ID int64 0 400k | content stringlengths 97 5.85k |
|---|---|
19,900 | Please write an abstract with title: A simulation study of an energy efficient routing protocol for mobile ad hoc networks, and key words: Energy efficiency, Routing protocols, Mobile ad hoc networks, Ad hoc networks, Computational modeling, Network topology, Sensor phenomena and characterization, Global Positioning System, Communication system security, Power engineering and energy. Abstract: We present a novel energy efficient routing protocol for mobile ad hoc networks. This protocol is particularly designed for dense networks. Node location information is used to simplify routing strategy. Only a small number of nodes are involved in one routing. This reduces the routing overhead and saves energy for other nodes. We conduct extensive simulations to study the performance of the routing protocol, and compare the performance with LAR routing protocol. The simulation results demonstrate that the routing protocol has very good performance and good scalability. Both the computation and simulation show that the routing protocol incurs only about 25% of the routing overhead of LAR routing protocol. |
19,901 | Please write an abstract with title: Automated deployment and scaling of automotive safety services in 5G-Transformer, and key words: Automobiles, Automotive engineering, Monitoring, Safety, Industries, 5G mobile communication, Image edge detection. Abstract: There is a growing interest of verticals (in this case, the automotive industry) to reap the benefits of 5G networks. At the same time, there is a clear trend of the telco industry to understand their needs. These are also some of the main goals of the EU 5G-TRANSFORMER (5GT) project. This demo focuses on the need of verticals to dynamically deploy services at the edge and to adapt the vertical service to network operational conditions. In particular, it is presented the Extended Virtual Sensing (EVS) service, which deployed on demand at the distributed computing infrastructure (i.e. in the network), complements sensing and processing functions running in the car to detect the risk of collisions and take appropriate action, even if there is no direct communication between cars. The stringent latency constraints imposed by the EVS network service leave a limited processing budget at the vertical service level. Since such processing time is correlated with the CPU consumption of a virtual machine running a VNF of the EVS network service, in this demo we also show how the vertical service exploits the automated scaling capabilities offered by the 5GT service orchestrator to deploy a new instance of the EVS VNF upon reception of a CPU consumption alert generated by the available 5GT monitoring platform. |
19,902 | Please write an abstract with title: Assessment of high voltage auto-transformer spare requirements in bulk transmission systems, and key words: Voltage, Transformers, Propagation losses, Cost function, Risk analysis, Power industry, Availability, Security, Power system protection, Explosion protection. Abstract: High voltage auto-transformers represent an important component of bulk transmission systems and are used to transform voltage from one level to another. These auto-transformers are critical for regional load supply, inter-regional load transfers and for certain generator/load connections. Major or catastrophic failures to this equipment can have severe consequences to electric utilities in terms of increased operating costs and customer load losses. To minimize the impact of this type of failures, utilities may carry some spare units to guard against such events. These spare units are going to cost utilities money (utility cost) to purchase, to store and to maintain and utilities should try to strike the right balance between the utility cost and the risk cost (if spare units are not there). This paper describes a probabilistic approach for assessing the risk associated with catastrophic failures of auto-transformers used in bulk transmission systems with and without availability of spare units. The computed risk will be expressed in dollars and will be added to the cost of carrying any spare units. The required number of spare units (optimal) is obtained when the total cost, utility and risk costs, is minimal. Sensitivity studies are carried out to determine the system parameters that have dominant impacts on the optimal number of spares. An example is presented to illustrate the proposed assessment methodology. |
19,903 | Please write an abstract with title: Sigma-Modified Power Control and Parametric Adaptation in a Grid-Integrated PV for EV Charging Architecture, and key words: Electric vehicle charging, Bidirectional control, Batteries, Vehicle-to-grid, Switches, Renewable energy sources, Power quality. Abstract: This paper presents a sigma-modified adaptive control algorithm to enhance the charging profile in a multi-objective electric vehicle (EV) charging installation. The present algorithm takes care of multiple parametric uncertainties and grid non-idealities to provide an instantaneous control updation in order to achieve well-regulated charging dynamics. With the support of renewable energy and battery energy storage (BES), the present algorithm also ensures an uninterrupted charging profile with controller robustness and stability for bi-directional EV charging. The sigma-mod adaptive controller provides an iterative error convergence at each clock interval of supply voltage dynamics to guarantee improved power quality operation in presence of grid distortions. To further improve the reliability of EV charging opportunities, a solar photovoltaic (PV) array in conjunction with the battery energy storage supports the ancillary services through maximum power point operation. Multivariable sliding mode control and rule-based phase-shift adaptation at different stages of power transformation assure faster convergence, parameter uncertainty and controller stability for the bi-directional EV charging operation. A 3.3 kW PV-integrated off-board charging facility is designed and developed as a laboratory prototype to validate the multi-mode charging architecture with minimal grid dependency. |
19,904 | Please write an abstract with title: A novel wide-band circularly polarized patch antenna based on L-probe and aperture-coupling techniques, and key words: Broadband antennas, Polarization, Patch antennas, Bandwidth, Antenna measurements, Dielectric measurements, Wavelength measurement, Aperture antennas, Antenna feeds, Dielectric substrates. Abstract: The design and measurements of a wide-band patch antenna with circular polarization are presented. For the proposed antenna, an L-probe and an aperture are utilized to feed the patch orthogonally. The distance between the patch and the ground plane is 0.1 free-space wavelength at 1.8 GHz. Air is used as the dielectric substrate. A Wilkinson power combiner is connected to the feeds to generate circular polarization. The antenna possessed a 14-dB return loss bandwidth of 35% (from 1.49 to 2.12 GHz), and has a 3-dB axial ratio bandwidth of 20.4% (from 1.67 to 2.05 GHz). The 3-dB axial ratio beamwidth and the boresight axial ratio are 84/spl deg/ and 1.94 dB at 1.8 GHz, respectively. |
19,905 | Please write an abstract with title: Investigation on Torque Characteristic and PM Operation Point of Flux-Intensifying PM Motor Considering Low-Speed Operation, and key words: Reluctance motors, Permanent magnet motors, Torque, Inductance, Magnetic circuits, Optimization, Permanent magnets. Abstract: In this article, a new type of flux-intensifying permanent magnet (FI-PM) motor is designed, analyzed, and optimized. It focuses on the low-speed operation condition of electric vehicles (EVs). The key characteristic of this motor is the feature of the reverse saliency, so that it not only utilizes the positive reluctance under the positive d -axis current but also improves the PM operation point under maximum torque per ampere (MTPA) control strategy. The relationships among the key parameters, reverse saliency, and torque performance are analyzed and investigated. The response surface method is used to optimize the motor performances. Then, for a better presentation of the investigated motor, the motor performances are evaluated and compared with the traditional interior permanent magnet motor (IPM) in torque characteristic and irreversible demagnetization ability. Finally, for the experimental validation, the prototyped motor is manufactured and tested. |
19,906 | Please write an abstract with title: Soil moisture retrieval over the southern Great Plains: comparisons between experimental remote sensing data and operational products, and key words: Soil moisture, Information retrieval, Remote sensing, Microwave measurements, Moisture measurement, Soil measurements, Land surface, Rough surfaces, Surface roughness, Passive microwave remote sensing. Abstract: The southern Great Plains region of the US has been a focus area for experimental remote sensing of surface soil moisture since the 1970's. Intercomparison of soil moisture retrieval using both experimental data and operational data is carried out during the SGP99 remote sensing campaign in July 1999. Passive microwave measurements obtained from the airborne ESTAR instruments at L-band and TRMM microwave imager (TMI) measurements at X-band were processed to retrieve surface soil moisture during SGP99 and compared to field measurements. TMI retrieved soil moisture for June-September 1999 were compared with operational soil moisture sensors in the Oklahoma (OK) Mesonet system. To mimic operational products, the correction for vegetation and surface roughness in the TMI retrievals are based on average literature values, and surface temperatures estimated from a land surface hydrologic model forced with operational products. |
19,907 | Please write an abstract with title: A Centralized-Stochastic Solution for Smart Energy Management in a Virtual Power Plant, and key words: Renewable energy sources, Costs, Uncertainty, Stochastic processes, Software, Numerical models, Stakeholders. Abstract: Virtual power plant concept creates additional benefits for different stakeholders such as system operators, distributed energy resources owners, and aggregators. This paper presents a smart energy management solution from virtual power plant aggregator point of view. To this end, a network-constrained economic dispatch has been developed taking into account a comprehensive resource portfolio including conventional and renewable distributed generations, energy storage units, and flexible loads. The virtual power plant aggregator aims at minimizing its expected costs through optimal dispatch of its own resources as well as purchasing and selling electricity from/to upstream network. To this end, a stochastic programming approach has been employed to consider the generation uncertainty of renewable energy resources using a set of plausible scenarios. The proposed framework is a mixed-integer linear programming problem and solved by the CPLEX solver in the GAMS software. It is noteworthy that, the effectiveness of the model has been verified considering several numerical studies. |
19,908 | Please write an abstract with title: De-aerator Exhaust Waste Heat Recovery Using TEG, and key words: Generators, Resistance heating, Heat transfer, Waste heat, Power generation, Thermoelectricity. Abstract: Coal fired-power plant has waste heat from exhaust de-aerator. Changes in coal-fired steam power plant operation cause change in deaerator temperature. The operating of coal-fired steam power plant about 150-300MW. Exhaust de-aerator temperature about 145°-170°C. The thermal energy can be recovered as electricity by using TEG. TEG is thermoelectric generator, an equipment which can convert heat flux to electric energy. TEG convert heat different between hot side and cold side. Dimension 1 Module of TEG is only 56x56x4 mm. The difference deaerator temperature influence TEG's performance. TEG highest voltage and power output is 2.48V and 5.1W obtained. Developing cooling system and MPPT is needed to maximize TEG performance. |
19,909 | Please write an abstract with title: Use of Regularization in Indirect Learning Identification of Predistorter, and key words: Minimization, Numerical models, Kernel, Complexity theory, Frequency measurement, Filtering. Abstract: The scope of this work is regularization approaches aimed to improve accuracy of identification of predistorter for power amplifier (PA) linearization. Use of regularization is motivated by intrinsic losses of indirect learning (IL) architecture and least-squares (LS) criterion of identification against a backdrop of an always present fidelity error of the polynomial expansion model of predistorter. Presented unified view covers regularization effects produced by numerical solver of identification problem, truncation of Volterra series model of predistorter and reduction of sampling frequency ( Fs) of test signals for identification. The impacts of different approaches on linearization performance are studied separately and then optimized in joint using test bench model of memory nonlinearity. It is shown that with optimal regularization setup and use of appropriate preconditioning of test signal performance of IL/LS approach is very close to reference predistorter derived analytically. |
19,910 | Please write an abstract with title: Intelligent Distraction and Drowsiness Detection System for Automobiles, and key words: Support vector machines, Measurement, Road accidents, Roads, Ear, Companies, Libraries. Abstract: Road accidents claim millions of lives every year. This statistics calls for a drowsiness detection system that can aid in detecting a lousy driver and help save thousands of lives every year. In this work, a Computer Vision-based approach leveraging Static vector machine (SVM) is adapted in order to produce an innovative solution for the same. The proposed project performs facial feature detection using an incoming live stream of a driver, detects and localizes open and closed eyes. Driver Distraction and Drowsiness Detection System focuses on detecting whether the driver is drowsy and thus distracted from the road using facial feature metrics. It may be used to assign drivers a rating indicating how drowsy a person gets while driving and then this rating can further be used to assign a driver who is less likely to fall asleep. This technology can be provided to companies that provide services like peerto-peer ridesharing and ride service hailing. This will be beneficial to both companies as well as customers. Customers who prefer traveling at night will be the most benefited ones as they will be assigned a more attentive and seasoned driver. |
19,911 | Please write an abstract with title: Identifying Pediatric Crohn’s Disease Using Deep Learning to Classify Magnetic Resonance Enterography (MRE) Images, and key words: Deep learning, Image segmentation, Neural networks, Magnetic resonance, Imaging, Medical services, Manuals. Abstract: Crohn’s Disease (CD) diagnosis is a constant challenge for clinicians. Even with extensive magnetic resonance enterography (MRE) scans, identifying tissue damaged by CD can still be difficult, even for experts. Deep learning approaches for medical applications have recently gained traction as tools to complement radiologist consultation. Computer aided diagnosis can potentially save time and labor resources spent on routine manual diagnosis. For imaging of the gastrointestinal tract, these cutting-edge techniques could help distinguish subtle structures indicative of Crohn’s Disease (CD) that are not visible to the human eye. In this paper, we explore existing segmentation and neural network approaches more traditionally used for non-medical imaging and compare their diagnostic potential for identifying CD from MRE images. |
