ID int64 0 400k | content stringlengths 97 5.85k |
|---|---|
11,400 | Please write an abstract with title: Energy- and Spectral-Efficiency Tradeoff With --Fairness in Energy Harvesting D2D Communication, and key words: Resource management, Device-to-device communication, Optimization, Uplink, Multiplexing, Channel allocation, Quality of service. Abstract: Energy Harvesting (EH) technology enables Device-to-Device (D2D) User Equipments (DUEs) to harvest energy from ambient energy, making contributions to green communications and breaking the single battery-powered and the regional limitations of device deployment. The joint problem of energy harvesting and resource allocation in EH-based D2D Communication Networks (EH-DCNs) is a challenge issue. In this paper, we investigate the joint problem of resource allocation and EH time slot allocation of DUEs in EH-DCNs, where the DUEs harvest energy and multiplex Cellular User Equipments (CUEs) uplink resources. A channel assignment, power allocation and EH time slot allocation problem in EH-DCNs is formulated. The goal is to maximize energy-and spectral-efficiency with α-fairness while guaranteeing the EH constraints of DUEs and the quality of service of CUEs. The formulated problem is a non-convex mixed integer multi-objective optimization problem. In order to solve the formulated problem, the multi-objective optimization problem is transformed into a single-objective optimization problem based on the weight sum method. We propose a joint iterative algorithm based on Lagrangian dual decomposition for α > 0 and α = 0, respectively. Numerical results illustrate that the proposed algorithm achieves higher energy efficiency and spectral efficiency for different network parameter settings. |
11,401 | Please write an abstract with title: Design of Full-Drive Multi-finger Dexterous Hand, and key words: Visualization, Mechatronics, Service robots, Software algorithms, Kinematics, Ontologies, Control systems. Abstract: With the rapid development of science and technology in recent decades, the multi-finger dexterous hand has the characteristics of good flexibility and strong adaptability. At the same time, the development of service robots has further promoted the multi-finger dexterous hand. The performance of the multi-finger dexterous hand not only considers the ontology structure of the dexterous hand but is also closely related to its control method. Based on the ontology structure of the multi-finger dexterous hand, a transmission structure of the fingers is proposed. The revolute joint is designed for modular fingers. Afterward, the robotic kinematic and control algorithms are analyzed. According to the driving structure of the multi-finger dexterous hand, the hardware and software of the control system is designed. The visualization software of the multi-fingered dexterous hand is developed through simulation and teleoperation. Finally, the effectiveness of the proposed system is verified through the experiments. |
11,402 | Please write an abstract with title: A Novel Motion Compensation Approach Based on Symmetric Triangle Wave Interferometry for UAV SAR Imagery, and key words: Unmanned aerial vehicles, Radar polarimetry, Interferometry, Chirp, Synthetic aperture radar, Frequency modulation, Azimuth. Abstract: The combination of synthetic aperture radar (SAR) with unmanned aerial vehicles (UAVs) is attractive for acquiring high-resolution images without the restrictions of time and weather. However, because UAVs are lightweight and small in size, the UAV SAR system is very sensitive to turbulence, resulting in serious trajectory deviations and remaining residual motion errors (RMEs), such as residual range cell migration (RCM) and aperture phase errors (APEs). In this paper, a novel motion compensation (MoCo) strategy is developed based on the symmetric triangle linear frequency modulated continuous wave (STLFMCW) signal. The STLFMCW signal model is first presented, which reveals the relevance between the positive-negative frequency modulations and motion errors. The residual RCMs and relative phase errors are estimated directly through the phase differential interferometry of up-ramp and down-ramp chirp signals, instead of the traditional approach of relying on the range-shift gradient of adjacent range profiles. The proposed approach is independent of conventional prominent point processing (PPP) and calculates the range deviation to avoid the accumulation of errors, thereby achieving high precision and efficiency. Experiments based on simulated and measured data sets validate the proposed approach. |
11,403 | Please write an abstract with title: Human Activity Recognition With Smartphone and Wearable Sensors Using Deep Learning Techniques: A Review, and key words: Sensors, Deep learning, Feature extraction, Computational modeling, Activity recognition, Wearable sensors, Benchmark testing. Abstract: Human Activity Recognition (HAR) is a field that infers human activities from raw time-series signals acquired through embedded sensors of smartphones and wearable devices. It has gained much attraction in various smart home environments, especially to continuously monitor human behaviors in ambient assisted living to provide elderly care and rehabilitation. The system follows various operation modules such as data acquisition, pre-processing to eliminate noise and distortions, feature extraction, feature selection, and classification. Recently, various state-of-the-art techniques have proposed feature extraction and selection techniques classified using traditional Machine learning classifiers. However, most of the techniques use rustic feature extraction processes that are incapable of recognizing complex activities. With the emergence and advancement of high computational resources, Deep Learning techniques are widely used in various HAR systems to retrieve features and classification efficiently. Thus, this review paper focuses on providing profound concise of deep learning techniques used in smartphone and wearable sensor-based recognition systems. The proposed techniques are categorized into conventional and hybrid deep learning models described with its uniqueness, merits, and limitations. The paper also discusses various benchmark datasets used in existing techniques. Finally, the paper lists certain challenges and issues that require future research and improvements. |
11,404 | Please write an abstract with title: Stochastic properties of quantization noise in memoryless converters affected by integral non-linearity, and key words: Stochastic resonance, Quantization, Probability density function, Integral equations, Telecommunications, Power system modeling, Gaussian noise, Modems, Neodymium, Digital communication. Abstract: This paper is focused on the stochastic properties of quantization noise introduced by non-ideal memoryless converters. In particular, overloading effects and integral nonlinearity (INL) are considered. A theoretical model is given, which accurately describes the quantization noise probability density function in presence of overloading noise and both deterministic and stochastic INL. The model is also extended to derive quantization noise power as a function of both input signal and INL stochastic properties. Finally, the results are applied to a memoryless converter affected by Gaussian distributed INL, analyzing the properties of quantization noise. |
11,405 | Please write an abstract with title: On Transformations among Opacity Notions, and key words: Observers, Encoding, Behavioral sciences, Computational complexity, Cybernetics. Abstract: Opacity is a property asking whether a system may reveal its secret to a passive observer who knows the structure of the system but has only limited observations of its behavior. Several notions of opacity have been studied. Similarities among the opacity notions have been investigated via transformations, which have many potential applications. We investigate K-step opacity (K-SO), a notion that generalizes both current-state opacity and infinite-step opacity, and asks whether the intruder cannot decide, at any instant, whether or when the system was in a secret state during the last K observable steps. We provide new polynomial-time transformations among K-SO and other opacity notions. Our results lead, among others, to the general solution of an open problem concerning the computational complexity of the verification of K-SO. |
11,406 | Please write an abstract with title: The Power Saver Development on Android Oreo Smartphone Based on App Categories which Accomodate User Preference, and key words: Batteries, Power demand, Android (operating system), Mathematics, Productivity, Streaming media. Abstract: The power management is required by owner of Android smartphone so that the device can be long enough to support the productivity of the user in mobility even the user does not realize that the app processes behind the screen use a lot of power. Turning off all app processes behind the screen can be a solution. However, it can disturb the user if the certain app process which is needed by the user is also terminated. Therefore, a special mechanism is required to regulate the processes which run such as by using the app categories which are associated with the user preference. When the selected categories are chosen, then the priority of the applications' importance is carried out. So that it can be known that whether the process is important or not for the user to be turned off. The built system model has been tested for the power usage assessment by using Ampere meter. This observation has succeeded in reducing power usage in awake condition. The scenario testing is done in 20 minutes. It can reduce the Android Oreo power consumption by 3 %. |
11,407 | Please write an abstract with title: Research on the Development Problems and Management Countermeasures of Third-Party Logistics in China, and key words: Conferences, Wireless communication, Smart grids, Industries, Supply chains, Supply and demand. Abstract: With the rise of network economy, third-party logistics has attracted extensive attention. China's third-party logistics industry started late and developed at a low level. The number of large professional third-party logistics enterprises is small, and their market share in the whole logistics industry is also low, which restricts the development of national economy to a certain extent. These problems mainly come from the market, government, law, information, logistics enterprises themselves and other aspects. Aiming at the above problems, this paper puts forward a series of management countermeasures to promote the sustainable development of the third-party logistics industry in China. |
11,408 | Please write an abstract with title: Apply data mining to defense-in-depth network security system, and key words: Data mining, Data security, Intrusion detection, Global Positioning System, Computer crime, Network servers, Scattering, Information security, Information management, Information analysis. Abstract: This paper proposes a defense in depth network security architecture and applies the data mining technologies to analyze the alerts collected from distributed intrusion detection and prevention systems (IDS/IPS). The proposed defense in depth architecture consists of a global policy server (GPS) to manage the scattered intrusion detection and prevention systems, each of which is managed by a local policy server (LPS). The key component of the GPS is the security information management (SIM) module where data mining technology is employed to analyze the events (alerts) collected from the LPSs. Once a DDoS attack is recognized by the SIM module, the GPS informs the LPS (IDS/IPS) to adjust the thresholds immediately to block the attack from the sources. To evaluate the effectiveness of the proposed defense in depth architecture, a prototyping is implemented, where three different data mining tools are employed. Experiment results demonstrate that for detecting the DDOS attacks, the proposed data mining-based defense in depth architecture performs very well on attack detection rate and false alarm rate. |
11,409 | Please write an abstract with title: Simplified Disc Brake Modeling, Identification, and Validation focusing on Temperature Influences, and key words: Brakes, Temperature measurement, Heating systems, Mathematical model, Temperature distribution, Data models, Axles. Abstract: In this paper an overall, simplified modeling approach describing the dependency between applied brake pressure and brake torque is presented. Therefore the internal amplification of a disc brake, the so-called brake-factor, is modeled in dependency of the vehicle velocity, the brake pressure and the brake temperature. As the application of this model requires the brake temperature, which is commonly not measured, a new lumped-mass-based brake temperature model, that describes the thermal behavior of a typical disc brake is stated and validated. |
11,410 | Please write an abstract with title: Proposition of two evolutionist approaches - genetic algorithm and neural network - to solve CSP, and key words: Genetic algorithms, Neural networks, Space exploration, Testing, Artificial intelligence, Artificial neural networks, Concrete, Explosions. Abstract: Within the framework of the constraint satisfaction problem (CSP) resolution, we propose two methods based on the principle of evolutionist algorithms. The resolution is carried out under two tests. Initially, we present a genetic algorithm, which uses original operators, based on personal heuristic, and we propose, thereafter, an algorithm based on the conception of a basic neural network able to solve some instantiations of the CSP. The results obtained are very encouraging. Indeed, if the search space is of significant size and if it is difficult to isolate an acceptable solution, which is the case of the CSPs, the use of the proposed heuristics is rather promising. |
11,411 | Please write an abstract with title: Boosting Semi-Supervised Face Recognition With Noise Robustness, and key words: Noise measurement, Face recognition, Training, Labeling, Semisupervised learning, Benchmark testing, Training data. Abstract: Although deep face recognition benefits significantly from large-scale training data, a current bottleneck is the labelling cost. A feasible solution to this problem is semi-supervised learning, exploiting a small portion of labelled data and large amounts of unlabelled data. The major challenge, however, is the accumulated label errors through auto-labelling, compromising the training. In this paper, we present an effective solution to semi-supervised face recognition that is robust to the label noise aroused by the auto-labelling. Specifically, we introduce a multi-agent method, named GroupNet (GN), to endow our solution with the ability to identify the wrongly-labelled samples and preserve the clean samples. We show that GN alone achieves the leading accuracy in traditional supervised face recognition even when the noisy labels take over 50% of the training data. Further, we develop a semi-supervised face recognition solution, named Noise Robust Learning-Labelling (NRoLL), which is based on the robust training ability empowered by GN. It starts with a small amount of labelled data and consequently conducts high-confidence labelling on a large amount of unlabelled data to boost further training. The more data is labelled by NRoLL, the higher confidence is with the label in the dataset. To evaluate the competitiveness of our method, we run NRoLL with a rough condition that only one-fifth of the labelled MSCeleb is available and the rest is used as unlabelled data. On a wide range of benchmarks, our method compares favorably against the state-of-the-art methods. |
