ID
int64
0
400k
content
stringlengths
97
5.85k
16,200
Please write an abstract with title: Integral Imaging Based Optical Image Encryption Using CA-DNA Algorithm, and key words: DNA, Encryption, Security, Imaging, Image coding, Encoding, Optical imaging. Abstract: Under the computational integral imaging-based security system, the application of Deoxyribonucleic Acid (DNA) encoding algorithm will cause silhouettes in the cipher image, thereby reducing the security of the system. To solve this problem, we introduced a cellular automata-based DNA (CA-DNA) algorithm, which effectively hides the distribution information of the original scene. It can prevent attackers from obtaining any valid information based on the statistical characteristics of the image, which makes our encryption system more security. At the same time, an improved high-resolution reconstruction algorithm is applied to achieve a high-quality decrypted scene. We conducted relevant experiments to certificate the effectiveness of proposed method. Experimental results verify that the scheme has high security and robustness.
16,201
Please write an abstract with title: Electromagnetically induced absorption and transparency in a single Raman spectrum, and key words: Electromagnetic wave absorption, Optical mixing, Atom optics, Nonlinear optics, Frequency conversion, Optical sensors, Resonance, Optical pumping, Optical scattering, Physics. Abstract: We report, observation of both electromagnetically induced absorption (ElA) and electromagnetically induced transparency (EIT) in sodium vapor in a single Raman spectrum. The sign of the of the coherent feature depends on whether the single-photon detuning favors four-wave mixing or coherent population trapping.
16,202
Please write an abstract with title: Interaction of Surface Gradient, Precipitation Rate and Conductor Surface Treatment on Corona Induced Audible Noise of AC Overhead Transmission Lines, and key words: Conductors, Standards, Surface discharges, Acoustic noise, Surface treatment, Corona, Rain. Abstract: Overhead Transmission lines are prone to emit audible noises under foul weather conditions (e.g. rain or fog), which can be a significant source of annoyance for people living close to the line. Apart from mere fulfilment of emission limits given by legislature, transmission system operators nowadays often seek to reduce audible noise emissions as far as possible to minimize public opposition towards overhead lines. A very promising approach for the reduction of audible noise emissions are hydrophilic conductor surface treatments, which influence the way water drops form on the conductors. However, very little is known about the operating behavior and limitations of hydrophilic conductors. This contribution therefore strives to illustrate how the electric field intensity around the conductors (surface gradient) and the precipitation rate affect the effectiveness and the emission behavior of hydrophilic conductors compared to standard conductors. The presented results are derived from a newly developed prediction model, which is based on noise emission measurements performed on 25 different bundle conductor arrangements carried out in an acoustically optimized high voltage laboratory. The compiled results indicate that hydrophilic surfaces can provide significant noise reductions, which tend to diminish with increasing surface gradient. Above a certain point of intersection, hydrophilic conductors exhibit higher emission levels than standard conductors. Since this behavior has been observed to depend strongly on the bundle conductor geometry, results for various numbers of sub-conductors and sub-conductor diameters are presented. From a practical point of view, this contribution shall raise awareness regarding the optimal utilization of hydrophilic conductors by illustrating the principal correlations and by providing first guidelines.
16,203
Please write an abstract with title: Layer-encoded video in scalable adaptive streaming, and key words: Streaming media, Scalability, Multimedia communication, Information technology, PSNR, Control systems, Computer science, Web and internet services, Protocols, Statistical analysis. Abstract: Combining the concepts of caching and transmission control protocol (TCP)-friendly streaming of layer-encoded video bears the problem that those videos might not be cached in full quality. Therefore, we focus in this work on the scheduling of retransmissions of missing segments of a cached video in a manner that allows clients to receive the content in an improved quality. In a first step, we conducted subjective assessments of variations in layer-encoded video with the goal to validate existing quality metrics, including our own, which are based on certain assumptions. A statistical analysis of the subjective assessment validates these assumptions. We also show that the frequently used peak signal-to-noise ratio (PSNR) is not an appropriate metric for variations in layer-encoded video. With the insight from the subjective assessment we develop heuristics for retransmission scheduling and prove their applicability by conducting a series of simulations.
16,204
Please write an abstract with title: Estimation of Individual Device Contributions for Incentivizing Federated Learning, and key words: Training, Performance evaluation, Estimation, Machine learning, Collaborative work, Mobile handsets, Data models. Abstract: Federated learning (FL) is an emerging technique used to collaboratively train a machine-learning model using the data and computation resources of mobile devices without exposing private or sensitive user data. Appropriate incentive mechanisms that motivate the data and mobile-device owner to participate in FL is key to building a sustainable platform. However, it is difficult to evaluate the contribution levels of participants to determine appropriate rewards without large computation and communication overhead. This paper proposes a computation- and communication-efficient method of estimating participants contribution levels. The proposed method requires a single FL training process, which significantly reduces overhead. Performance evaluations are done using the MNIST dataset, showing that the proposed method estimates participant contributions accurately with 46-49% less computation overhead and no communication overhead, as compared to a naive estimation method.
16,205
Please write an abstract with title: Stabilized Negative Resistance Emulating Control for Grid-Connected Inverter, and key words: Resistance, Inductance, Reactive power, Inverters, Steady-state, Synchronization, Impedance. Abstract: Resistance emulating control is attractive due to the advantages of ease to use and less voltage sensor. However, it is only suitable for rectification mode. This letter presents a simple stabilized negative resistance emulating control for inverter mode, which overcomes the limitation of the conventional resistance emulating control. To stabilize the converter, a stabilizer based on negative inductance emulating is designed. Moreover, the unity power factor is realized by the steady-state inductance emulating technique. Since only the input current information is required, this control scheme is cost effective and robust. Experimental results verify the effectiveness of the proposed method.
16,206
Please write an abstract with title: Anti-Drone System: A Visual-based Drone Detection using Neural Networks, and key words: Visualization, Surveillance, Neural networks, Birds, Sensors, Information and communication technology, Drones. Abstract: A system that secures an area from trespassing drones that might bring threat is in demand these days since drones became easily-available to the public and it became easier to operate. This paper proposes an anti-drone system that uses visual sensing to detect drones. A Faster R-CNN (Region-based Convolutional Neural Network) with ResNet-101 (Residual Neural Network-101) networks are used in this paper using a dataset from the SafeShore project. The network's accuracy is 93.40% and it has successfully detected drones in the simulation that has been done.
16,207
Please write an abstract with title: Operation-Adaptive Damage Assessment of Steam Turbines Using a Nonlinear Creep-Fatigue Interaction Model, and key words: Creep, Turbines, Fatigue, Stress, Strain, Rotors, Hip. Abstract: For sustainable operation, power plants require accurate damage assessment of the steam turbines used for power generation. In the past few decades, steam turbine designs have considered only steady-state operation, without accounting for thermal cyclic loads. However, steam turbines designed for steady-state operation are often subjected to operation under cyclic and transient operation as well; this situation can cause both creep and fatigue damage. Creep and fatigue damage can interact with each other, thereby significantly impacting performance and leading to premature failure. Thus, this study proposes operation-adaptive damage assessment for steam turbines using a nonlinear creep-fatigue interaction model. The three-fold novel aspects of this study include methods to: 1) adaptively determine the hyper-parameters embedded in the nonlinear creep-fatigue interaction model depending on the operation mode (i.e., base-load and peak-load); 2) incorporate actual operation data acquired from field-deployed steam turbines; and 3) interpret the creep-fatigue damage interaction diagram with respect to the operation modes. It can be concluded from the results that the nonlinear creep and fatigue damage interaction is significantly affected by the operation mode as well as by the type of dominant damage mechanism.
16,208
Please write an abstract with title: Learning Relation Models to Detect Important People in Still Images, and key words: Visualization, Feature extraction, Predictive models, Task analysis, Faces, Data models, Graph neural networks. Abstract: Important people detection aims to identify the most important people (i.e., the people who play the main roles in scenes) in images, which is challenging since people's importance in images depends not only on their appearance but also on their interactions with others (i.e., relations among people) and their roles in the scene (i.e., relations between people and underlying events). In this work, we propose the People Relation Network (PRN) to solve this problem. PRN consists of three modules (i.e., the feature representation, relation and classification modules) to extract visual features, model relations and estimate people's importance, respectively. The relation module contains two submodules to model two types of relations, namely, the person-person relation submodule and the person-event relation submodule. The person-person relation submodule infers the relations among people from the interaction graph and the person-event relation submodule models the relations between people and events by considering the spatial correspondence between features. With the help of them, PRN can effectively distinguish important people from other individuals. Extensive experiments on the Multi-Scene Important People (MS) and NCAA Basketball Image (NCAA) datasets show that PRN achieves state-of-the-art performance and generalizes well when available data is limited.
16,209
Please write an abstract with title: BER sensitivity to mistiming in correlation-based UWB, and key words: Bit error rate, Timing, RAKE receivers, Degradation, Pulse modulation, Ultra wideband technology, Correlators, Wireless communication, Amplitude modulation, Multiple access interference. Abstract: The unique advantages of ultrawideband (UWB) technology are somewhat encumbered by its stringent timing tolerances. To help to appreciate how critical timing offset estimation is for UWB, the bit-error-rate (BER) sensitivity to timing offsets is investigated in this paper for correlation-based UWB receivers. Focusing on UWB transmissions with time hopping, the BER expressions are derived for various operating conditions and system setups, including AWGN and frequency flat channels, dense multipath fading channels, and various receiver types including sliding correlators and RAKE combiners. It is demonstrated through analyses that time-hopping based multiple access systems exhibit little tolerance to acquisition errors, while the energy capture capability of a RAKE combiner can be severely compromised by mistiming.
16,210
Please write an abstract with title: Optimal Huffman coding of DCT blocks, and key words: Huffman coding, Discrete cosine transforms, Image coding, Transform coding, Video compression, Compression algorithms, Codecs, Pixel, Quantization, Entropy. Abstract: It is a well-observed characteristic that, when a discrete cosine transform block is traversed in the zigzag order, ac coefficients generally decrease in size and the runs of zero coefficients increase in length. This paper presents a minor modification to the Huffman coding of the JPEG baseline compression algorithm to exploit this characteristic. During the run-length coding, instead of pairing a nonzero ac coefficient with the run-length of the preceding zero coefficients, our encoder pairs it with the run-length of subsequent zeros. This small change makes it possible for our codec to code a pair using a separate Huffman code table optimized for the position of the nonzero coefficient denoted by the pair. These position-dependent code tables can be encoded efficiently without incurring a sizable overhead. Experimental results show that our encoder produces a further reduction in the ac coefficient Huffman code size by about 10%-15%.
16,211
Please write an abstract with title: Investigating Students' Strengths and Difficulties in Quantum Computing, and key words: quantum computing, evidence-based materials, quantum workforce, teaching, learning. Abstract: Quantum Computing is an exciting field that draws from information theory, computer science, mathematics, and quantum physics to process information in fundamentally new ways. There is an ongoing race to develop practical/reliable quantum computers and increase the quantum workforce. This needs to be accompanied by the development of quantum computing programs, courses and curricula coupled with the development and adoption of evidence-based materials and pedagogies to support the education of the next generation of quantum information scientists and workforce. At our university, we introduced an introductory course in Quantum Computing to undergraduate students and conducted a case study to investigate the strengths and difficulties of these students in quantum computing after taking the introductory course. Our goal is to contribute to the improvement of quantum computing education while understanding the topics that the students find easy to comprehend and topics that are difficult to comprehend. We conducted a series of interviews to identify these strengths and difficulties. This investigation is essential to help train the next generation of quantum scientists and researchers because it gives information and direction to quantum computing education, and it also helps us to develop research-based teaching and learning materials. We report on the results of these interviews and our initial work on the development of evidence-based materials for teaching an introductory course in Quantum Computing.
