ID int64 0 400k | content stringlengths 97 5.85k |
|---|---|
9,500 | Please write an abstract with title: Complexificated generalized gaussian beams, and key words: Optical beams, Mercury (metals), Region 8, Structural engineering, Optical propagation, Numerical simulation. Abstract: This work continues the authors' research about mutual transformations of Hermite-Gaussian and Laguerre-Gaussian beams by astigmatic optics. Recently, a parametrical beam family, which contains HG and LG beams as particular cases, has been found. The beams, called Hermite-Laguerre-Gaussian beams, keep some important properties of HG and LG beams, such as completeness, orthogonality and structural stability under propagation. In this work, an additional generalization of HLG beams through a complexification of an introduced parameter is proposed. The generalized beams are investigated theoretically. Results of numerical simulation and experiments are presented. |
9,501 | Please write an abstract with title: Expression-invariant face recognition system using subspace model analysis, and key words: Face recognition, Biometrics, Face detection, Robustness, Humans, Independent component analysis, Principal component analysis, Lighting, Deformable models, Terrorism. Abstract: Face recognition has been recognized as most simple and non-intrusive technology that can be applied in many places. However, there are still many unsolved face recognition problems such as facial deformations, pose or illumination variations. Nonetheless, little research has been done on facial deformation problems. The hypothesis of this research was to determine if a face recognition system could provide robustness to facial deformation problem and its potential applicability. We used the Japanese female facial expression (JAFFE) database as it provides the deformed facial traits for data collection. We used subspace model analysis to analyze the data so as to support our hypothesis. The experimental results indicate that face recognition may be robust to facial changes and applicable. |
9,502 | Please write an abstract with title: Embedded ArUco: a novel approach for high precision UAV landing, and key words: Visualization, Virtual environments, Fiducial markers, Task analysis, Detection algorithms, Standards. Abstract: This paper presents a novel approach for precise UAV landing using visual sensory data. A new type of fiducial marker called embedded ArUco (e-ArUco) was developed specially for a task of a robust marker detection for a wide range of distances. E-ArUco markers are based on original ArUco markers approach and require only ArUco detection algorithms. The applicability of developed markers was validated using UAV landing experiments in a virtual environment. Both a developed marker and a landing algorithm were implemented within the ROS framework and tested in the Gazebo simulator. According to our virtual experiments, an average landing accuracy was 2.03 cm with a standard deviation of 1.53 cm. |
9,503 | Please write an abstract with title: A 9.5nW, 0.55V Supply, CMOS Current Reference for Low Power Biomedical Applications, and key words: MOSFET, Threshold voltage, Immune system, Digital audio players, System-on-chip, Power demand, Transistors. Abstract: This brief proposes an ultra-low-power current reference in TSMC 180nm technology. Temperature compensation is achieved by taking the ratio of compensated voltage and an on-chip resistance. This design uses the concept of the back-gate effect of critical MOSFET to generate complementary to absolute temperature (CTAT) voltage. The circuit works from a supply voltage of 0.55V and is designed for a reference current of 5.6nA. Furthermore, a pseudo-differential amplifier (PD-AMP) helps realize low line regulation of 0.022%/V in the supply range of 0.55 to 1.9V. An average temperature coefficient (TC) of 256.07ppm/°C is achieved for mismatch and process variations in Monte-Carlo simulations for 1000 samples over a temperature range of −30°C to 70°C. The circuit consumes only 9.5nW of power (at room temperature and minimum supply voltage), making it suitable for ultra-low-power biomedical applications. |
9,504 | Please write an abstract with title: Beamer: Stage-Aware Coflow Scheduling to Accelerate Hyper-Parameter Tuning in Deep Learning Clusters, and key words: Training, Data models, Deep learning, Servers, Schedules, Graphics processing units, Tuning. Abstract: Training a neural network requires retraining the same model many times to search for the configuration of hyper-parameters with the best training result. It is common to launch multiple training jobs and evaluate them in stages. At the completion of each stage, jobs with unpromising configurations will be terminated and jobs with new configurations will start. Each job typically performs distributed training across multiple GPUs, and GPUs periodically synchronize their models over the network. However, model synchronizations of running jobs cause severe network congestion, significantly increasing the stage completion time (SCT) and thus the time to successfully search for the desired configuration. Existing flow schedulers are ineffective to reduce SCT since they are agnostic to training stages. In this paper, we propose a stage-aware coflow scheduling method to minimize the average SCT. In this method, an algorithm is designed to order coflows by considering stage information and then coflows are scheduled according to the order. Mathematical analysis shows that the method achieves the average SCT within 20/3 of the optimal. We implement the method in a real system called Beamer. Extensive testbed experiments and simulations show that Beamer significantly outperforms advanced network designs, such as Sincronia, FIFO-LM, and per-flow fair sharing. |
9,505 | Please write an abstract with title: Novel High Efficiency Wireless Energy Harvesting System Based on Metasurface, and key words: Wireless communication, Wireless sensor networks, Simulation, Rectifiers, Receiving antennas, Metasurfaces, Energy harvesting. Abstract: In this paper, a novel high efficiency wireless energy harvesting system based on metasurface is proposed. The periodic receiving antenna array consists of 4x4 subwavelength units with branch square loops. The receiving efficiency of the array can reaches 84%, and the maximum gain is 9.8dB. Also, a high-efficiency rectifier circuit worked at 5.8GHz is designed for the receiving array, the simulation results show that the efficiency is 70% while the input power is 16dBm. The high-efficiency wireless energy harvesting system proposed in this article is a good candidate in wireless energy harvesting to feed some low power electrical appliances. |
9,506 | Please write an abstract with title: Identifying significant genes from microarray data, and key words: Data analysis, Biomedical measurements, Gene expression, Biomedical engineering, Biomedical computing, Computer science, Biomedical informatics, Medical diagnostic imaging, Information science, Information systems. Abstract: Microarray technology is a recent development in experimental molecular biology which can produce quantitative expression measurements for thousands of genes in a single, cellular mRNA sample. These many gene expression measurements form a composite profile of the sample, which can be used to differentiate samples from different classes such as tissue types or treatments. However, for the gene expression profile data obtained in a specific comparison, most likely only some of the genes will, be differentially expressed between the classes, while many other genes have similar expression levels. Selecting a list of informative differential genes from these data is important for microarray data analysis. In this paper, we describe a framework for selecting informative genes, called ranking and combination analysis (RAC), which combines various existing informative gene selection methods. We conducted experiments using three data sets and six existing feature selection methods. The results show that the RAC framework is a robust and efficient approach to identify informative gene for microarray data. The combination approach on two selecting methods almost always performed better than the less efficient individual, and in many cases, better than both. More significantly, when considering all three data sets together, the combination approach, on average, outperforms each individual feature selection method. All of these indicate that RCA might be a viable and feasible approach for the microarray gene expression analysis. |
9,507 | Please write an abstract with title: Information theory-based analysis of partial and total occlusion in object tracking, and key words: Information analysis, Mutual information, Target tracking, Motion estimation, Computer vision, Transmitters, Informatics, Testing, Application software, Particle measurements. Abstract: Metrics based on mutual information and not resorting to ground truth data are proposed in this paper in order to measure tracking reliability under occlusion., The variations of the proposed metrics can be used as a quantitative estimate of changes in the tracking region, caused by occlusion, sudden movement or the deformation of the tracked object. The proposed metric was tested on an object tracking scheme using multiple feature point correspondences. Experimental results have shown that mutual information can effectively characterize object appearance and reappearance in many computer vision applications. |
9,508 | Please write an abstract with title: A 700kHz 800V/14V GaN-based DC-DC Converter with optimized Integrated Transformer for Electrical Vehicles, and key words: Power system measurements, Switching frequency, Prototypes, DC-DC power converters, Voltage, Switches, Zero voltage switching. Abstract: This paper proposes a high-step-down DC-DC converter for electric vehicles (EVs) with 800V battery system. The output of the input series half bridge (ISHB) converter is reconstructed to reduce the DC blocking capacitor in secondary. The maximum duty cycle of the proposed converter can be larger than 0.5, which allows the use of larger leakage inductance. This turns out to be a crucial advantage to achieve fully range ZVS in high switching frequency over 500kHz. The two transformers are integrated with partial cancellation, resulting in 20% of power loss and 32% of footprint reduction. A prototype of 1.2kW base on GaN devices achieves a power density of 10.2kW/1. Obtained maximum efficiency was up to 93%. Experiment results are provided to verify the proposed concepts. |
9,509 | Please write an abstract with title: A High Cooperativity Silicon Nitride Optomechanical Transducer, and key words: Transducers, Stationary state, Optical resonators, Silicon nitride, Mechanical variables measurement, Thermal noise, Land surface temperature. Abstract: Mechanical resonators are a canonical system for the exploration of quantum measurements. Milestones such as cooling to the ground state and generation of squeezed light have been demonstrated, but so far typically at cryogenic temperatures [1] , [2] . Room temperature operation would allow these effects to be observed in simplified experimental setups and potentially enable new applications inside and outside the laboratory. However, at room temperature, the thermal noise of a mechanical resonator usually dominates the quantum backaction of light and prohibits entering the quantum regime of optomechanics. Therefore, reduced mechanical dissipation is required to isolate the system from the environment. We present a platform that solves this problem: a nano-optomechanical transducer using high stress Si 3 N 4 , which features a one-dimensional Fabry-Pérot optical cavity integrated with a high aspect ratio nanobeam mechanical resonator reaching single photon optomechanical cooperativity exceeding 10 3 . |
9,510 | Please write an abstract with title: SMOS L-VOD Retrieved by Level 2 Algorithm and its Correlation With GEDI LIDAR Products, and key words: Vegetation mapping, Instruments, Forestry, Laser radar, Correlation, Vegetation, Laser beams. Abstract: In this article, L-band vegetation optical depth (L-VOD) retrieved by Soil Moisture and Ocean Salinity (SMOS) in four large continents is compared against vegetation parameters (RH100 and PAI) retrieved by Global Ecosystem Dynamics Investigation (GEDI) LIDAR instrument, recently launched by NASA. In order to manage the different spatial resolutions, GEDI parameters were averaged within SMOS pixels and a threshold to the minimum number of GEDI samples per SMOS pixel was applied. Spatial correlations between monthly averages were investigated from May 2019 to April 2020. For continents mostly covered by tropical vegetation (Africa and South America), the Pearson correlation coefficients between L-VOD and RH100 are higher than 0.8 in all months of the year. Conversely, seasonal effects are observed in North America and Asia, producing a lower correlation in colder months. RMS differences between L-VODs retrieved by SMOS and the ones obtained using a linear regression over RH100 are lower than 0.2 for all cases, and close to 0.1 for most cases. Using PAI in place of RH100 slightly lower spatial correlations are generally achieved. Overall, the obtained results confirm the good potential of L-VOD to monitor vegetation height in different environments. |
9,511 | Please write an abstract with title: Deep Recurrent Semi-Supervised EEG Representation Learning for Emotion Recognition, and key words: Training, Emotion recognition, Computational modeling, Supervised learning, Pipelines, Training data, Benchmark testing. Abstract: EEG-based emotion recognition often requires sufficient labeled training samples to build an effective computational model. Labeling EEG data, on the other hand, is often expensive and time-consuming. To tackle this problem and reduce the need for output labels in the context of EEG-based emotion recognition, we propose a semi-supervised pipeline to jointly exploit both unlabeled and labeled data for learning EEG representations. Our semi-supervised framework consists of both unsupervised and supervised components. The unsupervised part maximizes the consistency between original and reconstructed input data using an autoencoder, while simultaneously the supervised part minimizes the cross-entropy between the input and output labels. We evaluate our framework using both a stacked autoencoder and an attention-based recurrent autoencoder. We test our framework on the large-scale SEED EEG dataset and compare our results with several other popular semi-supervised methods. Our semi-supervised framework with a deep attention-based recurrent autoencoder consistently outperforms the benchmark methods, even when small sub-sets (3%, 5% and 10%) of the output labels are available during training, achieving a new stateof-the-art semi-supervised performance. |
