ID
int64 0
400k
| content
stringlengths 97
5.85k
|
|---|---|
3,500
|
Please write an abstract with title: Adaptive signal processing using a modified gradient estimation technique, and key words: Adaptive signal processing, Signal processing algorithms, Convergence, Least mean square algorithms, Least squares approximation, Least squares methods, Resonance light scattering, Computational complexity, Lattices, Noise cancellation. Abstract: An algorithm based on the gradient descent approach is proposed for adaptive signal processing. The algorithm outperforms the least mean square algorithm (LMS) in terms of convergence speed and misadjustment noise, and meets the performance characteristics of the conjugate gradient (OG) and recursive least squares (RLS) methods without the attendant computational complexity. It is simple to implement and lends itself to real time processing. The algorithm can be implemented using lattice or tap-delay line structures. In this paper extensive computational results are presented to illustrate the algorithm performance in terms of convergence properties, and its applications in adaptive noise cancelling and adaptive spectral analysis.
|
3,501
|
Please write an abstract with title: Application of Blended Teaching Mode Based on Constructivism Theory, and key words: Computers, Education, Information processing. Abstract: The constructivism theory emphasizes the student's main body position in the teaching process, highlights the teacher's guidance and the supervision function. Based on the connotation of the constructivism theory, with the aid of modern multimedia teaching technology, taking “Basic Accounting” course as an example, constructs “Blended Teaching” situation of before-class (online), during-class (offline), after-class(online and offline), explores the “online and offline” blended teaching innovative way under the perspective of constructivism theory, and evaluates the implementation effect of this teaching method.
|
3,502
|
Please write an abstract with title: A Supply Chain Model of Petrochemical Products Based on Internet of Things, and key words: Cloud computing, Analytical models, Supply chain management, Oils, Supply chains, Petrochemicals, User experience. Abstract: Contraposing to the problem of logistics information construction in China's oil product sales enterprises, a new intelligent logistics management system model based on the Internet of things(IoT) is proposed. In the field of manufacturing, manufacturing enterprises can realize the real-time and dynamic perception of manufacturing resources and manufacturing capacity by using IoT, and access the cloud platform through virtual access technology. Then the cloud platform perform unified management and service, to achieve the goal of optimal allocation of manufacturing resources and manufacturing capacity. Through specific cases to determine the main components of the petrochemical products logistics supply chain management system framework and system, we make use of modern logistics simulation technology to analyze the main modules, and to prove that the actual operation process of the enterprise with practicality and operability.
|
3,503
|
Please write an abstract with title: Discrete hierarchical supervisory control for autonomous underwater vehicle, and key words: Supervisory control, Underwater vehicles, Control systems, Machine intelligence, Humans, Vehicle dynamics, Intelligent control, Controllability, Observability, Virtual reality. Abstract: An autonomous underwater vehicle (AUV) is an unmanned untethered underwater vehicle managed by its control architecture. If we want an AUV to undertake a user-specified mission without the presence of a human, the control system should have enough machine intelligence. The present paper, based on the RW supervisory control theory of Discrete Event Dynamic Systems (DEDS) developed by Ramadge and Wonham, presents discrete hierarchical supervisory control for the intelligent level of AUV control architecture. The DEDS formalism models of AUVs are given in detail. Then the controllability and observability are outlined. The simulation results on the semi-physical virtual reality system shows that the control cannot only coordinate properly sensing, planning and motion but also make the vehicle to adapt to some relatively complex unknown ocean environment.
|
3,504
|
Please write an abstract with title: Spatial Context-Aware Self-Attention Model For Multi-Organ Segmentation, and key words: Image segmentation, Solid modeling, Three-dimensional displays, Image analysis, Computed tomography, Magnetic resonance imaging, Information filters. Abstract: Multi-organ segmentation is one of most successful applications of deep learning in medical image analysis. Deep convolutional neural nets (CNNs) have shown great promise in achieving clinically applicable image segmentation performance on CT or MRI images. State-of-the-art CNN segmentation models apply either 2D or 3D convolutions on input images, with pros and cons associated with each method: 2D convolution is fast, less memory-intensive but inadequate for extracting 3D contextual information from volumetric images, while the opposite is true for 3D convolution. To fit a 3D CNN model on CT or MRI images on commodity GPUs, one usually has to either downsample input images or use cropped local regions as inputs, which limits the utility of 3D models for multi-organ segmentation. In this work, we propose a new framework for combining 3D and 2D models, in which the segmentation is realized through high-resolution 2D convolutions, but guided by spatial contextual information extracted from a low-resolution 3D model. We implement a self-attention mechanism to control which 3D features should be used to guide 2D segmentation. Our model is light on memory usage but fully equipped to take 3D contextual information into account. Experiments on multiple organ segmentation datasets demonstrate that by taking advantage of both 2D and 3D models, our method is consistently outperforms existing 2D and 3D models in organ segmentation accuracy, while being able to directly take raw whole-volume image data as inputs.
|
3,505
|
Please write an abstract with title: An Active Set Approximation Method for the Design of Broadband Beamformer, and key words: Microphone arrays, Programming, Array signal processing, Approximation methods, Mathematical model, Finite impulse response filters. Abstract: The microphone array beamformer design problem in far-field environment is to design the coefficients of FIR filters such that the maximum error between the actual response and the desired response in a specified domain is minimized. The specified domain is always very large and this problem is a large scale optimization problem. In general the complexity of the optimal method for solving this problem is very expensive. This paper applies an active set approximation method to solve this problem. First, this paper transforms this problem into a semi-infinite programming problem. Next, this paper finds an approximate active set such that the scale of the problem can be mostly reduced. Then, this problem can be solved efficiently and the approximate solution is very close to the optimal solution. Numerical experiments are illustrated to show the efficiency of the proposed method.
|
3,506
|
Please write an abstract with title: Bayesian forward modelling of cosmic shear data, and key words: gravitational lensing: weak, methods: data analysis, cosmology: large-scale structure of Universe. Abstract: We present a Bayesian hierarchical modelling approach to infer the cosmic matter density field, and the lensing and the matter power spectra, from cosmic shear data. This method uses a physical model of cosmic structure formation to infer physically plausible cosmic structures, which accounts for the non-Gaussian features of the gravitationally evolved matter distribution and light-cone effects. We test and validate our framework with realistic simulated shear data, demonstrating that the method recovers the unbiased matter distribution and the correct lensing and matter power spectrum. While the cosmology is fixed in this test, and the method employs a prior power spectrum, we demonstrate that the lensing results are sensitive to the true power spectrum when this differs from the prior. In this case, the density field samples are generated with a power spectrum that deviates from the prior, and the method recovers the true lensing power spectrum. The method also recovers the matter power spectrum across the sky, but as currently implemented, it cannot determine the radial power since isotropy is not imposed. In summary, our method provides physically plausible inference of the dark matter distribution from cosmic shear data, allowing us to extract information beyond the two-point statistics and exploiting the full information content of the cosmological fields.
|
3,507
|
Please write an abstract with title: Predicting RNA-RBP Interactions by Using a Pseudo-Siamese Network, and key words: Proteins, Training, Representation learning, Deep learning, Protein engineering, Economic indicators, RNA. Abstract: Large scale RNA-protein binding data made computational identification of RNA-protein interactions possible, which provides great convenience for revealing the interplay between non-coding RNAs and RNA-binding proteins (RBPs). Various machine learning methods have been applied to the prediction of RNA-protein interactions (RPIs). However, most of the RPI predictors were designed for linear RNAs, while methods for circular RNAs (circRNAs) are few. Besides, most of the predictors use only RNA sequence or only protein sequences as input. Automatic feature learning from RNA and RBP sequences using deep neural networks has great potential to improve RPI predictors. In this paper, we propose a new method, PSi-bind, to predict the binding relationship between RNAs and RBPs, which is featured by a pseudo-Siamese neural network. We feed both RNA and RBP sequence embedding features to the network and perform an end-to-end learning to discover the latent association between RNAs and RBPs. Especially, we train our model on a large-scale circRNA dataset. The experimental results show that the model achieves very high accuracy on independent test set, and outperforms the state-of-the-art RPI predictors by a large margin.
|
3,508
|
Please write an abstract with title: Modelling the impact of social distancing and targeted vaccination on the spread of COVID-19 through a real city-scale contact network, and key words: COVID-19 vaccination, social distancing, epidemic modeling, contact network, mobile device data. Abstract: We use mobile device data to construct empirical interpersonal physical contact networks in the city of Portland, Oregon, both before and after social distancing measures were enacted during the COVID-19 pandemic. These networks reveal how social distancing measures and the public's reaction to the incipient pandemic affected the connectivity patterns within the city. We find that as the pandemic developed there was a substantial decrease in the number of individuals with many contacts. We further study the impact of these different network topologies on the spread of COVID-19 by simulating an SEIR epidemic model over these networks and find that the reduced connectivity greatly suppressed the epidemic. We then investigate how the epidemic responds when part of the population is vaccinated, and we compare two vaccination distribution strategies, both with and without social distancing. Our main result is that the heavy-tailed degree distribution of the contact networks causes a targeted vaccination strategy that prioritizes high-contact individuals to reduce the number of cases far more effectively than a strategy that vaccinates individuals at random. Combining both targeted vaccination and social distancing leads to the greatest reduction in cases, and we also find that the marginal benefit of a targeted strategy as compared to a random strategy exceeds the marginal benefit of social distancing for reducing the number of cases. These results have important implications for ongoing vaccine distribution efforts worldwide.
|
3,509
|
Please write an abstract with title: Efficient publication of distributed and overlapping graph data under differential privacy, and key words: Distributed databases, Differential privacy, Privacy, Standards, Heuristic algorithms, Data models, Data analysis. Abstract: Graph data publication has been considered as an important step for data analysis and mining. Graph data, which provide knowledge on interactions among entities, can be locally generated and held by distributed data owners. These data are usually sensitive and private, because they may be related to owners' personal activities and can be hijacked by adversaries to conduct inference attacks. Current solutions either consider private graph data as centralized contents or disregard the overlapping of graphs in distributed manners. Therefore, this work proposes a novel framework for distributed graph publication. In this framework, differential privacy is applied to justify the safety of the published contents. It includes four phases, i.e., graph combination, plan construction sharing, data perturbation, and graph reconstruction. The published graph selection is guided by one data coordinator, and each graph is perturbed carefully with the Laplace mechanism. The problem of graph selection is formulated and proven to be NP-complete. Then, a heuristic algorithm is proposed for selection. The correctness of the combined graph and the differential privacy on all edges are analyzed. This study also discusses a scenario without a data coordinator and proposes some insights into graph publication.
|
3,510
|
Please write an abstract with title: DCT-GAN: Dilated Convolutional Transformer-Based GAN for Time Series Anomaly Detection, and key words: Time series analysis, Generative adversarial networks, Data models, Anomaly detection, Transformers, Generators, Convolutional neural networks. Abstract: Time series anomaly detection (TSAD) is an essential problem faced in several fields, e.g., fault detection, fraud detection, and intrusion detection, etc. Although TSAD is a crucial problem in anomaly detection, few solutions in anomaly detection are suitable for it at present. Recently, some researchers use GAN-based methods such as TAnoGAN and TadGAN to solve TSAD problem. However, problems such as model collapse, low generalization capability and poor accuracy still exist. In this article, we proposed a Dilated Convolutional Transformer-based GAN (DCT-GAN) to enhance accuracy and improve generalization capability of the model. Specifically, DCT-GAN utilize several generators and a single discriminator to alleviate the mode collapse problem. Each generator consists of a dilated convolutional neural network and a Transformer block to obtain fine-grained and coarse-grained information of the time series, which is a useful component to improve generalization capability. We also use weight-based mechanism to balance these generators. Experiments verify the effectiveness of our method and each part of DCT-GAN.
|
3,511
|
Please write an abstract with title: Development of Eco-Industrial Park in Sindh, Pakistan, and key words: Industries, Power generation, Production, Coal, Economics, Pharmaceuticals, Green products. Abstract: Industrialization plays major role in economic development and it is growing very rapidly to fulfil the requirements of resident by increasing production. However, creating financial advantages is no longer the sole goal of industrial growth in the present worldwide sustainable industrial development trend due to the depletion of ozone layer, eco system destruction and changed weather phenomena severely. Nowadays, increasing importance is given on the idea of compatible and continuous economic, ecological and social growth, and the use of eco-efficiency to assess the relationship among the environment influence and economic cost and Eco-industrial Park (EIP) is the solution of dropping environmental problems and promoting financial interests through the interchange of products and energy between sectors for mutual benefit. Thus, the main purpose of this research is to model an Eco-Industrial park in Sindh region in order to find the feasibility as well as cost savings benefits. To achieve this firstly, the literature review and field survey is carried out to identify the potential industries, which are suitable for establishing an Eco - Industrial park. Secondly, the data of wastes/by-products of these industries are determined, after that the model is prepared to show the material flow between the waste producing and utilizing industries. Finally, the possible utilization of these wastes/byproducts is worked out. It is estimated that the coal power plant produces 2273 tons of fly-ash, 239.9 tons of bottom ash and 300 tons of gypsum every day. Thus, utilizing these wastes/byproducts will save around Rs. 2.27 million daily.