19,912 | Please write an abstract with title: An MAP Estimation for Between-Class Variance, and key words: Training, Maximum likelihood estimation, Interpolation, Estimation, Information processing, Probabilistic logic, Linear discriminant analysis. Abstract: Probabilistic linear discriminant analysis (PLDA) has been widely used in open-set verification tasks, such as speaker verification. A potential issue of this model is that the training set often contains limited number of classes, which makes the estimation for the between-class variance unreliable. This unreliable estimation often leads to degraded generalization. In this paper, we present an MAP estimation for the between-class variance, by employing an Inverse-Wishart prior. A key problem is that with hierarchical models such as PLDA, the prior is placed on the variance of class means while the likelihood is based on class members, which makes the posterior inference intractable. We derive a simple MAP estimation for such a model, and test it in both PLDA scoring and length normalization. In both cases, the MAP-based estimation delivers interesting performance improvement. |
19,913 | Please write an abstract with title: How to obtain turbo gains in coherent and non-coherent orthogonal transmit diversity, and key words: Block codes, Detectors, Convolutional codes, Transmitting antennas, Modulation coding, Space technology, Information analysis, Fading, Error correction, Antenna theory. Abstract: We consider turbo detection for coherent and non-coherent orthogonal transmit diversity. The turbo iterations are done between a convolutional code and the diversity combiner. We show that due to the orthogonal structure of the space-time block codes, extrinsic information which enables turbo gains can only be obtained for special symbol mappings. Such optimized symbol mappings arc given for 8-PSK, 16-PSK and 16-QAM. Furthermore, we present a simple non-coherent soft-output detector for differential space-time block codes. Extrinsic information transfer ( EXIT) charts are used as a powerful tool for analysis and performance prediction of the turbo detector. We show that a turbo detector benefits from spatial diversity in terms of earlier convergence. For quasistatic fading, we introduce the x%-EXIT chart. |
19,914 | Please write an abstract with title: Bilateral Teleoperation of Soft Robots under Piecewise Constant Curvature Hypothesis: An Experimental Investigation, and key words: Soft robotics, Manipulator dynamics, Task analysis, Aerospace electronics, Robot kinematics. Abstract: The field of soft robotics has evinced considerable interest recently due to its importance in several practical applications. Teleoperation of a soft manipulator to do a multitude of tasks in a remote environment is one such promising application. The dexterity and conformity of a soft robot can be constructively utilized for enhanced motion planning and manipulability in cluttered environments. To that end, this paper investigates an adaptive task space bilateral teleoperation framework for soft robots with dynamic uncertainties assuming a non-redundant rigid master manipulator and a redundant soft slave manipulator under the piecewise constant curvature hypothesis. First, the dynamics of the soft robot are approximated as a rigid link manipulator with elastic joints using an existing augmented formulation in the literature. The task space adaptive bilateral teleoperation framework is then introduced based on this rigid-robot-like formulation. The null space velocity of the soft robot is also exploited to achieve sub-task objectives. Finally, the proposed control algorithms are experimentally investigated on a planar soft robot and the results are discussed pointing out the important observations. |
19,915 | Please write an abstract with title: Use of Attenuation and Phase Delay Characteristics of SAW to Measure Air-Gap Height (Technical Notes), and key words: Surface acoustic waves, Attenuation measurement, Phase measurement, Air gaps, Delay lines, Optical surface waves, Piezoelectric films, Substrates, Surface waves, Dielectric constant. Abstract: The attenuation and phase delay characteristics of a SAW which has been perturbed by a metallic plane above the surface of a piezoelectric delay line have been theoretically computed and experimentally measured. These measurements provide a diagnostic tool for determining the height of an air gap and for determining the minimum achievable air gap for a particular supporting structure. |
19,916 | Please write an abstract with title: A FPGA Vein Imaging System Based on Matched Filter, and key words: Optical filters, Performance evaluation, Matched filters, Veins, Imaging, Filtering algorithms, Skin. Abstract: Venipuncture is one of the most frequently used medical means. Fat thickness and skin color of different people may increase the difficulty for medical staff to judge the position and depth of vein. Therefore, this paper proposes a near-infrared vein imaging system, which is an auxiliary device for venipuncture. Through acquiring the near-infrared images of skin, it can show the subcutaneous venous vessels and assist medical staff to improve the success rate of venipuncture. We use FPGA chip, which has great parallel computing ability, and noncoaxial optical structure of multiplexing to design the vein imaging system. In addition, we design a matched filter vessel enhancement algorithm based on FPGA, it can accurately retain the vessel depth information. Comparison with other filters verifies the effectiveness of this proposed algorithm. Experiments show that this vascular enhancement device has better image quality on the premise of ensuring the real-time and effective performance. |
19,917 | Please write an abstract with title: Truncated Conical-Tip Fiber Probe for Common-Path Optical Coherence Tomography With Optimal Sensitivity, and key words: Probes, Optical fibers, Optical fiber couplers, Optical fiber sensors, Sensitivity, Optical reflection, Lenses. Abstract: A truncated conical-tip fiber probe was developed for common-path (CP) swept-source optical coherence tomography (SSOCT) with optimized sensitivity. The probe was fabricated by mechanically polishing a conical no-core fiber (NCF) spliced to a section of gradient-index (GRIN) fiber. The GRIN fiber expanded the sample light at the entrance of the conical tip, and the conical tip generated the Bessel beam with a spot size of ∼2.2 μm over a depth of focus (DOF) of 90 μm. Improvement in the DOF was experimentally verified by measuring the axial profile of the output beam from the probe tip. Moreover, the truncated fiber tip with a flat surface significantly increased the reflectivity of the reference light compared with an untreated conical tip. A 6.6 dB sensitivity improvement was achieved by increasing the diameter of the flat surface from 2.8 μm to 5.8 μm. The performance of the probe was further examined by imaging a multi-layer translucent tape as well as a mouse lung tissue. The designed fiber probe with a high resolution and optimized sensitivity is attractive to common-path OCT imaging in biomedical and clinical applications. |
19,918 | Please write an abstract with title: Controlled seabed clutter fluctuations and their effects on backscattered signal statistics, and key words: Fluctuations, Statistics, Frequency, Statistical analysis, Signal analysis, Sea floor, Sonar, Statistical distributions, Scattering parameters, Chirp. Abstract: This paper describes controlled experiments in Weymouth Bay, UK providing backscattered high frequency data of random varying clutter density on wooden boards. A statistical analysis of the data is performed to establish the behaviour of the K-law parameters with respect to seafloor clutter density. |
19,919 | Please write an abstract with title: An Atmospheric Data-Driven Q-Band Satellite Channel Model With Feature Selection, and key words: Atmospheric measurements, Atmospheric modeling, Satellites, Attenuation, Channel models, Attenuation measurement, Satellite broadcasting. Abstract: This article proposes a novel atmospheric data-driven Q-band satellite channel model using two artificial neural networks, i.e., multilayer perceptron and long short-term memory (LSTM), to estimate real-time channel attenuation at Q-band via a set of atmospheric parameters. Seven atmospheric parameters for modeling satellite channel attenuation are selected by the least absolute shrinkage and selection operator (LASSO) algorithm from 14 commonly used atmospheric parameters. Simulation results demonstrate that the multilayer perceptron-based atmospheric data-driven Q-band satellite channel model via those seven atmospheric parameters is more accurate and less complex than that via the 14 atmospheric parameters. Meanwhile, the accuracy performance of multilayer perceptron- and LSTM-based atmospheric data-driven Q-band satellite channel models, such as absolute errors and mean-squared errors (MSEs), is discussed and analyzed. The complexity of multilayer perceptron and LSTM in this model, such as training time, loading time, and estimation time, is also investigated. It can be seen that the estimated channel attenuation can well align with the measured channel attenuation. |
19,920 | Please write an abstract with title: A Robust Routing Strategy for Congestion Resilient Communication through Augmented Network-Aware and Multi-Parameter Assistance for Optimal Routing Decision in Zone Routing Protocol, and key words: Wireless networks, Quality of service, Open systems, Routing, Dynamic scheduling, Routing protocols, Real-time systems. Abstract: The drastic increase in the difficulties for Quality of Service (QoS) centred infrastructure-less wireless communication and transmission classifications have strengthened the academicians and allied industries to advance further efficient and resourceful routing strategies to assist reliable and robust communication. Considering a large-scale and wide scenario of wireless networks, the zone based routing protocols consists of approaches that contain both the reactive and proactive network management approaches have remained and found substantial; but outdated direction-finding conclusions confines its usefulness for dynamic topology based interacting explanations such as Mobile Ad Hoc Networks (MANETs). MANET undergoes exceptionally high network and topologically varying conditions and the change necessitates ideal routing archetypal with augmented and increased network-awareness and multi-parameter aided approach to attain best possible QoS provision. With this as the consideration and motivation, in this paper, a Congestion Resilient Communication through Augmented Network-Aware and Multi-Parameter Assistance for Optimal Routing strategy has been technologically suggested with advanced and congestion resilient tactics for QoS assurance over the MANETs. Unlike traditional Zone Routing Protocol, the proposed Optimal Routing Decision model applies integrated and multiple parameters from various layers of the OSI layer to perform various procedures like Differentiation of Service (DoS), Dynamic Resource Scheduling (DRS), Dynamic Link and Packet Speed Approximation, Congestion Detection and Avoidance models. The multi-network parameters based best path detection and formation, enables the proposed strategy to exhibit 97.92% and 92% Packet Delivery Ratio for Real Time and Non-Real Time Data respectively, which is more than the existing approaches. |
19,921 | Please write an abstract with title: An Automated Design Procedure for the Power Density Optimization of IPM machines, and key words: Power system measurements, Rotors, Permanent magnets, Finite element analysis, Electromagnetics, Power generation, Optimization. Abstract: This paper presents a multi-physics design procedure for the power density maximization for Interior Permanent Magnet (IPM) machines. This goal is pursued by increasing the mechanical speed as well as the electromagnetic torque capability. At this purpose an automated design procedure aided by an optimization algorithm is developed: both electromagnetic and structural problems are taken into account by means of fast Finite Element (FE) magneto-static simulations together with a simplified analytical model for the mechanical sizing. Since the magnets are placed within the rotor iron, retaining sleeves are avoided and the motor integrity against centrifugal forces is guaranteed by the proper sizing of the rotor structure. The procedure allows to automatically find the maximum output power obtainable for a given machine volume; moreover it outputs the maximum value of rotational speed above which no further improvements on output power can be achieved. |
19,922 | Please write an abstract with title: PRSRTI: A Novel Device-Free Localization Method Using Phase Response Shift Based Radio Tomography Imaging, and key words: Fresnel reflection, Tomography, Monitoring, Wireless sensor networks, Wireless communication, Phase measurement. Abstract: Device-free localization (DFL) is a hot topic in passive sensing such as intrusion detection, pose estimation, and contact-tracing. To improve the performance, we propose a novel fine-grained DFL method using the phase response shift (PRS) to localize targets, which can mitigate the effect of multipath, and noise without phase ambiguity. The phases of received multi-frequency signals are linearly fitted as the phase response (PR). The shift of target-induced PR with respect to non-target PR is considered as the PRS. The PRSs at every location of the monitored area are observed with different length communication links, and are summarized as a PRS weight model. The PRS-based radio tomography imaging (PRSRTI) localization model is derived, and utilizes the PRS, and the weight model to localize targets. Experimental results validate that its performance is obviously higher than the received signal strength based radio tomography imaging (RTI). |
19,923 | Please write an abstract with title: Optimizing Deep Neural Network Architectures: an overview, and key words: Deep learning, Training, Conferences, Computer architecture, Reinforcement learning, Data science, Complexity theory. Abstract: Deep Neural Nets architectures are complex. Training them induces a greedy need for computing power and storage. This complexity is due to the large number of layers and parameters needed to achieve accurate results. From this perspective, several researchers thought of designing less complex models by proposing theoretical limits, constructive and pruning algorithms, Hyper-parameters optimization techniques. However, the most widely used method for designing deep learning models remains the experimental method that requires expertise and a lot of time to tune the model hyperparameters. Several research studies are attempting to automate the entire design process of deep learning models, using optimization algorithms to reduce architectural complexity and maximize accuracy. This paper proposes an overview of the Neural Nets optimization techniques. A comparison and discussion is also given for CNN architectures optimization for CIFAR-10 data-set. |
19,924 | Please write an abstract with title: Linear Dichroism in High Temperature Superconductors in THz Range, and key words: Temperature measurement, High-temperature superconductors, Temperature distribution, Temperature dependence, Resonant frequency, Faraday effect, Rotation measurement. Abstract: We measure as a function of sample orientation, doping, temperature, and energy, the Faraday rotation of linearly polarized THz light by high temperature cuprate superconductors. We observe a linear dichroism signal which increases with decreasing frequency and may exhibit resonances in the THz (1-6 meV) range. Preliminary results also show strong temperature dependence to the Faraday rotation signal. |
