ID
int64 0
400k
| content
stringlengths 97
5.85k
|
|---|---|
3,100
|
Please write an abstract with title: Providing Response Times Guarantees for Mixed-Criticality Network Slicing in 5G, and key words: Wireless communication, 5G mobile communication, Network slicing, Smart grids, Performance analysis, Time factors, Resource management. Abstract: Mission critical applications in domains such as Industry 4.0, autonomous vehicles or Smart Grids are increasingly dependent on flexible, yet highly reliable communication systems. In this context, Fifth Generation of mobile Communication Networks (5G) promises to support mixed-criticality applications on a single unified physical communication network. This is achieved by a novel approach known as network slicing, that promises to fulfil diverging requirements while providing strict separation between network tenants. We focus in this work on hard performance guarantees by formalizing an analytical method for bounding response times in mixed-criticality 5G network slicing. We reduce pessimism considering models on workload variations.
|
3,101
|
Please write an abstract with title: Data Integration for Big Data analytics to identify the gaps in Rheumatoid Arthritis Genomics in a Post-GWAS era, and key words: Proteins, Machine learning algorithms, Pipelines, Genomics, Data integration, Machine learning, Big Data. Abstract: Genome-wide association studies (GWASs) enable simultaneous detection of several genetic variations. The variants that do not match GW ASs' significance threshold can be missed. We aimed at the identification of novel candidate single nucleotide polymorphisms (SNPs) for rheumatoid arthritis (RA) using data integration based bioinformatics for analysis of publically available big data that employ computational processing and machine learning. 340 GW AS significant RA SNPs were searched for the proxy SNPs using SNipA proxy search tool that were then scored and annotated. Of 9194 proxy SNPs, 492 SNPs returned significant RegulomeDB scores and were linked to 94 expression quantitative trait loci (eQTLs). Protein interaction analysis identified 13 ‘hub proteins’ expressed by these eQTLs linked to 54 SNPs. Of these, nine were already GW AS significant RA SNPs. Remaining 45 novel SNPs, mapped to 11 genomic loci, are novel candidate SNPs for RA. The proposed pipeline can be integrated in an automated machine learning algorithm to automate the identification of novel SNPs for other disease with underlying complex genomics.
|
3,102
|
Please write an abstract with title: Improving Volume Diagnosis and Debug with Test Failure Clustering and Reorganization, and key words: Fault diagnosis, Root cause analysis, Systematics, Runtime, Production, Tools, Manufacturing. Abstract: Volume diagnosis and debug play a key role in identifying systematic test failures caused by manufacturing defectivity, design marginalities, and test overkill. However, diagnosis tools often suffer from poor diagnosis resolution. In this paper, we propose techniques to improve diagnosis resolution by test failure clustering and reorganization. The effectiveness of our techniques is demonstrated on two industrial designs in cutting-edge process nodes and verified by targeted analysis and testing. The number of suspects is reduced by 3.1x and 575.2x on average. The proposed techniques can be implemented using existing commercial diagnosis tools with runtime overheads below 1%.
|
3,103
|
Please write an abstract with title: Comparative analysis based on the switching frequency of modulation techniques for MMC applications, and key words: Phase modulation, Capacitors, Switching frequency, Frequency modulation, Voltage control, Pulse width modulation. Abstract: The Modular Multilevel Converter (MMC) is a consolidated attractive technology taking great importance in medium / high power applications compared to other topologies of multilevel converters. One of the main lines of research is on voltage modulation techniques and its influence on the converter performance. Specifically for a relatively high number of submodules (SMs) that may depend on the specific application type. In this paper, a brief overview of the MMC basic operation is presented and the modulation techniques based on switching frequency as the main parameter are studied. Also, three different modulation techniques are studied to later be performed in Matlab/Simulink, in simulation is considering two cases of MMC systems with 5 and 20 SMs/arm, in order to comparing the impact of modulation technique on MMC performance.
|
3,104
|
Please write an abstract with title: Accessibility of Entrepreneurial Ecosystem Elements: A Qualitative Comparative Analysis of Developed and Emerging Economies, and key words: Entrepreneurial Ecosystem, Measurements, Configuration, Developed and Emerging Economies, Qualitative Comparative Analysis, New Venture Survival. Abstract: The Entrepreneurial Ecosystem construct is gaining widespread popularity due to its holistic approach to enabling entrepreneurship, which in turn fosters economic growth. Consequently, a plethora of studies have been devoted to theorising, examining its attributes, and measuring its impact, with the aim of identifying ways to enhance its contribution. Despite its significance, however, there are challenges associated with identifying suitable measurement instruments that can assess these attributes and determine how they jointly facilitate the survival of new ventures in diverse regions. In this paper, we utilise Qualitative Comparative Analysis to compare 167 ventures in developed and emerging economies, to determine how the various elements of the entrepreneurial ecosystem combine to achieve the desired outcome of new venture survival. Our study adds to the existing literature on ecosystem measurement and provides valuable insights for policymakers and practitioners in identifying potential configurations of ecosystem elements that can support entrepreneurship in different regions. It also represents a novel approach to entrepreneurial ecosystem studies, paving the way for future empirical entrepreneurship research.
|
3,105
|
Please write an abstract with title: Optimal Evaluation and Detection of Alzheimer's, and key words: Neurological diseases, Calculators, Magnetic resonance imaging, Transfer learning, Medical services, Predictive models, Cameras. Abstract: Alzheimer's disease is a chronic and degenerative neurological disease that worsens with time. However, there is a medication that can temporarily alleviate the symptoms. With the help of magnetic resonance imaging, Alzheimer's disease is predicted using a deep residual network. Moderate demented, Mild demented, very mild demented, Non-demented are classified as four stages of dementia. This is predicted by using a ResN et50 model, a pre-trained and transfer learning shift-invariant artificial neural network, which gave an accuracy of 87.05%
|
3,106
|
Please write an abstract with title: Simplified Space-Vector Modulation Strategy for Indirect Matrix Converter With Common-Mode Voltage and Harmonic Distortion Reduction, and key words: Support vector machines, Phase modulation, Rectifiers, Switches, Inverters, Harmonic distortion, Matrix converters. Abstract: This paper presents a simple space vector modulation (SVM) strategy for a three-phase indirect matrix converter (IMC) to reduce common-mode voltage (CMV) and output harmonic distortion. To suppress the CMV peak value to 57.7% of the input phase voltage, three active voltage vectors are used to generate the desired output voltage with arbitrary amplitude and frequency. However, the output waveform quality of the IMC deteriorates due to the absence of zero voltage vectors. To overcome this problem, this paper proposes to redesign control of the rectifier stage by utilizing three active current vectors instead of two, as is common. Consequently, a constant average DC-link voltage is achieved, which can improve the output performance in terms of output voltage and current harmonic distortion. Compared to the existing strategies, the proposed strategy can reduce the CMV and maintain output harmonic distortion without increasing the computation burden. Implementation of the proposed strategy is also straightforward and simple. Simulated and experimental results are provided to verify the effectiveness of the proposed strategy.
|
3,107
|
Please write an abstract with title: Deep Unfolding Network for PAPR Reduction in Multicarrier OFDM Systems, and key words: Peak to average power ratio, Computational modeling, Biological system modeling, Training, Computational complexity, Frequency-domain analysis, Neural networks. Abstract: In this letter, we propose a Deep Unfolding Network called PR-DUN to reduce the peak-to-average power ratio (PAPR), which is a thorny problem in Orthogonal Frequency-Division Multiplexing (OFDM) systems. The proposed multi-layer model is constructed by unrolling an iterative algorithm resulting in layers with trainable parameters, which are optimized to minimize a loss function related to the PAPR value. The deep unfolding model uses the backpropagation algorithm to transfer gradients backwards to adjust parameters. Furthermore, the proposed scheme can accommodate any transmit power constraint, and therefore can control the power increase caused by the auxiliary signal. Simulation results show that the proposed PR-DUN model achieves a larger PAPR reduction and a smaller bit error rate while being less computationally intensive than related solutions.
|
3,108
|
Please write an abstract with title: O-RAN based proactive ANR optimization, and key words: 5G mobile communication, Machine learning, Handover, Software, Hardware, Optimization, Radio access networks. Abstract: As telecommunication networks evolve towards 5G, emerging technologies such as Massive Internet of Thing (mIoT) and massive Machine Type Communication(mMTC) are predicted to add billions of wireless devices to the 5G network.Tightly coupled Radio Access Network (RAN) devices are one of the major bottlenecks in the expansion of 5G network. To cater the dynamic and massive demand of the network,requires decoupling the network device hardware with its software function. Open Radio Access Network (ORAN) framework aims to achieve the decoupling of RAN device hardware with its function software to achieve auto-scaling of RAN network functions to meet the ever increasing and dynamic demand for network access. The 5G network needs to be densified to increase the capacity and coverage of networks. However network densification comes with its own challenges, as number of cells increase, it becomes more complex to manage and optimize neighbour relationships. Automatic Neighbour Relation (ANR) is a well know Self Organizing Network (SON) function that is used to manage neighbour cell relationships,optimization of the Neighbour Cell Relation Table (NCRT), significantly improves the handover timing, reduces the call drop rates and increase the total number of successful handovers. This paper investigates a new approach for ANR optimization for the next generation networks using O-RAN defined open interfaces and architectural platform.The approach would leverage O-RAN architecture that supports implementation of intelligent models and proposes a Machine Learning (ML) based proactive ANR optimization technique to improve gNodeB (gNB) handovers.
|
3,109
|
Please write an abstract with title: Reduced order cross-directional controller design for sheet forming processes, and key words: Actuators, Manufacturing industries, Process design, Predictive models, Predictive control, Reduced order systems, Manufacturing processes, Pulp manufacturing, Moisture, Paper making machines. Abstract: This paper presents a novel control strategy that efficiently addresses the issue of the large number of cross machine direction actuators with which sheet-forming processes are equipped. The approach relies on using the Karhunen-Loeve expansion (KLE) to model the disturbances affecting the properties of interest together with vector autoregressive processes to design a low-order representation of the disturbances. Subsequently, the control space is also reduced by appropriate transformations that rely on the use of KLE. Model predictive control is then implemented on the reduced order model and an optimal solution is obtained in that space, satisfying various types of actuator constraints defined on the full-order system and minimizing the cross-directional variability. The solution from the reduced order model is then projected back to the original space for implementation on the real plant. Simulation examples are included to illustrate the method.
|
3,110
|
Please write an abstract with title: Operational Effectiveness Evaluation of Space-based Information System based on Improved AHP-BPNN Model, and key words: Performance evaluation, Simulation, Neural networks, Mathematical models, Data models, Indexes, Resource management. Abstract: In view of the characteristics of complex influencing factors and coupling interaction of various combat capabilities in the effectiveness evaluation of space- based information system (SIS), the effectiveness evaluation method of SIS based on improved AHP-BP neural network was proposed, which was mapped to multi-attribute decision making problem. The weight of experts was determined from the objective perspective to improve the traditional AHP and calculate the relevant influencing factors among experts. The comprehensive evaluation value is obtained according to the evaluation matrix, and the comprehensive weight of the index is obtained by the weighted average of the expert weight and the index weight. The evaluation data obtained from improved AHP and combat simulation data are used as prior samples to train BPNN to obtain the effectiveness evaluation model. Finally, sample data were obtained through MATLAB and STK co-simulation to evaluate the operational effectiveness of SIS and verify the effectiveness of the model.
|
3,111
|
Please write an abstract with title: Distributed neurochemical sensing: in vitro experiments, and key words: In vitro, Neurotransmitters, Electrodes, Counting circuits, Clocks, Sensor systems, In vivo, Energy consumption, Current measurement, Shift registers. Abstract: Experimental results characterizing a very-large scale integration (VLSI) potentiostat sensor system for recording distributed neurotransmitter activity are presented. Neurotransmitter concentration is electrochemically transduced using an array of carbon electrodes. The resultant currents are then processed in parallel by eight integrated potentiostat channels consisting of a current amplification stage, current-mode delta-sigma A/D converter, and counting decimator. Electrical characterization has shown that the VLSI potentiostat is sensitive to picoampere levels of input current. Furthermore, both static and dynamic neurochemical measurements of dopamine are verified in vitro, proving the utility of the device for brain slice studies. Lastly, a biologically inspired experiment, whereby the catabolism of dopamine is mimicked with the addition of the COMT enzyme to modulate dopamine levels in vitro.
