ID int64 0 400k | content stringlengths 97 5.85k |
|---|---|
8,000 | Please write an abstract with title: Rectifying Pseudo Label By Mutual Disagreement Learning For Unsupervised Domain Adaptation Person Re-Identification, and key words: Training, Adaptation models, Conferences, Predictive models, Reliability, Task analysis. Abstract: Unsupervised domain adaptation person re-identification(re-ID) aims to transfer knowledge from the labeled source domain to unlabeled target domain, which is still a challenging task due to the large domain discrepancy. The clustering-based methods maintain advanced performance, generating pseudo-labels for unlabeled target domain images by clustering. However, not making full use of all valuable images and label noise derived from imperfect clustering results dramatically impact further performance improvement. To alleviate the above two problems, we propose a novel mutual disagreement learning(MDL) framework. We attach some of outliers(unclustered samples) with small loss to training process in an adversarial strategy manner. To rectify label noise, we train two networks and their momentum-based moving average models, making them teach each other and using prediction disagreement samples to update networks. Extensive experiments on four unsupervised domain tasks, Market-to-Duke, Duke-to-Market, Market-to-MSMT and Duke-to-MSMT, show that the advantages of our proposed MDL framework compared with other state-of-the-art methods. |
8,001 | Please write an abstract with title: Building 3D Map Based on Monte Carlo Localization and Feature Extraction, and key words: Three-dimensional displays, Robots, Robot sensing systems, Two dimensional displays, Kalman filters, Feature extraction, Buildings. Abstract: In this project, we mainly explore and construct the 3D indoor map. The goal of this paper is to merge the data from the laser and kinect sensor with Monte Carlo Location(MCL) in 2D map. We use the laser range sensor to construct the 2D map and get the robot's pose transformation matrix. Then, we obtain the color and depth image by using the kinect sensor and build 3D point cloud map by using the feature extraction method, getting the kinect's pose transformation matrix. After that, we get the optimal pose transformation by using the Kalman Filter to calibrate the robot's pose transformation matrix and the kinect's pose transformation matrix. Finally, the optimal pose transformation matrix is employed to accomplish the local 3D map and construct the global 3D indoor map. To show the superiority of our method, we make some experiments and compare with some other algorithms. Experimental results show that our method has a better superiority. |
8,002 | Please write an abstract with title: PAR reduction for DMT systems with unloaded subchannels, and key words: OFDM modulation, Peak to average power ratio, Transmitters, Discrete Fourier transforms, Dynamic range, Filtering, Filters, Symmetric matrices, Instruments, Digital signal processing. Abstract: The inverse discrete Fourier transform used by discrete multitone modulation produces transmitted signals with a large peak-to-average ratio. Peak-to-average ratio reduction methods allow the transmitter to reduce the probability of clipping, or maintain the same probability of clipping while reducing the dynamic range requirements of the analog front end. In this paper we propose a method of peak-to-average ratio reduction that uses unloaded subchannels to prevent clipping in the transmitted signal. Considerations such as efficient adaptation methods and extensions to compensate for upsampling and filtering are addressed. |
8,003 | Please write an abstract with title: Real discrete Fourier transform, and key words: Discrete Fourier transforms, Fourier series, Discrete transforms, Frequency, Data compression, Filtering, Software measurement, Convolution, Fourier transforms, Data flow computing. Abstract: The real discrete Fourier transform (RDFT) corresponds to the Fourier series for sampled periodic signals with sampled periodic frequency responses just as discrete Fourier transform (DFT) corresponds to the complex Fourier series for the same type of signals. RDFT has better performance than DFT in data compression and filtering for all signals in the sense that Pearl's measure for RDFT is less than Pearl's measure for DFT by an amount ΔW. RDFT also has better performance than DFT in the computation of real convolution because of the reduced number of operations, and the fact that forward and inverse transforms can be implemented with the same signal flowgraph, thereby facilitating hardware and software design. |
8,004 | Please write an abstract with title: Deep Metric Learning Based on Scalable Neighborhood Components for Remote Sensing Scene Characterization, and key words: Measurement, Semantics, Remote sensing, Feature extraction, Training, Complexity theory, Encoding. Abstract: With the development of convolutional neural networks (CNNs), the semantic understanding of remote sensing (RS) scenes has been significantly improved based on their prominent feature encoding capabilities. While many existing deep-learning models focus on designing different architectures, only a few works in the RS field have focused on investigating the performance of the learned feature embeddings and the associated metric space. In particular, two main loss functions have been exploited: the contrastive and the triplet loss. However, the straightforward application of these techniques to RS images may not be optimal in order to capture their neighborhood structures in the metric space due to the insufficient sampling of image pairs or triplets during the training stage and to the inherent semantic complexity of remotely sensed data. To solve these problems, we propose a new deep metric learning approach, which overcomes the limitation on the class discrimination by means of two different components: 1) scalable neighborhood component analysis (SNCA) that aims at discovering the neighborhood structure in the metric space and 2) the cross-entropy loss that aims at preserving the class discrimination capability based on the learned class prototypes. Moreover, in order to preserve feature consistency among all the minibatches during training, a novel optimization mechanism based on momentum update is introduced for minimizing the proposed loss. An extensive experimental comparison (using several state-of-the-art models and two different benchmark data sets) has been conducted to validate the effectiveness of the proposed method from different perspectives, including: 1) classification; 2) clustering; and 3) image retrieval. The related codes of this article will be made publicly available for reproducible research by the community. |
8,005 | Please write an abstract with title: Dual-Loop Dynamic Control of Cable-Driven Parallel Robots Without Online Tension Distribution, and key words: Power cables, Real-time systems, Position control, Synchronization, Motion control, Dynamics, Linear programming. Abstract: Achieving high-precision position control while maintaining positive cable tensions is the most challenging issue for the motion control of cable-driven parallel robots, which should be considered significantly. Different from the existing control schemes with online tension distribution that needs real-time computing in each control cycle, a novel dual-loop dynamic control scheme is proposed in this article, where a paralleled dual-loop tracking strategy is introduced to provide a more compatible scheme, which consists of two tracking loops: 1) the tension control loop and 2) the position control loop. In the former loop, the offline tension distribution is adopted to avoid cable hanging loosely and the real-time feasibility of the distribution method is no longer a necessary demand. In the latter loop, due to the complex dynamics characterized by the cable-driven form, the cooperative motion relation among multiple cables and inevitable external disturbances are investigated comprehensively, and the robust synchronization method is included to guarantee the high-precision position control. Afterward, the Lyapunov method is adopted to analyze the strict stability of the whole closed-loop system with both the position and tension control feedback. The experiments indicate that by synthesizing the two control loops, the proposed scheme can dramatically reduce the tracking errors in the trajectory tracking while avoiding the cable relaxation, and particularly, has a satisfactory control effect when the velocity and acceleration of the trajectory have significant oscillations. Additionally, the strong disturbance rejection ability is also validated via robustness experiments. |
8,006 | Please write an abstract with title: The Architecture of Intelligent Agent-based Educational System for Training Students in a Technical University, and key words: Training, Electronic learning, Databases, Scalability, Conferences, Servers, Information technology. Abstract: The article presents the development, implementation and approbation of a multi-level architecture of the intelligent agent-based educational system for training of technical specialists. The proposed architecture combines openness, flexibility and good scalability. This article shows how these quality indicators were achieved through a combination of multi-agent and service-oriented approaches. It describes the purpose and components of each level, presents some key aspects of the implementation and shows the results of pedagogical experiments. |
8,007 | Please write an abstract with title: Capella Space X-Band Synthetic Aperture Radar (Sar) Data Applied to Environmental and Humanitarian Use Cases in Earth Observation with A Focus on Urban Footprint Mapping, and key words: Space vehicles, Earth, Satellite constellations, Costs, Agriculture, Sensors, Synthetic aperture radar. Abstract: Small-sat systems are providing unprecedented access to remote sensing data and at a cost far lower than traditional spacecraft. This makes them appealing for a range of environmental and humanitarian monitoring applications previously thought unfeasible. In this paper we are demonstrating Capella Space's VHR X-band SAR, high-revisit satellite constellation applied to rice agriculture, glaciology, and a particular focus on urban mapping. |
8,008 | Please write an abstract with title: Research on food security system based on data processing, and key words: Earth, Ethics, Biological system modeling, Government, Developing countries, Safety, Reliability. Abstract: Simply put, contemporary human food systems still take a long time to develop. Compared with developed countries, developing countries need longer time to prepare and they should pay more attention to ethical food management. From the perspective of people’s safety, governments should invest more. At the same time, it is necessary to protect the ecological environment and achieve sustainable development. Under the current food system, the priorities of food distribution are efficiency and profit. Based on this background, we try to optimize the current food system by creating an equitable and sustainable food system model. From an ethically sound perspective, we select relevant and important factors to construct our model and determine the relevant weights. The results of the analysis illustrate that we need to optimize the food system in five aspects: political, health, social, economic, and environmental, which cannot be underestimated to enhance the reliability of the food security system. |
8,009 | Please write an abstract with title: Is the photonic crystal in the butterflies T. imperialis and P. sesostris optimal?, and key words: Photonic crystals, Photonic band gap, Lattices, Optical devices, Australia, Biomedical optical imaging, Geometrical optics, Optical refraction, Optical variables control, Robustness. Abstract: An identical triclinic photonic crystal occurs within the green scales of two unrelated species of butterfly: Teinopalpus imperialis and Parides sesostris. A photonic band structure calculation is performed to determine if the structure is optimal |
8,010 | Please write an abstract with title: Coverage Guided Multiple Base Choice Testing, and key words: Visualization, Systematics, Software quality, Tools, Software reliability, Test pattern generators, Testing. Abstract: A coverage guided input domain testing approach is presented with a feedback loop-controlled testing workflow and a tool is developed to support this workflow. Multiple base choices coverage criterion (MBCC) is chosen for systematic unit test generation in the proposed approach and branch coverage information is utilized as feedback to improve selection of bases, which results in improved branch coverage. The proposed workflow is supported with the tool designed and developed for coverage guided MBCC-based unit testing. |
8,011 | Please write an abstract with title: Site-Level Deterministic Channel Emulator: Grid-based Architecture and Continuous Channel Emulation Technique, and key words: Wireless communication, Heuristic algorithms, Architecture, Computer architecture, Ray tracing, Spatial databases, Robustness. Abstract: Deterministic channel emulator applicable in both static and dynamic scenarios are essential for testing a performance of a large-scale wireless communication system, such as cyber-physical system, with high accuracy. Despite providing a better accuracy than a stochastic approach, deterministic channel simulation such as ray tracing (RT) is time-consuming especially in the dynamic scenario. Therefore, implementing such deter-ministic approach in the channel emulator is challenging due to hardware constraint and real-time computation requirement. In this paper, a grid-based architecture is proposed as an alternative approach to realize the deterministic channel emulator. Here, RT is utilizing to only generate spatial channel parameters at specific grid node and stores in the emulator database. Then, continuous time-variant channel of a moving mobile station is synthesized by interpolating parameters of the tapped delay line channel at neighbor grid nodes, which has been converted from the spatial ones. Basic building-block of the proposed architecture and challenges will be addressed in the paper. |
8,012 | Please write an abstract with title: Reconfiguring Network Slices at the Best Time With Deep Reinforcement Learning, and key words: Deep learning, Costs, Network slicing, Reinforcement learning, Quality of service, Throughput, Network function virtualization. Abstract: The emerging 5G induces a great diversity of use cases, a multiplication of the number of connections, an increase in throughput as well as stronger constraints in terms of quality of service such as low latency and isolation of requests. To support these new constraints, Network Function Virtualization (NFV) and Software Defined Network (SDN) technologies have been coupled to introduce the network slicing paradigm. Due to the high dynamicity of the demands, it is crucial to regularly reconfigure the network slices in order to maintain an efficient provisioning of the network. A major concern is to find the best frequency to carry out these reconfigurations, as there is a trade-off between a reduced network congestion and the additional costs induced by the reconfiguration. In this paper, we tackle the problem of deciding the best moment to reconfigure by taking into account this trade-off. By coupling Deep Reinforcement Learning for decision and a Column Generation algorithm to compute the reconfiguration, we propose Deep-REC and show that choosing the best time during the day to reconfigure allows to maximize the profit of the network operator while minimizing the use of network resources and the congestion of the network. Moreover, by selecting the best moment to reconfigure, our approach allows to decrease the number of needed reconfigurations compared to an algorithm doing periodic reconfigurations during the day. |