19,925 | Please write an abstract with title: Learning Disentangled Representations for Identity Preserving Surveillance Face Camouflage, and key words: Training, Privacy, Visualization, Face recognition, Scalability, Network architecture, Video surveillance. Abstract: In this paper, we focus on protecting the facial privacy for people under the surveillance scenarios, by changing some visual appearances of the faces while keeping them recognizable by the current face recognition systems. This is a challenging problem because we need to retain the most important structures of the captured facial images, while modify the salient facial regions to protect personal privacy. To address this problem, we introduce a novel individual face protection model, which can camouflage the face appearance from the perspective of human visual perception and preserve the identity features of faces used for face authentication. To that end, we develop an encoder-decoder network architecture which can separately disentangle the facial feature representation into an appearance code and an identification code. Specifically, we first randomly divide the input face image into two groups, the source and target sets, where the identity and appearance codes can be correspondingly extracted. Then, we recombine the identity and appearance codes to synthesize a new face, which has the same identity as the source subject. Finally, the synthesized faces are employed to replace the original face to protect the individual privacy. Note that our model is end-to-end with a multi-task loss function, which can better preserve the identity and stabilize the training process. Experiments conducted on Cross-Age Celebrity dataset demonstrate the effectiveness of our model and validate our superiority in terms of visual quality and scalability. |
19,926 | Please write an abstract with title: Hardware Acceleration of the STRIKE String Kernel Algorithm for Estimating Protein to Protein Interactions, and key words: Proteins, Computers, Kernel, Multicore processing, Field programmable gate arrays, Sensitivity, Protein sequence. Abstract: Protein-protein interaction (PPI) is an important field in bioinformatics which helps in understanding diseases and devising therapy. PPI aims at estimating the similarity of protein sequences and their common regions. STRIKE was introduced as a PPI algorithm which was able to achieve reasonable improvement over existing PPI prediction methods. Although it consumes a lower execution time than most of other state-of the-art PPI prediction methods, its compute-intensive nature and the large volume of protein sequences in protein databases necessitate further time acceleration. In this paper, we develop hardware accelerator designs for the STRIKE algorithm. Results indicate that the weighted STRIKE accelerator execution times are about 10x longer than the unweighted STRIKE accelerator execution times. To further accelerate the performance of the weighted STRIKE, a parallel module accelerator organization duplicating the weighted STRIKE modules is introduced, achieving near linear speedups for long sequences of 100 or more characters. As demonstrated by Verilog simulations and FPGA runs, the weighted STRIKE module accelerator exhibits three orders of magnitude speed improvement over multi-core and cluster computers. Much higher speedups are possible with the parallel module accelerator. |
19,927 | Please write an abstract with title: Automating Adaptive Execution Behaviors for Robot Manipulation, and key words: Behavioral sciences, Planning, Robots, Cognition, Service robots, XML, Robot kinematics, Knowledge management. Abstract: Robotic manipulation in semi-structured and changing environments requires systems with: a) perception and reasoning capabilities able to capture and understand the state of the environment; b) planning and replanning capabilities at both symbolic and geometric levels; c) automatic and robust execution capabilities. To cope with these issues, this paper presents a framework with the following features. First, it uses perception and ontology-based reasoning procedures to obtain the Planning Description Domain Language files that describe the manipulation problem at task level. This is used in the planning stage as well as during task execution in order to adapt to new situations, if required. Second, the proposed framework is able to plan at both task and motion levels, intertwining them by incorporating geometric reasoning modules to determine some of the symbolic predicates needed to describe the states. Finally, the framework automatically generates the behavior trees required to execute the task. The proposal takes advantage of the ability of behavior trees to be edited during run time, allowing adaptation of the action plan or of the trajectories according to changes in the state of the environment. The approach allows for robot manipulation tasks to be automatically planned and robustly executed, contributing to achieve fully functional service robots. |
19,928 | Please write an abstract with title: Efficient Web log mining for product development, and key words: Product development, Companies, Manufacturing processes, Weapons, Collaboration, Internet, Data mining, Web pages, Investments, Debugging. Abstract: With the new global economy, manufacturing companies are focusing their efforts on the product development process which is fast emerging as a new competitive weapon. Several product development solutions allow engineers, suppliers, business partners and even customers to collaborate throughout the entire product lifecycle via the Internet. To gain an additional edge over competitors, it is vital that companies utilize Web logs to discover hidden knowledge about trends and patterns in such a cyberworld. However, existing Web log mining techniques are not designed for web logs generated by product data management processes. In this paper, we propose a method termed Product Development Miner (PDMiner) to mine such Web logs efficiently and effectively using a trie structure and sequential mining techniques. Experiments involving real Web logs show that PDMiner is both fast and practical. |
19,929 | Please write an abstract with title: Towards End-to-End Integration of Dialog History for Improved Spoken Language Understanding, and key words: Training, Gold, Text recognition, Semantics, Speech recognition, Signal processing, Acoustics. Abstract: Dialog history plays an important role in spoken language understanding (SLU) performance in a dialog system. For end-to-end (E2E) SLU, previous work has used dialog history in text form, which makes the model dependent on a cascaded automatic speech recognizer (ASR). This rescinds the benefits of an E2E system which is intended to be compact and robust to ASR errors. In this paper, we propose a hierarchical conversation model that is capable of directly using dialog history in speech form, making it fully E2E. We also distill semantic knowledge from the available gold conversation transcripts by jointly training a similar text-based conversation model with an explicit tying of acoustic and semantic embeddings. We also propose a novel technique that we call DropFrame to deal with the long training time incurred by adding dialog history in an E2E manner. On the HarperValleyBank dialog dataset, our E2E history integration outperforms a history independent baseline by 7.7% absolute F1 score on the task of dialog action recognition. Our model performs competitively with the state-of-the-art history based cascaded baseline, but uses 48% fewer parameters. In the absence of gold transcripts to fine-tune an ASR model, our model outperforms this baseline by a significant margin of 10% absolute F1 score. |
19,930 | Please write an abstract with title: Observer-Based Adaptive Synchronization Control of Unknown Discrete-Time Nonlinear Heterogeneous Systems, and key words: Synchronization, Observers, Artificial neural networks, Adaptation models, Mathematical model, Protocols, Adaptive systems. Abstract: This article is concerned with the optimal synchronization problem for discrete-time nonlinear heterogeneous multiagent systems (MASs) with an active leader. To overcome the difficulty in the derivation of the optimal control protocols for these systems, we develop an observer-based adaptive synchronization control approach, including the designs of a distributed observer and a distributed model reference adaptive controller with no prior knowledge of all agents’ dynamics. To begin with, for the purpose of estimating the state of a nonlinear active leader for each follower, an adaptive neural network distributed observer is designed. Such an observer serves as a reference model in the distributed model reference adaptive control (MRAC). Then, a reinforcement learning-based distributed MRAC algorithm is presented to make every follower track its corresponding reference model on behavior in real time. In this algorithm, a distributed actor–critic network is employed to approximate the optimal distributed control protocols and the cost function. Through convergence analysis, the overall observer estimation error, the model reference tracking error, and the weight estimation errors are proved to be uniformly ultimately bounded. The developed approach further achieves the synchronization by means of synthesizing these results. The effectiveness of the developed approach is verified through a numerical example. |
19,931 | Please write an abstract with title: Interaction-Aware Game-Theoretic Motion Planning for Automated Vehicles using Bi-level Optimization, and key words: Games, Prediction algorithms, Planning, Behavioral sciences, Task analysis, Optimization, Intelligent transportation systems. Abstract: Planning an interactive and cooperative behavior in the vicinity of multiple decision-makers is a challenging task. The game-theoretic perspective provides a suitable framework to describe such interactive scenarios. In this paper, we introduce a motion planning algorithm to generate interaction-aware behavior for highly interactive scenarios. Our algorithm is based upon a reformulation of a bi-level optimization problem which frames interactions among two decision makers as a Stackelberg game. In contrast to existing works in this field, we solve the prediction and planning problem simultaneously, which enables the generation of efficient behaviors even in highly interactive situations. The main novelty of our algorithm evolves around its ability to consider general nonlinear constraints. Further, we present mechanisms to introduce courtesy and cooperation into behavior planning which prevents overly aggressive driving, as issue that has been identified in existing interaction-aware planning approaches. Finally, we evaluate our approach in the context of automated driving. Our evaluation first investigates the algorithm's ability to purposefully influence and exploit the response of surrounding vehicles. We then illustrate how the approach can be used for cooperative and courteous planning. |
19,932 | Please write an abstract with title: Optimization of Drain Extended MOS Devices for Reliability in High Switching applications, and key words: Performance evaluation, Couplings, Layout, Switches, Logic gates, Reliability engineering, Delays. Abstract: In this work, we investigate the static and transient performance of Drain Extended NMOS (DeNMOS) devices with and without Shallow Trench Isolation (STI). Devices drain-to-source pitch and layout parameters are kept constant, except gate overlap length which is reduced by applying a suitable gate edge termination technique to ensure Safe Operating Area (SOA) and lower the gate charge. A comparative study of optimized STI and NonSTI based DeNMOS for switching applications and gate edge reliability is shown. It is found that the reduction of gate length over the drift region reduces gate to drain coupling charge by more than 60%. We present that a FOM improvement of 55% in STI and 45% in NonSTI DeNMOS w.r.t their respective standard devices can be achieved using gate edge termination techniques without compromising in SOA and gate edge reliability. |
19,933 | Please write an abstract with title: Soft BIBD and Product Gradient Codes, and key words: Codes, Encoding, Training data, Redundancy, Computational modeling, Stochastic processes, Probabilistic logic. Abstract: Gradient coding is a coding theoretic framework to provide robustness against slow or unresponsive machines, known as stragglers, in distributed machine learning applications. Recently, Kadhe et al. (2019) proposed a gradient code based on a combinatorial design, called balanced incomplete block design (BIBD), which is shown to outperform many existing gradient codes in worst-case adversarial straggling scenarios. However, parameters for which such BIBD constructions exist are very limited (Colbourn and Dinitz, 2006). In this paper, we aim to overcome such limitations and construct gradient codes which exist for a wide range of system parameters while retaining the superior performance of BIBD gradient codes. Two such constructions are proposed, one based on a probabilistic construction that relax the stringent BIBD gradient code constraints, and the other based on taking the Kronecker product of existing gradient codes. The proposed gradient codes allow flexible choices of system parameters while retaining comparable error performance. |
19,934 | Please write an abstract with title: Neural Networks and Classical Algorithms in Inverse Problems of Anomalous Diffusion, and key words: Mathematical model, Artificial intelligence, Task analysis, Neurons, Libraries, Iterative methods, Inverse problems. Abstract: The paper develops a new numerical method for the solution of the inverse problems. This method can be classified as a predictor-corrector method, in which the artificial neural network plays the role of a predictor, and the gradient method plays the role of a corrector. We apply this method to inverse anomalous diffusion problem and show its statistical efficiency. |
19,935 | Please write an abstract with title: The Effect of Dielectric Materials on the Discharge Charactersitics of a Coaxial Dielectric Barrier Discharge Driven by Nanosecond Power Supply, and key words: Analytical models, Dielectric materials, Glass, Voltage, Discharges (electric), Plasmas, Inductors. Abstract: The dielectric material is one of the most important factors influencing the DBD characteristics and application effects. A coaxial double dielectric barrier discharge (DBD) reactor driven by nanosecond (ns) power supply has been developed for plasma exhaust gas treatment. The glass, quartz, PC and PTFE materials are used as dielectric barriers of the coaxial DBD reactor to investigate their influence on discharge characteristics. The effects of these dielectric materials on the discharge uniformity, power depositions, energy efficiency, and reactor operation temperature are investigated through electric and optical diagnosis. The mechanisms of the influence of the dielectric materials on the DBD characteristics are analyzed by an equivalent electrical model and a heat conduct model. The results show that the discharge power of the ns pulsed coaxial DBD is larger with the larger relative permittivity of the dielectric material. Compared with the other dielectric materials at the same applied voltage, the ns pulsed coaxial DBD with glass dielectric barrier is more homogeneous and has higher energy efficiency which can reach 70.8% at 24 kV peak applied voltage with the analysis of equivalent electrical model. After 900 s operation at 24 kV, the coaxial DBD reactor with glass dielectric barrier has highest outside wall temperature of 78.0 °C. While, the reactor with PTFE dielectric barrier has lowest outside wall temperature of 58.2 °C. With the analysis of the equivalent electrical model and the heat conduct model, it is found that the energy loss of the reactor is the heat loss, which leads to the temperature increase. The heat loss rate increase with the decrease of the permittivity of the dielectric material. The reported work provides important reference for the selection of dielectric materials of the ns pulsed coaxial DBD reactor and is significant for the optimization of the exhaust gas plasma treatment process and industrial application. |
