ID int64 0 400k | content stringlengths 97 5.85k |
|---|---|
6,100 | Please write an abstract with title: Virtual object deformations using attributed boundary model, and key words: Deformable models, Virtual reality, Mechanical factors, Data mining, Solid modeling, Artificial neural networks, Finite element methods, Engines, Displays, Animation. Abstract: Virtual reality may provide reliable simulation for object interactions, when embedding virtual objects with artificial attributes to emulated physical and mechanical properties. This paper presents an attributed boundary model (ABM) that emulates realtime and realistic deformations for VR applications. In the ABM, the physical, mechanical, topological and geometrical properties of the solid are extracted and packed into a set of attribute matrices that generate equivalent displacements for its boundary model upon contact with other virtual objects. The attribute matrices are created by training the back propagation artificial neural network with displacement data provided by finite element method (FEM). These matrices are then encoded into the deformation behavioral module for the VR engine to perform realtime interactions in the virtual space. Implementations are built on Virtools using XEON PC with nVIDIA Quadro4 display device. The result shows that the speed of the animation is better than 30 FPS and the deviation from calculation is less than 1%. |
6,101 | Please write an abstract with title: Low-element wideband phased array, and key words: Phased arrays, Wideband, Antenna arrays, Bandwidth, Microwave technology, Organizing, IEEE catalog, Apertures, Frequency, Hidden Markov models. Abstract: A phased antenna array with wide-angle sector of 1D beamsteering, utilizing a minimum number of controlled elements due to certain space distribution of elements, is considered. The proposed array performances are shown. |
6,102 | Please write an abstract with title: Transmit Beamforming for Ambient Backscatter Communication Enabled Wireless Body Area Network in Multiuser MISO System, and key words: Wireless communication, Body area networks, Array signal processing, Throughput, Backscatter, Symbols, Resource management. Abstract: Wireless Body Sensor Network (WBAN) is a promising technology which can provide pervasive E-health services. However, the power consumption of wireless communications in WBAN greatly restricts its applications. Recently Ambient Backscatter Communication (AmBC) technology has been introduced to realize ultra-low power passive wireless communication, thus it is highly desirable for WBAN. In this paper we consider that AmBC, powered by a multi-antenna Base Station (BS), is incorporated in WBAN to achieve ultra-low power intra-WABN communication. To fully exploit the potential of the AmBC in WBAN, the transmit beamforming at BS, the AmBC information symbol period as well as the transmission time allocation are jointly designed, taking into account Quality of Service (QoS) requirement of WBAN and cellular users, and BS power budget. The formulated optimization problem is highly nonconvex and very challenging to solve. To tackle this issue, we employ Inner Approximate (IA) framework to reformulate the original problem and solve it in an iterative manner. Finally, numerical results are provided to show the effectiveness of the proposed algorithm under various of system parameters settings. |
6,103 | Please write an abstract with title: Multi-agent transactions for Web-based design activities, and key words: Design engineering, Concurrent computing, Chaos, Fault tolerance, Transaction databases, Web server, Aerodynamics, Fault tolerant systems, Offshore installations, Marine vehicles. Abstract: Web-based engineering design activities require fault tolerance and concurrent access to shared resources such as databases and Web servers. Such activities are generally dynamic, cooperative, long-lived, interactive, and non-prescriptive. We propose a new multi-agent transaction model, which is based on extended transactions and multi-agent technologies. The novelty of this model is that it automatically customises transactions to the requirements of the design activities. In addition, this model is believed to improve concurrency and fault tolerance, facilitate interaction and co-operation of participating systems involved in design activities. |
6,104 | Please write an abstract with title: A Comprehensive Review on Evolving Data Stream Clustering, and key words: Shape, Scalability, Computational modeling, Bibliographies, Clustering algorithms, Big Data, Data models. Abstract: Most of the real-world applications deal with large data streams that are generated continuously. With this increase in the size of data streams, the existing data stream clustering algorithms cannot be implemented efficiently as these are designed to tackle static data. This invalidation of the existing algorithms becomes even more prominent when dealing with continuous as well as evolving data streams. To effectively cluster such data streams, there is a need for algorithms that can deal with the memory and computational limitations along with the concept drift. In this regard, various state-of-the-art clustering techniques have been modified to tackle the continuity and evolving nature of data. One of the main approaches used by researchers is devising a hybrid framework, commonly termed as online-offline phase clustering. This approach effectively addresses Big Data. However, it does not provide any mechanism to detect the expired data points – data that has lost its significance due to concept drift. To further improve clustering algorithms, researchers came up with window models that serve as updating units, thus, successfully handling concept drift. Realizing the need for enhanced algorithms, in this paper we closely analyze these clustering algorithms by providing a detailed discussion on their performance from different perspectives, such as memory and computational cost, cluster quality and purity, scalability, effectiveness in detecting outliers, and the cluster shape. Our survey encompasses a comprehensive and thorough literature review of the evolving data stream clustering techniques established in recent years. Further, the paper highlights the shortcomings of the algorithms, and tends to target the limitations that should be tackled in future. |
6,105 | Please write an abstract with title: A review of fundamental mechanisms and techniques in functional electrical stimulation, and key words: Neuromuscular stimulation, Muscles, Biomedical electrodes, Control systems, Surface treatment, Biomedical engineering, Recruitment, Neurons, Extremities, Skin. Abstract: In this paper, we review various electrodes with individual design, address the influences of essential stimulator parameters and internal disturbances on the recruitment characteristics, and describe the control strategies of functional electrical stimulation (FES) musculoskeletal systems. The promise of possible directions for further research on safe and effective FES systems are also discussed. |
6,106 | Please write an abstract with title: How iris recognition works, and key words: Iris recognition, Pattern recognition, Testing, Image recognition, Eyelids, Airports, Demodulation, Laboratories, Biometrics, Face recognition. Abstract: The principle that underlies the recognition of persons by their iris patterns is the failure of a test of statistical independence on texture phase structure as encoded by multiscale quadrature wavelets. The combinatorial complexity of this phase information across different persons spans about 249 degrees of freedom and generates a discrimination entropy of about 3.2 bits/mm/sup 2/ over the iris, enabling real-time decisions about personal identity with extremely high confidence. Algorithms first described by the author in 1993 have now been tested in several independent field trials and are becoming widely licensed. This presentation reviews how the algorithms work and presents the results of 9.1 million comparisons among different eye images acquired in trials in Britain, the USA, Korea, and Japan. |
6,107 | Please write an abstract with title: Evaluation of MMCs for High-Power Low-Voltage DC-Applications in Combination with the Module LLC-Design, and key words: Capacitors, Europe, Voltage control, Topology, Stress, Resonant converters. Abstract: In this paper, a full-bridge modular multilevel converter (MMC) and two half-bridge-based MMCs are evaluated for high-current low-voltage e.g. 100 - 400V DC-applications such as electrolysis, arc welding or datacenters with DC-power distribution. Usually, modular multilevel converters are used in high-voltage DC-applications (HVDC) in the multiple kV-range, but to meet the needs of a high-current demand at low output voltage levels, the modular converter concept requires adaptations. In the proposed concept, the MMC is used to step-down the three-phase medium-voltage of 10kV, and provide up to 1 MW to the load. Therefore, each module is extended by an LLC resonant converter to adapt to the specific electrolyzers DC-voltage range of 142 - 220V and to provide galvanic isolation. The six-arm MMC converter with half-bridge modules can be simplified and optimized by removing three arms, and thus halving the number of modules. In addition, the module voltage ripple and capacitor losses are decreased by 22% and 30% respectively. By rearranging the components of the half-bridge MMC to build a MMC consisting of grid-side full-bridge modules, the voltage ripple is further reduced by 78 % and capacitor losses by 64 %, while ensuring identical costs and volume for all MMCs. Finally, the LLC resonant converter is designed for the most efficient full-bridge MMC. The LLC can not operate at resonance with a fixed nominal module voltage of 770V because the output voltage is varying between 142 - 220V. By decreasing the module voltage down to 600V, additional points of operation can be operated in resonance, and the remaining are closer to resonance. The option to decrease the module voltage down to 600V, increases the number of required modules per arm from 12 to 15, which requires to balance the losses of the LLCs and the grid-side stages. |
6,108 | Please write an abstract with title: Analysis of Lithium-Ion Battery Failure and PyBaMM's Viability in Simulating Them, and key words: Lithium-ion batteries, Heating systems, Thermodynamics, Renewable energy sources, Market research, Mathematical models, Data models. Abstract: As renewable energy sources become more popular, methods of energy storage, especially lithiumion batteries, have become essential in making renewable energy practical. Lithiumion batteries have seen widespread use in everyday machines such as smartphones and electric vehicles, mainly due to their power density and price. Despite their merits, lithium-ion batteries also have significant safety concerns, demonstrated by the several instances of these batteries catching fire or exploding. To ensure future battery safety, it is imperative to develop accurate testing procedures and determine the factors leading to catastrophic failure. The Oxford Mathematical Modelling Battery Group's Python Battery Mathematical Model (PyBaMM) was used to simulate these batteries in action along with experimental data from Dr. Thomas Hodson's lab at Columbia University [1]. By comparing these different types of data and exploring each individually, it was determined that discharge rate and repeated cycling are the leading causes of thermal runaway in lithiumion batteries. It was also determined that PyBaMM, despite showing general trends of different factors that led to combustion, was unviable in the simulation of battery explosions due to its failure to recognize explosive battery temperatures and inability to simulate both realistic thermal behavior and heat exchange between cells and the surrounding environment. |
6,109 | Please write an abstract with title: Substrate Integrated Waveguide Pedestal Filtenna for Sub-6 GHz 5G Radio Frequency Front-Ends, and key words: Antenna measurements, Filtering, Resonator filters, Resonant frequency, Gain measurement, Loss measurement, Linear antenna arrays. Abstract: This paper presents the design, manufacturing, and measurement of a novel substrate integrated waveguide (SIW) pedestal filtering antenna solution for use in 5G New Radio sub-6 GHz communications. Miniaturization is achieved through the use of SIW pedestal resonators and integration of the radiating element into the filter design, resulting in higher order suppression. The design generates a third order filtering response utilizing SIW pedestal resonators and a patch antenna element. The manufactured SIW pedestal filtenna achieves a 10 dB return loss bandwidth of 4.29 % about a centre frequency of 3.63 GHz, and a boresight gain of 3.66 dBi. Additionally a 1×4 linear array is measured, demonstrating the applicability to 5G radio frequency front-ends. |
6,110 | Please write an abstract with title: Review on Secure Device to Device Communications in LTE, and key words: Cellular networks, Power control, Spread spectrum communication, Throughput, Device-to-device communication, Delays, Security. Abstract: Mobile data traffic volume is growing on a large-scale which creates a data traffic overload problem on current cellular networks. To facilitate these growing demands for mobile data traffic volume in next-generation cellular networks such as 5G, the concept of device-to-device (D2D) communication has been introduced. D2D communications have been shown to improve power efficiency, spectrum efficiency, throughput and delay by maximizing the system’s capability in cellular networks through enabling multiple devices to communicate with each other directly. Despite these benefits, D2D communication faces some open research challenges ahead, for instance, security, cooperative multi-hop D2D communications, transmission scheduling and power control and power efficiency. This paper presents a review on the possible threats and the existing security solutions in D2D communications. |
6,111 | Please write an abstract with title: Brominated flame retardants: issues surrounding their use in electrical and electronic equipment, and key words: Flame retardants, Electronic equipment, Plastics, Fires, TV, Recycling, Delay effects, Safety, Flammability, Flashover. Abstract: Brominated flame retardants have been used for many years in electrical and electronic equipment (EEE). They provide an efficient, and in certain cases, the only viable method of achieving required flammability standards with given plastics. It is well documented that the use of flame retardants delays the spread of fires or delays the time of flashover, hence saving lives and property. In the case of televisions, the introduction of higher fire safety standard in the US for television enclosures has led to a 73% decrease in the incidence of fires involving televisions. With the use of brominated flame retardants come questions related to risk in use and end-of-life options for plastics containing these materials. European Risk Assessment for several brominated flame retardants is now in progress. Research has been ongoing to study various end-of-life options, such as recycle, bromine recovery, and waste-to-energy recovery (incineration). This paper addresses issues related to benefits, risk in use, and end-of-life options of plastics containing brominated flame retardants. Results of research aimed at determining the recyclability of plastics containing brominated flame retardants under a variety of conditions (standard recycle, material subjected to extreme temperature and humidity, and mixed recycle streams) is included. Also, current practices for end-of-life options are discussed. The conclusions of these evaluations show the benefits in terms of fire safety and the value of various end-of-life options for EEE containing selected brominated flame retardant resins. |