8,013 | Please write an abstract with title: When mathematics knocks physics or the true story of the layer copper factor, and key words: Mathematics, Physics, Copper, Maxwell equations, Skin, Magnetic analysis, Magnetic losses, Magnetic devices, Conductors, Finite element methods. Abstract: Summary form only given. In 1D analytical theories aimed at calculating winding losses in magnetic devices, one usually introduces a "layer copper factor" to account for layer porosity (i.e. several conductors per layer). The existence of this factor is accepted by anyone since 1966 although it leads to non-physical equations where the skin depth varies depending on the winding pitch. The author presents a theoretical discussion on the origin of the copper factor, and shows how it does not respect Maxwell equations, leading to non-physical conclusions such as a skin depth depending on winding pitch. The author also looks at non-physical models of the phenomena and shows via finite element analysis a specific 2D field effect occurring in typical round wire windings. The purpose of this paper is not to say that the layer copper factor cannot be used, but to show what it really is and that it comes from a tricky 1.5D model. Another purpose is to illustrate, as an interesting example, how theoretically wrong justifications have propagated from one paper to another during 35 years. |
8,014 | Please write an abstract with title: Evaluation of students programming skills on a computer programming course with a hierarchical clustering algorithm, and key words: Task analysis, Programming profession, Clustering algorithms, Tools, Python, Measurement, Java. Abstract: This Research Full Paper presents a computational hierarchical clustering approach to identify groups of college students from a Computer Science 1 (CS1) course that need extra help with the programming content. We first defined a set of features that characterize the student's programming skills in a CS1 course. Next, we applied a hierarchical clustering algorithm to bring together the students with similar skills by analyzing the source code they developed for different tasks. Finally, we evaluated the quality of the model and analyzed the different clusters. We processed a total of 630 source code tasks, for which our results indicate the formation of three clusters. We have found that one of the clusters has a large number of students with possible difficulties in programming. The other two clusters, although having different coding behaviors, reached high levels of knowledge about the contents taught. We conclude that features extracted from the students source codes can be used to group students into clusters that indicate their performance trends throughout the course. |
8,015 | Please write an abstract with title: A micropower OTA for digitally calibrated algorithmic ADCs, and key words: Signal processing algorithms, Calibration, Design methodology, Power dissipation, Circuits, Switches, Low voltage, Prototypes, Biomedical signal processing, Signal resolution. Abstract: The paper presents techniques to realize micropower OTAs using the inversion coefficient design methodology. Such OTAs find use in low speed moderate resolution algorithmic ADCs where use of digital calibration relaxes the analog performance requirements while simultaneously demanding low voltage operation to reduce the power dissipation of the added digital circuitry. A prototype switched OTA sample and hold and gain-by-two stages was fabricated in 0.5-/spl mu/m CMOS. Measured results indicate that the fabricated prototype gain-by-two amplifier dissipates 30 /spl mu/W at 1.5 V and shows a gain of 1.84 V/V when switched at 100 KHz. |
8,016 | Please write an abstract with title: Spherical Linguistic Petri Nets for Knowledge Representation and Reasoning Under Large Group Environment, and key words: Linguistics, Petri nets, Cognition, Knowledge representation, Expert systems, Knowledge acquisition, Adaptation models. Abstract: Fuzzy Petri nets (FPNs) are a promising modeling tool for knowledge representation and reasoning of rule-based expert systems. However, there exist limitations in representing ambiguous knowledge and performing approximate inference in traditional FPNs. Additionally, knowledge parameters are usually provided by some experts in existing FPN methods. In response to these issues, a new version of FPNs, named spherical linguistic Petri nets (SLPNs), is introduced in this article for knowledge representation and reasoning in the large group context. To this end, spherical linguistic sets are applied to capture imprecise knowledge and represent the uncertainty of experts’ judgements. Furthermore, a large group knowledge acquisition approach is developed to determine knowledge parameters. A bidirectional inference algorithm is developed for implementing the reasoning process and identifying the root causes of an appointed event. Finally, the efficacy and superiority of our developed SLPNs are illustrated by a realistic example regarding stampede risk level assessment in a high-speed railway station. |
8,017 | Please write an abstract with title: CacheNet: Leveraging the Principle of Locality in Reconfigurable Network Design, and key words: Analytical models, Network topology, Optical switches, Telecommunication traffic, Traffic control, Optical fiber communication, Topology. Abstract: Emerging optical communication technologies support the dynamic reconfiguration of datacenter network topologies depending on the traffic they serve. However, to reap the benefits of such demand-aware networks, a control logic is required which allows to quickly learn and adapt to traffic patterns. This paper presents CacheNet, a novel approach to efficiently control demand-aware networks. CacheNet leverages temporal and spatial locality in the traffic by managing the reconfigurable links of the optical switches as a links-cache. Network traffic, in turn, can be served either by a link from the link-cache component or by a demand-oblivious topology component. We study several classic caching algorithms and provide an analytical model which captures their performance benefits compared to an all demand-oblivious topology. Our analytical results show that based on the hit ratios and the links-cache size, our hybrid design can outperform designs that are based only on demand-oblivious topology. |
8,018 | Please write an abstract with title: Silicon Central Pattern Generator Model of Cardiac Contraction Behavior, and key words: Heart, Synapses, Data models, Adaptation models, Biological system modeling. Abstract: Synchronization of brain cells underlies the generation of key motor functions including breathing, cardiac activity and locomotion. The circuitry mechanisms underpinning this phase-locked rhythmic patterns have been studied in local circuitry networks known as Central Pattern Generators (CPGs). Biological CPGs (bCPGs) in healthy nervous systems demonstrate robustness and adaptation in response to variations in sensory feedback. This study aims at constructing biologically-plausible network models of analog hardware CPGs (hCPGs), and assimilating the membrane voltages of all constituting neurons in the network with large-scale constrained nonlinear optimization. The hCPG model exhibits a tetra-phasic behavior where the spike timings of the four neurons corresponds to the activation of the heart chambers: sino-atrial node, left atrium, left ventricle and right ventricle. We show the results of modelling electrocardiogram (ECG) recordings from anesthetized dogs. This research will facilitate designing bioelectronic implants to recover cardiac function in heart diseases. |
8,019 | Please write an abstract with title: Smart Vehicle Number Plate Scanning System using Optical Character Recognition Strategy, and key words: Surveillance, Transportation, Lighting, Traffic control, License plate recognition, Classification algorithms, Character recognition. Abstract: Due to the ever-increasing number of automobiles and transportation systems, it's becoming increasingly difficult for people to keep track of everything. Tracking stolen automobiles and parking tolls are two examples of traffic surveillance. Red-light enforcement is another. To make matters worse, there are several plate types, sizes, rotations, and lighting conditions that must be taken into account throughout the photo capture process, making it a challenging challenge to tackle. This approach is commonly used in toll booths in India. Tollbooth operators lose a great deal of money as a result of widespread misconduct and irregularities at the toll booths. Among the methods for identifying vehicles employed in the proposed approach is the Intelligent Neural Classifier Algorithm. Identifying the registration information in digital frames acquired by a camera is the main focus of this study. Typically, Intelligent Neural Classifier uses an algorithm called Number Plate Classifier Algorithm that mainly used for vehicle identification and Object Character Recognition (OCR) that recognize the character from the license plate. Surveillance systems assess their results and provide a detailed report on each object after it has been identified and as a means of determining whether or not a vehicle is legal or not. |
8,020 | Please write an abstract with title: Design and Construction of an H-bridge Inverter used in Wireless Power Transfer, and key words: H-bridge inverter, wireless transfer, MOSFET transistor driver, Schmitt-Trigger, bootstrap circuit. Abstract: This paper presents the H-bridge inverter prototype design and construction used in wireless power transfer, designed to operate at high frequencies. The block diagram of the electronic subassemblies of the inverter, hex inverter with Schmitt-Trigger, drivers, and power stage, is presented, from the design step to the final product. Throughout the paper, aspects related to the functioning, testing, and discrete electronic components parameterization and also aspects to improve the output inverter voltage waveform are presented. |
8,021 | Please write an abstract with title: PUBG Winner Ranking Prediction using R Interface ‘h2o’ Scalable Machine Learning Platform, and key words: Training, Machine learning algorithms, Neural networks, Linear regression, Prediction algorithms, Random forests, Testing. Abstract: Gaming is an important aspect of the new generation and with this aspect comes improvement, which can be concerning graphics, sounds, gameplay, interaction, or ranking. The ranking is a healthy competition where different players can know standing around the globe, which makes them more competitive and help them stand above all. PUBG is multiplayer gaming that is supported on various platforms with a huge number of players online every day. This huge number can lead to a huge ranking, to overcome this difficulty there is a package in R programming called H2O which helps the developer to work with large numbers of datasets and also apply all different types of algorithms ranging from Machine Learning as well as Deep Learning and various unsupervised Learning. The algorithms used in this research are Linear Regression, Random Forest in the category of Machine Learning & Deep Neural Network in the category of Deep Learning. The metric evaluation of all these algorithms was carried out by using MAE (Mean Absolute Error) for the ranking of different players. |
8,022 | Please write an abstract with title: Columnar structure and some properties of metal-evaporated tape, and key words: Magnetic films, Magnetic recording, Anisotropic magnetoresistance, Video recording, Vacuum technology, Coatings, Atmosphere, Substrates, Shape, Magnetic properties. Abstract: Metal Evaporated Video Tape (ME Tape) has been developed for highly competitive and innovative mass-produced VTRs. A magnetic recording layer of Co-Ni film of 0.15 μm was prepared by vacuum roll coating technology in an oxygen atmosphere using polyester substrate. The shape of the columnar grains forming the film is influenced by this deposition system which has a continuously varied incidence and deposition rate. The anisotropic columnar structures and properties of the ME Tape were investigated. The magnetic properties of a series of films made by varying the minimum incident angle were investigated and the results of the magnetic anisotropies and different recording characteristics of different tape transport directions are presented here. On the other hand, the still-frame life and the frictional behavior of ME Tape has shown no anisotropies for tape transport. |
8,023 | Please write an abstract with title: Design and Analysis of 8-Bit Stable SRAM for Ultra Low Power Applications, and key words: Transistors, Random access memory, Decoding, Logic gates, Inverters, Power dissipation, Stability analysis. Abstract: SRAMs (Static Random Access Memory) speed and power consumption are the most important which leads to complex designs with the power consumption of reducing the power during the read and write operations. Exceeding leakage power becomes the major concern in CMOS which has been used for deep micron process. Whenever the supply voltage is lowered it leads to lower oxide thickness and threshold voltage. The objective of this paper is to analyze the existing leakage power techniques, where an SRAM is designed using each technique. These techniques are implemented in tanner tool in which the waveforms are analyzed. By doing so a clear idea has been taken. An array of 8×8 SRAM has been designed. This cell design is able to reduce the static power dissipation and a high reading stability is predicted. To determine schematic solutions Tanner EDA tool is used. The performance of the proposed technique is investigated in terms of area and power. The design techniques have been analyzed. Based on the results obtained, there is a decrease in static power dissipation and the stability of the memory cells also been improved. |
8,024 | Please write an abstract with title: Data collection with battery and buffer consideration in a large scale sensor network, and key words: Batteries, Intelligent networks, Large-scale systems, Packaging, Routing, Data communication, Energy consumption, Relays, Distributed power generation, Sensor systems and applications. Abstract: In a pure sensor network thousands of sensors are distributed over a large area. Sensor data is relayed from sensor node to node until it reaches the edge node, where it is then routed by wire to the host. In this paper we study the effect of data collection on the battery and buffer of a sensor node, and on the overall sensor network. We determine the relationship among battery life, sampling frequency, buffer size, etc. We claim that using identical sensors throughout a large scale sensor network may not achieve the best result. We suggest some guidelines for deploying a large scale sensor network. We then propose routing algorithms that are robust, truly distributed, and efficient in utilizing the sensor network. |
8,025 | Please write an abstract with title: Design of FIR digital filters with prescribed flatness and peak error constraints using second-order cone programming, and key words: Finite impulse response filter, Digital filters, Minimax techniques, IIR filters, Delay, Optimization methods, Transformers, Linear programming, Design methodology, Least squares methods. Abstract: This paper studies the design of digital finite impulse response (FIR) filters with prescribed flatness and peak design error constraints using second-order cone programming (SOCP). SOCP is a powerful convex optimization method, where linear and convex quadratic inequality constraints can readily be incorporated. It is utilized in this study for the optimal minimax and least squares design of linear-phase and low-delay (LD) FIR filters with prescribed magnitude flatness and peak design error. The proposed approach offers more flexibility than traditional maximally-flat approach for the tradeoff between the approximation error and the degree of design freedom. Using these results, new LD specialized filters such as digital differentiators, Hilbert Transformers, Mth band filters and variable digital filters with prescribed magnitude flatness constraints can also be derived. |
