ID int64 0 400k | content stringlengths 97 5.85k |
|---|---|
8,700 | Please write an abstract with title: A new procedure to derive transmission-line parameters: applications and restrictions, and key words: Transmission lines, Frequency, Power transmission lines, Equations, Power system transients, Conducting materials, Magnetic materials, Permittivity, Soil, Grounding. Abstract: The objective of this paper is to show an alternative methodology to calculate transmission-line parameters per unit length. With this methodology, the transmission-line parameters can be obtained starting from impedances measured in one terminal of the line. First, the article shows the classical methodology to calculate frequency-dependent transmission-line parameters by using Carson's and Pollaczeck's equations for representing the ground effect and Bessel's functions to represent the skin effect. After that, a new procedure is shown to calculate frequency-dependent transmission-line parameters directly from currents and voltages of an existing line. Then, this procedure is applied in a two-phase and a three-phase transmission line whose parameters have been previously calculated by using the classical methodology. Finally, the results obtained by using the new procedure and by using the classical methodology are compared. The article shows simulations results for a typical frequency spectrum of switching transients (10 Hz to 10 kHz). |
8,701 | Please write an abstract with title: Poetry stylistic analysis technique based on term connections, and key words: Natural languages, Humans, Art, Atmosphere, Helium, Educational institutions, Computer science, Natural language processing, Bismuth, Logic. Abstract: Literary language processing deserves its due attention in the current research atmosphere of natural language processing (NLP). Since poetry fully reveals literary language features such as vividness, sensibility and individuality, it is the appropriate start-point in NLP. Stylistic analysis thus contributes as an important task in literary language processing with lots of challenges. This paper looks into the research object, poetic language, strongly recommends and carefully proves poetry stylistic analysis technique based on term connection with the support of NLP technique as the background. Furthermore, the corresponding algorithm is proposed and questionnaires are applied to evaluate poetry stylistics in surveys. Both theories and experiments confirm us that commonness exceeds individuality concerning poetry stylistic analysis, therefore poetry stylistic analysis technique based on term connection is valid in evaluating poetry stylistics. |
8,702 | Please write an abstract with title: Combination Oppermann sequences for spread spectrum systems, and key words: Spread spectrum communication, Multiaccess communication, Random sequences, Autocorrelation, Australia, Character generation, Gold, Area measurement, Space vehicles, Context. Abstract: Numerous spread spectrum applications require families of long spreading sequences, often used at very high chip rates. In this paper, an algebraically simple way of generating long sequences by combining shorter polyphase sequences is presented, aimed at asynchronous spread spectrum systems. The approach is motivated by the fact that polyphase sequences offer increased design options, in terms of the supported range of correlation characteristics, while combination sequences allow for simpler generation of long sequences. It leads to the definition of combination Oppermann sequences, the properties of which are investigated in this paper. Numerical results indicate that the families of these proposed combination sequences provide favourable aperiodic correlations. The presented family of combination Oppermann sequences is therefore suitable for applications that rely on rapid synchronisation and are required to provide multiple access to the system. |
8,703 | Please write an abstract with title: Analysis and implementation of a novel single-channel direction-finding method, and key words: Navigation, Phase locked loops, Signal processing algorithms, Phased arrays, Software radio, Antenna arrays, Receivers, Receiving antennas, Phase estimation, Software algorithms. Abstract: We propose and analyze a novel single channel direction finding (DF) algorithm based on phase-locked loops (PLL). The algorithm is evaluated via Matlab simulation to determine the accuracy of the estimated angle-of-arrival (AOA) of a target signal in an AWGN channel. The proposed algorithm is shown to provide exceptional accuracy. Additionally, we present results from a hardware implementation using a software radio platform and an eight-element circular array; they validate the simulation results. |
8,704 | Please write an abstract with title: GNSS Patch Antenna Design Parameter Optimization using FEKO, Design of Experiments & P-Transform Technique, and key words: Global navigation satellite system, Transmission line matrix methods, Patch antennas, Computational modeling, Optimization, Global Positioning System, Matlab. Abstract: The next generation of Automotive Radios, Navigation Systems, Connectivity, Connected Services, Positioning Services, Cloud Services, CV-X cellular network technologies, HD maps in autonomous domain needs and require an optimized and robust future GNSS (GPS and GLONASS) patch antenna solution to operate effectively and deliver services, features, functionality and that allows the V model process (Verification and Validation) of the above outlined items software stack at the engineering development component and vehicle level and as well as in the production intent vehicles out in the field.Conducted literature review and published paper studied however, observed that there is a problem related to the Center Frequency of 1.555 [GHz] GNSS antenna which has not been investigated. The proposed work involved a modeling of New GNSS (GPS and GLONASS) rectangular patch antenna. The design focus will be on the operating frequency range of 1.500 [GHz] to 1.610 [GHz] and FEKO 3D Electromagnetic simulation software package from Altair [4] will be used, Design of Experiments (DoE) [5], and as well as applying an optimization P-Transform algorithm [6] on the presented dual band GNSS (GPS and GLONASS) patch antenna passive gain. To be more direct, the GNSS microstrip patch antenna is designed to resonate and operate at 1.555 [GHz] frequency. The demonstrated GNSS patch antenna was designed to capture both the GPS and GLONASS signals and data targeting automotive and non-automotive industries as its intended application.Furthermore, the ground plane length, ground plane width and the substrate material dielectric constant design parameters were varied at each FEKO simulation run, in order to obtain the simulation of GNSS patch antenna passive gain output results for the purpose of the optimization study using P-Transform technique within the MATLAB environment. The presented GNSS patch antenna 2D far field and/or average passive gain measurement of GPS and GLONASS at carrier frequency of 1.555 [GHz] was plotted and analyzed. The computation and analysis involved taking the delta between elevation angle 30 and 90 degrees from the average passive gain graph and this step was conducted for 120 FEKO simulation iteration runs. In other words, for each FEKO simulation run the Far field (objective function) was computed separately unique for that specific design parameters and recorded in a lookup matrix. This four columns lookup matrix was called out for the purposes of the P-Transform algorithm utilization and execution within the MATLAB environment.To be more precise, the FEKO simulation studies were undertaken to determine the GNSS (GPS and GLONASS) patch antenna average passive gain, in turn we call it the Objection Function in which the P-Transform optimization process will be applied. Moreover, Design of Experiments (DoE) was applied on the presented GNSS patch antenna, in order to reduce the number of required simulation test runs and therefore improve the proposed antenna design cycle. |
8,705 | Please write an abstract with title: How to Assess Reflective Writing in Computer Science Education? A Critical Analysis, and key words: Reflectivity, Computer science, Education, Writing, Reflection, Computer science education, STEM. Abstract: Reflective writing is important in higher education that supports students to improve their critical thinking. However, Despite the widespread of using reflective writing in education, there is a lack of literature relating to the important aspects of reflection in computer science (CS) education. This study approached to (a) address theoretically how reflective writing can be in CS (b) investigate theoretically the conceptual reflective writing framework (RWF) indicators in CS. The literature showed that the RWF’s indicators is theoretically sound that the use of specific indicator can be less or more important based on the goal and the context of writing reflectivity. Finally, we consider the implications of refection aspects writing can be customized assessment to students based on the field. |
8,706 | Please write an abstract with title: Bug busters, and key words: Computer bugs, Libraries, Testing, Program processors, Java, Security, Computer languages, Pressing, Computer crashes, Buffer overflow. Abstract: One way to deal with bugs is to avoid them entirely. The approach would be wasteful because we'd be underutilizing the many automated tools and techniques that can catch bugs for us. Most tools for eliminating bugs work by tightening the specifications of what we build. At the program code level, tighter specifications affect the operations allowed on various data types, our program's behavior, and our code's style. Furthermore, we can use many different approaches to verify that our code is on track: the programming language, its compiler, specialized tools, libraries, and embedded tests are our most obvious friends. We can delegate bug busting to code. Many libraries come with hooks or specialized builds that can catch questionable argument values, resource leaks, and wrong ordering of function calls. Bugs many be a fact of life, but they're not inevitable. We have some powerful tools to find them before they mess with our programs, and the good news is that these tools get better every year. |
8,707 | Please write an abstract with title: Energy Efficiency Techniques for Residential, Commercial and Industrial application in Sub-Saharan Africa, and key words: Renewable energy sources, Sociology, Africa, Energy efficiency, Reliability, Sustainable development, Statistics. Abstract: Sub-Saharan Africa is among the regions of the world with very low access to energy. However, renewable energy and Energy Efficiency components POET (Performance, Operation, Equipment, and Technology)framework can serve as a pathway that will allow access to affordable and reliable energy while promoting sustainable development in this part of the globe. To achieve that, a strong review of policies needs to be conducted, with energy efficiency being among the priority aspects. This paper aims to provide an overview of energy efficiency in the residential, commercial, and industrial sectors of sub-Saharan Africa. Potential solutions and technologies that lead to efficient use of energy are discussed. |
8,708 | Please write an abstract with title: A Method of Physical Grid Partition Division for Distribution Network Based on Heuristic Algorithm, and key words: Economics, Power supplies, Heuristic algorithms, Modulation, Distribution networks, Linear programming, Planning. Abstract: In terms of a large scale of distributed generation connect to distribution network, absorption capacity of distributed generation should be increased significantly. Partition division of physical network is an optional mode. The entire planning area is divided into geographically and electrically independent power supply zones. Combined with the effective deployment of distribution terminals, the grid planning effect of distribution network is improved. The technical feasibility and economic optimization of the global scope are realized automatically. Based on the characteristics of distribution networks, the average level and the average degree as the objective functions are proposed. In view of the priority level of branch and node, an algorithm based on heuristic rule is proposed. The solution method abided by “search and modulation” is proposed. Finally, the algorithm are validated by case of PG & E69 node in the United States. |
8,709 | Please write an abstract with title: Multi-Scale Context Interaction Learning network for Medical Image Segmentation, and key words: Deep learning, Training, Image segmentation, Semantics, Retina, Skin, Decoding. Abstract: Semantic segmentation methods based on deep learning have provided the state-of-the-art performance in recent years. Based on deep learning, many Convolutional Neural Network (CNN) models have been proposed. Among them, U-Net with the simple encoder and decoder structure, can learn multi-scale features with various context information and has become one of the most popular neural network architectures for medical image segmentation. To reuse the features with the detail image structure in the encoder path, U-Net utilizes a skip-connection structure to simply copy the low-level features in the encoder to the decoder, and cannot explore the correlations between two paths and different scales. This study proposes a multi-scale context interaction learning network (MCIU-net) for medical image segmentation. First, to effectively fuse the features with detail structure in the encoder path and more semantic information in the decoder path, we conduct interaction learning on the corresponding scale via the bi-directional ConvLSTM (BConvLSTM) unit. Second, the interaction learning among all blocks of the decoder path is also employed for dynamically merging multi-scale contexts. We validate our proposed interaction learning network on three medical image datasets: retinal blood vessel segmentation, skin lesion segmentation, and lung segmentation, and demonstrate promising results compared with the state-of-the-art methods. |
8,710 | Please write an abstract with title: Crime Mapping in Crime Analysis, and key words: Law enforcement, Geographic information systems, Security, Planning, Behavioral sciences, Spatial databases, Pins. Abstract: This chapter presents the development of the use of geographical information systems in crime analysis in Slovenia. The beginnings go back to the 1950s with the first study on the distribution of crime in Slovenia followed by a study on the geographical distribution of deviant behavior in Ljubljana, the capital of Slovenia. Before 1991, hot spots were marked using maps and pins, or hand‐drawn maps shaded differently. In the 1990s, the Slovenian police began to use a Geographic Information System (GIS) in their work, and since then, it has been regularly used for strategic and operational crime purposes. In addition, a rather promising development has been noted regarding the cooperation of the police and research community in this context, as seen in the inclusion of GIS crime analysis in the university curricula in programmes for future experts in the field of security, studying at the Faculty of Criminal Justice and Security, University of Maribor. |
