ID int64 0 400k | content stringlengths 97 5.85k |
|---|---|
17,400 | Please write an abstract with title: Manipulation Using a Snake Robot Based on the Head Raising Motion, and key words: Snake robots, Kinematics, Manipulators, Stability analysis, Biology, Planning, Task analysis. Abstract: The snake robot is a biologically inspired robot with hyper-redundant joints. Though the locomotion control of the robot has been widely studied for decades, there are few works about the manipulation, which is more and more important. In this paper, a two-stage manipulation method is proposed by planning head raising locomotion and controlling the head pose of the snake robot. Specifically, the whole robot is divided into the ground part and the manipulation part, where the ground part is considered as the support polygon to maintain the stability during the head raising motion, and the manipulation part is considered as the manipulator to achieve tasks. The head raising motion planning is solved by nonlinear optimization and the head pose controller is designed by inverse kinematics. Finally the proposed method is verified through simulation. Results show that the head of the snake robot can reach any desired valid pose accurately. |
17,401 | Please write an abstract with title: A TDI charge-coupled imaging device for page scanning, and key words: Optical imaging, Document image processing, Lighting, Signal design, Registers, Application software, Silicon, Signal to noise ratio, MOS devices, Logic devices. Abstract: An experimental 2048/spl times/32-stage time-delay and integration (TDI) charge-coupled imaging device has been designed, fabricated, and operated. It is designed for high-speed, low-noise, full-page document imaging with moderate illumination. An overview is presented of its design and performance, detailing unusual design features. These include a photocharge capacity of 3.5 million electrons per pel, a parallel-to-serial interface design that avoids a common charge-transfer bottleneck, and a fast large-signal output stage. A discussion is included of the merits of TDI in document imaging applications. |
17,402 | Please write an abstract with title: On phase noise channels at high SNR, and key words: Phase noise, Signal to noise ratio, Channel capacity, Upper bound, Probability distribution, Fading, H infinity control, Entropy, Random variables, Signal processing. Abstract: Lapidoth and Moser (2001) have recently proposed a general technique for obtaining upper bounds on channel capacity via a dual expression in which the maximization over probability distributions on the channel input alphabet is replaced with a minimization over probability distributions on the channel output alphabet. They have also introduced the notion of "capacity achieving input distributions that escape to infinity" in order to study channel capacity at high signal-to-noise (SNR) ratios. In this partly tutorial paper we demonstrate the use of these ideas by applying them to the study of communication over discrete-time channels impaired by additive white Gaussian noise and phase noise. |
17,403 | Please write an abstract with title: Effects of Spectral Variations and Environmental Conditions on the Performance of Massive MIMO Systems, and key words: Channel capacity, System performance, Simulation, Massive MIMO, Throughput, Surface roughness, Stability analysis. Abstract: The paper is devoted to massive multiple-input multiple-output (MIMO) systems over a band of operation from 4.22 to 4.38 GHz. An investigation of the massive MIMO system performance is presented. The effect of rough surface boundaries, spectral fluctuations, and variable number of terminals onto the overall system performance is examined in terms of the throughput per user and the channel matrix singular value spread (SVS). It is found that as the rough surface height standard deviation increases, the obtained channel matrix SVS indicates ill-conditioning with more difficult situations for spatial separation of users' signals. In addition, significant reductions in the channel capacity and larger disparities of the power values designated for users' channels are noticed. When the operating frequency increases, the channel stability reduces due to phase variations. This is observed through considerable increases in the channel matrix SVS and remarkable degradations in the channel capacity since the electrical propagation distance is larger at higher frequencies. When the number of users grows, the channel matrix SVS increases due to the reduction in the per-user throughput. The adopted simulation results agree with the experimental results in literature. |
17,404 | Please write an abstract with title: A value meta-model for crossover services modeling, and key words: Industries, Analytical models, Computational modeling, Stakeholders, Usability, Artificial intelligence. Abstract: As a new service model, crossover services have attracted wide attention from the industry and academia, and have the characteristics of diversified stakeholders, heterogeneous services and processes, which brings big challenges to the requirements modeling and analysis of crossover scenarios. Most of the traditional modeling methods focus on the functional and non-functional requirements, but pay less attention to the value propositions of stakeholders and value attributes of services, which leads to the failure of some crossover services. In this paper, a value meta-model is proposed to support the value modeling of crossover services. To evaluate the proposed method, a case study is presented to illustrate the usage of the proposed approach, and a controlled experiment is conducted to evaluate the usability of the proposed method. The experimental results demonstrate the effectiveness and usefulness of the proposed method. |
17,405 | Please write an abstract with title: A 5V temperature-regulated reference, and key words: Temperature sensors, Voltage, Regulators, Bonding, Current density, Temperature distribution, Power supplies, Equations, Artificial intelligence, Wire. Abstract: A monolithic 5V reference for a 12b A/D converter, accurate to ±1LSB over a temperature range of -55 to 125°C will be reported. Typical temperature coefficient is 0.3ppm/° C and PSRR is 100dB. |
17,406 | Please write an abstract with title: A prototype deep learning system for the acoustic monitoring of intensive care patients, and key words: Training, Deep learning, Prototypes, Europe, Microcomputers, Acoustics, Microphone arrays. Abstract: We present a prototype system for the acoustic monitoring of artificially ventilated patients in intensive care. A device placed in the patient room detects sounds indicating an emergency situation and notifies a pager of the care staff. The staff can react more quickly and take appropriate action, as well as provide feedback on the prediction for continual learning. A microphone array with adaptive beamforming and an integrated microcomputer is employed, autonomously performing recording, audio preprocessing as well as deep learning based inference. The training dataset originates from a variety of patients and spatial and sonic environments, accommodating for different patterns of background noise and distortions. Mel spectrograms of short length are extracted and used for training a convolutional neural network. An initial evaluation of the system shows an accuracy of 80% for a binary, balanced dataset. The system is deployed in several intensive care facilities and can easily be adapted to other types of medically relevant sounds. |
17,407 | Please write an abstract with title: Gap Analysis of Chinese Students' Low Proficiency in Learning Spoken English for Better Learning Outcome, and key words: Industries, Education, Buildings, Interviews, Standards. Abstract: The English language education in adult education industry in China has achieved remarkable results. Meanwhile, a variety of reasons have led to Chinese students' insufficient English speaking proficiency. Consequently, to propose the reason that causes the difficulties in Spoken English teaching of Chinese students is beneficial for the further development of English language teaching in China. A gap analysis based on the teaching theories will be used as an approach to identifying the causes. From a developmental perspective, this article would be particularly useful for teachers to teach Chinese adult learners. |
17,408 | Please write an abstract with title: KL-EEM: A Novel Kullback-Leibler Distance Based EEM Clustering Model for Breast Cancer Identification, and key words: Breast cancer, Brain modeling, Clustering algorithms, Optimization, Data models, Computational modeling, Distance measurement. Abstract: Breast cancer is one the most common malignancies among women, along with the development of machine learning, clustering models have been utilized in this scenario. We focus on the exemplar-based clustering model in this paper. Based on the probability version of EEM clustering model, the choice of distance measurement could be more extensive. Kullbacek-Leibler distance is one of the most effective distances in Information theory, and could naturally measure the similarity between two probability distributions. Thus, this paper newly proposed a KL-distance based EEM clustering model for breast cancer by introducing KL-distance to keep target data similar to the training data into the probability version of EEM model. Deeply analyzing KL-EEM and EEM clustering models, we can conclude that the similarity based on KL-distance can be embedded into the calculation of similarity matrix. Thus, the optimization framework of EEM can be directly used to optimize the new target function of KL-EEM, which has been proved to be more effective and efficient compared with that in AP clustering model. Experiments with two real-world breast cancer datasets have been applied, and verified KL-EEM clustering model. |
17,409 | Please write an abstract with title: Objective-oriented utility-based association mining, and key words: Data mining, Association rules, Itemsets, Computer science, Probability, Laboratories, Pattern recognition, Frequency. Abstract: The necessity of developing methods for discovering association patterns to increase business utility of an enterprise has long been recognized in the data mining community. This requires modeling specific association patterns that are both statistically (based on support and confidence) and semantically (based on objective utility) related to a given objective that a user wants to achieve or is interested in. However, no such general model has been reported in the literature. Traditional association mining focuses on deriving correlations among a set of items and their association rules; diaper /spl rarr/ beer only tells us that a pattern like {diaper} is statistically related to an item like beer. In this paper we present a new approach, called objective-oriented utility-based association (OOA) mining, to modeling such association patterns that are explicitly related to a user's objective and its utility. Due to its focus on a user's objective and the use of objective utility as key semantic information to measure the usefulness of association patterns, OOA mining differs significantly from existing approaches such as existing constraint-based association mining. We formally define OOA mining and develop an algorithm for mining OOA rules. The algorithm is an enhancement of a priori with specific mechanisms for handling objective utility. We prove that the utility constraint is neither monotone nor anti-monotone, succinct or convertible and present a novel pruning strategy based on the utility constraint to improve the efficiency of OOA mining. |
17,410 | Please write an abstract with title: Error control code combining techniques in cluster-based cooperative wireless networks, and key words: Error correction, Wireless networks, Energy consumption, Noise reduction, Throughput, Costs, Forward error correction, Power system reliability, Automatic repeat request, Analytical models. Abstract: In this paper, we introduce a novel link layer cooperation technique in noisy wireless networks to improve overall system throughput and reliability, and to reduce the cost of retransmission and energy consumption. Under a cluster-based network design, code combining is used together with FEC to improve the link layer reliability. This approach is different from how code combining is used in the conventional hybrid ARQ, which is in a sequential way. The analytical results and the simulations show that with the cooperation of nodes in a clustering network, the link reliability is greatly improved with the same power consumption. Equivalently, this can be viewed as the same link performance with a lower transmission power and lower interference. |
17,411 | Please write an abstract with title: Design and Implementation of Tibetan-Chinese Dictionary System based on iOS, and key words: Operating systems, Smart phones, Mobile communication, Databases, Zirconium, Radio frequency, Information systems. Abstract: The system is developed based on iOS platform, which uses Objective-C language to write programs, adopts MVC architecture mode in engineering structure, realizes the corresponding logical structure and function of software, and ensures correct and rapid operation response. The system mainly implements the word search function, my word function, favourite operation and delete operation. The functional modules were tested and the system fulfilled the expected requirements and was able to run stably on the mobile terminal. |
17,412 | Please write an abstract with title: Cooperative sensor networks with misinformed nodes, and key words: Capacitive sensors, Mobile communication, Information retrieval, Fading, Telecommunication network reliability, Large-scale systems, Laboratories, Research initiatives, Global communication, Information theory. Abstract: The communication capacity of Cooperative SEnsor Networks with Mobile Access (C-SENMA) is considered when some sensors may be misinformed with erroneous messages. It is assumed that a global message is first distributed to all the nodes, each node receiving the message correctly with probability 1-/spl beta/. The nodes cooperate in delivering the global message to the mobile access point. Three system configurations are discussed based on whether a polling channel and/or an energy constraint are present. The first type is C-SENMA with Polling with No Energy constraints (PNE), where the mobile access point has the ability to poll individual sensors. Without energy constraints, each sensor can transmit for an unlimited number of times. The second type is C-SENMA with No Polling with No Energy constraints (NPNE), where adaptive polling is not allowed and sensors have to transmit according to a predetermined schedule. The third type is C-SENMA with No Polling with an Energy constraint (NPE), where each node has a limit on the number of transmissions. The capacities of the three system configurations are analyzed. It is shown that, the capacity for C-SENMA PNE is the same as that when there are no misinformed sensors. For C-SENMA NPNE, with the absence of the polling channel, there is a loss on the achievable rate, proportional to /spl beta/, the probability that a sensor is misinformed. Results are extended to multiple simultaneous transmissions with the presence of channel fading. The optimal number of simultaneous transmissions is investigated under three different fading situations. |