8,026 | Please write an abstract with title: Human-Centered Design of Tool Support for Managing Oral Anticoagulation, and key words: Systematics, Surgery, Medical services, Tools, User experience, Usability, Task analysis. Abstract: The Perioperative and peri-interventional management of oral anticoagulation are major clinical challenges with respect to stroke and bleeding risks in various interventional and surgical procedures. This paper illustrates the human-centered (re-)design of computer-based tool support providing individualized treatment concepts for patients. Considering pragmatic and hedonic aspects of usability and user experience, both the original and the revised version were evaluated with 20 medical experts each. Results of the User Experience Questionnaire (UEQ) and numbers of necessary interaction steps for task completions indicate that usability and user experience have been improved by the applied human-centered design measures. Therefore, this paper exemplifies the effects of systematic human-centered design efforts on usability and user experience as crucial aspects of patient safety, workload of medical professionals and long-term acceptance. |
8,027 | Please write an abstract with title: Decentralized Bayesian negotiation for cooperative search, and key words: Bayesian methods, Probability density function, Robustness, Optimal control, Unmanned aerial vehicles, Australia, Remotely operated vehicles, Mobile robots, Delay, Mobile communication. Abstract: This paper addresses the problem of coordinating a team of multiple heterogeneous sensing platforms searching for a single lost target. In this approach, the utility of a control sequence is a function of the probability density function (PDF) of the target state. Each decision maker builds an equivalent estimate of this PDF by communicating and fusing the information from the other sensor nodes. Coupled utilities incite the agents to collaborate and to agree on the next best set of actions. Decentralized cooperative planning is achieved via anonymous negotiation based on communication of expected observed information. Simulation results demonstrate the efficiency of the cooperative trajectories for a team of autonomous airborne search vehicles. |
8,028 | Please write an abstract with title: Throughput and spectral efficiency analysis in 3G FDD WCDMA cellular systems, and key words: Throughput, Spectral analysis, Multiaccess communication, Frequency, Capacity planning, Aggregates, Wireless communication, Telecommunication traffic, Wideband, 3G mobile communication. Abstract: Multimedia applications require from wireless communications service providers to support service mix traffic (voice, data, and real time audio/video) to the end wireless subscriber. Wideband code division multiple access (WCDMA) has been chosen as a basic radio access technology for the Universal Mobile Telecommunications System/ International Mobile Telecommunications-2000 (UMTS/IMT- 2000) to support multimedia services. Throughput and spectral efficiency are fundamental parameters in capacity planning for 3G cellular network deployments. In this paper, we investigate the downlink (DL) aggregate user average throughput and spectral efficiency performance of the standard universal mobile telecommunications system terrestrial radio access WCDMA frequency-division duplex (UTRA WCDMA FDD) system for different scenarios of user population density, coverage area and frequency reuse factor in a cellular environment. A standard 19-basestation cellular architecture is used in our analysis. Our analysis reveals that the aggregate user throughput performance is fluctuating as a result of changes in cell size, channel bandwidth, frequency reuse and subscribers density. Therefore, very careful network capacity planning is needed in order to operate the WCDMA FDD networks in a cost-effective manner. |
8,029 | Please write an abstract with title: The Principle of Data Distribution over Physical Data Storage, and key words: Time-frequency analysis, Storage management, Neural networks, Memory, Media, Writing, Software. Abstract: The article discusses the data storage system as a physical storage management system. Given that the data storage system is a multiuser system, it is assumed that uniform use of storage matrix cells, that is, data media is an important factor in improving storage performance. The article considers the necessity of distribution data across cells in such a way as to ensure the uniform use of physical storage media located at the same level of storage. As it is considered the multiuser system, the question is discussed about the time of user access to the storage matrix cells that should not exceed a given value. The efficiency criterion of the problem under consideration was defined. A data migration mechanism is proposed, in which the distribution of data over different media ensures uniformity of their use. The proposed mechanism for distributing data within a storage matrix is based on Bellman's principle of optimality. It is proposed to use an additional controller that implements such a migration mechanism. |
8,030 | Please write an abstract with title: Audio-visual talking face detection, and key words: Face detection, Acoustic noise, Working environment noise, Teleconferencing, Indexing, Testing, Videoconference, Large scale integration, Degradation, Correlation. Abstract: Talking face detection is important for videoconferencing. However, the detection of the talking face is difficult because of the low resolution of the capturing devices, the informal style of communication and the background sounds. In this paper, we present a novel method for finding the talking face using latent semantic indexing approach. We tested our method on a comprehensive set of home video conferencing sessions with a very high detection rate. Our experiments show that the LSI method accuracy degrades gracefully in a noisy environment as opposed to the correlation method which simply fails in presence of noise. |
8,031 | Please write an abstract with title: Research of E-commerce Resource Allocation Method Based on Clustering, and key words: Resource management, Mathematical model, Prediction algorithms, Databases, Classification algorithms, Filtering. Abstract: This paper focuses on the research of diversified e-commerce activities in e-commerce platform, mapping various business activities into the framework of resource allocation. When a certain number of users access the platform concurrently, the system allocates resources. This paper abandons the traditional simple filtering mode to analyze the historical data of e-commerce platform, abstracts the user commodity binary network and divides the user communities according to the attribute information of users and commodities and the purchase logs of users. By analyzing the community of users, we can allocate resources reasonably. In the binary network of users and goods, there are still many problems in user based clustering. For example, the sparseness of user attribute information, the proportion of intersection between users' purchasing goods is too small and so on. According to the characteristics of data and the existing problems, this paper selects the SimRank algorithm and improves it. In this paper, a combined similarity index based on user attributes and network structure is proposed to improve the accuracy of user clustering, and a reasonable scheme of resource allocation is proposed by using the community division of users, which increases the accuracy of user clustering, achieves the expected design goals, and improves work efficiency. |
8,032 | Please write an abstract with title: A Coupled Integral Equation Solution for Microstrip Transmission Lines, and key words: Couplings, Integral equations, Microstrip, Transmission lines, Transmission line theory, Dielectric substrates, Computer interfaces, Geometry, Permittivity, Laplace equations. Abstract: A theoretical analysis of microstrip transmission lines is presented which is based on a derivation of a set of coupled integral equations in terms of a free-space Green's function in the related inhomogeneous region. |
8,033 | Please write an abstract with title: Precision Force Tracking Control of a Surgical Device Interacting With a Deformable Membrane, and key words: Surgery, Force, Nonlinear control, Medical robotics, Adaptation models, Mathematical models, Force control. Abstract: Well-designed robotic-assisted surgical systems have been widely applied in medical treatments to make surgical operations precise and efficient. For these, precise tracking of the interaction force between the surgical device and affected human tissues is an important aspect to improve the safety and surgery success rate. In this development, an adaptive integral terminal sliding mode force control scheme for a piezoelectric actuator-based ear surgical device is presented to achieve precision force tracking during the interaction with the tympanic membrane that is soft and deformable, an important aspect in the course of such a surgery. Particularly, a force error-based integral terminal sliding manifold is employed to guarantee the finite-time convergence performance. A related adaptive control law is developed and deployed to estimate the controller’s parameters and update the switching gain to accommodate system uncertainties, disturbances, and the complex contact environment. Then, the stability of the proposed control method is analyzed and discussed rigorously based upon the Lyapunov theory and method. Furthermore and rather importantly, comparative experiments with three other force controllers are conducted for both S-curve and sine waves with different frequencies. The force tracking results interacting with the deformable membrane demonstrate that the best performance is achieved by the proposed method with all the statistical errors within a suitably effective range of 2.5% and 9.0% of the maximum amplitude. |
8,034 | Please write an abstract with title: Design Analysis of Fullbridge Converter on Proton Exchange Membrane Fuelcell, and key words: Protons, Analytical models, Hydrogen, Mathematical models, Inverters, Steady-state, Integrated circuit modeling. Abstract: Fuelcell is an electrochemical energy conversion device that converts hydrogen that reacts with oxygen into water, simultaneously producing electrical and thermal energy in a process. Fuelcell is a simple form of technology such as a battery that can be refueled to get its energy back, in this case the fuel is hydrogen. The implementation of this study simulated the Fuelcell and added the use of a Fullbridge DC - DC type power converter that uses isolated which is able to raise the voltage with a voltage ratio that can maintain its efficiency well. This study presents fuelcell and fullbridge modeling to obtain high efficiency using PSIM applications. And performed openloop integration on fuelcell with AVISTA PEM Fullbridge SPECS. In this trial, researchers varied the fuelcell temperature using 3 temperature variations, namely 60°C = 333.15K, 80°C = 353.15K and 100°C = 373.15K. From this temperature variation, it produces increased power and produces a fairly good efficiency of 82 – 84%. As well as keeping a constant voltage of 311 volts with an error of 1.5%. With this, humans can be used to become an alternative source of energy needed, one of which is in the automotive world. |
8,035 | Please write an abstract with title: The Application Of LSB Steganography For Secure Text and Hiding Confidential Information Using AES Cryptography, and key words: Steganography, Information security, Companies, Manuals, Media, Encryption, Intelligent systems. Abstract: Maintaining the confidentiality and security of a company's message are two fundamental aspects, primarily if the message is used for business purposes. It will be perilous for the company if the message file falls into the wrong hands. So that in sending messages, encryption should be done first and hidden into the media. The encryption technique we use in this application is Advanced Encryption Standard (AES) cryptography combined with Least Significant Bit (LSB) steganography techniques in mp3 extension files. The integration of the two techniques aims to provide protection or security systems for secret file messages in the form of images or images sent. This study indicates that the application of a combination of AES and LSB techniques can be used on document files so that the application can provide information security solutions for highly confidential company documents both when the document is sent. When the document is stored, then there are no errors in the functionality of the application. As evidenced by the results of comparing the encryption and decryption process of messages through the application with manual encryption and decryption of messages. |
8,036 | Please write an abstract with title: Fourier-synthesis of optical waveforms, and key words: Optical pulse generation, Optical pulses, Space vector pulse width modulation, Nonlinear optics, Optical mixing, Shape, Power generation, Bandwidth, Frequency synthesizers, Laser transitions. Abstract: The talk will describe the generation of an optical pulse where the spectrum is sufficiently broad that the waveform is a single cycle in length, and where the temporal shape of this waveform may be synthesized. Specifically, we report the generation of a train of single-cycle optical pulses with a pulse width of 1.6 fs, a pulse separation of 11 fs, and a peak power of 1 MW. To synthesize a periodic waveform that is not sinusoidal, it is required that the radiation be phase coherent across its spectrum, and that the bandwidth of the radiation be large as compared to its central frequency. To obtain a multi-octave phase coherent spectrum, we use Q-switched laser pulses at 1.064 /spl mu/m and 807 nm to drive the fundamental vibrational transition in deuterium slightly off resonance. An essential ingredient of the work that is described here is the use of non-resonant four-wave frequency mixing in xenon as a diagnostic for the generated pulses. |
8,037 | Please write an abstract with title: Applicants' Perception Towards the Application of AI in Recruitment Process, and key words: Industries, Navigation, Brand management, Standards organizations, Companies, Data collection, Artificial intelligence. Abstract: An organization or business needs professional employees to achieve its targets in order to succeed in this dynamic period. They are now at the forefront of the fourth technological revolution. In this new era, everybody needs strong, future and creative workers to stay successful. To order to navigate the new landscape and improve the market climate, companies with a successful management plan will include an acceptable employee. Recruitment strategy is the primary consideration for any company to employ skilled employees who are willing to accomplish their job objectives more efficiently and effectively. Clearly, the recruiting approach as a core feature of the company is focused on data collection for decisionmaking. This paper discusses artificial intelligence (AI) and the effect it has on the recruiting industry. This thesis explored the effect of AI on managers and applicants during the first phases of the recruiting process. |
8,038 | Please write an abstract with title: Self-organizing Software Defined Mesh Networks to Counter Failures and Attacks, and key words: Mesh networks, Automation, Redundancy, Manuals, Telecommunication traffic, Network architecture, Denial-of-service attack. Abstract: With current Traditional / Legacy networks, the reliance on manual intervention to solve a variety of issues be it primary operational functionalities like addressing Link-failure or other consequent complexities arising out of existing solutions for challenges like Link-flapping or facing attacks like DDoS attacks is substantial. This physical and manual approach towards network configurations to make significant changes result in very slow updates and increased probability of errors and are not sufficient to address and support the rapidly shifting workload of the networks due to the fact that networking decisions are left to the hands of physical networking devices. With the advent of Software Defined Networking (SDN) which abstracts the network functionality planes, separating it from physical hardware – and decoupling the data plane from the control plane, it is able to provide a degree of automation for the network resources and management of the services provided by the network. This paper explores some of the aspects of automation provided by SDN capabilities in a Mesh Network (provides Network Security with redundancy of communication links) which contribute towards making the network inherently intelligent and take decisions without manual intervention and thus take a step towards Intelligent Automated Networks. |