19,936 | Please write an abstract with title: A novel positioning system for home service robots, and key words: Service robots, Transmitters, Radio frequency, Sensor systems, Laser radar, Frequency estimation, Displacement measurement, Position measurement, Ultrasonic variables measurement, Wheels. Abstract: The work presents a novel positioning system for home service robots. The positioning system uses the difference of flight time between radio frequency and ultrasonic waves to estimate the distance. Especially, the proposed system employs multiple ultrasonic sensors to improve accuracy and position update rate. The experimental result of the proposed system is presented. |
19,937 | Please write an abstract with title: Strong-sense class-dependent features for statistical recognition, and key words: Hidden Markov models, Decoding, Automatic speech recognition, Speech recognition, Pattern recognition, Entropy, Probability density function, Performance loss, Robustness. Abstract: In statistical classification and recognition problems with many classes, it is commonly the case that different classes exhibit wildly different properties. In this case it is unreasonable to expect to be able to summarize these properties by using features designed to represent all the classes. In contrast, features should be designed to represent subsets that exhibit common properties without regard to any class outside this subset. The value of these features for classes outside the subset may be meaningless, or simply undefined. The main problem, due to the statistical nature of the recognizer, is how to compare likelihoods conditioned on different sets of features to decode an input pattern. This paper introduces a class-dependent feature design approach that can be integrated with any probabilistic model. This approach avoids the need of having a conditional probabilistic model for each class and feature type pair, and therefore decreases the computational and storage requirements of using heterogeneous features. This paper presents an algorithm to calculate the class-dependent features that minimize an estimate of the relative entropy between the conditional probabilistic model and the actual conditional probability density function (PDF) of the features of each class. An approach to a hidden Markov model (HMM) automatic speech recognition (ASR) system is applied. A nonlinear class-dependent volume-preserving transformation of the features is used to minimize the objective function. Using this approach, 2% improvement in phoneme recognition accuracy is achieved compared to the baseline system. The approach also shows improvement in recognition accuracy compared to previous class-dependent linear features transformation. |
19,938 | Please write an abstract with title: Converging Radar and Communications in the Superposition Transmission, and key words: Wireless communication, Time-frequency analysis, Frequency modulation, System performance, OFDM, Quality of service, Broadcasting. Abstract: This paper proposes a superposition transmission scheme for the future Radio Frequency (RF) convergence applications. The scheme is discussed under the assumption of a monostatic broadcasting channel topology. Under communications quality-of-service (QoS) constraints, the joint performance region of communications sum rate and radar estimation error variance is studied. Two radar signal waveforms, namely linear FM and parabolic FM, are used to investigate how signal shapes may influence the estimation accuracy. Both waveforms are generated with rectangular envelope. In the end, a numerical analysis is applied, which concludes that a moderate communications QoS promises a good communications fairness while with the limited radar performance degradation. |
19,939 | Please write an abstract with title: Teaching High Productivity and High Performance in an Introductory Parallel Programming Course, and key words: Productivity, Runtime, Parallel programming, Conferences, Computational modeling, Education, Task analysis. Abstract: Multicore processors are ubiquitous. Several prior research has emphasized the need for high productivity parallel programming models that require minimal changes to the sequential program and can still deliver high performance using runtimes based approaches on various architectures. In this paper, we present the structure and experience of teaching the Foundations of Parallel Programming course (FPP) at IIIT Delhi using a task-based parallel programming model, Habanero C/C++ Library (HClib). FPP covers a wide breadth of topics in parallel programming but emphasizes both high productivity and high performance. It is being offered at IIIT Delhi in the spring semester for undergraduate and postgraduate students since 2017. We describe our novel approach where the students start the learning process using the traditional parallel programming models, discover the underlying limitations, and build runtime solutions to achieve high performance. |
19,940 | Please write an abstract with title: Peak-shaving capacity assessment of commercial buildings with time-varying energy comfort, and key words: Economics, Visualization, Conferences, Buildings, Batteries, Indexes, Load modeling. Abstract: The accurate assessment of peak-shaving capacity is the key for customers to gain profits in the market. In this light, a peak-shaving capacity assessment method for commercial buildings with consumption characteristics is proposed. Firstly, considering that the peak-shaving capacity of commercial buildings is inversely proportional to customers flow rate, the time-varying energy comfort index is established from the dimensions of environment, visual comfort and so on. Then, to achieve maximum benefits, a peak-shaving capacity assessment model in the day-ahead market for commercial buildings is constructed, and a time-division differentiation strategy for cold, hot and electricity load and battery are proposed accordingly. Finally, results from cases illustrate the effectiveness of the proposed approach, and the important role of battery as a flexible resource in response or transaction is proved meanwhile. |
19,941 | Please write an abstract with title: Utilizing ASCII Codes Redundancy for Data Compression, and key words: Computers, Conferences, Redundancy, Data compression, Complexity theory, Information technology, Matlab. Abstract: When information is organized in documents and saved into computers its contents are stored using traditional ASCII codes. The occupied space by those ASCII codes is one challenge in the field of information technology. This is why many different data compression techniques have been developed and others are still in progress to meet this challenge. This paper looks at the ASCII codes from another view as inherited redundant codes. This inherited redundancy forms spatial redundancy that can be utilized to compress data documents. This compression is based on eliminating the repetition of the same ASCII code for the same character along its occurrences in a document. The proposed technique is based on the idea of assigning a position code for each element in the document. The position code is then connected with the original ASCII code for that element by reserving a memory area to keep track of the position codes of all bytes' patterns participating in the original document. The technique is then evaluated and assessed using analytical analysis and MATLAB work. The obtained results are then discussed to show the capability of the proposed method. |
19,942 | Please write an abstract with title: Strategies of Computational Process Synthesis — a System-Level Model of HW/SW (Micro)Architectural Mechanisms, and key words: Embedded computing, Microarchitecture, Codes, Computational modeling, Stacking, Organizations, Hardware. Abstract: The paper deals with insufficient unification of computational process transformation techniques and their mapping on design components in hardware and software domains. To address this issue, formulation of generic transformation approach, “strategy of computational process synthesis” (SCPS), is proposed. Inspired by composability of management mechanisms in software domain, custom hardware microarchitecture mechanisms are proposed to implement as synthesizable and programmable execution kernels that generate hardware in RTL or HLS form. Experimental implementation of ActiveCore framework and demo SoC designs based on this approach showed considerable improvement of hardware projects organization, while preserving competitiveness of the designs. |
19,943 | Please write an abstract with title: Testing of a Bipolar Solid-State Marx Generator for Berlin BESSY II Injection Kicker System, and key words: Generators, Optical switches, MOSFET, Capacitors, Topology, Switching circuits, Rectifiers. Abstract: This article describes the preliminary results from the new bipolar solid-state Marx generator proposed for Berlin BESSY II injection system, which includes the following pulse specifications: (1) peak voltage of ±8 kV, (2) peak current of 160 A, (3) impedance of 50 Ω, (4) frequency ≤10 Hz, (5) width of 350 ns, (6) risetime ≤80 ns, and (7) deviation from “Flat top” ≤ ± 1%. The generator is based on SiC metal-oxide-semiconductor field-effect transistors (MOSFETs) in order to allow fast risetime/falltime, where the charging of the main capacitors is from resistive paths. A generator with ten stages, using a dummy load that simulates a kicker magnet, is experimentally tested in order to study the overall performance, and results are presented and discussed. |
19,944 | Please write an abstract with title: Decision combination in speech metadata extraction, and key words: Signal processing, Loudspeakers, Automatic speech recognition, Mel frequency cepstral coefficient, Speech recognition, Pattern classification, Speech processing, Data mining, Signal processing algorithms, Laboratories. Abstract: Speech metadata extraction can both improve speech recognition and enable novel interactive voice response applications. Unlike the previous research, which concentrates on the frame-level signal processing and pattern classification, this paper systematically studies the behavior of decision combination at the utterance level. We analyze the asymptotic characteristics, and the factors affecting frame-level classification. In addition, we introduce new methods to more accurately and efficiently combine frame-level decisions, including phoneme/power-based weighting and smart sampling. Experimental results in gender classification are presented. |
19,945 | Please write an abstract with title: Exploring the Profiles of Software Testing Jobs in the United States, and key words: Software, Software testing, Task analysis, Data collection, Training, Software engineering, NIST. Abstract: There is an indisputable industrial need for highly skilled individuals in the role of software testers. However, little is known about what activities under testers' responsibilities, competencies, and experiences sought after from employers' perspectives. For the purpose of this research, a data set of 1000 job ads related to software testing role in the United States was collected and analyzed. Specifically, a thorough analysis was conducted to find the industrial demand for competencies for the software testing role in terms of (i) Level of education, training, and experience; (ii) Testing skills; (iii) Technical skills; and (iv) Soft-skills. Relevant correlated skills that may influence shaping the profile of the software tester were also analyzed. Also, the essential duties that a software tester is expected to perform were investigated. The results from the subsequent quantitative and qualitative analysis are reported. |
19,946 | Please write an abstract with title: A study on GaAs FET's failure mechanism and experimental technology of rapid evaluation of reliability, and key words: Gallium arsenide, FETs, Failure analysis, Degradation, Temperature sensors, Stress, Equations, Resistance heating, Heat sinks, Electric variables measurement. Abstract: A new evaluation method is proposed in this paper based on the temperature characteristic of I/sub DSS/ which is a sensitive parameter to the failure of GaAs FETs and the degradation characteristics of devices under electrothermal stress. With this new method we can extract information on the relationship between degradation of I/sub DSS/ and temperature rapidly and on line. Reliability parameters of GaAs FETs can be determined rapidly, such as the activation energy to failure Q. |
19,947 | Please write an abstract with title: Subchannel Assignment and Power Optimization in Caching based UAV Networks With NOMA, and key words: Wireless networks, Optimization, Resource management, Unmanned aerial vehicles, NOMA, Relays, Mathematical model. Abstract: This paper intends to study the energy efficiency in caching based UAV networks, where fog radio access network (FRAN) and non-orthogonal multiple access (NOMA) are considered meanwhile. Taking full account of the impact of caching, subchannel assignment, and power allocation in UAV enabled wireless networks, we formulate the problem of maximizing energy efficiency. In order to better solve the proposed non-convex problem, we propose a subchannel assignment algorithm and a power allocation algorithm applying alternating direction method of multipliers (ADMM). The final simulation section verifies the fast convergence of the algorithm and compares the advantages with existing algorithms. |
19,948 | Please write an abstract with title: Time-Series Analysis and Prediction of Surface Deformation in the Jinchuan Mining Area, Gansu Province, by Using InSAR and CNN–PhLSTM Network, and key words: Strain, Data mining, Monitoring, Deformable models, Predictive models, Data models, Time series analysis. Abstract: Surface deformation poses a great threat to the safety of Jinchuan mining area production activities. At present, the spatio-temporal evolution law and mechanism of surface deformation in the Jinchuan mining area are unclear, and it is difficult to obtain reliable prediction results using the existing spatio-temporal prediction methods due to the lack of model parameters or relevant data. To solve these problems, this study proposes a new unified convolutional neural network with peephole long short-term memory (CNN-PhLSTM). Small baseline subset interferometric synthetic aperture radar (SBAS-InSAR) technology was used to obtain the spatio-temporal evolution characteristics of surface deformation in the period of 2014–2021. Time series InSAR deformation data are merged into a unified network model in series with a time-distributed CNN segmentation and stacked PhLSTM. The InSAR measurement results are shown to be reliable by comparison and verification with the benchmark and InSAR results of different orbits. The proposed CNN-PhLSTM model was evaluated by mean absolute error and structural similarity (SSIM) evaluation indexes, and was compared with support vector regression (SVR), multilayer perceptron (MLP) and CNN-LSTM models. The results show three continuous subsidence areas, namely the Longshou, second western and third eastern mining areas. The cumulative surface deformation continued to increase from 2014 to 2021. Faults and lithology control the spatial distribution of surface deformation in the Jinchuan mining area. The prediction results demonstrate that the surface deformation range will continue to expand and that time-series surface deformation will show a slow deceleration trend in the next two years. |