16,212
Please write an abstract with title: Efficiently processing query-intensive databases over a non-dedicated local network, and key words: Relational databases, Scalability, Computer networks, Parallel processing, Hardware, Power system management, Concurrent computing, Costs, Database systems, Computer network management. Abstract: Commercial database systems must typically rely on fast hardware platforms and interconnects to deal efficiently with data in parallel. However, cheap computing power can be applied for flexibility and scalability in managing large data volumes if the right choices are made concerning data placement and processing. Our work concentrates on the use of cheap computing power in possibly slow, non-dedicated local networks to achieve a computing power over demanding query-intensive databases that would be unachievable without expensive specialized hardware and massively parallel systems. The Node Partitioned Data Management System (NPDM) works on computing nodes on non-dedicated local networks. In this paper we concentrate on query transformations required for efficient processing over a specialized query-intensive schema. The decision support benchmark TPC-H is used as a study case for the transformations and for experimental analysis.
16,213
Please write an abstract with title: Research on Chinese Text and Application Based on the Latent Dirichlet Allocation, and key words: Natural language processing, Chinese word segmentation, Text clustering, Latent Dirichlet Allocation. Abstract: Chinese text research has always been a hot and difficult point in natural language processing. On the one hand, Chinese and English are very different in grammar, resulting in the uniqueness of Chinese word segmentation. On the other hand, Chinese part of speech tagging methods are also different from English. To some extent, the above two points hinder the research and application of natural language processing technology in Chinese text. The paper presents a word segmentation algorithm for Chinese text, and then introduces how to use vector space model to represent Chinese text. At the same time, the topic number k is given according to different criteria for measuring text clustering in order to build the Latent Dirichlet Allocation model base on Guangdong Province consumer complaint text. Through the model to assist the administrative departments to formulate corresponding policies, to grasp the key points of complaints accurately and quickly for the administrative personnel.
16,214
Please write an abstract with title: A comparison of run-to-run control algorithms, and key words: Process control, Automatic control, Electric variables control, Feedback loop, Inductors, Conductors, Industrial control, Predictive models, Predictive control, Chemical processes. Abstract: Run-to-run control is the term used for the application of batch process control as practiced in the semiconductor industry. This paper gives a brief introduction to the fundamental parts of a run-to-run control algorithm and surveys several of the popular techniques for the application of this control methodology. In particular, model predictive control is explored as a robust and flexible technique for implementing run-to-run control.
16,215
Please write an abstract with title: A Middleware for Secure Integration of Heterogeneous Edge Devices, and key words: Protocols, Computational modeling, Computer architecture, Data collection, Security, Gain control, Middleware. Abstract: Connected devices are being deployed at a steady rate, providing services like data collection. Pervasive applications rely on those edge devices to seamlessly provide services to users. To connect applications and edge devices, using a middleware has been a popular approach. The research is active on the subject as there are many open challenges. The secure management of the edge devices and the security of the middleware are two of them. As security is a crucial requirement for pervasive environment, we propose a middleware architecture easing the secure use of edge devices for pervasive applications, while supporting the heterogeneity of communication protocols and the dynamism of devices. Because of the heterogeneity in protocols and security features, not all edge devices are equally secure. To allow the pervasive applications to gain control over this heterogeneous security, we propose a model to describe edge devices security. This model is accessible by the applications through our middleware. To validate our work, we developed a demonstrator of our middleware and we tested it in a concrete scenario.
16,216
Please write an abstract with title: Minimal feedback optimal algorithms for traffic engineering in computer networks, and key words: Feedback, Telecommunication traffic, Intelligent networks, Computer networks, Optimal control, Tellurium, Aggregates, Robust control, Sliding mode control, Communication system traffic control. Abstract: This paper addresses the problem of traffic engineering in computer networks. More precisely, optimal data rate adaptation laws are provided, which are applicable to networks where both multiple paths are available between any pair of source/destination nodes and multiple classes of service are to be provided. In particular, it is shown that the algorithms presented only need a minimal amount of information to achieve the optimal operating point. More precisely, they only require knowledge of whether a path is congested or not. Hence, the control laws provided in this paper require much less feedback than currently available ones. The proposed approach is applicable to utility functions of a very general form and endows the network with the very important property of robustness with respect to node/link failures; i.e., upon the occurrence of such failure, the presented control laws reroute traffic away from the inoperative node/link and converge to the optimal allocation for the "reduced" network.
16,217
Please write an abstract with title: Holography challenges on coding and quality assessment, and key words: Visualization, Three-dimensional displays, Europe, Information processing, Holography, Encoding, Quality assessment. Abstract: Holography is certainly the richer plenoptic format that still faces enormous challenges to make it an effective and reliable technological solution for multiple applications. Although digital holograms can provide a very detailed representation of the 3D information, they can easily result in huge amounts of data, requiring efficient compression for storage and trans-mission. Nowadays, both coding and quality evaluation of the coding technology is very challenging, despite the research effort dedicated to this data in recent years. Standard compression techniques tend to perform poorly due to the significantly different nature of the holographic data.The quality evaluation of different compression methodologies is another challenge. The 3D nature of holograms leads to very difficult representations, considering the current limitations of 3D displaying technologies. Moreover, current studies did not find suitable objective evaluation models. This paper describes the current state of the art in both compression and quality evaluation of digital holographic data. The current challenges and possible solutions will be considered.
16,218
Please write an abstract with title: The isomorphic fuzzy relations and fuzzy quotient spaces, and key words: Fuzzy sets, Computer science, Fuzzy set theory, Set theory, Humans, Cognition, Mathematics, Data mining, Topology. Abstract: This paper discussed the relation between FS and QS by theory of the isomorphism and homomorphism of fuzzy relations, and a main conclusion was reached. First, the following two statements are equivalent: (1) a group of fuzzy equivalence relations which are isomorphic for each other given in universe X; (2) a fuzzy quotient space [X] and a fuzzy quotient structure space ([X],d) given in X. Second, the construction of the fuzzy quotient space is given. The preliminary results have established the connection between fuzzy sets and quotient spaces.
16,219
Please write an abstract with title: Experimental Validation of the Open-Source DMPC Framework GRAMPC-D applied to the Remotely Accessible Robotarium, and key words: Mechatronics, Software algorithms, Control systems, Prediction algorithms, Convex functions, Real-time systems, Hardware. Abstract: The open-source framework GRAMPC-D enables controlling systems based on distributed model predictive control (DMPC) by providing an implementation that is capable of solving the Alternating Direction Method of Multipliers algorithm (ADMM) in the millisecond range. It supports communication over a network and plug-and-play mechanisms. This paper presents an experimental validation of GRAMPC-D applied to the multi-agent laboratory Robotarium. In the first experiment, a distribution problem is considered, whereby four robots maximize the distance between them. A formation control scenario is evaluated in the second scenario, whereby eleven robots form a rotating letter “G”. In the third experiment, a platooning scenario is evaluated in combination with plug-and-play mechanisms. The per-agent computation time in each experiment is lower than the sampling time. As these scenarios would exceed the system class that is currently considered in the implementation of GRAMPC-D, it is extended to consider agents that are coupled in their cost functional.
16,220
Please write an abstract with title: On parameter-dependent Lyapunov functions for robust stability of linear systems, and key words: Robust stability, Linear systems, Polynomials, Lyapunov method, Uncertainty, Convergence of numerical methods, Robustness, Design methodology, Linear matrix inequalities, Linear algebra. Abstract: For a linear system affected by real parametric uncertainty, this paper focuses on robust stability analysis via quadratic-in-the-state Lyapunov functions polynomially dependent on the parameters. The contribution is twofold. First, if n denotes the system order and m the number of parameters, it is shown that it is enough to seek a parameter-dependent Lyapunov function of given degree 2nm in the parameters. Second, it is shown that robust stability can be assessed by globally minimizing a multivariate scalar polynomial related with this Lyapunov matrix. A hierarchy of LMI relaxations is proposed to solve this problem numerically, yielding simultaneously upper and lower bounds on the global minimum with guarantee of asymptotic convergence.
16,221
Please write an abstract with title: Towards Controllability Analysis of Dynamic Networks Using Minimum Dominating Set, and key words: Classification algorithms, Heuristic algorithms, Computational modeling, Testing, Orbits, Proteins. Abstract: Finding a minimum dominating set is a classic NP-hard problem from graph theory. Given a finite, simple, undirected graph, it seeks a smallest set of vertices with the property that every vertex in the graph is either in or adjacent to at least one member of that set. In recent years, it has found increased application, particularly when used as the basis for classifying nodes of biological networks. Sample networks include those derived from metabolic, noncoding RNA and protein-protein interaction data. Classification schemes employed to date, however, have typically been limited by the need to solve multiple problem instances, which naturally constrains the size of amenable networks. Moreover, analytical methods based on minimum dominating set have thus far generally been limited to static graphs. In this paper, work in progress is described that improves upon these algorithms and applies them to dynamic streaming graphs in order to capture control structures as they evolve over time. Results demonstrate the effectiveness of these techniques at reducing computational overhead. A systematic experimental setup and a description of testbed construction is also provided.
16,222
Please write an abstract with title: Classification of Dry Beans Using Image Features, and key words: Self-organizing feature maps, Computational modeling, Data visualization, Optical imaging, Feature extraction, Mobile communication, Hardware. Abstract: This paper presents human-understandable methods for automated classification of dry beans using features extracted from optical images. It presents a detailed study of these features in the context of classification by examining their merits and the effect of using a reduced feature set. It also presents the results of constructing self-organizing maps (SOMs) for these features. An important result is that classification limited to human-understandable methods for this task does not incur any penalty in accuracy and comes with the benefit of significantly lower computational costs. Another result is that SOMs applied to this data provide a useful visualization that invites further study.
16,223
Please write an abstract with title: Efficient Decoupled Neural Architecture Search by Structure And Operation Sampling, and key words: Training, Machine learning algorithms, Conferences, Signal processing algorithms, Reinforcement learning, Signal processing, Speech processing. Abstract: We propose a novel neural architecture search algorithm via reinforcement learning by decoupling structure and operation search. Our approach samples candidate models from the multinomial distribution over the policy vectors. The proposed technique improves the efficiency of architecture search significantly compared to the existing methods while achieving competitive classification accuracy and model compactness. Our policy vectors are easily interpretable throughout the training procedure, which allows analyzing the search progress and the identified architectures. Note that, on the contrary, the black-box characteristics of the conventional methods based on RNN controllers hamper understanding training progress in terms of policy parameter updates. Our experiments demonstrate the outstanding performance of our approach compared to the state-of-the-art techniques with a fraction of search cost.
16,224
Please write an abstract with title: GMR head side-reading and bit aspect ratio, and key words: Magnetic heads, Geometry, Magnetic separation, Magnetic shielding, Disk drives, Laplace equations, Mirrors, Conformal mapping, Frequency, Degradation. Abstract: In this paper, we have derived approximate solutions for intermediate cases of side-shielding, and have employed a simple model to see if this suggests a practical lower limit to BAR.
16,225
Please write an abstract with title: Two types of novel micro-motors based on electro-mechanical interaction between slow wave and moving medium, and key words: Micromotors, Conductors, Radio frequency, Periodic structures, Micromechanical devices, Microwave devices, Stators, Radiofrequency microelectromechanical systems, Electromagnetic scattering, Electromagnetic forces. Abstract: Floquet theorem is used to show that electromagnetic slow wave can interact with moving dielectric or conductor and produce stable force density. Some basic mathematical formulations are described to compute such force density. Although only the lowest Floquet order is studied to illustrate the effectiveness of the interaction, the fundamental working principles for two types of novel RF micro-motors are shown to be possible.
16,226
Please write an abstract with title: Comparative Study of Single Source Boosted Multilevel Half-Bridge Inverter and Single Source Boosted Multilevel H-Bridge Inverter, and key words: Multilevel Inverter, PWM, switched-capacitor cell, H-bridge inverter, Half bridge Inverter, THD. Abstract: This paper compares a single source boosted multilevel half-bridge inverter with a single source boosted multilevel H-bridge inverter. A comparative analysis is conducted to compare the performance of the half-bridge MLI with H-bridge MLI by evaluating and analyzing their respective output voltage and current rms, output voltage and current % THD, and power efficiency. Both topologies are supplied with the same PI output voltage controller to control the output voltage and share the same non-PWM square wave inverter gate drive. Simulation results reveal that half-bridge MLI outperforms H-bridge MLI by yielding better results for performance parameters in response to variable and fixed loads. The paper therefore concludes that the half-bridge MLI is more power efficient and delivers better power quality than that of the H-bridge MLI.