17,413 | Please write an abstract with title: Electromagnetic Modeling Techniques for Switched Reluctance Machines: State-of-the-Art Review, and key words: Numerical models, Mathematical model, Analytical models, Finite element analysis, Electromagnetic modeling, Reluctance motors. Abstract: Switched Reluctance Machines (SRMs) are gaining more attention due to their simple, and rugged construction, low manufacturing cost, and high-speed operation capability. An electromagnetic model of the machine is needed in the design, and analysis processes. The required accuracy level of the model depends mainly on the application. A high-fidelity model is required to achieve a good design, and predict the performance accurately. However, it requires high computational cost, and longer simulation time. Other fast, and less-comprehensive models with less computational burden could be utilized in the design, and analysis of the motor drives. This paper extensively analyzes various electromagnetic modeling techniques of SRMs. Analytical, numerical, and hybrid models are considered. The paper investigates analytical models that are based on Maxwell's equations in addition to interpolation, and curve fitting techniques. Numerical techniques such as Finite Element Method (FEM), and Boundary Element Method (BEM) are presented. Moreover, Magnetic Equivalent Circuit (MEC) method is discussed. Finally, potential research areas are proposed for the electromagnetic modeling of SRMs. |
17,414 | Please write an abstract with title: Moisture determination in single peanut pods by complex RF impedance measurement, and key words: Radio frequency, Impedance measurement, Capacitance measurement, Frequency measurement, Phase measurement, Moisture measurement, Capacitors, Equations, Kernel, Testing. Abstract: An assessment was made of estimating the moisture content (mc) of single peanut pods (in-shell peanuts) by measuring the complex impedance of a parallel-plate capacitor with a single pod between the plates. Capacitance (C), phase angle (/spl theta/) and/or dissipation factor (D) were measured at 1.0 and 5.0 MHz, and the measured values at these two frequencies were used in a derived empirical equation to calculate the mc. Previous research had determined that the mc of single and small samples of shelled peanuts (kernels) could be determined by similar measurements at 1 and 4.5 MHz. In this paper, the mc of the pods tested was between 5% and 25%. The predicted mc of the pods was within 1% of the standard air-oven values for about 85% of the single pods. |
17,415 | Please write an abstract with title: Poster: Towards 2-Hop Neighbor Management for Heterogeneous Vehicular Networks, and key words: Communications technology, Conferences, Vehicle dynamics, Wireless communication, Spread spectrum communication, Safety, Probabilistic logic. Abstract: Message dissemination protocols for vehicular networks often build upon information maintained in neighbor tables. Due to high mobility and scarce channel capacity available in such networks, algorithms for maintaining neighbor tables must carefully select which information is transmitted at which time. Recent approaches rely on probabilistic data structures (e.g., Bloom filter) for transmitting such neighbor information in order to reduce channel load, yet they still suffer from scarce channel capacities. In this paper, we propose to use multiple communication technologies (heterogeneous networking) for maintaining neighbor tables by building upon recent 2-hop neighbor management strategies. Promising results show an increase of up to 19 % of covered neighbors in comparison to a Baseline approach that only uses one communication technology. |
17,416 | Please write an abstract with title: Measurement and application of betatron modes with MIA, and key words: Phase measurement, Lattices, History, Vectors, Particle beams, Laboratories, Position measurement, Storage rings, Singular value decomposition, Couplings. Abstract: We present model-independent analysis (MIA)-based methods for measuring lattice properties of a storage ring such as phase advance, beta function, chromaticity, and tune shift with amplitude. Using beam position histories of excited betatron oscillations that are simultaneously measured at a large number of beam position monitors (BPMs), the spatial-temporal modes of betatron oscillation can be extracted with MIA-mode analysis. The resulting spatial vectors are used to determine linear phase advance and beta function, and the temporal vectors are used to determine nonlinear chromaticity and tune shift with amplitude. Measurements done at the Advanced Photon Source fare reported |
17,417 | Please write an abstract with title: Utilizing the Reactive Current Control Capability of an MMC-Fed AC/DC Converter for Volt-Second Balancing in Medium Frequency Transformers, and key words: Current control, AC-DC power converters, Multilevel converters, Integrated circuit interconnections, Switches, Frequency conversion, Timing. Abstract: The non-ideal behavior of power switches and/or circuit asymmetries in transformer-isolated converters can result in nonzero average voltage across the transformer terminals, which, in turn, can saturate the transformer. In this paper, a volt-second balancing scheme is developed for a Modular-Multilevel-Converter (MMC)-fed AC/DC converter to avoid transformer saturation. |
17,418 | Please write an abstract with title: Risk-Averse Stochastic Midterm Scheduling of Thermal-Hydro-Wind System: A Network-Constrained Clustered Unit Commitment Approach, and key words: Uncertainty, Stochastic processes, Computational modeling, Reservoirs, Renewable energy sources, Costs, Load modeling. Abstract: With the increasing penetration of renewable energy, designing the efficient midterm (i.e., annual) scheduling for multi-source power systems is valuable in providing substantial cost reductions and flexibilities while ensuring system security against uncertainties of renewables. This paper presents a risk-averse two-stage stochastic midterm scheduling model for thermal-hydro-wind systems against short-term uncertainties of renewable generation. A network-constrained clustered unit commitment (NC-CUC) model is proposed to effectively incorporate short-term operation constraints into the midterm scheduling model, for improving the solution accuracy while reducing computational burden. Specifically, as the traditional CUC model cannot ensure consistent unit commitment status of generators across all scenarios, a power flow-based unit clustering method is proposed to improve the accuracy of short-term operation results. In addition, the conditional value-at-risk (CVaR) is used to quantify the system operational risk caused by uncertainties of wind generation and natural water inflows. Case studies show that the risk-averse two-stage stochastic midterm scheduling model can ensure operation dynamics and solution efficiency, and the proposed clustering method can achieve a tradeoff between solution accuracy and computational burden for the stochastic network-constrained CUC model. |
17,419 | Please write an abstract with title: Proportional Pricing for Efficient Traffic Equilibrium at Internet Exchange Points, and key words: Analytical models, Costs, Web and internet services, Pricing, Games, Routing, Market research. Abstract: We analyze traffic exchange between Internet Service Providers (ISPs) at an Internet Exchange Point (IXP) as a non-cooperative game with ISPs as self-interested agents. Each ISP has the choice of exchanging traffic either using the shared IXP facilities, or outside the IXP – through their transit providers or private peering. We analyze the efficiency (social cost optimality) of the traffic exchange equilibrium at the IXP taking into consideration the congestion cost experienced by the ISPs at the IXP, under a proportional pricing model where the per-unit price charged to ISPs is proportional to the aggregate level of congestion at the IXP. We obtain worst case bounds on the efficiency at traffic exchange equilibrium under two different models of the congestion cost (delay) functions. Simulations conducted using data for actual IXPs obtained from PeeringDB demonstrate that the theoretical bounds derived for social cost optimality at equilibrium (measured as the Price of Anarchy) are fairly tight, and correctly capture the performance trends against the variation of key model parameters. Further, the results show that for a certain range of the proportionality constant, proportional pricing not only results in significantly better efficiency compared to zero pricing, but also attains nearoptimal social cost and near-optimal IXP revenue simultaneously. |
17,420 | Please write an abstract with title: Hand-Gesture-Based Touchless Exploration of Medical Images with Leap Motion Controller, and key words: Support vector machines, Image recognition, Surgery, Gesture recognition, Task analysis, Biomedical imaging, Graphical user interfaces. Abstract: Hand gesture recognition has become one of the most interesting means of contactless human-computer interaction. There is significant importance for commanding medical images during surgical procedures by the mean of touchless hand gestures for reducing the time of surgery and the risk of contamination. In this work, we used the Leap Motion Controller as an acquisition device, with different classification methods, to recognize 11 hand gestures dedicated to manipulating medical images through a touchless graphical user interface. This framework was trained and tested on a benchmark dataset called LeapGestureDB. We worked with statistical features calculated from fingers and hand data, then normalized and fed into various classifiers such as the support vector machine, the nearest neighbor, the decision tree, the random forest, the AdaBoost, the linear discriminant analysis and the multi-layer perceptron. The highest accuracy was 91.73% and 89.91% using the cubic SVM and the multilayer perceptron, respectively. We developed a contactless interface based on the best recognition rate in order to facilitate the way of interaction with medical images in the operating room. |
17,421 | Please write an abstract with title: A formal experiment comparing extreme programming with traditional software construction, and key words: Computer science, Team working, Software systems, Springs, Software engineering, Software testing, In vitro, Production systems, Filters, Job production systems. Abstract: This paper describes an experiment carried out during the Spring/2002 academic semester with computer science students at the University of Sheffield. The aim of the experiment was to assess extreme programming and compare it with a traditional approach. With this purpose the students constructed software for real clients. We observed 20 teams working for 4 clients. Ten teams worked with extreme programming and ten with the traditional approach. In terms of quality and size teams working with extreme programming produced similar final products to traditional teams. The major implication for the current practice of traditional software engineering is that in spite of the absence of design and the presence of testing before coding the product obtained still has similar quality and size. The implication for extreme programming is the possibility of growth and maturation given the fact that it provided results that were as good as those from the traditional approach. |
17,422 | Please write an abstract with title: Residual Recurrent Neural Network for Speech Enhancement, and key words: Measurement, Recurrent neural networks, Convolution, Shape, Speech recognition, Speech enhancement, Spectrogram. Abstract: Most current speech enhancement models use spectrogram features that require an expensive transformation and result in phase information loss. Previous work has overcome these issues by using convolutional networks to learn the temporal correlations across high-resolution waveforms. These models, however, are limited by memory-intensive dilated convolution and aliasing artifacts from upsampling. We introduce an end-to-end fully recurrent neural network for single-channel speech enhancement. The network structured as an hourglass-shape that can efficiently capture longrange temporal dependencies by reducing the features resolution without information loss. Also, we use residual connections to prevent gradient decay over layers and improve the model generalization. Experimental results show that our model outperforms state-of-the-art approaches in six quantitative evaluation metrics. |
17,423 | Please write an abstract with title: Situational Awareness in Distribution Grid Using Micro-PMU Data: A Machine Learning Approach, and key words: Support vector machines, Event detection, Power quality, Transforms, Tools, Phasor measurement units, Power systems. Abstract: The recent development of distribution-level phasor measurement units, a.k.a. micro-PMUs, has been an important step towards achieving situational awareness in power distribution networks. The challenge however is to transform the large amount of data that is generated by micro-PMUs to actionable information and then match the information to use cases with practical value to system operators. This open problem is addressed in this paper. First, we introduce a novel data-driven event detection technique to pick out valuable portion of data from extremely large raw micro-PMU data. Subsequently, a datadriven event classifier is developed to effectively classify power quality events. Importantly, we use field expert knowledge and utility records to conduct an extensive data-driven event labeling. Moreover, certain aspects from event detection analysis are adopted as additional features to be fed into the classifier model. In this regard, a multi-class support vector machine (multi-SVM) classifier is trained and tested over 15 days of real-world data from two micro-PMUs on a distribution feeder in Riverside, CA. In total, we analyze 1.2 billion measurement points, and 10,700 events. The effectiveness of the developed event classifier is compared with prevalent multi-class classification methods, including k-nearest neighbor method as well as decision-tree method. Importantly, two real-world use-cases are presented for the proposed data analytics tools, including remote asset monitoring and distribution-level oscillation analysis. |
