ID int64 0 400k | content stringlengths 97 5.85k |
|---|---|
12,800 | Please write an abstract with title: A New Benchmark Dataset for Indonesian Traditional Woven Fabric Image Recognition and Image Retrieval, and key words: Image recognition, Transfer learning, Knowledge based systems, Image retrieval, Benchmark testing, Feature extraction, Fabrics. Abstract: This study aims to develop the TenunIkatNet dataset as one of the benchmarks for image recognition and retrieval problems, especially in Indonesian traditional fabrics. These are due to the present absence of the dataset for traditional fibers, especially the tenun ikat (woven) fabrics of East Nusa Tenggara (ENT). The TenunIkatNet dataset contains 120 types of fabric each being captured 40 times, leading to the collection of 4,800 original images at traditional shops and craftsmen. These shooting variations are often internally and externally carried out within the mini-studio box and another fabric background, before being hanged, and worn on the body. In this condition, the utilized Nikon D5600 camera produced 24 megapixels of RGB (red, green, blue) images, with the pre-processing and visual procedural application obtaining a 256x256 display according to the input feature extraction method. Furthermore, the data augmentation processes such as flipping, random rotating, zooming, and shear range, increased the number of images, with each type of tenun ikat fabric being randomly augmented by two images. This led to the production of 9,600 images based on the number of training datasets. Despite this, the testing and validation data were 960 images each. The TenunIkatNet dataset is expected to develop image recognition, classification, and retrieval algorithms, while also being useful for the preservation of local culture, as a knowledge base in the fields of education, crafts, and trade. In this report, two pre-trained Convolution Neural Network (CNN) methods with a transfer learning procedure, namely ResNet101 and DenseNet201. The results showed that the retrieval accuracy of two pre-trained models is 100% in the top-1. While the retrieval accuracy of DenseNet201 outperformed the ResNet101 method in the top-5 at 44.75% and 44.38%, respectively. Subsequently, the method had higher retrieval accuracy than ResNet101, although the query time was slower. |
12,801 | Please write an abstract with title: Differentiable Appearance Acquisition from a Flash/No-flash RGB-D Pair, and key words: Photography, Geometry, Three-dimensional displays, Lighting, Estimation, Rendering (computer graphics), Solids, Cameras, Optimization, Augmented reality. Abstract: Reconstructing 3D objects in natural environments requires solving the ill-posed problem of geometry, spatially-varying material, and lighting estimation. As such, many approaches impractically constrain to a dark environment, use controlled lighting rigs, or use few handheld captures but suffer reduced quality. We develop a method that uses just two smartphone exposures captured in ambient lighting to reconstruct appearance more accurately and practically than baseline methods. Our insight is that we can use a flash/no-flash RGB-D pair to pose an inverse rendering problem using point lighting. This allows efficient differentiable rendering to optimize depth and normals from a good initialization and so also the simultaneous optimization of diffuse environment illumination and SVBRDF material. We find that this reduces diffuse albedo error by 25%, specular error by 46%, and normal error by 30% against single-and paired-image baselines that use learning-based techniques. Given that our approach is practical for everyday solid objects, we enable photorealistic relighting for mobile photography and easier content creation for augmented reality. |
12,802 | Please write an abstract with title: Maximum Power Point Tracking Techniques Based on M5P Indirect Control of Doubly Fed Induction Generator for Wind Energy Systems, and key words: Wind energy generation, Machine learning algorithms, Wind energy, Wind speed, Heuristic algorithms, Computational modeling, Velocity control. Abstract: This study introduces M5P a control method to excerpt maximum capacity by wind power. Two methods of Utmost potency point tracking, is examined in detailed (with or without speed control). A regression model tree algorithm based on M5P fuzzy logic has been inserted into indirect control doubly fed induction generator. An integrated M5P machine learning algorithm to overcome the classic dynamic disadvantages of traditional controllers and to reduce the computational complexity, thereby improving the dynamics and robustness of the doubly fed induction generator while ensuring optimal operation of the wind turbine. Finally, the modeling and global control of the 2MW is achieved for the two operating modes hypo- and hyper-synchronous. The results obtained showed that they could have an optimal active power supplied to the electrical network regardless of the operating mode of the generator. |
12,803 | Please write an abstract with title: Classification of skin diseases based on improved MobileNetV2, and key words: Performance evaluation, Image recognition, Neural networks, Skin, Mobile handsets, Complexity theory, Lesions. Abstract: In order to realize the classification research of skin diseases on portable devices, the neural network model can be better applied to embedded and mobile devices. This article explores the impact of ECA module on the model complexity and accuracy. By embedding ECA module into the MobileNetV2 model, the accuracy of the model is significantly improved without increasing the complexity of the model. Due to the complex network structure of neural network, it has a high requirement on hardware equipment and has a great amount of calculation, which cannot be run on mobile and embedded devices, and cannot deal with the problem of portable identification of skin lesion images on mobile devices. In this article, a deep learning model based on improved MobileNetV2 is proposed, which has higher accuracy and faster recognition rate, and can realize the classification and recognition of skin lesion images on portable devices. By comparing with the current advanced network model, it is verified that this model can improve the network performance without increasing the complexity of the model and at the same time improving the recognition rate. |
12,804 | Please write an abstract with title: On Refactoring Quantum Programs in Q#, and key words: Quantum programming, refactoring, software maintenance and evolution, Q# language. Abstract: Refactoring is the process of restructuring existing computer code without changing its external behavior. Refactoring aims to improve the design, structure, and implementation of software while preserving its functionality. While classical programs have benefited from various refactoring methods, the field of quantum programming lacks dedicated refactoring techniques. This paper bridges this gap by presenting a preliminary catalog of refactorings designed for quantum programs in Q#. The paper also highlights the importance of tool support in automating the refactoring process for quantum programs. |
12,805 | Please write an abstract with title: A Virtual Classroom for Special Need Students, and key words: Electronic learning, Navigation, Operating systems, Mobile communication, Market research, Software, Software reliability. Abstract: Virtual Learning Environments (VLE) are online platforms which are used for teaching and learning. There are many VLEs available for the students in the market that are helpful for them to study and learn online. These VLEs make use of latest technologies and features like accessing the course material, submitting the assignments, attending live lectures, viewing recorded lectures etc. Unfortunately, for Visually Impaired (VI) students these environments do not possess alternative features like voice feedback and voice commands that would help them operate the application, disabling VIs to make benefit from such applications. So, to eradicate this gap this paper proposes a solution that provides enhancements to accessibility issues, content and navigation that confront the visually impaired, in its implemented mobile-based application. The solution proposed is expected to assist the VIs and contribute to the society. Only the key features for assisting the VIs are presented in this paper. The system implemented different modules for class management and accessibility. It provides text-to-speech integration and voice command controls. |
12,806 | Please write an abstract with title: Arc-Flash Incident Energy Analysis: Renewal Recommendations, and key words: Arc discharges, Fires, Personnel, Analytical models, Software packages, Hazards, Circuit breakers, Power distribution, Electrical safety. Abstract: Generally accepted industry standards, such as National Fire Protection Association (NFPA) 70E-2018, require arc-flash incident energy analysis to be updated when changes occur in the electrical power distribution system, and the analysis shall be reviewed for accuracy at least every five years. NFPA 70E also requires the data used for creating equipment labels, which contain arc-flash energy information, to be reviewed at least every five years, and, if the review identifies a change that renders the arc-flash energy label inaccurate, the equipment label must be updated. |
12,807 | Please write an abstract with title: Radio Map Assisted Path Planning for UAV Anti-Jamming Communications, and key words: Interference, Signal to noise ratio, Autonomous aerial vehicles, Path planning, Jamming, Signal processing algorithms, Base stations. Abstract: The communications quality of unmanned aerial vehicle (UAV) has been brought into focus increasingly, which can be severely affected by other users, as well as complex topography. In this letter, we propose a path planning algorithm for UAV anti-jamming communications with the joint assistance of two kinds of radio maps—signal power map and signal to interference plus noise ratio (SINR) map, which contain the abundant information of path loss caused by the topography and interference from jammers. We show how to generate these maps from real topographic data, and provide the optimal UAV path planning by adopting the power and the SNR maps to the heuristic and graphic based A* algorithm. Simulations with various settings for areas with complex topography in real world, show that the proposed algorithm can considerably improve the efficiency by minimizing the UAV flying distance for anti-jamming communications. |
12,808 | Please write an abstract with title: Identification of polymer materials in electronic packages including counterfeit prevention, and key words: Principal component analysis, Chemicals, Material properties, Spectroscopy, Nuclear magnetic resonance, Thermal stresses, Fingerprint recognition. Abstract: Epoxy-based underfill materials are widely used in microelectronic packaging to reduce coefficient of thermal expansion (CTE) mismatch between the organic substrate and the silicon chip and thermal stresses on the solder joints. The lack of information about the underfill material type together with its material properties can be a real hindrance to researchers when they deal with simulations involved with various underfills. Therefore, getting the correct material properties of underfill materials can enhance the reliability of simulation results to achieve the optimal solution, which significantly reduces experiment costs and time. A novel identification method for cured underfill materials from assembled packages is presented in this paper. Because the underfill materials are tiny size, insoluble in organic solvent and hard to harvest issues, the Fourier-transform infrared spectroscopy microscope Attenuated total reflectance (FT-IR Microscope ATR) have been proposed as a proper method to detect the underfill materials from assembled package. The fingerprint region of each material spectrum is chosen to apply the chemometrics to build the discriminant models. The soft independent modeling of class analogy (SIMCA) method is used to create a classification model that exhibits a high discrimination power ratio. By increasing the number of training sets and the confidence limit, the SIMCA model showed almost 100% accuracy on identification of UF1230, EP1641, SMT88U, and SMC-375TGSF5, which indicates its superior ability to discriminate underfill material with low risk of misclassification. In this study, the method of collecting dispensed or cured underfill material data from assembled packages is also presented. |
12,809 | Please write an abstract with title: Digitalization and Civic Engagement for the Environment: New Trends, and key words: Social networking (online), Blogs, Market research, Internet, Video on demand, Oils, Pipelines. Abstract: The widespread digitalization of civilization has led to many changes in the participation and involvement of social actors in civil society. Citizen environmental initiatives have often emerged on an individual basis through different digital photo and video sharing platforms – for example, on Fotolia, Flickr, Dailymotion and YouTube – within blogs and digital social networks. This chapter proposes the basis of exploratory empirical research, an overview of the reality of digital engagement in Quebec for the environment. Online collectives open up new spaces for “ordinary” citizens who want to get involved and express their support for an environmental cause. Facebook is by far the platform with the largest number of citizen groups in the environmental field. Emblematic digital spaces, including Facebook, thereby constitute a laboratory for networking among citizens about connected collective action and a place for the emergence of a collective “we” around environmental issues. |
12,810 | Please write an abstract with title: Rank Based Moth Flame optimisation for Feature Selection in the Medical Application, and key words: Optimization, Fires, Spirals, Search problems, Medical services, Biomedical equipment, Data mining. Abstract: Feature selection (FS) is a challenging data mining problem that incorporates a complex search process to find the most informative feature subset. In the brute force methods generating the entire feature space and applying an exhaustive search makes the FS NP-hard problem. Meta-heuristic algorithms are good alternative solutions that provide (near) optimal solutions through a random search process instead of a complete search. In this paper, an FS approach based on the Moth Flame optimization algorithm (MFO) and k-NN classifier are proposed. MFO is a recent meta-heuristic algorithm that has proved its effectiveness in solving different complex problems in a reasonable time. Nevertheless, the performance of MFO highly depends on achieving a balance between exploration and exploitation during the search process. To address this issue, we propose an adaptive method to update the position of a moth toward the best global solution based on the search status. The proposed MFO has been evaluated using sixteen benchmark medical data sets and the results show promising performance of the modified MFO algorithm in terms of the applied evaluation measures. |
