ID int64 0 400k | content stringlengths 97 5.85k |
|---|---|
8,400 | Please write an abstract with title: HPMA-NTRU: High-Performance Polynomial Multiplication Accelerator for NTRU, and key words: Quantum computing, Standardization, Switches, NIST, Very large scale integration, Market research, Public key cryptography. Abstract: Along the rapid development of large-scale quantum computers, post-quantum cryptography (PQC) has drawn significant attention from research community recently as it is proven that the existing public-key cryptosystems are vulnerable to the quantum attacks. Meanwhile, the recent trend in the PQC field has gradually switched to the hardware acceleration aspect. Following this trend, this work presents a novel implementation of a High-performance Polynomial Multiplication hardware Accelerator for NTRU (HPMA-NTRU) under different parameter settings, one of the lattice-based PQC algorithm that is currently under the consideration by the National Institute of Standards and Technology (NIST) PQC standardization process. In total, we have carried out three layers of efforts to obtain the proposed work. First of all, we have proposed a new schoolbook algorithm based strategy to derive the desired polynomial multiplication algorithm for NTRU. Then, we have mapped the algorithm to build a high-performance polynomial multiplication hardware accelerator and have extended this hardware accelerator to different parameter settings with proper adjustment. Finally, through a series of complexity analysis and implementation based comparison, we have shown that the proposed hardware accelerator obtains better area-time complexities than the state-of-the-art one. The outcome of this work is important and will impact the ongoing NIST PQC standardization process and can be deployed further to construct efficient NTRU cryptoprocessors. |
8,401 | Please write an abstract with title: Review on Domain Specific Systems Engineering, and key words: Solid modeling, Analytical models, Unified modeling language, Computational modeling, Context modeling, Systems engineering and theory, Biological system modeling. Abstract: The ongoing integration of connectivity and automation in cyber-physical systems (CPS) drives the need for innovative engineering concepts. Especially the aspect of dependability by design comes into focus. A suitable approach for this task can be found in the concepts of Model Based Systems Engineering (MBSE). In practical application, however, utilization of MBSE does not meet expectations. One of the main barriers identified is the little stakeholder acceptance for common concepts such as object modelling. This aspect has been addressed in the recent past by the Domain Specific Systems Engineering (DSSE) approach. In context of DSSE, plenty of research has been conducted and different aspects were studied. To gain a holistic picture of this approach, the paper at hands contributes a review on DSSE as a whole. In a first step, the main concepts of Domain Specific Systems Engineering are summarized and the application of this approach is discussed. Subsequently, research outcomes achieved so far are consolidated and discussed in detail. On this basis, remaining issues are identified and the future agenda for research in DSSE is outlined. |
8,402 | Please write an abstract with title: Review on Generative Adversarial Networks, and key words: Gallium nitride, Training, Generators, Generative adversarial networks, Games, Unsupervised learning, Spatial resolution. Abstract: Lately, supervised learning is hugely adopted in computer vision. But unsupervised learning has earned less consideration. A branch of CNNs classified as generative adversarial networks (GANs) is made acquainted, it has some architectural restraints, and exhibit that they are a tough contender for unsupervised learning. Training on different datasets of images, it displays conclusive proof that the adversarial pair learns a hierarchy of portrayal from parts to scenes in both the discriminator and generator. Also, the learned features can be used for variety of innovative tasks, indicating their appropriateness as general image representation. |
8,403 | Please write an abstract with title: Intraoperative testing of selectivity of spiral nerve cuff electrodes, and key words: Testing, Spirals, Muscles, Biomedical electrodes, Recruitment, Extremities, Injuries, Surgery, Humans, Parameter estimation. Abstract: Nerve cuff electrodes were used intraoperatively to stimulate peripheral nerves to test electrode selectivity in the human upper extremity. Subjects were recruited from patients undergoing upper extremity nerve repair procedures. The nerves were stimulated through different contacts in the cuff and with varying parameters. Estimates of threshold and selectivity data were recorded. The stimulation thresholds found were an order of magnitude higher than prior animal studies using the spiral nerve cuff electrode. Preliminary selectivity was found on the ulnar nerve and the upper trunk of the brachial plexus of one subject. The biceps and pectoralis major were selectively activated by a single cuff placed proximally, on the upper trunk; the flexor carpi ulnaris and first dorsal interosseous were selectively activated by a single cuff placed on the ulnar nerve. |
8,404 | Please write an abstract with title: Android Web Security Solution using Cross-device Federated Learning, and key words: Data privacy, Privacy, Costs, Machine learning, Collaborative work, Data models, Mobile handsets. Abstract: Over the last one decade or so, Machine Learning has changed the global technology landscape with applications in almost all disciplines and verticals. Mobile and Web Security is an important research area in which researchers have been trying to apply Machine Learning, but data privacy concerns and high data communication costs to a central Machine Learning server have limited its use. Federated Learning is emerging as a promising solution which addresses privacy concerns and drastically reduces communication costs. In Federated Learning, data from individual devices is not communicated to a central server and model learning happens in a distributed manner. In this paper, we propose a Federated Learning solution for security of Android based devices. Mobile and Web Security solutions have evolved from signature-based detections to building Machine Learning models which are trained over large centralized malware repositories. We have used Federated Learning to learn security patterns from users' browsing data, which resides on individual devices and will never leave the devices. Federated Learning preserves users' privacy as it shares with the central server only the model that it learns from users' browsing data, and not the data itself. This way each mobile platform trains its own web security model from its data, and shares it to the centralized server. The centralized server aggregates these trained models received from numerous mobile devices and compiles an aggregated global model, which in turn is sent to mobile devices for inference. Mobile security solutions based on this concept create a sustained self-evolving security ecosystem, in which millions of mobile platforms share their learned models to form a robust distributed security paradigm. The results obtained using Federated Learning are found to be comparable with the results of centralized Machine Learning. |
8,405 | Please write an abstract with title: Need of causal analysis for assessing phase relationships in closed loop interacting cardiovascular variability series, and key words: Cardiology, Delay, Phase estimation, Fluctuations, Blood pressure, Transfer functions, Baroreflex, Employee welfare, Physics, Testing. Abstract: The phase spectra obtained by the classical closed loop autoregressive model (2AR) and by an open loop autoregressive model (ARXAR) were compared to shed light on the need of introducing causality in the assessment of the delay between RR and arterial pressure oscillations. The reliability of the two approaches was tested in simulation and real data setting. In simulation, the coupling strength of a bivariate closed loop process was adjusted to obtain a range of working conditions from open to closed loop. In open loop condition, 2AR and ARXAR phases were comparable and in agreement with the imposed delay. In closed loop condition, ARXAR model returned the imposed delays, while 2AR showed an intermediate value of delay. Real data were chosen to represent comparable physiological condition. The use of cross spectrum for calculating the delay from arterial pressure to RR oscillations seems adequate only in particular condition of open-loop relationship as it happens during head up tilt in young healthy subjects. |
8,406 | Please write an abstract with title: Fast fuzzy signal and image processing hardware, and key words: Signal processing, Image processing, Hardware, Digital signal processing, Signal processing algorithms, Fuzzy logic, Inference algorithms, Fuzzy sets, Parallel processing, Frequency. Abstract: The paper presents the development of fast fuzzy logic based hardware for various applications such as controllers for very fast processes, real-time image processing and pattern recognition. It is based on the fired-rules-hyper-cube (FRHC) concept, characterized by extremely simple way of the fuzzy inference in a layered parallel architecture. The processing time slightly depends on the number of inputs of the fuzzy system and does not depend on the number of rules and fuzzy partitioning of all variables. Most important is the inherent high speed of processing because of the parallelism and pipelining, implemented in all layers. |
8,407 | Please write an abstract with title: A Hybrid Cryptographic Algorithm for securing medical data in Cloud Computing Environment, and key words: Steganography, Tracking, Computational modeling, Cloud computing security, Elliptic curve cryptography, Encryption, Cryptography. Abstract: In the past few years, the researchers focused on cloud computing security, because of medical data usage and its importance. Therefore, data security on medical data is an important issue, while storing it on clouds. Decentralized protection safeguarding prescient displaying enables numerous organisations to learn about a more generalize on medical services or genomic information by sharing the halfway prepared models rather than patient-level information, while evading dangers, such as single-purpose of control. One of the most important aspects of human life has become restorative care, which has led to a dramatic increase in therapeutic data. Although these advancements pose serious security risks and concerns about the movement of information, they also raise serious concerns about data tracking and recording. Even if the patient’s life is in jeopardy, these security and protection issues of medical information could result from a delay in treatment. A high level of data transit and storage security can be achieved through the use of cryptography. Traditional symmetric and asymmetric have various drawbacks in terms of their design. In order to ensure the privacy and data security at high level, the research work implemented the new hybrid technique. Elliptic curve cryptography (ECC) and the SHA-256 Cryptographic Hash Algorithm (SHA-256) are being combined in this article to create a hybrid algorithm. Proposed methods for patient data security and confidentiality have been tested and the results proves that it outperforms existing methods. To overcome the drawbacks of both symmetric and asymmetric cryptography, hybrid cryptography is employed. |
8,408 | Please write an abstract with title: Towards a Complete Safety Framework for Longitudinal Driving, and key words: Safety, Time factors, Road traffic, Brakes, Vehicular ad hoc networks, Trajectory, Switches, Vehicle safety, Collision avoidance. Abstract: Formal models for the safety validation of autonomous vehicles have become increasingly important. To this end, we present a safety framework for longitudinal automated driving. This framework allows calculating minimum safe inter-vehicular distances for arbitrary ego vehicle control policies. We use this framework to enhance the Responsibility-Sensitive Safety (RSS) model and models based on it, which fail to cover situations where the ego vehicle has a higher decelerating capacity than its preceding vehicle. For arbitrary ego vehicle control policies, we show how our framework can be applied by substituting real (possibly computationally intractable) controllers with upper bounding functions. This comprises a general approach for longitudinal safety, where safety guarantees for the upper-bounded system are equivalent to those for the original system but come at the expense of larger inter-vehicular distances. |
8,409 | Please write an abstract with title: Generative representations for the automated design of modular physical robots, and key words: Robotics and automation, Design engineering, Computer science, Morphology, Automatic control, Orbital robotics, Modular construction, Algorithm design and analysis, Genetic engineering. Abstract: The field of evolutionary robotics has demonstrated the ability to automatically design the morphology and controller of simple physical robots through synthetic evolutionary processes. However, it is not clear if variation-based search processes can attain the complexity of design necessary for practical engineering of robots. Here, we demonstrate an automatic design system that produces complex robots by exploiting the principles of regularity, modularity, hierarchy, and reuse. These techniques are already established principles of scaling in engineering design and have been observed in nature, but have not been broadly used in artificial evolution. We gain these advantages through the use of a generative representation, which combines a programmatic representation with an algorithmic process that compiles the representation into a detailed construction plan. This approach is shown to have two benefits: it can reuse components in regular and hierarchical ways, providing a systematic way to create more complex modules from simpler ones; and the evolved representations can capture intrinsic properties of the design space, so that variations in the representations move through the design space more effectively than equivalent-sized changes in a nongenerative representation. Using this system, we demonstrate for the first time the evolution and construction of modular, three-dimensional, physically locomoting robots, comprising many more components than previous work on body-brain evolution. |
8,410 | Please write an abstract with title: Printed Dipole Antenna with Stepped-Width Dipoles, and key words: Dipole antennas, Antenna radiation patterns, Impedance, Dual band, Optimization, Mathematical model, Manganese. Abstract: The new printed dipole antenna is presented in the paper. The main advantage of the antenna in comparison with classic printed dipole antenna is a small length of dipoles due to their stepped configuration. The antenna works at two central frequencies simultaneously and can be used both as a standalone antenna and as a part of antenna arrays. The characteristics of the antenna such as return losses diagram and radiation patterns at the low and high central frequencies are provided. |
