ID
int64 0
400k
| content
stringlengths 97
5.85k
|
|---|---|
5,100
|
Please write an abstract with title: Combining Multimodal DNN and SigPid technique for detecting Malicious Android Apps, and key words: Machine Learning, Malware detection, Multi modal Deep Learning, Android Security. Abstract: Google announced that they are 2.7 billion active Android users in the world. There are different categories of mobile apps available, based on development nature and different categories, for example apps based on development nature are native apps, hybrid apps, web apps and apps based on different categories are gaming, business, educational, lifestyle, entertainment and utility etc. Due to its scalable growing and open source nature it is easily vulnerable to hackers or attackers to steal our information and inject malware apps into our mobile system. In recent days, a new malware app called Joker was introduced in the mobile market and infected 24 apps in the Google store, which mainly focus on extracting money and credential information from the users without their knowledge. Many scientific researches are undergoing to identify android malicious apps using machine learning classification approach. In this paper, the deep neural network algorithm is chosen to detect Android Malware by extracting features from the Android Manifest file and java API modules then fed into Deep Neural network (DNN) [10] classifier to detect whether the apps as malicious or benign app. This paper combines the Sigpid [1] (Significant Permission Identification) technique which is given as a feature in Multimodal DNN. SigPid was evaluated as a high probability of detecting malware apps using Permissions. The goal is to implement an efficient framework for detecting the Android Malware apps using Machine learning techniques which can be used in App store where all the applications are deployed in cloud and also in Mobile Antivirus app, to detect the harmfulness of the app.
|
5,101
|
Please write an abstract with title: Parking Guidance System Using Wireless Sensor Networks, and key words: Wireless communication, Radio frequency, Wireless sensor networks, Technological innovation, Transmitters, Scalability, Smart homes. Abstract: The study's goal is to create a smart parking system using wireless sensor networks (WSNs), which are now being used in almost every field for a variety of applications, including monitoring marine life in oceans, health monitoring, object inspection, smart homes sensor based systems, and the automotive and locomotive industries. The wireless sensor network is built on the basis of a vehicle parking system utilizing the Xbee module after a thorough examination of several systems. The Xbee modules are set up in a star network, with the first node acting as a receiving and transmitter node, and the remaining nodes acting as transmitters. Multiple access time division was utilized in this project. The data is sent by the transmitter node after a predetermined time interval, and it is received by the receiver node without any data collision between two transmitting nodes. Each node's central processing unit is an Arduino. The HC-06 RF module is used to connect wirelessly with the graphical user interface through Bluetooth protocol. The main idea is to build a parking system that is completely wireless and does not rely on a wired network. The WSN-based auto parking system is chosen for the implementation.
|
5,102
|
Please write an abstract with title: A robust algorithm for text detection in color images, and key words: Robustness, Color, Image edge detection, Image texture analysis, Text recognition, Image analysis, Optical character recognition software, Data mining, Wavelet domain, Algorithm design and analysis. Abstract: Text detection in color images has become an active research area since recent decades. In this paper, we present a novel approach to accurately detect text in color images possibly with a complex background. First, we use an elaborate edge detection algorithm to extract all possible text edge pixels. Second connected component analysis is employed to construct text candidate region and classify part non-text regions. Third each text candidate region is verified with texture features derived from wavelet domain. Finally, the expectation maximization algorithm is introduced to binarize text regions to prepare data for recognition. In contrast to previous approach, our algorithm combines both the efficiency of connected component based method and robustness of texture based analysis. Experimental results show that our algorithm is robust in text detection with respect to different character size, orientation, color and language and can provide reliable text binarization result.
|
5,103
|
Please write an abstract with title: Tri-dimensional reduced-order thermal model of stacked electronic structures, and key words: Thermal conductivity, Heat sinks, Thermal resistance, Resistance heating, Substrates, Equations, Radio frequency, Electronic packaging thermal management, Conducting materials, Semiconductor materials. Abstract: This paper deals with the development of a reduced-order thermal modelling based on the analysis of heat spreading occurring in an element where a heat source is attached. The modelling, suitable for any stacked electronic structures, uses the elementary solution of the tri-dimensional heat conduction equation. The reduced-order thermal model is applied to the thermal design of an RF power component.
|
5,104
|
Please write an abstract with title: Data-Driven Hybrid Model for Forecasting Wastewater Influent Loads Based on Multimodal and Ensemble Deep Learning, and key words: Forecasting, Predictive models, Load modeling, Pollution measurement, Data models, Correlation, Computational modeling. Abstract: With the advent of the Industry 4.0 and the introduction of smart technologies in wastewater treatment plants (WWTP); forecasting influent loads is essential to regulate exaggerated operational strategies for WWTP. However, due to various water usage and sources, it is challenging to forecast the fluctuating influent loads. To deal with highly nonlinear and temporal-correlated characteristics of influent loads, in this article, we proposed hybrid influent forecasting model based on multimodal and ensemble-based deep learning (ME-DeepL). The proposed ME-DeepL forecasting model combines strength of multiple deep-learning algorithms in ensemble-learning architecture to handle propagated intrinsic sublayers by empirical mode decomposition of influent loads. Then, the proposed model was assessed to predict the loads on long-term (daily), and short-term (hourly) with multisteps forecast horizons. The experimental results revealed that ME-DeepL model exhibited superior forecasting performance in comparison to five recurrent neural network-based reference models, by capturing the informative features and temporal patterns from fluctuating influent loads.
|
5,105
|
Please write an abstract with title: Motion control of two-link flexible-joint robot with actuator nonlinearities, using neural networks and direct method, and key words: Motion control, Actuators, Neural networks, Control systems, Uncertainty, Mathematical model, Robot sensing systems, Payloads, Backstepping, Intelligent robots. Abstract: We present a state-feedback control of a two-link flexible-joint robot. We use three-layer neural networks to learn the unknown parts of the desired control laws. Therefore, the control algorithm does not require the mathematical model representing the robot. The neural networks' weights are adapted on-line. Therefore, the control system can adapt to changes during operation such as payload changes. We use a smooth variable structure controller to handle uncertainties from the neural network approximation, external disturbances, deadzone, and backlash. In our simulation, we obtain the actual plant model from experiments
|
5,106
|
Please write an abstract with title: The Framework and Practices of Digital Twin City, and key words: Digital transformation, Conferences, Urban areas, Government, Strategic planning, Market research, Digital twins. Abstract: Digital twin city has become an important choice and trend of urban digital transformation. Based on the theory of digital twin this paper proposed “4+5” digital twin city framework and applied it to the study of digital twin cases in China, the United States, France and other countries, analyzed the challenges being faced. Suggestions and guidance on the development of digital twin city were given to city builders and suppliers, as well as governments for strategic planning.
|
5,107
|
Please write an abstract with title: Multi-Frequency Residual Convolutional Neural Network for Steganalysis of Color Images, and key words: Steganography, Feature extraction, Color, Deep learning, Convolution, Payloads, Convolutional neural networks. Abstract: Current steganalyzers based on deep learning mostly adopt wider or deeper designs to improve detection performance. However, an overly complex network increases the training cost and is not conducive to its expansion and optimization. Moreover, steganalysis pays more attention to high-frequency information corresponding to the image texture. However, the deeper the network, the more likely it is to learn low-frequency information corresponding to the image content, which is inconsistent with the goal of steganalysis. In response to these problems, a multi-frequency residual deep convolutional neural network for steganalysis of color images called MFRNet is proposed in this paper. We apply the idea of multi-frequency analysis to steganography detection for the first time, effectively controlling the network scale. By designing columns of different depths, it can learn different frequency components of steganographic noise at the same time. The detection performance is better than the existing networks that only learn a single frequency component of steganographic noise at the same depth. Therefore, it can achieve a good detection performance with a lighter architecture. In addition, by designing residual basic blocks with different residual shortcuts, different scales of steganographic noise residuals can be calculated at the same time, which can effectively suppress the interference of image content, so as to better reduce the impact of steganography algorithm mismatch and payload mismatch than the existing methods. The experimental results on PPG-LIRMM-COLOR showed that the proposed MFRNet outperformed the state-of-the-art model WISERNet.
|
5,108
|
Please write an abstract with title: Performance study of OpenAirInterface 5G System on the Cloud Platform Managed by Juju Orchestration, and key words: 5G mobile communication, Cloud computing, Long Term Evolution, Cellular networks, Virtual machining, Virtualization, Scalability. Abstract: OpenAirInterface (OAI) 5G is an open source-based software that can implement LTE-based telecommunications systems and it's protocols, it uses the 3GPP standard on a public computer. OpenAirInterface 5G is used to conduct research on the development of 4G to 5G at a lower cost. In this work, we evaluate the concept of Virtual Networks on the OpenAirInterface 5G network by evaluating the performance of our OpenAirInterface 5G system on a cloud platform managed by Juju Orchestration. The cloud platform used is managed by Metal as a Service (MAAS) to help allocate the network infrastructure, both physical and virtual. Juju Orchestration is used to accelerate and automate the deployment and configuration of OpenAirInterface applications on cloud platforms. The performance evaluation is done by testing the bitrate, latency, jitter, streaming performance, and browsing performance. The performance evaluation shows that the performance quality of the OAI cloud is better, although the differences are not significant. Besides that, the OAI cloud still has it's big advantages in terms of its scalability process for the ease of automation deployment of applications carried out by Juju Orchestration.
|
5,109
|
Please write an abstract with title: MIMO measurements of communication signals and application of blind source separation, and key words: MIMO, Blind source separation, Transmitters, Source separation, Detection algorithms, Signal to noise ratio, Signal processing, Frequency, Time measurement, Hardware. Abstract: In this paper we present a flexible multiple input multiple output (MIMO) measurement system for communication signals in the 2.4 GHz band. We present some measurements of the digital to digital transmission channel which includes all impairments of the hardware realization. Using this system we perform a multi-layer transmission of communication signals. At the receiver side we use blind source separation (BSS) techniques as front-end processing to avoid estimation and synchronization problems. In order to improve the estimation of the channel and the symbol detection, we propose an iterative approach, which uses the knowledge of the finite symbol alphabet but does not need additional training data.
|
5,110
|
Please write an abstract with title: Testing Software and Hardware Data Security Tools Using the Automata Theory and the Graph Theory, and key words: Data security, Automata, Biomedical measurement, Software, Hardware, Graph theory, Software tools. Abstract: The article focuses on the application of existing provisions of the automata and graph theories to solving the problem of testing software and hardware data security tools (DST). The software and hardware DST, unlike software ones, include hardware components that implement key security functions, while preventing from using a number of testing methods and tools. In addition to the possibility of applying a particular known testing method or tool to software and hardware DST, what remains acute is the problem of ensuring completeness and optimality of such testing. The developers of various DST do not often have a clear understanding of when they can stop testing and whether the test results allow them to talk about its completeness. Accordingly, testing of DST is often spontaneous, and the developer does not understand whether all the security functions have been tested, whether all the states and all possible sets of parameters have been tested, and whether testing is being carried out in the optimal way. To eliminate these shortcomings, the authors of the article propose to use a mathematical approach based on the theories of automata and graphs to solve the problem of testing software and hardware DST, which can be also used for other software and hardware, as well as software tools and systems. Applying this approach in practice, it is possible to confirm or reject the possibility of ensuring completeness of testing a specific data security tool, as well as identifying specific measures to ensure completeness and optimality of testing.
|
5,111
|
Please write an abstract with title: Study the Influence of Normalization/Transformation process on the Accuracy of Supervised Classification, and key words: Standardization, Support vector machines, Machine learning, Ions, Robustness, Kernel, Conferences. Abstract: Recent developments in analytical technologies helped in developing applications for real-time problems faced by industries. These applications are often found to consume more time in the training phase. To reduce this pre-treatment of data in the training phase is pointed out to be an appropriate methodology. Normalization is the best technique for pre-processing data before the training phase of application. Normalization using metrics with criteria is found to be very important to attain good predictive results with less amount of time. This paper depicts the improvement in predictive accuracies with the help of normalization techniques. Various criteria needed to achieve such data normalization are also described. In this paper, will be having a glance on three different machine learning classifier i.e., Radial SVM, KNN, Sigmoid SVM and seven different standardization techniques i.e., StandardScaler, Scale, RobustScaler, QuantileTransform, PowerTransform, MinMaxS caler and MaxAbsS caler.
