ID
int64
0
400k
content
stringlengths
97
5.85k
2,900
Please write an abstract with title: Utilizing the NURBS modeler Rhino/sup /spl reg// for economical and intuitive 3D product development, and key words: Spline, Surface topography, Surface reconstruction, Packaging, Computer aided manufacturing, Personnel, Design automation, Software design, Software packages, Costing. Abstract: Many manufacturing firms in today's economy are reluctant to engage their design personnel in costly, difficult to operate 3D CAD packages. While the attributes of designing in 3D are numerous and beneficial, committing to a high-end design software package often seems unjustifiable, especially when only a few new designs are required. An extremely attractive alternative to this dilemma is the integration of a powerful and innovative 3D modeling software called Rhinoceros/sup /spl reg//, or Rhino/sup /spl reg// for short. While costing substantially less than most 3D modeling programs, Rhino supplies an impressive array of advanced capabilities not found on many of the most powerful design software's on the market. Though not considered a parametric or feature-based modeler, Rhino often supplements these costly packages to accomplish complex surfacing challenges. This paper introduces this incredible program as it applies to the motor manufacturing industry and highlights the ease-of-use and incredible power of this modeling and presentation software. Additionally, an overview of different types of 3D modeling software is given in contextual reference to where this product may fit into a firm's design initiatives.
2,901
Please write an abstract with title: An Enhanced Fault Diagnosis Method with Uncertainty Quantification Using Bayesian Convolutional Neural Network, and key words: Fault diagnosis, Uncertainty, Bayes methods, Circuit faults, Robustness, Predictive models, Noise measurement. Abstract: Fault diagnosis is a vital technique to pinpoint the machine malfunctions in manufacturing systems. In recent years, the deep learning techniques greatly improve the fault detection accuracy, but there still remain some problems. If one fault is absent in the training data or the fault signal is disturbed by severe noise interference, the fault classifier may misjudge the health state. This problem limits the reliability of the fault diagnosis in real applications. In this paper, we enhance the fault diagnosis method by using Bayesian Convolutional Neural Network (BCNN). A Shannon entropy-based method is presented to quantify the prediction uncertainty. The BCNN turns the deterministic predictions to probabilistic distributions and enhances the robustness of the fault diagnosis. The uncertainty quantification method helps to indicate the wrong predictions, detect unknown faults, and discover the strong disturbances. Then, a fine-tuning strategy is applied to enhance the model performance further. The potential usability of the proposed method in monitoring the motors of 3D printers is studied. And the experiment is conducted on a motor bearing dataset provided by Case Western Reserve University. The proposed BCNN achieves 99.82% fault classification accuracy over nine health conditions. Its robustness is verified by comparing the testing accuracy with three other methods on the noisy datasets. And the uncertainty quantification method successfully detects the outlier inputs.
2,902
Please write an abstract with title: High Throughput Outdoor Photoluminescence Imaging via PV String Modulation, and key words: Photovoltaic systems, Voltage measurement, Optical switches, Current measurement, Photoluminescence, Optical variables measurement, Throughput. Abstract: Outdoor Photoluminescence imaging of crystalline silicon photovoltaic modules in full daylight via contactless switching of the operating point was recently demonstrated. That previous method requires an optical modulator to be placed on at least two positions of each module under test and two or more separate sets of image pairs need to be acquired and combined into a merged PL image.Here we demonstrate a modified approach which enables outdoor PL image acquisition of an entire module from just one image pair. The method still enables image acquisition without any modification of the electrical wiring within the system but is overall simpler and thereby enables significantly higher sample throughput for outdoor PL image acquisition in PV power plants. It also enables imaging of several PV modules at once. The method relies on partial shading of up to five series connected modules and PL image detection of the remaining non-shaded series connected modules within the same module string. In this paper the underlying principles and technical details of this novel method are discussed. Experimental data demonstrating the feasibility of the method are presented, including PL images acquired on state-of-the art bifacial half-cell PV modules.
2,903
Please write an abstract with title: Deep structure of the Hellenic lithosphere from teleseismic Rayleigh-wave tomography, and key words: Structure of the Earth, Tomography, Surface waves and free oscillations, Dynamics of lithosphere and mantle, Subduction zone processes. Abstract: This research provides new constraints on the intermediate depth upper-mantle structure of the Hellenic lithosphere using a three-step Rayleigh-wave tomography. Broadband waveforms of about 1000 teleseismic events, recorded by ∼200 permanent broad-band stations between 2010 and 2018 were acquired and processed. Through a multichannel cross-correlation technique, the fundamental mode Rayleigh-wave phase-velocity dispersion curves in the period range 30–90 s were derived. The phase-velocities were inverted and a 3-D shear velocity model was obtained down to the depth of 140 km. The applied method has provided 3-D constraints on large-scale characteristics of the lithosphere and the upper mantle of the Hellenic region. Highlighted resolved features include the continental and oceanic subducting slabs in the region, the result of convergence between Adria and Africa plates with the Aegean. The boundary between the oceanic and continental subduction is suggested to exist along a trench-perpendicular line that connects NW Peloponnese with N. Euboea, bridging the Hellenic Trench with the North Aegean Trough. No clear evidence for trench-perpendicular vertical slab tearing was resolved along the western part of Hellenic Subduction Zone; however, subcrustal seismicity observed along the inferred continental–oceanic subduction boundary indicates that such an implication should not be excluded. The 3-D shear velocity model supports an N–S vertical slab tear beneath SW Anatolia that justifies deepening, increase of dip and change of dip direction of the Wadati-Benioff Zone. Low velocities found at depths <50 km beneath the island and the backarc, interrelated with recent/remnant volcanism in the Aegean and W. Anatolia, are explained by convection from a shallow asthenosphere.
2,904
Please write an abstract with title: Double gate silicon-on-insulator transistors: n/sup +/-n/sup +/ gate versus n/sup +/-p/sup +/ gate configuration, and key words: Silicon on insulator technology, Threshold voltage, Electron mobility, Light scattering, Voltage control, Phonons, Rough surfaces, Surface roughness, Electron traps, Electrostatics. Abstract: We have studied electron mobility behavior in asymmetric double-gate silicon on insulator (DGSOI) inversion layers, and compared it to the mobility in symmetric double-gate silicon on insulator devices. The electron mobility curves in asymmetric DGSOI devices are shown to be considerably below the mobility curves corresponding to symmetric devices, in the whole range of silicon thicknesses. We show that the lack of symmetry in the asymmetric DGSOT structure produces the loss of the volume inversion effect. In addition, we show that as the silicon thickness is reduced the conduction effective mass of electrons in asymmetric devices is lower than that in the symmetric case, but that the greater confinement of electrons in the former case produces a stronger increase in the phonon scattering rate, and in the surface roughness scattering rate.
2,905
Please write an abstract with title: Designing Smart Energy Network Ecosystem for Integrated energy services in urban areas, and key words: Ecosystems, Sustainable development, Waste heat, Urban areas, Business, Internet of Things. Abstract: Technologies such as electrification, informatization, and intelligence will reshape the energy form of cities in the future. Energy will become a key link in sustainable development and be integrated into sustainable urban development. Starting from the key elements of the energy system for sustainable urban development, considering urban resource endowment and energy demand, combining future urban forms and technological development, from the perspective of prosumer, a smart energy network ecosystem created by global partners and stakeholders is proposed. The features of the proposed ecosystem are: (1) the wisdom of various participants, the consideration of the renewable energy resources available in urban, and the waste heat and wastewater available in urban are integrated; (2) the integrated integration of smart grid and energy storage applications; considering the integration of big data, artificial intelligence and other technical means are considered; (3) focusing on the energy supply and consumption needs of the prosumers, we will jointly customize the smart energy network ecosystem, realize the complementary use of multiple clean energy sources and the coordinated response of the source, network, and storage to provide fair and diversified comprehensive energy services for urban users. This paper demonstrates the ecosystem's modelling ideas, principles, methods and logical framework. Based on the case of the Smart Otaniemi project in Espoo, Finland, it analyses the implementation plan of the smart energy network's ecosystem to provide support for the sustainable development of urban.
2,906
Please write an abstract with title: Vascular1: Development and Evaluation of a Virtual Reality Ultrasound Guided Vascular Access Training Module, and key words: Training, Solid modeling, Ultrasonic imaging, Costs, Scalability, Surgery, Virtual reality. Abstract: Direct vascular access is a common surgical procedure performed 150 million times annually in the United States. Ultrasound guided vascular access (UGVA) is a technique that uses real-time ultrasound imagery to guide the penetration of a micropuncture needle during direct vascular access. UGVA has proven to prevent unnecessary puncture attempts and improve patient satisfaction. UGVA training remains limited for medical students and surgical residents. They often learn on real patients that may suffer unnecessary complications. Current education options are limited by high costs and an inability to train essential hand-eye coordination skills. Recent advances in virtual reality (VR) technology enable high fidelity simulations of real-life environments. This paper introduces Vascular1 as an affordable VR module to train essential hand-eye coordination skills for safe and effective UGVA. Vascular1 was developed over an extensive period of nine months to create a robust training experience. It operates on the Oculus Quest hardware to ensure affordability, ease of use, and scalability. A trial was conducted to test Vascular1 as an effective training platform. Trainees reported an average 28% increase in confidence after training on Vascular1. The consistent increase in confidence and satisfaction with the VR experience establish Vascular1 as a competent training platform. Vascular1 demonstrates that an affordable and effective surgical training module is possible with VR.
2,907
Please write an abstract with title: Research on Intelligent Desk Design, and key words: Production, Media, Market research, Internet, Artificial intelligence, Remote control. Abstract: To explore the innovative design of intelligent desk. With researching and analyzing the current situation of intelligent desk, this paper figures out problems and design trends of intelligent desk, and formulates the feasibility of realizing intelligent desk. The demand for intelligent desk is put forward, and the user demand is transformed into design language through demand transformation. The design direction of intelligent desk is defined by design conception logic, and the innovative design scheme of intelligent desk is determined. The scheme is described in detail and analyzed and evaluated. The design of intelligent desk based on the user’s demand and the characteristics of intelligent furniture is in line with the furniture design process and has certain feasibility and has certain reference significance for the design and production of intelligent furniture.
2,908
Please write an abstract with title: A Fast Calibration Method for Digital Metasurface with Periodic Phase Modulation, and key words: Phase measurement, Phase modulation, Simulation, Discrete Fourier transforms, Meetings, Metasurfaces, Harmonic analysis. Abstract: A fast calibration method based on periodic phase modulation for digital metasurface is proposed and verified. By controlling the phase of the metasurface periodically, multiple harmonics with different frequencies are generated in the received calibration signal. Then with the multi-point discrete Fourier transform (DFT) and least square method, the unbalances of amplitude and phase carried in the harmonics can be easily estimated from the measured harmonic complex gains. Simulation result is provided to verify the feasibility.
2,909
Please write an abstract with title: Diseases Classification Utilizing Tooth X-ray Images Based On Convolutional Neural Network, and key words: Teeth, Computer architecture, X-rays, Implants, Filling, Convolutional neural networks, Medical diagnostic imaging. Abstract: Artificial Intelligence (AI), Deep Learning (DL), and Convolutional Neural Network (CNN) related technologies have seen widespread applications in various fields, such as in finance, military and medicine. In the medical field in particular, by utilizing the technology of CNN, there are many potential use cases in the real world, such as lung cancer detection, malignant tumor classification and tooth decay diagnosis. In this paper, we proposed a type of CNN architecture that used DL to classify four categories of tooth X-rays images: normal teeth, implants, fillings and abnormal teeth (cavities). The requirements for neural network architecture is also very important in this research, so we changed the CNN architecture and the parameters of the test set many times to achieve optimal performance. The preliminary results showed the highest detection accuracy rate of the four categories were normal teeth at 87%, implants and fillings at 98% and cavities at 89%. We were able to achieve an average accuracy at 93.04%. Thus we believed that this result could apply in periodontology dentistry field in the near future.
2,910
Please write an abstract with title: Impact of Surface Texture on Bifacial Silicon Heterojunction Solar Cell Carrier Loss, and key words: Optical losses, Three-dimensional displays, Surface waves, Photovoltaic cells, Lighting, Heterojunctions, Silicon. Abstract: We investigate the impact of surface texturing on current loss as a function of depth and wavelength in high efficiency bifacial silicon heterojunction solar cells operating at their maximum power output. We couple 3D ray tracing with TMM thin-film boundary conditions for optical simulations and solve Poisson’s drift-diffusion equations to calculate carrier recombination under both front and rear illumination. For front (rear) AM1.5G illumination at normal incidence, regular inverted pyramids out-perform planar surfaces and upright pyramid texture efficiencies by 17.1% rel. (17.9% rel.) and 1.4% rel. (1.0% rel.), respectively. Reduced carrier loss for inverted pyramid textures is calculated to be primarily due to a reflectivity decrease of 63% (76%) compared to planar surfaces which results in enhanced carrier-generation at depths further into the c-Si substrate. The benefit of inverted pyramidal light-trapping will be further enhanced when higher angles of incidence are considered, with angular performance particularly relevant for the rear-side.