12,811 | Please write an abstract with title: Mental Health Evaluation of College Students Based on Similar Trajectory Clustering Algorithm, and key words: Training, Mechatronics, Clustering algorithms, Mental health, Gain measurement, Prediction algorithms, Trajectory. Abstract: In order to improve the accuracy of college students' mental health evaluation method, this paper proposes a method of college students' mental health evaluation based on similar trajectory clustering algorithm. Similar trajectory clustering algorithm is used to mine the psychological data of college students, build the evaluation model of college students' mental health, and extract the rules of college students' mental health evaluation. The experimental results show that the similar trajectory clustering algorithm can effectively classify the mental health status of college students and improve the accuracy of College Students' mental health evaluation. |
12,812 | Please write an abstract with title: Scene exploration using Bayesian nets, and key words: Layout, Bayesian methods, Image recognition, Image databases, Object oriented modeling, Testing, Pattern recognition, Tires, Marine vehicles, Tiles. Abstract: Exploring scenes using Bayesian nets is based on the idea of performing an active knowledge based search on images unlike conventional visual recognition algorithms. During the active search of images, a sample set of training images from different classes is available right at the onset of an experiment and the nature of the class to be searched is unknown. Usually a recursive search on the images for objects, belonging to all classes is performed using a conventional object recognition system and our approach presented in the present paper can obviate this. The search by Bayesian nets can be confined only to a specific class or a set of classes, provided the relationships between constituent objects are exactly defined. We prove that if structural relationships are rightly established between the constituent objects of an image, searching scenes using Bayesian nets is quite effective and the presented results proclaim this very fact. |
12,813 | Please write an abstract with title: Aggregated Demand Response Scheduling in Competitive Market Considering Load Behavior Through Fuzzy Intelligence, and key words: Load modeling, Generators, Job shop scheduling, Load management, Indexes, Analytical models, Tuning. Abstract: This article presents an integrated and intelligent price based self-scheduling approach for demand response (DR) aggregators in the wholesale market considering load profile attributes of aggregated loads. The load profile attributes namely utilization and availability factors are derived as a function of load type and temporal characteristics of responsive loads. The proposed integrated approach uses the concept of conventional random willingness factors coupled with load profile attributes to resolve the ambiguity around customer/load behavior. The response of the customer to load profile attributes and the willingness factor is formulated using three different models, namely, linear, exponential, and nonlinear models. Further, to consider the nondeterministic and indistinct behavior of the customer, a fuzzy inference system (FIS) is developed to create a relationship between the load profile attributes and willingness to DR participation cost. Further, an online FIS membership function parameter tuning mechanism is developed to improve the performance of DR aggregator as well as overall day ahead market. The proposed approach is simulated for a combined price based scheduling of the generation company and the DR aggregator with responsive loads spread over various load sectors such as industrial, commercial, residential, agricultural, and the municipal sector. The simulation results of the online intelligent-integrated framework are compared to conventional willingness model, nonfuzzy, and untuned FIS models with and without considering load profile and customer willingness factor. The comparison of the same demonstrates the effectiveness of the proposed online framework in improving the overall and DR aggregator surplus over other approaches. |
12,814 | Please write an abstract with title: A Smoke Removal Method Based on Combined Data and Modified U-Net for Endoscopic Images, and key words: Training, Minimally invasive surgery, Real-time systems, Biology. Abstract: In minimally invasive surgery, the ablation of human tissue will produce a lot of smoke, which will interfere with the surgeon’s operation. We propose a smoke removal method based on combined data and modified U-net for endoscopic images. The real dataset and the synthetic dataset are built using a small amount of images with smoke. The real dataset is combined with the synthetic dataset successively. Qualitative evaluation shows that the quality of the output smoke-free image is the best when training using the combined data, compared to using only either the real dataset or the synthetic dataset above. Quantitative evaluation shows that the effect of smoke removal is still the best when training using the combined data in our method.Clinical Relevance—A real-time smoke removal method suitable for endoscopic surgery is proposed to help surgeons get clear images in real time and make the operation go smoothly. |
12,815 | Please write an abstract with title: Secure Offloading of User-level IDS with VM-compatible OS Emulation Layers for Intel SGX, and key words: Cloud computing, Virtual machine monitors, Program processors, Emulation, Memory management, Programming, Virtual machining. Abstract: Since virtual machines (VMs) provided by Infrastructure-as-a-Service clouds often suffer from attacks, they need to be monitored using intrusion detection systems (IDS). For secure execution of host-based IDS (HIDS), IDS offloading is used to run IDS outside target VMs, but offloaded IDS can still be attacked. To address this issue, secure IDS offloading using Intel SGX has been proposed. However, IDS development requires kernel-level programming, which is difficult for most IDS developers. This paper proposes SCwatcher for enabling user-level HIDS running on top of the operating system (OS) to be securely offloaded using VM-compatible OS emulation layers for SGX. SCwatcher provides the standard OS interface used in a target VM to in-enclave IDS. Especially, the virtual proc filesystem called vProcFS analyzes OS data using VM introspection and returns the system information inside the target VM. We have implemented SCwatcher using Xen supporting SGX virtualization and two types of OS emulation layers for SGX called SCONE and Occlum. Then, we confirmed that SCwatcher could offload legacy HIDS and showed that the performance could be comparable to insecure IDS offloading. |
12,816 | Please write an abstract with title: Fast Image Restoration Using A Simplified Matrix-Type Recurrent Neural Network, and key words: Recurrent neural networks, Runtime, Computational modeling, Signal processing algorithms, Optimization methods, Signal processing, Image restoration. Abstract: Recently, a matrix-type recurrent neural network with two-layers structure has been successfully applied for the matrix-variable optimization model of image restoration, since it can effectively strengthen the computation speed of vector-variable optimization methods. This paper employs a simplified matrix-type neural network with one-layer structure to further improve the computational performance. First, a matrix-variable regularization optimization model is considered for image detail perseveration. Then a simplified matrix-type neural network is introduced for fast dealing with matrix-variable regularization optimization model. Finally, illustrative examples show that the simplified matrix-type recurrent neural network-based algorithm is more effective than the existing matrix-type neural network with two-layers structures in terms of computational performance, and has faster speed than the vector-type neural networks. |
12,817 | Please write an abstract with title: Texture classification model based on temporal changes in vibration using wavelet transform, and key words: Vibrations, Wavelet transforms, Time-frequency analysis, Training data, Tactile sensors, Vibration measurement, Strain measurement. Abstract: Tactile sensation is important in the perception of the external world, and research on texture classification using vibration data obtained by tracing an object has been widely conducted. However, few studies have utilized time-varying frequency components, which are thought to be recognized by moving their fingers back and forth when they feel tactile sensations. Therefore, we propose a new texture classification system that uses the time variation of vibration with which a latent vector effective in perceiving tactile sensations is possibly embedded. Vibration data was acquired by reciprocating the developed sensor with strain gauges and PVDF film on fifteen different samples. The wavelet transform of the vibration data was conducted to extract a scalogram containing time-varying information. A CNN was constructed to perform texture classification based on the scalograms, resulting in an accurate classification. The results also showed the robustness of the model regarding the vibration information against the different touch condition. |
12,818 | Please write an abstract with title: Artificial-line-division distributed ICs with 0.1-/spl mu/m-gate-length GaAs MESFET and three-dimensional transmission lines, and key words: Gallium arsenide, MESFET integrated circuits, Baseband, Frequency, Distributed parameter circuits, Propagation losses, Transmission lines, Impedance, Shape, Bonding. Abstract: 0.1-/spl mu/m-gate-length GaAs MESFET distributed baseband integrated circuits (ICs) that utilize an artificial-line-division technique and three-dimensional transmission lines are described. The technique reduces return loss of the distributed circuits at high frequencies, and four-layer transmission-line structure reduces parasitic impedance caused by the IC pattern shape and is suitable for the flip-chip bonding module format. A gate-line-division distributed baseband amplifier IC achieved input return loss of less than -13 dB and gain of 11.7 dB in the 0-56 GHz band. A source-line-division distributed level-shift IC achieved output return loss of less than -9.6 dB at high frequencies and insertion loss of 2.7 dB in the 0-79 GHz band. Both results better the performance of all reported GaAs MESFET distributed ICs. |
12,819 | Please write an abstract with title: Mathematical Modeling and Analysis of the Dictionary Attack Mechanism in IoT Malware Mirai, and key words: Analytical models, Dictionaries, Mathematical models, Malware, Risk analysis. Abstract: This paper proposes a model of the dictionary attack mechanism. This is a mathematical model that divides the infection mechanism into two parts, dictionary, and procedure, and considers the number of trials as the time axis. The proposed model revealed the risks and characteristics of dictionary attacks in Mirai. Our analysis result shows that the mechanism cuts its losses against devices that cannot be penetrated by reducing the number of infection attempts to the same device. In addition, it was confirmed that the infection mechanism of Mirai has a trade-off relationship between the number of infections and the success rate of infection. |
12,820 | Please write an abstract with title: A Hybrid Learning Framework for Deep Spiking Neural Networks with One-Spike Temporal Coding, and key words: Training, Visualization, Speech coding, Neuromorphic engineering, Neural networks, Signal processing, Timing. Abstract: Bio-inspired spiking neural networks (SNNs) are compelling candidates for spatio-temporal information processing on ultra-low power neuromorphic computing chips. However, the existing SNN training methods have not fully exploited the temporal information of spikes that plays a critical role in sparse information representation and communication. Hereby, we present a hybrid learning framework for deep SNNs with one-spike temporal coding to make full utilization of the spike timing. We first propose a novel ANN-to-SNN conversion method based on forward propagation mechanisms of ANNs and SNNs to offer a good initialization for SNNs. The performance of the converted SNN is further improved by training with a timing-based backpropagation (BP) method. Experimental results demonstrate that the proposed hybrid learning framework can achieve competitive accuracies on both visual and audio recognition tasks with significantly improved training efficiency over direct SNN BP methods. |
12,821 | Please write an abstract with title: Power system transient stability enhancement by STATCOM with nonlinear control system, and key words: Power system transients, Power system stability, Automatic voltage control, Nonlinear control systems, Voltage control, Power system simulation, Mathematical model, Power transmission lines, System testing, Nonlinear dynamical systems. Abstract: A nonlinear control approach is applied to static synchronous compensator (STATCOM), which is one of the FACTS devices. Here, the nonlinear controller is designed locally based on mathematical models of one of the generators, STATCOM and transmission lines in a multi-machine system. The influence of the proposed controller, which controls the terminal voltage of STATCOM, on the power system stability is tested by digital dynamic simulations. As a result of the simulation, it has been made clear that the STATCOM can improve the transient stability in the 3-machine loop system. In the case of the IEEJ West 10-machine system, the effectiveness is also discussed. |
12,822 | Please write an abstract with title: Investigation of DNA sensing using piezoresistive microcantilever probes, and key words: DNA, Piezoresistance, Probes, Chemical and biological sensors, Biological materials, Biosensors, Immune system, Contact resistance, Gold, Substrates. Abstract: Piezoresistive microcantilever-based sensors maybe used in a variety of sensing applications, including chemical sensing and biological sensing. In these applications, a sensing material is functionalized so as to undergo a volumetric or dimensional change upon analyte exposure. A piezoresistive microcantilever in contact with, or embedded within, the sensing material records the dimensional change as a simple resistance change in the cantilever as it is strained by the volumetric shift in the sensing layer. Here, we describe the detection of single-strand DNA by utilizing a sensing layer material consisting of thiolated single-strand DNA attached to a gold film substrate. A piezoresistive microcantilever in direct contact with this layer in solution immediately responds to the presence of the complimentary (25 base) single strand. |