9,512 | Please write an abstract with title: Optimal MAC structures in an FPGA, and key words: Field programmable gate arrays, Delay, Hardware, Digital signal processing, Application software, Costs, Array signal processing, Finite impulse response filter, Logic arrays, Clocks. Abstract: Field programmable gate arrays (FPGA) are rapidly gaining popularity for signal processing applications. Multiplication, addition and multiply-accumulate (MAC) are the most important building blocks in signal processing. This paper compares a number of structures to find the optimum configurations for minimum delay, size and cost in an FPGA. |
9,513 | Please write an abstract with title: Design and Evaluation of Pint-Sized Gyroscopic Actuators, and key words: Actuators, Torque, Mechatronics, Fluid dynamics, Velocity control, Stability analysis, Gyroscopes. Abstract: One important aspect of gait stability is the control of whole-body centroidal angular momentum H. We recently showed that if sensory-motor impairments affect a person’s balance control, control of H can be assisted by control moment gyroscopes (CMGs). However, the effect of CMG technology inherently depends on the size and weight of these actuators, and on the speed of the flywheels they contain. These factors all pose challenges for wearable applications. Here, we show that it is possible to design CMGs light enough for wearable applications, while generating meaningful output torques. Our CMG, weighing 1.187 kg, can exert a peak torque of 15 N m with a torque-tracking bandwidth of 18 Hz. These results are partly due to an integrated model of components and partly to advancements in flywheel velocity control, allowing the speed to safely reach 20 000 rpm. These actuators open up new pathways of building wearable assistive devices for clinical applications. |
9,514 | Please write an abstract with title: Finline Taper Design Made Easy, and key words: Finline, Fabrication, Impedance, Coupling circuits, Polynomials, Geometry, Millimeter wave circuits, Millimeter wave technology, Production, Rectangular waveguides. Abstract: In this paper a method is presented which permits the quick and exact fabrication of tapers in finline technique. This method uses tapers in the form of circular area which are matched to the slotwidth as a function of the characteristic impedance. For the application of the described method the field distributions and the characteristic impedances of finlines must be known. |
9,515 | Please write an abstract with title: Automatic Load shedding Time management using Arduino, and key words: Power demand, Power distribution, Load shedding, Switches, Real-time systems, Task analysis, Power generation. Abstract: Electricity is a basic necessity for most appliances in modern machinery. There are varieties of applications that are dependent on electricity without which they are of no use. In day-to-day life, electricity is continuously modernizing and improving in the market. As the technologies are moving towards automation and automatic machines, the necessity of load shedding comes when the demand capacity is more than that of power generation capacity. Industries and companies are manufacturing modern circuits that help simplify lifestyle. The model is designed in such a way that it provides a very stable and efficient load shedding technique that takes over the manual operation of ON/OFF with respect to real-time. The Real-time clock DS1302 is interfaced with Arduino Uno. Our motto in this design is to program and execute the operation of load shedding automatically with an electrical load numerous times. By implementing this design one can overcome the challenges of manual action and operation of ON/OFF. |
9,516 | Please write an abstract with title: ETL Process in a Federal Educational Institution : Obtaining Functional Information and Geolocation of Retired Servers, and key words: Education, Transforms, Organizations, Tools, Data warehouses, Spatial databases, Data mining. Abstract: The ETL (Extract, Transform and Load) process is part of the Intelligent Business (BI) tools. It is used in organizations, public and private, to compile and process data, as well as perform extraction, cleaning, optimization and unification of various sources and loads of data in a Data Warehouse. BI makes it possible to achieve more accurate results, using a multidimensional database, oriented by subject, non-volatile, historical, decision-making and variable in relation to time. The ETL process proved to be an effective tool in the management of retired employees of a Federal Educational Institution, since it enabled the development of a base of indicators, through the BI, quantitative, qualitative and geographic tools of these employees. With the unification of the various databases, it was possible to identify the spatial location of the servers, allowing faster contact, their concentration by age group, the level and intensity of the links between the parties, as well as the evolution of health-related issues, evolution of retirement, mainly in legal matters. Thus, this article describes the ETL process designed to extract information about retired employees from different data sources and the creation of a Data Warehouse capable of providing individual and group information about these retired employees. |
9,517 | Please write an abstract with title: Spatial Analysis of the Spread of Tuberculosis Cases Based on Socio-Economic Factors Using Distance-Based Algorithm, and key words: Tuberculosis, Urban areas, Sociology, Data visualization, Clustering algorithms, Lung, Planning. Abstract: Tuberculosis is a contagious infectious disease that is one of the ten most deadly diseases in the world. Indonesia itself is the third highest country in the case of the spread of tuberculosis. Therefore, comprehensive supervision is needed by grouping tuberculosis cases by region. The aim is to obtain the results of the spatial analysis of tuberculosis mapping based on age, gender, and socio-economic factors by utilizing data mining and the K-Means clustering algorithm. Then, the spatial distribution pattern is visualized using a geographic information system (GIS). The tuberculosis case data used is secondary data obtained from the Makassar Community Lung Health Center (BBKPM) for the last three years (2018 - 2020). From the results of the analysis, it was found that the highest tuberculosis cases were dominated by elderly men. Meanwhile, the highest spread of tuberculosis was in the Panakukang sub-district which was dominated by adult males. The results of this study can be used to assist in making decisions about tuberculosis case-control planning in Makassar City. |
9,518 | Please write an abstract with title: Semantic Network Based Approach to Compute Term Semantic Similarity, and key words: Semantics, Knowledge based systems, Natural language processing, Knowledge engineering, Computational modeling, Taxonomy, Probabilistic logic. Abstract: Measuring semantic similarity between two terms is essential for a variety of text analytics and understanding applications.This paper presents a approach for measuring the semantic similarity between terms. Previous work on semantic similarity methods have focused on either the structure of the semantic network between terms, or only on the Information Content (IC) of terms. However, existing approaches are limited by the size of the knowledge base and corpus. We propose an efficient and effective approach for computing semantic similarity using a large scale semantic network. This approach base on Probase, which is a big graph of concepts. Knowledge in Probase is harnessed from billions of web pages and years' worth of search logs. Through experiments performed on well known word similarity datasets, we show that our approach is much more efficient than all competing algorithms. |
9,519 | Please write an abstract with title: Dynamic Authentication-Based Secure Access to Test Infrastructure, and key words: Instruments, Europe, Controllability, Security, History, Observability, Standards. Abstract: The complexity of modern Systems-on-Chips is steadily increasing, which poses hard challenges for testing. In order to be able to face those challenges, several standards have been proposed through history, such as the latest IEEE 1687 on Reconfigurable Scan Networks (RSNs), which allows dynamic configuration of the test infrastructure for an easier access to embedded instruments and data. This ease of access, however, may constitute a serious threat from the point of view of security, as it may be used by an attacker as an entry point to the internal state of the circuit, especially if the test infrastructure is reused for life-time testing. Some approaches exist to protect the access, but their performances and security levels are limited by the legacy view of test as a static process. In this paper, we propose an innovative solution that exploits the dynamic nature of the IEEE 1687 standard to obtain an Authentication-based Secure Access framework able to provide a trusted and personalized interface to the test infrastructure depending on user-defined security levels. |
9,520 | Please write an abstract with title: Numerical Modelling of Humidity Behaviour in the Electronics Housing, and key words: Heating systems, Atmospheric modeling, Electric shock, Corrosion, Moisture, Humidity, Predictive models. Abstract: Exposure of electronics into harsh climate conditions leads to about 40 % typical humidity related failure modes on PCBA of the total electronics failures. These humidity related failures are mainly electrochemical migration, corrosion, leakage currents and conductive anodic filament formation. Numerical modelling and prediction of humidity and temperature is very useful in the electronics design as it may help in postponing electronics humidity related failures and prolonging the electronics lifetime. Thus, the work concerns the moisture transport into electronics housing when the housing is exposed to a step change in ambient temperature and relative humidity. Such exposure of electronics housing can be considered as thermal and humidity shock. The RC model is developed and used to predict the temperature and humidity behaviour based on the heat and mass transfer mechanisms. Moreover, the heating effect was also considered in the study. The response of humidity and temperature were simulated and analysed inside the air-filled volume and the wall material of the housing. |
9,521 | Please write an abstract with title: Segmentation of Images Using Deep Learning: A Survey, and key words: Deep learning, Image segmentation, Computer vision, Image coding, Surveillance, Benchmark testing, Writing. Abstract: In this present era of technology, segmentation of image is a fundamental and significant component of computer vision and image processing applications. These applications include medical image analysis, compression of images, surveillance, security footage, and many others. Researchers have proposed and developed various models, theories, and algorithms in this advancing field of image segmentation. Due to the success of a wide range of computer vision applications, work whose goal was to use deep learning algorithms for the development and usability of image segmentation was completed not long ago. In this study, a detailed review of the literature on image segmentation is being written, which covers a vast and extensive amount of work done by researchers at the time of writing this review. This review investigates the similarity and differences between the proposed models by researchers in the past. Along with similarities, we have also discussed the strength and challenges of the model under the umbrella of deep learning algorithms. In the end, future work has been discussed along with keeping in view the past work of researchers. |
9,522 | Please write an abstract with title: Identifying Playstyles in Games with NEAT and Clustering, and key words: Conferences, Games, Topology, Genetic algorithms. Abstract: In the research of agents playing computer games, attempts have been made to create agents with particular playstyles. A typical approach adopted in previous studies is to define the reward functions so that the agent has the desired playstyle. However, based on this approach, it is difficult to identify other playstyles that have not been specified in advance. The purpose of this paper is to create agents with playstyles by combining a genetic algorithm called NeuroEvolution of Augmenting Topologies (NEAT) and clustering based on the logs of gameplay by agents. Here, individuals of NEAT are classified in some species by clustering according to the play log and crossed with the same species. We evaluated our method by an experiment with a roguelike game and observed that multiple playstyles were identified. Furthermore, by comparing the proposed method with the method using only NEAT, it was shown that the bias in the number of individuals among playstyles can be suppressed. |