8,411 | Please write an abstract with title: A 1.25Gb/s half-rate clock and data recovery circuit, and key words: Clocks, Circuits, Phase detection, Detectors, CMOS technology, Voltage-controlled oscillators, Frequency, Optical signal processing, Energy consumption, Voltage. Abstract: This paper presents a clock and data recovery (CDR) circuit with a new half-rate phase detector. The half-rate CDR circuit senses the input random data at full rate but employs a VCO running at a half frequency of the input data. At the locked condition, the circuit will generate two 625-Mb/s output sequences. The new half-rate phase detector applicable to the 1.25-Gb/s NRZ data stream is adopted to reduce the dead zone in phase characteristic. The CDR circuit is fabricated using the 0.35/spl mu/m CMOS technology and occupies 1800/spl mu/m/spl times/1800/spl mu/m chip area. Total power consumption of the chip is 54.8 mW under a 3-V supply voltage. |
8,412 | Please write an abstract with title: Surface-mode behavior of air-core photonic-bandgap fibers, and key words: Optical fiber losses, Frequency, Numerical simulation, Geometrical optics, Optical design, Optical device fabrication, Photonics Society, Optical coupling, Silicon compounds, Shape. Abstract: The relation between core size and surface modes in photonic-bandgap fibers is analyzed through numerical simulations. We present a simple criterion to predict the presence of surface modes and identify novel geometries that support no surface modes. |
8,413 | Please write an abstract with title: The design of a Ka-band two-stage monolithic low noise amplifier, and key words: Low-noise amplifiers, Noise figure, PHEMTs, FETs, Optimized production technology, Integrated circuit noise, MMICs, Microwave communication, Acoustic reflection, Inductors. Abstract: A Ka-band two-stage monolithic low noise amplifier has been designed using a commercial 0.18-/spl mu/m pseudomorphic high electron-mobility transistor (pHEMT) process. The gate widths of FETs and source inductors are adjusted to achieve best tradeoff among gain, noise figure and return loss. The simulated results of the low noise amplifier chip show a gain of more than 11 dB, a noise figure of less than 2 dB, an input return loss of greater than 15 dB, and an output return loss of greater than 9.7 dB in the frequency range of 27 to 33 GHz. The chip size is 1.4/spl times/0.9 mm/sup 2/. |
8,414 | Please write an abstract with title: A 98.1-dB SNDR 188-dB FoM<inf>S</inf> Noise-Shaping SAR ADC Using Series Connection Capacitors, and key words: Power demand, Capacitors, Redundancy, Voltage, Registers, Noise shaping, Topology. Abstract: This paper proposes a noise-shaping (NS) successive approximation register (SAR) analog-to-digital converter (ADC), which can be well applied in very high-precision and low-power-applications for Internet of Things (IoTs). An error feedback (EF) through the series connection of capacitors is implemented in the topology, which ensures that the input signal and feedback signal are not attenuated. Therefore, a small gain dynamic amplifier can be used, which has advantages of low power consumption and process-friendly characteristics. Designed in 55-nm CMOS process, the prototype of proposed NS-SAR ADC consumes very low power consumption of 623.6 μW when operating at 40 MS/s, which achieves a peak Schreier FoM of 188 dB with 98-dB signal to noise and distortion ratio (SNDR) at an oversampling ratio (OSR) of 16. |
8,415 | Please write an abstract with title: Dynamic deformation capability of a red blood cell under a cyclically reciprocating shear stress, and key words: Red blood cells, Stress, Glass, Microscopy, Cardiology, Humans, Shafts, Lenses, Lighting, Light sources. Abstract: Red blood cells (RBCs) in the cardiovascular devices are exposed to varying degree of the shear stress from all the directions. However the RBCs' deformability or the deformation capability under such a shear stress is not well understood. In this study, we designed and built a system that can induce a cyclically reciprocating shear stress to a RBC suspension. The arm of the cyclically reciprocating shear stress device was attached to the upper piece of the parallel glass plates between which a suspension of human RBCs (1% hematocrit whole blood diluted in a 32 weight% dextran phosphate buffer solution) was contained. The cyclic reciprocating motion of the upper glass plate of 3.0 mm stroke length was produced using a slider-crank shaft mechanism that was linked to an eccentric cam-motor system. Each rotation of the motor produced a 3.0 mm stroke each in the forward and backward direction of the slider block. The clearance between the two glass plates was adjusted to 30 micrometer. The cyclic reciprocating glass plate apparatus was attached to a light microscope stage (IX71 Olympus with x40 objective lens) for illumination with a 350 watt metal halide light source. A high speed camera (MEMREMCAM fx-K3 Nac, 5000 frames per second with shutter kept open) was attached to the microscope to capture the deformation process of the RBCs under cyclic shear stress. The preliminary result indicated that the correlation between the amplitude of the maximum shear stress and the RBCs' deformability. This indicates a potential application of the cyclic reciprocating device to evaluate the temporal response of the RBCs deformability prior to its destruction. The future study will focus on the study of the relative velocity of the erythrocytes with respect to the velocity of the reciprocating plate. |
8,416 | Please write an abstract with title: Analysis and verification on side effect of anti-backlash delay in phase-frequency detector, and key words: Phase frequency detector, Delay effects, Phase detection, Computer simulation, Phase locked loops, Space vector pulse width modulation, Charge pumps, Computational modeling, Modems, Voltage-controlled oscillators. Abstract: The side effect of the anti-backlash delay in digital phase-frequency detector is analyzed. It is shown that the frequency tracking ability of the detector is decreased by the delay, so that the lock-in transition time will increase. Furthermore, it is shown that the side effect is mainly caused by the delay to the front edge of the reset pulse. Both computer simulation and experimental verification shows the analysis is correct. The work gives an insight view of the detector's working principle and will be useful for its design. |
8,417 | Please write an abstract with title: Cost-Effective High-Performance Monolithic X-Band Low-Noise Amplifiers, and key words: Low-noise amplifiers, Noise figure, FETs, Circuit synthesis, Conducting materials, Costs, Radar antennas, Measurement standards, MMICs, Gallium arsenide. Abstract: A low-cost, high-performance X-band amplifier with ion-implanted MESFET technology has been demonstrated. Various design, material, and processing approaches have been evaluated in terms of yield, cost, and device performance. An average noise figure of 2.2 dB and a standard deviation of 0.1 dB, with an associated gain of 22.5 dB and a standard deviation of 0.8 dB at the center frequency band of 9.5 GHz, have been measured. |
8,418 | Please write an abstract with title: A New Digital Landscape and Politicians’ Public Performance Evaluation, and key words: Performance evaluation, Seminars, Time-frequency analysis, Social networking (online), Government, Communication channels, Tools. Abstract: The article under consideration aims at analysing the impact of a digital landscape on the activity of state and regional government leaders. The intertwining of offline and online uninhibited information flows, social networks, open data and other digital landscape elements have changed the social credibility online portrait of statesmen. Employing content and metadata analysis as research tools, the author focuses attention on the changes within political and state people’s social credibility online portraits and evaluates the effectiveness of their public presentations. |
8,419 | Please write an abstract with title: Characterizing the Self-Noise of a Seaglider AUV Using a Passive Acoustic Monitor, and key words: Temperature measurement, Temperature sensors, Temperature distribution, Oils, Sea measurements, Buoyancy, Conductivity. Abstract: The Seaglider is a relatively quiet vehicle in comparison with propelled Autonomous Underwater Vehicles (AUVs) making it a desirable acoustic receiving platform; however, Seaglider operations such as pumping oil to change buoyancy, shifting the battery to change pitch/roll, and oceanographic data collection do produce some self-noise. Data were analyzed from two separate missions, one in the Gulf of Mexico and one off the coast of Nova Scotia, Canada, to identify and characterize the self-noise produced by the vehicle during operation. Sources of Seaglider self-noise include roll changes, pitch changes, buoyancy changes, temperature conductivity and depth sensor measurements, and altimeter pings. Sound produced by these functions range from over 3 minutes of continuous broadband noise resulting from the buoyancy pump, to 0.75 second tonal signals produced by the integrated conductivity temperature and depth sensor. Self-noise characterization contributes to furthering the Seaglider platform as a cutting-edge technology in the field of underwater acoustics. |
8,420 | Please write an abstract with title: Proceedings at one hundred and eightieth ordinary general meeting, and key words: Floors, Power generation, Concrete, Buildings, Boilers, Turbines, Structural beams. Abstract: (Vice-President) was in the chair. |
8,421 | Please write an abstract with title: Signature Analysis of Dispatch Schemes in Wafer Fabrication, and key words: Fabrication, Job shop scheduling, Manufacturing processes, Semiconductor device modeling, Integrated circuit modeling, Semiconductor process modeling, Production facilities, Integrated circuit manufacture, Operations research, Production systems. Abstract: Signature analysis is used to characterize lot dispatch priority schemes in wafer fabrication, a complex manufacturing operation. A number of idealized dispatch schemes are evaluated using a comprehensive assessment criterion. The production system analyzed in this paper is large in comparison to previous studies on manufacturing scheduling. Real dispatch schemes depend strongly on the characteristics of human implementation. Signature analysis provides the basis for measuring organizational performance by comparing formal dispatch schemes with each other and with actual dispatch schemes used in wafer fabrication. |
8,422 | Please write an abstract with title: Measurements of ionization current in liquid dielectric mixtures, and key words: Dielectric liquids, Current measurement, Dielectric measurements, Testing, X-rays, Voltage, Electromagnetic wave absorption, Temperature, Ionization chambers, Silicon. Abstract: The article contains further development of the author's problem. I have tested the application of the ionization chamber as a dosimeter. I was measuring the changes of ionization current with the absorption of X-rays by metals. I was changing the thickness of the absorbent for different voltage of the X-lamp. The obtained results have the same character as in the case of other dosimeters used so far (e.g. Geiger-Mueller counter). Therefore my ionization chamber can function as dosimetric chamber (e.g. in medicine), although further research would be demanded to ensure better usage. |
8,423 | Please write an abstract with title: Fuzzy reasoning scheme for edge detection using local edge information based on Renyi's entropy, and key words: Fuzzy reasoning, Image edge detection, Entropy, Fuzzy systems, Humans, Noise measurement, Immune system, Image processing, Machine vision, Fuzzy set theory. Abstract: In this paper we present a robust approach to edge detection using fuzzy reasoning. In order to implement the fuzzy inference system a novel entropic local edge information measure is introduced based on Renyi's a-order entropy. The calculation of the proposed measure is carried out using a parametric classification scheme based on local statistics. By suitable tuning its parameter, the local edge information measure is capable of preserving edge information while exhibiting high immunity to noise. The proposed fuzzy system is able to successfully detect edges in images corrupted by noise. The effectiveness and the robustness of the new method are demonstrated by applying our algorithm to noisy images. Performance assessment is based on comparison of the results derived using the proposed method with those obtained using various existing edge-detection algorithms. |
8,424 | Please write an abstract with title: Video Object Boundary Reconstruction by 2-Pass Voting, and key words: Voting, Tensile stress, Data mining, Image edge detection, Shape, Image reconstruction, Detectors, Joining processes, Lighting, Object detection. Abstract: In this paper we propose a voting-based object boundary reconstruction approach. Tensor voting has been studied by many people recently, and it can be used for boundary estimation on curves or irregular trajectories. However, the complexity of saliency tensor creation limits its applications in real-time systems. In order to have an efficient solution, we introduce an alternative voting approach. Rather than creating saliency tensors, we use a “ 2-pass” method for orientation estimation. For the first pass, Sobel detector is applied on a coarse boundary image to get the gradient map, then the orientation information is updated by accumulating votes on the corresponding direction. In the second pass, edge linking is performed based on the pixels orientation map, and extra lines are eliminated by detecting intersections. The approach has been applied to various video clips under different conditions, and the experimental results demonstrate significant improvement on the final extracted objects accuracy. |
8,425 | Please write an abstract with title: Revealing Common Enterprise Architecture Debts: Conceptualization and Critical Reflection on a Workshop Format Industry Experience Report, and key words: Industries, Conferences, Computer architecture, Companies, Maintenance engineering, Reflection, Faces. Abstract: The Enterprise Architecture (EA) discipline evolved during the past two decades and is now established in a large number of companies. Architectures in these companies changed over time and are now the result of a long creation and maintenance process. Such architectures still contain processes and services provided by legacy IT systems (e.g., systems, applications) that were reasonable during the time they were created but might now hamper the introduction of better solutions. In order to support handling those legacies, research on the notion of EA debts has been started. The concept of EA debts widens the scope of technical debts to cover also organizational aspects offering a mean for managing EA in dynamic environments. The research encompasses the development of methods for managing debts together with a repository of typical EA debts. Identifying EA debts for the repository is challenging as required knowledge is usually not documented. Therefore, a structured approach is needed to externalize this knowledge. The paper presents a workshop format that is used to identify EA debts in organizations. Corresponding workshops are performed in two distinct companies to support them in understanding certain issues they face. First results from those workshops are presented in the second part of the paper. |