|
3,112
|
Please write an abstract with title: Channel access and power control algorithms with QoS for CDMA based wireless ad-hoc networks, and key words: Power control, Multiaccess communication, Ad hoc networks, Quality of service, Protection, Costs, Wireless networks, Resource management, Access protocols, Land mobile radio cellular systems. Abstract: The low cost distributed network may be a feasible solution scheme for the wireless networks in the future. Therefore, the wireless ad-hoc networks are taken more attention recently. In this paper, the novel distributed channel access and power control algorithms are proposed for the ad-hoc network based on code division multiple access (CDMA) technology. These algorithms are distributed/autonomous, maintain the required quality of service (QoS) of active links, and make the channel access process efficiently.
|
3,113
|
Please write an abstract with title: Non-repeatable flutter of magnetic recording disks, and key words: Magnetic recording, Magnetic heads, Servomechanisms, Tracking, Frequency, Magnetic flux, Thermal expansion, Actuators, Disk drives. Abstract: The non-repeatable disk flutter in a magnetic recording disk drive is investigated using laser Doppler interferometry. The transverse non-repeatable motion at the outside and the inside of a 350 mm (14") disk is measured, and the amplitude distribution of the true disk deformation is obtained. Results are then presented for a helium environment, in which flutter is substantially reduced. In addition, the peak statistics of the flutter are studied, and it is shown that they follow a Rayleigh distribution instead of a Gaussian distribution. Finally, the frequency content of the flutter is presented.
|
3,114
|
Please write an abstract with title: Remote Beamforming Scheme With Fixed Wavelength Allocation for Radio-Over-Fiber Systems Employing Single-Mode Fiber, and key words: Optical fibers, Array signal processing, Radio frequency, Optical fiber dispersion, Optical variables control, Frequency modulation, Resource management. Abstract: This paper presents a remote beamforming scheme with fixed wavelength allocation for radio-over-fiber (RoF) systems employing single-mode fiber (SMF). In the proposed scheme, wavelengths with equal narrow spacing are fixedly assigned to each antenna element to equalize the time delay differences between adjacent wavelengths caused by chromatic dispersion. The beam direction of base station (BS) is controlled only by phase control at central station (CS). This offers efficient wavelength utilization and completely remote beam control without information of optical fiber length, and supports systems employing high carrier frequency and long optical fiber. The beamforming performance of the scheme is evaluated theoretically and experimentally. It is shown that the beam pattern depends on optical intensity modulation frequency instead of radiated frequency. Simulations indicate that the required wavelength spacing to obtain a desired beam pattern becomes narrower as more wavelengths are used or intensity modulation frequency becomes higher. Finally, to evaluate the feasibility of the scheme, experiments are conducted under the condition of intensity modulation frequency of 10 GHz, 10 km SMF, and four element array antenna. The results substantially agree with the simulation results, and the main lobe level decrease is within 0.04 dB at wavelength spacing of 50–400 GHz (0.39–3.13 nm on average in C band). The results confirm that the scheme can achieve almost ideal beam patterns and realize beamforming and beamscanning.
|
3,115
|
Please write an abstract with title: Tunable zerogap technologies for terahertz wave manipulations, and key words: Microwave technology, Bending, Real-time systems, Plastics, Substrates, Microwave propagation. Abstract: We introduce technologies that vary the metallic gap widths in real time and on wafer scale, from subnanometers to several tens of nanometers, for the purpose of manipulating terahertz and microwave propagation with an extinction better than 10,000. Plastic substrates are used and the sample remains robust even after 10,000 bending repetitions.
|
3,116
|
Please write an abstract with title: Power System Model, and key words: Power transmission lines, Mathematical model, Inductance, Power system stability, Analytical models, Synchronous machines, Computational modeling. Abstract: The conventional quasi‐steady‐state model for transient stability (TS) analysis of power systems assumes that the frequency is constant and equal to the nominal one for the definition of network parameters such as series reactances and shunt susceptances. This chapter presents a frequency dependent (FD) model for TS analysis based on the frequency divider formula (FDF). The FDF indicates that the value of the frequency varies as a continuum along the branches of the grid the boundary conditions are constituted by synchronous machine rotor speeds and measurements at the interconnection buses. Hence, during a transient, the frequency not only varies from bus to bus, but also along the length of series reactances of transmission lines and transformers. The chapter compares the dynamic behavior of the FD model of power system with the conventional TS model as well as of a dynamic phasor model through the 1,479‐bus dynamic model of the AIITS.
|
3,117
|
Please write an abstract with title: Short-Circuit Strength Analysis of Distribution Transformer with OblongWinding by FEM, and key words: Windings, Force, Time series analysis, Bending, Transformers, Stability analysis, Finite element analysis. Abstract: Aiming at the problem of insufficient short-circuit strength of distribution transformer with oblong winding, the three-phase symmetrical short circuit simulation of a 630KVA oblong distribution transformer is carried out by using finite element software. The time series calculation of the short circuit impedance of the transformer and the strength check analysis of each part of the oblong winding are carried out. The short circuit force distribution law of the foil winding of the oblong transformer is obtained, which provides a good reference method for the short circuit check of the distribution transformer.
|
3,118
|
Please write an abstract with title: Dance movement: a focus on the technology, and key words: Application software, Optical recording, Mechanical sensors, Animation, Production, Internet, Sensor systems, Humans, Optical sensors, Exoskeletons. Abstract: Dance notation systems, like music notes, enable documentation of symbolic representations of movement as signs on paper for individual analysis and interpretation. Today, dance notation systems operate within a digital environment in dance notation applications that facilitate the process of recording movement. The author argues that a key objective in the development of these applications should be to provide the user with an unambiguous method to record and represent movement. These applications offer varying functionality in their use of technology for the representation of movement and can be broadly defined in three different categories. Dance notation applications make up the first category - they help notate or record specific forms of movement using dance notation. Notation-based applications, the second category, include applications that use dance notation as a basis for their development. The last category, dance technology, consists of applications that use emerging technologies to record and visualize movement. While each application has a defined use, it's important to consider how effective the technologies they employ are in successfully achieving their objectives. In this article, the author focuses on dance applications in these three categories. The author considers the limitations of existing technologies in their ability to effectively describe and record movement within a specific context.
|
3,119
|
Please write an abstract with title: Analytical and experimental study on noncontact sensing with embedded fiber-optic sensors in rotating metal parts, and key words: Optical fiber sensors, Layered manufacturing, Performance gain, Prototypes, Strain measurement, Thermal sensors, Tunable circuits and devices, Diode lasers, Monitoring, Bragg gratings. Abstract: Layered manufacturing can build functional metal parts with fiber-optic sensors placed within the structure and fully embedded. These sensors can be used to gain data for validating or improving designs during the prototype stage or to obtain information on the performance and structural integrity of functional components in service in hostile environment. This paper presents a new technique for noncontact thermal strain measurement in rotating metal components with embedded fiber Bragg grating sensors. Two different tunable laser diodes were incorporated into the sensing system to monitor the Bragg grating wavelength shifts, and thus the thermal strain can be determined. Experimental results validate the feasibility of this technique. The noncontact sensing system could provide a useful sensing tool to optimize the design for turbine blades and other rotary metal tooling, especially those exposed to hostile environments.
|
3,120
|
Please write an abstract with title: Estimating the severity of knee osteoarthritis using Deep Convolutional Neural Network based on Contrast Limited Adaptive Histogram Equalization technique, and key words: Knee, Adaptation models, Histograms, Three-dimensional displays, Medical services, Adaptive equalizers, Convolutional neural networks. Abstract: Osteoarthritis is a degenerative joint disease that affects larger joints, including the knee, foot, hip, and spine by infecting the cartilage, which causes bones to rub against each other in extreme pain. Knee osteoarthritis (KOA) manual inspections demand a skilled physician to examine the x-ray image. In this paper, a method for detecting the severity of knee osteoarthritis using a Deep Convolutional Neural Network (3D CNN) is proposed in order to benefit physicians by examining the X-ray images. Here, the Contrast Limited Adaptive Histogram Equalization (CLAHE) technique is used to enhance contrast in images, and this strengthens the current approach. This study presents two models: one for identifying and categorizing normal (KL 0,1) and osteoarthritic results (KL 2, 3, 4). The second model is to assist in distinguishing between severe grades (KL 3, 4) and non-severe grades (KL 2) or normal findings (KL 0,1). For examination, X-ray images from the Knee Osteoarthritis severity grading dataset and the Osteoarthritis Initiative (OAI) dataset are used. Experimental results have demonstrated that the proposed technique achieves accuracy rate of 85.50%, outperforming a number of existing approaches.
|
3,121
|
Please write an abstract with title: Personal firewall for Pocket PC 2003: design & implementation, and key words: Information security, Personal digital assistants, Protection, Internet, Wires, Pervasive computing, Access control, Computer hacking, Computer viruses, Hardware. Abstract: Personal digital assistants (PDAs) are widely used and becoming indispensable tools of everyday life. Wired or wireless connection enables PDA users to connect to the Internet from any place, making security an extremely important issue in a pervasive computing environment. This paper investigates how to build a personal firewall for PDAs running Pocket PC 2003. This personal firewall allows the PDA user to perform access control based on a user-defined policy, and hence provides a security perimeter between the public network and the PDA. We provide a complete technical detail on how the firewall can be built in a Pocket PC 2003 device. To the best of our knowledge, this is the first design and implementation of personal firewalls for Pocket PC 2003 device which is explicit, open source and successfully implemented in any Pocket PC 2003 compatible devices, including HP iPaq H5550 and XDA2 02 smart phone.
|
3,122
|
Please write an abstract with title: Applications for Machine Learning in Semiconductor Manufacturing and Test (Invited Paper), and key words: Machine learning algorithms, Machine learning, Manufacturing. Abstract: In this invited paper, applications for Machine Learning (ML) in several areas of semiconductor manufacturing and test are reviewed and potential opportunities are discussed.
|
3,123
|
Please write an abstract with title: Commuting and stable feedback design for switched linear discrete-time systems, and key words: Linear systems, Control systems, State feedback, Switched systems, Stability, Lyapunov method, Sufficient conditions, Linear feedback control systems, Controllability, Switching systems. Abstract: In the paper, commuting and stable feedback design for switched linear systems is investigated. This problem is formulated as to build up state feedback controller for each subsystem such that the closed-loop systems are not only asymptotically stable but also commuting each other. A new concept, common admissible eigenvector set (CAES), is introduced to establish necessary/sufficient conditions for such feedback controllers. For second-order systems, a equivalent condition is established. Moreover, a parametrization of the CAES is also obtained. The motivation comes from stabilization of switched linear systems which consist of a family of LTI systems and a switching law specifying the switching between them, where if all the subsystems are stable and commuting each other, then the total system is stable under arbitrary switching.
|
3,124
|
Please write an abstract with title: Multiple-coupled microstrip hairpin-resonator filter, and key words: Microstrip filters, Resonator filters, Couplings, Prototypes, Chebyshev approximation, Band pass filters, Attenuation, Frequency, Passband, Microstrip resonators. Abstract: This paper presents the design of a six-resonator multiple-coupled microstrip filter. A lowpass prototype is developed first based on the conventional Chebyshev filter. According to the lowpass prototype, the design of a six-resonator multiple-coupled microstrip hairpin filter at 6 GHz is completed with the aid of EM simulation. The experimental results are demonstrated and discussed.
|
3,125
|
Please write an abstract with title: Designing human-robot interaction via physical world objects, and key words: Human robot interaction, Robot sensing systems, Humanoid robots, Robotics and automation. Abstract: This paper proposes a new communication model based on physical world objects. In usual human-robot interaction a human looks on the robot's behaviors without responding to them and seldom immerses him/herself in the interaction. The communication model achieves human's immersion in interaction with two types of behaviors. The first draws human's attention to a physical world object or a physical world state. The second stimulates a human's feeling under the attention. The novel idea of the model is to employ the actual physical objects to mediate the human-robot interaction. In particular, since the second behavior relates directly to a sort of human's sensory perception, it is easy for a human to become aware of the referent of the robot's behavior. As a result of the two behaviors, he/she begins to infer robot's intentions and immerses him/herself in the interaction.