6,112 | Please write an abstract with title: Side information aware coding strategies for sensor networks, and key words: Source coding, Sensor phenomena and characterization, Wireless sensor networks, Decoding, Information theory, Relays, Educational institutions, Routing, Robustness, Scalability. Abstract: We develop coding strategies for estimation under communication constraints in tree-structured sensor networks. The strategies have a modular and decentralized architecture. This promotes the flexibility, robustness, and scalability that wireless sensor networks need to operate in uncertain, changing, and resource-constrained environments. The strategies are based on a generalization of Wyner-Ziv source coding with decoder side information. We develop solutions for general trees, and illustrate our results in serial (pipeline) and parallel (hub-and-spoke) networks. Additionally, the strategies can be applied to other network information theory problems. They have a successive coding structure that gives an inherently less complex way to attain a number of prior results, as well as some novel results, for the Chief Executive Officer problem, multiterminal source coding, and certain classes of relay channels. |
6,113 | Please write an abstract with title: Decoder Derived Cross-Component Linear Model Intra-Prediction for Video Coding, and key words: Video coding, Adaptation models, Image coding, Runtime, Conferences, Predictive models, Syntactics. Abstract: This paper presents a decoder derived cross-component linear model (DD-CCLM) intra-prediction method, in which one or more linear models can be used to exploit the similarities between luma and chroma sample values, and the number of linear models used for a specific coding unit is adaptively determined at both encoder and decoder sides in a consistent way, without signalling a syntax element. The neighbouring samples are classified into two or three groups based on a K-means algorithm. Moreover, DDCCLM can be combined with normal intra-prediction modes such as DM mode. The proposed method can be well incorporated with the state-of-the-art CCLM intra-prediction in the Versatile Video Coding standard. Experimental results show that the proposed method provides an overall average bitrate saving of 0.52% for All Intra configurations under the JVET common test conditions, with negligible runtime change. On sequences with rich chroma information, the coding gain is up to 2.07%. |
6,114 | Please write an abstract with title: Skin Disease Detection and Classification, and key words: Pathogens, Microorganisms, Computational modeling, Image processing, Transfer learning, Medical services, Skin. Abstract: Skin being the outermost integument of the human body has a significant role when it comes to protecting our body from sunlight, cold and other harmful germs and substances. Human skin type varies from person to person. The human skin type variety provides a diverse habitat for microorganisms and bacteria. Sometimes abnormalities of skin also cause noticeable signs of underlying disease. Hence it is highly necessary to detect and properly diagnose skin disease in the early stages to avoid spread of the disease. Our project involves image processing and classification of skin diseases using image data. These have been implemented with the help of two classifiers such as Convolutional Neural Networks and MobileNet in the domain of Deep Learning. Therefore, this project is an early warning tool which informs users about skindiseases that they are suffering from using a computer aided method. |
6,115 | Please write an abstract with title: Theoretical Framework & Engineering Methodology of Cloud-Based Open Cyber Infrastructure, and key words: Productivity, Industries, Ecosystems, Education, Collaboration, Transforms, Medical services. Abstract: To facilitate efforts to transform the domain-specific business vendor to be customer-centered, results-oriented, and market-based cyber-organization or e-organization, with the advances of Advanced Computing Technologies (ACT). In this paper we propose an engineering methodology and theoretical framework of constructing of an open, shared, collaborative multiple-tenant, multiple-organization domain-specific (SMEs enterprise, education, healthcare & wellness, farming etc.) digital service ecosystem. The theoretical description of Cloud-based Open Cyber Infrastructure (COCI) model, as well as the software infrastructure for such a model, are developed to implement the knowledge-intensive cyber-service environment for the domain-specific business vendors. Our approach provides an ACT solution to transform the physical-vendors into cyber-vendors or e-vendors with the low-cost, high-availability, economical. At the same time, we put the forward the concept of Knowledge-intensive Model as a Service (KMaaS) to meet the need of enhance the productivity and service pattern reshaping |
6,116 | Please write an abstract with title: Comparison Between Different Versions of INPE’S Fire Risk Model for the Brazilian Biomes, and key words: Biological system modeling, Wind speed, Ecosystems, Vegetation mapping, Spatial databases, Biomass, Fuels. Abstract: Fires are intrinsic disturbances in ecosystems functioning and structure in fire-prone biomes. In recent decades there has been an increase in the number of fire events in Brazilian biomes, especially due to misuse of fire in the land use and deforestation. The spatial and temporal pattern fire risk is a important way to understanding the seasonality and intensity of fire in different climate and fuel conditions. However, consistent long-term assessment at biome level is only possible with the support of remote sensing and modeling information. Thus, the objective of this work was to evaluate the fire risk patterns for the Brazilian biomes in the last years (2015-2018), using the new version of INPE’s fire risk (FR, v2). Regarding the temporal and spatial FR patterns by this new version from FR model, we evaluated that elevation and latitude correction factors, as well as the meteorological and land cover datasets with finer spatial scales can be contributed to adjust better the fire season vulnerability, notably in the less prone-biomes, such as Mata Atlantica, Pampa and Pantanal. However, there is still a need for adjustment to match the spatial active fire distribution, considering a biomass (fuel) map and the vegetation water status indicators. These improvements help to inform with more accuracy the most fire prone areas to define the strategies and decisions for fire combat and management. |
6,117 | Please write an abstract with title: Interactions Observed Between Torus and Solenoid Superconducting Magnets at JLab, and key words: Magnetic noise, Magnetic shielding, Superconducting magnets, Solenoids, Coils, Valves, Saturation magnetization. Abstract: The Jefferson Lab 12 GeV Upgrade of Experimental End Station Hall B required a new detector system that would be more sensitive to forward going particles and able to handle higher luminosity. This new detector is CLAS12 and includes two superconducting iron-free magnets - a torus and an actively-shielded solenoid. The torus magnet consists of 6-trapezoidal racetrack-type coils while the solenoid is an actively shielded 5 T magnet. The torus and the solenoid are located in close proximity to one another and are surrounded by sensitive particle detectors. The torus and solenoid, operating at 3770 A and 2416 A respectively, were commissioned successfully and are operating normally. This paper presents observed electromagnetic interactions which include induced static mechanical loads and inductive coupling as well as a summary of some of the cryogenic interactions and how they are mitigated. |
6,118 | Please write an abstract with title: Performance of PHY and MAC layers of a Bluetooth piconet in multi-Bluetooth interference environment, and key words: Physical layer, Bluetooth, Personal area networks, Interference, Additive white noise, Gaussian noise, Frequency, Working environment noise, Signal to noise ratio, Error analysis. Abstract: Operating in the 2.4 GHz unlicensed ISM band, a Bluetooth piconet inevitably encounters interference from other Bluetooth piconets. In the literature, the focus has been mainly on the analysis of the collision probability ( P/sub c/) of a Bluetooth packet. The destructive effect of packet collisions could be mitigated by the attenuation introduced by the propagation distance. We present a method to compute the packet error rate (PER) over distance in the presence of multiple Bluetooth piconets. The numerical results give insights on how to choose the optimum packet type in a multi-Bluetooth interference environment. |
6,119 | Please write an abstract with title: Abstraction of assembler programs for symbolic worst case execution time analysis, and key words: Computer aided software engineering, Real time systems, Performance analysis, Assembly systems, State-space methods, Space exploration, Embedded system, Permission, Computer architecture, Timing. Abstract: Various techniques have been proposed to determine the worst case execution time of real-time systems. For most of these approaches, it is not necessary to capture the complete semantics of the system. Instead, it suffices to analyze an abstract model provided that it reflects the system's execution time correctly. To this end, we present an absuaction technique based on program slicing that can be used to simplify software systems at the level of assembler programs. The kiy idea is to determine a minimal set of instructions such that the control flow of the program is maintained. This abstraction is essential for reducing the runtime of the analysis algorithms, in particdar, when symbolic methods are used to perform a complete state space exploration |
6,120 | Please write an abstract with title: Personalized Learning using Multiple Kernel Models, and key words: Learning systems, Information processing, Task analysis, Kernel. Abstract: This paper considers a personalized learning system with a large number of users each trying to learn a desired task. The user learning tasks have similarities as each of the users have common attributes. However, the learning tasks are each slightly different as the tasks are personalized to each learning system. There is also the concern that each learning system may not receive enough data to learn its desired task. To account for this a few canonical learners receive all the data from each personalized learning system. Each personalized learning system then takes a weighted sum of the canonical learners to realize their desired task. Here we will consider learning via kernel methods. |
6,121 | Please write an abstract with title: An approach to SAR imaging by means of non-uniform FFTs, and key words: Radar polarimetry, Interpolation, Computational efficiency, Testing, Image analysis, Frequency domain analysis, Backscatter, Fourier transforms, Numerical simulation, Performance analysis. Abstract: In this study, the potential use of the non-uniform FFT (NUFFT) in SAR imaging is analyzed. The main objective has been the improvement of the computational efficiency and image accuracy of seismic migration SAR processing. Different NUFFT methods have been implemented and tested in order to choose an adequate technique for the imaging problem. Our approach consists in substituting both the Stolt interpolation and the final range inverse FFT, in the /spl omega/-k algorithm, by a single NUFFT. Numerical simulations illustrate the performance of the new method and the influence of the selection of NUFFT parameters in the precision and computation time of the SAR imaging algorithm. |
6,122 | Please write an abstract with title: Telecommunication Planning for Rural Development, and key words: Telephony, Technological innovation, Communications technology, Space technology, Power generation economics, Environmental economics, Satellite broadcasting, Artificial satellites, TV, Power system planning. Abstract: The major premise of this paper is that telecommunication services can play Important roles in rural development. The authors argue that the implementation of a telecommunication infrastructure should be a high priority for development planners. An analysis is presented of the application of telecommunication in rural economic development, sociopolitical organization, and the extension of basic social services. The authors cite examples of applications of two-way audio communication and conference-circuits for remote areas. The advantages of satellites for providing telecommunication services to rural settlements are presented, and communication policy options for developing regions are outlined. |
6,123 | Please write an abstract with title: McClellan transformations for two-dimensional digital filtering-Part II: Implementation, and key words: Digital filters, Finite impulse response filter, Two dimensional displays, Laboratories, Filtering, Nonlinear filters, Biographies, Arithmetic, Design methodology. Abstract: A family of 2-D structures is presented for implementing 2-D FIR digital filters designed by means of a transformation of a 1-D design. These implementations are computationally efficient for filters up to degree 50 x 50 and are straightforward to program or build in hardware. Many details of the implementations are discussed such as its susceptibility to coefficient quantization and arithmetic roundoff. A comparison is made between these implementations and other implementations for 2-D FIR filters. |
6,124 | Please write an abstract with title: GNSS Interference Source Tracking using Kalman Filters, and key words: Interference, GNSS, Tracking, Kalman Filter, Geo-localization. Abstract: Modern infrastructure and a myriad of services rely on positioning and timing information provided by Global Navigation Satellite Systems (GNSS) and in particular the Global Positioning System (GPS). However, given their low received signal power levels, GNSS signals are vulnerable to Radio Frequency Interference (RFI), either from non-intentional or intentional (jamming), sources. Hence, GNSS itself has become a critical infrastructure which must be protected. Since RFI source is unknown a priori, passive localization systems consisting of spatially distributed Sensor Nodes (SNs) are needed to geo-locate the RFI. These systems typically use source Angle of Arrival (AOA), Time Difference of Arrival (TDOA) or a combination of AOA/TDOA measurements which are non-linear in nature, to estimate the RFI position. Also, dynamics associated with the RFI source(s) further complicates the geo-localization process. This paper explores and reports on the use of various Kalman Filters in combining AOA and TDOA measurements for efficient geo-localization and tracking of dynamic and stationary RFI sources based on real measurements from one such geo-localization system. We report on and contrast the geo-localization accuracies and computational complexities of the Extended, Unscented and Single Propagation Unscented Kalman Filters along with the traditional snap-shot approach. |
6,125 | Please write an abstract with title: Change Management Towards Digitalization And Innovation, and key words: Industries, Digital transformation, Companies, Production, Real-time systems, Stakeholders. Abstract: Purpose: The issue of this paper is the conceptualization of a digital transformation concept which supports both, digitalization and innovation. This is caused in the reason that organizations need appropriate circumstances in order to cope with challenges concerning digital transformation. Thus, this paper provides practical starting points in order to support firms in terms of their change towards digitalization.Design/methodology/approach: The paper is based on practical experiences, literature research and expert interviews concerning digitalization in companies. First of all benefits as well as resulting challenges arising out of digitalization will be presented in order to show the importance of digital issues for companies. Grounded on these insights a transformation model for the digital turn around will be created based on theoretical issues such as change management or sensemaking.Findings: The concept provides practical implication and measurements for a structured change. Hereby companies should first of all focus on the corporate culture due to the fact that culture is the most important enabler or hinderer for any kind of change. This includes the modification of the corporatés vision, values as well as the behaviour of executives and proper working condition as well. Moreover, digitalization will be linked to information management in order to underline the importance of the so called horizontal integration due to the fact that networking is the basis for cooperative change processes (Spath, 2013).Research/practical implications: The paper includes implications for the change management towards digitalization and innovation. The provided digital transformation concept serves as a guideline for managing the challenges in terms of digitalization and innovation processes.Originality/value: This paper fulfils an identified need in order to cope with the current issue digitalization that will change our whole life rapidly and extremely. In order to be prepared organizations, need to know how to deal with the challenges concerning digitalization. Only if they are prepared, e.g. by using a digital transformation concept companies are able to see not only the challenges but also the chances evolve out of digital issues. |