16,227
Please write an abstract with title: ECG Signal Processing for Early Detection of Atrial and Ventricular Fibrillation Based on R-R Interval, and key words: Electrocardiography, Band-pass filters, Microcontrollers, Image edge detection, Detectors, Atrial fibrillation, Signal processing. Abstract: Atrial and ventricular fibrillation are considered as frequent cardiac arrhythmias. Therefore, early detection of both fibrillation is important to support medical treatment. In this paper, design of detector circuit for atrial and ventricular fibrillation using R-R interval of electrocardiogram (ECG) signals is reported and considered as a solution for early detection. The detector circuit was designed using easy buy components. The ECG signals were classified as Normal Sinus Rhythm (NSR) when the R-R interval is detected regularly, Atrial Fibrillation (AF) when the R-R interval is detected irregularly, and Ventricular Fibrillation (VF) when the R-R interval is not detected. The system was directly tested using three human bodies for NSR category. Due to some limitations, three recorded ECG signals for each AF and VF were taken from PhysioNet database as samples. The system obtained square waves with amplitude of 5 V where every rising edges indicate R peaks. Experiment results show that the system can classify correctly.
16,228
Please write an abstract with title: Sensor data fusion for inertial navigation of trains in GPS-dark areas, and key words: Sensor fusion, Inertial navigation, Satellite navigation systems, Rail transportation, Global Positioning System, Calibration, Robustness, Sensor phenomena and characterization, Accelerometers, Testing. Abstract: The motivation of the presented work is to develop a robust navigation system for accurate localization of trains on railway tracks in the cases where the GPS-based navigation is not temporally available. As the final solution of the train locator naturally takes into consideration the satellite-based navigation, the satellite signal needs not to be available all along the railway. The presented contribution describes an approach to preprocessing and fusing of additional train onboard sensors - the odometer and accelerometer, all targeted to serve as optional and temporary substitution for GPS navigation. The suggested solution is exploring a rule-based substitutions and mutual calibrations of the used sensors depending on actual conditions. The given approach relies on the GPS system only to provide position calibrations and serves a reference method for evaluation of the presented results. Suggested solutions have been experimentally tested with real-world data gathered with locomotive onboard inertial sensors.
16,229
Please write an abstract with title: Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup, and key words: Training, Deep learning, Measurement, Analytical models, Computational modeling, Neural networks, Side-channel attacks. Abstract: In recent years, various deep learning techniques have been exploited in side channel attacks, with the anticipation of obtaining more satisfactory attack results. Most of them con-centrate on improving network architectures or putting forward novel metrics, assuming that there are adequate profiling traces available to train an appropriate neural network. However, in practical scenarios, profiling traces are probably insufficient, which makes the network learn deficiently and compromises attack performance. In this paper, we investigate a kind of data augmentation technique, called mixup, and first propose to exploit it in deep-learning based side channel attacks, for the purpose of expanding the profiling set and facilitating the chances of mounting a successful attack. We utilize mixup to generate new traces and perform Correlation Power Analysis for generated traces and original traces. The analysis reveals that the leakage location and leakage intensity between them are consistent. In view of this observation, we consider it feasible to add generated traces to the original profiling set. Our verifying experiments show that mixup is truly capable of enhancing attack performance especially for insufficient profiling traces. Specifically, when the size of the training set is decreased to 30% of the whole set, mixup can almost reduce required attacking traces to half. We test three mixup parameter values and conclude that generally all of them can bring about improvements. Besides, we compare three leakage models and surprisingly discover that least significant bit model, which is less frequently used in previous works, actually surpasses prevalent identity model and hamming weight model in terms of attack results.
16,230
Please write an abstract with title: Dynamic sub-mesh protection under dynamic traffic demands in dense WDM networks, and key words: Telecommunication traffic, Intelligent networks, WDM networks, Protection switching, Traffic control, Spine, Network topology, Wavelength division multiplexing, Optical fiber networks, Optical design. Abstract: Network survivability is a key issue in reliable WDM optical network design to assure the service guarantee to customers. Rather than conventional connection link/ path/subpath based protection switching scheme, we propose protection group (submesh)-based approach to fast recover traffic from single/multiple link/node failures. By the group-based spare resource discovery and exploitation, the local channel utilization of network are maximized and hence enhance the overall quality of protection. The simulation results show that the local resource utilization and restoration time are efficient under heavy load in the dynamic traffic environment over dense mesh backbone networks.
16,231
Please write an abstract with title: A Fast Heuristic for Gateway Location in Wireless Backhaul of 5G Ultra-Dense Networks, and key words: Logic gates, Clustering algorithms, Genetic algorithms, Wireless communication, 5G mobile communication, Biological cells, Ultra-dense networks. Abstract: In 5G ultra-dense networks, a distributed wireless backhaul is an attractive solution for forwarding traffic to the core. The macro-cell coverage area is divided into many small cells. A few of these cells are designated as gateways and are linked to the core by high-capacity fiber optic links. Each small cell is associated with one gateway and all small cells forward their traffic to their respective gateway through multi-hop mesh networks. We investigate the gateway location problem and show that finding near-optimal gateway locations improves the backhaul network capacity. An exact p-median integer linear program is formulated for comparison with our novel K-GA heuristic that combines a Genetic Algorithm (GA) with K-means clustering to find near-optimal gateway locations. We compare the performance of K-GA with six other approaches in terms of average number of hops and backhaul network capacity at different node densities through extensive Monte Carlo simulations. All approaches are tested in various user distribution scenarios, including uniform distribution, bivariate Gaussian distribution, and cluster distribution. In all cases, K-GA provides near-optimal results, achieving average number of hops and backhaul network capacity within 2% of optimal while saving an average of 95% of the execution time.
16,232
Please write an abstract with title: Thermochemical High-ordered Surface Structure Formation with an Astigmatic Gaussian Beam on Metal Thin Films, and key words: Laser beams, Hafnium, Fabrication, Springs, Surface treatment, Periodic structures. Abstract: We present the results of high-ordered surface structure formation by femtosecond laser pulses (λ =1026 nm, τ = 232 fs) using an astigmatic Gaussian beam on the surface of thin metal films (thickness 30-40 nm) of Cr and Hf sputtered on the glass substrate. The difference in the structure quality and formation performance between the cases of Cr and Hf metal films was analyzed. The fabrication productivity increase by an order of magnitude was achieved in the case of Hf metal film.
16,233
Please write an abstract with title: Energy barriers in magnetic random access memory elements, and key words: Random access memory, Magnetic anisotropy, Perpendicular magnetic anisotropy, Magnetoelasticity, Energy barrier, Micromagnetics, Finite element methods, Magnetization reversal, Shape, Anisotropic magnetoresistance. Abstract: Minimum energy paths and energy barriers are calculated for the free data layer in elliptical magnetic random access memory elements using a recently developed method that combines the nudged elastic band method with finite-element micro-magnetics. The method calculates the magnetic states along the most probable reversal paths for applied fields below the zero temperature switching field. The reversal mode in the minimum energy path depends on the strength of the external field. With increasing easy axis field, the reversal mode becomes more inhomogeneous than at lower fields.
16,234
Please write an abstract with title: Application of 3D Printing in the Development of Lumbar Puncture and Epidural Simulators, and key words: Resistance, Irrigation, Solid modeling, Costs, Medical services, Needles, Electron tubes. Abstract: This paper presents the development of 3D printed models of a lumbar puncture simulator and an epidural puncture simulator. For the lumbar puncture simulator two “pops” or losses of resistance were simulated when the needle penetrates 1) the ligamentum flavum ligament through the epidural space and 2) the dura mater which is a membrane of the thecal. A plastic tube inserted inside a silicone rubber tube gave the most realistic and second “pop.” The lumbar puncture simulator also included a partial plastic tube (with a foam insert) and a partial rubber tube that surrounded the plastic tube to simulate the first “pop.” For the epidural puncture simulator the needle does not enter as far as the lumbar puncture and only goes through the ligamentum flavum and then enters the epidural space. The simulators are being integrated into the Simulation Based Learning Experiences (SBLEs) in the College of Nursing.
16,235
Please write an abstract with title: The Relevancy of Electrical Measurements to Determine Plasma Region Extension in a Coaxial SDBD Plasma Jet, and key words: Discharges (electric), Electrodes, Plasmas, Voltage measurement, Surface discharges, Plasma measurements, Plasma jets. Abstract: A coaxial electrode configuration with surface dielectric barrier discharge is designed to generate a cold plasma jet emerging into the ambient air. A technique to determine the length of plasma extension based on the measurements of average values of current and applied voltage is proposed. The capacity of the discharge cell calculated using current and voltage values agrees with the capacity obtained from the integral length of a plasma layer along a dielectric surface. The average charge deposited on the dielectric surface is determined.
16,236
Please write an abstract with title: Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans, and key words: Machine learning algorithms, Art, Scalability, Supply chains, Machine learning, Implants, Hardware. Abstract: The globalized semiconductor supply chain significantly increases the risk of exposing System-on-Chip (SoC) designs to malicious implants, popularly known as hardware Trojans. Traditional simulation-based validation is unsuitable for detection of carefully-crafted hardware Trojans with extremely rare trigger conditions. While machine learning (ML) based Trojan detection approaches are promising due to their scalability as well as detection accuracy, ML-based methods themselves are vulnerable from Trojan attacks. In this paper, we propose a robust backdoor attack on ML-based Trojan detection algorithms to demonstrate this serious vulnerability. The proposed framework is able to design an AI Trojan and implant it inside the ML model that can be triggered by specific inputs. Experimental results demonstrate that the proposed AI Trojans can bypass state-of-the-art defense algorithms. Moreover, our approach provides a fast and cost-effective solution in achieving 100% attack success rate that significantly outperforms state-of-the art approaches based on adversarial attacks.
16,237
Please write an abstract with title: Electron microscopic and X-ray diffraction investigations of nanostructured thin films of ZnO, and key words: Electron microscopy, X-ray diffraction, Transistors, Zinc oxide, Transmission electron microscopy, X-ray scattering, Crystallization, Nanostructured materials, Shape, Lattices. Abstract: ZnO films prepared by sol-gel technique using zinc nitrate and zinc acetate as precursor material have been studied using transmission electron microscopy (TEM) and X-ray diffraction (XRD) techniques. The results show the formation of zinc oxide phase. The nanostructure of the films was studied by transmission electron microscopy. Nano-structured fine grains of size ranging from 20-60 nm were observed with zinc nitrate precursor film. Individual grains show a sharp contrast with different facets and boundaries. Films prepared by zinc acetate precursor show ultra-fine nano-grains in the shape of dendrites as seen by the TEM. XRD shows a larger size of crystallites with the zinc acetate precursor. Crystal planes and lattice parameters calculated by both electron diffraction and X-ray diffraction are quite close and in agreement with the reported values in literature.
16,238
Please write an abstract with title: Extraction of phonemic variation rules in continuous speech spoken by multiple speakers, and key words: Data mining, Speech recognition, Speech processing, Speech analysis, Information processing, System testing, Automatic speech recognition, Convergence. Abstract: This paper describes an interactive extraction of phonemic variation rules in continuous speech spoken by multiple speakers. To realize a continuous speech recognizer, we must first develop a highly accurate phoneme recognizer. The major problem related to phoneme recognizers is the phonemic variations in continuous speech. Our work focuses on the interactive analysis of phonemic variations in continuous speech and the extraction of the phonemic variation rules for many speakers. We extracted 317 rules related to 21 kinds of phonemic variation phenomena from 10,000 Japanese-language phrases spoken by 10 male speakers. With these rules, 97.6% of 36,000 Japanese-language phrases spoken by 36 test speakers (30 males and 6 females) were correctly segmented by our top-down phoneme segmentation system. Furthermore, a subset of the rules for each speaker was automatically obtained. On average, each subset contains 53.2% of the rules.
