was based on increasing traction while avoiding significant trauma. Repeated testing (n = 16) was used to obtain robust results. Results: A macro-scale tread pattern can increase the traction coefficient significantly, with a static traction coefficient of 0.74 ± 0.22 and a dynamic traction coefficient of 0.35 ± 0.04 compared to a smooth (on the macro-scale) Control (0.132 ± 0.055 and 0.054 ± 0.015, respectively). Decreasing the scale and spacing between the tread features reduced apparent trauma but also reduced the traction coefficient. Conclusion: Significant traction can be achieved on colon tissue using a macro-scale tread but a compromise between traction (large feature sizes) and trauma (small feature sizes) may have to be made. Significance: This work provides greater insight into the complex frictional mechanisms of the intestine and gives suggestions for developing functional tread surfaces for a wide range of clinical applications.
10,889
Please write an abstract with title: TNPU: Supporting Trusted Execution with Tree-less Integrity Protection for Neural Processing Unit, and key words: Degradation, Tensors, Semantics, Computer architecture, Hardware, Central Processing Unit, Encryption. Abstract: As neural processing units (NPUs) for machine learning inference have been incorporated into a wide range of system-on-a-chips, NPUs are processing more and more mission-critical computations such as autonomous driving. With the increasing application scenarios, securing NPU operations from potential attacks has become crucial for the safety of the entire system. To address the security challenges of NPU operations, this study investigates how the trusted execution technology can be extended to harden the NPU execution by hardware supports. This paper proposes trusted NPU (TNPU) which supports trusted execution for NPUs integrated in a processor. For securing NPUs, a key performance challenge is in the encryption and integrity protection for external memory. This work proposes a novel tree-less integrity protection by exploiting the data flow semantics of DNN computation. The tree-less integrity protection maintains a version number for each tensor or sub-tensor inside the CPU enclave which drives the NPU computation. By exploiting the data flow of tensor updates, a per-tensor version number can efficiently verify the recency of the data in the tensor. The tree-less integrity protection eliminates performance losses by counter and hash cache misses, which are major performance overheads of hardware-based memory protection. Our evaluation with simulated NPUs shows that the performance overheads for trusted NPUs can be significantly reduced from the prior tree-based design, improving the performance of a single NPU by 10.0% and 7.5% on average over the prior one with two different NPU configurations. When the number of NPUs is increased to three, the performance gains further improve, achieving on average 13.3% and 8.7% improvements.
10,890
Please write an abstract with title: Brilliant, Kind, Gentle, and Generous [People], and key words: Obituaries, Meindl, Jim. Abstract: Recounts the career and contributions of Jim Meindl.
10,891
Please write an abstract with title: Electric Field Environment Analysis of Near Strike lightning Simulator, and key words: Lightning, Hazards, Electric fields, Weapons, Structural engineering. Abstract: When lightning strikes the ground-based weapons, they may experience hazard from either a direct attachment or a nearby lightning. Although direct attachment is the more severe hazard, the indirect effects of a nearby lightning, which may cause a serious safety hazard, should also be paid attention to. For the lightning assessment of these weapons it is necessary to define the electromagnetic (EM) environment near the ground in terms of the magnetic and electric fields and their rates of change at a particular distance from the lightning channel. This paper aims to analysis the electric field environment of the near strike lightning simulator. A verification experiment was tested to validate the simulation, and the result comparison of simulation and experiment was carried out. Furthermore, structural parameters of experiment platform are determined for the subsequent work.
10,892
Please write an abstract with title: Analysis of acoustical responses of microbubbles for the optimization of phase- and amplitude-coded pulse sequences, and key words: Acoustic pulses, Filters, Bandwidth, Acoustic scattering, Rayleigh scattering, Frequency, Image resolution, Acoustic measurements, Algorithm design and analysis, Training data. Abstract: We have previously introduced an algorithm for the design of receive filters that are used with coded pulse sequences to enhance the contrast between two media, where one filter per pulse in the sequence is derived from training data. Following this approach, we tackled the question of what pulse sequence, considering amplitude and phase coding, is best suited for contrast agent imaging. We also solved the problem that filters of increasing length improve image contrast at the expense of bandwidth by means of non-liner frequency compounding.
10,893
Please write an abstract with title: A flexible, line-based JPEG 2000 decoder for digital cinema, and key words: Decoding, Motion pictures, Transform coding, Image coding, Tiles, Hardware, Field programmable gate arrays, Signal resolution, Scalability, Discrete wavelet transforms. Abstract: The image compression standard JPEG 2000 proposes a large set of features, useful for today's multimedia applications. Unfortunately, its complexity is greater than older standards. Real-time applications such as digital cinema requires a specific hardware implementation. In this paper, a decoding scheme is proposed with two main characteristics. Firstly, the complete scheme takes place in an FPGA without accessing any external memory, allowing integration in a secured system. Secondly, a customizable level of parallelization allows to satisfy a broad range of constraints, depending on the signal resolution.