8,711 | Please write an abstract with title: Analysis of Watermarking Techniques with Wavelet and Cosine Transform for Imperceptibility on Image, and key words: Radiography, Visualization, PSNR, Bit error rate, Watermarking, Wavelet analysis, Robustness. Abstract: Some medical image watermarking techniques utilize frequency transform domains to improve the performance of the watermarking technique, where the main requirement of the medical image is to maintain the visual quality. This paper analyzes the imperceptibility performance of two frequency transform techniques Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT). The analysis methodology is an experiment the embedding watermark data in the transferred domain of the medical image by image by utilizing two techniques DWT and DCT. The performance of both techniques was measured in terms of image imperceptibility and embedding capacity. The imperceptibility performance based on Peak Signal-toNoise Ratio (PSNR) and Bit Error Rate (BER) values of the watermarked medical image is 97.4129 to 104.0503 on the PSNR scale for three different medical images by DWT, while the BER range from 0.0038 to 0.0146 respectively. While under DCT, the performance under PSNR for three different medical images are 40.97, 43.15, 11.89 respectively, and BER of 0.39, 0.2995, 0.4259 respectively. This finding indicates that DWT outperformed DCT on PSNR. |
8,712 | Please write an abstract with title: A Fine-scale Industrial Process Distribution Evaluation Method with Concurrent Static and Dynamic Dissimilarity Analysis, and key words: fine-scale monitoring, process dynamics, operating condition, dissimilarity analysis, slow feature analysis. Abstract: Dissimilarity (DISSIM) analysis is a widely used method that can detect the changes of data distribution at the early stage, whereas conventional distance-based monitored statistics may still keep inside of the normal region. However, temporal distribution should be isolated from steady-state information, which are representations of process dynamics and provides precise discrimination of normal deviations from real faults. In this study, a concurrent static and dynamic dissimilarity analysis based on slow feature analysis technique (CSDDISSIM) is developed for identifying incipient faults sensitively and exploring physical interpretation. First, static features and their temporal counterpart are obtained for distribution exploration. Then the changes of distributions are checked in fine scale and the monitoring scheme is developed to distinguish the current process status, which are normal, operating deviation, dynamic abnormality and real fault. In this way, the industrial process status can be captured with beneficial process interpretation. The validity of the proposed method is tested in a typical benchmark, namely Tennessee Eastman process. |
8,713 | Please write an abstract with title: Neuroscience, neuroachitectronics, nanocomputers and nanotechnology, and key words: Neuroscience, Nanotechnology, Nanobioscience, Nervous system, Network topology, Mathematical model, Computer architecture, Humans, Nanoscale devices, Neurons. Abstract: With the ultimate objectives to design nanocomputers hardware (e.g., develop affordable high-performance architectures, discover advance organizations, synthesize and examine novel topologies, analyze performance, et cetera) far-reaching research should be performed. The need for mathematical models is emphasized, and we report the results in mapping neuroscience into advanced nanocomputer architectures with the sequential analysis and modeling. Optimization of nanocomputers can be performed as they are designed by applying neuroscience-neuroachitectronics fundamentals. Then, using the mathematical models, analysis and optimization can be formulated and carried out. |
8,714 | Please write an abstract with title: Energy-Efficient OFDM Radio Resource Allocation Optimization With Computational Awareness: A Survey, and key words: Energy efficiency, Resource management, Wireless communication, Power demand, Computational modeling, 5G mobile communication, Measurement. Abstract: In this paper, we review radio resource optimization methods for energy-efficient wireless communication in links and networks using the Orthogonal Frequency Division Multiplexing (OFDM) and Orthogonal Frequency Division Multiple Access (OFDMA) techniques. We first consider the energy-efficiency metrics and optimization goals. We discuss the increasingly complex systems, starting from (i) a single OFDM link, (ii) an OFDMA single-hop network to (iii) multi-hop relay OFDMA interference networks. In each case, we elaborate on the transmission rate estimation, power consumption modelling, existing optimization constraints and the optimization solutions. Specifically, in the power-consumption modelling, we include the signal-processing (and related computing) power. We discuss the practicality of the considered solutions. We also touch upon the problem of nonlinear power amplifier characteristics (causing distortions typical for OFDM signals) to be taken into account for energy-efficient resource allocation. We discuss trade-offs and provide recommendations for future energy-efficient OFDM networks design. We also discuss the future works and challenges in the context of energy efficiency resource allocation for OFDM/OFDMA and their derivative techniques. We conclude that the presented design practices should include computational awareness in the networks to trade-off between information communication, information processing and the required network management energy-efficiency. |
8,715 | Please write an abstract with title: Optimum Design of Stepped Transmission-Line Transformers, and key words: Transmission lines, Transformers, Impedance, Bandwidth, Design methodology, Coaxial components, Transmission line theory, Polynomials, Transmission line discontinuities, Transmission line measurements. Abstract: This paper describes the optimum stepped-transmission-line transformer structure for matching two unequal characteristic impedances. For any specified bandwidth, the steps are designed to yield a Tchebycheff-type (or equal-ripple) reflection-coefficient response. Over this band, the maximum vswr is less than that obtainable with any other stepped-transformer having the same number of steps. Design method and technique for eliminating discontinuity-capacitance effects are given. The measured results for a coaxial and a waveguide model are presented and found to verify the method. |
8,716 | Please write an abstract with title: Dynamic inference of perceptual categories in negotiating agents, and key words: Humans, Proposals, Ontologies, Multidimensional systems, Design engineering, Space technology, Computational modeling, Psychology, Spirals, Maintenance engineering. Abstract: In this paper, we describe an approach by which one agent may infer the categorical preference structure of another agent in relation to a set of alternative proposals made in negotiation. The categorical preferences are inferred over a sequence of proposals, as preferences are disclosed one at a time. We seek to avoid strong ontological commitment between the agents, making only minimal assumptions about shared representations of the set of alternatives. We adopt a multidimensional representation that avoids the common, but rarely plausible, assumption of issue independence. An illustration of the approach is included and possible applications are discussed. |
8,717 | Please write an abstract with title: The effect of torsion and tensile stress on the circumferential permeability of CoFeBSi amorphous wires, and key words: Tensile stress, Permeability, Amorphous materials, Wires, Amorphous magnetic materials, Magnetic anisotropy, Perpendicular magnetic anisotropy, Magnetic domains, Inductance, Frequency. Abstract: In this paper, a domain model for the magnetoimpedance (MI) of ferromagnetic wires and complex inductance formalism are used to study both the effect of torsion and tensile stress on the low frequency MI response of CoFeBSi amorphous wires (60/spl mu/m of diameter). In particular, the calculated /spl mu//sub /spl phi// dependence on these kind of stresses is found to be very sensitive to the wire's anisotropy constant K/sub a/ variations, exhibiting reduced L/sub r/ for diminished K/sub a/ and increasing L/sub r/ for increasing K/sub a/ is shown. |
8,718 | Please write an abstract with title: A goals-oriented mechanics curriculum featuring applications, and key words: Design engineering, Yarn, Project engineering, Manufacturing, Process design, Education, Innovation management, Visualization, Automotive engineering, Vehicles. Abstract: All instructors visualize goals and, to use recent vernacular, learning objectives for their courses. In this presentation, the authors formalize both, distinguish between them, consider a unified thread informing a mechanics curriculum and illustrate it through applications. Taken piecewise, the elements employed here are not new, but taken together, as an integrated, systematic process, the curriculum differs markedly from traditional mechanics curricula. Students learn theory and apply it to do mechanical design and learn about project engineering, manufacturing and more. Because applications must be current, the curriculum remains vibrant and practicable. This is a work in progress. |
8,719 | Please write an abstract with title: Artificial Intelligence-Based Anomalies Detection Scheme for Identifying Cyber Threat on IoT-Based Transport Network, and key words: Artificial Intelligence, Deep Learning, Intrusion Detection, Feature Optimization, Genetic Algorithm, Internet of Things, Cyber Attack. Abstract: Increasing use of portable wireless devices in the Internet of Things (IoT) network has made it more dynamic, flexible, and vulnerable to cyber-attacks due to shared communication links, and it is critical to identify and mitigate potential security risks. Thus, this leads to the crucial need for an intrusion detection system that can uncover malicious attacks on the IoT network. In order to identify malicious sessions in IoT networks, the author proposes an artificial intelligence-based IDS model employing a feature selection technique based on fuzzy and genetic algorithms (GA). We use the bio-inspired genetic algorithms Intelligent Water Drop (IWD) and Biogeography-based Optimization (BBO) for feature selection. We provide an effective feature extractor that employs intelligent water drop (IWD) algorithms and a feed-forward network called the fuzzy water drop intrusion detection model (FWDNN) for assault categorization. In this paper, we propose an artificial intelligence-based IDS model using feature selection method based on fuzzy and genetic algorithms (GA) with the goal of detecting malicious sessions in IoT networks. Evaluation is done on real IoT datasets and CICIDS-2017, and the results show that the proposed BBOKNN model outperforms existing models in terms of evaluation parameters. |
8,720 | Please write an abstract with title: Task Offloading and Trajectory Scheduling for UAV-Enabled MEC Networks: An Optimal Transport Theory Perspective, and key words: Task analysis, Energy consumption, Unmanned aerial vehicles, Computational modeling, Trajectory optimization, Wireless communication, Batteries. Abstract: In this letter, we propose a task offloading framework for UAV-enabled MEC networks, where all smart mobile devices are scattered randomly following an arbitrary distribution. By exploiting the hovering and mobilizing capability of a UAV, task offloading service can be provided to the devices in all sub-areas of the network. To extend UAV operating time and associated network lifetime, we formulate an optimization problem to minimize the total energy consumption of the UAV through joint region partitioning and UAV trajectory scheduling. To solve it, we decompose it into two independent sub-problems, i.e., region partitioning and UAV trajectory optimization. For the first sub-problem, we model it as a semi-discrete optimal transport problem by considering the traffic balance among different sub-areas and propose an iterative algorithm to achieve the optimal solution. Then, the UAV trajectory optimization sub-problem is modeled as a traveling salesman problem to determine the shortest route. Simulation results show that the proposed scheme can significantly reduce the energy consumption of the UAV while achieving proper load balance. |
8,721 | Please write an abstract with title: The Hierarchical Ensemble Model for Network Intrusion Detection in the Real-world Dataset, and key words: Circuits and systems, Network intrusion detection, Telecommunication traffic, Boosting, Data models, Task analysis, Computer crime. Abstract: Network intrusion detection is an indispensable defense in the critical era fulling of cyberattacks. However, it faces a severe class imbalanced issue, and most of the researches are conducted on simulated data. Therefore, this work introduces a hierarchical ensemble architecture with machine learning approaches. It is trained on the latest and real-world dataset to solve the above problems. The experiments show that we outperform state-of-the-art methods on real network traffic data. |
8,722 | Please write an abstract with title: A Study on Accelerating Average Consensus Algorithms Using Delayed Feedback, and key words: Convergence, Delays, Heuristic algorithms, Consensus algorithm, Laplace equations, Delay effects, Network topology. Abstract: This article studies accelerating a Laplacian-based dynamic average consensus algorithm by splitting the conventional delay-free disagreement feedback into a weighted summation of current and outdated terms. When determining the weighted sum, there is a range of time delay that results in a higher convergence rate for the algorithm. For such weights, using the Lambert $W$ function, we obtain the rate-increasing range of the time delay, obtain the maximum reachable rate, and characterize the value of the corresponding maximizer delay. We also study the effect of using the outdated feedback on the control effort of the agents. We show that only for some specific affine combination of the immediate and outdated feedback, the control effort of the agents does not go beyond that of the delay-free algorithm. In addition, we demonstrate that using outdated feedback does not increase the steady-state tracking error of the average consensus algorithm. Finally, we determine the optimum combination of the current and the outdated feedback weights to achieve the maximum increase in the rate of convergence without increasing the control effort of the agents. We demonstrate our results through a numerical example. |
8,723 | Please write an abstract with title: A Survey on Various Speech Emotion Recognition Techniques, and key words: Deep learning, Knowledge engineering, Emotion recognition, Wiener filters, Target recognition, Neural networks, Speech recognition. Abstract: Speech emotion recognition is one of the important concepts of all the recognition methods used till now. To know more about the process behind it, prior knowledge of how it is handled is required. This paper describes different methods for speech emotion recognition. Though the current target (an efficient method for recognizing emotion in speech) has brought many challenges, there were several methods introduced for the recognition in various situations. In this paper, some of the previously proposed methods for different situations like concealed signals, whispered signals, as well as noisy signals, were discussed and suggested for the researchers. A brief knowledge on other techniques, which use Convolution Neural Network, Pattern Recognition Neural Network, Spiking Neural Network, and Deep Neural Network for their recognition are elucidated. |