|
3,512
|
Please write an abstract with title: Anomaly Detection in Digital Twin Model, and key words: Productivity, Costs, Digital twin, Time series analysis, Predictive models, Maintenance engineering, Feature extraction. Abstract: As the simulation model of a physical system, digital twin has been widely used in many complicated control systems. Providing an effective way to perform simulation, digital twin makes the evaluation, prediction and optimization process cheaper and easier than on physical systems. For smart manufacturing, digital twin achieves high productivity with less operation and maintenance cost. However, the advantages of digital twin in anomaly detection during manufacturing are always neglected. Taking a two-speed transmission system as an example, we generate three kinds of faults on this digital twin model. After extracting features from the system output, we train an anomaly detection model on these features to classify each type of fault. By this digital twin model, we can find the fault in the whole system at the very beginning, and reduce the time and cost of debugging and diagnosing.
|
3,513
|
Please write an abstract with title: Intelligent Task Offloading Algorithm for Mobile Edge Computing in Vehicular Networks, and key words: Task analysis, Servers, Cloud computing, Delays, Artificial neural networks, Computational modeling, Resource management. Abstract: Based on the research of network and computing, while considering the delay of vehicular networks, this paper proposes an intelligent task offloading framework that can dynamically schedule network and computing resources to improve the performance of next-generation vehicular networks. Considering the task computing problem of the vehicles and the applications of the mobile edge computing (MEC), an intelligent task offloading joint optimization algorithm is proposed in this paper. The algorithm firstly uses the K-Nearest Neighbors (KNN) method to select the offloading platform (i.e., cloud computing, mobile edge computing, local computing) of the computing task. Considering the computing resource allocation problem and the complexity of the system, the algorithm secondly uses the reinforcement learning method to solve the resource allocation problem effectively. Simulation results show that, comparing to the baseline algorithm that all tasks are offloaded to the local or MEC server, the proposed algorithm achieves a significant reduction in latency cost. Compared with the Ful1 MEC” algorithm, the proposed algorithm can save 80% of the average system cost.
|
3,514
|
Please write an abstract with title: A Novel Design of Compact Antenna Test Range for Ultra-Precise Antenna Test, and key words: Antenna measurements, Patents, Shape, 5G mobile communication, Scattering, Europe, Reflector antennas. Abstract: A novel compact antenna test range (CATR) design is presented in this study. Conventionally, the edges of the reflector are parallel to the chamber walls. Instead, a diamond-shape reflector (DSR) is proposed in this design. The reflector is rotated for 45 degrees, so the corners of DSR point to the walls (patent pending).This design suppresses the scattering from the absorbers on the walls, which improves quiet-zone (QZ) performance accordingly. This is important for some applications, such as angle-of-arrival (AoA), which are sensitive to clutters. In addition, the chamber size can be more compact as the new design allows shorter distance between the reflector and the walls. The design has been realized and validated with QZ measurement.
|
3,515
|
Please write an abstract with title: An Incentivized and Optimized Dynamic Mechanism for Demand Response for Managing Voltage in Distribution Networks, and key words: Voltage control, Home appliances, Distribution networks, Load flow control, Reactive power, Optimization, Demand response, Solar power generation, Photovoltaics. Abstract: The voltage regulation in distribution networks is one of the major obstacles when increasing the penetration of distributed generators (DGs) such as solar photovoltaics (PV), especially during cloud transients, causing potential stress on network voltage regulations. Residential demand response (DR) is one of the cost-effective solutions for voltage management in distribution networks. However, the main barriers of DR implementation are the complexities of controlling a large number and different types of residential loads, satisfying customers’ preferences and providing them fair incentives while identifying the optimum DR implementation locations and sizing as well as cooperating with the existing network equipment for the effective voltage management in the networks. A holistic and practical approach of DR implementation is missing in the literature. This study proposes a dynamic fair incentive mechanism using a multi-scheme load control algorithm for a large number of DR participants coordinating with the existing network equipment for managing voltage at medium voltage (MV) networks. The multi-scheme load control is comprised of short-interval (10-minute) and long-interval (2-hour) DR schemes. The dynamic incentive rates are optimized based on the energy contribution of DR participating consumers, their influence on the network voltage and total power loss improvement. The proposed method minimizes the DR implementation cost and size, fairly incentivizes the consumers participating in the DR and priorities their consumption preferences while reduces the network power losses and DGs’ reactive power contributions to effectively manage the voltage in the MV networks. An improved hybrid particle swarm optimization algorithm (IHPSO) is proposed for the load controller to provide fast convergence and robust optimization results. The proposed approach is comprehensively tested using the IEEE 33-bus and IEEE 69-bus networks with several scenarios considering a large number of DR participants coordinated with the DGs and on-load tap changer (OLTC) in the networks.
|
3,516
|
Please write an abstract with title: Edge based adaptive Kalman filtering for real-time video stabilization, and key words: Kalman filters, Adaptive filters, Filtering, Motion estimation, Costs, Video equipment, Digital cameras, Surveillance, TV, Digital video broadcasting. Abstract: Image stabilization, particularly during zoom-in is an important feature in consumer cameras. Existing methods to stabilize an image often make an incorrect motion vector by an improper choice of motion estimation or correction method. The proposed algorithm is simple and effective; it is suitable for low cost camcorders, digital cameras, CCTV, surveillance video systems, and television broadcasting systems.
|
3,517
|
Please write an abstract with title: Demonstration of Intelligent HVAC Load Management With Deep Reinforcement Learning: Real-World Experience of Machine Learning in Demand Control, and key words: Heating systems, Energy consumption, HVAC, Demand response, Machine learning, Ventilation, Load management, Reinforcement learning. Abstract: Buildings account for 40% of total primary energy consumption and 30% of all CO<sub>2</sub> emissions worldwide. A large portion of building energy consumption is due to heating, ventilation, and air-conditioning (HVAC) systems. In the summer, for example, more than 50% of a building’s electricity consumption is used for cooling. With proper energy management, buildings can provide load shifting, peak shaving, frequency regulation, and many other demand response services.
|
3,518
|
Please write an abstract with title: Interactive Methodology to Iteratively Add Functionality to Swarm Programs, and key words: Conferences, Sociology, Statistics. Abstract: In this paper we present a technique for adding functionality to swarm programs leveraging both human observation and mechanical program transformation. The technique combines two homogeneous swarms - one that executes a baseline set of behaviors and another that independently implements the new functionality. The two are combined into a heterogeneous swarm with which humans interact to establish effective population ratios between the two, to produce the best outcome. The two behavioral rulesets are then mechanically fused to create a new homogeneous swarm that exhibits both behaviors. This swarm becomes the new baseline to which additional behaviors can be added by repeating the process. We demonstrate this technique in a simulated swarm environment.
|
3,519
|
Please write an abstract with title: Per-flow delay performance in traffic aggregates, and key words: Delay, Aggregates, Traffic control, Telecommunication traffic, Scalability, Statistics, Performance analysis, Processor scheduling, Queueing analysis, Laboratories. Abstract: Class-based traffic treatment frameworks such as differentiated service (DiffServ) have been proposed to resolve the poor scalability problem in the flow-based approach. Although the performance is differentiated in a class-based basis, the performance seen by individual flows in the same class may differ from that seen by the class and has not been well understood. We investigate this issue by simulation in a single node under FIFO, static priority, waiting time priority, and weighted fair queueing scheduling schemes. Our results indicate that such performance discrepancy occurs especially when flows joining the same class are heterogeneous, which is not uncommon considering that the same type of applications can generate traffic having very different statistical behaviors such as video traffic with different activity levels, or voice traffic with different compression schemes. We found that per-flow delay statistics, including the average and the 99/sup th/ percentile delay, can be very different from the corresponding class delay statistics, depending on flow burstiness, overall traffic load, as well as the queue discipline. We also propose a solution to reduce the mean delay variance experienced by flows in the same class.
|
3,520
|
Please write an abstract with title: Stabilization of Logical Dynamic Networks via Event-Triggered Switching Signals and Its Application, and key words: Switches, Lyapunov methods, Stability criteria, Switched systems, Costs, Switching systems, Matrix converters, Boolean functions. Abstract: This paper studies the stabilization of logical dynamic networks (LDNs) via event-triggered switching signals. Compared with existing results, the designed switching signal does not need to be updated at each time step, and it will greatly reduce the waste of resources in the process of information transmission. At present, most of the proposed event-triggered mechanisms (ETMs) for LDNs are available for special systems and are also difficult to implement in practice. Our goal is to propose an ETM with generality and strong operability, under which the designed switching signals can be used to stabilize the addressed system. Considering that the Lyapunov method can be successfully applied to investigating the stability of different LDNs, here we propose the concept of switching Lyapunov function and try to establish the ETM based on the switching Lyapunov function. A necessary and sufficient condition is derived from the existence of the switching Lyapunov function for the stabilization of LDNs via event-triggered switching signals. In terms of the obtained switching Lyapunov functions, two algorithms are further developed to seek the time-optimal switching sequence and cost-optimal switching sequence. Moreover, the obtained results are applied to the stabilization of LDNs with logical switching as well as impulsive LDNs. An example is finally given to show the effectiveness of the theoretical results.
|
3,521
|
Please write an abstract with title: Towards Generating Contextual and Empathetic Response for Covid-related Queries, and key words: COVID-19, Pandemics, Oral communication, Reinforcement learning, Transformers, Real-time systems, Context modeling. Abstract: This work addresses the vital need of keeping people informed with relevant, correct and essential information during the pandemic. Advanced NLP and machine learning mechanisms have been leveraged to generate responses to user queries through contextual conversation. In order to help people be discerning about what information they receive, a conversational system is proposed that identifies the correct intent of the query and a reinforcement Learning based generation model is used to proceed with conversation. We propose an end-to-end real-time text generation model that can respond to users queries on covid19. We created a new dataset with 1200+ covid-related questions from various sources and pre-processed them for a brief and direct answer. The dataset has also been manually observed to identify depressed questions and the responses are converted to be more empathetic. The dataset has been used to fine-tune DailoGPT, a GPT2-based transformer model to generate the responses related to COVID. COVID-related queries are bucketed into 15 categories to identify the exact intent of people. Our model generated both contextual and empathetic responses and achieved a human evaluation score of 3.48 (on a scale of 5) in terms of contextual relevance and a score of 2.12 (on a scale of 3).
|
3,522
|
Please write an abstract with title: On the Analytical Determination of the Complex Relative Permeance Function for Slotted Electrical Machines, and key words: Air gaps, Atmospheric modeling, Magnetostatics, Magnetic domains, Boundary conditions, Zinc, Mathematical model. Abstract: The complex relative permeance function is a suitable tool to predict the air gap magnetic field in slotted stator electrical machines. In the literature, the complex permeance function is usually identified by means of numerical techniques based on complex approaches such as conformal mapping or subdomain method. In this paper, an alternative approach is proposed. This method is based on solving the magnetostatic Laplace equation over a portion of the slotted air gap by imposing appropriate boundary conditions in the slot opening region. Such boundary condition tries to represent the theoretical trend of the magnetic field divergence near the corner-shaped ferromagnetic regions. The Carter theory for the slot fringing effect is also used. A fully analytical formulation for the complex relative permeance function is obtained, and its accuracy is assessed by comparison with Finite Element Analysis (FEA).
|
3,523
|
Please write an abstract with title: Real-Time Accident Detection in Traffic Surveillance Using Deep Learning, and key words: Shape, Surveillance, Object detection, Traffic control, Cost function, Real-time systems, Trajectory. Abstract: Automatic detection of traffic accidents is an important emerging topic in traffic monitoring systems. Nowadays many urban intersections are equipped with surveillance cameras connected to traffic management systems. Therefore, computer vision techniques can be viable tools for automatic accident detection. This paper presents a new efficient framework for accident detection at intersections for traffic surveillance applications. The proposed framework consists of three hierarchical steps, including efficient and accurate object detection based on the state-of-the-art YOLOv4 method, object tracking based on Kalman filter coupled with the Hungarian algorithm for association, and accident detection by trajectory conflict analysis. A new cost function is applied for object association to accommodate for occlusion, overlapping objects, and shape changes in the object tracking step. The object trajectories are analyzed in terms of velocity, angle, and distance in order to detect different types of trajectory conflicts including vehicle-to-vehicle, vehicle-to-pedestrian, and vehicle-to-bicycle. Experimental results using real traffic video data show the feasibility of the proposed method in real-time applications of traffic surveillance. In particular, trajec-tory conflicts, including near-accidents and accidents occurring at urban intersections are detected with a low false alarm rate and a high detection rate. The robustness of the proposed framework is evaluated using video sequences collected from YouTube with diverse illumination conditions. The dataset is publicly available at: http://github.com/hadi-ghnd/AccidentDetection.