6,126 | Please write an abstract with title: Defect detection in analog and mixed circuits by neural networks using wavelet analysis, and key words: Intelligent networks, Neural networks, Wavelet analysis, Circuit testing, Artificial neural networks, CMOS digital integrated circuits, Discrete wavelet transforms, Current supplies, Integrated circuit testing, Fast Fourier transforms. Abstract: An efficient defect-oriented parametric test method for analog & mixed-signal integrated circuits based on neural network classification of a selected circuit's parameter using wavelet decomposition preprocessing is proposed in this paper. The neural network has been used for detecting catastrophic defects in two experimental analog & mixed-signal CMOS circuits by sensing the abnormalities in selected parameters, observed under defective conditions and by their consequent classification into a proper category. To reduce complexity of the neural network, wavelet decomposition is used to perform preprocessing of the analyzed parameter. Moreover, we show that wavelet analysis brings significant enhancement in the correct classification, and makes the neural network-based test method extremely efficient & versatile for detecting hard-detectable catastrophic defects in analog & mixed-signal circuits. |
6,127 | Please write an abstract with title: Bilateral Fast Low-Rank Representation With Equivalent Transformation for Subspace Clustering, and key words: Null space, Sparse matrices, Streaming media, Singular value decomposition, Minimization, Matrix decomposition, Clustering algorithms. Abstract: In recent years, low-rank representation (LRR) has received increasing attention on subspace clustering. Due to inevitable matrix inversion and singular value decomposition in each iteration, however, most of existing LRR algorithms may suffer from high computational complexity, and hence can not cope with the large-scale sample data commendably. To overcome this problem, in this paper, we propose a bilateral fast low-rank representation (BFLRR), which has a linear time complexity with respect to the number of samples. Specifically, we introduce the equivalent transformation method to remove the null spaces of both the columns and rows of the coefficient matrix so that a hypercompact coefficient matrix can be learned. Furthermore, the proposed BFLRR is embedded into a distributed framework as DFC-BFLRR to make it more efficient, which utilizes a combination of the global and local projection matrices. Extensive experiments are carried out on real datasets, and the results testify that the proposed methods not only perform faster-computing speed but also obtain favorable clustering accuracy in comparison with the competing methods among large-scale sample data. |
6,128 | Please write an abstract with title: Modulation based time resolved laser scanning microscopy, and key words: Delay, Phase modulation, Phase detection, Optical imaging, Optical modulation, Optical amplifiers, Lasers and electrooptics, Optical microscopy, Image resolution, Signal detection. Abstract: We are reporting implementation of high quality time resolved laser scanning microscopy through modulation techniques. Inexpensive and commercially available electronics and mechanical optical modulator were integrated with an externally triggered laser scanning microscope to form a phase sensitive lock-in detection imaging system. The unique mapping capability enabled allows time resolved imaging of luminescent samples and photo-sensitive devices. |
6,129 | Please write an abstract with title: Constructing Reliable Network Of Biomarker Covariance By Joint Data Harmonization And Graph Learning, and key words: Neuroimaging, Correlation, Network topology, Magnetic resonance imaging, Sociology, Redundancy, Reliability, Noise measurement, Replicability, Biomedical imaging. Abstract: Networks of biomarker covariance based on neuropathological events or neuro-degeneration degree is important to understand genetic influence and trophic reinforcement in the brain development/aging process. It is a common to quantiry the covariance of inter-subject biomarker profiles by linear correlation metrics such as Pearson’s correlation. Due to the heterogeneity and noise in the observed neurobiological data, however, it is difficult to construct a reliable covariance network using gross statistical measurement. To this, we propose a graph learning approach to infer the brain connectivity based on the harmonized inter-subject biomarker profiles. Specifically, we progressively estimate brain network until region-to-region connectivities reach the largest consensus of biomarker covariance across individuals. A better understanding of the network topology allows us to harmonize the neurobiological data effectively which eventually facilitates the graph inference. Since the network of biomarker covariance represents the region-wise associations in the entire population, we further promote diversity by adaptively penalizing the predominant influence from a group of biomarker profiles exhibiting statistically correlated patterns. We applied our method to the cortical thickness from MRI and amyloid-beta burden from PET images, which are biomarkers in Alzheimer’s disease (AD). Enhanced statistical power and replicability have been achieved by our approach in identifying network alterations between cognitive normal (CN) and AD cohorts. |
6,130 | Please write an abstract with title: Integrity Auditing with Attribute based ECMRSA Algorithm for Cloud Data Outsourcing, and key words: Cloud computing, Servers, Protocols, Data integrity, Cryptography, Databases, Outsourcing. Abstract: Cloud computing is a vast area within which large amounts of data are exchanged through cloud services and has fully grown with its on-demand technology. Due to these versatile cloud services, sensitive data will be stored on cloud storage servers and it is also used to dynamically control a number of problems: security, privacy, data privacy, data sharing, and integrity across cloud servers. Moreover, the legitimacy and control of data access should be maintained in this extended environment. So, one of the most important concepts of cryptographic techniques in cloud computing environment is Attribute Based Encryption (ABE). In this research work, data auditing or integrity checking is considered as an area of concern for securing th cloud storage. In data auditing approach, an auditor inspects and verifies the data file integrity without having any knowledge about the content of file and sends the verification report to the data owner. In this research, Elliptical Curve Modified RSA (ECMRSA) is proposed along with Modified MD5 algorithm which is used for attribute-based cloud data integrity verification, in which data user or owner uploads their encrypted data files at cloud data server and send the auditing request to the Third-Party Auditor (TPA) for verification of their data files. The Third-Party Auditor (TPA) challenges the data server for ensuring the integrity of data files on behalf of the data owners. After verification of integrity of data file auditor sends the audit report to the owner. The proposed algorithm integrates the auditing scheme with public key encryption with homomorphic algorithm which generates digital signature or hash values of data files on encrypted files. The result analysis is performed on time complexity by evaluating encryption time, GenProof time and VerifyProof Time and achieved improvement in resolving time complexity as compared to existing techiques. |
6,131 | Please write an abstract with title: Integrating Multiple Policies for Person-Following Robot Training Using Deep Reinforcement Learning, and key words: Task analysis, Robots, Training, Navigation, Smoothing methods, Reinforcement learning, Collision avoidance. Abstract: Given a training environment which follows Markov decision process for a specific task, a deep reinforcement learning (DRL) agent is able to find possible optimal policies which map states of the environment to appropriate actions by repeatedly trying various actions to maximize training rewards. However, the learned policies cannot be reused directly in the training process for other new tasks resulting wasted precious time and resources. To solve this problem, we propose a DRL-based method for training an agent capable of selecting the appropriate policy for current state of the environment from a set of previously trained optimal policies for a given task which can be decomposed into other sub tasks. We implement our proposed method to a person-following robot task training that can be broken down into three sub tasks, namely: navigation, left attending, and right attending. Using the proposed method, the previously learned optimal navigation policy obtained from our previous work is integrated to attending policies which are trained in this study. We also introduce the use of weight-scheduled action smoothing which is able to stabilize actions generated by the agent in the attending task training. Our experiment results show that the proposed method is able to integrate all sub policies using the action smoothing method even though the navigation and the attending policies have dissimilar input structures, unalike output ranges, and are trained in different ways. Moreover, our proposed method shows better results compared to training from scratch and training using transfer learning strategy. |
6,132 | Please write an abstract with title: Publishing Private High-dimensional Datasets: A Topological Approach, and key words: Wireless communication, Privacy, Differential privacy, Publishing, Topology, Data mining, Mobile computing. Abstract: Publishing datasets is a key part of data mining and analysis. Handling datasets containing a large number of attributes is a major challenge for analyzing these datasets. Ensuring the privacy of personal and sensitive information is also represent another main challenge. In this paper, we will show how concepts from algebraic topology, and in particular persistent homology can be used for publishing differentially private datasets. We will propose a sampling-based framework to explore the dependencies among all attributes and subsequently build a dependency graph. From the dependency graph, we will regenerate the sub-graphs privately and publish an anonymized, synthetic datasets. Evaluation results demonstrate that our method achieves superior performance when compared to other methods in the literature. |
6,133 | Please write an abstract with title: IT Governance and Green IT: a systematic review, and key words: Green products, Organizations, Information technology, Energy efficiency, Taxonomy, Sustainable development, Monitoring. Abstract: This work is related to the IT (Information Technology) Governance and Green IT (Information Technology), specifically practices used by organizations. Every day, a greater number of organizations around the world are implementing new practices about Green IT; however, these are not connected with organizational management and governance. For that, is necessary a new framework to implement the governance of Green IT. About these factors, the authors show a taxonomy that classify the most important investigations about governance and Green IT. The authors have studied around 100 selected researches about this theme, and this article pretends schematize that information about Green IT practices and IT Governance frameworks. In detail the steps are the following: 1. Define the themes: “Green IT” and “IT Governance”. 2. Elapsed time: last ten and twenty years respectively. 3. Search key Words about: “IT Governance” and “Green IT” 4. Build logical expressions using key words. 5. Select scientific data bases. Beginning with Google Scholar, ascending to Elsevier, IEE Explore, Springer, and so on. 6. The articles founded are filtered: Title, Abstract, Diagonal reading. 7. Of the most important articles is extracted: Publication Date, Authors, Abstract (owner words), Methodology, Useful things, Article gaps -> source for unsolved problems. 8. Create a table and propose a new taxonomy and so on. 9. Discussion. |
6,134 | Please write an abstract with title: Foreword, and key words: Electronics packaging, Environmentally friendly manufacturing techniques, Lead, Components, Packaging, and Manufacturing Technology Society, Electronic packaging thermal management, Materials reliability, Organizing, Asia, Integrated circuit packaging, Wire. Abstract: Presents the welcome message from the conference proceedings. |
6,135 | Please write an abstract with title: Optimal Scheduling Method for Cogeneration System Based on Heat Storage Device, and key words: Cogeneration, Resistance heating, Wind power generation, Power systems, Boilers, Thermal loading. Abstract: In the north of China, the problem of wind abandonment is very serious. In order to improve the ability of wind power consumption, a cogeneration system with an electric boiler is proposed. First, the mathematical model of the minimum power generation cost of the traditional unit and the optimized model are established. Second, the model is solved by using the particle swarm optimization algorithm. In addition, a power structure of combined heat and power system (CHP) is constructed for simulation experiments. Through experimental analysis, proving the feasibility of the model. Finally, Simulation results show that making the electric boiler work in the period of wind abandonment can effectively alleviate the wind abandonment phenomenon. It also can provide more space for the wind power and enhance the wind power consumption. |
6,136 | Please write an abstract with title: Deep Poisoning: Towards Robust Image Data Sharing against Visual Disclosure, and key words: Training, Visualization, Computer vision, Toxicology, Conferences, Training data, Image representation. Abstract: Due to respectively limited training data, different entities addressing the same vision task based on certain sensitive images may not train a robust deep network. This paper introduces a new vision task where various entities share task-specific image data to enlarge each other’s training data volume without visually disclosing sensitive contents (e.g. illegal images). Then, we present a new structure-based training regime to enable different entities learn task-specific and reconstruction-proof image representations for image data sharing. Specifically, each entity learns a private Deep Poisoning Module (DPM) and insert it to a pre-trained deep network, which is designed to perform the specific vision task. The DPM deliberately poisons convolutional image features to prevent image reconstructions, while ensuring that the altered image data is functionally equivalent to the non-poisoned data for the specific vision task. Given this equivalence, the poisoned features shared from one entity could be used by another entity for further model refinement. Experimental results on image classification prove the efficacy of the proposed method. |