12,823 | Please write an abstract with title: Application Of Neutrosophic Sets Based On Mobile Network Using Neutrosophic Functions, and key words: Network topology, Decision making, Music, Games, Market research, Mobile handsets, Topology. Abstract: Mobile phones are used widely in our day-to day lives giving us the freedom to communicate anywhere and at anytime. It allows you to connect to other compatible devices, surf the internet, listen to music, play games and capture your precious moments. Latest models are stylish in looks and excellent in terms of usability and functions and help you in your personal and professional lives. The main goal of this paper is to find the methodical approach for decision making problems to select the proper attributes and alternatives for neutrosophic score function, neutrosophic negative score function, Neutrosophic accuracy score function and neutrosophic certainty score function by using topology. Also, we apply these neutrosophic functions in a mobile network problem by using a neutrosophic topological spaces based on attributes and alternatives along with graphical bar representation and find out the results. |
12,824 | Please write an abstract with title: Cascadable Dual-Buck Multilevel Inverter Modules with Autonomous DC Capacitor Voltage Balance, and key words: Equalizers, Microprocessors, Conferences, Capacitors, Pulse width modulation, Multilevel inverters, Active filters. Abstract: Traditional full-bridge inverter architecture is simple and can be easily connected to the grid. However, the bridge architecture has problems such as shoot-through current, severe voltage slew rate, and large filter volume. In order to improve the above shortcomings, this paper proposes a dual-buck multilevel inverter module, which adopts a power transistor and a diode to form a switching arm to prevent the shoot-through current problem. The use of the multilevel scheme can reduce the step size of the PWM voltage and is beneficial to lessen the voltage slew rate and downsize the filter volume. In addition, to simplify the system complexity, this paper proposes an autonomous input capacitor and clamping capacitor balance control, so that the microprocessors between the modules do not need to communicate with each other. The experimental results verify the feasibility and effectiveness of the proposed cascadable dual-buck multilevel inverter module for high-voltage applications. |
12,825 | Please write an abstract with title: Optically pumped liquid oxygen jet waveguides for production of singlet delta oxygen, and key words: Liquid waveguides, Optical waveguides, Optical pumping, Production, Laser excitation, Optical planar waveguides, Planar waveguides, Fiber lasers, Pump lasers, Waveguide lasers. Abstract: Thin, flat, stable liquid oxygen jets have been created for use as optical indexed planar waveguides. These waveguides are pumped at 1067 nm with 100 W Yb fiber lasers producing number densities /spl sim/6.5/spl times/10/sup 20/#/cm/sup 3/ for /spl sim/75 MW/cm/sup 2/ pump intensities. |
12,826 | Please write an abstract with title: Effect of Criteria Range on the Similarity of Results in the COMET Method, and key words: Comets, Correlation coefficient, Computer science, Correlation, Decision making. Abstract: Defining input values in the decision-making process can be done with appropriate methods or based on expert knowledge. It is essential to ensure that the values are adequate for the problem to be solved in both cases. There may be situations where values are overestimated, and it should be checked whether this affects the final results.In this paper, the Characteristic Objects Method (COMET) was used to investigate the overestimation effect on the final rankings. The decision matrixes with a different number of alternatives and criteria were assessed The obtained results were compared using the WS similarity coefficient and Spearman’s weighted correlation coefficient. The study showed that overestimation has a significant effect on the rankings. A larger number of criteria has a positive effect on the correlation strength of the compared rankings. In contrast, a large overestimation of characteristic values has a negative effect on the similarity of the results. |
12,827 | Please write an abstract with title: A spectral efficiency comparison of UMTS-FDD and 1xRTT cdma2000 for voice services, and key words: 3G mobile communication, Speech, Downlink, Power control, Power system modeling, Interleaved codes, Lakes, Cellular networks, Telecommunication traffic, Traffic control. Abstract: Third-generation (3G) cellular technologies are designed to carry more traffic than their second-generation (2G) predecessors. Spectral efficiency for voice services is compared between two competing technologies by simulation of their physical layer wireless transmission under IMT-2000 channel conditions. Assuming 25% of mobiles at 3 km/hr, 37.5% at 30 km/hr, and 37.5% at 100 km/hr, UMTS 12.2 kb/s AMR speech with spreading factor 128 is 0.78 dB more spectrally efficient than 8.6 kb/s 1xRTT RC4 (radio configuration 4) speech. UMTS 10.2 kb/s with spreading factor 128 is 0.6 dB more efficient, while UMTS 7.95 kb/s AMR speech with spreading factor 256 is 0.72 dB less efficient, than RC4. 1xRTT 8.6 kb/s RC3 speech is 0.98 dB more efficient than RC4. These calculations assume sufficient OVSF (orthogonal variable spreading factor)/Walsh codes exist in the system. Thus, efficiency is based on power utilization rather than code depletion. |
12,828 | Please write an abstract with title: Content-based image retrieval using both positive and negative feedback, and key words: Image retrieval, Content based retrieval, Bridges, Proposals, Negative feedback, Scattering, Stability, MPEG 7 Standard, Guidelines, Humans. Abstract: Satisfactory content-based search has long been considered a difficult task. One critical step in the content-based search is to estimate the user intention (perception) based on the query images. Our proposal is developed based on the combined weighted low-level image features. One distinct concept of our algorithm is that a sparse (scattered) feature is considered to be less important (which is not necessarily perceptually dissimilar). The other concept is that we define the image feature stability and include it in calculating the similarity measure. Yet, the third concept is using negative feedback as a pruning criterion to improve searching accuracy. Finally, quantitative simulation results are used to show the effectiveness of these concepts. |
12,829 | Please write an abstract with title: SweepCam — Depth-Aware Lensless Imaging Using Programmable Masks, and key words: Image reconstruction, Cameras, Image resolution, Semiconductor device measurement, Inverse problems, Convolution. Abstract: Lensless cameras, while extremely useful for imaging in constrained scenarios, struggle with resolving scenes with large depth variations. To resolve this, we propose imaging with a set of mask patterns displayed on a programmable mask, and introduce a computational focusing operator that helps to resolve the depth of scene points. As a result, the proposed imager can resolve dense scenes with large depth variations, allowing for more practical applications of lensless cameras. We also present a fast reconstruction algorithm for scene at multiple depths that reduces reconstruction time by two orders of magnitude. Finally, we build a prototype to show the proposed method improves both image quality and depth resolution of lensless cameras. |
12,830 | Please write an abstract with title: Distributionally Robust Deviation Flow Refueling Location for Electric Vehicle Swapping Stations, and key words: Robustness, Batteries, Numerical models, Routing, Vehicles, Programming. Abstract: Battery swapping has been recognized as an effective strategy to reduce charging time and enhance mobility for electric vehicles (EVs). The deployment of EV battery swapping stations (BSSs) is critical to provide effective battery swapping service and thus promote EV adoption. This paper proposes a distributionally robust deviation flow refueling location (DR-DFRL) model considering both uncertain EV traffic flow and driver routing choice behavior. Specially, the EV traffic flow is unknown at the planning stage, and characterized by a distributional set based on mean-covariance information. For given location decisions, drivers may have to deviate from their shortest paths to travel to available swapping stations, which also influence the captured EV traffic flow. We show that the DR-DFRL model can be equivalently reformulated into a mixed integer nonlinear optimization problem, and further present an outer approximation algorithm. Numerical experiments over real-world transportation networks are conducted to validate the effectiveness of the proposed model and algorithm, and provide useful managerial insights. |
12,831 | Please write an abstract with title: Which Phonemes Will Distinguish the Different Regions Within the Same Dialect?, and key words: Databases, Information security, Speech recognition, Probabilistic logic, Speaker recognition, Speech synthesis. Abstract: The work of finding which phonemes distinguish the different regions within the same dialect will be of great significance to the improvement the recognition technology, national and information security and dialect protection. To address this issue, this paper investigates the refinement recognition of different regions of the same dialect based on the corpus designed and recorded by CASIA (CASIA Dialect Corpus, CASIA DC) firstly and then finds the distinguishing phonemes by the probabilistic accumulation of phonemes method. Based on i-vector model, the recognition results indicate that the recognition rates of different regions of the same dialect are different from one dialect to another. The recognition rate of the Mandarin dialects is lower than that of other dialects. Through the probabilistic accumulation of phonemes, we find that the phonemes with significant difference can distinguish different regions of the same dialect, which will provide significance for the synthesis and recognition of dialects in the future. |
12,832 | Please write an abstract with title: Optimization design of negative group delay circuits based on improved PSO algorithm, and key words: Pain, Insertion loss, WiMAX, Particle measurements, Loss measurement, Delays, Frequency measurement. Abstract: Based on electromagnetic simulation and catfish particle swarm algorithm, a novel method is proposed to design the negative group delay circuit with defected structures. The optimization is developed to increase the efficiency and the accuracy, which is confirmed by the data before and after optimizations. The measured results show that at the frequencies of 5.7 and 7.0 GHz, the insertion loss values achieve -17dB and -7dB, respectively. |
12,833 | Please write an abstract with title: Hardware-Aware Transformable Architecture Search with Efficient Search Space, and key words: Computer architecture, Hardware, Neural networks, Search problems, Channel estimation, Extraterrestrial measurements. Abstract: While Neural Architecture Search (NAS) discovers the optimal topology structure, Transformable Architecture Search (TAS) aims to search for the best width and depth, which is more challenging due to the larger search space. Since FLOPs is inconsistent with the actual latency, hardware-aware TAS uses the inference latency to evaluate the efficiency. However, most existing work focuses on the search strategy, ignoring the critical role of the search space in affecting the actual efficiency. Motivated by it, we study hardware-aware TAS by considering the search space, to the best of our knowledge, for the first time. We propose a hardware-aware transformable architecture search (HTAS) framework to discover the optimal architecture for different hardware. The core of our method is a novel hardware-aware search space, which provides efficient channel choices for the search strategy to sample efficient architectures. Experiments on CIFAR datasets demonstrate the superiority of HTAS over the state-of-the-art method. |
12,834 | Please write an abstract with title: The impact of local electricity markets on the operation and development of the distribution networks, and key words: Heat pumps, Europe, Distribution networks, Electricity supply industry, Electric vehicles, Smart grids, Faces. Abstract: This paper discusses local electricity markets in relation to the operation of distribution networks. Distribution networks face several challenges, mainly related to the increasing number of generation sources and loads, such as heat pumps and electric vehicles that have been connected recently. The evolving local electricity market, where the traded commodity is not necessarily the energy itself, can have a major impact on the distribution network. Coupled with the smart grid solutions, the local electricity market can provide an alternative to costly network upgrades. An important aspect of local electricity markets is the interaction between the market and the network operator. To exchange information related to the network conditions Traffic Light System can be use. The impact of flexible devices that can participate in the local electricity market are illustrated for the case of Luče, Slovenia, where the establishment of local flexibility market, aiming to enable fair distribution of limited network capacities is under development as part of the X-FLEX project. |
12,835 | Please write an abstract with title: Control Barrier Functions for Unknown Nonlinear Systems using Gaussian Processes, and key words: Gaussian processes, Safety, Kernel, Computational modeling, Trajectory, Probabilistic logic, Noise measurement. Abstract: This paper focuses on the controller synthesis for unknown, nonlinear systems while ensuring safety constraints. Our approach consists of two steps, a learning step that uses Gaussian processes and a controller synthesis step that is based on control barrier functions. In the learning step, we use a data-driven approach utilizing Gaussian processes to learn the unknown control affine nonlinear dynamics together with a statistical bound on the accuracy of the learned model. In the second controller synthesis steps, we develop a systematic approach to compute control barrier functions that explicitly take into consideration the uncertainty of the learned model. The control barrier function not only results in a safe controller by construction but also provides a rigorous lower bound on the probability of satisfaction of the safety specification. Finally, we illustrate the effectiveness of the proposed results by synthesizing a safety controller for a jet engine example. |