8,724 | Please write an abstract with title: How Europe missed the transistor, and key words: Europe, Transistors, Solid state circuits, Telephony, Laboratories, X-ray imaging, Germanium, Electrodes. Abstract: This paper relates how the invention of the transistor occurred twice and independently of each other. In late 1948, shortly after Bell Telephone Labs announced the invention of the transistor, surprising reports began coming in from Europe about how two physicists from the German radar program, claimed to have invented a strikingly similar semiconductor device, which they called the transistron. This dual, nearly simultaneous breakthrough can be attributed in part to the tremendous wartime advances in purifying silicon and, in particular, germanium. In both cases, germanium played the crucial gateway role, for in the immediate postwar years it could be refined much more easily and with substantially higher purities than silicon. |
8,725 | Please write an abstract with title: Emotable - Emotion Detection Based Social Media Application Using Machine Learning And Deep Learning, and key words: Emotion Detection, Social Media, Emotions, Machine Learning, Deep Learning. Abstract: Social media analytics and emotion recognition have gained immense popularity in recent years. Emotion recognition is a technique for identifying and detecting human emotions while utilizing technical capabilities. This paper presents emotion detection of text posted by users on a social media application and evaluates the performances of various machine learning models, individually and combined. We applied several preprocessing techniques before training the models, which helped us understand and analyze the data. This study concluded that combining all four approaches increased accuracy compared to using each separately. |
8,726 | Please write an abstract with title: Effects of crosslinking byproducts on space charge formation in crosslinked polyethylene, and key words: Space charge, Polyethylene, Cable insulation, Polymers, Morphology, Current measurement, Charge measurement, Voltage measurement, Testing, Electrodes. Abstract: Space charge is formed in cables insulated with crosslinked polyethylene. It has not been clear whether the crosslinking byproducts or the crosslinked polymer morphology is responsible for the space charge formation. In order to clarify this point additive-free noncrosslinked low-density polyethylene, additive-free crosslinked polyethylene, and degassed crosslinked polyethylene were soaked in the crosslinking byproducts and the space charge distribution was measured after DC voltage application. Samples tested are divided into two categories. The first category is a soaked single-layered sheet and the second category is a two-layered specimen consisting of a soaked sheet and a nonsoaked sheet. As a result, the following conclusions were obtained. (1) Cumyl alcohol is responsible for homocharge layers in front of the electrodes in both low-density and crosslinked polyethylene sheets. (2) Acetophenone is responsible for heterocharge formation in crosslinked polyethylene, presumably as a synergistic effect with water. (3) alpha -methylstyrene has no effect on space charge formation in low-density polyethylene, while it assists charge trapping in crosslinked polyethylene. (4) Charge trapping occurs easier in degassed crosslinked polyethylene than in low-density polyethylene, probably because of carbonyl groups induced by crosslinking |
8,727 | Please write an abstract with title: Robust Power System Stabilizer for Multi-machine Power Networks using Tunicate Swarm Algorithm, and key words: Damping, Simulation, Optimization methods, Power system stability, Particle measurements, Robustness, Stability analysis. Abstract: As a result of the multiple interruptions induced by low-frequency oscillations in power systems, they may lead to system instability. This research employs the tunicate swam algorithm (TSA), a metaheuristic optimization approach, to design the power system stabilizers (PSSs) for the multi-machine power system networks. To increase system damping, a damping ratio-based objective function is proposed and a commonly utilized traditional lead-lag type PSS structure is adopted. The effectiveness of the TSA-based PSS architecture is illustrated by two systems: one with four machines and another with ten machines. The effectiveness and robustness of the proposed method are demonstrated using many performance tests. An additional measure of trustworthiness is provided by the comparison of the simulation results to the well-known particle swarm optimization (PSO) approach for swarm intelligence in this field. |
8,728 | Please write an abstract with title: Effect of Poling Atmosphere on Pb (Zr, Ti)O3 / Pb(Zr, Ti) O3 Sol-gel Composite, and key words: Ultrasonic transducers, Zirconium, Atmospheric measurements, Ultrasonic variables measurement, Atmosphere, Humidity, Humidity control. Abstract: In the Pb(Zr,Ti)O3/Pb(Zr,Ti)O3 sol-gel composite, the influence of humidity and the influence of atmosphere during poling treatment were investigated. There were three atmospheric conditions to be surveyed. There are three states: a high humidity state where the atmosphere is not controlled, a humidity control state by injecting nitrogen gas, and a humidity control state by injecting dry air. When poling in a high humidity condition where the atmosphere is not controlled, the piezoelectric constant d33 was confirmed to be as small as a number [pC/N]. On the other hand, when the poling was performed while the humidity was controlled by injecting nitrogen gas or dry air, a relatively large value of several tens [pC/N] was confirmed. Also, the ultrasonic response of these samples was measured. As a result, it was confirmed that the ultrasonic response was clearer when the humidity was controlled by injecting nitrogen gas or dry air than when the poling was performed in a high humidity state where the atmosphere was not controlled. |
8,729 | Please write an abstract with title: Distributed Adaptive Tracking Control for High-Order Nonlinear Multiagent Systems Over Event-Triggered Communication, and key words: Uncertainty, Parameter estimation, Backstepping, Monitoring, Telecommunications, Standards, Network topology. Abstract: In this article, we investigate the consensus problem for high-order nonlinear multiagent systems (MASs) with an uncertain leader under event-triggered communication. Compared with the existing consensus results for nonlinear MASs under event-triggered communication, the class of systems considered is more general, while achieving better performance in term of asymptotic tracking. To estimate the unknown parameters of the uncertain leader, distributed intermediate parameter estimators based on event-triggered communication mechanism are first introduced. To guarantee that high-order derivatives exist when applying the backstepping method, such estimators are further modified to obtain final estimators having a polynomial form by using the Hermite interpolation method. Moreover, novel high-order filters are proposed to generate local reference signals and to ensure the existence of high-order derivatives of the filter states. Based on the developed filters, a backstepping-based decentralized adaptive controller is developed. It is proved that consensus errors are asymptotically convergent with the developed method. Finally, simulation examples are provided to show the effectiveness of the proposed method. |
8,730 | Please write an abstract with title: Study on the peak interval variability of photoplethysmogtaphic signals, and key words: Heart rate variability, Electrocardiography, Signal analysis, Heart rate, Biomedical engineering, Blood pressure, Reflectivity, Time measurement, Measurement standards, Temperature sensors. Abstract: Heart rate variability (HRV) is concerned with the analysis of the intervals between heartbeats. ECG R-R interval variability is the commonly used measure of HRV. In this study, the peak interval variability and successive interval difference variability of photoplethysmographic signals were analyzed for HRV estimation instead of using the ECG R-R interval. The experiments were conducted under three different physiological conditions: rest, immediate post-exercise, and recovery from exercise on 16 subjects. Comparison with HRV estimated by R-R intervals indicated that a reasonably accurate HRV estimation could be achieved from photoplethysmographic signals at rest. With the error of 2.6% for overall HRV and 2.1% for short term HRV, the preliminary results showed that it is possible to analyze the HRV using photoplethysmographic signal when subjects are in stationary cardiovascular condition. |
8,731 | Please write an abstract with title: The telephone and the laboratory — Part I, and key words: Telephone sets, Companies, Switches, Manufacturing, Telecommunications, Wires, Research and development. Abstract: The necessity for organized research resulted in the growth in America from about 1907 of the Bell Telephone Laboratories, with their present staff of 2 300 qualified engineers and scientists. In Great Britain the British Post Office has 300 such men engaged in research, their activities being largely co-ordinated with those of the manufacturing companies. The figure for Australia is 55. The Comité Consultatif International T él éphonique (Fernsprechen) (C.C.I.F.) and other bodies perform useful liaison functions. Outline financial data are given. In South Africa, with its comparatively small telephone system, most of the apparatus used has been imported. Work done has therefore consisted largely in the comparative quality testing of equipment and the investigation of problems arising from its use under South African conditions. With the growth of local industry the amount of material testing has increased. Investigations and development work have been carried out on telegraphs, radio, switching, long distance dialling, wires and dielectrics, and on telephone instruments. The high incidence of lightning has brought problems on underground cables, fusing and earthing. Research on lightning interference with V.F. telegraph systems is now in progress. |
8,732 | Please write an abstract with title: Blockchain-Based Privacy Enforcement in the IoT Domain, and key words: Privacy, Blockchains, Data privacy, Multiuser detection, Internet of Things, Standards, Smart contracts. Abstract: The Internet of Things (IoT) pervades our lives every day and has given end users the opportunity of accessing personalized and advanced services based on the analysis of the sensed data. However, IoT services are also characterized by new challenges related to security and privacy because end users often share sensitive data with different consumers without precise knowledge of how they will be managed and used. To cope with these issues, we propose a blockchain-based privacy enforcement framework where users can define how their data can be used and check if their will is respected without relying on a centralized manager. The preliminary tests we performed, simulating different scenarios, show the feasibility of our approach. |
8,733 | Please write an abstract with title: Design and Analysis of Corrugated Antennas Based on Surface Susceptance of a Single Cell of Corrugation, and key words: Resonant frequency, Corrugated surfaces, Permittivity, Surface impedance, Directive antennas, Density measurement. Abstract: In this article, a simple approach to design and analyze corrugated antennas is proposed that estimates their general radiation performance. Based on the analysis of a unit cell of the corrugated structure, the relationship between resonant frequency, spectral bandwidth, and directivity of the antenna is analytically derived. This simplifies the design of a corrugated antenna in terms of the design of a single cell of the corrugation. Hence, optimization process for designing corrugated antennas is made time efficient. The effect of corrugation width, height, as well as the permittivity of the material within the corrugations on the unit cell's surface susceptance and antenna directivity is parametrically studied. Agreement is shown between the derived formulas for a unit cell and the full-wave simulation of the entire antenna. The study of one-unit cell of the corrugated antenna provides the substrate parameters for a desired band of operation. A 2-D corrugated antenna with three corrugations is designed and fabricated. The measured results show that a gain of 17.4 dBi can be achieved at the center frequency. |
8,734 | Please write an abstract with title: Parametric amplifiers driven by two pump waves, and key words: Frequency, Optical amplifiers, Optical fibers, Bandwidth, Nonlinear equations, Stimulated emission, Optical fiber amplifiers, Optical fiber dispersion, Fiber nonlinear optics, Optical mixing. Abstract: The theory of parametric amplifiers driven by two pump waves is developed. By choosing the pump wavelengths judiciously, one can design an amplifier that produces uniform exponential gain over a range of wavelengths that extends at least 30 nm on either side of the average pump wavelength. |
8,735 | Please write an abstract with title: Caesar: Segment-Wise Alignment Method for Solving Discontinuous Deformations, and key words: Image segmentation, Strain, Motion segmentation, Image resolution, Microscopy, Detectors, Indexes. Abstract: Images obtained from serial section electron microscopy can contain defects that create discontinuous tissue deformation. Fixing such defects during image registration is especially challenging, as classical block matching registration techniques assume smooth motion within each block, and ConvNet based registration techniques must rely on smoothness assumption during training. We propose Caesar, a divide-and-conquer technique that breaks registered images into segments, such that most of discontinuity is confined to segment boundaries. Then, we align the segments independently and stitch the results back together. We provide extensive experimental evaluation on brain tissue serial section microscopy data that shows that segment-wise alignment reduces the average misalignment area around defects by 6-10x. |
8,736 | Please write an abstract with title: Power conditioning of standalone Photo-voltaic system with BLDC motor by Negative-Output Luo Converter, and key words: Power conditioning, Maximum power point trackers, Renewable energy sources, High-voltage techniques, DC-DC power converters, Electric vehicles, Topology. Abstract: The power electronic devices have evolved the drive circuits for machines over the last decade. The introduction of many DC-DC topologies has led to different functionality in power conditioning. Luo converter is one such DC-DC converter that is embedded by the voltage-lift techniques. The power transfer efficiency and the output voltage of Luo converter are limited by the limits on the parasitic elements in DC-DC converters. The Negative Output Luo converter is one wherein the DC power conditioning is done in the second quadrant with minimum passive elements. This helps in achieving reduced ripples, and high voltage transfer gain. The DC input can be harnessed from renewable energy resources like Solar energy through Photo-voltaic panels. The PV integrated Negative Output Luo converter is backed up by a Maximum Power Point Tracker with Perturb and Observe algorithm to extract maximum power at varying irradiance. In this paper, the Negative Output Luo converter is designed to control the speed of high power-to-weight ratio motors like BLDC motor. The characteristics of the proposed system under various irradiance have been analysed and reported. |