8,426 | Please write an abstract with title: Space-time iterative receivers for narrowband multichannel networks, and key words: Narrowband, Multiuser detection, Time division multiple access, Interference suppression, MIMO, Bandwidth, Sensor arrays, Interchannel interference, Frequency division multiaccess, Land mobile radio cellular systems. Abstract: The iterative MMSE multiuser detection paradigm is applied to the suppression of cochannel interference in the coded narrowband (multicell) uplink. The equivalent of multiple chips per bit (necessary for MMSE multiuser demodulation) is generated via multisensor reception, the array responses serving as user signatures. This receiver's robustness to overloading allows its sensor count to be much lower than the typical number of other-cell cochannel interferers. A permutation transmit diversity technique that exploits channel time-selectivity is proposed in order to enhance the interuser separation afforded by multisensor reception. |
8,427 | Please write an abstract with title: Zen Mind, Machine Mind, and key words: Generative adversarial networks, Visualization, Media, Companies, Machine learning, Big Data. Abstract: Artificial intelligence and machine learning are often discussed in grandiose contexts. Global technologies, trillion–dollar companies or sweeping societal implications tend to dominate the arguments. Terms like big data and petabyte storage evoke vastness. As an artist, David Young wants nothing to do with any of this. He would rather concern himself with beauty, mystery, and the little things in life—machine life, that is. There is nothing “big” about his work. |
8,428 | Please write an abstract with title: Passive-Circuit-Based Nonreciprocal Metamaterials: Controlling the Phase Gradient of Fields in Resonators and Antennas, and key words: Wireless communication, Microwave antennas, Transmission lines, Microwave communication, Microwave theory and techniques, Microwave circuits, Metamaterials, Resonators. Abstract: In next- and future-generation wireless communication systems, demand for antenna technologies has continued to grow. This demand has fueled the development of design techniques that pursue more desirable configurations with simplification, electrically small size, and low profiles as well as multiple functionalities and higher performance with multiband, broad bandwidth, single/multibeam scanning, polarization control, and dispersionless group delay. |
8,429 | Please write an abstract with title: Soft(ware) skills in context: corporate usability training aiming at cross-disciplinary collaboration, and key words: Usability, Collaboration, Collaborative work, Collaborative software, Design methodology, Programming, Software engineering, Education, State feedback, Computational modeling. Abstract: Employing user-centered instructional design methodology, we developed a usability training workshop for developers which has remarkable impact on participants' attitudes towards the cross-disciplinary collaboration in the software development team. Based mainly on learning experiences during a simulation game, participants gain insights regarding typical pitfalls and opportunities of collaboration with user experience specialists and other non-technical professionals. Rather than teaching abstract, high-level usability principles, we use the "reflected practice" approach as a guiding workshop theme, in order to achieve lasting effects for the succeeding professional practice of software development teams. We include evaluative data based on participants' feedback and in-class statements. |
8,430 | Please write an abstract with title: Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity, and key words: Computer security, Taxonomy, Ontologies, Cyberspace, Law, Computer crime, Social sciences. Abstract: This chapter discusses the frequent assertion that “no one definition or typology, taxonomy, ontology exists for cybersecurity. It examines definitions, typologies, taxonomies, ontologies, their theoretical modes of construction and their applications to the concept of cybersecurity. The chapter introduces some theoretical background to identify the themes, notions or concepts of typologies. It discusses the usefulness of typologies, rules for the construction of typologies, and cybersecurity typologies. The chapter explores the components, rules of creation, and the contents of the cybersecurity taxonomies. While taxonomies are classification tools, ontologies help to model the relationships between concepts. The chapter discusses the usefulness of ontologies, rules for the construction of ontologies, and cybersecurity ontologies. Cybersecurity appears, through the prism of definitions, to be an essentially technical issue, giving a large place to the engineer's vision. The chapter asserts that there is no consensus on definitions of cybersecurity, although of course multiple formulations remain possible. |
8,431 | Please write an abstract with title: Using fuzzy logic inference algorithm to recover molecular genetic regulatory networks, and key words: Fuzzy logic, Inference algorithms, Genetics, Gene expression, Biological system modeling, Mathematical model, Regulators, Computer networks, Power engineering computing, Computational modeling. Abstract: Network inference algorithms are powerful computational tools for identifying potential causal interactions among variables from observational data. Fuzzy logic has inherent capability of handling noisy data, so it becomes a tool we use to develop our inference algorithm. Here, we use a simulation approach to test and improve the algorithm. Our fuzzy logic inference algorithm works reasonably well in recovering the underlying regulatory network. |
8,432 | Please write an abstract with title: The effect of price-optimized charging on electric vehicle fleet emissions, and key words: Schedules, Scheduling algorithms, Carbon dioxide, Electric vehicle charging, Smart grids, Carbon, Optimization. Abstract: Aggregation of sufficiently large electric vehicle (EV) fleets and control over their charging schedules enables aggregators to utilise the flexibility of EV charging in the Day Ahead Market. Optimising the charge scheduling of such fleets enables time-shifting of electricity demand to hours when electricity is cheaper, reducing the electricity cost for charging the entire fleet. Time shifting with scheduled charging is expected to influence the average carbon intensity of the energy used by these vehicles. This work aims to quantify the change in the carbon intensity of energy used by smart charged vehicles. It uses real data collected from over 55,000 home charging sessions from 1031 chargepoints in the Netherlands in 2018. A simulation was made with a commercial smart charging algorithm to create a scheduled charging profile ex post from the historic EV charging dataset. The simulation resulted in an average price reduction of electricity for the fleet of about 25% relative to unscheduled charging of the same fleet over the same period. The time dependent average carbon intensity of electricity consumed in the Netherlands was used to calculate the mean carbon intensity of the electricity used to charge the fleet over the period in the scheduled and unscheduled charging cases. The results revealed a small decrease in carbon intensity by 1.2%. Analysis reveals that price optimisation can have large effects on the mean carbon intensity of individual sessions in the Dutch grid, but the net effect is averaged out over a large number of sessions and over the year. |
8,433 | Please write an abstract with title: Importance of Model Fidelity of Power to X Devices in Energy System Analysis, and key words: Temperature measurement, Performance evaluation, Analytical models, Temperature dependence, Temperature, Heat pumps, Biological system modeling. Abstract: Power-to-X (PtX) technologies are accelerating the energy transition. Increasingly, these technologies are also being leveraged as flexible energy resources to support the electrical grid. PtX models are often represented using a constant efficiency term as a linear relation between the power input and energy output. However, the operational performance of any PtX device such as an electrolyser or an electric heat pump can depend on factors such as operational temperature. In this paper, we have developed and analyzed two levels of model fidelity of the most widely assessed PtX technologies: electrolyser and heat pump systems. We assess the impact of detailed models on operation of PtX within simulation-based energy system analysis. Our results show that for electrolyser systems, the efficiency errors can be almost 0.6%. With heat pump systems, the difference in COP can be as high as 1.4. |
8,434 | Please write an abstract with title: A Taxonomy of Optimal Feature Learning Model in Combined Data Mining System, and key words: Wireless communication, Analytical models, Sensitivity, Neural networks, Taxonomy, Predictive models, Data models. Abstract: Data mining is one the emerging field in recent days, which gained a significant attention due to its efficiency, proper decision making ability, and cost-adeptness. This paper investigating the performance of various data mining techniques in the financial domain. The main of this study to investigate the prospects and practices of the conventional data mining techniques for processing the large financial dataset. Also, the importance of data preprocessing, clustering, feature selection, and classification processes have been studied in this work. The different types of factors that helps to improve the reliability of data mining system are examined. Typically, the data retrieval process can be difficult in the financial banking systems due to its large size of information. Also, a machine learning classification technique can be developed for identifying the type of data with better performance rate and reduced time complexity factors. During experimentation, the existing techniques have been compared by using various performance indicators such as sensitivity, specificity, precision, recall, jaccard, and F-Measure. |
8,435 | Please write an abstract with title: A Review on Techniques and Applications of Object Tracking and Gesture Recognition, and key words: Training, Costs, Surveillance, Gesture recognition, Object detection, Hardware, Sensors. Abstract: Detecting different items in a picture with the aid of computers using any of the numerous detection techniques is referred to as object detection in computer vision. A thorough examination of several research papers on object identification, object tracking (its extension), and gesture recognition (an application) reveals the varied methodologies and algorithms employed in these tasks. The practice finds applications in several areas like the military, medical science, surveillance, autonomous vehicle science etc. We are at a point where we can comfortably compute these things locally on a smartphone. So far the literature in these areas is promising. Only hurdle is training the programs to perform as intended may need more power than the machine that runs the end product. A look at various works in the field gives a view of how the technology in the sector has progressed and what can be done with it. Various contemporary techniques are available which can be used with relative ease and can be tweaked without much hassle, for example - SSD, RCNN, YOLO. |
8,436 | Please write an abstract with title: An Expansion for FM Spectra, and key words: Frequency, Upper bound, Equations, Background noise, Gaussian processes, Communication channels, Repeaters, Millimeter wave communication, Random variables. Abstract: A formal series expansion is given for the powerdensity spectrum of a carrier frequency-modulated by a random signal. The first term of the series is the well-known Woodward term usually obtained heuristically by considering the FM wave as a slowly changing sinusoid. Higher order terms represent corrections to this quasi-static description. |
8,437 | Please write an abstract with title: Distilling Spikes: Knowledge Distillation in Spiking Neural Networks, and key words: Knowledge engineering, Training, Image coding, Computational modeling, Artificial neural networks, Linear programming, Hardware. Abstract: Spiking Neural Networks (SNN) are energy-efficient computing architectures that exchange spikes for processing information, unlike classical Artificial Neural Networks (ANN). Due to this, SNNs are better suited for real-life deployments. However, similar to ANNs, SNNs also benefit from deeper architectures to obtain improved performance. Furthermore, like the deep ANNs, the memory, compute and power requirements of SNNs also increase with model size, and model compression becomes a necessity. Knowledge distillation is a model compression technique that enables transferring the learning of a large machine learning model to a smaller model with minimal loss in performance. In this paper, we propose techniques for knowledge distillation in spiking neural networks for the task of image classification. We present ways to distill spikes from a larger SNN, also called the teacher network, to a smaller one, also called the student network, while minimally impacting the classification accuracy. We demonstrate the effectiveness of the proposed method with detailed experiments on three standard datasets while proposing novel distillation methodologies and loss functions. We also present a multi-stage knowledge distillation technique for SNNs using an intermediate network to obtain higher performance from the student network. Our approach is expected to open up new avenues for deploying high performing large SNN models on resource-constrained hardware platforms. |
8,438 | Please write an abstract with title: Internet of Things based Intelligent Waste Segregation and Management System for Smart Home Application, and key words: Temperature sensors, Temperature measurement, Deep learning, Training, Microcontrollers, Humidity, Real-time systems. Abstract: The Internet of Things (IoT) has a significant impact on research for real time data monitoring. Waste segregation and control based on IoT is a significant task in metropolitan cities and municipal corporations. The advancement of key enabling technologies dependent on IoT enabled devices. Waste segregation and disposal mechanisms are among the severe problems associated with smart cities, which have a negative impact on our society and health. The trash bin monitoring and control is carried out through a microcontroller is proposed in this work. An IoT enabled smart bin utilizes a microcontroller with multiple sensors will control the process. In this paper, use inductive proximity sensors to detect metal trash, while temperature and humidity sensors are used to segregate as wet and organic wastes. The bin filling level is monitored using Infrared sensors. IoT with sensor communication module allows remote control of real-time data collection at each home. While Bluetooth allows for short-range waste monitoring via a mobile app. Waste is piled at various levels in the trash bins. The centralized controller is enabled and the filled bins are managed effectively with the deep learning technique. The waste collection is monitored by setting up a training model based on Deep Learning (DL). The intelligent GUI will track the unfilled levels of each trash bin as proposed. |