|
3,524
|
Please write an abstract with title: On convergence of the Horn and Schunck optical-flow estimation method, and key words: Convergence, Jacobian matrices, Equations, Gaussian processes, Matrix decomposition, Symmetric matrices, Linear systems, Image motion analysis, Sparse matrices, State estimation. Abstract: The purpose of this study is to prove convergence results for the Horn and Schunck optical-flow estimation method. Horn and Schunck stated optical-flow estimation as the minimization of a functional. When discretized, the corresponding Euler-Lagrange equations form a linear system of equations. We write explicitly this system and order the equations in such a way that its matrix is symmetric positive definite. This property implies the convergence Gauss-Seidel iterative resolution method, but does not afford a conclusion on the convergence of the Jacobi method. However, we prove directly that this method also converges. We also show that the matrix of the linear system is block tridiagonal. The blockwise iterations corresponding to this block tridiagonal structure converge for both the Jacobi and the Gauss-Seidel methods, and the Gauss-Seidel method is faster than the (sequential) Jacobi method.
|
3,525
|
Please write an abstract with title: Reliability Assessment of the External Power Supply in Electrified Railways With Weak Power Sources, and key words: Reliability, Power system reliability, Power supplies, Rail transportation, Power systems, Substations, Generators. Abstract: Reliable external power supplies guarantee the safe and reliable operation of electrified rail-ways. Once the external power system fails, it disrupts the normal operation of trains and, especially for railways supplied by weak external power sources, may well incur serious accidents. Therefore, this paper proposes a reliability evaluation method of external power supplies of electrified railways with weak external power sources. Firstly, a weak external power system of electrified railways is modelled. Then, system operational states are analyzed by integrating Monte Carlo simulation with the DC optimal power flow (OPF) algorithm considering system node weight coefficients. Finally, reliability evaluation metrics are defined to quantify the reliability of both power system nodes and traction substations. A case study of a typical weak external power system supplying the electrified railways is presented to demonstrate the proposed method. Results show that the method can effectively quantify the reliability of the external power supply of electrified railways. Meanwhile, the DC OPF algorithm considering weight coefficients can significantly improve the reliability of critical loads, and thus improving the reliability of traction substations and electrical trains. The proposed method can provide valuable guidelines for the planning and designing of electrified railways supplied by weak power sources.
|
3,526
|
Please write an abstract with title: State of Health Estimation for Proton Exchange Membrane Fuel Cell using Strong Tracking Filter, and key words: Degradation, Protons, Voltage measurement, Filtering, Fuel cells, Filtering algorithms, Indexes. Abstract: In recent years, Proton Exchange Membrane Fuel Cell (PEMFC) is widely used as a new energy source in many fields. However, due to performance degradation, the remaining useful life of PEMFC is limited, so it is necessary to estimate its health status in order to prolong its service duration. This paper uses a voltage degradation model to reflect the relationship between voltage signal and index parameter of the State of Health (SOH) of PEMFC. Then, a nonlinear filtering model is constructed with the degradation parameter and its change rate as the state variable. Then, the Strong Tracking Filter (STF) is introduced to estimate the health status. Finally, a set of PEMFC aging experimental data is used to verify the effectiveness of the algorithm for health state estimation of PEMFC.
|
3,527
|
Please write an abstract with title: Benchmarking Framework for Reconfigurable Intelligent Surfaces, and key words: Measurement, Manufacturing processes, Surface waves, Phase control, Benchmark testing, Reconfigurable intelligent surfaces, Complexity theory. Abstract: Reconfigurable Intelligent Surfaces (RIS), which comprise of large number of unit cells (meta-atoms), reflect the incoming wave according to desired radiation patterns. As the number of unit cells increase, complex radiation patterns can be generated. Similarly, a unit cell allowing more phase control and larger phase difference helps in the generation of complex radiation patterns at the surface level. However, the control circuit complexity and energy requirements also increase. In many practical applications, only a handful of radiation patterns may suffice. Additionally, the overall problem of finding the appropriate unit cell control state to generate any desired radiation patterns has combinatorial complexity. In this paper, we propose a benchmarking framework and suitable performance metrics that enable us to determine and compare the capabilities of RISs made from different unit cells. The proposed framework is numerically tested on three 40x40 RISs made from optimized and unoptimized unit cells of various resolutions reported in the literature. While the performance of RIS made from 1-bit unoptimized unit cell was overall poor, it was able to successfully generate some simple but useful benchmarking patterns. Thus, our framework provides a mechanism to identify the best candidate unit cell for a given set of requirements. The proposed framework has a potential to revolutionize future research and development on unit cell and RIS design.
|
3,528
|
Please write an abstract with title: Motion planning of mobile robots, and key words: Motion planning, Mobile robots, Control systems, Equations, Kinematics, Wheels, Velocity control, Electronic mail, Boundary value problems, Mechanical systems. Abstract: It is considered, in kinematic approximation, a problem of choice of a program trajectory of wheel robots. The solution of this problem for mobile robots with one and with two steering wheels is carried out. Comparison of the suggested approach with the results of other authors is carried out on the example.
|
3,529
|
Please write an abstract with title: GMR enhancement in hybrid spin valves for CIP geometries, and key words: Spin valves, Geometry, Magnetic heads, Giant magnetoresistance, Error analysis, Stability, Drives, Through-silicon vias, Anisotropic magnetoresistance, Impedance. Abstract: Summary form only given. A goal in research into giant magnetoresistance (GMR) is to achieve large GMR whilst maintaining device stability and sensitivity. Dual spin valves (DSVs) have a larger GMR output than single spin valves due to the increased number of interfaces for electron scattering (W.F. Egelhof et al, 1995). Synthetic antiferromagnets (SAFs) are often used in DSVs to assist pinning and improve device stability; however, current may be shunted through these additional layers so that the full potential GMR output is not achieved. Removal of the SAF layers to form a simple DSV results in an unstable structure with poor pinning and large hysteresis in the MR response. It is the purpose of this paper to describe a hybrid device which solves this problem.
|
3,530
|
Please write an abstract with title: Ultra wideband exponentially-tapered antipodal Vivaldi antennas, and key words: Ultra wideband technology, Vivaldi antennas, Slot antennas, Broadband antennas, Microstrip antennas, Dielectric constant, Dielectric substrates, Loss measurement, Antenna measurements, Shape. Abstract: An ultra wideband antipodal Vivaldi antenna is designed to cover from 8 to 50 GHz. The slot flare is tapered exponentially and the length and width of the slot flare are 1.7 and 0.6 inches, respectively. The measured antenna gain varies from 5 to 10 dBi, and the cross-polarization levels are less than -12 dB over the operating frequencies.
|
3,531
|
Please write an abstract with title: A Sliding-Mode Fault Tolerant Control for Robotic Manipulators Based on Actuator Switching, and key words: Variable structure systems, Actuators, Conferences, Switches, Fault tolerant control, Manipulators, Closed loop systems. Abstract: In this paper, a sliding-mode fault tolerant control (FTC) based on actuator switching is proposed for a class of n-link robotic manipulators with actuator failures and disturbances, for which, each joint is driven by an actuator with several healthy actuators as backups. First, a sliding-mode controller is designed, and then based on the value of the sliding surfaces, a set of monitoring functions (MFs) is constructed to tackle those serious actuator failures. It is shown that with the proposed scheme, all signals of the closed-loop system are bounded. A two-link robotic manipulator example is used to verify the effectiveness of the control scheme.
|
3,532
|
Please write an abstract with title: A Logistic Regression Approach for Generating Movies Reputation Based on Mining User Reviews, and key words: Motion pictures, Logistics, Large scale integration, Semantics, Sentiment analysis, Bit error rate, Indexing. Abstract: The paper aims to present an approach for generating a single reputation value towards a target movie based on mining movie reviews and their attached ratings with the use of Logistic Regression classifier and Latent Semantic Indexing (LSI) method. The contribution of the paper is fourfold. First, we apply Logistic Regression classifier to determine the sentiment orientation of movie reviews (positive or negative). Second, we use LSI method and cosine similarity to compute the semantic similarity between reviews. Third, we compute a custom reputation value separately for positive opinions group and negative opinions group. Finally, we use the weighted arithmetic mean to generate a single reputation value towards the target movie.
|
3,533
|
Please write an abstract with title: Low-Cost NDVI Platform for Land Operation: Passive and Active, and key words: Sensors, Cameras, Measurement by laser beam, Laser modes, Vegetation mapping, Reflectivity, Remote sensing. Abstract: In this letter, a novel low-cost active normalized difference vegetation index (NDVI) platform is developed. In the first stage, the system was tested and calibrated outdoor in a passive mode. Then, vegetation illumination was done using two laser sources with a beam combiner. The active mode was benchmarked using a field spectrometer from analytical spectral devices. Successful operation of active NDVI system was shown indoor.
|
3,534
|
Please write an abstract with title: Self-Compensation for the Influence of Working Distance and Ambient Temperature on Thermal Imaging-Based Temperature Measurement, and key words: Temperature measurement, Temperature sensors, COVID-19, Temperature distribution, Linear feedback control systems, Time measurement, Temperature control. Abstract: Nowadays, body temperature screening is very important especially in the current global coronavirus disease (COVID-19) epidemic. It can be considered as the first step in monitoring the fever symptom if the body temperature is checked regularly. Aiming at alleviating the influence of working distance and ambient temperature disturbance, this article proposes and demonstrates a self-compensation technique that is built into our low-cost thermal imaging-based temperature screening system. The key idea relies on a combination of a 3-D depth sensor, an electronic temperature sensor, and a reference temperature for realtime data feedback and control. In addition, we obtain simple mathematical models for compensating the influence of ambient temperature and measuring distance variations. Experimental demonstration using a blackbody radiation source as an object confirms that the measured temperature under our self-compensation agrees very well with the blackbody radiation source, showing a very low standard deviation of 0.10 °C under 21.0 °C–40.0 °C ambient temperature. In addition, an improved standard deviation of 0.18 °C and a low 0.020 °C/m for the measured temperature are obtained under the variation in measuring the distance from 0.50 to 2.00 m.
|
3,535
|
Please write an abstract with title: Object Petri nets for synthesis of the control of automated manufacture systems, and key words: Petri nets, Control system synthesis, Automatic control, Manufacturing automation, Control systems, Manufacturing industries, Atmosphere, Proposals, Mass production, Electrical equipment industry. Abstract: The current and future tendencies in the manufacture area indicate the need of the development of more agile automated manufacture systems, that can work with the appeared problems of the global industrial competition. This implies in the need of developing automated manufacture systems that allow the continuous change of its needs while it decreases the market time of its products. However, the current control systems are characterized by top-down rigid structures, that don't get to work with all the eventualities of the new dynamic atmosphere of manufacture. Thus, it is necessary the identification and development of tools and more powerful methods to work with the inherent complexity of such systems. This article proposes the application of Object Petri nets for synthesis of the control of automated manufacture systems.
|
3,536
|
Please write an abstract with title: Design and Test of a SRF-PLL Based Algorithm for Positive-Sequence Synchrophasor Measurements, and key words: Finite impulse response filters, Phasor measurement units, Phase locked loops, Cutoff frequency, Demodulation, Frequency estimation. Abstract: This paper presents the design, analysis and experimental testing of a SRF-PLL based algorithm for positive-sequence synchrophasor measurements in compliance with the IEEE C37.118.1-2011 and C37.118.1a-2014 standards. The proposed approach consists of a three-stage algorithm, being the first one a three-phase demodulation, which detach the positive-sequence from the negative sequence signal in the frequency domain, as well as removes the zero sequence. The second stage is a finite impulse response filter (FIR) that is applied in order to improve the noise and interference rejection. Such class of digital filters was chosen by its characteristics of linear phase and constant group delay. Finally, the last stage is carried out by a synchronous reference frame phase-locked loop featuring magnitude normalization and proportional-integral controller, which estimates amplitude, phase, frequency and rate of change of frequency. The experimental results obtained by a test platform show that steady-state criteria are met.
|
3,537
|
Please write an abstract with title: Shielding of Orbital Angular Momentum Waves by a Cavity With Apertures, and key words: Apertures, Antennas, Scattering parameters, Antenna arrays, Slot antennas, Method of moments, Transmitting antennas. Abstract: In this article, for the first time, the shielding of orbital angular momentum (OAM) waves by a cavity with apertures is evaluated. This is particularly interesting because the distinguishing feature between the OAM modes is their phase distribution in space, and, hence, shielding effectiveness is a mode-dependent phenomenon. A perfectly electrically conducting cavity with multiple apertures and two OAM antennas, inside and outside the cavity, is investigated using a method of moments based tool. The behavior of OAM waves is analyzed by comparing the transmission between the OAM arrays for different cases, including their field patterns in front of and behind the apertures. The effects of the orientation and position of the transmitting antenna, the rotation, size, and form of the apertures and different cavities are explored. Additionally, the effect on the distance and the orientation angle of the outer antenna are studied. It is shown that the propagation of OAM waves through apertures is possible and that the resulting signal loss is similar to the loss of a plane wave or the field of a monopole. It is also shown that certain OAM waves penetrate the apertures better than others.