2,911
Please write an abstract with title: A low-frequency counter using time-discriminant connectionist systems, and key words: Counting circuits, Frequency measurement, Time measurement, Neurons, Velocity measurement, Pulse generation, Pulse measurements, Band pass filters, Power measurement, Voltage. Abstract: A new simple, accurate, and instantaneous low-frequency counter based on the time-discriminant connectionist system , is proposed. The new counter could be used as a general-purpose frequency counter to measure a wide range of low frequencies. The accuracy of the proposed counter can be increased by increasing the number and the size of the EPROMS used and by increasing the clock frequency. Measurements from a prototype system agree well with the analysis.
2,912
Please write an abstract with title: Personal Health Mention Identification from Tweets Using Convolutional Neural Network, and key words: Diseases, Social networking (online), Prognostics and health management, Training, Task analysis, Depression, Kernel. Abstract: The past decade witnesses the unprecedent growth of social media users worldwide. People express health related outcomes, information, and views on social media platforms. This provides many opportunities to utilize the data source for health monitoring and surveillance, and digital epidemiology in real time. Personal health mention (PHM) is among one of the critical tasks for such purpose. It tries to identify whether a person’s health condition is mentioned in a sentence. However, social media texts contain noises, many creative and novel phrases, sarcastic Emoji expressions, and misspellings. This poses challenges to detect PHM from social media text. This paper explores the PHM identification task for six diseases from twitter using convolutional neural network (CNN). Specifically, word embeddings are used to encode the twitter text. Then they are fed into CNN structure to train the classifier for PHM identification. We also explore how the performance of different methods are affected by data imbalance issue and training sample size.
2,913
Please write an abstract with title: Comparison of 3-D Self-Calibration Methods for High-Precision Measurement Instruments, and key words: Three-dimensional displays, Mathematical models, Instruments, Uncertainty, Calibration, Measurement uncertainty, Solid modeling. Abstract: Three-dimensional self-calibration for high-precision 3-D measurement instruments can separate the system errors using an auxiliary artifact, with accuracy comparable to that of the instrument to be calibrated, having significant advantages in terms of production costs and realization conditions. The auxiliary artifact is rotated and/or translated to different positions. From measurements of the artifact in various positions, the system errors of the measurement instrument are separated after the elimination of the artifact’s errors through the self-calibration model. In this study, an iterative optimization method in 2-D self-calibration was extended to 3-D and compared with an established 3-D self-calibration method, namely the equation method based on least squares. The optimization method involves an optimization of 3-D instrument to eliminate its system errors by a correction function during an iterative loop. The equation method is used to establish a 3-D self-calibration model and solve the overdetermined equation model by least squares. The uncertainties of these two methods were analyzed using different approaches. The two methods were compared by simulation with the separated system errors and the effect of calibration when the artifact position scheme changed. Experiments on a computed tomography (CT) instrument were conducted to confirm the effectiveness of the two methods of 3-D self-calibration, through the mutual verification of results.
2,914
Please write an abstract with title: Memory access optimization of molecular dynamics simulation software Crystal-MD on Sunway Taihulight, and key words: Software, Optimization, Multicore processing, Registers, Dynamics, Data models, Lattices. Abstract: The radiation damage effect of key structural materials is one of the main research subjects of the numerical reactor. From the perspective of experimental safety and feasibility, Molecular Dynamics (MD) in the materials field is an ideal method for simulating the radiation damage of structural materials. The Crystal-MD represents a massive parallel MD simulation software based on the key material characteristics of reactors. Compared with the Large-scale Atomic/Molecular Massively Parallel Simulator (LAMMPS) and ITAP Molecular Dynamics (IMD) software, the Crystal-MD reduces the memory required for software operation to a certain extent, but it is very time-consuming. Moreover, the calculation results of the Crystal-MD have large deviations, and there are also some problems, such as memory limitation and frequent communication during its migration and optimization. In this paper, in order to solve the above problems, the memory access mode of the Crystal-MD software is studied. Based on the memory access mode, a memory access optimization strategy is proposed for a unique architecture of China's supercomputer Sunway TaihuLight. The proposed optimization strategy is verified by the experiments, and experimental results show that the running speed of the Crystal-MD is increased significantly by using the proposed optimization strategy.
2,915
Please write an abstract with title: A New Crossover Mechanism for Genetic Algorithms for Steiner Tree Optimization, and key words: Optimization, Genetic algorithms, Steiner trees, Encoding, Biological cells, Maintenance engineering, Greedy algorithms. Abstract: Genetic algorithms (GAs) have been widely applied in Steiner tree optimization problems. However, as the core operation, existing crossover operators for tree-based GAs suffer from producing illegal offspring trees. Therefore, some global link information must be adopted to ensure the connectivity of the offspring, which incurs heavy computation. To address this problem, this article proposes a new crossover mechanism, called leaf crossover (LC), which generates legal offspring by just exchanging partial parent chromosomes, requiring neither the global network link information, encoding/decoding nor repair operations. Our simulation study indicates that GAs with LC outperform GAs with existing crossover mechanisms in terms of not only producing better solutions but also converging faster in networks of varying sizes.
2,916
Please write an abstract with title: Diagnosis of Gastroesophageal Reflux in Patients with Complicated Forms of Peptic Ulcer Disease, and key words: Pathology, Liquids, Surgery, Biomedical monitoring, Monitoring, Chemicals, Diseases. Abstract: Intraesophageal pH monitoring in patients with acidic gastroesophageal reflux (GER) makes it possible to establish the pathological or physiological nature of reflux. Diagnosis and correction of GER in the treatment of complicated forms of ulcer contributes to the improvement of long-term results of treatment and the quality of life of patients.
2,917
Please write an abstract with title: Research on Condition Prediction of Rod Pumping System Based on Grey Prediction Model, and key words: Employee welfare, Mechatronics, Oils, Time series analysis, Fitting, Predictive models, Mathematical models. Abstract: This paper aims to effectively monitor the complex working conditions that may occur at any time during the downhole operation of the rod-pumping system, and perform the targeted processing in advance. A grey prediction model is established based on the characteristic values of the pump dynamograph to predict the working conditions. In this prediction method, we will use the characteristic values of the pump dynamograph extracted by Freeman chain code as a parameter, and use the gray theory to establish a grey prediction model. The prediction model is used to predict the sample parameters in the time series to obtain the characteristic values for a period of time in the future and the prediction of future conditions to be realized. The results show that the prediction model has a high degree of fitting, and has a good effect on the prediction of the conditions of the rod pumping system.
2,918
Please write an abstract with title: Side-Scan Sonar Analysis Using ROI Analysis and Deep Neural Networks, and key words: Sonar, Sonar measurements, Image segmentation, Databases, Histograms, Proposals, Convolutional neural networks. Abstract: Side-scan sonar generates an image based on the reflection of sound waves. The reflection takes place with the first encountered object, which, in practice, may be a passing fish or even a wave from the boat turbine. Therefore, such data are sensitive to all noises. In this article, we propose a real-time automatic system of side-scan sonar analysis that can detect and classify different objects. Our proposition is based on the processing of a given image to quickly verify whether there is anything other than the bottom of the river/sea. If so, this image is analyzed in terms of regions of interest (ROIs) by the histogram module. This action allows the extraction of only objects of interest, which are then classified by convolutional neural networks (CNNs). A proposed model also contains an automatic mechanism of adding the sample to the database in order to later guarantee the accuracy of the classifiers. The model is a hybridization of image processing techniques with a machine learning approach to analyze difficult images. The presented system has been tested on the bottom of a river in Szczecin, Poland. We reached 90% of accurate classification in case scenario and 88% in simulation on used datasets. The obtained results were presented and discussed in terms of the advantages of practical application in analyzing side-scan sonar images.
2,919
Please write an abstract with title: Identification and open-loop tracking control of a piezoelectric tube scanner for high-speed scanning-probe microscopy, and key words: Open loop systems, Scanning probe microscopy, Nanotechnology, Spatial resolution, Actuators, High-resolution imaging, Displacement control, Force control, Velocity control, Error correction. Abstract: Fast and precise positioning is a basic requirement for nanotechnology applications. Many scanning-probe microscopes (SPM) use a piezoelectric tube scanner for actuation with nanometer resolution in all three spatial directions. Due to the dynamics of the actuator, the imaging speed of the SPM is limited. By applying model-based open-loop control, the dynamic behavior of the scanner can be compensated, reducing the displacement error, topographical artifacts, modulation of the interaction force, and modulation of the relative tip-sample velocity. The open-loop controlled system enables imaging of up to 125-/spl mu/m-sized samples at a line scan rate of 122 Hz, which is about 15 times faster than the commercial system.
2,920
Please write an abstract with title: Inclusive application proposal for the Museo Nacional de Arte of Mexico City, and key words: Visualization, Art, Terminology, User centered design, Urban areas, Education, Auditory system. Abstract: Museums in Mexico are public areas whose purpose is the approach and appreciation of art for people. However, access to culture is not guaranteed for people who have a disability, being the particular case of people who live with sensory disabilities, such as visual or hearing disabilities. Considering the above, this article offers an accessibility proposal so that blind and deaf people can access the artistic content, guaranteeing their approach without any distinction. The development proposal is an agreement with the National Museum of Art (MUNAL for its acronym in Spanish), which through its Munal + Educa department, has been working on create its Mediated Visit Methodology (MVM). Considering this previous experience, an inclusive application proposal is proposed taking aspects of said methodology, as well as User-Centered Design (UCD) to ensure that the needs of the target users are prioritized from the beginning of the stages of the proposal.
2,921
Please write an abstract with title: MPI: Memory Protection for Intermittent Computing, and key words: Hardware, Task analysis, Checkpointing, Software, Cryptography, Random access memory, Nonvolatile memory. Abstract: Batteryless devices harvest energy from sporadic ambient sources, enabling a wide range of long-lived, stand-alone, and environmentally-friendly sustainable applications. Software on these devices operates intermittently due to frequent power failures. Each power failure leads the device to lose its computational state that hinders the forward progress of computation and memory consistency. One solution to remedy this situation is to pair programs with checkpoints to save a snapshot of the intermediate program state to non-volatile memory before a power loss. Due to the lack of protection mechanisms in the state-of-the-art intermittent systems, checkpoints can be altered either by programmer errors or deliberately by an attacker. This situation leads to catastrophic effects since the program execution might be corrupted, and in turn, the device might malfunction. In this paper, we propose MPI, a memory protection mechanism for intermittent computing systems. In particular, MPI is a minimal intermittent-compliant trusted computing base acting as a hypervisor that fully manages and protects the underlying memory of a batteryless device. MPI enables a reliable and secure generation and restoration of checkpoints, maintaining their integrity and access control in the presence of remote software-based attacks without trusting the user program or requiring programmer intervention. Notable is that MPI neither requires hardware modifications nor depends on hardware features that might not exist in all batteryless platforms. Our experiments on a real batteryless platform show that MPI provides stronger security guarantees compared to the state-of-the-art approaches, with a comparable time and energy overhead.
2,922
Please write an abstract with title: Operation of an Externally Excited Synchronous Machine with a Hybrid Multilevel Inverter, and key words: Batteries, Inverters, Europe, Hybrid power systems, Synchronous machines, Rotors, Switches. Abstract: An innovative hybrid multilevel inverter is proposed which is able to deliver a separate DC voltage while a three-phase system is provided. The voltages are independently, but delivered by shared battery cells. The new system operates an electrically excited synchronous machine's rotor and stator current circuit in a vehicle drivetrain.