|
3,126
|
Please write an abstract with title: Cybersecurity and Information War, and key words: Information science, TV, Films, Weapons, Sociology, Music, Media. Abstract: In the 21st century, information is becoming the most powerful weapon of the forces fighting for world domination. The amount and relevance of information available to the parties of confrontation have a direct impact on their combat capability. Thus, it is possible to influence the enemy's combat capability by destroying their equipment, infrastructure and manpower, or it is possible to influence his information exchange processes or introduce own information into the enemy's information systems. Consequently, the main goal of an information war is to influence the enemy's information in order to undermine his combat capability, as well as to protect own information from enemy influence. This article revealed the main forms of information warfare, such as cyberattack, infoagression, disinformation, propaganda and their specificity in the modern world.
|
3,127
|
Please write an abstract with title: A comparison of front- and backside-illuminated high-saturation power partially depleted absorber photodetectors, and key words: Photodiodes, Lighting, Radio frequency, Space charge, Photoconductivity, Thermal conductivity, Linear antenna arrays, Phased arrays, Optical arrays, High speed optical techniques. Abstract: A systematic study of high-saturation-current p-i-n In/sub 0.53/Ga/sub 0.47/As photodiodes with a partially depleted absorber (PDA) has been made under front (p-side) and back (n-side) illumination. The photodiode structure consists of an In/sub 0.53/Ga/sub 0.47/As absorption region (450-nm p-InGaAs, 250-nm unintentionally doped InGaAs, and 60-nm n-InGaAs) sandwiched between p- and n-InP layers. For front illumination of a 34-/spl mu/m-diameter photodiode at 2-V bias the saturation currents were 23 and 24 mA at 10 and 1 GHz, respectively. Under similar conditions, backside-illumination resulted in saturation currents of 76 mA (10 GHz) and >160 mA (1 GHz). Backside illumination of a 100-/spl mu/m-diameter photodiode achieved a saturation current >400 mA. For the case of front illumination the device lateral resistance dominates whereas for backside illumination the response is determined primarily by the space charge effect.
|
3,128
|
Please write an abstract with title: A kind of classification and regression tree algorithm for unusual customers recognition in telecom trade, and key words: Classification tree analysis, Regression tree analysis, Telecommunication computing. Abstract: The recognition of unusual customers is one of the most important applications in data mining. Using an example from telecom trade, This work presents a kind of classification and regression tree algorithm to recognize unusual customers in telecommunication trade databases (TCART for short). The TCART includes the following process: maximal classification tree construction, regression pruning and optimal classification tree selection. During the procedure of classification tree growing, we propose improved classification approaches. Finally, the TCART algorithm is validated by large numbers of customer data in the Zhejiang telecom database. The experimental results indicate that the TCART algorithm has the virtues of robustness and effectiveness.
|
3,129
|
Please write an abstract with title: On the tradeoffs between path computation efficiency and information abstraction in optical mesh networks, and key words: Computer networks, Optical computing, Intelligent networks, Optical fiber networks, Mesh networks, Protection, Signal restoration, Distributed control, Optical receivers, Optical control. Abstract: Distributed, IP-based control architecture has been proposed for switched optical mesh networks, as a means to automate operations, enhance interoperability and facilitate the deployment of new applications. While distributed control in general enhances scalability and flexibility, it also offers challenges to path computation, especially for shared mesh restored paths, because of the summarization of link state information disseminated by the routing protocol. This paper discusses the tradeoffs between the path computation efficiency and the abstraction level of link state information. Several heuristic algorithms for computing shared mesh restored paths are described, which require different levels of abstraction and summarization of link resource sharing information. The performance of these algorithms is compared in term of the efficiency of network capacity utilization, the computation complexity, and the amount of required network information. We show that with appropriately aggregated link state information the proposed path computation algorithms are able to utilize the network resource very efficiently.
|
3,130
|
Please write an abstract with title: Joint optimization of transmit pulse shaping, guard interval length, and receiver side narrow-band interference mitigation in the HomePlugAV OFDM system, and key words: Pulse shaping methods, Narrowband, Interference, OFDM, Throughput, Power line communications, System performance, Filters, Jamming, Constraint optimization. Abstract: The primary subject of this paper is the selection of a pulse-shaping waveform for in-home power line communications. As system performance is also determined by other parameters affecting the length and shaping of the OFDM symbol, the problem formulation is expanded to also include the simultaneous selection of guard interval length and Hanning window length, creating a joint optimization problem. Given the constraints of allowing no transmit notch filters, and adequate receive side mitigation of narrow band jammers, we jointly optimize the selection of guard interval length, transmit pulse-shaping and receive side windowing for throughput performance on the average power line channel. Throughput performance is inferred from SNR data and associated guard interval overhead. We also present results of performance assessment and parameter selection, for the average power line channel, based on a collection of 120 measured power line channel impulse responses.
|
3,131
|
Please write an abstract with title: Simulation of transportation logistics, and key words: Logistics, Cities and towns, Airports, Modeling, Air transportation, Business, Road transportation, Costs, Marine vehicles, Systems engineering and theory. Abstract: In this paper, we discuss issues concerning the simulation of transportation systems. In particular, we demonstrate a number of implementation tricks that are designed to make the modeling and coding processes more efficient and transparent. We present examples involving the simulation of commercial airline and military sealift operations.
|
3,132
|
Please write an abstract with title: Real-time obstacle avoidance for manipulators and mobile robots, and key words: Manipulators, Mobile robots, Large Hadron Collider, Laboratories. Abstract: This paper presents a unique real-time obstacle avoidance approach for manipulators and mobile robots based on the "artificial potential field" concept. In this approach, collision avoidance, traditionally considered a high level planning problem, can be effectively distributed between different levels of control, allowing real-time robot operations in a complex environment. We have applied this obstacle avoidance scheme to robot arm using a new approach to the general problem of real-time manipulator control. We reformulated the manipulator control problem as direct control of manipulator motion in operational space-the space in which the task is originally described-rather than as control of the task's corresponding joint space motion obtained only after geometric and kinematic transformation. This method has been implemented in the COSMOS system for a PUMA 560 robot. Using visual sensing, real-time collision avoidance demonstrations on moving obstacles have been performed.
|
3,133
|
Please write an abstract with title: New FOM-Based Performance Evaluation of 600/650 V SiC and GaN Semiconductors for Next-Generation EV Drives, and key words: Silicon carbide, Inverters, Gallium nitride, Silicon, Performance evaluation, Switches, Semiconductor devices. Abstract: The drive inverter represents a central component of an electric vehicle (EV) drive train, being responsible for the DC/AC power conversion between the battery and the electrical machine. In this context, novel converter topologies adopting modern 600/650V wide bandgap (WBG) semiconductor devices will play a crucial role in improving the performance of next-generation drive inverters. In fact, WBG devices theoretically allow to achieve both higher inverter power density and higher conversion efficiency with respect to conventional silicon (Si) IGBT based solutions. Even though silicon carbide (SiC) devices are already well established in the automotive industry, high-voltage gallium nitride (GaN) devices are rapidly entering the market, promising higher theoretical performance but featuring a lower degree of maturity. As a consequence, it is currently not clear which semiconductor technology is most suited for future EV drive inverters. Therefore, this paper aims to address this gap providing a comparative performance evaluation of state-of-the-art SiC and GaN 600/650V active switches. In particular, a novel figure-of-merit (FOM) representing the minimum theoretical semiconductor losses under hard-switching operation is introduced. Remarkably, this FOM enables a fair and accurate performance comparison among semiconductor devices, allowing to clearly determine the best performing technology for a given set of application-specific conditions. The results of the comparative assessment show that currently available SiC and GaN active switch technologies can outperform each other depending on the semiconductor operating temperature and the converter switching frequency.
|
3,134
|
Please write an abstract with title: Optically controlled nonlinear absorption and third harmonic generation in azo-PMMA thin films, and key words: Optical control, Optical harmonic generation, Nonlinear optics, Optical films, Absorption, Transistors, Laser excitation, Switches, Polarization, Time measurement. Abstract: The third harmonic generation (THG) and nonlinear transmission (NT) were used to probe the change of /spl chi//sup (3)/ in azo-doped polymethylmethacrylate (PMMA) thin films. The observed phenomena can be interpreted by a microscopic model based on angular hole burning (AHB) and angular redistribution (AR) mechanisms of photoisomerization effect. In this experiment, the pumping effect on the THG and NT at different polarization directions is investigated. The variations of THG here are mainly due to the change of third order susceptibility /spl chi//sup (3)/ (-/spl omega/; /spl omega/, /spl omega/, -/spl omega/). As we switch on the pumping beam, the THG in the co-polarized configuration experiences a fast decay associated with the AHB in few seconds and, thereafter, it reaches the stationary state after a slow decay corresponding to the AR lasting for several minutes. When we turn off the pumping beam, THG will recover its original level by thermal relaxation. However, there is a small G increase in the cross-polarized configuration. Since the nonlinear absorption is related to the image part of /spl chi//sup (3)/ (-/spl omega/; /spl omega/, /spl omega/, -/spl omega/), the decrease in trans molecule number density corresponds to the decrease in Im /spl chi//sup (3)/ (-/spl omega/; /spl omega/, /spl omega/, -/spl omega/). When nonlinear absorption decreases, the NT increases accordingly. The anisotropic molecular distribution, which appears during AHB and AR, will also result in the nonlinear dichroism in the sample. We present time evolutions of the NT in the sample measured in the vicinity of focus point of the probing beam for both co-polarized and cross-polarized configurations in NT measurements. A considerable increase of NT in the co-polarized configuration can be observed when we switch on the pumping beam. On the contrary, as we turn off the pumping beam, the NT decreases to its original level. However the NT remains nearly unchanged in the cross-polarized configuration. The considerable change of NT in the co-polarized configuration fits in with our expectation since, in the existence of pumping beam, the trans population density in the direction parallel to the pumping beam will decrease in both AHB and AR mechanisms. On the other hand, the thin film will restore its isotropic distribution by thermal relaxation after pump removal, so the NT returns its original level. Nevertheless, the nearly unchanged NT in cross-polarized configuration is beyond our expectation. It may be due to that the change is too small to be observed in the NT measurements. Furthermore, the expected fast growth associated with AHB disappears in the growing curve. This may be due to that we used another 1 kHz diode-pumped Nd:YAG laser as pumping source. The heat accumulated on thin film is inevitable, so thermal cis-trans relaxation speeds up and the raising population of trans molecules can reorient to the direction parallel to the pump polarization by fast angular diffusion. Accordingly, nonlinear absorption (NT) will not decrease (increase) as fast as expected in AHB.
|
3,135
|
Please write an abstract with title: Computer-Aided English Pronunciation Accuracy Detection Based on Lip Action Recognition Algorithm, and key words: Training, Correlation, Lips, Computational modeling, Face recognition, User experience, Skin. Abstract: This paper studies computer-aided English pronunciation accuracy detection based on lip recognition. First, the face is detected using the skin color model and the geometric features of the face, and then a multi-level structure of the lip region detection algorithm is proposed to detect the lips, which is to achieve the lips. The coarse positioning to the fine positioning. The optical flow method is used to calculate the movement information of the lips between adjacent frames to accurately mark the time corresponding to the change of the lips. The marking task is completed by calculating the similarity between the learner's pronunciation and the standard speech, and Comparing the scores of learners' pronunciation with experts, calculating the correlation between the two, verifying the feasibility and effectiveness of the model increased by 7.8%.
|
3,136
|
Please write an abstract with title: Operating reserve and generation risk analysis for the PJM interconnection, and key words: Risk analysis, Combustion, Nuclear power generation, Spinning, Hydraulic turbines, Load forecasting, Capacity planning, Load modeling, Power system modeling, Power markets. Abstract: This paper discusses the application of probability methods to the determination of daily operating reserve objectives for the Pennsylvania-New Jersey-Maryland Interconnection (PJM). The paper summarizes PJM reserve policy and the developments leading to the present operating reserve and generation risk analysis program. Descriptions are offered of the generation and load models, the data reduction techniques, and the statistical analysis procedures for the generator outage data. The paper also contains typical comparative results obtained from applications of the program.
