ID int64 0 400k | content stringlengths 97 5.85k |
|---|---|
21,100 | Please write an abstract with title: Coded differential space-time modulation for flat fading channels, and key words: Modulation coding, Fading, Channel state information, Interleaved codes, Channel capacity, Power measurement, Computational modeling, Predictive models, Turbo codes, Information theory. Abstract: In this paper, powerful coding techniques for differential space-time modulation (DSTM) over Rayleigh flat fading channels and noncoherent detection without channel state information at the receiver are investigated. In particular, multilevel coding, bit-interleaved coded modulation, and so-called hybrid coded modulation (HCM) are devised and compared. For improved noncoherent reception multiple-symbol differential detection (MSDD) is adapted to DSTM. In order to reduce the computational effort required for MSDD, a low-complexity version of MSDD is applied. Evaluating the ergodic channel capacity for the different schemes as appropriate performance measure, HCM with simplified MSDD is shown to offer a favorable tradeoff between complexity and achievable power efficiency. Simulation results employing turbo codes in properly designed HCM schemes confirm the predictions from information theory. |
21,101 | Please write an abstract with title: Longitudinal Vehicle Dynamics: A Comparison of Physical and Data-Driven Models Under Large-Scale Real-World Driving Conditions, and key words: Vehicle dynamics, Data models, Roads, Atmospheric modeling, Mathematical model, Adaptation models. Abstract: Mathematical models of vehicle dynamics will form essential components of future autonomous vehicles. They may be used within inverse or forward control loops, or within predictive learning systems. Often, nonlinear physical models are used in this context, which, though conceptually simple (especially for decoupled, longitudinal dynamics), may be computationally costly to parameterise and also inaccurate if they omit vehicle-specific dynamics. In this study we sought to determine the relative merits of a commonly used nonlinear physical model of vehicle dynamics versus data-driven models in large-scale real-world driving conditions. To this end, we compared the performance of a standard nonlinear physical model with a linear state-space model and a neural network model. The large-scale experimental data was obtained from two vehicles; a Lancia Delta car and a Jeep Renegade sport utility vehicle. The vehicles were driven on regular, public roads, during normal human driving, across a range of road gradients. Both data-driven models outperformed the physical model. The neural network model performed best for both vehicles; the state-space model performed almost as well as the neural network for the Lancia Delta, but fell short for the Jeep Renegade whose dynamics were more strongly nonlinear. Our results suggest that the linear data-driven model gives a good trade-off in accuracy and simplicity, whilst the neural network model is most accurate and is extensible to more nonlinear operating conditions, and finally that the widely used physical model may not be the best choice for control design. |
21,102 | Please write an abstract with title: Design of a UWB/Tri-Band Reconfigurable Flexible Antenna for IoT Applications, and key words: Communication systems, Patch antennas, Impedance matching, Bandwidth, Ultra wideband antennas, Internet of Things, P-i-n diodes. Abstract: In this paper, a compact, geometrically simple, ultra-wide band, flexible and tri band antenna is proposed for IoT applications. The proposed antenna is designed on commercially available flexible substrate material Roger RT5880, having relative permittivity, loss tangent and thickness of 2.2, 0.0009 and 0.79 mm, respectively. The circular patch is loaded with a rectangular stub in order to enhance the bandwidth and return loss. Afterwards, the circular patch is cleaved to integrate a diode in order to achieve frequency reconfigurability. The simulation and analysis of proposed reconfigurable antenna was done using Higher Frequency Structural Simulator (HFSS). Furthermore, to demonstrate the potential of the proposed work, it is compared with state-of-the-art works for similar applications. |
21,103 | Please write an abstract with title: An overview of very high capacity transmission technology for NTT networks, and key words: Marine technology, Repeaters, Optical fiber communication, Costs, Diode lasers, Paper technology, Underwater vehicles, Optical fibers, Bit rate, Transmission lines. Abstract: This paper describes very high capacity optical transmission system technology, which is useful for long-haul trunk lines, and has led to the feasibility of NTT's first gigabit-per-second range transmission system. It also describes various devices and circuits, such as high performance lasers, photodetectors, very wide-band amplifiers, and high speed logic circuits required for the development of such systems. It then discusses future research areas and trends in advanced lightwave communication systems. |
21,104 | Please write an abstract with title: A Forensics System for Live-Audio Watermarking, and key words: Watermarking, Generators, Protocols, Forensics, Probes, Audio recording, Delays. Abstract: A common problem in audio forensics is the difficulty to authenticate an audio recording. You can have an argument against any audio probe. In this paper we propose a system that can take audio probes which can be used with success in a court. The recording will be bulletproof due to the use of a reference protocol based on an external entity, the company that provides the recording system. Using an external cloud-based application, for the recorded person and for the recording institution, the resulted audio-recording will be 100% authenticated in terms of integrity check. All editing by means of deleting/inserting audio fragment longer than 5 ms will be detected. |
21,105 | Please write an abstract with title: COVID-19: A Crisis or a Springboard, and key words: COVID-19, Pandemics. Abstract: Reports on the impact the COVID-19 pandemic has had on society, business, industry, and the political system. A crisis can be a watershed opportunity in organizations’ lifetime. It takes leadership to turn crises into a springboard. While enterprises have ample opportunities and levers to pivot, and achieve competitive advantage, they should execute the same without losing the trust of the employees and customers. |
21,106 | Please write an abstract with title: Design and Analysis of Variable Pressure Control of Aircraft Hydraulic System, and key words: Heating systems, Switching frequency, Hydraulic systems, Pressure control, Military aircraft, Logic design, Aircraft propulsion. Abstract: The variable pressure hydraulic systems can automatically adjust the output pressure according to the load demand to reduce energy consumption, reduce the heat generated by the hydraulic systems, has a good application prospect. At present, the dual pressure hydraulic systems have been used in foreign military and civil aircraft, but domestic aircraft are less used. In order to solve the problems faced by engineering application of variable pressure hydraulic systems, the control logic, control mode, switching frequency, status monitoring and other aspects in engineering application of hydraulic variable pressure control function are designed and analyzed in this paper. The related content can provide reference for the engineering design of the aircraft variable pressure hydraulic systems in China and promote the engineering application of the hydraulic variable pressure control function to a certain extent. |
21,107 | Please write an abstract with title: A New Image Fusion Method for ERT-EMT Dual-Modality System Used in Gas–Liquid–Solid Three-Phase Fluidized Bed, and key words: Image reconstruction, Image fusion, Tomography, Media, Mathematical models, Image edge detection, Permeability. Abstract: The electrical resistance tomography and electromagnetic tomography (ERT-EMT) dual-modality system can be used to reconstruct the image of cross-sectional three-phase distribution for gas–liquid–solid fluidized bed by fusing the reconstructed images of ERT and EMT. However, due to the small size of solid particles, the complexity of fluidization process, and the inconsistency of media distribution recognized by ERT and EMT, the existing fusion algorithms of dual-modality electrical tomography, which either divide the media distribution into binary distribution or use the consistency of the media distribution to be recognized to improve the image quality, are not applicable. Aiming at the problem, a new image fusion method based on guided image filtering (GIF) and image statistics is proposed in this article. First, the GIF method is used to decompose the images of ERT and EMT into base layers containing large-scale variations in intensity and detail layers with small-scale details. Then, the weights corresponding to the base layers and detail layers are calculated with the image statistics method and the GIF method, respectively. Through the process, the useful information in the reconstructed images of ERT and EMT is fully utilized. The simulation and experimental results demonstrate that the proposed fusion method can accurately reconstruct the gas–liquid–solid distribution. |
21,108 | Please write an abstract with title: COVID-19 Diagnosis from Chest Radiography Images using Deep Residual Network, and key words: COVID-19, Training, Mathematical model, X-rays, Neural networks, Computer architecture, Residual neural networks. Abstract: The outbreak of COVID-19 has received much international attention due to its life-threatening repercussions. This pandemic has taken an enormous toll on the social, psychological, and economic stability of the humans. With the Coronavirus being extremely contagious, it becomes essential to automate the process of detecting the presence of this virus in humans. The diagnosis using Reverse Transcript Polymerase Chain Reaction (RT-PCR) is arduous and time-consuming; thus, the utilization of the chest X-rays has been proposed. Deep Learning algorithms often suffer from vanishing gradients and accuracy reduction with the increase in depth of the network. To efficiently tackle this issue on a limited dataset with severe class imbalance, this paper proposes an optimized variant of ResNet50, a Residual Network with Weighted Cross-Entropy loss to predict the presence of Coronavirus accurately in susceptible patients by analyzing their chest X-rays. The model yields reliable and stable results, with 97.5% Accuracy, 99% Positive Predictive Value, 96% Negative Predictive Value, 98.96% Specificity, and 96.11% sensitivity. The clinical reliability of the results has been validated by the precise feature extraction that has been highlighted in the heat maps of the predicted results. |
21,109 | Please write an abstract with title: Protection Scheme for Collector Lines Based on the Current Amplitude Ratio with Spectrum Index, and key words: Fault diagnosis, Sensitivity, Simulation, Doubly fed induction generators, Power system stability, Wind farms, Indexes. Abstract: Considering the various low voltage ride-through (LVRT) strategies of the doubly fed induction generator (DFIG), the fault currents supplied by each collector line equipped with DFIGs are complicated and changeable. As a result, there is a maloperation risk for the conventional overcurrent protection that is generally employed for the collector line. To address this issue, this paper proposes an improved protection scheme for the collector line based on the current amplitude ratio criterion with spectrum index. The main idea of the proposed protection scheme is using the amplitude difference features of the sequence current to differentiate the fault and healthy collector line. Besides, the proposed protection scheme also introduces the spectrum index to further revise the operation threshold of the amplitude criterion. The simulation results show that combined with the conventional overcurrent protection, the proposed protection scheme can accurately identify the fault line on the one hand and with the high reliability and sensitivity on the other hand. |
21,110 | Please write an abstract with title: Data-Driven Self-Learning Controller Design Approach for Power-Aware IoT Devices based on Double Q-Learning Strategy, and key words: Performance evaluation, Q-learning, Machine learning algorithms, Heuristic algorithms, Stochastic processes, Machine learning, Minimization. Abstract: Operational cycle control is an attractive field of research which can lead to improvements in the services offered by power-aware monitoring embedded IoT devices. Machine learning (ML) is an infrastructure for operational cycle control and provides many approaches which provide more energy-efficient operation. One subfield of ML is Q-learning (QL), which forms the basis of the data-driven self-learning (DDSL) controller. The DDSL algorithm dynamically sets operational duty cycles according to estimates of future collected data values, leading to effective operation of power-aware systems. However, QL performs very poorly in stochastic environments as a result of overestimation of action values. The double estimator implemented in QL therefore applies Double QL (DQL) and forms the basis for a novel Double DDSL (DDDSL). The results of testing a DDDSL controller on historical data showed 42–50 % greater performance than a controller with a fixed duty-cycle, and 2–12 % more performance than a DDSL controller. |
21,111 | Please write an abstract with title: Controlling LSPs in an ORION network, and key words: Intelligent networks, Optical packet switching, Optical fiber networks, Optical buffering, Optical wavelength conversion, Switching circuits, Packet switching, Stimulated emission, Optical interconnections, Delay. Abstract: New networking paradigms try to combine packet switching and circuit switching, keeping the best of both worlds and getting rid of the drawbacks. One promising technology is overspill routing in optical networks (ORION). In this paper we develop a control technique to set up LSPs in this novel network environment. It is based on the GMPLS paradigm and needs no extra control messages. |
21,112 | Please write an abstract with title: Whistle Generation in Superheterodyne Receivers, and key words: Frequency, Signal generators, Modems, Cable TV, Tuning, Receivers, Testing, Communication cables, Voltage, Communications technology. Abstract: A previous paper [3] dealt with seven receiver spurious response mechanisms. This paper shows that two of those mechanisms (intermediate-frequency harmonic and mixer p - q) can give responses at identical frequencies. A measurement method is described which allows the predominant mechanism to be identified, and it is shown that either response may predominate in practice. |