8,439 | Please write an abstract with title: A Method for Detecting Liquid Capacity in Metal Can, and key words: Liquids, Metals, Transforms, Interference, Feature extraction, Information filters, Software. Abstract: There are many methods to detect the quality of metal filling products, one of which is liquid volume detection. According to the agreed rules, the knocking audio signal of metal canned liquid is collected, and the continuous sound signal recorded is converted into discrete digital signal through MATLAB software and the recording function of mobile phone, and a variety of characteristics are analyzed. Finally, the metal filling liquid level is judged through feature extraction, so as to achieve the purpose of capacity detection. |
8,440 | Please write an abstract with title: Concealed Object Detection using Microwave Transmission Holography, and key words: Microwave measurement, Shape, Weapons, Shape measurement, Object detection, Holography, Microwave theory and techniques. Abstract: The work presented here, describes the use of indirect microwave holography in transmission mode for imaging and identification of concealed objects. Experimental analysis with metallic sheets of different shapes is done to show the applicability of the method. The qualitative measurements for econstruction of shape and size of the obscured objects are performed. The agreement of actual and measured results for different metallic objects validate the method and setup of transmission holographic measurement in identification of unknown objects. |
8,441 | Please write an abstract with title: CuMARL: Curiosity-Based Learning in Multiagent Reinforcement Learning, and key words: Training data, Reinforcement learning, Mutual information, Games, Decision making, Behavioral sciences, Multi-agent systems, Mutual information. Abstract: In this paper, we propose a novel curiosity-based learning algorithm for Multi-agent Reinforcement Learning (MARL) to attain efficient and effective decision-making. We employ the centralized training with decentralized execution framework (CTDE) and consider that each agent has knowledge of the prior action distribution of others. To quantify the difference in agents’ knowledge, curiosity, we introduce conditional mutual information (CMI) regularization and use the amount of information for updating decision-making policy. Then, to deploy these learning frameworks in a large-scale MARL setting while acquiring high sample efficiency, we consider a Kullback-Leibler (KL) divergence-based prioritization of experiences. We evaluate the effectiveness of the proposed algorithm in three different levels of StarCraft Multi Agent Challenge (SMAC) scenarios using the PyMARL framework. The simulation-based performance analysis shows that the proposed technique significantly improves the test win rate compared to various state-of-the-art MARL benchmarks, such as the Optimistically Weighted Monotonic Value Function Factorization (OW_QMIX) and Learning Individual Intrinsic Reward (LIIR). |
8,442 | Please write an abstract with title: Manual and Automatic Methods for User Needs Detection in Requirements Engineering: Key Concepts and Challenges, and key words: Mechatronics, Automation, Manuals, Machine learning, Requirements engineering, Interviews. Abstract: User needs inform designers and developers of essential functionalities for requirements engineering. In this work, we summarize key concepts and challenges relating to manual and automatic user needs detection methods. We discuss six challenges with manual and eight challenges with automated methods. Despite the promise of automated methods, the challenges imply that artificial intelligence and machine learning are not yet mature enough to replace manual methods, such as interviews and focus groups, for discovering user needs in requirements engineering. |
8,443 | Please write an abstract with title: An enhanced reactive dynamic source routing algorithm applied to mobile ad hoc networks, and key words: Heuristic algorithms, Mobile ad hoc networks, Routing protocols, Vehicle dynamics, Broadcasting, Electronic mail, Land mobile radio cellular systems, Robustness, Vehicles, Costs. Abstract: Even though the reactive dynamic source routing protocol (RDSR) has been shown via simulations to be mostly efficient among all the existed routing protocols, it increases transmission delay. To overcome the above drawback in the reactive ad hoc routing protocol, this paper proposes an enhanced reactive ad hoc network routing protocol: ERDSR (enhanced reactive dynamic source routing protocol). ERDSR chooses the route by using the bandwidth and the number of hops of the available paths, and regulates the value of send/spl I.bar/timeout dynamically. Compared with RDSR by using ns-2 under various environments, ERDSR reduces the transmission delay and the average path length, and significantly improves the packet delivery ratio. |
8,444 | Please write an abstract with title: Design of A Class-E Direct AC-AC Converter with Only One Capacitor and One Inductor for Domestic Induction Cooker, and key words: Systematics, AC-AC converters, Capacitors, Prototypes, Switches, Telecommunications, Inductors. Abstract: Induction heating system is the most important component in domestic induction cooker. The system is usually required a full-bridge rectifier and a resonant inverter to generate medium-frequency power source to the induction coil. In order to simplify and reduce the operating procedure, we propose a design of the system by using a Class-E direct AC-AC converter with only one capacitor and one inductor. The design principle is based on the zero-voltage derivative switching (ZVDS) of the Class-E inverter with a parallel network. Thus, this study provides a more systematic scheme to design a Class-E direct AC-AC converter for domestic induction cooker than the conventional methodology. The results from our design are then compared with experimental results from a 1,300 W prototype operated at 220 V and 50 Hz. |
8,445 | Please write an abstract with title: Correlation Between Ammonia Selectivity and Temperature Dependent Functional Group Tuning of GO, and key words: Sensors, Annealing, Graphene, Temperature sensors, Vibrations, Silicon, X-ray scattering. Abstract: Starting from room temperature (27 °C), graphene oxide (GO) was annealed stepwise at 100 °C, 200 °C and 300 °C and detailed structural characterizations like FTIR (Fourier transform infrared spectroscopy), XPS (X-ray photoelectron spectroscopy), XRD (X-ray powder diffraction) and Raman spectroscopy revealed that with increase in temperature, transformation from GO to rGO (reduced graphene oxide) took place and complete conversion was achieved at 300 °C. With increase in temperature, the functional groups like epoxy, ether, carbonyl and carboxyl were gradually reduced and at 300 °C, only the hydroxyl group became dominant. The gas sensing study was carried out using NH3 and alcohols in the concentration range of 125 ppb-700 ppm. It was observed that for lower ppm (5-50 ppm) the GO based sensors offered better selectivity towards NH3, while rGO exhibited better NH3 selectivity at higher concentrations (200-700 ppm). Possibly, presence of hydroxyl group is favorable for NH3 adsorption and therefore NH3 selectivity is better in rGO particularly at high concentrations. On the other hand, at low NH3 concentrations, presence of various types of functional groups in GO gives a resultant selectivity which is better compared to that of rGO. |
8,446 | Please write an abstract with title: Optimization of the control process in residential buildings using technological tools, and key words: Buildings, Process control, Tools, Software, Proposals, Synchronization, Optimization. Abstract: Many construction companies worldwide continue to implement different methodologies to optimize time and improve management in the execution of works; however, a lack of control in projects continues to be observed. For this reason, one of the most common problems currently is the incompletion of scheduled work. Due to this, it is necessary to keep better control of the projects at the execution stage so that the contractor can optimally, quickly, and easily manage the progress of all the specialties involved. In this sense, this research develops the use of the Plan Grid Application for data collection in the field and the Power Bi software for the automatic processing and information visualization through a management dashboard where indicators are shown to reflect the progress and actual performance of the activities as well as the main non-compliance causes, which leads to optimize the control process and the time spent by its administrators to carry out this management. |
8,447 | Please write an abstract with title: Kronecker products and matrix calculus in system theory, and key words: Calculus, Matrices, Algebra, Stochastic systems, Steady-state, Subspace constraints, Sufficient conditions, Sensitivity analysis, Feedback. Abstract: The paper begins with a review of the algebras related to Kronecker products. These algebras have several applications in system theory including the analysis of stochastic steady state. The calculus of matrix valued functions of matrices is reviewed in the second part of the paper. This calculus is then used to develop an interesting new method for the identifiication of parameters of lnear time-invariant system models. |
8,448 | Please write an abstract with title: Efficient HLS Implementation of Fast Linear Discriminant Analysis Classifier, and key words: Training, Principal component analysis, Testing, Field programmable gate arrays, Hardware, Eigenvalues and eigenfunctions, Optimization. Abstract: Linear discriminant analysis (LDA) classification is widely used in the current field of machine learning and data mining. However, its computational complexity tends to cause high processing latency when implemented on field-programmable gate array (FPGA), especially for high-dimensional data. This letter proposes a method to reduce computational complexity, which uses principal component analysis (PCA) to obtain the most representative characteristics of the original data for projection. Instead of the original data, the dimension-reduced data obtained by the projection will be used for classification. Moreover, when there is only one main characteristic value, not only the matrix inversion operation is avoided but also a large number of matrix multiplication operations are simplified. The implementation of the classifier on FPGA is realized using high-level synthesis (HLS), which can effectively save hardware development time. The results show that the method has an encouraging performance in reducing the execution time of the algorithm on FPGA, while the accuracy of the classifier can also be guaranteed. |
8,449 | Please write an abstract with title: A wavelet-based ECG delineator: evaluation on standard databases, and key words: Electrocardiography, Databases, Detectors, Robustness, Communications technology, Standards development, Wavelet transforms, Sampling methods, Cardiac disease. Abstract: In this paper, we developed and evaluated a robust single-lead electrocardiogram (ECG) delineation system based on the wavelet transform (WT). In a first step, QRS complexes are detected. Then, each QRS is delineated by detecting and identifying the peaks of the individual waves, as well as the complex onset and end. Finally, the determination of P and T wave peaks, onsets and ends is performed. We evaluated the algorithm on several manually annotated databases, such as MIT-BIH Arrhythmia, QT, European ST-T and CSE databases, developed for validation purposes. The QRS detector obtained a sensitivity of Se=99.66% and a positive predictivity of P+=99.56% over the first lead of the validation databases (more than 980,000 beats), while for the well-known MIT-BIH Arrhythmia Database, Se and P+ over 99.8% were attained. As for the delineation of the ECG waves, the mean and standard deviation of the differences between the automatic and manual annotations were computed. The mean error obtained with the WT approach was found not to exceed one sampling interval, while the standard deviations were around the accepted tolerances between expert physicians, outperforming the results of other well known algorithms, especially in determining the end of T wave. |
8,450 | Please write an abstract with title: Application of ANN for Fault Detection in Overhead Transport Systems for Semiconductor Fab, and key words: Rails, Semiconductor device measurement, Artificial neural networks, Power supplies, Fault detection, Cable insulation, Materials handling. Abstract: In order to ensure safe and fast transportation of wafers in 300 mm semiconductor factories, overhead transport systems (OHT) are primarily used. These systems consist of a rail network and vehicles. To avoid congestion and delays in production, high availability of individual rail sections is essential. In order to ensure this extensive preventive maintenance is required. In this paper, we focus on automatic checks for faults of the rail network by capturing the rail with optical sensors. Our objective is the identification of faults in real time. We considered the identification using artificial neural networks (ANN). Due to the lack of fixed rules designing an ANN we tested different topologies for our application and covered adaptation of ANN to the real conditions in the fab. As a result, our ANN provides accurate real time fault detection which allows a needs-based, resource-saving and efficient maintenance procedure for a reliable OHT and hence 24/7 semiconductor manufacturing. |
8,451 | Please write an abstract with title: Domain-principled Inference with ResNet-Transformer Model for 12-lead ECG Classification, and key words: Sensitivity, Electrocardiography, Predictive models, Feature extraction, Prediction algorithms, Inference algorithms, Recording. Abstract: Automated detection of cardiovascular diseases (CVDs) from Electrocardiogram (ECG) recordings is a problem of immense practical interest and it is associated with considerable research challenges. In this paper, we develop an ECG classification model that is capable of satisfying a practical clinical requirement of automated CVD screening solution, where the medical domain principle is to minimize the false negative rates of decisive diagnosis or to improve sensitivity of the critical CVD classes. In this work, we attempt to solve this unique domain principle challenge and propose novel hybrid deep neural model architecture called domain-principled ResNet-Transformer, which consists of two components-ResNet-Transformer network and domain-principled inference. Residual Network or ResNet acts as the feature extractor from the ECG signal to construct lower dimensional feature embeddings, which are fed to the transformer network to capture the patterns in ECG signals and learn the internal information between the embeddings for classification. While the proposed ResNet-Transformer model demonstrates reliable classification performance, the domain-principled inference algorithm ensures that the model is capable of higher sensitivity measures of the critical diagnosis classes, where affinity propagation-based unsupervised learning approach is proposed to maximize the reward of successfully predicting the critical CVDs. We have experimented with Physionet 2020 ECG datasets, one of the largest publicly available 12-lead ECG datasets of its kind and empirical results demonstrate that the classification performance of our ResNet-Transformer model significantly outperforms the current state-of-the-art algorithms. Moreover, the ablation study establishes the unique proposition of our reward-centric inference method to maximize sensitivity towards critical CVD classes. |