2,923
Please write an abstract with title: Benchmarking Photoplethysmography Peak Detection Algorithms Using the Electrocardiogram Signal as a Reference, and key words: Performance evaluation, Wearable computers, Soft sensors, Detectors, Intellectual property, Benchmark testing, Electrocardiography. Abstract: Introduction: Photoplethysmography (PPG) is fast becoming the signal of choice for the widespread monitoring of sleep metrics obtained by wearable devices. Robust peak detection is critical for the extraction of mean-ingful features from the PPG waveform. There is however no consensus on what PPG peak detection algorithms perform best on nocturnal continuous PPG recordings. We introduce two methods to benchmark the performance of PPG peak detectors. Methods: We make use of data where nocturnal PPG and electrocardiogram (ECG) are measured synchronously. Within this setting, the ECG, a signal for which there are established R -peak detectors, is used as reference. The first method for benchmarking, denoted &#x201C;Peak Matching&#x201D;, consists of forecasting the expected position of the PPG peaks using the ECG R-peaks as reference. The second technique, denoted &#x201C;IHR-IPR Accuracy&#x201D;, compares the instantaneous pulse rate (IPR) extracted from the PPG with the instantaneous heart rate (IHR) extracted from the ECG. For benchmarking, we used the MESA dataset consisting of 2,055 overnight polysomnography recordings with a combined length of over 16,300 hours. Four open PPG peak detectors were benchmarked. Results: The &#x201C;Pulses&#x201D; detector performed best with a Peak Matching F1-score of 0.94 and an IHR-IPR Accuracy of 89.6&#x0025;. Discussion and conclusion: We introduced two new methods for benchmarking PPG peak detectors. Among the four detectors evaluated, &#x201C;Pulses&#x201D; performed best. Benchmarking of further PPG detectors and on other data source (e.g. daytime recordings, recordings from patients with arrhythmia) is needed.
2,924
Please write an abstract with title: High-Speed and Low-Power GaAs Phase Frequency Comparator, and key words: Gallium arsenide, Voltage-controlled oscillators, Fabrication, Local oscillators, FETs, Circuit simulation, Frequency conversion, Semiconductor diodes, MESFET circuits, Threshold voltage. Abstract: A high-speed and low-power consumption phase frequency comparator (PFC) for a phase lock stable oscillator was designed and fabricated with a GaAs MESFET BFL circuit for the first time. The threshold voltage, gate width, and gate length of GaAs MESFET's in the PFC were determined by circuit simulations for a high-speed and low-power operation. The fabrication process used buried p-layer SAINT-FET's with 0.5-µm gate length. The fabricated PFC performed stable phase and frequency comparison up to 600 MHz at only 60 mW. Using dislocation-free wafers, the fabrication yield in the laboratory was more than 90 percent.
2,925
Please write an abstract with title: Autonomous Detection of Stair Dimensions for the Motion Planning of Stair Climbing Robots, and key words: Point cloud compression, Service robots, Robot vision systems, Clustering algorithms, Stairs, Climbing robots, Cameras. Abstract: The need for service robots to help humans in daily tasks is increasing globally. Whether in an indoor or outdoor environment, service robots need to plan their motion to climb stairs autonomously. So, in this paper, we propose a new approach using a depth camera to determine the features of stairs which are required as an input to autonomous motion planning for stair climbing robots. The proposed approach uses a pinhole camera model to compute the point cloud of the perceived environment. After that, determining the normal vector of the points in the point cloud helps to organize the data into two clusters: horizontal and vertical. For each of the two clusters, the Euclidean distance algorithm is used to generate a class for each step of the stairs. Finally, the Maximum Likelihood Estimation Sample Consensus (MLESAC) algorithm is used to fit a plane on each class. Thus, the dimensions of the stairs are determined accurately by subtracting two subsequent plane equations from each other.
2,926
Please write an abstract with title: Motor bus transfer: considerations and methods, and key words: Synchronous motors, Induction motors, Frequency, Voltage, Spinning, Aggregates, Petroleum, Chemical industry, Power generation, Industrial plants. Abstract: This paper addresses the types of motor bus transfer (MBT) available, explores its technical challenges, and analyzes the creation of proper settings when implementing an MBT system for power plant spinning motor auxiliary buses or industrial plant spinning motor buses. Classic approaches are described and conditions are explored that make these transfers proper or improper. Advanced implementations of MBT methodology that use high-speed sensing, decision making, and breaker control to account for the dynamic conditions in and about the plant, such as motor dispatch and loading, new source conditions, and faults are explored.
2,927
Please write an abstract with title: RIVIE: Robust Inherent Video Information Embedding, and key words: Cameras, Watermarking, Decoding, Steganography, Distortion, Motion pictures, Training. Abstract: Imagine an interesting situation when watching a movie, we can scan the screen using our smartphones to get some extra information about this movie such as the cast, the release date, the movie's homepage, etc. Our prospect is a world where each video contains invisible information that can be delivered to us through mobile devices with cameras. This paper proposes the first deep learning-based information hiding method for videos to achieve information transmission from screens to cameras. Compared with hiding information in single images, the methods for videos need to maintain visual quality in both spatial and temporal domains. Furthermore, the training of video models builds on a large video dataset, which needs much more computational resources than training models for images. To reduce the computational complexity, we propose to simulate data on-the-fly to generate simulated sequences from single images. Then, we use the simulated data to train a spatio-temporal generator that hides information in videos while maintaining visual quality. During training, a temporal loss function based on the simulated data is exploited to ensure the temporal consistency of generated videos. After embedding, we use a decoder to recover the hidden information. To simulate the imaging pipeline from screens to cameras in the real world, we insert a distortion network between the generator and decoder. The distortion network is based on differentiable 3D rendering to cover possible distortions introduced in the procedure of camera imaging. Experimental results show that the hidden information in videos can be extracted by cameras without impacting the visual quality. Our work can be applied to many fields, such as advertisement, entertainment, and education.
2,928
Please write an abstract with title: Underwater Target Recognition Method Based on Convolution Autoencoder, and key words: convolutional autoencoder, time-frequency image, unsupervised training, supervised tuning. Abstract: Aiming at the underwater target radiated noise recognition under the limitation of low signal-to-noise ratio and small number of labeled samples, the deep learning method of convolutional autoencoder is proposed for target noise time-frequency image recognition. According to the characteristics of underwater acoustic target noise, the convolutional autoencoder models with different number of convolution layers were constructed. Then, the unsupervised training based on noisy samples without labels and supervised tuning based on labeled samples were implemented for the models in sequence. The experimental data processing results show that the unsupervised training can effectively purify data noise and improve the separability of dimensionality reduction features to a certain extent. And after supervised training, the separability of features can be greatly improved. At the same time, the recognition accuracies of convolutional autoencoder models are better than that of the contrast methods, which verifies its effectiveness for underwater target recognition.
2,929
Please write an abstract with title: Electromagnetic Vibration-Prediction Process in Interior Permanent Magnet Synchronous Motors Using an Air Gap Relative Permeance Formula, and key words: Vibrations, Air gaps, Rotors, Magnetic flux density, Force, Electromagnetics, Permanent magnet motors. Abstract: Interior permanent magnet synchronous motors have the advantage of being applicable to various fields owing to their high torque density and wide operating range but have the disadvantage of large electromagnetic vibrations. To calculate the electromagnetic vibration, analysis of the magnetic flux density of the air gap using the finite element method (FEM) is essential. This process requires a significant amount of time because of the use of many analysis models. The radial force, which is the source of vibration, is expressed as the square of the air gap magnetic flux density, the vibration can be predicted in advance by calculating the waveform of the air gap magnetic flux density using a formula. In this paper, a new air gap relative permeance formula is proposed when an offset is applied to the outer diameter of the rotor to reduce electromagnetic vibration. By calculating the waveform of the air gap magnetic flux density using the proposed air gap relative permeance formula, a model with a minimum total harmonic distortion is selected. The validity of the formula was confirmed by comparing the FEM result with the waveform of the air gap magnetic flux density calculated using the proposed formula. The proposed model minimized the vibration and was confirmed using FEM. Using the proposed formula, vibration can be easily and quickly predicted in analytic way. The prototype of the final model was developed and compared using FEM, and the validity of the analysis result was confirmed.
2,930
Please write an abstract with title: A microwave technique for the determination of nonlinearities in bulk material, and key words: Microwave theory and techniques, Conducting materials, Conductivity, Aggregates, Voltage, Silicon carbide, Frequency conversion, Shape, Linearity, Testing. Abstract: A method for the determination of the analytical form of the nonlinear conductive component of bulk materials is described. This method consists of determining the interaction between simultaneously applied microwave and dc signals and inferring the shape of the nonlinearity from this interaction. Experimental techniques for mounting aggregate samples are described and typical test results for aggregates of silicon carbide are given.
2,931
Please write an abstract with title: Early Validation of SoCs Security Architecture Against Timing Flows Using SystemC-based VPs, and key words: Design automation, Scalability, Prototypes, Authentication, Computer architecture, Production, Intellectual property. Abstract: Modern System-on-Chips (SoCs) have been increasingly deployed in critical aspects of our lives. As a consequence, they have access to a large number of secret assets that must be protected against unauthorized access. In order to provide sound security guarantees, an SoC typically has a security architecture as authentication mechanisms to control the access of different Intellectual Properties (IPs) to secret assets. Since the SoC's security architecture cannot be changed after production, it is of utmost importance to detect any security flaws in the design phase. Moreover, to prevent costly fixes in later stages, security validation should start as early as possible. In this paper, we propose a novel approach to validate the security architecture of a given SoC against timing flows using SystemC-based Virtual Prototype (VP) and static information flow tracking technique at the system level. Experimental results on two real-world VP-based SoCs demonstrate the scalability and applicability of the proposed approach in identifying timing flows.
2,932
Please write an abstract with title: A new approach to representing continuously moving regions, and key words: Spatiotemporal phenomena, Object oriented modeling, Spatial databases, Solid modeling, Computer science, Data models, Prototypes, Shape, Storms, Fires. Abstract: Spatiotemporal databases have received increasing interests, and a lot of data models have been proposed. One of the key issues in spatiotemporal databases is the representation of spatiotemporal changes. The typical example is to represent moving regions. But most of previous work concentrated on representing discretely moving regions. Continuously moving regions are much difficult to be modeled, and few techniques are proposed. This work deals with the representations of continuously moving regions. The new approach is called constraint rectangle. A continuously moving region is represented as a set of constraint rectangles, and both x-dimension and y-dimension of each constraint rectangle are functions of time. We develop algorithms to represent a moving region into constraint rectangles, and discuss the prototype implementations.
2,933
Please write an abstract with title: Electrochemical-Theory-Guided Modeling of the Conditional Generative Adversarial Network for Battery Calendar Aging Forecast, and key words: Aging, Predictive models, Probabilistic logic, Lithium-ion batteries, Power electronics, Computational modeling, Data models. Abstract: In many energy storage applications, the inevitable calendar aging of batteries results in both short service life and decreased battery performance. In this article, a generative adversarial network-based (GAN-based) model is proposed for both point and probabilistic forecasts of battery calendar aging, i.e., the capacity forecast GAN (CFGAN), which will be the first work that applies GAN to calendar aging forecast. GAN’s ability to learn arbitrarily complex distributions has enabled CFGAN to approximate all the possible (arbitrarily shaped) joint distributions. By taking electrochemical knowledge as the guidelines for designing CFGAN’s crucial part, i.e., the conditioner, CFGAN has maintained a satisfying consistency between knowledge and data, making it both knowledge-driven and data-driven, i.e., knowledge+data-driven, which has improved its theoretical strength and forecast performance significantly. Illustrative results on practical calendar aging case studies demonstrated the superiority of CFGAN in forecasting and generalizing to unwitnessed conditions, implying that the CFGAN built in deep structure has grasped the complex multimodality of the condition-varying calendar aging process.
2,934
Please write an abstract with title: Passive diamagnetic levitation: theoretical foundations and application to the design of a micro-nano force sensor, and key words: Force sensors, Magnetic levitation, Magnetostatics, Superconducting magnets, Magnetic materials, Electrostatic levitation, Friction, Magnetic sensors, Web page design, Magnetic fields. Abstract: Mechanical friction and more generally adhesion forces are some problems, which can severely limit the performances of micromechanical devices. One way to avoid friction problem, is to use levitation methods. Levitation in static magnetic field is very easy to achieve by the use of diamagnetic materials. Thus, it is possible to freely suspend a light magnet and let it in a stable equilibrium state. We have developed a prototype of a micro-nano force sensor using a passive levitation approach. This paper explains diamagnetic levitation in the simple case of a small cylindrical magnet with a mass and volume of 11 mg and 1.65 mm/sup 3/ respectively. The forces applied to the suspended magnet are presented and the natural stability of the diamagnetic levitation is explained. Finally, we present the design of our micro-nano force sensor using diamagnetic levitation.