9,523 | Please write an abstract with title: WaveSpy: Remote and Through-wall Screen Attack via mmWave Sensing, and key words: Liquid crystal displays, Password, Liquid crystals, Radio frequency, Probes, Sensors. Abstract: Digital screens, such as liquid crystal displays (LCDs), are vulnerable to attacks (e.g., "shoulder surfing") that can bypass security protection services (e.g., firewall) to steal confidential information from intended victims. The conventional practice to mitigate these threats is isolation. An isolated zone, without accessibility, proximity, and line-of-sight, seems to bring personal devices to a truly secure place.In this paper, we revisit this historical topic and re-examine the security risk of screen attacks in an isolation scenario mentioned above. Specifically, we identify and validate a new and practical side-channel attack for screen content via liquid crystal nematic state estimation using a low-cost radio-frequency sensor. By leveraging the relationship between the screen content and the states of liquid crystal arrays in displays, we develop WaveSpy, an end-to-end portable through-wall screen attack system. WaveSpy comprises a low-cost, energy-efficient and light-weight millimeter-wave (mmWave) probe which can remotely collect the liquid crystal state response to a set of mmWave stimuli and facilitate screen content inference, even when the victim’s screen is placed in an isolated zone. We intensively evaluate the performance and practicality of WaveSpy in screen attacks, including over 100 different types of content on 30 digital screens of modern electronic devices. WaveSpy achieves an accuracy of 99% in screen content type recognition and a success rate of 87.77% in Top-3 sensitive information retrieval under real-world scenarios, respectively. Furthermore, we discuss several potential defense mechanisms to mitigate screen eavesdropping similar to WaveSpy. |
9,524 | Please write an abstract with title: An improved design of microstrip patch antennas using photonic bandgap structure, and key words: Microstrip antennas, Patch antennas, Photonic band gap, Harmonics suppression, Resonant frequency, Power system harmonics, Impedance matching, Resonance, Antenna feeds, Inductance. Abstract: Microstrip antennas inherently have a high input impedance at resonant frequency. This may not be convenient for some applications. For active integrated antennas, moreover, the radiated power of microstrip antennas needs to be very low at harmonic frequencies. The main goals of this study are impedance matching and harmonic suppression of microstrip antennas. In order to meet these requirements, two one-dimensional (1-D) photonic bandgap (PBG) structures, namely, the defected ground structure (DGS) and the compact microstrip resonant cell (CMRC), are applied to the feed line of microstrip antennas. The characteristic impedance of the microstrip line is controlled by the additional effective inductance of the PBG structure. Without any matching circuits, microstrip antennas can be easily fed by a simple 50 /spl Omega/ microstrip line with a PBG structure at the operating frequency. Additionally, the second harmonic of the proposed antennas is properly suppressed compared to a conventional antenna. Measured results indicate that the two PBG structures are quite effective for harmonic suppression. Therefore, the proposed antennas are suitable for active integrated antennas. |
9,525 | Please write an abstract with title: PLC Channel Selection Schemes for OFDM-based NB-PLC Systems, and key words: Power line communications, Attenuation, Smart grids, Complexity theory, Noise measurement, Data communication, Signal to noise ratio. Abstract: Narrow-band (NB) power line communication (PLC) is a key technology for supporting different smart grid applications. It uses the existing power-grid infrastructure to provide cost-efficient data transmissions between the different nodes of an electrical grid. However, channel attenuation and high unpredictable noise levels may degrade the performance of the NB-PLC systems. The impact of these two impairments on PLC systems can be reduced by using an efficient and dynamic channel selection scheme. In this paper, we propose two PLC channel selection schemes: a single-channel based scheme (SCS), and a multi-channel based scheme (MCS). They are based on the up-link and the down-link signal-to-noise ratios, and the successful transmission probabilities (STP) between the different nodes in the considered network. The first scheme involves selecting the best single channel for the entire network that offers the maximum number of connected nodes. The second scheme works under the assumption that different channels can be used for each link. Field measurements-based simulations are used to evaluate the proposed schemes. |
9,526 | Please write an abstract with title: Feature selection forcing overtraining may help to improve performance, and key words: Feedforward systems, Neural networks, Feedforward neural networks, Learning systems, Testing, Performance evaluation, Machine learning, Psychology, Security. Abstract: One of the main drawbacks of machine learning systems is the negative effect caused by overtraining. If the points in the dataset are perfectly fitted, the generalization performance is usually bad. We propose to take profit of overtraining, together with Feature Selection, to improve the performance of a learning system. The main idea lies in the hypothesis that when the dataset is as fitted as possible, the system is forced to use all the available variables as much as possible. Noisy and useless variables can be detected if generalization improves when the system is not allowed to use them. Forcing overtraining, noisy and useless variables should be more outstanding. In order to test this hypothesis, we performed several Feature Selection experiments using Feedforward Neural Networks. The particular Feature Selection procedure used was Sequential Backward Selection. Experimental results with several real-world problems suggest that our hypothesis seems to be well-founded. Ironically, forcing overtraining may help to achieve good performance. |
9,527 | Please write an abstract with title: Efficient One-Shot Video Object Segmentation, and key words: Computer science, Image segmentation, Object segmentation, Computer architecture, Labeling. Abstract: Video object segmentation is the problem of labelling the foreground object of interest that has widespread applications. We reevaluate One-shot Video Object Segmentation (OSVOS), a simple method that adapts VGG to image segmentation using a structure similar to a Fully Convolutional Network. We propose a range of improvements to make OSVOS competitive to newer methods while keeping its simplicity. Specifically, we replace VGG with EfficientNet, and adopt the U-net architecture. We also utilize Focal Loss and Dice Loss to handle the imbalanced binary classification, and finally we remove the boundary snapping module. With our amendments, we achieve 82.4% J&F on DAVIS 2016 validation set, an improvement over the original 80.2% of OSVOS. We also achieve much faster inference time per frame than OSVOS. |
9,528 | Please write an abstract with title: Embedded Monitoring of Covellar Carbon Monoxide Detection and Air freshening in Air Trained Automotives, and key words: Technological innovation, Sleep, Planets, Ventilation, Carbon monoxide, Carbon, Respiratory system. Abstract: Carbon monoxide (CO) is a dry, unscented gas created as a side-effect of deficient ignition of hydrocarbons. CO ties quickly to Hemoglobin (Hb), prompting the development of carboxyhemoglobin (COHb), so the oxygen conveying limit of the blood will be diminished and causing tissue hypoxia. Starting indications of breathing in CO is discombobulation, sleepiness, disarray, windedness and trouble relaxing. Incidental carbon monoxide harming in vehicles can happen due to spilling debilitates and lacking ventilation. This is because of the distribution of air inside shut vehicles for long time. A model is made to screen carbon monoxide focus level in vehicles produced from climate control system and robotized air ventilation framework is fused in it. On the off chance that the degree of CO fixation increments above limit esteem (50 sections for each million (ppm) in air) the air ventilation framework begins naturally. Moreover, grouping of Carbon monoxide (CO) and air ventilation frameworks are effectively observed utilizing a versatile application. The fundamental target of this examination work is to dispense with the gamble of human existence by checking Carbon monoxide level in vehicles and programmed air ventilation executes when CO focus reaches out past edge. |
9,529 | Please write an abstract with title: Wireless Crowd Charging with Battery Aging Mitigation, and key words: Wireless communication, Protocols, Computational modeling, Wearable computers, Aging, Ubiquitous computing, Batteries. Abstract: Battery aging is one of the major concerns for the pervasive devices such as smartphones, wearables and laptops. Current battery aging mitigation approaches only partially leverage the available options to prolong battery lifetime. In this regard, we claim that wireless crowd charging via network-wide smart charging protocols can provide a useful setting for applying battery aging mitigation. In this paper, for the first time in the state-of-the-art, we couple the two concepts and we design a fine-grained battery aging model in the context of wireless crowd charging, and two network-wide protocols to mitigate battery aging. Our approach directly challenges the related contemporary research paradigms by (i) taking into account important characteristic phenomena in the algorithmic modeling process related to fine-grained battery aging properties, (ii) deploying ubiquitous computing and network-wide protocols for battery aging mitigation, and (iii) fulfilling the user QoE expectations with respect to the enjoyment of a longer battery lifetime. Simulation-based results indicate that the proposed protocols are able to mitigate battery aging quickly in terms of nearly 46.74-60.87 % less reduction of battery capacity among the crowd, and partially outperform state-of-the-art protocols in terms of energy balance quality. |
9,530 | Please write an abstract with title: The frequency design of nozzles layout of the piezoelectrically actuated micro droplet generator based on a fluid-solid interaction modal analysis, and key words: Modal analysis, Piezoelectric films, Resonant frequency, Piezoelectric transducers, Numerical simulation, Resonance, Production, Drugs, Medical treatment, Couplings. Abstract: Generally, the behavior of a micro droplet generator is related to its resonant frequency, near which the pressure wave in the liquid chamber reaches maximum amplitude. However, the pressure wave distributes differently under different frequencies, and this leads to the fact that not all nozzles produce droplet ejection in one operating cycle under a certain frequency. Those nozzles not working negatively affect those working well, and even make the device fail. We study numerically and experimentally the effect of nozzle layout on the droplet ejection of a droplet generator with arrayed nozzles. The experimental and numerically predicted results agree very well and prove that only increasing the number of nozzles may not enhance droplet generation, and the design of nozzle layout from the point of view of the pressure wave resonant mode is necessary for a nozzle array droplet generator. |
9,531 | Please write an abstract with title: Extension of all-optical network-transparent domains based on normalized transmission sections, and key words: Optical fiber networks, Wavelength division multiplexing, Optical design, Degradation, Signal design, Design optimization, Fiber nonlinear optics, Nonlinear optics, Stimulated emission, Optical design techniques. Abstract: This paper presents a technique that significantly simplifies the design and operation of transparent optical wavelength-division-multiplexing (WDM) networks. Since most of the signal degradations arise due to the interaction of linear and nonlinear physical effects along the fiber links, a link design concept based on erbium-doped fiber amplification is developed and optimized such that originally degrading effects mutually compensate each other, leading to approximately noise-limited transmission. In extensive numerical simulations as well as laboratory experiments, an optimized modular link design is identified. Regenerator-free transmission of a single-channel 10-Gb/s nonreturn-to-zero signal over 4000 km is achieved in a recirculating loop experiment with less than a 3-dB penalty. Reliable WDM transmission is demonstrated over 1600 km, showing the high robustness of this concept. Finally the link design concept is applied in a WDM field trial using deployed standard single-mode fibers (S-SMFs) of the optical network infrastructure of Deutsche Telekom. Between the German cities of Berlin and Darmstadt, 10-Gb/s synchronous digital hierarchy (SDH)-based data, 10-Gb/s duobinary-encoded data, and a native Gigabit Ethernet signal have been transmitted error-free over a maximum distance of 1720 km, thus demonstrating the feasibility of the design concept under realistic field conditions. The presented design approach substantially supports link setup and rerouting procedures by supplying simple rules to identify the maximum number of dispersion-compensated S-SMF amplified spans which can be cascaded for a given tolerable penalty. |
9,532 | Please write an abstract with title: Controllable Orthogonalization in Training DNNs, and key words: Training, Matrix decomposition, Convergence, Neural networks, Eigenvalues and eigenfunctions, Covariance matrices, Jacobian matrices. Abstract: Orthogonality is widely used for training deep neural networks (DNNs) due to its ability to maintain all singular values of the Jacobian close to 1 and reduce redundancy in representation. This paper proposes a computationally efficient and numerically stable orthogonalization method using Newton's iteration (ONI), to learn a layer-wise orthogonal weight matrix in DNNs. ONI works by iteratively stretching the singular values of a weight matrix towards 1. This property enables it to control the orthogonality of a weight matrix by its number of iterations. We show that our method improves the performance of image classification networks by effectively controlling the orthogonality to provide an optimal tradeoff between optimization benefits and representational capacity reduction. We also show that ONI stabilizes the training of generative adversarial networks (GANs) by maintaining the Lipschitz continuity of a network, similar to spectral normalization (SN), and further outperforms SN by providing controllable orthogonality. |