8,452 | Please write an abstract with title: Summation invariant and its applications to shape recognition, and key words: Application software, Noise shaping, Marine animals, Shape measurement, Testing, Image databases, Spatial databases, Computer vision, Neural networks, Equations. Abstract: A novel summation invariant of curves under transformation group action is proposed. This new invariant is less sensitive to noise than the differential invariant and does not require an analytical expression for the curve as the integral invariant does. We exploit this summation invariant to define a shape descriptor called a semi-local summation invariant and use it as a new feature for shape recognition. Tested on a database of noisy shapes of fish, it was observed that the summation invariant feature exhibited superior discriminating power compared to that of wavelet-based invariant features. |
8,453 | Please write an abstract with title: On the Analysis of Symmetrical Three-Line Microstrip Circuits, and key words: Microstrip, Voltage, Coupling circuits, Couplers, Impedance, Transmission line matrix methods, Symmetric matrices, Microwave circuits, Propagation constant, Transmission lines. Abstract: The immittance parameters for the case of symmetrical coupled three-line microstrip or other inhomogeneous six-port structures are derived in terms of the normal modes of the coupled system. The analytical results obtained reduce to the heretofore known results when the line parameters are interrelated in a specified manner, and should be useful in the study and accurate design of three-line couplers and other microwave circuit elements. |
8,454 | Please write an abstract with title: Ultrafast LTD's for bremsstrahlung diodes and Z-pinches, and key words: Diodes, Voltage, Capacitors, Acceleration, Dielectric liquids, Linear accelerators, Induction generators, Pulse generation, Adders, Inductance. Abstract: Most of the modern high-current high-voltage induction linacs require several stages of pulse conditioning (pulse forming) to convert the multi-microsecond pulses of the Marx generator output to the 40-100 ns pulse required for a cell cavity. This makes the devices large, cumbersome to operate, and expensive. In the present design we eliminate Marxes and pulse-forming networks and instead utilize a new technology recently implemented at the Institute of High Current Electronics in Tomsk (Russia). Each inductive voltage adder cavity is directly fed by a number of fast 100-kV small-size capacitors arranged in a circular array around each accelerating gap. The number of capacitors connected in parallel to each cavity defines the total maximum current. By selecting low inductance switches, voltage pulses as short as 30-60-ns FWHM can be directly achieved. The voltage of each stage is low (100-200 kV). Many stages are required to achieve multi-megavolt accelerator output. However, since the length of each stage is very short (4-10 cm), accelerating gradients of higher than I MV/m can easily be obtained. Each LTD voltage adder can deliver up to 1-MA current to the load. To produce drivers of higher current, many LTD's are connected in parallel. A conceptual design for Saturn three ring diode and Z-pinch and a compact 10-MV 100-kA 60-ns accelerator for advanced radiography will be presented. In both designs the LTD's operate in vacuum and no liquid dielectrics like oil or deionized water will be required. Even elimination of ferromagnetic material (air-core cavities) is a possibility. This makes the devices cheaper, smaller, and lighter than the devices presently utilized which are based on conventional pulsed power technology architecture. We envisage a factor of 3 reduction in size and cost. |
8,455 | Please write an abstract with title: Cyber threat response using reinforcement learning in graph-based attack simulations, and key words: Measurement, Training, Reinforcement learning, Data models, Security, Task analysis, Standards. Abstract: In this ongoing project we employ reinforcement learning in a simulation environment to learn policies for cyber defense. The environment is based on attack graphs produced using the Meta Attack Language, a modeling language used to assess the security of systems.Two RL algorithms are utilized to prevent a simulated attacker agent to reach a series of targets within attack graphs. The defensive agent has to make decisions based on the value of keeping assets enabled, or suffering the consequence of the attacker reaching its goal.The initial results are promising, and show that both algorithms are able to find distinct strategies for defense. However, further analysis is needed to evaluate policy quality, including the implementation of sensible baseline policies for comparison. |
8,456 | Please write an abstract with title: Hematocrit measurement by dielectric spectroscopy, and key words: Dielectric measurements, Electrochemical impedance spectroscopy, Plasma measurements, Permittivity measurement, Plasma stability, Impedance measurement, Blood, Conductivity measurement, Extracellular, Plasma materials processing. Abstract: Based on permittivity changes, a new method to measure hematocrit (HCT) in extracorporeal blood systems is presented. Human blood samples were tested at different HCT levels pairing the values of permittivity change, obtained by means of a commercial impedance analyzer, with traditional centrifugation measurements. Data were correlated using both linear and nonlinear regression. When using the lineal model, the comparison yielded a high correlation coefficient (r=0.99). Theoretical simplifications suggest that the method is independent of changes in the conductivities of the intracellular and extracellular compartments. The influence of osmolarity and conductivity of the extracellular compartment was analyzed. It is shown that HCT can be predicted within an error lower than 5% when those parameters changed as much as 1 mS/cm and 50 mOsm/kg, respectively. Thus, the method appears as valid and viable showing good possibilities in applications such as renal dialysis. |
8,457 | Please write an abstract with title: A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud, and key words: Semantics, Cloud computing, Encryption, Indexes, Servers. Abstract: Semantic searching over encrypted data is a crucial task for secure information retrieval in public cloud. It aims to provide retrieval service to arbitrary words so that queries and search results are flexible. In existing semantic searching schemes, the verifiable searching does not be supported since it is dependent on the forecasted results from predefined keywords to verify the search results from cloud, and the queries are expanded on plaintext and the exact matching is performed by the extended semantically words with predefined keywords, which limits their accuracy. In this paper, we propose a secure verifiable semantic searching scheme. For semantic optimal matching on ciphertext, we formulate word transportation (WT) problem to calculate the minimum word transportation cost (MWTC) as the similarity between queries and documents, and propose a secure transformation to transform WT problems into random linear programming (LP) problems to obtain the encrypted MWTC. For verifiability, we explore the duality theorem of LP to design a verification mechanism using the intermediate data produced in matching process to verify the correctness of search results. Security analysis demonstrates that our scheme can guarantee verifiability and confidentiality. Experimental results on two datasets show our scheme has higher accuracy than other schemes. |
8,458 | Please write an abstract with title: Optimizing Employee Scheduling System with Firefly Algorithm (Case Study: MJ Store), and key words: Schedules, Statistics, Sociology, Linear programming, Processor scheduling, Job shop scheduling, Genetic algorithms. Abstract: Employee scheduling is a complex problem since it must precisely allocate resources such as time, task disposition, employee's competencies, a day off, and cost of the activity. The firefly algorithm is implemented to arrange the schedule of employees automatically and meet the rules. This algorithm allows the system to produce a list that is by applicable rules. The proposed system was designed with three steps to produce lists of employee shifts. Firstly, enter employee, job description and the last is set the employee holiday schedules. Then the system will process it and produce the desired schedule in a short time. Performance results show schedule made in 90 seconds with a success rate of 96.5% with 20 fireflies and 40 times iteration. |
8,459 | Please write an abstract with title: Design Method for an LUT Network-Based CNN with a Sparse Local Convolution, and key words: Deep learning, Data centers, Power demand, Convolution, Design methodology, Hardware, Data models. Abstract: Demand of applications using deep learning models in the data centers is rapidly increasing. Thus, we need to support a massive amount of convolutional neural network (CNN) calculations with limited area and power consumption of data centers by using domain specific hardwares. |
8,460 | Please write an abstract with title: Linear Microwave Solid State Transferred Electron Power Amplifiers with a Large Gain-Bandwidth Product, and key words: Solid state circuits, Electrons, Microwave amplifiers, Power amplifiers, Broadband amplifiers, Microwave devices, Bandwidth, Gain, Reflection, Gallium arsenide. Abstract: In this paper we shall describe recent results with reflection type wide band solid state power amplifiers which show promise of replacing tubes in many microwave systems. These amplifiers are fabricated from epitaxial GaAs transferred electron devices which are stabilized through the use of low impedance circuits to form stable wideband linear cw amplifiers. Output powers in C-band of more than 250 mW over a 1 dB bandwidth of 3 GHz with a gain of 7 dB have been achieved. Saturated power outputs of 1 watt with 3 dB gain have also been achieved. In X-band, power outputs of over 150 mW over a 2 GHz bandwidth with 4 dB has been achieved. |
8,461 | Please write an abstract with title: Continual Learning with Adversarial Training to Enhance Robustness of Image Recognition Models, and key words: Training, Deep learning, Adaptation models, Image recognition, Aggregates, Robustness, Data models. Abstract: In recent years, deep learning has been widely adopted in many image recognition tasks with great success. However, this method is vulnerable against well-designed attacks, causing serious safety and security problems in life- critical applications. To overcome the issue of continuously evolving attacks, in this work, we develop a new defensive approach that integrates continual learning and adversarial training to improve both corruption robustness and structure compactness of the defensive model. Our approach adopts the structure of progressive neural model to establish a robust model over time. It includes adaptive phases of model growing and pruning in continual learning, and performs adversarial training iteratively during the learning process. To evaluate the performance of the proposed approach, we conduct a series of experiments to compare our approach with others in defending the current well-known adversarial attacks. The results that our model can obtain best performance and provide an effective approach in cybersecurity. |
8,462 | Please write an abstract with title: Cryocooler-cooled high T/sub c/ superconducting magnet excited by thermoelectromotive force, and key words: Magnetic flux, High temperature superconductors, Thermal force, Coils, Thermoelectricity, Magnetic analysis, Performance analysis, Testing, Magnetic fields, Bismuth. Abstract: This paper presents and analyzes test results in order to optimize the performance of a new-concept cryocooler-cooled HTS magnet, which is excited by a thermal electromotive force. This magnet system has the advantages of compactness, lightweight and continuous excitation in comparison with conventional HTS magnets. That is, a conventional HTS magnet is not suitable for operation in persistent-current mode, because an HTS coil has much larger flux flow resistance than an LTS coil. So, the magnet needs an external power source to maintain continuous magnetic fields. Accordingly, the concept of the HTS magnet excited by a thermal electromotive force of a thermoelectric element instead of an external power source was proposed. This magnet system will be simpler than a conventional one because it doesn't need the large external power source. Therefore, this magnet is suitable for applications in which there are severe constraints on the space and the weight. In a conventional magnet, a current lead connected to the HTS coil is designed to minimize the heat leakage to the coil. In the same way, for the new magnet system excited by thermal electromotive force, the optimum design of thermoelectric element is necessary to minimize the heat leakage. An experiment in which the HTS coil and the cold junction of the thermoelectric element are cooled by a cryocooler has been carried out. The heat leakage of our new magnet system using of Bi/sub 2/Te/sub 3/ thermoelectric elements was found to be 0.22 W/A by experiment. It is twice as high as that for optimized Cu current leads. |
8,463 | Please write an abstract with title: Structural design and finite element analysis of underwater gas leakage intelligent monitoring array, and key words: Underwater structures, Sonar equipment, Parallel processing, Acoustic arrays, Finite element analysis, Arrays, Underwater acoustics. Abstract: The underwater structure gas leakage monitoring system designed by passive acoustics has the characteristics of long detection distance, no obstruction and the influence of seawater turbidity, and can reach a detection distance of hundreds of meters. Based on the principle of passive underwater acoustic positioning and the actual needs, this paper designs the hydrophone array and the array frame for installing the hydrophone array, analyzes the overall layout of the array frame, and establishes the finite element model of the array frame. The calculation shows that the strength and stiffness of the array frame meet the design requirements under the hoisting conditions of 30 °, 45 ° and 60 °. Finally, through the actual static hoisting test, the feasibility of the scheme is verified, which lays a foundation for the next test of underwater structure gas leakage monitoring system. |