2,935
Please write an abstract with title: Quantum Computing for Artificial Intelligence Based Mobile Network Optimization, and key words: Computers, Quantum computing, Automation, Qubit, Quantum mechanics, Indexes, Artificial intelligence. Abstract: In this paper, we discuss how certain radio access network optimization problems can be modelled using the concept of constraint satisfaction problems in artificial intelligence, and solved at scale using a quantum computer. As a case study, we discuss root sequence index (RSI) assignment problem — an important LTE/NR physical random access channel configuration related automation use-case. We formulate RSI assignment as quadratic unconstrained binary optimization (QUBO) problem constructed using data ingested from a commercial mobile network, and solve it using a cloud-based commercially available quantum computing platform. Results show that quantum annealing solver can successfully assign conflict-free RSIs. Comparison with well-known heuristics reveals that some classic algorithms are even more effective in terms of solution quality and computation time. The non-quantum advantage is due to the fact that current implementation is a semi-quantum proof-of-concept algorithm. Also, the results depend on the type of quantum computer used. Nevertheless, the proposed framework is highly flexible and holds tremendous potential for harnessing the power of quantum computing in mobile network automation.
2,936
Please write an abstract with title: Deep Learning of Movement Intent and Reaction Time for EEG-informed Adaptation of Rehabilitation Robots, and key words: Electroencephalography, Training, Task analysis, Rehabilitation robotics, Robot sensing systems, Manipulators, Kinematics. Abstract: Mounting evidence suggests that adaptation is a crucial mechanism for rehabilitation robots in promoting motor learning. Yet, it is commonly based on robot-derived movement kinematics, which is a rather subjective measurement of performance, especially in the presence of a sensorimotor impairment. Here, we propose a deep convolutional neural network (CNN) that uses electroencephalography (EEG) as an objective measurement of two kinematics components that are typically used to assess motor learning and thereby adaptation: i) the intent to initiate a goal-directed movement, and ii) the reaction time (RT) for that movement. We evaluated our CNN on data acquired from an in-house experiment where 12 healthy subjects moved a rehabilitation robotic arm in four directions on a plane, in response to visual stimuli. Our CNN achieved average test accuracies of 80.08% and 79.82% in a binary classification of the intent (intent vs. no intent) and RT (slow vs. fast), respectively. Our results demonstrate how individual movement components implicated in distinct types of motor learning can be predicted from synchronized EEG data acquired before the start of the movement. Our approach can, therefore, inform robotic adaptation in real-time and has the potential to further improve one's ability to perform the rehabilitation task.
2,937
Please write an abstract with title: Gas Heating Analysis in High-Power Microwave Breakdown Process Based on SETD Method, and key words: Wireless communication, Electromagnetic heating, Temperature distribution, Electric breakdown, Microwave theory and techniques, Mathematical models, Plasmas. Abstract: In this paper, an electromagnetic-fluid model based on spectral-element time-domain (SETD) method is adopted to describe microwave argon breakdown. This model contains Maxwell's equations and electronic fluid equations. And the background gas temperature equation is introduced in this system. The characteristics of microwave argon breakdown can be obtained. Meanwhile, the temperature distribution and characteristics of the background gas can also be obtained.
2,938
Please write an abstract with title: Evaluation of Elements of a Prospective System to Alert Users to Intentionally Deceptive Content, and key words: Scientific computing, Web pages, Media, Labeling, Computational intelligence. Abstract: This paper presents a system designed to alert users to potentially deceptive online media. It reviews existing alert mechanisms and labeling systems which provide inspiration for the system’s components. It also discusses how a new mechanism could be developed that uses elements of these common alert mechanisms to warn users about potentially deceptive content on web pages. This paper evaluates the benefits, risks, and limitations of the proposed system. Sources of the alert components, and their integration into a single combined alert system, are discussed as are planned areas of future work.
2,939
Please write an abstract with title: Effects of speculation on performance and issue queue design, and key words: Pipelines, Delay, Microprocessors, Clocks, Frequency, Iris, Costs, Degradation, Out of order, Permission. Abstract: Current trends in microprocessor designs indicate increasing pipeline depth in order to keep up with higher clock frequencies and increased architectural complexity. Speculatively issued instructions are particularly sensitive to increases in pipeline depth. In this brief, we use load hit speculation as an example, and evaluate its cost effectiveness as pipeline depth increases. Our results indicate that as pipeline depth increases, speculation is more essential for performance but can drastically alter the utilization of pipeline resources, particularly the issue queue. We propose an alternative, more cost-effective design that takes into consideration the different issue queue utilization demands without degrading overall processor performance.
2,940
Please write an abstract with title: Embedding propagation over heterogeneous event networks for link prediction, and key words: Machine learning algorithms, Social networking (online), Network topology, Organizations, Machine learning, Big Data, Heterogeneous networks. Abstract: Events can be defined as phenomena that occur at a specific time and place. Social networks and news portals publish thousands of events daily, and this knowledge is beneficial for many social, political, and economic studies. Recently, heterogeneous networks have been used successfully for modeling large event datasets since they model different event components as nodes (e.g., events, actors, locations, people, and organizations), and network links express different relationships between these nodes. However, event analysis from heterogeneous networks is a research challenge due to several factors: (1) event nodes are usually associated with textual (unstructured) and high dimensional data; and (2) inapplicability of several machine learning methods that assume input data represented by independent vectors in a vector space. In this paper, we present a language model-based embedding propagation method for heterogeneous event networks. While most of the existing network embedding methods mainly explore the network’s topology, our method maps both (i) textual information about events and (ii) the complex relationships between events and their components to a low dimensional vector space in order to use several machine learning algorithms, such as clustering and classification. We carried out an extensive experimental evaluation involving link prediction tasks in heterogeneous event networks, such as event forecasting, prediction of event locations, and event actors. Our approach proved competitive compared to the state-of-the-art network embedding methods for link prediction tasks in different real-world event datasets, in addition to allowing dynamic and incremental updating of the embeddings as new events arise.
2,941
Please write an abstract with title: Signal Processing with Spiking Neuron Model, and key words: adaptive signal processing, spiking neuron, integrate and fire neuron. Abstract: The article deals with signal processing models that use the representation of signals by spike trains. The “input-output” model of an integrate and fire spiking neuron is considered. The possibilities of using this model for spectral analysis and adaptive filtering are investigated. To solve the problem of adaptive processing of spike sequences, a generalized multi-input vector-matrix model of a spiking neuron is introduced. Based on this model, we derive supervised learning rules to adapt the dynamics of the spiking neuron. Examples of adaptive signal recovery from spike trains, additive noise suppression, and adaptive synthesis of band-pass filters are demonstrated.
2,942
Please write an abstract with title: Predefined-Time Stabilization of Permanent-Magnet Synchronous Motor System Using Linear Time-Varying Control Input, and key words: Simulation, Conferences, White noise, Synchronous motors, Permanent magnet motors, Numerical simulation, Reliability. Abstract: This paper designs a predefined-time convergent continuous control algorithm using a linear time-varying control input to stabilize a permanent magnet synchronous motor system in three cases: disturbance-free, in presence of a deterministic disturbance satisfying a Lipschitz condition, and in presence of both a stochastic white noise and a deterministic disturbance satisfying a Lipschitz condition. Numerical simulations are provided for a permanent magnet synchronous motor system to validate the obtained theoretical results. The simulation results demonstrate that the employed values of the predefined-time convergent control inputs are applicable in practice.
2,943
Please write an abstract with title: Generalized Mutual Information-Maximizing Quantized Decoding of LDPC Codes With Layered Scheduling, and key words: Decoding, Table lookup, Complexity theory, Schedules, Quantization (signal), Iterative decoding, Convergence. Abstract: In this paper, we propose a framework of the mutual information-maximizing (MIM) quantized decoding for low-density parity-check (LDPC) codes by using simple mappings and fixed-point additions. Our decoding method is generic in the sense that it can be applied to LDPC codes with arbitrary degree distributions, and can be implemented based on either the belief propagation (BP) algorithm or the min-sum (MS) algorithm. In particular, we propose the MIM density evolution (MIM-DE) to construct the lookup tables (LUTs) for the node updates. The computational complexity and memory requirements are discussed and compared to the LUT decoder variants. For applications with low-latency requirement, we consider the layered schedule to accelerate the convergence speed of decoding quasi-cyclic LDPC codes. In particular, we develop the layered MIM-DE to design the LUTs based on the MS algorithm, leading to the MIM layered quantized MS (MIM-LQMS) decoder. An optimization method is further introduced to reduce the memory requirement for storing the LUTs. Simulation results show that the MIM quantized decoders outperform the state-of-the-art LUT decoders in the waterfall region with both 3-bit and 4-bit precision over the additive white Gaussian noise channels. For small decoding iterations, the MIM quantized decoders also achieve a faster convergence speed compared to the benchmarks. Moreover, the 4-bit MIM-LQMS decoder can approach the error performance of the floating-point layered BP decoder within 0.3 dB in the moderate-to-high SNR regions, over both the AWGN channels and the fast fading channels.
2,944
Please write an abstract with title: Design of AI-based Resource Forecasting Methods for Network Slicing, and key words: Wireless communication, Training, Adaptation models, Costs, 5G mobile communication, Network slicing, Predictive models. Abstract: With the forthcoming of 5G networks, the underlying infrastructure needs to support a higher number of heterogeneous services with different QoS needs than ever. For that reason, 5G inherently provides a way to allocate these services over the same infrastructure through the concept of Network Slicing. However, to maximize revenue and reduce operational costs, a method to proactively adapt the resources assigned to each slice becomes imperative. For that reason, this work presents two Machine Learning (ML) models, leveraging Long-Short Term Memory (LSTM) and Random Forest algorithms, to forecast the throughput of each slice and adapt accordingly the amount of resources needed. The models are evaluated using NS-3, which has been integrated with the ML models through a shared memory framework. This enables a closed loop in which the predictions of the models can be used at run time to introduce changes in the network. Consequently, it makes it able to cope with the forecasted requirements, eliminating the need for off-line training and resembling better a real-life scenario. The evaluation performed shows the ability of the models to predict the slices' throughput under various settings and proves that Random Forest provides up to 26% better results than LSTM.
2,945
Please write an abstract with title: Implementation of Soldier Tracking and Health Monitoring System, and key words: Wireless sensor networks, Military aircraft, Modems, Safety, Sensors, Security, National security. Abstract: In modern times enemy warfare is a major factor in the sovernity of any country. National security lies in the hand of army (on the ground), the ships (at sea), the air force (in the air). An crucial and indispensable role is played by the military. There are many concerns about the safety of the soldiers.. This program will be useful for soldiers, participants in special trips or special missions. This system enables tracking of these soldiers via GPS (Global positioning systems). It could be MHealth. M-health can be explain as mobile computing, medical sensors and healthcare communications technology. In the enemy's territory soldiers are not only exposed to physical threats, but also they feel exhausted and weary caused by prolonged work or poor sleep. Therefore for security reasons we require a tool for distant soldiers to monitor his wellbeing. Therefore in this project the tool is used using biosensors for the purpose of monitoring health. And a Global positioning system is used to track a soldier's location. Adding to it the GSM modem which make the system compatible wireless. In our module we have come about with the design of tracking a soldier and giving him a military position during the war.
2,946
Please write an abstract with title: Improved Neutral-Point Voltage Balancing Control With Time Delay Compensation and Antiwindup Loop for a Three-Level NPC Inverter, and key words: Voltage control, Pulse width modulation, Inverters, Delay effects, Windup, Delays, Capacitors. Abstract: This article proposes an improved neutral-point voltage balancing control (NPVBC) with time delay compensation and an antiwindup loop based on a dynamic change limit for a three-level neutral-point clamped (NPC) voltage-source inverter. NPVBC is essential for a three-level NPC inverter since it has a separate dc link. In an NPVBC based on the carrier-based pulsewidth modulation (CBPWM), the neutral-point (NP) voltage is regulated by synthesizing the NP current. The conventional NP voltage balancing controller is designed as a proportional-integral controller; however, time delays due to the digital control and pulsewidth modulation, and antiwindup loop were not considered despite the fact that digital control delay disturbs the accurate synthesis of NP current and the windup phenomenon may appear on the regulator since synthesizable NP current range can be limited by operating condition. To solve these problems, this article proposes improvement methods for NPVBC with digital delay compensation and an antiwindup loop based on CBPWM. Analysis on the effect of digital delay is described, and the time delays compensation method is proposed. Furthermore, an NP voltage balancing controller with an antiwindup loop is proposed along with an analysis of the synthesizable NP current range. With the proposed method, NP voltage ripples can be reduced, and control stability of the NPVBC can be greatly improved by preventing the windup phenomenon that may occur when the inverter output is insufficient. To verify the proposed methods, simulations and experiments, including elevator tower test, were conducted, and the results verify the effectiveness of the proposed methods.