|
3,538
|
Please write an abstract with title: Improved Aircraft Performance using Simple Pitch Control, and key words: Aircraft, Aerospace control, Control systems, Aerodynamics, Matlab, Robustness, Tuners. Abstract: Stability and control are composite for an aircraft. Three basic control movements of the aircraft are Pitch, Roll and Yaw where Pitch enables a plane to descend or climb. The pitching movement control is paramount to ensure the stability of the aircraft and intrinsic safety of passengers. This paper intends to explore few control schemes for the aircraft pitch control system. Conventional PID controller and Fuzzy tuned PID are probed and interpreted through the simulation results obtained using MATLAB. The qualified assessment of aforesaid methods based on time response specifications is cited in the paper. Further the robustness analysis has also been included. The results from the proposed control have been giving improved performance of aircraft, in comparison to methods from literature.
|
3,539
|
Please write an abstract with title: Instance-Specific Feature Propagation for Referring Segmentation, and key words: Feature extraction, Image segmentation, Fuses, Visualization, Task analysis, Linguistics, Proposals. Abstract: Referring segmentation aims to generate a segmentation mask for the target instance indicated by a natural language expression. There are typically two kinds of existing methods: one-stage methods that directly perform segmentation on the fused vision and language features; and two-stage methods that first utilize an instance segmentation model for instance proposal and then select one of these instances via matching them with language features. In this work, we propose a novel framework that simultaneously detects the target-of-interest via feature propagation and generates a fine-grained segmentation mask. In our framework, each instance is represented by an Instance-Specific Feature (ISF), and the target-of-referring is identified by exchanging information among all ISFs using our proposed Feature Propagation Module (FPM). Our instance-aware approach learns the relationship among all objects, which helps to better locate the target-of-interest than one-stage methods. Comparing to two-stage methods, our approach collaboratively and interactively utilizes both vision and language information for synchronous identification and segmentation. In the experimental tests, our method outperforms previous state-of-the-art methods on all three RefCOCO series datasets.
|
3,540
|
Please write an abstract with title: Low-leakage asymmetric-cell SRAM, and key words: Random access memory, Degradation, MOSFETs, Stability, Power dissipation, Delay, SRAM chips, Leakage current, Threshold voltage, System-on-a-chip. Abstract: We introduce a novel family of asymmetric dual-V/sub t/ static random access memory cell designs that reduce leakage power in caches while maintaining low access latency. Our designs exploit the strong bias toward zero at the bit level exhibited by the memory value stream of ordinary programs. Compared to conventional symmetric high-performance cells, our cells offer significant leakage reduction in the zero state and, in some cases, also in the one state, albeit to a lesser extent. A novel sense amplifier, in combination with dummy bitlines, allows for read times to be on par with conventional symmetric cells. With one cell design, leakage is reduced by 7/spl times/ (in the zero state) with no performance degradation, but with a stability degradation of 6%. Another cell design reduces leakage by 2/spl times/ (in the zero state) with no performance or stability loss. An alternative cell design reduces leakage by 58/spl times/ (in the zero state) with a performance degradation of 1% and an area increase of 2.4% and no stability degradation.
|
3,541
|
Please write an abstract with title: An analysis of the complex fit normalized site attenuation method, and key words: Attenuation, Dipole antennas, Antenna measurements, Receiving antennas, Log periodic antennas, Transmitting antennas, Frequency, Personal communication networks, Antenna accessories, Predictive models. Abstract: The complex fit normalized site attenuation (CFNSA) method was introduced in 2000 as an enhancement to the normalized site attenuation (NSA) model used in ANSI C63.4 and C63.5. The simple dipole NSA model is insufficient to predict the behavior of complex antennas like log periodic dipole arrays (LPDAs) and horns. Thus, NSA measurements made with these antennas using free-space antenna factors can have significant deviations from that predicted by the model. The CFNSA model is a modification to the simple dipole NSA model to account for the variations in antenna pattern and phase center that are possible in complex antennas. This paper evaluates the effectiveness of the phase center/pattern matching (PCPM) method previously proposed, as well as the use of directly measured pattern and phase center information, for a variety of antenna types.
|
3,542
|
Please write an abstract with title: A Hybrid Feature Selection Approach for Flash Flood Disaster Risk in Jiangxi Province, China, and key words: Radio frequency, Solid modeling, Simulated annealing, Forestry, Predictive models, Feature extraction, Solids. Abstract: Appropriate feature selection is critical for flash flood disaster risk assessment as the premise of flash flood warning and forecast. Furthermore, a thorough examination of the algorithm for selecting flash flood risk features and the handing of unbalanced data is required. This study proposes a practical hybrid feature selection approach based on the combination of random forests (RF) and simulated annealing (SA) with a case study in Jiangxi Province, China. By employing weighted samples as the input to the RF-model, this method reduces the influence of unbalanced samples. Results indicate that: The optimal weighting ratios for terrain features are 3:1 or 4:1. The optimal weighting ratios for rainfall features are 2:1 or 3:1. The findings of the two algorithms are combined with physical interpretation of features and concentration time in mountainous catchments, resulting in the selection of four terrain features: slope, maximum elevation, outlet catchment area, confluence time, and four rainfall features: the annual maximum variation coefficients of 10 minutes, 6 hours (CV_M10, CV_H6), and the mean of annual maximum rainstorm of 10 minutes, 6 hours (EX_M10, EX_H6).
|
3,543
|
Please write an abstract with title: Hierarchical vector quantization of speech with dynamic codebook allocation, and key words: Vector quantization, Speech coding, Data mining, Feature extraction, Bit rate. Abstract: This paper introduces a Hierarchical Vector Quantization (HVQ) scheme that can operate on "supervectors" of dimensionality in the hundreds of samples. HVQ is based on a tree-structured decomposition of the original super-vector into a large number of low dimensional vectors. The supervector is partitioned into subvectors, the subvectors into minivectors and so on. The "glue" that links subvectors at one level to the parent vector at the next higher level is a feature vector that characterizes the correlation pattern of the parent vector and controls the quantization of lower level feature vectors and ultimately of the final descendant data vectors. Each component of a feature vector is a scalar parameter that partially describes a corresponding subvector. The paper presents a three level HVQ for which the feature vectors are based on subvector energies. Gain normalization and dynamic codebook allocation are used in coding both feature vectors and the final data subvectors. Simulation results demonstrate the effectiveness of HVQ for speech waveform coding at 9.6 and 16 Kb/s.
|
3,544
|
Please write an abstract with title: Grounding concept in percept: learning physics experientially in multi-user virtual worlds, and key words: Grounding, Collaborative work, Educational institutions, Physics computing, Continuing education, Physics education, Stress, Kinematics, History, Resists. Abstract: Despite almost 25 years of research related to "misconceptions" in science education, students today still widely hold erroneous beliefs about natural phenomena and continue to engage in intuitive forms of pseudo-scientific reasoning. In this paper, we stress the importance of grounding concept in percept when students engage learning. We appeal to Kolb's experiential learning theory to guide the design of C-VISions, a collaborative learning environment that provides experientially grounded learning. We report partial results from an empirical study of three students learning kinematics in C-VISions, presenting some quantitative as well as qualitative findings. We discuss our findings in relation to the pervasive misconception referred to in the literature as "V-F reasoning." We conclude by pointing to ongoing research to develop pedagogical agent support in C-VISions to complete the conception of experiential learning advocated here.
|
3,545
|
Please write an abstract with title: Linear Model-Based Intra Prediction in VVC Test Model, and key words: Video coding, Linear regression, Predictive models, Signal processing, Encoding, Speech processing, Standards. Abstract: This paper studies a new intra prediction method based on a linear model for improving the intra prediction performance of Versatile Video Coding (H.266/VVC) standard. The Linear Model-based Intra Prediction (LMIP) method in this work attempts to model the samples behavior of a coding block based on the reconstructed pixels in the neighboring of that block. The proposed method uses a 3-parameter linear function as prediction model in which the parameters of the model are derived based on a linear regression with mean square error minimization approach from the neighboring samples and their locations. The proposed LMIP method is then used as a new intra prediction mode in the VTM-4.0 test model of the VVC standard. The conducted experiments illustrate that the LMIP method provides on average 0.30% and 0.14% BD-rate improvements in luma component with all intra (AI) and random access (RA) configurations, respectively.
|
3,546
|
Please write an abstract with title: Subject-Specific Brain Activity Analysis in fMRI Data Using Merge Trees, and key words: Human computer interaction, Brain, Data analysis, Statistical analysis, Feature detection, Data visualization, Functional magnetic resonance imaging. Abstract: We present a method for detecting patterns in time-varying functional magnetic resonance imaging (fMRI) data based on topological analysis. The oxygenated blood flow measured by fMRI is widely used as an indicator of brain activity. The signal is, however, prone to noise from various sources. Random brain activity, physiological noise, and noise from the scanner can reach a strength comparable to the signal itself. Thus, extracting the underlying signal is a challenging process typically approached by applying statistical methods. The goal of this work is to investigate the possibilities of recovering information from the signal using topological feature vectors directly based on the raw signal without medical domain priors. We utilize merge trees to define a robust feature vector capturing key features within a time step of fMRI data. We demonstrate how such a concise feature vector representation can be utilized for exploring the temporal development of brain activations, connectivity between these activations, and their relation to cognitive tasks.
|
3,547
|
Please write an abstract with title: Hybrid Sensorless Motor Control in aerospace applications, a survey in sensorless control, optimizing for availability and acoustic noise, and key words: Vibrations, Temperature sensors, Motor drives, Simulation, Sensorless control, Synchronous motors, Permanent magnet motors. Abstract: A wide range of aerospace applications previously based on hydraulics including the control of aerodynamic surfaces are being actively replaced by lighter, more intelligent Motor Drive Electronics (MDEs). However, motor resolvers commonly used to provide the rotor's position to the MDEs are sensitive devices susceptible to extreme temperature and vibrations, conditions commonly encountered in aerospace applications. This weakness can lead to resolver failures and reduction in system availability. In DALA safety critical motor control designs, system availability is paramount. Following a survey of sensorless methods, this paper proposes a hybrid motor control solution where sensorless rotor position calculation is run in parallel with the resolver interface, monitoring the resolver. In the event of a resolver failure, the sensorless motor control takes over controlling the motor. Furthermore in order to suppress acoustic noise produced from High Frequency injection, a variant of the Pseudo Random High Frequency injection method is also proposed.
|
3,548
|
Please write an abstract with title: A novel yield optimization technique for digital CMOS circuits design by means of process parameters run-time estimation and body bias active control, and key words: Design optimization, CMOS digital integrated circuits, CMOS process, CMOS technology, Circuit synthesis, Runtime, Parameter estimation, Yield estimation, Integrated circuit yield, Constraint optimization. Abstract: This work presents a novel approach to optimize digital integrated circuits yield referring to speed, dynamic power and leakage power constraints. The method is based on process parameter estimation circuits and active control of body bias performed by an on-chip digital controller. The associated design flow allows us to quantitatively predict the impact of the method on the expected yield in a specific design. We present the architecture scheme, the theoretical foundation, the estimation circuits used, and two application case studies, referring to an industrial 0.13-/spl mu/m CMOS process data. The approach results to be remarkably effective at high operating temperature. In the presented case study, initial yields below 14% are improved to 86% by using a single controller and a single set of estimation circuits per die.
|
3,549
|
Please write an abstract with title: A Network-Based Approach to Study of Adhd Using Tensor Decomposition of Resting State Fmri Data, and key words: Feature extraction, Functional magnetic resonance imaging, Tensile stress, Data mining, Correlation, Brain modeling. Abstract: Identifying changes in functional connectivity in Attention Deficit Hyperactivity Disorder (ADHD) using functional magnetic resonance imaging (fMRI) can help us understand the neural substrates of this brain disorder. Many studies of ADHD using resting state fMRI (rs-fMRI) data have been conducted in the past decade with either manually crafted features that do not yield satisfactory performance, or automatically learned features that often lack interpretability. In this work, we present a tensor-based approach to identify brain networks and extract features from rs-fMRI data. Results show the identified networks are interpretable and consistent with our current understanding of ADHD conditions. The extracted features are not only predictive of ADHD score but also discriminative for classification of ADHD subjects from typically developed children.
|
3,550
|
Please write an abstract with title: Stability analysis of linear systems with state jump - motivated by periodic motion control of passive walker, and key words: Stability analysis, Linear systems, Motion control, Legged locomotion, Feedback control, Digital-to-frequency converters, Chaos, Equations, Delay effects, Prototypes. Abstract: In this paper, we study the stability of periodic solutions of linear systems with state jump. Such a model arises, for example, when we consider the periodic motion of passive walkers [M. Garcia, et. al. The simplest walking model: stability, complexity, and scaling, 1998]. In our previous work [K. Hirata, H. Kokame and K. Konishi, On stability of simplified passive walker model and effect of feedback control, 2002], we derived such a model by simplifying the result of Garcia et.al.[T.McGeer, Passive dynamic walking, 1990] and analyzed its stability via the Poincare map. Also the effects of the feedback control strategies, OGY and DFC (delayed feedback control) methods, were examined in the same framework. However, the Poincare map was introduced in a rather ad-hoc manner there. In this paper, we refine the mathematical treatment of the Poincare map. After defining a special type of stability for the periodic solution considered here, we show that the stability via the Poincare map is equivalent to this specific definition. Also the effect of the data loss caused by the variation of the state jump interval in the OGY case is examined.