10,894
Please write an abstract with title: Association and content-based retrieval, and key words: Content based retrieval, Birds, Indexing, Fires, Image retrieval, Explosions, Image databases, Spatial databases, Visual databases, Dictionaries. Abstract: In spite of important efforts in content-based indexing and retrieval during these last years, seeking relevant and accurate images remains a very difficult query. In the state-of-the-art approaches, the retrieval task may be efficient for some queries in which the semantic content of the query can be easily translated into visual features. For example, finding images of fires is simple because fires are characterized by specific colors (yellow and red). However, it is not efficient in other application fields in which the semantic content of the query is not easily translated into visual features. For example, finding images of birds during migrations is not easy because the system has to understand the query semantic. In the query, the basic visual features may be useful (a bird is characterized by a texture and a color), but they are not sufficient. What is missing is the generalization capability. Birds during migrations belong to the same repository of birds, so they share common associations among basic features (e.g., textures and colors) that the user cannot specify explicitly. We present an approach that discovers hidden associations among features during image indexing. These associations discriminate image repositories. The best associations are selected on the basis of measures of confidence. To reduce the combinatory explosion of associations, because images of the database contain very large numbers of colors and textures, we consider a visual dictionary that group together similar colors and textures.
10,895
Please write an abstract with title: Parallel algorithms for Toeplitz matrix operations, and key words: Parallel algorithms, Concurrent computing, Signal processing algorithms, Distributed computing, Space technology, Parallel processing, Polynomials, Propulsion, NASA, Computer science. Abstract: Algorithms for multiplication and inversion of ToepIitz matrices are presented that take advantage of the special structure of ToepIitz forms and the parallelism offered by concurrent processors. Multiplication of two general n×n Toeplitz matrices is defined on an array of 2n-1 processing elements. A block size may be chosen to effect an appropriate compromise between the number of processors and the amount of overhead due to interprocessor data communication. The parallel algorithm For inversion is based on a method of Justice For inverting a positive definite Toeplitz matrix. The computation, distributed over an array of n processing elements, generates a sequence of orthogonal polynomials from which the elements of the Toeplitz inverse are computed with O(n) concurrency.
10,896
Please write an abstract with title: Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM, and key words: Encryption, Nonvolatile memory, Metadata, Computer crashes, Computer architecture. Abstract: Emerging Non-Volatile Memories (NVMs) bring a unique challenge to the security community, namely persistent security. As NVM-based memories are expected to restore their data after recovery, the security metadata must be recovered as well. However, persisting all affected security metadata on each memory write would significantly degrade performance and exacerbate the write endurance problem. On the other hand, relying on an encryption counters recovery scheme would take hours to rebuild the integrity tree, and will not be sufficient to rebuild the Tree-of-Counters (ToC). Due to intermediate nodes dependencies it is not possible to recover this type of trees using the encryption counters. To ensure recoverability, all updates to the security metadata must be persisted, which can be tens of additional writes on each write. In this article, we propose Phoenix, a practical novel scheme which relies on elegantly reproducing the cache content before a crash, however with minimal overheads. Our evaluation results show that Phoenix reduces persisting security metadata overhead writes to 3.8 percent less than a write-back encrypted system without recovery, thus improving the NVM lifetime by 8x. Overall Phoenix performance is better than the baseline.
10,897
Please write an abstract with title: Inversion of strongly scattering data: imaging and structure synthesis, and key words: Optical scattering, Filtering, Permittivity, Optical distortion, Approximation methods, Backpropagation, Fluctuations, Optical imaging, Optical fiber communication, Nonlinear optics. Abstract: In this paper we explain some of the difficulties encountered in implementing this approach and how they have been successfully addressed. We show examples of reconstructions using real data taken from the US Air Force Research Laboratory's (AFRL) Ipswich data set and also show examples of synthesizing structures similar to these which have prescribed scattering patterns in certain directions
10,898
Please write an abstract with title: Dual Quaternion Based Finite-Time Tracking Control for Mechatronic Systems with Actuation Allocation, and key words: Couplings, Actuators, Uncertainty, Mechatronics, Tracking, Quaternions, Numerical simulation. Abstract: This paper investigates the tracking control performance regulation and actuation allocation of mechatronic systems subject to coupling motions. In particular, the kinematic and dynamic model is described by dual quaternion, which captures the coupling effect between translation and rotation movements. Considering external disturbances and system uncertainties, a non-singular fast terminal sliding controller is then developed to ensure finite-time tracking performance. In addition, the unwinding problem caused by the redundancy of dual quaternion is addressed with the help of a novel attitude error function. Furthermore, an improved simplex method is designed for distributing the developed control commands to proper actuators. Numerical simulations demonstrate the effectiveness with respect to disturbance suppression, fast tracking, high accuracy, and finite-time stability of the proposed method.
10,899
Please write an abstract with title: Design of a Pseudo-Wide Dynamic Range CMOS Image Sensor by Using the Bidirectional Gamma Curvature Technique, and key words: Generators, Random access memory, Transfer functions, Signal resolution, Lighting, Frequency control, Dynamic range. Abstract: This brief presents a 640×480 CMOS image sensor (CIS) with in-circuit bidirectional gamma correction for use in computer vision applications. The conventional gamma correction method can saturate the bright region in an image, leading to the loss of bright image information. Using the proposed bidirectional gamma correction method, which can be implemented with a log-exponential counter, both bright and dark regions in an image can be simultaneously corrected. The transfer function of an 8-bit single-slope analog-to-digital converter can be selected considering either linear or bidirectional gamma curves with three different slope-change points to enhance the visibility in the pseudo-dynamic range. From the prototype sensor, we observed that the visibility of dark images was increased with proper bidirectional gamma curvatures. The CIS was fabricated in a 110 nm CIS process, and the full chip area was 5900 μm × 5240 μm. The total power consumption was 6 mW at a rate of 15 frames per second with an analog, pixel, and digital supply voltage of 3.3 V, 3.3 V, and 1.5 V, respectively.