19,949 | Please write an abstract with title: Temporal Relations Extraction and Analysis of Log Events for Micro-service Framework, and key words: Couplings, Runtime, Scalability, Web and internet services, Data visualization, Maintenance engineering, Data mining. Abstract: Micro-service is a prevalent framework for Internet services. Its loosing coupling design has gained popularity recently. Loosing coupling services offer convenience, scalability and flexibility, however bring unexpected maintenance problems. This paper focuses on the problem where service administrations attempt to monitor the runtime services performance and status with mined service logs. To achieve it, we propose to extract unstructured logs as log patterns and visualise the services temporal relations using temporal graphs. Our analysis and data mining method can help to give new insights in system management area and non-trivial analysis process. The early experiments and analysis can clearly reveal inner structures of system and help to gain deep understanding. |
19,950 | Please write an abstract with title: Research on Automatic Lighting Control Equipment of Tunnel Entrance, and key words: Light emitting diodes, Lighting, Brightness, Lighting control, Road transportation, Control equipment, Analytical models. Abstract: In response to the national energy conservation and emission reduction policy and reducing tunnel operating costs, this paper introduced automatic lighting control equipment research and development on the basis of tunnel traffic safety and comfort. This research and development is aiming for LED lights which having a broad application prospects, combined with the lighting intensity outside the tunnel, traffic and other factors. In this paper, the relationship model of power and illumination of LED light is analyzed, and the High-precision digital current stepless dimming technology is proposed. The test results demonstrate that this device can reduce the manpower and electricity consumption of tunnel illumination to a large extent while ensuring the tunnel traffic safety. |
19,951 | Please write an abstract with title: A novel stochastic vibration-based algorithm for electromagnetic leakage detection, and key words: Vibrations, Electronic equipment, Computational modeling, Biological system modeling, Resonant frequency, Safety, Electromagnetics. Abstract: In the safety detection of the current electromagnetic leakage of electronic equipment, weak leakage signal frequencies are easily missed, involving other problems. This paper presents a new algorithm connecting with stochastic vibrating electromagnetic leakage detection, which uses the principle of stochastic vibration to enhance the leak signal strength and reduce the noise strength by migrating the noise signal energy from the original signal to the leak signal, thus solving the problem arising from leak detection of spectrum. The algorithm is implemented by frequency shifting, a new genetic algorithm and segmented biostability to overcome the shortcomings in the traditional bistatic random algorithm. This paper demonstrates the effectiveness of the method in electromagnetic leakage detection through experiments and simulations. |
19,952 | Please write an abstract with title: Magnetic field measurements of the LHC-IR MQXA magnets at room temperature, and key words: Magnetic field measurement, Coils, Testing, Temperature measurement, Superconducting magnets, Large Hadron Collider, Mechanical variables measurement, Shape measurement, Performance evaluation, Optical beams. Abstract: KEK has completed 13 of the 18 MQXA quadrupole magnets supplied for the LHC interaction region. The field measurements at room temperature were performed before and after the cold test. The multipole components by the warm measurements showed a good correlation with those by the cold measurements. It is concluded that field quality of the magnets can be evaluated by the warm measurements. |
19,953 | Please write an abstract with title: Experimental Validation of Speech Improvement-Based Stratified Adaptive Finite-Time Saturation Control of Omnidirectional Service Robot, and key words: Feature extraction, Speech recognition, Noise measurement, Support vector machines, Adaptive systems, Switches, Speech processing. Abstract: To implement the human–robot interactions in a noisy environment, the speech improvement-based (SIB) stratified adaptive finite-time saturation control (SAFTSC) for omnidirectional service robot (OSR) is developed. From the outset, the feature vectors of nine designed speech commands are extracted from their frequency signals and then trained by multiclass support vector machine. Two background noises are on-line filtered with the characteristic: “the smaller error in power spectrum is, the larger recovery from noisy power spectrum is.” Comparisons among without or with noise, and filtering are addressed. To achieve the zero pose error of OSR in finite time, an adaptive finite-time indirect trajectory (AFTIT) is constructed. To track the AFTIT with the zero error in finite time, the adaptive finite-time saturation control (AFTSC) is also established. Both AFTIT and AFTSC possess nonlinear switching gain increasing the high-frequency motion capability to fulfill the classified speech command. Simply put, the proposed SIB stratified AFTSC includes the speech improvement for classification, the AFTIT, and the AFTSC. Besides the stability of the closed-loop system is verified by the Lyapunov stability theory, three categories of SIB experiments are compared. |
19,954 | Please write an abstract with title: A Generative Answer Aggregation Model for Sentence-Level Crowdsourcing Tasks, and key words: Task analysis, Decoding, Crowdsourcing, Transformers, Satellites, Feeds, Training. Abstract: Previous answer aggregation methods for sentence-level crowdsourcing tasks extract one sentence from a collection of redundant sentences. However, these extractive methods have a drawback in that they ignore the phenomenon of answer complementarity and the spammer dilemma in crowdsourcing. To alleviate this problem, in this paper, we generate new, comprehensive sentences that synthesize all redundant sentences. To achieve this goal, we design a sequence-to-sequence neural model composed of an encoder and decoder. Specifically, considering the complementarity phenomenon, the encoder synthesizes all the collected sentences into hidden states, which are then utilized by the decoder to generate the final sentence. Next, considering the spammer dilemma, we model the workers in the neural network to detect spammers. Furthermore, to train the neural model better, we construct pseudo-sentences to enrich the training data. The experimental results demonstrate that our method can efficiently aggregate redundant sentences and generate comprehensive sentences with increased quality. |
19,955 | Please write an abstract with title: Autonomous UAV Navigation for Covert Video Surveillance, and key words: Video surveillance, Trajectory planning, Trajectory, Uncertainty, Target tracking, Navigation, Behavioral sciences. Abstract: In this chapter, we focus on covert video surveillance using unmanned aerial vehicles (UAVs), which is a relatively new research area. Different from the normal surveillance discussed in the previous chapters, covert surveillance requires that the intention of the UAVs is not discovered by the targets of interest. We present two approaches. The first approach is optimization‐based. We present a new metric to characterize the disguising performance, which evaluates the change of the relative distance and angle between the UAV and the target. Then, we formulate an optimization problem, which jointly maximizes the disguising performance and minimizes the energy efficiency of the UAV, subject to the motion constraint of the UAV and the requirement of keeping the target within view. We present a dynamic programming method to plan the UAV's trajectory in an online manner. The second one is a motion camouflage‐based approach. To achieve motion camouflage, the UAV keeps on a straight line segment connecting the target and a fixed reference point. A sliding mode control strategy is developed, which only takes the bearing information as input. We present extensive computer simulations demonstrate the performance of these approaches. |
19,956 | Please write an abstract with title: Simulation of Subsystem for Providing Resonant Mode of Operation of Automated Installation for Conducting Fatigue Vibration Tests, and key words: Vibrations, Time-frequency analysis, Blades, Resonant frequency, Fatigue, Control systems, Generators. Abstract: The article is devoted to simulation of a subsystem for providing a resonant mode of operation of an automated installation for conducting fatigue vibration tests. The article discusses the block diagram of the system and algorithms of initial search for the resonant frequency and adjusting the resonant frequency. This article uses an autonomous control system to find and maintain resonance. In this system, the computer is not included in the main loop of the control system. In such a system, the search for the resonant frequency is carried out at the minimum of the control signal coming from the controller output to the attenuator control input. The input data for the program are the initial value of the frequency of the master oscillator, the step frequency change $\Delta\omega$, the time of transient processes, the value of the output voltage of the regulator at resonance, the amplitude of oscillation of the blade, which is determined by the voltage applied to the reference element. At each step of the program execution, a new frequency value is entered into the setting generator. After the transition process is established, the value of the output signal from the controller is measured. If it differs from the threshold value by less than 5%, the search for the resonant frequency ends. Otherwise, the master oscillator frequency changes by $\Delta\omega$ in the decreasing direction. |
19,957 | Please write an abstract with title: Ultrasonic Liver Characterization Using Phase Congruency, and key words: Ultrasonic imaging, Feature extraction, Attenuation, Liver diseases, Cells (biology), Biopsy, Testing, Clinical diagnosis, Support vector machines, Radiofrequency identification. Abstract: Feature extraction plays an important role in the whole process of liver characterization. Because the ultrasonic scanner in use can be adjusted by different clinicians to produce optimal images, the ultrasound images captured sometimes can be greatly influenced by machine settings and further impact the classification result. In this paper, some experiments are made to try to extract the liver features using the 2D phase congruency, which invariant to changes in intensity or contrast, to try to avoid those problems. The effectiveness of our method tested on three classes of liver images shows the potential for physicians to quantify liver status in clinical diagnosis |
19,958 | Please write an abstract with title: Loose Formation Control of Multi-Agent Systems based on Piecewise Function, and key words: Asymptotic stability, Uncertainty, Protocols, Power supplies, Measurement uncertainty, Stability analysis, Delays. Abstract: This paper introduces a loose motion control algorithm for multi-agent systems whose interaction is described by a connected undirected graph. The proposed algorithm guarantees agents to achieve a loose formation motion. Each agent is driven by a nonlinear piecewise function of the coordination errors, to save agents from unnecessarily overcontrolling and, hence, it can reduce the energy cost in the case where input uncertainties exist. Both theoretical analyses on stability and simulations are given to demonstrate the effectiveness of the algorithm. |
19,959 | Please write an abstract with title: A high power, continuous wave, continuous tunable, narrow linewidth infrared OPO beyond 4 /spl mu/m, and key words: Laser tuning, Pump lasers, Tunable circuits and devices, Laser excitation, Power generation, Absorption, Spectroscopy, Frequency, Nonlinear optics, Optical pumping. Abstract: We present two new continuous-wave OPOs, using continuously tunable high-power single-frequency pump lasers. We extended the operation of PPLN OPO's to 4.7 micrometer and we reached a stabilized single-frequency idler output power of 3 Watts. |
19,960 | Please write an abstract with title: Continuous-time Value-Iteration-Based Learning for Constrained-Input Nonlinear Nonzero-Sum Game, and key words: Learning systems, Adaptive systems, Simulation, Heuristic algorithms, Games, Complex systems, Optimization. Abstract: A continuous-time value iteration based learning method is proposed for constrained-input nonlinear nonzero-sum game in this paper. Most existing studies were based on policy iteration, and thus they require an initial admissible control policy as the initial condition or some proper control policy to make the states satisfy the persistent excitation (PE) condition. However, no mater the initial admissible control policy nor a PE satisfied control policy, they can not be derived by a general feasible way. Such difficulty of choosing control policy may limit the actual application. The proposed method is developed based on value iteration and the requirement of choosing proper control policy can be avoided. Moreover, since the control signal should always be designed within limits in practice, the constrained-input property is taken into consideration. Simulation results are displayed to show the effectiveness. |
19,961 | Please write an abstract with title: On Self-Security of Grid-Interactive Smart Inverters, and key words: Conferences, Inverters, Software, Smart grids, Security, Smart devices. Abstract: The capability to exchange information with utility operators, aggregators, and nearby smart devices can make a grid-interactive inverter an intelligent cyber-physical device. However, the capability of exchanging information can also put the inverters at the risk of insecure operation. In this paper, possible software manipulations into the inverters are studied to understand their vulnerability to cyber-attacks. Moreover, the state-of-the-art system-level and device-level cyber-defense measures are discussed, and advantages and drawbacks of each technique are provided. Studies show that a reference model can be implemented in device-level security to effectively examine incoming setpoints for detecting and preventing malicious or harmful actions. This paper particularly underlines the significance of device-level self-security and its advantages for grid-interactive inverters. Finally, recommendations for future studies are provided. |
19,962 | Please write an abstract with title: Electrical Parameter Analysis on DLP 3D Printers using IoT (Internet of Things), and key words: System testing, Three-dimensional displays, Systematics, Shape, Voltage, Three-dimensional printing, Printers. Abstract: In this research, we develop a current, power, energy, and voltage monitoring system which is implemented on a 3D printer. The printer used is a 3D DLP (Digital Light Processing) printer, where this printer uses a 3D photopolymer resin that can solidify under a light source. We added IoT (Internet of Things) technology to make it easier for users to monitor 3D printer usage. One of the additional components used is the ESP 32, which functions as the main processor for processing and sending data. The system is equipped with a PZEM-004T sensor to transmit current, power, energy, and voltage readings. System testing is done by printing objects in three-dimensional form, including factory shapes, circles, pluses, triangles, and squares. Based on the test results, it is found that the longest response time is when the system prints a box object, which is 110 minutes, while the fastest response time on the plus object is 24 minutes. This proves that sending data using ESP32 can be used to implement IoT technology. |