9,533 | Please write an abstract with title: EEG Electrode Selection for a Two-Class Motor Imagery Task in a BCI Using fNIRS Prior Data, and key words: Electrodes, Support vector machines, Location awareness, Electroencephalography, Sensor systems, Sensors, Reliability. Abstract: This study investigated the possibility of using functional near infrared spectroscopy (fNIRS) during right- and left-hand motor imagery tasks to select an optimum set of electroencephalography (EEG) electrodes for a brain computer interface. fNIRS has better spatial resolution allowing areas of brain activity to more readily be identified. The ReliefF algorithm was used to identify the most reliable fNIRS channels. Then, EEG electrodes adjacent to those channels were selected for classification. This study used three different classifiers of linear and quadratic discriminant analyses, and support vector machine to examine the proposed method.Clinical Relevance— Reducing the number of sensors in a BCI makes the system more usable for patients with severe disabilities. |
9,534 | Please write an abstract with title: Development and Testing of a Core System for Red and Blue Scenario in Cyber Security Incidents, and key words: Training, Passwords, SQL injection, Virtual machining, Malware, Time factors, Cyberattack. Abstract: In the context of continuous digitalization in all business areas, cyber-attacks became a major challenge. The data security component is a priority in the development of this changing environment. There have been many types of cyber-attacks such as Distributed Denial-of-Service, Malware Attack, Password Attack, or SQL Injection Attack that have affected different countries around the world. These security vulnerabilities led to data exfiltration or unavailability of certain critical services for long periods of time, while causing significant material damage. In order to properly manage the problems that may occur, it is necessary for any entity offering services on the Internet to have a cyber security component. Moreover, for a better coordination in the response to cyber incidents, it is necessary to train the teams providing these services. The development of capabilities can be achieved in a controlled environment, where different types of real-life attacks are simulated. A classic training method is considered to be a Red vs. Blue competition. In this paper, a different strategy is proposed, in which the two types are combined in a Red and Blue scenario. To develop it, a central system is needed to generate the information to be captured, to validate its accuracy and to monitor the availability of services. Also, through this, it was possible to observe the behaviour of the players and how they improve their knowledge. Compared to the Red vs. Blue version, the proposed one in which the teams are combined offers more advantages for understanding how a hacker acts and for reducing the response time in case of a cyber security incident. |
9,535 | Please write an abstract with title: An empirical study on keyword-based Web site clustering, and key words: Web pages, Data mining, Natural language processing, Navigation, Reverse engineering, Clustering methods, Information resources, Clustering algorithms, Web page design, Conferences. Abstract: Web site evolution is characterized by a limited support to the understanding activities offered to the developers. In fact, design diagrams are often missing or outdated. A potentially interesting option is to reverse engineer high level views of Web sites from the content of the Web pages. Clustering is a valuable technique that can be used in this respect. Web pages can be clustered together based on the similarity of summary information about their content, represented as a list of automatically extracted keywords. This work presents an empirical study that was conducted to determine the meaningfulness for Web developers of clusters automatically produced from the analysis of the Web page content. Natural language processing (NLP) plays a central role in content analysis and keyword extraction. Thus, a second objective of the study was to assess the contribution of some shallow NLP techniques to the clustering task. |
9,536 | Please write an abstract with title: Ontology supported intelligent information agent, and key words: Ontologies, Intelligent agent, Semantic Web, Information retrieval, Space technology, HTML, Paper technology, Web services, Humans, Web sites. Abstract: This paper introduces the new technology of the ontology on the Semantic Web. The paper shows the integration of agent technology and ontology may make significant impact on the use of Web services and the ability to extend programs to more efficiently perform tasks for users with less human intervention. It presents the implement of Web service search by ontology supported intelligent agent. |
9,537 | Please write an abstract with title: Aerospace fiber optic training standards and certification, and key words: Optical fibers, Certification, Time of arrival estimation, Aerospace engineering, Aerospace industry, Industrial training, Automotive engineering, Standards development, Protocols, Aerospace electronics. Abstract: This paper discusses the need for training standards in the area of aerospace fiber optics and the current role of the Society of Automotive Engineers and Electronics Technicians Association in aerospace fiber optic training standardization. |
9,538 | Please write an abstract with title: Rate-distortion optimization of spatial filters for motion-compensated video coding, and key words: Rate-distortion, Spatial filters, Video coding, Filtering, Interpolation, Video compression, Motion estimation, Uncertainty, Motion compensation, PSNR. Abstract: We propose a novel motion-compensated prediction scheme for improving the rate-distortion performance of motion compensated video coders. Our scheme uses a codebook of filters so that the prediction block is encoded by specifying jointly an integer motion vector and the index of a filter in the codebook. The two-dimensional spatial filter furnishes simultaneously the functions of motion compensation, pixel interpolation and noise reduction. With such a filtering framework, motion compensation can be performed at arbitrary precision and the codebook optimized for specific video data. Incorporated into an ITU-T H.264 coder, the proposed motion-compensated prediction scheme improves coder performance by increasing the reconstruction PSNR by 0.2 dB or reducing the bit rate by 5 %. |
9,539 | Please write an abstract with title: Intelligent Games for Learning and the Remediation of Dyslexia: Using Automaticity Principles, and key words: Training, Adaptation models, Games, Optimization, Cybernetics. Abstract: The ability to read has become an indispensable skill in modern ages, and any reading difficulty, such as dyslexia, can seriously impair the aspirations of the individual. Orthographically opaque languages such as English lay a heavy burden on learners. In this article, a gamified intervention program for the remediation of dyslexia is proposed for opaque orthographies. Current technology-based approaches of reading acquisition in the literature lack sophistication in terms of training design, game design, and adaptivity. This approach is based on the principles of automaticity acquisition and the gamification of learning as well as intelligent instruction. For the latter, an optimization model is proposed to maximize the educational value of each training session while respecting the capabilities of each individual. |
9,540 | Please write an abstract with title: Resource-aware conference key establishment for heterogeneous networks, and key words: Costs, Protection, Cryptography, Protocols, Material storage, Greedy algorithms, Steiner trees, Communications technology, Computer science. Abstract: The Diffie-Hellman problem is often the basis for establishing conference keys. In heterogeneous networks, many conferences have participants of varying resources, yet most conference keying schemes do not address this concern and place the same burden upon less powerful clients as more powerful ones. The establishment of conference keys should minimize the burden placed on resource-limited users while ensuring that the entire group can establish the key. In this paper, we present a hierarchical conference keying scheme that forms subgroup keys for successively larger subgroups en route to establishing the group key. A tree, called the conference tree, governs the order in which subgroup keys are formed. Key establishment schemes that consider users with varying costs or budgets are built by appropriately designing the conference tree. We then examine the scenario where users have both varying costs and budget constraints. A greedy algorithm is presented that achieves near-optimal performance, and requires significantly less computational effort than finding the optimal solution. We provide a comparison of the total cost of tree-based conference keying schemes against several existing schemes, and introduce a new performance criterion, the probability of establishing the session key (PESKY), to study the likelihood that a conference key can be established in the presence of budget constraints. Simulations show that the likelihood of forming a group key using a tree-based conference keying scheme is higher than the GDH schemes of Steiner et al.. Finally, we study the effect that greedy users have upon the Huffman-based conference keying scheme, and present a method to mitigate the detrimental effects of the greedy users upon the total cost. |
9,541 | Please write an abstract with title: Electromagnetic Illusion in Smart Environments, and key words: Wireless communication, Three-dimensional displays, Metasurfaces, Nonhomogeneous media, Sensors, Radar applications, Coatings. Abstract: Metasurfaces can be designed to achieve prescribed functionality. Careful meta-atom design and arrangement achieve homogeneous and inhomogeneous layouts that can enable exceptional capabilities to manipulate incident waves. Inherently, the control of scattering waves is crucial in wireless communications and stealth technologies. Low-profile and light-weight coatings that offer comprehensive manipulation are highly desirable for applications including camouflaging, deceptive sensing, radar cognition control, and defense security. Here, we propose a method that achieves electromagnetic illusion without altering the object. A proof of principle is proposed and practiced for one-dimensional media. The idea is to engineer the environment instead of the object coating. This work paves the way for versatile designs that will improve electromagnetic security applications with the aid of smart environments. |
9,542 | Please write an abstract with title: A Semi-Linear Approximation of the First-Order Marcum <i>Q</i>-Function With Application to Predictor Antenna Systems, and key words: Throughput, Optimization, Antennas, Resource management, Closed-form solutions, Channel estimation, System performance. Abstract: First-order Marcum Q -function is observed in various problem formulations. However, it is not an easy-to-handle function. For this reason, in this article, we first present a semi-linear approximation of the Marcum Q -function. Our proposed approximation is useful because it simplifies, e.g., various integral calculations including Marcum Q -function as well as different operations such as parameter optimization. Then, as an example of interest, we apply our proposed approximation approach to the performance analysis of predictor antenna (PA) systems. Here, the PA system is referred to as a system with two sets of antennas on the roof of a vehicle. Then, the PA positioned in the front of the vehicle can be used to improve the channel state estimation for data transmission of the receive antenna that is aligned behind the PA. Considering spatial mismatch due to the mobility, we derive closed-form expressions for the instantaneous and average throughput as well as the throughput-optimized rate allocation. As we show, our proposed approximation scheme enables us to analyze PA systems with high accuracy. Moreover, our results show that rate adaptation can improve the performance of PA systems with different levels of spatial mismatch. |
9,543 | Please write an abstract with title: Adaptive jitter compensation on the downlink of future mobile multimedia communications systems, and key words: Jitter, Downlink, Multimedia communication, Multimedia systems, Mobile communication, Resource management, Delay, Communication system traffic control, IP networks, Communication system control. Abstract: As all-IP based mobile communications networks become a reality, it is important to understand how characteristics of these networks such as delay jitter can affect the overall performance of the system. We find that backbone network delay jitter can significantly influence the multiple access performance of an all-IP mobile communications system. To compensate for this, we introduce an adaptive jitter compensation technique that is linked to the system slot allocation and multiple access mechanisms. By linking these mechanisms, we are able to compensate for delay jitter, whilst also introducing novel resource allocation techniques for use with multimedia traffic. We detail the various techniques introduced, and show the performance enhancements possible when using such a scheme. |
9,544 | Please write an abstract with title: SIMPL: Generating Synthetic Overhead Imagery to Address Custom Zero-Shot and Few-Shot Detection Problems, and key words: Training, Training data, Three-dimensional displays, Software, Object detection, Visualization, Image recognition. Abstract: Recently deep neural networks (DNNs) have achieved tremendous success for object detection in overhead (e.g., satellite) imagery. One ongoing challenge however is the acquisition of training data, due to high costs of obtaining satellite imagery and annotating objects in it. In this article, we present a simple approach—termed Synthetic object IMPLantation (SIMPL)—to easily and rapidly generate large quantities of synthetic overhead training data for custom target objects. We demonstrate the effectiveness of using SIMPL synthetic imagery for training DNNs in zero-shot scenarios where no real imagery is available; and few-shot learning scenarios, where limited real-world imagery is available. We also conduct experiments to study the sensitivity of SIMPL's effectiveness to some key design parameters, providing users for insights when designing synthetic imagery for custom objects. We release a software implementation of our SIMPL approach, as well as design details of our experimental synthetic imagery, so that others can build upon our approach, or use it for their own custom problems. |