|
3,551
|
Please write an abstract with title: Segmentation of Neuronal-Cell Images from Stained Fields and Monomodal Histograms, and key words: Image segmentation, Histograms, Neurons, Mice, Image edge detection, Australia, Stress, Image processing, Cranes, Information technology. Abstract: Information from images taken of cells being grown in culture with oxidative agents allows life science researchers to compare changes in neurons from the Zellweger mice to those from normal mice. Image segmentation is the major and first step for the study of these different types of processes in cells. In this paper we develop an innovative strategy for the segmentation of neuronal-cell images which are subjected to stains and whose histograms are monomodal. Such nontrival images make it a challenging task for many existing image segmentation methods. We show that the proposed method is an effective and simple procedure for the subsequent quantitative analysis of neuronal images
|
3,552
|
Please write an abstract with title: Time-multiplexed signals and parallel signal analysis/switch optimization for MEMS-based optical cross-connect, and key words: Signal analysis, Optical switches, Mirrors, Optical fiber networks, Micromechanical devices, Calibration, Optical add-drop multiplexers, Liquid crystal displays, Voltage, Manufacturing processes. Abstract: The calibration of the numerous mirror pairs, or switches, in MEMS-mirror optical cross-connect systems is a critical process in their manufacture. Because the number of switch connections for these systems scales quadratically to the number of inputs/outputs, this places great demands on the equipment used to perform testing. We propose and demonstrate a calibration technique for generic optical subsystems based on optical time-division multiplexing (OTDM).
|
3,553
|
Please write an abstract with title: Encryption Algorithms based on Security in IoT (Internet of Things), and key words: Wireless communication, Ciphers, Wireless sensor networks, Smart cities, Memory management, Signal processing algorithms, Smart homes. Abstract: The Internet is evolving everywhere and expanding its entity globally. The IoT(Internet of things) is a new and interesting concept introduced in this world of internet. Generally it is interconnected computing device which can be embedded in our daily routine objects through which we can send and receive data. It is beyond connecting computers and laptops only although it can connect billion of devices. It can be described as reliable method of communication that also make use of other technologies like wireless sensor, QR code etc. IoT (Internet of Things) is making everything smart with use of technology like smart homes, smart cities, smart watches. In this chapter, we will study the security algorithms in IoT (Internet of Things) which can be achieved with encryption process. In the world of IoT, data is more vulnerable to threats. So as to protect data integrity, data confidentiality, we have Light weight Encryption Algorithms like symmetric key cryptography and public key cryptography for secure IoT (Internet of Things) named as Secure IoT. Because it is not convenient to use full encryption algorithms that require large memory size, large program code and larger execution time. Light weight algorithms meet all resource constraints of small memory size, less execution time and efficiency. The algorithms can be measured in terms of key size, no of blocks and algorithm structure, chip size and energy consumption. Light Weight Techniques provides security to smart object networks and also provides efficiency. In Symmetric Key Cryptography, two parties can have identical keys but has some practical difficulty. Public Key Cryptography uses both private and public key which are related to each other. Public key is known to everyone while private key is kept secret. Public Key cryptography method is based on mathematical problems. So, to implement this method, one should have a great expertise.
|
3,554
|
Please write an abstract with title: Approximate Logic Synthesis: A Survey, and key words: Circuit synthesis, Integrated circuit modeling, Measurement, Logic gates, Boolean functions, Power demand, Approximate computing, Approximation methods. Abstract: Approximate computing is an emerging paradigm that, by relaxing the requirement for full accuracy, offers benefits in terms of design area and power consumption. This paradigm is particularly attractive in applications where the underlying computation has inherent resilience to small errors. Such applications are abundant in many domains, including machine learning, computer vision, and signal processing. In circuit design, a major challenge is the capability to synthesize the approximate circuits automatically without manually relying on the expertise of designers. In this work, we review methods devised to synthesize approximate circuits, given their exact functionality and an approximability threshold. We summarize strategies for evaluating the error that circuit simplification can induce on the output, which guides synthesis techniques in choosing the circuit transformations that lead to the largest benefit for a given amount of induced error. We then review circuit simplification methods that operate at the gate or Boolean level, including those that leverage classical Boolean synthesis techniques to realize the approximations. We also summarize strategies that take high-level descriptions, such as C or behavioral Verilog, and synthesize approximate circuits from these descriptions.
|
3,555
|
Please write an abstract with title: An economic method for fabrication sub-quarter-/spl mu/m gate doped-channel FET's by photolithography, and key words: Fabrication, FETs, Lithography, Electrons, Gallium arsenide, HEMTs, Conducting materials, High power amplifiers, Coatings, Etching. Abstract: This paper reports a new sub-0.5-/spl mu/m gate-length FET processing technique by using conventional i-line optical lithography. The key methodology is to thermally re-flow the patterned photo-resist upon two-step spin-coated SOG. According to this new process, the deposited gate metal has its final length and thickness be separately determined by taped resist profile and SOG thickness. The implemented gate length is as short as 0.41 /spl mu/m. Then it was successfully applied to fabrication of a newly designed hetero-doped-channel field-effect transistor with digital-graded In/sub x/Ga/sub 1-x/As multi-layer forming a HEMT-like channel. This digital-graded In/sub x/Ga/sub l-x/As channel by changing x values from 0.1 to 0.2 has most electrons be closer to gate metal. The measured sheet carrier density and mobility are 4.3 /spl times/ 10/sup 12/ cm/sup -2/ and 3560 cm/sup 2/V/sup -1/s/sup -1/ while the peak carrier concentration is larger than 1 /spl times/ 10/sup 19/ cm/sup -3/. A fabricated 0.41 /spl times/ 100 /spl mu/m/sup 2/ HDCFET exhibits the maximum transconductance of 370 mS/mm with an output current lager than 535 mA/mm and ft (f max) of 26 (32) GHz.
|
3,556
|
Please write an abstract with title: A Blockless Echo Suppressor, and key words: Speech, Coils, Telephony, Communications technology, Circuit faults, Signal generators, Impedance matching, Transfer functions, Wire, Communications Committee. Abstract: Practically all echo suppressors presently used in long-distance telephone circuits operate on the principle of cutting off the sending circuit when the receiving speech level is greater than the sending speech level, thereby suppressing echoes. Therefore, they generate a faulty speech problem due to the cutting off of speech in simultaneous talking, thus making speech unnatural. To correct this fault, a blockless echo suppressor which, unlike the usual echo suppressors, generates a signal equivalent to the echo to be canceled, has been developed. In the suppressor, a signa1 equivalent to an echo is produced from the convolution of a received speech signal and an echo-path impulse response which is stored in a memory in advance of the commencement of commercial service. It has been confirmed by subjective evaluation that an echo suppressor of this kind manufactured for trials has better talking quality than any other kind of typical echo suppressors now in service. This is because an echo is effectively suppressed more than 30 dB below the transmitted speech signal, and speech is not cut off in this suppressor.
|
3,557
|
Please write an abstract with title: Spectrum sharing with distributed interference compensation, and key words: Interference, Transmitters, Iterative algorithms, Peer to peer computing, Pricing, Signal to noise ratio, Convergence, Power distribution, Heuristic algorithms, Centralized control. Abstract: We consider a spectrum sharing problem in which each wireless transmitter can select a single channel from a set of available channels, along with the transmission power. An asynchronous distributed pricing (ADP) scheme is proposed, in which users exchange "price" signals that indicate the negative effect of interference at the receivers. Given this set of prices, each transmitter chooses a channel and power level to maximize its net benefit (utility minus cost). We show that a sequential version of this single-channel (SC)-ADP algorithm converges with two users and an arbitrary number of channels, and observe via simulation that it exhibits rapid convergence with more users in the network. The pricing algorithm always outperforms the heuristic algorithm in which each user picks the best channel without exchanging interference prices. In a dense network with heavy interference, the SC-ADP algorithm can also perform better than the iterative water-filling algorithm where each user transmits over multiple channels but the users do not exchange any information. The performance of the SC-ADP algorithm is also compared with a multi-channel (MC)-ADP algorithm in which users can transmit over multiple channels and exchange interference prices over each channel
|
3,558
|
Please write an abstract with title: Low-level microwave effect on nerve pulse propagation velocity, and key words: Microwave propagation, Nerve fibers, Permeability, Biomembranes, Pulse measurements, Myelin, Optical fiber polarization, Density measurement, Power measurement, Skin. Abstract: The hypotheses that microwave radiation can affect permeability of the nerve fibers membranes or myelin sheaths was examined in this study. The changes in fiber membrane permeability affect propagation velocity of the nerve pulse. The experimental investigation was carried out for nerve pulse propagation velocity with and without applied microwave field and different orientations of its polarization to the nerve axon. The 450 MHz radiation was applied polarized perpendicular or parallel to the nerve fiber. The measured field power density at the skin was 0.87 mW/cm/sup 2/. The left and right nervus medianus motor nerve fibers of two young female subjects were under the study. The results of 20 measurements show that low-level microwave radiation caused statistically significant increase in nerve pulse propagation velocity in human motor nerve fiber. It is important to point out that the effect depends on polarization. The changes were detected for perpendicular to the nerve fiber polarization only. The effect would be related rather to reduction of axional resistance of the nerve axon than to the myelin sheath.
|
3,559
|
Please write an abstract with title: Automatic support for irregular computations in a high-level language, and key words: High level languages, Titanium, Program processors, Message passing, Sparse matrices, Writing, Runtime, Parallel processing, Performance analysis, Optimizing compilers. Abstract: The problem of writing high performance parallel applications becomes even more challenging when irregular, sparse or adaptive methods are employed. In this paper we introduce compiler and runtime support for programs with indirect array accesses into Titanium, a high-level language that combines an explicit SPMD parallelism model with implicit communication through a global shared address space. By combining the well-known inspector-executor technique with high level multi-dimensional array constructs, compiler analysis and performance modeling, we demonstrate optimizations that are entirely hidden from the programmer. The global address space makes the programs easier to write than in message passing, with remote array accesses used in place of explicit messages with data packing and unpacking. The programs are also faster than message passing programs: using sparse matrix-vector multiplication programs, we show that the Titanium code is an average of 21% faster across several matrices and machines, with the best case speedup more than a factor of 2x. The performance advantages are due to both the lightweight RDMA (remote direct memory access) communication model that underlies the Titanium implementation and automatic optimization selection that adapts the communication to the machine and workload, in some cases using different communication models for different processors within a single computation.
|
3,560
|
Please write an abstract with title: The XCAT Science Portal, and key words: Portals, Packaging, Prototypes, Programming profession, Computer interfaces, Distributed computing, Grid computing, Web pages, Web server, Network servers. Abstract: The design and prototype implementation of the XCAT Grid Science Portal is described in this paper. The portal lets grid application programmers easily script complex distributed computations and package these applications with simple interfaces for others to use. Each application is packaged as a "notebook" which consists of web pages and editable parameterized scripts. The portal is a workstation-based specialized "personal" web server, capable of executing the application scripts and launching remote grid applications for the user. The portal server can receive event streams published by the application and grid resource information published by Network Weather Service (NWS) [32] or Autopilot [15] sensors. Notebooks can be "published" and stored in web based archives for others to retrieve and modify. The XCAT Grid Science Portal has been tested with various applications, including the distributed simulation of chemical processes in semiconductor manufacturing and collaboratory support for X-ray crystallographers.
|
3,561
|
Please write an abstract with title: Efficient Modelling of ICS Communication For Anomaly Detection Using Probabilistic Automata, and key words: Protocols, Semantics, Automata, Traffic control, Probabilistic logic, Security, Integrated circuit modeling. Abstract: Industrial Control System (ICS) communication transmits monitoring and control data between industrial processes and the control station. ICS systems cover various domains of critical infrastructure such as the power plants, water and gas distribution, or aerospace traffic control. Security of ICS systems is usually implemented on the perimeter of the network using ICS enabled firewalls or Intrusion Detection Systems (IDSs). These techniques are helpful against external attacks, however, they are not able to effectively detect internal threats originating from a compromised device with malicious software. In order to mitigate or eliminate internal threats against the ICS system, we need to monitor ICS traffic and detect suspicious data transmissions that differ from common operational communication. In our research, we obtain ICS monitoring data using standardized IPFIX flows extended with meta data extracted from ICS protocol headers. Unlike other anomaly detection approaches, we focus on modelling the semantics of ICS communication obtained from the IPFIX flows that describes typical conversational patterns. This paper presents a technique for modelling ICS conversations using frequency prefix trees and Deterministic Probabilistic Automata (DPA). As demonstrated on the attack scenarios, these models are efficient to detect common cyber attacks like the command injection, packet manipulation, network scanning, or lost connection. An important advantage of our approach is that the proposed technique can be easily integrated into common security information and event management (SIEM) systems with Netflow/IPFIX support. Our experiments are performed on IEC 60870-5-104 (aka IEC 104) control communication that is widely used for the substation control in smart grids.