17,424 | Please write an abstract with title: Time-sensitive POI Recommendation by Tensor Completion with Side Information, and key words: Geography, Tensors, Sensitivity, Social networking (online), Computational modeling, Data models, Stability analysis. Abstract: Context has been recognized as an important factor to consider in personalized recommender systems. Particularly in location-based services (LBSs), a fundamental task is to recommend to a mobile user where he/she could be interested to visit next at the right time. Additionally, location-based social networks (LBSNs) allow users to share location-embedded information with friends who often co-occur in the same or nearby points-of-interest (POIs) or share similar POI visiting histories, due to the social homophily theory and Tobler's first law of geography. So, both the time information and LBSN friendship relations should be utilized for POI recommendation. Tensor completion has recently gained some attention in time-aware recommender systems. The problem decomposes a user-item-time tensor into low-rank embedding matrices of users, items and times using its observed entries, so that the underlying low-rank subspace structure can be tracked to fill the missing entries for time-aware recommendation. However, these tensor completion methods ignore the social-spatial context information available in LBSNs, which is important for POI recommendation since people tend to share their preferences with their friends, and near things are more related than distant things. In this paper, we utilize the side information of social networks and POI locations to enhance the tensor completion model paradigm for more effective time-aware POI recommendation. Specifically, we propose a regularization loss head based on a novel social Hausdorff distance function to optimize the reconstructed tensor. We also quantify the popularity of different POIs with location entropy to prevent very popular POIs from being over-represented hence suppressing the appearance of other more diverse POIs. To address the sensitivity of negative sampling, we train the model on the whole data by treating all unlabeled entries in the observed tensor as negative, and rewriting the loss function in a smart way to reduce the computational cost. Through extensive experiments on real datasets, we demonstrate the superiority of our model over state-of-the-art tensor completion methods. |
17,425 | Please write an abstract with title: Investigating the Effects of Macaque Primary Motor Cortex Multi-Unit Activity Binning Period on Behavioural Decoding Performance, and key words: Training, Primary motor cortex, Correlation, Coordinate measuring machines, Neural engineering, Information filters, Brain-computer interfaces. Abstract: This paper investigates the relationship between Multi-Unit Activity (MUA) Binning Period (BP) and Brain-Computer Interface (BCI) decoding performance using Long-Short Term Memory decoders. The motivation is to determine whether lossy compression of MUA via increasing BP has any adverse consequences for BCI Behavioral Decoding Performance (BDP). The Neural data originates from intracortical recordings from Macaque Primary Motor cortex. The BDP is measured by the Pearson correlation r between the observed and predicted velocity of the subject's X- Y hand coordinates in reaching tasks. The results suggest a statistically significant but slight linear relationship between increasing MUA BP and decreasing BDP. For example, when using a 100 ms moving average window, increasing the BP by 10 ms on average reduces the BDP r by approximately 0.85%. This relationship may be due to the reduced number of training examples, or due to the loss of Behavioral information because of reduced MUA temporal resolution. |
17,426 | Please write an abstract with title: Coherent Backscattering of Spatially Entangled Photons, and key words: Electrooptical waveguides, Photonics, Backscatter. Abstract: We report the first observation of coherent backscattering of spatially entangled photons and show that the backscattering cone of entangled photons corresponds to that of single photons with half the wavelength. |
17,427 | Please write an abstract with title: Online Fault Diagnosis for Rotating Rectifier in Wound-Rotor Synchronous Starter–Generator Based on Geometric Features of Current Trajectory, and key words: Rectifiers, Rotors, Fault diagnosis, Circuit faults, Windings, Voltage measurement, Trajectory. Abstract: Accurate and timely fault diagnosis of the rotating rectifier in wound-rotor synchronous starter-generator (WRSSG) plays an important role in improving the reliability of the WRSSG system. By analyzing the geometric features of the rotor current trajectory of the main exciter (ME) under health and different fault conditions of the rotating rectifier, in this article, a fault diagnosis method for the rotating rectifier based on the geometric features of ME rotor current trajectory is proposed. In this method, ME rotor currents are estimated first, and then the center distance, center angle, and length-width ratio of the ME rotor current trajectory are calculated and used to detect fault occurrence, locate the faulty diode, and identify the fault type for the rotating rectifier, respectively. The experimental results verified the feasibility and effectiveness of the proposed fault diagnosis method. |
17,428 | Please write an abstract with title: Computation of stabilizing PI parameters for vehicle suspension system using the stability boundary locus, and key words: Stability, Control systems, Three-term control, Automotive engineering, Design engineering, Land vehicles, Frequency, Transfer functions, Acceleration, Pi control. Abstract: This paper presents a new approach for the design of vehicle suspension system with the goal to maximise passenger comfort by minimising vertical acceleration. For this reason PI controlled suspension system, at which controller parameters are computed by using the stability boundary locus, is proposed. In order to select the best parameters in the stability region obtained using the stability boundary locus, the phase margin and the gain margin of system is studied and step response of the system is evaluated. The proposed method offers several important advantages over existing results since it is simple to apply and does not need to sweep over the parameters. |
17,429 | Please write an abstract with title: A DNN-Based Cross-Domain Recommender System for Alleviating Cold-Start Problem in E-Commerce, and key words: Recommender systems, Bridges, Industrial electronics, Neural networks, Task analysis, Collaboration, Machine learning. Abstract: Many applications use recommender systems to predict user preferences, improve user experience, and increase the amount of sales. However, because of the cold-start problem, it is not easy to recommend items to new users accurately. Recommendation performance degrades in the case of users with little interaction, in particular latent users who have never used the service. To alleviate the cold-start problem, we develop a framework that combines an online shopping domain with information from an Ads platform. Our framework employs deep learning to build a cross-domain recommender system based on shared users in these two domains. This is the first attempt that models users based on shared users in online shopping and Ads domains for solving the user-cold start problem. We apply Word2Vec to turn textual information on users and items into latent vectors as their representations. The experimental results show the effectiveness of deep neural approaches with knowledge transferred from another domain for the cold-start problem. Textual information may contain useless information, and Word2Vec cannot capture some structural and semantic correlations between different users. Therefore, we propose R-metapath2Vec to enhance user modeling and use the Stacking model to integrate these two kinds of user representations. The experimental results demonstrate the effectiveness of our integration model: our framework can recommend products to users of another domain through Ads distribution in a more accurate level. |
17,430 | Please write an abstract with title: Mapping of Spatiotemporal Scalar Fields by Mobile Robots using Gaussian Process Regression, and key words: Uncertainty, Costs, Correlation, Gaussian processes, Sensor phenomena and characterization, Spatiotemporal phenomena, Frequency measurement. Abstract: Spatiotemporal maps are data-driven estimates of time changing phenomena. For environmental science, rather than collect data from an array of static sensors, a mobile sensor platform could reduce setup time and cost, maintain flexibility to be deployed to any area of interest, and provide active feedback during observations. While promising, mapping is challenging with mobile sensors because vehicle constraints limit not only where, but also when observations can be made. By assuming spatial and temporal correlations in the data through kernel functions, this paper uses Gaussian process regression (GPR) to generate a maximum likelihood estimate of the phenomenon while also tracking the estimate uncertainty. Spatiotemporal mapping by GPR is simulated for a single fixed-path mobile robot observing a latent spatiotemporal scalar field. The learned spatiotemporal map captures the structure of the latent scalar field with the largest uncertainties in areas the robot never visited. |
17,431 | Please write an abstract with title: Design and performance of the pre-fire detection system for the FRX-L main capacitor, and key words: Capacitors, Pulse power systems, Toroidal magnetic fields, Plasma confinement, Optical switches, Coils, Detectors, Circuits, Power system protection, Optical fibers. Abstract: The main capacitor bank of the FRX-L (field-reversed configuration experiment) supplies current (1.6 Meg amp) to a single-turn coil that is used to create high-density plasmas for magnetized-target fusion (MTF) experiments. The energy stored in the main bank (200 kJ) is transferred to the load coil via an array of four Maxwell rail-gap switches in parallel. Each switch is capable of transferring approximately a quarter of the main bank charge flow without damage. Therefore, if a single switch pre-fires it is subject to much greater stress than it is able to tolerate. In this paper, we discuss the design and performance of a system that is able to discriminate between a switch pre-fire, trigger noise, and normal operation and initiate a trigger in time to safely prevent damage. This system consists of innovative electric field detectors, fiber-optic isolation of signals and high-speed solid-state circuitry that interfaces with the Maxwell trigger system without modification. |
17,432 | Please write an abstract with title: A linear control system simulation toolbox using spreadsheets, and key words: Control system synthesis, Circuit simulation, Joining processes, Spreadsheet programs, Transfer functions, Costs, Displays, Logic circuits, Adders, Software packages. Abstract: A new method is presented for simulating linear control systems using modern spreadsheet programs. The method is characterized by its flexibility, simplicity, and availability. It was verified for various cases, and examples were given for illustration. It is particularly useful for educational exercises that require calculations to be repeated with different parameters and values. |
17,433 | Please write an abstract with title: ClothFace: Battery-Free User Interface Solution Embedded into Clothing and Everyday Surroundings, and key words: Antennas, Testing, Software, User interfaces, Integrated circuits, RFID tags. Abstract: This paper introduces ClothFace, a passive ultrahigh frequency (UHF) radio frequency identification (RFID) -based user interface solution, which can be embedded into clothing and into our everyday surroundings. The user interface platform consists of RFID tags, each of which has a unique ID. All the tags are initially readable to an external RFID reader. A specific tag can be switched off by covering it with a hand, which change can then be used as a digital input to any connected device. Because of the used passive UHF RFID technology, there is no need for embedded energy sources, but the interface platform gets all the needed energy from the external RFID reader. In this study, two test setups were created to an office environment: For the Body Test, the interface was integrated into a cotton shirt and into an item. For the Table Test, the interface was integrated into a wooden table. A gamelike testing software was created for both setups and two male test subjects tested the platform. The achieved results were very promising: success rates of 99-100 % and 94-98 % were reached in the Body Test and in the Table Test, respectively. Based on these promising preliminary results, we can envision the employment of ClothFace for developing multi-modal interfaces that can provide on-body gestural controls in body-based serious game applications. |
17,434 | Please write an abstract with title: A semiconductor laser stand-alone neural network, and key words: Laser theory, Semiconductor device measurement, Surface waves, Injection-locked oscillators, Wavelength measurement, Switches, Vertical cavity surface emitting lasers. Abstract: We experimentally demonstrate a high-performance, fully autonomous, and scalable neural network of 350 nodes based on a semiconductor laser. And we study the impact of several key physical parameters on its performance in a 3-bit header recognition task. |
17,435 | Please write an abstract with title: Increasing field weakening capability of an axial flux PM machine, and key words: Iron, Magnetic flux, Saturation magnetization, Topology, Stator windings, Demagnetization, Magnetic separation, Geometry, Finite element methods, Armature. Abstract: In this paper an investigation related with the improvement of the field weakening capability for an axial flux PM machine is carried out. The machine configuration proposed allows us to control the airgap flux, so that field weakening characteristic is obtained based in a negative d-axis current injection. This axial flux topology contains one central stator and two rotors. The stators have 3-phase AC windings allocated in slots. Rotor poles are shaped by a magnet piece, which provide the excitation; and iron pole section, with a reduced d-axis reluctance path. In this manner a reduced amount AC demagnetizing current is required for flux control. Proper design of the rotor yoke, selection of the pole geometry and PM to iron area ratio allows us to increase field weakening capability of the machine. |