|
3,137
|
Please write an abstract with title: Antenna Design of Windshield Mounted NFC Pairs Integrated with Wireless Charging for V2X Driving Data Link, and key words: Antenna measurements, Wireless communication, Conferences, Inductive charging, Near field communication, Glass, Computational electromagnetics. Abstract: An antenna set and matching circuit for Near Field Communication integrated with Qi wireless charging coil is proposed. It is specially designed to fulfill the demands of upcoming V2X automatic parking application, to setup a secured control command link between the devices outside and inside the windshield glass. With the windshield and wireless charging coil’s influence taken into considerationˈ the field-circuit co-simulation procedure is utilized. A PCB antenna set is manufactured and measured. Test results proves the proposed antenna and matching circuit design has met the requirements for the proposed scenario .
|
3,138
|
Please write an abstract with title: Battery Management and Operation of a Wind-PV Based Microgrid, and key words: Reactive power, Total harmonic distortion, Wind speed, Battery management systems, Microgrids, Wind power generation, Stators. Abstract: This paper deals with an integrated PV (Photovoltaic)-wind battery-based micro-grid with an improved multi-functional grid-side converter (GSC) control. This improved discrete three-stage reduced-order multiple integrator (ROMI) GSC control is used to maintain the reactive power into the grid as well as to maintain the dc-link voltage across the converter. Moreover, it improves power quality issues in different abnormal conditions. The rotor side converter (RSC) is used to provide the required amount of reactive power using the field-oriented control, for the wind power generator (WPG). A double fed induction generator (DFIG) is used as a WPG. The single-stage PV array and a battery with class-C chopper is connected to the common dc-link of the GSC. It extracts the maximum power from wind turbine in light load conditions. The tip speed ratio (TSR) algorithm is used to extract the maximum power from a wind turbine and the incremental conductance (INC) method is used to extract the maximum power from a PV array. According to the load demands at the micro-grid, the battery management works. A PV feed-forward term is added with the total active component of the GSC control, which damps out the dynamic changes into the system. The grid current THD is also maintained within 5% according to the IEEE standard. Simulated results show the performance of the microgrid in different conditions, such as speed changes from the cut-in to cut-out the speed of the wind turbine, load unbalancing condition, changes in PV insolation. The charging and discharging cycle of the battery is optimized using at battery management system (BMS) at different circumstances.
|
3,139
|
Please write an abstract with title: Mobile Wireless Network Infrastructure on Demand, and key words: Task analysis, Ad hoc networks, Routing, Wireless networks, Hardware, Probabilistic logic. Abstract: In this work, we introduce Mobile Wireless Infrastructure on Demand: a framework for providing wireless connectivity to multi-robot teams via autonomously reconfiguring ad-hoc networks. In many cases, previous multi-agent systems either assumed the availability of existing communication infrastructure or were required to create a network in addition to completing their objective. Instead our system explicitly assumes the responsibility of creating and sustaining a wireless network capable of satisfying end-to-end communication requirements of a team of agents, called the task team, performing an arbitrary objective. To accomplish this goal, we propose a joint optimization framework that alternates between finding optimal network routes to support data flows between the task agents and improving the performance of the network by repositioning a collection of mobile relay nodes referred to as the network team. We demonstrate our approach with simulations and experiments wherein wireless connectivity is provided to patrolling task agents.
|
3,140
|
Please write an abstract with title: A Method for Disturbance-Tolerant “Sensorless” Angle Measurement of DC Motors, and key words: DC motors, Commutation, Passband, Induction motors, Band-pass filters, Voltage measurement, Rotation measurement. Abstract: “Sensorless” measurement of the angle of rotation or speed of direct current motors using periodic oscillations in the electrical signals is usually very susceptible to errors. This is caused by the occurrence of frequencies in the signals that do not correspond to the expected frequency. In this article, a new method is presented, which is robust against these influences and is, thus, able to provide a much more reliable angle or speed signal. For this purpose, the causes of the frequencies occurring in the electrical signals are discussed first. Based on general considerations incorporating these effects, the derivation of a general scheme and the associated requirements are presented. The algorithm is then developed in detail and implemented within the context of an application example using an electric parking brake of a motor vehicle. Finally, the process is experimentally validated using three different motor types under different operating conditions and the specific properties of the method are discussed.
|
3,141
|
Please write an abstract with title: A Control Injection Attack against S7 PLCs -Manipulating the Decompiled Code, and key words: Industrial electronics, Electric potential, Codes, Program processors, Semantics, Programmable logic devices, Process control. Abstract: In this paper, we discuss an approach which allows an attacker to modify the control logic program that runs in S7 PLCs in its high-level decompiled format. Our full attack-chain compromises the security measures of PLCs, retrieves the machine bytecode of the target device, and employs a decompiler to convert the stolen compiled bytecode (low-level) to its decompiled version (high-level) e.g. Ladder Diagram LAD. As the LAD code exposes the structure and semantics of the control logic, our attack also manipulates the LAD code based on the attacker’s understanding to the physical process causing abnormal behaviors of the system that we target. Finally, it converts the infected LAD code to its executable version i.e. machine bytecode that can run on the PLC using a compiler before pushing the malicious code back to the PLC. For a real scenario, we implemented our full attack-chain on a small industrial setting using real S7-300 PLCs, and built the database (for our decompiler and compiler) using 108 different control logic programs of varying complexity, ranging from simple programs consisting of a few instructions to more complex ones including multi functions, sub-functions and data blocks. We tested and evaluated the accuracy of our decompiler and compiler on 5 random programs written for real industrial applications. Our experimental results showed that an external adversary is able to infect S7 PLCs successfully. We eventually suggest some potential mitigation approaches to secure systems against such a threat.
|
3,142
|
Please write an abstract with title: The influence of text rotation, font and distance on legibility in VR, and key words: Virtual reality, Automobiles, Three-dimensional displays, Resists, Human factors, Guidelines, Text recognition. Abstract: The legibility of text in virtual environments (VE) is especially important for the simulation of user interfaces of real machines and devices. For this purpose a study was conducted to examine the influence of rotation, the distance and the font of text on the legibility in VR. In addition, the minimum readable text size under these conditions was measured using the angular unit dmm. The results of the study show that text rotated 60° or more requires a much larger text size to be legible regardless of the distance of the text to the viewer and font.
|
3,143
|
Please write an abstract with title: Chaotic Based Adaptive Inter Planar Confusion for Color Images, and key words: Measurement, Chaotic communication, Gaussian noise, Receivers, Propagation losses, Generators, Encryption. Abstract: Data security remains to be one of the most discussed issues in the modern, fast-paced technological ecosystem. This paves way to a lot of endangerment to the transfer of data over various channels, which can be considered reliable and confidential. Classified information cannot be compromised by transmitting it through common channels as they are prone to attack by certain groups, which might to lead to catastrophic circumstances. The most commonly transmitted type of data is in the form of images and classified images have to be transmitted in such a way that it is highly imperceptible. This paper discusses about an encryption algorithm which follows an unconventional method of encryption, followed by diffusion by Ex-OR addition. The confusion is carried out among different planes of the image and can be termed as inter-planar confusion. There are two different ways in which inter-planar confusion can be done and that depends on a chaotic tent map random number generator. The viability and the overall performance of the proposed algorithm is marked as a trade-off between various combinational metrics and good results shows the imperceptibility of the encrypted image
|
3,144
|
Please write an abstract with title: 3D Graphical Simulation of Nuclear Reactor in Open GL & C# Using Probability Density Functions, and key words: Probability density function, Inductors, Computational modeling, Fission reactors, Neutrons, Graphics, High performance computing, Physics computing, Software performance, Costs. Abstract: The experimentation of nuclear reactor is perhaps one of the most expensive and may produce hazardous effects if not controlled properly but with the advancements of 3D graphics and high speed processing; the computational simulation gives almost same result that could be performed on physical experimentation. Once the software is written, countless experiments to examine the factors affecting a reactors performance can be carried out at little cost and with no dangerous side effects. Our simulation software is developed using C# & CsGL (An Open GL wrapper for C#). It provides a 3D environment of a Nuclear Reactor controlled by input parameters interacted with output result simulations. Its purpose is to helps students & engineers in education for understanding energy generation process. The implementation of Monte Carlo method for this simulation involves following lives of a large group of neutrons in the reactor, with each neutron taking it’s own random walk from release; either absorption, exiting reactor, or causing further fission. From this it is possible to work out how enrichment level and fuel:moderator ratio affect the reactors performance. It also allows to vary control rods, f:m ratios, pump speed, along with its inner & outer components views.
|
3,145
|
Please write an abstract with title: Performance Comparison Between Rare-Earth and Ferrite-based PM Transverse Flux Generators for Small-Scale Direct-Drive Wind Turbine, and key words: Ferrites, Magnetic flux, Costs, Permanent magnet generators, Generators, Wind turbines, Magnetic analysis. Abstract: The direct-drive (gearless) permanent magnet generator system has a high potential for wind turbines because of its performance efficiency, robustness, low maintenance, and reliability compared to other generator systems. Transverse flux permanent magnet generators (TFPMGs) have high-power density and modular structures, making them a proper candidate for direct-drive wind turbine applications. The main disadvantage TFPMGs is the high cost of PMs and increment of PM demagnetization risk with rising temperature. This paper is dedicated to a comprehensive comparison of the three-phase constructed rare-earth and Ferrite TFPMGs considered in small-scale direct-drive wind generator applications (320 rpm, 3000 W). The comparison includes operation principles, design procedure, performance (in terms of analyzing methods, electric and magnetic characteristics), cost, materials, and structures. It will be shown that the Ferrite TFPMGs can have acceptable performance for low-cost wind turbines applications.
|
3,146
|
Please write an abstract with title: Task Allocation of Multi UAV Based on Genetic Algorithm, and key words: Multiple UAVs, genetic algorithm, task allocation, dynamic adjustment. Abstract: Unmanned aerial vehicles (UAVs) have developed rapidly in the military field. UAVs can play a role in the strike mission. However, UAVs can not complete the strike mission alone due to their limited bomb load. Multiple UAVs are often required to complete the strike mission together. In the process of task implementation, the weights of different goals are also very different. In order to maximize the strike effect, it is necessary to find out the optimal task to allocate the task. In order to solve the optimal task allocation problem of heterogeneous UAV attacking the opposite target, genetic algorithm is used to solve the optimal task allocation scheme. By modeling the task allocation model, the fitness function of genetic algorithm is obtained. Finally, the simulation results show that the genetic algorithm can effectively solve the task allocation problem of heterogeneous UAV attacking the opposite target.
|
3,147
|
Please write an abstract with title: An M-Cache-Based Security Monitoring and Fault Recovery Architecture for Embedded Processor, and key words: Monitoring, Security, Transient analysis, Hardware, Real-time systems, Circuit faults, Embedded systems. Abstract: Recently, extensive research attention has been drawn to the program executing security of embedded processor since increasing code tamper attacks, as well as transient faults severely affect the safety of embedded systems. The security monitoring and fault recovery technique is one of the effective methods to ensure the security and performance of embedded devices. In this article, an architecture for the security monitoring and fault recovery is proposed for run-time program execution, which builds a Monitoring Cache (M-Cache) and then checks the integrity based on reference data. Especially, the proposed architecture will build the checkpoint once the M-Cache is missed and also take the rollback operation after the unsuccessful of integrity check. In addition, three tampered positions (e.g., instruction register within the pipeline, instruction within the cache, and code within memory) have been elaborately focused on to guarantee the normal running of the embedded system. Eventually, by adopting the open RISC processor for algorithm implementation and verification, the proposal has been proven to be promising for the detection of a fault or tampered program, as well as the fast recovery of running environment and code.
|
3,148
|
Please write an abstract with title: Prediction of Individual Propofol Requirements based on Preoperative EEG Signals, and key words: Electroencephalography, Brain, Anesthesia, Surgery, Correlation, Presses, Accidents. Abstract: The patient must be given an adequate amount of propofol for safe surgery since overcapacity and low capacity cause accidents. However, the sensitivity of propofol varies from patient to patient, making it very difficult to determine the propofol requirements for anesthesia. This paper aims to propose a neurophysiological predictor of propofol requirements based on the preoperative electroencephalogram (EEG). We exploited the canonical correlation analysis that infers the amount of information on the propofol requirements. The results showed that the preoperative EEG included the factor that could explain the propofol requirements. Specifically, the frontal and posterior regions had crucial information on the propofol requirements. Moreover, there was a significantly different power in the frontal and posterior regions between baseline and unconsciousness periods, unlike the alpha power in the central region. These findings showed the potential that preoperative EEG could predict the propofol requirements.