11,412 | Please write an abstract with title: Multiple Objective Frame Rate Up Conversion, and key words: Motion estimation, Motion measurement, Motion pictures, Videoconference, Interpolation, Bidirectional control, Motion analysis, Gold, Time measurement, HDTV. Abstract: In this paper, we propose a multiple objective frame rate up conversion algorithm (MOFRUC), which utilizes two different models. The first model is a constant velocity model that assumes the objects position is a linear function of time. The second model exploits the spatial correlation between neighboring blocks, and assumes the pixel intensity is highly correlated in a small local area. In this model, the perceptual quality of interpolated frame is also taken into account and the blocking artifact is minimized. Our proposed MOFRUC estimates the motion trajectory by the first model and interpolate the frame along the motion trajectory. At the same time, the algorithm refines the motion trajectory by maximizing a spatial correlation measurement defined in the second model and interpolates the frame with minimum blocking artifact. Simulation results show that our proposed MOFRUC outperforms other existing algorithms and produces high quality interpolated frame. |
11,413 | Please write an abstract with title: Situational Control of a Computer Network Security System in Conditions of Cyber Attacks, and key words: Optimal control, Aerospace electronics, Probability, Prediction algorithms, Computer networks, Real-time systems, Security. Abstract: Modern cyberattacks are the most powerful disturbance factor for computer networks, as they have a complex and devastating impact. The impact of cyberattacks is primarily aimed at disrupting the performance of computer network protection means. Therefore, managing this defense system in the face of cyberattacks is an important task. The paper examines a technique for constructing an effective control system for a computer network security system operating in real time in the context of cyber attacks. It is supposed that it is built on the basis of constructing a system state space and a stack of control decisions. The probability of finding the security system in certain state at each control step is calculated using a finite Markov chain. The technique makes it possible to predict the number of iterations for managing the security system when exposed to cyber attacks, depending on the segment of the space of its states and the selected number of transitions, as well as automatically generate control decisions. An algorithm has been developed for situational control of a computer network security system in conditions of cyber attacks. The experimental results obtained using the generated dataset demonstrated the high efficiency of the developed technique and the ability to use it to determine the parameters that are most susceptible to abnormal deviations during the impact of cyber attacks. |
11,414 | Please write an abstract with title: Scanning the issue - Special issue on flat-panel display technology, and key words: Special issues and sections, Liquid crystal displays, Flat panel displays, Cathode ray tubes, Plasma displays, Microdisplays, Companies, Active matrix liquid crystal displays, Active matrix technology, Computer interfaces. Abstract: Provides an overview of the technical articles and features presented in this issue. |
11,415 | Please write an abstract with title: The Other ADC Test [Shop Talk: What You Didn’t Learn in School], and key words: Frequency-domain analysis, Dynamic range, Solid state circuits, Time-domain analysis, Analog-digital conversion. Abstract: Most converter folks I know are obsessed with spectral performance, and rightly so. After all, most analog-to-digital converters (ADCs) these days work as “waveform coders”; their output is intended for some frequency-domain purpose. Of course, time-domain “measurement” applications are still out there, especially in the high-precision realm, but the communications boom has caused many to abandon integral nonlinearity and differential nonlinearity (DNL) for spurious free dynamic range. |
11,416 | Please write an abstract with title: A novel approach to real-time RTI based distributed simulation system, and key words: Real time systems. Abstract: HLA, a DoD high level architecture, is emerging as a standard platform for large-scale distributed interactive simulation systems. It mainly emphasizes on the reusability and interoperability of different simulation components. HLA was well designed and has been proved to have the ability to guarantee the desirable properties of reusability and the interoperability in distributed simulation systems from several aspects. However, HLA shows an apparent weaknesses when it comes to real-time simulation applications. Indeed, there are no specific rules provided with respect to real-time applications in HLA specifications. Therefore, there has not been any widely accepted real-time implementation specification for the HLA run-time infrastructure (HLA/RTI). In this paper, we propose a novel real-time RTI architecture which addresses the weakness of HLA/RTI in terms of real-time applications. We discuss our design and the implementation of our real-time RTI architecture with an emphasis on the real-time RTI end-system. |
11,417 | Please write an abstract with title: Task Offloading and Caching for Mobile Edge Computing, and key words: Wireless communication, Energy consumption, Simulation, Mobile applications, Servers, Task analysis, Optimization. Abstract: Mobile applications in the present have created tremendous pressure on the computational capabilities of user equipments. Against this background, mobile edge computing (MEC) has been proposed to tackle this issue, e.g., by shifting the computational workload to the edge server. We in this paper consider a caching enabled task offloading in MEC, for the sake of joint optimization of task offloading and caching. We consider both energy consumption and response latency in the optimization problem and solve the problem by an alternate optimization algorithm. Extensive experiments have been conducted to evaluate the algorithm and the simulation results have shown its advantages such as rapid response latency and powerful convergence capability. |
11,418 | Please write an abstract with title: Discovery and sharing of knowledge with self-organized agents, and key words: Centralized control, Communication system control, Unsupervised learning, Data mining, Skeleton, Self organizing feature maps, Data structures, Flexible structures, Neural networks, Data analysis. Abstract: This paper describes a system, which has the capability to analyze and discover knowledge gathered from distributed sources. This autonomous system is implemented using the growing self organizing map (GSOM), which is a dynamic version of the self organizing map (SOM) and a multi agent communication system. The important contribution of this model is its ability to transfer local knowledge to a central knowledge base referred to as a central controller where the data is clustered and analyzed to identify similarities and variations. The central controller has the capability of transferring back its global knowledge to the distributed sources. |
11,419 | Please write an abstract with title: Browsing thumbnails: a comparison of three techniques, and key words: Computer displays, Navigation, Usability, User interfaces, Personal digital assistants, Computer graphics, Testing, Recruitment, Information technology, Taxonomy. Abstract: We conducted a usability study comparing three different browser alternatives (iconic, zoom-and-pan, and fisheye) for an electronic bulletin board containing thumbnails of notes. The iconic browser behaves in the manner of a standard windowing system. The zoom-and-pan browser allows the user to pan over a note and zoom to a readable size. The fisheye browser was an implementation of the bifocal view. We conducted an experiment where 21 subjects performed browsing tasks with each browser. We found that users performed best with the iconic browser and that young people (20-25) were significantly faster than older (31-53). |
11,420 | Please write an abstract with title: Quasiparticle mixing close to the gap frequency in aluminum tunnel junctions, and key words: Aluminum, Frequency conversion, Testing, Mixers, Josephson junctions, Superconducting devices, Silicon compounds, Temperature, Impedance, Quantum mechanics. Abstract: We have tested the conversion efficiency of quasi-particle mixers at frequencies close to the superconducting gap frequency. We investigated arrays of aluminum SIS and SIN tunnel junctions at frequencies around 75 GHz and temperatures down to 0.3 K. This frequency corresponds to about 80% of the gap frequency. The experimental conversion loss was large due to severe impedance mismatches. However, we obtained a good agreement (within 1 dB) to the quantum theory of mixing, indicating that nonequilibrium effects do not play a significant role for these low current density junctions. |
11,421 | Please write an abstract with title: A high-efficiency strongly self-checking asynchronous datapath, and key words: Circuit faults, Circuit testing, Switches, Voltage, Hardware, Asynchronous circuits, Switching circuits, Logic circuits, Electrical fault detection, Fault detection. Abstract: This work examines the inherent self-checking (SC) property of latch-free dynamic asynchronous datapath (LFDAD) using differential cascode voltage switch logic. Consequently, a highly efficient SC dynamic asynchronous datapath architecture is presented. In this architecture, no hardware needs to be added to the datapath to achieve SC. The presented implementation is efficient in terms of speed and area and represents a new approach to fault-tolerant design. |
11,422 | Please write an abstract with title: The design of an autonomous vehicle for the disabled, and key words: Remotely operated vehicles, Mobile robots, Wheelchairs, Buildings, Humans, Navigation, Floors, Microcomputers, Digital cameras. Abstract: The first steps in the design and construction of an autonomous vehicle for the physically and sensory disabled are described. The vehicle is basically a self-navigating wheelchair, which is designed to transport a person to a desired room within an office building given only the destination room number. The wheelchair has been equipped with an on-board microcomputer, a digital camera, and a scanning ultrasonic rangefinder. The goal of the project is to develop a vehicle that can operate without human intervention within a crowded environment with little or no impact on the building or its inhabitants. An overview of the project objectives and a detailed description of the components that are currently working are presented. |
11,423 | Please write an abstract with title: Deep Video Compression using Compressed P-Frame Resampling, and key words: Training, Video coding, Deep learning, Visualization, Video compression, Generative adversarial networks, Entropy coding. Abstract: The Convolutional Neural Network has emerged as one of the major players in the field of deep video compression. Many deep learning models relying on convolutional layers have outperformed the state-of-the-art compression standards by a huge margin. Although their work is still at infancy level, they seem to be the future of video coding. The proposed approach uses a frame resampling based video compression approach using Temporal 3-D CNN based encoder and Y-style CNN based decoder concatenated with High Fidelity GAN based entropy coding for frame compression. The proposed architecture employs frame downsampling method over the residual frame to control the bitrate of the compressed data and is trained through a simplified stagewise training procedure. The extensive experiments are conducted with different datasets and different colorspaces. The study shows that the proposed model outperforms the H.265 by 0.255 dB in terms of PSNR and nearly 0.1 in terms of MS-SSIM. |
11,424 | Please write an abstract with title: Low-power voltage-controlled oscillators in 90-nm CMOS using high-quality thin-film postprocessed inductors, and key words: Thin film inductors, Voltage-controlled oscillators, Radio frequency, CMOS technology, Dielectric substrates, Wafer scale integration, Sun, Packaging, CMOS process, Energy consumption. Abstract: Wafer-level packaging (WLP) technology offers novel opportunities for the realization of high-quality on-chip passives needed in RF front-ends. This paper demonstrates a thin-film WLP technology on top of a 90-nm RF CMOS process with one 15-GHz and two low-power 5-GHz voltage-controlled oscillators (VCOs) using a high-quality WLP or above-IC inductor. The 5-GHz VCOs have a power consumption of 0.33 mW and a phase noise of -115 dBc/Hz and -111 dBc/Hz at 1-MHz offset, respectively, and the 15-GHz VCO has a phase noise of -105 dBc/Hz at 1-MHz offset with a power consumption of 2.76 mW. |
11,425 | Please write an abstract with title: GloFood: A Community-oriented System for Knowledge Sharing and Collaboration, and key words: Knowledge engineering, Electronic learning, Discussion forums, Social networking (online), Maintenance engineering, Collaborative work, Internet. Abstract: In the last decades, technology has evolved exponentially and become a big part of our daily activities. The widespread use of the Internet coupled with the growth of social networks allowed a more intense search for knowledge sharing as well as the creation and maintenance of interpersonal relationships. As a result, several learning communities appeared and grew. Each community has its central topic, cooking being an example of these topics. The key idea is that some cooks from around the world might want to enhance their culinary knowledge and, to do so, they can join a related community. This paper introduces GloFood which is a community-oriented system supporting a collaborative learning community that tries to foster knowledge sharing and collaboration. |