|
3,562
|
Please write an abstract with title: New Submodule Selection Algorithm for Low Device Switching Frequency Modulation of Medium-Voltage Modular Multilevel Converter, and key words: Capacitors, Switches, Switching frequency, Modulation, Harmonic analysis, Topology, Sorting. Abstract: Low device switching frequency is preferred in high-power converters to achieve higher efficiency, higher device utilization, and feasible cooling system design. However, low device switching frequency operation leads to higher peak voltage in submodule (SM) capacitors of medium-voltage modular multilevel converters (MMC). The main reason is unequal distribution of energy among SMs in each fundamental period due to fewer switching commutations available for balancing. This results in increased converter cost due to higher voltage rating of SM capacitors and semiconductor devices. Therefore, the main objective of this paper is to propose a new SM selection algorithm to reduce the peak voltage of SM capacitors without significantly increasing the device switching frequency. The main idea is to avoid unnecessary switching commutations by ensuring balancing of SM capacitor voltages only at the end of charging period. The proposed algorithm has been verified with extensive simulation studies of a 5L-MMC and it has been observed that peak voltage is kept within 10 % of the nominal value while limiting the device switching frequency in the range of 350 to 400 Hz.
|
3,563
|
Please write an abstract with title: The continuing need for vacuum electronic devices to support electronic warfare, and key words: Electronic warfare, Missiles, Jamming, Power amplifiers, Costs, Vacuum technology, Phased arrays, Power generation, Solid state circuits, Availability. Abstract: Summary form only given. This paper presents a simple analysis that examines a notional anti-ship cruise missile (ASCM) threat and the requirements to defeat such a missile. It uses a comparative methodology to arrive at "baseline" effective radiated power requirements. These requirements are then expressed as relative improvements required for maintaining a jamming capability against future as well as current threats. It includes the implications of varying output powers of amplifiers on array element requirements. It addresses the requirements for operation in the I and J bands as well those needed to defeat threats in the 35 and 94 GHz portions of the spectrum. A relative cost analysis comparing solid state technology and vacuum technology is presented. The analysis shows the need to use vacuum technology in future MMW phase array jammers. Without the availability of high power vacuum amplifiers the system complexity and cost would be prohibitive.
|
3,564
|
Please write an abstract with title: The Topic Evolution of Danmaku Text Based on BTM -- Taking the Context of COVID-19 as an Example, and key words: COVID-19, Text mining, Pandemics, Big Data, Entropy, Public healthcare, Artificial intelligence. Abstract: The danmaku text is a popular interactive mode of instantaneous video comment. Websites with danmaku texts have been widely used recently, and this vast number of texts can be regarded as a short text mining resource. This paper uses Perplexity and Rényi entropy to evaluate the BTM (Biterm Topic Model), by extracting the topic from the danmaku texts to explore the evolution of danmaku text topics in videos relevant to COVID-19. The results show that Rényi entropy is an effective way to decide the optimal number of topics, and the topics captured by BTM indicate that video viewers showed positive attitudes in the face of this public health emergency.
|
3,565
|
Please write an abstract with title: A Distributed Link Scheduler for In-Band Full Duplex Wireless Networks, and key words: Interference, Signal to noise ratio, Wireless networks, Reinforcement learning, Throughput, Relays, Time division multiple access. Abstract: In a wireless network, a well designed link scheduler ensures links are activated frequently and experience minimal or no interference, meaning these links will have a high capacity. A challenging problem, however, is random or uncertain channel gains. Another challenge is determining whether a set of links can co-exist together, meaning they do not cause excessive interference to one another. These challenges have a direct impact on the number of activated links as well as their data rates. To this end, this paper proposes a reinforcement learning approach that enables each node to learn the best link to activate and data rate to use over random channel conditions. In addition, it allows nodes to learn the opportune time to use full-duplex or half-duplex transmissions. Our simulation results show our link scheduler results in an average throughput that is triple that of Carrier Sense Multiple Access (CSMA), and up to quadruple the average throughput of Time Division Multiple Access (TDMA). Moreover, our link scheduler remains superior when channel gains vary significantly from their average value.
|
3,566
|
Please write an abstract with title: Flexible Linear Absolute Encoder System for Force Localization in Soft Environments, and key words: Surface resistance, Force, Soft robotics, Robot sensing systems, Topology, Flexible structures, Strain. Abstract: This paper proposes a novel disposable linear absolute encoder system and its peripheral electronic readout circuitry to be used for the localization of force in a continuum media such as a flexible robotic arm. The proposed structure relies on the design of graphite layers on a flexible surface that shows varying resistance based on the applied strain. The proposed topology can localize the force applied on a continuous paper based sensor having the geometry of an absolute encoder system. The successful results obtained from the experiments prove the efficacy of the proposed system while opening new paradigms for the possibility of contact force localization in flexible structures like soft robots.
|
3,567
|
Please write an abstract with title: Hydraulic parameter identification using aerial photographs, and key words: Parameter estimation, Satellites, Rivers, Filters, Equations, State estimation, Geometry, Inverse problems, Testing, Floods. Abstract: Some parameters embedded in open-channel flow equations lack definitive measurement methods. Optimal values of these parameters in a mathematical sense can be identified by using assimilation methods. New generations of satellites are now able to provide observation data that can be useful to implement inverse problems. Assimilation techniques such as variational assimilation or the Kalman filter have been tested on a simple case, in order to find the most appropriated method for the hydraulic parameter identification. This method has then been implemented on a real case: this paper presents the results of hydraulic parameter identification on the Aisne River, using air photos of the flood of December 1993.
|
3,568
|
Please write an abstract with title: Global Fuzzy Supervisor Control For a Dual Input-Single Output Boost Converter, and key words: Renewable energy sources, PI control, Power system management, Power system dynamics, Hybrid power systems, Power capacitors, Wind turbines. Abstract: Energy management of hybrid systems is a key challenge nowadays since the available energy is not constant over time and due to very low harvested power levels. Thus, advanced power technologies and their control strategies are needful for improving power efficiency. In fact, a multi-input converter is a power electronics interface that can integrate various power sources. It can be used to perform both power management and output voltage regulation. Therefore, robust control is required to manage both tasks simultaneously. So, the presented work describes the control process with a Fuzzy Supervisor Controller (FSC) for a Dual Input Single Output (DISO) DC-DC power converter that integrates the power from a solar PV panel and a wind turbine generator to supply a DC load. The design of the studied DISO converter with a FSC will be developed based on the power sharing principle. We will demonstrate the performance proprieties of the proposed FSC controller in term of robustness against varying input voltages and load variations and its invariant dynamic performance in the face of changing the output reference voltage. To validate the efficiency of the proposed control approach, the performances of the studied system are evaluated by simulation using Matlab/Simulink software and then compared to the simple control without supervision. The FSC improves the power sharing ability between the two input sources and ensures the load and the line regulation.
|
3,569
|
Please write an abstract with title: A Novel On-Board Electrochemical Impedance Spectroscopy System for Real-Time Battery Impedance Estimation, and key words: Impedance, Estimation, Frequency estimation, Topology, Real-time systems, MOSFET, Microgrids. Abstract: This article proposes a real-time electrochemical impedance spectroscopy (EIS) technique that can provide high accurate estimation of the impedance of each lithium-ion (Li-ion) cell of a battery (BT) stack, even for less than mΩ. Thus, the suggested EIS technique can be used in high demanding applications, such as nearly zero-energy buildings, microgrids, and electric vehicles. This is attained because a smooth cell excitation current is utilized that is provided by the proper control of the gate-source of each cell's parallel-connected MOSFET and thus, effective harmonic analysis can be accomplished. Since the circuit topology of the EIS is implemented without requiring expensive electronic equipment, it is affordable to be applied in the BT system of any application. The proposed EIS system can cooperate with a BT cell equalization (BCE) system that utilizes the same MOSFET control scheme to provide the excitation current. Thus, a combined EIS-BCE system is developed that can be used to improve the performance of a Li-ion BT management system. The accuracy of the EIS technique and its high performance by operating within a combined EIS-BCE system are experimentally validated.
|
3,570
|
Please write an abstract with title: Mathematical formulation for the secure and versatile integration of biometric data into a cryptographic framework, and key words: Bioinformatics, Biometrics, Elliptic curve cryptography, Polynomials, Interpolation, Information security, Cryptographic protocols, Robustness, Iris, Laboratories. Abstract: This paper presents the mathematical formulation for the secure and versatile integration of biometric data into a cryptographic framework. The use of Shamir polynomial thresholding to further stabilise bitstrings derived from token-and (*)-biometric inputs, resulting in zero-uncertainty cryptographic keystrings is described. This enables direct biometric applicability in cryptographic protocols. Bio-hash implementations operate in a priori insecure environments or message-based scenarios. The versatility of discretisation based on a generic inner-product formulation raises the possibility of using Shamir interpolation to integrate multiple biometric forms ie face and fingerprint,which is combined with discrete token and/or knowledge key-factors. Therefore, token*biometric cryptographic factorizations are rigorously secure and flexible versatile.
|
3,571
|
Please write an abstract with title: Control of an Autonomous Energy Complex with Renewable Energy Sources, taking into account the Type of Input Information Uncertainty, and key words: Fuzzy logic, Renewable energy sources, Uncertainty, Wind energy, Software algorithms, Software systems, Mathematical models. Abstract: This article discusses the management of autonomous energy complex with renewable energy within the smart grid solutions in terms of different types of input data uncertainty. On the basis of the theory of fuzzy logic and a fuzzy situational network, an approach has been developed that allows one to calculate the type of uncertainty of the input information, and then select the most appropriate mathematical model and control strategy for AEC with RES.
|
3,572
|
Please write an abstract with title: High-resolution Cardo polymer dielectric "VPA-series", and key words: Polymers, Dielectrics, Resistance heating, Steel, Chemicals, Spine, Wiring, Wafer scale integration, Packaging, Resists. Abstract: Nippon Steel Chemical Co., Ltd. has developed a "Cardo" structure polymer based dielectric VPA-series. "Cardo" structure is characterized as bulky substituents attached to the sp3 carbon in polymer backbone. We achieved excellent heat resistance as an acrylic polymer by adopting fluorene as bulky substituent. We have designed a photoimageable dielectric using this polymer. This dielectric has excellent resolution (via-hole opening aspect ratio >1 for a wide thickness range) and high reliability together with heat resistance. This paper introduces characteristics of the polymer itself and featured as dielectric for both printed wiring board (PWB) and wafer level package (WLP) applications. Varnish type and dry film resist (DFR) types are available.
|
3,573
|
Please write an abstract with title: A General Fixed-Time Observer for Lower-Triangular Nonlinear Systems, and key words: Observers, Nonlinear systems, Estimation error, Circuits and systems, Stability criteria, Mirrors, Micromechanical devices. Abstract: The design of global fixed-time observer for a category of lower-triangular nonlinear systems is reported in this brief. Under a wild condition that admits the Hölder continuous conditions as a special case, a constructive algorithm of global fixed-time observer design is proposed by virtue of non-recursive combining bi-limit homogeneous technique. Rigorous stability analysis as well as robustness with respect to exogenous disturbances is provided to show the proposed observer ensuring global fixed-time convergent performance of the estimation error dynamics. Simulation results of an example of MEMS mirror with the nonlinear viscous damping dissipative load are given to confirm the effectiveness of the proposed algorithm.
|
3,574
|
Please write an abstract with title: Computationally efficient congestion controller for data transmission networks with variable packet loss, and key words: Computational modeling, Packet loss, Buffer overflows, Aerospace electronics, Computational efficiency, Delays, Data communication. Abstract: In our paper we consider the issue of controlling the flow of data in connection-oriented communication networks with multiple data sources and variable bit rate. Effective control of such a system is not a trivial task since all sources are characterized by individual delays and unpredictable packet loss rates. In this work a sliding mode control scheme is proposed for data congestion control in the considered networks. The controller uses a particular delay-free model of the network and a sliding hypersurface defined in the extended state space. It is demonstrated that the proposed scheme ensures all essential properties of the network while offering high computational efficiency.
|
3,575
|
Please write an abstract with title: Area-optimal FPGA implementation of the YOLO v2 algorithm using High-Level Synthesis, and key words: Simulation, Very large scale integration, Tools, Throughput, Task analysis, Field programmable gate arrays, Pipeline processing. Abstract: Field-programmable gate arrays (FPGAs) have been used as pre-silicon validation platforms in VLSI designs. In this paper, we propose a FPGA-based you-only-look-once (YOLO) v2 object detector implementation that provides better performance in terms of speed, achieves higher accuracy, and requires fewer resources compared with the alternatives. It is constructed using a convolutional deep neural network (CNN). We apply high-level synthesis (HLS) to model and optimize the implementation using multiple directives, such as pipelining, loop unrolling, in-lining, etc. The proposed YOLO v2 design is implemented on a Xilinx Zynq xc7z020clg484-1 device. We run simulations to test its functionality using an xSim simulator. The proposed implementation not only runs faster, but it utilizes an order of magnitude fewer resources than available implementations in the literature.