8,737 | Please write an abstract with title: Wheeling charge evaluation by using proposed MW-mile method considering transmission losses and load power factor variation, and key words: Reactive power, Pricing, Propagation losses, Transmission line measurements, Loss measurement, Task analysis, Load flow. Abstract: Today's electric utility industry is drastically changing due to power system restructuring. The main feature of this power system restructuring is to create a competition among the market players. It is necessary to develop a proper pricing strategy to maintain reliability and secure operation. It is a key and challenging task to allocate the charges for wheeling participants accurately. One of the pricing method widely used in India is MW- mile method for wheeling charge evaluation. This method is based on impact of power flow in a network and considers actual usage of the transmission line. There are three power flow approaches of MW-mile method namely absolute power flow, reverse power flow, dominant power flow. This method does not consider the impact of transmission loss as well as power factor variation of recipient load while evaluating the wheeling charges for the corresponding three power flow approaches. This paper compares the three power flow approaches with inclusion of transmission losses along with fluctuating power factor. The recipient should necessarily get benefit for operating their load at improved power factor. It motivate the recipient to operate their load with opitimal power factor. It also make sure that recipient should get penalty for operating the load at poor power factor. To get this accurate wheeling charge, this paper include the impact of transmission loss of line associated with power factor variation term which is set by the regulator. Newton Raphson algorithm is preferred to evaluate the line flows and line losses of the IEEE-30 bus system and corresponding wheeling charges are evaluated by using MW-mile method for all the three power flow approaches after inclusion of impact power loss as well as correction term of power factor. |
8,738 | Please write an abstract with title: Querying imprecise data in moving object environments, and key words: Uncertainty, Nearest neighbor searches, Databases, Tracking, Error correction, Computational modeling, Monitoring, Bandwidth, Batteries, Delay effects. Abstract: In moving object environments, it is infeasible for the database tracking the movement of objects to store the exact locations of objects at all times. Typically, the location of an object is known with certainty only at the time of the update. The uncertainty in its location increases until the next update. In this environment, it is possible for queries to produce incorrect results based upon old data. However, if the degree of uncertainty is controlled, then the error of the answers to queries can be reduced. More generally, query answers can be augmented with probabilistic estimates of the validity of the answer. We study the execution of probabilistic range and nearest-neighbor queries. The imprecision in answers to queries is an inherent property of these applications due to uncertainty in data, unlike the techniques for approximate nearest-neighbor processing that trade accuracy for performance. Algorithms for computing these queries are presented for a generic object movement model and detailed solutions are discussed for two common models of uncertainty in moving object databases. We study the performance of these queries through extensive simulations. |
8,739 | Please write an abstract with title: A Design of Layered Decoding for QC-LDPC Codes Based on Reciprocal Channel Approximation, and key words: Phase change materials, Numerical analysis, Software algorithms, Performance gain, Approximation algorithms, Software, Decoding. Abstract: This paper presents an analytically designed layered decoding algorithm for quasi-cyclic low-density parity-check (QC-LDPC) codes in the 5th Generation (5G) New Radio (NR) mobile communication system. First, a layered density evolution (DE) based on reciprocal channel approximation (RCA) is newly developed to accurately reflect the layered decoding operation in the decoder design. Using this technique, a single nested sequence is optimized in a greedy way to configure the processing order for any given number of layers. The error-correction performance is improved by up to 0.15 dB, while the number of iterations is reduced by about one simultaneously. |
8,740 | Please write an abstract with title: Numerical simulations of electrokinetically generated micro vortices in microchannels, and key words: Numerical simulation, Microchannel, Fluid flow, Computational fluid dynamics, Design methodology, Geometry, Mechanical engineering, Nonuniform electric fields, Microfluidics, Lab-on-a-chip. Abstract: The technology developed to micro-pattern the electric surface charge to be negative, positive or neutral enables the realization of complex liquid flows in simple microchannels. A commercial CFD code is utilized to numerically simulate a variety of electrokinetically-generated liquid flows in a straight and uniform microchannel due to non-uniform surface charge distributions under a single, externally applied electric field. Design methodologies to generate vortical flow in any desired direction are presented. In particular, surface charge patterns required to generate single or multi, co-rotating or counter-rotating, in-plane or out-of-plane vortices are investigated. |
8,741 | Please write an abstract with title: Covariance Based Tensor Reconstruction Approach for the Bistatic MIMO Radar in Unknown Nonuniform Noise, and key words: Tensors, MIMO radar, Estimation, Reconstruction algorithms, Covariance matrices, Image reconstruction, Signal resolution. Abstract: To resolve the problem of unknown nonuniformity of noise that occurs during data signal reception of the bistatic MIMO radar, a covariance-based tensor reconstruction approach is proposed in this paper. After obtaining the tensorial arrangement of the received measurement, a tensor reconstruction model which permits a tensor transformation with an inherent linear transformation matrix is utilized to capture, exploit and get rid of the unknown noise variances. Then the covariance matrix of the obtained received data measurement taken and reduced to a single structure angle estimation matrix problem where a Reduce dimension MUSIC method is adopted to exploit the signal subspace. Contrary to existing methods, the proposed method is simple and robust to unknown nonuniform noise with an improved angle estimation performance. Results from numerical simulation provided demonstrate the validity and effectiveness of the proposed method. |
8,742 | Please write an abstract with title: Comparison of voltage unbalance factor by line and phase voltage, and key words: Impedance, Industrial power systems, Voltage control, Cities and towns, Power distribution, Power system analysis computing, Temperature, Transformers, Power quality, Power system protection. Abstract: Most of the loads in industrial power distribution systems are balanced and connected to three power systems. However, voltage unbalance is generated at the user's 3-phase 4-wire distribution systems with single & three phase. Voltage unbalance is mainly affected by load system rather than power system. Unbalanced voltage will draws a highly unbalanced current and results in the temperature rise and the low output characteristics at the machine. It is necessary to analyze correct voltage unbalance factor for reduction of side effects in the industrial sites. Voltage unbalance is usually defined by the maximum percent deviation of voltages from their average value, by the method of symmetrical components or by the expression in a more user-friendly form which requires only the three line voltage readings. If the neutral point is moved at the 3-phase -4-wire system by the unbalanced load, by the conventional analytical method, line and phase voltage unbalance leads to different results due to zero-sequence component. This paper presents a new analytical method for phase and line voltage unbalance factor in 4-wire systems. Two methods indicate exact results |
8,743 | Please write an abstract with title: Multicriteria Analysis of the Opportunity Cost of the Sale of Paraguayan Energy from Itaipu to the Brazilian Market, and key words: Economics, Industries, Hydroelectric power generation, Production, Analytic hierarchy process, Electricity supply industry, Distance measurement. Abstract: The abundance of clean and renewable electrical energy constitutes a strategic asset for the development of the countries, and Paraguay has great availability of hydroelectric energy based on its participation in the binational power plants Itaipu and Yacyretá, in condominium with Brazil and Argentina.. However, a large part of the electricity production is not consumed in the country and is transferred to both Argentina and Brazil. In this sense, it is clear that the strategic use of the surplus of hydroelectricity that is currently being transferred could be key to lead the process of economic and social development in Paraguay, either by encouraging the consumption of its energy through the installation of industries, thus generating jobs and mobilizing the internal economy, or selling the surplus to third countries. Any selected alternative and the rejection of other alternatives will be inextricably linked to an opportunity cost. This work presents a methodology that allows identifying the opportunity cost of the sale of Paraguayan electricity to the Brazilian electricity market, with the use of the Analytical Hierarchy Process (AHP). It was possible to determine energy sales prices in the Brazilian market, for which rents would be generated that would significantly affect the development of Paraguay, ranging from US $63,55/MWh to US $2.841/MWh. It can be concluded that a scenario of high export of Paraguayan hydroelectric energy to Brazil presents an opportunity cost, for several scenarios where decision makers have a notorious predilection for the Economic, Environmental and Social criteria, in addition to some combinations of these criteria with others. |
8,744 | Please write an abstract with title: On the Information Coupling and Propagation of Visual 3D Perception in Vehicular Networks With Position Uncertainty, and key words: Three-dimensional displays, Uncertainty, Internet of Vehicles, Location awareness, Simultaneous localization and mapping. Abstract: Visual 3D perception is a key interface between vehicles and the environment which provides rich perception information for autonomous vehicles. In vehicular visual 3D perception, camera position uncertainty can often degrade the perception and localization performance, and the information coupling and propagation among 3D points and cameras exist ubiquitously. However, these factors do not receive the deserving concern in previous algorithms which mainly focus on the consideration of efficiency. In this paper, we develop a statistical framework for visual 3D perception in vehicular networks from the perspective of information gains. Specifically, we first derive the influence of camera position uncertainty on perception and localization quality with geometric interpretations given by the information ellipsoid, and also present the perception loss caused by uncertainty in the camera deployment application. Then we determine the information coupling and propagation among 3D points and cameras in the vehicular network, propose the visual information graph to characterize the coupling, and derive the hierarchical structure in propagation. Moreover, we also propose the equivalent circuit for the quasi-tree network to interpret the hierarchical structure and derive the blocking and the end-link effects for network reduction. Our results provide guidelines for the development of efficient uncertainty- and coupling-aware visual 3D perception techniques in vehicular networks. |
8,745 | Please write an abstract with title: Designing Safety Certificates for <i>H</i><sub>∞</sub> Control of Unknown Linear Systems, and key words: Safety, Games, Cost function, System dynamics, Riccati equations, Linear systems, Thermal stability. Abstract: This letter synthesizes safety barrier certificates for $\text {H}_{\infty }$ control of unknown linear systems. Inspired by the idea of expanding the domain of attraction (DoA) using control barrier functions (CBFs), we construct a region, called safe optimal DoA, in which both optimality and safety are simultaneously respected. The effect of unknown disturbances is attenuated by unifying the robustness property of CBFs and the $\text {H}_{\infty }$ control methods. To construct the control barrier certificates, a feasible optimization problem is developed using the relaxed game algebraic Riccati equation. A sum-of-squares (SOS)-based safe policy iteration algorithm is then proposed to solve the optimization problem iteratively. The resulting optimal policy minimizes a predefined cost function over an obtained maximum barrier-certified region for which there is no conflict between safety and optimality. Furthermore, to remedy the requirement of having the system dynamics, an online data-driven approach is presented using off-policy reinforcement learning. Finally, to demonstrate the efficacy of the proposed controller, a numerical example is given. |
8,746 | Please write an abstract with title: Five-Level T-type Converter Based Fault-Tolerant Isolated Dc-Dc Topology Using WBG Devices, and key words: Fault tolerance, Fault tolerant systems, Bridge circuits, Prototypes, DC-DC power converters, Voltage, Switches. Abstract: In this paper, a bidirectional isolated dc-dc converter is proposed for MVDC applications. In this topology, a modified T-type converter producing a 5-level voltage waveform is used on both sides of a high frequency transformer. The operations of the proposed converter and switching strategies in normal and faulty conditions are investigated in detail. A cost function is used to minimize the overall losses of the converter. The proposed converter has advantages of better fault-tolerance and higher efficiency compared to common dual active bridge dc-dc converters. The operation of the proposed structure is verified by experimental results. |