11,426 | Please write an abstract with title: ID CAM: a smart camera for scene capturing and ID recognition, and key words: Computer aided manufacturing, CADCAM, Smart cameras, Layout, High speed optical techniques, Stimulated emission, Optical sensors, Image recognition, Image sensors, Intelligent sensors. Abstract: An ID recognition system is described that uses optical beacons and a high-speed image sensor. The ID sensor captures a scene like an ordinary camera and recognizes the ID of a beacon emitted over a long distance. The ID recognition system has three features. The system is robust to changes in the optical environment, e.g. complete darkness, spotlights, and sunlight. It can recognize up to 255 multiple optical beacons simultaneously. Furthermore, it can recognize beacons even over a long distance, e.g. 40 m indoors and 20 m outdoors. Implementation and evaluation of this ID recognition system showed that a mobile augmented reality system can be achieved by combining this ID recognition system with a PDA and a wireless network. |
11,427 | Please write an abstract with title: Coarsely Quantized Layered Decoding Using the Information Bottleneck Method, and key words: Schedules, Quantization (signal), Error analysis, Computer architecture, Throughput, Parity check codes, Decoding. Abstract: In recent years coarsely quantized LDPC decoding using a flooding schedule has been extensively studied. However, there exist few works addressing coarse quantization for a layered schedule, which enables improved convergence speed of the message passing algorithm. The layered schedule can especially be beneficial for high throughput applications like fiber optical systems. This paper presents innovative layered decoding approaches, where the information bottleneck method is used for the design of different coarsely quantized decoder architectures. The varieties of investigated node implementations include lookup tables, computational domain techniques as well as reduced complexity approximations. All structures are designed offline using a layered discrete density evolution method. The performance of multiple node architectures is investigated in terms of evolution of mutual information in the design phase and in terms of error rates. We focus in this paper on regular quasi-cyclic codes. Our simulations running on GPUs also allow insights into the error floor behavior. |
11,428 | Please write an abstract with title: DNN Based Iterative Detection for High Order QAM OFDM Systems With Insufficient Cyclic Prefix, and key words: Quadrature amplitude modulation, OFDM, Iterative algorithms, Robustness, Channel models, Detection algorithms, Computational complexity. Abstract: In this paper, we consider high order QAM orthogonal frequency-division multiplexing (OFDM) systems with insufficient cyclic prefix (CP) which will lead to intersymbol interference (ISI) and intercarrier interference (ICI) in the receiver. To cope with the error floor induced by ICI and ISI in one-tap equalization and iterative serial interference cancellation (ISIC), we develop a maximum likelihood (ML) based iterative grouping detection algorithm (ML-IG), which utilizes the correlation among the received signals on adjacent subcarriers to improve the detection accuracy. Since ML-IG for OFDM systems with high order QAM modulation is of significant complexity, detection network (DetNet) based iterative grouping detection algorithm (DetNet-IG) is designed to imitate ML-IG. Simulations show that both ML-IG and DetNet-IG can provide better BER performance than ISIC, and DetNet-IG exhibits distinguished robustness against channel model incongruity. |
11,429 | Please write an abstract with title: Detection of DTV Spectrum White Spaces for IEEE 802.22 Network Using Correlator Detector, and key words: Synchronization, Correlators, Detectors, Correlation, Signal to noise ratio, Digital TV. Abstract: In this paper, a correlation-based spectrum sensing method is presented to detect the frequency holes in the licensed digital TV band when accurate existence database is not available. The data segment and field synchronization symbols of digital TV signal features are considered in this sensing method. These two approaches (features) are proposed by using the cross correlation between the time accumulated original signal pattern and a copy of this pattern with different sensing time to present the desired detection scheme at low signal to noise ratio levels. When data segment synchronization approach is considered, simulation result show that the correlator detector can detect SNR of -25dB in 19.25 msec when PFA=0.1. However for the field synchronization correlator detector, the result show that the minimum detected SNR is -30dB for sensing time of 96.4msec. |
11,430 | Please write an abstract with title: Comments on "Explicit criterion for the positive definiteness of a general quartic form", and key words: Robust control, Automatic control, Robustness, Sampling methods, Control systems, Monte Carlo methods, Uncertainty, Interpolation, System identification, Linear matrix inequalities. Abstract: The purpose of this note is to point out that the result in the above paper (W. H. Ku, IEEE Trans. Autom. Control, vol. AC-10, no. 3, pp. 372-373, Jul. 1965) is incomplete, and to give a complete and improved result. |
11,431 | Please write an abstract with title: A Promising PE-PUF Structure Based on High Precision Delay Measurement, and key words: Ring oscillators, Manufacturing processes, Image processing, Prototypes, Physical unclonable function, Hardware, Delays. Abstract: Physical Unclonable Function (PUF) has proved to be a promising primitive for hardware security, which extracts entropy from the IC manufacturing process variations. The delay-based PUFs such as Ring Oscillator PUF(RO PUF) and Arbiter PUF have received a great deal of attention. In this paper, we present a promising delay-based PUF architecture, called Processing Element-PUF (PE-PUF) that exploits the circuit delay variations existing in the processing elements. We apply a system clock with incremental frequency to a pair of PE modules, and one output bit of PE-PUF is determined by the information which PE module of the pair fails first. A prototype implementation of PE-PUF is validated on Digilent Nexys A7 FPGAs. Compared with conventional delay-based PUFs, the proposed PE-PUF can mitigate the counter failure problem. Moreover, the PE-PUF utilizes the intrinsic delay of existing processing elements of reconfigurable processor, which leads to a compact implementation. Similar methodology could be applied to other system where a collection of combinatorial circuits could be driven by a tunable clock. |
11,432 | Please write an abstract with title: High Order Modes in a Spherical Fabry-Perot Resonator, and key words: Fabry-Perot, Mirrors, Partial differential equations, Resonant frequency, Frequency measurement, Surface waves, Electromagnetic waveguides, Energy measurement, Laser modes. Abstract: The accuracy of the approximate solution to the wave equation in the "large aperture" case was investigated. The measured distribution of energy in the various transverse modes corresponded to the Laguerre-Gaussian solutions; resonant frequencies, however, deviated from those predicted by the approximate theory by as much as 2 percent for high radial mode numbers. Two first order perturbation calculations, including a neglected term in the wave equation and the nonsphericity of constant phase surfaces, yielded resonant frequencies in agreement with experiment. |
11,433 | Please write an abstract with title: About aggregation of imprecise evidence in database, and key words: Databases, Fuzzy sets, Fuzzy systems, Fuzzy neural networks, Humans, Function approximation, Computational complexity, Data analysis, Machine learning, Prototypes. Abstract: We present a data-driven approach to fuzzy modelling that provides the user with both accurate and transparent rule bases for her/his database. The method has two steps: data exploration by means of fuzzy clustering and fuzzy set aggregation by means of similarity analysis. |
11,434 | Please write an abstract with title: Planetary telecommunication development during the next ten years, and key words: Extraterrestrial phenomena, Space vehicles, Technology forecasting, Communications technology, Space technology, Planets, Atmospheric measurements. Abstract: The past Mariner missions to the inner planets have greatly increased our knowledge about Mars, Venus, and Mercury. The continued success of these missions has been enhanced by the evolution of communication technology, with the main growth in the ground capability. The missions during the next decade will concentrate on the outer planets, with requirements to operate over greatly increased ranges in hostile radiation environments, and for reduced weight to allow the transportation of probes. The communication requirements will be mainly achieved by increases in flight equipment performance, new larger antennas, and operation at higher frequencies. The rate of growth of the communication capability is heavily dependent on the type of missions planned. However, we do have the capability to provide significant data return from the outer planets. |
11,435 | Please write an abstract with title: A UTD/FDTD investigation on procedures to assess compliance of cellular base-station antennas with human-exposure limits in a realistic urban environment, and key words: Finite difference methods, Time domain analysis, Humans, Guidelines, Physical theory of diffraction, Lead, FCC, Life testing, Windows, Computational efficiency. Abstract: In this paper, different exposure situations for a subject standing inside a room of a building with a window facing a rooftop-mounted base-station antenna are analyzed. The study is accomplished by using a technique combining the uniform asymptotic theory of diffraction and the finite-difference time-domain method, suitable to characterize human exposure in realistic urban environments at a reasonable computational cost. The different exposure conditions examined are analyzed to highlight the problems related to compliance assessment procedures in complex exposure scenarios and to suggest some possible solutions. A comparison of the results obtained in these scenarios with those computed neglecting the presence of the room walls (free-space situations) evidences that, under certain conditions, average exposure field levels and specific absorption rates (SARs) in the realistic environments can be higher than in free space, thus demonstrating that compliance assessment carried out in free space can yield nonconservative results. As concerns implications of field nonuniformities, typical of realistic urban environments, on SAR values, the results show that the whole-body averaged SAR is related to the average field value, provided the averaging procedure is appropriately chosen to cover all the volume occupied by the subject (V/sub S/) and not only a vertical surface. Local SAR values, instead, show a more complex relation with the exposure field, such that considering only the V/sub S/-averaged field value for compliance assessment might lead to an underestimation of the real exposure level, while using the peak of the field in V/sub S/ leads to a remarkable overestimation. |
11,436 | Please write an abstract with title: Development of Cu Seed Layers in Ultra-High Aspect Ratio Through-Silicon-Vias (TSVs) with Small Diameters, and key words: Fabrication, Electrochemical deposition, Three-dimensional displays, Plating, Tin, Conductors, Dielectrics. Abstract: Through-silicon-vias (TSVs) with high aspect ratio are of great demand due to their advantages in high density three-dimensional (3D) integration. This paper presents a feasible and convenient process flow for fabricating insulation layer, barrier and seed layer in ultra-high aspect ratio TSVs. A conformal polyimide (PI) liner is deposited by vacuum-assisted spin coating technique. Then a uniform TiN barrier layer is fabricated using atomic layer deposition (ALD) at 270 °C. The seed layer is fabricated by sequentially applying sputtering and electroless plating of Cu. Notably, with the pre-treatment effect of sputtered Cu, the electroless plating process is able to form a continuous Cu layer in high aspect ratio vias. Dense and continuous Cu seed layers are successfully fabricated in TSVs with diameters of 3 μm and 5 μm, respectively. The aspect ratios of the TSVs are larger than 17. The minimum thickness of the Cu seed layer inside TSVs is around 100 nm, and such a continuous seed layer is beneficial to the subsequent electroplating of Cu conductor. The proposed process flow for the formation of liner, barrier and seed layer in ultra-high aspect ratio TSVs is useful for the fabrication of interconnects in heterogeneous integration of various modern electronic systems and devices. |
11,437 | Please write an abstract with title: Considerations of SiP based Antenna in Package/ Module (AiP/AiM) Design at Sub-Terahertz Frequencies for Potential B5G/6G Applications, and key words: Fabrication, Phased arrays, Radio frequency, Parametric study, Simulation, Millimeter wave technology, Electronic components. Abstract: Antenna-in-Package/Module (AiP/AiM) are the primary technologies to realize the RF subsystems for frequencies beyond millimeter-wave (mmW) bands, including sub-terahertz for potential B5G/6G applications. Due to the small wavelength, the mechanical process of the current system-in-package (SiP) results in limitations to realize antenna arrays at sub-terahertz. In this paper, the mechanical limits to cause radiation discrepancy is investigated by designing an AiP/AiM at 110 GHz band. Through the parametric studies based on the currently available cheap SiP process, one may summarize the considerations of AiP/AiM design for beyond sub-terahertz frequencies. The examination will consider the design of an 8×8 antenna array to provide a radiation gain of 20 dBi. Numerical full-wave simulations by HFSS were performed to obtain reliable behaviors of AiP/AiM radiations. |
11,438 | Please write an abstract with title: Isolation Bandwidth Enhancement of Electrical Balance Duplexers, and key words: Antenna measurements, Spirals, Limiting, Frequency-domain analysis, Transmitting antennas, Receiving antennas, Bandwidth. Abstract: In In-Band Full Duplex (IBFD) transceivers, newly suggested Electrical Balance Duplexer (EBD) technique works by coupling transmitter, receiver, antenna, and balancing impedance using a hybrid junction where the balancing impedance needs to be equal to the antenna impedance to achieve a high Transmit-Receive (TX-RX) isolation. This isolation implements a form of self-interference (SI) cancellation to facilitates simultaneous transmission and reception from single antenna. Variations in antenna impedance with respect to frequency significantly reduces the isolation bandwidth and is dominant factor in limiting the isolation. A frequency independent antenna with a core structure of equiangular Archimedean spiral is designed by authors with high impedance stability in ultra-wideband (UWB) frequency domain of 1.5GHz to 3.5GHz while the antenna impedance is smoothened using some electromagnetic techniques. In comparison with the literature, using this antenna in the EBD stage along with a simpler balancing impedance is resulted to six times wider isolation bandwidth in the EBD stage. |