17,436 | Please write an abstract with title: Data Balanced Bagging Ensemble of Convolutional- LSTM Neural Networks for Time Series Data Classification with an Imbalanced Dataset, and key words: Accelerometers, Neural networks, Time series analysis, Brain modeling, Electroencephalography, Convolutional neural networks, Bagging. Abstract: A system was developed using a bagging (bootstrap-aggregating) ensemble of neural networks to classify time-series data with class imbalanced datasets. The proposed system uses a Data Balanced Bagging Ensemble (DBBE) of Convolutional-LSTM (CLSTM) Neural Networks (DBBE- CLSTM) to classify accelerometer and EEG datasets. The base neural network (CLSTM) that is used in the DBBE-CLSTM contains three convolutional layers with a batch normalization layer following each convolutional layer, one max-pooling layer, one LSTM layer, and one sigmoid classification layer. A bagging ensemble was created which used the CLSTM paired with the proposed data balancing technique as the ensemble's base learner. The proposed bagging ensemble achieves a validation set average accuracy of 90.42% and a validation set recall of 93.23% on an accelerometer dataset. Ultimately, the proposed DBBE- CLSTM achieves the best overall performance of the models developed in this paper when evaluating both accuracy and recall, with the DBBE-CLSTM achieving greater than 90% for both metrics. As a secondary verification of the proposed DBBE- CLSTM, we evaluated the model on the UCI Epileptic Seizure Detection dataset and show that the model achieved high performance across all evaluated metrics. The DBBE-CLSTM achieved an average validation set accuracy of 99.23%, and average validation set f1-score of 0.9809 on UCI Seizure dataset. |
17,437 | Please write an abstract with title: Face detection under variable lighting based on resample by face relighting, and key words: Face detection, Lighting, Support vector machines, Testing, Face recognition, Frequency, Multimedia computing, Laboratories, Computer science, Image databases. Abstract: Different environment illuminations have a great impact on face detection. We present a solution based on face relighting technology. The basic idea is that there exists nine harmonic images that can be derived from a 3D model of a face, and by which we can estimate the illumination coefficient of any face sample. Using an illumination radio image, we can produce images under new lighting conditions. To detect the faces under certain lighting condition, we relight the original face samples to get more new faces under different kinds of possible lighting condition, and add them to the training set. Our experimental results on support vector machine (SVM) turns out that the relighting subspace is effective in face detection under various lighting conditions. Moreover, if we relight original face samples to the new samples under different illuminations, the collected example sets are multiplied. We use the expanded database to train an AdaBoost-based face detector and test it on the MIT+CMU frontal face test set. The experimental results show that the data collection can be efficiently speeded up by the proposed methods. The later experiment also verifies the generalization capability of the proposed method. |
17,438 | Please write an abstract with title: A practical scheme of improving the link performance for ATM satellite communication networks, and key words: Satellite communication. Abstract: Broadband satellite communication systems play a more and more important role in the global information infrastructure, but it still remains a challenging problem for the satellite data link to support ATM services because of its high error rate and the onboard processing limitation. This paper investigates concatenated coding as a means of improving and optimizing the data link performance. Taking the burst error characteristic of satellite links and ATM cell format into account, several coding schemes are evaluated by simulations. A concatenated coding scheme is therefore presented that can not only get fibre-like performance but also has the ability to correct long burst errors. The new scheme concatenates an outer RS code and an inner convolutional code, and can be implemented at a low complexity. Experiments show that it is practical and applicable for onboard applications. |
17,439 | Please write an abstract with title: Thermal characterization of SiC MOSFETs for automotive power module, and key words: Temperature measurement, Transient analysis, Calibration, Electrical resistance measurement, Silicon carbide, Thermal resistance, Semiconductor device measurement. Abstract: This paper shows that thermal characterization of SiC MOSFETs for automotive power module using the thermal transient measurement method, simulation, calibration, and boundary condition independent reduced order model. Thermal transient measurement method was used to determine the thermal resistance of the junction to case. As a second task, the thermal model calibration using the thermal transient measurement was built for even more accurate thermal simulations and improve the reliability of components. We also demonstrated the boundary condition independent reduce order model (BCI-ROM) for automotive mission power profile from a full detailed calibrated model. Model order reduction aims to lower the computational complexity thus allowing for faster solving while maintain predictive accuracy in space and time. |
17,440 | Please write an abstract with title: Detecting Organisms for Marine Video Surveillance, and key words: Oceans, Ecosystems, Detectors, Video surveillance, Organisms, US Government agencies, Monitoring. Abstract: The way to better understand the marine life and ecosystems is to surveil and analyze the activities of marine life. Research on marine organisms is becoming increasingly popular because of the increased focus in recent years. In this paper, we design a novel framework, dubbed Efficient Marine Organism Detector (EMOD) for high-resolution marine video surveillance, to detect and monitor marine organisms in a realtime and fast fashion. Current state-of-the-art marine organism detectors are mainly based on computer vision techniques that make great progress in recent years, which essentially requires a relatively large amount of various data. The datasets used are from the National Oceanic and Atmospheric Administration (NOAA), including a total five annotated video datasets HabCam, MOUSS, AFSC DropCam, MBARI and NWFSC. Experiments are performed on these three datasets with current popular one-stage detection methods (RetinaNet and SSD) and two-stage detection methods (Faster R-CNN and Cascade R-CNN) in our marine detector respectively. Experimental results demonstrate that our framework is competitive and efficient. |
17,441 | Please write an abstract with title: Closing the Theory-Practice Gap: Psychologically-Based Laboratory Course in Electrical Engineering, and key words: Electrical engineering, Knowledge engineering, Conferences, Laboratories, Psychology, Integrated circuit modeling, Electrical engineering education. Abstract: Psychology abounds in theory and empirical evidence about learning and teaching methods. Electrical engineering education however often lacks the application of this knowledge. In the following paper, Problem- and Project-Based-Learning will be examined for their utility in electrical engineering education. It turns out that both methods are advantageous in many respects compared to the classical lecture; whereby Project-Based-Learning has more useful effects for the education of practical electrical engineering. The contribution of this paper is to give two model laboratories to apply this knowledge in real teaching settings. The newly created laboratory exercise in circuit technology “Black-Box Lab” and a Design Project are presented considering psychological concepts and feasibility in equal measure. |
17,442 | Please write an abstract with title: Failed prominence eruptions near 24 cycle maximum, and key words: Sun: activity, Sun: coronal mass ejections (CMEs), Sun: filaments, prominences, Sun: magnetic fields. Abstract: We analyse 16 failed filament eruptions observed near 24 solar cycle maximum from 2013 May to 2014 July. No significant rotation of filament spines is observed during the ascent in all studied failed eruptions, which does not support kink-instability mechanism of triggering the eruptions. We calculate potential magnetic field distributions in the corona above the initial locations of the filaments to study their height dependence. In seven events, the vertical profiles of the decay index n are monotonic. The other nine events occur in the regions with the switchback or saddle-like n-profiles. The direction of the horizontal field near the saddle bottom is turned through more than 100° relative its direction at the initial filament position, which reveals the quadrupolar magnetic configuration with null points in these regions. The eruptive filaments stop above the null points where the total Lorentz force is directed upward. The most reasonable force that can terminate filament ascending and balance the Lorentz force seems the gravity. |
17,443 | Please write an abstract with title: Precise dielectric measurement of low loss materials at 60 GHz, and key words: Dielectric measurements, Dielectric loss measurement, Dielectric materials, Permittivity measurement, Frequency measurement, Loss measurement, Resonance, Error analysis, Thickness measurement, Time measurement. Abstract: The permittivity and loss-tangent of a number of low-loss materials have been measured using the open-resonator system by two methods - the full cavity-length variation technique and the frequency variation technique. While excellent agreement and consistency in results were obtained by both methods, the measured results showed that the cavity-length technique is a little more accurate with a less-noise resonance peak profile. An extensive error analysis is made for the first time for various open resonator measurement methods for a number of specimens of different thickness. |
17,444 | Please write an abstract with title: Large-tilt Heavy Ions Induced SEU in Multiple Radiation Hardened 22 nm FDSOI SRAMs, and key words: Radiation effects, Sensitivity, Radiation hardening (electronics), Layout, Silicon-on-insulator, Random access memory, Ions. Abstract: Four kinds of radiation hardened SRAM were fabricated based on a 22 nm UTBB FDSOI process and irradiated by high-energy heavy ions. The high SEU tolerance and even SEU immunity for the three DICE SRAMs were investigated in vertical heavy-ion irradiation. However, the large-tilt-incidence (75°-85°) significantly increased the SEU cross sections for the 8-T SRAMs, and the errors in M-DICE and C-DICE hardened SRAMs in large tilt incidence were observed as well, indicating that the layout placement is essential. The UTBB FDSOI process contributes substantially to realize high SEU tolerance. While considering the existence of 4π-distributed relativistic heavy ions in space, the large-tilt irradiation is also indispensable in ground evaluation especially for the high reliable systems. |
17,445 | Please write an abstract with title: Security of operating system using the Metasploit framework by creating a backdoor from remote setup, and key words: Technological innovation, Operating systems, Linux, Security. Abstract: The era of technology has seen many rising inventions and with that rise, comes the need to secure our systems. In this paper we have discussed how the old generation of people are falling behind at being updated in tandem with technology, and losing track of the knowledge required to process the same. In addition this factor leads to leakage of critical personal information. This paper throws light upon the steps taken in order to exploit the pre-existing operating system, Windows 7, Ultimate, using a ubiquitous framework used by everyone, i.e. Metasploit. It involves installation of a backdoor on the victim machine, from a remote setup, mostly Kali Linux operating machine. This backdoor allows the attackers to create executable files and deploy them in the windows system to gain access on the machine, remotely. After gaining access, manipulation of sensitive data becomes easy. Access to the admin rights of any system is a red alert because it means that some outsider has intense access to personal information of a human being and since data about someone explains a lot of things about them. It basically is exposing and human hate that. It depraves one of their personal identity. Therefore security is not something that should be taken lightly. It is supposed to be dealt with utmost care. |
17,446 | Please write an abstract with title: A Novel Approach to Map the Intensity of Surface Melting on the Antarctica Ice Sheet Using SMAP L-Band Microwave Radiometry, and key words: Microwave radiometry, Ice, Snow, Antarctica, Satellite broadcasting, Microwave integrated circuits, Microwave FET integrated circuits. Abstract: The polar ice sheets have undergone unprecedented melt events in recent years, which have consequences for the ice sheet mass balance and stability, and global sea level. In this article, we employed L-band (1.4 GHz) brightness temperature observations collected by NASA's Soil Moisture Active Passive (SMAP) mission to investigate the extent, duration, and intensity of melt events on the Antarctic Ice Sheet from 2015 to 2020. The observed microwave response depends on the sensor measurement frequency. Our hypothesis for this article is that the relatively long wavelength (21 cm) SMAP observations can detect a wider range of surface wetness conditions relative to shorter wavelength microwave observations that attain signal saturation at relatively lower wetness levels and within shallower surface layers. SMAP provides nearly all-weather surface monitoring over all of Antarctica twice daily with morning and evening overpasses at about 40 km spatial resolution. We applied an empirical threshold algorithm using horizontally and vertically polarized microwave brightness temperature differences to detect surface melt events over Antarctica. The results show that the SMAP empirical algorithm can be used to detect melt extent and duration, and the geophysical model-based algorithm can be used to detect variations in snow wetness, which serve as an indicator of melt intensity. Analysis of the melt seasons between 2015 and 2020 shows that even though the melt extent in 2019–2020 was not as large as during the 2015–2016 melt season, it was significantly more intense, particularity on the West Antarctic Ice Sheet. |