12,836 | Please write an abstract with title: Empirical Test for Coverage Evaluation of NB-IoT Network, and key words: Performance evaluation, Cloud computing, Power demand, Smart buildings, Smart cities, Throughput, Internet of Things. Abstract: In recent years several Internet of Things(IoT) technologies are being developed covering different aspects and sets of applications. One of such technology, proposed by the Third Generation Partnership Project (3GPP) is called as Nar-roBand IoT (NB-IoT). NB-IoT is based on 3GPP’s existing LTE standard with special features added to support the Low Power Wide Area Network(LPWAN) devices. Some of the NB-IoT features include low power consumption, low cost, deep-indoor coverage (20dB improvement over standard LTE), massive device connectivity, etc. In this paper, we have evaluated performance of an commercially deployed NB-IoT network from a prospective of smart building & smart city applications. In order to achieve this goal, we performed two sets of tests. The first test focused on measuring the maximum distance covered by a single NB-IoT cell in a given area. The second test included measuring the signal strength when the device was placed in an indoor, outdoor, and deep-indoor locations. Theses tests were conducted in the campus of the Technical University of Denmark (DTU) and neighbouring residential area. The results for the tests were obtained by sending approximately 300 packets from each location to a cloud solution. |
12,837 | Please write an abstract with title: Design of a Three Degree of Freedom Nanopositioning Stage, and key words: Nanopositioning, Displacement measurement, Drives, Apertures, Nanoscale devices, Finite element analysis, Manufacturing. Abstract: A new type of simple and compact three degree of freedom parallel large-travel nano-piezoelectric stage is designed. First, a two-stage rhombus displacement amplifying mechanism is designed as the drive unit of the platform, and a spatially orthogonal arrangement is adopted. Then, based on four drive units with the same structure and located at the four corners of the base, a z-θx-θy stage with large displacement is designed. Finally, the static performance of the platform is tested by finite element simulation. The result shows that the travel of the platform along the z, θx and θy directions are 226.7 µm, 2.53 mrad and 2.56 mrad, respectively, and the natural frequencies are 251.81 Hz, 261.46 Hz and 261.46 Hz, respectively. |
12,838 | Please write an abstract with title: Digital identification of voltage sag in distribution system, and key words: Voltage fluctuations, Power quality, Spline, Wavelet transforms, Induction motors, Interference, Analytical models, EMTP, Power system modeling, Wavelet analysis. Abstract: Voltage sags in distribution system occur more frequently and devastatingly than other power quality problems. Voltage sags due to line faults, transformer energizing and induction motor starting are the main interference sources. The reasons leading to these sags are analyzed and simulation result are presented by an EMTP model in this paper. A new identification method to sag waveforms is presented in this paper, since B-spline wavelet transform is good at the analysis of singularity. The characteristics of sag waveform are extracted easily and accurately by using the B-spline wavelet transform. |
12,839 | Please write an abstract with title: A Low-Loss Balun-Embedded Interconnect for THz Heterogeneous System Integration, and key words: Microwave measurement, Semiconductor device measurement, Power transmission lines, Baluns, Insertion loss, System integration, Packaging. Abstract: An interconnect for THz heterogeneous integration is proposed in this work. Two transmission lines deployed on a 40-nm CMOS chip and an IPD carrier, respectively, are coupled together to form a Marchand balun during a flip-chip packaging process. By doing this, the proposed interconnect can provide packaging and balun functions simultaneously. Two interconnects using the proposed idea are demonstrated with measured and simulated insertion loss of 0.9 and 1.4 dB at 169 and 340 GHz, respectively. |
12,840 | Please write an abstract with title: Multimedia SoC: a systolic core for embedded DCT evaluation, and key words: Discrete cosine transforms, Field programmable gate arrays, Multimedia communication, Radio communication, Hardware, Clocks, Communication standards, Discrete transforms, System-on-a-chip, Video coding. Abstract: The growing interest in video standards has fostered many research activities towards efficient transform architectures. Many works have been proposed concerning the discrete cosine transform (DCT); however the need is felt for efficient cores, ready to be embedded into systems on chip (SoC). To grant maximal interoperability among different cores, the proposed DCT one has been designed to be wishbone compliant. A reconfigurable systolic 2D-DCT architecture is proposed and physical implementation results on XILINX Virtex-E FPGA are given. As far as performance is concerned, this core is able to process 128 XGA (1024/spl times/768) frames/s running at 110 MHz. |
12,841 | Please write an abstract with title: Airy beam generation and manipulation utilizing metasurface, and key words: Microwave integrated circuits, Modulation, Wireless power transfer, Metasurfaces, Generators, Trajectory, Structural beams. Abstract: In this paper, a new method to generate and control one-dimensional Airy beam based on metasurface is proposed. By controlling the length and rotation angle of the unit cell structures, the amplitude and phase of the transmission coefficient can be adjusted to excite the desired one-dimensional Airy beam with obvious self-bending phenomenon. Full-amplitude modulation method and simplified-amplitude modulation method are utilized and discussed here. In addition, the method to regulate the deflection of the main lobe of the one-dimensional Airy beam is proposed by changing the number of elements in the metasurfaces array. The calculated and experimental results show good agreement with each other, and the proposed metasurface-based Airy beam generator can be widely applied in wireless energy transmission and underground exploration systems. |
12,842 | Please write an abstract with title: Design and Implementation of a Low-Cost Atl-Azimuth Telescope Mount for Tracking Multiple Celestial Bodies, and key words: Wiring, Costs, Gears, Moon, Buildings, Telescopes, Belts. Abstract: This paper is on the design and implementation of an Alt-Azimuth Telescope, augmented with low-cost add-on components, to meet the needs of individuals who desire to track multiple celestial bodies but can’t afford the cost or find other telescopes difficult to use. Currently, a few of the cheaper and not so complex telescopes available on the market can track a single celestial body at a time. The motivation for the development of this research is to provide an alternative, low-cost solution using a low-priced motorized Alt-Azimuth telescope mount that can be aimed at and track multiple celestial bodies. The result is the design of block diagrams, assembly of electric components, wiring, algorithm design, and development of a base Alt-Azimuth telescope, which were integrated and tested into a fully functional system for beginners or amateurs who enjoy astronomy. |
12,843 | Please write an abstract with title: Automated Analysis through Natural Language Processing of DGMS Fatality Reports on Indian Non-Coal Mines, and key words: Training, Visualization, Virtual reality, Natural language processing, Safety, Coal mining, Timing. Abstract: Mining activities pose a major threat to the safety of mine workers due to the inherent risky nature of the job. To realize the objective of preventing fatal and non-fatal injuries, it is imperative for a mine management to analyze site specific mine safety data. This paper is the first attempt to automate the analysis of Directorate General Mines Safety (DGMS) fatality reports on Indian non-coal mines. It is done by text mining and natural language processing (NLP) techniques. The proposed method sidesteps multiple man hours of scrutinizing each report and technical expertise required in analyzing mining accidents. The authors have taken 6 years' worth of data ranging from 2010–2015 published by DGMS. The attempt revealed valuable insights into the causes of injuries such as accidents occurrence is highest in states of Rajasthan followed by Andhra Pradesh. The leading indicators of fatality included falling from heights, age between 28 to 32 years, worker class of ‘mazdoors’, and shift timings between 10 AM and 2 PM. Furthermore, results show accidents happened mostly in small scale stone mines. This will be a step forward for the Indian mining industry to extract meaningful results from more such text data quickly and accurately to make better decisions. The methodology can be extended to the Indian coal mining industry easily. |
12,844 | Please write an abstract with title: Robust identification and control with time-varying parameter perturbations, and key words: Robust control, Parameter estimation, Robustness, Convergence, Nonlinear systems, Open loop systems, Time varying systems, Additive noise, Nonlinear control systems, Control systems. Abstract: This paper is dedicated to the identification of parameters for a reasonably large class of nonlinear systems. We propose to design a direct parameter identification method in open loop and an indirect one in closed loop using the variable structure theory. The exponential convergence of parameter identifiers in both cases is studied. Finally, we highlight some robustness properties of the method with respect to bounded parameter perturbations. |
12,845 | Please write an abstract with title: Convolutional Neural Networks Based Diagnosis of Myocardial Infarction in Electrocardiograms, and key words: Heart, Training, Sensitivity, Databases, Myocardium, Electrocardiography, Convolutional neural networks. Abstract: Myocardial infarction also called heart attack, is the most dangerous Coronary heart disease for humans beings. Portable Electrocardiogram(ECG) device is useful for the identification and control of ECG signals for myocardial infarction. These ECG signals record heart electrical activity and reflect the unusual movement of the heart. Visually, it is difficult to identify a variation in ECG due to its small amplitude and period. Therefore in this paper, we implemented a convolutional neural network (CNN) made of two layers of convolution-pooling, two dense layers and one output layer for the diagnosis of myocardial infarction using ECG. For batter performance, this network uses Leaky ReLU neurons with categorical cross-entropy loss function and the ADAM optimizer algorithm. To avoid the problem of overfitting, we used L2 regularisation method for regularization of the dense layer of CNN. For experimentation, we use the Physikalisch-Technische Bundesanstalt (PTB) diagnostic database. In this database, we obtained results of sensitivity, specificity, and accuracy of 100 %, 99.65%, and 99.82%, respectively, for data taken from the training set. And sensitivity, specificity, and accuracy of 99.88 %, 99.65%, and 99.82%, respectively, on patients, it hasn't seen before which indicating that the model can achieve excellent classification performance. |
12,846 | Please write an abstract with title: Discrete PID control for integrator processes with time delay, and key words: Three-term control, Process control, Delay effects, Open loop systems, Polynomials, Sun, Feedback, Transfer functions, Certification, Laboratories. Abstract: A discrete control scheme is proposed for integrator processes with dominant time delay. It uses a local feedback to prestabilize the process. The proposed control has good set-point tracking and robust performance for the deviation of the time-delay. |
12,847 | Please write an abstract with title: Nocturnal Seizure Detection Using Off-the-Shelf WiFi, and key words: Wireless fidelity, Monitoring, Epilepsy, Receiving antennas, Bandwidth, Radio frequency, RF signals. Abstract: The detection of nocturnal seizures in epilepsy patients is essential, both for the quick management of the seizure complications, and for the assessment of the ongoing seizure treatment. Traditional seizure detection products (e.g., wearables), however, are either very costly, uncomfortable, or unreliable. In this article, we then propose to utilize everyday WiFi signals for robust, fast, and noninvasive detection of nocturnal seizures. We first present a new and rigorous mathematical characterization for the spectral content/bandwidth of the WiFi signal, measured on a WiFi device placed near a sleeping patient, during different kinds of sleep motions: seizures, normal movements (e.g., posture adjustments), and breathing. Based on this mathematical modeling, we propose a novel pipeline for processing the received WiFi signals to robustly detect all nocturnal nonbreathing movements, and then classify them into normal body movements or seizures. In order to validate this, we carry out extensive experiments in seven different typical bedroom locations, where a set of 20 actors simulate the state of having seizures (a total of 260 instances), as well as normal sleep movements (a total of 410 instances). Our proposed system detects 93.85% of the seizures with a mean response time (MRT) of only 5.69 s since the onset of the seizure. Moreover, our proposed system achieves a probability of false alarm of only 0.0097, when classifying normal sleep movements. Overall, our new mathematical modeling and experimental results show the great potential the ubiquitous WiFi signals have for detecting nocturnal seizures, which can provide better support for epilepsy patients and their caregivers. |
12,848 | Please write an abstract with title: Seismic intensity for inslab earthquakes in the southeast of the Mexican Volcanic Belt, and key words: Interpolation, Graphical models, Instruments, Earthquakes, Belts, Distribution functions. Abstract: In this paper the seismic intensity of 5 inslab earthquakes with magnitude 6.0 ≤ Mw ≤ 7.3 and epicenter in the southeast of the Mexican Volcanic Belt is analyzed in terms of spatial distribution of the peak ground acceleration recorded by seismological stations located in Mexico. Based on the available instrumental data, intensity maps were generated using a Kriging interpolation and site effects for some seismological stations were estimated by a Horizontal-to-Vertical Spectral Ratio analysis. Results show the crucial role that distribution of seismic instrumentation and site characteristics have in the determination of expected ground motion and reflect the importance of having an appropriate instrumentation coverage to improve seismic engineering analyses. |
12,849 | Please write an abstract with title: High-resolution fiber optic Fabry-Perot seismometer for low frequency monitoring, and key words: Optical fibers, Optical interferometry, Optical fiber communication, Fabry-Perot, Sensors, Monitoring, Noise level. Abstract: A high-resolution fiber optic Fabry-Perot seismometer for low frequency monitoring is presented. The noise level of the proposed seismometer is 6.74 ng/√Hz, which is better than NHNM within 0.16-50 Hz. |