11,439 | Please write an abstract with title: Deep Learning-Based Automatic Modulation Classification Over MIMO Keyhole Channels, and key words: MIMO communication, Convolutional neural networks, Modulation, Convolution, Scattering, Correlation, Classification algorithms. Abstract: Automatic modulation classification (AMC) is a significant part of cognitive communication systems. In early researches, likelihood-based (LB) and feature-based (FB) solutions were proposed for the AMC problem. With the developments in the data-driven approaches, a third method based on deep learning (DL) has recently gained prominence among AMC researchers. It is shown that convolutional neural network based classifiers are very efficient in the AMC for both single input single output (SISO) and multiple-input multiple-output (MIMO) systems. However, for most of the works in MIMO-AMC, the channel considered is full rank. This work addresses the problem of AMC over rank deficient channels such as a keyhole channel using a DL-based classifier. The classifier utilizes a CNN, which does not employ pooling layers or dropouts in the convolutional layers. To further improve the classification accuracy, decision cooperation as well as feature fusion is employed. In addition to the keyhole effect, this work investigates the effect of antenna correlation on DL-based AMC. A comparative study of the proposed method and the existing FB AMC method for the MIMO keyhole channel is also presented. |
11,440 | Please write an abstract with title: Softermax: Hardware/Software Co-Design of an Efficient Softmax for Transformers, and key words: Deep learning, Design automation, Neural networks, Transformers, Hardware, Software, Natural language processing. Abstract: Transformers have transformed the field of natural language processing. Their superior performance is largely attributed to the use of stacked “self-attention” layers, each of which consists of matrix multiplies as well as softmax operations. As a result, unlike other neural networks, the softmax operation accounts for a significant fraction of the total run-time of Transformers. To address this, we propose Softermax, a hardware-friendly softmax design. Softermax consists of base replacement, low-precision softmax computations, and an online normalization calculation. We show Softermax results in 2.35x the energy efficiency at 0.90x the size of a comparable baseline, with negligible impact on network accuracy. |
11,441 | Please write an abstract with title: Stator Teeth Pairing Design for Reduction of Cogging Torque of Dual RFPM Generator, and key words: Forging, Torque, Design methodology, Permanent magnet generators, Prototypes, Stators, Minimization. Abstract: In the application of small wind turbines, the minimization design of cogging torque is the most important to raise the utilization rate. In this paper, the stator teeth pairing design method is proposed to reduce the cogging torque of dual stator radial flux permanent magnet generators for small wind turbines. The proposed stator teeth pairing design method is to design the teeth width angle of the inner and outer stator differently from each other for the cancelation of cogging torque generated by each stator. For this study, 2D FEA is used for the analysis of cogging torque and driving characteristics. As a result, the applying effect of the suggested design method is verified. |
11,442 | Please write an abstract with title: An image metric-based ATR performance prediction testbed, and key words: Testing, Phase measurement, Iterative algorithms, Predictive models, Wavelength measurement, Temperature sensors, Geometry, Military computing, Computer architecture, Rivers. Abstract: Currently, automatic target recognition (ATR) evaluation techniques use simple models, such as quick-look models, or detailed exhaustive simulation. Simple models cannot accurately quantify performance, while the detailed simulation requires enumerating each operating condition. A need exists for ATR performance prediction based on more accurate models. We develop a predictor based on image measures quantifying the intrinsic ATR difficulty on an image. These measures include: CFAR, power spectrum signature, probability of edge etc. We propose a two-phase approach: a learning phase, where image measures are computed on set of test images, and the ATR performance measured; and a performance prediction phase. The learning phase produces a mapping, valid across various ATR algorithms, even applicable when no image truth is available (e.g., evaluation for denied area imagery). We present a performance predictor using a trained classifier ATR constructed using GENIE, a tool from Los Alamos. |
11,443 | Please write an abstract with title: An EDF-based scheduling algorithm for multiprocessor soft real-time systems, and key words: Scheduling algorithm, Real time systems, Processor scheduling, Computer science, Multiprocessing systems, Signal design, Large-scale systems, Signal processing, Radar signal processing, Dynamic scheduling. Abstract: In hard real-time systems, a significant disparity in schedulability exists between EDF-based scheduling algorithms and Pfair scheduling, which is the only known way of optimally scheduling recurrent real-time tasks on multiprocessors. This is unfortunate because EDF-based algorithms entail lower scheduling and task-migration overheads. In work on hard real-time systems, it has been shown that the disparity in schedulability can be lessened by placing caps on per-task utilizations. In this paper, we show that it can also be lessened by easing the requirement that all deadlines be met. Our main contribution is a new EDF-based scheme that ensures bounded deadline tardiness. In this scheme, per-task utilizations must be capped, but overall utilization need not be restricted. The required cap is quite liberal. Hence, our scheme should enable a wide range of soft real-time applications to be scheduled with no constraints on total utilization. We also propose techniques and heuristics that can be used to reduce tardiness. |
11,444 | Please write an abstract with title: On The Adversarial Robustness of Principal Component Analysis, and key words: Conferences, Signal processing algorithms, Signal processing, Robustness, Acoustics, Speech processing, Principal component analysis. Abstract: In this paper, we investigate the adversarial robustness of principal component analysis (PCA) algorithms. In the considered setup, there is a powerful adversary who can add a carefully designed data point to the original data matrix. The goal of the adversary is to maximize the distance between the subspace learned from the original data and the subspace obtained from the modified data. Different from most of the existing research using Asimov distance to measure such a distance, we leverage a more precise and sophisticated measurement, Chordal distance, which can be used to analyze the influence of an outlier on PCA more comprehensively. Our analysis shows that the first principal angle can be completely changed by an outlier and the second principal angle changes very little. We also demonstrate the performance of our strategy with experimental results on synthetic data and real data. |
11,445 | Please write an abstract with title: Criminal Investigation Image Retrieval Based on Deep Learning, and key words: Feature extraction, Image retrieval, Semantics, Object detection, Annotations, Training, Deep learning. Abstract: This paper proposed a criminal investigation image retrieval algorithm based on deep learning. First, this paper improves Faster R-CNN object detection network making it can extract multi-scale features of images, so that it can better annotation semantic information for the image. To obtain a preliminary image list through image retrieval of the semantic information. Then use ResNet50 to extract image features, perform content-based retrieval in the image list returned by the first step of semantics to obtain the final criminal investigation image retrieval result, both the semantic and the content are combined for image retrieval. The experimental results show that the criminal investigation image retrieval algorithm proposed in this paper is superior to the simple content criminal investigation image retrieval algorithm in Precision and Retrieval rate. |
11,446 | Please write an abstract with title: Model-Based Systems Engineering Tool-Chain for Automated Parameter Value Selection, and key words: Artificial intelligence, Decision making, Modeling, Tools, Data models, Unified modeling language, Stakeholders. Abstract: Cyber-physical systems (CPSs) integrate heterogeneous systems and process sensor data using digital services. As the complexity of CPS increases, it becomes more challenging to efficiently formalize the integrated multidomain views with flexible automated verification across the entire lifecycle. This article illustrates a model-based systems engineering tool-chain to support CPS development with an emphasis on automated parameter value selection for co-simulation. First, a domain-specific modeling approach is introduced to support the formalizations of CPS artifacts, development processes, and simulation configurations. The domain-specific models are used as the basis to generate a Web-based process management system for automated parameter value selections, which coordinates Open Services for Lifecycle Collaboration services of development information and technical resources (models, data, and tools) in order to support automated co-simulation. The services are deployed by a service orchestrator based on a decision-making algorithm for parameter value selection. Finally, developers make use of the WPMS to implement simulations and to select system parameter values for co-simulation automatically. The approach is illustrated by a case study on auto-braking system development and we evaluate the efficiency of this tool-chain by both qualitative and quantitative methods. The results show that parameter values are selected more efficiently and effectively when implementing co-simulations using our tool-chain. |
11,447 | Please write an abstract with title: Die aanbieding van voorgraadse kursusse oor diskrete-tyd stelsels, and key words: Finite impulse response filters, Minimization, Ice, History, Fourier transforms, Discrete-time systems, Digital signal processing. Abstract: An introductory courte on linear discrete time systems can conveniently be offered before or together with one on continuous time systems, and furthermore it is desirable that such a course should be presented as early as possible in the syllabus. Such a course could start with a description of a linear discrete time system in terms of difference equations, followed by a discussion of the Z-transform without the students having to know anything about the Fourier Transform. Stress should be laid on the connection between difference equations, transfer functions, pole-zero diagrams, frequency responses, impulse responses and convolution. |
11,448 | Please write an abstract with title: THz Radar Security Screening Method for Walking Human Torso With Multi-Angle Synthetic Aperture, and key words: Radar imaging, Radar, Legged locomotion, Imaging, Security, Apertures, Synthetic aperture radar. Abstract: Terahertz (THz) radar imaging has widely adopted for security screening of standoff human body in recent years, owing to its capacities of high resolution, harmless, contactless, and penetrate clothing. However, THz radar security screening for walking human is still a challenge due to the non-rigid motion of walking. To figure it out, a THz radar security screening method for walking human torso is proposed with multi-angle synthetic aperture. In this method, the echo data of walking human torso component is assumed as a rigid motion model within a short time. Particularly, the torso component has the maximum ratio of surface area and echo energy, which means that its motion phase error can be detected after fractional Fourier transform processing. Besides, after the correction and imaging processing, the imaging results under different angles are fused by coherent integration with registration processing to improve the integrity of scattering information, which is incomplete within a short aperture due to self-occlusion and the changes in incident angles. The simulation experiments are conducted to verify the imaging quality and feasibility of the proposed method. Moreover, the real small aperture echo data of moving torso collected by our THz radar (that operates at 330GHz with the bandwidth of 30GHz and the output peak power of 5mW) is processed via the proposed method to indicate the significance of multi-angle imaging. |
11,449 | Please write an abstract with title: Test consideration for nanometer-scale CMOS circuits, and key words: Circuit testing, Frequency, Circuit faults, Threshold voltage, Silicon, CMOS technology, Timing, Thermal management, Temperature dependence, Delay. Abstract: The exponential increase in leakage, the device parameter variations, and the aggressive power management techniques will severely impact IC testing methods. Test technology faces new challenges as faults with increasingly complex behavior become predominant. Design approaches aimed at fixing some of the undesirable effects of nanometric technologies could jeopardize current test approaches. In this article, we explore test considerations for scaled CMOS circuits in the nanometer regime and describe possible solutions to many of these challenges, including statistical timing and delay test, I/sub DDQ/ test under exponentially increasing leakage, and power or thermal management architectures. |
11,450 | Please write an abstract with title: Leveraging Neural Networks in Malaria Control, and key words: Training, Conferences, Neural networks, Africa, Predictive models, Tools, Data models. Abstract: In this paper we build a neural network model to predict prevalence of malaria for a given geographic location and year. We report on our experience of building the most suitable neural network architecture for this problem. We show that both utilizing dropout and Adam optimizer in the network training process is very effective and can lead to a precise model without overfitting issues. Incorporating rainfall data leads to a significant improvement in the precision of the model, highlighting the fact that this is an important factor in the spread of malaria. We then utilize the selected best neural network to predict the outcome of eradicating malaria at given locations. This can help to decide where to use limited resources, like vaccines or insecticides, for the largest possible impact in malaria control. |