16,239
Please write an abstract with title: Click Fraud Detection of Online Advertising–LSH Based Tensor Recovery Mechanism, and key words: Tensors, Advertising, Data models, Prediction algorithms, Machine learning algorithms, Internet, Social networking (online). Abstract: Online advertising utilizes the Internet technique to deliver marketing messages to promotional consumers. It is growing in recent years to facilitate the increasing demands of electronic commerce. Advertisers bid and pay for the advertisement whenever potential customers click it. The way of Pay-Per-Click (PPC) is vulnerable to malicious clicks that mimic real user behaviour to trick the platform into counting their clicks as legitimate. It causes massive financial losses on advertisers and also significantly reduces the credibility of online advertising platforms. The common strategies to detect fraud clicks are dynamically tailoring and interpreting data based on the machine learning model. These algorithms treat multi-dimensional data as an individual feature vector or matrix, making it different to explore intrinsic relations among a sequence of data. Million daily fraud clicks on various types further disperse the focus of models and result in relatively low efficiency for the current fraud prediction system. To tackle the fraud click problem, we introduce a tensor-based mechanism to predict fraud clicks. This paper considered reconstructing data into a high-rank tensor, implement tensor decomposition and transformation to explore hidden information under each data and explore the joined effect among a sequence of data. The proposed tensor transformation algorithm with locality-sensitive hashing (LSH) is tested by extensive experiments using real-world data. Compared with the state-of-art machine learning algorithms, our model can achieve significant performance in terms of accuracy and prediction-recall rate.
16,240
Please write an abstract with title: Semidefinite Programming Algorithms for Sensor Network Localization using Angle Information, and key words: Wireless sensor networks, Euclidean distance, Image sensors, Laboratories, Computational modeling, Target tracking, Routing, Iterative methods, Multidimensional systems, Geometry. Abstract: The problem of position estimation in sensor networks using a combination of distance and angle information as well as pure angle information is discussed. For this purpose, a semidefinite programming relaxation based method that has been demonstrated on pure distance information is extended to solve the problem. Practical considerations such as the effect of noise and computational effort are also addressed. In particular, a random constraint selection method to minimize the number of constraints in the problem formulation is described. The performance evaluation of the technique with regard to estimation accuracy and computation time is also presented by the means of extensive simulations
16,241
Please write an abstract with title: Smart Meter in Voltage Control System of Power Network, and key words: Voltage control, Meters, Protocols, Smart meters, Cloud computing, Task analysis, Standards. Abstract: The use of microgeneration in low-voltage (LV) power networks based on prosumer solar installations (PV) has brought many benefits. Larger scale power generation can also have undesirable effects - including dynamic voltage changes that exceed limits. The paper presents a model of communication channel for remote data reading from a 3-phase energy meter in terms of using the meter as a sensor in the voltage control system in the low-voltage power network. The model uses the LoRaWAN network based on the LoriotOR cloud platform and the developed DLMS protocol converter to the LoRa protocol, which as an end node connected to the meter interface. The test results of the developed smart meter in voltage control system of power network are presented in the article.
16,242
Please write an abstract with title: Optimal design of an automatic control system for submerged hydrofoil boats operating in a random seaway, and key words: Force control, Sea surface, Control systems, Sea measurements, Hydrodynamics, Fluid flow control, Additive noise, Force sensors, Proportional control, Acceleration. Abstract: A novel design procedure is applied to hydrofoil boat control systems; it is referred to as the Specific Linear Optimal Control Optimization Problem (SLOCOP). Also described is the minimization algorithm, GRASP, which is used to produce numerical SLOCOP solutions. SLOCOP requires that the boat motion satisfy linear differential equations and results in a linear feedback law. The forcing function is a discretized Pierson-Moskowitz random seaway. The free-surface effects, orbital particle velocity, and unsteady lift are modeled as sums of outputs of linear oscillators subject to random initial conditions. Surge, heave, and pitch degrees of freedom are considered. Control surfaces are actuated using fluid power. Noisy sensors for wave height, acceleration, attitude, and rate are assumed. The objective is to minimize acceleration while maintaining the foils near trim depth and control deflections within cavitation limits. The relationship of horsepower capacity to performance is also sought.
16,243
Please write an abstract with title: Analitical modeling for design of heated microbridge applied in catalytic gas microsensors, and key words: Microsensors, Temperature, Heat transfer, Thermal conductivity, Equations, Resistance heating, Mathematical model, Analytical models, Bridges, Thermal resistance. Abstract: This paper is concerned with the analitical investigation of the heat transfer mechanisms through the heated microbridge. The results are used for design a heated microbridge applied in catalytic gas microsensors.
16,244
Please write an abstract with title: Shop floor scheduling with simulation based proactive decision support, and key words: Job shop scheduling, Manufacturing processes, Plastics, Telecommunication control, Planning, Production engineering, Analytical models, Manufacturing systems, Manufacturing industries, Production facilities. Abstract: This paper involves the study of a simulation based proactive decision support module for the shop-floor scheduling of the plastic processing section (PPS) at Bharti Telecom Limited, Gurgaon, India. The flow of material and information in this shop is highly complex as it involves multiple product parts, sequence dependent setup, molding machine specifications, mould restrictions etc. with a variety of scheduling and operational choices. The shop floor planning and scheduling decisions are being exercised manually and there is enough scope of using this simulation based tool to improve the shop-performance. In this work, efforts have been made to simulate the scheduling environment of this section. The performance of the shop depends on various parameters such as initial conditions of the machines, the load on the system, sequencing rule etc. Also the user requirements are so varied and situation dependent that it requires the use of simulation techniques to get a better schedule. Further, there are some findings based on the simulation experiments, which are in the process of implementation in the shop.
16,245
Please write an abstract with title: On a development of sparse PCA method for face recognition problem, and key words: Support vector machines, Image recognition, Tensors, Face recognition, Fingers, Finance, Fingerprint recognition. Abstract: Face recognition is a very significant branch of application in the pattern recognition area. It has multiple applications in the military and finance, to name a few. In reality, sometimes we have to deal with sparse representation of the facial data. In this paper, to deal with sparsity, two advanced versions of Sparse PCA are developed, including Proximal Gradient Sparse PCA (PG Sparse PCA) and Fast Iterative Shrinkage-Thresholding Algorithm Sparse PCA (FISTA Sparse PCA). Then they will be respectively applied to solve the face recognition problem by considering their combination with nearest-neighbor method and with the kernel ridge regression method. Experimental results illustrate that the accuracies of PG Sparse PCA and FISTA Sparse PCA are equivalent in the combination with nearest-neighbor, while PG Sparse PCA performs better than FISTA Sparse PCA in the case of using kernel ridge regression. However, we recognize that the computing process of FISTA Sparse PCA, on average, is always faster than the PG sparse PCA version due to the use of a fast proximal gradient version.
16,246
Please write an abstract with title: The evolution of wireless mobile data communication technologies and their market opportunities, and key words: Wireless communication, Data communication, Communications technology, Market opportunities, Web and internet services, Personal communication networks, Wireless networks, Circuits, Communication industry, Telecommunication computing. Abstract: The cellular industry has been very successful in providing voice services to consumers and business. The next big opportunity for wireless networks will be differentiation based on data and multimedia services. Wireless service providers face ever-increasing pressure to offer innovative services, new capabilities, and make more efficient use of spectrum. In order to meet these needs, existing wireless networks have evolved with new technology both in the air interface and the core network. Specifically, the wireless mobile data communication technologies have evolved from the circuit switched second-generation (2G) networks to 2.5G and then to the third generation (3G) networks and beyond. The paper describes how the revolution of wireless communications, the wireless mobile data industry, evolution of wireless mobile data communication technologies, the wireless mobile data market and the failing barriers to wireless data proliferation.
16,247
Please write an abstract with title: A Smart Waste Management and Segregation System that Uses Internet of Things, Machine Learning and Android Application, and key words: Waste management, Procurement, Systematics, Smart cities, Process control, Machine learning, Pressing. Abstract: In this environment of accelerated development around the world, more and more waste is generated by direct or indirect means. A daily generation of waste in tons requires an effective management technique. If not done suitably, virtually unlimited amounts of open spaces will be required to dump the waste. The system proposed in this research will lend a hand to solve these waste management problems. The main constituent of this system is a waste bin which will automatically segregate the waste by employing technologies such as Internet of Things and Machine Learning. The bin is connected to the cloud to assist in systematic waste collection by tracking and uploading various data points for a particular bin. A group of these bins will help in efficient garbage collection and management starting from the origin of the waste itself. An Android application which is also a part of this system will assist the relevant authorities to manage the bins as per real time requirements. Two versions of the system are elaborated in this paper with the first version achieving an accuracy of 75% in classifying the waste as wet or dry whereas the second version achieves an accuracy of 90% when segregating the waste into six distinct categories.
16,248
Please write an abstract with title: Simulations and Measurements of the Effect of Beam Sweeping in the EMF level in 5G Communication Systems, and key words: 5G mobile communication, OFDM, Antenna measurements, Antennas, Electromagnetics, Base stations, Amplitude modulation. Abstract: The aim of this contribution is to discuss some problems regarding the measurement of the Electromagnetic Field Exposure (EFE) in 5G communication systems, with particular reference to the current 'first' generation of 5G systems. In particular, it will clarify how the smart use of the time/frequency/space resource of the communication channel impacts on the estimation of the EFE. Some approaches for EFE estimations are proposed, and tested on real 5G systems.
16,249
Please write an abstract with title: A de-centralized scheduling and load balancing algorithm for heterogeneous grid environments, and key words: Load management, Scheduling algorithm, Multiprocessing systems, Processor scheduling, Resource management, NASA, Clocks, Computer science, Computational modeling, Message passing. Abstract: In the past two decades, numerous scheduling and load balancing techniques have been proposed for locally distributed multiprocessor systems. However they all suffer from significant deficiencies when extended to a Grid environment: some use a centralized approach that renders the algorithm unscalable, while others assume the overhead involved in searching for appropriate resources to be negligible. Furthermore, classical scheduling algorithms do not consider a Grid node to be N-resource rich and merely work towards maximizing the utilization of one of the resources. In this paper, we propose a new scheduling and load balancing algorithm for a generalized Grid model of N-resource nodes that not only takes into account the node and network heterogeneity, but also considers the overhead involved in coordinating among the nodes. Our algorithm is decentralized, scalable, and overlaps the node coordination time with that of the actual processing of ready jobs, thus saving valuable clock cycles needed for making decisions. The proposed algorithm is studied by conducting simulations using the Message Passing Interface (MPI) paradigm.
16,250
Please write an abstract with title: Characterization and Modeling of Reduced-Graphene Oxide Ambipolar Thin-Film Transistors, and key words: Transistors, Electrodes, Thin film transistors, Logic gates, Graphene, Electric potential, Capacitance. Abstract: The rise of graphene as an innovative electronic material promoted the study and development of new 2-D materials. Among them, reduced graphene oxide (rGO) appears like an easy and cost-effective solution for the fabrication of thin-film transistors (TFTs). To understand the limits and possible application fields of rGO-based TFTs, a proper estimation of the device parameters is of extreme importance. In this work, liquid-gated ambipolar rGO-TFTs are characterized and a description of their working principle is given. Particular attention is paid toward the importance of the transistors’ OFF-state conductivity that was modeled as a resistance connected in parallel with the TFT. Thanks to this model, the main transistor parameters were extrapolated from rGO-TFTs with different levels of electrochemical reduction. The extracted parameters allowed understanding that rGO-TFTs have similar holes and electrons mobilities, and the more pronounced p-type behavior of the devices is due to a positive shift in the p-type and n-type threshold voltages.
16,251
Please write an abstract with title: Self-stabilizing autonomic recoverer for eventual Byzantine software, and key words: Computer bugs, Safety, Computer industry, Software testing, Software systems, Software packages, Packaging, Monitoring, Fault tolerant systems, Computer science. Abstract: We suggest to model software package flaws (bugs) by assuming eventual Byzantine behavior of the package. In particular, the package has been tested by the manufacturer for limited length scenarios when started in a predefined initial state; the behavior beyond the tested scenario may be Byzantine. Restarts (reboots) are useful for recovering such systems. We suggest a general yet practical framework and paradigm, based on a theoretical foundation, for the monitoring and restarting of systems. An autonomic recoverer that monitors and restarts the system is proposed, where: the autonomic recoverer is designed to handle different tasks given specific task requirements in the form of predicates and actions. DAG subsystem hierarchy structure is used by a consistency monitoring procedure in order to achieve gracious recovery. The existence and correct functionality of the autonomic recovery is guaranteed by the use of a kernel resident (anchor) process, and the design of the process to be self-stabilizing. The autonomic recoverer uses new scheme for liveness assurance via online monitoring that complements known schemes for online ensuring safety.