21,113 | Please write an abstract with title: Design and Simulation of Novel Control Architecture for the Movement of Commercial Aircraft Cabin Door, and key words: Aircraft, Trajectory, Mathematical model, Synchronous motors, Permanent magnet motors, Atmospheric modeling, Gears. Abstract: This work describes the architecture and modeling to control the movement of commercial aircraft cabin door using electro-mechanical actuator. An accurate door model system is integrated with brush-less direct current motor that offers high torque to achieve the motion trajectory. Proportional-integral control scheme is incorporated to achieve speed and position control of cabin door. The proposed scheme offers two salient characteristics: Firstly, the leakage problem of the traditional hydraulic system has been addressed. Secondly, it substantially reduces the power drawn from the aircraft engine. Finally, the numerical simulation results are exhibited that prove the efficacy of the proposed strategy. |
21,114 | Please write an abstract with title: A Smart Badge Implementation on Electrical Power Sector for Safety Improvement for Workforce - A Study Case, and key words: Performance evaluation, Pandemics, Inspection, Safety, Internet of Things, Research and development, Intelligent sensors. Abstract: The immersion of sensors in the industry, through Internet of Things (IoT) concept, has brought many opportunities for operational improvements in power electrical sector. In a more specific sense, the on-field activities carried out by utilities workforce, can become safer with the use of IoT sensors. This technology transmits data related to courses capacitation and electricians' certification. This type of data is regulated and supervised by regulatory agents in the electrical sector, and inspection are performed periodically by the utilities in order to guarantee the safety criteria established by the regulation. In that sense, this paper aims to present the implementation of a smart badge, which communicates with the inspector's mobile devices in order to make a more dynamic and feasible inspection solution for field activities. The presented solution implements courses and PPE (Personal protective equipment) management features, in order to guarantee and safeguard the life of employees who perform in on-field activities. In addition, it provides an update of inspection information in real time, in order to improve the management of training and PPE. The obtained results are derived from the Urban Futurability project, carried out by ENEL Sao Paulo Distribuicao in the framework of the Brazilian regulator's R&D program. |
21,115 | Please write an abstract with title: Effect of Asymmetry Mechanical Loads on the Potential Barrier Region of a Piezoelectric pn Junction, and key words: Junctions, Electric potential, Piezoelectric devices, Mathematical model, Impurities, Couplings, Compressive stress. Abstract: The nonlinear governing equations on the coupling between electromechanical fields and charge carrier in a thermal equilibrium piezoelectric pn junction subjected to asymmetric mechanical loads are established in this article. Effect of mechanical loads on the basic physical parameters of a piezoelectric pn junction, such as potential barrier region width, contact potential difference, electric potential, and carrier concentrations are analyzed numerically. Results show that asymmetry compressive stresses exert more influence on the movement of the potential barrier region's boundary and the migration of carrier compare to asymmetry tensile stresses. It is also found that asymmetry compressive stresses lead to a pn junction with a thin potential barrier region which enhances the chance of carrier's passing through of potential barrier region. The obtained results are useful in reducing the disadvantage of capacitance on rectification characteristic and can be used to tune the I- V characteristic of the pn junction working with bias voltage. |
21,116 | Please write an abstract with title: New asymptotic bounds for self-dual codes and lattices, and key words: Lattices, Binary codes, Rain, Linear programming, H infinity control, Cost accounting, Quantum mechanics. Abstract: We give an independent proof of the Krasikov-Litsyn bound d/n/spl lsim/(1-5/sup -1/4/)/2 on doubly-even self-dual binary codes. The technique used (a refinement of the Mallows-Odlyzko-Sloane approach) extends easily to other families of self-dual codes, modular lattices, and quantum codes; in particular, we show that the Krasikov-Litsyn bound applies to singly-even binary codes, and obtain an analogous bound for unimodular lattices. We also show that in each case, our bound differs from the true optimum by an amount growing faster than O(/spl radic/n). |
21,117 | Please write an abstract with title: Design of High-Gain Circularly Polarized Antennas Based on Vehicle Application Environment, and key words: Antenna feeds, Microstrip antennas, Antenna radiation patterns, Microstrip, Satellite antennas, Dipole antennas, Apertures. Abstract: In this paper, a novel circularly polarized (CP) antenna that achieves high gain by maximizing the radiation aperture utilization is proposed for vehicle applications. The realization of increasing the radiation aperture is based on the application environment, making full utilization of the vehicle roof, a large metal reflector beneath the antenna, which is indispensable in the vehicle application. Developed from the structure of typical microstrip patch antenna, the design extends the radiation patch to cover the side of the dielectric substrate, which increases the size of the radiating patch without increasing the antenna's outline size. To make CP antennas more suitable for special working environments with large reflecting surface, a sequential rotation feeding structure with 90° progressive phase difference is uniquely designed based on the active port impedance of the four-ended radiation structure. This co-design method introducing the active port impedance of a multi-port radiator into the design of feeding network as the loads can effectively guarantee the CP performance of the antenna, and can greatly simplify the optimization work in the subsequent stage. Based on this design idea, a prototype working at 1.48 GHz with a 50-MHz bandwidth is designed for vehicle satellite broadcasting application. Experimental results show that the antenna achieves a high CP gain greater than 7 dBic with a compact size of $50 \times 50 \times 10\,\,mm^{3}$ ($0.247\lambda _{0} \times 0.247\lambda _{0} \times 0.05\lambda _{0}$ , $\lambda _{0} $ is the wavelength of working frequency in free space). |
21,118 | Please write an abstract with title: A working-set approach to reduce the download-execution time of mobile programs, and key words: Mobile computing, Delay, Bandwidth, Wireless networks, Computer networks, Computational modeling, Distributed computing, Personal digital assistants, IP networks, Java. Abstract: The on-demand downloading of application code over a wireless network is an emerging paradigm for the distributed environment of mobile computing devices. In this environment, a user must wait while a mobile computing device fetches the application code over the network prior to execution. To reduce this downloading latency, we have developed a download approach based on working sets, and have designed and implemented a working-set generator that defines working sets by focusing on the intervals during which a program refers to junctions, variables, and constants. The program invocation times with this approach, simulated using trace information obtained from actual program behavior on Linux, have been compared with those of all-at-once, page, class, and symbol download approaches. This simulation showed that the working-set approach can reduce the download-execution time compared to that with the four other approaches. |
21,119 | Please write an abstract with title: Research on Distribution Line Protection Device Based on 5G/AD Hoc Network Wireless Communication Technology, and key words: Wireless communication, Optical fibers, Power supplies, Distribution networks, Internet, Communication networks, Security. Abstract: In order to solve the problem of insufficient optical fiber channels in the existing power backbone communication network and power distribution communication network, this paper is based on the 5G network and wireless ad hoc network technology that has been widely studied in the industry, and conducts 5G enhanced mobile broadband scenario enhancement technology research for power application services. Based on 5G/wireless ad hoc network-based power control business application key technology, through the deep integration of wireless communication technology and line protection, it is applied to the differential protection of the distribution network to form a line protection device based on wireless communication. It provides a new development prospect for the accurate location, isolation and protection of power supply for the distribution network. |
21,120 | Please write an abstract with title: Energy-aware Allocation of Graph Jobs in Vehicular Cloud Computing-enabled Software-defined IoV, and key words: Resource management, Cloud computing, Energy consumption, Servers, Vehicle dynamics, Computational modeling, Network topology. Abstract: Software-defined internet of vehicles (SDIoV) has emerged as a promising paradigm to realize flexible and comprehensive resource management, for next generation automobile transportation systems. In this paper, a vehicular cloud computing-based SDIoV framework is studied wherein the joint allocation of transmission power and graph job is formulated as a nonlinear integer programming problem. To effectively address the problem, a structure-preservation-based two-stage allocation scheme is proposed that decouples template searching from power allocation. Specifically, a hierarchical tree-based random subgraph isomorphism mechanism is applied in the first stage by identifying potential mappings (templates) between the components of graph jobs and service providers. A structure-preserving simulated annealing-based power allocation algorithm is adopted in the second stage to achieve the trade-off between the job completion time and energy consumption. Extensive simulations are conducted to verify the performance of the proposed algorithms. |
21,121 | Please write an abstract with title: Simultaneous Localization of a Receiver and Mapping of Multipath Generating Geometry in Indoor Environments, and key words: Wireless communication, Wireless sensor networks, Receiving antennas, Radio navigation, Transceivers, Indoor environment, Sensors. Abstract: This paper presents an algorithm that aims at combining the pre-existing and dominating applications of radio signals, namely communication, navigation and sensing of an environment into an integrated approach. In wireless propagation the transmitted signal is reflected and scattered by objects. Especially in indoor or urban scenarios, the signal reaching the receive antenna consists of multiple paths, called multipath. Multipath reception degrades the accuracy of the positioning device as long as the receiver is based on standard methods. With Channel-SLAM we introduced an algorithm which uses multipath components (MPCs) for positioning instead of mitigating them. In this paper, we show that MPCs allow us in addition to estimating the position of a receiver, to estimate the locations of reflecting surfaces and scatterers. We show that these estimations relate to floor plans of indoor environments. To verify the proposed algorithm, we evaluate the algorithm based on measurements using an ultra-wideband (UWB) system, the Decawaves DW1000 UWB transceiver. |
21,122 | Please write an abstract with title: 3D Object Detection on large-scale dataset, and key words: Industries, Three-dimensional displays, Laser radar, Vehicle detection, Neural networks, Object detection, Benchmark testing. Abstract: 3D object detection based on LiDAR point cloud has gained more and more attention from industry and academia. Most of the previous works are carried out on the KITTI dataset, which has the gap with real-world scenes in terms of data size and distribution. Faced with large-scale datasets, existing methods have encountered with some problems, especially in the detection of difficult targets and heading prediction. In this paper, we design an integrated framework to improve 3D object detection accuracy targeting on large-scale datasets. We explore data augmentation methods from the perspective of data-rich scenes. Two well-designed auxiliary losses are introduced into our framework to relieve the problem caused by the diversity of points density and distribution. To promote the performance of heading prediction, the existing heading classifier is replaced by our novel dual heading classifier. Experiments on the largest and most realistic 3D object detection benchmark of Waymo Open Dataset show that our integrated framework boosts the detection accuracy for a large margin. |
21,123 | Please write an abstract with title: A resource discovery model based on multi-agent technology in P2P system, and key words: Peer to peer computing, Mobile agents, Telecommunication traffic, Traffic control, Distributed computing, Resource management, Intelligent agent, Intelligent networks, Educational institutions, Computer science. Abstract: Dynamic joins and leaves of the node and heterogeneous network structure in a P2P system make it difficult to discover shared resources. A resource discovery model based on multiagent technology is presented. Agents maintain local resource information and mobile agents migrate on the network to discover shared resources. Multiagents cooperate with each other by means of pheromone and local heuristic information in an ant system. The system model and decision algorithm are described. Resources can be quickly acquired, network traffic can be reduced greatly, ans scalability and robustness can also be improved based on this model in a P2P system. |
21,124 | Please write an abstract with title: Fast Soft Color Segmentation, and key words: Image color analysis, Image segmentation, Training, Task analysis, Motion segmentation, Estimation, Neural networks. Abstract: We address the problem of soft color segmentation, defined as decomposing a given image into several RGBA layers, each containing only homogeneous color regions. The resulting layers from decomposition pave the way for applications that benefit from layer-based editing, such as recoloring and compositing of images and videos. The current state-of-the-art approach for this problem is hindered by slow processing time due to its iterative nature, and consequently does not scale to certain real-world scenarios. To address this issue, we propose a neural network based method for this task that decomposes a given image into multiple layers in a single forward pass. Furthermore, our method separately decomposes the color layers and the alpha channel layers. By leveraging a novel training objective, our method achieves proper assignment of colors amongst layers. As a consequence, our method achieve promising quality without existing issue of inference speed for iterative approaches. Our thorough experimental analysis shows that our method produces qualitative and quantitative results comparable to previous methods while achieving a 300,000x speed improvement. Finally, we utilize our proposed method on several applications, and demonstrate its speed advantage, especially in video editing. |