17,447 | Please write an abstract with title: A cooperative nearest neighbours topology control algorithm for wireless ad hoc networks, and key words: Network topology, Ad hoc networks, Mobile ad hoc networks, Interference, Hardware, Power control, Computer science, Distributed algorithms, Throughput, Routing. Abstract: In this paper, we introduce a simple distributed algorithm that assigns appropriate individual transmission powers to devices in a wireless ad hoc network. In contrast to many other proposed algorithms, it does not depend on special hardware. It requires only local neighbourhood information and therefore avoids flooding information throughout the network. Finally, the cooperative nature of the algorithm avoids that devices cause excessive interference by using unnecessarily high transmission powers. We show by means of simulation that the topologies created by this algorithm without any global knowledge are as effective as topologies resulting from a good choice of a common transmission power (which would require global knowledge) in terms of the achievable throughput. |
17,448 | Please write an abstract with title: Adaptive control of robots with an improved transient performance, and key words: Adaptive control, Control systems, Linear systems, Automatic control, Robustness, Trajectory, Parameter estimation, Error correction, Robot control, Stability. Abstract: By using a robust control technique, this note proposes an adaptive control for rigid robots with the following important features: under a parameter-dependent persistent excitation (PE) condition, it gives a guaranteed transient performance of tracking a smooth desired trajectory while assuring the parameter, estimation error to go to a residual set of the origin arbitrarily fast. Simulations are included to support the theoretical results. |
17,449 | Please write an abstract with title: The Numerical Simulation and Investigation of Influence of Inductor Parameters on a Quality of Induction Surface Heating, and key words: Electromagnetic heating, Temperature distribution, Conferences, Heat engines, Numerical simulation, Steel, Inductors. Abstract: This paper describes the results of numerical simulation and investigation of induction surface heating process of the steel cylinder in the two-wind and three-wind inductors with the same height and diameter. Due to the obtained temperature distribution in the workpiece, the configuration of the inductor was revealed, which provides the most uniform heating of the workpiece. |
17,450 | Please write an abstract with title: The electrical conduction in polyimide nanocomposites, and key words: Polyimides, Nanocomposites, Dielectrics, Temperature, Isothermal processes, Steady-state, Electrochemical impedance spectroscopy, Current measurement, Mechanical factors, Optical polarization. Abstract: The electrical properties of polyimide based nanocomposites were fully investigated by isothermal steady-state current, dielectric spectroscopy, and thermally stimulated current measurements. The effect of nano fillers on the dielectric properties was evaluated via the interfacial polarization as well as the electrical conduction mechanism study. The electrical conduction of polyimide nanocomposites is found to be thermally assisted ionic in nature. The shift of the main thermally stimulated current peak to higher temperatures indicates deeper trapping by incorporating nano fillers. As a result, the nanocomposites will at least maintain the electrical breakdown strength because of the reduced electrical conductivity at elevated temperatures. |
17,451 | Please write an abstract with title: High accuracy simulation for high current multi-phase DC-DC power converters, and key words: DC-DC power converters, Circuit simulation, Computational modeling, Design automation, Electronic components, Virtual prototyping, Computer simulation, Power system modeling, Buck converters, Current measurement. Abstract: With the evolutionary complexity of miniaturized electronic components and systems, the reliance on computer-aided design tools (CAD) have surfaced in power design to predicate device and system prototype performance, to simulate behavioral responses, and to expedite design completion. However, the design paradox is trying to minimize simulation time and inaccuracies while increasing circuit construction complexity. Accurate models are the single most important factor in getting accurate data from any simulation. A new high-speed (4 sec), high-accuracy (5%) simulation tool for high current (40-80 A) nonisolated DC-DC multiphase buck converters are presented along with actual measured data. |
17,452 | Please write an abstract with title: A new model for multisection tunable lasers, and key words: Tunable circuits and devices, Laser modes, Laser tuning, Semiconductor lasers, Stimulated emission, Laser theory, Optical reflection, Refractive index, Optical materials, Spontaneous emission. Abstract: In the present contribution we further generalise the treatment to explicitly account for reflections at interfaces between sections and to allow the propagation constant to vary between sections. The model has been tested against published experimental results for a two-section laser and has shown good agreement. |
17,453 | Please write an abstract with title: Conceptual Study of Tri-beam Spacebrone SAR, and key words: Deformable models, Surface reconstruction, Solid modeling, Spaceborne radar, Scattering, Data models, Synthetic aperture radar interferometry. Abstract: Multi-temporal synthetic aperture radar interferometry (MT-InSAR) is used for many application in earth observations. Conventional SAR missions with single beam only detect deformation along the line of sight and relative elevation due to the undetermined model of phase wrapping. In this paper, a tri-beam spaceborne SAR mission is introduced to overcome the limitation of the relative measurements. Using multi-view measurements, it is possible to detect 3-D deformation and derive 3-D surface model from a single satellite platform. A multi-dimensional coherent scattering model is used to simulate the multi-temporal SAR data with different viewing angles. The results of this study indicate that the tri-beam SAR is able to measure 3-D deformation and reconstruct 3-D surface model without ground control point. |
17,454 | Please write an abstract with title: POLAR: Passive object localization with IEEE 802.11ad using phased antenna arrays, and key words: Phased arrays, Training, Antenna measurements, Robots, Bandwidth, Real-time systems. Abstract: Millimeter-wave systems not only provide high data rates and low latency, but the very large bandwidth also allows for highly accurate environment sensing. Such properties are extremely useful for smart factory scenarios. At the same time, reusing existing communication links for passive object localization is significantly more challenging than radar-based approaches due to the sparsity of the millimeter-wave multi-path environment and the weakness of the reflected paths compared to the line-of-sight path.In this paper, we explore the passive object localization accuracy that can be achieved with IEEE 802.11ad devices. We use commercial Access Points (APs) whereas the station design is based on a full-bandwidth 802.11ad compatible FPGA-based platform with a phased antenna array. The stations exploit the preamble of the beam training packets of the APs to obtain Channel Impulse Response (CIR) measurements for all antenna patterns. With this, we determine distance and angle information for the different multi-path components in the environment to passively localize a mobile object. We evaluate our system with multiple APs and a moving robot with a metallic surface. Our system operates in real-time and achieves 6.5cm mean error accuracy and sub-meter accuracy in 100% of the cases. |
17,455 | Please write an abstract with title: Can We Learn Heuristics for Graphical Model Inference Using Reinforcement Learning?, and key words: Semantics, Optimization, Image segmentation, Task analysis, Inference algorithms, Approximation algorithms, Learning (artificial intelligence). Abstract: Combinatorial optimization is frequently used in computer vision. For instance, in applications like semantic segmentation, human pose estimation and action recognition, programs are formulated for solving inference in Conditional Random Fields (CRFs) to produce a structured output that is consistent with visual features of the image. However, solving inference in CRFs is in general intractable, and approximation methods are computationally demanding and limited to unary, pairwise and hand-crafted forms of higher order potentials. In this paper, we show that we can learn program heuristics, i.e., policies, for solving inference in higher order CRFs for the task of semantic segmentation, using reinforcement learning. Our method solves inference tasks efficiently without imposing any constraints on the form of the potentials. We show compelling results on the Pascal VOC and MOTS datasets. |
17,456 | Please write an abstract with title: High Speed Serial Links Risk Assessment in Industrial Post-Silicon Validation Exploiting Machine Learning Techniques, and key words: Risk management, Tuning, Silicon, Data models, Data collection, Support vector machines, Hidden Markov models. Abstract: Post-Silicon system margin validation consumes a significant amount of time and resources. To overcome this, a reduced validation plan for derivative products has previously been used. However, a certain amount of validation is still needed to avoid escapes, which is prone to subjective bias by the validation engineer comparing a reduced set of derivative validation data against the base product data. Machine Learning techniques allow to perform automatic decisions based on already available historical data. In this work, we present an efficient methodology implemented with Machine Learning to make an automatic risk assessment decision for derivative products, considering a large set of parameters obtained from the base product. The proposed methodology yields a high performance on the risk assessment decision, which translates into a significant reduction in time, effort, and resources. |
17,457 | Please write an abstract with title: Advanced Transitive-Closure-Graph-Based Placement Representation for Analog Layout Design, and key words: Layout, Merging, Design automation, Very large scale integration, Topology, Tools, Physical design. Abstract: Due to complexity and susceptibility of analog layouts, maturity state of analog physical design automation has largely lagged behind that of the digital counterpart. It demands effective placement representations to handle nontrivial analog placement topologies especially in the advanced nanometer technologies. In this paper, we propose an advanced transitive-closure-graph-based placement representation (ATCG) to effectively and efficiently deal with analog placement. The versatility and flexibility of ATCG can ensure it to accurately control spacing and merging constraints uniquely required by analog layout design. Moreover, we also present a redundancy control scheme among the representation states in order to generate high-performance analog placement with high computation efficiency. Our experimental results demonstrate high efficacy of our proposed representation. |
17,458 | Please write an abstract with title: Personalized Image Aesthetics Assessment via Meta-Learning With Bilevel Gradient Optimization, and key words: Task analysis, Adaptation models, Optimization, Visualization, Integrated circuit modeling, Training. Abstract: Typical image aesthetics assessment (IAA) is modeled for the generic aesthetics perceived by an “average” user. However, such generic aesthetics models neglect the fact that users’ aesthetic preferences vary significantly depending on their unique preferences. Therefore, it is essential to tackle the issue for personalized IAA (PIAA). Since PIAA is a typical small sample learning (SSL) problem, existing PIAA models are usually built by fine-tuning the well-established generic IAA (GIAA) models, which are regarded as prior knowledge. Nevertheless, this kind of prior knowledge based on “average aesthetics” fails to incarnate the aesthetic diversity of different people. In order to learn the shared prior knowledge when different people judge aesthetics, that is, learn how people judge image aesthetics, we propose a PIAA method based on meta-learning with bilevel gradient optimization (BLG-PIAA), which is trained using individual aesthetic data directly and generalizes to unknown users quickly. The proposed approach consists of two phases: 1) meta-training and 2) meta-testing. In meta-training, the aesthetics assessment of each user is regarded as a task, and the training set of each task is divided into two sets: 1) support set and 2) query set. Unlike traditional methods that train a GIAA model based on average aesthetics, we train an aesthetic meta-learner model by bilevel gradient updating from the support set to the query set using many users’ PIAA tasks. In meta-testing, the aesthetic meta-learner model is fine-tuned using a small amount of aesthetic data of a target user to obtain the PIAA model. The experimental results show that the proposed method outperforms the state-of-the-art PIAA metrics, and the learned prior model of BLG-PIAA can be quickly adapted to unseen PIAA tasks. |
17,459 | Please write an abstract with title: Model-updated image guidance: initial clinical experiences with gravity-induced brain deformation, and key words: Brain modeling, Deformable models, Gravity, Predictive models, Neurosurgery, Surgical instruments, Drives, Computational modeling, Image databases, Surgery. Abstract: Image-guided neurosurgery relies on accurate registration of the patient, the preoperative image series, and the surgical instruments in the same coordinate space. Recent clinical reports have documented the magnitude of gravity-induced brain deformation in the operating room and suggest these levels of tissue motion may compromise the integrity of such systems. We are investigating a model-based strategy which exploits the wealth of readily-available preoperative information in conjunction with intraoperatively acquired data to construct and drive a three dimensional (3-D) computational model which estimates volumetric displacements in order to update the neuronavigational image set using model calculations, the preoperative image database can be deformed to generate a more accurate representation of the surgical focus during an operation. In this paper, we present a preliminary study of four patients that experienced substantial brain deformation from gravity and correlate cortical shift measurements with model predictions. Additionally, we illustrate our image deforming algorithm and demonstrate that preoperative image resolution is maintained. Results over the four cases show that the brain shifted, on average, 5.7 mm in the direction of gravity and that model predictions could reduce this misregistration error to an average of 1.2 mm. |