2,947
Please write an abstract with title: Economic Analysis for the Players Participating in a Hybrid Solar Virtual Power Plant, and key words: Economics, Renewable energy sources, Circuits and systems, Virtual power plants, Very large scale integration, Power markets, Hybrid power systems. Abstract: Individual distributed energy resources (DER) because of their small capacity is not able to participate in energy trading. A novel concept has been used in this paper wherein Virtual Power Plant (VPP) acts as an aggregator and can provide scheduled dispatch of power and thereby participate in energy trading of the grid. VPP operator (VO) is the authority of transmit power from several sources maintaining their freedom in property and operation. VO conducts energy trading with the grid on behalf of the VPP. In this study an investigation is carried out to determine economic stature of all the players participating in a VPP system.
2,948
Please write an abstract with title: A 35nW/pixel 2D visual motion sensor, and key words: Sensor arrays, Detectors, Energy consumption, Intelligent sensors, Logic circuits, Motion analysis, Smart pixels, Motion detection, Voltage, CMOS process. Abstract: An ultra-low power visual motion sensor based on the time stamped pixel structure is presented in this paper. Both the current-clamping circuits in the edge detector and the static logic circuit in the time stamp component are developed to allow the pixel dissipating tens of nanowatt power. In addition, both proposed edge detector and time stamp component reduce the pixel size simultaneously. Implemented in a CMOS 0.35/spl mu/m process, a 2D vision motion sensor of 32/spl times/32 arrays only consumes 35nW/pixel with the chip area of (40/spl mu/m/spl times/40/spl mu/m)/pixel.
2,949
Please write an abstract with title: Multifrequency and Multipolarization High-Resolution Sar Datasets for Demarcation of Structural Pattern of Base Metal Bearing Carbonate Rocks of Zawar Region, and key words: Fluids, Filtering, Mineralization, Metals, Market research, Rocks, Feature extraction. Abstract: Remote Sensing is widely used in the field of geology for lithology mapping, mineral identification, and demarcation of regional structural features. In the present study, multifrequency (L and S-band) and multipolarization datasets of ASAR Level – 2 were used for the structural mapping in the Zawar region. The VH and RV polarization datasets were selected for the texture analysis, principal component analysis, and directional filtering for the extraction of the lineaments in the Zawar and Hati Magra regions. The extracted lineaments of Zawar show the major trend in E-W and WNW-ESE directions while WNW-ESE and ENE-WSW trends are observed in the northern and southern part of Hati Magra dolomite. The swing in the lineaments of Hati Magra dolomite may be attributed to the structural heterogeneity and subsequent faulting in the region.
2,950
Please write an abstract with title: A methodology for validating manufacturing test vector suites for custom designed scan-based circuits, and key words: Circuit testing, Manufacturing, Conferences, Microprocessors. Abstract: In Motorola's High Performance Design Center, two verification flows are often used to verify correctness of custom designed blocks. The first is an equivalence checking flow, and the second is a manufacturing test pattern generation/simulation flow. The two flows are often disconnected resulting into silicon failures on manufacturing test vector suites. Our aim is to analyze the disconnect and to arrive at a technique that bridges the gap between the two verification flows by validating the correctness of manufacturing test patterns. This reduces time to market by cutting down on precious silicon debug time by eliminating redundant defect fixes. Our experimental results were obtained from a set of custom designed circuits of a Motorola MPC74XX microprocessor.
2,951
Please write an abstract with title: A modified weighted bit-flipping decoding of low-density Parity-check codes, and key words: Parity check codes, Iterative decoding, Iterative algorithms, Error correction, AWGN channels, Binary phase shift keying, Random variables, Equations, Additive white noise, Noise measurement. Abstract: In this letter, a modified weighted bit-flipping decoding algorithm for low-density parity-check codes is proposed. Improvement in performance is observed by considering both the check constraint messages and the intrinsic message for each bit.
2,952
Please write an abstract with title: Strengthening human-computer interfaces: an automatic construction and evaluation of an annotated corpus, and key words: Annotations, Thesauri, Semantics, Task analysis, Manuals, Linguistics, Labeling. Abstract: The human-computer interfaces exploits the annotated corpora to identify the meaning of the statements during dialogue management. The construction of an annotated corpus is an arduous task, usually manual involving high costs and limitations on the number of texts to annotate. This paper presents the automatic construction and evaluation of an annotated corpora for strengthening human-computer interfaces. The proposal is inexpensive and independent of domain information; therefore, it applies to other contexts with a low investment of resources.
2,953
Please write an abstract with title: Adaptive QIM With Minimum Embedding Cost for Robust Video Steganography on Social Networks, and key words: Social networking (online), Modulation, Quantization (signal), Principal component analysis, Robustness, Discrete wavelet transforms, Watermarking. Abstract: Sharing videos on social networks has become more and more popular, which provides a new scenario for covert communication. Video sharing-based hidden communication can conceal the contact relation between the sender and receiver and achieve the one-to-many delivery of secret messages. However, most video steganographic methods are unable to complete reliable hidden communication on social networks because of lossy video recompression. In this paper, we propose adaptive QIM (Quantization Index Modulation) with minimum embedding cost, which decreases the quantization distortion as much as possible to improve the security performance against steganalysis under the same level of robustness. Furthermore, based on the proposed quantization modulation scheme, we implement two robust steganographic methods in the DWT-SVD domain and the DTCWT-SVD domain. Experimental results show that the overall performance of our proposed modulation scheme outperforms QIM and adaptive QIM. Compared with existing robust video data hiding, two proposed steganographic methods demonstrate superior robustness and security on local lossy channels and social networks.
2,954
Please write an abstract with title: Performance of an asynchronous CDMA system with parallel interference cancellation, and key words: Multiaccess communication, Interference cancellation, AWGN, Eigenvalues and eigenfunctions, Covariance matrix, Signal to noise ratio, Additive white noise, Closed-form solution, Numerical simulation, Signal processing. Abstract: The asymptotic performance of a multistage linear partial parallel interference cancellation (PPIC) receiver for an asynchronous code division multiple access (CDMA) system over an additive white Gaussian noise (AWGN) channel using the moments of the eigenvalues of the correlation matrix is addressed. The closed-form expression for the eigenvalues of a random covariance matrix in synchronous case is known (Jonsson, D., 1982). However, for the case where the users are not synchronous, the distribution is not known. In such a case, we evaluate the behavior of the eigenvalues through numerical simulation. The figure of merit to evaluate the performance is the signal-to-interference-plus-noise ratio (SINR) that is calculated under large-system conditions where the number of active users (K) and the processing gain (N) tend to infinity, while their ratio (/spl beta/=K/N) is a finite value. Simulation results show a significant degradation in performance due to asynchrony. It is also seen that, similar to the synchronous case, the SINR for the asynchronous case in a large-system scenario converges to that of the minimum mean-squared error (MMSE) receiver.
2,955
Please write an abstract with title: Simultaneous pixel calibration for global shutter THz imager, and key words: Detectors, Calibration, Manufacturing, Standards, Electronic circuits. Abstract: CMOS THz detectors are prone to manufacturing variations. In this paper, we proposed a method for simultaneous calibration of all the pixels that does not interfere with the global shutter operation by mounting a threshold calibration mechanism in the pixel circuit. With this calibration technique, standard deviation of pixel outputs is suppressed by 89.4%.
2,956
Please write an abstract with title: Multiple single pixel dim target detection in infrared image sequence, and key words: Pixel, Object detection, Infrared imaging, Infrared detectors, Image sequences, Target tracking, Nonlinear filters, Multi-stage noise shaping, Shape, Matched filters. Abstract: It is difficult to detect and classify multiple point targets in the presence of clutter and noise, in an air borne IR image sequence. Most existing approaches assume a target of several pixels size or of Gaussian shape with a variance of 1.5 pixels. We propose a wavelet based detection technique for multiple single pixel dim targets in an IR image sequence in the presence of clutter and noise. Temporal multiscale decomposition is used to detect temporal change. This temporal change map is postprocessed to reduce the probability of false alarm and misdetection.
2,957
Please write an abstract with title: The Impact of a Distributed Generation and Electric-Vehicle Parking on the Coordination of the Fuse-Recloser, and key words: Automation, Fuses, Electric breakdown, Power systems, Distributed power generation, Indexes, Fault currents. Abstract: A recloser fuse protection system is one of the most effective methods of protecting distribution systems. Typically, these protection strategies are developed prior to the entry of distributed resources into the distribution system. On the other hand, distributed resource usage in distribution systems affects the magnitude and direction of fault currents. These modifications may cause a breakdown in the coordination of recloser fuse protection schemes. The purpose of this work is to develop a new indicator for examining the effect of distributed source injection current on recloser fuse coordination disruption. The new index evaluates the effect of dispersed resources on the system's overall performance on the basis of network protection. To evaluate the suggested method's efficiency and performance, an IEEE 33-bus test system was employed, and the influence of distributed sources on the fuse-recloser protection of this system was evaluated under various scenarios.
2,958
Please write an abstract with title: The constitutive equations of a piezoelectric duo-bimorph, and key words: Actuators, Voltage, Electrodes, Piezoelectric polarization, Piezoelectric materials, Torque, Capacitive sensors, Integral equations, Computer aided manufacturing, CADCAM. Abstract: This paper describes the behaviour of a two-degrees-of-freedom piezoelectric actuator; based on piezoelectric bimorphs. The constitutive equations of the actuator are established, with a model derived from material resistance. They link external parameters (applied voltages; applied torque, force and distributed loads) and the internal variables (deflexion, slopes and volume displaced).
2,959
Please write an abstract with title: Design of Physical Security for Constrained End Devices within the IoT Ecosystem, and key words: Performance evaluation, Ecosystems, Authentication, Maintenance engineering, Telecommunications, Performance analysis, Security. Abstract: With the enormous growth of the market with remote sensors/actuators provided with internet connectivity forming the Internet of Things (IoT) comes new and new challenges in the field of communication technologies itself but also in terms of physical and cyber security. Over the last years, the cyber security of these devices has been well considered, and many new approaches to protecting these devices have emerged. On the other side, as the remote sensors were mostly very low-cost, propper physical protection was not cost-effective. But recently, new use cases demanding more complex devices have changed this view. In this paper, we thus propose a proof-of-concept design of the physical security of such devices providing intrusion and sensitive data protection with the capability of physical access for maintenance by an authentication method suitable for constrained devices.
2,960
Please write an abstract with title: Reconstruction method of missing texture using error reduction algorithm, and key words: Reconstruction algorithms, Fourier transforms, Image reconstruction, Image restoration, Iterative algorithms, Computer errors, Discrete Fourier transforms, Information science, Information retrieval, Phase estimation. Abstract: This paper presents a novel reconstruction method of missing textures using an error reduction algorithm which is one of phase retrieval methods. The proposed method estimates the Fourier transform magnitude of the missing area from another area whose texture is similar in the obtained image. In order to realize this, a novel approach that monitors the errors caused by the error reduction algorithm is introduced into the selection scheme of the similar texture. Further, the proposed method estimates the phase of the target area by using the error reduction algorithm modified for the texture reconstruction and can restore the missing area accurately. Some experimental results show that the proposed method achieves more accurate restoration than that of the traditional methods.
2,961
Please write an abstract with title: Large Motion Object Tracking using Active Contour Combined Active Appearance Model, and key words: Tracking, Active contours, Active appearance model, Face detection, Detectors, Convergence, Computer vision, Parameter estimation, Active shape model, Principal component analysis. Abstract: Because the Active Appearance Model (AAM) is sensitive to the initial parameters, it is difficult to track an object that shows a large motion. This paper proposes an active contour combined Active Appearance Model that can track an object whose motion is large. The proposed AAM fitting algorithm consists of two alternating procedures: active contour fitting to find the contour sample that best fits the face image and then the active appearance model fitting that begins from the estimated motion parameters. Experimental results show that the proposed active contour combined AAM provides better accuracy and convergence characteristics in terms of RMS error and convergence rate than the existing AAM. The combination of the existing robust AAM and the proposed active contour based AAM (AC-R-AAM) had the best accuracy and convergence performances.