|
3,576
|
Please write an abstract with title: Prototyping 5G Network in Laboratory Testbed with Virtual Deployment Environment, and key words: 5G mobile communication, Long Term Evolution, Containers, Computer architecture, Radio access networks, Hardware, Software. Abstract: This paper describes different ways of deploying a 5G network testbed for research porpouses. The proposed method allows us to introduce various research developments into the ecosystem of the network infrastructure. Using the laboratory infrastructure we propose a technique for investigating moving mobile devices using artificial signal distortion. This technique reduces the time and cost of test planning. At the same time, it simulates conditions close to real situations.
|
3,577
|
Please write an abstract with title: Corridor 3D Navigation of a Fully-Actuated Multirotor by Means of Bee-Inspired Optic Flow Regulation, and key words: Visualization, Three-dimensional displays, Quaternions, Numerical simulation, Regulation, Mathematical models, Vehicle dynamics. Abstract: This paper deals with the issue of autonomous indoors navigation related to Unmanned Aerial Vehicles. Here, we simulated two hexarotors: a fully-actuated one that maintains level its attitude, and therefore that of the visual sensors; and an under-actuated one. Both vehicles were meant to fly forwards in a tunnel while reacting to the irregularities of the terrain, adopting a bee-like behavior based on a nonlinear optic flow regulation. The dynamic models are provided by means of the Newton-Euler equations, nonetheless, the unit quaternion representation is used for a suitable treatment of the rotational motion. The attitude stabilization depends on the knowledge of the quaternion itself, moreover, and due to the non-linearities related to the translational optic flows, visual guidance relies on the implementation of adaptive integral sliding mode controllers to accomplish a triple direct regulation (forward, side and lift commands). We compared both vehicles performance using detailed numerical simulations, validating the concept that a fully actuated hexarotor permits to improve the optic flow based navigation task.
|
3,578
|
Please write an abstract with title: Control of a Single Phase Modular Multilevel Converter based on a New Modulation Technique, and key words: Multilevel converters, Phase modulation, Conferences, Capacitors, Switching loss, Pulse width modulation, Topology. Abstract: Modular Multilevel Converter (MMC) topologies have a bright future for high-power applications. In order to operate them, the first objective is to control the current at MMC terminals. Therefore, the arm currents must be controlled. The second objective is to control the capacitor voltages. Therefore, the internal circulating current must be controlled too. Additionally, the third objective is to reduce the switching losses. As of late, there has been an extensive effort towards addressing the technical constraints associated with the control and operation of MMC. The control of single phase MMC is however not widely developed. This paper proposes a complete scheme for controlling the MMC load current and capacitor voltages. The proposed control scheme presents a new modulation technique called the Integral Modulation technique. Finally, the effectiveness of the control scheme with its new modulation technique is tested on a single phase MMC using MATLAB/Simulink.
|
3,579
|
Please write an abstract with title: TuneMPC—A Tool for Economic Tuning of Tracking (N)MPC Problems, and key words: Economics, Tuning, Stability criteria, Numerical stability, Software, Orbits. Abstract: Economic nonlinear model predictive control (NMPC) is a variant of NMPC that directly optimizes an economic performance index instead of a tracking error. Although economic NMPC can achieve excellent closed-loop performance, the associated computational effort as well as the difficulty of guaranteeing stability in practice are its main drawbacks. Motivated by these difficulties, a formal procedure was developed that tunes a tracking (non)linear MPC scheme so that it is first-order equivalent to economic NMPC. This letter introduces TuneMPC, a new open-source software framework that closes the gap between the underlying theory and practical application of this tuning procedure. For user-provided system dynamics, constraints and economic objective, TuneMPC enables automated computation of optimal steady states and periodic trajectories, and returns the corresponding tuned stage cost matrices. To demonstrate the potential of the tool, we apply the technique to the challenging example of an autonomous tethered aircraft flying periodic orbits for airborne wind energy harvesting.
|
3,580
|
Please write an abstract with title: A Cascading Online-Simulation Framework to Optimize Installation Cycles for Offshore Wind Farms, and key words: Wind energy, Computational modeling, Wind farms, Predictive models, Data aggregation, Data models, Planning. Abstract: Offshore wind energy constitutes a promising technology to achieve the world's need for sustainable energy. However, offshore wind farm installations require sophisticated planning methods due to increasing resource demands and the processes' high dependence on viable weather conditions. Current literature provides several models that either provide strategic or tactical decision support using historical data or operative support using current measurements and forecasts. Unfortunately, models of the first type cannot support the operative level. In contrast, the second type provides decision support using local, short-term optimizations that do not consider these decisions' effect on the overall installation project. This article proposes a cascading online-simulation concept that optimizes local decisions using current data. However, it estimates the effects of each decision using nested simulation and aggregates of historical data. The results show that this approach achieves a good trade-off between the project's duration and cost-inducing delays at comparably low computational costs.
|
3,581
|
Please write an abstract with title: Vlasov model for the impedance of a rod-pinch diode, and key words: Impedance, Diodes, Anodes, Cathodes, Tensile stress, Critical current, Radiography, Space vector pulse width modulation, Electron emission, Ion emission. Abstract: The rod-pinch diode [(R.A. Mahaffrey et al., 1978), (G. Cooperstein et al., 2001)] is a cylindrical, pinched-beam diode being developed as a radiography source [R.J. Commisso et al., 2002]. The diode consists of a small radius anode rod extending through the hole of an annular cathode. The diode has been operated at 1 to 5 MV with an impedance of 20 to 50 /spl Omega/, a FWHM pulse width of 20 to 50 ns, and an anode radius as small as 0.25 cm [(R.A. Mahaffrey et al., 1978), (G. Cooperstein et al., 2001), (R.J. Commisso et al., 2002)]. The diode is designed to run at critical current so that electrons emitted from the cathode flow axially along the anode rod and pinch radially onto the rod tip. Typically, ion emission from the anode is required for propagation of the pinch along the rod. Without ions, the pinch would occur on the anode rod just downstream of the cathode disk. In order to assure that a given diode will be properly designed to run at critical current requires a detailed knowledge of the diode impedance characteristics. Initially, a laminar flow model [B.V. Oliver et al., 2001] was developed to describe the rod-pinch diode. Although this model provides considerable insight into diode operation, PIC simulations show that the electron flow is not laminar [G. Cooperstein et al., 2001]. The model of [B.V. Oliver et al., 2001] was extended to include transverse electron pressure in order to consider the effects of nonlaminar flow [P.F. Ottinger et al., 2002]. However, a form for the transverse pressure tensor is required to close the equation set in this model and only special forms of the pressure tensor are analytically tractable. Here, a Vlasov model for the diode electron flow is developed using an electron distribution function with properties that are well characterized and directly related to a rod-pinch diode. In this model, the pressure tensor is self-consistently derived.
|
3,582
|
Please write an abstract with title: Cancer Survival Prediction From Whole Slide Images With Self-Supervised Learning and Slide Consistency, and key words: Feature extraction, Task analysis, Computational modeling, Cancer, Annotations, Self-supervised learning, Training. Abstract: Histopathological Whole Slide Images (WSIs) at giga-pixel resolution are the gold standard for cancer analysis and prognosis. Due to the scarcity of pixel- or patch-level annotations of WSIs, many existing methods attempt to predict survival outcomes based on a three-stage strategy that includes patch selection, patch-level feature extraction and aggregation. However, the patch features are usually extracted by using truncated models (e.g. ResNet) pretrained on ImageNet without fine-tuning on WSI tasks, and the aggregation stage does not consider the many-to-one relationship between multiple WSIs and the patient. In this paper, we propose a novel survival prediction framework that consists of patch sampling, feature extraction and patient-level survival prediction. Specifically, we employ two kinds of self-supervised learning methods, i.e. colorization and cross-channel, as pretext tasks to train convnet-based models that are tailored for extracting features from WSIs. Then, at the patient-level survival prediction we explicitly aggregate features from multiple WSIs, using consistency and contrastive losses to normalize slide-level features at the patient level. We conduct extensive experiments on three large-scale datasets: TCGA-GBM, TCGA-LUSC and NLST. Experimental results demonstrate the effectiveness of our proposed framework, as it achieves state-of-the-art performance in comparison with previous studies, with concordance index of 0.670, 0.679 and 0.711 on TCGA-GBM, TCGA-LUSC and NLST, respectively.
|
3,583
|
Please write an abstract with title: Research on Legal Judgment Prediction Based on Bert and LSTM-CNN Fusion Model, and key words: Deep learning, Law, Predictive models, Data mining, Artificial intelligence, Task analysis, Standards. Abstract: In recent years, artificial intelligence has been advancing and intelligence in the judicial field has been developing, and legal Judgment prediction based on legal documents has become a hot research direction. The task of legal verdict prediction is to analyze the factual descriptions of real cases and mine the textual features in the factual descriptions. Most of the present-day legal verdict prediction uses deep learning methods, but its accuracy rate still needs to be improved. In this paper, we propose a fusion model based on Bert and LSTM-CNN for prediction, and use part of the datasets from the "China Law Research Cup" Judicial Artificial Intelligence Challenge to filter and conduct experiments. The experimental results show that compared with other common models, the proposed model has more accurate prediction results and achieves better standards in model evaluation criteria.
|
3,584
|
Please write an abstract with title: Analysis of Multi-Loop Nonlinear Systems, and key words: Nonlinear systems, Differential equations, Nonlinear equations, Laplace equations, Acceleration, Electric resistance, Capacitance, Mutual coupling, Voltage. Abstract: In many multi-loop nonlinear systems, it is possible to get from the original set of simultaneous differential equations a single differential equation of a higher order. The high order nonlinear differential equa- tion can be solved by an n -dimensional phase-space method, which is an extension of the phase-plane method. As an illustration, a three- loop system is analyzed. Numerical examples for a two-loop system with nonlinear elements either in one of the loops or in the coupling are also given. Two-dimensional trajectories are shown as projections of phase-space trajectories.
|
3,585
|
Please write an abstract with title: Research on Field Routing Planning and Optimization Algorithm Based on GIS, and key words: Heuristic algorithms, Computational modeling, Software algorithms, Routing, Software, Data models, Planning. Abstract: In this paper, A* optimization algorithm based on GIS is proposed to solve the problems of the lack of scientific methods and means in routing planning under the field conditions and the low computational efficiency. Firstly, this paper extracted the information of water source, road network and elevation through GIS related software, stored it in raster layer and mapped the environment model to save the storage space of the map. Then, the moving speed and constraint constraints were calculated by combining the opening conditions of the environmental model, which were introduced into the cost function of A* algorithm as an adaptive factor. Then, the efficiency of the algorithm was improved and the space and time costs were reduced through the step size crossing mechanism and the two-way search strategy.Finally, software is used to standardize the algorithm flow and visualize the algorithm results, which effectively proves the feasibility and practical application of the algorithm Status.
|
3,586
|
Please write an abstract with title: Pre-processed space-time trellis codes, and key words: Convolutional codes, Fading, Transmitters, Space technology, Maximum likelihood decoding, Equations, Channel state information, Bit rate, State feedback, Receiving antennas. Abstract: Tarokh et al. (1998) introduced the concept of space-time trellis coding as a means to combat fading by introducing redundancy, both in space and time. If the wireless channels are static or fade very slowly, the channel state information can be sent back to the transmitter using a low bit rate feedback path. In such a situation, it may be possible to mitigate the effects of signal cancellation due to simultaneous transmission, by using some sort of pre-processing technique at the transmitter (which incorporates the channel knowledge). However, we assume that no such feedback channel exists. Therefore, we address the issue of feedforward only pre-processing schemes at the transmitter. For fading channels, the error-rate performance depends on the effective code length, which is the length of the shortest error event path. The performance also depends on the minimum product distance which is computed from the maximum likelihood path and the other error paths with non-zero distance from it.