|
3,149
|
Please write an abstract with title: Influence of Microstrip Resonator Topology on Frequency and Energy Characteristcs, and key words: Microstrip antennas, Antenna radiation patterns, Resonant frequency, Broadband antennas, Nonhomogeneous media, Microstrip resonators. Abstract: The results of the study of frequency and energy characteristics of multi-band antenna based on microstrip monopole with the sectorial type inhomogeneity are presented. The main characteristics have been obtained through numerical modelling based on semi-open resonator model. The main antenna characteristics have been analyzed.
|
3,150
|
Please write an abstract with title: Biomimetic Control of Myoelectric Prosthetic Hand Based on a Lambda-type Muscle Model, and key words: Correlation, Automation, Biological system modeling, Conferences, Muscles, Fatigue, Impedance. Abstract: Myoelectric prosthetic hands are intended to re-place the function of the amputee’s lost arm. Therefore, developing robotic prosthetics that can mimic not only the appearance and functionality of humans but also characteristics unique to human movements is paramount. This paper proposes a novel biomimetic control method for myoelectric prosthetic hands integrating the impedance model with the concept of the λ-type muscle model. According to the state of the muscle, the proposed method can dynamically control the joint equilibrium position, and can maintain the joint angle naturally during muscle relaxation. The experimental results, based on comparison with the actual human joint angles, suggest that the proposed method has a better correlation with the actual human motion than the conventional methods. Additionally, the control experiments showed that the proposed method could achieve a natural prosthetic hand movement similar to that of a human, thereby allowing voluntary hand movements.
|
3,151
|
Please write an abstract with title: Cluster Synchronization of Complex Networks Under Denial-of-Service Attacks With Distributed Adaptive Strategies, and key words: Synchronization, Couplings, Complex networks, Security, Denial-of-service attack, Adaptive systems, Control systems. Abstract: This article studies the security cluster synchronization of complex networks under denial-of-service (DoS) attacks. First, an adaptive strategy is designed to update coupling weights and gains for ensuring cluster synchronization, even if the control channels of complex networks suffer from DoS attacks. This security strategy is developed in a distributed framework, in which only local information is utilized instead of any global information, such as the network topology and the number of nodes. Then, the security cluster synchronization analysis against DoS attacks is extended to the case where only partial coupling weights on edges are updated. By constructing suitable Lyapunov functions with exponential terms, the corresponding security cluster synchronization conditions are presented, and the DoS attack duration ratio that the system can tolerate is also obtained. Finally, a network composed of Chua’s circuits is employed to validate the efficiency of the derived methods.
|
3,152
|
Please write an abstract with title: Ring based FIR-IIR best delay LS inverse filters, and key words: Delay, Finite impulse response filter, IIR filters, Wiener filter, Convolution, Filtering, Matrix decomposition, Design engineering, Signal design, Signal processing. Abstract: We investigate the best delay LS inverse filter design problem. We propose FIR-IIR LS inverse filters to improve the LS error performance for the same complexity. Furthermore, we present a new approach for the design of FIR-IIR LS inverse filters by using a special selection procedure for the IIR part. We derived the closed form LS error expressions and compared with the practical results in order effectively to show the performance improvement in this case. In general, 4-5 dB improvement is achieved compared to the best delay LS inverse filter design approach.
|
3,153
|
Please write an abstract with title: An adaptive neurocontroller using RBFN for robot manipulators, and key words: Neurocontrollers, Robots, Robust stability, Neural networks, Control system synthesis, Nonlinear control systems, Robust control, Nonlinear systems, Manipulator dynamics, Radial basis function networks. Abstract: In recent years, neural networks have fulfilled the promise of providing model-free learning controllers for nonlinear systems; however, it is very difficult to guarantee the stability and robustness of neural network control systems. This paper proposes an adaptive neurocontroller for robot manipulators based on the radial basis function network (RBFN). The RBFN is a branch of neural networks and is mathematically tractable. Therefore, we adopt the RBFN to approximate nonlinear robot dynamics. The RBFN generates control input signals based on the Lyapunov stability that is often used in the conventional control schemes. A saturation function is also chosen as an auxiliary controller to guarantee the stability and robustness of the control system under the external disturbances and modeling uncertainties.
|
3,154
|
Please write an abstract with title: Using Delaunay triangulation to construct obstacle detour mobility model, and key words: Portable computers, Military computing, Cities and towns, Computational modeling, Wireless networks, Computer networks, Atmospheric modeling, Computer science, Wireless communication, Communications technology. Abstract: With the rapid growth in wireless communication technologies, mobility management research is in great demand. Simulation has become an effective method to study the performance of many mobility issues. A realistic mobility model not only reflects mobile user behavior, but also affects correctness of the simulation results. In a wireless environment, obstacles usually exist within the coverage area. We propose a new detour model by using Delaunay triangulation through the incorporation of obstacles. The proposed mobility model can create detour paths as long as there exist gaps among obstacles. Comparative studies show that our proposed model can construct more detour paths than the Voronoi model.
|
3,155
|
Please write an abstract with title: Cross-Modal Representation Learning for Lightweight and Accurate Facial Action Unit Detection, and key words: Gold, Feature extraction, Optical imaging, Visualization, Task analysis, Optical computing, Deep learning. Abstract: In this letter, we focus on designing an effective method for lightweight and accurate facial action unit (AU) detection, which is essential for emotional communication in most human-robot interaction scenarios. AU detection is a delicate and challenging task because the subtle fleeting appearance changes caused by AUs are very difficult to catch and express. Therefore existing approaches mainly deal with static facial states or frame-level temporal relationships. The dynamic process of facial muscle movement, as the core feature of AU, is yet ignored and rarely exploited by prior studies. Based on such observation, we propose Flow Supervised Module (FSM) to explicitly capture the dynamic facial movement in the form of Flow and use the learned Flow to provide supervision signals for the detection model during the training stage effectively and efficiently. Furthermore, the proposed FSM can be easily incorporated into various backbone networks and boost their performance. Extensive experiments are conducted on two benchmark datasets, DISFA and BP4D, showing state-of-the-art performance with competitive detection speed.
|
3,156
|
Please write an abstract with title: On-Chip High Extinction Ratio Single-Stage Mach-Zehnder Interferometer Based on Multimode Interferometer, and key words: Extinction ratio, Optical interferometry, Optical filters, Bending, Photonics, Bandwidth, Silicon. Abstract: On-chip high extinction ratio Mach-Zehnder interferometers (MZI) have always attracted interest from researchers as it can be used in many applications including astrophotonics, optical switching, programmable photonic circuit, and quantum information. However, in previous research studies, ultra-high extinction ratio on-chip MZIs have only been achieved by using a multi-stage MZI approach. In this paper, we investigate a high extinction ratio single-stage MZI based on two cascaded multimode interferometers (MMI). We determine that TM noise is an important factor that can prevent us from achieving high extinction ratio MZI. By introducing a bend-based TM filter without additional loss, we experimentally demonstrate that such a TM filter can improve the maximum extinction ratio of the MMI-MZI by more than 10 dB. With the TM filter, we report a record high 61.2 dB extinction ratio on a single stage, thermally tunable MMI-MZI with only 1.5 dB insertion loss and more than 60 nm bandwidth. These results pave the way for many interesting applications.
|
3,157
|
Please write an abstract with title: SLAMANTIC - Leveraging Semantics to Improve VSLAM in Dynamic Environments, and key words: Semantics, Automobiles, Dynamics, Heuristic algorithms, Cameras, Three-dimensional displays, Buildings. Abstract: In this paper, we tackle the challenge for VSLAM of handling non-static environments. We propose to include semantic information obtained by deep learning methods in the traditional geometric pipeline. Specifically, we compute a confidence measure for each map point as a function of its semantic class (car, person, building, etc.) and its detection consistency over time. The confidence is then applied to guide the usage of each point in the mapping and localization stage. Points with high confidence are used to verify points with low confidence in order to select the final set of points for pose computation and mapping. Furthermore, we can handle map points whose state may change between static and dynamic (a car can be parked or in motion). Evaluating our method on public datasets, we show that it can successfully solve challenging situations in dynamic environments which cause state-of-the-art baseline VSLAM algorithms to fail and that it maintains performance on static scenes. Code is available at github.com/mthz/slamantic.
|
3,158
|
Please write an abstract with title: Formal security analysis of MPC-in-the-head zero-knowledge protocols, and key words: Protocols, Cognition, Security, Cryptography, Computer security, Digital signatures. Abstract: Zero-knowledge proofs allow a prover to convince a verifier of the veracity of a statement without revealing any other information. An interesting class of zero-knowledge protocols are those following the MPC-in-the-head paradigm (Ishai et al., STOC ’07) which use secure multiparty computation (MPC) protocols as the basis. Efficient instances of this paradigm have emerged as an active research topic in the last years, starting with ZKBoo (Giacomelli et al., USENIX ’16). Zero-knowledge protocols are a vital building block in the design of privacy-preserving technologies as well as cryptographic primitives like digital signature schemes that provide post-quantum security. This work investigates the security of zero-knowledge protocols following the MPC-in-the-head paradigm. We provide the first machine-checked security proof of such a protocol on the example of ZKBoo. Our proofs are checked in the EasyCrypt proof assistant. To enable a modular security proof, we develop a new security notion for the MPC protocols used in MPC-in-the-head zero-knowledge protocols. This allows us to recast existing security proofs in a black-box fashion which we believe to be of independent interest.
|
3,159
|
Please write an abstract with title: Online fingerprint template improvement, and key words: Fingerprint recognition, Image matching, Fingers, Merging, Skin, Bifurcation, Impedance matching, Feature extraction, Employment, Image enhancement. Abstract: This work proposes a technique that improves fingerprint templates by merging and averaging minutiae of multiple fingerprints. The weighted averaging scheme enables the template to change gradually with time in line with changes of the skin and imaging conditions. The recursive nature of the algorithm greatly reduces the storage and computation requirements of this technique. As a result, the proposed template improvement procedure can be performed online during the fingerprint verification process. Extensive experimental studies demonstrate the feasibility of the proposed algorithm.
|
3,160
|
Please write an abstract with title: Hydrosoil, Soil Moisture and Vegetation Parameters Retrieval with a C-Band GB-SAR: Campaign Implementation and First Results, and key words: C-band, Soil moisture, Vegetation mapping, Crops, Process control, Synthetic aperture radar, Monitoring. Abstract: HydroSoil is a measurement campaign, funded by the European Space Agency (ESA), where the temporal evolutions of two crops, barley and corn, have been continuously monitored during the whole crop period by means of a C-band Fully Polarimetric C-band Ground-Based Synthetic Aperture Radar (GB-SAR). SAR data has been collected together with ancillary data, and both are being processed to demonstrate the retrieval of soil moisture and vegetation parameters in an agricultural field under controlled conditions, to simulate the frequent acquisitions of GeoSAR missions.
|
3,161
|
Please write an abstract with title: Causal Discovery from Natural Language Text using Context and Dependency Information, and key words: Fault diagnosis, Instruments, Process control, Tagging, Linguistics, Feature extraction, Control systems. Abstract: Causality analysis is one of the emerging topics of importance in fault diagnosis, network reconstruction and in performance analysis of control systems. Almost all current day literature in the engineering arena makes use of numerical data. However, many processes generate insightful textual data that is left unanalysed. In this work we present a novel method for causal discovery from textual data using context and dependency information. The proposed BiLSTM and Node2Vec architecture uses word-level embeddings, linguistic features to gather contextual information and dependency-parse tree representations to gauge how entities in a sentence are related. The extracted phrases in each sentence are labelled as causes, effects or causal connectives. Our work is evaluated on datasets such as SemEval, BECAUSE 2.0 and CausalBank and compared against a baseline Conditional Random Field (CRF) based supervised BiLSTM model. We demonstrate that the presence of both context and dependency information significantly improves performance and also extend our analysis to operator logs, exhibiting its effectiveness in extracting causal events in process logs. The work hopes to generate immense value for the technology envisaged in Industry 4.0
|
3,162
|
Please write an abstract with title: A Deep Learning based Recognition System for Yemeni Sign Language, and key words: Industries, Deep learning, Bridges, Image recognition, Convolution, Neural networks, Gesture recognition. Abstract: There are more than 466 million people with hearing disabilities in the world. Those people need to communicate with others, get learning and interact with activities around them. Sign language is the bridge to eliminate the gap between them and other people. Developing an automatic system to recognize sign language has a lot of challenges, especially for Yemeni sign language, as there are very few researches touching on this language. In this paper, we propose a new Convolution Neural Network based model for classifying the sign language of Yemen. The System was trained and tested using a dataset that includes 16,192 images gathered from 40 people with different distances and variations. The proposed model uses pre-processing methods to remove noises and reposition the images, etc. The results display that the proposed model achieved 94% accuracy.