8,039 | Please write an abstract with title: Promises Come to Fruition as 5G Reaches Critical Mass [Mobile Radio], and key words: 5G mobile communication, Market opportunities. Abstract: I n the years that led to the deployment of 5G networks, people often read of the envisioned transformative power of 5G in everyday life, with examples usually drawn from health care, entertainment, and automation. As explored in this column, these promises are finally coming to fruition as more trials and near-commercial deployments showcase the capabilities of 5G in these areas. At the same time, reports are coming in documenting that 5G adoption is reaching critical mass, typically targeting the midband spectrum in an effort to deliver both maximum speeds and optimal coverage. |
8,040 | Please write an abstract with title: Action Recognition Using Frame Average Feature Map with 2D Convolutional Neural Network for Real-Time Video Analysis, and key words: Streaming media, Real-time systems, Image recognition, Two dimensional displays, Surveillance, Computer architecture, Convolutional neural networks. Abstract: A typical video action recognition system has a high computational cost and is not suitable for real-time applications. To solve this problem, we propose an action recognition method using a two-dimensional convolutional neural network (2D CNN), which has a significantly lower computational cost than a 3D CNN. In addition, the proposed method uses a small number of frames from the video for an accurate result. The proposed method consists of: i) pretrained VGG16,which is a2D CNN, to train the action of the video andii) a test with an average of ten frames per dataset. The proposed method improved the recognition performance with a reduce computational cost by using the average of several frames instead of directly analyzing all the frames for real-time video analysis environments. |
8,041 | Please write an abstract with title: Unravelling Diabetes-related Pathways Using 16S rRNA Microbiome Data from Human Gut and Nasal Cavity, and key words: Microorganisms, Parkinson's disease, Nose, Muscles, Biology, Diabetes, Phylogeny. Abstract: Type 2 Diabetes (T2D) is a complex chronic illness that affects around 90% of diabetic patients worldwide. Prediabetes is an elementary phase for T2D that is recommended to be early diagnosed to prevent its progression. In this study, we used 16S rRNA data from the gut and nasal cavity of prediabetic and control patients to identify common and exclusive diabetic pathways for each body site. Furthermore, using the Phylogenetic Investigation of Communities by Reconstruction of Unobserved States (PICRUSt) as well as MicobiomeExplorer in the pathway enrichment analysis, we also identified the pathways that are able to differentiate between prediabetic and control patients. Moreover, our study highlights some important aspects, (1) the number of differentially enriched pathways in the nasal cavity is two times more than that in the gut; 22 and 11 respectively, (2) Cardiac muscle contraction and Parkinson's disease were the only common pathways identified from the data of gut and nasal cavity, (3) The difference in the values of pathways enrichment in prediabetic and control was more explored in the gut microbial community than in the nasal cavity, (4) the gut's data showed higher diagnostic power than the nasal cavity's data in differentiation between the prediabetic and control patients. In conclusion, the microbiome data could lead to biologically relevant insights on the progression of human diseases. Moreover, the gut microbiome is more susceptible to the prediabetes pathogenesis than the nasal cavity microbiome. |
8,042 | Please write an abstract with title: Forgery-Domain-Supervised Deepfake Detection With Non-Negative Constraint, and key words: Faces, Forgery, Deepfakes, Task analysis, Feature extraction, Crops, Training. Abstract: Fake faces produced by deepfake techniques have attracted public concerns in recent years. Deepfake detection is a binary classification task that distinguishes fake faces from real ones. As the training data for deepfake detection is usually generated from real faces via various face forgery methods, it is difficult for a single binary decision boundary to distinguish fake faces. Besides that, the learned features often involve irrelevant information for identifying fake faces that are generated from diverse forgery methods. To deal with such challenges, unlike existing approaches that regard fake detection as a binary classification, we re-model the task as a multiclass forgery-domain classification task, where each forgery method is treated as a distinct class. This simplifies the complex decision boundary brought by the diversity of forgery patterns and provides more forgery-relevant information for the learning process. In addition, we introduce a non-negative constrained learning framework composed of non-negative features and a non-negative constrained classifier (NCC) to block irrelevant features with zero weights and enhance forgery-relevant features with positive weights, leading to a sparse structure of the classifier. Furthermore, to capture subtle and discriminative forgery-relevant features, we propose an integration module over augmented faces based on cross-attention. We demonstrate that our approach achieves competitive performance and generalization ability on widely-used benchmarks through extensive experiments. |
8,043 | Please write an abstract with title: On construction of rate-compatible low-density Parity-check codes, and key words: Parity check codes, Automatic repeat request, Throughput, AWGN, Error correction codes, Decoding, Forward error correction, Turbo codes, Data communication, Adaptive coding. Abstract: In this letter, we present a framework for constructing rate-compatible low-density parity-check (LDPC) codes. The codes are linear-time encodable and are constructed from a mother code using puncturing and extending. Application of the proposed construction to a type-II hybrid automatic repeat request (ARQ) scheme with information block length k=1024 and code rates 8/19 to 8/10, using an optimized irregular mother code of rate 8/13, results in a throughput which is only about 0.7 dB away from Shannon limit. This outperforms existing similar schemes based on turbo codes and LDPC codes by up to 0.5 dB. |
8,044 | Please write an abstract with title: Crosstalk prediction in twisted bundles by a neural approach, and key words: Crosstalk, Wires, Neural networks, Electronic mail, Dielectrics, Finite element methods, Computer networks, Voltage, Impedance, Admittance. Abstract: A neural network based procedure is proposed for the crosstalk prediction in twisted bundles. The nonuniform bundle is approximated as a cascade of uniform sections and the neural network is suitably trained with few cross section configurations to learn the behavior of the per unit length parameters. The procedure allows a fast and accurate prediction tool. |
8,045 | Please write an abstract with title: Brilliance Bias in GPT-3, and key words: Analytical models, Focusing. Abstract: Language has a profound impact on how we perceive the world. With GPT-3’s rise in popularity, as of latest utilized in 300 applications averaging 4.5 billion words per day, it is critical to identify and correct biases in its generations. A variety of biases have been identified in generative language models, spanning biases based on gender, race, and religion. In this paper, we pioneer the study of the Brilliance Bias for generative models. This implicit, yet powerful bias imposes the idea that “brilliance” is a male trait and in turn, sets back women’s achievements starting as early as ages 5-7. We perform an analysis of two GPT-3 models, the base GPT-3 model (davinci) and InstructGPT (text-davinici-002), focusing on adjectives, verbs and lexicons found in their generations. Our analysis reveals the presence of substantial Brilliance Bias across both models. |
8,046 | Please write an abstract with title: GPR studies in the piano di pezza area of the ovindoli-pezza fault, Central Apennines, Italy: Extending palacoselsmic trench investigations with high resolution GPR profiling, and key words: Ground penetrating radar, Earthquakes, Geoscience, Educational institutions, Fans, Surface topography, Satellite ground stations, Frequency, Radar applications, Data processing. Abstract: A high-resolution 200 MHz frequency GPR profile with 0.1 m station spacing was collected using a Pulse EKKO 100 system, adjacent to a trench site previously excavated and interpreted by Pantosti et al., 1996. The profile intersected the fault scarp on one of the alluvial fans on the northern slope of the Piano di Pezza; this fault scarp was thought to be associated with repe:ated earthquake activity along the Ovindoli-Pezza fault. The trench excavation exposed a 4 metre sedimentary section formed principally of palaeosols and alluvial fan gravel dipping gently toward the south west, into the Piano di Pezza basin. The deposits exposed in the trench are strongly deformed in a 7 metre complex fault zone, located beneath the main topographic scarp. The scarp is 6.8 metres high at this location. Two palaeo-earthquake events were recognised in the trench, the most recent (circa. 1300 A.D.?) with a vertical displacement of 2.8 to 3.0 metres, and thoucght to be responsible for the current scarp formation, surface rupture, and deformation of the sedimentary section exposed in the upper part of the trench. The second event (circa. 1900 B.C.?) is thought to be represented in the lower part of the trench, and estimated to have a minimum vertical displacement of 2.5 metres. The GPR data were processed using Win EKKO radar data processing software and included the application of SEC gain and time-depth conversion utilising a field derived CMP analysis which provided a velocity of 0.06 dns. In the upper part of the GPR section a strong continuous radar reflector, thought to represent the top of the carbonate scarp, is clearly imaged beneath 1.5 m of surficial cover, and is abruptly down faulted vertically by approximately 2.8 metres, to the south west. The complex, 7 - metre wide deformation zone, recognised in the trench and associated with the most recent catastrophic event, is clearly imaged in the hanging wall of the fault and exhibits a diminishing deformation intensity towards the south west, terminating with a vertical sequence of antithetic faults with a local cumulative offset of 1.5 metres, thus forming a low angle, south west tilted graben structure. In the lower part of the GPR section, the down thrown carbonate surface forms the north eastern margin of a rotated basement block, above which an asymmetric graben has developed within the sedimentary section, with maximum antithetic fault offset of the order of 0.6 metres. This graben is imaged beneath the sedimentary units exposed by the trenching operations, and is interpreted as representing the base of an approximately 12 metres cumulative vertical offset from the original carbonate surface. The GPR data has thus provided a framework for estimating the extent of extensional and episodic catastrophic activity along the fault, and elucidated the geometric relationship between the faulting in response to recent tectonic events. |
8,047 | Please write an abstract with title: Evaluation of the Efficiency of UAE Sectors on the Basis of Sustainable Development Objectives and Circular Economy Using DEA, and key words: Energy consumption, Economic indicators, Oils, Input variables, Government, Data models, Manufacturing. Abstract: The paper aims at assessing the efficiency of different sectors in the UAE based on sustainability and circularity objectives. Sustainability objectives are based on the three pillars of sustainable development which are economic, social, and environmental development objectives. We considered the number of employees and energy consumption as the input variables and GDP, GHG emission, and waste generated in each sector as the output variables. We employed a data envelopment analysis (DEA) input-output model. The examined sectors are agriculture, crude oil, natural gas and mining, manufacturing and electricity, construction and real estate, trade, and transport, restaurant and hotels, banking and financial services, government, social and personal services. |
8,048 | Please write an abstract with title: Power conditioning for pulsed electrostatic precipitators, and key words: Power conditioning, Electrostatic precipitators, Pulse generation, Voltage, Power generation, Semiconductor diodes, Space vector pulse width modulation, Flashover, Cement industry, Kilns. Abstract: In many industrial applications like coal-fired power plants, cement kilns and sintering plants, electrostatic precipitators (ESP) are the best choice to reduce particulate emissions from the off-gas stream into the environment. Although it is well known that optimization of ESP efficiency in many cases can be achieved by enhancing the static electric field (which is used for both particle charging and precipitation) with short (/spl ap/10 /spl mu/s) high voltage (/spl ap/50 kV) pulses, the technical challenges for the realization of a pulsed power generator suitable for industrial use are enormous. We report on laboratory and field experiments of a novel pulse generator using a fast recovery pseudospark switch and high-power semiconductor diodes. The prototype pulse generator is able to drive capacitive loads of over 150 nF, at peak voltages of up to 40 kV, pulse duration of 6 to 10 /spl mu/s FWHM (full width at half maximum), and repetition rates of over 40 pps. The intentional mismatch between the pulse forming capacitor and the load capacitance reduces the voltage constraints on the switching element by a factor of /spl ap/0.65 while not sacrificing the overall energy efficiency. An efficient energy recovery scheme leads to efficiencies of the order of 90% and above. The pulse generator is able to withstand frequent flashover events in the ESP, with the main limitation in lifetime caused by the high peak current load in the semiconductor diodes during flashover, which can reach up to 8 kA in some cases. Field experiments on sintering plants have shown the suitability of this pulse forming scheme to drive full-scale industrial ESPs. |
8,049 | Please write an abstract with title: Secure scheme for locating disease-causing genes based on multi-key homomorphic encryption, and key words: Genetics, Diseases, Protocols, Medical diagnostic imaging, Integrated circuit modeling, Genomics, Bioinformatics. Abstract: Genes have great significance for the prevention and treatment of some diseases. A vital consideration is the need to find a way to locate pathogenic genes by analyzing the genetic data obtained from different medical institutions while protecting the privacy of patients' genetic data. In this paper, we present a secure scheme for locating disease-causing genes based on Multi-Key Homomorphic Encryption (MKHE), which reduces the risk of leaking genetic data. First, we combine MKHE with a frequency-based pathogenic gene location function. The medical institutions use MKHE to encrypt their genetic data. The cloud then homomorphically evaluates specific gene-locating circuits on the encrypted genetic data. Second, whereas most location circuits are designed only for locating monogenic diseases, we propose two location circuits (TH-intersection and Top-q) that can locate the disease-causing genes of polygenic diseases. Third, we construct a directed decryption protocol in which the users involved in the homomorphic evaluation can appoint a target user who can obtain the final decryption result. Our experimental results show that compared to the JWB+17 scheme published in the journal Science, our scheme can be used to diagnose polygenic diseases, and the participants only need to upload their encrypted genetic data once, which reduces the communication traffic by a few hundred-fold. |