|
5,112
|
Please write an abstract with title: Fabrication of CNT-FETs using PECVD-grown nanotubes, and key words: Fabrication, Nanotubes, Transconductance, Iron, Insulation, Temperature measurement, Ballistic transport, Plasma transport processes, Anodes, Cathodes. Abstract: Carbon nanotube FETs (CNT-FETs) are very attractive because of their ideal one-dimensional structure of the channel, which would lead to the ballistic transport of the carrier and a large transconductance. Among various growth techniques, plasma-enhanced CVD (PECVD) seems to be attractive because of its advantages such as the low-temperature growth on a large-area substrate. However, there are few reports which succeeded in growing single-walled nanotubes (SWNTs) [4] and fabricating CNT-FETs using PECVD probably due to the ion bombardment damage of the plasma. We have recently reported that the insertion of a grid between the anode and cathode in the PECVD is effective in suppressing the ion bombardment damage. In this report, we grew SWNTs directly on the SiO/sub 2/,/Si substrate using the PECVD and the patterned catalysts, and succeeded in fabricating CNT-FETs.
|
5,113
|
Please write an abstract with title: AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems, and key words: Access control, Runtime, Web and internet services, Prototypes, Publish-subscribe, Static analysis, Software systems. Abstract: Autonomous vehicle (AV) software systems are emerging to enable rapidly developed self-driving functionalities. Since such systems are responsible for safety-critical decisions, it is necessary to secure them in face of cyber attacks. Through an empirical study of representative AV software systems Baidu Apollo and Autoware, we discover a common over privilege problem with the publish-subscribe communication model widely adopted by AV systems: due to the coarse-grained message design for the publish-subscribe communication, some message fields are over-granted with publish/subscribe permissions. To comply with the least-privilege principle and reduce the attack surface resulting from such problem, we argue that the publish/subscribe permissions should be defined and enforced at the granularity of message fields instead of messages. To systematically address such publish-subscribe over-privilege problems, we present AVGuardian, a system that includes (1) a static analysis tool that detects overprivilege instances in AV software and generates the corresponding access control policies at the message field granularity, and (2) a low-overhead, module-transparent, runtime pub-lish/subscribe permission policy enforcement mechanism to perform online policy violation detection and prevention. Using our detection tool, we are able to automatically detect 581 overprivilege instances in total in Baidu Apollo. To demonstrate the severity, we further constructed several concrete exploits that can lead to vehicle collision and identity theft for AV owners, which have been reported to Baidu Apollo and confirmed as valid. For defense, we prototype and evaluate the policy enforcement mechanism, and find that it has very low overhead, does not affect original AV decision logic, and also is resilient to message replay attacks.
|
5,114
|
Please write an abstract with title: A Current Efficient 10mA Analog-Assisted Digital Low Dropout Regulator with Dynamic Clock Frequency in 65nm CMOS, and key words: Regulators, Voltage control, Transient response, Limit-cycles, Oscillators, Capacitors, Transistors. Abstract: This paper proposes an analog-assisted digital output capacitor-less low-drop out (LDO) regulator. At full load, the digital loop supplies greater than 90% of the load whereas the rest is supplied by the analog loop. The analog loop regulates the output accurately eliminating the limit cycle oscillations and quantization error due to a standalone digital LDO. The analog loop is implemented with a flipped source follower architecture to achieve lower output impedance and higher bandwidth. The digital loop employs 32-bit shift register to control the discrete set of power-FETs. A fast clock (250 MHz) is used to speed up the digital loop during load transients and a slower clock (10 MHz) is used in steady state for power saving. The LDO uses only 1pF as output capacitor and consumes a quiescent current of 17.3μA. The proposed LDO was implemented in TSMC-65nm for an input of 1.2V, output of 1V and achieves settling time less than 110ns with undershoot/overshoot of 24mV/72mV for 0.1-10mA/100ns load step.
|
5,115
|
Please write an abstract with title: The Flood Discharge Monitoring System based on Resource Virtual Mapping Algorithm, and key words: Base stations, Floods, Lenses, Cameras, Interference, Dams, Discharges (electric). Abstract: Mining is an important part of the national economy and has always played a pivotal role in the rapid development of the national economy. The safety of tailings dam is key factor for the mining operation, especially the flood discharge safety. As the development of the 5G technologies, it is possible to monitor the safety of tailings dam remotely and intelligently. The data collector for flood discharge culvert is designed to scan the panorama hazards. The resource mapping algorithm is proposed to solve the mass users and bulk data transmission. The problem of inter-cell interference in a 5G ultra-dense network environment is addressed, and a wireless virtual mapping algorithm to reduce inter-cell interference is proposed in this system. The results show that this system can help the mine staff to improve the tailings dam safety in daily supervision.
|
5,116
|
Please write an abstract with title: Speech "re-cognition"? Investigating speech as a cognition-augmenting modality, and key words: Speech recognition, Instruments, Personal digital assistants, Robot control, Cognitive robotics, Cognition, Image analysis, Speech analysis, Performance analysis, Feeds. Abstract: We report and compare two projects investigating speech interfaces and augmented cognition. We performed an exploratory study to examine the effects of speech-enabled input on an imagery analysis and annotation task. We hypothesized that speech recognition could be a cognition-enabling technology by reducing the mental load of instrument manipulation and freeing up resources. Results indicate that people did identify images more efficiently and could potentially annotate images faster with speech. However, people did not annotate better with speech (precision was lower, and recall was significantly lower). We also developed a personal digital assistant capable of controlling a search-and-rescue robot. The PDA displayed a map and video feed of the robot's camera and permitted both stylus and speech input. We note differences between speech input in the robot control task and in the imagery annotation experiment. We conclude that speech may be helpful if the cognitive cost of speech recognition delays and errors is outweighed by the cognitive benefit of reducing instrument manipulation.
|
5,117
|
Please write an abstract with title: Emergency Imaging after a Mass Casualty Incident: An Operational Perspective via a Simulation Study, and key words: Hospitals, Computed tomography, Computational modeling, Imaging, Surgery, Planning, Surges. Abstract: In the aftermath of a Mass Casualty Incident (MCI) many patients require lifesaving treatments and surgeries. Due to the sudden surge in demand, the resources of the hospital are overwhelmed, making proper planning and use of the available resources crucial in minimizing mortality and morbidity. To help with planning, patients are triaged into four levels based on the clinical assessment of the criticality of their conditions. The triage decisions are however subject to error and a patient may be under or overtriaged. Mistriages can be identified by performing imaging, e.g., a Computed Tomography (CT) scan, but imaging also takes non-negligible time and has limited capacity. We propose a queueing network model of patient flow during an MCI and use simulation experiments to quantify the value of identifying mistriaged patients. Our results demonstrate the value of performing imaging, but also point out to the importance of accounting for its limited capacity.
|
5,118
|
Please write an abstract with title: Estimating fundamental frequency and formants based on periodicity glimpses: a deep learning approach, and key words: Time-frequency analysis, Neural networks, Auditory system, Feature extraction, Acoustics, Frequency estimation, Task analysis. Abstract: Despite many technological advances, hearing aids still amplify the background sounds together with the signal of interest. To understand how to process the acoustic information in an optimal way for a human listener, we have to understand why a healthy auditory system performs this task with such a great efficiency. Several studies show the importance of the so called auditory glimpses in decoding of the auditory scene. They are usually defined as time-frequency bins dominated by one source, which the auditory system may use to track this source in a crowded acoustic space. Josupeit et al. in [6]-[8] developed an algorithm inspired by these findings. It extracts the speech glimpses, defined as the salient tonal components of a sound mixture, called the sparse periodicity-based auditory features (sPAF).In this study, we investigated if sPAF can be used to estimate the instantaneous voice parameters: fundamental frequency F0 and formant frequencies F1 and F2. We used a supervised machine learning technique for finding the mapping between parameter and feature space. Using a formant synthesizer, we created a labeled data set containing instantaneous sPAF and the corresponding parameter values. We trained a deep neural network and evaluated the prediction performance of the learned model. The results showed that the sPAF represent the parameters of a single voice very well, which opens a possibility to use the sPAF for more complex scenarios of auditory object tracking.
|
5,119
|
Please write an abstract with title: Adaptive frame layer rate control for H.264, and key words: Programmable control, Adaptive control, Bit rate, Quantization, Fluid flow control, Rate-distortion, Predictive models, Fluid flow, Traffic control, Target tracking. Abstract: This paper proposes an adaptive frame layer rate control scheme for H.264 by introducing a linear model to predict the mean absolute difference (MAD) of current frame by that of previous one. The target bit rate for each frame is computed by adopting a fluid flow traffic model and linear tracking theory. The corresponding quantization parameter is computed by using a quadratic rate-distortion model. The rate distortion optimization (RDO) is then performed for all macroblocks (MBs) in the current frame by the quantization parameter. Both constant bit rate (CBR) and variable bit rate (VBR) cases are studied. The average PSNR is improved up to 0.75 dB compared to an encoder with fixed quantization parameter.
|
5,120
|
Please write an abstract with title: Analysis of Phase-leg Crosstalk Problem of Three-phase PMSM Driver with SiC MOSFETs, and key words: Crosstalk, Switches, Silicon carbide, MOSFET, Space vector pulse width modulation, Bridge circuits, Threshold voltage. Abstract: Aiming at the characteristics of silicon carbide (SiC) metal oxide semiconductor field effect transistors (MOSFETs), which have lower threshold voltage and lower switching energy losses. The principle of phase-leg crosstalk problem is analyzed in single-phase bridge circuit firstly. Then, this paper discusses the influence of space vector pulse width modulation (SVPWM) algorithm to phase-leg crosstalk problem in a three-phase permanent magnet synchronous motor (PMSM) driver. Finally, the experimental devices based on PMSM are designed. The experimental results verify the conclusion effectively.
|
5,121
|
Please write an abstract with title: Evaluation of three-layer damper for superconducting generator, and key words: Shock absorbers, Damping, Temperature, Rotors, Eddy currents, Heat transfer, Testing, Bonding, Magnetic flux, Virtual manufacturing. Abstract: A three-layer room-temperature damper, which is considered to be most suitable as a damper structure for superconducting generators, was evaluated by analyzing negative-sequence losses, temperature rises, stresses due to crushing force during 3-phase sudden short-circuit fault, and other conditions. Also, a 300MW-level 3-layer damper test model manufactured by explosive bonding, which is considered to be a promising method for manufacturing 3-layer dampers, was evaluated by subjecting it to various tests.
|
5,122
|
Please write an abstract with title: Errata to “On-Edge Multi-Task Transfer Learning: Model and Practice With Data-Driven Task Allocation”, and key words: Task analysis, Resource management, Technological innovation, Computational modeling, Big Data, Service computing, Computer science. Abstract: Presents corrections to author information for the above named paper.
|
5,123
|
Please write an abstract with title: SmartTiles: mobility and wireless programmability in children's construction and crafts, and key words: Tiles, Personal digital assistants, Prototypes, Light emitting diodes, Biological materials, Automata, Computer displays, Mobile computing, Programming profession, Computer interfaces. Abstract: This paper presents a working prototype of a mobile, programmable set of construction kit elements for children. SmartTiles are small, lightweight, independently programmable tile objects that can be combined to cover various sorts of planar surfaces; each touch-sensitive tile contains its own computer and LED, and communicates with its neighboring tiles when placed on an appropriate background material. Collectively, the tiles enact user-customizable cellular automaton programs and thus display complex and fascinating dynamical patterns of light. In this paper, we discuss the implementation of SmartTiles and explore their potential use as an instance of mobile computation for children. We also discuss the way in which the tiles can be programmed wirelessly via a PDA interface, and discuss the implications of this sort of programming for educational computing more generally.