12,850 | Please write an abstract with title: Reinforcement Learning Based Temporal Logic Control with Maximum Probabilistic Satisfaction, and key words: Robot motion, Uncertainty, Learning automata, Conferences, Reinforcement learning, Markov processes, Probabilistic logic. Abstract: This paper presents a model-free reinforcement learning (RL) algorithm to synthesize a control policy that maximizes the satisfaction probability of complex tasks, which are expressed by linear temporal logic (LTL) specifications. Due to the consideration of environment and motion uncertainties, we model the robot motion as a probabilistic labeled Markov decision process (PL-MDP) with unknown transition probabilities and probabilistic labeling functions. The LTL task specification is converted to a limit deterministic generalized Büchi automaton (LDGBA) with several accepting sets to maintain dense rewards during learning. The novelty of applying LDGBA is to construct an embedded LDGBA (E-LDGBA) by designing a synchronous tracking-frontier function, which enables the record of non-visited accepting sets of LDGBA at each round of the repeated visiting pattern, to overcome the difficulties of directly applying conventional LDGBA. With appropriate dependent reward and discount functions, rigorous analysis shows that any method, which optimizes the expected discount return of the RL-based approach, is guaranteed to find the optimal policy to maximize the satisfaction probability of the LTL specifications. A model-free RL-based motion planning strategy is developed to generate the optimal policy in this paper. The effectiveness of the RL-based control synthesis is demonstrated via simulation and experimental results. |
12,851 | Please write an abstract with title: A Generalized Hold Based Countermeasure Against Zero-Dynamics Attack With Application to DC-DC Converter, and key words: Cyberattack, Security, Sampled data systems, DC-DC power converters, Monitoring, Power system dynamics, Networked control systems. Abstract: Zero-dynamics attack (ZDA) is a model based cyber attack. It is stealthy in the sense that the existence of attack signal cannot be determined by monitoring the system output, and it is effective to systems that have unstable zero-dynamics. Several countermeasures against ZDA have been introduced, and the one employing the generalized hold (GH) is considered in this paper. The GH is a generalized version of zero-order hold that is commonly used in the digital control systems. In this paper, the lethality of ZDA and the effectiveness of GH as a countermeasure are demonstrated on a control system that involves a DC-DC converter. Through extensive simulations and experiments, the design of the proposed scheme is presented in detail and relevant practical issues are discussed. |
12,852 | Please write an abstract with title: A minimax receding-horizon estimator for uncertain discrete-time linear systems, and key words: Minimax techniques, Linear systems, Filters, State estimation, Least squares approximation, Cost function, Noise robustness, Stability, Estimation error, Noise measurement. Abstract: An approach to robust receding-horizon state estimation for discrete-time linear systems is presented. Estimates of the state variables can be obtained by minimizing a worst-case least squares cost function according to a sliding-window strategy. The resulting optimal robust filter can be approximated by a simpler and computationally efficient estimator. Stability properties are proved for both proposed filters. Specifically, the estimation errors of such filters converge exponentially to zero when the system is not affected by noise, and a bounding sequence can be given in the presence of bounded system and measurement disturbances. Simulation results are reported to show the effectiveness of the proposed approach. |
12,853 | Please write an abstract with title: On the Infiniband subnet discovery process, and key words: Computer network management, Message passing, Local area networks, Computer fault tolerance, Network operating systems, Communication system software, Communication standards, Communication system routing, Complexity theory, Optimization methods, Data communication. Abstract: InfiniBand is becoming an industry standard both for communication between processing nodes and I/O devices, and for interprocessor communication. Instead of using a shared bus, InfiniBand employs an arbitrary (possibly irregular) switched point-to-point network. InfiniBand specification defines a basic management infrastructure that is responsible for subnet configuration, activation, and fault tolerance. After the detection of a topology change, management entities collect the current subnet topology. The topology discovery algorithm is one of the management issues that are outside the scope of the current specification. Preliminary implementations obtain the entire topological information each time a change is detected. In this work, we present and analyze an optimized implementation, based on exploring only the region that has been affected by the change. |
12,854 | Please write an abstract with title: Research on the Application of Exchange Mode in Data Communication Technology, and key words: Automation, Information sharing, Internet, Data communication, Sustainable development. Abstract: With the continuous development of economy and the continuous improvement of people's quality of life, data communication technology is also indispensable. Because of the sustainable development of data communication technology, the long-term development of various undertakings in China can be promoted. In the process of the development of data communication technology, the research on the exchange mode is an important way to expand the application of data communication mode. This paper mainly expounds the computer network technology and the technical principle and source of data communication, and explores the application way of exchange mode in data communication technology. |
12,855 | Please write an abstract with title: Gallium orthophosphate device manufacturing by chemical etching, and key words: Gallium compounds, Manufacturing, Etching, Optical resonators, Rough surfaces, Surface roughness, Kinetic theory, Optical microscopy, Chemical processes, Design methodology. Abstract: This paper presents a study of gallium orthophosphate chemical etching as a method to design high frequency AT resonators. The dissolution reaction was studied in phosphoric acid solutions and the equation of the dissolution kinetics was determined. The apparent dissolution rate depends both on the solvent and the solute concentrations at the solid-liquid interface and follows an Arrhenius type law in terms of temperature. In order to completely determine the kinetics at this interface, the rates of dissolution and nucleation processes were both established. The geometry and the density of etch figures appearing on the surface of the plates were observed using optical microscopy photographs. During the chemical dissolution, the surface quality was evaluated essentially through the measurement of the roughness average Ra parameter. The best surface state was obtained with solutions containing dissolved GaPO/sub 4/. Finally, resonators manufactured by the chemical etching process are characterized piezoelectrically by the air-gap method. These first results show that the Q factor (Q*F=1 to 1.5E+11) is not affected by the chemical etching process. |
12,856 | Please write an abstract with title: Third-Order Nilpotency, Finite Switchings and Asymptotic Stability, and key words: Asymptotic stability, Switched systems, Optimal control, Linear systems, Vectors, Algebra, Control systems, Switches, Nonlinear systems, Sufficient conditions. Abstract: We show that a switched system generated by a pair of globally asymptotically stable nonlinear vector fields, which span a third-order nilpotent Lie algebra, is globally asymptotically stable under arbitrary switching. This generalizes a known fact for switched linear systems and provides a partial solution to the open problem posed in [1]. To prove the result, we consider an optimal control problem which consists of finding the "most unstable" trajectory for an associated control system. We use the Agrachev-Gamkrelidze second-order maximum principle to show that there always exists an optimal control that is piecewise constant with no more than four switches. This property is obtained as a special case of a reachability result by piecewise constant controls that is of independent interest. By construction, our criterion also holds for the more general case of differential inclusions. |
12,857 | Please write an abstract with title: Setting up a Distributed Control System Laboratory, and key words: Databases, Substations, Relays, Tools, Protocols, Monitoring, Hardware. Abstract: This paper presents a practical laboratory for student education purpose in Distributed Control Systems, with focus on applications for high voltage transmission substations. The monitoring, control and protection part is realized with a software platform and IED devices manufactured by AREVA T&D France, while the primary equipment, like circuit breakers and disconnectors are simulated with latched relays. The system architecture and communication network are reproducing a real one usually used in transmission substations. The implementation of this laboratory, both through specific laboratory works and experiments, makes the theoretical part to be supported by a practical experience, resulting in future graduates with added value in the electric power industry. |
12,858 | Please write an abstract with title: Towards an MD simulation of ion currents in the alpha hemolysin channel, and key words: Polymers, Proteins, Nanoporous materials, NASA, DNA, Robust control, Chemicals, Energy barrier, Genetics, Biomembranes. Abstract: Experiments show that single stranded nucleic acids polymers can be transported across an alpha hemolysin channel under the action of an applied electric field. The translocation of the nucleic acid polymers causes transient blockades in the ion current. The physical and chemical details of the interactions between polymer, channel and ionic solution that lead to the blockade events are not yet fully understood. Atomistic simulations enable a realistic description of the dynamic motions of the solvated polymer-pore system as a function of time. Analysis of such calculated system trajectories leads to valuable insight possible energy barriers, ion mobilities and short time-scale interactions. This study investigates the relationship between the structural properties of the alpha hemolysin channel and the ionic current blockades that result from the translocation of single stranded nucleic acids. |
12,859 | Please write an abstract with title: Empirical Study of Mobility Support in Millimeter-Wave Outdoor Urban Deployments, and key words: Phased arrays, Antenna measurements, Beam steering, Protocols, Phase measurement, Three-dimensional displays, Millimeter wave measurements. Abstract: The use of high-gain directional communications is key to enable the capacity enhancement of millimeter-wave (mm-wave) spectrum for 5G-and-beyond networks. However, this entails extensive beam management to continuously track the mobile user to maintain precise transmitter (TX)/receiver (RX) beam alignment. Detailed characterization of mm-wave link opportunities in real-world urban environments and corresponding beam management requirements, are key to addressing the great challenge of mobility support for mm-wave urban deployments. In this paper, we present the results of our large-scale outdoor urban mm-wave measurements using phased antenna arrays, where we collected received signal strength data over fine-grained 3D TX/RX orientations for 78 spatially-dense RX positions in three sub-regions in Aachen, totaling over 421,000 individual measurements. Our results show 2–8 spatial link opportunities per RX position, where only up to 40% of all RX orientations result in a feasible mm-wave connection. Our results suggest that the beam management burden would fall heavily on the mobile user-side, and be moderate on the TX-side, for a typical walk in vicinity of the serving cell. For example, the required TX-side beam steering from one RX position to the next to maintain a minimum data rate of 1 Gbps is less than 12° (twice the half power-beamwidth), but up to 88° at the RX-side. Therefore, obtaining spatially-dense and fine-grained angular propagation data is a critical input for the design and evaluation of mm-wave beam management protocols. |
12,860 | Please write an abstract with title: Extending UDDI with recommendations: an association analysis approach, and key words: Web services, Collaboration, Electronic commerce, Computer science, Software engineering, Recommender systems, Usability, Service oriented architecture, Information filtering, Information filters. Abstract: This paper presents a novel recommendation extension to UDDI that we term RUDDIS. Recommendations can have potential benefits to both providers and consumers of Web services. We adopt a unique technique to making recommendations that applies association analysis rather than traditional collaborative filtering approach. We present the implementation and demonstrate the functioning of RUDDIS in an unobtrusive manner where the user has total control over the recommendation process. |
12,861 | Please write an abstract with title: Graph Convolutional Extreme Learning Machine, and key words: Convolution, Robustness, Closed-form solutions, Neural networks, Training, Convolutional codes, Optimization. Abstract: Extreme Learning Machine (ELM) has gained lots of research interest due to its universal approximation capability and fast learning speed. However, traditional ELMs are devised for regular Euclidean data, such as 2D grid and 1D sequence, and thus don't apply to non-Euclidean data, e.g., graph-structured data. To overcome this shortcoming, this paper presents a Graph Convolutional Extreme Learning Machine (termed as GCELM) for semi-supervised classification. Technically, a random graph convolutional layer is introduced to replace the random projection of original ELM, which endues ELM with the capability of dealing with graph-structured data directly. To generate a robust graph from the raw dataset, a self-representation model is adopted to construct a weighted graph. Extensive experiments on 27 UCI datasets demonstrate that GCELM outperforms many popular semi-supervised methods, and with faster learning speed. To the best of our knowledge, this is the first work that combines graph convolution with ELM. |