21,125 | Please write an abstract with title: Effect of SHe Temperature on Cool-Down Speed in JT-60SA CS Module, and key words: Conductors, Temperature measurement, Analytical models, Mathematical model, Insulation, Heat transfer, Plasma temperature. Abstract: The JT-60SA central solenoid (CS), which consists of four stacked modules, is cooled to an operating temperature of 4.5 K by supercritical helium (SHe). During cool-down from room temperature to 4.5 K, in order to avoid a damage on the coil, it is required to reduce thermal stress due to temperature difference in the coil. In the cool-down operation, the CS needs to control the maximum temperature difference in the longitudinal direction of the cable-in-conduit (CIC) conductor below 40 K. However, since that could damage the coil, correctly estimating the temperature distribution in the conductor is important for ensuring the cool-down operation is performed safely. In the present study, the JT-60SA CS module was prepared and the inlet and outlet temperatures, as well as the SHe mass flow rate, were measured until the CS module was cooled to operating temperature, after which a CS module simulation was performed in order to determine the effect of the inlet temperature on the cool-down speed. From the simulation results, it was concluded that the average cool-down speed was 0.73 K/h and the CS module reached 80 K in approximately 8.3 days while maintaining the maximum temperature difference within 40 K. Furthermore, the temperature difference between the inlet and outlet was kept within 25 K in order to limit the thermal stress. Taken together, the results of our analyses provide fundamental data that can be used to evaluate the safe cool-down operation of the coil and thus protect the coil systems. |
21,126 | Please write an abstract with title: IFSAR: an airborne interferometric SAR simulator, and key words: Synthetic aperture radar interferometry, Layout, Computational modeling, Signal generators, Application software, Ellipsoids, Global Positioning System, Scattering, Chirp, Computer simulation. Abstract: The IFSAR is an airborne SAR simulator for extended targets developed by INTA. This tool generates simulated signal data of an artificial three-dimensional scene as collected by an interferometric SAR with a fully configurable system oriented to airborne applications. Scene is made of points and triangular extended targets, over a selected ellipsoid, and it can be drawn using common CAD software. GPS motion records of plane and moving point targets, extended targets, associated scattering patterns, chirp signal, antenna patterns and TxRx diagram can be simulated too. Experimental results comparing interferograms from real and simulated missions shows that the tool is extremely accurate and requires few computer resources. It is used to calibrate of MOCO algorithms and interferometric processors, to probe new techniques and solve problems in real acquisitions of interferometric airborne SAR data. |
21,127 | Please write an abstract with title: QAAN: Question Answering Attention Network for Community Question Classification, and key words: Correlation, Conferences, Computational modeling, Computer architecture, Linguistics, Knowledge discovery, Task analysis. Abstract: Community Question Answering (CQA) provides platforms for users with various backgrounds to obtain information and share knowledge. In recent years, with the rapid development of such online platforms, an enormous amount of archive data has accumulated, it becomes more and more difficult for expert users to identify desirable questions. In order to reduce the proportion of unanswered questions in CQA, facilitate expert users to find the questions they are interested in, question classification becomes an important task of CQA, which aims to assign a newly posted question to a specific preset category. In this paper, we propose a novel question answering attention network (QAAN) for investigating the role of the paired answer of questions for classification. Specifically, QAAN studies the correlation between question and paired answer, taking the questions as the primary part of the question representation, and the answer information is aggregated based on similarity and disparity with the answer. Our experiment is implemented on Yahoo! Answers dataset. The results show that QAAN outperforms all the baseline models. |
21,128 | Please write an abstract with title: Speaker Anonymization for Machines using Sinusoidal Model, and key words: Error analysis, Conferences, Authentication, Signal processing. Abstract: With the widespread use of speech technologies, speaker identity/voiceprint protection has become very important. Many methods have been proposed in the literature that protects the speaker’s identity either by modifying the voice or replacing it with another speaker’s identity. Both authentication systems and humans cannot recognize the speaker’s identity in those approaches. Changing the speaker identity of original speech cannot be used for the applications in which we want to conceal speaker identity from machine authentication and, at the same time, keep the speaker’s voice as it is. Noise addition methods have been proposed in the literature to address this issue. However, adding noise to the signal increases the irritation effect on speech perception. This paper proposes a sinusoidal model-based approach that solves this issue. The proposed method does not interfere with the originality of speech but, at the same time, protects the speaker’s identity for the automatic speaker verification (ASV) system by degrading its performance. The proposed approach’s anonymized speech is tested on the ASV system for TIMIT and IITG-MV datasets, and an equal error rate (EER) is reported. Intelligence tests like short-time objective intelligibility (STOI) and mean opinion score (MOS) is also done. By taking both EER and intelligibility tests together into consideration, it is shown that the proposed approach can solve the discussed issue. |
21,129 | Please write an abstract with title: Photon echoes in an amplifying rare-earth ion-doped crystal, and key words: Photonic crystals, Pulse amplifiers, Laser transitions, Pump lasers, Optical pumping, Optical signal processing, Ultrafast optics, Erbium-doped fiber lasers, Laser excitation, Absorption. Abstract: We report, on the first experimental demonstration of photon echoes in an amplifying rare-earth ion-doped crystal. Population inversion is achieved via optical pumping yielding higher power photon echoes, with an energy gain up to 5. |
21,130 | Please write an abstract with title: Mixture autoregressive hidden Markov models for speech signals, and key words: Hidden Markov models, Density functional theory, Speech recognition, Maximum likelihood estimation, Decoding, Spectral analysis, Signal analysis, Stochastic processes, Probability distribution, Parameter estimation. Abstract: In this paper a signal modeling technique based upon finite mixture autoregressive probabilistic functions of Markov chains is developed and applied to the problem of speech recognition, particularly speaker-independent recognition of isolated digits. Two types of mixture probability densities are investigated: finite mixtures of Gaussian autoregressive densities (GAM) and nearest-neighbor partitioned finite mixtures of Gaussian autoregressive densities (PGAM). In the former (GAM), the observation density in each Markov state is simply a (stochastically constrained) weighted sum of Gaussian autoregressive densities, while in the latter (PGAM) it involves nearest-neighbor decoding which in effect, defines a set of partitions on the observation space. In this paper we discuss the signal modeling methodology and give experimental results on speaker independent recognition of isolated digits. We also discuss the potential use of the modeling technique for other applications. |
21,131 | Please write an abstract with title: Dc‐to‐Dc Power Converter Circuits, and key words: Steady-state, Switches, Buck converters, Pulse width modulation, Inductors, Capacitors, Voltage. Abstract: The second edition of the book extends the scope of the first edition to the emerging topic of <b>Dc Power Distribution Systems</b>. Starting from the converter circuit analyses, small‐signal modeling and dynamic analyses, and control designs for standalone dc‐to‐dc converters, the book culminates with <b>Four New Chapters</b> about <b>Dc Power Distribution Systems</b>, covering the system stability, subsystem compatibility, line filter considerations, and system design/integration for predictable/programmable performance. |
21,132 | Please write an abstract with title: Development of Temperature Monitoring System Based on Finite Element Analysis for Barycenter Adjustment of Trial Airplane, and key words: Temperature sensors, Temperature measurement, Temperature distribution, Costs, Instruments, Simulation, Software. Abstract: With the rapid development of computer technology, simulation experiments are more and more widely used in various engineering projects, especially for projects that require very strict experimental environments. Using simulation results to guide actual projects can save costs and make the system design more perfect, avoid unnecessary losses. This paper proposes to use a finite element analysis software to simulate the temperature field changes of the aircraft cabin and the center of gravity deployment system. According to the temperature data, using virtual instrument technology to design temperature monitoring system. Finally, the function of the system was verified by experiments and the design requirements were met. |
21,133 | Please write an abstract with title: Smooth trimmed NURBS surface connection with tension control, and key words: Spline, Surface topography, Surface reconstruction, Solid modeling. Abstract: An automatic smooth surface connection method that has the capability of tension control is presented. Given two trimmed NURBS surfaces, the new method constructs a smooth connection surface to connect the trimming regions of the trimmed surfaces at the trimming curves. The connection satisfies pseudo-G/sup 1/ or pseudo-C/sup 1/ smoothness requirement. The construction process consists of four major steps: connection curves construction and alignment, initial blends construction, setting up continuity constraints, and internal and external boundary smoothing. The advantages of the new method include: (1) providing the users with more flexibility in adjusting the shape of the connection surface; (2) the representation of the connection surface is compatible with most of the current data-exchange standards; (3) including the classical blending as a special case but with more flexibility on the setting of the rail curves; and (4) smoother shape of the resulting connection surface through an energy optimization process. Test cases that cover typical CAD applications are included. |
21,134 | Please write an abstract with title: Transformation Technology of Computer Monitoring System of Hydropower Plant in Frontier Minority Areas, and key words: Redundancy, Hydroelectric power generation, Maintenance engineering, Isolation technology, Reliability engineering, Market research, Computer security. Abstract: The development of monitoring and control system in hydroelectric power plant can be started from the early manual control, which consists of a simple operation platform consisting of relays, operation buttons, signal lights and buzzers. The monitoring system can realize partial operation and monitoring of the unit, and the operation platform of electromechanical equipment is separated. This paper analyzes the threat of network communication in power plants and introduces the development status of network communication isolation technology at home and abroad. On this basis, through the demand analysis, this paper puts forward a design scheme of industrial network data monitoring and isolation device based on FPGA. The experimental results show that the designed industrial network data monitoring and isolation devices have high accuracy, security and transparency, and can indeed provide reliable guarantee for the network communication security of power plants. |
21,135 | Please write an abstract with title: Video and audio trace files of pre-encoded video content for network performance measurements, and key words: Measurement, Telecommunication traffic, Libraries, Video sequences, Wireless networks, Traffic control, Protocols, MPEG 4 Standard, Bandwidth, Streaming media. Abstract: Video services are expected to account for a large portion of the traffic in future wireless networks. Therefore, realistic traffic sources are needed to investigate the network performance of future communication protocols. Previously, we provided a publicly available library of frame size traces of long MPEG-4 and H.263 encoded videos in the QCIF format resulting in low bandwidth video streams. These traces can be used in 3G network simulations. Some future communication systems, such as WLAN systems, offer high data rates and therefore high quality video can be transmitted over such higher speed networks. We now present an addition to our existing trace library. For this addition we collected over 100 pre-encoded video sequences from the Web, generated the trace files, and conducted a thorough statistical evaluation. Because the pre-encoded video sequences are encoded by different users, their video settings differ in terms of codec, quality, format, and length. The advantage of user diversity for encoding is that it reflects very well the traffic situation in upcoming WLANs. Thus, the new traces are very suitable for the network performance evaluation of future WLANs. |
21,136 | Please write an abstract with title: Application of Maximum Power Point Tracking Algorithm in Simulation of PV Systems, and key words: Photovoltaic systems, Maximum power point trackers, Temperature, Input variables, Energy conversion, Temperature control, Solar power generation. Abstract: In this paper modelling and simulation of photovoltaics array in local energy domain systems is presented. Photovoltaics array consists of group of connected PV modules. Thus, connected to energy domain system is building block of a photovoltaic energy conversion system. PV module is the essential power energy conversion unit of a solar energy transformation system. The output characteristics of a PV module are determined by solar irradiance, cell temperature and the output voltage of the PV module. Strong nonlinearity, in turn, enforces to use such energy system using maximum power point tracking (MPPT). |
21,137 | Please write an abstract with title: An Airborne SAR Radiometric Calibration Method with Random Constrained Evolution, and key words: Geology, Atmospheric modeling, Radiometry, Stability analysis, Robustness, Radar polarimetry, Calibration. Abstract: Due to the passive corner reflector widely used in airborne SAR calibration is greatly affected by the flight attitude of airborne platform and the process of manufacturing, processing and laying out the corner reflector. An airborne radiometric calibration method with random constrained evolution is proposed in this paper. Based on the principle of random sampling consistency, this method can iteratively extract the internal points of corner reflector samples for effectively avoiding the impact on the accuracy of conventional radiometric calibration methods when there are abnormal points in corner reflector samples. Finally, the experiment of X-band SAR data is applied to verify the effectiveness of the proposed method. |