|
5,124
|
Please write an abstract with title: The Resolution of English Pronoun by Chinese-speaking Learners: Evidence from Eye Movement, and key words: Semantics, Gaze tracking, Machine learning. Abstract: With resort to eye-tracking technique, this study investigated English pronoun resolutions of Chinese-speaking learners in picture noun phrase (PNP) contexts. In the eye-tracking experiment, both the effects of the nonlocal antecedent and local antecedent appeared in regression path duration in the pronoun region, suggesting that the nonlocal antecedent might sometimes be retrieved regardless of its gender. The results indicted that the binding-as-initial-filter model is not applicable and binding constraints may not have primacy over semantic cues in the processing of pronoun of Chinese L2 learners.
|
5,125
|
Please write an abstract with title: A Blockchain-Based Shamir’s Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings, and key words: Industrial Internet of Things, Security, Cloud computing, Blockchains, Encryption, Edge computing, Logic gates. Abstract: The Industrial Internet of Things (IIoT), a typical Internet of Things (IoT) application, integrates the global industrial system with other advanced computing, analysis, and sensing technologies through Internet connectivity. Due to the limited storage and computing capacity of edge and IIoT devices, data sensed and collected by these devices are usually stored in the cloud. Encryption is commonly used to ensure privacy and confidentiality of IIoT data. However, the key used for data encryption and decryption is usually directly stored and managed by users or third-party organizations, which has security and privacy implications. To address this potential security and privacy risk, we propose a Shamir threshold cryptography scheme for IIoT data protection using blockchain: STCChain. Specifically, in our solution, the edge gateway uses a symmetric key to encrypt the data uploaded by the IoT device and stores it in the cloud. The symmetric key is protected by a private key generated by the edge gateway. To prevent the loss of the private key and privacy leakage, we use a Shamir secret sharing algorithm to divide the private key, encrypt it, and publish it on the blockchain. We implement a prototype of STCChain using Xuperchain, and the results show that STCChain can effectively prevent attackers from stealing data as well as ensuring the security of the encryption key.
|
5,126
|
Please write an abstract with title: A Wideband Endfire Double Dipole Antenna Fed From Double-Ridge Gap Waveguides for Multibeam Array Application, and key words: Dipole antennas, Butler matrices, Metals, Antenna measurements, Antenna radiation patterns, Gain, Couplers. Abstract: In this letter, an endfire double dipole antenna fed from double-ridge gap waveguides (DRGWG) is proposed and designed for multibeam array application. Two dipoles with different lengths are connected to the extension of the ridges of DRGWG in series. Different resonances can be generated by these two dipoles, which contributes to a wide impedance bandwidth, high gain, and stable radiation patterns across the working band. The double dipole antenna is vertically polarized and has a wide H-plane beamwidth suitable for beam scanning application. To verify the performance of the double dipole antenna, a Butler matrix is designed based on ridge gap waveguides to feed a 1 × 4 double dipole array arranging in H-plane. The maximum gains achieved for Ports 1 and 2 are 13.94 and 12.68 dBi, respectively. Besides, the simulated radiation efficiencies for Ports 1 and 2 are both above 83%.
|
5,127
|
Please write an abstract with title: Mesh-based depth map compression and transmission for real-time view-based rendering, and key words: Rendering (computer graphics), Decoding, Tree graphs, Video compression, Cameras, Graphics, Geometry, Tree data structures, Strips, Mesh generation. Abstract: Enabling telepresence using depth-based new view rendering requires the compression and transmission of dynamic depth maps and video from multiple cameras. The telepresence application places additional requirements on the compressed representation, such as preservation of depth discontinuities, low complexity decoding, and amenability to real-time rendering using graphics cards. We propose a simplified triangular mesh representation that can be encoded efficiently. The mesh geometry is encoded using a binary triangle tree structure and the depths at the tree nodes are differentially coded. By matching the tree traversal to the mesh rendering order, both depth map decoding and triangle strip generation for efficient rendering are achieved simultaneously. The proposed scheme naturally lends itself to coding segmented foreground layers. Our experiments show a significant improvement in rendering speeds at similar compression rates using the new mesh based depth map representation when compared to independent representations for compression and rendering.
|
5,128
|
Please write an abstract with title: Design and Implementation of a New Intelligent Compression Trash Tank, and key words: Semiconductor device measurement, Presses, Automation, Transportation, Production, Mobile handsets, Internet. Abstract: Garbage can is a common daily necessities in our life, so garbage can is indispensable. It can not only keep the living environment comfortable and tidy, but also make us feel relaxed and happy. The function of garbage bin is to store garbage temporarily, and sanitation workers collect, transport and carry garbage in garbage bin every day for centralized destruction or secondary waste utilization. For part of the garbage fluffy, large volume, easy to overflow, is not conducive to garbage collection, transportation and handling. The degree of automation of the existing compressed trash can is not very high. In some links (such as opening the lid or starting compression), it is usually necessary to manually click and press the twist operation, so it is difficult to match with the robot to complete the garbage picking task in special scenarios. Based on the shortcomings and shortcomings of the prior art, we design an intelligent compressed garbage can based on STM32. The trash can is divided into garbage input room and garbage waiting room. When the garbage in the garbage input room reaches a certain height, the garbage carries on a series of operations to compress the garbage and push it into the garbage waiting room. The garbage waiting room is equipped with garbage height detection device and pressure detection device. When there is garbage in the waiting room, the indicator light is on. When the garbage in the waiting room reaches a certain height, the indicator light begins to flicker. The trash can be connected to Internet devices such as mobile phones. Users can always check the status of the trash can. When the trash can indicator lights flicker, it will give a reminder to the mobile phone. In order to achieve the trash bin automation, intelligence, in line with the concept of green development. Our design can not only realize the automation and intelligence of the trash can, but also in line with the concept of green development.
|
5,129
|
Please write an abstract with title: A modulation circuit for impulse radio ultra-wideband communications, and key words: Ultra wideband technology, Pulse modulation, Pulse generation, Switches, Radio transmitters, Radio frequency, Pulse circuits, Jitter, Binary phase shift keying, DC generators. Abstract: This paper presented a novel transmitter structure for IR-UWB communications. The structure modulates information after the extremely short pulses being produced, decreasing the transmitted pulse position jitter and enabling the high performance of the whole system. A simple RF pulse modulation circuit was devised for the new structure, which is easily to be implemented. Theoretical analysis indicates that the new structure can achieve high-speed modulation like PPM and BPSK. We further implemented BPSK at a rate of 100Mbps with discrete devices.
|
5,130
|
Please write an abstract with title: Applications of Pelvic 3D reconstruction and Dimension Measurement to Colorectal Cancer Surgery, and key words: Cancer, Oncological surgery, Image reconstruction, Biomedical imaging, Medical diagnostic imaging, Visualization, Medical treatment, Surface reconstruction, Surface treatment, Pelvis. Abstract: Three-dimensional visualization is opening new worlds for more precise diagnosis and higher-quality treatment. 3D reconstruction from medical images is widely used in diagnosis and medical research. This paper focuses on 3D surface reconstruction of the pelvis from CT images on a personal computer. We measure and analyze large numbers of interrelated parameters in order to help doctor in diagnosis, operation planning and the actual surgery
|
5,131
|
Please write an abstract with title: Soft drinks industry faces shortage of recycled plastic, and key words: Plastics, Recycling, Industries, Europe, Companies, Sports, Semiconductor device measurement. Abstract: EUROPE WILL NEED three times more recycled plastic if all soft drinks manufacturers are to make the switch to using it, the company behind Ribena and Lucozade has claimed.
|
5,132
|
Please write an abstract with title: Automatic knowledge acquisition in interactive oral translation, and key words: Uniform resource locators, Matched filters, Automation, Statistical analysis, Knowledge acquisition, Web pages, Search engines. Abstract: In order to improve the accuracy of automatic knowledge acquisition in interactive oral translation, an automatic knowledge acquisition method is designed. First, the target mining includes four steps: automatic acquisition of bilingual abstract resources, extraction of candidate translation units, translation selection and statistical model. Then, the phrase table is filtered and the context is reordered. Finally, a matching template is established to realize the knowledge acquisition in interactive spoken translation. Experimental results show that the proposed method can effectively improve the accuracy and inclusion rate.
|
5,133
|
Please write an abstract with title: Out-of-Plane Flexible Electronic Whisker Array, and key words: e-whisker, strain sensor, flexible sensor, laser-induced graphene. Abstract: This study proposes an out-of-plane electronic whisker (e-whisker) array that integrates a three-dimension whisker structure using polydimethylsiloxane (PDMS) and nanocarbon-based strain sensors. The strain sensor is fabricated by a laser-induced graphene from polyimide film and transfer process from polyimide to the PDMS. Fundamental characteristics of an out-of-plane electronic whisker such as sensitivity and response time are studied as well as the demonstration of e-whisker array. By considering the device structure, multiple directional force detection is realized for the first time. Based on the properties of the sensors, simple and low-cost three-dimensional device fabrication process works well for the e-whisker application.
|
5,134
|
Please write an abstract with title: 3D Representation of UAV-obstacle Collision Risk Under Off-nominal conditions, and key words: Solid modeling, Visualization, Three-dimensional displays, Computational modeling, Wind speed, Controllability, Unmanned aerial vehicles. Abstract: Safe operations of autonomous unmanned aerial vehicles (UAVs) in low-altitude airspace with beyond visual line-of-sight (BVLOS) flights demand robust risk monitoring of airspace as well as of people and property on ground. One of the safety critical factors for UAV flights is the risk of collision with static and dynamic obstacles in proximity to its flight path. This paper presents a detailed formulation of risk likelihood of obstacle collision incorporating the effects of off-nominal conditions introduced by component failures, degraded controllability and environmental disturbances such as wind gusts. The deviation in the planned trajectory caused due to wind is computed utilizing a point-mass 3D kinematic simulation model of the vehicle. Likelihood of risk for the flight plan is then analyzed based on generating the probability of collision for each point in the trajectory. The proposed risk factor is demonstrated on real flight data from experimental flights of an octocopter at NASA Langley Research Center in presence of simulated obstacles and wind conditions. Effect of varying wind conditions, distance from obstacles, level of controllability and obstacle measurement noise on the risk factor is demonstrated. The proposed approach enables risk-informed decision making for timely mitigation of current and future unsafe events in autonomous systems.
|
5,135
|
Please write an abstract with title: Mathematical model for optimal siting of the industrial plants, and key words: Information science, Atmospheric modeling, Prediction algorithms, Communications technology, Industrial plants, Mathematical model, Monitoring. Abstract: Research, prediction and monitoring of air vmasses in the atmosphere of industrial regions are described in the paper. A mathematical model, an effective numerical algorithm based on the method of splitting into physical processes and analysis of numerical calculations on a computer are developed.
|
5,136
|
Please write an abstract with title: Neural Network Estimation Model to Optimize Timing and Schedule of Software Projects, and key words: Training, Analytical models, Schedules, Neural networks, Estimation, Predictive models, Software. Abstract: Software projects have a probability of high failure rates that appear to linger around 60% for significant IT projects. Estimating time and project schedule are crucial tasks and extremely influence the project outcomes. Artificial Intelligence now can provide multiple solutions for most problems of software projects. This article aims to develop a Neural Network estimation model to manipulate the problem of timing for software projects. The model can predict the estimation value of project time which optimizes the scheduling process, the developed model achieved high accuracy after testing through the test datasets.
|
5,137
|
Please write an abstract with title: Design of a sensor array circuit for edge detection, and key words: Sensor arrays, Image edge detection, Photoconductivity, Switches, Voting, Photodiodes, Lighting control, Switching circuits, Low pass filters, Filtering. Abstract: In this paper, the design of a sensor array circuit for edge detection is presented. For this design, a new version of edge detection algorithm is proposed to reduce the complexity of inter-pixel connections and to simplify the circuit of each pixel. The processing unit in each pixel consists of current-mode modules and simple logic gates. Compensation procedures are implemented in the analog modules to reduce the effect of device mismatch and charge injection. The simplicity of the circuit makes it easy to be implemented using a digital technology and integrated in detection systems.