11,451 | Please write an abstract with title: P2800/D6.1, Jun 2021 - IEEE Draft Standard for Interconnection and Interoperability of Inverter-Based Resources (IBR) Interconnecting with Associated Transmission Electric Power Systems, and key words: IEEE Standards, Interoperability, Voltage control, Power systems, IEC Standards, Voltage measurement, Inverters, Frequency response, Harmonic analysis, Power system measurements. Abstract: Uniform technical minimum requirements for the interconnection, capability, and lifetime performance of inverter-based resources interconnecting with transmission and sub-transmission systems are established in this standard. Included in this standard are performance requirements for reliable integration of inverter-based resources into the bulk power system, including, but not limited to, voltage and frequency ride-through, active power control, reactive power control, dynamic active power support under abnormal frequency conditions, dynamic voltage support under abnormal voltage conditions, power quality, negative sequence current injection, and system protection. This standard also applies to isolated inverter-based resources that are interconnected to an ac transmission system via dedicated voltage source converter high-voltage direct current (VSC-HVDC) transmission facilities; in these cases, the standard applies to the combination of the isolated IBRs and the VSC-HVDC facility, and not to an isolated inverter-based resource (IBR) on its own. |
11,452 | Please write an abstract with title: An adaptive configuration-space and work-space based criterion for view planning, and key words: Robot sensing systems, Kinematics, Mobile robots, Space exploration, Orbital robotics, Sensor systems, Solid modeling, Computational geometry, Inspection, Adaptive algorithm. Abstract: We consider the view planning problem, also called, next best view (NBV) problem for sensor based exploration for general robot-sensor systems, where a range scanner is mounted on a robot with non-trivial kinematics, e.g., an eye-in-hand system. Earlier approaches to NBV had considered purely work-space (we also use the term physical-space) based criteria, such as select the view that maximizes the unknown physical-space volume. While this works well for mobile robots (often modeled as point or circle, thereby having trivial geometry and kinematics), it ignores a critical aspect, i.e., to give priority to exploring "manoeuvrable" space around the robot so that it can move to better viewing configurations. Proposed C-space based view planning criteria address this problem. However, C-space criteria (assuming the robot has enough manoeuvrable space) may sacrifice efficiency in work-space volume coverage. For inspection or environment modeling tasks, efficient workspace volume coverage is important. In this paper, we propose an adaptive algorithm that biases the search toward C-space or toward work-space, as needed. We call it adaptive viewpoint candidates entropy (VCE) criterion. Results with different simulated scenes show the effectiveness of this criterion in efficient (in that it needs less scans) exploration of the workspace. |
11,453 | Please write an abstract with title: Optimization of link adaptation with a practical power consumption model, and key words: Energy consumption, Batteries, Power system modeling, Power amplifiers, Optimization methods, Microelectronics, Costs, Throughput, Gain, Rayleigh channels. Abstract: Link adaptation (LA) is an effective technique to significantly boost the spectral efficiency of current wireless systems, so as to meet the increasing demand for high-speed data service at low cost. LA achieves high spectral efficiency by minimizing power of maximizing throughput under a constant power budget. In order to make its application meaningful in practical systems, we have to take into account the actual battery power consumption instead of just the transmitted power. First, the power amplifier is not 100% efficient and the relationship between transmitted and consumed power is nonlinear. Second, there is the processing power in addition to the transmitted power. This is overlooked in previous work in LA. Thus, we investigate the optimal LA scheme within the real battery power consumption context and present some preliminary results. This paper first identifies the problem with the "conventional" power concept, and gives an abstract nonlinear model for the battery power consumption, then it proposes an optimization method for LA. Finally, it demonstrates this method, using adaptive modulation as an example. The resulting adaptation scheme is quite different from the previous optimal one (both in the modes used and switching thresholds). The numerical results show at least 1.2 dB gain over the previous optimal scheme derived with the "conventional" power concept in the Rayleigh channel. Therefore we have to use this alternative scheme to fully utilize the benefit of LA in real systems. The proposed power model and the analysis approach also are generic and widely applicable. |
11,454 | Please write an abstract with title: Study of UHF RFID signal propagation through complex media, and key words: UHF propagation, Propagation losses, Radiofrequency identification, Electromagnetic propagation, Electromagnetic reflection, Electromagnetic fields, Material properties, Dielectric losses, Dielectric materials, Water. Abstract: We show that consideration of reflections and product dimensions is important for liquid and dielectric materials as well since much of the power loss occurs at the interfaces between air and the medium. The quantitative approach outlined in this paper can have an important impact on understanding the behavior of UHF RFID systems and optimizing performance. |
11,455 | Please write an abstract with title: Development of a Block-Based Programming Environment that Enables to Create Web Game Pages about Random Numbers, and key words: Computer languages, Conferences, Games, Programming, Usability, Task analysis, Consumer electronics. Abstract: Numerous learners require general and generic algorithmic thinking abilities regardless of the programming languages through activities to develop algorithms to solve problems. For example, Scratch is block-based programming often used in elementary and junior high schools. Therefore, several learners need a block-based programming environment that can increase their interest in programming and fosters algorithmic thinking as they implement and solve their problems. However, setting a task that does not require learners to take the initiative is challenging. Thus, an easy subject that several learners can handle is necessary to develop. This study proposes a block-based programming environment allowing novice learners to create web game pages regarding random numbers to promote algorithmic thinking. The proposed environment can be handled easily by learners who know how to use Scratch. |
11,456 | Please write an abstract with title: Long term operation of superfluid-cooled cryostat for 920 MHz NMR spectrometer, and key words: Nuclear magnetic resonance, Spectroscopy, Superconducting magnets, Cooling, Nitrogen, Magnetic fields, Laboratories, Materials science and technology, Temperature. Abstract: The 920 MHz NMR magnet which successfully generated its designed magnetic field on April 2001 was installed at Tsukuba Magnet Laboratory (TML) of the National Institute for Materials Science (NIMS). The magnet again generated 920 MHz without a quench, and has been in continuous operation for over one and a half years up to the present time. The cryostat, which houses the superconducting magnet, employs a pressurized superfluid helium cooling process. Its operating temperature is below 1.55 K. The consumption rates of liquid helium and liquid nitrogen are 0.98 L/h and 0.76 L/h, respectively. Liquid helium is manually supplied every week and liquid nitrogen is automatically supplied every week. Although the cryostat has experienced earthquakes more than 70 times and power failure 3 times, there has been no serious trouble related to the cryostat and the cooling operation is still continuing without interruption. |
11,457 | Please write an abstract with title: Benchmarking for graph transformation, and key words: Software engineering, Real time systems, Data systems, Information systems, Computer architecture, Microwave integrated circuits, Modeling, Productivity, Automation, Civil engineering. Abstract: Model transformation (MT) is a key technology in the model-driven development approach of software engineering that provides automated means to capture the evolution of models and mappings between modeling languages. The pattern and rule-based paradigm of graph transformation is considered a very popular approach for specifying such model transformations. While the expressiveness of different MT specification techniques is frequently compared on well-known transformation problems (e.g. UML-to-XMI, or UML-to-EJB mappings), no such benchmarks exist currently for comparing the performance of different model transformation tools. In the paper, we propose a systematic method for quantitative benchmarking in order to assess the performance of graph transformation tools. Typical features of the graph transformation paradigm and various optimization strategies exploited in different toots are identified and categorized. Moreover, the performance of several popular graph transformation tools is measured and compared on a well-known distributed mutual exclusion problem. |
11,458 | Please write an abstract with title: Amortized Q-learning with Model-based Action Proposals for Autonomous Driving on Highways, and key words: Road transportation, Trajectory planning, Decision making, Optimal control, Reinforcement learning, Benchmark testing, Trajectory. Abstract: Well-established optimization-based methods can guarantee an optimal trajectory for a short optimization horizon, typically no longer than a few seconds. As a result, choosing the optimal trajectory for this short horizon may still result in a sub-optimal long-term solution. At the same time, the resulting short-term trajectories allow for effective, comfortable and provable safe maneuvers in a dynamic traffic environment. In this work, we address the question of how to ensure an optimal long-term driving strategy, while keeping the benefits of classical trajectory planning. We introduce a Reinforcement Learning based approach that coupled with a trajectory planner, learns an optimal long-term decision-making strategy for driving on highways. By online generating locally optimal maneuvers as actions, we balance between the infinite low-level continuous action space, and the limited flexibility of a fixed number of predefined standard lane-change actions. We evaluated our method on realistic scenarios in the open-source traffic simulator SUMO and were able to achieve better performance than the 4 benchmark approaches we compared against, including a random action selecting agent, greedy agent, high-level, discrete actions agent and an IDM-based SUMO-controlled agent. |
11,459 | Please write an abstract with title: Performance Evaluation of Electrical Discharge Abrasive Grinding Process using Grinding Ratio, and key words: Artificial Intelligence, CBN Abrasive, EDAG, Grinding Ratio, Optimization. Abstract: The high grinding ratio (GR) is one of the most desirable quality parameter in any grinding process. People are trying to improve the performance of grinding by combining it with other processes. Electrical discharge machining (EDM) is a process that has been adopted to develop hybrid variant of grinding. In the present research a combined process of grinding and EDM has been performed in high speed steel. The GR has been evaluated by varying different EDM and grinding parameters. Further, the process prediction and optimization of GR has been done by applying advanced artificial intelligence based technique. Optimization result elucidates significant improvement in GR. |
11,460 | Please write an abstract with title: Preoperative Prediction of Prosthetic Size in Total Knee Arthroplasty Based on Multimodal Data and Deep Learning, and key words: Prosthetics, X-ray imaging, Training, Predictive models, Machine learning, Data models, Feature extraction. Abstract: Total knee arthroplasty (TKA) is an effective treatment method for severe knee osteoarthritis and other knee-related diseases. Accurate match of prostheses is a crucial factor to improve the clinical efficacy and patients' postoperative satisfaction in TKA, to which no enough attention is paid currently. In this paper, we introduce deep learning algorithm to analyze the patients' multimodal data, such as preoperative radiograph of knees and relevant physical features (e.g. sex, height, weight), and design a software system for preoperative prediction of prosthetic type in TKA. The main processing steps include the pre-processing of X-ray images and the prediction of prosthetic type based on convolutional neural network. Research on loss function and model structure is implemented to fit the dataset better for further improvement of prediction accuracy. Transfer learning method is employed to address the problem of inadequate data. The experimental results shows that our prediction system can achieve the same accuracy level compared with that of traditional methods manipulated by experienced doctors, while it can complete the preoperative prediction automatically with lower cost and better stability. |
11,461 | Please write an abstract with title: A miniaturized metamaterial unit cell for 5G applications, and key words: Metamaterials, Magnetic materials, Bandwidth, Permeability, 5G mobile communication, Broadband antennas. Abstract: In this paper, a novel miniaturized metamaterial unit cell for 5G applications was proposed. The new structure is composed of an outer ring with four slots having capacitive loads and of two intersecting arms placed in the interior of the outer ring. This unit achieves a bandwidth of 52.32% compared to 18.46% for the conventional Split Ring Resonator structure. A set of unit cells are periodically associated on a substrate, above a bowtie antenna to improve their performances. The results show that this miniaturized structure offers some interesting features performances, such as wide bandwidth, which makes the design suitable for 5G systems. |
11,462 | Please write an abstract with title: A new computational solution of the linear optimal regulator problem, and key words: Regulators, Riccati equations, Matrix converters, Control systems, Differential equations, Steady-state, MIMO, Centralized control, Symmetric matrices. Abstract: A new method is presented for the numerical deterruination of the solution of the steady-state matrix Riccati equation. The equation is converted to a canonical form corresponding to Luenberger's canonical representation for controllable multivariable systems. Three special matrices closely associated with Luenberger's canonical form are defined and two related lemmas are established. These results are used to obtain concise expressions for the eigenvectors of the Hamiltonian matrix associated with the canonical Riccati equation in terms of the solutions of a much simpler reduced Hamiltonian system. Using a theorem due to Potter the solution of the Riccati equation is written in terms of the concise eigenvector expressions. The method is particularly well suited to problems in which the ratio of system states to system inputs is large and it can lead to a 26 to 1 reduction in the computational effort required to solve the Riccati equation. |