16,252
Please write an abstract with title: Research on On-line Monitoring Technology of Aluminum Electrolytic Capacitor in AC Power Supply, and key words: Degradation, Resistance, Power supplies, Capacitors, Aluminum, Voltage, Capacitance. Abstract: As one of the important power devices to guarantee the stability of AC power supply, the failure rate of aluminum electrolytic capacitor in AC power supply is as high as 60%. Therefore, in view of the problems that aluminum electrolytic capacitor in AC power supply is easy to fail and on-line monitoring is difficult, the on-line monitoring method of DC-Link capacitor in high-power AC power supply is studied. In this paper, the equivalent series resistance (ESR) was selected as the characteristic parameter of the degradation failure of aluminum electrolytic capacitor, and then the online monitoring method of the current state ESR value of aluminum electrolytic capacitor in operation was studied. Then, an online ESR monitoring model is designed to study the loss power of aluminum electrolytic capacitor. Through real-time monitoring of the ripple voltage and ripple current of the busbar capacitance, the ESR value of the current state is obtained. Finally, simulation and online monitoring experiments are used to verify the effectiveness of the scheme, and the relative error of monitoring results is less than 1%, and good monitoring effect is obtained.
16,253
Please write an abstract with title: Transportation Mode Recognition With Deep Forest Based on GPS Data, and key words: Feature extraction, Transportation, Trajectory, Global Positioning System, Tunneling magnetoresistance, Forestry, Acceleration. Abstract: Transportation mode recognition (TMR) is a common but critical task in the human behavior research field, which provides decision support for urban traffic planning, public facility arrangement, travel route recommendations, etc. The rapid development of urban information technology, mobile sensors and artificial intelligence has generated solutions for TMR; however, they rely on extra sensors and Geographic Information System (GIS) information, which are not always available. Recognition is usually simplified by disregarding the trajectories among transportation mode change points. In this paper, we proposed an ensemble learning-based approach to automatically recognize transportation modes (including a hybrid mode) using only Global Positioning System (GPS) data. A total of 72 features were extracted to better distinguish different transportation modes. Furthermore, we exploited a deep forest to combine various types of classification models, which facilitates robust learning with different trajectory samples and modes. The experimental results for the Geolife dataset show the efficiency of our approach, and the improved deep forest model achieved the best performance among all experiments that we conducted with 88.6% accuracy.
16,254
Please write an abstract with title: Automatic Accuracy versus Complexity Characterization for Embedded Emotion-Sensing Platforms in Healthcare Applications, and key words: Emotion recognition, Solid modeling, Medical services, Feature extraction, Brain modeling, Electroencephalography, Complexity theory. Abstract: In this paper, we present a novel framework to realize an automatic “accuracy versus complexity” characterization for embeddable emotion recognition systems in healthcare applications. This framework is based on a series of grid searches able to identify highly descriptive features from the input signals, while taking into account implementation ease, memory usage, and classification performance. This paper is articulated on a proof of concept, in which the proposed framework is used to extract an emotion recognition architecture able to discriminate up to 8 emotions, by employing the users' cortical activity and a 3D model for the emotion characterization. The implemented series of grid searches lead to a final low-memory, low-resources and low-complexity emotions recognition processing chain suitable for embedded platforms. The processing chain extracted by the proposed framework has been implemented as a real-time task on a personal care robot processing core. The extracted emotion recognition system tested on cortical signals from a publicly available dataset, showed an accuracy of ~75 % (average) in discriminating 8 emotions and a memory reduction of 70% from a canonical implementation of the same feature extraction step.
16,255
Please write an abstract with title: Intelligent Tool for Persons with Visual Impairments: An Overview, and key words: Visualization, Face recognition, Estimation, Radar detection, Object detection, Blindness, Writing. Abstract: Generally, humans have been gifted with five senses namely vision, acoustic, aromatic, flavor, and touch. These five senses provide us with plenty of information about the world. According to the findings, vision contributes to nearly 84 percent of the overall data. This paper presents several existing pieces of literature-based tools for blind people within a mixed-mode approach. The survey was categorized into four parts 1. Reading Assistant 2. Object Detection 3. Face Recognition 4. Indoor and Outdoor Navigation. This survey examines the support process for visually impaired people.
16,256
Please write an abstract with title: Hybrid IC Structures Using Solder Reflow Technology, and key words: Hybrid integrated circuits, Substrates, Integrated circuit technology, Cost function, Semiconductor thin films, Thin film circuits, Resistors, Capacitors, Silicon carbide, Conductive films. Abstract: A study of hybrid IC's produced by solder refiow technology was carried out to achieve optimum miniaturization and substantial cost reduction. Thin-film resistor and capacitor network (R-C) chips and silicon integrated circuit (SIC) chips are mounted on a multilayered thick-film conductor substrate and connected to the substrate by solder joining. The chips are first supported by solder bumps, and then they are self-aligned by the surface tension of the solder through the reflow process. This process results in a joint that compensates for the deviation and undulation of the substrates. Mechanical supports and electrical contacts of hybrid IC's are accomplished through a single reflow process. These hybrid IC's have proven to be completely satisfactory and reliable.
16,257
Please write an abstract with title: Distributed Optimization for Graph Matching, and key words: Optimization, Nonhomogeneous media, Task analysis, Labeling, Sun, Digital twin, Convergence. Abstract: Graph matching, or the determination of the vertex correspondences between a pair of graphs, is a crucial task in various problems in different science and engineering disciplines. This article aims to propose a distributed optimization approach for graph matching (GM) between two isomorphic graphs over multiagent networks. For this, we first show that for a class of asymmetric graphs, GM of two isomorphic graphs is equivalent to a convex relaxation where the set of permutation matrices is replaced by the set of pseudostochastic matrices. Then, we formulate GM as a distributed convex optimization problem with equality constraints and a set constraint, over a network of multiple agents. For arbitrary labelings of the vertices, each agent only has information about just one vertex and its neighborhood, and can exchange information with its neighbors. A projected primal-dual gradient method is developed to solve the constrained optimization problem, and globally exponential convergence of the agents’ states to the optimal permutation is achieved. Finally, we illustrate the effectiveness of the algorithm through simulation examples.
16,258
Please write an abstract with title: Single low-supply and low-distortion CMOS analog multiplier, and key words: Circuits, Transconductance, CMOS technology, MOSFETs, Current supplies, Virtual colonoscopy, Voltage control, Information technology, Dynamic range, Linearity. Abstract: A single low-supply CMOS analog multiplier based upon ohmic region of MOS transistors is presented. This paper describes a method to force the drain-source voltage (V/sub DS/) of MOS transistors to operate in ohmic region. The achieved circuit can be used a single low-power supply. The complete circuit contains 20 transistors and 8 current sources using a low-power supply +1.5 volts. This circuit has high performance with very high-linearity and low-distortion. The achieved input dynamic range operation is /spl plusmn/400 mV, the linearity error is smaller than 0.1% and total harmonic distortion is smaller than 0.25% for input range 800 mVp-p.
16,259
Please write an abstract with title: Qualification of an enhanced ball grid array package using build-up layers on a metal heat spreader, and key words: Qualifications, Electronics packaging, Dielectric substrates, Copper, Circuits, Bonding, Testing, Assembly, Wire, Certification. Abstract: The innovative package platform discussed in this paper uses build-up technologies to produce circuitry on a copper heat spreader. It applies micro-vias to connect different layers in the substrates. Like any new technology, there are some remaining assembly concerns and challenges with the package design and performance. Additionally, business risks involved in the substrate selection were also discussed. The package under study was certified for product use. The evaluation results showed the package platform under study is capable of achieving accepted reliability performance. However, some assembly issues need to be resolved before volume production, for instance, low wire bonding yield and solder ball mounting defects. It is important to note business risks before the adoption of any new technologies. The team found that the product won't benefit from the most advanced technologies if the substrate/package materials supply is unstable or interrupted. The results and learning from this package certification will be helpful for future advanced product/package development.
16,260
Please write an abstract with title: New latch-up failure mechanism between different power pins in the mixed-voltage process [CMOS ICs], and key words: Pins, Voltage, Power supplies, CMOS integrated circuits, CMOS technology, Circuit testing, Variable structure systems, Equivalent circuits, CMOS process, Semiconductor device manufacture. Abstract: A new latch-up failure phenomenon, induced by the parasitic P-N-P-N path between different power pins, is reported here. The system voltage difference between IO and core blocks is the major factor to see whether the chips will have latch-up failure or not. This latch-up failure only occurs in 0.13 /spl mu/m and 0.18 /spl mu/m processes because the system voltage difference between IO and core circuitry could hold and sustain the latch-up path between IO and core power pins, but latch-up test passes in 0.25 /spl mu/m because the parasitic P-N-P-N path could not be turned on. A traditional latch-up protection methodology with guide-ring insertion works well here, and chip designers need to be aware of this phenomenon and follow the design guideline for IO and core circuitry before the chip is taped-out.
16,261
Please write an abstract with title: Time-Division Multiplexing Ising Computer Using Single Stochastic Magnetic Tunneling Junction, and key words: Time division multiplexing, Magnetic tunneling, Logic gates, Stochastic processes, Energy barrier, Couplings, Calibration. Abstract: A magnetic tunneling junction (MTJ) with very low energy barrier, which shows controllable stochastic property, is recently proposed to constitute the probability bit (P-Bit). With the P-Bit, Ising computation, which is a general and powerful computing platform for both conventional and non-conventional problems, is implemented. However, such hardware emulation suffers from the severe intrinsic variations of a stochastic MTJ device. The nonuniform probability switching curves of different stochastic MTJs hinder straightforward expansion of Ising computer to a large P-Bits array for solving more complicated problems. In this work, we propose a novel Ising computer using a single stochastic MTJ device. With the utilization of the time-division multiplexing (TDM) technology, a “Compute–Read–Switch” scheme is proposed, so that the single stochastic MTJ can act as multiple P-Bits during Ising computation. A design guide for the current magnitude and time duration of the “Compute–Read–Switch” scheme is investigated and provided. Furthermore, NOT and XOR logic gates are implemented with our proposal. An accuracy rate as high as 69% for the integer factorization is also achieved, which is comparable with conventional Ising computer. Meanwhile, the TDM Ising computer avoids the calibration process, which is mandatory in the conventional Ising computer.
16,262
Please write an abstract with title: Optimal Spectral Resource Allocation and Pricing for 5G and Beyond: A Game Theoretic Approach, and key words: Resource management, Cost function, Cost accounting, Games, Pricing, Bandwidth, 5G mobile communication. Abstract: Optimal allocation of the available spectrum is a crucial requirement of 5G and Beyond (B5G) for achieving higher Quality of Service (QoS) and low-latency. However, in 5G and Beyond, this requirement presents a potential need for dimensioning and managing the spectral resource in the cellular services. In this article, we address the issues of spectral distribution using DAG and Vickrey Clarke Groves (VCG) mechanisms by evaluating with a derived parameter for sustainable revenue and social welfare of the entire network. In particular, we modelled a framework to optimize social welfare of the users and the revenue of the cellular operator by proposing an efficient spectral allocation and pricing mechanism.
16,263
Please write an abstract with title: Topology design and resource dimensioning for optical mesh networks under demand uncertainties, and key words: Network topology, Optical design, Optical fiber networks, Mesh networks, Uncertainty, Costs, Design optimization, Probability distribution, Telecommunication traffic, Traffic control. Abstract: We present a framework to help the network designer to dimension optical metropolitan area networks (MAN) incorporating uncertainties in demands. In this framework the interplay among topology design, resource provisioning, and routing are analyzed jointly, based on two stochastic optimization models that use probability distributions of demands as inputs. In one model we minimize the weighted sum of network installation cost and expected penalty cost for unsatisfied traffic; in another model we minimize the network installation cost subject to certain service level requirements. The optimization results enable us: (1) to identify the physical architectures that are most robust (in cost) to demand uncertainties among rich classes of regular topologies, assuming the (random) uniform all-to-all traffic; and (2) to provide analytical references on how the optimum dimensioning, network connectivity, and network cost change as functions of the designer's level of risk aversion, service level requirements, and probability distributions of the demand.