6,137 | Please write an abstract with title: Clustering Proposal Support for the COVID-19 Making Decision Process in a Data Demanding Scenario, and key words: COVID-19, Coronaviruses, Visualization, Proposals, Urban areas, Subspace constraints, Silicon compounds. Abstract: The COVID-19 disease surprised the world in the last months due to the number of infections and deaths have been increased in an exponential way. Since the pandemic was established by the World Health Organization, different strategies have been proposed for dealing diverse problems in cities that the coronavirus affected. This work presents a method to decision making support processes, specifically in environment with few data and variables to be considered. Thus, artificial neural networks architectures were employed to cluster the information available in the Bogota city, and provide a tool that allows generating additional findings in a simultaneous mode, and expressed as a visual map. The present proposal reached sensitivity measures around 75%, obtaining 100% for the best cases. |
6,138 | Please write an abstract with title: Fuzzy Logic Control of Heartrate by Electrical Block of Vagus Nerve, and key words: Electrodes, Fuzzy logic, Heart rate, Action potentials, Platinum, Neural engineering, Linguistics. Abstract: Although vagus nerve stimulation (VNS) can be used to reduce heartrate by enhancing parasympathetic activity, a fully controllable intervention would also require a method for downregulating parasympathetic activity. A direct current (DC) block can be applied to a nerve to block its action potential conduction. This nerve block can be used to downregulate parasympathetic activity by blocking afferent reflexes. The damaging effects of reactions that occur at the electrode-nerve interface using conventional platinum electrodes can be avoided by separating the electrode from the nerve. Using a biocompatible, ionically conducting medium, the electrode and the damaging reactions can be isolated in a vessel away from the nerve. This type of electrode has been called the Separated Interface Nerve Electrode (SINE). Fuzzy logic control (FLC) is a controller approach that is well suited to physiological systems. The SINE, controlled by an FLC, was utilized to block a stimulated vagus nerve and regulate heart rate. The FLC was able to maintain the heartrate at a pre-determined setpoint while still achieving instant recovery when the block was removed. |
6,139 | Please write an abstract with title: New ZVS-PWM converters with zero-current-switched auxiliary switch for low power applications, and key words: Switches, Switching converters, Switching circuits, RLC circuits, Resonance, Diodes, Inductors, Switched capacitor circuits, Zero voltage switching, Zero current switching. Abstract: A new family of ZVS-PWM converters, which contain auxiliary resonant circuit, is proposed and designed for low power applications in this paper. The auxiliary circuit consists of a resonant inductor, a resonant capacitor, auxiliary diodes, and an auxiliary switch. The auxiliary circuit is only activated during the main switch turn-on. Also, the added auxiliary circuit of the converter provides soft switching of all switches, which main switch and main diode operate under satisfying ZVS, and auxiliary switch operates under satisfying ZCS. A boost typed converter is selected to describe the operation of the family of ZVS-PWM converter. The converter is analyzed for steady state and graphical state plane. The operation characteristics and performances of the converter have been verified by 100 kHz, 90 W breadboarded boost typed converter. |
6,140 | Please write an abstract with title: Optimal Rate-Distortion-Leakage Tradeoff for Single-Server Information Retrieval, and key words: Privacy, Protocols, Databases, Rate-distortion, Information retrieval, Size measurement, Particle measurements. Abstract: Private information retrieval protocols guarantee that a user can privately and losslessly retrieve a single file from a database stored across multiple servers. In this work, we propose to simultaneously relax the conditions of perfect retrievability and privacy in order to obtain improved download rates in the single server scenario, i.e., all files are stored uncoded on a single server. In particular, we derive the optimal tradeoff between download rate, distortion, and information leakage when the file size is infinite and the information leakage is measured in terms of the average success probability for the server of correctly guessing the identity of the requested file. Moreover, we present a novel approach based on linear programming to construct schemes for a finite file size and an arbitrary number of files. When the database contains at most four bits, this approach can be leveraged to find provably optimal schemes. |
6,141 | Please write an abstract with title: Lévy Firefly Algorithms Applied to Improve Sequential Adaptive Processing for Fetal Electrocardiograms (FECGs), and key words: Computers, Adaptive systems, Sensitivity, Filtering, Adaptive filters, Interference, Electrocardiography. Abstract: Previously published results demonstrated that a sequential combination of adaptive linear prediction (LPC), adaptive noise cancellation (ANC), and adaptive comb filtering (CF) can effectively remove maternal interference from noninvasive fetal ECGs. More recent research results have verified that the bio-inspired Lévy Flight Firefly Algorithm (LFFA) can be effectively applied to many different forms of linear and non-linear adaptive filter structures, including low sensitivity IIR adaptive structures that could not be used with steepest descent adaptive algorithms due to their multimodal characteristics. This paper presents results obtained when using the LFFA algorithm in various stages of the FECG sequential combination processing. |
6,142 | Please write an abstract with title: Learning Optimality Theory for Accuracy-Based Learning Classifier Systems, and key words: Task analysis, Tuning, Evolutionary computation, Reliability, Sociology, Statistics. Abstract: Evolutionary computation has brought great progress to rule-based learning but this progress is often blind to the optimality of the system design. This article theoretically reveals an optimal learning scheme on the most popular evolutionary rule-based learning approach-the accuracy-based classifier system (or XCS). XCS seeks to form accurate, maximally general rules that together classify the state space of a given domain. Previously, setting up the system to perform well has been a “blackart” as no systematic approach to XCS parameter tuning existed. We derive a theoretical approach that mathematically guarantees that XCS identifies the accurate rules, which also returns a theoretically valid XCS parameter setting. Then, we demonstrate our theoretical setting derives the maximum correctness of rule-identification in the fewest iterations possible. We also experimentally show that our theoretical setting enables XCS to easily solve several challenging problems where it had previously struggled. |
6,143 | Please write an abstract with title: Manufacturing Consent: The Modern Pandemic of Technosolutionism, and key words: COVID-19, Epidemics, Human factors, Social factors. Abstract: As our first issue of the Transactions went to publication, the COVID19 crisis fully gripped the globe. While this was not the first time that such a disease had threatened to keep the world at gridlock, very few of us could have imagined the full extent of the socio-economic impacts of a dynamic global pandemic zoonoses. In recent history, we can point to the Severe Acute Respiratory Syndrome (SARS) novel coronavirus epidemic first identified in 2003, as having infected humans in the Guangdong province of China in 2002. We then had the Asian highly pathogenic AVIAN Influenza (H5N1) virus making a strong resurgence in 2006, that was first detected in geese in China in 1996, with some sporadic infections in humans occurring in 1997 during a poultry outbreak in Hong Kong. Finally, the swine flu (H1N1) outbreak in 2009 which had an estimated 700 million to 1.4 billion confirmed cases (between 11%–21% of the global population), and concluded with a vaccine [item 1) in the Appendix]. Each of these diseases have had catastrophic impacts on people, supply chains, infrastructure, and the economy but none more than COVID19, also known as SARS-CoV-2. According to a situational report by the World Health Organization on May 5, 2020, there were 3 517 345 confirmed COVID19 cases and 243 401 of these eventuated in death (approximately 6.92% of confirmed cases) [item 2) in the Appendix]. When considering these statistics, we should also note such numbers as a proportion of the total global population. |
6,144 | Please write an abstract with title: A Deep Learning Approach for Understanding Device Behavior in Smart Building Networks, and key words: Performance evaluation, Protocols, Smart buildings, Neural networks, SCADA systems, Telecommunication traffic, Bayes methods. Abstract: Securing critical infrastructure networks requires a detailed understanding of the devices that are connected to the network and how networking resources are being used. In this paper, we present a novel technique that focuses on describing device behavior by analyzing and classifying the observed network traffic patterns, and demonstrate how this technique augments existing Machine Learning (ML) models for the detection and classification of networked devices. In our research, we primarily focus on techniques for the classifying of Supervisory Control and Data Acquisition (SCADA) networks that often run as an overlay on top of the Internet Protocol (IP). The prevalence of IP networks within manufacturing and industrial sites adds a layer of vulnerability and makes it a primary target for attacks by malicious actors. By design, the IP network often carries critical SCADA traffic as well as other Information Technology (IT) traffic with different security constraints. We will share our initial results obtained using an optimized implementation of a Bayesian Neural Network (BNN) used to classify SCADA devices and alternatively, to characterize networked devices behaviors for unknown protocols. We will present two scenarios and discuss the performance of BNN: In one scenario, we use an application protocol parser for Building Automation Control Network over IP (BACnet/IP) and show how the specific protocol features can be used for classifying devices. In a second scenario we assume that we cannot parse the application protocol messages and use features derived from the underlying User Datagram Protocol (UDP) for our classification. We will discuss the benefits and shortcomings of each method and discuss how the method for analyzing UDP can be used to quickly formulate an initial point of view on the network being studied by classifying devices based on their pattern of behavior independent of what application protocol they use. This approach presents a significant advantage when the messages between the devices cannot be decoded. |
6,145 | Please write an abstract with title: Impact of Total Harmonic Distortion in SWIPT Enabled Wireless Communication Networks, and key words: Wireless communication, High power amplifiers, Total harmonic distortion, Transmitters, Mean square error methods, Receivers, Power system harmonics. Abstract: In this article, the impact of high power amplifier non-linearity namely harmonic distortion in simultaneous wireless information and power transfer (SWIPT) power splitting system (PS) is analyzed. Here the SWIPT transmitter with a high power amplifier follows IQ modulation and the receiver is equipped with a power splitting architecture. The harvested energy and signal to noise ratio (SNR) with and without harmonic distortion are determined. The mean square error of harvested energy is observed as −86.8 dBm (8.4e-06) and that of the received SNR is 49.24 dB (137.68). |
6,146 | Please write an abstract with title: POWER CONSUMPTION MANAGEMENT SYSTEM (PCMS) IN WIRED NETWORKS USING ADAPTIVE GENETIC ALGORITHM, and key words: Phase change materials, Power demand, Adaptive systems, Wireless networks, Conferences, Quality of service, Energy efficiency. Abstract: Power consumption in both wired and wireless networks is becoming an increasingly important concern across the world. Most scholars have concentrated on wireless, so we have taken wired networks as our focus. Wired network operators had an increased network concern to meet the decrease in traffic levels from which service quality (QoS) is achieved and maximize power consumption. To achieve the QOS and power consumption in a wired network, we provided comprehensive Power Consumption Management (PCMS) research modules that provide current and future access networks. The results of PCMS are being tested out with the genetic algorithm gives us the best-optimized module. |
6,147 | Please write an abstract with title: Unified power quality conditioner with shared legs and high-frequency transformer, and key words: DC-DC power converters, Voltage control, Switches, Pulse width modulation, Bridge circuits, Legged locomotion. Abstract: This work proposes a three-phase unified power quality conditioner based on a nine-leg converter composed of three single-phase three-leg cells with shared legs and connecting the three DC-links by means of a DC-DC converter with a high-frequency transformer (HFT). Each DC-link is connected to a high frequency H-bridge and each H-bridge is connected to one winding of the transformer. The high-frequency transformer is responsible to balance the DC-links, providing the necessary power flow. Converter model is provided, as well as pulse-width modulation and control strategy. Simulations and experimental results are presented for validation purposes. The proposed converter is compared with a conventional solution in terms of harmonic distortion. |
6,148 | Please write an abstract with title: The art of requirements triage, and key words: Subspace constraints, Personnel, Medical treatment, Scheduling, Economic forecasting, Product development, Art, Layout, Resumes, Constraint optimization. Abstract: Driven by an increasingly competitive market, companies add features and compress schedules for the delivery of every product, often creating a complete mismatch of requirements and resources that results in products failing to satisfy customer needs. Triage is the process of determining which requirements a product should satisfy given the time and resources available. The author presents three product development case studies and 14 recommendations for practicing this neglected art. |
6,149 | Please write an abstract with title: Technology mapping and packing for coarse-grained, anti-fuse based FPGAs, and key words: Field programmable gate arrays, Logic programming, Libraries, Reconfigurable logic, Logic circuits, Multiplexing, Application specific integrated circuits, Circuit testing, Consumer electronics, Programmable logic arrays. Abstract: We present a new synthesis flow for antifuse based FPGAs with multiple-output logic cells. The flow consists of two steps: mapping and packing. The mapper finds mapping solutions using a dynamic programming-based approach that finds the best match at each node of the decomposed target circuit. After this mapping step is completed, the resulting netlist of cells is optimally packed into net list of logic cells by using a multidimensional coin change problem formulation which is again solved by a dynamic programming based approach. Experimental results for Quicklogic's pASIC3 logic family are provided to assess the effectiveness of the proposed mapping and packing techniques. |
6,150 | Please write an abstract with title: Decentralized algorithms for vehicle routing in a stochastic time-varying environment, and key words: Routing, Stochastic processes, Unmanned aerial vehicles, Mobile robots, Remotely operated vehicles, Adaptive systems, Surveillance, Intelligent sensors, Aerospace engineering, Automotive engineering. Abstract: In this paper we present decentralized algorithms for motion coordination of a group of autonomous vehicles, aimed at minimizing the expected waiting time to service stochastically-generated targets. The vehicles move within a convex environment with bounded velocity, and target generation is modeled by a spatio-temporal Poisson process. The general problem is known as the m-vehicle dynamic traveling repairperson problem (m-DTRP); the best previously known control algorithms rely on centralized a-priori task assignment and locational optimization, and are of limited applicability in scenarios involving ad-hoc networks of autonomous vehicles. In this paper, we present a new class of algorithms for the m-DTRP problem that: (i) are spatially distributed, scalable to large networks, and adaptive to network changes, (ii) are provably locally optimal in the light load case, and (iii) achieve the same performance as the best known centralized algorithms in the heavy-load, single-vehicle case. Simulation results are presented and discussed. |