|
5,138
|
Please write an abstract with title: 6.6 Reference-Noise Compensation Scheme for Single-Ended Package-to-Package Links, and key words: Clocks, Delays, Noise measurement, Tuning, Neural networks, Integrated circuit interconnections, Tracking loops. Abstract: A recent trend in high-performance systems is distribution of computing across many chips and packages to sustain performance scaling while achieving high yield and alleviating power delivery. High-end data center systems and new applications like deep neural network (DNN) accelerators with scalable architecture [1] may extend the system from large chip-scale computing not just to package-scale multi-chip modules (MCM), but also to PCB-scale computing systems. An essential requirement for these distributed systems is a highly scalable low-power and high-bandwidth interconnect system, that can cover a wide range of integration and channel distances. Ideally, the same low-power links designed for ultra-short reach interconnects in MCM should be used in more challenging board-level environments.
|
5,139
|
Please write an abstract with title: The stator flux linkage adaptive SVM-DTC control strategy of permanent magnet synchronous motor, and key words: Couplings, Reactive power, Torque, Simulation, Adaptive algorithms, Stators, Permanent magnet motors. Abstract: PMSM direct torque control can realize rapid torque response. The voltage space vector modulation technology is introduced into the traditional DTC. While maintaining the advantages of the traditional DTC, such as simple structure and fast torque response, the motor flux linkage trajectory can be more stable and the torque ripple can be effectively reduced. In this paper, considering that the constant amplitude of stator flux will bring unnecessary stator direct axis current and affect the stable operation of the motor, based on SVM-DTC control, the stator flux adaptive algorithm is introduced to prevent the demagnetization of permanent magnet synchronous motor and improve the power factor of the system. The simulation results show that the stator flux adaptive control strategy proposed in this paper can maintain the low torque ripple, improve the power factor of the system, and have good steady and dynamic performance.
|
5,140
|
Please write an abstract with title: On Using Real-Time Reachability for the Safety Assurance of Machine Learning Controllers, and key words: Runtime, Switches, Reinforcement learning, Real-time systems, Safety, Sensors, Vehicle dynamics. Abstract: Over the last decade, advances in machine learning and sensing technology have paved the way for the belief that safe, accessible, and convenient autonomous vehicles may be realized in the near future. Despite the prolific competencies of machine learning models for learning the nuances of sensing, actuation, and control, they are notoriously difficult to assure. The challenge here is that some models, such as neural networks, are “black box” in nature, making verification and validation difficult, and sometimes infeasible. Moreover, these models are often tasked with operating in uncertain and dynamic environments where design time assurance may only be partially transferable. Thus, it is critical to monitor these components at runtime. One approach for providing runtime assurance of systems with unverified components is the simplex architecture, where an unverified component is wrapped with a safety controller and a switching logic designed to prevent dangerous behavior. In this paper, we propose the use of a real-time reachability algorithm for the implementation of such an architecture for the safety assurance of a 1/10 scale open source autonomous vehicle platform known as F1/10. The reachability algorithm (a) provides provable guarantees of safety, and (b) is used to detect potentially unsafe scenarios. In our approach, the need to analyze the underlying controller is abstracted away, instead focusing on the effects of the controller’s decisions on the system’s future states. We demonstrate the efficacy of our architecture through experiments conducted both in simulation and on an embedded hardware platform.
|
5,141
|
Please write an abstract with title: Super-resolution Reconstruction of Infrared Images of Internal Defective Metal Plates Based on Generative Adversarial Networks, and key words: Superresolution, Metals, Photothermal effects, Reconstruction algorithms, Generative adversarial networks, Information filters, Image reconstruction. Abstract: Infrared thermal imaging non-destructive testing technology has made great progress and has been used in the field of defect detection. However, due to the internal noise of the infrared imaging equipment and the influence of the surrounding environment interference, the infrared images used for defect recognition have the disadvantages of low contrast, low resolution, and low signal-to-noise ratio. Our article first briefly introduces the basic principle of infrared thermal imaging detection technology and the development status at home and abroad, then we builds an infrared image acquisition system that uses long-pulsed thermal method to collect internal defects of a metal plate. In order to solve the problem of noises, our paper first adopts Gaussian blur and homomorphic filtering on the acquired infrared images. Then we use Laplacian operator to process the filtered images and obtained second-order differential images. Finally, we use GAN for super-resolution reconstruction of the filtered second-order differential images. The results show that the super-resolution reconstructed images have higher PSNR and SSIM. What's more, it retains detailed information about defects in the original infrared images.
|
5,142
|
Please write an abstract with title: A Survey on Disease Detection of a potato Leaf Using CNN, and key words: Deep learning, Support vector machines, Microorganisms, Convolution, Crops, Production, Learning (artificial intelligence). Abstract: India is an agricultural nation and crops yield rate is a serious concern over the nation. Lesser the production, higher the price of such crops and higher the hunger problem for those who can’t even afford potato so in order to enhance the yield rate of crops and minimize the disease infection in plant deep learning model come up with a technology which will makes farmer work easier for some extent They can rely on Deep neural Networks which is sub field of AI technology to detect the plant having disease and avoid doing it manually and give a proper treatment in the bud stage before it is too late. This paper reviews various papers and found out that Convolution Neural Networks (CNN) performs better in finding out the leaf disease also found that the CNN contribute the highest possible accuracy for disease detection.
|
5,143
|
Please write an abstract with title: Battlefield Target Grouping by a Hybridization of an Improved Whale Optimization Algorithm and Affinity Propagation, and key words: Clustering algorithms, Optimization, Algorithms, Statistics, Sociology, Convergence, Whales. Abstract: Target grouping, which is essentially a data clustering problem, is a research hotspot in the field of battlefield situation assessment. To address an unknown battlefield environment, affinity propagation based on an improved whale optimization algorithm (APBWOA) is proposed from the perspective of clustering. First, we propose a whale optimization algorithm based on a chaotic map and nonlinear inertia weight improvement called CPIW-WOA, which uses an improved circle map to generate initial populations and introduces nonlinear inertia weights to improve its convergence efficiency. The test results on nine benchmark functions show that the CPIW-WOA algorithm has superior performance to existing methods. Second, based on the fact that it fully considers the weights of the attributes in a given sample, the weighted Mahalanobis distance is adopted to replace the Euclidean distance. In addition, the silhouette index is introduced to determine the optimal number of clusters. By iteratively updating through CPIW-WOA to search for the optimal settings, the limitation of manually entering specified parameters can be overcome. Test results on real-world datasets show that the new method is more accurate and effective than other methods; therefore, it can provide effective solutions with respect to battlefield target grouping.
|
5,144
|
Please write an abstract with title: Sputtered permanent magnet arrays for MR sensor bias, and key words: Sensor arrays, Permanent magnets, Magnetic sensors, Magnetic domain walls, Thin film sensors, Production, Magnetoresistance, Bridges, Magnetic noise, Transistors. Abstract: Magnetic field sensors consisting of four magnetoresistive elements in a bridge configuration are capable of detecting very low magnetic fields. These sensors require the application of a bias field to maximise the sensitivity and prevent domain wall formation which gives rise to Barkhausen noise. The design of thin film permanent magnet arrays for the production of sensor bias fields is considered. A simple charge sheet model is used to calculate the field from thin-film PtCo magnet arrays and the criteria for the production of sufficiently large and uniform bias fields are discussed. The use of these magnet arrays is shown to enable the simple construction of sensors with excellent vector response and allow the possibility of producing sensors capable of measuring fields up to 100 Oe with a linearity better than 1%.
|
5,145
|
Please write an abstract with title: Eight Years of Delivering Professional Education and Training for Software Engineering at Fraunhofer IESE: An Experience Report, and key words: Software engineering, Educational technology, Paper technology, Knowledge engineering, Team working, Continuing education, Educational institutions, Books, Process control, Stress. Abstract: In this paper, we reflect on our experiences of delivering professional software engineering (SE) education and training over the course of the last eight years. We begin the paper with a summary of current developments in SE education and training, followed by a brief description of the educational framework that has guided our work in this domain. We then move on to describe four case studies of SE education and training delivery together with a set of lessons learnt. We end the paper with a summary of the wider lessons learnt gained from our experiences in the domain - these consider how SE education should be delivered and facilitated, as well as other considerations such as changes to organizational roles and responsibilities brought about by the introduction of technology-based learning
|
5,146
|
Please write an abstract with title: Effect of drive modes on the acoustic noise of fluid dynamic bearing spindle motors, and key words: Acoustic noise, Fluid dynamics, Torque, Aerodynamics, Permanent magnet motors, Bismuth, Frequency, Magnetic levitation, Rotors, Magnetic forces. Abstract: The torque ripple is one of the major sources of acoustic noise in the fluid dynamic bearing (FDB) spindle motors. This paper analyzes the relationship between the acoustic noise frequency, harmonic current and harmonic field, and compares the acoustic noise produced in FDB motors driven by different modes. Results show the effect of drive mode on acoustic noise is significant in the FDB spindle motors.
|
5,147
|
Please write an abstract with title: Mobile Carrier Choice Behavior Analysis Based on IT Service Management Platform, and key words: Gold, Analytical models, 5G mobile communication, Decision making, Mobile handsets, Behavioral sciences, Informatics. Abstract: The purpose of this study is to understand the mobile carrier choice behavior considering the current market in Japan. The mobile phone market in Japan was mainly shared by three Major Mobile-Carriers (3MMC): docomo, au, and SoftBank. However, the number of Mobile Virtual Network Operators (MVNOs) customers has been increasing recently, and Rakuten Mobile has entered the mobile phone market as a Mobile Network Operator (MNO) since 2020. Under such competitive conditions, MNOs and MVNOs need an appropriate method to develop service strategies to increase their market share. To understand users' mobile carrier choice behavior, we analyzed the differences between users who intend to continue with their current mobile carrier and those who intend to change to another mobile carrier on the basis of IT service management platform that we proposed. In addition, we demonstrated useful information for service strategies to prevent users from changing to other mobile-carriers.
|
5,148
|
Please write an abstract with title: EMG-Based Continuous Motion Decoding of Upper Limb with Spiking Neural Network, and key words: Training, Torque, Neuromorphics, Neurons, Electromyography, Robustness, Decoding. Abstract: Surface electromyography (EMG), generated during muscle activities of human beings, allows intuitive control for human-robot interaction to happen. Decoding human movement intention from EMG accurately and instantaneously is one of the most important parts of the whole control task. Spiking neural network (SNN) with spiking neurons is more computationally powerful than networks with non-spiking neurons and contains temporal information (time-dependency). Compared with discrete motion classification task, motion regression is more meaningful and helpful for the underlying applications including assisting human beings’ activities of daily living (ADLs). We proposed a novel method deploying SNN in human motion regression task. An SNN is built to decode elbow joint angle from preprocessed surface EMG signals and achieved satisfying accuracy compared with long short-term memory. According to the experiment results, SNN is competent to decode motion information from surface EMG.
|
5,149
|
Please write an abstract with title: Influential Factors for Tourist Profiling for Personalized Tourism Recommendation Systems– A Compact Survey, and key words: Knowledge based systems, Decision making, Computer architecture, Planning. Abstract: Over the past few years, recommendation systems have gained immense popularity and are being applied to many domains. This paper discusses the application of recommendation systems for the domain of tourism. In this paper, we aim to present an up-to-date, thorough and compact survey on Tourism Recommendation Systems and the most influential factors which significantly impacts the decision-making of tourists while planning a tour. We have discussed complete architecture and modules of recommendation systems, various types of recommendation approaches and algorithms, the functionalities offered by these systems, the factors used for recommendation and knowledge base, tourist profiling and type of data used in tourism recommendation systems. The paper also mentions the scope of improvement and promising areas of research in this field.