12,862 | Please write an abstract with title: Manipulation guide using contact constraints for construction of 3D composite objects, and key words: Layout, Databases, Mice, Computer displays, Contacts, Information science, Graphics, User interfaces. Abstract: There is a well-known problem that it is very difficult to accurately make a 3D object move/rotate into the specific position/orientation in a virtual 3D space by the direct manipulation of a mouse device on a 2D computer display screen. To deal with this problem, the authors have already proposed an automatic 3D object layout method based on contact constraints. After automatically generating a 3D scene using this method, the user often wants to modify it manually. For this, the authors propose manipulation guide functionality based on contact constraints in this paper. The contact constraints of the 3D object layout method can also be useful for the construction of 3D composite objects. This paper also reports the applicability of the 3D object layout method and manipulation guide functionality to the construction of 3D composite objects. |
12,863 | Please write an abstract with title: H/sub /spl infin//-optimal control of a parametrically disturbed pendulum, and key words: Control systems, Robustness, Control theory, Robust control, Damping, MATLAB, Bismuth, Costs, Stability. Abstract: Based on the H/sub /spl infin//-control technique, a control law for a parametrically disturbed pendulum is derived, under which a level of attenuating oscillations is close to the minimally possible one. Results of numerical modeling are presented. |
12,864 | Please write an abstract with title: Intrusion Detection and Obfuscation Mechanism for PUF-Based Authentication, and key words: Intrusion detection, Authentication, Machine learning, Physical unclonable function, Servers. Abstract: Physical Unclonable Functions (PUF) provide a lightweight secure primitive. However, it is well known that PUFs are vulnerable to machine learning based modeling attacks (MA). A lot of efforts have been devoted to develop MA-resistant PUFs, while MA techniques are also evolving. In this paper, we propose to protect PUF-based authentication systems by providing an intrusion detection mechanism. By replacing some responses with the check information only known to the server and the PUF, any attacks will trigger alerts to the server. The proposed method provides an active protection mechanism so that the verifier can initiate an intrusion detection process to determine whether the prover is an attacker in disguise. In this way, the proposed method can provide an early alert so as to achieve another layer of protection. Experimental results show that the proposed mechanism can effectively provide alerts after PUFs being attacks. |
12,865 | Please write an abstract with title: Vibration Signal Analysis of Rolling Bearing Based on Permutation Entropy, and key words: Vibrations, Fault diagnosis, Time-frequency analysis, Time series analysis, Rolling bearings, Market research, Entropy. Abstract: Permutation entropy (PE) is usually used as a statistical feature combined with classification algorithms to identify the state of rolling bearings and has achieved high recognition accuracy. The purpose of this paper is to study the potential behavior of PE at varying parameters in rolling bearing vibration signals for the normal state and three fault states (including inner race, outer race, and ball fault). The influence of the vibration signal length (N) and the parameter embedding dimension (m) on the PE were studied, and the signal length when they reached stability was analyzed. Then PE with varying signal lengths of each state at m=3 and m=5 was compared. Finally, the ordinal patterns found and their relative frequency in each state’s vibration signal with varying m were analyzed, and the differences were discussed. The results indicated that the different states of rolling bearing could be effectively distinguished with a shorter time series than the $N \gg m !$ recommendation. PE could sensitively distinguish between the normal state and fault states, which may be due to the difference in the number of ordinal patterns found at the same length signal and the difference in relatively high-frequency ordinal pattern types and their relative frequency. The identification of outer race and ball fault is more difficult than that of inner race fault by PE, which may be due to the fact that the ordinal patterns and their relative frequency in the vibration signals between the outer race and ball fault are similar to a certain extent, while inner race fault is different from them. |
12,866 | Please write an abstract with title: Metal oxide nanocrystals for gas sensing, and key words: Nanocrystals, Nanobioscience, Optical surface waves, Photonic band gap, Surface morphology, Chemical sensors, Optical sensors, Nanostructures, Nanostructured materials, Gas detectors. Abstract: In the past few years, progress has been achieved in the synthesis, structural characterization and physical properties investigation of nanostructures. Due to their peculiar characteristics and size effects, these materials often show some novel physical properties that are different from those of the bulk, and are of great interest both for fundamental study and for potential nanodevice applications. In this paper, the topics covered are the worldwide most recent research in the field of quasi one-dimensional inorganic structures for gas sensing and some promising results achieved at Sensor Lab in Brescia Italy in sensors based on conductometric, visible photoluminescence quenching and photoinduced desorption by subbandgap light. |
12,867 | Please write an abstract with title: Trust-Region Approximation of Extreme Trajectories in Power System Dynamics, and key words: Trajectory, Mathematical models, Sensitivity, Uncertainty, Load modeling, Optimization, Power system dynamics. Abstract: In this work we present a novel technique, based on a trust-region optimization algorithm and second-order trajectory sensitivities, to compute the extreme trajectories of power system dynamic simulations given a bounded set that represents parametric uncertainty. We show how this method, while remaining computationally efficient compared with sampling-based techniques, overcomes the limitations of previous sensitivity-based techniques to approximate the bounds of the trajectories when the local approximation loses validity because of the nonlinearity. We present several numerical experiments that showcase the accuracy and scalability of the technique, including a demonstration on the IEEE New England test system. |
12,868 | Please write an abstract with title: Relationship Between the Transponder Triggering Area and the SSR Mode S Surveillance Coverage Map, and key words: Integrated circuits, Azimuth, Surveillance, Airborne radar, Europe, Aircraft navigation, Transponders. Abstract: EUROCONTROL and other European organizations place great emphasis on the efficiency of the use of the radio frequency band 1030/1090 due to its heavy load. One of the major contributors to the load on this band is the excessive number of replies that aircraft emit as a result of “Mode S Only All Call” interrogations from SSR Mode S radars. The dominant source of these replies is the area that arises between the end of the radar's surveillance coverage map to the border where transponder minimum triggering level (MTL) is achieved. Therefore, it should be an effort that the interrogation power is optimally adapted to the set surveillance coverage map and is not unnecessarily greater. Based on the processing of replies from aircraft, the paper analyzes how large this area is and whether there is a clear relationship between the set size of the surveillance coverage map and the so-called physical range of the radar. The aim is to find out how manufacturers and air navigation service providers (ANSPs) approach this setting. The paper uses data available from the Open Sky Network portal, and the analysis is performed on a sample of selected SSR within the European region. |
12,869 | Please write an abstract with title: Web Insights for National Security: Analysing Participative Online Activity to Interpret Crises, and key words: National security, Social network services, Data mining, Uniform resource locators, Urban areas, Critical infrastructure. Abstract: Social Media has become the primary communication channel to share feelings and opinions to big audiences. This characteristic is especially important when dealing with a crisis because people use it to send a variety of messages; however, to emphasise or complement what they post, individuals include links to web pages or other web services. Contributing a component to a novel framework for National Security crises analysis and management, this paper focuses on Web Insights as a mechanism that can help to comprehend the nature and state of a crisis. The mechanism analyses web resources and provides insights along three different dimensions: Firstly, the escalation of the crisis over time. Secondly, the interpretation of the information that the main actors have published (Social Networking Services, Information Outlets, Non-Governmental Organisations and Independent Websites). Thirdly, an estimate whether the crisis has turned violent. |
12,870 | Please write an abstract with title: Identity Authentication of OSA Patients Using Microwave Doppler radar and Machine Learning Classifiers, and key words: Wireless communication, Support vector machines, Wireless sensor networks, Authentication, Feature extraction, Microwave theory and techniques, Sleep apnea. Abstract: Non-contact home-based sleep monitoring will bring a paradigm shift to diagnosis and treatment of Obstructive Sleep Apnea (OSA) as it can facilitate easier access to specialized care in order to reach a much boarder set of patients. However, current remote unattended sleep studies are mostly contact sensor based and test results are sometimes falsified by sleep-critical job holders (driver, airline pilots) due to fear of potential job loss. In this work, we investigated identity authentication of patients with OSA symptoms based on extracting respiratory features (peak power spectral density, packing density and linear envelop error) from radar captured paradoxical breathing patterns in a small-scale clinical sleep study integrating three different machine learning classifiers (Support Vector Machine (SVM), K-nearest neighbor (KNN), Random forest). The proposed OSA-based authentication method was tested and validated for five OSA patients with 93.75% accuracy using KNN classifier which outperformed other classifiers. |
12,871 | Please write an abstract with title: The Secured AES designs against Fault Injection Attacks: A comparative Study, and key words: Redundancy, Hardware, Fault detection, Encryption, Circuit faults, Throughput, Field programmable gate arrays. Abstract: To protect the Advanced Encryption Standard (AES) against physical attacks known as fault injection attacks various fault detection schemes have been proposed. In this paper, a comparative study between the most well-known fault detection schemes in terms of fault detection capabilities and implementation cost has been proposed. In the considered study we implement, separately, the hardware, the temporal and the information redundancy for the 32-bit AES. These schemes are implemented on the Virtex-5 Xilinx FPGA board in order to evaluate their efficiency in terms of area, time costs and fault coverage. |
12,872 | Please write an abstract with title: An Electronic Hybrid with Adaptive Balancing for Telephony, and key words: Telephony, Switches, Echo cancellers, Subscriber loops, Switching circuits, Propagation losses, Insertion loss, Communication switching, Impedance measurement, Convergence. Abstract: A new form of adaptive balancing hybrid is proposed for application to the two-wire to four-wire interface of a local digital switch. It is similar to an echo canceller but with a single degree of freedom and much simpler circuitry. In this paper a theory of operation of the hybrid is developed, and in a companion paper two circuit implementations and experimental results are reported. |
12,873 | Please write an abstract with title: Performance of coded WOFDM systems with MLC/MSD on AWGN and Rayleigh fading channels, and key words: AWGN, Fading, OFDM, Mutual information, Communication systems, Bandwidth, Maximum likelihood decoding, Channel capacity, Capacity planning, Mobile communication. Abstract: We propose coded wavelet based OFDM (WOFDM) with MLC/MSD scheme based on capacity rule. BER performances of coded WOFDM systems with MLC/MSD are investigated on AWGN and Rayleigh fading channels respectively. In the MLC scheme, BCH codes of length 127 are employed as component codes. Different component code rates are used, and their performances are compared on different channels. Results show that the capacity rule works well in our proposed systems. The performances are different when codes rates do not comply with the capacity rule in different degree. |
12,874 | Please write an abstract with title: Distributed Cooperative Control of Offshore Wind Farms Integrated via MTDC System for Fast Frequency Support, and key words: Frequency control, Rotors, Wind farms, Frequency estimation, Indexes, Voltage control, Delay effects. Abstract: This article proposes a distributed cooperative control (DCC) scheme of offshore wind farms integrated via the multiterminal direct current system for fast frequency support. The DCC scheme employs the consensus algorithm to share the frequency support burden among offshore wind turbines (WTs) suitably. The proposed DCC scheme can exploit the kinetic energy of all WTs adequately, while ensuring the security by employing the consensus state index and changing droop control coefficients adaptively. After the frequency support, the asymptotic recovery scheme is proposed at the leader WT for smooth rotor speed restorage, and other WTs will follow the leader to recover and reduce the second frequency drop. Besides, to realize the fast frequency support, the communication-free estimator is employed to estimate the onshore dc voltage using offshore local measured signals. Case studies are carried out on MATLAB and OPAL-RT real-time simulation platforms, respectively. Different control schemes are compared to elaborate the performance of the proposed DCC scheme considering the parameter uncertainty and noise disturbance. |
12,875 | Please write an abstract with title: A subband space constrained beamformer incorporating voice activity detection [speech enhancement applications], and key words: Speech enhancement, Space technology, Statistics, Working environment noise, Telecommunications, Australia, Array signal processing, Microphone arrays, Covariance matrix, Vectors. Abstract: This paper introduces a new subband adaptive space constrained beamforming structure for use in hands-free speech enhancement applications. The scheme incorporates a space constrained source model and voice activity information through the integration of a voice activity detector (VAD). The VAD information is used to estimate noise covariance information during non-speech periods and to optimally estimate the source power spectral density (PSD), which is used to provide a spectrally optimized constraint on the source. The proposed structure is evaluated in a real car environment, yielding results which compare well to the optimal Wiener solution where full knowledge of the source is known. |