|
3,163
|
Please write an abstract with title: Learning-Based Off-Chain Transaction Scheduling in Prioritized Payment Channel Networks, and key words: Delays, Routing, Blockchains, Throughput, Costs, Jitter, Scalability, Learning systems, Reinforcement learning. Abstract: Payment channel network (PCN) is one of the promising solutions for scalable blockchains since it shows great potential in improving blockchain network throughput. However, the growing number of transactions and the payment-channel sharing of concurrent transactions can lead to channel congestion. Although many studies have proposed different solutions to solve this problem, they ignore a fact that applications may have different transaction rate requirements at different times. In this paper, we propose a priority-aware PCN to meet the requirements of those transactions. Senders in priority-aware PCNs can specify the priority of their transactions by paying a corresponding forwarding fee on each hop along the transaction path. However, capacity competition occurs on the shared hops. Moreover, we propose a multi-agent DQN-based priority assignment algorithm to address the competition issue and design a PCN simulator for performance evaluation. Simulation results show that our solution can guarantee a high throughput of transactions and assign priorities appropriately to balance the transaction rate and forwarding fee cost. The experimental results demonstrate that the priority scheduling scheme can achieve higher transaction throughput and success ratio than other scheduling methods in a congested PCN environment.
|
3,164
|
Please write an abstract with title: Application-oriented multimedia scheduling over lossy wireless networks, and key words: Wireless networks, Quality of service, Scheduling algorithm, Streaming media, Application software, Throughput, Processor scheduling, Computational modeling, Error analysis, Proposals. Abstract: This work seeks a better understanding of the relations between the better network service provided by QoS-oriented wireless packet scheduling and the actual benefits perceived by the multimedia applications that use them. Through extensive simulations driven by real (multimedia and wireless channel error) traces, we observe that in general, there is a performance gap between application perceived QoS and network QoS provided by the wireless fair packet scheduler. This gap tends to increase further as the channel error rate aggravates. The exact distribution of channel errors greatly affects the multimedia application performance, but its impact on network QoS is much smaller. We then present the solution, which is based on idealized weighted fair queuing (IWFQ) to further improve three popular multimedia applications' performance.
|
3,165
|
Please write an abstract with title: Scheduling support for guaranteed time services in IEEE 802.15.4 low rate WPAN, and key words: Scheduling algorithm, Job shop scheduling, Wireless sensor networks, Computational modeling, ZigBee, Processor scheduling, Virtual prototyping, Transceivers, Communication system security, Intelligent sensors. Abstract: We propose a real-time message scheduling algorithm which is applied to schedule periodic real-time messages in IEEE 802.15.4 for LR-WPAN (low rate wireless personal area network). The standard allows GTSs (guaranteed time slots) in the optional use of a superframe structure in a beacon-enabled network to be used to exchange real-time messages. To utilize these features of the standard efficiently, a proper message scheduling algorithm is needed. The proposed offline message scheduling algorithm which is based on a distance constrained scheduler generates the standard specific parameters including BO, SO, and GTS information to schedule the given message set. The algorithm is evaluated by simulation and the guaranteed time service using the schedule is implemented and evaluated on CC2420DB which is a prototyping platform including an IEEE 802.15.4 compliant transceiver of Chipcon AS.
|
3,166
|
Please write an abstract with title: Conceptual Analysis of Product Evaluations Using Deep Learning, and key words: Support vector machines, Measurement, Sentiment analysis, Neural networks, Companies, Multilayer perceptrons, Tools. Abstract: The process of classifying a small text piece into positive, negative or neutral is called as Sentiment Analysis. For example, if a message is considered, then the meaning of the sentence is identified and then analysis of the sentence has to be done. After analysis, we decide that the sentence is either positive, either negative or neutral. This is referred to as Sentiment Analysis. Nowadays, most of the people prefer the online products compared to the direct buyers. So, the online marketing is growing very high. In fact, the online marketing is fully satisfying the customer needs so that it occupies a great place in people's heart. They are also satisfying the demands of customers with high quality and low price. These are the primary reasons for the online marketing to be in a successful position. If an e-commerce company has an ability to gather information about the customer thoughts and behavior, then the online marketing will be more effective than now. In this paper, we have taken a particular e-commerce dataset called Flipkart and classify the polarity of the comments by using some of the classifiers namely Support Vector Machine Classifier, Guassian Naïve Bayes Classifier and Random Forest Classifier and Multilayer Perceptron Classifier. The existing approach is that the comments were classified based on the attitude of the customer. But, now the proposed approach has been implemented with the help of Multilayer Perceptron (MLP) Neural Network Classifier which is simulated by the SPYDER tool. The accuracy for all the four algorithms namely, Support Vector Machine, Random Forest, Naïve Bayes and Multilayer Perceptron (MLP) Neural Network algorithm has been computed and the best accuracy has been predicted by comparing them. Here, the Multilayer Perceptron (MLP) shows the best accuracy of all others and the accuracy is 99.94%. Moreover, some performance metrics has been determined here. The performance metrics namely Precision, Recall and F-measure has been evaluated for each algorithm individually and then the comparison is made among them. Then, the ROC curve is measured for the classes designated by us for revealing the recognition of parameters between two diagnostic groups. It is predicted individually for each class. At last, the Confusion Matrix is going to enumerate for each algorithm distinctly. It presents the actual and predicted values in a tabular format thereby measuring the performance of a classifier.
|
3,167
|
Please write an abstract with title: A Review on Medical Image Compression and Encryption Using Compressive Sensing, and key words: Image coding, Transmitters, System performance, Receivers, Encryption, Sensors, Sparse matrices. Abstract: Recently, the use of public networks for multimedia transmission is rapidly increasing, so there is a demand for high data rate, while protecting the security of data. Compressive Sensing (CS) is an acquisition technique for sparse signals. CS has a property that allows it to recover the sparse signal at a lower rate than Nyquist rate. In the case of transmission, signal security is also an important factor. CS can be utilized as a cryptosystem when the measurement matrix is shared as a key between the transmitter and receiver. This review paper focuses on the essential theory and technique for compressing and encrypting medical images using CS, with a comparative study of different researches inside this domain.
|
3,168
|
Please write an abstract with title: Development of Low–Cost Portable Blood Vessel Imaging System, and key words: Optical filters, Performance evaluation, Software libraries, Optical design, Optical imaging, Real-time systems, Skin. Abstract: As an alternative to high-cost near-infrared (NIR) vascular imaging devices in the market [1], a microcomputer-based, real-time, low-cost, non-contact and safe vascular imaging system has been developed. The higher absorption coefficient of blood from skin and fat, as well as the differences in oxy and deoxyhemoglobin spectra in blood, were helpful factors in the use of the NIR region during the acquisition of vessel images. A device, which uses NIR LED light operated at 850 nm, was designed using optical and electronic components. Image analysis were performed using OpenCV, which is an open-source software library, and data visualization libraries. Tests were carried out to optimize the best imaging conditions for the device. In this study, a portable device design with improved vessel image quality is presented which could potentially be used to assist the health professionals to investigate the abnormalities in the superficial vascular structures at different times during patients’ treatments.
|
3,169
|
Please write an abstract with title: Detecting Darting Out Pedestrians With Occlusion Aware Sensor Fusion of Radar and Stereo Camera, and key words: Radar, Cameras, Radar detection, Radar tracking, Automobiles, Laser radar, Intelligent vehicles. Abstract: Early and accurate detection of crossing pedestrians is crucial in automated driving in order to perform timely emergency manoeuvres. However, this is a difficult task in urban scenarios where pedestrians are often occluded (not visible) behind objects, e.g., other parked vehicles. We propose an occlusion aware fusion of stereo camera and radar sensors to address scenarios with crossing pedestrians behind such parked vehicles. Our proposed method adapts both the expected rate and properties of detections in different areas according to the visibility of the sensors. In our experiments on a real-world dataset, we show that the proposed occlusion aware fusion of radar and stereo camera detects the crossing pedestrians on average 0.26 seconds earlier than using the camera alone, and 0.15 seconds earlier than fusing the sensors without occlusion information. Our dataset containing 501 relevant recordings of pedestrians behind vehicles will be publicly available on our website for non-commercial, scientific use.
|
3,170
|
Please write an abstract with title: Cogging torque due to roundness errors of the inner stator core surface, and key words: Forging, Stator cores, Rotors, Engine cylinders, Testing, Torque measurement, Permanent magnet motors, Magnetization, Brushless motors, Fabrication. Abstract: Cogging torque of brushless permanent magnet (PM) motors employing segmented stator cores with narrow slot openings has been investigated. Two types of test motors were examined: one with a segmented Halbach cylinder rotor and the other with a radially oriented ring PM rotor. The measured cogging torque was predicted from the measured dimensional errors for the inner radius of the stator core in both types.
|
3,171
|
Please write an abstract with title: How to Deploy Intelligent Reflecting Surfaces in Wireless Network: BS-Side, User-Side, or Both Sides?, and key words: intelligent reflecting surface (IRS), IRS deployment, double-IRS system, cooperative beamforming, channel estimation. Abstract: The performance of wireless communication systems is fundamentally constrained by the random and uncontrollable wireless channel. By leveraging the recent advances in digitally-controlled metasurface, intelligent reflecting surface (IRS) has emerged as a promising solution to enhance the wireless network performance by smartly reconfiguring the radio propagation environment. Despite the substantial research on IRS-aided communications, this article addresses the important issue of how to deploy IRSs in a wireless network to achieve its optimum performance. We first compare the two conventional strategies of deploying IRS at the side of base station or users in terms of various communication performance metrics, and then propose a new hybrid IRS deployment strategy by combining their complementary advantages. Moreover, the main challenges in optimizing IRS deployment as well as their promising solutions are discussed. Numerical results are also presented to compare the performance of different IRS deployment strategies and draw useful insights for practical design.
|
3,172
|
Please write an abstract with title: Plenary Talk 4 : Learning Analytics – A Multiple Perspectives Analysis of Student Data, and key words: Conferences, Social networking (online), Ubiquitous computing, Sociology, Scholarships, Predictive analytics, Optimization. Abstract: Summary form only given, as follows. The complete presentation was not made available for publication as part of the conference proceedings. Learning analytics (LA) is a growing research area, which aims at selecting, analyzing and reporting student data (in their interaction with the online learning environment), finding patterns in student behavior, displaying relevant information in suggestive formats; the end goal is the prediction of student performance, the optimization of the educational platform and the implementation of personalized interventions. The topic is highly interdisciplinary, including machine learning techniques, educational data mining, statistical analysis, social network analysis, natural language processing, but also knowledge from learning sciences, pedagogy and sociology. Despite its increasing popularity, LA has been applied less in the context of social media-based environments. In this talk we focus especially on research in social learning analytics area. Four research directions are tackled: analytics dashboards, predictive analytics, social network analytics and discourse analytics. We thus address the “trinity” of methodological approaches to get a more comprehensive learning analytics perspective
|
3,173
|
Please write an abstract with title: Dependence on intrinsic strain of packaging-induced strain in quantum-well laser diodes, and key words: Capacitive sensors, Quantum well lasers, Tensile strain, Diode lasers, Optical sensors, Copper, Semiconductor diodes, Semiconductor device packaging, Optical devices, Strain measurement. Abstract: Intrinsic strain within quantum wells significantly influences interband energy shifts in diode lasers. We show that despite intrinsic strain, energy shifts permit quantitative determination of packaging-induced-strain configurations in commercial devices.