11,463 | Please write an abstract with title: (POSTER) Impact of Connectivity Degradation on Networked Robotic Swarm Cooperation, and key words: Wireless communication, Degradation, Wireless sensor networks, Swarm robotics, Robot sensing systems, Sensor systems, Delays. Abstract: One of the most fundamental capabilities of swarm robotics is their ability to cooperate. This implies that swarm robots must exchange information with each other or with a centralized controller. However, this communication is often assumed to be perfect, an assumption that does not reflect real-world conditions, where impairments can affect the Packet Delivery Ratio (PDR) over wireless links. One essential application of swarm robotic cooperation is exploration and mapping in a timely and accurate manner. This paper studies how communication impairments can have a drastic impact on the performance of robotic swarms in critical missions such as exploration. We use an improved version of the Atlas algorithm to simulate the effect of various PDRs on the exploration mission execution performance, with the key indicator being mapping completion time. Our results show that the time it takes to complete area exploration increases exponentially as the PDR decreases linearly. Based on our results, we emphasise the importance of considering methods that minimize the delay caused by lossy communication when designing and implementing algorithms for robotic swarm exploration. |
11,464 | Please write an abstract with title: Switched-capacitor realization of FIR filters, and key words: Finite impulse response filter, Digital filters, IIR filters, Hardware, Sampling methods, Polynomials, Pipeline processing, Throughput, Circuits and systems, Acoustic signal processing. Abstract: Finite impulse response (FIR) filters can be realized without multipliers and delays by delta modulating the input signal [5]. In this letter, we describe a stray-insensitive switched-capacitor (SC) implementation of such delta modulation FIR filters. |
11,465 | Please write an abstract with title: Optimal Positioning for Energy Harvesters on a T09 AEROMAX type Aircraft’s Wing, and key words: Damping, Vibrations, Automatic frequency control, Shape, Atmospheric modeling, Static analysis, Software. Abstract: The following article analyzes the optimal position for piezoelectric patches on the structure of a T09 Aeromax model aircraft’s main wing to harvest the most energy possible. By analyzing the natural frequencies and their respective modal shapes with an accelerometer and real-time monitoring software, it was concluded that there are two potential locations for piezoelectric patches installation. However, this project also proposes a basis for future steps to validate these proposals and apply the energy harvested to a specific application. |
11,466 | Please write an abstract with title: Neural Network-Based Online Energy Management for Multi-Mode Power Split Hybrid Vehicles, and key words: Optimal control, Artificial neural networks, Computer architecture, Batteries, Dynamic programming, Hybrid electric vehicles, Fuels. Abstract: Hybrid electric vehicles (HEVs) are equipped with a traditional internal combustion engine (ICE) and one or more electrical motors (EMs). HEV multi-mode power-split powertrain architecture improves fuel consumption, battery life, and vehicle emissions. However, this architecture is known for its control complexity due to the involvement of several modes of operation. Global optimal control strategies are commonly utilized as a benchmark in HEVs however they cannot be implemented on the electronic control unit (ECU) due to their extensive computational load. In this paper, a neural network (NN) -based energy management system (EMS) is proposed to control the mode and the power split of an HEV. Firstly, dynamic programming (DP), a global optimal control strategy, is utilized to achieve optimal fuel consumption using drive cycles at a wide range of conditions. Then, the proposed NN-based EMS is trained and tested using the data collected offline from the DP. The results show that the proposed NN-based EMS is able to predict the mode and power split of an HEV with only 2% higher than the optimal fuel consumption obtained by the DP. |
11,467 | Please write an abstract with title: Real-Time Traffic and Road Surveillance With Parallel Edge Intelligence, and key words: Roads, Image edge detection, Artificial intelligence, Surveillance, Feature extraction, Videos, Traffic control. Abstract: Edge computing, which is an emerging concept to complement cloud computing, processes data closer to where the data is generated at the network edge. Transportation system is a critical component of our cities and is generating more and more data. To leverage the power of the increasing amount of data from traffic sensors, researchers have started exploring the feasibility of edge computing for traffic big data analytics. Given the resource constraints on edge devices, it is very challenging to achieve high intelligence and real-time capability at the same time. There are few edge transportation systems that function in a multi-tasking mode with high efficiency and intelligence on the edge. This paper proposes a multi-thread parallel edge system architecture and several lightweight algorithms for traffic and road surveillance. The designs ensure robustness and real-time capability for the key modules of the system. |
11,468 | Please write an abstract with title: Performance speedup of Quantum Espresso using optimized AOCL-FFTW, and key words: Three-dimensional displays, Runtime, Mission critical systems, Life estimation, Performance gain, Libraries, Nanoscale devices. Abstract: Quantum Espresso (QE) is an open-source software suite for electronic-structure calculations and materials modeling at the nanoscale. QE depends upon multiple libraries including an internal or external library for FFT computations. The iterative diagonalization process and the computation of charge density in QE use forward and inverse 3D FFTs that account for a large portion of the total application runtime. AOCL- FFTW is the FFT library recommended for QE on AMD CPU systems. QE currently uses the FFTW library in a sub-optimal manner thereby not achieving the best performance. This paper presents a new set of design and implementation strategies applied in AOCL-FFTW to overcome the major limitations of QE in its use of FFTW without requiring any code changes in QE. Results showcasing the performance benefits of the proposed optimizations in AOCL-FFTW are presented in this paper. Speed-ups are achieved in single-node and multi-node test executions that help to accelerate the QE application. |
11,469 | Please write an abstract with title: Research on Multi-Source Data Fusion Method under the Background of Unified Real Estate Registration, and key words: Solid modeling, Warehousing, Data integration, Batch production systems, Data protection, Solids, Data models. Abstract: In-depth analysis and discussion of the integration methods in the implementation of the unified registration of real estate can better provide effective data protection for the real estate management department. Taking the land data and real estate data involved in real estate registration as an example, this paper discusses the process and method of standardized integration by analyzing the problems existing in data integration, and realizes the standardization and unification of multi-source data integration through the integration of land data and real estate data. At the same time, the data batch processing model constructed based on the Model-Builder provided by ArcGIS realizes the batch automatic processing of real estate data integration, improves the efficiency of data integration and storage, and lays a solid foundation for the unified registration data integration and storage of real estate. |
11,470 | Please write an abstract with title: Video based rendering of planar dynamic scenes, and key words: Layout, Cameras, Video sequences, Robustness, Video compression, Rendering (computer graphics), Automation, Educational institutions, Motion estimation, Humans. Abstract: In this paper, we propose a method to synthesize arbitrary views of a planar scene from a monocular video sequence of it. The 3-D direction of motion of the object is robustly estimated from the video sequence. Given this direction any other view of the object can be synthesized through a perspective projection approach, under assumptions of planarity. If the distance of the object from the camera is large, a planar approximation is reasonable even for non-planar scenes. Such a method has many important applications, one of them being gait recognition where a side view of the person is required. Our method can be used to synthesize the side-view of the person in case he/she does not present a side view to the camera. Since the planarity assumption is often an approximation, the effects of non-planarity can lead to inaccuracies in rendering and needs to be corrected for. Regions where this happens are examined and a simple technique based on weak perspective approximation is proposed to offset rendering inaccuracies. Examples of synthesized views using our method and performance evaluation are presented. |
11,471 | Please write an abstract with title: Age-Optimal Multi-Slot Pilot Allocation Random Access Protocol for S-IoT, and key words: Performance evaluation, Satellites, Simulation, Massive machine type communications, Access protocols, Throughput, Sensors. Abstract: The timeliness of information is important for massive machine type communications (mMTC) random access in satellite internet of things (S-IoT), where the propagation delay would hinder the terrestrial sensing devices update their timely status to the satellite. In this paper, we analyse the timeliness of information for the mMTC random access scenario via a new performance metric named age of information (AoI), and propose an age-optimal multi-slots pilot allocation random access (AMSPA) protocol, which aims to lower the system average AoI with a certain access failure probability (AFP) requirement. We derive the closed-form expression of the system average AoI by tracking the AoI evolution of each device via Markovian analysis, then we conduct an optimal number of slots to achieve the lowest system average AoI with the increasing of the system overload. Simulation results validate our theoretical analysis and show that we can minimize the system average AoI via choosing an optimal number of slots under diversity system load for our AMSPA protocol. |
11,472 | Please write an abstract with title: Estimation of parameters of life from progressively censored data using Burr-XII model, and key words: Life estimation, Parameter estimation, Maximum likelihood estimation, Lifetime estimation, Hazards, Entropy, Shape, Testing, Insulation, Numerical simulation. Abstract: Based on progressively Type-II censored samples, the maximum likelihood, and Bayes estimators for some lifetime parameters (reliability, and hazard functions), as well as the parameters of the Burr-XII model, are derived. The Bayes estimators are obtained using both the symmetric (Squared Error, SE) loss function, and asymmetric (LINEX, and General Entropy, GE) loss functions. This was done with respect to the conjugate prior for the one shape parameter, and discrete prior for the other parameter of this model. Also the existence, uniqueness, and finiteness of the ML parameter estimates for this type of censoring are discussed. A practical example consisting of data from an accelerated test on insulating fluid reported by Nelson (1982) was used for illustration, and comparison. Finally, some numerical results using simulation study concerning different sample sizes, and progressive censoring schemes were reported. |
11,473 | Please write an abstract with title: Adaptability Preserving Domain Decomposition for Stabilizing Sim2Real Reinforcement Learning, and key words: Training, Simulation, Reinforcement learning, Stability analysis, Task analysis, Intelligent robots. Abstract: In sim-to-real transfer of Reinforcement Learning (RL) policies for robot tasks, Domain Randomization (DR) is a widely used technique for improving adaptability. However, in DR there is a conflict between adaptability and training stability, and heavy DR tends to result in instability or even failure in training. To relieve this conflict, we propose a new algorithm named Domain Decomposition (DD) that decomposes the randomized domain according to environments and trains a separate RL policy for each part. This decomposition stabilizes the training of each RL policy, and as we prove theoretically, the adaptability of the overall policy can be preserved. Our simulation results verify that DD really improves stability in training while preserving ideal adaptability. Further, we complete a complex real-world vision-based patrolling task using DD, which demonstrates DD’s practicality. A video is attached as supplementary material. |
11,474 | Please write an abstract with title: Core and Spectrum Allocation for Avoidance of Spectrum Fragmentation in EON-SDM, and key words: Resource management, Crosstalk, Bandwidth, Modulation, Optical fiber networks, Clustering algorithms. Abstract: In Elastic Optical Networks with Space-Division Multiplexing (EON-SDM), dynamic allocation and deallocation of the spectrum can cause spectrum fragmentation. A possible solution is the use of proactive techniques to reduce the occurrence of fragmentation. In this paper, we propose a proactive algorithm for EON-SDM networks using Multi-Core Fibers (MCFs), which employs a core prioritization and quadrant ordering to allocate requests. Results show that our algorithm can effectively reduce the blocking of requests for connection establishment. |
11,475 | Please write an abstract with title: Performance of multiantenna signaling techniques in the presence of polarization diversity, and key words: Polarization, MIMO, Diversity methods, Error analysis, Samarium, Transmitting antennas, Scattering, Transmitters, Receiving antennas, Laboratories. Abstract: Multiple-input multiple-output (MIMO) antenna systems employ spatial multiplexing to increase spectral efficiency or transmit diversity to improve link reliability. The performance of these signaling strategies is highly dependent on MIMO channel characteristics, which, in turn, depend on antenna height and spacing and richness of scattering. In practice, large antenna spacings are often required to achieve significant multiplexing or diversity gain. The use of dual-polarized antennas (polarization diversity) is a promising cost- and space-effective alternative, where two spatially separated uni-polarized antennas are replaced by a single antenna structure employing orthogonal polarizations. This paper investigates the performance of spatial multiplexing and transmit diversity (Alamouti (see IEEE J. Select. Areas Commun., vol.16, p.1451-58, Oct. 1998) scheme) in MIMO wireless systems employing dual-polarized antennas. In particular, we derive estimates for the uncoded average symbol error rate of spatial multiplexing and transmit diversity and identify channel conditions where the use of polarization diversity yields performance improvements. We show that while improvements in terms of symbol error rate of up to an order of magnitude are possible in the case of spatial multiplexing, the presence of polarization diversity generally incurs a performance loss for transmit diversity techniques. Finally, we provide simulation results to demonstrate that our estimates closely match the actual symbol error rates. |