9,545 | Please write an abstract with title: The Mechanism of the Formation of Grain Boundaries Nanopores in Polycrystalline Materials, and key words: Grain boundaries, Photovoltaic systems, Conferences, Market research, Telecommunications, Plastics, Stress. Abstract: The article deals with the problem of the appearance of the grain boundary nanopores in polycrystalline materials of the parquet type. The mechanism of their formation is proposed, as well as appropriate modeling is carried out, which allowed to establish the condition for the appearance of nanopore instead of stress concentrator. These studies are important for understanding the nature of the grain boundary defects in polycrystalline materials for their applications in photovoltaic energy converters. |
9,546 | Please write an abstract with title: Power System Parameter Attack for Financial Profits in Electricity Markets, and key words: Electricity supply industry, Power systems, Cyberattack, Programming, Generators, Computational modeling, Measurement uncertainty. Abstract: Maintaining an accurate power system model is crucial for a variety of applications such as electricity markets. In this paper, the cyber security issue induced by critical parameters in electricity market operations is investigated. Critical parameters are a set of model parameters the errors of which cannot be detected due to the lack of local measurements. In this paper, it is first proven that the criticality property of parameters is independent from system operating points, i.e., the maliciously injected errors will always remain undetectable. Then, the cyber attack against critical parameters is formulated as a bilevel programming problem in search of the optimal attack strategy or the worst situation faced by the system operators. An effective algorithm for solving this problem is also provided. Simulation results verify that by injecting undetectable errors into critical model parameters, the locational marginal prices in electricity markets can be significantly distorted, which leads to financial benefits for the attackers. |
9,547 | Please write an abstract with title: Mechanism and Prevention of Commutation Failure in LCC-HVDC Caused by Sending End AC Faults, and key words: Inverters, Control systems, Rectifiers, Circuit faults, Firing, HVDC transmission, Voltage control. Abstract: This letter analyzes the mechanism of commutation failures (CFs) caused by sending end AC faults. It is founded that the dc impulse current after fault clearance is the direct reason of CF occurring under nonserious sending end AC faults, and the controller interaction is the main reason of CF occurring under severe sending end AC faults. Moreover, a prevention strategy is proposed based on the revealed mechanism, and the validity is verified by the simulation results. |
9,548 | Please write an abstract with title: Graphical user interface to multiple biological databases, and key words: Graphical user interfaces, Spatial databases, Object oriented databases, Navigation, Information retrieval, Sequences, Biology computing, Database languages, Crystallography, Nuclear magnetic resonance. Abstract: Accessing multiple biological databases involves either explicit navigation through multiple databases or expressing a query in the query language of the designer which is a formidable task. In this paper we propose a graphical user interface to multiple biological databases. The query which consists of the data to be retrieved and the condition, if any, to be satisfied is expressed in an intuitive way. The link information that exists in the databases is used automatically by the system and the relevant data retrieved. The retrieved data can be viewed in more than one format. There is also a provision for refining the query. |
9,549 | Please write an abstract with title: Analysis of whispering gallery mode resonators by using airy functions, and key words: Whispering gallery modes, Vertical cavity surface emitting lasers, Resonance, Resonant frequency, Structural discs, Optical resonators, Optical ring resonators, Surface emitting lasers, Q factor, Optical waveguides. Abstract: In this paper, airy functions to represent Bessel functions of large index order are applied. The eigenvalue wave equation is then reduced to a polynomial equation. The complex roots of such a polynomial are the sought whispering gallery modes (WGM) resonant frequencies which in effect, provide the Q-factors and determine the WGM field profiles. Particular emphasis has been given to deriving the spectral and spatial distribution of WGMs, along the Q-factors of the resonators. These properties are essential to characterise circular semiconductor lasers, which use WGMs as modal emission. |
9,550 | Please write an abstract with title: SmArt WhiteBoard Replacement Interactive Device (SAWBRID) Enhancements and Optimizations, and key words: Schedules, Public key, User experience, Mobile applications, Internet, Servers, Security. Abstract: Communication between the professor and student are key to a successful learning experience. However, it can be difficult at times to schedule a meeting with a professor. The SmArt WhiteBoard Replacement Interactive Device (SAWBRID) is a system that facilitates the communication between professors and students. The system is composed an E- Paper device that mounts outside a professor's office and a mobile application. The E-paper device displays a professor's availability, scheduled meetings, and communicates messages such as being a little late for office hours. The mobile application allows students to check different professor's availability and schedule an appointment with their professor. It also allows professors to connect the system to their calendar, update their schedule, and relay messages to be displayed on the E-paper. The professors' and students' data are stored on an in house server. In this research we focus on providing a smooth user experience with the SAWBRID system as well as providing a fully secure communication channel using public-key and aecret-key encryption to ensure confidentiality and hash functions to ensure data and user integrity. The system will be evaluated for usability, security, and power and energy consumption. |
9,551 | Please write an abstract with title: Managing uncertainties in electromagnetic design problems with robust optimization, and key words: Uncertainty, Design optimization, Optimization methods, Sensitivity analysis, Electric variables measurement, Uncertain systems, Noise robustness, Magnetic noise, Noise shaping, Electromagnetic devices. Abstract: Numerical optimization techniques are widely used for the design of electromagnetic devices. In practical implementations of such devices, the problem parameters may be subject to tolerances and uncertainties. Optimal designs should be insensitive to parameter variations. The demand for robustness is often neglected during the optimization process. A formulation of robust nonlinear design problems is proposed in this paper. The influence of uncertainties on the target performance and the feasibility of a solution is assessed and incorporated into the optimization strategy. Methods for the solution of robust problems are introduced. Special emphasis is put on keeping the computational effort as small as possible. The proposed robust optimization method is applied to a standard benchmark optimization problem. |
9,552 | Please write an abstract with title: Optimization of Operating Parameters for the Determination of Normalized Components in Thin Films Based on Trivalent Chromium and Titanium by the FP Method RFA, and key words: Analytical models, Systematics, Density measurement, Films, Titanium, Chromium, Fluorescence. Abstract: Actual tasks are to study the possibility of conducting RFA of passive films by the FP method and to develop a possible method for the production of control samples of films, the solution of which will significantly increase the precision, profitability, and safety of analysis. The method of X-ray fluorescence analysis provides the simultaneous determination of a large number of elements in a wide range of concentrations, rapid measurements. |
9,553 | Please write an abstract with title: The EMC Community, and key words: Electromagnetic compatibility, Interference, Telemetry, Pins, Oils, NASA, Modulation. Abstract: The history of Electromagnetic Interference, dating from 1920. is given. Not only communications engineers but more generally electrical engineers and, more recently, computer engineers, biologists and physicians are part of the EMC community. There are International organisations like IEC, CISPR, NASA and national committees who deal with specifications on EMC, International EMC symposia are held every second year in Europe apart from similar meetings held in Eastern Europe. In South Africa a number of statutory bodies have representatives in the Working Groups on ‘Sources’ and ‘Receptors’ which operate within the High Voltage Co-ordinating Committee of the CSIR. |
9,554 | Please write an abstract with title: Automatic pathological gait recognition by a mobile robot using ultrawideband-based localization and a depth camera, and key words: Location awareness, Pathology, Three-dimensional displays, Robot vision systems, Cameras, Skeleton, Mobile robots. Abstract: Human gaits constitute significant health information because they indicate body function conditions, such as sensory, motor, and cognitive functions. Monitoring gait patterns helps to find weakened body parts and to prevent diseases before they become serious. In this paper, we propose a novel method to monitor human gaits in indoor environments by using a mobile robot and artificial intelligence. A mobile robot periodically collects 3D skeleton data by using an installed depth camera, and the collected data are used to extract gait parameters and to classify normal, antalgic, stiff-legged, steppage, lurching, and Trendelenburg gaits via the proposed system. Ultrawideband (UWB)-based localization with Kalman filtering and odometry-based state estimation is adopted to allow a mobile robot to rapidly and accurately reach the target human. We use both 3D skeletons and joint-based angle data to achieve improved pathological gait classification performance. A bidirectional gated recurrent unit (Bi-GRU) architecture is adopted for fusion at the feature level. An accuracy of 97.64% is achieved by using the proposed multiple-input model, whereas 96.63% and 94.17% accuracies are achieved by the skeleton-and joint-based angle input models, respectively. The proposed automatic gait analysis method can contribute to improving untact smart home care and quality of life. |
9,555 | Please write an abstract with title: Application of Machine Learning Techniques in Delay Modelling for Heterogenous Signalized Intersections, and key words: Support vector machines, Urban areas, Artificial neural networks, Predictive models, Software, Delays, Mathematical model. Abstract: Delay can be defined as the amount of extra time spent by a vehicle at an intersection. It is important to estimate vehicular delay as accurately as possible so that the efficiency of the intersection can be determined in terms of Level of Service (LOS). In general, researchers tend to opt either US-based HCM or UK based Webster's model to estimate the delay for Indian traffic conditions. As these models are designed for homogeneous and lane-based behavior, they tend to give erroneous results when applied for Indian road conditions. So, a model is developed to estimate the delay under heterogenous and no lane discipline conditions. As deep learning techniques provide high accuracy prediction, this paper is an attempt to estimate delay using Support Vector Machine (SVM) and Artificial Neural Network (ANN). In this study, video graphic survey is conducted to collect required parameters such as volume, signal timing, geometric features such as the number of lanes and approaches, the proportion of vehicles crossing in the green interval, platoon ratio and field delay is estimated by using HCM 2016 procedure. Two predictive models are formulated and compared to find out the best model which predicts the delay accurately. From the developed two models it can be concluded that ANN is the best fit model to estimate the delay at a signalized intersection as the R^2 (0.88) value is more when compared with R^2 (0.59) obtained from SVM Model. |
9,556 | Please write an abstract with title: Single echo acquistion of MR images using RF coil arrays, and key words: Radio frequency, Magnetic resonance imaging, Coils, Preamplifiers, Sensor arrays, Phased arrays, Image resolution, Acceleration, Data acquisition, Magnetic resonance. Abstract: Parallel imaging methods such as SMASH and SENSE reduce imaging time by using receiver coil sensitivity patterns to reduce requirements for gradient based image localization. This paper describes the first use of a coil array to completely eliminate gradient phase encoding. By using a 64 element planar array and a custom built 64 channel receiver system, 64/spl times/256 resolution images were constructed from a single line of k-space, demonstrating the ability to form complete images from a single echo acquisition. Together, the receiver and array are capable of generating complete images during successive echo acquisitions, potentially enabling extremely rapid frame rates. |
9,557 | Please write an abstract with title: Design and implementation of university performance Appraisal System based on responsibility center, and key words: Information science, Data analysis, Databases, Education, Memory, Maintenance engineering, Computer performance. Abstract: This paper mainly puts forward corresponding solutions for the design and implementation of university performance compensation a management system. The steps of computer university performance compensation management system mainly include system analysis, system design, system implementation and system maintenance. In the design of the computer system, the various modules, the required database table and the table field menu design are shown in detail. In the implementation of the system, the event, code and menu implementation of the corresponding functional controls in the form are presented. This paper analyzes the design and implementation of the university performance compensation management system of computer technology with data input, data storage, information calculation and modification book removal. Its data analysis technology has promoted the further development of performance compensation management system in universities. |