6,151 | Please write an abstract with title: The Network Reliability Assessment and Risk Prevention Measures for the Power System of Kazakhstan Due to High Renewables, and key words: Power system dynamics, Power system stability, Tools, Stability analysis, Power system reliability, Mathematical model, Load modeling. Abstract: The electricity generation mix in Kazakhstan will be changed due to pushing up the share of intermittent renewables (RE) in the next two decades. The fulfillment of the expected demand for electricity in 2035 can lead to issues when the transmission capacity limit and permissible power surge are reached. In this paper analyzed two scenarios when renewable generation output in South Kazakhstan dropdown for 50% and 80%. Permissible power surge in the north-south transit according to the dynamic stability conditions and their impact on the network reliability were assessed. The short-term (8 seconds) operating edges of the power system to avoid unstable regimes were calculated using the Power Factory modeling tool. Optimal Power Flow (OPF) modeling approach was used for the technical and economic assessment of the impact of RE penetration in the electric power system of the Republic of Kazakhstan. To conclude, mathematical modeling of the optimal distributed mix of the mass deployment of solar and wind RE could minimize the dynamic instability and violation of power balance in the network. |
6,152 | Please write an abstract with title: Investigating Spiking Neural Networks for Energy-Efficient On-Board AI Applications. A Case Study in Land Cover and Land Use Classification, and key words: Potential energy, Energy consumption, Satellites, Quantization (signal), Data preprocessing, Pipelines, Energy efficiency. Abstract: Spiking neural networks have been attracting the interest of researchers due to their potential energy efficiency. This feature makes them appealing for applications on board CubeSats or small Earth observation satellites, given their strict energy consumption requirements. However, the performance of spiking neural networks in terms of the accuracy on the space-scene classification datasets, and their benefits with respect to the energy efficiency still remain to be demonstrated. This work is a preliminary investigation on deploying spiking neural networks to land cover and land use classification problems. To train a spiking model, a VGG-16-based artificial neural network has been trained on EuroSAT RGB benchmark dataset. The parameters of this network were then used to initialise a spiking model, which was optimised by fine-tuning the connection weights and the synaptic filters parameters. By using the mean neuron activations, and the number of time-steps and their width as proxies for the energy consumption of the models, this study shows different trade-offs between accuracy, and energy efficiency, when comparing a spiking model to the deep learning approach. Moreover, some additional input data preprocessing strategies are investigated as a method of further enhancement of the energy benefits of the spiking models. |
6,153 | Please write an abstract with title: Machine Translation Evaluation using Textual Entailment for Arabic, and key words: Measurement, Social networking (online), Semantics, Tools, Machine translation, Security, Task analysis. Abstract: Textual entailment is a generic task aiming to capture semantic inference between two text fragments. It has been applied so far to improve many natural language applications such as Question Answering and Information Extraction for the English language. This work aims to exploit results obtained for Textual Entailment in machine translation evaluation to Arabic. We show that the output of a system built for textual entailment recognition for Arabic can be used to serve as a metric to evaluate machine translation into Arabic. Despite the simplicity of the concepts and techniques., this metric has realized competitive results in comparison to state-of-the-art tools in terms of correlation with human judgments. |
6,154 | Please write an abstract with title: Exact Recovery Threshold in Dynamic Binary Censored Block Model, and key words: Measurement, Maximum likelihood estimation, Maximum likelihood detection, Sufficient conditions, Heuristic algorithms, Convex functions, Information theory. Abstract: This paper considers community detection in the dynamic binary censored block model. Under this model, the graph is observed at successive times (snapshots), and the node label in the current snapshot is dependent on the same node label in the previous τ snapshots. In this paper, the maximum likelihood estimator of the current node labels is obtained under this model, subject to the observation of the graph in the present and past snapshots, and the exact recovery conditions are derived. Relaxing the maximum likelihood estimator, a semidefinite programming algorithm is proposed for community detection. In the asymptotic regime, a sufficient condition for exact recovery is obtained using the semidefinite programming estimator, which is shown to asymptotically match the sufficient conditions for exact recovery. |
6,155 | Please write an abstract with title: Radio Environment Map Construction with Joint Space-Frequency Interpolation, and key words: Correlation, Shadow mapping, Interpolation, Frequency measurement, Radio propagation, Mathematical model, Wireless communication. Abstract: In this paper, we propose a radio environment map (REM) construction method that interpolates the received signal power over not only the spatial domain but also the frequency domain. REM is a tool for analyzing radio propagation, which is typically defined as a map that stores the received signal power. Crowdsourcing with spatial interpolation (e.g., Kriging) can accurately construct the REM, and the accurate REM improves the efficiency of spectrum use. However, crowdsourcing can only be performed over frequencies in which the mobile terminals can perform the sensing. Thus, conventional REM construction may only improve the spectral efficiency in the frequency in which the sensing can be performed. Our proposed method focuses on the fact that the average received signal power, which consists of path loss and shadowing, shows a strong correlation over the frequency domain. We show that utilizing correlations over both frequency and spatial domains can construct the REM even if the datasets are not available at the estimated environment. |
6,156 | Please write an abstract with title: Automatic language acquisition by an autonomous robot, and key words: Robotics and automation, Cognitive robotics, Robot sensing systems, Cognition, Robot vision systems, Auditory system, Stereo vision, Control systems, Decision making, Natural languages. Abstract: There is no such thing as a disembodied mind. We posit that cognitive development can only occur through interaction with the physical world. To this end, we are developing a robotic platform for the purpose of studying cognition. We suggest that the central component of cognition is a memory which is primarily associative, one where learning occurs as the correlation of events from diverse inputs. We also posit that human-like cognition requires a well-integrated sensory-motor system, to provide these diverse inputs. As implemented in our robot, this system includes binaural hearing, stereo vision, tactile sense, and basic proprioceptive control. On top of these abilities, we are implementing and studying various models of processing, learning and decision making. Our goal is to produce a robot that will learn to carry out simple tasks in response to natural language requests. The robot's understanding of language will be learned concurrently with its other cognitive abilities. We have already developed a robust system and conducted a number or experiments on the way to this goal, some details of which appear in this paper. This is a first progress report of what we believe will be a long term project with significant implications. |
6,157 | Please write an abstract with title: Ultrasound Imaging of Bottom Opening Crack Based on Frequency-Domain Reverse Time Migration, and key words: Imaging, Acoustic field, Frequency division multiplexing, Computational efficiency, Ultrasonic imaging, Sparse matrices, Extrapolation. Abstract: In 2-dimension (2D), a frequency-domain reverse time migration (FRTM) based on the optimal 9-point finite difference method (FDM) is introduced into the field of ultrasonic non-destructive testing (NDT). This study solves the challenge that conventional ultrasound imaging methods are difficult to image defects completely. In numerical investigations, the use of multiple reflection waves and the necessity of bottom identification are explained. In actual inspection, the method of bottom identification is given, and then the bottom opening crack (BOC) of different lengths in the aluminum block can be completely imaged. Furthermore, the conventional total focusing method (TFM) cannot image the sides of the BOCs using the same data as FRTM. Therefore, the quantitative analysis of BOC based on the complete imaging results of FRTM is more convincing. On this basis, the optimization methods for the number of grid points placed at each wavelength and the frequency calculation range are also given. On the premise of ensuring high image quality, the imaging computation time is reduced to 1/18 of the original, which improves the computing efficiency of the FRTM. |
6,158 | Please write an abstract with title: A Lightweight Underwater Object Detection Model: FL-YOLOV3-TINY, and key words: Wireless communication, Adaptation models, Wireless sensor networks, Neural networks, Object detection, Feature extraction, Mobile communication. Abstract: Due to the variety of underwater object species and small object, the traditional object detection model is difficult to adapt to underwater object detection in accuracy and real-time. In this paper, a lightweight detection model FL-YOLOV3-TINY is proposed, which improves the detection accuracy and real-time performance while shrinking the model size. In FL-YOLOV3-TINY, first, the model reduces the number of parameters by introducing deep separable convolutional module to replace traditional convolutional feature extraction module. Secondly, in order to improve the detection ability of small objects and obtain more delicate image features, FL-YOLOV3-TINY adds the feature size to the three-scale to improve the detection performance. Finally, the CIoU loss regression function is introduced to make the prediction box closer to the actual box. Experiments show that compared with other lightweight models YOLOV3-MobilenetV1 and YOLOV3-Tiny, FL-YOLOV3-TINY has better mAP performance (13.7% and 10.9% increase, respectively) and better real-time perfurmance(6% and 29% increase in FPS, respectively). Meanwhile, the model size is reduced by 43% compared to YOLOV3-Tiny. |
6,159 | Please write an abstract with title: Net-based force-directed macrocell placement for wirelength optimization, and key words: Macrocell networks, Wire, Costs, Simulated annealing, Design methodology, Design automation, Electrostatics, Silicon, Clustering algorithms, Minimization methods. Abstract: We propose a net-based hierarchical macrocell placement such that "net placement" dictates the cell placement. The proposed approach has four phases. 1) Net clustering and net-level floorplanning phase: a weighted net dependency graph is built from the input register-transfer-level netlist. Clusters of nets are then formed by clique partitioning and a net-cluster level floorplan is obtained by simulated annealing. The floorplan defines the regions where the nets in each cluster must be routed. 2) Force-directed net placement phase: a force-directed net placement is performed which yields a coarse net-level placement without consideration for the cell placement. 3) Iterative net terminal and cell placement phase: a force-directed net and cell placement is performed iteratively. The terminals of a net are free to move under the influence of forces in the quest for optimal wire length. The cells with high net length cost may "jump" out of local minima by ignoring the rejection forces. The overlaps are reduced by employing electrostatic rejection forces. 4) Overlap removal and input/output (I/O) pin assignment phase: Overlap removal is performed by a grid-based heuristic. I/O pin assignment is performed by minimum-weight bipartite matching. Placements generated by the proposed approach are compared with those generated by Cadence Silicon Ensemble and the O-tree floorplanning algorithm. On average, the proposed approach improves both the total wire length and longest wire length by 18.9% and 28.3%, respectively, with an average penalty of 5.6% area overhead. |
6,160 | Please write an abstract with title: Polymorphic Measurement Method of FeO Content of Sinter Based on Heterogeneous Features of Infrared Thermal Images, and key words: Feature extraction, Temperature measurement, Temperature distribution, Data mining, Heating systems, Real-time systems, Pallets. Abstract: FeO content of sinter is an important indicator of the quality of sinter. Aiming to overcome the difficulty of detecting the FeO content of sinter in the sintering process in real-time, this paper proposes a polymorphic measurement method for sinter FeO content based on heterogeneous features of infrared thermal images. First, an infrared thermal imager is applied to capture the infrared thermal images of sinter cross section at the tail of the sintering machine, and key frame and region of interest extraction are adopted to reduce the data throughput. Then, the shallow features and deep features that are related to the FeO content are extracted based on the regions of interest. Next, a polymorphic mechanism model is established to obtain the preliminary FeO content, and the sinter quality is divided into three grades according to the preliminary FeO content. Finally, three intelligent models corresponding to the three sinter grades are established to achieve the FeO content prediction based on the extracted heterogeneous features. Results in a sintering plant show that the proposed method can measure the FeO content accurately and provide reliable FeO content data for sintering site. |
6,161 | Please write an abstract with title: Exploiting Knowledge Embedded Soft Labels for Image Recognition, and key words: Knowledge engineering, Training, Correlation, Image recognition, Semantics, Benchmark testing, Birds. Abstract: Objects from correlated classes usually share highly similar appearance while objects from uncorrelated classes are very different. Most of current image recognition works treat each class independently, which ignores these class correlations and inevitably leads to sub-optimal performance in many cases. Fortunately, object classes inherently form a hierarchy with different levels of abstraction and this hierarchy encodes rich correlations among different classes. In this work, we utilize a soft label vector that encodes the prior knowledge of class correlations as extra regularization to train the image classifiers. Specifically, for each class, instead of simply using a one-hot vector, we assign a high value to its correlated classes and assign small values to those uncorrelated ones, thus generating knowledge embedded soft labels. We conduct experiments on both general and fine-grained image recognition benchmarks and demonstrate its superiority compared with existing methods. |