21,138 | Please write an abstract with title: 3D worlds for edutainment: educational, relational and organizational principles, and key words: Educational institutions, Cultural differences, Electronic learning, Internet, Europe, Conferences, Graphics, Robustness, Education, Aging. Abstract: Can 3D graphics convey robust cultural value in an effective, engaging way? Can virtual worlds be a magic place where intercultural exchange with remote peers takes place? Can difficult students be "rescued" by unusual learning activities supported by technologies? Can teachers play a fundamental facilitating role while using advanced e-learning tools? The paper presents the educational impact of SEE, Shrine Educational Experience - a joint cooperation between Politecnico di Milano and the Israel Museum. SEE is a 3D world shared over the Internet where students from all over the world meet to learn and play, tackling cultural topics related to the Dead Sea scroll. SEE underwent a successful evaluation between November 2002 and May 2004, involving over 1500 participants from Europe and Israel. The paper discusses the educational, relational and organizational principles that were crucial for the success of this pervasive e-learning experience. |
21,139 | Please write an abstract with title: Adding Manufacturability to the Quality of Results, and key words: Manufacturing. Abstract: Traditionally, IC designers have been able to define "Quality of Results" (QoR) primarily in terms of functionality, area, speed, and power. Hardly a backward glance was given to what manufacturers would do once the designs were handed off to them. Today, manufacturability has clearly joining the ranks of QoR. This is particularly true for technology nodes at 65 nanometers (nm) and below. Yield loss mechanisms, both functional and parametric, have become dependant on the design and increasingly, as geometries continue to shrink to 45nm and below, must be addressed from design to lithography to process. In this talk, we will examine some solutions being used to ensure quality in this area of concern. Topics include incorporating yield-rated cells and probabilistic methods such as statistical timing analysis to address yield losses early in the design. Test is being used for diagnosis. Routing optimization techniques such as minimizing critical areas for shorts and open circuits, wire-spreading, redundant vias and dummy metal fills improve manufacturability for metal layers. Further down the tool chain, resolution enhancement techniques (RET) used in mask synthesis addresses lithography, improving printability and hence yield. Manufacturing process knowledge is becoming increasingly important in design to enable effective yield modeling. TCAD models are making their way into manufacturing, helping, for example, to simulate statistical variations of electrical parameters as a function of process parameters. |
21,140 | Please write an abstract with title: Microcoil photonic resonator and waveguide, and key words: Optical resonators, Resonance, Couplings, Optical waveguides, Fiber nonlinear optics, Optical refraction, Optical variables control, Microcavities, Electromagnetic waveguides, Optical fibers. Abstract: The principal electromagnetic properties of the recently invented optical fiber microcoil resonator, which is suggested as a basic functional element for the future microfiber-based photonics, are investigated theoretically. |
21,141 | Please write an abstract with title: AISEC: an artificial immune system for e-mail classification, and key words: Artificial immune systems, Electronic mail, Immune system, Laboratories, Bayesian methods, Web mining, Data mining, Shape, Internet, Pathogens. Abstract: With the increase in information on the Internet, the strive to find more effective tools for distinguishing between interesting and non-interesting material is increasing. Drawing analogies from the biological immune system, this paper presents an immune-inspired algorithm called AISEC that is capable of continuously classifying electronic mail as interesting and non-interesting without the need for re-training. Comparisons are drawn with a naive Bayesian classifier and it is shown that the proposed system performs as well as the naive Bayesian system and has a great potential for augmentation. |
21,142 | Please write an abstract with title: Lessons learned through the implementation of Space-Time Adaptive Processing algorithms for GPS reception in jammed environments, and key words: Global Positioning System, Jamming, Signal processing algorithms, Algorithm design and analysis, Adaptive signal processing, Design optimization, Signal analysis, Array signal processing, Computational modeling, Analytical models. Abstract: The use of Space-Time Adaptive Processing (STAP) algorithms to mitigate the detrimental effects of jamming upon GPS receivers has gained significant interest in the signal processing community. Sufficient spatial and temporal degrees of freedom allow these algorithms to position nulls in the space-time locations of jammers while concurrently allowing the reception of the GPS signal. Unfortunately, algorithm design assumptions tend to be optimistic and can prove to be unrealistic and inaccurate. Additionally, much of the analysis, development, and evaluation of these digital beamforming algorithms have been accomplished with computer-generated simulations that may not accurately address mismatches between the assumed signal model and the actual environment. In recognition of these shortcomings, MITRE has recently processed recorded data containing both the GPS signal and jamming that can be used to evaluate current and future generation antenna array electronics and signal processing algorithms. In this paper, practical issues encountered during the analysis of the recorded data are presented. These issues must be addressed to ensure the successful evaluation of STAP algorithms for GPS. Techniques are developed to accurately calculate jammer mitigation performance as well as the resulting satellite availability. A methodology for beampattern visualization is also described. We conclude that careful consideration of data collection methods and conditions is required to adequately assess adaptive algorithm performance. |
21,143 | Please write an abstract with title: Large reflector antenna pattern computation using moment methods, and key words: Reflector antennas, Moment methods, Wire, Feeds, Antenna radiation patterns, Radar cross section, Backscatter, Frequency response, Integral equations, Radar scattering. Abstract: A technique, whereby the radiation patterns of large size reflector antennas can be approximated by computers using a moment method without excessive computer time or memory, is described. Computational time increases only linearly with antenna size. There is no limit on the minimum reflector size (a single wire reflector can be analyzed). An example is discussed showing the radiation patterns of a truncated parabolic reflector excited by feeds displaced from the parabola focus. |
21,144 | Please write an abstract with title: Observation of Kerr nonlinearity in micro-cavities at room temperature, and key words: Temperature, Laser excitation, Probes, Optical modulation, Frequency, Optical resonators, Optical pumping, Optical refraction, Optical variables control, Resonance. Abstract: We have devised and experimentally verified a method for observation of the optical Kerr effect in micro-cavities at room temperature. The technique discriminates against typically dominant thermal component of nonlinearity using its relatively slow frequency response. |
21,145 | Please write an abstract with title: A new ultrasonic measurement system for tremor, and key words: Ultrasonic variables measurement, Vibration measurement, Pulse modulation, Strain measurement, Ultrasonic transducers, Phase measurement, Calibration, Frequency modulation, Optical interferometry, Optical transmitters. Abstract: A new binary amplitude-shift-keyed (BASK) ultrasonic tremor measurement system for use in isothermal air is developed. Our microcomputer-based system includes two important parts. One of which is BASK modulation signal generator. The other is a phase meter designed to record and compute the phase shifts of the three different frequencies and the result motion is then sent to either an LCD for display or a PC for calibration. By the proposed method, we can conduct larger range measurement than the phase-shift method and also get higher accuracy compared with the time-of-flight (TOF) method. Experiments are done in the laboratory using BASK modulation for the frequencies of 200 Hz and 1 kHz with a 40 kHz carrier. |
21,146 | Please write an abstract with title: Critical Conduction Mode Based High Frequency Single-Phase Transformerless PV Inverter, and key words: Switching frequency, Resonant frequency, Voltage, Switches, Zero voltage switching, Pulse width modulation, Transformers. Abstract: This paper presents critical conduction mode (CRM) single-phase transformerless full-bridge inverter in residential photovoltaic (PV) system. CRM full-bridge inverter with bipolar pulse width modulation (PWM) features inherent zero voltage switching (ZVS) capability for the whole line cycle. This enables the inverter to push switching frequency up to hundreds kHz and achieve high power density with high efficiency. However, CRM operation incurs non-constant common mode (CM) voltage during resonant period causing high frequency leakage current. To minimize the leakage current, a new switching modulation strategy is introduced combining CRM and triangular current mode (TCM). The switching modulation scheme alleviates CM voltage by shortening the resonant period and consequently reduces the leakage current. In this paper, the basic operation principle of CRM full-bridge inverter, impacts of CRM operation on the leakage current, and details of the switching modulation method are discussed. Experimental results with laboratory prototype built with E-mode GaN device validate its performance. |
21,147 | Please write an abstract with title: Development of A Walking-Trajectory Measurement System, and key words: Legged locomotion, Mechatronics, Sociology, Measurement by laser beam, Gaussian processes, Control systems, Real-time systems. Abstract: In recent years, robots have attracted attention to provide a supplemental workforce in Japan as the working population decreases. A reception and response control system using the interface robot ApriPoco™ has been studied, measuring human walking trajectories using a laser range finder, but accurate measurements have been impeded by overlapping people and trajectories leading to missing data. Therefore, in this paper, we propose a system that uses Gaussian process regression to predict human trajectories in addition to the conventional system. Three-directional walking experiments were conducted with groups of one, three, and five people, and the trajectories of the conventional and proposed systems were compared. The experimental results show that the proposed system has fewer missing data than the conventional system and can obtain more accurate trajectories. We also demonstrated human walking-trajectory measurement at a public museum to confirm the effectiveness of this system. In the future, we plan to build a reception system by linking this system with robots. |
21,148 | Please write an abstract with title: An Optimization Method for Array Direction Finding Based on Beamforming Coefficient Comprehensive Design, and key words: Phased arrays, Electronic warfare, Navigation, Array signal processing, Simulation, Optimization methods. Abstract: A comprehensive optimization method to improve the direction finding accuracy at the edge of covered airspace in phased array system is proposed. Due to the variation of beam width which caused by the array scanning, this method first uses the spatial resampling strategy to design the digital beam weighting coefficients with constant beam width. Then, the beam coverage under high elevation is further optimized to improve the direction finding accuracy with the consideration ofelevation scanning scenario in practice. The simulation results show that the comprehensive optimization method can reduce the direction finding error effectively, especially at a high elevation scene. |
21,149 | Please write an abstract with title: Digital Image Forensic Approach to Counter the JPEG Anti-Forensic Attacks, and key words: Transform coding, Discrete cosine transforms, Image coding, Forensics, Correlation, Statistical analysis, Digital images. Abstract: Rapid advancement in digital image processing tools and software's has made it extremely simple to manipulate the digital images without leaving any footprints. It becomes a hot issue about the security and threat to society with increasing growth of social media. JPEG compression format has been widely used in most of the digital cameras. The investigation of JPEG compression footprints can play an important role in image tampering detection. In this paper, a novel method is proposed to detect the JPEG compression. The proposed forensic scheme comprises of two steps i.e. selection of target difference image and generation of second-order statistical features by evaluating the Markov Transition Probability Matrices (MTPMs) for both intra and inter-block DCT domain. Finally, the resultant feature is used to train the SVM classifier for classification purposes. The experiment results on UCID and BOSSBase datasets show that the proposed forensic technique based on MTPM is capable of detecting the JPEG compression traces even in the presence of anti-forensic attacks. |
21,150 | Please write an abstract with title: ECG Segmentation Using a Neural Network as the Basis for Detection of Cardiac Pathologies, and key words: Training, Pathology, Neural networks, Medical services, Electrocardiography, Noninvasive treatment, Cardiology. Abstract: Electrocardiography allows fast and noninvasive diagnosis and screening of a wide range of cardiac diseases. The interpretation of ECGs is difficult and depends on the levels of training of the physician. In consequence, pathologies can remain undiagnosed or norm-variations are interpreted as pathological. The PhysioNet/Computing in Cardiology Challenge 2020 aims to classify various cardiac pathologies in 12-lead ECGs, data was collected across a variety of different clinics and countries to pave the way for a common evaluation of ECGs. Our Team Heartly-AI proposes a two-step algorithm using a UNet and XGBoost for the 2020 Phys-ioNet Computing in Cardiology Challenge “Classification of 12 lead ECGs”. The algorithm achieved a 5-fold cross-validation metric of 0.113 and scored 0.136 on the official test set, therefore placing us 28th out of the 41 teams in the official ranking. |