9,558 | Please write an abstract with title: Windowing functions for the average magnitude difference function pitch extractor, and key words: Upper bound, Speech, Computer buffers, History, Jitter, Steady-state, Equations, Uncertainty, Frequency, Government. Abstract: This paper describes the fundamental properties of the Average Magnitude Difference Function, (AMDF) when used for pitch extraction on human speech, such as the ability to work in the absence of the fundamentals, and responses to pitch and formant resonances. Requirements for the algorithm's correct functioning are discussed, including reasonable bounds on window size and requirements on a nonlinear post processor. Finally, three experiments are described: 1) comparison of rectangular window versus exponential window AMDF, 2) comparison of the accuracy of the indicated pitch versus window length, and 3) effects of inverse filtering on the AMDF. |
9,559 | Please write an abstract with title: Self-Growing Binary Activation Network: A Novel Deep Learning Model With Dynamic Architecture, and key words: Training, Computer architecture, Neurons, Task analysis, Deep learning, Mathematical models, Data models. Abstract: For a deep learning model, the network architecture is crucial as a model with inappropriate architecture often suffers from performance degradation or parameter redundancy. However, it is experiential and difficult to find the appropriate architecture for a certain application. To tackle this problem, we propose a novel deep learning model with dynamic architecture, named self-growing binary activation network (SGBAN), which can extend the design of a fully connected network (FCN) progressively, resulting in a more compact architecture with higher performance on a certain task. This constructing process is more efficient than neural architecture search methods that train mass of networks to search for the optimal one. Concretely, the training technique of SGBAN is based on the function-preserving transformations that can expand the architecture and combine the information in the new data without neglecting the knowledge learned in the previous steps. The experimental results on four different classification tasks, i.e., Iris, MNIST, CIFAR-10, and CIFAR-100, demonstrate the effectiveness of SGBAN. On the one hand, SGBAN achieves competitive accuracy when compared with the FCN composed of the same architecture, which indicates that the new training technique has the equivalent optimization ability as the traditional optimization methods. On the other hand, the architecture generated by SGBAN achieves 0.59% improvements of accuracy, with only 33.44% parameters when compared with the FCNs composed of manual design architectures, i.e., 500+150 hidden units, on MNIST. Furthermore, we demonstrate that replacing the fully connected layers of the well-trained VGG-19 with SGBAN can gain a slightly improved performance with less than 1% parameters on all these tasks. Finally, we show that the proposed method can conduct the incremental learning tasks and outperform the three outstanding incremental learning methods, i.e., learning without forgetting, elastic weight consolidation, and gradient episodic memory, on both the incremental learning tasks on Disjoint MNIST and Disjoint CIFAR-10. |
9,560 | Please write an abstract with title: Exploring the Use of Artificial Intelligence Techniques to Detect the Presence of Coronavirus Covid-19 Through Speech and Voice Analysis, and key words: COVID-19, Feature extraction, Databases, Reliability, Pathology, Medical services, Machine learning algorithms. Abstract: The Covid-19 pandemic represents one of the greatest global health emergencies of the last few decades with indelible consequences for all societies throughout the world. The cost in terms of human lives lost is devastating on account of the high contagiousness and mortality rate of the virus. Millions of people have been infected, frequently requiring continuous assistance and monitoring. Smart healthcare technologies and Artificial Intelligence algorithms constitute promising solutions useful not only for the monitoring of patient care but also in order to support the early diagnosis, prevention and evaluation of Covid-19 in a faster and more accurate way. On the other hand, the necessity to realise reliable and precise smart healthcare solutions, able to acquire and process voice signals by means of appropriate Internet of Things devices in real-time, requires the identification of algorithms able to discriminate accurately between pathological and healthy subjects. In this paper, we explore and compare the performance of the main machine learning techniques in terms of their ability to correctly detect Covid-19 disorders through voice analysis. Several studies report, in fact, significant effects of this virus on voice production due to the considerable impairment of the respiratory apparatus. Vocal folds oscillations that are more asynchronous, asymmetrical and restricted are observed during phonation in Covid-19 patients. Voice sounds selected by the Coswara database, an available crowd-sourced database, have been e analysed and processed to evaluate the capacity of the main ML techniques to distinguish between healthy and pathological voices. All the analyses have been evaluated in terms of accuracy, sensitivity, specificity, F1-score and Receiver Operating Characteristic area. These show the reliability of the Support Vector Machine algorithm to detect the Covid-19 infections, achieving an accuracy equal to about 97%. |
9,561 | Please write an abstract with title: Understanding the Surface Condition of Silicone Rubber Nanocomposite Due to Corona Aging Using AFM Imaging and LIBS Spectroscopy, and key words: Corona, Rubber, Surface morphology, Surface discharges, Discharges (electric), Aging, Surface roughness. Abstract: Silicone rubber insulators undergo degradation when they are exposed to corona discharges. The present study explores the surface degradation behavior of silicone rubber alumina nanocomposites due to corona aging using high-frequency ac voltage. The electric field distribution on the sample surface during corona aging is simulated using COMSOL. The change in silicone rubber functional group is studied using Fourier transform infrared (FTIR) spectroscopy analysis. The influence of corona aging time on the surface roughness recovery of silicone rubber nano alumina composites is studied using an atomic force microscopy (AFM). The elemental distribution behavior and change in the emission spectra persistence time are analyzed during recovery period of corona-aged silicone rubber nanocomposites using laser-induced breakdown spectroscopy (LIBS) technique. The addition of alumina nanofiller to the silicone rubber improves the resistance to aging due to corona discharge. Loss and recovery of hydrophobic property of silicone rubber due to corona aging were determined using static contact angle measurement. The results show a direct correlation between the contact angle and the surface roughness recovery characteristics. They indicate that the nanocomposite having a 5 wt% alumina content exhibits the highest resistance to corona discharge with least surface damage. Furthermore, fast recovery was observed in the first few hours after corona aging, and most samples eventually regained their properties after about 8 h of recovery time. |
9,562 | Please write an abstract with title: Emerging verification methods for complex hardware in avionics, and key words: Hardware, Aerospace electronics, Formal specifications, Specification languages, Logic devices, Guidelines. Abstract: This paper discusses the additional design assurance strategies stated in RTCA/DO-254, Appendix B - "Design assurance considerations for level A and level B functions." In particular, we address the use of formal specification languages such as the property specification language (PSL) in combination with dynamic (simulation) and static (formal) verification methods for programmed logic devices. Using these methods, we suggest a design assurance strategy for complex programmable airborne electronics compliant with the guidelines of RTCA/DO-254. The strategy is a semi-formal solution, a hybrid of static and dynamic assertion based verification. |
9,563 | Please write an abstract with title: Photodiode Array-based Angular Estimator and It's Application in Indoor Positioning with Single LED Lamp, and key words: LED lamps, Prototypes, Optical receivers, Photodiodes, Optical sensors, Optical noise, Photonics. Abstract: An angular estimator based on photodiode array is proposed. The experimental results in positioning with single LED show that the angular of incident light relative to the receiver can be estimated with small errors. |
9,564 | Please write an abstract with title: Trajectory Anomaly Detection based on Similarity Analysis, and key words: Performance evaluation, Wavelet transforms, Clustering algorithms, Feature extraction, Video surveillance, Trajectory, Classification algorithms. Abstract: Automatic trajectory processing has multiple applications, mainly due to the wide availability of the data. Trajectory data have a significant practical value, making possible the modeling of various problems such as surveillance and tracking devices, detect anomaly trajectories, identifying illegal and adverse activity. In this study, we show a comparative analysis of the performance of two descriptors to detect anomaly trajectories. We define Wavelet and Fourier transforms as trajectory descriptors to generate characteristics and subsequently detect anomalies. The experiments emphasize performance in the description in the coefficient feature space. For that, we used unsupervised learning, specifically clustering techniques, to generate subsets and identify which are irregular. The implications of the study demonstrate that it is possible to use descriptors in trajectories for automatic anomaly detection and the use of unsupervised learning methods that automatically segment the required information. The performance and comparative analysis of our study are demonstrated through experiments and a case study considering synthetic and real data sets that leave evidence of our contribution. |
9,565 | Please write an abstract with title: Finite-element analysis of material and parameter effects in laser-based thermoelastic ultrasound generation, and key words: Finite element methods, Optical materials, Thermoelasticity, Ultrasonic imaging, Laser theory, Biological materials, Geometrical optics, Frequency, Two dimensional displays, Optical arrays. Abstract: Laser-based, thermoelastic transduction methods have potential in very high frequency (>50 MHz), high-density two-dimensional (2-D) arrays for a variety of very high-resolution superficial imaging applications, including in vivo tissue sectioning. Previous studies of these transducers generally have been based on experimental measurements or theoretical analyses using various simplifying assumptions. These theoretical models are mostly 1-D and best matched to simple geometries with a minimum number of component materials. In this work, we use a new thermoelastic solver in a commercially available finite-element analysis (FEA) software package to analyze multidimensional effects in laser-based devices of arbitrary geometry with the potential for use with arbitrary material properties. The FEA approach was verified first against experimental data. Thereafter, we explored the impact of various design variables, including laser spot size and laser penetration depth. |
9,566 | Please write an abstract with title: Learning energy efficient walking based on ballistics, and key words: Energy efficiency, Legged locomotion, Humans, Leg, Torque control, Knee, Hip, PD control, Educational robots, Robot sensing systems. Abstract: This paper presents a method to realize energy efficient walking of a biped robot with a layered controller. The lower layer controller is a state machine which consists of four states: (1) constant torque is applied to hip and knee joints of the swing leg. (2) no torque is applied so that the swing leg can move in a ballistic manner. (3) a PD controller is used so that the desired posture can be realized at the heel contact, which enables a biped robot to walk stably. (4) as the support leg, hip and knee joints are servo-controlled to go back and the torque to support upper leg is applied. With this lower layer controller, parameters that enable robot to walk as energy efficiently as human walking can be explored by the upper layer controller without caring to avoid falling down. |
9,567 | Please write an abstract with title: Iris Liveness Detection Using Fusion of Domain-Specific Multiple BSIF and DenseNet Features, and key words: Iris recognition, Lenses, Iris, Feature extraction, Robustness, Computational modeling, Protocols. Abstract: In the past few years, some fusion-based approaches have been proposed to constitute discriminatory features for iris liveness detection. However, several methods exist in the literature for iris feature extraction and, thus, identifying an optimal composite of such features is still a vital challenge. This article also proposes a score-level fusion of two distinct domain-specific features, i.e., multiple binarized statistical image feature (BSIF) and DenseNet-based features. However, instead of randomly scrutinizing such features, statistical tests are executed on six predominant iris features to identify the optimal feature set to combine. Particularly, this work emphasizes textured-lens-based presentation attacks and aims to identify the type of contact lenses within the iris samples. The experimental analysis depicts that the domain-specific features substantially outperform the generic features while discriminating live iris from the artifacts. Furthermore, the proposed fusion-based approach is assessed on three iris datasets and the outcomes are compared with various state of the arts using three validation protocols in terms of equal error rate (EER). The comparative analysis perceived that the proposed method obtains a significant performance gain over the existing approaches and offers an improved benchmark for both, iris liveness detection and contact lens identification. |