|
5,150
|
Please write an abstract with title: Behavioral simulation of fractional-N frequency synthesizers and other PLL circuits, and key words: Circuit simulation, Frequency synthesizers, Phase locked loops, Phase frequency detector, Voltage-controlled oscillators, Phase noise, Computational modeling, Noise figure, Charge pumps, Frequency conversion. Abstract: Two techniques are presented that allow fast and accurate simulation of fractional-N synthesizers. A uniform time step allows implementation of these techniques in various simulation frameworks, such as Verilog, Matlab, and C or C++ programs. The techniques are also applicable to the simulation of other PLL systems, such as clock and data recovery circuits.
|
5,151
|
Please write an abstract with title: Vibrating FRET-Based Nanomechanical Sensor Preparation and Characterization for Environmental Monitoring Applications, and key words: Graphene, Biomembranes, Nanoscale devices, Quantum dots, Sensor phenomena and characterization, Energy exchange. Abstract: In this study, the recently introduced graphene nanomechanical sensor design based on the vibrating Förster resonance energy transfer (VFRET) was experimentally demonstrated for the first time. VFRET was realized by the dynamic FRET between quantum dots on vibrating graphene layers. Graphene nanomechanical membranes were fabricated and experimentally analyzed with quantum dots donor and acceptor material loads. The loaded membranes were paired in the VFRET based sensor device structure. The FRET and the VFRET tests were applied to the prepared devices, experimental challenges and the device development solutions were utilized. Novel technology and the future applications of the VFRET based sensor examples were discussed with the advanced capabilities of sensing nano- and micro-scale particles around the device for the real-time point-of-care (PoC), and the environmental monitoring applications include imaging, monitoring and tracking of intra- or inter- cellular mechanical processes as the nanophotonic applications by exploiting the VFRET based nanoscale sensor design.
|
5,152
|
Please write an abstract with title: Measuring Global, Direct, Diffuse, and Ground-Reflected Irradiance Using a Reference Cell Array, and key words: Training, Photovoltaic systems, Sensitivity, Costs, Correlation, Instruments, Prototypes. Abstract: We report on an updated field trial of a novel method for measuring global horizontal irradiance (GHI), direct normal irradiance (DNI), diffuse horizontal irradiance (DHI), and reflected horizontal irradiance (RHI) using an array of reference cells with no moving parts. The technique, similar to previously explored methods using multi-pyranometer array concepts, uses multiple reference cells facing different directions together with an analysis model that fits the data from the sensors to determine GHI, DNI, DHI, and RHI. In previous work we reported on a first test of this approach at a single site. In this work we report further progress with this method, including an updated configuration of the reference cell array that offers improved sensitivity, an updated analysis that does not require site-specific training, and early field test results from prototypes installed at two different locations with different latitude.
|
5,153
|
Please write an abstract with title: Network-based dynamic visual man-on-board order-picking method in AS/RS, and key words: Intelligent networks, Throughput, Warehousing, Costs, Control systems, Automatic control, Storage automation, Performance analysis, Chebyshev approximation, Communication system traffic control. Abstract: This paper proposes a new kind of visual method for man-on-board order-picking in automated storage/retrieval system (AS/RS) using network technology and panel pc. By using the storage assignment policies and sequencing algorithms, we can improve the performance of the man-on-board order-picking method, increasing the throughput capacity of AS/RS. After introducing the framework of this new method, we present an analytical model and analyze the system performance for the case of using dynamic job inserting.
|
5,154
|
Please write an abstract with title: A Survey of IoT and Blockchain Integration: Security Perspective, and key words: Blockchains, Internet of Things, Security, Peer-to-peer computing, Bitcoin, Information technology, Object recognition. Abstract: Blockchain has recently attracted significant academic attention in research fields beyond the financial industry. In the Internet of Things (IoT), blockchain can be used to create a decentralized, reliable, and secure environment. The use of blockchain in IoT applications is still in its early stages, particularly at the low end of the computing spectrum. As a result, the future roadmap is hazy, and several challenges and questions must be addressed. Several articles combining blockchain technology with IoT have recently been released, but they are limited to shallow technological potential discussions, with very few providing an in- depth examination of the complexities of implementing blockchain technology for IoT. Therefore, this paper aims to coherently and comprehensively provide current cutting-edge efforts in this direction. It provides a literature review of IoT and blockchain integration by examining current research issues and trends in the applications of blockchain-related approaches and technologies within the IoT security context. We have surveyed published articles from 2017 to 2021 on blockchain-based solutions for IoT security, taking into consideration different security areas and then, we have organized the available articles according to these areas. The surveyed articles have been chronologically organized in tables for better clarity. In this paper, we try to investigate the vital issues and challenges to the integration of IoT and blockchain, and then investigate the research efforts that have been conducted so far to overcome these challenges.
|
5,155
|
Please write an abstract with title: Tools for radio communications in C, and key words: Radio communication, Impedance, Dipole antennas, Coupling circuits, Education, Transmission line antennas, Antennas and propagation, Loaded antennas, Satellite antennas, Power transmission lines. Abstract: The program package "Tools for Radiocommunication in C" was developed to support the teaching process at Polytechnic of Zagreb, Dept. of Electrical Engineering. Several programs are listed in the paper and their parameters are given. The capabilities of the programs are analyzed. Some examples of simulations, with real values used in teaching process, are given.
|
5,156
|
Please write an abstract with title: Waveguide damage detection by the matching pursuit approach employing the dispersion-based chirp functions, and key words: Matching pursuit algorithms, Chirp, Inspection, Data mining, Dispersion, Signal processing, Delay, Signal processing algorithms, Pursuit algorithms, Testing. Abstract: If the wave mode used in guided wave non-destructive inspection is dispersive, reflected pulses from damaged parts may be significantly distorted due to wave dispersion. The main concern, in this case, is how to detect the reflected pulses in noisy signals, and to extract meaningful damage information from the detected pulses. However, current signal processing techniques used for guided wave inspection do not account for pulse dispersion, so the extracted information is often not so accurate. The objective of this study is to develop an efficient technique to deal with dispersed pulses for guided-wave nondestructive evaluation. Our idea is to model dispersed pulses by chirp functions of special form that can simulate up to quadratically varying group delay. To determine the parameters of the chirp functions approximating dispersed, reflected pulses, an adaptive matching pursuit algorithm is employed. Once the characterizing parameters are found, the damage location and extent can be estimated. The proposed method is tested with experimentally measured signals of longitudinal waves in a circular cylinder.
|
5,157
|
Please write an abstract with title: Nacre: Proactive Recurrent Concept Drift Detection in Data Streams, and key words: Sensitivity, Neural networks, Forestry, Detectors, Market research, Delays. Abstract: Concept drift detection is used to signal to a learning algorithm that there has been a change in the underlying distribution of the data stream. However, there is a delay in detecting the actual drifts, leading to performance loss between the start of the drift and the detection point. There are two major challenges in reducing such performance loss, specifically the difficulty in anticipating the location of the next drift point and determining the exact concept that will appear for timely concept adaptation. In this research, we leverage concept recurrences in data streams. We proposed a framework called Nacre, which can perform proactive drift detection and online updates to allow for smooth adaptation of concept drifts. We present a novel technique, called drift coordinator, that anticipates the next drift point and assesses the incoming concept. This will ultimately increase accuracy in the classification performance. We demonstrate that our method is able to learn and predict drift trends in streams with recurring drifts. This allows the anticipation of future changes which enables users and detection methods to be more proactive. We empirically show that our technique outperforms baselines in terms of accuracy, kappa, accuracy gain per drift and cumulative accuracy gain on both synthetic and real-world datasets.
|
5,158
|
Please write an abstract with title: Early Detection of DDoS Attacks using Photonic Neural Networks, and key words: Ports (computers), Protocols, Neuromorphics, Neural networks, Switches, Denial-of-service attack, Real-time systems. Abstract: Deep Learning (DL) has been extensively used in challenging tasks including security applications such as Distributed Denial of Service (DDoS) attacks. However, the high speed requirements of such applications along with the high complexity of DL models restrict the practical use of DL in real systems. Photonic neuromorphic hardware provides several advantages over electronic counterparts since it can operate at very high frequencies with lower power consumption. To this end, in this paper, we propose employing a photonic neuromorphic lookaside accelerator, aiming to perform real-time traffic inspection, enabling us to detect port-scanning attacks, which are indicative of DDoS attacks. We have designed, trained, and evaluated a Photonic Neural Network (PNN) capable of detecting DDoS attacks and operating on such photonic neuromorphic lookaside accelerators. The experimental evaluation is performed on Transport Control Protocol (TCP) traces obtained by simulating a port scanning attack and demonstrates the effectiveness of the proposed approach.
|
5,159
|
Please write an abstract with title: Development of multichannel dual-mixer time difference system to generate UTC (NICT), and key words: Time measurement, Frequency measurement, Atomic clocks, Atomic measurements, Communications technology, Hydrogen, Masers, Stability, System testing, Phase measurement. Abstract: A multichannel dual-mixer time difference (DMTD) system has been developed by the National Institute of Information and Communications Technology (NICT) for a measurement system to generate the UTC(NICT) time scale based on Coordinated Universal Time (UTC). This system measures time differences between a reference signal and 24 device under test (DUT) signals, simultaneously. We have confirmed that this system has enough accuracy to measure hydrogen maser and cesium clocks at an averaging time of 1 s.
|
5,160
|
Please write an abstract with title: 802.3ct-2021 - IEEE Standard for Ethernet Amendment 13:Physical Layers and Management Parameters for 100 Gb/s Operation over DWDM Systems, and key words: IEEE Standards, Wavelength division multiplexing, Ethernet, Forward error correction, Physical layer, Local area networks, Metropolitan area networks. Abstract: This amendment includes changes to IEEE Std 802.3-2018 and adds Clause 152 through Clause 154 and Annex 154A. This amendment adds 100 Gb/s Physical Layer specifications and management parameters for operation over DWDM systems using a combination of phase and amplitude modulation with coherent detection for reaches of at least 80 km.
|
5,161
|
Please write an abstract with title: Complete analytical framework for throughput calculation in WCDMA downlink TDD mode, and key words: Throughput, Multiaccess communication, Downlink, 3G mobile communication, Wireless communication, Wideband, Computer simulation, Distribution functions, Shadow mapping, 4G mobile communication. Abstract: Throughput and spectral efficiency are two important metrics that are used in performance evaluation of next generation cellular systems known as 3G. Wideband code division multiple access (WCDMA) has been adopted as an air interface technology for such systems. Tedious and time consuming Monte Carlo simulation schemes are usually needed to assess the performance of WCDMA in terms of throughput and spectral efficiency. In this paper, we present a simple analytical framework that can be used to evaluate the performance of downlink WCDMA operating in the time division duplex (TDD) mode without using computer simulations. An approximate closed form expression for the cumulative distribution function (CDF) of the user carrier-to-interference-plus-noise ratio (CINR) is first obtained, based on the 3GPP pathloss model, assuming lognormal shadowing and uniform cell loading. The throughput is then expressed in terms of this distribution and other system parameters. Numerical results are presented and show good agreement between both the proposed analytical framework and Monte Carlo simulations.
|
5,162
|
Please write an abstract with title: Intelligent Resource Allocation in Joint Radar-Communication With Graph Neural Networks, and key words: Wireless sensor networks, Protocols, Radar detection, Radar, Reinforcement learning, Markov processes, Graph neural networks. Abstract: Autonomous vehicles produce high data rates of sensory information from sensing systems. To achieve the advantages of sensor fusion among different vehicles in a cooperative driving scenario, high data-rate communication becomes essential. Current strategies for joint radar-communication (JRC) often rely on specialized hardware, prior knowledge of the system model, and entail diminished capability in either radar or communication functions. In this paper, we propose a framework for intelligent vehicles to conduct JRC, with minimal prior knowledge of the system model and a tunable performance balance, in an environment where surrounding vehicles execute radar detection periodically, which is typical in contemporary protocols. We introduce a metric on the usefulness of data to help an intelligent vehicle decide what, and to whom, data should be transmitted. The problem framework is cast as a generalized form of the Markov Decision Process (MDP). We identify deep reinforcement learning algorithms (DRL) and algorithmic extensions suitable for solving our JRC problem. For multi-agent scenarios, we introduce a Graph Neural Network (GNN) framework via a control channel. This framework enables modular and fair comparisons of various algorithmic extensions. Our experiments show that DRL results in superior performance compared to non-learning algorithms. Learning of inter-agent coordination in the GNN framework, based only on the Markov task reward, further improves performance.