2,962
Please write an abstract with title: Context Debloating for Object-Sensitive Pointer Analysis, and key words: Java, Receivers, Approximation algorithms, Cognition, Software engineering. Abstract: We Introduce a new approach, Conch, for debloating contexts for all the object-sensitive pointer analysis algorithms developed for object-oriented languages, where the calling contexts of a method are distinguished by its receiver objects. Our key insight is to approximate a recently proposed set of two necessary conditions for an object to be context-sensitive, i.e., context-dependent (whose precise verification is undecidable) with a set of three linearly verifiable conditions (in terms of the number of statements in the program) that are almost always necessary for real-world object-oriented applications, based on three key observations regarding context-dependability for their objects used. To create a practical implementation, we introduce a new IFDS-based algorithm for reasoning about object reachability in a program. By debloating contexts for two representative object-sensitive pointer analyses applied to a set of 12 representative Java programs, Conch can speed up the two baselines together substantially (3.1x on average with a maximum of 15.9x) and analyze 7 more programs scalably, but at only a negligible loss of precision (less than 0.1%).
2,963
Please write an abstract with title: A self-learning automaton with variable resolution for high precision assembly by industrial robots, and key words: Robotic assembly, Service robots, Robotics and automation, Automatic control, Stochastic processes, Learning automata, Quantization, Industrial control, Force control, Input variables. Abstract: This paper reports on the use of the stochastic automaton theory to configure control algorithms for high precision assembly operations performed with a force-sensing robot. The basic principle of the stochastic automation, i.e., its variable structure, has been extended to the dimensionality of the automaton by gradually optimizing the resolution of the input variables.
2,964
Please write an abstract with title: Probabilistic linkage, and key words: Couplings, Training data, Sociology, Mathematical models, Maintenance engineering, Indexes, Data models. Abstract: Probabilistic linkage (or record linkage) consists of methods for matching duplicate records within or across files using non‐unique identifiers such as first name, last name, date of birth and address, or a national health identification code with typographical error. This chapter provides an introductory overview of some well‐established methods of record linkage that have been used for different types of lists for more than 40 years. It first gives a background on the record linkage model of Fellegi and Sunter, methods of parameter estimation without training data, some brief comments on training data, and string comparators for dealing with typographical error and blocking criteria. Next, the chapter provides details of the difficulties with the preparation of data for linkage. Then, it describes methods for error rate estimation without training data and methods for adjusting statistical analyses of merged files for linkage error. The chapter ends with some concluding remarks.
2,965
Please write an abstract with title: An Ultrawideband Circularly-Polarized Vivaldi Antenna With High Gain, and key words: Antennas, Polarization, Vivaldi antennas, Slot antennas, Antenna feeds, Lenses, Ultra wideband antennas. Abstract: This paper proposes a novel ultrawideband antenna with high gain and circular polarization. Its circular polarization can be easily changed to right-handed or left-handed. The antenna consists of four sophisticated antipodal Vivaldi antennas and an ultrawideband feeding network. The feeding network composes of four horizontal-to-vertical transitions, a two-to-four power divider, and a 3-dB directional coupler. This network can provide two pairs of outputs with equal magnitude and ninety-degree phase difference. In addition, it is horizontally fed with a single input port that can be directly connected to the corresponding circuit board. The newly introduced transition can reduce the discontinuity between the horizontally placed circuit and vertically standing antenna. A prototype antenna is designed, fabricated, and tested. Its impedance-matching, circularly-polarized and stable-gain band is sufficiently wide to cover the entire Ku, K, and Ka bands. The fractional bandwidth (FBW) is as large as 113.2%. In the entire band, the antenna axial ratio is well below 3 dB, while the antenna gain is stable up to 18.35 dBic. Remarkable performance has been achieved in the literature for the first time.
2,966
Please write an abstract with title: Linear approach to axial resolution in elasticity imaging, and key words: Image resolution, Elasticity, Capacitive sensors, Spatial resolution, Imaging phantoms, Strain measurement, Biomedical measurements, Computational modeling, Linear systems, Transfer functions. Abstract: Thus far axial resolution in elasticity imaging has been addressed only empirically. No clear analytical approaches have emerged because the estimator is nonlinear in the data, correlation functions are nonstationary, and system responses vary spatially. This paper describes a linear systems approach based on a small-strain impulse approximation that results in the derivation of a local impulse response (LIR) and local modulation transfer function (LMTF). Closed-form Solutions for strain LIR are available to provide new insights on the role of instrumentation and processing on axial strain resolution. Novel phantom measurements are generated to validate results. We found that the correlation window determines axial resolution in most practical situations, but that the the same system properties that determine B-mode resolution ultimately limit elasticity imaging.
2,967
Please write an abstract with title: Lossless generalized-LSB data embedding, and key words: Distortion, Watermarking, Data mining, Signal processing, Spread spectrum communication, Authentication, Biology computing, Biomedical imaging, Propagation losses, Payloads. Abstract: We present a novel lossless (reversible) data-embedding technique, which enables the exact recovery of the original host signal upon extraction of the embedded information. A generalization of the well-known least significant bit (LSB) modification is proposed as the data-embedding method, which introduces additional operating points on the capacity-distortion curve. Lossless recovery of the original is achieved by compressing portions of the signal that are susceptible to embedding distortion and transmitting these compressed descriptions as a part of the embedded payload. A prediction-based conditional entropy coder which utilizes unaltered portions of the host signal as side-information improves the compression efficiency and, thus, the lossless data-embedding capacity.
2,968
Please write an abstract with title: DTOF Image LiDAR With Stray Light Suppression and Equivalent Sampling Technology, and key words: Laser radar, Time measurement, Semiconductor device measurement, Measurement by laser beam, Temperature measurement, Field programmable gate arrays, Reflectivity. Abstract: This paper presents direct time-of-flight image LiDAR to realize a reliable autopilot system, which consists of hardware architecture and processing algorithm based on field programmable logic array (FPGA). The processing algorithm consists of multi-channel time-to-digital converters (TDCs), equivalent sampling technology consisting of equivalent sampling circuit (ESC) and amplitude fitting algorithm (AFA), correlation slope fitting algorithm (CSFA), and stray light suppression algorithm (SLSA). The TDCs are used to measure the flight time. The ESC is used to record waveforms based on time discrimination circuits, dynamic threshold adjustment circuits, and TDCs. The AFA is used to achieve the amplitude of the echo signal whether it is saturated or not. The CSFA based on the Gauss function is used to eliminate walk error, which does not need to calibrate the compensation coefficient in advance. And the stary light suppression algorithm based on laser pulse signal modulation technology is used to suppress the interference of background light and interference within different LiDAR systems. The LiDAR system can achieve 100 m measurement range with the laser peak power of 120 W. A measurement precision of ~+/−15 mm was achieved with non-cooperative targets when the measurement range was less than 10m. And the measured relative precision was less than 1% for a distance up to 100 m with a 100-klux direct sunlight.
2,969
Please write an abstract with title: Robust TS-Fuzzy output feedback controller synthesis for saturated vehicle System, and key words: Robust control, Uncertainty, Stability analysis, Tires, Performance analysis, Linear matrix inequalities, PD control. Abstract: This paper addresses robust control design problem for parameter dependent (PD) systems subject to actuator saturation. The dead-zone nonlinearity is considered for regional stability and performance analysis of control design strategy. The parallel distributed compensation static output feedback controller is derived in new gain-scheduling scheme satisfied the generalized sector condition. Based on the fuzzy Lyapunov function approach, the parametrized stabilization non-convex conditions are reformulated in linear matrix inequalities (LMI) by congruence transformations. The proposed method leads to less conservative constraint on saturated PD controller synthesis. The effectiveness of the design methodology is demonstrated through simulations.
2,970
Please write an abstract with title: Word line pulsing technique for stability fault detection in SRAM cells, and key words: Fault detection, Random access memory, Circuit testing, Circuit stability, Circuit faults, Stress, Electrical fault detection, Circuit noise, System-on-a-chip, Degradation. Abstract: Stability testing of SRAMs has been time consuming. This paper presents a new programmable DFT technique for detection of stability and data retention faults in SRAM cells. The proposed technique offers extended flexibility in setting the weak overwrite test stress, which allows to track process changes without time-consuming post-silicon design iterations. Moreover, it does not introduce extra circuitry in the SRAM array and surpasses the data retention test in test time and detection capability
2,971
Please write an abstract with title: Sensitivity of broadband microwave receiver with consideration nonlinear part, and key words: Envelope detectors, Noise level, Temperature sensors, Electromagnetic interference, Signal to noise ratio, Band pass filters, Low-frequency noise, Frequency, Computer vision, Receiving antennas. Abstract: The radioelectronic receiver, from the analysis of the signal to noise point of view, consists of two blocks: linear and nonlinear. Sensitivity of the linear block is generally defined on noise factor or working noise temperature. The influence of the nonlinear receiver's block on the sensitivity of the receiver is rarely considered. Taking into consideration a nonlinear block, especially in broadband receivers (as IFM are) causes significant improvement of sensitivity compared with the obtained sensitivity of the linear block.
2,972
Please write an abstract with title: A new stereophonic amplifier, and key words: Costs, Circuits, Feedback, Loudspeakers, Audio systems, Distortion measurement, Frequency measurement, Crosstalk. Abstract: A central feature of the new design of a stereo amplifier is an output transformer with original features that makes possible reduced cost and improved performance at the same time. This paper discusses a varied possibility of design objectives for a stereo system, and explains the way in which the new output transformer functions. By variation in its method of use, or in choice of parameters, a whole range of amplifiers can apply advantages in different proportions or degrees. The basic design of an output transformer, which is essentially inexpensive to make, provides for separation between "left" and "right" as well as crossover, and combining networks for mixed lows, if desired, without additional external circuits. It makes possible a new type of tone control, achieving high performance economically, using feedback, and/or improved matching between amplifier and loudspeakers over the entire frequency range as well as better separation and efficiency than the single-ended and push-pull transformer matrix can give. One particular amplifier is discussed in detail, while a more general discussion shows possible application to more diverse design objectives.
2,973
Please write an abstract with title: Research on the Control Strategy of AC/DC Interlinking Converters in Islanded Hybrid Microgrid, and key words: Fluctuations, Simulation, Microgrids, Hybrid power systems, Stability analysis, Mathematical model, Voltage control. Abstract: As the hub of the alternating current (AC) sub-microgrid and direct current (DC) sub-microgrid connection, the interlinking converter is responsible for the important tasks of power transmission within the AC and DC sub-microgrids. The quality of its control strategy is directly related to the AC/DC hybrid microgrid stable operation. In this paper, the droop control equations adopted by the distributed sources connected to the AC sub-microgrid and the DC sub-microgrid is analyzed in detail. Furthermore, a bidirectional droop control strategy for interlinking converters based on PI control is proposed to realize the power balance of isolated hybrid microgrids. This strategy considers the characteristics of interlinking converters that need to maintain AC bus frequency and DC bus voltage stability and power bidirectional transmission. Mutual power support between AC and DC subsystems can reduce the impact of the deviation of the individual subsystem from the rated operating conditions on the remaining subsystems. Finally, a simulation model of the AC/DC hybrid microgrid is built in MATLAB/Simulink to verify the feasibility and effectiveness of the proposed control strategy.
2,974
Please write an abstract with title: An Outdoor Navigation Assistance System for Visually Impaired People in Public Transportation, and key words: Navigation, Mobile applications, Real-time systems, Cameras, Indoor navigation, Global Positioning System, Blindness. Abstract: Visually impaired and blind people (VIBP) have to face significant difficulties locating public transport vehicles and bus stops due to their vision restrictions. Over the past decade, diverse assistance systems have been developed to solve this problem. However, most of them are based upon the global positioning system (GPS) and present satellite coverage problems in indoor environments. Some others are wearable prototypes that turn out to be onerous for the user. This paper presents an assistance system for VIBP in the use of public transportation. The proposed system uses Bluetooth Low Energy (BLE) technology for location and communication purposes, and a mobile application for user-smartphone interaction. The BLE beacons are installed on buses and their stops; accordingly, the mobile application tracks them in real-time and provides the relevant information to the user employing verbal instructions; transportation line, destination, next stop name, and current location. This information allows the user to properly select the desired bus in advance and get off at the correct destination stop. The proposed system has been tested in two scenarios: 1) under controlled conditions and 2) in a real environment. The results show that the proposed system is 97.6% effective when VIBP travel independently from one point to another. In addition, according to an assessment sheet completed by the participants, the proposed system grants them greater confidence and independence than GPS-based systems because of the following reasons; firstly, it can work with an internet connection or without an internet connection. Secondly, it is not an onerous system; information about the location of vehicles and stops is provided in real-time. Last but not least, it does not present satellite coverage problems in indoor environments.