12,876 | Please write an abstract with title: Performance analysis of full-rate, full-diversity space-time code in asynchronous DS/CDMA, and key words: Performance analysis, Space time codes, Multiaccess communication, Bit error rate, Multiple access interference, MIMO, Direct-sequence code-division multiple access, Fading, Upper bound, Pairwise error probability. Abstract: Full-rate, full-diversity space-time codes can be applied in the framework of multiple-input multiple-output asynchronous direct-sequence code-division multiple access (MIMO-ACDMA) to increase the system capacity. First, the performance of these codes in this framework is investigated analytically assuming known channel fading coefficients. An upper bound on the pair-wise error probability is derived. It is shown that the determinant of an effective SINR matrix can serve as a metric to select chip waveforms. Next, different expurgated union bounds are derived to approximate the bit error rate (BER) at different SNR levels. Results show that a chip-level oversampling technique can effectively suppress the multiple-access interference (MAI) when used jointly with high-rate space-time codes. |
12,877 | Please write an abstract with title: Information-theoretic capacity analysis in MIMO distributed antenna systems, and key words: Information analysis, MIMO, Transmitting antennas, Receiving antennas, Rayleigh channels, Mobile antennas, Power system modeling, Power control, Shadow mapping, Wireless communication. Abstract: Distributed antenna system (DAS) can reduce the access distance and so lower the required transmit power compared with the conventional multiple input multiple out (MIMO) system. This paper investigated the information-theoretic capacity of DAS based on the channel model considering path loss, log-normal shadowing fading and Rayleigh fading. We find that the location of the receiver affects the DAS capacity and the difference between capacity with water-filling power allocation and that with equal-power allocation is significant. Furthermore, simulation results show that DAS offers large capacity gains over the traditional MIMO system. |
12,878 | Please write an abstract with title: Standard cell layout with regular contact placement, and key words: Lithography, Circuits, Lighting, Image quality, Finite impulse response filter, High speed optical techniques, Optical filters, Apertures, Optical imaging, Viterbi algorithm. Abstract: The practicability and methodology of applying regularly placed contacts on layout design of standard cells are studied. The regular placement enables more effective use of resolution enhancement technologies, which in turn allows for a reduction of critical dimensions. Although placing contacts on a grid adds restrictions during cell layout, overall circuit area can be made smaller by a careful selection of the grid pitch, allowing slight contact offset, applying double exposure, and shrinking the minimum size and pitch. The contact level of 250 nm standard cells was shrunk by 10%, resulting in an area change ranging from -20% to +25% with an average decrease of 5% for the 84 cells studied. The areas of two circuits, a finite-impulse-response (FIR) filter and an add-compare-select (ACS) unit in the Viterbi decoder, decrease by 4% and 2%, respectively. |
12,879 | Please write an abstract with title: A Review of Medical Implants Communication in Body Area Network, and key words: Implants, Body area networks, Microwave integrated circuits, Radio frequency, Biological system modeling, IEEE 802.15 Standard. Abstract: An overview of medical implant communication in body area network is presented keeping in mind the readers from both engineering and medical science background. Starting from the very basic body area network topology, the paper shows the general architecture for the design of implantable transceiver Integrated Circuit (IC). Most of the work is focused on the Medical Implant Communication Service (MICS) band from 402 to 405 MHz. We have also presented a recent energy harvesting technique for battery-less implantable IC and test method for the implants operating in MICS band. Mostly the review is done based on IEEE 802.15.6, ETSI EN 301 839-1, and ITU-R Recommendation RS 1346 standards. |
12,880 | Please write an abstract with title: A Two-Stage Adaptation Network (TSAN) for Remote Sensing Scene Classification in Single-Source-Mixed-Multiple-Target Domain Adaptation (<i>S</i>²<i>M</i>²<i>T</i> DA) Scenarios, and key words: Remote sensing, Annotations, Adaptation models, Sensors, Satellites, Earth, Data models. Abstract: Over the past decade, domain adaptation (DA) algorithms have been proposed to address domain gap problems as they do not need any interpretation in the target domain. However, most existing efforts focus on scenarios with only one source domain and one target domain. In this article, we explore the scenario with one source domain and mixed multiple target domains for remote sensing applications and propose a new algorithm, named the two-stage adaptation network (TSAN). First, we utilize the adversarial learning approach to confuse the classifier to discriminate between the source domain and the whole mixed-multiple-target domain. Second, we adopt self-supervised learning to divide the mixed-multiple-target domain with automated generation of “pseudo”-domain labels, which guides our network to learn intrinsic features of multiple target domains. Finally, these two steps are combined as an iterative procedure. We integrate a test dataset that includes five remote sensing datasets and ten classes. Our method achieves an average accuracy of 63.25% and 73.68% with two typical backbones, considerably outperforming other DA methods with an average accuracy improvement of 4.84%–20.19% and 9.06%–17.04%, respectively. Furthermore, we identify the negative transfer effect in existing mainstream DA methods in remote sensing image classification with multiple different domains. |
12,881 | Please write an abstract with title: Automated registration of surveillance data for multi-camera fusion, and key words: Surveillance, Calibration, Cameras, Layout, Monitoring, Digital images, Robustness, Object detection, Protection, Fuses. Abstract: The fusion of tracking and classification information in multi-camera surveillance environments will result in greater robustness, accuracy and temporal extent of interpretation of activity within the monitored scene. Crucial to such fusion is the recovery of the camera calibration which allows such information to be expressed in a common coordinate system. Rather than relying on the traditional time-consuming, labour-intensive and expert-dependent calibration procedures to recover the camera calibration, extensible plug-and-play surveillance components should employ simple learning calibration procedures by merely watching objects entering, passing through and leaving the monitored scene. In this work we present such a two stage calibration procedure. In the first stage, a linear model of the projected height of objects in the scene is used in conjunction with world knowledge about the average person height to recover the image-plane to local-ground-plane transformation of each camera. In the second stage, a Hough transform technique is used to recover the transformations between these local ground planes. |
12,882 | Please write an abstract with title: Impact of power-electronics systems on the performance and durability of tubular solid-oxide fuel cell, and key words: Fuel cells, Power system reliability, Personal communication networks, Voltage, Inverters, Power electronics, Material properties, Chemicals, Temperature, DC-DC power converters. Abstract: This paper analyzes the impacts of steady-state and transient electrical-feedback effects from the power-conditioning system (PCS) on the performance and durability of tubular solid-oxide fuel cells (TSOFCs). Subsequently, this paper explores the impacts of modulation/control strategies on the transient response, flow parameters and current density. This paper demonstrates how traditionally known superior modulation/control methodologies may have a negative effect on the TSOFC performance and lifetime unless carefully implemented. The interaction-analysis methodologies and the results presented in this paper lead to an improved understanding, and may yield realization of cost-effective, reliable and optimal power-electronics systems for TSOFC PCS. |
12,883 | Please write an abstract with title: DREAM: a chip-package co-design tool for RF-mixed signal systems, and key words: Packaging, Radio frequency, Signal design, RF signals, Power distribution, Circuit noise, Signal analysis, CMOS technology, Coupling circuits, Integrated circuit noise. Abstract: 'Package aware' IC design has not only become advantageous, but also essential towards optimum performance of high-end systems. Here, an early design tool has been presented that can assist a designer in chip-package co-design of RF and mixed signal systems. The primary function of this tool is to correlate metrics in the chip and package domain. The tool allows modifications of RF standard CMOS circuits based on package effects and in analyzing package power distribution. It evaluates the effect of package power supply noise on RF circuits in detail. The analysis can be used either to change the RF/mixed signal design or the packaging technology used for both simultaneously depending upon the application. |
12,884 | Please write an abstract with title: eeRIS-NILM: An Open Source, Unsupervised Baseline for Real-Time Feedback Through NILM, and key words: Home appliances, Real-time systems, Image edge detection, Voltage measurement, Hidden Markov models, Reactive power, Power measurement. Abstract: Awareness of residential consumers about the impact of their behavior on electricity consumption is an important determinant for energy efficiency and for their participation in electricity markets. Non-intrusive load monitoring (NILM) has been proposed as a cost-effective approach for providing detailed information about the consumption of individual appliances and help achieve these goals. In this context, the ideal NILM algorithm should be unsupervised and provide real-time consumption feedback (i.e., the appliances should be detected immediately after they start consuming power). Solutions with these characteristics have not been sufficiently studied in the NILM bibliography. This paper introduces an attempt to address this problem, by suggesting the use of a "Live" algorithm that provides real-time feedback. The Live algorithm runs in parallel with a more robust NILM procedure, and a periodic synchronization step ensures that the two processes share the same appliance models. The paper presents the details and implementation of the algorithm, along with an evaluation methodology and its results on the REDD dataset. Although the Live algorithm presented here has significant room for improvement, it can serve as a baseline for evaluating more sophisticated approaches in the future. The source code for the implemented system is available at https://github.com/eeris-nilm/. |
12,885 | Please write an abstract with title: Sensorless PMSM Drive Using Adaptive Harmonics Elimination based Modified Flux Observer with Regenerative Braking Capability for LEV Application, and key words: Band-pass filters, Velocity control, Estimation, Switches, Sensorless control, Observers, Harmonic analysis. Abstract: This paper presents, the sensorless PMSM drive for light electric vehicle (LEV) using modified rotor flux observer (FO) with regenerative braking capability. In order to accurate flux estimation for flux observer technique, the unknown initial integral value, higher order harmonics, DC components are the major impediments. To overcome these issues, conventional flux observer along with an adaptive band pass filter is utilized in this work for sensorless speed and position estimation. Furthermore, a robust model predictive current controller (MPCC) is employed to evade cascading of linear controllers and eliminate modulator. In addition to this, regenerative braking is incorporated in this work, which helps to improve the driving range of the EV as well as eliminate the risk of deep discharge of the battery in case of uphill driving situation. The system configuration is simulated in MATLAB/Simulink and its effectiveness is validated with the obtained results. |
12,886 | Please write an abstract with title: Free space optical communications routing performance in highly dynamic airspace environments, and key words: Optical fiber communication, Routing protocols, Telecommunication traffic, High-speed networks, Aircraft, Added delay, Propagation delay, Interleaved codes, Traffic control, Network topology. Abstract: Airborne networking environments utilizing high speed free space optical communications are being proposed as a method of providing immediate high speed network access and communications in a tactical environment where access is otherwise unavailable. Frequent link failures and recoveries due to wing obstruction and the dead zone produced by the wake vortex of the aircraft characterize the links. Many links additionally have large delay due both to coding/interleaving and propagation characteristics. Network availability from a user perspective is predicated on the fast response to link outages and recoveries by the routing protocol. The routing protocol must converge very quickly to ensure that the network is highly available and that traffic is not disrupted. In this work, we considered two different architectures/topologies that meet these requirements and analyzed the performance of OSPF and EIGRP on each using simulation. We fixed the scenarios such that an end-to-end path was always available through the network. We varied the input parameters for OSPF and EIGRP to maximize network availability. We determined that OSPF is limited by its minimum HELLO interval and results in gaps in path availability on the order of seconds and EIGRP may respond quickly to achieve subsecond gaps in path availability, but at a cost of increased network traffic. We have additionally introduced an analytical methodology for selection of HELLO interval lengths and router dead times which quantifies the cost and benefit of a particular selection. Scalability of the different approaches to a complete network needs further exploration. |