|
3,174
|
Please write an abstract with title: Effect of soft handoff parameters and traffic loads on soft handoff ratio in CDMA systems, and key words: Telecommunication traffic, Multiaccess communication, Fading, Base stations, Interference, Performance gain, Gaussian distribution, Random variables, Signal analysis, Power system planning. Abstract: In this paper, the relations of soft handoff ratio to soft handoff thresholds setting and the pilot channel power fraction under different traffic loads in CDMA systems are analyzed. Sectorized cells are considered, and the propagation environment includes correlation of shadow fading signals arriving from multiple sectors of the same base station and different base stations. Simulations are made and the results can be referenced for CDMA networks planning and optimizing.
|
3,175
|
Please write an abstract with title: A theoretical and experimental study of DMOS enhancement/depletion logic, and key words: Inverters, Boron, Microwave transistors, Ion implantation, Driver circuits, Electric variables, Logic devices, Threshold voltage, Silicon, Space technology. Abstract: Enhancement/depletion (E/D) logic is an attractive application of the double-diffused MOS (DMOS) technology, since no extra diffusions or ion implantations are required. Design rules are studied taking into account several criteria such as space-saving and optimum noise immunity. It is evidenced that some particular features of the DMOS driver, such as the fact that short-channel characteristics are obtained from a full-size device, deeply modifies the relations existing between the electrical characteristics of a gate and its `real estate'. Results are compared to conventional E/D logic. Two specific design regions are pointed out: low power and high speed. The first one normally results from the standard DMOS technology, making use of a <111>, /spl pi/-substrate. The high-speed option requests a supplementary ion implantation for the load device. Technology is discussed. A simple silicon-gate DMOS process is presented. Its main feature is to be almost identical to a standard n-channel silicon-gate technology, except for a supplementary p-diffusion. Emphasis is given to the threshold voltage control problem. A new solution yielding an improved control is presented. The method is based on the use of doped silox as p-diffusion source, combined with ion implantation for the n/SUP +/ regions.
|
3,176
|
Please write an abstract with title: Space Mapping Optimization of a Cylindrical Voice Coil Actuator, and key words: Actuators, Samarium, Constraint optimization, Coils, Electromagnetic measurements, Design optimization, Vectors, Finite element methods, Geometry, Helium. Abstract: An optimal design problem of an electromagnetic actuator is formulated by defining the set of design variables, constraints, and the optimality criterion. Solving such a problem is a difficult and time expensive task when many variables, constraints, and conflicting objectives are involved, and high accuracy is required. In order to determine the solution in an efficient manner the space mapping technique is investigated. A cylindrical voice coil actuator is chosen as trial example. The numerical results show that the approach is viable, and an obtained design is verified by measurements
|
3,177
|
Please write an abstract with title: Smart Certificate Revocation List Exchange in VANET, and key words: Veins, Computational modeling, Vehicular ad hoc networks, Public key, Peer-to-peer computing, Communication networks, Computational intelligence. Abstract: Communication among vehicles should be secure and safe. Any vehicle or node that misbehaves or transmits wrong information needs to be revoked. One of the widely used scheme to revoke the malicious node’s certificate is a public key infrastructure (PKI). In PKI Certificate revocation list (CRL) is issued by the Certificate Authority (CA). CRL is distributed in the system after its creation by the CA. All the vehicles must receive a genuine copy of CRL so that they can stop receiving messages from malicious nodes. CRL should be distributed very fast and efficiently in the VANET system. We propose a new method for CRL distribution called Smart Certificate Revocation List Exchange (SCRLE). Both V2V and V2I communication is used by our method to distribute CRL pieces among the vehicles. Our method is inspired by C2CEpidemic method of CRL distribution and uses the idea of sharing the CRL list in peer to peer manner. With this approach, vehicles will be able to find their peers more appropriately. This approach uses a ranking mechanism by which vehicles will be paired with those vehicles which have more number of CRL pieces. This will increase the chance of exchanging of CRL pieces efficiently. OMNET++ along with Vein s framework is used to implement and evaluate the method. Sumo is used to generate traces of vehicles for large scale simulation. Results show that it performs better than C2CEpidemic method of CRL exchange.
|
3,178
|
Please write an abstract with title: DT-MRI regularization using anisotropic tensor field filtering, and key words: Diffusion tensor imaging, Anisotropic magnetoresistance, Tensile stress, Filtering, Adaptive filters, Magnetic resonance imaging, Multidimensional systems, Biomedical imaging, Anatomy, Volume measurement. Abstract: In this paper, we present a new non-iterative anisotropic method to regularize vector and higher order tensor fields. The driving application for this work is filtering data from diffusion tensor imaging. Our scheme is based on a multidimensional anisotropic adaptive filtering. The method is based on first estimating the local structure of the field and, then, combining the outputs of a set of steerable filter basis responses to the tensor field, which are adaptively weighted depending on the local structure. Promising results are presented from experiments on both synthetic data and real diffusion tensor MRI.
|
3,179
|
Please write an abstract with title: Design of Ultra Wideband Cubic Dielectric Resonator Antenna Surrounded by Dielectric Micropillars for THz Applications, and key words: Silicon compounds, Gold, Frequency synthesizers, Microstrip resonators, Resonant frequency, Microstrip antennas, Dielectric resonator antennas. Abstract: In this paper, a cubic dielectric resonator antenna (CDRA) with patterned structure fed through a microstrip line using gold is proposed. Geometry-induced resonant frequency is synthesized with cuboid periodic pattern through micro pillars grown around the DRA. Following the idea of frequency excitation, a synthesized frequency inherits and combines the modal features from several conventional ones of regular DRAs. Antenna radiation patterns have fine complementation, meanwhile, they are excited by a shared feed. To further demonstrate the mechanism of frequency excitation within ultra-wideband (UWB), the field distribution of the proposed CDRA with micro pillars around it is analyzed by varying the height of the pillars. The radiation patterns and surface fields around the core frequencies are also demonstrated here. The simulation results suggest that periodic geometric structures can be utilized to excite a frequency within UWB band for THz applications.
|
3,180
|
Please write an abstract with title: SEU measurements and predictions on MPTB for a large energetic solar particle event, and key words: Energy measurement, Particle measurements, Testing, Protons, Random access memory, Single event upset, Laboratories, Microelectronics, Photonics, Predictive models. Abstract: Single-event upset (SEU) ground testing and rate calculations have been performed for 16-Mb DRAMs flown on the microelectronics and photonics testbed experiment (MPTB) using measured particle spectra and compared with space data from a period of high solar activity. The results show that with the measured spectra, the measurements agree quite well with the calculations. Using just modeled environments, the results do not agree as well.
|
3,181
|
Please write an abstract with title: Predicted information gain and convolutional neural network for prediction of gait periods using a wearable sensors network, and key words: Legged locomotion, Adaptation models, Adaptive systems, Wearable robots, Predictive models, Data collection, Activity recognition. Abstract: This work presents a method for recognition of walking activities and prediction of gait periods using wearable sensors. First, a Convolutional Neural Network (CNN) is used to recognise the walking activity and gait period. Second, the output of the CNN is used by a Predicted Information Gain (PIG) method to predict the next most probable gait period while walking. The output of these two processes are combined to adapt the recognition accuracy of the system. This adaptive combination allows us to achieve an optimal recognition accuracy over time. The validation of this work is performed with an array of wearable sensors for the recognition of level-ground walking, ramp ascent and ramp descent, and prediction of gait periods. The results show that the proposed system can achieve accuracies of 100% and 99.9% for recognition of walking activity and gait period, respectively. These results show the benefit of having a system capable of predicting or anticipating the next information or event over time. Overall, this approach offers a method for accurate activity recognition, which is a key process for the development of wearable robots capable of safely assist humans in activities of daily living.
|
3,182
|
Please write an abstract with title: 3D character model creation from cel animation, and key words: Animation, Deformable models, Image generation, Image sequences, Shape, Character generation, Shadow mapping, Computer graphics, Rendering (computer graphics), Layout. Abstract: When creating a cel animation, the animators often use 3D character models to add some effects on the character or to generate intermediate images between the keyframes. However, it is a troublesome and time-consuming task to create a 3D model. In this paper, we present an easy-to-use approach for creating a set of consistent 3D character models from the user-specified strokes on a 2D image sequence. The created consistent 3D models can be used in cel animation editing systems for adding shadowing effects, textures, etc. Moreover, since the vertices of the consistent 3D models have one-to-one correspondence among the frames, by using 3D morphing techniques, this approach can also be used to generate intermediate images between the key frames.
|
3,183
|
Please write an abstract with title: A 20-Gb/s Digitally Adaptive Linear Equalizer with 25dB loss for Single-ended Interfaces in 65nm CMOS, and key words: Semiconductor device modeling, Adaptation models, Equalizers, Power supplies, CMOS technology. Abstract: This paper describes the digitally adaptive linear equalizer with 25dB channel loss for single-ended interfaces in a 65nm CMOS technology. The proposed adaptation method achieves optimal-boosting using a comparator and digital logic. So, the proposed adaptation is insensitive to process variation. The adaptive linear equalizer is verified by post-layout simulations achieved 0.83 unit-interval (UI) eye-opening. The proposed adaptive linear equalizer occupies 0.08mm<sup>2</sup>, and power efficiency is 0.58pJ/b at 20Gb/s with 1.2V power supply.
|
3,184
|
Please write an abstract with title: Hardware Development for Joint Sparse Decentralized Heterogeneous Data Fusion for Target Estimation, and key words: Radio frequency, Target tracking, Surveillance, Software algorithms, Data integration, Computer architecture, Hardware. Abstract: For surveillance applications, users are typically interested in detecting and tracking targets of interest. In many surveillance systems, heterogeneous sensor data are collected by sensors of varying sensing modalities with different dimensionalities. However, individual sensing system collects only one kind of signal, leading to a lack of accuracy to characterize the target. One of the most popular approaches to overcome single sensor assessment is data fusion. In our recent work, a new joint-sparse data-level fusion (JSDLF) approach to integrate heterogeneous sensor data for target discovery is developed in the matter of using a decentralized architecture algorithm. Several decentralized implementations of the data-level fusion approach based on the JSDLF approach were developed and investigated in the software aspect. In this paper, the hardware development of this algorithm will be displayed. Several unmanned aerial vehicles (UAVs) were utilized as nodes for image or RF SIGINT data processing. Meanwhile, a computer with RF SIGINT data processing communicated with these nodes as decentralized architecture as the hardware development of this algorithm. The performance of the decentralized hardware development is represented in this paper and the results are comparable with only software development in the algorithm.
|
3,185
|
Please write an abstract with title: Communications cryptography, and key words: Public key cryptography, Information security, Privacy, Protection, Law enforcement, Communication system security, Wire, Wireless networks, Availability, Writing. Abstract: This paper focuses on the analysis of the two types of key cryptography which exist, based on the availability of the key publicly: private key cryptography, and public key cryptography. Both the sender and the recipient share a key that must be kept private. In the former case, the sender and recipient share a private key between the two of them which must be distributed first before actual communications take place. This analysis shows how very complicated and difficult this is to do properly. The most famous example of this type of cryptography is the data encryption standard (DES). In public key cryptography, each party has two sets of keys; one key is known to the public while the other is kept secret to the owner.
|
3,186
|
Please write an abstract with title: On automatic motion control with optimization, and key words: Motion control, Motion planning, Damping, Automatic control, Vehicle driving, Wheels, Steering systems, Feedback control, Charge coupled devices, Charge-coupled image sensors. Abstract: Steering a car by hand means that the driver plans a path by preview and controls the lateral deviation of the vehicle from the planned path by the steering wheel. In an automatic car steering system, this path following is automated. The deviation is kept small by feedback control via the steering motors. The reference trajectory may be calculated from the data of a CCD camera and the compensation scheme is derived by the data of a gyro or a GPS. The desired system behavior in the car steering motion is primarily to obtain good damping and an almost disturbance decoupling property. A certain stability margin should be satisfied and the actuator activity should not be too high. This desired system behavior is to be made precise by formulating performance criteria. In the design process of controller, a design parameter is chosen for the optimization process, which results in good damping, our primary objective is to approximately keep this damping. At the same time the lateral acceleration should be better attenuated in the representative response due to a yaw rate initial value disturbance. In order to study automatic car steering, the steering model must be extended. For the extended steering model with output equation whose elements can be measured by equipped sensors, the optimal regulator is introduced so that the vehicle can tracks the reference path.