|
5,163
|
Please write an abstract with title: Research on Analog Circuit Fault Diagnosis Based on CBAM-CNN, and key words: Fault diagnosis, Convolution, Conferences, Low-pass filters, Analog circuits, Feature extraction, Circuit faults. Abstract: The difficulty in extracting the fault features of analog circuit leads to complex calculation and poor precision with the model. A fault diagnosis method for analog circuits based on attention mechanism and convolutional neural network (CBAM -CNN) is proposed. Firstly, the image features of the input layer were extracted by using the convolution kernel. Followed by rectifying linear unit (ReLU) was connected behind each convolution layer, and a batch normalization (BN) layer was added to solve the problem of internal covariate migration, so as to improve the expression ability of the nonlinear model. Secondly, the convolutional block attention module (CBAM) was added after the batch normalization layer to extract the important features. After CBAM, the pooling layer is connected to reduce the computational complexity of the network and improve the accuracy and efficiency of the network. Finally, the Sallen-Key low-pass filter and the two-stage four-op amplifier double-order low-pass filter are taken as the research objects. The results of fault diagnosis experiments demonstrate that the proposed method can effectively improve the diagnosis accuracy and realize the classification and location of all faults with high difficulty.
|
5,164
|
Please write an abstract with title: Analysis and optimization of high-power GaN lasers, and key words: Gallium nitride, Quantum well lasers, Waveguide lasers, Laser modes, Laser theory, Fabry-Perot, Diode lasers, Power generation, Power measurement, Aluminum gallium nitride. Abstract: Summary form only given. 400 nm Fabry-Perot laser diodes are investigated that exhibit the highest output power measured thus far (420 mW). The active region includes two InGaN quantum wells, an AlGaN electron stopper layer, GaN waveguide layers, and superlattice cladding layers. Advanced laser simulation is used to analyze internal physical processes, to reveal performance limitations, and to explore optimization options. The laser model self-consistently combines 6x6 k.p band structure and gain calculations with two-dimensional simulations of wave guiding, carrier transport, and heat flux.
|
5,165
|
Please write an abstract with title: Model-Free Emergency Frequency Control Based on Reinforcement Learning, and key words: Frequency control, Load modeling, Power systems, Voltage control, Mathematical model, Informatics. Abstract: Unexpected large power surges will cause instantaneous grid shock and, thus, emergency control plans must be implemented to prevent the system from collapsing. In this article, with the aid of reinforcement learning, novel model-free control (MFC)-based emergency control schemes are presented. First, multi-Q-learning-based emergency plans are designed for limited emergency scenarios by using offline-training-online-approximation methods. To solve the more general multiscenario emergency control problem, a deep deterministic policy gradient (DDPG) algorithm is adopted to learn near-optimal solutions. With the aid of deep Q network, DDPG-based strategies have better generalization abilities for unknown and untrained emergency scenarios, and thus are suitable for multiscenario learning. Through simulations using benchmark systems, the proposed schemes are proven to achieve satisfactory performances.
|
5,166
|
Please write an abstract with title: Multi chips heavy ions SEE testing of the COTS Myriad-2 vision processing unit, and key words: Performance evaluation, Radiation effects, Annealing, Random access memory, Graphics processing units, Europe, Xenon. Abstract: This work presents the heavy ions SEE testing of the Intel Movidius Myriad-2. This device is a vision processing unit that will be part of the CAES High-Performance Compute Board platform targeting space applications.
|
5,167
|
Please write an abstract with title: Using Wavelet Packet Denoising and a Regularized ELM Algorithm Based on the LOO Approach for Transient Electromagnetic Inversion, and key words: Mathematical models, Neural networks, Data models, Conductivity, Wavelet packets, Computational modeling, Noise reduction. Abstract: Transient electromagnetic method (TEM) inversion is a complex nonlinear problem with high dimensionality and ill-posedness. Using traditional neural networks based on a gradient algorithm to solve the TEM inversion problem might result in a slow convergence where the model falls easily into local minima. To solve these problems, a wavelet packet denoising (WPD) technology and a regularized extreme learning machine (ELM) algorithm based on the leave-one-out cross-validation (LOO) approach are proposed in this article. First, the WPD method is based on the hard threshold, the Shannon entropy with a Sym15 wavelet, which is provided to suppress the noise from the TEM data. Moreover, the learning process of the ELM model is optimized by randomly setting the hidden layer parameters instead of updating based on the gradient algorithm, which accelerates the learning speed. Finally, the LOO methodology is introduced to optimize the regularization factor of the ELM to improve the prediction accuracy and generalization ability of the approach. The inversion results of two typical TEM layered geoelectric models, two anomalous body models, and one field example are provided to prove the validity and feasibility of the proposed approach. In addition, compared with other traditional methods [ELM, backpropagation (BP), radial basis function (RBF), and linear support vector machine (LSVM)], the introduced method achieves higher inversion accuracy, better stability, and stronger forward data fitting ability, enabling it to effectively solve the TEM inversion problem.
|
5,168
|
Please write an abstract with title: P2P live streaming system with low signal interruption, and key words: Streaming media, Relays. Abstract: P2P content distribution networks are collecting interest to efficiently deliver rich contents such as audio and video. Stream interruption caused by relay peers dropping out of the P2P network is a problem in P2P live streaming systems. In this paper, we propose a P2P live streaming system with low stream interruption. In the proposed system, peers are connected to the peers with low drop-out probability and a wide and short P2P network is constructed. Also, multiple paths to the source is considered. We show the improvement in the interruption time by our algorithm through simulations.
|
5,169
|
Please write an abstract with title: Coherent signal-subspace processing for the detection and estimation of angles of arrival of multiple wide-band sources, and key words: Signal processing, Wideband, Narrowband, Sensor arrays, Position measurement, Direction of arrival estimation, Frequency domain analysis, Propagation delay, Maximum likelihood detection, Maximum likelihood estimation. Abstract: This paper presents a method of constructing a single signal subspace for high-resolution estimation of the angles of arrival of multiple wide-band plane waves. The technique relies on an approximately coherent combination of the spatial signal spaces of the temporally narrow-band decomposition of the received signal vector from an array of sensors. The algorithm is presented, and followed by statistical simulation examples. The performance of the technique is contrasted with other suggested methods and statistical bounds in terms of the determination of the correct number of sources (detection), bias, and variance of estimates of the angles.
|
5,170
|
Please write an abstract with title: Reveal: Fine-grained Recommendations in Online Social Networks, and key words: Facebook, Data mining, Videos, Knowledge based systems, Dictionaries, Tagging. Abstract: Content selection in social networks is driven by numerous extraneous factors that can result in the loss of content of interest. In this paper we present Reveal, a fine-grained recommender system for social networks, designed to recommend media content posted by the user's friends. The intuition is to leverage the abundance of pre-existing information and identify overlapping user interests in specific sub-categories. While our system is intended as a component of the social network, we develop a proof-of-concept implementation for Facebook and experimentally evaluate the effectiveness of our approach.
|
5,171
|
Please write an abstract with title: Joint NOMA and Beamforming in PNC-coded Parallel Relay Channels, and key words: NOMA, Array signal processing, Spectral efficiency, Simulation, Interference, Throughput, Resource management. Abstract: Non-orthogonal multiple access (NOMA) has been a popular choice to deploy multiple access in physical layer network (PNC) coded parallel relay channels. However, when the number of parallel relay channels are large, interference can seriously hinder the NOMA based communication. To have a spectral efficient and reliable communication in parallel relay channels, this paper proposes a joint NOMA and beamforming scheme where the key contribution is the use of beamforming pre-coding to avoid cross interference between individual relay based communications. However, NOMA is also used in selected clusters to provide multiple access which reduces the number of antennas required at the base-station. The proposed communication scheme is tested for throughput and it shows that it achieves a superior throughput than communication schemes operating PNC coded parallel relay channels with NOMA only.
|
5,172
|
Please write an abstract with title: Simulation of large on-chip capacitors and inductors, and key words: Inductors, Resistors, Circuit simulation, Capacitance, Frequency, Inductance, MOS capacitors, Active filters, Transconductance, Filtering. Abstract: A circuit configuration to simulate large on-chip capacitors and inductors is discussed. It is based on the backward-Euler integration rule and can be realized by means of a sample-and-hold function. It leads to filters with time constants determined by resistor ratios and by the sample frequency.
|
5,173
|
Please write an abstract with title: PoissonSeg: Semi-Supervised Few-Shot Medical Image Segmentation via Poisson Learning, and key words: Frequency selective surfaces, Training, Representation learning, Image segmentation, Biological systems, Skin, Data models. Abstract: The application of deep learning to medical image segmentation has been hampered due to the lack of abundant pixel-level annotated data. Few-shot Semantic Segmentation (FSS) is a promising strategy for breaking the deadlock. However, a high-performing FSS model still requires sufficient pixel-level annotated classes for training to avoid overfitting, which leads to its performance bottleneck in medical image segmentation due to the unmet need for annotations. Thus, semi-supervised FSS for medical images is accordingly proposed to utilize unlabeled data for further performance improvement. Nevertheless, existing semi-supervised FSS methods has two obvious defects: (1) neglecting the relationship between the labeled and unlabeled data; (2) using unlabeled data directly for end-to-end training leads to degenerated representation learning. To address these problems, we propose a novel semi-supervised FSS framework for medical image segmentation. The proposed framework employs Poisson learning for modeling data relationship and propagating supervision signals, and Spatial Consistency Calibration for encouraging the model to learn more coherent representations. In this process, unlabeled samples do not involve in end-to-end training, but provide supervisory information for query image segmentation through graph-based learning. We conduct extensive experiments on three medical image segmentation datasets (i.e. ISIC skin lesion segmentation, abdominal organs segmentation for MRI and abdominal organs segmentation for CT) to demonstrate the state-of-the-art performance and broad applicability of the proposed framework.
|
5,174
|
Please write an abstract with title: A Tracking Control Method for Autonomous Intelligent Park Vehicle Based on Model Predictive Control, and key words: Employee welfare, Target tracking, Predictive models, Prediction algorithms, Unmanned vehicles, Stability analysis, Automobiles. Abstract: In order to make our autonomous intelligent park vehicles against established track has a good path tracking effect, a path tracking control method based on model prediction control (MPC) is proposed, using particle swarm optimization algorithm control to automatically calculate and adjust the MPC controller parameters under different working conditions. The CarSim/Simulink co-simulation platform is built to complete path following control simulation for dual lane under various speed. The simulation and experiment show that the intelligent vehicle in the parks has a good accuracy in following the target path under the control strategy.
|
5,175
|
Please write an abstract with title: A Model Library Method of Android Malware Detection for Population, and key words: android, malware detection, model library, population, smo. Abstract: In order to solve the problem that the recognizer generated by a single algorithm has differences in the identifing malware amang all population applications, this paper proposes a method of Android malware detection model library for population. Firstly, the python program crawls the application file and extracts the application permission set. Then, uses the Sequential Minmal Optimization algorithm to classify the set. Next, uses the trained constraint model algorithm to find the corresponding population recognizer pool in the model library by using the population attributes. Finally, uses the permission feature matrix as the input to run the classifier to get results. Each pool is made up of three algorithm. Experimental results show that this method is feasible and effective, and it can make the application of each population reach a better recognition rate.