|
3,587
|
Please write an abstract with title: Optimal Layout of Rotor-bearing System Sensors Based on Fault Diagnosability, and key words: Vibrations, Fault diagnosis, Layout, Rotors, Estimation, Density functional theory, Indexes. Abstract: In view of the current situation that there is little research on whether the possible fault signals of the rotor-bearing system can be identified and separated when optimizing the sensor arrangement, the transmission path of the vibration signals in the rotor-bearing system is analyzed, and the rolling bearing vibration signal model is established, and the fault diagnosability is applied to the optimal sensor arrangement of the rotor-bearing system, and the fault diagnosability evaluation criterion is used as an indicator to evaluate different arrangement solutions. The optimal sensor arrangement is finally given. The possible fault signals are measured at these sensor nodes, the fast Fourier transform is performed to obtain the spectrum of the corresponding faults, the density function of the corresponding faults is obtained by using kernel density estimation, and then the K-L scatter is used to determine the fault diagnosability at each location; the optimal solution is determined by using the fault diagnosability as an evaluation index. The feasibility of the proposed method is verified by the rotor bearing fault diagnosis test bench..(Abstract)
|
3,588
|
Please write an abstract with title: A laser doppler spectroscopy method for laser nanodiagnostics of oncologic diseases, and key words: Nanoparticles, Spectroscopy, Strips, Sensitivity, Biochemical analysis, Lasers, Nanoscale devices. Abstract: The new method for laser nanodiagnosis of oncological diseases based on the hydrodynamic analysis of nanoparticle distribution in human urine using the laser Doppler spectrometry and self-engineered devices has been proposed, tested and patented for the first time. The generalized distributions of nanoparticles in the urine of a healthy and ill people have been constructed. The statistics on the distribution of nanoparticles in the urine of healthy donors and patients with oncological diseases was collected and added with the results of biochemical analyses of blood and urine of 136 donors in a wide age spectrum. The biochemical analyses were found to correlate with spatial and dimensional distributions of nanoparticles in human urine. The reliability of the diagnosis exceeded 89%, which is a very good result for a simple non-invasive screening method. The results have revealed perspectives for the development of the proposed method for diagnosing a wide range of disorders, such as diseases of heart, liver, kidney and circulatory system. These results provide opportunities and perspectives for further commercialization
|
3,589
|
Please write an abstract with title: Array Geometry Effects on Digital Beamforming for Multi-Channel Passive Radar Systems, and key words: Geometry, Passive radar, Array signal processing, Transmitters, Signal processing algorithms, Interference, Radar antennas. Abstract: Passive radar which uses the so called "signal of opportunities" has become very popular in last decade or so. These radars provided the advantages of ease of use, and covertness, which arises because of the use of third-party free signals. Since there is no control on the transmitted waveform, therefore the signal processing involve in passive radar is more complicated and challenging. In passive radar, the typical cross-ambiguity function (CAF) is used to form the final Doppler-range plot which can be used for detection. The cross-ambiguity function uses the signal scattered from target and pure reference signal coming from main transmitter. Initially the passive radar system utilizes two antenna setup to collect these two signals. One antenna is used to collect the so called reference signal and the other is used to collect the target echo corrupted by very strong reference signal. Therefore, the first step is to clean this target signal by using classical interference cancelation algorithm based on various types of adaptive filters. Later on, multi-channel passive radar systems were developed for providing additional gain in suppressing reference signal by using digital beamforming (DBF). The use of digital beamforming in combination with interference cancelation provides enough gain to acquire a clean target signal, thus improving the final detection by CAF. These multi-channel system include an array of antennas, typical configured as either uniform linear array (ULA) or uniform circular array (UCA). The aim of this paper is to cover various array configuration and there effect on suppressing the reference signal by using DBF. Various array configuration will be presented along with digital beamforming algorithms being implemented by optimizing the array factor. The array configuration which will be covered include linear, circular and rectangular. The optimization based DBF will be presented with the constraint of very low level of side lobes. The effect of various array configuration on the efficient cancelation of reference signal will be presented using simulated data.
|
3,590
|
Please write an abstract with title: On optimal training sequence design for multiple-antenna systems over dispersive fading channels and its extensions, and key words: Dispersion, Fading, Binary sequences, Channel estimation, Communication systems, Interference, Transmitting antennas, Autocorrelation, Councils, Mobile communication. Abstract: In this correspondence, previous work on (P,V,M) code sequences, which are sequences with a zero-correlation zone (ZCZ) that can be used to accurately and efficiently perform channel estimation in multiple-antenna communication systems, are noted. In addition, extensions of ZCZ sequence sets based on perfect sequences, almost-perfect sequences, and perfect arrays are presented. It is shown that those ZCZ sets based on perfect sequences/arrays are optimal with respect to theoretical bounds.
|
3,591
|
Please write an abstract with title: FPGA implementation of a general purpose HMM processor based on token passing algorithm, and key words: Field programmable gate arrays, Hidden Markov models. Abstract: In this paper, the FPGA implementation of a general purpose hidden Markov model (HMM) processing unit is illustrated. The HMM is based on the token passing algorithm, resulting in a simplified hardware topology, since a typical HMM based system can be seen as a number of HMM processors working in parallel. Each HMM processor has been designed as a parametric unit, reusable in a number of applications (speech recognition, protein structure prediction, control systems, etc). A VHDL RTL model has been developed and results obtained for the implementation on a Xilinx VirtexII FPGA are discussed.
|
3,592
|
Please write an abstract with title: Database for underwater biosensor ligands, and key words: Databases, Biosensors, Rivers, Organisms, Chemicals, Oceans, Humans, Marine animals, Underwater tracking, Data mining. Abstract: There is a great diversity of different chemical substances found in the World Ocean. The population of river and marine chemical substances contains natural oligopeptides and their analogues. They are produced by living organisms and can be the result of human activity. We are familiar with several thousand naturally occurring oligopeptides at present and this number is rapidly increasing. The information on their structures and function is contained in a specially created database: EROP-Moscow (Endogenous Regulatory OligoPeptides). These substances were elucidated in many river and marine organisms: Chordata (Protochordata, mammalians, fishes, amphibians), Coelenterata (hydra, jellyfishes, sea anemones,), Arthropoda (crabs, lobsters, prawns, shrimps), Reptilia (alligators, moccasins, turtles), Echinodermata (sea cucumbers, sea urchins, starfishes), Mollusca (mussels, sea hares, snails, octopus) etc. Many of them are the sources of different toxins and other physiologically active oligopeptides that can be detected by special biosensors. Increasing interest in the detection of river and marine living organisms and the underwater biosensor problem has created a need for improved data management in this field. Part of the EROP-Moscow database contains more than thousand entries of fully referenced river and marine oligopeptide data including primary structure, functions, and location along with relevant literature references. The database has a set of search tools that allow users to extract data and perform specific queries and different investigations. These entries have compiled from scientific literature, cleaned of errors and enriched with additional structural and functional information. The grouping of oligopeptides provides a basis for extending and clarifying the existing structural and functional (e.g. oligopeptide biosensor interaction) classification. This information is planned to be accessible via the Internet.
|
3,593
|
Please write an abstract with title: Feature-Based Attack on Visual Tracking, and key words: Training, Heating systems, Visualization, Target tracking, Perturbation methods, Neural networks, Object detection. Abstract: Machine learning can categorize various algorithms, for example, classification model, object detection, segmentation and visual tracking. The adversarial attack comes up to addresses the generalization weakness which learns to anticipate the deep neural network by causing model malfunction. Although the adversarial attack models can effectively suppress the performance of the classification model, there are narrow attacking models in visual tracking because the tracking model is different from the generalization model. In this paper, we propose a feature-based attack model that mildly generates perturbation in the template region with two loss functions: minimizing malicious noise and interfering with the heatmap feature which gradually forces the tracker into the erroneous position. We train our proposed attacking model based on SiamRPN++. Our training model requires only a template image which is sufficient for attacking the tracker and leads to the training resource decreasing. In the experiment section, we benchmark our model with OTB100, VOT2018, LaSOT and UAV123 datasets. Our model can successfully deceive the tracker. It is superior to the other existing adversarial attack models in visual tracking. Besides, our noise generator is the fastest model.
|
3,594
|
Please write an abstract with title: Single-electron transistor using self-aligned sidewall spacer gates on silicon-on-insulator nanowire, and key words: Single electron transistors, Silicon on insulator technology, Lithography, Quantum dots, Oxidation, Temperature, Wires, Nanoscale devices, Electron beams, Size control. Abstract: A dual-gate-controlled single-electron transistor was fabricated by using self-aligned polysilicon sidewall spacer gates on a silicon-on-insulator nanowire. The quantum dot formed by the electric field effect of the dual-gate structure was miniaturized to smaller than the state-of-the-art feature size, through a combination of electron beam lithography, oxidation and polysilicon sidewall spacer gate formation processes. The device shows typical MOSFET I-V characteristics at room temperature. However, the Coulomb gap and Coulomb oscillations are clearly observed at 4 K.
|
3,595
|
Please write an abstract with title: The Research on the expansion scheme of security operation center based on data self-balancing, and key words: Automation, Data integrity, Big Data, Security, Business continuity, Surges, Information technology. Abstract: With the frequent occurrence of security incidents and the continuous growth of data levels, the processing of massive data places higher requirements on the analysis and storage capabilities of the security operation center. The cluster deployment mode makes the horizontal expansion a basic capability of the platform, but how to ensure data integrity and business continuity while expanding nodes is a key issue that needs to be solved. Based on the security operation center of the China Academy of Engineering Physics, this paper studied the technical details of the data migration expansion schemes and data self-balancing expansion schemes, and conducted comparative experiments in the laboratory. Finally, it proves the data self-balancing expansion schemes have more advance and feasibility than the data migration expansion schemes. The data self-balancing expansion schemes has been applied in the online system, which provides a certain reference for the expansion of other big platforms on the secret network in the future.
|
3,596
|
Please write an abstract with title: Reliable evolutionary-based command input generator for a simple mobile manipulation task, and key words: Manipulator dynamics, Wheels, Actuators, Performance evaluation, Algorithm design and analysis, Testing, Robotics and automation, Mobile robots, End effectors, Design optimization. Abstract: This paper studies the possibility of using the evolutionary approach to determine dynamic control of mobile manipulators on which very little information is known. To determine the feasibility of the approach, an evolutionary algorithm is set according to the control problem. Simulation uses a simple trajectory following task and existing robots modeled by their dynamical characteristics. Adaptation of the algorithm according to performance is presented.
|
3,597
|
Please write an abstract with title: Sorting Algorithm for Medium and Large Data Sets Based on Multi-Level Independent Subarrays, and key words: Satellites, Program processors, Simulation, Approximation algorithms, Stability analysis, Partitioning algorithms, Data mining. Abstract: In this paper, we propose a new low-complex preprocessing that enables conventional data sorting algorithms to be more efficient for medium and large data sets in a serial/parallel realization. First, we divide the main array into independent subarrays by a multi-level mean-based division. It is realized by calculating the mean value of each level as the pivot to divide its elements into two parts, greater and lower than the pivot, almost in the same lengths with a lower randomness rate to the main array. Then, subarrays can be sorted by the conventional sorting algorithms in a sequential serial realization to extract sorted data gradually or parallel realizations by using independent multi-core structures. It also holds the stability and adaptivity features of the sorting algorithm, if any. The effectiveness of the mean-based pivot to the random one is investigated. To show the superiority of the proposed idea, the simulation results are compared in view of the running time and the number of swaps required to the conventional and proposed serial and parallel Insertion-sort in different lengths of data. Finally, the complexity order of the proposed algorithm in serial and parallel implementations is compared to the conventional one.
|
3,598
|
Please write an abstract with title: Observation of ferromagnetic domain structures using scanning magnetoresistance microscope with a magnetoresistive cantilever, and key words: Magnetoresistance, Magnetic force microscopy, Magnetic anisotropy, Perpendicular magnetic anisotropy, Atomic force microscopy, Magnetic sensors, Magnetic domains, Tensile stress, Electrical resistance measurement, Magnetic field measurement. Abstract: In this paper, we report on the fabrication process and characterization of the MR cantilever, and demonstrate that imaging domain structures of a various ferromagnetic materials using our SMRM.
|
3,599
|
Please write an abstract with title: A Novel Approach for Network Intrusion Detection using Probability Parameter to Ensemble Machine Learning Models, and key words: Machine learning algorithms, Computational modeling, Network intrusion detection, Probability, Boosting, Classification algorithms, Computer crime. Abstract: Existing algorithms that have been implemented by researchers to detect attacks, have used bagging, boosting and voting classifier as a method to ensemble multiple models. But the proposed approach uses the probability parameter as a key factor to ensemble two machine learning models and makes an efficient new model to detect attacks. This approach states that, if a particular model is not sure about its decision on a sample, then that decision should not be considered as final decision. The surety of a decision being correct can be calculated using probability parameter. Probability parameter tells with how much probability the decision will be correct. So, the ensemble of two models is done in such a way that, if Model 1 is not sure about the decision then Model 1’s decision will not be considered and then Model 2’s surety will be checked and if found surety is more than Model 1’s then the decision given by Model 2 will be the final decision and vice-versa. Eventually, the performance of final ensemble model will be boosted. After comparing with the existing models, the proposed model gave better performance. In this paper, two final models have been created which are trained on two different datasets, one using NSL-KDD dataset and other using Canadian Institute of Cyber Security’s dataset. The accuracy of the final model for NSL-KDD dataset is 99.32% and that for Canadian Institute of Cyber Security’s dataset is 99.68%. In short, this paper proposes a new hyperparameter related to probability parameter to ensemble two existing Machine Learning models. Future work is to work on zero-day attacks and also detect the type of attack more accurately.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.