6,162 | Please write an abstract with title: Research and Design of Automatic Testing System for Full Performance of Measuring Instruments, and key words: Performance evaluation, Meters, Crimping, Process control, Control systems, Real-time systems, Test equipment. Abstract: The automatic detection system for full-performance detection of measuring instruments mainly solves the problems of the existing detection platform body cannot be applied to the full-performance detection automatic detection line, cannot be compatible with a variety of tested equipment, low automation level, low detection efficiency, and large area. Design a multifunctional automatic detection device suitable for all types of intelligent electric energy meters, type I concentrators and type III special transformer collection terminals. Used in conjunction with the full-performance testing automated assembly line, error testing and functional testing of a variety of metering equipment can be completed without human intervention. It is conducive to the realization of intelligent optimization control of the detection process, and is conducive to the realization of the intelligent collection and management of detection data. Reduce equipment procurement and operation and maintenance costs, and improve resource utilization. |
6,163 | Please write an abstract with title: Text-based language identification for south african languages, and key words: Integrated circuits, Oils, Indium phosphide, III-V semiconductor materials, Support vector machines, Single photon emission computed tomography, Routing. Abstract: We investigate the performance of text-based language identification systems on the 11 official languages of South Africa, when n-gram statistics are used as features for classification. In particular, we compare support vector machines, likelihood and frequency difference-based classifiers on different amounts of input, text and for various values of n. With as few as 15 words of input text, reliable language identification is possible. Although the support vector macine is generally more accurate as classifier, the additional computational complexity of training this classifier may not be justified in light of the importance of using a large value for n. |
6,164 | Please write an abstract with title: L/spl alpha//sub 2/ satellites in X-ray emission spectra of higher Z elements, and key words: Satellites, Energy measurement, State estimation. Abstract: Summary form only given. The X-ray satellite spectra arising due to the 2p/sub 3/2//sup -1/3x/sup -1/-3x/sup -1/3d/sup -1/ (x/spl equiv/s, p, d) transition array, in elements with Z=73 to 90, have been calculated. While the energies of various transitions of the array have been determined using available Hartree-Fock-Slater data on 1s/sup -1/-2p/sup -1/3x/sup -1/ and 2p/sub 3/2//sup -1/-3x/sup -1/,3x/sup -1/ Auger transition energies and their relative intensities have been estimated by considering cross-sections of singly ionized 2x/sup -1/ (x /spl equiv/ s, p) states and then of subsequent Coster-Kronig and shake off processes. The calculated spectra have been compared with the measured satellite energies in L/spl alpha/ spectra. Their intense peaks have been identified as the observed satellite lines. The one to one correspondence between the peaks in calculated spectra and the satellites in measured spectra has been established on the basis of the agreement between the separations in peak energies and those in the measured satellite energies. It has been established that one satellite observed in the L/spl alpha//sub 2/ region of the X-ray spectra of various elements and named /spl alpha//sub s/ in order of increasing energy are mainly emitted by 2p/sub 3/2//sup -1/3d/sup -1/-3d/sup -2/ transitions. It is observed that the satellite /spl alpha//sub s/ in all these spectra can be assigned to the superposition of three intense transitions namely /sup 3/P/sub 1/-/sup 3/D/sub 1/, /sup 3/D/sub 2/-/sup 3/D/sub 3/ and /sup 3/D/sub 2/-/sup 3/D/sub 1/. The three remaining satellites in /sup 80/Hg namely La/sub 13/, La/sub 14/ and La/sub 17/ are found to have different origin in different elements. The possible contributions of other transitions of the 2p/sub 3/2//sup -1/3x/sup -1/-3x/sup -1/3d/sup -1/ (x/spl equiv/ s, p, d) array having appreciable intensities have also been discussed. |
6,165 | Please write an abstract with title: Condition Monitoring of a IC Engine Fault Diagnosis using Machine Learning and Neural Network Techniques, and key words: Vibrations, Fault diagnosis, Machine learning, Predictive models, Feature extraction, Naive Bayes methods, Fuels. Abstract: This study focuses on real-time condition monitoring of the compressed ignition (CI) engine using the various vibration signatures acquired for the different combinations of fuels. The vibration signals acquired through shear accelerometer by maintaining a constant speed of 1800 rpm with varying load conditions from no load (0kg) to full load (20kg) with equal intervals of 5kg. Statistical features are extracted from each particular signal and determination of features is carried out. Classification is performed using a random tree and naive Bayes algorithms which identifies the minimal vibrations and best performance among the selected blends. The best classification accuracy is found for naive Bayes algorithm with 96.4%. The selected best combination blend data is used further for training the developed neural network model with neurons in hidden layers and a trained model was tested to predict the vibration signatures with the average 0.97 correlation coefficient. |
6,166 | Please write an abstract with title: Triplet-Classifier GAN for Finger-Vein Verification, and key words: Generative adversarial networks, Feature extraction, Veins, Fingers, Generators, Convolutional neural networks, Training. Abstract: In finger-vein-based biometric verification, it is essential to robustly extract vein features with strong discrimination ability. Recently, deep learning methods have achieved remarkable performance in the field of finger-vein verification. However, the establishment of an effective deep learning model requires large-scale databases to prevent overfitting during the training process, while currently used finger-vein databases are not large enough. In our article, a new generative adversarial network (GAN), named triplet-classifier GAN, is designed for finger-vein verification. Unlike the traditional GAN-based method, the proposed triplet-classifier GAN uses the generated “fake” data to improve the learning ability of the triplet loss-based convolutional neural network (CNN) classifier. The combination of GAN and the triplet loss-based CNN classifier expands the training data and improves the discriminant ability of CNN. Experiments prove that the proposed triplet-classifier GAN has superior performance in finger-vein verification and has good prospects in finger-vein-based biometric verification. |
6,167 | Please write an abstract with title: No Crash, No Exploit: Automated Verification of Embedded Kernels, and key words: Runtime, Annotations, Computer bugs, Tools, Real-time systems, Safety, Kernel. Abstract: The kernel is the most safety- and security-critical component of many computer systems, as the most severe bugs lead to complete system crash or exploit. It is thus desirable to guarantee that a kernel is free from these bugs using formal methods, but the high cost and expertise required to do so are deterrent to wide applicability. We propose a method that can verify both absence of runtime errors (i.e. crashes) and absence of privilege escalation (i.e. exploits) in embedded kernels from their binary executables. The method can verify the kernel runtime independently from the application, at the expense of only a few lines of simple annotations. When given a specific application, the method can verify simple kernels without any human intervention. We demonstrate our method on two different use cases: we use our tool to help the development of a new embedded realtime kernel, and we verify an existing industrial real-time kernel executable with no modification. Results show that the method is fast, simple to use, and can prevent real errors and security vulnerabilities. |
6,168 | Please write an abstract with title: Research on Nondestructive Examination of Jacket Section for CFETR TF Coil, and key words: Probes, Testing, Phased arrays, Acoustics, Superconducting magnets, Magnetic confinement, Inspection. Abstract: The Chinese Fusion Engineering Testing Reactor (CFETR) is aiming to bridge the gap between the International Thermonuclear Experimental Reactor (ITER) and the first commercial fusion power plant, a necessary complement of the ITER. The requirement for sustaining long burn duration as specified in the duty time CFETR mission necessitates the use of superconducting magnets. Totally 16 toroidal field (TF)D-shaped coils which are of cable-in-conduit conductor type are designed. All the subcomponents have very demanding requirement to withstand the severe environments. This paper gives the nondestructive examination (NDE) method developed for the jacket of TF conductor which is made of 316L stainless steel. Based on the linear elastic fracture mechanics, maximum acceptable defect sizes in the TF jacket material have been defined. Phased array ultrasonic testing(PAUT)method and eddy current test (ECT) method were developed for the circular-in-square jacket inspection. For PAUT method, focus laws were calculated and optimized. For ECT method, specific ECT probe was designed and manufactured. Benchmark experiments were carried out to study the NDE reliability. |
6,169 | Please write an abstract with title: Wideband Interference Mitigation for SAR Based on Intrinsic Chirp Component Decomposition, and key words: Time-frequency analysis, Chirp, Viterbi algorithm, Estimation, Interference, Radar imaging, Radar polarimetry. Abstract: The wideband interferences (WBIs) seriously degrade the quality of the synthetic aperture radar (SAR) image. Since the WBI occupies a larger bandwidth, it is difficult to mitigate it. Some existing WBI mitigation methods based on transform-domain analysis or filter design suffer from model mismatch and signal loss. In order to solve this problem, a method based on instantaneous frequency (IF) estimation and intrinsic chirp component decomposition (ICCD) is proposed to suppress WBI in this paper. First, a WBI-contaminated SAR echo is represented in the time-frequency domain by using the short-time Fourier transform (STFT). Then, the IF estimation is carried out for the WBI components. Finally, the WBI is extracted by using the ICCD. The experimental results verify the effectiveness of the proposed method. |
6,170 | Please write an abstract with title: A New Method to Design Steerable First-Order Differential Beamformers, and key words: Array signal processing, Microphone arrays, Design methodology, Noise reduction, Geometry, Speech enhancement, Solids. Abstract: First-order differential microphone arrays (FODMAs), which combine a small-spacing uniform linear array and a first-order differential beamformer, have been used in a wide range of applications for sound and speech signal acquisition. However, traditional FODMAs are not steerable and their main lobe can only be at the endfire directions. To circumvent this problem, we propose in this letter a new method to design steerable FODMAs. We first divide the target beampattern into a sum of two sub-beampatterns, i.e., cardioid and dipole, where the summation is controlled by the steering angle. We then design two sub-beamformers, one is similar to the traditional approach and is used to achieve the cardioid sub-beampattern, while the other is designed to filter the squared observation signals and is used to approximate the dipole sub-beampattern. The overall beampattern resembles the target beampattern for any steering angle. Simulations and experiments are performed to justify the effectiveness of the developed method. |
6,171 | Please write an abstract with title: Models of radar imaging of the ocean surface waves, and key words: Radar imaging, Surface waves, Sea surface, Radar cross section, Image analysis, Rough surfaces, Surface roughness, Ocean waves, Synthetic aperture radar, Backscatter. Abstract: A number of models which would explain ocean wave imagery taken with a synthetic aperture imaging radar are analyzed analytically and numerically. Actual radar imagery is used to support some conclusions. The models considered correspond to three sources of radar backscatter cross section modulation: tilt modulation, roughness variation, and the wave orbital velocity. The effect of the temporal changes of the surface structure, parametric interactions, and the resulting distortions are discussed. |
6,172 | Please write an abstract with title: Focusing of high-perveance planar electron beams in a miniature wiggler magnet array, and key words: Electron beams, Undulators, Structural beams, Laboratories, Focusing, Lenses, Microwave antenna arrays, Microwave devices, Magnetic confinement, High power microwave generation. Abstract: The transport of planar electron beams is a topic of increasing interest for applications to high-power, high-frequency microwave devices. This paper describes two- and three-dimensional simulations of electron-beam transport in a notched wiggler magnet array. The calculations include self-consistent effects of beam-generated fields. The simple notched wiggler configuration can provide vertical and horizontal confinement of high-perveance sheet electron beams with small transverse dimensions. The feasibility calculations address a beam system to drive a 95-GHz traveling-wave tube experiment under construction at Los Alamos National Laboratory, Los Alamos, NM. |
6,173 | Please write an abstract with title: Mobile crowd sensing : task assignment, privacy protection, incentive, and application, and key words: Performance evaluation, Privacy, Smart cities, Sensors, Resource management, Servers, Task analysis. Abstract: Mobile crowd sensing(MCS) system takes mobile intelligent devices (smart phones, tablets, etc.) carried by ordinary users as the basic perception unit. Through the mobile Internet (Wi-Fi, cellular network and wired network, etc.), conscious or unconscious collaboration is carried out to realize the distribution of sensing tasks and the collection and analysis of sensing data. Able to perform large-scale, complex perceptual tasks. The task completion of the mobile swarm intelligence sensing system depends on the participants or mobile intelligent devices, which leads to the need for the mobile swarm intelligence sensing system to meet certain constraints. In view of this, we described the task assignment model, privacy protection mechanism, incentive mechanism and other contents of the current mobile swarm intelligence perception system, and discussed the various applications of mobile swarm intelligence perception in life. Finally, the research direction of mobile swarm intelligence sensing system is proposed to improve the performance of mobile swarm intelligence sensing system in the future. |
6,174 | Please write an abstract with title: 3:1 Bandwidth Sinuous Antenna for Direction Finding Applications, and key words: Estimation error, Navigation, Europe, Receivers, Directive antennas, Frequency estimation, Wideband. Abstract: This paper discusses the design and performance of an eight-arm sinuous antenna for analog and digital direction finding (DF) systems. The multimode and dual-polarized capabilities of the eight-arm sinuous are utilized to achieve wideband angle of arrival estimation independent of the incoming signal polarization. The performance is evaluated for the classical analog amplitude/phase comparison and the importance of mode 3 to achieve more accurate estimation is highlighted. Also, the Cramér-Rao lower bound (CRLB) is used to evaluate the performance of the proposed design in the context of a digital receiver backend. The performance of the antenna is experimentally verified over the 1.5-4.5GHz frequency band and low estimation errors are demonstrated over wide field of view. |