|
5,176
|
Please write an abstract with title: Design of Early Detection System for Home Security Based on Smartphone, and key words: Temperature sensors, Temperature measurement, Voltage measurement, Power supplies, Switches, Cameras, Security. Abstract: The home security system has become a concern for residents of the house. Humans need to know early on the dangers that will threaten the security of their homes or the wealth in their homes. This paper proposes a design of an early security system that can provide information on matters that threaten home security. The prototype of the home security early detection system consists of the MC38 magnetic switch sensor, which is used to determine the door position, the MQ2 gas sensor and the LM35 temperature sensor, which is used to detect fire early, the camera is used to detect the humans, and the accumulator 12V 45 Ah is used to ensure that the system will not experience any interruptions related to the supply of power. Arduino Mega 2560 is used as the main data processor, receiving sensor readings, and sending data to the ESP8266. Testing of the MC38 magnetic switch sensor is carried out by opening and closing the door, testing of the MQ2 gas sensor and LM35 temperature sensor is carried out by comparing reference measuring instruments, the camera is used to detect humans, and the power supply of an accumulator is used at a voltage of 11.4 V – 12.5 V. The test results show that all sensors can work well, and the camera can detect humans. The results of sensor measurements are monitored, and human detection results are sent to smartphones in the form of notifications.
|
5,177
|
Please write an abstract with title: 10th March 2022 - Plenary Session: “A global IC development oriented approach towards Electromagnetic Compatibility: from concept design to final product release”, and key words: Electromagnetic compatibility, Integrated circuit modeling, Computational modeling, Automotive engineering, Electromagnetics, Electrical engineering, Behavioral sciences. Abstract: Summary form only given. The complete presentation was not made available for publication as part of the conference proceedings. Any product which is placed onto the market, should not cause electromagnetic interface to surrounding receivers, but should also keep its own functionality under the presence of a possible disturbance source. When applied to automotive semiconductor products, this very vague but necessary requirement needs refinement into a set of low-level requirements which can easily be validated during the product’s life cycle, from concept design to product release. At the concept design stage, these requirements will define restrictions on e.g. technology, floorplan, and package design. At this stage, EMC design and system expertise play a crucial role, supported by a well-defined simulation strategy. Keeping track of all the multidisciplinary aspects of this exercise is a real challenge. One of the most important questions to be answered at this stage is how the final targeted EMC performance can be translated into a targeted EMC specification at e.g. block-level or package-level. During the validation phase, one is often confronted with evolved or new requirements, new insights and issues which were not observed in simulation or taken into account in the initial risk assessment. A solid requirement definition rolls out as a red carpet through the different product development phases. The full set of practices, methods and tools guide the development process in order to have the final product behaving as expected within the ambient electromagnetic environment. Subsequently, the time to market, the development cost, and the number of customer returns can be minimized.
|
5,178
|
Please write an abstract with title: Study on PBL and TCAD Tools in Microelectronics Process Education, and key words: Fabrication, Manufacturing processes, Education, Tools, Microelectronics, Information technology. Abstract: This paper discusses the implementation of problem-based learning (PBL) and TCAD tools in microelectronics manufacturing process education. The PBL performs well as an adjunct to traditional education. And the TCAD tool provides students with necessary practical knowledge of chip manufacturing processes in the fabrication chain. The above implementations make it possible to improve the effect in manufacturing process education by providing students with deeper process knowledge, necessary work skills and consistent pursuit of goals and other traits.
|
5,179
|
Please write an abstract with title: Bridging Robotics Education between High School and University: RoboCup@Home Education, and key words: Conferences, Education, Educational robots, Europe, Task analysis, Service robots. Abstract: Comparing to the learning contents in high school level robotics education leads us to discover a gap of missing skill sets required in university level robotics development. Our objective in this work is to bridge this gap by outreaching our development in RoboCup@Home Education. We have conducted our studied in several RoboCup events to establish new local communities. We have run hands-on robot building workshop, and finally gauge the project outcome by organizing the Education Challenge.
|
5,180
|
Please write an abstract with title: Wideband Programmable Gaussian Noise Generator on FPGA, and key words: Wideband, Field programmable gate arrays, Filter banks, Gaussian noise, Generators, Probability density function, Radar countermeasures. Abstract: Gaussian Noise Generators are common in various applications of Electronic Countermeasures and Low Probability of Intercept radar. It can be applied to military applications, law enforcement and commercial segments. The key requirement for such a generator is the ability to operate in wide spectral band. The main driver for this requirement is the ever increasing radars bandwidth to achieve high radar resolution.In addition to wideband capabilities, it is important to have a fine control over the suppressed and unsuppressed spectral frequencies. The countermeasures must allow friendly system to continue to operate, while suppressing the adversary systems. Moreover, due to limited transmit power envelope on analog RF power amplifier chain, it is advantageous to limit a transmission only to specific band-limited regions. The countermeasures should be able to reconfigure its settings in terms of active spectral frequencies agilely, when operational conditions or power considerations change. This paper presents proposed implementation on FPGA that achieves such key metrics.
|
5,181
|
Please write an abstract with title: A Single-to-Multi Network for Latency-Free Non-Intrusive Load Monitoring, and key words: Home appliances, Convolution, Databases, Training, Load monitoring, Load modeling, Feature extraction. Abstract: As one of the most important smart grid features, non-intrusive load monitoring (NILM) has become a practical technology for identifying the users’ energy consumption behavior. The conventional studies are usually based on the assumption that only one appliance is active or the signature database of all appliances is already known. Existing deep learning-based algorithms need to train a model for each target appliance. This paper, however, proposes an energy disaggregation network (EDNet) with deep encoder-decoder architecture to remove the unrealistic assumptions and reduce the size of the network to achieve latency-free NILM with only one model. Firstly, the blind source separation and mask mechanism used for speech recognition are creatively adopted for energy disaggregation. Then, the on/off states of each target appliance is detected based on the results of energy disaggregation. Finally, a personalized signature database with detailed states is constructed based on dynamic time warping (DTW) with energy disaggregation and state detection results to remove the assumption of NILM's dependence on prior information. Full comparison results with the previous work show that our proposed algorithms outperform state-of-the-art methods. It means that the load consumption behavior of residential users can be monitored with high accuracy without sub-metered information and other prior knowledge. Furthermore, the proposed EDNet has significantly smaller parameters, making the NILM toward offline and real-time load monitoring.
|
5,182
|
Please write an abstract with title: Analysis of the Optimal Voltage Spectrum in RPWM Tables, and key words: Pulse width modulation, Virtual colonoscopy, Switching frequency, Pulse width modulation inverters, Space vector pulse width modulation, Circuits, Power generation economics, Optimal control, Voltage control, Amplitude modulation. Abstract: Random pulse width modulation (RPWM) techniques for inverters and converters can improve the spectrum of the output voltage and the emitted noise. Looking up a given RPWM table in memory is the most economic and convenient way to digitally implement RPWM strategy. However, the above way is not truly random but deterministic for the given RPWM table and repeated showing order. From our analysis, we can find that the different showing orders for the same elements of RPWM tables result in the different voltage spectrum. In this paper, the showing orders are categorized and the optimal showing order corresponding to the optimal voltage spectrum are found through the proposed index with the help of the personal computer
|
5,183
|
Please write an abstract with title: The Performance of Coded Diversity Systems on a Slowly Fading Rayleigh Channel, and key words: Rayleigh channels, Radio frequency, Frequency diversity, Hamming distance, Additive noise, Communication systems, System testing, Fading, Frequency modulation, Modulation coding. Abstract: A new diversity technique has been developed that uses message waveforms consisting of a sequence of RF bursts at a number of different frequencies. Furthermore, the ensemble of message sequences is a code with large minimum Hamming distance. Hence, reliable communications are possible in spite of channel fading and additive noise. The new diversity technique has been integrated into a troposcatter communication system that was first tested in 1967. The new technique is illustrated and its performance predicted assuming both correlated and uncorrelated fading between the RF frequencies. A particular code is presented that achieves a 4-dB coding improvement beyond that generally obtained using binary modulation and frequency diversity techniques of the same order. Theoretical predictions of system performance and actual empirical data taken on two operational links agree very closely.
|
5,184
|
Please write an abstract with title: Multi-Point Travel Destination Recommendation System in Yogyakarta Using Hybrid Location Based Service-Floyd Warshall Method<inf>1</inf>, and key words: Planning, Heuristic algorithms, Global Positioning System, Memory management, Hospitals, Approximation algorithms, Location awareness. Abstract: Yogyakarta is one of the cities that has a high level of tourist visits. In a span of 4 years, the increase in local tourists reached 71% and 64% of foreign tourists. Increasing the number of tourists is not a problem-free process, especially as visit preferences change over time. The challenge in this research is how to find alternative tourism objects which are located around the destination route with the fastest route, so as to shorten the travel time. In this study, the multi-point tourism recommendation system using Location-Based Service (LBS) is designed to find out tourist locations from the current location to the point of locations you want to visit but with a radius of 9 km. The application of the Floyd Warshall algorithm to this system will help tourists find the best route to the chosen tourist location. From the test results obtained an accuracy rate of 90%.
|
5,185
|
Please write an abstract with title: Sub-threshold analysis and drain current modeling of polysilicon thin-film transistor using Green's function approach, and key words: Thin film transistors, Green's function methods, Grain boundaries, Silicon, Poisson equations, Semiconductor process modeling, Threshold voltage, Transconductance, Boundary conditions, Active matrix liquid crystal displays. Abstract: An analytical analysis for a poly-crystalline silicon thin-film transistor is presented. The Green's function approach is adopted to solve the two-dimensional Poisson's equation using Neumann's boundary conditions at the silicon-silicon di-oxide interface. The developed model gives an insight of device behavior due to the effect of traps and also grain-boundary effect. The analysis of threshold voltage depicts short-channel effects and drain-induced barrier lowering. The model is extended to analyze the transfer characteristics and obtain the transconductance of the device. The results obtained show good agreement with the numerical model and with simulated results, thus proving the validity of our model.
|
5,186
|
Please write an abstract with title: A New Method to Analyse the Role of Surface Plasmon Polaritons on Dielectric-Metal Interfaces, and key words: Metals, Optical reflection, Optical surface waves, Optical diffraction, Surface plasmon polaritons, Permittivity, Oscillators. Abstract: At nano-scale new phenomena have been discovered, allowing devices’ miniaturisation, energy harvesting, and power reduction. The Extraordinary Optical Transmission (EOT) phenomenon was reported in 1998 by Ebessen, who stated that the resonant peaks in the response of metallic nano antennas were more intense than predicted by classical diffraction theories. Years later, the main reason for this behaviour was attributed to the Surface Plasmon Polaritons (SPP), at least in ultraviolet and visible regions. In this article, a new method to model the radiation-matter interaction on a dielectric-metal interface is proposed, based on Maxwell’s equations and Fresnel Coefficients in absorbing media. Transmission percentage, angle and propagation length are obtained for a rigorous sweep on incident angle and wavelength. The results taken using some noble metals allow us to observe the presence of surface phenomena at expected SPP resonances. First, it is noticeable huge values of transmission in ultraviolet and visible regions, meaning that the metal does not reflect all the radiation. Also, the transmission angle tends to be higher, meaning huge surface components. Furthermore, the transmission length is on orders of 50-100 nm, meaning that phenomena as EOT only occurs at the nano-scale, since waves should arrive at another interface before being absorbed.
|
5,187
|
Please write an abstract with title: Technology Analysis of Global Smart Furniture Development Using Patent Data, and key words: Patents, Data analysis, Databases, Smart cities, Data visualization, Market research, Sensor systems. Abstract: The need for the exact overview of technology, which is the target for some purposes is often very crucial. Patent databases provide nowadays very suitable source of data and information which can be further analyzed. Global overview is thus possible to provide for any kind of technology. Smart Furniture is a very used term recently, which is related to current trends such as digitization, smart city or internet of things. Within these phenomena, Smart Furniture is used in different contexts, and so its concept is not clarified. The aim of the article is to show the technology analysis of Smart Furniture based on the patent data analysis and literature analysis by clustering and visualization. The definition of Smart Furniture was recently provided in literature based on previous research which was undertaken based on searching in scientific and patent databases. Thus, the term is defined by its technical properties and parameters. This definition is put into the context of actual trends of patents content with selected future trends. A patent analysis was undertaken between 20 October 2019 and 09 November 2019, while the Web of Science database was included, which was searched by keywords that included the phrase "Smart Furniture" and variants. Patent searching was performed in the PatentInspiration database. In total 31 articles from scientific database and 491 patent applications were examined against strict criteria containing meaningful definitions of Smart Furniture. Based on the analysis of key technologies and properties, clustering of results and their further analysis, it was found that the concept of smart furniture is specific to the following components: intelligent system, controller operated with user's data and energy sources, sensors and actuators.