11,476 | Please write an abstract with title: Fuzzy Mathematical Programming and Self-Adaptive Artificial Fish Swarm Algorithm for Just-in-Time Energy-Aware Flow Shop Scheduling Problem With Outsourcing Option, and key words: Frequency selective surfaces, Energy consumption, Genetic algorithms, Job shop scheduling, Outsourcing. Abstract: Flow shop scheduling (FSS) problem constitutes a major part of production planning in every manufacturing organization. It aims at determining the optimal sequence of processing jobs on available machines within a given customer order. In this article, a novel biobjective mixed-integer linear programming (MILP) model is proposed for FSS with an outsourcing option and just-in-time delivery in order to simultaneously minimize the total cost of the production system and total energy consumption. Each job is considered to be either scheduled in-house or to be outsourced to one of the possible subcontractors. To efficiently solve the problem, a hybrid technique is proposed based on an interactive fuzzy solution technique and a self-adaptive artificial fish swarm algorithm (SAAFSA). The proposed model is treated as a single objective MILP using a multiobjective fuzzy mathematical programming technique based on the ε-constraint, and SAAFSA is then applied to provide Pareto optimal solutions. The obtained results demonstrate the usefulness of the suggested methodology and high efficiency of the algorithm in comparison with CPLEX solver in different problem instances. Finally, a sensitivity analysis is implemented on the main parameters to study the behavior of the objectives according to the real-world conditions. |
11,477 | Please write an abstract with title: Multi-Aspect SAR Target Recognition Based on Efficientnet and GRU, and key words: Training, Synthetic aperture radar, Feature extraction, Radar polarimetry, Target recognition, Data models, Image sequences. Abstract: Automatic target recognition (ATR) in synthetic aperture radar (SAR) has been extensively applied in military and civilian fields recently. However, SAR images are very sensitive to the azimuth of the imaging, and the same target at different aspects differs greatly, thus requiring more reliable and robust multi-aspect ATR recognition performance. In this paper, we propose an end-to-end multi-aspect ATR model based on EfficientNet and GRU, and use island loss as the training loss, which is more suitable for SAR ATR. Experiments show that our proposed method can achieve 100% accuracy for 10-class recognition, and 99.68% for a large depression angle. Besides, the proposed method can achieve satisfactory accuracy even with reduced datasets. Experimental results have shown that our proposed method outperform other state-of-the-art ATR methods. |
11,478 | Please write an abstract with title: Energy Consumption and QoS-Aware Co-Offloading for Vehicular Edge Computing, and key words: Task analysis, Energy consumption, Quality of service, Delays, Computational modeling, Optimization, Edge computing. Abstract: By deploying computing, storage, and bandwidth resources at the user side, vehicular edge computing (VEC) provides low-delay services for vehicle users. However, due to the limited resources of edge servers, how to efficiently meet the Quality-of-Service (QoS) requirements of multiple tasks and save the total energy consumption in a dynamic environment is an important issue in VEC. In this article, we first propose an energy consumption and QoS-aware co-offloading model. Unlike most previous studies, our goal is to minimize the total energy consumption while guaranteeing the QoS constraints of tasks, thus avoiding the overallocation of resources and high energy consumption caused by the one-sided pursuit of delay minimization. Then, without the requirements for domain experts, we propose Bayesian optimization-based computation offloading (BOCO) method to find the optimal offloading decision. To the best of our knowledge, this work is the first to apply Bayesian optimization to computation offloading in VEC. Furthermore, we conduct a series of experiments and comparisons with other offloading methods to analyze the effectiveness and performance of the proposed algorithm. Experimental results verify that our proposed BOCO outperforms counterparts. |
11,479 | Please write an abstract with title: A new method for eye location tracking, and key words: Coils, Transmitters, Magnetic sensors, Sensor systems, Magnetic heads, Couplings, Voltage, Robots, Magnetic field measurement, Bandwidth. Abstract: A standard scleral search coil (SSC) system is supplied with a single three-axial transmitter (or with a triad of transmitters) and the direct magnetic coupling between the transmitting coils and the SSC is used for computing the eye location. The SSC's orientation components measured by the SSC system are involved in the location-tracking algorithm as well. The suggested method differs from traditional ones where the eye location is computed indirectly, relative to the measured location and orientation of a transitional three-axial magnetic sensor attached to the subject's head. The new method eliminates systematic errors caused by inaccurate situating the transitional sensor relative to the eye. It also eliminates systematic errors caused by imperfect orthogonality of the transitional sensor. It is found that an accurate location tracking with a single transmitter is possible only if orientation freedom of the eye is limited. To track the eye location with no orientation limitations, a triad of transmitters is employed. The resulting accuracy can be as good as /spl plusmn/1 mm (in a 200-Hz bandwidth) over a relatively large (0.5/spl times/0.5/spl times/0.5 m) operating region in the center of a 1/spl times/1/spl times/1 m SSC system. The analytical results obtained are confirmed with the help of computer simulations. |
11,480 | Please write an abstract with title: A study on cyclist behavior at signalized intersections, and key words: Bicycles, Traffic control, Automobiles, Microscopy, Vehicles, Cameras, Intelligent transportation systems, Statistical analysis, Signal analysis, Cities and towns. Abstract: A study on the cyclist behavior at a signal-controlled intersection was conducted to determine the behavioral characteristics representative. The study focused on the cyclists' behavior at signalized intersections, including the crossing speeds, crossing gap/lag acceptance behavior, and group-riding behavior. Traffic data were collected by using video cameras from a wide and complex signalized intersection. The statistical analysis of data was conducted to determine the characteristics of bicycle traffic crossing speeds, gap/lag acceptance, and group riding. Interesting group behavior of cyclists at a signal-controlled intersection was discovered and analyzed. The results are useful for understanding the performance of mixed traffic at signalized intersections and building microscopic simulation models. |
11,481 | Please write an abstract with title: The Thermoelectric Properties of Nanostructured SiGe Phosphorus Doped by Spark Plasma Sintering, and key words: Thermoelectric materials, Powders, Annealing, Temperature, Doping, Solids, Phosphorus. Abstract: A new method for obtaining a nanostructured thermoelectric solid solution of silicon-germanium n-type using spark plasma sintering of powders is described. The novelty of the work lies in the use of a silicon phosphide compound as a doping source. Methods for measuring thermoelectric characteristics of the structures under study are described. The influence of the sintering rate on the final thermoelectric characteristics of the sintered material is revealed. The effect of high-temperature annealing on the thermoelectric properties of structures is discussed. It is shown that the described method of forming a thermoelectric material makes it possible to achieve the value of thermoelectric parameters comparable with world analogues. |
11,482 | Please write an abstract with title: Longitudinally Magnetized Ferrite Phase Shifters Using a Reduced Height Rectangular Waveguide, and key words: Ferrites, Phase shifters, Rectangular waveguides, Electromagnetic waveguides, Waveguide components, Slabs, Waveguide theory, Magnetic materials, Insertion loss, Saturation magnetization. Abstract: A new reciprocal ferrite phase-shifter in 4 millimeter wavelength is described. This electronically controlled phaser uses a reduced height rectangular waveguide and the ferrite material is longitudinally magnetized. A theoretical approach of the problem from the coupled-mode formalism is elaborated. The first performances of a 90/spl deg/ phaser element at 70 GHz are obtained with 1.5 db maximum insertion loss and a VSWR < 1.5. That corresponds to a figure of merit equal to 60 deg/db. The measured characteristics of the phaser show good agreement with computational values. |
11,483 | Please write an abstract with title: Evolution of Engineering Education Research in Portugal and Spain: a scientometric study, and key words: Engineering profession, Bibliometrics, Market research, Engineering education. Abstract: This paper contributes to the growing body of work that analyses the growth of engineering education research (EER) as a global field of inquiry. It uses a computer-aided process to compare the evolution of EER in Portugal and Spain. This is achieved by extracting the names of the Portuguese and Spanish authors that published in a sample of 12 different journals in the years 2018 and 2019 and then carrying out a computer-curated scientometric analysis of their complete publishing careers in both specialised engineering fields and in EER. For a sample of 50 Portuguese and 285 Spanish authors we present data taken from 14,121 publications that allow us to show the percentage of their publications that are educationally focused and how this in turn impacts their h-index. We also calculate how early in their career they published their first educational paper. Differences between researchers active in the field of EER from Portugal and Spain are identified, the most notable being the tendency for a large number of Spanish authors to publish in specific EER journals and we suggest possible explanations for the findings. |
11,484 | Please write an abstract with title: Real-time change detection for surveillance in public transportation, and key words: Transportation, Lighting, Statistics, Layout, Brightness, Statistical analysis, Event detection, Video surveillance, Change detection algorithms, Fluctuations. Abstract: The efficiency of event detection in video surveillance applications depends on the performance of the early stage of content change detection. However, this stage encounters difficulties deriving from the presence of noise in image acquisition devices. Furthermore, illumination variations in the surveyed scene tend to cause degradation in change detection results. This paper introduces a real-time statistic change detection technique which employs a block-based clustering procedure for the estimation of the noise model. The method is applied in conjunction with a brightness normalization stage for the suppression of ambient illumination variations. Additionally, an adaptation of the technique for real-time surveillance of subway environments is proposed. |
11,485 | Please write an abstract with title: Multiplexer restructuring for FPGA implementation cost reduction, and key words: Multiplexing, Field programmable gate arrays, Hardware design languages, Logic gates, Table lookup, Design optimization, Network synthesis, Permission, Cost function, Logic design. Abstract: This paper presents a novel synthesis algorithm that reduces the area needed for implementing multiplexers on an FPGA by an average of 18%. This is achieved by reducing the number of lookup tables (LUTs) needed to implement multiplexers. The algorithm relies on reimplementing 2:1 multiplexer trees using efficient 4:1 multiplexers. The key to the algorithm's performance lies in exploiting the observation that most multiplexers occur in busses. New optimizations are employed which pay a small cost in logic that is shared across the bus to achieve a reduction in the logic required for every bit of the bus. |
11,486 | Please write an abstract with title: Frequency Doubler Gate Drive Circuit Suitable for High-Frequency Applications, and key words: Logic gates, RLC circuits, Integrated circuits, Switching circuits, Resonant frequency, MOSFET, Drives. Abstract: In megahertz (MHz) power converters, the gate drive loss becomes one of the main issues that should be addressed. In the relevant literature, several gate drive circuits had been proposed to reduce the gate drive losses. A literature survey is provided in the introduction section to summarize the merits and demerits of each circuit. These studies proposed innovative methods to reduce gate drive loss. Nonetheless, they did not propose any solution to reduce the loss of the buffer stage inside the drive IC. In this article, we present a frequency doubler gate drive circuit. The proposed gate drive circuit can double the frequency of the input PWM signal at the driver output stage, using the second harmonic of the input signal. Therefore, the loss of the buffer stage inside the drive IC can be significantly reduced, compared with the hard-switching, the inductive resonant, and multiresonant gate drive circuits. This article focuses on designing, simulating, and experimentally validating the frequency doubler gate drive circuit with a 6.78-MHz input frequency and 13.56-MHz driving frequency. The concept of a frequency tripler gate drive circuit is also introduced and discussed. For instance, the frequency tripler gate drive circuit can triple the frequency of the input PWM signal at the driver output stage using the third harmonic; in this scenario, a 20.34-MHz driving frequency can be obtained. The proposed frequency doubler gate drive circuit is experimentally tested in a 13.56-MHz class E inverter. |