12,887 | Please write an abstract with title: Numerical simulation for air flow in the mini-environment and SMIF enclosure, and key words: Numerical simulation, Robots, Personnel, Costs, Contamination, Semiconductor device modeling, Drilling, Semiconductor process modeling, Kinetic energy, Manufacturing processes. Abstract: The application of mini-environment and standard mechanical interface (SMIF) enclosure in the clean room can efficiently reduce airborne particles and isolate the personnel from the product. The purpose of this article is to reduce the recirculation zone and to maintain the positive pressure from the analysis results of the airflow field and pressure distribution of SMIF enclosure and mini-environment. The simulation code CFX will be used to study the flow field of air movement corresponding to the associated design parameters. The results show that proper drilling holes or slots can reduce the circulation zones of SMIF enclosure. The positive pressure of SMIF enclosure is mainly affected by inlet air flux, area of outlets, and leakage area. The calculated results can provide the design rules for SMIF robot inside the SMIF enclosure and reduce the particle accumulation during robot moving. |
12,888 | Please write an abstract with title: A replicated assessment of the use of adaptation rules to improve Web cost estimation, and key words: Costs, Frequency selective surfaces, Software algorithms, Educational institutions, Industrial relations, Web pages, Graphics, Calibration, Software engineering, Accuracy. Abstract: Analogy-based estimation has, over the last 15 years, and particularly over the last 7 years, emerged as a promising approach with comparable accuracy to, or better than, algorithmic methods. In addition, it is potentially easier to both understand and apply; these two important factors can contribute to the successful adoption of estimation methods within Web development companies. We believe therefore, analogy-based estimation should be examined further. This paper replicates previous work that investigated the use of two types of adaptation rules as a contributing factor to better estimation accuracy. In addition, it also investigates the use of feature subset selection, in addition to adaptation rules. Two datasets are used in the analysis; results show that adaptation rules improved estimation accuracy for the less "messy" dataset. Feature subset selection also seems to help improve the adaptation results. |
12,889 | Please write an abstract with title: Machine Learning Based Traffic-Aware Service Reconfiguration in Metropolitan Area Networks, and key words: metropolitan area networks, tidal traffic, machine learning, traffic prediction, service reconfiguration. Abstract: With the development of 5G technology and the emergence of the large amount of traffic with various broadband services, the operation and resource scheduling of optical network are facing unprecedented challenges. In the metropolitan area network, the location where users access to the network changes in real time, causing that the tidal traffic in the network changes dynamically with the time. However, the network operators cannot make fast and flexible resource scheduling. Considering tidal traffic in the metropolitan area network, this paper proposes a traffic-aware service reconfiguration algorithm based on machine learning model. |
12,890 | Please write an abstract with title: Comparative analysis of sub-THz detection in graphene, GaN HEMT, and FinFET devices, and key words: Temperature measurement, Temperature sensors, Microwave measurement, Semiconductor device measurement, Voltage measurement, Current measurement, Graphene. Abstract: We studied temperature-dependent photo response in the sub-THz regime (0.14 THz) of graphene and AlGaN/GaN-based field-effect transistors (FETs). Instead of measuring the voltage response using a lock-in amplifier, the current induced by the incoming sub-THz radiations was measured directly using the semiconductor parameters analyzer (SPA). Such an approach allows fast and multiple measurements as a function of temperature. We have observed that, while responsivity increase saturates at 50-100K, depending on the device, the noise equivalent power continues to decrease with the temperature decrease. Our results show the advantage of the graphene-based detectors over the GaN-based ones while operating at low temperatures. |
12,891 | Please write an abstract with title: Basic research and applications in magnetism, and key words: Superconducting magnets, Magnetic materials, Magnetic properties, History, Permanent magnets, Optical polarization, Superconducting microwave devices, Silicon, Steel, Optical devices. Abstract: Several brief case histories are recounted, to show how basic scientific discoveries of new materials and phenomena are used as necessary background for the design of modern devices. The essential elements in the follow-through from the discoveries to the useful devices are listed for six subjects used as examples: 1) rare earths for permanent magnets, 2) orthoferrite domain "bubbles" for memory, 3) Faraday rotation of polarized microwave radiation, 4) magnetic properties of grain-oriented silicon steel, 5) optical properties of magnetic materials, and 6) superconducting magnets. |
12,892 | Please write an abstract with title: Electromagnetic Simulation to Determine Mesoscopic Dielectric Particle Parameters for Optimal Terajet Effect, and key words: Radiation detectors, Image edge detection, Electromagnetic scattering, Rectifiers, Dielectrics, Electromagnetics, Nonlinear optics. Abstract: This paper reports on optimization of the parameters, by mean of electromagnetic simulations to obtain the values of the parameters that permit optimal conditions for terahertz (THz) radiation detection using the terajet effect generated by inserting a cuboid-shaped mesoscopic dielectric particle in the optical path at in the front of the rectifier. The obtained results show that the length of edge of the cuboid is the key parameter that conditions the performance of the detection system. A substantial gain is obtained under optimal conditions. |
12,893 | Please write an abstract with title: Mixed Numerology Interference Recognition Approach for 5G NR, and key words: Interference, OFDM, Training, Signal to noise ratio, 5G mobile communication, Demodulation, Frequency-domain analysis. Abstract: The coexistence of multiple numerologies can cause interference and degrade system performance in 5G devices. In this letter, a convolutional neural networks (CNN)-based mixed numerology interference (MNI) recognition approach is devised to resolve the interference for user equipment (UE) to receive new radio (NR) downlink signal. The results are learned from the frequency domain magnitude and phase waveform, for the best precision and efficiency. We use as little sample data as possible to reduce memory/buffer costs and to alleviate the computing resources. Simulations are performed to verify the viability on various signal-noise ratio (SNR), channel condition, modulation, etc. It is shown that the accuracy can reach 97% or higher at varying SNR and fading channels. Furthermore, a dynamic filtering/windowing (DFW) scheme is proposed. The link level simulation results show that the scheme can improve the attainable Signal to Interference plus Noise Ratio (SINR) by 3~6dB for the indicated cases. |
12,894 | Please write an abstract with title: A study of the influence of local variations in myocardial thickness on SPECT perfusion imaging, and key words: Myocardium, Computed tomography, High-resolution imaging, Image segmentation, Heart, Imaging phantoms, Image reconstruction, Attenuation, Detectors, Performance analysis. Abstract: The objective of this project was to study the impact of local variations in myocardial thickness on SPECT perfusion imaging using segmented high-resolution gated-CT data of the heart to define source distributions. High-resolution breath-hold gated CT data of 16 patients were obtained using a GE Lightspeed multi-slice CT system. Transverse slices (512/spl times/512) with x-y pixel size of 0.039 cm and a slice thickness of either 0.25 cm or 0.125 cm were segmented to obtain left-ventricular (LV) and right-ventricular (RV) myocardial walls for all time frames of the cardiac cycle. Polar maps of myocardial thickness were generated using radial and short-axis slices of the LV. Absolute quantitation was performed on the myocardium thickness polar maps. The segmented LV and RV were also incorporated in the gated MCAT phantom, and analytical SPECT projections generated using typical acquisition parameters. Projection data were folded down to 64/spl times/64 image matrices and reconstructed using FBP, 5 iterations of OSEM including attenuation compensation (AC), as well as 5 iterations of OSEM including AC and compensation for detector response (ACR). CEQUAL polar maps were generated and relative quantitative analysis performed. Results show there is considerable variation in wall thickness at the resolution of the CT studies. Apical thinning, papillary muscles, and apical to base shortening are clearly visible. AC and ACR give a more realistic perfusion distribution in the simulated MCAT patient data than FBP. |
12,895 | Please write an abstract with title: Deep Learning for Estimation and Pilot Signal Design in Few-Bit Massive MIMO Systems, and key words: Channel estimation, Massive MIMO, Detectors, Maximum likelihood estimation, Data models, Hardware, Deep learning. Abstract: Estimation in few-bit MIMO systems is challenging, since the received signals are nonlinearly distorted by the low-resolution ADCs. In this paper, we propose a deep learning framework for channel estimation, data detection, and pilot signal design to address the nonlinearity in such systems. The proposed channel estimation and data detection networks are model-driven and have special structures that take advantage of domain knowledge in the few-bit quantization process. While the first data detection network, B-DetNet, is based on a linearized model obtained from the Bussgang decomposition, the channel estimation network and the second data detection network, FBM-CENet and FBM-DetNet respectively, rely on the original quantized system model. To develop FBM-CENet and FBM-DetNet, the maximum-likelihood channel estimation and data detection problems are reformulated to overcome the indeterminant gradient issue. An important feature of the proposed FBM-CENet structure is that the pilot matrix is integrated into the weight matrices of its channel estimator. Thus, training the proposed FBM-CENet enables a joint optimization of both the channel estimator at the base station and the pilot signal transmitted from the users. Simulation results show significant performance gains in estimation accuracy by the proposed deep learning framework. |
12,896 | Please write an abstract with title: Comparison of graph cuts with belief propagation for stereo, using identical MRF parameters, and key words: Belief propagation, Inference algorithms, Stereo vision, Markov random fields, Computer vision, Pixel, Labeling, Testing, Computational efficiency, Costs. Abstract: Recent stereo algorithms have achieved impressive results by modelling the disparity image as a Markov Random Field (MRF). An important component of an MRF-based approach is the inference algorithm used to find the most likely setting of each node in the MRF. Algorithms have been proposed which use graph cuts or belief propagation for inference. These stereo algorithms differ in both the inference algorithm used and the formulation of the MRF. It is unknown whether to attribute the responsibility for differences in performance to the MRF or the inference algorithm. We address this through controlled experiments by comparing the belief propagation algorithm and the graph cuts algorithm on the same MRF's, which have been created for calculating stereo disparities. We find that the labellings produced by the two algorithms are comparable. The solutions produced by graph cuts have a lower energy than those produced with belief propagation, but this does not necessarily lead to increased performance relative to the ground truth. |
12,897 | Please write an abstract with title: Collaborative Multi-Agent Resource Allocation in C-V2X Mode 4, and key words: Collaboration, Reinforcement learning, Road safety, Safety, Resource management, 3GPP, Vehicle-to-everything. Abstract: Intelligent Transport System (ITS) provides an efficient solution to road safety traffic. To support safety applications, cellular vehicle-to-everything (C-V2X) is developed by third generation partnership project (3GPP). C-V2X support two modes of communication as mode 3 and mode 4. In mode 4, vehicles reserve the resources based on their local observations using semi-persistent scheduling (SPS). If two vehicles, simultaneously select the same resources, it will lead to resource contention. This arises the consensus problem. To overcome this, in this paper we proposed the multi agent collaborative deep reinforcement learning based scheme. A single deep Q network (DQN) is trained for each zone. Each zone is preconfigured with resources which constitute a resource pool. A reward function is shared between the vehicles that belong to the same pool. This approach makes the vehicles to collaborate rather than compete in selecting the resources for their transmission. The proposed scheme is compared with the random resource allocation in C-V2X. The results show that the proposed scheme outperforms even in dense vehicular environment. |
12,898 | Please write an abstract with title: A Secure IWT Watermarking Technique using QR Decomposition and 2D Henon Maps, and key words: Location awareness, Wavelet transforms, Electrical engineering, Conferences, Watermarking, Robustness, Matrix decomposition. Abstract: Watermarking techniques are employed for protecting copyrights, preventing digital thefts and providing proof-of-authentications, document integrity, tamper detection and localization. Therefore, strong imperceptible watermarking techniques provide an interesting research area of the present era. In this paper, we endeavour to improve capacity and imperceptibility of the watermark using Integer Wavelength Transform (IWT) with QR decomposition under a 2D Henon map. The host image is transformed using the Integer Wavelength Transform to produce a 2×2 block matrix, in which the top-left block is decomposed using the QR decomposition technique. The watermarking image is encrypted with a Henon map before embedding it into the decomposed part of the host image to enhance the security. The tests were conducted on sensitive Arabic text images and plausible results were achieved. It is shown that the proposed watermarking technique can be used for images in order to attain better tamper detection and localization. |
12,899 | Please write an abstract with title: 400v switches for subscriber line interface, and key words: Voltage control, Coupling circuits, Optical switches, Switched capacitor circuits, Switching circuits, Optical arrays, Dielectrics, Decoding, Telephony, Optical coupling. Abstract: An integrated high voltage 4-switch device for 100mA continuous service and capable of withstanding 500mA surges will be described. The input is dielectrically isolated. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.