21,151 | Please write an abstract with title: Energy-Efficient Tethered UAV Deployment in B5G for Smart Environments and Disaster Recovery, and key words: Potential energy, Power demand, Smart cities, Scalability, Simulation, Smart homes, Medical services. Abstract: Due to Unmanned aerial vehicles (UAV s) limitations in processing power and battery lifetime. The tethered UAV (TUAV) offers an attractive approach to answer these shortcomings. Since a tethered connected to UAV is one potential energy solution to provide a stable power supply that connects to the ground would achieve impressive performances in smart environments and disaster recovery. The proposed solution is intended to provide stable energy and increase the coverage area of TUAV for smart environments and disaster recovery. This paper proposed that the tethered connected to UAV will provide the continuous supply and exchange the data with ground terminals. Besides the adjustable tether length, elevation angels act to increase the hovering region, leading to the scalability of coverage in many applications. Moreover, the power consumption and transmission distance while achieving a trade-off between the hovering and coverage probabilities. The simulation results demonstrate efficient performance in terms of line-of-sight probability, path loss, and coverage probability for scalability coverage smart environments and disaster recovery scenarios. Furthermore, maximum coverage probability is achieved versus increased tethered length because of the gain and fly over a region of maximum tethered. |
21,152 | Please write an abstract with title: IMPATT Diode Circuit Design for Parametric Stability, and key words: Diodes, Circuit synthesis, Circuit stability, Circuit testing, Radio frequency, Sufficient conditions, Frequency domain analysis, Impedance, Gallium arsenide, Oscillators. Abstract: A new approach to IMPATT diode circuit design to achieve freedom from parametric instabilities is described. Necessary and sufficient conditions are described in the frequency domain for the load impedance presented to the diode terminals. A number of unconditionally stable circuits have been developed for flat-profile GaAs diodes using this approach. Three of these circuits have been built and tested experimentally in 11-GHz IMPATT oscillators and amplifiers. These experimental circuits have been free of parametric instability, even when driven into full RF saturation. In a systems application practical constraints such as cost, RF loss, and tunability will require compromises which will degrade the stability, and it may not always be possible to achieve complete stability for a given diode. |
21,153 | Please write an abstract with title: Observability of Leader-Based Discrete-Time Multi-Agent Systems Over Signed Networks, and key words: Observability, Switches, Controllability, Laplace equations, Topology, Nickel, Network topology. Abstract: This paper models a class of leader-based discrete-time multi-agent systems (MASs) over signed networks with both positive edges and negative edges, and addresses the observability of such multi-agent network based on an agreement protocol. Some new algebraic and graphical characterisations of the observability are given using a signed Laplacian. In addition, for a structurally balanced network, the observability of a leader-follower discrete-time signed network with structurally balanced condition is equivalent to that of the corresponding unsigned network, if the leaders are selected from the same partitioned subset. Some numerical examples and simulations are given to demonstrate the analysis. |
21,154 | Please write an abstract with title: Acoustic ranging with communication signals for wireless diver guidance to base, and key words: Wireless communication, Acoustic communication (telecommunication), Oceans, Prototypes, Inertial navigation, Distance measurement, Underwater acoustics. Abstract: There are situations in which divers need to find their way to an unknown location within acoustic communication range as quickly as possible without broadcasting additional energy besides that of already transmitted acoustic communication signals, e.g., for acoustic covertness or saving battery life. For these situations, a prototype of a combined acoustic navigation and communication system for divers was developed and demonstrated in open water. |
21,155 | Please write an abstract with title: Optimal dimensionality for quantum cryptography, and key words: Quantum entanglement, Quantum mechanics, Information theory, Information processing, Laboratories, Noise generators, Performance analysis, Optimized production technology. Abstract: Two protocols are compared for sharing between Alice and Bob a cryptographic key composed from quarts. The first protocol uses a ququart (4-level system) prepared in one of 5 mutually biased bases. The second one uses two independent qubits, each being prepared in one of 3 mutually unbiased bases. Information gained by the eavesdropper Eve is calculated, suggesting that she uses an asymmetric cloner for cloning individual systems. |
21,156 | Please write an abstract with title: High-Precise Fractional Orbital Angular Momentum Probing With a Fiber Grating Tip, and key words: Laser beams, Optical fiber sensors, Optical fibers, Optical fiber communication, Fiber gratings, Optical vortices, Measurement by laser beam. Abstract: Optical orbital angular momentum (OAM), carried by optical vortices, is a fundamental property of light that grabs broad interests. The detection of OAM modes, including fractional OAM is of great importance in diverse fields. Here, we firstly propose and develop the limited integer-component measurement method to determine the fractional topological charge (TC) of OAM states. This method indicates that a 2-integer-mode responsive device could be applied for the detection of fractional TC. An orthogonal long-period fiber grating (OLPFG) element is used as a fractional OAM TC probe to verify the Applicability. We experimentally demonstrate the fractional TC detection, ranging from −1 to 0, and recognize different fractional OAM modes with the minimum TC interval of 0.01. This scheme provides a concise, precise, continuous, and fiber-compatible fractional TC detection method that might have great potential in micro-detection, optical communication, quantum information, and chiral sensing applications. |
21,157 | Please write an abstract with title: Data Science, and key words: Data models, Predictive models, Data science, Costs, Predictive analytics, Companies, Collaborative filtering. Abstract: This chapter discusses data science techniques, applies them through various technologies, and discusses deploying data science projects on production. Data science applications’ Big Data might provide customer satisfaction and retention gains with the data science tools and algorithms on the rise. Although the problem space for data science is quite large, data analysts reduced it to three categories: recommendation, predictive analytics, and pattern discovery. The data science life cycle is a relatively new concept. It consists of business objectives, data understanding, data ingestion, data preparation, data exploration, feature engineering, data modeling, model evaluation, model deployment, and operationalizing. Data science has a great set of tools to experiment, explore, and analyze data sets in many different directions. The chapter discusses some of the well‐known tools such as R, Python, SQL, TensorFlow, and SparkML. It presents some examples of machine learning deployment frameworks and software such as Apache PredictionIO, Seldon, MLflow, and Kubeflow. |
21,158 | Please write an abstract with title: Optical Multi-Tap RF Canceller for In-Band Full-Duplex Wireless Communication Systems, and key words: Radio frequency, Optical receivers, Optical filters, Optical modulation, Optical sensors, Fiber optics, Stimulated emission. Abstract: In-band full-duplex (IBFD) technology has become important for future wireless communications, due to its ability of increasing the radio-frequency (RF) spectrum efficiency. However, the benefits can only be realized if the self-interference (SI) is sufficiently suppressed. RF cancellation is important for IBFD systems due to its ability of SI mitigation. But it becomes more difficult for RF cancellation while the frequency and bandwidth increase. In real scenarios, the response of the multi-path SI channel is not frequency-flat, which also limits the cancellation performance. To solve these problems, we present a photonic-enabled multi-tap RF canceller in this paper. The proposed RF canceller has the ability of cancelling multi-path SI. The tap coefficients are precisely adjusted by optical spectrum processing. A prototype system with 8 taps is demonstrated in this paper. The measured results show 25 dB average cancellation depth over 1 GHz cancellation bandwidth under over-the-air conditions. To verify the signal of interest (SOI) recovery capability of the novel RF canceller, an IBFD wireless communication experiment based on 16-quadrature amplitude modulation (16-QAM) was demonstrated, the SOI was successfully recovered. |
21,159 | Please write an abstract with title: A real-time error compensation system for a computerized numerical control turning center, and key words: Real time systems, Error compensation, Computer numerical control, Turning, Control systems, Computer errors, Machine tools, Error correction, Sensor systems, Transfer functions. Abstract: A real-time compensation scheme for geometric and thermally-induced errors of a computerized numerical control (CNC) turning center is described. The compensation system predicts these errors using a combination of data taken from various sensors on the machine tool and previously established relationships (transfer functions). The system translates these errors into servo counts and injects them into the control loops of the machine tool controller in real-time. A single-board microcomputer interfaced to the machine tool controller and the sensors is the workhorse of the system. The system control software written in PLM, a high level programming language, is modular, flexible, and easily maintainable. To evaluate the capabilities of the compensation system, a series of cutting tests have been performed, and the results are presented. Along with the elimination of machine warmup periods of 8 to 12 hours, significant geometric accuracy improvements in straightness and squareness have been achieved. An additional accomplishment is a dimensional accuracy improvement of up to 20 times over that of uncompensated workpieces. |
21,160 | Please write an abstract with title: Growing Digital Vulnerability: A Case Study of Threats to Pakistans National Assets, and key words: Digital transformation, Government, Information security, Companies, Communications technology, Ransomware, Cyberattack. Abstract: In the last two decades, cyber threats have changed rapidly. Social engineering, insider attacks, and cloud technologies have altered the way we see the information security perimeter, and in certain people’s eyes, have made it obsolete. Cyberattacks on multi-national companies and organizations have been common; these attacks are carried out by both state- and non-state actors. Pakistan is experiencing an exponential growth in the domain of digital transformation. From the military to the government and also the private sector, much of the assets or data regarding the assets is being stored digitally which makes them susceptible to cyber attacks. In this paper, we take a look at two of the cases demonstrating how the social engineering aspect is just as important as to making secure services as they are what makes a system, vulnerable to cyber attacks. This is discussed through the Cyber Kill Chain which formally explains the way a cyber attack is performed in a chronological order of operations and various phases of an attack. |
21,161 | Please write an abstract with title: Optimal Platoon Merging and Catch-up Approach for Connected Electric Vehicles, and key words: Road transportation, Energy consumption, Simulation, Merging, Optimal control, Vehicular ad hoc networks, Process control. Abstract: Vehicle platooning can provide a significant energy saving benefit for battery electric vehicles (BEVs) during on-highway operation and thus improve the BEV driving range. Platooning merging and catch-up from on-ramp and on highway are critical steps to accomplish energy-efficient platooning process. This paper proposes an optimal control framework for a host BEV to produce the optimal vehicle speed profile that minimizes the energy consumption during the catch-up phase in platooning. The proposed optimal control framework is applicable to various catch-up scenarios including on-ramp catch-up with and without vehicle-to-vehicle (V2V) communication, as well as on-highway catch-up process. The proposed platoon merging problem are solved numerically using Pontryagin’s Minimum Principle (PMP). Simulation results show that the air drag coefficient change during the platoon merging does not have significant effect on the optimal speed trajectory. The simulation results also demonstrate that, with V2V communication, the platoon catch-up distance can be significantly shortened. In addition, 4.21% energy saving benefit can be achieved due to the prediction of upcoming leading vehicle that provides an earlier access to vehicle platooning benefits. |
21,162 | Please write an abstract with title: The characterization of classification problems by classifier disagreements, and key words: Pattern recognition, Mathematics, Computer science, Buildings, Standards development. Abstract: In this paper we try to characterize a set of classification problems. For this, we use the disagreement between a set of standard classifiers. The disagreement patterns do not only point towards different types of classification problems, but also indicate the novelty and the usefulness of a classifier with respect to a set of classification problems and classifiers. Some experiments show when known classification problems become unknown after changing their feature size or their training set size. |
21,163 | Please write an abstract with title: MOSFETs’ Electrical Performance in the 160-nm BCD Technology Process With the Diamond Layout Shape, and key words: MOSFET, Shape, Layout, Integrated circuits, Diamond, Analytical models, Logic gates. Abstract: This article introduces an innovativeapproach that describes the drain-source current improvements of MOS transistors. It is based on the geometrical modification of MOSFET's channel from a rectangular layout shape (RLS) into a diamond layout shape (DLS). In this way, the drain-source current enhancement is increased up to 11% for the DLS MOS transistors with an effective aspect ratio (W/L)eff equal to 2.0 and an angle α set to 80°. Moreover, we present the comparison of 3-D TCAD simulations data, analytical model data based on Schwarz-Christoffel transformation (SCT), and measurement data given by measurement of the MOS transistors fabricated in the BipolarCMOS-DMOS (BCD) 160-nm technology process. For this purpose, there have been fabricated 1124 samples, which were proportionally divided into RLS MOSFETs and DLS MOSFETs with the angles α equal to 120°, 100°, and 80°. For all studied aspect ratios, the presented model has an excellent analytic description in comparison with the 3-D TCAD simulation results with an error lower than 3%. So, it proves the quality of the analytical model based on the SCT approach and it is the recommended approach to use also for modeling other MOSFET gate layout shapes. |