8,464 | Please write an abstract with title: A Novel Optimal Planning Between Generation and Transmission Expansion Planning Considering Security Constraint, and key words: Generation Expansion Planning, Transmission Expansion planning, Voltage stability, Transient Stability. Abstract: The present paper proposes a novel approach to solve strategic expansion problems between generation and transmission companies when it considers security constraints of power network such as transient stability and voltage stability of the system. Generally, in previous studies, generation expansion planning (GEP) and transmission expansion planning (TEP) are solved in a restructuring environment of power market without considering the security constraint of the power system. Hence, the proposed approach definites voltage stability index and security stability index as a security constraint of the system at the first step. Afterward, an objective function for GEP and TEP problem is formulated considering the security constraints. Eventually, the objective function is optimized by particle swarm optimization algorithm and the optimum expansion planning of generation and transmission are determined. Several case studies have been carried out to evaluate the performance of the proposed spruce. The results clearly demonstrate that the proposed method solve GEP and TEP problem when it considers economic and security objectives in a competitive electricity market. |
8,465 | Please write an abstract with title: Analytical model for nanowire and nanotube transistors covering both dissipative and ballistic transport, and key words: Analytical models, Ballistic transport, MOSFETs, Silicon, Light scattering, Particle scattering, Wire, Quantum capacitance, Telecommunications, Carbon nanotubes. Abstract: We present an analytical model for silicon nanowire and carbon nanotube transistors that allows us to seamless cover the whole range of transport regimes from drift-diffusion to ballistic, taking into account the one-dimensional electron or hole gas in the channel. We propose an analytical description of the transition from drift-diffusion to ballistic transport based on the Buttiker approach to dissipative transport. We start from the derivation of an analytical expression for ballistic nanowire transistors and show that a generic transistor with finite scattering length can be described as a chain of elementary ballistic transistors. Then, we are able to compact the behavior of an arbitrary ballistic chain in a simple analytical model, suitable for circuit simulators. In the derivation of the model, we find a relation between the mobility and the mean free path that has deep consequences on the understanding of transport in nanoscale devices. |
8,466 | Please write an abstract with title: Dispersion estimation from linear array data in the time-frequency plane, and key words: Time frequency analysis, Sensor arrays, Dispersion, Surface waves, Mars, Delay estimation, Signal processing algorithms, Two dimensional displays, Fourier transforms, Frequency domain analysis. Abstract: We consider the problem of estimating the dispersion of a wave field from data recorded by a linear array of geophones. The fact that the data we are looking at may contain several propagating waves make this even more challenging. In this paper, a new algorithm is proposed to solve this issue. Currently, there are two methods for estimating wave dispersion described in the literature. The first method estimates the group delay function from the time-frequency representation (TFR) of each sensor separately. It is efficient as long as the patterns of the different waves do not overlap in the time-frequency plane. The second method estimates the dispersion from the two-dimensional (2-D) Fourier transform of the profile (or more generally from a velocity-frequency representation). This assumes that the dispersion is constant along the entire sensor array. It is efficient as long as the patterns of the waves do not overlap in the frequency domain. Our method can be thought of as a hybrid of the above two methods as it is based on the construction of a TFR where the energy of waves that propagate at a selected velocity are amplified. The primary advantage of our algorithm is the use of the velocity variable to separate the patterns of the propagating waves in the time-frequency plane. When applied to both synthetic and real data, this new algorithm gives much improved results when compared with other standard methods. |
8,467 | Please write an abstract with title: Services-oriented dynamic reconfiguration framework for dependable distributed computing, and key words: Distributed computing, Computer applications, Application software. Abstract: Recently service-oriented architecture (SOA) has received significant attention and one reason is that it is potentially survivable as services are located, bound, and executed at runtime over the Internet. However, this is not enough for dependable computing because the system must also be able to reconfigure once a system failure or overload is detected, and this reconfiguration must be done in real-time at runtime with minimum disruption to the current operation. This work presents reconfiguration requirements for building dependable SOA, and proposes a dynamic reconfiguration framework based on distributed monitoring, synchronization, and runtime verification with distributed agents. |
8,468 | Please write an abstract with title: 50G-PON Upstream With Over 36dB Link Budget Using an SOA-PIN Based Receiver, and key words: Semiconductor optical amplifiers, Sensitivity, Bandwidth, Optical transmitters, Gain, Optical receivers, Optical network units. Abstract: We demonstrate sensitivities below −28.6dBm using an SOA-PIN receiver for the 50G-PON upstream. The effect of the optical filter bandwidth to reduce the SOA ASE is investigated to consider both uncooled and cooled ONU transmitters. Using an EML for the ONU transmitter, optical link budgets over 36dB are attained for the two upstream wavelength bands using the same SOA. |
8,469 | Please write an abstract with title: Emotion Recognition of EEG Signals Using Wavelet Filter and Convolutional Neural Networks, and key words: Emotion recognition, Convolution, Stochastic processes, Computer architecture, Information filters, Electroencephalography, Filtering theory. Abstract: Emotion is a psychophysiological process that is triggered by conscious or unconscious states. Emotional information in the human brain can be captured through a multi-channel Electroencephalogram (EEG). EEG signals are recorded from multiple channels, representing information points of electrical activity from different parts of the brain. While the EEG signal of each channel is a sequence, some studies use one dimension in recognizing patterns, and the signal from the next channel is a continuation of the sequence from the previous channel. It makes the channel sequence less maintained so that the EEG signal processing from multi-channel is seen as a matrix, i.e., the vertical direction is the signal from various channels. While the horizontal direction of the sequence of each channel. So that the signal processing of the multi-channel is rich in information in the appropriate order, this study used 2D Convolutional Neural Networks (CNN) for emotion recognition, with various architectures and configurations to get the best performance. In addition, the EEG signal needs to be extracted, which reflects the emotion variable first using a Wavelet. That is the 4-45 Hz frequency band of Theta, Alpha, Beta, and Gamma. The results show that two-dimensional CNN, which pays attention to signal order, produced the best accuracy of 83.44% compared to 75.97% with one-dimensional CNN. Experiments gave the best configuration used eight layers and Stochastic Gradient Descent (SGD) weight correction. |
8,470 | Please write an abstract with title: A Cross-Layer Review of Deep Learning Frameworks to Ease Their Optimization and Reuse, and key words: Measurement, Deep learning, Ecosystems, Linear algebra, Artificial neural networks, Libraries, Software. Abstract: Machine learning and especially Deep Learning (DL) approaches are at the heart of many domains, from computer vision and speech processing to predicting trajectories in autonomous driving and data science. Those approaches mainly build upon Neural Networks (NNs), which are compute-intensive in nature. A plethora of frameworks, libraries and platforms have been deployed for the implementation of those NNs, but end users often lack guidance on what frameworks, platforms and libraries to use to obtain the best implementation for their particular needs. This paper analyzes the DL ecosystem providing a structured view of some of the main frameworks, platforms and libraries for DL implementation. We show how those DL applications build ultimately on some form of linear algebra operations such as matrix multiplication, vector addition, dot product and the like. This analysis allows understanding how optimizations of specific linear algebra functions for specific platforms can be effectively leveraged to maximize specific targets (e.g. performance or power-efficiency) at application level reusing components across frameworks and domains. |
8,471 | Please write an abstract with title: Affect-DML: Context-Aware One-Shot Recognition of Human Affect using Deep Metric Learning, and key words: Measurement, Training, Emotion recognition, Adaptation models, Face recognition, Semantics, Psychology. Abstract: Human affect recognition is a well-established research area with numerous applications, e.g. in psychological care, but existing methods assume that all emotions-of-interest are given a priori as annotated training examples. However, the rising granularity and refinements of the human emotional spectrum through novel psychological theories and the increased consideration of emotions in context brings considerable pressure to data collection and labeling work. In this paper, we conceptualize one-shot recognition of emotions in context - a new problem aimed at recognizing human affect states in finer particle level from a single support sample. To address this challenging task, we follow the deep metric learning paradigm and introduce a multi-modal emotion embedding approach which minimizes the distance of the same-emotion embeddings by leveraging complementary information of human appearance and the semantic scene context obtained through a semantic segmentation network. All streams of our context-aware model are optimized jointly using weighted triplet loss and weighted cross entropy loss. We conduct thorough experiments on both, categorical and numerical emotion recognition tasks of the Emotic dataset adapted to our one-shot recognition problem, revealing that categorizing human affect from a single example is a hard task. Still, all variants of our model clearly outperform the random baseline, while leveraging the semantic scene context consistently improves the learnt representations, setting state-of-the-art results in one-shot emotion recognition. To foster research of more universal representations of human affect states, we will make our benchmark and models publicly available to the community under https://github.com/KPeng9510/Affect-DML. |
8,472 | Please write an abstract with title: Using Deep Learning to Improve Detection and Decoding Of Barcodes, and key words: Deep learning, Pipelines, Detectors, Generative adversarial networks, Decoding, Numerical models, Image restoration. Abstract: We propose an end-to-end pipeline for transforming raw images containing barcodes into sharp barcode images that can be accurately decoded. Our pipeline leverages recent deep learning approaches and consists of a rotation-decoupled detector (RDD) for oriented barcode detection and a deblurring model. The deblurring model uses a generative adversarial network (specifically, DeblurGAN-v2) trained on pairs of noisy and sharp images generated using ground truth numeric codes. Evaluation of the proposed pipeline using real barcode images enhanced by the DeblurGAN-v2 model shows a 14% improvement of the decoding rate as compared to the decoding rate obtained on the original images. |
8,473 | Please write an abstract with title: Networking Africa: a case for VoIP, and key words: Africa, Computer aided software engineering, Internet telephony, Business, Telecommunication services, Cities and towns, Companies, LAN interconnection, Telecommunication traffic, Network topology. Abstract: Penetration of telecommunication services in Africa is generally quite low outside major cities. The reason for this is the use of technologies that do not scale well in terms of capacity versus coverage in low tele-density traffic areas. The advent of IP-based networking for voice and data services promises to provide cost-effective solution to the tele-density problem because it addresses the decentralisation of the access and switching levels of the network that are reportedly the most costly part of any national network. We propose a network topology to support Africa-wide VoIP networking by the interconnection of segmented area-wide networks. It is shown that using an IP-based access network and provisioning based on teletraffic area-wide network demarcations, we can achieve a network solution to support different services and address the needs of the different market segments in low-density traffic areas. |
8,474 | Please write an abstract with title: Astrocytes’ signals guided storage and retrieval of patterns by an SNN, and key words: Image recognition, Uncertainty, Neurons, Information processing, Gray-scale, Brain modeling, Pattern recognition. Abstract: Information processing by spiking neural networks (SNNs) is one of the greatest applications of neuroscience research. The benefits of biologically inspired SNNs are known for energy efficient computations through spike-driven communications. However, the biological relevance of existing computational models and hardware implementations is rather limited. It is known that synaptic transmission in a living brain is directly influenced by astrocytes releasing gliotransmitters that modulate the excitability of neurons and, hence, their firing rate. Unlike electrical spikes with a shape determined by the properties of a neuron, the amplitude of the astrocyte’s response is gradual (proportional to the input stimulus). In the presented study, we use this feature for non-binary information processing. We employ SNN enhanced by bidirectional interaction with an astrocytic network to recognize grayscale images, encoded into astrocyte activation levels. The results showed that such a harmony of digital and analog coding makes it possible to retrieve even highly noisy images within a few seconds. This memory effect is provided only by astrocytes, and the storage time is determined by the characteristic time scale of their activation. |