6,175 | Please write an abstract with title: Impact of Knowledge Integration on Performance of Water Solutions in Process Industries, and key words: Industries, Key performance indicator, Process control, Pollution control, Water conservation, Water pollution, Reverse osmosis. Abstract: For technologies used in environmental analysis and control, it’s important to have knowledge integration among the concerned in process industries so that all involved can achieve their desire key performance indicators. We cannot expect that all will have in-depth knowledge on environmental analysis and management pertaining to the areas like effluent treatment plant, demineralized plant, or reverse osmosis plants. Water, wastewater treatment and control are very important since this contribute to utility management. The process involves generating good quality of water from raw water and further used in process. Industries have responsibility to manage wastewater by treating, segregating waste and use treated water for gardening etc. Pollution control boards have brought stringent norms to monitor this. Post global pandemic situation, it has become more challenging for industries due to various challenges like manpower, hesitance to move in the field for even routine check where waste water is brought at common place which includes human waste from toilets for treatments in ETP. Service availability in time is too questionable. Without knowledge integration among the suppliers and the users, performance of water and wastewater management cannot be enhanced. Hence, it’s important to study impact of knowledge sharing on key performance indicators on both sides. |
6,176 | Please write an abstract with title: Study on Indoor Facility Design of the Smart Senior Care Community Based on Human Factor Characteristics, and key words: Conferences, Senior citizens, Psychology, Human factors, Big Data, Physiology, Planning. Abstract: China's aging population is becoming increasingly serious, and with the gradual popularization of big data technology, smart senior care communities are developing rapidly. However, most of the relevant studies focus on the policy level or the planning and architecture field, and there are still some limitations in the design and research of indoor facilities. In particular, the related research on the physiological and psychological characteristics of the elderly needs to be further explored. By investigating the status quo of the smart senior care community, and by analyzing the elderly's physical and mental needs and life activity line, this paper summarizes the innovative design strategy of indoor facilities design in the smart senior care community based on human factors. |
6,177 | Please write an abstract with title: A small sample model selection criterion based on Kullback's symmetric divergence, and key words: Linear regression, Density measurement, Time measurement, Signal processing, Bayesian methods, Entropy, Parametric statistics, Reflection. Abstract: The Kullback information criterion (KIC) is a recently developed tool for statistical model selection (Cavanaugh, J.E., Statistics and Probability Letters, vol.42, p.333-43, 1999). KIC serves as an asymptotically unbiased estimator of a variant of the Kullback symmetric divergence, known also as J-divergence. A bias correction of the Kullback symmetric information criterion is derived for linear models. The correction is of particular use when the sample size is small or when the number of fitted parameters is of a moderate to large fraction of the sample size. For linear regression models, the corrected method, called KICc, is an exactly unbiased estimator of a variant of the Kullback symmetric divergence between the true unknown model and the candidate fitted model. Furthermore, KICc is found to provide better model order choice than any other asymptotically efficient methods when applied to autoregressive time series models. |
6,178 | Please write an abstract with title: Investigation of Underfill Delamination in Flip Chip Packages by Finite Element Analysis, and key words: Two dimensional displays, Finite element analysis, Flip-chip devices, Delamination, Electronics packaging. Abstract: The most suitable method to study interface delamination issue is fracture mechanics based on energy criterion. It can be calculated by two methods, virtual crack-closure technique (VCCT) and J-integral in finite element analysis (FEA). Although both methods have developed maturely, the comparative analysis of the two methods is still lacking. In this paper, the influence of different mesh types and mesh sizes of crack tip on G value calculated by VCCT and J-integration are studied in detail through a two-dimensional (2D) multi-layer model. Furthermore, J-integral method was used to evaluate G-value at the interface between underfill (UF) and chip in a 2D flip chip package structure. Then, the influence of modulus and CTE of UF on G-value are discussed. Our study may contribute to quantitative assessment of the risk of UF delamination. |
6,179 | Please write an abstract with title: Is BlockChain Mining Profitable in the Long Run?, and key words: Blockchain, Smart contracts, Bitcoin, Economics, Graphics processing units, Technological innovation, Instruments. Abstract: Blockchain technologies are at the heart of digital innovation and are a harbinger of Industry 4.0. Consequently, popular press and academic researchers alike have focused on its importance. Yet blockchain technologies’ most promising efforts, cryptocurrency and smart contracts, are underpinned by blockchain mining. The blockchain mining service is undergoing change, cryptocurrencies like Ethereum and others are nearing the end of their minting. Smart contracts are in their infancy. The financial impetus for providing the mining service has changed. Here, we add to the literature through a deep financial analysis of blockchain mining regarding its long-term financial viability. Our methods include a financial cost analysis and an analysis of the financial viability of cryptocurrency through focus on Ethereum. It is found that blockchain miners, despite initial profitability, cannot maintain sustainable financial viability without substantial fees. This article is important to those academics who focus on understanding how service technologies and products underpin Industry 4.0. Finally, this article contributes to the practitioners’ decision-making process to embrace blockchain mining as a technological entrepreneur. |
6,180 | Please write an abstract with title: Investigation of 5G and 4G V2V Communication Channel Performance Under Severe Weather, and key words: Wireless communication, Degradation, 5G mobile communication, Simulation, Weather forecasting, Propagation losses, Communication system security. Abstract: As all three major US mobile carriers have launched their own 5G networks and are working hard to expand their coverage nationwide, 5G has come into everyone's daily life. 5G networks use millimeter-wave (mm-Wave) for higher speeds, while 4G long-term evolution (LTE) networks favor lower-band spectrum for better coverage. Vehicle-to-vehicle (V2V) communication enables wireless communication between cars and exchanges their speed, location, and acceleration information. 5G mm-Wave and 4G LTE bands are used in V2V sidelink transmissions. These two wireless channels are affected by different weather conditions, such as rain, snow, dust, and sand. Compared with 4G networks, 5G networks are designed to accommodate the increasing number of devices with higher transfer speed, lower latency, and improved security. However, our study shows that severe weather degrades the 5G performance more significantly than 4G. In this paper, we use NS-3 as a simulator to study the effect of harsh weather of dust or sand on the propagating loss of 5G mm-Wave and 4G LTE signal. We investigate their performance degradation and use a time-series machine learning technique, long short-term memory (LSTM), to predict future signal strength for 5G and 4G. Our simulation results show that LSTM performs good forecasting for signal strength, and we plan to design a system that can dynamically choose the better wireless channel in the future. |
6,181 | Please write an abstract with title: Batch(Offline) Reinforcement Learning for Recommender System, and key words: offline reinforcement learning, recommender systems, big data. Abstract: The explosive spread of the Internet in recent years has increased the types and amounts of big data, making it difficult for users to search for the data they need. With the continued growth of business on the Internet, e-learning, increased communication and sharing among users, and the advent of social networking, there is an undeniable need to design and implement systems that make it easier for people to search. A recommender system provides the ability to provide the most appropriate and accurate suggestions to users by checking user-related information from relevant datasets. In other words, it extracts user preferences and interests from data and makes suggestions. In this paper, we study the problem of learning recommendation systems with large datasets. We propose an offline RL framework for recommender systems to achieve high accuracy and perform recommendations quickly. Specifically, we propose a framework called Ofrec that first transforms the problem into a Markov Decision Process (MDP) and provides highly accurate and time-saving recommendations. We conduct extensive experiments on a large dataset of CIKM 2019 EComm AI and show that the proposed approach outperforms supervised learning and reinforcement learning algorithms. |
6,182 | Please write an abstract with title: Fast Light-Weight Near-Field Photometric Stereo, and key words: Technological innovation, Three-dimensional displays, Memory management, Lighting, Graphics processing units, Calibration, Pattern recognition. Abstract: We introduce the first end-to-end learning-based solution to near-field Photometric Stereo (PS), where the light sources are close to the object of interest. This setup is especially useful for reconstructing large immobile objects. Our method is fast, producing a mesh from 52 512x384 resolution images in about 1 second on a commodity GPU, thus potentially unlocking several AR/VR applications. Existing approaches rely on optimization coupled with a far-field PS network operating on pixels or small patches. Using optimization makes these approaches slow and memory intensive (requiring 17GB GPU and 27GB of CPU memory) while using only pixels or patches makes them highly sus-ceptible to noise and calibration errors. To address these issues, we develop a recursive multi-resolution scheme to estimate surface normal and depth maps of the whole image at each step. The predicted depth map at each scale is then used to estimate 'per-pixel lighting, for the next scale. This design makes our approach almost 45x faster and 2° more accurate (11.3° vs. 13.3° Mean Angular Error) than the state-of-the-art near-field PS reconstruction technique, which uses iterative optimization. |
6,183 | Please write an abstract with title: Convergence conditions for an optimal solution in adaptive recursive filters, and key words: Adaptive filters, Parameter estimation, Convergence, Equations, Filtering, Transient response, Matched filters, State-space methods, Noise measurement, Gaussian noise. Abstract: In this paper, a One Step Adaptive Recursive Prediction Filter (OSARPF) is described. OSARPF is an adaptive filter for recursive systems and is suitable for parameter estimation problems. By representing the recursion in matrix notation, blocks of input data are used for adaptation. Using the past reference input for recursion, the adaptive filter can be shown to converge to an optimal solution. Adaptation equations are then developed for updating the coefficients of the adaptive filter and the adaptation process can be shown to converge to the optimal solution. |
6,184 | Please write an abstract with title: Overcurrent Protection Scheme Utilising Reed Switches Instead of Current Transformers, and key words: Relays, Contacts, Current transformers, Switches, Power engineering, Current measurement, Actuators. Abstract: This paper states the need to create overcurrent protection without the use of current transformers due to their inherent disadvantages. Reed switches are proposed as current sensors, since they can simultaneously act as a current sensor, a current relay, and an analog-to-digital converter. The known overcurrent protections utilising reed switches are analyzed. The three closest alternatives of the proposed protection scheme are considered in more detail. A certain disadvantage of these protection schemes is failure to trip in case of a short circuit if reed switch contacts are stuck. Another disadvantage is the possibility of a false tripping if an interference occurs in the reed switch control winding due to a magnetic field. To eliminate the first disadvantage, a corresponding time relay is proposed to be started after each tripping of the reed switch with a delay shorter than the protection time for the interval between the first and the considered tripping of the reed switch. To eliminate the second disadvantage, the control winding and contacts of the specified reed switch are proposed to be connected in series to the control winding and contacts of the blocking reed switch. The latter has normally closed contacts, which open only in case of interference in the control winding circuit. The operation of the protection circuits and the measurement device has been analyzed in various modes of operation. A method for the protection scheme measurement device adjustment is proposed, which takes into account the inequality of the calculated and actual inductions of the magnetic field acting on the reed switch. |
6,185 | Please write an abstract with title: Analysis and representation of statistical performance of JPEG2000 encoded image over wireless channels, and key words: Image analysis, Performance analysis, Analytical models, Error correction codes, Streaming media, Image quality, Protection, Resilience, Base stations, Videos. Abstract: JPEG2000 is a new coming image standard. In this paper we analyze the performance of error resilience tools in JPEG2000, and present an analytical model to estimate the quality of JPEG2000 encoded image transmitted over wireless channels. The effectiveness of the analytical model is validated by simulation results. Furthermore, analytical model is utilized by the base station to design efficient unequal error protection schemes for JPEG2000 transmission. In the design, a utility function is defined to make a tradeoff between the image quality and the cost for transmitting the image over a wireless channel. |
6,186 | Please write an abstract with title: High-resolution multibeam deepwater cable route survey in high-relief seafloor area, and key words: Sea floor, Optical fiber cables, Monitoring, Data acquisition, Sonar equipment, Optical arrays, System testing, Fiber optics, Acoustic sensors, Acoustic beams. Abstract: In support of monitoring for nuclear tests, a Hydroacoustic Data Acquisition System (HDAS) monitoring system is to be installed at Ascension Island. The system consists of two hydrophone arrays linked by fibre optic cable to the island. A survey to select cable routes from PanAm Beach on Ascension Island to the proposed hydrophone sites was conducted in the summer of 2002. The survey utilised various acoustic sensors, single beam and multibeam echo sounders, sidescan sonar and sub-bottom profilers, operating from very shallow, near surf-zone depths, to full ocean depth. Backscatter data was included in the multibeam echo sounder data acquisition. The survey employed a small survey launch for the shallow water work, depths less than 100 meters, and a 1200-ton survey ship for the deep-water work. A land survey of the beach and a diver swim survey in the surf zone, completed the end-to-end survey. Data were processed in near real time to allow for rapid assessment and revision of the survey route. |