21,164 | Please write an abstract with title: Directly-Connected Image Guide 3db Coupler with Very Flat Coupling, and key words: Bandwidth, Dielectric constant, Millimeter wave technology, Directional couplers, Dispersion, Frequency measurement, Design methodology, Dielectric measurements, Process design, Microwave Theory and Techniques Society. Abstract: Design method of the broadband, compact, and mechanically stable 3dB coupler with very flat coupling are demonstrated using a directly-connected image guide. The experimental results agree reasonably well with the theoretical ones by forming appropriate tapers even at frequencies where higher modes could be excited. |
21,165 | Please write an abstract with title: DDoSNet: A Deep-Learning Model for Detecting Network Attacks, and key words: Computer crime, Training, Feature extraction, Machine learning, Recurrent neural networks, Support vector machines. Abstract: Software-Defined Networking (SDN) is an emerging paradigm, which evolved in recent years to address the weaknesses in traditional networks. The significant feature of the SDN, which is achieved by disassociating the control plane from the data plane, facilitates network management and allows the network to be efficiently programmable. However, the new architecture can be susceptible to several attacks that lead to resource exhaustion and prevent the SDN controller from supporting legitimate users. One of these attacks, which nowadays is growing significantly, is the Distributed Denial of Service (DDoS) attack. DDoS attack has a high impact on crashing the network resources, making the target servers unable to support the valid users. The current methods deploy Machine Learning (ML) for intrusion detection against DDoS attacks in the SDN network using the standard datasets. However, these methods suffer several drawbacks, and the used datasets do not contain the most recent attack patterns - hence, lacking in attack diversity. In this paper, we propose DDoSNet, an intrusion detection system against DDoS attacks in SDN environments. Our method is based on Deep Learning (DL) technique, combining the Recurrent Neural Network (RNN) with autoencoder. We evaluate our model using the newly released dataset CICDDoS2019, which contains a comprehensive variety of DDoS attacks and addresses the gaps of the existing current datasets. We obtain a significant improvement in attack detection, as compared to other benchmarking methods. Hence, our model provides great confidence in securing these networks. |
21,166 | Please write an abstract with title: DAGGER: a novel generic methodology for FPGA bitstream generation and its software tool implementation, and key words: Field programmable gate arrays, Software tools, Design automation, Runtime, Hardware, Logic functions, Very large scale integration, Software algorithms, Memory management, Cryptography. Abstract: A novel bitstream generation algorithm and its software implementation are introduced. Although this tool was developed for the configuration of AMDREL FPGA reconfigurable platform, it could be used to program any other compatible device. This tool is the only one known academic implementation for FPGA configuration with such features. Among them are the run-time-, partial- and dynamic-reconfiguration, the memory management, the bitstream compression and encryption, the read-back technique, the bitstream reallocation, the used low-power techniques as well as the graphical user interface. |
21,167 | Please write an abstract with title: Methods and Techniques for Photovoltaic Solar Power Plant Monitoring and Wearing State Evaluation, and key words: Photovoltaic systems, Maintenance engineering, Safety, Batteries, Inverters, Shafts, Personnel. Abstract: The paper presents methods and techniques for monitoring the status and diagnosis of wear for each element in the architecture and operation of photovoltaic solar power plant. A typical configuration of photovoltaic solar power plant is: photovoltaic panel, junction box, connection cables, controller, battery and inverter. The first part of this study describes the methods and techniques often used in monitoring and diagnosing the state of a system. In the second part of the study is presented a new method and technique used in monitoring and diagnosing the state of a system, SMART FMECA. This new method will help to approach a better hierarchy of each failure mode, for each component. |
21,168 | Please write an abstract with title: Creeping waves on a perfectly conducting cone, and key words: Optical surface waves, Geometry, Physical theory of diffraction, Mutual coupling, Engine cylinders, Senior members, Surface waves, Performance analysis, Geometrical optics, Data mining. Abstract: The rigorously formulated scalar and vector Green's functions for a perfectly conducting semi-infinite cone are approximated asymptotically to furnish the high-frequency creeping wave contributions when the source and observation points are both located on the cone surface. The results are expressed in the ray-optical format of the geometrical theory of diffraction and thus provide another canonical solution for verification of the postulates of that theory. The analytical procedure for isolating the creeping waves from other high-frequency phenomena such as tip diffraction is motivated by the methodology for the simpler circular cylinder problem, to which the present solution reduces when the cone-to-cylinder transition is performed. The results are of interest for calculation of source-induced surface currents, and of mutual coupling between slot array elements, on conical surfaces. |
21,169 | Please write an abstract with title: Researches in loudness measurement, and key words: Frequency, Laboratories, Instruments, Performance evaluation, Ear, Broadcasting, Acoustic noise, Working environment noise, Testing, Radio control. Abstract: CBS Laboratories has performed a fundamental study of loudness from which several results already have emerged. A new set of equal-loudness contours has been obtained using octave bands of "pink" noise in a simulated living room environment. The CBS Laboratories contours differ radically from the Fletcher-Munson contours. Forward vs. backward inhibition tests were performed, from which a new summation function was deduced. A new duration vs. loudness level function was obtained for octave bands ranging in frequency from 125 Hz to 8 kHz. These data are being incorporated in an instrument for measuring sensory loudness level. |
21,170 | Please write an abstract with title: Evaluation of Damping of Generator by Using Oscillation Energy, and key words: Generators, Oscillators, Damping, Integrated circuit modeling, Windings, Mathematical model, Power system stability. Abstract: Evaluating damping of generators is beneficial for improving the stability of the power system. The existing damping evaluation methods based on the sixth-order generator model are strongly rely on detailed parameters which are not easy to obtain. To address this problem, a damping evaluation method using oscillation energy and small signal analysis is proposed, the method can evaluate the damping of the sixth-order generator model based on electric parameters. First, the oscillation energy that flow into the sixth-order generator model based on electric parameters is deduced and corresponding equivalent circuits is also given. Second, a damping evaluation index based on oscillation energy is proposed, and then the express of index is given by eigenvector and eigenvalue. Finally, simulation result of a 4-machine system demonstrates the validation of the proposed method for damping evaluation. |
21,171 | Please write an abstract with title: Transforming the reliability, security and scalability of IT communications through the pervasive deployment of serverless software infrastructure, and key words: Scalability, Application software, Costs, Peer to peer computing, Collaboration, Narrowband, Broadband communication, Quality management, Quality of service, Communication system control. Abstract: The degree of user empowerment enabled by present day peer-to-peer applications in the areas of content-brokerage, super-distribution and group collaboration is now bringing IT professionals to an awareness of the many new and useful applications for "P2P" technology today. As a result, P2P technology and applications are beginning to take root throughout the industry as a whole. But these applications have only started to scratch the surface. The pervasive deployment of P2P technology in a truly serverless environment brings new opportunities and exciting challenges capable of completely transforming the way society experiences IT and media communications. This paper reviews how P2P technology can be applied pervasively to provide a serverless infrastructure that lowers the cost of wide-scale private networking right through from narrow-band networking at 2,400 bps to full broadband communications. The paper presents a three-part serverless infrastructure model, covering "application", "connectivity" and "management" and describes techniques for user discovery, auto-population and Quality of Service control applied at the end-user level. It describes a fault-tolerant approach to administrating large groups of users and network resources and discusses security at the transport, data storage and LAN levels. The paper also sets out a telecommunications carrier solution that enables service providers to further exploit their existing network infrastructure and presents a low cost solution for operators faced with high network configuration costs. |
21,172 | Please write an abstract with title: Application of deep learning for the detection of default in fabric texture, and key words: Fabrics, Inspection, Image classification, Correlation, Neural networks, Real-time systems. Abstract: In terms of quality control, manual inspection of the fabric is time-consuming and inefficient. In this work, we are studying several models of deep convolutional neural networks (DCNNs) to prospect for fabric and detect manufacturing defects from real-time images. DCNNs have a powerful feature extraction and feature fusion capability that can simulate learning in the human brain. In order to improve computational efficiency and detection accuracy, the learning process consists of several convolution operations and the image features are extracted and processed step by step. Experimental results show that the best performance is obtained by the Detectnet model. |
21,173 | Please write an abstract with title: Dynamic linear mode coupling effects in multi mode fibers for mode division multiplexed transmission (invited), and key words: Multiplexing, Couplings, Optical fibers, Equalizers, System performance, Optical fiber communication, Optical coupling. Abstract: Mode division multiplexed transmission system performance is affected by linear mode coupling. Mitigating elements such as multiple-input multiple-output (MIMO) equalizers have to be able to follow temporal variations of the coupling. We investigate potential response time requirements for adaptive mitigating elements. |
21,174 | Please write an abstract with title: Low-power CMOS PLL for clock generator, and key words: Phase locked loops, Clocks, Phase frequency detector, Bandwidth, Phase detection, Voltage-controlled oscillators, Digital signal processing, CMOS logic circuits, Analytical models, Jitter. Abstract: This paper presents a design of phase-locked loop suitable for the clock generation of DSP applications. The challenge of a low-jitter PLL is observed in the design tradeoff between noise contributions and bandwidth choice. An extra logic scheme with a PFD (phase/frequency detector) is applied in the lock detection. For power noise at low and high frequencies, the proposed VCO is proven by analysis and simulation. The supply sensitivity of the measured VCO is less than 0.5%/V over a large operation range. The measured loop bandwidth is 325 kHz, and the rms value of long-term jitter is 40 ps. The power consumption of the PLL core is 5.5 mW at 2.5 V. The overall circuit is implemented in a 0.35 /spl mu/m 1P4M standard CMOS process with a supply range of 1.3 to 3.3 V and the occupied area of the proposed PLL is 460/spl times/560 /spl mu/m/sup 2/. |
21,175 | Please write an abstract with title: Experiences with a Layered Approach to Local Area Network Design, and key words: Local area networks, Costs, Microcomputers, Workstations, File servers, Transport protocols, Application software, Data encapsulation, Network servers, Very large scale integration. Abstract: The Nestar Plan 4000 network was designed using the ISO Open Systems Interconnection model. The Xerox Network Systems Internet Transport Protocols (XNS) were chosen for the network and transport layers, a token-passing protocol (Arcnet) for the physical and datalink layers, and existing Nestar server software for the highest layers. The physical and datalink layers are supported by a VLSI chip and their implementation was straightforward. In spite of their detailed specification, implementing the network and transport layers presented some unanticipated challenges. This paper discusses details of our experience in implementing the network with emphasis on the problems encountered and how they were solved. |
21,176 | Please write an abstract with title: Open microscopy environment, and key words: Microscopy, Algorithm design and analysis, Data models, Sociotechnical systems, Environmental management, Data analysis, Image analysis, Informatics, Semantic Web, Ontologies. Abstract: Summary form only given. The Open Microscopy Environment (OME) is a framework for the management and analysis of image data and metadata in biological microscopy. Biological microscopy images can be collected in many different ways, and may represent many different kinds of information which changes continually with evolving technology and experimental goals. A framework that fully encompasses biological microscopy in scope cannot rely on a fixed data model - it must be designed to accommodate ever-changing informatics needs. The challenge posed by a fluid data model is similar to one addressed by the semantic web, principally support for arbitrary or user-defined semantics and ontologies. However, an analysis framework faces additional challenges besides the management of semantics: definition of analytic units as transforms between semantic constructs, definition of aggregates of analytic units to represent work flows, interfaces to algorithm implementations, and maintenance of data provenance or history. A collaborative scientific environment also demands that these locally defined semantics and transforms be fully transportable for subsequent review or analysis. OME incorporates these components in a database-backed system targeted at end-user biologists. This presentation will briefly describe the various components of OME: the semantic layer (Semantic Types - STs), the analytical un its used to transform between STs (Analysis Modules), the units of work flow (Analysis Chains), the work-flow processor (Analysis Engine), and the transportability layer (OME XML). An example of a complex work flow will also be presented illustrating how this system is used for automated image classification. |