19,963 | Please write an abstract with title: Feature-Supervised Action Modality Transfer, and key words: Integrated optics, Training, Knowledge engineering, Adaptation models, Feature extraction, Pattern recognition, Task analysis. Abstract: This paper strives for action recognition and detection in video modalities like RGB, depth maps or 3D-skeleton sequences when only limited modality-specific labeled examples are available. For the RGB, and derived optical-flow, modality many large-scale labeled datasets have been made available. They have become the de facto pre-training choice when recognizing or detecting new actions from RGB datasets that have limited amounts of labeled examples available. Unfortunately, large-scale labeled action datasets for other modalities are unavailable for pre-training. In this paper, our goal is to recognize actions from limited examples in non-RGB video modalities, by learning from large-scale labeled RGB data. To this end, we propose a two-step training process: (i) we extract action representation knowledge from an RGB-trained teacher network and adapt it to a non-RGB student network. (ii) we then fine-tune the transfer model with available labeled examples of the target modality. For the knowledge transfer we introduce feature-supervision strategies, which rely on unlabeled pairs of two modalities (the RGB and the target modality) to transfer feature level representations from the teacher to the student network. Ablations and generalizations with two RGB source datasets and two non-RGB target datasets demonstrate that an optical-flow teacher provides better action transfer features than RGB for both depth maps and 3D-skeletons, even when evaluated on a different target domain, or for a different task. Compared to alternative cross-modal action transfer methods we show a good improvement in performance especially when labeled non-RGB examples to learn from are scarce. |
19,964 | Please write an abstract with title: Preliminary analysis of magnetic shielding design, and key words: Magnetic analysis, Magnetic shielding, Magnetic sensors, Performance analysis, Actuators, Magnetic materials, Nickel, Interference, Finite element methods, Material properties. Abstract: The performance of micromachined sensors and actuators made of ferromagnetic material, such as nickel, is subject to environmental magnetic fields. To minimize such environmental interference, effective magnetic shielding is required. Preliminary magnetic field investigations are performed using finite element analysis (FEA). Effectiveness of the shielding versus the material properties of the shield, geometry of shield design, and orientation of the shield with respect to the magnetic field are analyzed. Experimental data are reported. The results agree well with the experimental data, except at higher magnetic flux density and a particular orientation. These analyses could be useful as a guide to improve magnetic shielding design and to enhance device performance. |
19,965 | Please write an abstract with title: A comparison of some spectral estimation techniques for short data lengths, and key words: Prediction methods, Frequency estimation, Forward contracts, Aerospace electronics, Minimization methods, White noise, Equations, Information systems, Laboratories, Aircraft. Abstract: This short paper presents a performance comparison of several recently proposed spectral estimation methods for short data lengths. The performance measures used are bias and variance of the estimate as obtained in simulations. The results show that the forward and backward prediction method is better than the forward prediction method, and Ulrych and Clayton's method [11 appears to perform better than Cadzow's ARMA technique [ Z ] . A modified form of Ulrych and Clayton's method, which exploits the symmetry in the AR coeffiecients that exists in the special case of sinusoids, is proposed and its performance is evaluated. |
19,966 | Please write an abstract with title: 25.6 Tbps Capacity and Sub-µsec Latency Switching for DataCenters Using >1000-Port Optical Packet Switch Architectures, and key words: Optical switches, Optical buffering, Optical packet switching, Layout, Computer architecture, Energy consumption. Abstract: We discuss the challenges and limitations of current electrical DataCenter switches towards scaling beyond the 25.6 Tb/s capacity-era while meeting a low-latency and high-radix envelope. With the high-power SerDes and required DSP interfaces forming critical scaling factors, we discuss the perspectives and challenges of migrating to Optical Packet Switch (OPS) technologies for avoiding the electronically-induced bottlenecks, while exploiting reliable and practical techniques for overcoming well-known OPS problems, like buffering and high-port connectivity. We demonstrate the feasibility of OPS schemes by reporting experimental results of our Hipoλaos architecture towards extending its line-rate to 25 Gb/s per port and enabling 25.6 Tb/s switch capacities through a 1024-radix layout, while still preserving sub-μs latency metrics. Experimental results are presented for both unicast and multicast packets, employing the 1024-radix Hipoλaos architecture in a fully-fledged FPGA-controlled switching Plane, along with a 32 × 32 Arrayed Waveguide Grating Router (AWGR) device. The unicast performance is validated through BER measurements, while optical multicasting to 5 nodes is also experimentally evaluated at 25 Gb/s, along with an evaluation of the broadband multicast capabilities of the switch. Moreover, a mixed-traffic scenario involving both unicast and multicast traffic is demonstrated. Finally, a discussion about the perspectives and challenges of bringing OPS in DC networks is presented. |
19,967 | Please write an abstract with title: User mobility pattern scheme for location update and paging in wireless systems, and key words: Paging strategies, History, Costs, Databases, Data structures, Protocols, Probability, Multidimensional systems, Shape. Abstract: The user mobility pattern (UMP) scheme is introduced for location update and paging in wireless systems where mobile terminals (MTs) maintain their history data in a database called user mobility history (UMH). During a location update, a UMP is derived from UMH and registered to the network. Unless the MT detects that it has moved out of the registered UMP, it does not perform any other location update. On the other hand, cells are paged selectively according to the cell entry times in the registered UMP upon a call arrival for the MT. The related data structures and the protocols for the UMP scheme are presented in the paper. The experimental results show that the UMP scheme outperforms the time-based and movement-based location update schemes as well as the blanket, selective, and velocity paging schemes. |
19,968 | Please write an abstract with title: Software Interaction Problem with the LDAP Directory Service: Description, Resolving, Analysis, and key words: Authorization, Software packages, Databases, Computer bugs, Libraries, Standards, Testing. Abstract: During the development of automated software packages for user authorization and granting access to network resources, there is a problem of software identification of the user of the directory service based on the LDAP database to a certain group of users. The standard Microsoft.NET Framework library, designed to perform basic operations on directory service objects, includes a special System.DirectoryServices library. The testing of this library has revealed that this mechanism only works properly with the group up to 1,500 members. This limitation of the System.DirectoryServices library remains uncorrected in all versions of.NET Framework. Wrong detection the group membership can lead to the dangerous situation when a authenticated user gets more large rights and privileges than it should or, on the contrary, does not get the necessary rights. The purpose of the article is to demonstrate how using of the library Novell.Directory.Ldap allows the administrator to produce the new working code for correct membership detection a certain user account in the user group. |
19,969 | Please write an abstract with title: A 7-MHz process, temperature and supply compensated clock oscillator in 0.25 /spl mu/m CMOS, and key words: Clocks, CMOS process, Temperature sensors, Temperature distribution, Ring oscillators, Frequency measurement, Semiconductor device measurement, Temperature control, Voltage control, Voltage-controlled oscillators. Abstract: This paper reports on the design and implementation of a process, temperature and supply compensated 7-MHz clock oscillator in a 0.25 /spl mu/m, double poly, 5-metal CMOS process. The clock generator is based on a 3-stage differential ring oscillator. The compensation technique incorporates a unique combination of a process corner sensing scheme and a temperature compensating network to appropriately change the control voltage of the differential ring oscillator. Measurements made across a temperature range of -40/spl deg/C to 125/spl deg/C and 64 samples collected over 3 runs indicate an average variation of /spl plusmn/0.82% (/spl plusmn/46 ppm//spl deg/C) in the clock frequency with temperature, /spl plusmn/2.1% with process across chips at room temperature, and a worst-case combined variation of /spl plusmn/2.6% (with process, temperature and supply). The variation of frequency with power supply was /spl plusmn/0.31% for a supply voltage range of 2.4-2.75 V. The measurement results are in good agreement with the simulation results. The oscillator is intended to serve as a start-up clock for microcontroller applications. |
19,970 | Please write an abstract with title: Effects of a Hard Limiting Repeater on the Performance of a DPSK Data Transmission System, and key words: Repeaters, Differential quadrature phase shift keying, Data communication, Downlink, Filters, Phase detection, Signal to noise ratio, Phase shift keying, Gaussian noise, Degradation. Abstract: Although the effects of a hard-limiting repeater on coherent phase shift keying (CPSK) data transmission systems have been studied, corresponding effects pertaining to differential phase shift keying (DPSK) systems are yet to be examined. The present paper contains the results of a study on DPSK data detection performance when a hard-limiting repeater is part of the overall data link under consideration, and white Gaussian noise is introduced at the repeater and receiver front ends; the extension to the multi-link system, containing cascaded hard-limiting repeaters, is also included. The results obtained were found to be analogous to those of previous CPSK studies. Specifically, the inclusion of the hard-limiter was generally shown to improve probability of error performance when downlink noise is present. A comparison of present results with those of previous ones for corresponding CPSK systems shows that DPSK is degraded noticeably more by downlink noise than its CPSK counterpart. |
19,971 | Please write an abstract with title: On the synthesis of equivalent circuit models for multiports characterized by frequency-dependent parameters, and key words: Circuit synthesis, Equivalent circuits, Time domain analysis, Frequency synthesizers, Microwave theory and techniques, Character generation, Microwave generation, Microwave circuits, Admittance, Impedance. Abstract: The synthesis of lumped-element equivalent circuits for time-domain analysis of problems with frequency-dependent parameters is of great interest in microwave theory. This paper presents a systematic approach to generate minimal order realizations for passive microwave circuits characterized by either admittance, impedance or scattering parameter data. Also a very efficient method to ensure inherent system properties such as stability and passivity is described. Modeling examples for a two- and four-port system are given. |
19,972 | Please write an abstract with title: Inertial Navigation and Geophysical Invariants, and key words: Earth, Satellites, Inertial sensors, Instruments, Inertial navigation, Satellite navigation systems, Angular velocity. Abstract: The paper is devoted to the problem of improving the accuracy of strapdown inertial navigation systems (SINS) both during the initial alignment and in the autonomous reckoning of coordinates. The proposed solution to the problem is based on the use of geophysical invariants and their combinations for observing SINS errors. At the initial alignment, in addition to the typical invariants associated with the immobility of the SINS base, the projections of the vectors of the angular velocity of the Earth's rotation and the acceleration of gravity on the axes of various coordinate systems are considered. In the SINS autonomous navigation mode, it is proposed to use the projections of the angular velocity vector of the Earth's rotation on the axis of the inertial coordinate system as invariants. Such projections are compared with their values calculated in the SINS. The observations formed on this basis are used to estimate SINS errors using the extended Kalman filter. The results of full-scale experiments with the integrated inertial-satellite navigation system SINS-500NS are presented and analyzed. |
19,973 | Please write an abstract with title: Fault Detection Based on Hierarchical Mode Analysis with ICA-KICA, and key words: Fault diagnosis, Analytical models, Uncertainty, Fault detection, Process control, Independent component analysis. Abstract: For the problem of fault detection in non-Gaussian and nonlinear multimode processes, a fault detection method based on hierarchical mode analysis with independent component analysis (ICA)-kernel independent component analysis (KICA) is presented. Since stable and transition modes coexist in multimode processes and the mode information has uncertainty, hierarchical mode analysis is used for obtaining the hierarchical mode information. Then, the ICA-KICA is presented for modeling the stable and transition modes obtained from the hierarchical mode analysis. Lastly, a mode identification method based on discriminant function is given for fault detection. The penicillin fermentation process is used for the experiments of fault detection and the analyses indicate the performance of the fault detection based on hierarchical mode analysis with ICA- KICA. |
19,974 | Please write an abstract with title: Visualization of recursively defined concepts, and key words: Diseases, Pollution measurement, Time measurement, Data visualization, Area measurement, Atmospheric measurements, Performance analysis, Computer science, Air pollution, Geographic Information Systems. Abstract: Visualization of recursively defined concepts is a general problem that appears in many areas. For example, drought areas based on the standardized precipitation index (SPI) and long-term air pollution areas based on safe and critical level standards are recursively defined concepts. We develop a general and efficient representation and visualization method for recursively defined spatio-temporal concepts. We illustrate our general method by visualizing drought and pollution areas. |