8,747 | Please write an abstract with title: FPGA based Intelligent Food Spoilage Detection for Commercial Storage, and key words: Methane, Animals, Moisture, Food industry, Machine learning, Logic gates, Raw materials. Abstract: India grows food in surplus quantity and also wastes tons of food by storing it in cold storage that goes unmonitored along with inefficient temperature controls. A lot of raw materials get rotten while transported from one cold storage to the food industry or directly to the consumer side be it the restaurants or the vegetable and fruit markets. Spoilt food when consumed by animals causes death and diseases. Even in restaurants, already preserved food is again stored in refrigerators for weeks. Today in the era of smart refrigerators, keeping a track of items inside became easier due to various alerting systems. As food spoilage is also a concern refrigerator should be able to detect the spoilage of food that is stored in it and should be able to alert the user. Often, the spoilage is known only when the food is smelt or tasted. In this paper, an FPGA-based food spoilage detection system is designed that detects early spoilage of food in storage systems through methane gas and moisture detection in foods as well as mold on bread surfaces. The system alerts the user through a buzzer and the inbuilt display of the storage at early spoilage itself so that the user discards the food even before it is completely rotten preventing other food from getting affected as well as saving the lives of animals who die from food poisoning. The YoloV5 machine learning model is retrained to detect the early formation of mold on food surfaces and discard the food items immediately. |
8,748 | Please write an abstract with title: Equations of motion for a free-electron laser with an electromagnetic pump field and an axial electrostatic field, and key words: Free electron lasers, Pump lasers, Electromagnetic fields, Laser excitation, Electrostatics, Resonance, Maxwell equations, Energy exchange, Electron beams, Partial differential equations. Abstract: The equations of motion for a free-electron laser (FEL) with an electromagnetic pump field and a static axial electric field are derived using a Hamiltonian formalism. Equations governing the energy transfer between the electron beam and each of the electromagnetic fields are given, and the phase shift for each of the electromagnetic fields is derived from a linearized Maxwell wave equation. The relation between the static axial electric field and the resonant phase is given. Laser gain and the fraction of the electron energy converted to photon energy are determined using a simplified resonant particle model. These results are compared to those of a more exact particle simulation code. |
8,749 | Please write an abstract with title: A spread spectrum based communication system for an integrated sensor microsystem, and key words: Spread spectrum communication, Sensor systems, Transmitters, Sensor phenomena and characterization, System-on-a-chip, Integrated circuit reliability, Power system reliability, Minimization, Interference, Access protocols. Abstract: This paper describes the design and implementation of a spread spectrum based miniaturized communication system for an integrated sensor microsystem, to be implemented as part of a system-on-chip device. One of the most important tasks in such a system is to convey information reliably on a multiple access based environment. In addition to the minimization of interferences, the devices have strict power and area limitations. The paper describes the application environment, the choice of the communication protocol, and the implementation of the transmitter and receiver circuitry. We provide results using practical sensor data which demonstrate satisfaction of functionality, area, and power constraints even when a degree of programmability is incorporated into the transmitter. |
8,750 | Please write an abstract with title: Integrating simulation and optimization of manufacturing systems, and key words: Manufacturing systems, Object oriented modeling, Artificial intelligence, Optimization methods, Delta modulation, Logic programming, Object oriented programming, Decision making, Job shop scheduling, Operations research. Abstract: This paper presents the ongoing development of a modeling methodology and a tool (the so-called simulation integrated system with modeling and optimization (SISMO) solver) that permits manufacturing systems to be both simulated and optimized according to several improvement strategies. We point out that the different steps of modeling, simulating, and optimizing uses the same integrated formalism and environment. A major point of this methodology and tool is the original decision-making mechanism over a hierarchy of complex discrete systems that model the real world. For the SISMO platform to be validated, we applied it to an actual highly constrained discrete-continuous scheduling problem. This study on a real-life problem has systematically led to improvements. |
8,751 | Please write an abstract with title: Suppression of Background Count by Cargo Containers in Radiation Portal Monitor, and key words: Radiation Portal Monitor (RPM), background count suppression, plastic scintillator, cargo container, Monte Carlo simulation. Abstract: At domestic ports and airports, radiation portal monitors (RPMs) have been installed and operated for detection of illegal radioactive materials in cargo containers. In RPM operation, although the alarm level of the RPM is set based on the background count, measured before the cargo container passes through the RPM, suppression of the background count occurs due to shielding by the cargo container and its contents. In this study, we evaluated, using Monte Carlo simulations, background-count variations caused by various conditions of cargo containers and their contents. To that end, the experimental RPM at the Port of Busan in Korea and a 40 ft cargo container, the most commonly used type in Korea, were precisely modeled. In order to verify the simulation models, the simulated data on the background count for the empty container were compared with the measured data, as recorded at 0.2-second intervals during container passes through the RPM. When the empty container passed through the RPM, the average background count decreased by approximately 20-30% with a consistent tendency. It was found that the degree and shape of background suppression varied depending on the cargo conditions. For example, for various cargoes (i.e., potassium chloride, slag powder, and zircon), as the vertical loading increased, the background count varied by approximately 50-60% on average, and by up to 74% in comparison to the time before the container entered the RPM. The present findings will contribute to the optimization of site-specific alarm criteria for RPM by better enabling realistic estimation of background variation for various factors. |
8,752 | Please write an abstract with title: A bulk-micromachined bistable relay with U-shaped thermal actuators, and key words: Relays, Actuators, Etching, Contacts, Micromechanical devices, Fabrication, Resistance heating, Finite element methods, Surface resistance, Process design. Abstract: This paper reports a deep-reactive ion etching (DRIE)-through-etched laterally bistable MEMS relay for power applications, with a primary emphasis on the design and modeling of its U-shaped transient thermal actuators, and a secondary emphasis on the design and fabrication of its contact element. In this relay, a contact crossbar is carried by a curved-beam bistable mechanism , which is toggled by transient U-shaped thermal actuators with their hot beam adiabaticly heated by electrical pulses. Each U-shaped thermal actuator comprises uniform-thickness hot and cold beams with a gap between them so they bend differently. This paper develops both a basic model and a complete model for the actuator that are verified by Finite Element Analysis and serve as effective design tools. The DRIE process creates nonideal etched surfaces, which pose challenges for good relay contacts. Both contact design and process development are discussed to help alleviate this problem. The fabricated relay exhibits a minimum total on-state resistance of 60 m/spl Omega/, and a maximum current carrying capacity of 3 A. It switches with a 1 ms actuation pulse, and a maximum 5 Hz repetition rate. |
8,753 | Please write an abstract with title: Experimental Investigation of Different Floor Materials in Automotive Near Field Antenna Testing, and key words: Antenna measurements, Filtering, Measurement uncertainty, Position measurement, Gain measurement, Frequency measurement, Floors. Abstract: In this paper we present the results from scaled automotive spherical near field measurements of a vehicle model conducted on absorbing and conducive floors. The purpose of the study is to compare accuracies of the different floor scenarios in the 84-1500 MHz frequency range. Two different scaled absorbers are considered to emulate full scale 48-inch and 18-inch absorbers. The larger ones ensure good absorption down to 70-80 MHz but are expensive and difficult to handle, leading to longer setup time. It is thus interesting to verify the level of accuracy that can be reached by using the smaller 18-inch absorbers. To cope with the expected performance degradation at low frequencies, measurements with the vehicle in a configuration raised from the floor, combined with a spatial filtering technique, are also performed. The analysis is carried out in the StarLab multiprobe system, considered a 12-time down-scaled version of typical full-size multiprobe automotive systems. Measurement results relevant to three antenna positions on the car body are shown estimating the measurement uncertainties for the peak gain and the Upper Hemisphere Radiated Power (UHRP). |
8,754 | Please write an abstract with title: Two-Stage Distributionally Robust Voltage Regulation of Active Distribution Network with Hybrid Energy Storage, and key words: Renewable energy sources, Uncertainty, Simulation, Supercapacitors, Active distribution networks, Voltage control, Optimization. Abstract: Due to inherent volatility and intermittence, the increasing penetration of distributed renewable energies brings significant voltage deviation problem in active distribution network. In this paper, a novel two-stage distributionally robust optimization (TSDRO) strategy of hybrid energy storage systems is proposed for voltage regulation in active distribution network. The prediction errors of distributed renewable generation with different time-scales are considered in constructing Wasserstein ambiguity sets. In the first stage, distributed battery energy storage systems are scheduled day-ahead in distributionally robust optimization with chance constraints. In the second stage, model predictive control is utilized to roll optimize the intraday charging/discharging strategy of the supercapacitor energy storage systems. The simulation results show the effectiveness of the proposed TSDRO strategy. |
8,755 | Please write an abstract with title: Brain Tumor Detection and Segmentation Using Anisotropic Filtering, and key words: Anisotropic Filtering, Brain Tumor, Magnetic Resonance Imaging (MRI), segmentation, Morphological operation. Abstract: Medical image processing now plays a critical part in scientific research by using a Computer-Aided Diagnosis (CAD) system to make an early diagnosis that will allow accurate and decisive treatment. This paper investigates a brain MRI imaging and focuses on a technique for a clearer view of the tumor attack side. For removing noise content from MRI images anisotropic filter is being used, thresholdbased segmentation and morphological procedures for differentiating the damage area from normal one. The foundation of this technique is obtaining sharp MRI images of the brain therefore anisotropic filter is used to make it suitable for further processing with improved value PSNR value of filtered image with less mean square error. The proposed method achieves better accuracy and clear segmentation of brain MRI with exact detection of tumor location. |
8,756 | Please write an abstract with title: Microprocessor pipeline energy analysis, and key words: Microprocessors, Pipelines, Microarchitecture, Circuits, Energy measurement, Power measurement, Energy consumption, Clocks, Permission, Hardware. Abstract: The increase in high-performance microprocessor power consumption is due in part to the large power overhead of wide-issue, highly speculative cores. Microarchitectural speculation, such as branch prediction, increases instruction throughput but carries a power burden due to wasted power for mis-speculated instructions. Pipeline over-provisioning supplies excess resources which often go unused. In this paper, we use our detailed performance and power model for an Alpha 21264 to measure both the useful energy and the wasted effort due to mis-speculation and over-provisioning. Our experiments show that flushed instructions account for approximately 6% of total energy, while over-provisioning imposes a tax of 17% on average. These results suggest opportunities for power savings and energy efficiency throughout microprocessor pipelines. |
8,757 | Please write an abstract with title: A channelized hotelling trace collimator design method based on reconstruction rather than projections, and key words: Collimators, Design methodology, Lesions, Image reconstruction, Band pass filters, Cutoff frequency, Scattering, Signal to noise ratio, Noise level, Detectors. Abstract: In this study a new SPECT (single photon emission computed tomography) collimator design technique is investigated. In this feasibility study, the collimator hole size is the only design variable changed. Other collimator parameters are fixed to a low-energy-high-resolution (LEHR) design. The design is based on a task of imaging a small hot lesion with a uniform background. A channelized hotelling trace (CHT) is used to quantify the lesion detectability in a reconstructed image for a particular collimator parameter. The unique feature of this development is that the image quality is not evaluated for planar projection data, but rather is evaluated for the reconstructed tomographic image with an OS-EM (ordered-subset expectation-maximization) reconstruction algorithm. Our results suggest that a collimator hole size that is larger than the LEHR collimator hole size is preferable for lesion detection. This implies that the parameter that gives the optimal lesion detectability on the planar projections may not give the optimal lesion detectability in the reconstructed image. In SPECT, the optimal collimator design should be reconstruction algorithm dependent. |
8,758 | Please write an abstract with title: ML-Driven Malware that Targets AV Safety, and key words: Safety, Robot sensing systems, Trajectory, Accidents, Malware, Autonomous vehicles. Abstract: Ensuring the safety of autonomous vehicles (AVs) is critical for their mass deployment and public adoption. However, security attacks that violate safety constraints and cause accidents are a significant deterrent to achieving public trust in AVs, and that hinders a vendor's ability to deploy AVs. Creating a security hazard that results in a severe safety compromise (for example, an accident) is compelling from an attacker's perspective. In this paper, we introduce an attack model, a method to deploy the attack in the form of smart malware, and an experimental evaluation of its impact on production-grade autonomous driving software. We find that determining the time interval during which to launch the attack is{ critically} important for causing safety hazards (such as collisions) with a high degree of success. For example, the smart malware caused 33X more forced emergency braking than random attacks did, and accidents in 52.6% of the driving simulations. |