21,177 | Please write an abstract with title: A Neural Network for Predicting Protein Disorder using Amino Acid Hydropathy Values, and key words: Neural networks, Proteins, Amino acids, Artificial neural networks, Crystallography, Nuclear magnetic resonance, Spectroscopy, Computer networks, Support vector machines, Logistics. Abstract: Proteins have been discovered to contain ordered regions and disordered regions, where ordered regions have a defined three-dimensional (3D) structure and disordered regions do not. While in the past it was believed that proteins only function in a defined 3D structure, proteins with disordered regions have been discovered to have at least 28 distinct functions. It is now important to be able to determine the ordered and disordered regions in proteins. Several experimental techniques such as X-ray crystallography, NMR spectroscopy, circular dichroism, protease digestion, and Stokes radius determination, along with several computational techniques such as artificial neural networks (ANNs), support vector machines (SVMs), logistic regression, and discriminant analysis have so far been used to detect disordered proteins. Past research has shown that ANNs and amino acid properties are an effective tool at predicting protein disorder. This research uses a feed-forward neural network implemented using JavaNNS and the hydropathy values of amino acids to predict protein disorder. The results show that hydropathy is an important amino acid property for disorder. |
21,178 | Please write an abstract with title: A Challenging Benchmark of Anime Style Recognition, and key words: Protocols, Face recognition, Semantics, Benchmark testing, Metadata, Feature extraction, Transformers. Abstract: Given two images of different anime roles, anime style recognition (ASR) aims to learn abstract painting style to determine whether the two images are from the same work, which is an interesting but challenging problem. Unlike biometric recognition, such as face recognition, iris recognition, and person re-identification, ASR suffers from a much larger semantic gap but receives less attention. In this paper, we propose a challenging ASR benchmark. Firstly, we collect a large-scale ASR dataset (LSASRD), which contains 20,937 images of 190 anime works and each work at least has ten different roles. In addition to the large-scale, LSASRD contains a list of challenging factors, such as complex illuminations, various poses, theatrical colors and exaggerated compositions. Secondly, we design a cross-role protocol to evaluate ASR performance, in which query and gallery images must come from different roles to validate an ASR model is to learn abstract painting style rather than learn discriminative features of roles. Finally, we apply two powerful person re-identification methods, namely, AGW and TransReID, to construct the baseline performance on LSASRD. Surprisingly, the recent transformer model (i.e., TransReID) only acquires a 42.24% mAP on LSASRD. Therefore, we believe that the ASR task of a huge semantic gap deserves deep and long-term research. We will open our dataset and code at https://github.com/nkjcqvcpi/ASR. |
21,179 | Please write an abstract with title: A distributed parallel genetic local search in distributed computing environments, and key words: Genetics, Distributed computing, Network topology, Binary trees, Concurrent computing, Computer networks, Biological cells, Computational modeling, Testing, Convergence. Abstract: We propose a parallel and distributed computation of genetic local search with irregular topology in distributed environments. The scheme we propose is implemented with tree network topologies where each computing element carries out genetic local search on its own chromosome set and communicates with its parent when the best solution of each generation is improved. We evaluate the proposed algorithm in a grid simulation environment implemented on a PC-cluster. We test our algorithm on four types topologies: star, line, balanced binary tree and sided binary tree, and find that the topology's depth and the number of independent search nodes influences on the evolution process. Furthermore, we observe in the experiment 'Reset' mechanism of the population after convergence is so useful in grid computing environments. |
21,180 | Please write an abstract with title: Automatic Construction of Femoral Statistical Model by Clustering Method, and key words: Point cloud compression, Solid modeling, Three-dimensional displays, Buildings, Manuals, Feature extraction, Data models. Abstract: Building a statistical model is the first step of many medical types of research. Traditional ASM (active shape model) has a wide range of applications, including establishing a statistical model. However, the traditional ASM statistical model needs to set the mark points manually, which is time-consuming and lacks repeatability. Therefore, this paper proposes a novel method to construct the statistical model of the femur automatically. Firstly, the coarse registration method is combined with birch hierarchical clustering, ICP (iterative closest point), and GPA (generalized Procrustes analysis) algorithm to provide a good initial value for the object to be registered. Then, according to the correlation between the density of the femoral point cloud data and the curvature of the femoral surface, the DBSCAN density clustering is applied to the fine registration process to improve the accuracy. Finally, the femur is aligned based on the bottom surface to offset the error caused by the centroid offset and further optimize the model. A statistical model with an average error of less than 3. 28mm is obtained from 148 CT images of the femur, superior to the existing methods. Experimental results show that the proposed unsupervised clustering and 3D model registration method can improve the efficiency and accuracy of building a statistical model. |
21,181 | Please write an abstract with title: Ship Detection in Inland Rivers Based on Multi-Head Self-Attention, and key words: Adaptation models, Navigation, Semantics, Object detection, Interference, Seaports, Feature extraction. Abstract: Ship object detection is becoming a key technology for unmanned ships and plays a crucial role in ship safety. Aiming at the characteristics of a large difference in scale between classes and many small objects in inland rivers and ports, this paper proposes MHSA-YOLO (Multi-Head Self-Attention-You Only Look Once) based on Multi-Head Self-Attention (MHSA) and You Only Look Once (YOLO) network to implement the ship object detection in inland rivers. More specifically, this proposed method introduces MHSA in the feature extraction process to weaken the interference of complex background information and strengthen the feature information of the ship objects. Further, a simplified two-way feature pyramid is developed in the feature fusion process so as to strengthen the fusion of feature information and the representation ability. The experimental results on the Seaships dataset show that the proposed MHSA-YOLO method achieves 97.59% mAP@.5, and is more effective compared with the state-of-the-art (SOTA) methods. |
21,182 | Please write an abstract with title: Estimation of 3D geometrical properties of spheroid-like particle systems using projection images, and key words: Three-dimensional displays, Shape, Sociology, Estimation, Bayes methods, Statistics, Detection algorithms. Abstract: We propose a parametric method to estimate geometrical properties of a population of spheroid-like particles from 2D projection images. The method consists in, first, detecting the projection of the particles in the images, and then estimating the parameters of the supposed probability laws of the spheroids semi-axes using a Bayesian framework. Moreover, a new estimator of the Sauter mean diameter to assess the efficiency of two-phase flow processes, in the case of spheroid-like particle system, is proposed. Still in view to its practical use for the characterization of two-phase flows, the whole methodology is applied to a typical bubbly flow. |
21,183 | Please write an abstract with title: Sound source separation for a robot based on pitch, and key words: Source separation, Robots, Power harmonic filters, Frequency, Autocorrelation, Loudspeakers, Speech, Neurons, Amplitude modulation, Acoustic testing. Abstract: We present a novel method for the separation of monaurally recorded speech signals based on pitch. Our method is inspired by the ability of some auditory neurons to phase lock with the excitation signal. After applying a Gammatone filter-bank on the original signal we compare the distances between zero crossings of possible harmonics and decide upon the result of this comparison if they share the same fundamental and hence originate from the same sound source. For higher frequencies we use the amplitude modulation property of unresolved harmonics to determine their fundamental frequency. When comparing our method to standard autocorrelation based methods we see that the pitch can be tracked more precisely and especially opens the way to extract also the pitch contour of a second speaker or other sound sources which can be of importance for the robots behavior. Tests in sound source separation of our algorithm on a database with several speakers and a large set of intrusions show that our algorithm performs slightly better than the commonly used autocorrelation at lower computational costs. |
21,184 | Please write an abstract with title: Influence Maximization in Social Networks using Hurst exponent based Diffusion Model, and key words: Integrated circuit modeling, Time series analysis, Computational modeling, Diffusion processes, Social network services, Market research. Abstract: Influence maximization (IM) in online social networks (OSNs) has been extensively studied in the past few years, owing to its potential of impacting online marketing. IM aims at solving the problem of selecting a small set of influential nodes, who can lead to maximum influence spread across a social network. An integral part of IM is the modelling of the underlying diffusion process, which has a substantial impact on the spread achieved by any seed set. In this paper, Hurst-based diffusion model for IM has been proposed, under which node's activation depends upon the nature of self-similarity exhibited in its past activity pattern. Assessment of the self-similarity trend exhibited by a node's activity pattern, has been done using Hurst exponent (H). On the basis of the results achieved, the proposed model has been found to perform significantly better than two widely popular diffusion models, Independent Cascade and Linear Threshold, which are often used for IM in OSNs. |
21,185 | Please write an abstract with title: Machine Learning Based Smart Assistive Device for Differently Abled People-SADDAP, and key words: Training, Machine learning, Activity recognition, Video equipment, Turning, Feature extraction, Object recognition. Abstract: Recently, Human Activity Recognition (HAR) has turned into an energetic exploration region, particularly because of the spread of electronic gadgets, for example, cell phones, digital watches and camcorders present in our everyday lives. Likewise fall accidents are one of the primary sources of passing’s because of cracks brought about by clash with the ground or hard obstructions. The failure to see objects around oneself is the most tragic things that could happen to an individual. This likewise annihilates the capacity of the individual to move around without anyone else in known regions and conditions. Over the range of the last decade, a few sorts of gadgets have been intended to help the differently abled individuals to move around in various types of conditions be that as it may, in any case need to have every one of the components for diversely abled individuals or senior’s in one gadget. The current paper is the augmentation of our past work to add to say research with a way for offering help to differently abled or elder’s people. The proposed smart assistive activity recognition device for differently abled people that perceive the movement of environment around them and assist them with living. It likewise recognizes snags and sound on their route to caution them so they don’t get into an accident. The current paper adds to help differently abled individuals or elder’s by permitting them to realize the encompassing objects and safe them from getting into any mishap by fall detection and obstacle detection. Activity discovery is turning into an indispensable piece of numerous portable applications. The proposed system utilizes the procedures of machine learning to make an application that would help the differently abled individuals or elders and give them a freshly discovered expectation for cherishing the lavishness and difficulty of the world, meanwhile effectively explore in it. |
21,186 | Please write an abstract with title: All-active tapered 1550 nm InGaAsP-BH-FP lasers for uncooled 10 Gb/s operation, and key words: Fiber lasers, Optical transmitters, Temperature, Power generation, Optical coupling, Threshold current, Bandwidth, Optical modulation, Diode lasers, Thermoelectricity. Abstract: In summary, all-active tapered 10Gb/s-1550nm InGaAsP QW BH-FP lasers have been developed. 400 /spl mu/m long as-cleaved devices show low threshold current, high output power and uncooled 10 Gb/s operation up to at least 70 C. |
21,187 | Please write an abstract with title: Low-Latency Data Aggregation Scheduling for Cognitive Radio Networks With Non-Predetermined Structure, and key words: Data aggregation, Cognitive radio, Interference, Schedules, Processor scheduling, Scheduling, Distributed algorithms. Abstract: Data aggregation is a fundamental yet popular operation in wireless networks where the sink needs to obtain the combined information of the whole network. However, the problem of minimum latency aggregation scheduling (MLAS) is not well studied in cognitive radio networks. Few studies have addressed this issue and most previous aggregation methods all assume that a fixed-structure based aggregation tree is constructed in advance, which may result in the selection of a node with limited spectrum opportunities as the parent by many nodes and by extension results in a large latency. Thus, the MLAS problem in cognitive radio networks (MLAS-CR) without the above limitation is investigated in this paper. First, the MLAS-CR problem with primary social behaviors where the activity of primary users can be predicted is studied. To make full use of the limited spectrum opportunities, we integrate the construction of the aggregation tree, and the computation of a conflict-free schedule simultaneously, without any predetermined structures. Second, the MLAS-CR problem without the above assumption is also investigated. To reduce the latency, a two-way aggregation scheduling method is proposed to adaptively choose the parent with only current channel information. To further reduce the latency, we also introduce a new data aggregation mode for CRN, i.e., Data Aggregation Scheduling in The Dark, to utilize the spectrum opportunities of scheduled nodes. Finally, the theoretical analysis and simulation results verify that the proposed algorithms have high performance in terms of latency. |