8,050 | Please write an abstract with title: PROFIBUS and PROFInet technology and standardization activity, and key words: Standardization, Production facilities, Field buses, Communication industry, Digital communication, Protocols, Standards development, Manufacturing industries, Servomechanisms, Safety. Abstract: This paper outlines an effective approach for the standard development in industrial digital communications. The paper mainly focuses on the differences between Manufacturing Automation Protocol (MAP) and PROFIBUS, but the detailed technical specifications for both the buses are not described. This paper points out the some of the important items which include: (1) easy to develop and introduce, (2) factory layer concept, and (3) smooth connection to the existing technology. The author believes that a practical solution is more easily accepted by the market than a technology oriented one. |
8,051 | Please write an abstract with title: Board-Level Power Integrity Analysis for Complex High-Speed Printed Circuit Boards, and key words: Fabrication, Transient response, Printed circuits, Resonant frequency, Switches, Reliability engineering, Product design. Abstract: With the increasing speed and complexity of high-performance printed circuit boards, designing a robust Power Delivery Network (PDN) has become the inevitable requirement for the stable and reliable operation of high-speed electronics. On the contrary, poorly designed PDN not only cause various signal integrity (SI) issues but also intensify Conducted and Radiated Emissions (CE & RE) failing EMC compliance at later stages of product design. Therefore, it is pertinent to identify and mitigate potential board-level power integrity (PI) issues before fabrication to prevent iterative hardware prototyping and testing after fabrication. In this work, post-layout PI analysis and optimization flow is presented for a complex high-speed FPGA based data processing board. The analysis is performed in the frequency domain (FD) using the industry's proven electromagnetic (EM) solver tools, while FD data is imported back in the time domain (TD) to assess and improve the transient response of signal switching noise (SSN). |
8,052 | Please write an abstract with title: A compact triple-mode plated ceramic block based hybrid filter for base-station applications, and key words: Ceramics, Resonator filters, Base stations, Dielectrics, Radio frequency, Resonance, 3G mobile communication, Circuit simulation, Coaxial components, Microwave filters. Abstract: A triple-made plated ceramic black based hybrid filter is designed for UMTS base station applications, fabricated and tested. It is designed using 3-D finite element method based electromagnetic simulator along with circuit model based in-house software. The simulated response of the filter matches very well with the measured response. The filter is very compact; its size is 75 mm X 36 mm X 33 mm. It has low loss, compact size, and goad spurious performance. |
8,053 | Please write an abstract with title: Millimeter-Wave New Radio Test Zone Validation for MIMO Over-the-Air Testing, and key words: Testing, Antenna measurements, Three-dimensional displays, Antenna arrays, Antennas, Probes, MIMO communication. Abstract: Standardization efforts to define radiated metrics and test methods for verifying millimeter-wave (mmWave) new radio (NR) devices are currently ongoing. Multiprobe anechoic chamber (MPAC) method, which is capable of reproducing spatial fading channels in the test zone, is selected as the reference solution for NR device testing. It is of importance to ensure that the defined testing propagation environment in the test zone is correctly implemented. In this communication, a novel algorithm is proposed to determine the wideband power-angle-delay profile of the reconstructed channels in the test zone for mmWave NR. The proposed algorithm is shown to be generic (applicable for both 2-D and 3-D testing setup), applicable for both near-field and far-field conditions and robust (i.e., insensitive to measurement distance errors). |
8,054 | Please write an abstract with title: Quality of Pre-trained Deep-Learning Models for Palmprint Recognition, and key words: Palmprint recognition, Scientific computing, Neural networks, Numerical models, Convolutional neural networks, Task analysis, Tuning. Abstract: This paper presents a comprehensive study of deep learning methods and datasets used for solving the palmprint recognition problem. The quality of image embeddings provided by deep neural networks, pre-trained on the ImageNet dataset, are evaluated on palmprint recognition in the visible spectrum task. In our tests, we used twelve publicly available datasets obtained with different types of acquisition procedures: constrained, partially constrained and unconstrained. Sixteen convolutional neural networks (two from the VGG family, six from ResNet, three from Inception, two from MobileNet and three from DenseNet) were evaluated. We analyzed the results from the point of view of specialization potential, dataset difficulty and general parameter tuning. For evaluation, EER (Equal Error Rate) was employed. We ranked the datasets and appraised the feature vectors computed by the pre-trained networks using this metric. The best results, on average, were provided by the deep neural networks from the MobileNet family. The distances used for comparing the feature vectors were Euclidean, Cityblock, cosine and correlation. The best results were obtained with the cosine family distances. |
8,055 | Please write an abstract with title: A two's complement overflow limit cycle free digital filter structure, and key words: Limit-cycles, Digital filters, Delay, Quantization, Australia, Feedback loop, Hardware, Timing, Linear systems, Stability. Abstract: Liapunov analysis is used to design a second-order digital incremental computer structure which is suitable for implementation by a sequentially executed program which is free of autonomous two's complement overload limit cycles. |
8,056 | Please write an abstract with title: Third Order Band Pass Filter With Double-Gate MOSFET: A Circuit Perspective, and key words: Band-pass filters, Performance evaluation, Radio frequency, MOSFET, Power demand, Switches, Reliability. Abstract: To achieve the signal of a particular range, a third order Band Pass Filter (BPF) has been realized for the Radio frequency (RF) applications. The mathematical analysis of the designed filter has been performed to determine the overall center frequency and bandwidth. Traditional components such as BJT and MOSFETs have increased power consumption and larger electronic package size. The application of Double-Gate (DG) MOSFET leads to performance and reliability improvement of the filter with a reduction in the device's size. The DG MOSFET has a smaller width and better gate control over the channel than the traditional MOSFET. This DG MOSFET also provides improved power efficiency and switching capabilities for the filter design. |
8,057 | Please write an abstract with title: K2 observations of the pulsating subdwarf B stars UY Sex and V1405 Ori, and key words: stars: oscillations, subdwarfs. Abstract: We processed and analysed K2 observations of the pulsating subdwarf-B (sdBV) stars UY Sex and V1405 Ori. We detect 97 p-mode pulsations in UY Sex while we discover V1405 Ori to be a rare rich hybrid pulsator with over 100 p-mode pulsations and 19 g-mode pulsations. We detect frequency multiplets, which we use to identify pulsation modes as well as determine rotation periods. For UY Sex, we find a rotation period of the envelope of 24.6 ± 3.5 d and for V1405 Ori, we find a rotation period of 0.555 ± 0.029 d for the p modes and a marginal detection of 4.2 ± 0.4 d for the g modes. We discover that V1405 Ori is unique among sdBV stars observed to date. It is a rich hybrid pulsator, allowing us to simultaneously probe the envelope and interior; its frequency multiplets indicate V1405 Ori to be rotating differentially with the core rotating more slowly than the envelope, and it is also in a short-period binary (0.398 d) with an envelope that is nearly but not quite tidally locked. For both stars, we have obtained spectroscopic follow-up observations and examine combining them with Gaia parallaxes and archival photometry to determine fundamental properties. Our derived masses are inconsistent with spectroscopy and previous determinations and indicate problems with the methodology. |
8,058 | Please write an abstract with title: Transient Analysis of Diffusion Recursive Least Squares via Signed Error Algorithm for Cyclostationary Colored Inputs, and key words: Analytical models, Machine learning algorithms, Simulation, Conferences, Signal processing algorithms, Machine learning, Signal processing. Abstract: In this paper, we perform the transient theoretical analysis of diffusion recursive least squares via signed error (DRLS-SE) algorithm over networks in the presence of impulsive noise. The obtained analytical models allow us to investigate the impacts of nonstationary system and cyclostationary colored inputs on the network transient convergence behavior. Simulations are provided to highlight the robustness of DRLS-SE algorithm against impulsive noise, and corroborate the correctness and accuracy of obtained theoretical findings. |
8,059 | Please write an abstract with title: Efficient Interpolation-based Reversible Watermarking for Protecting Fingerprint Images, and key words: Wavelet transforms, Location awareness, Image quality, Interpolation, Adaptation models, Image coding, Image matching. Abstract: In this paper, an efficient interpolation-based reversible watermarking scheme for protecting fingerprint images is proposed. The interpolation approach, which generates additional pixels, is adopted to ensure perfect retrieval of the original image. The aim of this scheme is to guarantee both authenticity and integrity verification of fingerprint images, by embedding two multibit watermarks into interpolated pixels. A new robust watermarking technique is proposed to embed the authenticity watermark into the Lifting Wavelet Transform (LWT) coefficients, by using an adapted perceptual model. The insertion of the integrity watermark is achieved by adapting a semi-fragile technique, which is based on the Intermediate Significant Bit Substitution (ISBS) approach and operates in the spatial domain. The integrity watermark is generated from a block checksum procedure and serves for tamper detection and localization purposes. Experimental results showed that the proposed technique offers good performances in terms of imperceptibility and robustness, and is also capable of detecting and localizing tampers on watermarked images. |
8,060 | Please write an abstract with title: Delay-Phase Precoding for THz Massive MIMO with Beam Split, and key words: Precoding, MIMO communication, Bandwidth, Gain, Radio frequency, Delay effects, Antenna arrays. Abstract: Benefiting from tens of GHz bandwidth, Terahertz (THz) communications has been considered as one of the promising technologies for the future 6G wireless communications. To compensate the serious attenuation in THz band and avoid huge power consumption, massive multiple input multiple output (MIMO) with hybrid precoding is widely considered. However, the traditional phase-shifter (PS) based hybrid precoding architecture cannot cope with the effect of beam split in THz communications, which means that the path components of THz channel split into different spatial directions at different subcarrier frequencies, leading serious array gain loss. In this paper, we first point out the seriousness of beam split effect in THz massive MIMO by analyzing the array gain loss caused by the beam split effect. To compensate this array gain loss, we propose a new hybrid precoding architecture called delay-phase precoding (DPP). In the proposed DPP, a time delay (TD) network is introduced between radio- frequency chains and the traditional PS network, which converts phase-controlled analog precoding into delay-phase controlled analog precoding. When carrying out precoding, the time delays in the TD network are dedicatedly designed to generate frequency-dependent beams which are aligned with the spatial directions over the whole bandwidth. Thanks to the joint control of delay and phase, the proposed DPP can significantly alleviate the beam split effect. Simulation results reveal that the proposed DPP can generate beams with the near- optimal array gain over the whole bandwidth, and achieve the near-optimal achievable rate performance. |
8,061 | Please write an abstract with title: Rod Antenna for 28-GHz Band Operation, and key words: Wireless communication, Waveguide transitions, Circular waveguides, 5G mobile communication, Horn antennas, Rectangular waveguides, Stairs. Abstract: This paper presents a stair-shaped dielectric rod antenna, which is a simplified version of the conventional tapered rod antenna. The operation frequency is set to be 28 GHz for 5G communications. The antenna configuration is composed of three sections: a transition section from a rectangular waveguide to a circular waveguide, a horn exciter section, and a stair-shaped dielectric rod section. The number of stairs is chosen to be three. The analysis shows that the optimized rod radius and length realize a high gain of more than 22 dBi. The 3-dB beam width is approximately 15°. The VSWR is less than 2 across a frequency range of 26.5 GHz to 32 GHz. |
8,062 | Please write an abstract with title: Vibration Analysis of Delta-Connected PMSMs Using Lookup Table-Based Models—Influence of the 0-Sequence Component, and key words: Iron, Computational modeling, Vibrations, Analytical models, Table lookup, Force, Atmospheric modeling. Abstract: In this article, a multiphysics simulation workflow based on the use of reduced-order models to decrease the computation time is presented. Using finite-element (FE) precomputed flux-linkage and lumped force lookup-tables in function of dq0 currents and rotor position, an electromagnetic model of a permanent-magnet synchronous machine (PMSM) is developed. Coupled to a mechanical state-space representation, the complete workflow allows to predict the vibrations of the motor. Using our model, the influence of the 0-sequence current on the vibration spectrum is investigated. A detailed description on the parameter identification for homogenized stator core of the considered 12-slot 10-pole delta-connected fractional-slot concentrated-winding spoke-type PMSM is also given. The numerical results are validated with experimental data for the machine at hand. Because of the large amount of FE data required, the workflow is best suited for the optimization of motor control schemes (instead of the initial design optimization) with the purpose of reducing the noise, vibration, and harshness. |
8,063 | Please write an abstract with title: Low-voltage low-power high dB-Linear CMOS exponential function generator using highly-linear V-I converter, and key words: Signal generators, CMOS process, Linearization techniques, Energy consumption, Signal design, Low voltage, CMOS technology, CMOS digital integrated circuits, CMOS analog integrated circuits, Digital signal processing. Abstract: A CMOS voltage-to-current converter with exponential characteristic is presented in this paper. The concept of Taylor series expansion is used for realizing the exponential characteristic. The proposed exponential V-I converter is composed of a current-to-current squarer and a linear V-I converter with the use of linearization technique. Based on a 0.25 /spl mu/m CMOS process, simulations show a 23 dB of linear-output current range and the linearity within 20 dB with error less than /spl plusmn/0.5dB is achieved. The total power consumption is below 0.2 mW with 1.25 V supply voltage. The proposed circuit can be used for the design of an extremely low-voltage low-power variable gain amplifier (VGA). |