9,568 | Please write an abstract with title: Comparative analysis of two heat spreader designs for a wire bond TBGA package, and key words: Wire, Bonding, Thermal management, Heat transfer, Resistance heating, Thermal conductivity, Semiconductor device packaging, Semiconductor devices, Cooling, Parametric study. Abstract: Thermal management is becoming increasingly significant in semiconductor devices because of greater functional densities and smaller devices. A critical factor in obtaining better heat transfer from cavity down devices is the proper choice of heat spreader design. In an earlier study Guttikonda, S.C. and Sammakia, B.G. [2001] presented a comparative basic analysis of two types of heat spreader design and also studied the effect of forced convection cooling for different velocities. It has been noted that the single piece type of heat spreader, with a cavity for the die, is superior to a design incorporating separate heat spreader and stiffeners. The adhesive between the stiffener and the heat spreader was identified as a major resistance in the heat flow path. In the present study a detailed parametric study of the effects of various factors that are responsible for the difference in performance of two designs, is presented. These factors include possible delamination between the die and cover plate/heat spreader and the thermal conductivity of the die attach. The authors also obtained trends to study the effects of heat spreader thickness. All results point towards better performance by the single piece design from a thermal standpoint. |
9,569 | Please write an abstract with title: IPMSM Drive with Interleaved Bidirectional Converter for Electric Vehicle Application, and key words: Voltage source inverters, DC-DC power converters, Traction motors, Permanent magnet motors, Electric vehicles, Synchronous motors, Batteries. Abstract: Interior permanent magnet synchronous motor (IPMSM) is one of the most commonly used electric vehicle (EV) traction motors due to many of its desirable features like high-power density and better performance. The frontend interleaved bidirectional DC-DC converter in IPMSM drive circuit can further enhance the performance of the circuit along with stepping-up the battery voltage. The front-end bidirectional converter allows bidirectional power flow and thus, the battery gets charged during regenerative braking of the motor. The interleaved converter allows ripple reduction and reliability enhancement. The current sharing in the interleaved converter also reduces the size and the weight of the inductors. The converter operation automatically shifts from boost mode to buck and vice-versa. The DC link voltage control and the motor control allows the motor to have better static and dynamic characteristics as required for the EVs. The space vector modulated direct torque control (SVMDTC) is used for the voltage source inverter to control the motor with lesser parameter dependence and reduced ripples in torque. Hence, an IPMSM drive for a four wheeler battery electric vehicle is designed and the simulation results are analyzed. |
9,570 | Please write an abstract with title: The quality concerns in health care Big Data, and key words: Big Data, Medical services, Data integrity, Biomedical monitoring, Business. Abstract: Health information technology is showing an impressive growing interest towards Big Data. Big Data Analytics is expected to bring important achievements for building sophisticated models, methods and tools that are expected to improve healthcare services and citizen health and wellbeing. In spite of these expectations data quality and analytics methods are not getting the attention they deserve. In this short paper, we aimed to highlight the issues of data quality in the context of Big Data Healthcare Analytics. The common sources of errors, the consequence of these errors, and potential solutions that should be considered to mitigate errors and pitfalls are discussed in the healthcare context. |
9,571 | Please write an abstract with title: Automatic Generation Control of a Future Multisource Power System Considering High Renewables Penetration and Electric Vehicles: Egyptian Power System in 2035, and key words: Power system stability, Power generation, Frequency control, Thermal loading, Thermal factors, Renewable energy sources, Transfer functions. Abstract: Egypt aims to diversify electricity generation sources and targets 42% of its power capacity through different renewable energy sources (RESs) by 2035. Such an increased share of RESs will make grid operation and control more tedious and may have a negative impact on power system frequency stability. Therefore, this paper is the first study that studies the automatic generation control of future multi-source power systems (e.g., Egyptian Power System (EPS) in a future 2035 scenario) considering high RESs penetrations and electric vehicles (EVs). The RESs in this future scenario include photovoltaic plants, wind generation plants, concentrated solar power plants, and hydropower plants. The EPS also contains other traditional power plants based on fossil fuels (i.e., coal, oil, and natural gas) and nuclear power plants. Moreover, this study investigates the effect of participation of EVs in enhancing the frequency stability of the future-scenario EPS. Furthermore, this study proposes a fractional-order proportional integral derivative (FOPID) controller for load frequency control (LFC), and its parameters are tuned using RUNge Kutta optimizer (RUN), which is a new optimization algorithm. To assess the FOPID controller performance, it was compared with a proportional-integral-derivative controller, proportional-integral controller, and integral controller. The results showed the positive effect of EVs’ participation in frequency regulation of the future-scenario EPS, the effectiveness of RUN optimizer in LFC application, and the superior performance of the FOPID controller over its peers of controllers used in the literature in improving frequency stability through reducing frequency deviations caused by different disturbances and under various power system conditions. |
9,572 | Please write an abstract with title: Hyperspectral Unmixing with Rare Endmembers via Minimax Nonnegative Matrix Factorization, and key words: Reflectivity, Signal processing algorithms, Matrix decomposition, Task analysis, Spatial resolution, Standards, Hyperspectral imaging. Abstract: Hyperspectral images are used for ground-cover classification because many materials can be identified by their spectral signature, even in images with low spatial resolution. Pixels in such an image are often modeled as a convex combination of vectors, called endmembers, that correspond to the reflectance of a material to different wavelengths of light. This is the so-called linear mixing model. Since reflectance is inherently nonnegative, the task of unmixing hyperspectral pixels can be posed as a low-rank nonnegative matrix factorization (NMF) problem, where the data matrix is decomposed into the product of the estimated endmembers and their abundances in the scene. The standard NMF problem then minimizes the residual of the decomposition. Thus, using NMF works well when materials are present in similar amounts, but if some materials are under-represented, they may be missed with this formulation. Alternatively, we propose a novel hyperspectral unmixing model using a collection of NMF subproblems solved for patches of the original image. The endmembers are estimated jointly, such that the the maximum residual across all patches is minimized. In this paper we estimate the solution to the patch-based minimax NMF model, and show that it can estimate rare endmembers with superior accuracy. |
9,573 | Please write an abstract with title: Achievement of High-speed Processing by Autonomous Decentralized Processing and Decentralized Algorithm in a Wired-and-Wireless Integrated IC Card Ticket System, and key words: High speed integrated circuits, Automatic frequency control, Rail transportation, Railway safety, Wireless communication, Costs, Conferences, Collaborative software, Manuals, Algorithm design and analysis. Abstract: High speed and high reliability are required of the Automatic Fare Collection Systems (AFCSs). In the congested environments, as seen in the trains and stations in Japan during rush hours, the automatic fare collection gates (AFCGs) must let the passengers pass as quickly as possible but cannot roughly handle the tickets equivalent to notes. Establishment of high speed and high reliability on wireless communications was challenging when East Japan Railway Company was developing a wireless IC card ticket system; faster processing resulted in poorer reliability. "Autonomous Decentralized Processing Technology" and "Decentralized Algorithm on the Fare Calculations with an IC Card and AFCGs" have been designed as the solutions. This paper introduces the two models - the decentralized process and the centralized one - to simulate and shows the satisfactory results on the decentralized one. These technologies are implemented to the practical "Suica" system and have proven the effectiveness. |
9,574 | Please write an abstract with title: Institute notes: Cape western centre, and key words: Telephone sets, Switching circuits, Remuneration, Registers, Rails, Minerals, Films. Abstract: The 125th general meeting of the Cape Western centre was held on Thursday, 9th January, 1964 at Electricity House, Strand Street, Cape Town. |
9,575 | Please write an abstract with title: On the Zero-Error Capacity of the Chemical Residual Channel, and key words: Error probability, Conferences, Chemicals, Information theory. Abstract: We consider a class of channels, collectively referred to as the ‘chemical residual channel’, where the channel output is determined by the current input and the previous output. When the channel is binary and the output is a deterministic function of the current input and the previous output, there are 16 possible cases. For all these cases, we characterize the maximal rate that can be achieved with zero error probability at any given finite block length. As a result, the zero-error capacities of these cases are obtained. |
9,576 | Please write an abstract with title: Research on The Development of Commercial Digital Economy Based on Information Driven, and key words: Knowledge engineering, Machine learning algorithms, Force, Production, Machine learning, Knowledge management, Communications technology. Abstract: With the help of the “information technology and business” model, this paper summarizes and innovates the information kinetic energy theory by using the scientific experiment of information energy and relevant professional technology theory. According to the three-tier technical logic of the new generation of information technology, this paper solves the new kinetic energy logic of traditional business economy and reading the information kinetic energy driving the development of commercial digital economy from three levels. |
9,577 | Please write an abstract with title: Advance Recommendation System for the Formation of More Prolific and Dynamic Software Project Teams, and key words: Software, Social networking (online), Data mining, Companies, Psychology, Project management, Buildings. Abstract: For the successful software project management and its success, many studies have been done but still many of the software projects cannot end up well. Formation of software teams has always given less priority in the entire project development process, but we have identified it as a strong determinant in project success. We have developed a methodology that will allow the formation of software project teams through a recommendation system. In this system, the team members which are best compatible with each other as a team will be recommended. This system gives weightage to both technical and non-technical skills of individual team member. We have used social network analysis techniques to dig out information and connections that are helpful in formation of best compatible teams. The results show a remarkable difference in the performance of the team that is formed using our recommendation system as compared to the traditional team selection criteria i.e. based on technical skills. Hence, selection of right project team in right way increases project productivity. Moreover, non-technical and social factors can boost the team performance remarkably. |
9,578 | Please write an abstract with title: Computational modeling of atherosclerotic plaque progression in carotid lesions with moderate degree of stenosis, and key words: Solid modeling, Three-dimensional displays, Computational modeling, Biological system modeling, Atherosclerosis, Tools, Predictive models. Abstract: Carotid atherosclerotic plaque growth leads to the progressive luminal stenosis of the vessel, which may erode or rupture causing thromboembolism and cerebral infarction, manifested as stroke. Carotid atherosclerosis is considered the major cause of ischemic stroke in Europe and thus new imaging-based computational tools that can improve risk stratification and management of carotid artery disease patients are needed. In this work, we present a new computational approach for modeling atherosclerotic plaque progression in real patient-carotid lesions, with moderate to severe degree of stenosis (>50%). The model incorporates for the first time, the baseline 3D geometry of the plaque tissue components (e.g. Lipid Core) identified by MR imaging, in which the major biological processes of atherosclerosis are simulated in time. The simulated plaque tissue production results in the inward remodeling of the vessel wall promoting luminal stenosis which in turn predicts the region of the actual stenosis progression observed at the follow-up visit. The model aims to support clinical decision making, by identifying regions prone to plaque formation, predict carotid stenosis and plaque burden progression, and provide advice on the optimal time for patient follow-up screening. |