16,264
Please write an abstract with title: Adaptive Contention Window Design Using Deep Q-Learning, and key words: Adaptive systems, Wireless networks, Conferences, Reinforcement learning, Signal processing, Acoustics, Speech processing. Abstract: We study the problem of adaptive contention window (CW) design for random-access wireless networks. More precisely, our goal is to design an intelligent node that can dynamically adapt its minimum CW (MCW) parameter to maximize a network-level utility knowing neither the MCWs of other nodes nor how these change over time. To achieve this goal, we adopt a reinforcement learning (RL) framework where we circumvent the lack of system knowledge with local channel observations and we reward actions that lead to high utilities. To efficiently learn these preferred actions, we follow a deep Q-learning approach, where the Q-value function is parametrized using a multi-layer perceptron. In particular, we implement a rainbow agent, which incorporates several empirical improvements over the basic deep Q-network. Numerical experiments based on the NS3 simulator reveal that the proposed RL agent performs close to optimal and markedly improves upon existing learning and non-learning based alternatives.
16,265
Please write an abstract with title: WebGL Presentation of Three Tank System, and key words: Solid modeling, Three-dimensional displays, Computational modeling, Laboratories, Valves, Software, Internet. Abstract: The paper describes an educational tool that enables to present a typical laboratory model of three tank system in the Internet environment. The model is realized in the form of WebGL animation and is interactive. By opening and closing valves it enables students to change its dynamical behavior. In addition, the model is complemented by PID controller where user can set up proportional, integral and derivative term according to own controller design. The background of the whole web application is driven by ScicosLab simulation environment.
16,266
Please write an abstract with title: Efficient Voltage Profile Based Model-Predictive Control Strategy for Stand-Alone Wind-Integrated Hybrid Microgrid Systems, and key words: Renewable energy sources, PI control, Wind speed, Perturbation methods, Rectifiers, Modulation, Switches. Abstract: Future power system depends on penetrating more renewable energy to fulfill the drastic increase in energy demand with reduced carbon emission. Wind energy integration is increasing in worldwide each year. To efficiently investigate a quality voltage for AC loads under wind speed variations, a combined control strategy is proposed in this paper. It consists of PI and model predictive control (MPC) for the three-phase rectifier and interlinking inverter, respectively. The controlled rectifier ensures a constant DC-bus voltage under variable wind speed, while MPC is used to control output AC load voltage under abrupt load changes. Unlike traditional controllers, MPC does not require PI controllers for inner current and outer voltage loop or complex modulation steps. The discrete state-space model of VSI, LC filter, and load currents are used to predict future trends of load voltage for each of eight switching states. The control strategy selects the optimal switching state that reduces the error difference between reference and predicted load voltage. The proposed scheme is tested under perturbation of generation and load parameters. The proposed MPC strategy is compared with the conventional method-based PI controllers. The presented results ensure the effectiveness of the proposed approach with 0.67% THD for the AC output voltage.
16,267
Please write an abstract with title: A Pilot Study to Infer CEFR Can-Do Statements Based on a Japanese Document Classification Method Including the Pre-A1 Level, and key words: Europe, Indexes, Informatics. Abstract: The Common European Framework of Reference for Languages (CEFR), which is designed to assess foreign language proficiency, has attracted lot of attention with can-do statements (CDSs). However, only a limited number of CEFR studies for learners of the Japanese language have been conducted. Some of them focused on the classification of Japanese example sentences into the corresponding CEFR reading comprehension indices using three inference features: length, document type, and technicality. In this study, we add seven new CDSs to the Pre-A1 level published in the CEFR Companion Volume with New Descriptors in 2017 and perform experiments to classify the CDSs. In line with the incorporation of the new CDSs, we used a new feature called Kanji rate along with the three inference features as vital indexes for assessing Japanese reading comprehension. Experimental results are presented in the study. The purpose of this study is to help teachers on site use CEFR to evaluate the Japanese language proficiency of learners. Our ultimate goal is to create a Japanese CEFR-compliant text corpus.
16,268
Please write an abstract with title: Feature Selection on K-Nearest Neighbor Algorithm Using Similarity Measure, and key words: KNN, feature selection, similarity measures. Abstract: Data mining was the data processing technique to be obtained knowledge or important pattern of data. One of the popular methods was the KNN (K-Nearest Neighbor) which was computational simplicity. There was some weakness of KNN, vulnerable in the data high dimensionality. It was caused of data high dimensionality, so that space can be occupied in instance to be greater. The method approach would be proposed in the research was the method to be omitted several numbers of features were irrelevant to the KNN method by using similarity measures (Euclidean distance, Correlation distance and Cosine similarity). The testing was done by testing the different three datasets and computed the average of accurate results. The results of testing have successes to be omitted the data features without decreasing accuracy, that the accuracy average of feature selection using the KNN algorithm: KNN without selection was 88.804%, KNN-Euclidean distance was 89.120%, KNN-Correlation distance is 89.567% and KNN-Cosine similarity was 89.134%.
16,269
Please write an abstract with title: Digital Twin-Enabled Service Provisioning in Edge Computing via Continual Learning, and key words: Digital twin, continual learning, mobile edge computing, resource allocation, inference model accuracy, model retraining, approximation algorithm, and online algorithm. Abstract: Propelled by recent advances in Mobile Edge Computing (MEC) and the Internet of Things (IoT), the digital twin technique has been envisioned as a de-facto driving force to bridge the virtual and physical worlds through creating digital portrayals of physical objects. In virtue of the flourishing of edge intelligence and abundant IoT data, data-driven modelling facilitates the implementation and maintenance of digital twins, where simulations of physical objects are usually performed based on Deep Neural Networks (DNNs). A significant advantage of adopting digital twins is to enable decisive prediction on the behaviours of objects in near future without waiting for that really happen. To provide accurate predictions, it is vital to keep each digital twin synchronized with its physical object in real-time. However, it is challenging to maintain the real-time synchronization between a digital twin and its physical object due to the dynamics of physical objects and sensing data drift over time, i.e., the live data from a physical object diverge from the model training data of its digital twin. To address this critical issue, continual learning is a promising solution to retrain models of digital twins incrementally. In this paper, we investigate digital twin synchronization issues via continual learning in an MEC environment, with the aim to maximize the total utility gain, i.e., the enhanced model accuracy. We study two novel optimization problems: the static digital twin synchronization problem per time slot and the dynamic digital twin synchronization problem for a finite time horizon. We first formulate an Integer Linear Program (ILP) solution for the static digital twin synchronization problem when the problem size is small; otherwise, we develop a randomized approximation algorithm at the expense of bounded resource violations for it. We also devise a deterministic approximation algorithm with guaranteed performance for a special case of the static digital twin synchronization problem. We thirdly consider the dynamic digital twin synchronization problem by proposing an efficient online algorithm for it. Finally, we evaluate the performance of the proposed algorithms for continuous digital twin synchronization through simulations. Simulation results show that the proposed algorithms are promising, outperforming counterpart benchmarks by no less than 13.2%, in terms of the total utility gain.
16,270
Please write an abstract with title: Effect of a discontinuity of curvature in high-frequency scattering, Part II, and key words: Optical scattering, Surface waves, Antennas and propagation, Computer interfaces, Missiles, Subcontracting, Optical surface waves, Antenna accessories, Geometrical optics. Abstract: A plane wave is incident upon a cylindrical surface comprised of two parabolic sections with different curvature at their junction, but otherwise smoothly joined such that the direction of their normals are continuous. The far-field contribution of the ray from the discontinuity is computed for the Neumann boundary condition on the interface.
16,271
Please write an abstract with title: Operating Condition Identification of Complete Wind Turbine using DBN and Improved DDPG-SOM, and key words: Learning systems, Fault diagnosis, Costs, Blades, Maintenance engineering, Control systems, Wind turbines. Abstract: Although there have been a lot of researches on identifying the condition of components in wind turbine, such as blade, gearbox, bearings, etc., maintenance immediately after some component faults is not an optimal choice in practical use, since it leads to high-frequency downtime and large unnecessary cost. Therefore, the condition identification of complete wind turbine is required. In this paper, we propose a novel method based on data-driven techniques and information fusion model. Firstly, a DBN is used for capturing information about the condition of components in wind turbine. Then, a new information fusion model is presented for integrating the information about conditions of components based on an improved DDPG by incorporating a random module and SOM. Based on the output of the improved DDPG-SOM, a status index is calculated representing the condition of the whole machine. A case study based on real SCADA data is conducted to show the effectiveness and superiority of the proposed method.
16,272
Please write an abstract with title: A beam-waveguide feed having a symmetric beam for Cassegrain antennas, and key words: Antenna feeds, Antennas and propagation, Convergence, Reflector antennas, Optical waveguides, Planar arrays, Lattices, Optical reflection, Gratings, Antenna arrays. Abstract: The asymmetric reflectors are unavoidable in the composition of a beam-waveguide feed and generally cause asymmetry of the beam from the feed. By means of the combination of two suitable asymmetric reflectors a rotationally symmetric beam can be obtained on the basis of geometrical optics.
16,273
Please write an abstract with title: Smart Home Energy Visualizer: A Fusion of Data Analytics and Information Visualization, and key words: Home appliances, Data visualization, Visualization, Smart homes, Energy consumption, Data analysis, Monitoring. Abstract: While technology advancements are continuously improving, the energy efficiency of household appliances, energy consumption analysis, and providing feedback to consumers on this analysis remains a critical issue in ensuring the effectiveness of such improvements. Visual feedback is a promising technique for promoting energy conservation by applying demand response (DR) in smart home energy management systems (SHEMSs). In this article, we propose a smart home energy visualization (SHEV) system, an SHEMS that comprises three components: Appliance Profile Detector with XCorrelation (APDX) that monitors the activation of household appliances, operation modes identification using cycles clustering (OMICC) to identify the operation modes used, and the visualizer to represent the appliance usage-related information to the user using concentric circles representation (CCR). This visualization assists the consumer in applying DR by better understanding the appliance usage so that the consumer makes sense of the consumption, and hence, better decision-making in energy conservation.
16,274
Please write an abstract with title: Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification, and key words: IP networks, Robustness, Payloads, Perturbation methods, Training, Protocols, Feature extraction. Abstract: Network traffic classification is used in various applications such as network traffic management, policy enforcement, and intrusion detection systems. Although most applications encrypt their network traffic and some of them dynamically change their port numbers, Machine Learning (ML) and especially Deep Learning (DL)-based classifiers have shown impressive performance in network traffic classification. In this article, we evaluate the robustness of DL-based network traffic classifiers against Adversarial Network Traffic (ANT). ANT causes DL-based network traffic classifiers to predict incorrectly using Universal Adversarial Perturbation (UAP) generating methods. Since there is no need to buffer network traffic before sending ANT, it is generated live. We partition the input space of the DL-based network traffic classification into three categories: packet classification, flow content classification, and flow time series classification. To generate ANT, we propose three new attacks injecting UAP into network traffic. AdvPad attack injects a UAP into the content of packets to evaluate the robustness of packet classifiers. AdvPay attack injects a UAP into the payload of a dummy packet to evaluate the robustness of flow content classifiers. AdvBurst attack injects a specific number of dummy packets with crafted statistical features based on a UAP into a selected burst of a flow to evaluate the robustness of flow time series classifiers. The results indicate injecting a little UAP into network traffic, highly decreases the performance of DL-based network traffic classifiers in all categories.
16,275
Please write an abstract with title: A Digital Root Based Modular Reduction Technique for Power Efficient, Fault Tolerance in FPGAs, and key words: Voltage measurement, Error analysis, Measurement uncertainty, Throughput, Military aircraft, Hardware, Decoding. Abstract: Recent advancements in performance, logic density, and power consumption of Field-Programmable Gate Arrays (FPGAs) have made them attractive for their widespread adoption into automotive, aircraft, space, military, and other safety-critical applications, in both embedded systems and cloud computing platforms. Every year, though, it becomes harder and harder to benefit from such advances in technology scaling due to smaller voltage margins, more aggressive clocking schemes, and greater device variability. FPGAs are often expected to last years or even decades in a variety of different environments before replacement. In some applications, they can be susceptible to soft and transient errors due to Single Event Upsets (SEUs), environment, and aging related effects. In this paper, we propose a simplified modular arithmetic technique based upon the concept of the digital root (DR) to monitor soft and transient errors, with low area overhead and high rates of detectability. The technique can be easily implemented at the register-transfer level (RTL) with no need to modify the underlying hardware of the FPGA. In one experiment, after dropping the supply voltage well below recommended design margins, we show in situ measurements on the instantaneous error rate in an Intel Arria 10 GX FPGA, which can be leveraged to optimize the power-performance trade-off of already deployed designs. We demonstrate this tradeoff, using an inherently error tolerant low-density parity-check (LDPC) decoder block, by either increasing the system clock beyond its synthesized target to achieve a 50% improvement in throughput, or by lowering the FPGA's supply voltage below synthesized design margins for a 65% reduction in power.