8,475 | Please write an abstract with title: Security Requirements, and key words: Software, Codes, Databases, Encryption, Passwords, Cloud computing, Uniform resource locators. Abstract: This chapter assumes that readers have a basic understanding of how IT projects and software development processes work. It presents some types of questions that security professionals should be asking when assisting with requirements gathering and analysis. The chapter details security requirement definitions and explanations. The most commonly known security vulnerability in web applications is cross‐site scripting; it's estimated to be present in over two‐thirds of web applications on the internet as of this writing. Security headers are settings that tell the browser and server how to handle various things for the web application; they only apply to web assets that use a browser. Technical debt causes an organization to be slow in reacting to change, meaning they are unable to respond in a timely manner in time of incident or other threats to security. The chapter provides a checklist of requirements that could be added to any web application project requirements document. |
8,476 | Please write an abstract with title: Stabilization for Networked Control Systems with Unreliable Communication Channel, and key words: Random variables, Covariance matrices, Automation, Riccati equations, Networked control systems, Mathematical model, Estimation. Abstract: We study stabilization problems for networked control systems (NCSs) with asymmetric information. In this NCSs model, the remote controller can receive packet-dropout states of the plant, and the available information for the embedded controller are observations of states and packet-dropout states sent from the remote controller. It is shown that the system is bounded in the mean-square sense if and only if there exist the solutions to the two coupled algebraic Riccati equations and the packet-dropout probability satisfies certain condition. |
8,477 | Please write an abstract with title: Pulse Width Modulation current control for LED lighting horticulture systems, and key words: Current control, PI control, Simulation, Lighting, Process control, Pulse width modulation, Light emitting diodes. Abstract: This paper presents a DC-DC LED driver for a 200 W luminaire dedicated to greenhouses lighting applications. Plants are more sensitive to particular radiations for their growth. Hence, we adopted only five LED types that favor photosynthesis process. In order to better control the luminous flux of plants, we used an inverted-Buck converter in each LED string type through four parallel devices of 50 W. A pulse width modulation (PWM) is carried out using the proportional-integral (PI) in order to control the LED's current. The present driver is designed and simulated using PSIM environment. Simulations results prove that the PWM current control guarantees an average current 280 mA with a low current ripple of the order of 10 mA maximizing efficiency energy. |
8,478 | Please write an abstract with title: Achieving Efficient and Adaptable Dispatching for Vehicle-to-Grid Using Distributed Edge Computing and Attention-Based LSTM, and key words: Vehicle-to-grid, Dispatching, Edge computing, Deep learning, Power system stability, Informatics, Decision making. Abstract: With the popularity of electric vehicles (EVs), vehicle-to-grid (V2G) technology is attracting increasing attention due to its crucial merit of enabling bidirectional power flows between EVs and grid, so as to enhance the grid security and stability by regulated dispatching. However, the existing V2G approaches are confronted with several unrealizable challenges because of high computational complexity for large-scale EVs and impracticality for future power data acquisition. In this article, an edge computing framework is proposed in a distributed manner to ensure the dispatching efficiently and provide the raw dataset flexibly. Meanwhile, the long short-term memory network is applied to prediction merely by the past and present power data. Moreover, attention mechanism and data clustering are utilized to improve the prediction accuracy and operation robustness. Experiments involving real dataset demonstrated that the proposed V2G scheme is able to achieve very satisfactory dispatching performance with the prediction accuracy up to 98.89%. |
8,479 | Please write an abstract with title: Implementation of the simple domain-specific language for system testing in V-Model development lifecycle, and key words: DSL, System testing, Task analysis, XML, Tools, Software. Abstract: This paper presents easy to use domain-specific language for system testing in V-model development lifecycle. The systematic approach offered by the domain-specific language for system testing eliminates miscommunications between testers and requirement engineers making the testing closer to the requirement engineers. This concept enables automation in the generation of the tests based on given System Requirements in the future. As many would argue on V-Model's difficulty to align system requirements and system tests, this approach enables better mapping between those two parts of the V-diagram. This will make no functional requirement missing its counterpart in testing and vice-versa. |
8,480 | Please write an abstract with title: House Price Prediction Using Machine Learning, and key words: Machine learning algorithms, Urban areas, Machine learning, Prediction algorithms, Water resources, Regression tree analysis. Abstract: Now-a-days everyone wish to live in the large cities but the competition in the market related to all the resources is increasing day by day. A middle-class family can’t afford the price of rent, food, water and electricity while surviving his family. The price of the flats in the city is increasing and there is so much of risk to predict the actual price of the house. Our research paper [1] will helps you to predict the price of the house to a good accuracy. The main motive of our research paper is to predict the price [2] of the house by analyzing the customer needs and their financial income. As we see when a client wants to purchase the house in the city he used to see three things within the city location, area and available resources around the society. Our research paper will helps the clients to know the actual price of the house and it will also helps the builders to know about the selling price that will fits the client needs. |
8,481 | Please write an abstract with title: Small Object Detection Based on Deep Learning, and key words: Object detection, Classification algorithms, Feature extraction, Prediction algorithms, Training, Machine learning, Convolutional neural networks. Abstract: With the improving of the intelligent driving awareness, object detection as an important part of intelligent driving, has now become a research hotspot in the world. In recent years, convolutional neural network (CNN) has attracted more and more attention in the field of computer vision. CNN has made a series of important breakthroughs in the field of object detection. This paper introduces the object detection method based on deep learning. This paper mainly introduces the detection algorithm based on regional suggestion and regression, and analyzes the advantages and disadvantages of the detection algorithm and detection performance from two aspects of accuracy and speed. Then, the disadvantages of these detection methods in detecting small objects and the difficulties in detecting small objects are analyzed. On this basis, the public data sets and evaluation criteria related to small object detection are introduced. |
8,482 | Please write an abstract with title: Scalable Gamma-Driven Multilayer Network for Brain Workload Detection Through Functional Near-Infrared Spectroscopy, and key words: Fatigue, Neurons, Brain modeling, Gamma distribution, Functional near-infrared spectroscopy. Abstract: This work proposes a scalable gamma non-negative matrix network (SGNMN), which uses a Poisson randomized Gamma factor analysis to obtain the neurons of the first layer of a network. These neurons obey Gamma distribution whose shape parameter infers the neurons of the next layer of the network and their related weights. Upsampling the connection weights follows a Dirichlet distribution. Downsampling hidden units obey Gamma distribution. This work performs up-down sampling on each layer to learn the parameters of SGNMN. Experimental results indicate that the width and depth of SGNMN are closely related, and a reasonable network structure for accurately detecting brain fatigue through functional near-infrared spectroscopy can be obtained by considering network width, depth, and parameters. |
8,483 | Please write an abstract with title: Five-Level Hysteresis DTC of Open-End Winding Permanent Magnet Synchronous Motors With Zero-Sequence Currents Suppression and Torque Ripple Reduction, and key words: Voltage, Switches, Inverters, Synchronous motors, Torque measurement, Hysteresis, Permanent magnet motors. Abstract: Direct torque control (DTC) systems for open-end winding permanent magnet synchronous motors (OEW-PMSM) with common DC bus generate zero sequence currents (ZSC) and large torque ripple, resulting in increased system loss and poor operating characteristics. In this paper, a DTC based on five level torque hysteresis (FLTH) is proposed to improve the system performance. Firstly, an online calculation and selection strategy based on switch table is designed to suppress ZSC. By analyzing the composition of zero sequence voltage and using the double vector method to suppress it, the ZSC can totally be suppressed in theory, without affecting the system performance. On this basis, this paper proposes to add FLTH to DTC to reduce torque ripple. FLTH can not only effectively use many voltage vectors, but also reduce torque ripple. In the case study, the torque ripple rate has been reduced by 53%. Through simulation and experiment, the conventional DTC and the FLTH DTC are compared, and the results prove the validity of the proposed strategy. |
8,484 | Please write an abstract with title: How New Zealand Software Companies Are Adapting Work Settings With Changing Times, and key words: Companies, Pandemics, Software, COVID-19, Standards, Productivity, Employment. Abstract: Based on data collected from software professionals from 13 different companies, we compared their work settings before, during, and after the COVID-19 pandemic lockdown. We found that after the restrictions were eased, most companies adopted a hybrid work setting combining work from home and office. |
8,485 | Please write an abstract with title: Array Antenna Coverage: For High Rise Building Scenarios, and key words: Base stations, Wireless networks, Buildings, Radio propagation, Planning, Mathematical model, Clutter. Abstract: The determination of radio propagation characteristics for a given terrain is a key consideration in wireless network planning. For this purpose, radio propagation models are quite useful. For this scenario most widely used models are the Empirical Propagation Models. The suitability of any propagation model depends on the terrain, clutter and other constraints. Some extensively used Empirical Model include the COST 231 Hata Model (COST 231 1999, Saunders 2000, COST 231 revision 2, 1991), COST 231-Walfisch-Ikegami Model (COST 231 1999) etc. In this paper, we have proposed coverage scenario for high rise building. A study has been done based on different parameters that significantly impact the coverage, such as antenna height, distance of the antenna to calculate the signal strength in the required building. For this analysis, we have developed MATLAB program and described different scenarios which calculates the received signal strength from a Base Station (BTS). |
8,486 | Please write an abstract with title: An Evolutionary Method of Computation for Dynamic Scheduling Problems with Periodic Demand, and key words: Processor scheduling, Conferences, Computational modeling, Neural networks, Genetic programming, Optimal scheduling, Evolutionary computation. Abstract: Dynamic scheduling for irregularly arriving jobs is considered. In the real world, demands often change for some reason suddenly. In a previous paper (Eguchi et al., 2006), the optimal schedule was determined by using a neural network. That method was based on existing dispatching rules that determined the job order sequence. Here, a new method using genetic programing is proposed, in which new dispatching rules are generated. By generating a new rule, performance can be increased. Also, in the real world, job arrivals vary periodically depending on the season or month. By using past data, scheduling can be done effectively. Therefore, this paper proposes a new parallel genetic programming introducing long-term memories to use past data. The results of numerical experiments indicate the effectiveness of the proposed method. |
8,487 | Please write an abstract with title: A pendulous oscillating gyroscopic accelerometer fabricated using deep-reactive ion etching, and key words: Accelerometers, Etching, Torque, Gyroscopes, Acceleration, Wheels, Instruments, Silicon, Wafer bonding, Assembly. Abstract: A silicon pendulous oscillating gyroscopic accelerometer (POGA) was fabricated using deep-reactive ion etching (DRIE) and silicon wafer bonding technologies. A POGA is the micromachining-compatible analog of the pendulous integrating gyroscopic accelerometer (PIGA), which is the basis of the most sensitive accelerometers demonstrated to date. Gyroscopic accelerometers rely on the principle of rebalancing an acceleration-sensing pendulous mass by means of an induced gyroscopic torque. The accelerometer is composed of three individual layers that are assembled into the final instrument. The top layer uses wafer bonding of an oxidized wafer to a handling wafer to create a silicon-on-oxide wafer pair, in which the oxide layer provides electrical isolation between the mechanical members and the handling layer. The middle layer is a two-gimbal torsionally-supported silicon structure and is in turn supported by an underlying drive/sense layer. The micromachined POGA operated according to gyroscopic accelerometer principles, having better than milligram resolution and dynamic ranges in excess of 1 g (open loop) and approximately 12 mg (closed loop). |
8,488 | Please write an abstract with title: Optimal Estimation of Link Delays Based on End-to-End Active Measurements, and key words: Delays, Monitoring, Real-time systems, Computer architecture, Routing, Quality of service, Propagation delay. Abstract: Current IP-based networks support a wide range of delay-sensitive applications such as live video streaming of network gaming. Providing an adequate quality of experience to these applications is of paramount importance for a network provider. The offered services are often regulated by tight Service Level Agreements (SLAs) that needs to be continuously monitored. Since the first step to guarantee a metric is to measure it, delay measurement becomes a fundamental operation for a network provider. In many cases, the operator needs to measure the delay on all network links. We refer to the collection of all link delays as the Link Delay Vector (LDV). Typical solutions to collect the LDV impose a substantial overhead on the network. In this paper, we propose a solution to measure the LDV in real-time with a low-overhead approach. In particular, we inject some flows into the network and infer the LDV based on the delay of those flows. To this end, the monitoring flows and their paths should be selected minimizing the network monitoring overhead. In this respect, the challenging issue is to select a proper combination of flows such that by knowing their delay it is possible to solve a set of linear equations and obtain a unique LDV. This combination of monitoring flows should be optimal according to some criteria and should meet some feasibility constraints. We first propose a mathematical formulation to select the optimal combination of flows, in form of an Integer Linear Programming (ILP) problem. Then we develop a heuristic algorithm to overcome the high computational complexity of existing ILP solvers. As a further step, we propose a meta-heuristic algorithm to solve the above-mentioned equations and infer the LDV. The challenging part of this step is the volatility of link delays. The proposed solution is evaluated over real-world emulated network topologies using the Mininet network emulator. Emulation results show the accuracy of the proposed solution with a negligible networking overhead in a real-time manner. |