19,975 | Please write an abstract with title: UAV Pre-Study for In-Air-Capturing Maneuver, and key words: Couplings, Location awareness, Satellites, Propulsion, Aerodynamics, Autonomous aerial vehicles, Aircraft manufacture. Abstract: Implementation of reusable launch vehicle (RLV) missions is a major goal in current aerospace research. One conceptual idea to return a booster stage is the so-called “in-air capturing” (IAC), where a winged stage is captured by an aerial vehicle and towed back to the final destination. This approach has the advantage that a towed winged stage does not need a propulsion system or fuel reserves to arrive to a destination point, compared to alternative approaches as demonstrated by SpaceX. The concept of capturing the RLV in air is based on earlier IAC missions for satellite photo capsules and the probe-and-drogue refueling method. A key difference is that in an air-to-air-refueling procedure a highly dynamic fighter tries to connect to a trailing drogue or rigid boom from a sluggish tanker. Opposite to this procedure, it can be assumed that in IAC case two aerodynamically sluggish aircraft need to be coupled. The challenge is to build up a formation which enables a connection between a gliding RLV and a dynamic coupling device trailing from a large aircraft. To investigate this IAC approach, the German Aerospace Center (DLR) built a scaled demonstration system with smaller unmanned aerial vehicles (UAV) to research different aspects of IAC flight tests. Based on the assumption that at an IAC approach would involve two large aerodynamically sluggish systems, a third highly dynamic vehicle should be introduced to enable a safe and reliable connection. Therefore, the trailing system, which is known from the air-to-air refueling, was modified by DLR with aerodynamic control surfaces and an independent flight control system. This enables a dynamic and independent motion of the coupling device relative to the towing aircraft, as well as the RLV. This paper gives an overview about IAC investigations of DLR, which are validated in experimental flight test demonstrations with scaled unmanned systems. The focus of this work is on building up the formation, from the rough approach with GNSS up to the final approach, where the global, absolute localization is supported by an image based relative position estimation of the coupling device. A major aspect in the formation implementation is the active coupling device (ACD). Therefore, the paper will show the construction of the ACD, its functionality and operation during the formation flight and a validation of its behavior at the flight demonstration. The first flight test results show that our research is heading in the right direction and further tests are expected to provide comprehensive results for the validation of the IAC concept. |
19,976 | Please write an abstract with title: The Markov Random Field in Materials Applications: A synoptic view for signal processing and materials readers, and key words: Solid modeling, Markov processes, Machine learning, Object detection, Signal processing, Solids, Microstructure. Abstract: The Markov random field (MRF) is one of the most widely used models in image processing, constituting a prior model for addressing problems such as image segmentation, object detection, and reconstruction. What is not often appreciated is that the MRF owes its origin to the physics of solids, making it an ideal prior model for processing microscopic observations of materials. While both fields know of their respective interpretations of the MRF, each knows very little about the other’s version of it. Hence, both fields have “blind spots,” where some concepts readily appreciated by one field are completely obscured from the other. With this in mind, the objectives of this article are to 1) develop a synoptic view of the MRF, the related Gibbs distribution, and the Hammersley–Clifford theorem that links them, in such a way that signal processing and materials readers will see them from the same perspective; and 2) explain physics-based regularization using the MRF and describe how it can provide insight into the performance of MRF-based segmentation methods. While the MRF has already been used in many machine learning contexts, we will use a simpler, more transparent method to illustrate the fundamental behavior of the MRF, with the understanding that this behavior should be inherent in more complex learning approaches. |
19,977 | Please write an abstract with title: Generation and recall method for long-term memory data to suppress interference in RAN, and key words: Interference suppression, Radio access networks, Resource management, Training data, Function approximation, Neural networks, Learning systems, Intelligent networks, Informatics, Information retrieval. Abstract: A phenomenon called "interference" has been known as a problem in incremental learning of neural networks. That may happen when input-output relations trained by former training data are collapsed by new training data incremented later. In order to cope with "interference" problems, RAN-LTM (resource allocating network with long term memory) has been proposed. It has a long term memory (LTM) which stores input-output relations acquired by RAN. Then the relations in the LTM are recalled by a current training sample in order to suppress the interference in learning process. While RAN-LTM is effective to avoid the interference, there are many parameters to be set carefully in advance. In this paper, generation and retrieving methods of LTM data are proposed. The modified RAN-LTM is applied to two function approximation problems. Computational simulation results show that the modification is effective to improve the performance of RAN-LTM. |
19,978 | Please write an abstract with title: Fourier-synthesis of optical waveforms, and key words: Frequency, Optical pulse generation, Space vector pulse width modulation, Shape, Optical pulses, Pulse shaping methods, Laser transitions, Liquid crystals, Optical modulation, Xenon. Abstract: The talk will describe the generation of an optical pulse where the spectrum is sufficiently broad that the waveform is a single cycle in length, and where the temporal shape of this waveform may be synthesized. Specifically, we report the generation of a train of single-cycle optical pulses with a pulse width of 1.6 fs, a pulse separation of 11 fs, and a peak power of 1 MW. |
19,979 | Please write an abstract with title: Analysis on giant magnetoresistive characteristics of synthetic antiferromagnet-based spin valves with modified pinned layers, and key words: Magnetic analysis, Giant magnetoresistance, Antiferromagnetic materials, Spin valves, Sensitivity analysis, Size control, Equations, Magnetic multilayers, Couplings, Saturation magnetization. Abstract: A parametric sensitivity analysis has been performed on a new type of synthetic antiferromagnet-based spin valves (SSVs) comprising a modified pinned structure using CoFe (P1)-Ru-CoFe (P2)-Ru-CoFe (P3). Recently, it was demonstrated that this type of modified synthetic spin valves (MSSVs) could deliver larger effective exchange field (H/sub ex.eff/) as well as better bias point control capability over a conventional SSV, in particular, when the device size became as small as 50 nm . A series of calculations based on the Landau-Lifschitz-Gilbert equation incorporating a single-domain multilayer model was carried out. We considered three key parameters such as an indirect exchange coupling energy (J/sub 1/) between P1-P2 as well as P2-P3, an exchange biasing energy between P1 and antiferromagnetic layer (J/sub eb/), and a relative giant magnetoresistive contribution (R) due to the angular difference of magnetizations in the pinned structure. It was found that J/sub 1/ was mainly related with the saturation field (H/sub s/) and the field at which the maximum subpeak magnetoresistance (MR) ratio (H/sub sub/) occurred, while J/sub eb/ influenced on the H/sub ex.eff/. R raised the MR ratio between the main peak and subpeak. As J/sub 1/ increased, H/sub ex.eff/ also increased. As the cell dimension decreased below 1 /spl mu/m, H/sub ex.eff/ and H/sub s/ increased while H/sub sub/ decreased rapidly. |
19,980 | Please write an abstract with title: Defect diagnosis technology based on multi-spectral point cloud, and key words: Image segmentation, Visualization, Temperature distribution, Insulation, Three-dimensional displays, Laser radar, Conferences. Abstract: To increase the ability to detect defects, 2D image RGB and temperature information was fused with 3D point cloud by calibrating cameras and LiDAR. According to the segmented area in 2D images, point cloud was semantically divided into different groups. Visual appearance defects and abnormal temperature distribution in the segmented point cloud can be recognized with less misdiagnosis. The point clouds collected at different times were compared to realize the abnormal appearance of equipment components. This application showed an improvement of the reliability of power equipment and reduction of the work pressure of operation and maintenance personnel. |
19,981 | Please write an abstract with title: A critical evaluation and design of bi-directional DC/DC converters for super-capacitors interfacing in fuel cell applications, and key words: Bidirectional control, DC-DC power converters, Fuel cells, Distributed power generation, Automotive engineering, Analog-digital conversion, Vehicle dynamics, Supercapacitors, Capacitors, Energy management. Abstract: Among innovative conversion systems for alternative energy, fuel cells (FCs) are ideal in applications as distributed power generation or automotive. The connection of FCs to domestic or industrial loads requires a DC/AC converter also acting as an energy buffer to match the different dynamics of FCs and loads. In the last years, a new type of electrolytic capacitors called super-capacitors (SCs), has been designed using double layers technology. Such components are able to store more energy than electrolytic capacitors maintaining the capability to swap it at high power levels. Firstly, different solution used to connect SCs to a FC based conversion system are considered. Then, a comparison of bi-directional DC/DC converters designed to manage SCs energy is performed. Finally, the converter design and a laboratory prototype of the adopted solution are reported. |
19,982 | Please write an abstract with title: CEO Turnover, Network Effects, and Firm Performance, and key words: Organizations, Time measurement, Performance evaluation, Organizatonal aspects, Leadership. Abstract: This study applies network and organizational theory to examine the effect of CEO turnover on firms' accounting performance and market performance in both the short-term and the long-term. In addition, this study investigates the moderating role of network effects using cluster analysis.Using a system generalized method of moments (GMM) estimation of panel data obtained from Compustat and S&P's Execucomp database, this study finds that firms with frequent CEO turnover are less likely to have superior performance, in the long-term. This study also finds that firms that have CEO turnover are more likely to have better accounting performance over the short-term, but less likely to have superior market performance. In addition, this study found that network effects moderate the relationship between CEO turnover and firm performance, and generally play an opposite moderating role between the long-term and the short-term.This study contributes to the research by providing new insights of CEO turnover effects on firm performance and investigating the moderation effects of network structure on firm performance. The findings in this study also provide practical suggestions for firms that have frequent changes of CEO. |
19,983 | Please write an abstract with title: Spring Buddy: A Self-Adaptive Elastic Memory Management Scheme for Efficient Concurrent Allocation/Deallocation in Cloud Computing Systems, and key words: Concurrent computing, Cloud computing, Linux, Memory management, Force, Organizations, Resource management. Abstract: Within the cloud computing scenario, each server usually carries multiple service processes, which intensifies the concurrency pressure of the system. As a result, the process of memory management during page allocation and deallocation becomes a significant bottleneck. Although several methods such as Buddy System and Inverse Buddy System (iBuddy) have been proposed to improve the performance of memory management, they cannot adapt to the highly concurrent environment of cloud computing, because they either force the memory allocation/deallocation requests to be serialized or bring extra fragmentation. To address the above problem, we propose Spring Buddy, which improves the concurrency of both memory allocation and deallocation and avoids unnecessary fragmentation. It can detect the changes of system- and process-level memory request patterns and dynamically adjust the organization of page frames. Inventively, Spring Buddy uses the spring core layer to provide both concurrent response and resource aggregation capability which is adapted to the system's concurrency pressure, and also uses the spring lazy layer to further mitigate the system resource contention through process behavior prediction. To demonstrate the effectiveness of Spring Buddy, we implement it in the Linux kernel. The results demonstrate that Spring Buddy can reduce memory allocation latency by 71.47 % and deallocation latency by 93.20% on average compared to the existing methods. |
19,984 | Please write an abstract with title: Implementing driver's behaviours to evaluate how to offer road information, and key words: Traffic control, Hardware, Frequency modulation, Radio broadcasting, Driver circuits, Road transportation, Computer simulation, Computational modeling, Earth, Fuels. Abstract: An information offering system in a highway attracts attention as a method of a course instruction to an effective driver for a current traffic jam problem. However, when the effect of the course instruction by these information offering is evaluated from driver's behaviour etc, it is difficult to acquire the behaviour data of an actual driver. Therefore, the system which virtually evaluates the effect is needed. Then, the computer simulation is used before the method of inducing the route is introduced into an actual road. In order to evaluate the effect virtually, the driver model to imitate the behaviour of the driver on the simulation is needed. In the article, we suggest a driver model for the evaluation of the effect of these informations given to a driver. We focus on the number of cars in the circumference that can be recognized by a driver as well as the distance between the car in front and the driver's car itself. We conducted simulations on various combinations of the above two factors. We compared the results of the simulations with a previous studies on driver's perception of traffic jam. It turned out that both studies yielded reasonably similar results. |
19,985 | Please write an abstract with title: Augmenting a conceptual model with geospatiotemporal annotations, and key words: Inventory management, Environmental management, Spatial databases, Large-scale systems, Geology, Personnel, Transportation, Portfolios, Data models, Insurance. Abstract: While many real-world applications need to organize data based on space (e.g., geology, geomarketing, environmental modeling) and/or time (e.g., accounting, inventory management, personnel management), existing conventional conceptual models do not provide a straightforward mechanism to explicitly capture the associated spatial and temporal semantics. As a result, it is left to database designers to discover, design, and implement - on an ad hoc basis - the temporal and spatial concepts that they need. We propose an annotation-based approach that allows a database designer to focus first on nontemporal and nongeospatial aspects (i.e., "what") of the application and, subsequently, augment the conceptual schema with geospatiotemporal annotations (i.e., "when" and "where"). Via annotations, we enable a supplementary level of abstraction that succinctly encapsulates the geospatiotemporal data semantics and naturally extends the semantics of a conventional conceptual model. An overarching assumption in conceptual modeling has always been that expressiveness and formality need to be balanced with simplicity. We posit that our formally defined annotation-based approach is net only expressive, but also straightforward to understand and implement. |