17,460 | Please write an abstract with title: Destination-initiated wavelength-weighted reservation protocols: scalable solutions for WDM rings, and key words: Protocols, Wavelength division multiplexing, Forward contracts, Lighting control, Optical fiber networks, WDM networks, Optical wavelength conversion, Network topology, Distributed control, Centralized control. Abstract: In this paper, the authors investigate the use of two destination-initiated wavelength-weighted reservation (DW/sup 2/R) protocols for the distributed setup of dynamic lightpaths in wavelength division multiplexed (WDM) rings. The two protocols are based on a weight-based wavelength selection heuristic, recently proposed for mesh topologies. The main objective of the DW/sup 2/R protocols is to reduce the probability of service denial due to multiple and concurrent wavelength reservation attempts, initiated by distinct sources. A detailed performance study based on simulation experiments on ring topologies reveals for the first time a number of desirable scalable properties of the DW/sup 2/R protocols. |
17,461 | Please write an abstract with title: Efficient available bandwidth estimation in ad hoc networks, and key words: Bandwidth, Intelligent networks, Ad hoc networks, Media Access Protocol, Admission control, Computer science, Throughput, History, Physical layer, Wireless LAN. Abstract: We present a method to estimate dynamically the available bandwidth of a node with its neighboring nodes being taken into account. In wireless networks, each node can overhear the frames sent by its neighboring nodes and get some important information from their headers. We implement our method by maintaining an active neighbor table (ANT) in each node. The ANT contains the information of all neighboring nodes that are contending a channel. The throughput of each active neighboring node can be obtained based on the transmission history. We can then know how much bandwidth is available for the considered node. Simulation results show that our estimation of available bandwidth is very accurate. |
17,462 | Please write an abstract with title: Diseño de un prototipo de exoesqueleto para rehabilitación postquirúrgica del síndrome del túnel del carpo, and key words: Wrist, Mechatronics, Automation, Thumb, Prototypes, Electronics packaging. Abstract: This article shows the results of the design in SolidWorks, of a prototype to carry out post-surgical rehabilitation processes of carpal tunnel syndrome, in order to reduce patient recovery times and travel to medical centers where these activities are carried out. The design was made for a portable prototype of a 15 degrees of freedom (GDL) structure, which is subject to the movements of three joints, metacarpophalangeal (MCP), proximal interphalangeal (PIP) and distal interphalangeal (DIP) for each of the fingers, except for the thumb that only has two (Distal and Proximal), additionally, for the wrist that has the radiocarpal, radio-ulnar and midcarpal joints that work together for flexion and extension movement. |
17,463 | Please write an abstract with title: Influence of the conductive adhesives joints to decoupling impedance, and key words: Conductive adhesives, Impedance, Power distribution, Switching circuits, Integrated circuit noise, Frequency, Integrated circuit technology, Noise level, Microprocessors, Application specific integrated circuits. Abstract: Design of the power distribution system is becoming an increasingly difficult challenge for modern complementary metal-oxide-semiconductor technology. Simultaneous switching noise is a major concern in present for microprocessors and application specific integrated circuits due to a combination of fast switching circuits, high clock frequencies, wide buses and low voltage levels. A major requirement to limit switching noise is the need for a low impedance power distribution system over a large frequency bandwidth and for this purpose it is used the decoupling. In the paper the influence of the conductive adhesives joints to decoupling impedance will be analyzed. To do this, the impedance of the decoupling line and their parameters (equivalent series resistance and equivalent series inductance) will be measured using appropriate test structures configurations. For these structures different adhesives formulations, different power supply line configurations and different type of decoupling capacitors will be investigated. |
17,464 | Please write an abstract with title: Pedestrian Target Tracking Based On DeepSORT With YOLOv5, and key words: Computer vision, Target tracking, Filtering, Surveillance, Image edge detection, Switches, Prediction algorithms. Abstract: Pedestrian target tracking is an important problem in the field of computer vision. To address low tracking accuracy and tracking errors in pedestrian target tracking. This paper developed a YOLOv5-based DeepSORT pedestrian target tracking algorithm (YOLOv5-DeepSORT), which introduces the high-performing YOLOv5 algorithm into the DeepSORT algorithm, which detects the tracking video frame by frame, and then predicts the target position using Kalman filtering while matching the same target using the Hungarian algorithm. To verify the performance of the YOLOv5-DeepSORT algorithm, this paper compares it with the YOLOv3-DeepSORT algorithm for experiments. The results show that the YOLOv5-DeepSORT algorithm can detect and track pedestrians well. Compared with the YOLOv3-DeepSORT algorithm, the MOTA of the YOLOv5- DeepSORT algorithm is improved by 9.9%, the number of false detections and missed detections is significantly reduced, and the number of target ID switching is decreased by 23 times, which proves the effectiveness of the method in this paper. |
17,465 | Please write an abstract with title: CloudFindr: A Deep Learning Cloud Artifact Masker for Satellite DEM Data, and key words: Deep learning, Earth, Satellites, Image processing, Geology, Urban planning, Data visualization. Abstract: Artifact removal is an integral component of cinematic scientific visualization, and is especially challenging with big datasets in which artifacts are difficult to define. In this paper, we describe a method for creating cloud artifact masks which can be used to remove artifacts from satellite imagery using a combination of traditional image processing together with deep learning based on U-Net. Compared to previous methods, our approach does not require multi-channel spectral imagery but performs successfully on single-channel Digital Elevation Models (DEMs). DEMs are a representation of the topography of the Earth and have a variety applications including planetary science, geology, flood modeling, and city planning. |
17,466 | Please write an abstract with title: Impact of the total dc-link voltage ripple on the grid-side harmonics of a 3LNPC back-to-back converter employed in a medium voltage WECS, and key words: Windings, Europe, Voltage, Medium voltage, Harmonic analysis, Transformers, Amplitude modulation. Abstract: The operation of two back-to-back three-level neutral point clamped (3LNPC) converters employed in a medium voltage (MV) wind energy conversion system (WECS) is analytically investigated. In particular, the harmonics that appear on the primary winding of the grid-side transformer due to oscillation of the dc-link voltage. |
17,467 | Please write an abstract with title: Design and Construction of a Planar Robotic Exoskeleton for Assessment of Upper Limb Movements, and key words: Robots, Exoskeletons, Elbow, Task analysis, Shoulder, Monitoring, Performance evaluation. Abstract: Robotic assessment devices aimed at patients with motor disorders offer a comprehensive insight into motor coordination. In this paper, we designed and constructed a novel upper-limb exoskeleton robot that can be helpful in proprioception assessments and rehabilitation of impairments after stroke. The Exoskeleton consists of two 2-DOF arms which are fully adjustable to accommodate users of different sizes. The robot has hinge joints aligned with the user's shoulder and elbow, operates in a horizontal plane, and provide independent assessment of elbow and shoulder joints. By recruiting a virtual reality environment along with the exoskeleton, we have provided a platform that conveniently enables assessments of upper extremity, without the encumbrances of existing methods. As a preliminary step of validation, the reaching experiments were run as a qualitative test to find out user's perception of the device. Results underline the ability of the user to perform a variety of motor tasks under this protocol. |
17,468 | Please write an abstract with title: Full C-band slope-matched dispersion compensation based on a phase sampled Bragg grating, and key words: Bragg gratings, Sampling methods, Optical fiber dispersion, Chirp, Fiber gratings, Channel spacing, Delay, Optical fiber communication, Optical fibers, Wavelength division multiplexing. Abstract: A 51 channel fiber Bragg grating slope-matched dispersion compensator is produced with a complex phase mask. The phase mask includes a phase sampling function with a linearly chirped sampling period to achieve dispersion slope-matching. |
17,469 | Please write an abstract with title: Target Speech Extraction: Independent Vector Extraction Guided by Supervised Speaker Identification, and key words: Speech processing, Data mining, Training, Feature extraction, Time-frequency analysis, Task analysis, Microphones. Abstract: This manuscript proposes a novel robust procedure for the extraction of a speaker of interest (SOI) from a mixture of audio sources. The estimation of the SOI is performed via independent vector extraction (IVE). Since the blind IVE cannot distinguish the target source by itself, it is guided towards the SOI via frame-wise speaker identification based on deep learning. Still, an incorrect speaker can be extracted due to guidance failings, especially when processing challenging data. To identify such cases, we propose a criterion for non-intrusively assessing the estimated speaker. It utilizes the same model as the speaker identification, so no additional training is required. When incorrect extraction is detected, we propose a “deflation” step in which the incorrect source is subtracted from the mixture and, subsequently, another attempt to extract the SOI is performed. The process is repeated until successful extraction is achieved. The proposed procedure is experimentally tested on artificial and real-world datasets containing challenging phenomena: source movements, reverberation, transient noise, or microphone failures. The method is compared with state-of-the-art blind algorithms as well as with current fully supervised deep learning-based methods. |
17,470 | Please write an abstract with title: Numerical analysis of micro hybrid Multi-Level Zone Plates using electromagnetic and scalar methods, and key words: Numerical analysis, Optical signal processing, Lighting, Lenses, Optical device fabrication, Optical interconnections, Optical surface waves, Communication switching, Electromagnetic analysis, Optical refraction. Abstract: In this work we report on the results of a rigorous numerical analysis taking into account the whole Multi-Level Zone Plate (MLZP) structure. The analysis is carried out with one-dimensional structures using both electromagnetic and scalar methods as well as TE and TM illumination. |
17,471 | Please write an abstract with title: Global observability and detectability analysis for a class of nonlinear models of biological processes with bad inputs, and key words: Observability, Biological system modeling, Biological processes, Nonlinear systems, Nonlinear dynamical systems, Control systems, Stability, Wastewater treatment, Inductors, Bioreactors. Abstract: This paper proposes a new general approach to the global analysis of observability and detectability for nonlinear systems. Based on the definition of indistinguishability it is possible to derive the dynamics of the non-observable part of the system and thus to study its stability properties using methods of nonlinear systems theory. The method is first introduced in general and then applied to a class of nonlinear models for biological processes as e.g. in waste water treatment. Finally detectability conditions for the reactor model are deduced. |
17,472 | Please write an abstract with title: Distributed versus centralized multiuser detection with antenna arrays in frequency-selective multipath channels, and key words: Multiuser detection, Antenna arrays, Frequency, Multipath channels, Decorrelation, Multiaccess communication, Receiving antennas, Signal detection, Gaussian channels, Fading. Abstract: We have analyzed and compared two different multiuser detection receiver structures that are appropriate for code-division multiple access (CDMA) systems with multiple antennas in frequency-selective multipath channels. Distributed decorrelation detection (where signal decorrelation is performed at each receiving antenna) and centralized decorrelation detection (where decorrelation is performed once collectively) are compared. We show that they provide the same performance in additive Gaussian channels. Centralized decorrelation detection provides better performance in general frequency-selective multipath fading channels. Therefore, the hardware cost, complexity, and processing at the receiver can be optimized using centralized decorrelation detection. We employ decorrelation detection to demonstrate our results, although the work can be easily extended to other linear multiuser detection configurations. |
17,473 | Please write an abstract with title: Implementation of optical pulse densitometry sensor, and key words: Absorption, Pulse measurements, Wavelength measurement, Signal processing, Blood, Standards, Optical pulses. Abstract: Determining the rate of elimination of indocyanine green in the blood is the most informative way to evaluate liver function, supplementing standard methods for studying hepatic function. It is proposed to use optical pulse densitometry as a method of study. The paper presents the development of a non-invasive optical pulse densitometry sensor for measuring light absorption by a tissue at a specific wavelength, a signal processing system, as well as analysis of information on light absorption. |
17,474 | Please write an abstract with title: Are we geared up for evs?: The UK will only be in a position to ban new petrol cars by 2035 if the charging infrastructure for electric vehicles is fit for purpose, and key words: Automobiles, Government, Petroleum, Vehicles, Electric vehicle charging, Regulation, Industries. Abstract: IN FEBRUARY, before the coronavirus pandemic reached the UK, Transport Secretary Grant Shapps announced his intention to bring forward the ban on sales of new petrol, diesel and hybrid cars and vans from 2040, as previously announced, to 2032, in a bid to meet the UK's carbon reduction targets. |