16,276
Please write an abstract with title: Automated Segmentation of Profiled Fibers in cross-sectional Micrographs for Quality Control, and key words: Geometry, Image segmentation, Visualization, Shape, Pipelines, Quality control, Manuals. Abstract: The industrial standard for quality control of pro-filed fibers is the visual inspection of a batch’s deviation from the production master. This is performed by human experts using cross-sectional micrographs. An alternative to this qualitative analysis is to use metrics describing the desired morphological characteristics of the fiber, so-called shape factors, in a quantitative approach. Such a quantitative approach requires the manual segmentation of profiled fibers in cross-sectional micrographs, and is therefore time-consuming and economically infeasible. Thus, an automated segmentation of profiled fibers is required to facilitate industrial use of quantitative shape factor analysis.We develop and present a pipeline for automated instance segmentation of profiled fibers in cross-sectional micrographs. The pipeline consists of preprocessing, seed generation, segmentation and candidate selection steps. Different configurations of the pipeline were investigated and their performance was evaluated across four profiled fiber types using manual segmentations as groundtruth. For the best configuration, a median F1 score of 0.935 could be achieved over all four evaluated fiber types. The developed pipeline is publicly available and expected to facilitate the quantitative quality control of profiled fibers.
16,277
Please write an abstract with title: A new approach to the variable selection using the TLS approach, and key words: Input variables, Linear regression, Context modeling, Least squares methods, Gaussian noise, Vectors, Measurement errors, Statistics, Computational complexity, Pollution measurement. Abstract: The problem of variable selection is one of the most pervasive model selection problems in statistical applications. It arises when one wants to explain the observations or data adequately by a subset of possible regression variables. The objective is to identify factors of importance and to include only variables that contribute significantly to the reduction of the prediction error. Numerous selection procedures have been proposed in the classical multiple linear regression model. We extend one of the most popular methods developed in this context, the backward selection procedure, to a more general class of models. In the basic linear regression model, errors are present on the observations only, if errors are present on the regressors as well, one gets the errors-in-variables model which for Gaussian noise becomes the total-least-squares model, this is the context considered here.
16,278
Please write an abstract with title: Bayesian Optimization Based on Pseudo Labels, and key words: Measurement, Deep learning, Extrapolation, Machine learning algorithms, Uncertainty, Asia, Optimization methods. Abstract: The performance of a machine learning or deep learning algorithm is heavily influenced by its hyperparameters. The selection of the hyperparameters is of great significance. To automatically find a superior-performing set of hyperparameters, Bayesian optimization is a common and effective hyperparameter optimization method. And an early stopping strategy is usually employed in the optimization algorithm to improve efficiency. The early stopped trials cannot run to the end, so their final performance metrics are unavailable. Therefore, the existing Bayesian optimization algorithms fail to use the trials terminated early as samples for modeling. This may result in less information participating in the modeling, which leads to high model uncertainty. In this paper, we propose Bayesian optimization based on pseudo labels (BOPL). We apply the extrapolation of learning curves as the early stopping strategy and the pseudo labels obtainment method. We use the pseudo labels of all trials to model the surrogate model in Bayesian optimization, thereby avoiding the waste of information contained in the early stopped trials. Experiments on the ResNet-18 on the CIFAR-100 dataset show that the proposed BOPL consistently outperforms vanilla Bayesian and Bayesian with early stopping. It proves the effectiveness of the proposed method, which finds better-performing hyperparameters at a faster rate. The proposed method is versatile, conceptually simple, and easy to implement.
16,279
Please write an abstract with title: Resistivity image reconstruction using J-substitution algorithm for MREIT, and key words: Conductivity, Image reconstruction, Current density, Density measurement, Current measurement, Magnetic resonance imaging, Computer simulation, Magnetic resonance, Impedance, Tomography. Abstract: We describe a new resistivity image reconstruction algorithm called J-substitution algorithm. It utilizes internal current density data measured by MRI technique with current injection. Computer simulations show that Magnetic Resonance Electrical Impedance Tomography (MREIT) system using J-substitution algorithm can produce high-resolution static resistivity images of a subject.
16,280
Please write an abstract with title: Rethinking Transmit Power Control for SAE J3161/1 Congestion Control Algorithm, and key words: SAE J3161/1, SAE J2945/1, V2X communication, congestion control, Tx power control, rate control. Abstract: The Society of Automotive Engineers (SAE) has specified wireless channel congestion control algorithm for vehicle-to-everything (V2X) communication: J2945/1 for Dedicated Short Range Communication (DSRC) and J3161/1 for cellular V2X (C-V2X) environment. Although J2945/1 utilizes both transmit (Tx) power control and message rate control, the more recently specified J3161/1 standard for C-V2X environment has opted to abandon the power control. It is understandable as previous studies have demonstrated the inefficacy of power control in J2945/1, resulting in the rate control solely fighting congestion. Consequently, channel congestion leads to a fast increase in packet inter-reception time (PIR) and potentially tracking error. This letter advocates for the reinstatement of Tx power control in J3161/1 as a means to minimize PIR, while proposing a distinct approach from J2945/1 to show the feasibility of an effective combined control. Based on vehicle traffic engineering principles, the approach switches control modes to use power control to cope with increased vehicle density and rate control with increased channel utilization. It leads to significant improvements in packet delivery characteristics while more effectively managing channel load.
16,281
Please write an abstract with title: Rights protection for digital contents redistribution over the Internet, and key words: Internet, Watermarking, Protocols, Cryptography, Humans, Computer science, Content management, Copyright protection, Costs, Data mining. Abstract: Although the customer-to-customer (C2C) business model has been around for years, second-hand markets of digital contents over the Internet are still unpopular. A key factor to the success of second-hand markets lies in the support of rights management of digital contents redistribution over the Internet. Although various watermarking protocols have been proposed to achieve digital rights protection over the Internet, they do not generally provide protection over a second-hand market. We propose a buyer-reseller watermarking protocol that protects the interests of buyers, resellers and the original sellers. The protocol is adapted from a previous work proposed by Memon and Wong (2001), which defends the interests of buyers against sellers' unethical distribution of watermarked contents. Our protocol makes use of watermark certificates to distribute the information of buyers' identities. An implementation outline of the proposed protocol is given.
16,282
Please write an abstract with title: Hybrid fractal video coding with neighbourhood vector quantisation, and key words: Fractals, Video coding, Vector quantization, Computer science, Motion compensation, Redundancy, Rate-distortion, Video compression, Transform coding, Code standards. Abstract: A volume-based hybrid video coding scheme which combines fractal coding with neighbourhood vector quantisation is reported. The algorithm works as follows: the neighbourhood blocks (the virtual code-book) of a range block r/sub i/ are causally selected from the connected neighbourhood, 9 in the previous time slice, and 4 are within the same time slice. In the implementation, instead of having the neighbourhood blocks collected from the original frames, we compare the range block with the blocks that were actually transmitted, ie., the previously quantised blocks. This prevents quantisation errors from accumulating and gives better rate-distortion performance. The experimental results suggests that the coder's compression performance beats most of the fractal-based video coders.
16,283
Please write an abstract with title: Dual-Ascent Hierarchical Control-Based Distribution Power Loss Reduction of Parallel-Connected Distributed Energy Storage Systems in DC Microgrids, and key words: Microgrids, Voltage control, Optimization, Resistance, Convex functions, Current distribution, Batteries. Abstract: In this article, the loss of dc microgrid with distributed energy storage systems (DESSs) is modeled as one unified function of the output currents. Based on the theoretical proof of this article, the loss model is a smooth concave function and has only one extreme point. Then, a dual-ascent algorithm is proposed to online optimize the current distribution coefficients. The current distribution coefficients move in the direction of minimizing the distribution loss iteratively. The adaptive secondary control is applied to realize the given current sharing rate among DESSs. To cope with the changes in model parameters, one online line resistance identification method is designed in this article. Besides, a state-of-charge limitation mechanism is added to the control strategy to prevent deep discharge or overcharge. Thereby, the real-time loss minimization operation is achieved, regardless of line resistance and load variations. The simulation and experimental results are presented to verify the proposed hierarchical control in mitigating the distribution loss in various cases, including charging/discharging operation, output power clip, plug-in and out of DESSs, and daily operation.
16,284
Please write an abstract with title: Label Self-Adaption Hashing for Image Retrieval, and key words: Training, Image resolution, Image retrieval, Binary codes, Feature extraction, Data models, Data mining. Abstract: Hashing has attracted widespread attention in image retrieval because of its fast retrieval speed and low storage cost. Compared with supervised methods, unsupervised hashing methods are more reasonable and suitable for large-scale image retrieval since it is always difficult and expensive to collect true labels of the massive data. Without label information, however, unsupervised hashing methods can not guarantee the quality of learned binary codes. To resolve this dilemma, this paper proposes a novel unsupervised hashing method called Label Self-Adaption Hashing (LSAH), which contains effective hashing function learning part and self-adaption label generation part. In the first part, we utilize anchor graph to keep the local structure of the data and introduce joint sparsity into the model to extract effective features for high-quality binary code learning. In the second part, a self-adaptive cluster label matrix is learned from the data under the assumption that the nearest neighbor points should have a large probability to be in the same cluster. Therefore, the proposed LSAH can make full use of the potential discriminative information of data to guide the learning of binary codes. It is worth noting that LSAH can learn effective binary codes, hashing function and cluster labels simultaneously in a unified optimization framework. To solve the resulting optimization problem, an Augmented Lagrange Multiplier based iterative algorithm is elaborately designed. Extensive experiments on three large-scale data sets indicate the promising performance of the proposed LSAH.
16,285
Please write an abstract with title: Permanent Magnet Electrodynamic Suspensions Applied to MAGLEV Transportation Systems: A Review, and key words: Force, Coils, Drag, Topology, Superconducting magnets, Permanent magnets, Magnetic flux. Abstract: This article reviews permanent magnet electrodynamic suspensions (PM-EDSs) used in ground transportation systems, such as Magnetic Levitation (MAGLEV) trains. The different suspension topologies are first presented, considering separately their two main components, namely the track and the magnetic field source. Beyond that, a phenomenological explanation of the evolution with the speed of the drag and levitation forces is provided, depending on the track topology. The models aimed at predicting the behavior and performance of the suspension are then detailed, classifying them according to whether they are global or local. Finally, the main experimental setups developed to validate PM-EDSs are described.
16,286
Please write an abstract with title: Lightweight Proofs of Storage with Public Verifiability from Lattices, and key words: Performance evaluation, High performance computing, Conferences, Computational modeling, Lattices, Cryptography, Task analysis. Abstract: Proof of storage (POS) is a useful cryptographic primitive that enables users to efficiently verify the integrity of their data outsourced in the cloud. Usually, users prefer to utilize POS schemes with public verifiability for integrity checking tasks, since such schemes allow a third-party on behalf of a user to implement these tasks without disclosure of any secret information of the user. However, most of the existing publicly verifiable POS schemes are somehow cumbersome because they involve a great deal of heavy operations especially on the user side so that they may not be competent for some applications.To compensate for this defect, we explore a simple and lightweight POS scheme with public verifiability from hardness problems relative to lattices. Our scheme only requires simple cryptographic computations and, in particular, significantly decreases the computation overhead of users. We prove our scheme is secure assuming the ring small integer solution problem is intractable. Moreover, we also conduct extensive simulations to evaluate the performance of our scheme, and the experimental results do speak volumes about its effectiveness.