21,188 | Please write an abstract with title: Performance Evaluation of Biometric Authentication and Classification Using Deep Learning Approach, and key words: Industries, Deep learning, Performance evaluation, Authentication, Fingerprint recognition, Retina, Feature extraction. Abstract: Biometric authentication and categorization of fingerprints and retina images have been a major difficulty in intelligent computing in several industries over the last decade. The main motivation of the current research work is the increasing number of people who are attacked by hackers every day especially in the field of the banking industry. So there is a need to develop intelligent computing techniques for accessing and identifying the person more accurately for secured transactions. This research work aims to classify the fingerprint and retina image and measure the performance metrics using these intelligent computing techniques. The Biometric Authentication and Classification Using Deep Learning Approach contribution was based on Fragment Jaya Whale Optimizer with Deep Convolutional Neural Network (FJWO-DCNN) for achieving a good recognition rate using the optimal theoretical features of Biometric images. The generated theoretical features ensure the effectiveness of the optimal solution that yields to detect the Fingerprintand retina image more accurately. Then the extracted theoretical features and the original image were given as the input to different level classification strategy which were performed using Deep Convolution Neural Network (DCNN) classifier, which was trained by the proposed Fragment Jaya Whale Optimization (FJWO) algorithm. The Casia fingerprint and the STARE database are used in this investigation. Finally, employing this hybrid approach, the results were obtained with a higher performance value. This proposed work achieves a higher performance percentage in terms of accuracy. |
21,189 | Please write an abstract with title: Learning to Rank for Active Learning: A Listwise Approach, and key words: Training, Measurement, Correlation, Prediction algorithms, Classification algorithms, Pattern recognition, Labeling. Abstract: Active learning emerged as an alternative to alleviate the effort to label huge amount of data for data-hungry applications (such as image/video indexing and retrieval, autonomous driving, etc.). The goal of active learning is to automatically select a number of unlabeled samples for annotation (according to a budget), based on an acquisition function, which indicates how valuable a sample is for training the model. The learning loss method is a task-agnostic approach which attaches a module to learn to predict the target loss of unlabeled data, and select data with the highest loss for labeling. In this work, we follow this strategy but we define the acquisition function as a learning to rank problem and rethink the structure of the loss prediction module, using a simple but effective listwise approach. Experimental results on four datasets demonstrate that our method outperforms recent state-of-the-art active learning approaches for both image classification and regression tasks. |
21,190 | Please write an abstract with title: Fabrication and modeling of silicon-embedded high Q inductors, and key words: Fabrication, Inductors, Circuit simulation, Q factor, Frequency, Integrated circuit measurements, Equivalent circuits, Electromagnetic modeling, Finite element methods, Electromagnetic analysis. Abstract: In this paper, we report on the fabrication and modeling of a CMOS-compatible silicon-embedded high-performance integrated inductor (/spl mu/H range) with a Q-factor of over 60 and a self-resonant frequency of greater than 150 MHz. The fabrication process is based on DRIE and a pulse-reverse super-conformal electroplating technique. A lumped-element equivalent circuit model based on finite element method analysis of electromagnetic field parameters was also developed to simulate the inductor. Inductors with different geometric design parameters were simulated to optimize the performance. A Q factor of over 60 (at 40 MHz) for a 2 /spl mu/H inductor was measured, which is the highest reported in the literature for integrated inductors at such frequencies. The measurement results closely match the simulations from the lumped circuit model. |
21,191 | Please write an abstract with title: Online Bayesian activity detection in DS/CDMA networks, and key words: Bayesian methods, Intelligent networks, Multiaccess communication, Signal processing algorithms, Multiuser detection, Sequential analysis, Change detection algorithms, Interference, Detection algorithms, Probability. Abstract: An on-line Bayesian based multiple hypotheses Shiryayev sequential probability ratio test (SSPRT) for the detection/isolation of new active users in a multiuser code division multiple access (CDMA) environment is presented. This SSPRT algorithm makes use of a priori knowledge of the user activity parameter. Comparison by simulation between this SSPRT algorithm and the non-Bayesian Matrix cumulative sum (CUSUM) shows that when such information is available, the SSPRT algorithm that uses this information can achieve better performance than the non-Bayesian approach. |
21,192 | Please write an abstract with title: A Multi-Branch Feature Fusion Network for Building Detection in Remote Sensing Images, and key words: Feature extraction, Detectors, Semantics, Object detection, Proposals, Image segmentation, Buildings. Abstract: Deep convolutional neural networks (CNNs) based methods have achieved great success in object detection, but when it comes to remote sensing images, new challenges appear considering that current approaches either downsampling or cropping on remote sensing images can hardly provide sufficient structural or semantic information. Aiming to these issues, we propose a multi-branch feature fusion network, in which a global branch and a local branch takes downsampled images and cropped patches as inputs and extracts contextual and structural features respectively. The extracted features are fused and composed into enhanced feature maps. A set of experiments over public building detection dataset for remote sensing images demonstrate the superiority of the proposed method over other state-of-art methods. |
21,193 | Please write an abstract with title: Part-Level Car Parsing and Reconstruction in Single Street View Images, and key words: Automobiles, Three-dimensional displays, Shape, Image reconstruction, Two dimensional displays, Semantics, Annotations. Abstract: Part information has been proven to be resistant to occlusions and viewpoint changes, which are main difficulties in car parsing and reconstruction. However, in the absence of datasets and approaches incorporating car parts, there are limited works that benefit from it. In this paper, we propose the first part-aware approach for joint part-level car parsing and reconstruction in single street view images. Without labor-intensive part annotations on real images, our approach simultaneously estimates pose, shape, and semantic parts of cars. There are two contributions in this paper. First, our network introduces dense part information to facilitate pose and shape estimation, which is further optimized with a novel 3D loss. To obtain part information in real images, a class-consistent method is introduced to implicitly transfer part knowledge from synthesized images. Second, we construct the first high-quality dataset containing 348 car models with physical dimensions and part annotations. Given these models, 60K synthesized images with randomized configurations are generated. Experimental results demonstrate that part knowledge can be effectively transferred with our class-consistent method, which significantly improves part segmentation performance on real street views. By fusing dense part information, our pose and shape estimation results achieve the state-of-the-art performance on the ApolloCar3D and outperform previous approaches by large margins in terms of both A3DP-Abs and A3DP-Rel. |
21,194 | Please write an abstract with title: Salt Content Detection Using a Microwave Sensor, and key words: Liquids, Sea measurements, Conductivity, Conductivity measurement, Microwave theory and techniques, Microwave circuits, Ions. Abstract: A microwave interdigital-electrode (IDE) sensor is used to detect the salt content in saline solutions. As there is electrode polarization when measuring a liquid that contains lots of ions, and considering its dispersion property at microwaves, frequency dependent complex conductivity is investigated in the present study. A reasonable equivalent circuit of the liquid loaded IDE sensor is provided, which is further used to deduce the characterization theory. The theory demonstrates that the measured scattering (S-)parameters can be accurately translated to the complex conductivity of the liquid under detection. The characterization theory is validated with finite-element simulation method. The measurements on some saline solutions demonstrate that the IDE method has the capability of detecting the salt content in liquids in a non-invasive and contactless way. This technique is targeted for a fast pollution detection or characterization of sea water. |
21,195 | Please write an abstract with title: Automatic Synchronization System for Synchronous Generators, and key words: Microcontrollers, Control systems, Synchronous generators, Hybrid power systems, Generators, Synchronization, Power generation. Abstract: The article presents a microcontroller system for synchronizing synchronous generators. The conditions of shockless synchronization of generators are considered and fulfilled. A system of active experiments has been developed to automatically adjust the contactor setting |
21,196 | Please write an abstract with title: Constrained Utility Maximization in Dual-Functional Radar-Communication Multi-UAV Networks, and key words: Sensors, Radar, Downlink, Unmanned aerial vehicles, Radar detection, Optimization, Power control. Abstract: In this paper, we investigate the network utility maximization problem in a dual-functional radar-communication multi-unmanned aerial vehicle (multi-UAV) network where multiple UAVs serve a group of communication users and cooperatively sense the target simultaneously. To balance the communication and sensing performance, we formulate a joint UAV location, user association, and UAV transmission power control problem to maximize the total network utility under the constraint of localization accuracy. We then propose a computationally practical method to solve this NP-hard problem by decomposing it into three sub-problems, i.e., UAV location optimization, user association and transmission power control. Three mechanisms are then introduced to solve the three sub-problems based on spectral clustering, coalition game, and successive convex approximation, respectively. The spectral clustering result provides an initial solution for user association. Based on the three mechanisms, an overall algorithm is proposed to iteratively solve the whole problem. We demonstrate that the proposed algorithm improves the minimum user data rate significantly, as well as the fairness of the network. Moreover, the proposed algorithm increases the network utility with a lower power consumption and similar localization accuracy, compared to conventional techniques. |
21,197 | Please write an abstract with title: Creating a Yolov3 Custom Model for Aerial Surveillance, and key words: Computer vision, Visualization, Satellites, Databases, Surveillance, Computational modeling, Object detection. Abstract: The annual cases of Dengue, Zika, and Chikungunya in Brazil are alarming. A way to minimize this problem is to identify and treat possible mosquito breeding grounds, such as swimming pools, untapped water tanks, etc. This paper proposes a YOLO custom model, an object detection system based on a convolutional neural network, to detect swimming pools on Aerial Surveillance Applications. A dataset was created with high-resolution aerial images in bird’s eye view and annotating desired objects, and then training the YOLO CNN inner layers. The evaluation occurred on a database containing 150 high-resolution images, testing on 72 satellite images with different resolutions, at three different image scales, for two different locations. The proposed method correctly identified up to 49.52% and 94.36% of the swimming pools in low and high-resolution satellite images, respectively. These results show that the proposed methodology is promising, mainly when applied to high-resolution satellite images. |
21,198 | Please write an abstract with title: Multi-server federated edge learning for low power consumption wireless resource allocation based on user QoE, and key words: Servers, Computational modeling, Training, Wireless communication, Uplink, Energy consumption, Task analysis. Abstract: Federated edge learning (FEL) deploys a machine learning algorithm by using devices distributed on the edge of a network, trains massive local data, uploads the local model to update the parameters after training, and performs alternate updating with global model parameters to reduce the pressure for uplink data transmission, prevent systematic time delay and ensure data security. This paper proposes that an optimal balance between time delay and energy consumption be achieved by optimizing the transmission power and bandwidth allocation based on user quality of experience (QoE) in a multi-server intelligent edge network. Given the limited computing capability of devices involved in FEL local training, the transmission power is modeled as a quasi-convex uplink power allocation (UPA) problem, and a lower energy consumption bandwidth allocation algorithm is proposed for solution-seeking. The proposed algorithm allocates appropriate power to the device by adapting the computing power and channel state of the device, thereby reducing energy consumption. As the theoretical deduction result suggests that additional bandwidth should be allocated to those devices with weak computing capabilities and poor channel conditions to realize minimal energy consumption within the restraint time. The simulation result indicates that, the maximum gain of the proposed algorithm can be optimized by 31% compared with the baseline. |
21,199 | Please write an abstract with title: Suppression of Common-Mode Voltage Based on Space-Vector Modulation for Four-Level Hybrid Inverters, and key words: Capacitors, Modulation, Switches, Support vector machines, Voltage control, Inverters, Legged locomotion. Abstract: This paper proposes the operation scheme and control method for a four-level hybrid-clamped inverter based on a modified space-vector modulation to suppress the common-mode voltage (CMV). With the proposed technique, the CMV peak value is reduced to 17% of DC-link voltage, whereas the peak-to-peak ripple of the flying-capacitor voltage is kept at 8% of its reference. In comparison with the in-phase disposition (IPD) modulation, the total power losses in the proposed method are decreased by more than 20% at various modulation indices. The effectiveness of the proposed inverter operation has been verified by simulation results. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.