17,475 | Please write an abstract with title: Using datacube aggregates for approximate querying and deviation detection, and key words: Aggregates, Marketing and sales, Cities and towns, Computer Society, Inverse problems, Data analysis, Information analysis, Information entropy, Data mining, Decision making. Abstract: Much research has been devoted to the efficient computation of relational aggregations and, specifically, the efficient execution of the datacube operation. In this paper, we consider the inverse problem, that of deriving (approximately) the original data from the aggregates. We motivate this problem in the context of two specific application areas, approximate query answering and data analysis. We propose a framework based on the notion of information entropy that enables us to estimate the original values in a data set, given only aggregated information about it. We then show how approximate queries on the data from which the aggregates were derived can be performed using our framework. We also describe an alternate use of the proposed framework that enables us to identify values that deviate from the underlying data distribution, suitable for data mining purposes. We present a detailed performance study of the algorithms using both real and synthetic data, highlighting the benefits of our approach as well as the efficiency of the proposed solutions. Finally, we evaluate our techniques with a case study on a real data set, which illustrates the applicability of our approach. |
17,476 | Please write an abstract with title: Modern Analysis of Hutchinson's Trace Estimator, and key words: Computer science, Estimation, Tools, Linear matrix inequalities. Abstract: The paper establishes the new state-of-art in the accuracy analysis of Hutchinson's estimator for the matrix trace. Leveraging tools that have not been previously used in this context, particularly hypercontractive inequalities and results on concentration of sub-gamma distributions, we offer an elegant and modular analysis, as well as numerically superior bounds. Besides the improvements, this work aims to better popularize the aforementioned techniques within the CS community. Leveraging tools that have not been previously used in this context, particularly hypercontractive inequalities and results on concentration of sub-gamma distributions, we offer an elegant and modular analysis, as well as numerically superior bounds. Besides the improvements, this work aims to better popularize the aforementioned techniques within the CS community. Besides the improvements, this work aims to better popularize the aforementioned techniques within the CS community. |
17,477 | Please write an abstract with title: A Study on the Security of Privacy Homomorphism, and key words: Privacy, Cryptography, Information security, Data security, Application software, Polynomials, Public key, Knowledge engineering, Hardware, Equations. Abstract: Informally, Privacy Homomorphism (PH) refers to encryption schemes with a homomorphic property allowing to obtain Ek(a + b) or E_k(a × b) from ciphertexts E_k(a) and E_k(b) without the knowledge of the decryption key. PH has a wide range of applications in information security due to its homomorphic property, but the best achievable security of them is yet unknown. In this paper, we discuss the security of PH in the black-box model and find that any PH is at most semantically secure under non-adaptive chosen-ciphertext attacks (i.e. IND-CCA1 secure). We also show that the IND-CCA1 security can be achieved with a small amount of hardware, namely, we offer a hardware-based solution to construct PH with provable security. |
17,478 | Please write an abstract with title: Design and development of Air to Water Generator for the Village in Kerala, India, and key words: Urban areas, Sociology, Government, Prototypes, Moisture, Humidity, Water quality. Abstract: Wayanad, a district in India's southwestern state of Kerala is known for its forest cover, has been impacted by changing precipitation patterns, decreased annual rainfall, and water shortfall. The water crisis's impact on society and the economy are extensively discussed. The various alternatives to provide access to water were evaluated to determine their cost-effectiveness. The human-centered design approach was used to identify the actual problems with active participation from the community. Subsequently, solutions were co-designed with the indigenous population, keeping in mind their cultural and socio-economic conditions. A laboratory-scale prototype air-to-water generation system was fabricated and tested based on the design parameters. The prototype works on the dehumidification principle, extracting moisture from the air. The village's high humidity, viability and environmental friendliness, ease of government approval, and ability to provide distinct units for each house or group of locations contributed to the plan's selection. We quantified and analyzed the effects of process parameters such as relative humidity, ambient temperature, operating time, and water quality. Finally, test results were discussed in terms of the system's impact on meeting the water requirements of the community. |
17,479 | Please write an abstract with title: Identification of Co-change Patterns in Software Evolution, and key words: History, Data mining, Couplings, Software measurement, Open source software. Abstract: Tracking the after-effect of changes is very difficult due to complex and huge structure of software applications now days. Researchers have found that revision history is very useful in deriving dependencies in software applications. However it is difficult to choose the right history length that is useful for dependency identification. Also all the new and old commits do not have the same potential in identifying dependencies. In this paper, we propose the use of change history for measuring the co-change probability in software applications by varying the weightage of change commits. Academicians and researchers may find this approach useful for studying the effect of revision age on cochange prediction results. |
17,480 | Please write an abstract with title: Hand Gesture Recognition using Shape-based Image Features for Music Controller, and key words: Training, Webcams, Tracking, Shape, Thumb, Process control, Gesture recognition. Abstract: The main objective of this article is to develop a system for recognizing the user’s hand gesture by detecting some significant shape-based features. The features are orientation, finger status, thumb in either in folded or raised form as well posture of hand fingers of hand, and their relevant position in the given input image. There is a similarity between the shape of the hands and the fingers of the human. The goal of work is to make a real-time system for passing the information to other devices or controlling the device by recognizing the gesture motion. The suggested method is particularly intended for use in a multitasking environment. While working on multiple programs on desktop at the same time like hearing music and playing in different windows. To skip from one song to another song or stop a song some appropriate action must be taken. This is a long and time-consuming procedure. Users will save time and remain connected to the job that can be executed this activity without using the music system and with only one hand movement. The Music Controller switches or pause the current music track by making a simple hand movement in front of the webcam. |
17,481 | Please write an abstract with title: A Novel Trust Model In Detecting Final-Phase Attacks in Substations, and key words: Privacy, Substations, Protocols, Real-time systems, Smart grids, Blocklists, Security. Abstract: A substation’s security is paramount because it is an integral part of the Smart Grid for the transmission and distribution of electricity. Advanced persistent threats (APTs) have become the bane of the substation because they can remain undetected for a period until final attacks are launched. A lot of existing techniques may not be real-time enough to detect these final attacks. Trust, even though less investigated, can be used to tackle these attacks. In this paper, we present a trust model designed specifically for the Modbus communication protocol that can detect final attacks from APTs when a substation is compromised. This model is formed from the perspective of the substation device and was successfully tested on two publicly available Modbus datasets under three testing scenarios. The external test, the internal test, and the internal test with IP-MAC blacklisting. The first test assumes attackers’ IP, and MAC addresses are not part of the substation network, and the other two assume otherwise. Our model detected the attacks within each dataset and also revealed the attack behaviour within the two datasets. Our model can also be extended to other protocols, and this has been marked for future work. |
17,482 | Please write an abstract with title: Improve Spark-based Application Performance Using Minimizer, and key words: Sequential analysis, Genomics, Bioinformatics, Standards, Task analysis, DNA, Correlation. Abstract: SpaRC(Spark Reads Clustering) is a generic sequence clustering algorithm based on Spark, which provides a scalable solution for billions of reads. However, SpaRC measures the correlation between reads by employing k-mer. This method can effectively complete computing tasks when the the amount of data is small. However, as the amount of data increases, the shortcomings of long running time and large memory resources are increasingly prominent. Here we explored a sequence similarity measurement method to alleviate these problems by using minimizer to measure sequence similarity between reads, without long running time and large memory resources. This method combines the minimizer measurement strategy and extracts the overlap rate information of reads to measure the sequence similarity between different reads, instead of the traditional method using k-mer. Results indicate that the method offers great improvement in clustering performance. Compared with the traditional k-mer method, this method can effectively improve the use of memory resources by SpaRC. |
17,483 | Please write an abstract with title: Wavelength agile mid-IR (5-10 μm) ZnGeP<sub>2</sub> optical parametric oscillator pumped using a Galvano-controlled KTP-OPO, and key words: Nonlinear optics, Optical pumping, Oscillators, Laser tuning, Biomedical optical imaging, High speed optical techniques, Optical sensors, Optical tuning, Tunable circuits and devices, Laser excitation. Abstract: A new tunable, random wavelength accessible mid-IR ZGP optical parametric oscillator (OPO) was demonstrated using a Galvano-controlled KTP-OPO. The mid-IR wavelength is controlled by tuning the pump wavelength with a double crystal KTP-OPO. |
17,484 | Please write an abstract with title: X-ray diffraction with sub-picosecond time resolution, and key words: X-ray diffraction, X-ray lasers, Optical pulse generation, Optical pulses, Probes, Atomic beams, Optical materials, Atom lasers, Laser transitions, Laser excitation. Abstract: Microplasmas generated by femtosecond laser pulses emit short bursts of multi-keV X-rays. X-ray diffraction of these pulses can be used to probe ultrafast changes in the atomic configuration of the material caused by pulsed laser excitation. |
17,485 | Please write an abstract with title: Randomly sampled digital filters, and key words: Digital filters, Gold, Signal sampling, Signal processing, Antennas and propagation, Filtering algorithms, Time sharing computer systems, Radar tracking, Electrons, Design methodology. Abstract: The concept of a randomly sampled digital filter is introduced and formulated in this paper. An equivalent problem, which is of utmost importance in digital filtering, is also considered, namely, the problem of digital filtering with faulty samplers. Error analysis is carried out in two different approaches: 1) frequency response method, and 2) worst-case analysis. With the confirmation of experimental verification, very simple formulas are derived that are applicable under different realistic assumptions, and are most appealing to practical design purposes. |
17,486 | Please write an abstract with title: Automatic Glaucoma Diagnosis Based on Photo Segmentation with Fundus Images, and key words: Optical losses, Image segmentation, Systematics, Statistical analysis, Image databases, Filtering, Feature extraction. Abstract: Glaucoma is a prime sickness that damages the optic nerve of the eye and it additionally results in everlasting vision loss. Retinal photograph evaluation is comprehensively hired in the clinical area for the recognition of abnormalities in the eye. for this reason, it's far important to locate the glaucoma from the attention at an early stage. consequently, segmentation is a significant procedure for automatic glaucoma diagnosis in an accurate manner. a singular technique photo segmentation method is introduced for accurate glaucoma detection with minimal time consumption. initially, the wide variety of fundus snap shots is amassed from the database. The photo segmentation approach accommodates the three important tactics namely preprocessing, segmentation, feature extraction. The photo segmentation technique is carried out for photograph preprocessing to eliminate the noise artifacts and attain the high-quality improved photo. Secondly, the infomax enhance clustering method is applied to section the enter pix into the variety of segments to extract the place of hobby element. subsequently, the exceptional scientific capabilities are extracted from the segmented area and perform the statistical evaluation to pick out the Glaucoma sickness or normal. The proposed photo segmentation approach is carried out the usage of a fundus picture database for qualitative and quantitative analysis. Experimental assessment is finished using a fundus photograph dataset with exceptional parameters along with peak sign to noise ratio, sickness detection accuracy, false-wonderful rate, and disorder detection time with recognize to the variety of photographs. The mentioned consequences demonstrate that the photo segmentation approach achieves higher Glaucoma detection accuracy with minimum time consumption and fake-wonderful price than the nation -of -the -art strategies |
17,487 | Please write an abstract with title: A hybrid maximum error algorithm with neighborhood training for CMAC, and key words: Convergence, Kinematics, Robots, Neural networks, Iterative algorithms, Algorithm design and analysis, Employment, Brain modeling, Mathematical model, Information processing. Abstract: Several possible algorithms and training methods for the CMAC network are analyzed thoroughly. Improvements are then examined and a hybrid approach has been developed for the maximum error algorithm by using the neighborhood training technique for the initial training period. The employment of the technique yielded faster initial convergence which is very important for many control applications. The proposed hybrid approach is demonstrated on an inverse kinematics problem of a two-link robot arm. |