19,986 | Please write an abstract with title: Deep Reinforcement Learning for Wireless Resource Allocation Using Buffer State Information, and key words: Training, Wireless networks, Reinforcement learning, Quality of service, Benchmark testing, Scheduling, Resource management. Abstract: As the number of user equipments (UEs) with various data rate and latency requirements increases in wireless networks, the resource allocation problem for orthogonal frequency-division multiple access (OFDMA) becomes challenging. In particular, varying requirements lead to a non-convex optimization problem when maximizing the systems data rate while preserving fairness between UEs. In this paper, we solve the non-convex optimization problem using deep reinforcement learning (DRL). We outline, train and evaluate a DRL agent, which performs the task of media access control scheduling for a downlink OFDMA scenario. To kickstart training of our agent, we introduce mimicking learning. For improvement of scheduling performance, full buffer state information at the base station (e.g. packet age, packet size) is taken into account. Techniques like input feature compression, packet shuffling and age capping further improve the performance of the agent. We train and evaluate our agents using Nokia's wireless suite and evaluate against different benchmark agents. We show that our agents clearly outperform the benchmark agents. |
19,987 | Please write an abstract with title: Reflection from a periodically perforated plane using a subsectional current approximation, and key words: Reflection, Apertures, Current density, Integral equations, Conductors, Scattering, Electric resistance, Lighting, Surface resistance, Boundary conditions. Abstract: The scattering from a zero thickness plane having finite sheet resistance and perforated periodically with apertures is calculated for arbitrary plane wave illumination. The surface current density within the unit cell is approximated by a finite number of current elements having rooftop spatial dependence. The transverse electric field is expressed in terms of the current, and the electric field boundary condition is satisfied in an integral sense over the conductor, generating a finite dimension matrix equation whose solution is the current density. Since the conductor shape is defined through the locations of subsectional current elements, arbitrary shaped apertures can be handled. The reflection coefficient and current distribution are calculated for square apertures in both perfectly conducting and resistive sheets, and for cross-shaped apertures. Finite resistivity is shown to cause the magnitude of the transverse magnetic (TM) reflection coefficient to decrease more rapidly and its phase to decrease less rapidly, as the angle of incidence approaches glancing. Through detailed plots of the current density, the current crowding around the apertures is made clearly evident. |
19,988 | Please write an abstract with title: A 2.3-to-3.2GHz Class-G Impedance-Modulation Power Oscillator with 10dBm Peak $P_{\text{out}}$ and 39%/37%/33%/30% Efficiency at 0/3/6/9dB PBOs, and key words: Phase noise, Resistors, Radio frequency, Frequency modulation, Impedance matching, Resonant frequency, Switches. Abstract: In this paper, a Class-G impedance-modulation power oscillator is proposed to enhance the efficiencies at multiple PBOs. With the switch-combined reconfigurable matching-resonator, the output matching is optimized along with the tuning of oscillation frequency. Meanwhile, the digitally controlled tail resistor array is used to continuous tune the output power. The proposed power oscillator is fabricated in a 40-nm CMOS technology. Measurements exhibit a 33% tuning range from 2.3 to 3.2GHz. The peak output power is 10dBm while the efficiencies at 0/3/6/9dB PBOs are 39%, 37%, 33%, and 30%, respectively. The 1MHz-offset phase noise is −131.5 to −127.2dBc/Hz over the operation frequency. |
19,989 | Please write an abstract with title: Performance Analysis of a New Energy-Aware RPL Routing Objective Function for Internet of Things, and key words: Linear programming, Routing protocols, Measurement, Routing, Internet of Things, Base stations. Abstract: In recent years, there has been an increasing interest in Internet of Things (IoT). IoT wireless networks are formed of several small devices encompassing the capability of sensing a physical characteristic and sending it hop by hop to a central node or base station. Wireless sensor networks are also termed as Low Power and Lossy Networks (LLNs). Designing an energy efficient routing protocol for LLNs is very important to prolong the lifetime of the IoT network. We propose a new energy-aware objective function for the RPL routing protocol which combines the nodes link quality and their residual energy to improve the network latency and at the same time prolong the life of the sensor nodes. Experimental results using COOJA simulator show an improvement in terms of network latency and remaining energy of around 10% for our protocol ETX-ENR compared to a recently published Fuzzy Logic objective function. |
19,990 | Please write an abstract with title: Deep Space Relay Resource Planning Model Based on Sliding Time Window, and key words: Earth, Supply and demand, Scheduling, Planning, Resource management, Telemetry, Relays. Abstract: When a deep space probe enters into the back of the celestial body, it cannot directly communicate with the earth for TT&C (Telemetry, Tracking & Control) and data transmission. As a transfer station for communication between the earth TT &C station and the deep space probe, the deep space satellite realizes all-weather data transmission between the earth and deep space probe. Because of the exclusivity of the deep space relay satellite communication link, several deep space probes compete for relay resources. Aiming at the problem of relay resource planning for deep space probes, this paper proposes a deep space relay resource planning algorithm based on sliding time window, designs hierarchical planning and scheduling architecture of relay resources, and realizes automatic planning and allocation of relay resources and unified scheduling and management. The practical application results show that the algorithm can meet the requirements of resource planning for celestial backside exploration tasks, improve the efficiency of resource allocation and reduce the rate of resource fragmentation. |
19,991 | Please write an abstract with title: Influence of the magnetic field on dielectric breakdown in memristors based on h-BN stacks, and key words: Lorentz covariance, Magnetic field measurement, Current measurement, Memristors, Switches, Materials reliability, Dielectric measurement. Abstract: Here we present a characterization study of Au/hBN/Au/Ti memristors when exposed to controlled magnetic field (MF) perpendicular to the device main vertical axis. The main switching parameters, i.e. set and reset voltages and currents, have been extracted and the influence of the MF on them (and on the resistive switching operation) has been analyzed. We observed that the set voltage values decrease with the MF, also the variability linked to the reset voltage is reduced. A similar effect is seen on the reset current, which shows a decrease due to the MF presence. These effects are linked to the reduction of the effective conductive filament section due to the influence of Lorentz force on the current lines. |
19,992 | Please write an abstract with title: Research on Decision Making Technology for Maintenance Cycle of Operating Vehicle Components, and key words: Preventive maintenance, Reliability, Road transportation, Decision making, Safety, Power system reliability. Abstract: Whether the maintenance system is reasonable or not is directly related to the safety and economy of the operating vehicles. The maintenance cycle is very subjective, and can’t adapt to the maintenance and management of the parts after the speed increase of the operating vehicles. The fault of main parts operation of the vehicle model, the maintenance cycle and service life were studied using the reliability method, the reliability, effectiveness and economy as the main factor, the fuzzy decision method to determine the optimal maintenance cycle, so as to reduce the maintenance cost, provide the basis for the decrease of on the highway transportation safety threat. |
19,993 | Please write an abstract with title: A Zero Offset Reduction Method for RTD-based Thermal Flow Sensors, and key words: Temperature sensors, Temperature measurement, Resistors, Heating systems, Measurement errors, Semiconductor device measurement, Thermal resistance. Abstract: Zero offset, which is caused by unavoidable asymmetrical structures of thermal flow sensors, commonly reduces the practical performance of thermal flow sensors. In this work, a zero offset reduction method for thermal flow sensors based on resistive temperature detectors (RTD) is proposed. A micro-machined thermal flow sensor consists of four thick-film resistors is adopted in this work. Among these four resistors, two of them are acted as heaters placed between the other pair of RTDs. An unbalanced heater driving strategy is adopted to cancel the zero offset and a new measurement model is proposed for mass flow rate measurement. Experimental results show that the zero offset has been significantly reduced and the mass flow rate measurement error is less than ±1% F.S. (Full Scale) within the range of 0 mg/s to 0.1 mg/s. |
19,994 | Please write an abstract with title: Performance Evaluation of a PV Inverter with Active Filter Functionalities, and key words: Inverters, Power harmonic filters, Harmonic analysis, Active filters, Low pass filters, Voltage control, Load modeling. Abstract: This paper presents the analysis of the operational performance of a PV inverter with added active filter (AF) functionalities. The paper details modelling of a PV inverter acting as an AF and performing compensation of fundamental reactive power and non-fundamental distortion power, i.e. compensation of harmonic emission due to nonlinear loads connected in the local network. Several load cases are analysed, including emission by constant harmonic current sources and full-wave rectifier loads, which are also considered for different operating powers. |
19,995 | Please write an abstract with title: Distributed Alpha-Fair Throughput Aggregation in Multi-RAT Wireless Networks, and key words: Resource management, Radio access technologies, Throughput, Wireless fidelity, Long Term Evolution, Wireless communication, Ad hoc networks. Abstract: Today’s wireless devices can be simultaneously connected to multiple communication networks based on different radio access technologies (RATs) such as WiFi, 3G, and LTE. Simultaneous aggregation of each client’s traffic across multiple such RATs or the corresponding base stations (BSs) can substantially improve the quality of experience for each client and improve the overall network utilization and efficiency.Our goal in this paper is to design distributed resource allocation algorithms that can be independently executed by each BS and achieve alpha-fairness among the clients. In particular, we derive a simple water filling based solution and study its theoretical aspects such as convergence, optimality, evolution, and convergence time. We also characterize its performance through a comprehensive multi-RAT simulator, and show that it achieves superior performance to alternative distributed solutions due to its fast and low-overhead operation. |
19,996 | Please write an abstract with title: Knowledge Exchange Between Domain-Adversarial and Private Networks Improves Open Set Image Classification, and key words: Adaptation models, Training, Task analysis, Knowledge engineering, Computational modeling, Data models, Benchmark testing. Abstract: Both target-specific and domain-invariant features can facilitate Open Set Domain Adaptation (OSDA). To exploit these features, we propose a Knowledge Exchange (KnowEx) model which jointly trains two complementary constituent networks: (1) a Domain-Adversarial Network (DAdvNet) learning the domain-invariant representation, through which the supervision in source domain can be exploited to infer the class information of unlabeled target data; (2) a Private Network (PrivNet) exclusive for target domain, which is beneficial for discriminating between instances from known and unknown classes. The two constituent networks exchange training experience in the learning process. Toward this end, we exploit an adversarial perturbation process against DAdvNet to regularize PrivNet. This enhances the complementarity between the two networks. At the same time, we incorporate an adaptation layer into DAdvNet to address the unreliability of the PrivNet's experience. Therefore, DAdvNet and PrivNet are able to mutually reinforce each other during training. We have conducted thorough experiments on multiple standard benchmarks to verify the effectiveness and superiority of KnowEx in OSDA. |
19,997 | Please write an abstract with title: Gait Self-learning for Damaged Robots Combining Bionic Inspiration and Deep Reinforcement Learning, and key words: Legged locomotion, Training, Biological system modeling, Robot control, Reinforcement learning, Aerospace electronics, Robots. Abstract: The gait self-learning for the Hexapod Robot in the damaged state is very important to improve its survivability in complex environments. Aiming at the damage of a Hexapod Robot with broken legs, this paper proposes a gait self-learning method for the damaged robot based on bionic inspiration and deep reinforcement learning. Due to various damage states of robots, it is difficult to accurately model the complex damage state. Using deep reinforcement learning can better solve this kind of model-free robot control problem. Besides, inspired by the moving gaits of the hexapod, the motion range of each leg joint of the Hexapod Robot is constrained, which further reduces the search range of the action space. The experimental results show that compared with the single deep reinforcement learning method under the same training episodes, the gaits generated by the proposed method are more adaptable and efficient. |
19,998 | Please write an abstract with title: A Rake System for Tropospheric Scatter, and key words: Scattering, Bandwidth, Fading, Diversity reception, RAKE receivers, Propagation delay, Radio frequency, Circuit testing, Delay effects, Frequency synchronization. Abstract: Experimental equipment has been developed which adapts the Rake concept to tropospheric scatter. This equipment enables experimental tests of multipath diversity effectiveness for communications. Its delay-resolution capabilities and circuit stability also allow effective use of the equipment for novel propagation research. The underlying concepts and equipment design are described, along with initial propagation test results. |
19,999 | Please write an abstract with title: Electronic Education in Aviation Technical Personnel Education, and key words: Training, Education, Streaming media, Personnel, Mediation, Monitoring, Text processing. Abstract: The specifics of the system approach to education of an aviation professional lie not only in more complicated methods of analysis of this process, but also in new orientation and new principles for the overall understanding of the aviation education process. The system approach of the solution includes both historical and contemporary aspects, emphasizing the mutual relations of elements and relations of the phenomenon to its surroundings, static and dynamic aspects, structural and procedural. The aim of this article is to describe the primary teaching technics with of e-learning, computer and simulators. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.