11,487 | Please write an abstract with title: Bistability and Mode Switching in Microdisk Photonic Molecules, and key words: Absorption, Laser modes, Wet etching, Position measurement, Nonlinear equations, Microcavities, Temperature, Bonding, Charge carrier density, Charge carrier lifetime. Abstract: The bistability and mode switching were observed in microdisk photonic molecule lasers with a low threshold of < 100 μW. They are well explained by the rate equation analysis including saturable absorption and nonlinear gain. |
11,488 | Please write an abstract with title: An InP based monolithic FM laser, and key words: Indium phosphide, Semiconductor lasers, Laser mode locking, Quantum cascade lasers, Fiber lasers, Frequency modulation, Optical modulation, Optical ring resonators, Laser stability, Optical interferometry. Abstract: We report the first demonstration of a monolithic optical frequency comb generator using quaternary/quaternary multiple quantum well InP/InGaAsP phase modulator. A line spacing of 26 GHz and a comb width of 2 THz were obtained. |
11,489 | Please write an abstract with title: Using semi-implicit representation of algebraic surfaces, and key words: Gold, Polynomials, Solid modeling, Equations, Shape, Active contours, Level set, Computational geometry, Design automation, Interpolation. Abstract: We introduced a general representation of algebraic surfaces, that we called semiimplicit, which encapsulates both usual and less known surfaces. Here we specialize this notion in order to apply it in solid modeling: we view a surface in /spl Ropf//sup 3/ as a one-parameter (algebraic) family of algebraic low-degree curves. The paper mainly addresses the topic of performing the usual CAD operations with semiimplicit representation of surfaces. We derive formulae for computing the normal and the curvatures at a regular point. We provide exact algorithms for computing self-intersections of a surface and more generally its singular locus. We also present some surface/surface intersection algorithms relying on generalized resultant calculations. |
11,490 | Please write an abstract with title: API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models, and key words: Analytical models, Privacy, Machine learning, Telecommunication traffic, Feature extraction, Nonhomogeneous media, Ransomware. Abstract: Ransomware is a major malware attack experienced by large corporations and healthcare services. Ransomware employs the idea of cryptovirology, which uses cryptography to design malware. The goal of ransomware is to extort ransom by threatening the victim with the destruction of their data. Ransomware typically involves a 3-step process: analyzing the victim’s network traffic, identifying a vulnerability, and then exploiting it. Thus, the detection of ransomware has become an important undertaking that involves various sophisticated solutions for improving security. To further enhance ransomware detection capabilities, this paper focuses on an Application Programming Interface (API)-based ransomware detection approach in combination with machine learning (ML) techniques. The focus of this research is (i) understanding the life cycle of ransomware on the Windows platform, (ii) dynamic analysis of ransomware samples to extract various features of malicious code patterns, and (iii) developing and validating machine learning-based ransomware detection models on different ransomware and benign samples. Data were collected from publicly available repositories and subjected to sandbox analysis for sampling. The sampled datasets were applied to build machine learning models. The grid search hyperparameter optimization algorithm was employed to obtain the best fit model; the results were cross-validated with the testing datasets. This analysis yielded a high ransomware detection accuracy of 99.18% for Windows-based platforms and shows the potential for achieving high-accuracy ransomware detection capabilities when using a combination of API calls and an ML model. This approach can be further utilized with existing multilayer security solutions to protect critical data from ransomware attacks. |
11,491 | Please write an abstract with title: Evaluation of Linear Component Node Orchestration for IoT Clusters in Smart Grid Communication Networks, and key words: Substations, Voltage, Quality of service, Throughput, Routing protocols, Smart grids, Topology. Abstract: Linear Component node orchestration (LCNO) is a novel paradigm that focuses on the use of smart routing procedures to derive random connectivity among nodes in a Smart grid communication network (SGCN). It eliminates the limitations in distributed communication involving Machine to Machine interactions among edge nodes in the substations. To achieve the aims; first, the edge layer for data stream parameter collection (from both homogenous and heterogeneous sources) is automated. Second, homogeneous linear-like Internet of Things (IoT) clusters are introduced for modular deployment at the distribution network. Third, interface protection monitoring for linear-chain topology in SGCN is deployed. To study the effect of the LCNO for system resilience, a simple routing protocol (SRP) is compared with Power-Efficient Gathering in Sensor Information System (PEGASIS) and Low Energy Adaptive Clustering Hierarchy (LEACH). Quality of service (QoS) results show that SRP is more efficient for monitoring the frequency and voltage parameters. |
11,492 | Please write an abstract with title: High resolution air-coupled ultrasonic imaging of thin materials, and key words: Image resolution, Ultrasonic imaging, Focusing, Materials testing, Capacitance, Ultrasonic transducers, Pulse compression methods, Mirrors, Ultrasonic variables measurement, Performance evaluation. Abstract: This paper describes the use of a focussed air-coupled capacitance transducer combined with pulse compression techniques to form high-resolution images of thin materials in air. The focussing of the device is achieved by using an off-axis parabolic mirror. Initial measurements were performed to determine the lateral resolution of the focussed transducer, which was found to be better than 0.5mm. A combination of the focussed transducer as a source and a planar receiver in through-transmission mode was then used to image thin materials. It will be shown that the technique is able to detect various watermarks embedded in bank notes, high quality writing paper and postage stamps. In addition, measurements of adhesive layers are possible. It will be demonstrated that a high-resolution imaging technique results, which could be used to test a range of thin materials where contact and immersion testing is not possible. |
11,493 | Please write an abstract with title: Linear phase oversampled filter banks, and key words: Channel bank filters, Filter bank, Finite impulse response filter, Image reconstruction, Sampling methods, Nonlinear filters, Matrix decomposition, Prototypes, Bandwidth, Signal sampling. Abstract: This paper introduces a factorization for the design of oversampled filter banks with linear phase and complex-valued coefficients. Our approach is based on the design of rectangular paraunitary polyphase matrices and gives a general formulation for perfect reconstruction filter banks with uniform sampling in the subbands, critically sampled or oversampled, and linear phase filters with real- or complex-valued coefficients. By using a framework that is not restricted to modulation of a prototype window, as in oversampled modulated filter banks, we are able to increase the design freedom and to allow the design of non uniform bandwidth oversampled filter banks. |
11,494 | Please write an abstract with title: The effects of speed variations on transient stability - simulation study and mechanism analysis, and key words: Transient analysis, Stability analysis, Analytical models, Power system transients, Power system simulation, Power system stability, Power system modeling, Power system dynamics, Power system security, Power system analysis computing. Abstract: Transient stability simulation is an important aspect of dynamic security assessment (DSA) in power systems. In the deregulated environment, simulation results are more sensitive to models and parameters. In this paper, based on many simulation cases, the effects of neglecting speed instantaneous changes in generator modeling on transient stability are discussed. Based on extended equal area criterion (EEAC), a method is provided to analyse the mechanism of the influences. Numerical simulation results have proved the method's validity. Based on digital simulation and theory analysis, suggestions on choosing appropriate simplifications of speed variations in transient stability calculations are given. |
11,495 | Please write an abstract with title: Double scroll via a two-transistor circuit, and key words: Finite impulse response filter, Operational amplifiers, Shift registers, Integrated circuit noise, Noise level, Signal to noise ratio, Application specific integrated circuits, CMOS integrated circuits, Filtering, Signal sampling. Abstract: The double scroll attractor has been experimentally observed from an extremely simple circuit using an op amp. The purpose of this brief note is to give an alternate realization of the circuit using only two transistors as the active elements. |
11,496 | Please write an abstract with title: Joint Crypto-Blockchain Scheme for Trust-Enabled CCTV Videos Sharing, and key words: Privacy, Pandemics, Law, Distributed ledger, Conferences, Metadata, Market research. Abstract: The declaration of COVID-19 as pandemic affected almost all public and private functionaries by enforcing them to operate remotely, and the judiciary is no exception. The trend seems to continue for the foreseeable future. The judicial proceedings where a piece of evidence, particularly the digital one, holds undisputed importance. Its preservation and intact transmission to the jury have gained an enhanced significance in this era which is highly susceptible to manipulation. This research proposes joint encryption and blockchain-based solution for immutable decentralised evidence management for CCTV footage. The permissioned chain of evidence system is implemented using Hyperledger Fabric to ensure the validity of the video metadata. The hash values are calculated on videos (recorded per session) and stored in the blockchain, while Region of Interest (ROI) based selective encryption of videos adds optimized security to individuals' privacy and protects from illegal access of stored videos. The experimental results provide a proof of concept that the proposed scheme facilitates the remote court services by maintaining a legal chain of evidence for CCTV videos. |
11,497 | Please write an abstract with title: Developing Computing Competencies Without Restrictions, and key words: Python, Programming profession, Codes, Internet, Syntactics, Software algorithms, Operating systems, Online learning. Abstract: The information society represents a great revolution. Computing programming is a relevant competence nowadays for everybody, regardless of educational background. However, traditional programming languages consider syntax barriers that complicate their adoption and usefulness for beginners. Python is an exception for its open-source, cross-platform nature and syntax simplicity, which facilitate the development of algorithmic thinking and dissemination of programming solutions. Several Python extensions support modern functionalities such as web development, videogame, and machine learning, making it one of the most used programming languages. Google Colab or Colaboratory facilitates the online learning and development of Python solutions. This article presents positive academic experiences of Chilean students of majors from two Chilean universities, a traditional university in the north and a private university in the middle of Chile, using Google Colab to develop programming competencies remotely for the Covid pandemic. We highlight the promising results obtained for basic programming and operating system programming subjects, which motivate us to use Python and Google Colab widely, not only in university contexts. We expect to continue developing programming competencies using Google Colab and Python. The main limitation encountered in this experience is the internet connection requirements for online education. However, it does not represent an issue for education in developing and developed countries. Google Colab permits the development of highly demanded competencies worldwide at home, only with internet access and a web browse, an excellent motivation for learning for all students regardless of age and academic level. |
11,498 | Please write an abstract with title: Underwater Soft Robot Modeling and Control With Differentiable Simulation, and key words: Soft robotics, Computational modeling, Robots, Analytical models, Pipelines, Data models, Mathematical model. Abstract: Underwater soft robots are challenging to model and control because of their high degrees of freedom and their intricate coupling with water. In this letter, we present a method that leverages the recent development in differentiable simulation coupled with a differentiable, analytical hydrodynamic model to assist with the modeling and control of an underwater soft robot. We apply this method to Starfish, a customized soft robot design that is easy to fabricate and intuitive to manipulate. Our method starts with data obtained from the real robot and alternates between simulation and experiments. Specifically, the simulation step uses gradients from a differentiable simulator to run system identification and trajectory optimization, and the experiment step executes the optimized trajectory on the robot to collect new data to be fed into simulation. Our demonstration on Starfish shows that proper usage of gradients from a differentiable simulator not only narrows down its simulation-to-reality gap but also improves the performance of an open-loop controller in real experiments. |
11,499 | Please write an abstract with title: A Bernoulli Track-Before-Detect Filter for Interacting Targets in Maritime Radar, and key words: Radar tracking, Target tracking, Sea measurements, Radio frequency, Clutter, Radar, Noise measurement. Abstract: This article is devoted to the problem of multitarget tracking in the maritime environment using Bernoulli track-before-detect (TBD) filtering. Detection and tracking of weak targets in sea clutter using high-resolution airborne radar is notoriously challenging compared to classical target tracking problems. Furthermore, the measured amplitude in range-azimuth cells that are in the vicinity of closely spaced (interacting) targets represents a superposition of individual target contributions, demanding a special joint treatment. This article proposes a novel solution for multitarget tracking using Bernoulli TBD for maritime radar and covers cases when targets are both far apart and closely spaced. Comparisons with existing TBD algorithms are used to verify the efficacy of the proposed Bernoulli TBD algorithm with realistic sea clutter simulations used to create challenging scenarios with variable target strengths. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.