17,488 | Please write an abstract with title: Application of artificial intelligence techniques to obtain robust dynamic equivalents, and key words: Artificial intelligence, Robustness, Artificial neural networks, Power system dynamics, Power system modeling, Power system simulation, Humans, Power system planning, Power system transients, Power system stability. Abstract: This paper presents an application of artificial neural networks (ANN) to power systems. ANN are tested to construct dynamic equivalents, which is considered a hard task in the context of power systems. The main objective is to reproduce the complex voltage at frontier nodes. The simulation results prove the applicability and robustness of this innovative approach. |
17,489 | Please write an abstract with title: A new super-resolution spectral estimation technique using staggered PRFs, and key words: Frequency, Signal resolution, Nonuniform sampling, Doppler radar, Radar applications, Radar detection, Doppler shift, Radar signal processing, Entropy, Spectral analysis. Abstract: This paper presents a new super-resolution spectral estimation technique based upon nonuniform sampling of time series data. The focus is the application to a radar system employing nonuniform transmission of pulses or staggered pulse repetition frequencies (PRFs). This spectral estimator can detect target doppler shifts an order of magnitude greater than the largest PRF; thus it is capable of providing unambiguous range and doppler coverage simultaneously for a radar system operating on long-range targets. The mathematical realization of this estimator requires relatively less signal processing than other conventional nonlinear methods; e.g., maximum entropy spectral analysis (MESA). In addition, it appears to provide sharper target peaks with very little frequency offset even in a low signal to noise ratio environment. The narrow bandwidth of the peak may become a disadvantage when doppler detection is performed in real-time. This occurs because real time processing involves examining a large number of points on the frequency axis. However, this problem can be alleviated greatly by using an integer search algorithm which exploits the property of nonuniform sampling. |
17,490 | Please write an abstract with title: Machine-Learning-Based Fast Angle-of-Arrival Recognition for Vehicular Communications, and key words: Estimation, Antenna arrays, Training, Antenna measurements, Support vector machines, Real-time systems, Array signal processing. Abstract: Obtaining angle-of-arrival (AOA) information is of great significance to improve the performance of communication systems. Real-time AOA recognition can reduce the complexity of beamforming design for massive multiple-input multiple-output (MIMO) systems, and can be used to construct an outer precoder to optimize the system and rate. However, for vehicular communications, AOA will change with environment and positions of vehicles, and it is difficult to obtain accurate AOA in real-time. Therefore, a fast AOA recognition method is needed to adapt to the rapid changes of channels. The traditional spectral- or parametric-based AOA estimation methods are difficult to obtain real-time AOA information because of the relatively high computational complexity. In order to solve this problem, this paper proposes a machine-learning-based fast AOA recognition approach. The proposed method includes off-line training and on-line estimation processes. In the off-line training process, an estimation model is obtained by using the support vector machine (SVM) based on a large number of actual measurement data in vehicular scenarios. Then, in the on-line estimation process, the obtained model is used to realize fast AOA recognition according to the channel snapshots collected by antenna array. Furthermore, the performance is verified under the different conditions of SVM parameters, training features, antenna numbers, and training data sizes. The experimental results show that the proposed method has satisfactory accuracy in real-time AOA recognition, and the optimal configuration and implementation scheme are also discussed. |
17,491 | Please write an abstract with title: Research on Simulation Technology of Opening and Closing Process of High Voltage Isolating Switch in Normal and Fault State, and key words: Fault diagnosis, Shafts, Analytical models, Torque, Substations, Process control, Switches. Abstract: The high-voltage isolating switch is an important switching device in the electrical system of power plants and substations. This article takes the GW23B-252 isolating switch as an example, and conducts dynamic simulation on it. This paper Obtains the relationship between the output shaft torque and rotation angle of the operating mechanism with time by simulating the closing and opening process of the main knife under normal operating conditions. Which provides a reference basis for the installation, commissioning, overhaul and maintenance of the isolation switch, and provides guidance for fault diagnosis and product maintenance. |
17,492 | Please write an abstract with title: XGBoost Regression of the Most Significant Photoplethysmogram Features for Assessing Vascular Aging, and key words: Aging, Indexes, Feature extraction, Boosting, Classification algorithms, Blood vessels, Artificial intelligence. Abstract: The purpose of this study was to confirm the potential of XGBoost as a vascular aging assessment model based on the photoplethysmogram (PPG) features suggested in previous studies, and to explore the key PPG features for vascular aging assessment through an explainable artificial intelligence method. The PPG waveforms obtained from 752 volunteers aged 19–87 years were analyzed and a total of 78 features were derived that were proposed in previous studies. Age was estimated through an XGBoost regression model, and estimation error was calculated in terms of mean absolute error and root-mean-squared error. To evaluate feature importance, gain, coverage, weight, and SHAP value was calculated. The vascular aging assessment model developed using XGBoost has 8.1 years of mean-absolute error and 9.9 years of root-mean-squared error, a correlation coefficient of 0.63 with actual age, and a coefficient of determination of 0.39. Feature importance analysis using the SHAP value confirmed that features, such as systolic and diastolic peak amplitude, risetime, skewness, and pulse area, play a key role in vascular aging assessment. The XGBoost regression model showed an equal level of performance to the existing PPG-based vascular aging assessment models. Moreover, the result of feature importance analysis using explainable artificial intelligence verified that the features proposed in previous vascular aging assessment studies, such as reflective index and risetime, were more important in vascular aging assessment than other PPG features. |
17,493 | Please write an abstract with title: Using Deep Learning For Assessing Cybersecurity Economic Risks In Virtual Power Plants, and key words: Economics, Deep learning, Analytical models, Data models, Computer security, Bagging, Power generation. Abstract: This paper presents an assessment procedure for evaluating economic risks in Virtual Power Plants (VPPs) using two deep learning techniques, viz., Naïve Bayes algorithm and J48 bagging tree model. A comprehensive matrix of cybersecurity economic assessment based on threats, motives, impacts, challenges and economic impacts is provided in this paper. Cybersecurity risk quantification and their measurement and Cyber risk mitigation frameworks are also dealt with in this paper. Our cybersecurity risk Return On Security Investment (ROSI) model employs 9-parameters, while our dataset collection is classified into 11 types of attack profiles. The results obtained from Naïve Bayes classifier and CRQ using J48 bagging tree model yield a predictor accuracy of 82%, while the classifier correctly classifies instances in Naïve Bayes with a Receiver-Operator-Characteristic (ROC) area of 0.940 indicating the good classification of the sampled data; the prediction rate is 94.2% for the CRQ-J48. The ROC curve for the naïve Bayes classifier performs its best when the data is at 80% and performs worse when at 10%. Similarly, the J48 performs best when the data is at 85%-90% and worse between 5%-10%. While examining the cost of the data breach of a single instance of compromise, it can be estimated that web server has the maximum exposure and hence the cost of a breach is approximately estimated to be around 19 million dollars in our dataset. |
17,494 | Please write an abstract with title: Study on Wind Induced Vibration Response of High-voltage Disconnector Switch by Wind Tunnel Test, and key words: Vibrations, Wind tunnels, Switches, Displacement measurement, Position measurement, Vibration measurement, Load modeling. Abstract: The disconnector switch is highly sensitive to the wind load. Under the strong wind, such structure can have a huge wind-induced vibration, which may cause its destruction and result in the loss of the high-voltage substations. In order to study this vibration characteristic, the wind-tunnel test of the GW35-550 high voltage disconnector switch has been presented. In this paper, firstly its aeroelastic model with a scale ration of 1/3.775 was well designed and manufactures through finite element analysis. Then, the wind-induced response including displacement, acceleration and wind vibration coefficients have been obtained in the wind fields specified by the China code: Building Structure Load Specification (GB50009-2012). Experimental results shows that the maximum windinduced displacement is at the top of this model, and there have a strong cross-wind vortex-induced vibration phenomenon. This study can provide useful guidance for the material selection and mechanism design optimization of the disconnector switch. |
17,495 | Please write an abstract with title: A phased array approach to MIMO for wireless applications, and key words: Phased arrays, MIMO, Antenna arrays, Transmitting antennas, Transmitters, Mobile antennas, Receiving antennas, Wireless communication, Throughput, Fading. Abstract: In this paper we investigated the performance of linear uniform array, as it is usually used in the MIMO systems. By using the phased array techniques we investigated the effect of pattern rotation on the capacity of the system. |
17,496 | Please write an abstract with title: Development of a Point Absorber Wave Energy Converter with Magnus Effect-Based Turbine Generator, and key words: Torque, Wave power, Design methodology, Blades, Mathematical models, Generators, Steady-state. Abstract: Since wave power from ocean waves has the advantages of high energy density and predictability of fluctuations, various concepts of wave energy converter (WEC) have been proposed and investigated. However, only a few of them have progressed to the stage of practical application. This is because the wave energy is proportional to the width of the wave, so it is necessary to increase the size of WEC to capture large amounts of energy. The point absorber WEC can be a candidate for the best solution for WECs because it can harvest large amounts of energy regardless of the size of the system by resonating the operation of the system and the wave. In this study, a novel point absorber WEC using a turbine generator driven by the Magnus effect is proposed, and the usefulness of the proposed WEC are discussed through theoretical investigations. A simulation model is developed first. Steady-state characteristics of the system are investigated and system design guidelines are identified. It is shown that if the system is properly designed, it will be comparable to the wave power generation systems that have been realized. Finally, the resonance control necessary to achieve synchronization of operation of the WEC and wave oscillation is discussed. |
17,497 | Please write an abstract with title: An efficient cw diode-pumped Nd:YVO/sub 4/ laser with reciprocal self-organizing dynamic holographic cavity, and key words: Diodes, Holography, Optical beams, Optical amplifiers, Laser beams, Optical pumping, Power generation, Holographic optical components, Pump lasers, Laser feedback. Abstract: A diode-pumped Nd:YVO/sub 4/ laser with a reciprocal self-intersecting loop cavity completed by dynamic grating induced by the generating beams was realized. Continuous-wave, high-quality beam generation (M/sup 2//spl ap/1) with 10 W power and 32% optical efficiency was obtained. |
17,498 | Please write an abstract with title: Therapist-patient interaction in virtual reality at the level of the upper limbs, and key words: Visualization, Electronic learning, Collaboration, Virtual reality, Arms, Animation, Timing. Abstract: This paper describes upper extremity interaction system implemented in collaborative virtual reality. Main focus of the paper is to the description of the functionality of animation settings within the parameters of interaction/rehabilitation, visualization and functionalization of the system. With this system, the patient can be stimulated under the supervision of a therapist to practice some rehabilitation/training procedures. Due to the use of collaborative virtual reality, this process can be also applied in a distance form and thus it expands the therapist-patient interaction. |
17,499 | Please write an abstract with title: A Combined Weight method in Automatic Classiflcation of Chinese Text, and key words: Data mining, Classification tree analysis, Computational linguistics, Natural languages, Cognitive science, Frequency, Reflection, Dictionaries, Organizing, Functional analysis. Abstract: In this paper, we set a shielded level in a concept tree to use both the concept attributes from a semantic dictionary and the Chinese words to make the feature set. After comparing the weight theories and classification precise, of the eight methods, we give a new selection method, the CHI-MCOR weight method, which is derived from two normal methods which present well in our experiments. Our former experiment result shows that if we can set a proper shielded level, we can not only reduce the feature dimension but also improve the classification precise. The later result shows that the combined weight method makes a good balance between the fuzzy words which have a high occurrence and the dividing words which have a middle or low occurrence, and the classification precise is higher than any one of the weight methods. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.