8,759 | Please write an abstract with title: A scalable wavelet-based video distortion metric and applications, and key words: Bit rate, Humans, Visual system, Video compression, Distortion measurement, Transform coding, Video sequences, Video coding, Monitoring, Wavelet transforms. Abstract: Video distortion metrics based on models of the human visual system have traditionally used comparisons between the distorted signal and a reference signal to calculate distortions objectively. In video coding applications, this is not prohibitive. In quality monitoring applications, however, access to the reference signal is often limited. This paper presents a computationally efficient video distortion metric that can operate in full- or reduced-reference mode as required. The metric is based on a model of the human visual system implemented using the wavelet transform and separable filters. The visual model is parameterized using a set of video frames and the associated quality scores. The visual model's hierarchical structure, as well as the limited impact of fine scale distortions on quality judgments of severely impaired video, are exploited to build a framework for scaling the bitrate required to represent the reference signal. Two applications of the metric are also presented. In the first, the metric is used as the distortion measure in a rate-distortion optimized rate control algorithm for MPEG-2 video compression. The resulting compressed video sequences demonstrate significant improvements in visual quality over compressed sequences with allocations determined by the TM5 rate control algorithm operating with MPEG-2 at the same rate. In the second, the metric is used to estimate time series of objective quality scores for distorted video sequences using reference bitrates as low as 10 kb/s. The resulting quality scores more accurately model subjective quality recordings than do those estimated using the mean squared error as a distortion metric, while requiring a fraction of the bitrate used to represent the reference signal. The reduced-reference metric's performance is comparable to that of the full-reference metrics tested in the first Video Quality Experts Group evaluation. |
8,760 | Please write an abstract with title: Estimation of Zero-Sequence Impedance Parameters in Double-Circuit Lines Using Disturbance Recorder Data, and key words: Mutual coupling, Power transmission lines, Voltage measurement, Software algorithms, Estimation, Transmission line measurements, Impedance. Abstract: Knowledge of accurate zero-sequence line impedance parameters of transmission lines is critical for power system engineers since they play a key role in the settings of distance and directional protection relays, and fault location applications. Double-circuit transmission lines involve zero-sequence mutual impedance due to mutual coupling between the conductors, in addition to the self-impedance. The paper presents an offline estimation technique for zero-sequence self and mutual impedance parameters for double-circuit transmission lines using data from disturbance recorders from both terminals. The most accurate distributed parameter line model is used, and simulation tests prove the accuracy of the algorithm. The application of zero-sequence mutual coupling compensation in distance protection of double-circuit lines using the estimated parameters is also presented. |
8,761 | Please write an abstract with title: Two-dimensional AWE technique in fast calculation of microstrip antennas, and key words: Microstrip antennas, Transmission line matrix methods, Frequency, Green's function methods, Integral equations, Matrix converters, Permittivity, Moment methods, Impedance, Polynomials. Abstract: The method of moments (MoM) in conjunction with the two-dimensional asymptotic waveform evaluation (AWE) (E.K. Miller, IEEE Antennas and Propag. Mag., vol. 40, no. 1, pp. 40-52, 1998; ibid., vol. 40, no. 2, pp. 51-65, 1998; ibid., vol. 40, no. 3, pp. 49-66, 1998) is applied to calculate both input impedance response in terms of frequency and substrate parameters for a microstrip antenna simultaneously. The hybrid field integral equation of the microstrip patch irradiated by a current source is first converted into a matrix equation using MoM and Green's functions of the substrate. In the AWE method, the derivatives of Green's function are required. A closed form of microstrip Green's function is used for this requirement. Then, the matrix equation of frequency and permittivity derivatives can be obtained from the original matrix equation. With these matrices in hand, coefficients of the two-dimensional Pade polynomial can be obtained by using AWE technique in simultaneous frequency and permittivity extrapolation. Numerical results demonstrate the accuracy and efficiency of this technique. |
8,762 | Please write an abstract with title: Impact of a Spatial Decorrelation of the Noise on the Performance of Despeckling Filters for Polarimetric SAR Data, and key words: Speckle, Synthetic aperture radar, Decorrelation, Scattering, Springs, Electromagnetics, Correlation. Abstract: In this work, we have extended a procedure for the spatial decorrelation of fully developed speckle, originally developed for single-polarization SAR data, to fully-polarimetric SAR data. Assuming that the SAR processor is the same for all the polarimetric channels, the noise-whitening procedure can be performed applying the decorrelation stage to each channel, separately. Equivalently, the noise-whitening stage is applied to each element of the scattering matrix, before any multilooking operation, either coherent or not, is performed. In order to evaluate the impact of speckle decorrelation on the performance of classical polarimetric despeckling filters, we make use of simulated PolSAR data. We optionally introduce a spatial correlation of the noise in the simulated data by means of a 2D separable Hamming window; then we remove such a correlation by using the whitening procedure and compare the despeckling performance for the three following cases: uncorrelated, correlated, and whitened correlated SLC images. Simulation results show a steady improvement of performance scores, e.g., ENL, which are better after decorrelation than those measured with correlated noise and closely attain those of the uncorrelated case. Also, qualitative results on a true RADARSAT-2 image confirm the trend of the simulated data. |
8,763 | Please write an abstract with title: A wideband crosstalk canceller for xDSL using common-mode information, and key words: Wideband, Crosstalk, DSL, Attenuation, Radiofrequency interference, Adaptive filters, RF signals, Signal to noise ratio, Digital filters, Filtering. Abstract: This letter uses the twisted-pair common-mode signal as the input of an adaptive canceller to remove some wideband crosstalk in a digital subscriber line (xDSL) differential signal. Simulations using simple crosstalk and line balance models show the potential benefits of the canceller to improve the signal-to-noise ratio of an xDSL channel. |
8,764 | Please write an abstract with title: Direct optical biosensor based on optical feedback interferometry, and key words: Optical feedback, Optical interferometry, Biomedical optical imaging, Biosensors, Laser feedback, Stimulated emission, Optical coupling, Interference, Signal detection, Photodetectors. Abstract: In this paper, MEMs solution of the biosensor based on optical feedback interferometry is presented. Optical feedback occurs when part of the emitted laser light is coupled back into the laser cavity. The light interacts with the original laser light producing an interference signal which is detected using a photodetector placed on the opposite side of the laser cavity |
8,765 | Please write an abstract with title: P3204/D1.0, Apr 2023 - IEEE Draft Standard for Blockchain Interoperability - Cross Chain Transaction Consistency Protocol, and key words: blockchain, cryptocurrency, IEEE 3204, cross-chain, smart contract, relay chain. Abstract: The technical architecture and details of three cross-chain approaches is described in this standard, including Centralized/Multi-signature Notary-based cross-chain technology, HTLC-based cross chain technology and Relay Chain-based cross-chain technology. |
8,766 | Please write an abstract with title: Usability Matters: A Human–Computer Interaction Study on Network Management Tools, and key words: Tools, Monitoring, Usability, Human computer interaction, Task analysis, Data visualization, Knowledge engineering. Abstract: Over the years, network monitoring tools have evolved to keep pace with the advances in networking technologies and paradigms, such as virtualization and softwarization, and more recently, data plane programmability. However, there have been few advances regarding user interfaces and interactions in network management systems. In this paper, an investigation based on the human-computer interaction perspective is presented and improvements on the usability aspects of network monitoring tools are proposed. First, we conducted a survey to capture general information from network administrator professionals. On the basis of these initial data, we identified and specified two personas to represent the groups of users. Thereafter, a study focused on observing users' interaction and experience with a well-known network monitoring tool was conducted. Finally, our qualitative analysis revealed several findings that were used to develop recommendations to aid developers in the (re)design of these tools to enhance end-user interaction. |
8,767 | Please write an abstract with title: Energy Efficient and QoS Aware Multi-Level Mobile Cloud Offloading, and key words: Cloud computing, Energy consumption, Simulated annealing, Quality of service, Machine learning, Mobile handsets, Energy efficiency. Abstract: Mobile devices are constrained in battery capacity and processing power to execute heavy computation tasks. So mobile cloud offloading is the process in which compute-intensive tasks are migrated from mobile devices to the remote cloud servers to reduce the execution time and the energy consumption on mobile devices. In this work, we consider the combination of direct task upload and task upload via cloudlet to minimize the overall energy consumption on mobile devices for executing the latency-sensitive tasks in the mobile cloud computing (MCC) environment. We propose integer linear programming (ILP) based formulation, machine learning based formulation, and standard simulated annealing based formulation for task uploading decisions. Based on our experiment, ILP and machine learning-based approaches outperform other approaches like the naive random approach and the greedy-based uploading approach. Also, when the tasks with tighter deadlines, random and greedy approaches fail to produce solutions to the uploading decision, whereas the ILP based approach, simulated annealing approach, ML-based uploading approaches are comparatively successful in producing solutions. |
8,768 | Please write an abstract with title: Photovoltaic Generation Scenario Analysis Considering Irradiation Uncertainty and Output Derating Probability, and key words: Photovoltaic systems, Support vector machines, Radiation effects, Uncertainty, Monte Carlo methods, Machine learning algorithms, System integration. Abstract: The performance of PV system is influenced by both uncertain external factors and component reliability. This paper proposes a scenario generation approach of PV system combing the irradiation forecasting and system derating probability. Firstly, the catboost machine learning method is adopted to achieve the irradiation forecasting of different weather conditions as well as the predicting error distribution. Meanwhile, the PV system is divided into several levels according to the failure impact degree. The reliability states are sampled by using the sequential Monte Carlo simulation to analyze the distribution of PV derating output state. Finally, combining the error distribution and derating probability, the typical PV output scenario is generated. The results show that the typical photovoltaic scene obtained by the proposed algorithm can cover a larger fluctuation range and effectively eliminate the negative effects caused by prediction errors, providing a more reasonable basis for scheduling. |
8,769 | Please write an abstract with title: Predicting Traffic Incidents in Road Networks Using Vehicle Detector Data, and key words: Machine learning algorithms, Databases, Machine learning, Detectors, Predictive models, Prediction algorithms, Data models. Abstract: Prediction models can help to identify traffic incidents in roadways, reducing incident detection and response time. Advances in machine learning techniques to support the safety of roadways is a relatively underexplored area. This research seeks to advance machine learning to predict incidents based on detector data by comparing and analyzing the performance of different learning models. This study first discusses the severe class imbalance affecting the dataset. Then, using to-fold cross validation, the performance of the algorithms J48 Decision Tree, Naïve Bayes, and AdaBoost were compared. In the explored problem, a false positive indicates an incident where there is no incident, and this is highly undesirable. AdaBoost reached an ideal 0% false positive rate, followed by Naïve Bayes and J48. However, these values were achieved with a cost of high false negative rates for all classifiers. AdaBoost was also successful in handling the low correlation between fit and test datasets, which was not observed for the other two. |
8,770 | Please write an abstract with title: Age of Information in the Presence of an Adversary, and key words: Measurement, Wireless communication, Base stations, Conferences, Computational modeling, Information age. Abstract: We consider a communication system where a base station serves N users, one user at a time, over a wireless channel. We consider the timeliness of the communication of each user via the age of information metric. A constrained adversary can block at most a given fraction, $\alpha$, of the time slots over a horizon of T slots, i.e., it can block at most $\alpha$T slots. We show that an optimum adversary blocks $\alpha$T consecutive time slots of a randomly selected user. The interesting consecutive property of the blocked time slots is due to the cumulative nature of the age metric. |
8,771 | Please write an abstract with title: A Highly Efficient QEC Decoder Implemented on FPGA and ASIC, and key words: Quantum Computing, Quantum Error Correction, Quantum Control, Real time Decoding. Abstract: To make quantum computers useful and run applications featuring trillions of reliable logical operations, error correction will be required. One of the key components to enable error correction is a decoder that can identify errors which accumulate during the execution of a quantum circuit. The requirements for a decoder are that it accurately detects errors, executes quickly enough as to not create a backlog, and has low power usage so it can scale to millions of qubits and be more easily co-located with the wider qubit control apparatus. In this paper we present a decoder which for a distance 23 rotated planar surface code with 0.1% circuit-level depolarising noise executes in 240ns per round, has a threshold of 0.78%, occupies 0.06mm2 on a CMOS based silicon chip, and consumes less than 8mW of power. |