8,489 | Please write an abstract with title: Group Role Assignment with Constraints (GRA+), and key words: Software, Optimization, Java, Qualifications, Production, Linear programming, Hardware. Abstract: Group Role Assignment (GRA) is a complex problem whose exhaustive search algorithm has exponential complexity. An efficient alternative algorithm to solve GRA problems was developed using the Hungarian algorithm (also called the Kuhn–Munkres algorithm) (Chapter 5). The general GRA problems have the constraints of a minimum number of agents required for each role and an assignment of only one role to each agent. After the GRA problem is solved, role assignment becomes a straightforward process if there are no additional constraints. However, there are many variations of GRA with additional constraints.GRA is an idealized role assignment scenario. In the real world, there are often many constraints when considering role assignment. We can classify these assignment problems as a new category of GRA, i.e. Group Role Assignment with Constraints, or simply, GRA<sup>+</sup>.This chapter discusses several important GRA<sup>+</sup> problems discovered, specified, and solved hitherto, i.e. Group Multi‐Role Assignment (GMRA), Group Role Assignment with Conflicting Agents on Roles/in a Group (GRACAR/G), and Group Role Assignment with Cooperation and Conflict Factors (GRACCF). |
8,490 | Please write an abstract with title: How to increase the utility of monitoring information for the various management needs, and key words: Marine pollution, Condition monitoring, Oceans, Quality management, US Government, Lakes, Meeting planning, Research and development management, Ecosystems, Standardization. Abstract: Technical experts and managers from industry, municipal agencies, local, state, and Federal government agencies have participated in six regional workshops on marine pollution monitoring, held during the period between September 1980 and February 1981. Following an assessment of present monitoring practices and discussions of future monitoring strategies, the participants made several recommendations. This paper details the strategy for implementing the workshop recommendations. The new regional and national monitoring programs are coordinated, and their objectives are directed toward actual management requirements. |
8,491 | Please write an abstract with title: Optimization of Server Scheduling Based on Cloud Platform, and key words: Cloud computing, Smart cities, Processor scheduling, Optimization methods, Search problems, Mathematical models, Servers. Abstract: Aiming at the problem of low efficiency of services deployment of cloud computing platform by using exhaustive search algorithm, and in order to obtain a better services deployment scheme, a novel cloud computing services deployment optimization method, based on improved particle swarm optimization algorithm, is proposed. Firstly, it analyzes the deployment problem of the cloud computing service, converts the cloud computing service deployment problem into a multi-objective combination optimization problem and establishes a corresponding mathematical model. Then it uses the particle swarm algorithm with a strong global search ability to solve the mathematical model and improves the problem of slow convergence and premature convergence of the standard particle swarm algorithm. Finally, it verifies the feasibility of the simulation test. The experimental results show that the proposed method can find the optimal cloud computing service deployment scheme quickly and provide a valuable reference for cloud computing service providers. |
8,492 | Please write an abstract with title: An Effective Rewriting of the Inverse Scattering Equations via Green’s Function Decomposition, and key words: Mathematical model, Scattering, Inverse problems, Green's function methods, Numerical models, Integral equations, Permittivity. Abstract: In this article, a new inversion model for 2-D microwave imaging is introduced by means of a convenient rewriting of the usual Lippmann-Schwinger integral scattering equation. Such a model is derived by decomposing Green's function and the corresponding internal radiation operator in two different contributions, one of them easily computed from the collected scattered data. In the case of lossless backgrounds, the resulting model turns out to be more convenient than the traditional one, as it exhibits a lower degree of nonlinearity with respect to parameters embedding the unknown dielectric characteristics. This interesting property suggests its exploitation in the solution of the inverse scattering problem. The achievable performance is tested by comparing the proposed model with the one based on the usual Lippman-Schwinger equation in both cases of linearly approximated and full nonlinear frameworks. Both numerical and experimental data are considered. |
8,493 | Please write an abstract with title: Software piracy prevention through digital rights management systems, and key words: Computer crime, Software measurement, Logistics, CD-ROMs, Law, Legal factors, Protection, Tin, Conference management, Technology management. Abstract: Software publishers use digital rights management, specifically copy-protection techniques, to prevent unauthorized and illegal copying of their software products. Common forms of prevention are copy-protection techniques based on physical tokens. While physical tokens provide better protection from unauthorized copying than intangible ones, the protected digital content becomes unsuitable for online distribution. This paper investigates the role of copy-protection techniques based on physical and intangible tokens in software piracy prevention. An internationally organized online survey among users of sequencer software, a particular kind of music software, provides the data for the subsequent descriptive analysis and logistic regression. Based on our findings, we present the general implications of our results for a software publisher's anti-piracy and online distribution policy. |
8,494 | Please write an abstract with title: Region Proposal Network with Graph Prior and Iou-Balance Loss for Landmark Detection in 3D Ultrasound, and key words: Three-dimensional displays, Ultrasonic imaging, Task analysis, Object detection, Proposals, Face, Biomedical imaging. Abstract: 3D ultrasound (US) can facilitate detailed prenatal examinations for fetal growth monitoring. To analyze a 3D US volume, it is fundamental to identify anatomical landmarks of the evaluated organs accurately. Typical deep learning methods usually regress the coordinates directly or involve heatmap-matching. However, these methods struggle to deal with volumes with large sizes and the highly-varying positions and orientations of fetuses. In this work, we exploit an object detection framework to detect landmarks in 3D fetal facial US volumes. By regressing multiple parameters of the landmark-centered bounding box (B-box) with a strict criteria, the proposed model is able to pinpoint the exact location of the targeted landmarks. Specifically, the model uses a 3D region proposal network (RPN) to generate 3D candidate regions, followed by several 3D classification branches to select the best candidate. It also adopts an IoU-balance loss to improve communications between branches that benefit the learning process. Furthermore, it leverage a distance-based graph prior to regularize the training and helps to reduce false positive predictions. The performance of the proposed framework is evaluated on a 3D US dataset to detect five key fetal facial landmarks. Results showed the proposed method outperforms some of the state-of-the-art methods in efficacy and efficiency. |
8,495 | Please write an abstract with title: Flip chip on standard lead frame: laminate performance at a lower cost, and key words: Flip chip, Laminates, Costs, Integrated circuit packaging, Electronic packaging thermal management, Electronics packaging, Automotive engineering, Assembly, Ceramics, Portable computers. Abstract: Flip Chip (FC) technology has been used for the last 30 years for high density, thermally challenging, high-speed IC packaging requirements. Originally done on very expensive ceramic substrates for mainframe computers, the technology was given a great boost forward by the implementation of the lower cost laminate-based PBGA technology. While laminate technology provided a significant cost, weight, and lead-time reduction in packaging technology, that helped revolutionize the PC and laptop computer markets, this still left a significant portion of the IC using marketplace unable to afford the benefits of FC technology. This paper discusses the advent of FC technology in low cost lead frame based IC packages for wireless, automotive and consumer electronic applications. By selectively engineering the die layout and by applying new and improved redistribution, bumping, and assembly technologies it is possible to take non-pad limited die and redistribute its I/O to a 200, 300, or 400 micron pitch and use the existing conventional lead frame IC packages infrastructure. The abbreviated assembly process and the re-use of existing tooling allows for a significant reduction in overall tooling charges. These new IC packages while having the same outward appearance, have a significant improvement in moisture sensitivity level (MSL), electrical performance, and in many instances where the die can be exposed, improved thermal performance at a cost significantly below that of laminate based FC technology. |
8,496 | Please write an abstract with title: Adaptive bit allocation for space-time block coded OFDM system, and key words: Bit rate, OFDM modulation, Fading, System performance, Bit error rate, Transmitters, Block codes, Multipath channels, Transmitting antennas, Wireless communication. Abstract: A new scheme consisting of a combination of adaptive bit allocation, space-time block coded-OFDM and antenna selection is presented. The proposed scheme, exploits the benefits of space-time block codes, OFDM and adaptive bit allocation to provide high quality of transmission for wireless communications over frequency selective multipath channels with enhanced performance in terms of spectral and power efficiency. The system performance of non-adaptive OFDM, adaptive OFDM, non-adaptive STBC-OFDM, and the proposed adaptive STBC-OFDM are evaluated and compared. It is shown that the proposed scheme can greatly improve the performance of non-adaptive STBC-OFDM system. |
8,497 | Please write an abstract with title: Optimize Semi-Persistent Scheduling in NR-V2X: An Age-of-Information Perspective, and key words: Measurement, Analytical models, Monte Carlo methods, Rail to rail inputs, Robustness, Real-time systems, Safety. Abstract: Information freshness is a crucial metric for time-sensitive services such as Basic Safety Messages (BSMs) in Vehicle-to-Everything (V2X) communications to achieve high-reliability autonomous driving. However, Semi-Persistent Scheduling (SPS) algorithm under the current 5th generation (5G) New Radio (NR) standard may not fulfill the requirement of such a metric for BSMs without optimizing relevant parameters. This paper analyzes the parameters of SPS used for BSM scheduling in NR-V2X Mode 2 from an Age-of-Information (AoI) perspective, to explore the freshness of BSMs. We first present an analytical model to illustrate that Resource Reservation Interval (RRI) is the SPS parameter which significantly impacts the AoI performance. Subsequently, we investigate the expected peak AoI (PAoI) performance with respect to RRI values under different vehicle densities. A Monte Carlo simulator is then utilized to verify the results obtained in the analytical models. Numerical results show that the optimal RRI values in SPS, which minimize the expected PAoI of the vehicular network, can be obtained based on different vehicle densities accordingly. |
8,498 | Please write an abstract with title: Automatic Error Correction Technology for the Same Field in the Same Kind of Power Equipment Account Data, and key words: Technological innovation, Gears, Production, Hardware, Power systems, Error correction, Business. Abstract: Account data of electrical power system is the link of all businesses in the whole life cycle of equipment. It is of great significance to improve the data quality of power equipment account data for improving the information level of power enterprises. In the past, there was only the error correction technology to check whether it was empty and whether it contained garbled code. The error correction technology for same field of the same kind of power equipment account data is proposed in this paper. Combined with the characteristics of production business, the possible similar power equipment can be found through the function location type and other fields of power equipment account data. Based on the principle of search scoring, the horizontal comparison is used to search and score in turn. Finally, the potential spare parts and existing data quality are identified according to the scores. And judge whether it is necessary to carry out inspection maintenance. |
8,499 | Please write an abstract with title: Speed Fluctuation Suppression by Model-Based Feed-Forward Control in Gimbal System With Harmonic Drive, and key words: Torque, Mathematical models, Harmonic analysis, Splines (mathematics), Kinematics, Gears, Load modeling. Abstract: Harmonic drive is usually installed in the gimbal system of single gimbal magnetic suspended control moment gyroscope (SGMSCMG) not only to meet the requirements on the volume and weight but also output large torque. However, its nonlinear transmission characteristics are also introduced into the gimbal system and make the output speed fluctuate, which will seriously affect the output torque accuracy of SGMSCMG. Torque feedback control is an effective technique for achieving high-performance control for the above-mentioned problem. Nevertheless, it is difficult to add torque sensors in the gimbal system. In order to obtain nonlinear transmission torque without torque sensors, a novel online modeling method based on the Lagrange equation is put forward. Besides, to restrain the main torque disturbance, the gear-wave torque model is extracted. According to the above-mentioned models, a model-based feed-forward control method with phase advance is presented. Plentiful simulation and experiments on an SGMSCMG are performed, and the results show that the load speed fluctuation can be effectively suppressed. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.