8,064 | Please write an abstract with title: Optimal LQG Control for Discrete-Time System with Multiplicative Noise and Multiple State Delays, and key words: Delays, Control systems, Cost function, Electrical engineering, Automation, Discrete-time systems, Difference equations. Abstract: This paper focuses on the optimal linear quadratic Gaussian (LQG) control problem for stochastic discrete-time systems with multiplicative noise and multiple delays in the state. The relationship between the state and the costate is obtained by using the Pontryagin's maximum principle. The necessary and sufficient condition for the problem existing a unique optimal controller is given. Moreover, an explicit expression of the optimal LQG controller and the associated minimum cost function are presented in terms of coupled Riccati equations. It should be stressed that these results are based on the key technical tool, which established relations between the state and the costate of the LQG systems. |
8,065 | Please write an abstract with title: Research on the Influence of the Coupling Coordination of the Logistics Industry and Manufacturing Industry on the Upgrading of the Manufacturing Industry, and key words: Logistics, Manufacturing industries, Couplings, Manufacturing, Rivers, Technological innovation, Carbon dioxide. Abstract: One of the objectives of coupling coordination between the logistics industry and manufacturing industry (hereinafter referred to as “two industries coordination”) is to improve the competitiveness of the manufacturing industry. Using the slacks-based method (SBM) and coupling coordination degree model, the coupling coordination scheduling between the logistics industry and manufacturing industry is measured, and the coupling coordination measurement system of the logistics industry and manufacturing industry under low-carbon constraints is constructed. The DEA Malmquist model is used to measure the level of manufacturing upgrading, and a threshold regression model is used to study the mechanism of the two industries’ coordination on manufacturing upgrading. The empirical study found that during 2009-2019, the average coordination of the two industries in the Yangtze River Delta was 0.64, which was basically in the stage of good coordination, and the coupling level showed a gradual upward trend. From 2009 to 2019, the average total factor productivity index of the manufacturing industry was 1.23, showing an upward trend. The coordination of the two industries can promote the upgrading of the manufacturing industry, and there is an obvious inverted U-shaped relationship. There is a double threshold for industrial scale and technological innovation. When the scale of the manufacturing industry is between 79.1 billion yuan and 97.4 billion yuan, the impact of industrial coupling coordination on the production efficiency of the manufacturing industry is greater. When the R&D expenditure is less than 9.89 billion yuan, the impact of industrial coupling coordination on the production efficiency of the manufacturing industry is greater. The study found that the larger the industrial scale of the manufacturing industry is, the more conducive it is to the coordination of the two industries, and the coupling coordination does not increase with the increase in R&D investment. The manufacturing industry is mainly light industry, so the proportion of optimal assets is relatively low under low-carbon constraints. The upper limit of optimal science and technology expenditure shows that there is the problem of excessive investment of optimal science and technology funds under low-carbon constraints. |
8,066 | Please write an abstract with title: An Empirical Study on Correlation between Coverage and Robustness for Deep Neural Networks, and key words: Measurement, Correlation, Systematics, Neural networks, Pipelines, Benchmark testing, Robustness. Abstract: Deep neural networks (DNN) are increasingly applied in safety-critical systems, e.g., for face recognition, autonomous car control and malware detection. It is also shown that DNNs are subject to attacks such as adversarial perturbation and thus must be properly tested. Many coverage criteria for DNN since have been proposed, inspired by the success of code coverage criteria for software programs. The expectation is that if a DNN is well tested (and retrained) according to such coverage criteria, it is more likely to be robust. In this work, we conduct an empirical study to evaluate the relationship between coverage, robustness and attack/defense metrics for DNN. Our study is the largest to date and systematically done based on 100 DNN models and 25 metrics. One of our findings is that there is limited correlation between coverage and robustness, i.e., improving coverage does not help improve the robustness. Our dataset and implementation have been made available to serve as a benchmark for future studies on testing DNN. |
8,067 | Please write an abstract with title: Design of an fMRI-compatible pneumatic tactile array for spatiotemporal stimulation, and key words: Instruments, Functional magnetic resonance imaging, Haptic interfaces, Safety, Magnetic fields, Task analysis, Spatial temporal resolution. Abstract: A functional Magnetic Resonance Imaging (fMRI) compatible haptic interface is drawing interest from neuroscientists in recent years. The strong magnetic field of the MRI scanner prevents the use of the commercially available tactile display. Previous studies showed the potential of pneumatic actuation techniques, limited to temporal stimulation. In this study, we proposed a modulated pneumatic tactile array and evaluated its safety and feasibility in an fMRI experiment. The development of a high spatial-temporal resolution tactile interface will open a wide range of complicated experiments for investigating the processing of tactile information inside human brain. |
8,068 | Please write an abstract with title: Learning in Sinusoidal Spaces with Physics-Informed Neural Networks, and key words: Mathematical models, Three-dimensional displays, Laplace equations, Artificial intelligence, Poisson equations, Transient analysis, Steady-state. Abstract: A physics-informed neural network (PINN) uses physics-augmented loss functions, e.g., incorporating the residual term from governing partial differential equations (PDEs), to ensure its output is consistent with fundamental physics laws. However, it turns out to be difficult to train an accurate PINN model for many problems in practice. In this paper, we present a novel perspective of the merits of learning in sinusoidal spaces with PINNs. By analyzing behavior at model initialization, we first show that a PINN of increasing expressiveness induces an initial bias around flat output functions. Notably, this initial solution can be very close to satisfying many physics PDEs, i.e., falling into a local minimum of the PINN loss that only minimizes PDE residuals, while still being far from the true solution that jointly minimizes PDE residuals and the initial and/or boundary conditions. It is difficult for gradient descent optimization to escape from such a local minimum trap, often causing the training to stall. We then prove that the sinusoidal mapping of inputs—in an architecture we label as sf-PINN—is effective to increase input gradient variability, thus avoiding being trapped in such deceptive local minimum. The level of variability can be effectively modulated to match high-frequency patterns in the problem at hand. A key facet of this paper is the comprehensive empirical study that demonstrates the efficacy of learning in sinusoidal spaces with PINNs for a wide range of forward and inverse modelling problems spanning multiple physics domains. |
8,069 | Please write an abstract with title: Experimental study on thermal characteristics during leader discharge and its recovery procedure, and key words: Temperature sensors, Thermodynamics, Insulation, Temperature, Air gaps, Measurement by laser beam, Interference. Abstract: Long air gap discharge is the main form of external insulation in UHV power grid. The in-depth study of its discharge characteristics is beneficial to optimize the insulation level configuration in the construction to improve the safety and reliability of power grid operation and save costs. The thermodynamic characteristics of the leader discharge are the important characteristics that distinguish it from other discharge stages. The study of the thermodynamic characteristics of the leader discharge and its recovery process can provide the basis for the reliable operation of the energy Internet. In this article, a multi-parameter comprehensive observation experimental platform for long air gap leader discharge and its recovery process was built, which realized the simultaneous measurement of thermal characteristics, morphological parameters and electrical parameters. The effect of voltage amplitude on the thermal characteristics of the leader discharge and its recovery process was investigated under positive polarity standard operating impulse voltage. |
8,070 | Please write an abstract with title: Homerow Improvements for Touch Typists - A 3-Month Real Life Experiment Turns Standard Keybords to Ergonomic, and key words: Technological innovation, Phase measurement, Atmospheric measurements, Shape, Ergonomics, Keyboards, Biomedical measurement. Abstract: The present study asks the question: To what extent can the ergonomics of keyboards already present at the workplace be increased by “minimally invasive” changes?To investigate this, we measure 300 standard operations several times to build a baseline phase. Then we let the partizipands perform their normal daily work for 3 months. During these 3 months, we provide to them a potpourri of 800 keycaps in different colors - most importantly: different shapes and heights. They are allowed to try everything: exchange single caps, multiple caps or leave everything as it is. After 3 months, we perform the same 300 measurements under the same conditions.We found strongly modified keyboards, which were “tailored to the hands” of the partizipands. At all participands, “orthopedic profile progression curvatures” emerged independently of each other. The measured values improved significantly: the time needed decreased on average by 20 %, the eye switches decreased by 42 %. Above all, the almost halved eye switches significantly unburdened the partizipands in everyday life. |
8,071 | Please write an abstract with title: A Scheduled Cluster-Tree Topology to Enable Wide-Scale LoRaWAN Networks, and key words: Performance evaluation, Wireless sensor networks, Schedules, Protocols, Network topology, Simulation, Scalability. Abstract: Wireless Sensor Networks (WSNs) based on the Long-Range radio modulation (LoRa) can use the LoRaWAN protocol as the medium access layer. However, this protocol only supports a single-hop star topology. As a consequence, devices can not use retransmissions along the network to extend their coverage area or to circumvent signal attenuation with distance, obstacles or interference from other radio sources. This paper proposes a multi-hop LoRaWAN wide-scale WSN based on a scheduled cluster-tree topology. This methodology can expand the spatial coverage of the network, decrease collisions, and improve overall network performance. A multi-hop cluster-tree topology eliminates the need for adjustments of LoRa radio parameters as an attempt to expand the single-hop coverage limitation. Simulation results show that the scheduled cluster-tree topology can scale the network coverage and significantly improve communication and energy consumption performances. |
8,072 | Please write an abstract with title: L2 Disturbance Suppression Controller Design for Multiple Time Delays Offshore Wind Turbines, and key words: Delay effects, Wind turbines, Power system stability, Stability analysis, Wind power generation, Stators, Shafts. Abstract: With the large-scale development of offshore wind power and the rapid development of smart grid, more and more attention has been paid to the stable operation of wind turbines under various conditions. In the actual operation process of wind turbines, there are inevitably many kinds of uncertain time delays, and also external or parameter disturbances, which affect the stable operation of wind turbines and make the system deviate from the original stable state. Based on Hamiltonian energy theory, the disturbance rejection of doubly fed wind turbines with multiple time delays is studied in this paper. Firstly, the doubly fed wind turbine is Hamiltonian realized to obtain its port controlled Hamiltonian with dissipation(PCH-D) model. Then, aiming at the PCH-D model, a multiple time delays controller is designed based on Casimir function, which can make wind turbines run stably under multiple time delays. Furthermore, based on the passive control theory, L2 gain disturbance rejection control technology is introduced to eliminate the steady-state error caused by external disturbance and improve the stability of wind turbines. Finally, the simulation results show that the proposed controller can effectively solve the multiple time delays and disturbance problems in the system, and improve the stability and anti-interference of wind turbines. |
8,073 | Please write an abstract with title: Extreme Structure from Motion for Indoor Panoramas without Visual Overlaps, and key words: Meters, Visualization, Computer vision, Structure from motion, Codes, Semantics, Cameras. Abstract: This paper proposes an extreme Structure from Motion (SfM) algorithm for residential indoor panoramas that have little to no visual overlaps. Only a single panorama is present in a room for many cases, making the task infeasible for existing SfM algorithms. Our idea is to learn to evaluate the realism of room/door/window arrangements in the topdown semantic space. After using heuristics to enumerate possible arrangements based on door detections, we evaluate their realism scores, pick the most realistic arrangement, and return the corresponding camera poses. We evaluate the proposed approach on a dataset of 1029 panorama images with 286 houses. Our qualitative and quantitative evaluations show that an existing SfM approach completely fails for most of the houses. The proposed approach achieves the mean positional error of less than 1.0 meter for 47% of the houses and even 78% when considering the top five reconstructions. We will share the code and data in https://github.com/aminshabani/extreme-indoor-sfm. |
8,074 | Please write an abstract with title: Variance-constrained control for uncertain stochastic systems with missing measurements, and key words: Control systems, Stochastic systems, Uncertain systems, Time measurement, Output feedback, Steady-state, Upper bound, Matrices, Linear matrix inequalities, Robust control. Abstract: In this paper, we are concerned with a new control problem for uncertain discrete-time stochastic systems with missing measurements. The parameter uncertainties are allowed to be norm-bounded and enter into the state matrix. The system measurements may be unavailable (i.e., missing data) at any sample time, and the probability of the occurrence of missing data is assumed to be known. The purpose of this problem is to design an output feedback controller such that, for all admissible parameter uncertainties and all possible incomplete observations, the system state of the closed-loop system is mean square bounded, and the steady-state variance of each state is not more than the individual prescribed upper bound. We show that the addressed problem can be solved by means of algebraic matrix inequalities. The explicit expression of the desired robust controllers is derived in terms of some free parameters, which may be exploited to achieve further performance requirements. An illustrative numerical example is provided to demonstrate the usefulness and flexibility of the proposed design approach. |