|
3,187
|
Please write an abstract with title: MCORANFed: Communication Efficient Federated Learning in Open RAN, and key words: Wireless communication, Training, Costs, Federated learning, Quality of service, Resource management, Task analysis. Abstract: To bring network intelligence closer to the end devices, Open Radio Access Networks (O-RAN) specifies a disaggregated and vendor agnostic framework of hierarchical processing units. Although this framework can be useful for certain use cases of 5G smart services, no standardised method to train Machine Learning (ML) models has been defined. Recently, Federated Learning (FL) has emerged as a promising solution for training in disaggregated systems. Unfortunately, the stringent deadline of O-RAN control loops and fluctuating network band-width poses challenges for FL implementation. In this paper, we tackle this problem by proposing an accelerated gradient descent method to expedite the FL convergence, and a compression operator to reduce the communication cost. We formulate a joint optimization problem to select the participating local trainers in each global round of FL and allocate the resources to these trainers while minimizing the overall learning time and resource costs. We design an FL algorithm (MCORANFed) which adheres to the deadline of O-RAN control loops. Extensive experimental results show that MCORANFed outperforms state-of-the-art FL methods such as MFL, FedAvg, and FedProx in terms of its convergence and objective costs.
|
3,188
|
Please write an abstract with title: Best mapping for LDPC coded modulation on SISO, MIMO and MAC channels, and key words: Parity check codes, Modulation coding, MIMO, Iterative decoding, Fading, Convolutional codes, Rayleigh channels, Receiving antennas, Transmitting antennas, Iterative methods. Abstract: Mapping has a significant impact on multilevel modulation schemes. These schemes for conventional codes with iterative demapping and decoding on static channel and Rayleigh fading channel have been studied previously. In this paper, we first investigate the mapping influence on LDPC-code based multilevel modulations on static and Rayleigh fading channels. Then we extend our work to multiple-input multiple-output (MIMO) fading channels and MIMO multiple access channels (MAC). A conclusion can be made as that the Gray map is the best with both iterations and super-iterations for all these channels, which is different from the results of conventional codes.
|
3,189
|
Please write an abstract with title: Fuzzy coded trellis quantization, and key words: Quantization, Context modeling, Arithmetic, Fuzzy logic, Image coding, Probability, Computer science, Art, Entropy coding, Optimization methods. Abstract: In this paper we propose an image compression algorithm based on embedded trellis quantization and inventive fuzzy context based modeling (TCQFCB). The indices produced by trellis-coded quantization are adaptively arithmetically coded, bit plane by bit plane. The fuzzy logic is used to assign the probability of the coded symbol for an arithmetic coder. The probability of the coded bit depends on the previous coded bits. The fuzzy logic is used in order to attribute the highest possible probability of the coded bit. The performance of the proposed method is comparable with the state-of-the-art methods.
|
3,190
|
Please write an abstract with title: Cluster time series based on partial information, and key words: Data mining, Information retrieval, Discrete Fourier transforms, Discrete wavelet transforms, Clustering algorithms, Machine learning algorithms, Information analysis, Algorithm design and analysis, Laboratories, Intelligent systems. Abstract: Cluster analysis has been studied extensively for many years. Recently, there has been a lot of interest in using cluster techniques in mining time series data. The previous cluster models mainly focus on the overall and the most remarkable series behaviors. We address the problem: using a portion of information in clustering time series. We describe a model for retrieving and representing the partial information in time series data. By using this model, a methodology for partial-information-based clustering is proposed. We evaluate our approach through comparing the results with a standard classification. The results show our approach could outperform the previous clustering method that is based on the whole information of time series.
|
3,191
|
Please write an abstract with title: Writing the claims for a patent, and key words: Writing, Vocabulary, Law, Legal factors, Protection, Natural languages, Painting, Mood, Testing. Abstract: Most of the body of a patent is written in plain English. The exception is the claims section, which is the section of primary legal importance. The claims determine what aspects of the invention are protected by the patent. Attorneys write claims in claim language, a special style of writing. Claims are difficult to read when you are new to the patenting process and don't understand the basic structure and semantics of claim language. In this paper, the author explains the basic vocabulary and structure of a claim to demystify claim language.
|
3,192
|
Please write an abstract with title: Development and Contribution to Students’ Intercultural Skills: A Case Study of an International Collaborative Site, and key words: Interviews, Cultural differences, Acoustics, Collaboration, Sensors, Ear, Microphones. Abstract: This work-in-progress research paper presents our experiences with an NSF-sponsored International Research Experiences for Undergraduates (IRES) program. A major component of the program is implemented at an international laboratory in China. The lab has been established in 2010 as a collaborative research platform, for a large land-grant university in the U.S. and a public comprehensive university in China, to study the biosonar sensing and flight of bats from an engineering perspective. The lab has pioneered work on the diversity and dynamics of the structures (noseleaves and ears) that bats use to emit and receive ultrasonic pulses In addition, the lab has hosted research experiences for international (primarily U.S.) students and collaborative BS/MS and MS/PhD educational programs. In the last two years, two cohorts of IRES scholars completed IRES 10-week program. In addition to research and technical experiences, the IRES students participated in several field trips and seminars and were exposed to Chinese culture. To better understand the impact of the program, students were invited to complete pre- and post-program surveys and a post-program interview. The surveys included cultural intelligence assessment, Global Competency Activity, and Sojourn Readiness Assessment. In addition, students answered a few open-ended questions about their technical and cultural experiences. In this paper, we first explain the history of the lab and its research and educational contribution to date. Then, we describe the IRES program and program evaluation measures. Finally, we focus on the influence of the program on students' intercultural skills and present the results from interviews.
|
3,193
|
Please write an abstract with title: Tailoring force-stroke characteristics in medium-stroke linear reluctance actuators, and key words: Hydraulic actuators, Valves, Electromagnetic forces, Robust control, Motion control, Servomechanisms, Internal combustion engines, Reluctance generators, Shape, Finite element methods. Abstract: Summary form only given. Linear reluctance actuators based on a pair of C-cores offer a robust and high efficiency solution for controlled linear motion when strokes of the order several mm are required, e.g. electro-hydraulic servo valves. Although such actuators are capable of producing a relatively constant force over a significant proportion of their stroke, there is inevitably a roll-off in force as the armature moves towards full alignment. In some cases that require a near constant-force, restricting the working stroke can accommodate this roll-off in force. However, there are some applications in which the space envelope for the actuator is very constrained, e.g. electromagnetic valve actuation systems for internal combustion engines, as a consequence of which it may be necessary to employ the entire stroke. One approach that is investigated in this paper is to incorporate a degree of overhang in order to generate a component of normal reluctance force, which increases in magnitude as the actuator comes into alignment. The ability to optimise the dimensions and the shape of the overhanging pole and the upper edge of the armature affords considerable scope to tailor the force-stroke characteristic to the specific demands of the end application. This feature is illustrated by means of two detailed design studies. In the first case, the aim is to generate a near constant force over the entire stroke, while in the second case, the aim is to supplement a near constant force with a significant holding force near alignment, as might be required for example in electromagnetic valve actuation systems. The design studies include extensive finite element analysis of various actuators and are supported by experimental measurements on prototype devices.
|
3,194
|
Please write an abstract with title: Polyphase Watt-Hour Measurement Methods Based on Back Propagation Neural Network, and key words: Backpropagation, Sensitivity, Current measurement, Neural networks, Training data, Predictive models, Stability analysis. Abstract: This paper propses watt-hour measurement methods based on the back propagation neural network, and the watt-hour measurement accuracy is verified, where the measurement analysis in terms of its sensitivity is performed for the input data sets. Besides, the accuracy of the method is a function of the training data sets and multiple model parameters. The analysis is based on measurement method activities carried out by a real watt-hour accuracy measurement system validated by polyphase meters.
|
3,195
|
Please write an abstract with title: Barrier crystallographic texture control and its impact on copper interconnect reliability, and key words: Crystallography, Copper, Scanning electron microscopy, Surface resistance, Stability, Surface morphology, Probes, X-ray diffraction, X-ray scattering, Electrical resistance measurement. Abstract: The impacts of barrier micro-structure on Cu seed and electro copper plating (ECP) film have been investigated in terms of seed sheet resistance (R/sub s/) stability, crystal orientation, and wetting properties; ECP film surface morphology and CMP defects. We have studied the effect of these parameters using 4-point probe, X-ray diffraction (XRD), scanning electron microscopy (SEM), and SEM vision. We also studied barrier impact on via resistance and interconnect reliability using E-test measurement and stress migration test. It was found that barrier layer micro-structure can manipulate seed layer and ECP film properties, which affect E-test performance. The seed layer deposited on highly <110>-oriented /spl alpha/-Ta underlayer shows better Cu <111> orientation, resulting in a seed with stable R/sub s/, better wetting properties, smoother ECP film, and lower defects. In addition, it shows lower via resistance and better interconnection reliability.
|
3,196
|
Please write an abstract with title: Visual Defect Detection for Substation Equipment based on Joint Inspection Data of Camera and Robot, and key words: Inspection, Substations, Robots, Machine learning, Adaptation models, Feature extraction, Meters. Abstract: The basic principle of joint inspection with video and robot is that the deep learning algorithm can extract specific defect features from mass images and video data. However, the defect information of substation equipment is often masked by label noise and complex backgrounds. Futhermore, there are many different types of equipment in the substation and the defect varies from equipment to equipment, which increases the difficulty of detection. Previous work mostly focuses on defect features of single frame image, which ignores the association between typical defect characteristics and the substation equipments. Besides, it requires manual selection for preliminary image annotation. To solve the above-mentioned problems, this paper proposes a visual defect detection strategy for substation equipments using cascade deep learning model. The efficacy of the proposed method is verified through an experiment based on electrical equipment of substation.
|
3,197
|
Please write an abstract with title: Designer Terahertz Frequency Comb Generation, and key words: Optical fibers, Lasers and electrooptics, Electrooptical waveguides, Standards, Optical devices, Fiber lasers. Abstract: We present a simple method to generate almost arbitrary Terahertz frequency combs, between 0.1 and 3.6 THz with single line linewidths of 10 MHz, based on a robust optical system built from standard fiber-optic components.
|
3,198
|
Please write an abstract with title: Formulation and comparison of two detectors of independent timing jitter in a complex harmonic, and key words: Detectors, Timing jitter, Sampling methods, Random processes, Optical arrays, Signal sampling, Humans, Lenses, Charge coupled devices, Additive white noise. Abstract: Two detectors of symmetrically distributed independent timing jitter in a data record composed of a complex harmonic in additive white Gaussian noise are proposed. The proposed detectors are computationally efficient, and although they are formulated using asymptotic results, they may be effectively used with small sample lengths under a wide range of conditions. The conditions required for consistency of the detectors are derived and examined for important special cases. The performances of the detectors are analyzed using simulations.
|
3,199
|
Please write an abstract with title: Waveform Classification in Radar-Communications Coexistence Scenarios, and key words: OFDM, Modulation, Radar, Time-frequency analysis, Quadrature amplitude modulation, Multiple signal classification, Fading channels. Abstract: In this paper the problem of recognizing waveform and modulation is addressed in radar-communications coexistence and shared spectrum scenarios. We propose a deep learning method for waveform classification. A hierarchical recognition approach is employed. The received complex-valued signal is first classified to single carrier radar, communication or multicarrier waveforms. Fourier synchrosqueezing transformation (FSST) time-frequency representation is computed and used as an input to a convolutional neural network (CNN). For multicarrier signals, key waveform parameters including the cyclic prefix (CP) duration, number of subcarriers and subcarrier spacing are estimated. The modulation type used for subcarriers is recognized. Independent component analysis (ICA) is used to enforce independence of I- and Q-components, and consequently significantly improving the classification performance. Simulation results demonstrate the high classification performance of the proposed method even for orthogonal frequency division multiplexing (OFDM) signals with high-order quadrature amplitude modulation (QAM).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.