|
5,188
|
Please write an abstract with title: An Effective 3D Text Recurrent Voting Generator for Metaverse, and key words: Three-dimensional displays, Metaverse, Solid modeling, Analytical models, Sentiment analysis, Random forests, Motion pictures. Abstract: Metaverse is a novel innovative platform that connects users worldwide in the distributed virtual environment. People share their interests, opinions, and resources on this virtual reality platform. With this, we come to know that besides other fundamental techniques, the language generation method is also a necessity to regulate the VR environment. There are several types of language generation methods in 3D, including neural learning, such as GRU, RNN, and GPT-3, and transfer learning. This paper proposes a recurrent voting generator (RVG) system that understands the 3D text of a book and performs emotional analytics within a metaverse space. The proposed model RVG evaluates emotions through three algorithms such as the first module is a recurrent sentiment generator (RSG) that analyzes emotions and calculates and generates the distributions. The second module is the sentiment decomposition (SD) that optimizes higher dimensions in Big Data. And, the third module is the compound voting learning (CVL) module that performs calculations with an emphasis on optimal performance. The dataset used to evaluate RVG is based on the content of movie reviews and books. The performance evaluation shows that the proposed approach outperforms better compared to the existing 2D RNN models in the metaverse.
|
5,189
|
Please write an abstract with title: Finding Important Edges in Networks through Local Information, and key words: Measurement, Transportation, Complex networks, Benchmark testing, Indexes, Task analysis. Abstract: In transportation, communication, social and other real complex networks, some critical edges act a pivotal part in controlling the flow of information and maintaining the integrity of the structure. Due to the importance of critical edges in theoretical studies and practical applications, the identification of critical edges gradually become a hot topic in current researches. Considering the overlap of communities in the neighborhood of edges, a novel and effective metric named subgraph overlap (SO) is proposed to quantifying the significance of edges. The experimental results show that SO outperforms all benchmarks in identifying critical edges which are crucial in maintaining the integrity of the structure and functions of networks.
|
5,190
|
Please write an abstract with title: An asymmetric subspace watermarking method for copyright protection, and key words: Watermarking, Copyright protection, Public key, Computer hacking, Data mining, Computer crime, Robustness, Information security, Authentication, Fingerprint recognition. Abstract: We present an asymmetric watermarking method for copyright protection that uses different matrix operations to embed and extract a watermark. It allows for the public release of all information, except the secret key. We investigate the conditions for a high detection probability, a low false positive probability, and the possibility of unauthorized users successfully hacking into our system. The robustness of our method is demonstrated by the simulation of various attacks.
|
5,191
|
Please write an abstract with title: Spurious Mode Generation in Nonuniform Waveguide, and key words: Electromagnetic waveguides, Differential equations, Circuits, Maxwell equations, Waveguide theory, Wave functions, Telecommunication standards, Mathematics, Dielectrics, Surface waves. Abstract: This paper deals with the problem of a nonuniform waveguide joining two uniform ones and the spurious modes generated by it when a pure mode is incident in one of the uniform waveguides. The generalised telegraphist's equations are stated and transformed into a set of differential equations for the amplitudes of the forward and backward traveling waves. The expressions for the coupling coefficients between the various modes are given and analysed.
|
5,192
|
Please write an abstract with title: A Phase Variation-Based Smart Structure for Crack Detection on Metals Using Cold Spray Additive Manufacturing, and key words: Sensors, Metals, Delays, Substrates, Microwave circuits, Resonant frequency, Intelligent structures. Abstract: This article presents a novel zero-power smart structure for metal cracks’ detection. We fabricated a sensitive one-port structure that receives the interrogation signal at 2.45 GHz and reflects the sensing information through its phase parameter. Damage on the ground surface of the structure causes variations in the phase delay of the reflection signal. This study combines the microwave sensing methodology with the innovative solid-state additive manufacturing (AM) technology to facilitate an in situ structural health monitoring (SHM) for a wide range of harsh environment applications. A sensing structure with a conductive comb-like pattern made from Cu powder is simulated and fabricated through the cold spray deposition (CSD) additive technology. Samples of aluminum including sharp rectangular machined grooves with different widths (constant 2 mm depth and 25 mm long) were fabricated to explore the sensor’s detection ability in cases close to the natural cracks’ scenario. It is shown from the simulations and experiments that the printed sensors on defected samples provide different phase delay parameters when compared with baseline healthy samples. As expected, increased diameter or width value of cracks results in a higher phase delay, and the best sensitivity of 138°/mm is obtained for sharp rectangular cracks. This experiment opens a new door for simple, low-cost fabrication and in situ repair of battery-free smart infrastructures by integrating metalized dielectrics on metallic substrates. Finally, the presented smart structure can be a part of a wireless sensing node and hence a node of the wireless sensor network for the internet-of-things applications.
|
5,193
|
Please write an abstract with title: Identity-Preserving Realistic Talking Face Generation, and key words: Faces, Image color analysis, Mouth, Facial animation, Shape, Lips, Synchronization. Abstract: Speech-driven facial animation is useful for a variety of applications such as telepresence, chatbots, etc. The necessary attributes of having a realistic face animation are 1) audiovisual synchronization (2) identity preservation of the target individual (3) plausible mouth movements (4) presence of natural eye blinks. The existing methods mostly address the audiovisual lip synchronization, and few recent works have addressed synthesis of natural eye blinks for overall video realism. In this paper, we propose a method for identity-preserving realistic facial animation from speech. We first generate person-independent facial landmarks from audio using DeepSpeech features for invariance to different voices, accents, etc. To add realism, we impose eye blinks on facial landmarks using unsupervised learning and retarget the person-independent landmarks to person-specific landmarks to preserve the identity-related facial structure which helps in generation of plausible mouth shapes of the target identity. Finally, we use LSGAN to generate the facial texture from person-specific facial landmarks, using an attention mechanism that helps to preserve identity-related texture. An extensive comparison of our proposed method with the current state-of-the-art methods demonstrate a significant improvement in terms of lip synchronization accuracy, image reconstruction quality, sharpness, and identity-preservation. A user study also reveals improved realism of our animation results over the state-of-the-art methods. To the best of our knowledge, this is the first work in speech-driven 2D facial animation that simultaneously addresses all the above-mentioned attributes of a realistic speech driven face animation.
|
5,194
|
Please write an abstract with title: Input and output coupled nonlinear systems, and key words: Nonlinear systems, Coupling circuits, Integrated circuit interconnections, Linear matrix inequalities, Interconnected systems, Design methodology, Control theory, Chaos, Limit-cycles, Circuit analysis. Abstract: In this paper, a class of input and output coupled nonlinear systems with multiple equilibria are studied. These kinds of systems can also be viewed as interconnected systems composed of single-input and single-output systems through some linear and nonlinear interconnections. Frequency-domain conditions are established for global convergence and convergence of bounded solutions for such systems. The effects of nonlinear input and output interconnections can be studied through a nonsingular matrix. The design method based on linear matrix inequality for the interconnected matrix is presented. In addition, the relation between input and output coupling here and input transformation in control theory is established. The coupling method is illustrated through a coupled Chua's circuit. The nonexistence of chaotic attractors or limit cycles in the coupled Chua's circuit can be analyzed by convergence of bounded solutions.
|
5,195
|
Please write an abstract with title: Nonvolatile block-oriented RAM, and key words: Shift registers, Circuits, Latches, Nonvolatile memory, Read-write memory, Decoding, Detectors, Random access memory, Sensor arrays, Contracts. Abstract: This paper will discuss a nonvolatile 2048-bit MNOS block-oriented RAM array with a serial clear/write or read/cycle data rate of over 2 MHz with less than 400-mW power dissipation.
|
5,196
|
Please write an abstract with title: Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites, and key words: COVID-19, Computers, Systematics, Organizations, Security, Informatics, Payloads. Abstract: COVID-19 has hit hard on the global community, and organizations are working diligently to cope with the new norm of "work from home". However, the volume of remote work is unprecedented and creates opportunities for cyber attackers to penetrate home computers. Attackers have been leveraging websites with COVID-19 related names, dubbed COVID-19 themed malicious websites. These websites mostly contain false information, fake forms, fraudulent payments, scams, or malicious payloads to steal sensitive information or infect victims' computers. In this paper, we present a data-driven study on characterizing and detecting COVID-19 themed malicious websites. Our characterization study shows that attackers are agile and are deceptively crafty in designing geolocation targeted websites, often leveraging popular domain registrars and top-level domains. Our detection study shows that the Random Forest classifier can detect COVID-19 themed malicious websites based on the lexical and WHOIS features defined in this paper, achieving a 98% accuracy and 2.7% false-positive rate.
|
5,197
|
Please write an abstract with title: Improving the ESD Robustness of an Ultra-high Voltage nLDMOS Device with the Embedded Schottky Diode, and key words: Schottky diodes, Electrostatic discharges, Layout, Breakdown voltage, Testing, Switched mode power supplies, Market research. Abstract: In this paper, ultra-high voltage (UHV) nLDMOS devices with drain-side embedded Schottky diode for improving ESD ability via TSMC 0.5-μm 300-V BCD process has been proposed and verified. In order to improve the ESD ability without extra layout area adding, the embedded layout skill is known as the area-efficient method to increase the ESD ability. The proposed new structure of nLDMOS is embedded Schottky diodes at the drain side, and the drain side is divided into three concentric circles. The influence of these embedded Schottky diodes and the original LDMOS with different arrangement on the ESD ability is discussed. Compared with the Reference pure LDMOS, which show that the HBM values of the pure Schottky diodes (MMM-type) and embedded Schottky diodes in the middle and outer circles (NMM-type) increased from 1000-V to 5500 / 5000-V, respectively.
|
5,198
|
Please write an abstract with title: Energy Management of Co-Phase Traction Power Supply System Considering PV and Hybrid Energy Access Based on Information Gap Decision Theory, and key words: Photovoltaic systems, Uncertainty, Traction power supplies, Rail transportation, Hybrid power systems, Standards, Energy storage. Abstract: In the promising trend of low-carbon emission, new energy sources are being used for high-speed railways to decrease operating costs. Photovoltaic energy (PV) is a new energy source that can be easily obtained but high uncertainty involved. This paper proposes an Information Gap Decision Theory(IGDT)-based energy management approach for the co-phase traction power system considering the integration of PV and hybrid energy storage system(HESS). This approach aims to reduce total costs with the IGDT model, which resolves the uncertainty of PV. The proposed approach offers Day-Ahead robustness and opportunity strategies to guarantee the expected cost and pursue the windfall profit, respectively. The relevant national standards are met as well. The result of case studies verifies the approach can provide effective risk-averse/risk-seeking decisions under PV uncertainty conditions.
|
5,199
|
Please write an abstract with title: Brain Age Estimation Using LSTM on Children's Brain MRI, and key words: Two dimensional displays, Training, Magnetic resonance imaging, Feature extraction, Testing, Estimation, Three-dimensional displays. Abstract: Brain age prediction based on children's brain MRI is an important biomarker for brain health and brain development analysis. In this paper, we consider the 3D brain MRI volume as a sequence of 2D images and propose a new framework using the recurrent neural network for brain age estimation. The proposed method is named as 2D-ResNet18+Long short-term memory (LSTM), which consists of four parts: 2D ResNet18 for feature extraction on 2D images, a pooling layer for feature reduction over the sequences, an LSTM layer, and a final regression layer. We apply the proposed method on a public multisite NIH-PD dataset and evaluate generalization on a second multisite dataset, which shows that the proposed 2D-ResNet18+LSTM method provides better results than traditional 3D based neural network for brain age estimation.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.