8,075 | Please write an abstract with title: FS-IDS: A Novel Few-Shot Learning Based Intrusion Detection System for SCADA Networks, and key words: Training, Deep learning, Industrial control, SCADA systems, Intrusion detection, Data models, Encoding. Abstract: Supervisory control and data acquisition (SCADA) networks provide high situational awareness and automation control for industrial control systems, whilst introducing a wide range of access points for cyber attackers. To address these issues, a line of machine learning or deep learning based intrusion detection systems (IDSs) have been presented in the literature, where a large number of attack examples are usually demanded. However, in real-world SCADA networks, attack examples are not always sufficient, having only a few shots in many cases. In this paper, we propose a novel few-shot learning based IDS, named FS-IDS, to detect cyber attacks against SCADA networks, especially when having only a few attack examples in the defenders’ hands. Specifically, a new method by orchestrating one-hot encoding and principal component analysis is developed, to preprocess SCADA datasets containing sufficient examples for frequent cyber attacks. Then, a few-shot learning based preliminary IDS model is designed and trained using the preprocessed data. Last, a complete FS-IDS model for SCADA networks is established by further training the preliminary IDS model with a few examples for cyber attacks of interest. The high effectiveness of the proposed FS-IDS, in detecting cyber attacks against SCADA networks with only a few examples, is demonstrated by extensive experiments on a real SCADA dataset. |
8,076 | Please write an abstract with title: On High-Power Circulators with Mismatched Terminations (Correspondence), and key words: Circulators, Loaded waveguides, Coupling circuits, Ferrites, Propagation constant, Electric breakdown, Electromagnetic heating, Laboratories, Voltage, Reflection. Abstract: A comparison of the signal level in the ferrite-loaded sections of high-power circulators shows that the advantage presented by the coupled-line approach decreases when the device is terminated into a mismatch. |
8,077 | Please write an abstract with title: Mapping Natural Language Questions to Medical Specialties, and key words: Medical services, Biomedical imaging, Naive Bayes methods, Machine learning, Classification algorithms, Training, Natural languages. Abstract: Many real-world applications handle large amounts of data, which needs to be preprocessed and classified before it can be used. Performing this classification using human agents is usually slow and costly, thus motivating the need for automation. One of the areas that can benefit from an automatized process includes online health-care platforms that connect people to doctors remotely. This type of platform usually offers an asynchronous messaging service, and can receive up to hundreds or thousands of medical questions every day. The questions need to be assigned to the appropriate specialists in a timely manner. This paper offers an automatic solution to this problem. Its purpose is to address the issue of mapping natural language texts to medical specialties. Two solutions are proposed and compared, one based on the Naive Bayes classifier and the other on a Linear classifier implemented using TensorFlow. The former obtains an accuracy of over 95% for 23% of the questions while the latter obtains the same accuracy for 60% of the questions. The results motivate the use of these solutions in real-world applications. |
8,078 | Please write an abstract with title: Recent Advances in Space-Mapping-Based Multiphysics Optimization for Microwave Filters, and key words: Power filters, Computational modeling, Microwave theory and techniques, Information filters, Computational electromagnetics, Microwave filters, Optimization. Abstract: Multiphysics-based optimization is a useful technique for high performance microwave design. An overview for recent advancements in multiphysics design using space mapping (SM) techniques is provided in this paper. We develop a surrogate model including two mapping modules and an EM coarse model using SM. This technique provide a effective and larger update for every iteration by utilizing the information of the coarse model represented using inexpensive EM domain samples, resulting in optimal solutions being obtained more efficient than the existing methods. A high power microwave filter is used to illustrate this technique. |
8,079 | Please write an abstract with title: Nash Equilibrium to Competitive Equilibrium Mechanisms Design: Subsidization and Punishment, and key words: Generators, Nash equilibrium, Mathematical model, Pricing, Adaptation models, Biological system modeling. Abstract: Due to the small number of participants in realistic cases, the Nash equilibrium generated by an oligopolistic market is more appropriate for depicting the actual energy market than the competitive equilibrium generated by a competitive market. However, the market efficiency decreases when the Nash equilibrium is used rather than the competitive equilibrium because of the strategic behaviors of the participants. In this paper, we propose two new mechanisms (subsidization and punishment) for each generator, both of which drive the Nash equilibrium to the competitive equilibrium in heterogeneous oligopolistic energy markets with a uniform pricing mechanism. Under the two proposed mechanisms, the equivalence of the Nash equilibrium and the competitive equilibrium is strictly proven. Furthermore, we apply a distributed algorithm to numerically confirm that both mechanisms perfectly eliminate the market efficiency loss. Finally, these two mechanisms are applied to the energy market under three different stages of development. Simulation results illustrate that the additional costs caused by the mechanisms converge to a low value and that the subsidization mechanism slightly outperforms the punishment mechanism. |
8,080 | Please write an abstract with title: A Cyber-Security Prototype Module for Smart Bikes, and key words: Portable computers, Smart cities, Prototypes, Transportation, Software, Real-time systems, Hardware. Abstract: The Internet of Things (IoT) applications have been explored extensively in the past years due to multiple factors, notably advancements in hardware and software. Nevertheless, IoT devices are still vulnerable to attacks because of their nature, e.g.: lower computation, storage, and network capacities. IoT is considered the cornerstone of the smart city paradigm. ITS-Intelligent Transportation Systems is one major component of a smart city and, in turn, Smart Bikes have become an unavoidable environmentally friendly means within ITS. The way the different entities of an ITS communicate and how their communications are secured is a main issue that is being addressed by researchers in multiple different approaches. In this paper, a cyber-security system that utilizes pre-existing encryption methods to implement a secured real-time double hybrid encryption algorithm is pro-posed. As an illustrative example, the system proposed is applied to a Smart autonomous bike prototype for encryption during the data transfer between the bike and the different surrounding elements in its environment. |
8,081 | Please write an abstract with title: Design of Elbow Exoskeleton with Wireless System Control for Post Stroke Flexion-Extension Rehabilitation, and key words: Wireless communication, Bluetooth, Exoskeletons, Velocity control, Pulse width modulation, DC motors, Robot sensing systems. Abstract: In this paper we proposed a rehabilitation system that assists therapists to restore motor function by repetitive flexion-extension movement using robotic technology. The sys-tem is an elbow exoskeleton that can be controlled based on elbow rotation angle and angular velocity. The system also equipped with wireless communication to give therapists an ability to determine the trajectory of motor movement patterns and speed. For speed control, therapists need to input Pulse Width Modulation (PWM) value by Android application that conducts 100% accuracy to communicate the PWM value to microcontroller through bluetooth connection. INA226 sensor used by the system for measuring current value in order to detect the voluntary movement that occured in subject's arm. Proportional Integral Derivative control (PID) used in order to achieve a predetermined trajectory value and maintain the Rotation per Minute (RPM) of the DC motor. As a result, the system can reach the target for fulfill 120-degree movement with 83.3% accuracy with passive hand and 100% accuracy with active arm condition. The measure of the sensor is used to analyze the rehabilitation process quantitatively and determine future treatment. This method expected can help patients to get intensive rehabilitation and make it easier for therapists to evaluate and rehabilitate patients. |
8,082 | Please write an abstract with title: Analysis and FPGA implementation of image restoration under resource constraints, and key words: Image analysis, Field programmable gate arrays, Image restoration, Digital signal processing, Hardware, Iterative algorithms, Programmable logic arrays, Programmable logic devices, Signal processing algorithms, Application software. Abstract: Programmable logic is emerging as an attractive solution for many digital signal processing applications. In this work, we have investigated issues arising due to the resource constraints of FPGA-based systems. Using an iterative image restoration algorithm as an example we have shown how to manipulate the original algorithm to suit it to an FPGA implementation. Consequences of such manipulations have been estimated, such as loss of quality in the output image. We also present performance results from an actual implementation on a Xilinx FPGA. Our experiments demonstrate that, for different criteria, such as result quality or speed, the best implementation is different as well. |
8,083 | Please write an abstract with title: The conceptual design of multi-channel millimeter wave receiver for VLBI, and key words: Terrestrial atmosphere, Frequency, Band pass filters, Millimeter wave technology, Fluctuations, Calibration, Receivers, Phase noise, Feeds, Observatories. Abstract: The most important thing in millimeter and sub-millimeter wave VLBI is how to calibrate the variations in the phase of an electromagnetic wave propagating through the troposphere. Many techniques for calibrating the phase fluctuations due to the troposphere have been well proposed and demonstrated (Alef, W. et al., 2003; Asaki, Y. et al., 1998; Sasao, T., 2002). A millimeter wave multi-channel receiver system which can be used for phase calibration in millimeter and sub-millimeter wave VLBI observation is proposed. A conceptual multi-channel receiver system and quasi-optical filters which could be used in this receiver are described. |
8,084 | Please write an abstract with title: Fine-Grained Recognition in High-throughput Phenotyping, and key words: Feature extraction, Histograms, Image recognition, Task analysis, Pattern recognition, Biological system modeling, Visualization. Abstract: Fine-Grained Recognition aims to classify sub-category objects such as bird species and car models from imagery. In High-throughput Phenotyping, the required task is to classify individual plant cultivars to assist plant breeding, which has posed three challenges: 1) it is easy to overfit complex features and models, 2) visual conditions change during and between image collection opportunities, and 3) analysis of thousands of cultivars require high-throughput data collection and analysis. To tackle these challenges, we propose a simple but intuitive descriptor, Radial Object Descriptor, to represent plant cultivar objects based on contour. This descriptor is invariant under scaling, rotation, and translation, as well as robust under changes to the plant's growth stage and camera's view angle. Furthermore, we complement this mid-level feature by fusing it with the low-level features (Histogram of Oriented Gradients) and deep features (ResNet-18), respectively. We extensively test our fusion approaches using two real world experiments. One experiment is on a novel benchmark dataset (HTP-Soy) in which we collect ~ 2, 000 high-resolution aerial images of outdoor soybean plots. Another experiment is on three datasets of indoor rosette plants. For both experiments, our fusion approaches achieve superior accuracies while maintaining better generalization as compared with traditional approaches. |
8,085 | Please write an abstract with title: A non-invasive approach to dynamic Web services provisioning, and key words: Web services, Vehicle dynamics, Runtime, Protocols, Availability, Software standards, Software systems, Service oriented architecture, Mechanical factors, XML. Abstract: Service-oriented computing has emerged as a new component-based software development paradigm in a network-centric environment. By using a standard description language and protocol, services can be used to wrap legacy software systems to be integrated beyond the enterprise boundary across heterogeneous platforms. Nevertheless, the challenges come in tandem with the opportunities because of the inherent dynamic characteristics within a distributed environment. In particular, there is a need for dynamic adaptation for provisioned services to accommodate the ever-changing business requirements externally as well as the computing resource status internally, while maintaining the continuousness of service provisioning. We present a dynamic Web service provisioning approach based on .NET common language runtime, one of the two primary Web services platforms, exploring the runtime code manipulation at the intermediate language (IL) level rather than at the source code level. Meanwhile, we show how the service provisioning can be adapted in a modularized way by complementing the conventional service-oriented architecture (SOA) with a repository of adaptation aspects. Moreover, we demonstrate how dynamic service provisioning can be used for nonfunctional property assurance. |
8,086 | Please write an abstract with title: A Lightweight Configurable XOR RO-PUF Design Based on Xilinx FPGA, and key words: Temperature distribution, Logic gates, Delay lines, Physical unclonable function, Reliability engineering, Hardware, Integrated circuit reliability. Abstract: Lightweight electronic devices are emerging as a promising electronic equipment. Physical unclonable function (PUF), a kind of authentication circuit in lightweight electronic chip, is very useful component in secure system design. The reliability and uniqueness of PUF is limited by the complexity of its circuit. Herein, a reconfigurable XOR gate PUF based on configurable delay line is demonstrated to obtain lightweight chip certification circuit. Owing to the same number of configurable logic blocks (CLBs) in the FPGA implementation, the PUF can generate more challenge response pair (CRP) well. The PUF exhibits a much better uniqueness and reliability than previous other types of PUF designs when this design is implemented in multiple Xilinx Virtex-6 FPGAs. Moreover, this PUF consumes less than 0.05% of hardware resources to generate a 1-bit response than other configurable PUFs implemented in FPGA. |
8,087 | Please write an abstract with title: Extractive Document Summarization Based on Dynamic Feature Space Mapping, and key words: Feature extraction, Data mining, Task analysis, Clustering algorithms, Heuristic algorithms, Semantics, Social network services. Abstract: The exponential growth of the Web documents has constituted the need for automatic document summarization. In this context, extractive document summarization, i.e., that task of extracting the most relevant information, removing redundancy and presenting the remained data in a coherent and cohesive structure, is a challenging task. In this article, we propose a novel intelligent approach, namely ExDoS, that harvests benefits of both supervised and unsupervised algorithms simultaneously. To the best of our knowledge, ExDoS is the first approach to combine both supervised and unsupervised algorithms in a single framework and an interpretable manner for document summarization purpose. ExDoS iteratively minimizes the error rate of the classifier in each cluster with the help of dynamic local feature weighting. Moreover, this approach specifies the contribution of features to discriminate each class, which is a challenging issue in the summarization task. Therefore, in addition to summarizing text, ExDoS is also able to measure the importance of each feature in the summarization process. We evaluate our model both automatically (in terms of ROUGE factor) and empirically (human analysis) on the benchmark datasets: the DUC2002 and CNN/DailyMail. Results show that our model obtains higher ROUGE scores comparing to most state-of-the-art models. The human evaluation also demonstrates that our model is capable of generating informative and readable summaries. |