2,975
Please write an abstract with title: Interactive Self-Training with Mean Teachers for Semi-supervised Object Detection, and key words: Training, Computer vision, Head, Costs, Fuses, Object detection, Predictive models. Abstract: The goal of semi-supervised object detection is to learn a detection model using only a few labeled data and large amounts of unlabeled data, thereby reducing the cost of data labeling. Although a few studies have proposed various self-training-based methods or consistency regularization-based methods, they ignore the discrepancies among the detection results in the same image that occur during different training iterations. Additionally, the predicted detection results vary among different detection models. In this paper, we propose an interactive form of self-training using mean teachers for semi-supervised object detection. Specifically, to alleviate the instability among the detection results in different iterations, we propose using nonmaximum suppression to fuse the detection results from different iterations. Simultaneously, we use multiple detection heads that predict pseudo labels for each other to provide complementary information. Furthermore, to avoid different detection heads collapsing to each other, we use a mean teacher model instead of the original detection model to predict the pseudo labels. Thus, the object detection model can be trained on both labeled and unlabeled data. Extensive experimental results verify the effectiveness of our proposed method.
2,976
Please write an abstract with title: 3d Pathological Signs Detection And Scoring On CPA CT Lung Scans, and key words: Measurement, Pathology, Three-dimensional displays, Computed tomography, Time series analysis, Lung, Lesions. Abstract: Chronic Pulmonary Aspergillosis (CPA) is a complex type of fungal infection caused by the Aspergillus fungus that mostly affects people with pre-existing lung lesions or weakened immune systems. Pleural thicknening, fungal balls and cavities visualized on CT scans are used to score the extent and gravity of CPA, in a qualitative manner. This work focuses on the use of deep-learning to improve current standards in localising and scoring CPA signs for longitudinal follow-up. We propose an original framework fully implemented in 3D, combining imaging and time series encoding, to provide activation maps, CPA severity scores and 5-years mortality prediction.
2,977
Please write an abstract with title: Statistical design of ARMA filters, and key words: Digital filters, Fourier series, Filtering, Books, Polynomials. Abstract: Procedures are given for the systematic design of ARMA filters. All of the design algorithms are linear and of the Levinson type. Each design is initiated with a long AR approximation of an ideal spectrum. The long AR is used to generate consistent unit pulse and covariance sequences for use in the Levinson type algorithm of Mullis and Roberts. The latter algorithm allows one to approximate the unit pulse and covariance sequences and thereby obtain a low-order ARMA approximation. There is no need for the ARMA approximation to be proper.
2,978
Please write an abstract with title: Kirchhoff Migration Method for Tube Detection with UWB GPR, and key words: Ground penetrating radar, Automation, Inverse problems, Electromagnetic scattering, Tools, Electron tubes, Electromagnetic fields. Abstract: The problem of subsurface object depth determination is solved by the ultrawideband ground penetrating radar simulation and Kirchhoff migration method. The electromagnetic problem is calculated by the FDTD method. The source of electromagnetic field is a plane electromagnetic wave of nanosecond time duration with normal incidence to the ground plane. A-scans are obtained by measuring the reflected electromagnetic field at the certain height above the air-ground interface. The resulting scattered fields in the form of B-scans are processed by Kirchhoff migration method in order to determine the exact depth of the hidden object.
2,979
Please write an abstract with title: Earning a living among peers - the quest for viable P2P revenue models, and key words: Costs, Uninterruptible power systems, Peer to peer computing, Distributed computing, Humans. Abstract: P2P applications have found a lot of interest lately but there are open questions about the viability of the revenue models behind P2P applications/services. In this paper, we discuss revenue models for P2P applications. There is no one size fits all revenue model for the different P2P applications/services; hence the quest for viable revenue models requires a differentiated discussion. Our goal is to review some of the fundamental issues which the various P2P application/service styles face in terms of revenue models. In order to do this, we suggest an abstract view of P2P interaction to which we map the P2P applications/services and discuss potential issues which revenue models. We conclude with a short summary and some areas for further research.
2,980
Please write an abstract with title: Hate Speech detection in English and Malayalam Code-Mixed Text using BERT embedding, and key words: Social networking (online), Computational modeling, Hate speech, Bit error rate, Transformers, Security, Intelligent systems. Abstract: Hate speech detection is a very popular research area for past few years. Hate speech is given various definition by various researchers. In this paper we try to analyse the use of BERT embedding in hate speech detection in low resource language like Malayalam. The crucial challenge faced by researchers in this area are that most non-English languages are represented in code-mixed form in Social media. Here we work with transformer-based models to classify tweets as hate or non-hate content. Hence this is a novel approach that uses BERT in non-English text.
2,981
Please write an abstract with title: Dialogue Strategy Adaptation to New Action Sets Using Multi-Dimensional Modelling, and key words: Training, Measurement, Transfer learning, Supervised learning, Natural languages, Training data, Reinforcement learning. Abstract: A major bottleneck for building statistical spoken dialogue systems for new domains and applications is the need for large amounts of training data. To address this problem, we adopt the multi-dimensional approach to dialogue management and evaluate its potential for transfer learning. Specifically, we exploit pre-trained task-independent policies to speed up training for an extended task-specific action set, in which the single summary action for requesting a slot is replaced by multiple slot-specific request actions. Policy optimisation and evaluation experiments using an agenda-based user simulator show that with limited training data, much better performance levels can be achieved when using the proposed multi-dimensional adaptation method. We confirm this improvement in a crowd-sourced human user evaluation of our spoken dialogue system, comparing partially trained policies. The multi-dimensional system (with adaptation on limited training data in the target scenario) outperforms the one-dimensional baseline (without adaptation on the same amount of training data) by 7% perceived success rate.
2,982
Please write an abstract with title: Model Assumptions and Data Characteristics: Impacts on Domain Adaptation in Building Segmentation, and key words: Remote sensing, Buildings, Image segmentation, Task analysis, Adversarial machine learning, Adaptation models, Feature extraction. Abstract: Studies on domain adaptation (DA) for remote sensing (RS) imagery analysis lack consistency in selection and description of evaluation scenarios. Without properly characterizing datasets, model assumptions, and evaluation scenarios, it is difficult to objectively compare DA methods and reach conclusions about their suitability across different applications. With this motivation, this work seeks to empirically assess to which extent the interaction between data characteristics and model assumptions influences the effectiveness of DA methods. Using the widely explored task of building footprint segmentation as a case study, we perform a large-scale study across over 200 DA scenarios that include variations across view angles, areas observed, and sensors used for data acquisition. Rather than adopting different model architectures or optimization criteria, we contrast the performances of two DA methods based on adversarial learning that differ only in their assumptions about source and target domains. Informed by metadata and data characteristics unveiled using traditional computer vision (CV) techniques as well as pretrained deep models, we provide a detailed meta-analysis of experiments highlighting the importance of accurately considering data assumptions for DA in RS segmentation tasks. As demonstrated by a “cherry-picking” exercise, different claims regarding which model is best could be made by selecting different subsets of evaluation scenarios. While well-calibrated assumptions can be beneficial, mismatching assumptions can lead to negative biases in DA applications. This study intends to motivate the community toward more consistent evaluation protocols while providing recommendations and insights toward creating novel benchmark datasets, documenting data characteristics, application-specific knowledge, and model assumptions.
2,983
Please write an abstract with title: U-Net-based medical image segmentation algorithm, and key words: Deep learning, Wireless communication, Training, Image segmentation, Signal processing algorithms, Melanoma, Skin. Abstract: Before the deep learning algorithm, there are many traditional image segmentation methods. However, with the rapid development of artificial intelligence technology, the requirements for the accuracy and efficiency of image segmentation are getting higher and higher, so the image segmentation algorithm based on deep learning arises as the times require. But it is worth noting that these algorithms are natural image processing, and medical image format diversification, the difference of pixel value range, the presence of noise and artifacts, and so on, using the general image segmentation algorithms cannot meet medical demand scenarios medical image segmentation. On the basis of U-Net model, this paper improves its sub-modules, and proposes four sub-module structures: Path direct connection, Dropout direct connection, Conv direct connection, and Constant scale. Dataset uses Skin lesions of melanoma, and accuracy, sensitivity, specificity, precision, F-Measure, IOU, Dice coefficient and comprehensive score were selected as model performance evaluation indexes. After model training, validation and testing, the conclusion was drawn: In the segmentation task of melanoma skin disease image, the performance of Constant scale model was the best among all experimental models.
2,984
Please write an abstract with title: Surface Temperature Limit as Food Quality Control in Automatic Learning Model for Drying Process, and key words: Technological innovation, Temperature, Atmospheric modeling, Process control, Quality control, Predictive models, Temperature control. Abstract: This paper presents design and implementation of an automatic learning model for a drying process. Setting surface temperature limit as an upper boundary for the drying process is very helpful key to prevent loss in physico-chemical properties such as color variation, nutrients, preferable odors, and surface textures. Based upon input-out data acquired from the designed system, the drying machine can identify system parameter adjusting by innovation sequences of the Kalman gains. The model is then used as a predictor to prescribe suggestion rules for firing automatically suitable control gains. According to the experimental results, Thai curry paste as testing materials under the proposed control process reveal desired properties, meaning that the scheme is effective and is available to be adopted for other similar dried food requirements.
2,985
Please write an abstract with title: The interaction of technology and performance in complementary-symmetry MOS integrated circuits, and key words: Integrated circuit technology, MOS integrated circuits, Capacitance, Inverters, Delay, Switching circuits, MOSFETs, Equations, Threshold voltage, Transistors. Abstract: The technology of complementary MOS has already resulted in significant advantages in circuit simplicity, speed-power, and noise immunization. Future technological improvements to increase device gain, reduce capacity, and increase packing density will make complementary MOS even more attractive. The relationships among device physics, processing technology and performance will be presented.
2,986
Please write an abstract with title: Traffic grooming on WDM rings using optical burst transport, and key words: Wavelength division multiplexing, Optical receivers, Telecommunication traffic, Traffic control, Transport protocols, Communication system traffic control, Performance analysis, Analytical models, Media Access Protocol, Testing. Abstract: A sublambda traffic-grooming scheme on wavelength-division-multiplexed (WDM) rings, which is called optical burst transport (OBT), is proposed. The network protocol and architecture allow increased flexibility to tailor the transport network behavior for efficient delivery of bursty data traffic. Using different network parameters, its performance is analyzed via simulation, and the implementation issues including the media-access-control (MAC) protocol, tunable-filter controller, and burst-mode receiver are addressed. Finally, the feasibility of the OBT with an experimental testbed built by the authors is demonstrated and a streaming-video application is used to present its overall functionality.
2,987
Please write an abstract with title: Electricity Consumption Forecasting Using Gated-FCN With Ensemble Strategy, and key words: Logic gates, Forecasting, Load modeling, Predictive models, Long short term memory, Load forecasting, Deep learning. Abstract: Accurate electricity consumption forecasting in the power grids ensures efficient generation and distribution of electricity. Keeping this in mind, the paper introduces a novel deep learning model, termed Gated-FCN, for short-term load forecasting. The key idea is to introduce an automated feature selection and deep learning model for forecasting. The model includes an eight-layered Fully Convolutional Network (FCN-8) in which the hand-crafted feature selection that requires expert domain knowledge is avoided. Furthermore, the model also reduces noise as it learns internal dependencies and the correlation of the time series. Enhanced Bidirectional Gated Recurrent Unit (EBiGRU) is used in combination with FCN-8 to learn long-term temporal dependencies of the time series. Moreover, a weighted averaging mechanism of multiple snapshot models is adopted in the proposed model to assign optimized weights to BiGRU. At the end of FCN-8 and BiGRU, a fully connected dense layer is used that gives final prediction results. Gated-FCN is an end-to-end forecasting model that does not require any other model for enhancing its forecasting efficiency. Different activation functions are initially analyzed to determine how the proposed model learns complex patterns from the time series data. Later, the activation function having the best accuracy is used for forecasting. The proposed model extracts both spatial and temporal features from the data. Furthermore, this paper also provides predictive and exploratory data analyses to assist policymakers in making optimal decisions regarding power production and dispatch. In order to demonstrate the applicability of the proposed technique, the simulations are performed using nine years’ load consumption data taken from Independent System Operators New England (ISO-NE). The comparison with five state-of-the-art techniques is also provided to prove the fact that Gated-FCN gives the best forecasting accuracy as compared to other benchmark techniques in terms of two performance metrics: Mean Absolute Percentage Error (MAPE) and Root Mean Square Error (RMSE).