8,772 | Please write an abstract with title: Mobile Robot Circumnavigating an Unknown Target Using Only Range Rate Measurement, and key words: Robots, Mobile robots, Extraterrestrial measurements, Robot kinematics, Signal processing algorithms, Convergence, Dynamical systems. Abstract: This brief proposes a bounded continuous control law to steer a mobile robot to approach and maintain a predefined distance from an unknown stationary target in a GPS-denied environment where the positions of the robot and the target are not available. The control algorithm utilizes only the derivative of the distance between the mobile robot and the target, that is, range rate measurement. We demonstrate that the controller can achieve global convergence regardless of the initial states of the mobile robot. Compared with the existing works, the proposed control algorithm is the simplest form (derivative-type controller) and easy to implement. Numerical simulations and real-time experiments are both performed to confirm the effectiveness of the proposed control scheme. |
8,773 | Please write an abstract with title: Intrinsic Grassmann Averages for Online Linear, Robust and Nonlinear Subspace Learning, and key words: Principal component analysis, Kernel, Approximation algorithms, Manifolds, Distributed databases, Sparse matrices, Convergence. Abstract: Principal component analysis (PCA) and Kernel principal component analysis (KPCA) are fundamental methods in machine learning for dimensionality reduction. The former is a technique for finding this approximation in finite dimensions and the latter is often in an infinite dimensional reproducing Kernel Hilbert-space (RKHS). In this paper, we present a geometric framework for computing the principal linear subspaces in both (finite and infinite) situations as well as for the robust PCA case, that amounts to computing the intrinsic average on the space of all subspaces: the Grassmann manifold. Points on this manifold are defined as the subspaces spanned by $K$-tuples of observations. The intrinsic Grassmann average of these subspaces are shown to coincide with the principal components of the observations when they are drawn from a Gaussian distribution. We show similar results in the RKHS case and provide an efficient algorithm for computing the projection onto the this average subspace. The result is a method akin to KPCA which is substantially faster. Further, we present a novel online version of the KPCA using our geometric framework. Competitive performance of all our algorithms are demonstrated on a variety of real and synthetic data sets. |
8,774 | Please write an abstract with title: The satisfaction assessment of a course on designing and developing distance learning courses, and key words: Training, Computers, Computer aided instruction, Technological innovation, Asia. Abstract: This paper aims to present the results of a trainee satisfaction survey for an online course developed under the Erasmus+ Modernization of Higher Education Project in Central Asia through New Technologies (HiEdTec). The study about the trainees’ satisfaction evaluation aimed to identify aspects of the training program that could contribute to the adoption of innovative pedagogical practices and didactic models in universities in partner countries in Central Asia. In this study, a questionnaire was used to measure the trainees’ satisfaction regarding different aspects of the training program. The results show a clear satisfaction of the trainees in relation to the vast majority of the measured dimensions. The implications of this satisfaction study will have a direct impact on the restructuring of the course, namely with regard to some methodological options to be taken. |
8,775 | Please write an abstract with title: Phased Antenna Array of Radar for Small Sized Civil Helicopters, and key words: Phased arrays, Simulation, Helicopters, Buildings, Transmitting antennas, Receiving antennas, Radar. Abstract: In recent years, small sized and unmanned helicopter equipment has become very widespread in the civilian area. Often when piloting small sized helicopters, there is a danger of collision with the crown of trees, unlit roofs of buildings, as well as with power lines. This problem is especially acute at night or in conditions of limited visibility. To prevent helicopter collisions with various obstacles, it is advisable to use a radar. In this regard, this article provides an overview of the concept of building a radar for small sized civil helicopters. In particular, the structures of the phased antenna arrays of the radar are considered and their directivity patterns are presented. |
8,776 | Please write an abstract with title: Synthetic evaluation of enterprises future profitability based on neural networks, and key words: Profitability, Neural networks, Finance, Neurons, Ink, Large-scale systems, Telephony, Equations, Entropy, Uncertainty. Abstract: After analyzing the advantages and disadvantages of common multi-target synthetic evaluation in determining enterprises future profitability, this paper gives the method of multi-target synthetic evaluation based on neural networks, and applies it to the evaluation of enterprises future profitability. The simulation result demonstrates that this method is satisfactory. |
8,777 | Please write an abstract with title: Habituation to Pseudo-Ambient Vibrotactile Patterns for Remote Awareness, and key words: Vibrations, Legged locomotion, MIMICs, Buildings, Rendering (computer graphics), Skin, Haptic interfaces. Abstract: Habituation is a key aspect of the human sensory processing system. This includes the sense of touch, since it allows our skin receptors to be constantly stimulated, yet largely ignored until something of interest occurs or we consciously focus our attention on the sensations and their meanings. This "ambience" is largely lacking in mobile and wearable systems today, as jarring notifications clamor for our attention. Yet, there are few longitudinal, in-the-wild studies that explore whether and how users can habituate to new ongoing haptic stimuli, especially in practical applications. We report on a three-week in-the-wild study with each participant wearing a vibrotactile device throughout every day. The device rendered two brief vibrotactile pulses every 20 seconds, and varied their durations based on a linked partner’s current activity. Some participants had little difficulty acclimating to the system from the very beginning, but practically all expressed at least some days of annoyance/distraction within the first week. Despite considerable variation among participants, we find a significant drop in both annoyance and distraction over the multiple weeks of the study. A clear majority no longer report annoyance or distraction by the end of the experiment, indicating habituation. |
8,778 | Please write an abstract with title: Deep Reinforcement Learning-based Computation Offloading in Vehicular Networks, and key words: Cloud computing, Energy consumption, Reinforcement learning, Time-varying channels, Load management, Servers, Internet of Things. Abstract: With the rapid development of 5G communications and the Internet of Things (IoT), vehicular networks have enriched people’s lives with abundant applications. Since most of such applications are computation-intensive and delay-sensitive, it is difficult to guarantee the requirements of low latency and low energy consumption by relying on vehicles only. In addition, low latency has posed great challenge to the cloud computing. Therefore, as a promising paradigm, Mobile Edge Computing (MEC) is developed for vehicular networks to relieve the pressure on vehicles, which means to offload tasks to edge servers. However, existing studies mainly consider a constant channel scenario and ignore load balancing of edge servers in the system. In this paper, deep reinforcement learning is adopted to build an intelligent offloading system, which can balance the load balancing in the time-varying channel scenario. First, we introduce a communication model and a calculation model. Then the offloading strategy is formulated as a joint optimization problem. Furthermore, a deep deterministic policy gradient (DDPG) algorithm based on priority experience replay in the distributed scheme, which considers the load balancing, is proposed. Finally, performance evaluations illustrate the effectiveness and superiority of the proposed algorithm. |
8,779 | Please write an abstract with title: Generation of Kilowatt/Kilovolt Broadband Micowave Bursts with a Single Picosecond Photoconductive Switch, and key words: Photoconductivity, Optical pulse generation, Microwave generation, Optical pulses, Coaxial components, Voltage, Optical switches, Resonance, Gallium arsenide, Pulse generation. Abstract: A single picosecond GaAs photoconductive switch is used to pulse excite a microwave resonant cavity, generating various microwave waveforms. The generation of over 7 kW, with peak to peak voltage over 1.2 kV, of broadband microwave bursts is demonstrated. |
8,780 | Please write an abstract with title: Box-Covering Fractal Dimension of Complex Network: From the View of Effective Distance, and key words: Complex networks, Information processing, Media, Fractals. Abstract: The fractal property of networks, that is, self-similarity, is a basic but important topic in the area of complex networks. In the process of studying the fractal characteristics of complex networks, the topological distance of unweighted networks is often used to represent the network. However, this ignores some local information of the network, such as the contribution of edges to node degrees. It is inconsistent with common sense. Therefore, in this paper, we propose a new algorithm which replace the traditional topological distance with the effective distance to calculate fractal dimension reasonably. Moreover, we apply this algorithm to five real networks, and the experiment results show the effectiveness and correctness of using effective distance instead of topological distance. |
8,781 | Please write an abstract with title: The Alma catalogue of OB stars – II. A cross-match with Gaia DR2 and an updated map of the solar neighbourhood, and key words: stars: massive, catalogues, astrometry, (Galaxy:) solar neighbourhood, Galaxy: structure. Abstract: We cross-match the Alma catalogue of OB stars with Gaia DR2 astrometry and photometry as a first step towards producing a clean sample of massive stars in the solar neighbourhood with a high degree of completeness. We analyse the resulting colour–absolute magnitude diagram to divide our sample into categories and compare extinction estimates from two sources, finding problems with both of them. The distances obtained with three different priors are found to have few differences among them, indicating that Gaia DR2 distances are robust. An analysis of the 3D distribution of massive stars in the solar neighbourhood is presented. We show that a kinematically distinct structure we dub the Cepheus spur extends from the Orion–Cygnus spiral arm towards the Perseus arm and is located above the Galactic mid-plane, likely being related to the recently discovered Radcliffe wave. We propose that this corrugation pattern in the Galactic disc may be responsible for the recent enhanced star formation at its crests and troughs. We also discuss our plans to extend this work in the immediate future. |
8,782 | Please write an abstract with title: Classification of external signal by spiking neural network of bistable Hodgkin-Huxley neurons, and key words: Neurons, Couplings, Neural networks, Brain modeling, Adaptation models, Electroencephalography, Neuroscience. Abstract: We propose a classifier consisting of Hodgkin-Huxley neurons based on the activation of a different number of neurons depending on the external current amplitude. We consider a network with 2 output neurons and train the classifier for 2 external current pulses with different amplitudes by adaptation of the couplings between neurons of the main network and the output neurons. |
8,783 | Please write an abstract with title: ADACOR: a collaborative production automation and control architecture, and key words: Collaboration, Automatic control, Manufacturing processes, Control systems, Manufacturing automation, Production systems, Coordinate measuring machines, Production facilities, Production control, Centralized control. Abstract: Manufacturers are under enormous pressure to comply with market changes and the continual shortening of product life cycles. An analysis of the ADACOR collaborative manufacturing control architecture from the point of view of the Collaborative Manufacturing Management paradigm shows how ADACOR (adaptive holonic control architecture for distributed manufacturing system) supports integration and extension across the manufacturing value chain. |
8,784 | Please write an abstract with title: Research on Enterprise Quality Innovation of VE and DMAIC Tool Integrated Application, and key words: Technological innovation, Histograms, Costs, Control charts, Internet, Electronic commerce, Six sigma. Abstract: DMAIC process implementation of Six Sigma methodology in this research, combined with the value Engineering (VE), launched the project implementation. This study uses a variety of advanced quality management theory and methods, such as permutation graph, incidence graph, line graph, control chart, histogram and other QC tools, value function analysis of value engineering (VE) method, and the DMAIC, SINPOC six sigma tools. In the improvement phase, this study uses the DOE orthogonal experiment method to reduce the number of experiments, the cost of the experiment, and improve the company's quality management level and core competitiveness. |
8,785 | Please write an abstract with title: The Design Overview of the Hybrid Doherty-Outphasing Technique, and key words: Degradation, Power amplifiers, Topology, Power generation, Communication standards. Abstract: In this paper, the hybrid Doherty-Outphasing technique is explained and constructed conceptually. In Doherty power amplifiers, several topologies are used to accomplish a larger back-off value. Nevertheless, these circuits have a serious disadvantage: the degradation of the power-added efficiency between the maximum back-off efficiency and the peak output power points. As an aim of this paper, the applicability of the Chireix combining technique to Doherty power amplifiers is inquired to achieve a flatter and wider efficiency response. |
8,786 | Please write an abstract with title: Blended Learning in the IT Educational Programme: an Example of the Programming Technologies Course, and key words: Paper technology, Hybrid learning, Information technology, Engineering education, Programming profession. Abstract: This paper researches the blended learning technology usage for realization of the "Programming Technologies" course included in the IT programme under study in Ural Federal University. Today, blended learning has become not only prospective technology but the real necessity. The question now is not whether to blend or not; it is how to design an effective blend. In this paper, technologies, information platforms used for learning, and concepts underlying the course are under discussion. One of the concepts – cross-cutting technology usage – is discussed in detail. The results of the course accomplished by the final test are presented at the end of the paper. This course implementation in 2020 was a pilot one, and, according to the results, this experiment was recognized as a successful one in terms of the learning effect. Usage of different channels, technologies and teaching methods in combination has proved the effectiveness of blended learning, while the results obtained in each activity (in terms of marks) have balanced each other. |