8,088 | Please write an abstract with title: 5G V2V Communication With Antenna Selection Based on Context Awareness: Signaling and Performance Study, and key words: Transmitting antennas, 5G mobile communication, Receiving antennas, MIMO communication, Proposals, Antenna measurements. Abstract: Enhanced vehicle-to-everything (eV2X) communication is one of the key challenges to be addressed by the fifth generation (5G) of cellular mobile communications. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. Although vehicular communications are by default assumed between single antennas located on the roof of the transmitter and receiver vehicles, prior art has shown that there are other antenna positions more suitable for V2X communication, depending on the specific communication context. Antenna selection can be used in this case to select one specific antenna or a subset of them better suited for a certain communication link. In this work, we propose a context-aware antenna selection procedure able to enhance the communication with multi-antenna vehicles. To enable such scheme in 5G systems, we discuss the necessary signaling to extend current 5G radio resource control and radio resource management mechanisms, which are mainly focused on single-antenna communication. The signaling overhead caused by context exchange for antenna selection is analyzed and compared to the overhead when reference signals are exchanged for that purpose instead. Finally, simulation results for a 5G platooning use case are presented to show the advantages of antenna selection. |
8,089 | Please write an abstract with title: Bayesian Optimization for Expensive Smooth-Varying Functions, and key words: Regression analysis, Linear programming, Optimization, Bayes methods, Computational modeling, Adaptation models, Gaussian processes, Smoothing methods. Abstract: Bayesian optimization (BO) is a powerful class of data-driven techniques for the maximization of expensive-to-evaluate objective functions. These techniques construct a Gaussian process (GP) regression for representing the objective function according to the latest available function evaluations and sequentially select samples and evaluate the function by maximizing an acquisition function. The primary assumption in most BO policies is that the objective function has a uniform level of smoothness over the input space, modeled by a kernel function. However, the uniform smoothness assumption is likely to be violated in a wide range of practical problems, primary domains in which the objective function is evaluated differently at various regions of input space (e.g., through different experiments, software, or approximators). This article develops a BO framework capable of optimizing expensive smooth-varying functions. Unlike the existing techniques that rely on a single GP model, the proposed framework constructs a set of local and global GP models to represent the objective function. The predictive mean and variance at any given sample in the input space are computed according to the posterior probabilities of the local and global GP models. Local and global models are adaptively controlled through a single parameter, which can be optimized along with other GP models’ parameters during the optimization process. Using the predicted local and global values, the expected improvement acquisition function is employed as one of the possible acquisition functions for the selection process. The performance of the proposed framework is assessed extensively through two optimization benchmark problems. |
8,090 | Please write an abstract with title: Visual servoing for underwater docking of an autonomous underwater vehicle with one camera, and key words: Visual servoing, Underwater vehicles, Cameras, Optimal control, Equations, Oceans, Batteries, Real time systems, Nose, Servomechanisms. Abstract: Docking systems are required to increase the capability of autonomous underwater vehicles (AUVs) to recharge the batteries and to transmit data in real time in underwater. This paper presents a docking system for an AUV to dock into an underwater station with one camera installed at the nose center of the AUV. To make a visual servo controller, this paper presents an optimal control algorithm based on a state equation composed of the AUV dynamics and the optical flow equation. The control inputs of the AUV are generated with the projected target position on the CCD plane of the camera and with the AUVs motion. This paper introduces a test bed AUV for underwater docking developed in Korea Research Institute of Ships and Ocean Engineering (KRISO), KORDI of Korea. The AUV is propelled with one thruster and controlled with two horizontal planes and two vertical planes. Experiments will be performed in Ocean Engineering Basin of KRISO to demonstrate the effectiveness of the modeling and control law of the visual servoing AUV. The AUV identifies target position with processing the captured image of the lights mounted around the entrance of the dock. This paper also presents a strategy to identifier the target with lights arrays. |
8,091 | Please write an abstract with title: Conceptual Perspectives on Tourist Behavior toward Information Technology and Social Media in Bangsaen Beach, Chonburi, Thailand, and key words: Social network services, Business, Information technology, Economics, Consumer behavior, Digital art, Media. Abstract: This paper discusses the theoretical background in tourist behavior by studying how they perform, use and think about Bangsaen Beach located in Chonburi, Thailand from social media. These theoretical basic is important in empirical research of tourist behavior. The paper will conclude the key concepts that will further apply to the collecting data process. |
8,092 | Please write an abstract with title: Recurrent Neural Networks for Colluded Applications Attack Detection in Android OS Devices, and key words: Smart phones, Detectors, Recurrent neural networks, Data models, Performance evaluation, Handheld computers, Data collection. Abstract: The paper presents a design and an implementation of an intelligent detector of a novel "colluded applications" attack on user's privacy in Android OS devices, which employs recurrent neural network (RNN) models. The paper reports the results of an empirical study that involved the attack research, data collection and pre-processing, the choice of the RNN model for a detector design, multiple detector implementations, their performance evaluation and analysis, and finally, an Android app realization and execution on a real device. We investigate and analyze multiple attack scenarios and the attack influence on such technological signals as memory consumption and a CPU's cores clock speed. For the attack detection, a few detectors exploring multiple RNN models are designed, implemented, and examined. The detectors employ various RNN models, such as a simple recurrent neural network, a long short-term memory, and a gated recurrent unit. Each model's performance in detecting multiple attack scenarios is evaluated and analyzed in order to compare classification models against various criteria. |
8,093 | Please write an abstract with title: Fairness based resource allocation strategy towards heterogeneous QoS requirement, and key words: Conferences, Computational modeling, Quality of service, Transforms, Throughput, Dynamic scheduling, Resource management. Abstract: Dynamic spectrum allocation is a promising solution to alleviate the severe spectrum scarcity recently, meanwhile the fairness of resource allocation between different SUs with heterogeneous Quality of Service (QoS) demands is an existed problem. In this paper, we propose a fairness based resource allocation strategy to guarantee the transmission of different SUs in cognitive radio networks (CRNs). First, we formulate the resource allocation problem as a constrained optimization problem with the objection of maximizing the sum capacity of all SUs. Second, we transform the optimization problem into two sub-problems, and find a suboptimal alternative to decrease the complexity. Third, we design a fairness index based strategy to transform the problem into equivalent optimization problems by adjusting the fairness degree through penalty functions. Simulations and analysis show that, the proposed strategy can guarantee the allocation rationality between different SUs at the premise of satisfying the required transmit rate of users. |
8,094 | Please write an abstract with title: Preparation and Testing of Large Scale Epoxy Impregnated REBCO Coil for SMES, and key words: Superconducting magnetic energy storage, Temperature sensors, Degradation, Temperature, Superconducting coils, Testing, High-temperature superconductors. Abstract: REBCO coil is a promising technology for superconducting magnetic energy storage system (SMES). Although degradation has been discovered in epoxy impregnated coil, it is essential to fill the coil with epoxy in such occasion. This paper describes preparation of large scale epoxy impregnated REBCO coil for SMES. The coil with inner diameter 320 mm and 268 turns was tested at 77 K both before and after epoxy impregnation. Consistency of Ic value and high n-value suggest that there was no degradation in the coil. Conduction cooled test was also carried out. Transport current was run up to 223 A at 50 K. |
8,095 | Please write an abstract with title: Spectral feature analysis, and key words: Spectral analysis, Kernel, Data mining, Feature extraction, Electronic mail, Principal component analysis, Laboratories, Intelligent systems, Automation, Machine learning. Abstract: We have seen a surge of interest in spectral-based methods and kernel-based methods for machine learning and data mining. Despite the significant research, these methods remain only loosely related. In this paper, we give theoretically an explicit relation between spectral clustering and weighted kernel principal component analysis (WKPCA). We show that spectral clustering is not only a method for data clustering, but also for feature extraction. We are then able to reinterpret the spectral clustering algorithm in terms of WKPCA and propose our spectral feature analysis (SFA) method. The spectral features extracted by SFA can capture the distinguishing information of data from different classes effectively. Finally some experimental results are presented to show the effectiveness of our method. |
8,096 | Please write an abstract with title: Transmission Guarantee Method of End-to-end Service In Narrowband Dynamic Environment, and key words: Delays, Routing, Narrowband, Reliability, Throughput, Electronic mail, Communication networks. Abstract: To achieve reliable service transmission in such scenarios such as satellites and radio stations, Delay Tolerant Network (DTN) can be used as an effective processing method. However, the existing researches lack consideration of service-oriented end-to-end transmission guarantee method, so ensuring the reliability and continuity of DTN end-to-end service transmission has become an important issue to be solved. This paper first analyzes the characteristics and application scenarios of DTN, and then establishes the optimization models in different scenarios with the goal of maximizing service transmission throughput. And then implements dynamic routing based on node behavior analysis (DRNA), which determines routing paths according to different node behaviors. Finally, it is found that when the road is interrupted, DRNA algorithm can not only reduce the end-to-end delay of the service transmission, but also guarantee the service delivery rate. |
8,097 | Please write an abstract with title: Geometry to the Rescue: 3D Instance Reconstruction from a Cluttered Scene, and key words: Three-dimensional displays, Surface reconstruction, Shape, Estimation, Image reconstruction, Two dimensional displays, Training. Abstract: 3D object instance reconstruction from a cluttered 2D scene image is an ill-posed problem. The main challenge is posed by the lack of geometric information in color images and heavy occlusions that lead to incomplete shape details. To deal with this problem, existing works on 3D instance reconstruction directly learn the mapping between the intensity image and the corresponding 3D volume model. Different from these works, we propose to explicitly incorporate 2.5D geometric cues, such as the surface normal, relative depth, and height, while generating full 3D shapes from 2D images. With an intermediate step focused on estimating these 2.5D geometric features, we propose a novel convolutional neural network design that progressively moves from 2D to full 3D estimation. Our model automatically generates instance-specific surface normal maps, relative depth, and height that are compactly encoded within our network design and consequently used to improve the 3D instance reconstruction. Our experimental results on the large-scale synthetic SUNCG dataset and the real-world NYU depth v2 dataset demonstrate the effectiveness of the proposed approach where it beats the state-of-the-art Factored3D network [15]. |
8,098 | Please write an abstract with title: Investigation of Vacuum Breakdown in Pulsed DC Systems, and key words: Vacuum systems, Electric breakdown, Ionization, Vacuum breakdown, Plasmas, Numerical models, Semiconductor process modeling. Abstract: Vacuum breakdown in the pulsed DC experiment at CERN was investigated by means of electrical measurements, SEM and STEM imaging of the surface and cross sections of the copper electrodes, and numerical modeling. The breakdown sites comprise one or more craters. There is plastic deformation beneath the craters. The crater(s) represent the epicenter of the breakdown, where electron emission and vaporization of the metal occur, and the plasma ball is formed. The only possible mechanism of ionization of neutral vapor seems to be ionization by the emitted electrons. The pressure exerted by the plasma ball is responsible for the formation of the crater. Simulations have been started with the aim to describe the mechanisms of vacuum breakdown on copper cathodes with protrusions of different geometries. First results show that, while Joule heating is initially a minor effect, together with the Nottingham effect, it may lead to a rapid increase of the protrusion temperatures up to the critical temperature, which may be indicative of a microexplosion. Very thin protrusions are not critical for the initiation of a microexplosion and subsequent breakdown; rather, the breakdown may be initiated by significantly wider ridge-like structures. The numerical model will be further developed so as to describe the whole evolution of the breakdown in vacuum. |
8,099 | Please write an abstract with title: An Exploration of Blended Teaching on Clinical Laboratory Instruments and Technology, and key words: Learning systems, Instruments, Education, Big Data, Creativity. Abstract: By comparing and analyzing the advantages and disadvantages of online course and traditional offline course of Clinical Laboratory Instruments and Technology, this paper finds that blended teaching combining these two forms can absorb both of their advantages. In blended teaching, online platform can be used on the preview and review processes as well as for teaching support on the offline course. Adopting various evaluation methods including online process assessment, practice assessment and traditional examination, higher education can apply better teaching methods and better serve students. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.