6,187 | Please write an abstract with title: DC Link Capacitor Sizing for 240°-Clamped Space Vector PWM for EV Traction Inverters, and key words: Conferences, Capacitors, Prototypes, Mechanical power transmission, Pulse width modulation, Electric vehicles, Inverters. Abstract: DC link capacitor is one of the critical components in EV powertrain affecting the size, weight, and reliability. In a cascaded architecture (DC-DC stage followed by DC-AC stage), the size of DC link capacitor is dictated by the ripple current it has to support from both the stages. This work explores the benefits of relatively new PWM method called 240°-Clamped space vector PWM (240CPWM) in terms of reduced current stress on the DC link capacitor which corresponds to reduction in the DC link capacitor size. Detailed analysis of ripple current contribution from DC-DC and DC-AC stages is carried out leading to design methods for the DC link capacitor. It is shown that the current stress on the DC link capacitor for 240CPWM is 25% lower as compared to CSVPWM under same operating conditions. The analysis is validated by the experimental results from a 5 kW, 500 V (line to line voltage) hardware prototype. |
6,188 | Please write an abstract with title: An Evaluation of Backpropagation Interpretability for Graph Classification with Deep Learning, and key words: Deep learning, Backpropagation, Tools, Big Data, Feature extraction, Convolutional neural networks, Usability. Abstract: The end-to-end learning in convolutional neural networks (CNNs) and their ability to extract localized deep features, have turned them into powerful tools for learning from a large corpus of data including graphs. Deep neural networks such as CNNs are "black-box", therefore various interpretability methods have been developed to understand which aspects of the input data drive the decisions of the network. However, interpretability for graph convolutional neural networks (GC-NNs) is an open area of research. To this end, we investigate three backpropagation-based interpretability methods: saliency map with contrastive gradients (CG), gradient-weighted class activation mapping (Grad-CAM), and deep learning important features (DeepLIFT) in conjunction with three state-of-the-art GCNNs: GCNN+GAP, DGCNN, and DIFFPOOL, as well as with their variants, for the graph classification problem. We discuss novel challenges and our solutions towards integrating these deep learning frameworks, measuring their efficiency and performance both qualitatively and quantitatively. With our extensive empirical analysis over five real-world graph datasets from different categories, we report their quantitative, visualization, and active subgraph based performance, compare them with the classic significant subgraph mining results, summarize their trade-offs and surprising findings. We conclude by discussing our recommendations on the road ahead. |
6,189 | Please write an abstract with title: A New Modular Level-2 PEV Charger for Plug-in Electric Vehicle: Design and Implementation, and key words: Battery chargers, Total harmonic distortion, Simulation, Design methodology, Voltage, Resonant converters, Batteries. Abstract: This paper presents a novel design for a leve1-2 battery charger for plug-in hybrid/electric vehicles. The converter is of two stages. First, an interleaved boost converter is used to minimize the total harmonic distortion (THD). The second stage is a half-bridge LLC resonant converter used for dc-dc conversion. PSIM modelling and design methodology are detailed for a 7.6 kW charger, as a case study, charging the battery with an output voltage of 230V to 340V from 240V, 60Hz single-phase grid. Simulation results are provided to prove the compliance with the NEMA 5-15 and NEMA 6-15 standards’ requirements. |
6,190 | Please write an abstract with title: Where did the globular clusters of the Milky Way form? Insights from the E-MOSAICS simulations, and key words: galaxies: evolution, galaxies: formation, galaxies: haloes, galaxies: star clusters: general, galaxies: star formation. Abstract: Globular clusters (GCs) are typically old, with most having formed at z ≳ 2. This makes understanding their birth environments difficult, as they are typically too distant to observe with sufficient angular resolution to resolve GC birth sites. Using 25 cosmological zoom-in simulations of Milky Way-like galaxies from the E-MOSAICS project, with physically motivated models for star formation, feedback, and the formation, evolution, and disruption of GCs, we identify the birth environments of present-day GCs. We find roughly half of GCs in these galaxies formed in situ (52.0 ± 1.0 per cent) between z ≈ 2–4, in turbulent, high-pressure discs fed by gas that was accreted without ever being strongly heated through a virial shock or feedback. A minority of GCs form during mergers (12.6 ± 0.6 per cent in major mergers, and 7.2 ± 0.5 per cent in minor mergers), but we find that mergers are important for preserving the GCs seen today by ejecting them from their natal, high density interstellar medium (ISM), where proto-GCs are rapidly destroyed due to tidal shocks from ISM substructure. This chaotic history of hierarchical galaxy assembly acts to mix the spatial and kinematic distribution of GCs formed through different channels, making it difficult to use observable GC properties to distinguish GCs formed in mergers from ones formed by smooth accretion, and similarly GCs formed in situ from those formed ex situ. These results suggest a simple picture of GC formation, in which GCs are a natural outcome of normal star formation in the typical, gas-rich galaxies that are the progenitors of present-day galaxies. |
6,191 | Please write an abstract with title: A Technique of Holographic Projection from Far Field Pattern to an Unconstrained Planar Surface, and key words: Antenna measurements, Transmission line matrix methods, Image resolution, Force, Measurement techniques, Proposals, Antenna arrays. Abstract: Holographic back projection to a plane from spherical pattern data offers more details than from planar data because the image is derived from data over an entire hemisphere. A previous study introduced a back-projection method where the far field pattern can be projected to a plane which is orthogonal to the radial direction. With this arrangement, the projection is forced to be centered at the interception point between the plane and the radial line. This could force the desire image to be located away from the center where the best image resolution resides. In case of a large offset, it could even result in incorrect hologram. In this study, we propose a more robust back projection method. In this proposal, a translation and a series of rotation operations are applied on the far field pattern, after which the desired image area is centered and orthogonal to the propagation direction. The plane wave spectrum and hologram can then be calculated from the translated and rotated far field pattern. The propagation term ${e^{j\gamma d}}$ in the conventional back projection technique is no longer needed after the pre-process of the far field pattern because it is included in the translation operation. This method provides a high-resolution holographic projection onto any desired area. It is especially applicable for cases when Antenna Under Test (AUT) has an arbitrary orientation with an offset from the origin, or for cases where projections are needed onto several surfaces of a multifaceted AUT. |
6,192 | Please write an abstract with title: A single-chip optical CMOS detector with in-situ demodulating and integrating readout for next-generation optical storage systems, and key words: Integrated optics, Optical detectors, Photodiodes, Optical signal processing, Stimulated emission, High speed optical techniques, Optical sensors, Optical recording, Signal generators, Power distribution. Abstract: In this paper, a new fully integrated detector architecture for pick-up units in optical storage systems is presented. It features a special high-frequency photodiode constellation for data recovery suitable for the needs of future optical storage systems. The functionality of standard detectors has been extended by using an additional 5 /spl times/ 5 low-frequency photodiode matrix for in-situ determination of the average spatial light power distribution across the detector. The six high-frequency paths exhibit bandwidths up to 135 MHz, and the maximum clock frequency for the low-frequency paths is 20 MHz. The detector has been fabricated in a standard 0.6-/spl mu/m CMOS process, and it operates at a 3.3-V power supply and occupies 1.78 /spl times/ 1.58 mm/sup 2/. |
6,193 | Please write an abstract with title: Shannon Capacity under Relative Motion, and key words: Wireless communication, Information science, Radio transmitters, Receivers. Abstract: The classical form of Shannon capacity describes the quasi-static capacity, i.e., the movement of receivers or transmitters is negligible compared with the signal propagation speed (SPS). When the speed of relative motion (SRM) between transmitters and receivers is comparable with SPS, the capacity may deviate from the classical form. This study takes a different perspective on the Shannon capacity and extends the classical form of capacity with constraints of SRM and SPS. The special theory of relativity is used to analyze the capacity when SRM approaches the speed of light. Results imply the threshold below in which we can neglect the capacity deviating from the classical form for wireless radios. While for low SPS which is far less than light speed, modifying factors should be particularly added to the classical capacity form. |
6,194 | Please write an abstract with title: Development of Critical Thinking in Education: A Case Study on Hoax Messages, and key words: Training, Informatics, Problem-solving, Annotations, Reflection, Object recognition. Abstract: Not only the world is changing but also a way of education. The main purpose of the article is to focus on critical thinking in preparing pre-service Informatics teachers. It is described how essential is critical thinking, not only from the global reason but also our national - Slovak - point of view. We have used the case study method to support critical thinking in the preparation of pre-service Informatics teachers. We have created a collection of didactic situations which we handled into case studies using the AAA method (annotation, analysis, alternation), supplemented by tasks focused on critical thinking about the case study and further creative topic elaboration. As an example, we present a case study on Hoax Messages. |
6,195 | Please write an abstract with title: Traffic and interference adaptive scheduling for Internet traffic in UMTS, and key words: Interference, Adaptive scheduling, Internet, 3G mobile communication, Telecommunication traffic, Scheduling algorithm, Resource management, Radio access networks, Telecommunication standards, Time division multiple access. Abstract: We propose a scheduling strategy for radio resources management when transmitting Internet traffic over third-generation systems. More precisely, we consider the UMTS terrestrial radio access network (UTRAN) time division duplex (TDD) mode standardized by ETSI. UTRAN TDD uses a hybrid solution of code and time division multiple access, called TD-CDMA. We present a fair and efficient scheduling algorithm that adapts its behavior to traffic and interference conditions. Specifically, our scheduling algorithm is able to manage the radio resources taking into account both traffic fluctuations, in the uplink and downlink direction, and variations in system interference. The goal of our scheduler is data-throughput maximization for an efficient utilization of available radio resources. The performance of our scheduling algorithm is evaluated via simulation. |
6,196 | Please write an abstract with title: Electronic design of electrode communication control for multiple electrodes in electrochemotherapy and corresponding electric field distribution, and key words: Electrodes, Communication system control, Cells (biology), Tumors, Voltage, Circuit testing, Biomembranes, Drugs, Sequences, DNA. Abstract: Electroporation is a phenomenon that occurs in cell membranes as cells are exposed to sufficiently high electric field. Large molecules, such as some chemotherapeutic drugs or DNA, which otherwise are unable to cross cell membranes may then enter cells. This phenomenon is used in combination with some chemotherapeutic drugs for tumour treatment. Electric field in the tissue is established by voltage application to the electrodes. Usually the voltage applied is in the range of 1000 V for 0.1 to 1 ms. Multiple needle electrodes were already proposed for electrochemotherapy in order to effectively treat larger tumours or to perform the treatment with lower pulse voltages. We developed and tested electrode communication circuit, which controls up to 19 electrodes independently. Each electrode can be in one of three different states: positive, negative or high impedance. In addition, we proposed and tested a pulse sequence using seven electrodes for which we also calculated electric field distribution in tumour tissue by means of finite elements method in 3D model. The electrochemotherapy, which was performed on subcutaneous murine tumour model was demonstrated to be effective (60% complete responses). We also demonstrated that the proposed electrode communication sequence is functional and safe. |
6,197 | Please write an abstract with title: Current Issues of Legal Transformation of Educational Systems in Russia in the Context of Digitalization, and key words: Training, Symbiosis, Law, Biological system modeling, Education, Sociology, Media. Abstract: The article describes the relevance of the application of various models in the educational process in higher education in Russia today and in the near future. The problems are presented in the dynamics of the development of the situation in the world, law and economics. The stages of the transition of Russian education to the Bologna system are studied in detail. Positive and negative aspects of the practice of its application. What are the advantages of returning to the traditional Russian specialty. The results of the work are shown. Conclusions are drawn. |
6,198 | Please write an abstract with title: Virtual Petri nets as a modular modeling method for planning and control tasks of FMS, and key words: Petri nets, Flexible manufacturing systems, Process planning, Automatic control, Production planning, Joining processes, Power system modeling, Manufacturing systems, Virtual private networks, Computer science. Abstract: The modeling of automated manufacturing systems has been studied to cope with the production planning and control problems. Petri Nets have been applied to model these systems because they provide resources to represent the systems behavior. When the systems are too large or complex, the modeling task is difficult and the elements in the model are too many for a simple under-standing and analyze task. This work proposes an method for modeling these systems in order to minimize the difficulties mentioned. The proposed method introduces the virtual Petri net (VPN) and a modular strategy considering the shared resources and the alternative process planning. Using this method, a system has been modeled, initially considering the systems elements for the modeling job, and then a modules linking way can be used in order to build the complete model. |
6,199 | Please write an abstract with title: MIMO systems properties preservation under SPR substitutions, and key words: MIMO, Transfer functions, Matrices, Time varying systems, Control systems, Circuit stability, Impedance, Circuit theory, Passive networks, Lyapunov method. Abstract: The preservation of some control-oriented positive real properties (passivity, positivity, bounded realness, as well as input-output behavior) in multi-input multi-output transfer functions is studied, when performing substitutions (of the complex Laplace variable s) by a particular class of rational strictly positive real (SPR) functions, the so-called SPR functions of zero relative degree (SPR0 functions). We also consider here the preservation of stability properties of a class of unforced linear time-invariant systems with memoryless (possibly time-varying nonlinear) input depending on the system output. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.