16,287
Please write an abstract with title: A Conformal Broadband Monopole Antenna for VHF/UHF Band Applications, and key words: Structural rings, Antenna theory, Voltage, UHF antennas, Broadband communication, Coplanar waveguides, Broadband antennas. Abstract: This paper presents a conformal broadband monopole antenna working at very high frequency (VHF) band and ultra-high frequency (UHF) band. The proposed antenna is composed of an open ring ground and a circular monopole patch, which is fed by modified coplanar waveguide (CPW). Base on analysis of the effect of open ring ground, a broadband CPW-fed antenna is designed. Simulated results show that, with the electrical dimension of 0.25λ × 0.25λ at the minimum operation frequency, the voltage standing wave ration (VSWR) of the antenna is less than 2 from 98MHz to 622MHz (145%).
16,288
Please write an abstract with title: Autonomous Wheel Loader Trajectory Tracking Control Using LPV-MPC, and key words: Systematics, Trajectory tracking, Trajectory planning, System dynamics, Computational modeling, Wheels, Predictive models. Abstract: In this paper, we present a systematic approach for high-performance and efficient trajectory tracking control of autonomous wheel loaders. With the nonlinear dynamic model of a wheel loader, nonlinear model predictive control (MPC) is used in offline trajectory planning to obtain a high-performance state-control trajectory while satisfying the state and control constraints. In tracking control, the nonlinear model is embedded into a Linear Parameter Varying (LPV) model and the LPV-MPC strategy is used to achieve fast online computation and good tracking performance. To demonstrate the effectiveness and the advantages of the LPV-MPC, we test and compare three model predictive control strategies in the high-fidelity simulation environment. With the planned trajectory, three tracking control strategies LPV-MPC, nonlinear MPC, and LTI-MPC are simulated and compared in the perspectives of computational burden and tracking performance. The LPV-MPC can achieve better performance than conventional LTI-MPC because more accurate nominal system dynamics are captured in the LPV model. In addition, LPV-MPC achieves slightly worse tracking performance but tremendously improved computational efficiency than nonlinear MPC.
16,289
Please write an abstract with title: A near optimal deblocking filter for H.264 advanced video coding, and key words: Filters, Video coding, Decoding, Filtering, MPEG 4 Standard, Automatic voltage control, Discrete cosine transforms, Hardware, Displays, Field programmable gate arrays. Abstract: We propose a near optimal hardware architecture for deblocking filter in H.264/MPEG-4 AVC. We propose a novel filtering order and a data reuse strategy that result in significant saving in filtering time, local memory usage, and memory traffic. Every 16-16 macroblock requires 192 filtering operations. After a few initialization cycles, our 5-stage pipelined architecture is able to perform one filtering operation per cycle. Compared with some state-of-the-art designs, our architecture delivers the fastest level of performance while using much smaller gate count and memory. We have implemented and integrated the proposed deblocking filter into an H.264 main profile video decoder and verified it with an FPGA prototype.
16,290
Please write an abstract with title: Smart Cities in Indonesia: A Retrospective of the Publication Journey, and key words: Earth, Computer science, Knowledge engineering, Visualization, Smart cities, Bibliometrics, Collaboration. Abstract: Research on smart cities in Indonesia continues to develop but is limited to one field and/or one year. From the retrospective journey of bibliometric analysis, this study purposes to visually research mapping and research trends in international publications on smart cities in Indonesia. This study used bibliometric techniques with secondary data from Scopus. Analyze and visualize data using the VOSViewer program and the analyze search results function on Scopus. This study analyzed 518 scientific documents published from 2013 to 2020. According to the research, Universitas Indonesia, and Suhono Harso Supangkat had the most active affiliated organization and individual scientists in smart cities publications from Indonesia. Computer Science, and IOP Conference Series Earth and Environmental Science were the most studied and disseminated outlets of smart cities publication. There were three category maps of collaborative researchers. Based on the identification of a collection of knowledge accumulated from over seven years of publication, this research proposes a grouping of smart cities publication themes in Indonesia: Government, Living, Information management, Intelligent system, Mobility, and Environment, abbreviated as GLIIME publication themes.
16,291
Please write an abstract with title: Time-dependent acoustic scattering from generalized impedance boundary conditions via boundary elements and convolution quadrature, and key words: generalized impedance boundary conditions, wave equation, exterior domain, boundary elements, convolution quadrature. Abstract: Generalized impedance boundary conditions are effective approximate boundary conditions that describe scattering of waves in situations where the wave interaction with the material involves multiple scales. In particular, this includes materials with a thin coating (with the thickness of the coating as the small scale) and strongly absorbing materials. For the acoustic scattering from generalized impedance boundary conditions, the approach taken here first determines the Dirichlet and Neumann boundary data from a system of time-dependent boundary integral equations with the usual boundary integral operators, and then the scattered wave is obtained from the Kirchhoff representation. The system of time-dependent boundary integral equations is discretized by boundary elements in space and convolution quadrature in time. The well-posedness of the problem and the stability of the numerical discretization rely on the coercivity of the Calderón operator for the Helmholtz equation with frequencies in a complex half-plane. Convergence of optimal order in the natural norms is proved for the full discretization. Numerical experiments illustrate the behaviour of the proposed numerical method.
16,292
Please write an abstract with title: Laser ablation synthesis of oxide nanowires and their properties, and key words: Laser ablation, Nanowires, Laser modes, FETs, X-ray lasers, Large-scale systems, Zinc oxide, Gold, Crystalline materials, Optical materials. Abstract: We report an efficient and reliable laser-ablation approach for large-scale synthesis of SnO/sub 2/ and ZnO nanowires. The nanowire growth followed the vapor-liquid-solid model. Precise control over the nanowire diameters has been achieved by using monodispersed gold clusters as the catalyst. Detailed material analysis such as transmission electron microscopy (TEM) and X-ray diffraction (XRD) were used to confirm the crystal structure of the nanowires. In addition, field effect transistors have been constructed based on individual SnO/sub 2/ nanowires, and excellent n-type transistor characteristics were observed. These nanowire transistors were further demonstrated to work as sensitive UV detectors.
16,293
Please write an abstract with title: Sensing and sensing-of-sensing with drones, and key words: Visualization, Transducers, Wheelchairs, Sonar applications, Acoustic sensors, Sensor phenomena and characterization, Acoustics. Abstract: Vehicles such as cars, mobility scooters, wheelchairs, and the like are becoming partially or fully automated (i.e. equipped with driver-assist technologies or completely self-driving technologies). These technologies rely heavily on sensors such as vision (cameras), radar, sonar, etc.. In this paper, we propose the use of autonomous craft (e.g. “drones”) for scientific meta-measurement, i.e. specifically sensing-of-sensors and sensing their capacity to sense (metasensing). In particular, we show how a drone can be used to characterize a sonar sensing device. Sonar sensing devices are often used on autonomous vehicles. Our two main contributions are: (1) the use of drones for the sensing of acoustic sensors (e.g. sonar transducers), and (2) minimizing the metasensing flight paths by following phase contours (i.e. vector scanning rather than raster scanning), so that a small number of flights can provide meaningful insight into the characteristics of an acoustic sensor.
16,294
Please write an abstract with title: Research on Chinese Translation of Multivariate English Passive Structure Based on Big Data, and key words: Image color analysis, Semantics, Machine learning, Big Data, Syntactics, Business intelligence, Pragmatics. Abstract: The passive phenomenon is a common phenomenon in English language structure and Chinese language structure. Although both of them are called passive phenomena, there are some differences in expression between them. This article analyzes the content of the "English-Chinese Parallel Corpus" of a school from the multivariate perspective of big data, and deeply studies the characteristics and forms of passive structure. The author discovered the linguistic features in the passive structure of the original English language and some influencing factors that may be ignored by the translator during the translation process. This article hopes to provide some help to future English translators.
16,295
Please write an abstract with title: Locating object surfaces with an ultrasonic range sensor, and key words: Robot sensing systems, Ultrasonic transducers, Sensor phenomena and characterization, Solids, Acoustic propagation, Intelligent robots, Acoustic pulses, Pulse compression methods, Surface impedance, Face detection. Abstract: Ultrasonic range sensing has attracted attention in the robotics community because of its simple construction and low cost. However, determining range direction is made difficult by the signal beam spread of the transducer. This direction ambiguity can be reduced to some extent by increasing the operating frequency or diameter of the sensor but some ambiguity will still remain. A technique is described for obtaining the true surface normals to a planar surface using three sensors or three positions of one sensor. The solution is quite complex in direct form. A simplifying transformation applied to the direct form and a further simplifying sensor configuration are described which greatly reduces the solution complexity. An alternate formulation of the problem is described from which geometrical insight can be obtained. This alternate solution also lends itself to the generation of tangential constraint surfaces for bounding curved object surfaces.
16,296
Please write an abstract with title: Mobile element scheduling for efficient data collection in wireless sensor networks with dynamic deadlines, and key words: Dynamic scheduling, Intelligent networks, Wireless sensor networks, Sensor phenomena and characterization, Base stations, Relays, Environmentally friendly manufacturing techniques, Industrial pollution, Batteries, Mechanical sensors. Abstract: Wireless networks have historically considered support for mobile elements as an extra overhead. However, recent research has provided means by which network can take advantage of mobile elements. Particularly, in the case of wireless sensor networks, mobile elements are deliberately built into the system to improve the lifetime of the network, and act as mechanical carriers of data. The mobile element, which is controlled, visits the nodes to collect their data before their buffers are full. It may happen that the sensor nodes are sampling at different rates, in which case some nodes need to be visited more frequently than others. We present this problem of scheduling the mobile element in the network, so that there is no data loss due to buffer overflow. We prove that the problem is NP-complete and give an ILP formulation. We give some practical algorithms, and compare their performances.
16,297
Please write an abstract with title: Secure group communication using robust contributory key agreement, and key words: Robustness, Collaboration, Communication system security, Cryptographic protocols, Computer Society, Protection, Telecommunication network reliability, Data security, Network servers, Power system faults. Abstract: Contributory group key agreement protocols generate group keys based on contributions of all group members. Particularly appropriate for relatively small collaborative peer groups, these protocols are resilient to many types of attacks. Unlike most group key distribution protocols, contributory group key agreement protocols offer strong security properties such as key independence and perfect forward secrecy. We present the first robust contributory key agreement protocol resilient to any sequence of group changes. The protocol, based on the Group Diffie-Hellman contributory key agreement, uses the services of a group communication system supporting virtual synchrony semantics. We prove that it provides both virtual synchrony and the security properties of Group Diffie-Hellman, in the presence of any sequence of (potentially cascading) node failures, recoveries, network partitions, and heals. We implemented a secure group communication service, Secure Spread, based on our robust key agreement protocol and Spread group communication system. To illustrate its practicality, we compare the costs of establishing a secure group with the proposed protocol and a protocol based on centralized group key management, adapted to offer equivalent security properties.
16,298
Please write an abstract with title: Application Research on Identification of Cervical Lesions Based on Random Forest, and key words: Radio frequency, Solid modeling, Liquids, Feature extraction, Power electronics, Lesions, Random forests. Abstract: According to analysis of the shortcomings in the course of the joint inspection of HPV-DNA viral load testing and TCT liquid thin-layer cytology technical, application of computer aided diagnosis (CAD) technology to improve cervical cancer screening accuracy, this paper proposes a cervical lesion recognition based on random forest (RF) model. Through characteristic value of cervical cell image are extracted to form the cervical cells characteristic data sets, and then to do the Bootstrap sampling, using a random sample build a decision tree, a feature subset classification results to vote on the cervical cells, use this model in cervical cancer screening. According to theoretical analysis and experimental data, compared with traditional combined examination, this method improves the performance of cervical lesion identification, and its results have certain competitiveness and advantages.
16,299
Please write an abstract with title: The method of dynamic generating a forecast depending on the user's story, and key words: Adaptation models, Analytical models, Costs, Web services, Predictive models, Data models, Planning. Abstract: This work has developed method of dynamic generating a forecast depending on the user's story by automatically determining the quality and quantity of user story, as well as the importance of items on which the forecast may depend. Separation of mandatory and important elements for the formation of a forecast, as well as taking into account the number of these elements, allows you to generate a high-quality forecast dynamically for any area of application without taking into account the binding of the method to a specific model. The developed method was used in the family budget planning web service “Saving wisely”. As a result, it was found that the forecast was on average 85% consistent with the real costs of users after the end of the end of the period for which the forecast was made.