8,787 | Please write an abstract with title: MFM study of magnetic dot patterns of different dimensions, and key words: Magnetic force microscopy, US Department of Transportation, Magnetic recording, Perpendicular magnetic recording, Magnetization, Magnetic forces, Magnetic properties, Milling, Etching, Disk recording. Abstract: In this paper, we present a magnetic force microscopy (MFM) study of the magnetic dot patterns of different dimensions and spacings. The magnetic dot arrays were obtained using a focused-ion-beam etching technique on a commercial postsputtering longitudinal recording disk media. The "transitions" were created by the discontinuity of magnetization at the edges of each dot. The MFM observation was employed to study the magnetic property of each dot and the dipulse of two transitions created at the edges of two adjacent dots versus different dot spacings. The single domain structures were formed spontaneously as the dot dimension was reduced to 200 nm or less. The dipulse was still observed as the spacing between the dots is reduced to around 10 nm. |
8,788 | Please write an abstract with title: A Scalable Design for Photonic Quantum Random Number Generators, and key words: Generators, Information entropy, Electrooptical waveguides, Photonics. Abstract: We introduce a novel method to controllably improve the performance of photonic quantum random number generators by using minimum information entropy per bit as a standalone design parameter. |
8,789 | Please write an abstract with title: A New Neuromorphic Computing Approach for Epileptic Seizure Prediction, and key words: Sensitivity, Neuromorphic engineering, Wearable computers, Energy efficiency, Electroencephalography, Convolutional neural networks, Computational complexity. Abstract: Several high specificity and sensitivity seizure prediction methods with convolutional neural networks (CNNs) are reported. However, CNNs are computationally expensive and power hungry. These inconveniences make CNN-based methods hard to be implemented on wearable devices. Motivated by the energy-efficient spiking neural networks (SNNs), a neuromorphic computing approach for seizure prediction is proposed in this work. This approach uses a designed gaussian random discrete encoder to generate spike sequences from the EEG samples and make predictions in a spiking convolutional neural network (Spiking-CNN) which combines the advantages of CNNs and SNNs. The experimental results show that the sensitivity, specificity and AUC can remain 95.1%, 99.2% and 0.912 respectively while the computation complexity is reduced by 98.58% compared to CNN, indicating that the proposed Spiking-CNN is hardware friendly and of high precision. |
8,790 | Please write an abstract with title: UIPDroid: Unrooted Dynamic Monitor of Android App UIs for Fine-Grained Permission Control, and key words: Authorization, Privacy, Prototypes, User interfaces, Control systems, Virtualization, Monitoring. Abstract: Proper permission controls in Android systems are important for protecting users' private data when running applications installed on the devices. Currently Android systems require apps to obtain authorization from users at the first time when they try to access users' sensitive data, but every permission is only managed at the application level, allowing apps to (mis)use permissions granted by users at the beginning for different purposes subsequently without informing users. Based on privacy-by-design principles, this paper develops a new permission manager, named UIPDroid, that (1) enforces the users' basic right-to-know through user interfaces whenever an app uses permissions, and (2) provides a more fine-grained UI widget-level permission control that can allow, deny, or produce fake private data dynamically for each permission use in the app at the choice of users, even if the permissions may have been granted to the app at the application level. In addition, to make the tool easier for end users to use, unlike some other root-based solutions, our solution is root-free, developed as a module on top of a virtualization framework that can be installed onto users' device as a usual app. Our preliminary evaluation results show that UIPDroid works well for fine-grained, per-widget control of contact and location permissions implemented in the prototype tool, improving users' privacy awareness and their protection. The tool is available at https://github.com/pangdingzhang/Anti-Beholder; A demo video is at: https://youtu.be/dT-mq4oasNU |
8,791 | Please write an abstract with title: Directly conductive, flexible, 3D printed, EEG electrodes, and key words: Electrodes, Electric potential, Visualization, Three-dimensional displays, Costs, Shape, Electroencephalography. Abstract: Electroencephalography (EEG) is the non-invasive monitoring of the electrical activity in the brain, and forms a key part of Brain-Computer Interfaces (BCIs). Traditionally EEG instrumentation has been connected to the head using wet Ag/AgCl electrodes in the shape of a (typically) 1 cm disc. However, the conductive gel used increases set up time, and all the electrodes are the same size and shape for all users and head/hair shapes. Recently 3D printed EEG electrodes have been proposed to allow personalised EEG electrodes. However, to-date these have relied on printing a base structure which is then coated in Ag/AgCl. This paper presents 3D printed EEG electrodes using a directly conductive filament. The resulting electrodes do not require a conductive gel or coating, can be personalized, and cost less money and manufacturing time. The new electrodes are characterized in terms of electrical resistance, skin contact impedance and mechanical strength, all showing an acceptable performance. We demonstrate their use for recording Steady-State Visual Evoked Potential (SSVEP) brain responses in comparison to wet and dry Ag/AgCl electrodes. |
8,792 | Please write an abstract with title: High-energy density miniature thermoelectric generator using catalytic combustion, and key words: Thermoelectricity, Combustion, Tellurium, Substrates, Bonding, Ignition, Fuels, Etching, Silicon, Glass. Abstract: This paper describes the components and system of a thermoelectric (TE) generator with a catalytic butane combustor. The combustion chamber with a size of 8 mm/spl times/8 mm/spl times/0.4 mm is etched in a 0.65-mm-thick silicon substrate, and bonded to both sides of a 0.77-mm-thick glass substrate with a thin-film ignition heater. A set of 34 couples of BiTe TE elements, each with a size of 0.65 mm/spl times/0.65 mm/spl times/2 mm, are directly bonded to both sides of the combustor. The combustor without the TE modules was tested using butane as fuel, and self-sustaining combustion and electrical ignition were achieved. Also, nearly 100% combustion efficiency and a uniform temperature distribution were confirmed by gas chromatography and infrared thermoimaging, respectively. When the TE modules were attached to the combustor, however, butane combustion was impossible. The characteristics of TE generation were measured using hydrogen as fuel. When a theoretical combustion power was 6.6 W, the maximum output power of 184 mW was obtained with a load of 5.68 /spl Omega/. The total efficiency in this experiment was 2.8% (184 mW/6.6 W). |
8,793 | Please write an abstract with title: Improved Genetic Algorithm for Multi-agent Task Allocation with Time Windows, and key words: Mechatronics, Sociology, Mathematical models, Resource management, Time factors, Task analysis, Statistics. Abstract: Task allocation is a very important part of multi-agent systems. When assigning tasks to one of the agents in multi-agent systems, many constraints need to be considered to achieve optimal allocation results. In this paper, an improved genetic algorithm (GA) is proposed to solve the multi-agent task allocation with time window constraints. Firstly, the mathematical model of task allocation is established, and the constraint problem of time window is analyzed. The penalty function method is used to deal with the constraint condition. Secondly, the improved Large Neighborhood Search (LNS) is added to the local search to increase the diversity of population, which can make the algorithm easier to jump out of local optimum. Then genetic algorithm is used to solve the multi-agent task allocation problem with time window constraints. Finally, the simulation verifies the optimization performance of the improved algorithm. |
8,794 | Please write an abstract with title: Adversarial Camouflage: Hiding Physical-World Attacks With Natural Styles, and key words: Perturbation methods, Cameras, Robustness, Feature extraction, Distortion, Visualization, Measurement. Abstract: Deep neural networks (DNNs) are known to be vulnerable to adversarial examples. Existing works have mostly focused on either digital adversarial examples created via small and imperceptible perturbations, or physical-world adversarial examples created with large and less realistic distortions that are easily identified by human observers. In this paper, we propose a novel approach, called Adversarial Camouflage (\emph{AdvCam}), to craft and camouflage physical-world adversarial examples into natural styles that appear legitimate to human observers. Specifically, \emph{AdvCam} transfers large adversarial perturbations into customized styles, which are then “hidden” on-target object or off-target background. Experimental evaluation shows that, in both digital and physical-world scenarios, adversarial examples crafted by \emph{AdvCam} are well camouflaged and highly stealthy, while remaining effective in fooling state-of-the-art DNN image classifiers. Hence, \emph{AdvCam} is a flexible approach that can help craft stealthy attacks to evaluate the robustness of DNNs. |
8,795 | Please write an abstract with title: MITNet: Multi-intention Trajectory Network for Motion Prediction, and key words: Uncertainty, Computational modeling, Pipelines, Mobile agents, Prediction methods, Trajectory, Proposals. Abstract: Predicting the future behavior of mobile agents is critical for real-world applications. It is challenging because the agent's intentions and corresponding behaviors are unknown and multimodal in nature. Recent data-driven motion prediction methods attempt to learn to regress the exact future location or its distribution directly from large amounts of trajectory data. However, these methods are difficult to provide multimodal prediction and synthesis of physical constraints such as traffic rules and movable areas. In this work we propose a novel three-stage motion prediction framework, Multi-intention Trajectory Network (MITNet). Experiments on our logistic dataset and large-scale public trajectory prediction datasets show that MITNet achieves state-of-the-art results both quantitatively and qualitatively. |
8,796 | Please write an abstract with title: Teaching Modern Multithreading in CS2 with Actors, and key words: Multithreading, Message systems, Education, Java, Games, Instruction sets. Abstract: Explosive growth in multiprocessor computing and the pervasive nature of multicore processors has not only made multithreading and related topics such as parallelism, concurrency, synchronization, etc. an essential part of any undergraduate Computer Science curriculum, it has also lead to the addition of newer constructs to support multithreading in many languages. Not only is it important to motivate student interest in this topic, it is important that they are also educated in current methods used in industry. This can mean an increase in material that needs to be covered. Because of the increase in scope of a CS education, teaching topics in parallel and distributed computing in a hands-on manner is challenging, thus it is valuable for educators to explore different methods of educational delivery in order to best engage their students within the limits of curriculum timelines. The actor model is immensely popular in industry and runs some of the most important software today. In this paper, we describe how we are using Actors as a significant part of the multithreading coverage at the CS2 level, for first-year computer science majors. We also describe a semester-long project that involves the use of these concepts to help solidify student understanding and present student feedback on the project and approach. |
8,797 | Please write an abstract with title: An Edge-powered Approach to Assisted Driving, and key words: Connected vehicles, Network topology, Navigation, Roads, Systems architecture, Topology, Optimization. Abstract: Automotive services for connected vehicles are one of the main fields of application for new-generation mobile networks as well as for the edge computing paradigm. In this paper, we investigate a system architecture that integrates the distributed vehicular network with the network edge, with the aim to optimize the vehicle travel times. We then present a queue-based system model that permits the optimization of the vehicle flows, and we show its applicability to two relevant services, namely, lane change/merge (representative of cooperative assisted driving) and navigation. Furthermore, we introduce an efficient algorithm called Bottleneck Hunting (BH), able to formulate high-quality flow policies in linear time. We assess the performance of the proposed system architecture and of BH through a comprehensive and realistic simulation framework, combining ns-3 and SUMO. The results, derived under real-world scenarios, show that our solution provides much shorter travel times than when decisions are made by individual vehicles. |
8,798 | Please write an abstract with title: A multiagent multisensor based security system for intelligent building, and key words: Intelligent systems, Intelligent structures, Power system security, Fault detection, Buildings, Humans, Intelligent sensors, Fires, Fault diagnosis, Laboratories. Abstract: The security of buildings, homes, laboratories, offices and factories is essential to human life. An unlucky event is often caused by human negligence. We have developed a multiagent multisensor-based security system or intelligent building. The system can be widely employed in daily life and can detect dangerous situations using sensors. The structure of the security system is divided into four parts, the fire detection/diagnosis agent, intruder detection/diagnosis agent, environment detection/diagnosis agent, and power detection/diagnosis agent. In this paper, we use an adaptive data fusion method in the fire detection/diagnosis agent and use a rule-based method in the intruder detection/diagnosis agent. We use statistical signal detection theory in the environment detection/diagnosis agent, and use a fault detection and isolation procedure (FDIP) in the power detection/diagnosis agent. The security system has a four-variety detection/diagnosis agent. Finally, we implement these methods using computer simulation and achieve quite satisfactory results. |
8,799 | Please write an abstract with title: Police Force - Traffic Accidents, and key words: Technological innovation, Road accidents, Law enforcement, Filtration, Databases, Roads, Force. Abstract: This article focuses on the topic of the Police Corps project. In the following sections of the article, we will deal with the field of traffic accident data processing. This article describes the goal of the project, the analysis, and processing of data provided for this project, the creation of an information system for processing this data, and the subsequent basic analysis of the data we process. The data on which the analysis is performed is realistic, provided by the police force of the Czech Republic. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.