2,988
Please write an abstract with title: Improved 5G-AKA Scheme Based on Identity Pool and Bloom Filter, and key words: Protocols, Home automation, 5G mobile communication, Conferences, Authentication, Synchronization, Standards. Abstract: 5G-AKA is an identity authentication protocol for 5G network that ensures communication security, such as the network and subscribers. However, the existing standards simply associate 5G Globally Unique Temporary UE Identity (GUTI) with the Subscription Permanent Identifier (SUPI) in the Home Network (HN) as a temporary identity solution for 5G subscribers, UE cannot quickly change the 5G-GUTI according to its own needs. Moreover, the current Sequence Number (SQN) synchronization mechanism will cause low authentication efficiency in the specific situation. To address the above issues, we use Bloom filter to establish a many-to-one mapping relationship between the identity and the UE, so as to achieve rapid verification of the identifier. Based on this, a mechanism that allows the UE to change the temporary identity and a fast authentication mechanism under the condition of sequence out-of-synchronization are proposed. Security analysis and experimental results demonstrate that the proposed scheme is efficient, secure, and compatible with the existing system.
2,989
Please write an abstract with title: Neural network based soft sensor for critical parameter estimation of gas turbine engine, and key words: Temperature measurement, Temperature sensors, Predictive models, Data models, Sensors, Integrated circuit modeling, Engines. Abstract: It is often difficult to implement instrumentation in the intricate passages of a Aero Gas Turbine Engine (GTE). These instrumentations are to be critically monitored and evaluated during the developmental testing for estimating the performance and health of the GTE before it attains maturity into a qualified flying machine. Soft sensors are often implemented to infer parameters which are otherwise hard to measure variables. In this work a ANN based soft sensor approach is developed for estimating set of five parameters which are hard to measure temperatures and pressures of secondary air system (SAS) of a GTE. The soft sensor is developed using a large sample set of 50000 samples collected over a period during the developmental testing of a GTE program. ANN model is developed with multiple inputs and output nodes. Optimum numbers of hidden layers are chosen. Using the main measured gas path pressures, temperatures and spool speeds as the input, the soft sensor infers the various SAS parameters which can be used for both online monitoring and off line data analysis.
2,990
Please write an abstract with title: Visual Sentiment Analysis With Social Relations-Guided Multiattention Networks, and key words: Visualization, Feature extraction, Sentiment analysis, Correlation, Semantics, Heterogeneous networks, Analytical models. Abstract: These days, social media users tend to express their feelings through sharing images online. Capturing the emotions embedded in these social images involves great research challenges and practical values. Most existing works concentrate on extracting the visual feature from a global view, while ignoring the fact that visual objects are also rich in emotion. How to leverage the multilevel visual features to improve the sentiment analysis performance is important yet challenging. Besides, existing works view each social image as an independent sample while ignoring the rich correlations among social images, which may be helpful in detecting visual emotion. In this article, we propose a novel model called social relations-guided multiattention networks (SRGMANs) to incorporate both the multilevel (region-level and object-level) visual features of a single image and the correlations among multiple social images to conduct visual sentiment analysis. Specifically, we first construct a heterogeneous network consisting of various types of social relations and introduce a heterogeneous network embedding method to learn the network representation for each image. Then, two visual attention branches (region attention network and object attention network) are devised to extract emotional and discriminative visual features. For each branch, we design a self-attention module to capture the emotional dependencies among visual parts. Besides, a network-guided attention module is also designed in each branch to focus on more network-related emotional visual parts with the guidance of the topology information. Finally, the attended visual features from the two attention models, together with network representation features, are combined within a holistic framework to predict the sentiment of social images. Extensive experiments demonstrate the superiority of our model on three benchmark datasets.
2,991
Please write an abstract with title: Constrained-optimization Approach Delivers Superior Classical Performance for Graph Partitioning via Quantum-ready Method, and key words: Quantum computing, Organizations, Tools, Linear programming, Software, Partitioning algorithms, Optimization. Abstract: Graph partitioning is one of an important set of well-known compute-intense (NP-hard) graph problems that devolve to discrete constrained optimization. We sampled solutions to the problem via two different quantum-ready methods to understand the strengths and weaknesses of each method. First we formulated and sampled the problem as a quadratic unconstrained binary optimization (QUBO) problem, via the best known QUBO formulation, using a best-in-class QUBO sampler running purely classically. Second, we formulated the problem at a higher level, as a set of constraints and an objective function, and sampled it with a recently developed constrained-optimization sampler (which generates QUBOs and also samples them classically). We find that both approaches often deliver better partitions than the purpose-built classical graph partitioners. Further, we find that the constrained-optimization approach is often able to deliver better partitions in less time than the bespoke-QUBO approach, without specific knowledge of the graph-partitioning problem. Stepping back from graph partitioning itself, one key question is whether bespoke algorithms for high-value problems or general tools for classes of problems are more likely to deliver the power of QCs to a broad market of real-world users. We believe this early evidence, though anecdotal, supports the proposition that general tools may contribute significant benefit to a range of problems, expanding the impact of QCs on industry and society. The fact that this benefit is independent of the low-level sampler employed, whether classical software or one of a variety of QC architectures, reinforces the need for further work on high-level optimization. The commercial availability in the cloud of such software today, delivering superior classical performance for some problems, enables quantum-forward organizations to migrate to quantum-ready methods now, accelerating progress toward quantum advantage and ensuring sampler software evolves to address the problems such organizations value.
2,992
Please write an abstract with title: Made-to-measure technologies for an online clothing store, and key words: Clothing, Web server, Spatial databases, Layout, Application software, Animation, Information retrieval, Information geometry, Computer architecture, Delay. Abstract: The Internet is a compelling channel for selling garments. Several recent initiatives by companies such as Nordstrom, Macy's, and Lands End focus on made-to-measure manufacturing and shopping via the Internet. We present a Web application that provides more powerful access to and manipulation of clothing to facilitate clothing design, pattern derivation, and sizing. We apply 3D graphics technology to help create and simulate the virtual store.
2,993
Please write an abstract with title: Handling the Inconsistency of Relative Map Filter, and key words: Simultaneous localization and mapping, Kalman filters, Equations, Laboratories, Navigation, Mobile robots, Convergence, Robot sensing systems, Motion estimation, Robot motion. Abstract: In [5], a version of Relative Map Filter (RMF) is proposed to solve the simultaneous localization and map building (SLAM) problem. In the RMF, the map states contain only quantities invariant under shift and rotation. The estimation of the map states and their correlations is carried out in an optimal way using the Kalman filter. However, the dependency among the map states is not taken into account, thus the resulting map states are inconsistent. This paper presents two methods to enforce the consistency of the relative map states. The idea is to maintain a geometrically consistent map by solving a set of constraints between the map states. Experimental results obtained by using the proposed methods on real platform data show better performance than those deduced from the original RMF.
2,994
Please write an abstract with title: Research on the Influence of Integrated Demand Response in Multiple Energy System, and key words: Couplings, Costs, Conferences, Energy conversion, Demand response, Industrial plants, Temperature control. Abstract: With the influence of the energy internet, traditional demand response has evolved to the integrated demand response, which can achieve the flexible operation of the whole system, improve the energy utilization efficiency and reduce operating costs. In order to optimize the operation of the industrial plant with multiple energy needs, the equipment model, energy coupling model, load model and demand response model of the integrated energy system of the industrial plant are established. Then, based on the above model, an optimal operation model for the integrated energy system with economy as the goal is established. Finally, the operating cost and equipment output of the system before and after the industrial plant participates in the integrated demand response are compared and analyzed using typical daily load operation data of the industrial plant. The result shows that the integrated energy system participating in the integrated demand response can effectively reduce operating costs and load demand during peak hours of power consumption.
2,995
Please write an abstract with title: Adaptive Dynamic Window Approach for Local Navigation, and key words: Navigation, Reinforcement learning, Robot sensing systems, Prediction algorithms, Cost function, Trajectory, Collision avoidance. Abstract: Local navigation is an essential ability of any mobile robot working in a real-world environment. One of the most commonly used methods for local navigation is the Dynamic Window Approach (DWA), which heavily depends on the settings of the parameters in its cost function. Since the optimal choice of the parameters depends on the environment that may significantly vary and change at any time, the parameters should be chosen dynamically in a data-driven way. To cope with this problem, we propose a novel deep convolutional neural network, which dynamically predicts these parameters considering the sensor readings. The network is trained using a state-of-the art reinforcement learning algorithm. In this way, we combine the power of data-driven learning and the dynamic model of the robot, enabling adaptation to the current environment as well as guaranteeing collision-free movement and smooth trajectories of the mobile robot. The experimental results show that the proposed method outperforms the DWA method as well as its recent extension.
2,996
Please write an abstract with title: A Novel Training Algorithm for Neuro-control of Discrete-time Nonlinear Systems, and key words: Training, Backpropagation, Sensitivity, Control design, Linear approximation, Communications technology, Feedforward neural networks. Abstract: Guntur District, AP, India Guntur District, AP, India Physical systems are inherently nonlinear, and traditional methods of controlling such systems are based on a first-order linear approximation. Even though several nonlinear control design methods have been proposed in the past decades, most of these require analytical models. In contrast, artificial neural networks have been used as models for control since the paper published by Narendra and Parthasarathy in 1990. These recurrent networks are trained using the back-propagation algorithm, popular in other contexts. The principal issue was the notoriously slow convergence. More recently, an online sequential learning algorithm was proposed, which had better convergence properties. However, this algorithm applies to feedforward neural networks with a single hidden layer. We propose extending this algorithm’s applicability to networks with two hidden layers. The extension is achieved by incorporating error back-propagation. Further, we demonstrate that this novel algorithm has better convergence properties.
2,997
Please write an abstract with title: A Study of the Impact of the Contention Window on the Performance of IEEE 802.11bd Networks with Channel Bonding, and key words: Analytical models, Roads, Packet loss, Quality of service, Delays, Bonding, IEEE 802.11n Standard. Abstract: Nowadays, Vehicle-To-Everything (V2X) networks are actively developing. Most of the already deployed V2X networks are based on the IEEE 802.11p standard. However, these networks can provide only basic V2X applications and will unlikely fulfill stringent requirements of modern V2X applications. Thus, the IEEE has launched a new IEEE 802.11bd standard. A significant novelty of this standard is channel bonding. IEEE 802.11bd describes two channel bonding techniques, which differ from the legacy one used in modern WiFi networks. Our study performs a comparative analysis of the various channel bonding techniques and a single-channel access method from IEEE 802.11p via simulation. We compare them under different contention window sizes and demonstrate that the legacy technique provides the best quality of service in terms of frame transmission delays and packet loss ratio. Moreover, we have found a quasi-optimal contention window size for the legacy technique.
2,998
Please write an abstract with title: Reactive collision avoidance for ASVs based on control barrier functions, and key words: Marine vehicles, Collision avoidance, Safety, Task analysis, Sea surface, Robots. Abstract: A reactive collision avoidance method for autonomous surface vehicles based on control barrier functions (CBFs) is proposed. An encounter between the ownship (the vessel that we control) and a target ship is classified, in accordance with the International Regulations for Preventing Collisions at Sea (COLREGs), to be either a head-on, overtake, give-way, stand-on or a safe situation with respect to the ownship. Subsequently, a spatial region is assigned to the target ship based on the classification, and this region is used to define a collision-free set. Based on this, a CBF is formulated to ensure forward invariance of the collision-free set. This CBF can then be applied as an inequality constraint to any guidance, navigation and control system with an optimization-based trajectory tracking or thrust allocation system. The method is verified through simulations and is seen to handle head-on, overtaking and crossing situations with both give-way and stand-on duty in compliance with COLREGs rules 13-15 and 17.
2,999
Please write an abstract with title: Lumped Parameter Model of the Systemic Circulation and a Rotary Blood Pump Interaction, and key words: Heart, Solid modeling, Artificial satellites, Biological system modeling, Mathematical model, Blood, Biomedical engineering. Abstract: Heart failure is the most common worldwide mortality reason. Although heart transplantation is a patient’s treatment gold standard, the lack of donor hearts problem remains unsolved. Using rotary blood pumps is the most effective method for patients waiting for transplantation. In this work, we introduce a lumped parameter model developed to simulate the interaction between the systemic circulation and the rotary blood pump Sputnik. The interaction was studied at a pump rotor speed of 5000 – 8500 rpm. This simulation demonstrated that the pump changed mean pressure in the systemic vessels increased to normal (from 75 mmHg to 97 mmHg), and the blood flow increased to normal (from 3.9 l/min to 5.2 l/min). The simulation results confirm the developed mathematical model can be used to model various stages of heart failure and the pump support level.