9,579 | Please write an abstract with title: A current-tripler dc/dc converter, and key words: DC-DC power converters, Topology, Rectifiers, Switches, Zero voltage switching, Strontium, MOSFETs, Windings, Microprocessors, Leg. Abstract: This paper proposes a novel zero-voltage-switching (ZVS) current-tripler dc/dc converter. Compared to the conventional phase-shifted ZVS full-bridge dc/dc converter with current-doubler rectifier, the proposed current-tripler dc/dc converter reduces the synchronous rectifier (SR) conduction loss as well as the transformer winding loss. Furthermore, the proposed transformer structure is very compact, and thus the power density of the converter could be greatly increased. Analysis and experimental results show that the proposed topology offers great advantages when the converter output current goes higher and the voltage goes lower, as demanded by future microprocessors and telecommunications systems. A 48-V/1.0-V, 100-A, 300-kHz prototype is implemented, and the experimental results show that it can achieve 87% efficiency at full load. |
9,580 | Please write an abstract with title: Structural Health Monitoring of UHV GIL Shield Cross-River Electric Power pipe Gallery, and key words: Water, Force, Fasteners, Soil, Power systems, Safety, Steel. Abstract: Considering the characteristics of complex stratum distribution, high external water pressure, and large tunnel section size of the UHV GIL integrated pipeline gallery project, a structural health monitoring scheme and a safety evaluation standard suitable for electric power river-crossing shield tunnels are proposed. According to the stress characteristics of UHV GIL shield cross-river electric power pipe gallery, water and soil pressure, steel stress, bolt axial force, joint opening and tunnel settlement are monitored. Four grade evaluation standards are proposed, which take reinforcement stress, joint opening and bolt axial force as the control values of safety classification. |
9,581 | Please write an abstract with title: Dissipativity theory for nonnegative and compartmental dynamical systems with time delay, and key words: Delay effects, Power engineering and energy, Open loop systems, Control systems, Automatic control, Feedback, Oscillators, Electromagnetic fields, Partial differential equations, Process control. Abstract: Nonnegative and compartmental dynamical system models are derived from mass and energy balance considerations that involve dynamic states whose values are nonnegative. These models are widespread in engineering and life sciences and typically involve the exchange of nonnegative quantities between subsystems or compartments wherein each compartment is assumed to be kinetically homogeneous. However, in many engineering and life science systems, transfers between compartments are not instantaneous and realistic models for capturing the dynamics of such systems should account for material in transit between compartments. Including some information of past system states in the system model leads to infinite-dimensional delay nonnegative dynamical systems. In this note, we develop dissipativity theory for nonnegative dynamical systems with time delay using linear storage functionals with linear supply rates. These results are then used to develop general stability criteria for feedback interconnections of nonnegative dynamical systems with time delay. |
9,582 | Please write an abstract with title: Reliability Assessment of Distribution Power Transformers Considering Load Transfer Capability, and key words: Power transformers, Reliability, Markov processes, Power system reliability, Load modeling, Measurement, Planning. Abstract: A number of reliability models based on stationary Markov processes were developed at Hydro One to evaluate the reliability of a group of similar distribution power transformers. Those models accounted for a number of factors that affected the reliability of the group. The factors included, in addition to the basic Markov model parameters, the redundancy and mobile unit transformer capability at each individual station. There was one factor namely the load transfer capability between the stations that was not considered in the reliability assessment. The objective of load transfer is to further reduce the impact of transformer outages on customers and therefore improve the overall reliability of the system. The policy of load transfer between distribution stations can be simple or complicated and that can have a significant impact on the overall system reliability. This paper describes a probabilistic method based on stationary Markov models for evaluating the impacts of load transfers on the reliability of distribution stations. An example of a real distribution system is used to illustrate the proposed method of assessment. |
9,583 | Please write an abstract with title: An Enhanced Secure Authentication Scheme With One More Tag for RFID Systems, and key words: Authentication, Radiofrequency identification, Couplings, Security, Fingers, Resists, Law. Abstract: Currently, Radio Frequency Identification (RFID) is one of the key technologies to realize the Internet of Things (IoT), which is widely used in our daily life. However, there are some security threats such as impersonation attack, replay attack in existed RFID systems. In addition, most physical-layer authentication methods for RFID systems are mainly to authenticate tags without authenticating the user. In this paper, we present the design and implementation of Au-Hota, a system that can authenticate the tag and the user simultaneously, and can resist replaying attack and impersonation attack that cannot be solved by most physical-layer methods. Our idea is to assign a unique identifier to the user based on the inductive coupling between two adjacent tags. When the user draws the identity identifier on the tag, different identity identifiers correspond to unique phase features so that simultaneous authentication of the tag and the user can be achieved under the premise of ensuring security. The system is fully compatible with Ultra High Frequency (UHF) RFID systems without any modification. We implement a prototype of the system and conduct extensive experiments to evaluate performance. Our results demonstrate that the system has good authentication performance. |
9,584 | Please write an abstract with title: Speed and Yaw Rate Response Optimization based on Parameter Estimation for Electrical Bus Mathematical Model, and key words: Analytical models, Parameter estimation, Mechatronics, Estimation, Optimization methods, Machine learning, Stability analysis. Abstract: The mathematical model of the vehicle is an important component of vehicle stability control research. Therefore, the right model is required to model an actual vehicle. In designing a vehicle model, the right parameter values are also needed to produce an optimal output response from the model. However, optimal response cannot be obtained when there is parameter value that are either unknown or cannot be measured directly. This paper proposed a parameter estimation approach using the Quasi-Newton and least squares methods to estimate the value of the unknown parameter. The output responses from the model with the estimated parameters will be compared with the output responses from the simulator used, and the level of accuracy and error of the estimation method will be analyzed. From the test results, it was found that the model with the estimated parameter values produces high accuracy of more than 85%. It is shown that the proposed estimation method can be used in estimating the parameters of a vehicle model and can produce an optimal output response. |
9,585 | Please write an abstract with title: Who will Trust my Digital Twin? Maybe a Clerk in a Brick and Mortar Fashion Shop, and key words: Solid modeling, Three-dimensional displays, Mortar, Digital twin, Conferences, User interfaces, Mirrors. Abstract: Digital Twin (DT) models mirror the life of physical entities and are adopted to optimize several industrial processes. Although well-established in the industrial fields, one of the most exciting examples of where DTs may be employed is in the MetaVerse, with Human Digital Twins (HDTs). We present a preliminary study that examines the efficacy of HDT-human interactions in the context of a fashion shop. Based on the results obtained involving thirty-two participants in our experiments, we begin a discussion related to the pros and cons of this approach on x-commerce. |
9,586 | Please write an abstract with title: Multi-Agent Deep Reinforcement Learning for Distributed Resource Management in Wirelessly Powered Communication Networks, and key words: Resource management, Interference, Optimization, Uplink, Wireless communication, Downlink, Wireless sensor networks. Abstract: This paper studies multi-agent deep reinforcement learning (MADRL) based resource allocation methods for multi-cell wireless powered communication networks (WPCNs) where multiple hybrid access points (H-APs) wirelessly charge energy-limited users to collect data from them. We design a distributed reinforcement learning strategy where H-APs individually determine time and power allocation variables. Unlike traditional centralized optimization algorithms which require global information collected at a central unit, the proposed MADRL technique models an H-AP as an agent producing its action based only on its own locally observable states. Numerical results verify that the proposed approach can achieve comparable performance of the centralized algorithms. |
9,587 | Please write an abstract with title: A wearable augmented reality system with personal positioning based on walking locomotion analysis, and key words: Augmented reality, Legged locomotion, Wearable sensors, Cameras, Humans, Head, Displays, Sensor fusion, Kalman filters, Filtering. Abstract: In this paper, we present a wearable augmented reality (AR) system with personal positioning based on walking locomotion analysis that allows a user to freely mover around indoors and outdoors. The user is equipped with self-contained sensors, a wearable camera, an inertial head tracker and display. The system is based on the sensor fusion of estimates for relative displacement caused by human walking locomotion and estimates for absolute position and orientation within a Kalman filtering framework. The former is based on intensive analysis of human walking behavior using self-contained sensors. The latter is based on image matching of video frames from a wearable camera with an image database that was prepared beforehand. |
9,588 | Please write an abstract with title: An adaptive learning control approach based on constructive function approximation, and key words: Programmable control, Adaptive control, Function approximation, Neural networks, Target tracking, Control systems, Convergence, Nonlinear dynamical systems, Robust control, Drives. Abstract: A constructive function approximation approach is proposed for adaptive learning control which handles finite interval tracking problems. Unlike the well established adaptive neural control which uses a fixed neural network structure as a complete system, in our method the function approximation network consists of a set of bases and the number of bases can be increased when learning repeats. The nature of basis allows the continuously adaptive tuning or learning of parameters when the network undergoes a structure change, consequently offers the flexibility in tuning the network structure. The expansibility of the basis ensures the function approximation accuracy, and removes the processes in pre-setting the network size. Two classes of system unknown nonlinear functions, either in L/sup 2/(R) or a known upperbound, are taken into consideration. With the help of Lyapunov method, the existence of solution and the convergence property of the proposed adaptive learning control system, are analyzed rigorously. |
9,589 | Please write an abstract with title: Fabrication of strained Si/strained SiGe/strained Si heterostructures on insulator by a bond and etch-back technique, and key words: Fabrication, Silicon germanium, Germanium silicon alloys, Insulation, Bonding, Etching, Materials science and technology, MOSFETs, Charge carrier processes, Electron mobility. Abstract: This paper discusses the fabrication of strained Si/strained SiGe/strained Si heterostructures on insulator by a bond and etch-back technique with total thickness of 25 nm. We have shown that the etch back process does not roughen the surface. By secondary ion mass spectroscopy (SIMS), we have shown a reduction in peak Ge fraction from the as grown 55% to 50% as a result of thermal processing. |
9,590 | Please write an abstract with title: Differential of the mutual information, and key words: Mutual information, Source separation, Independent component analysis, Signal processing algorithms, Random variables, Algorithm design and analysis, Blind source separation, Signal analysis, Vectors, Signal generators. Abstract: In this letter, we compute the variation of the mutual information, resulting from a small variation in its argument. Although the result can be applied in many problems, we consider only one example: the result is used for deriving a new method for blind source separation in linear mixtures. The experimental results emphasize the performance of the resulting algorithm. |
9,591 | Please write an abstract with title: The research of semantic content applied to image fusion, and key words: Image fusion, Computed tomography, Biomedical imaging, Medical diagnostic imaging, Focusing, Merging, Pixel, Image segmentation, Information retrieval, Image retrieval. Abstract: The diagnostic value of CT (Computed Tomography) checking for encephalic illness is affirmative. For clinical doctors, they are in urgent need of a good approach for this monomodality medical image fusion at an acceptable accuracy, in order to obtain some visual comparison about a patient in normal and pathologic conditions, tracing the development of focus, determining the regimen and so on. Thus is also the purpose of this paper. The usual method is merging images at pixel-level or feature-level. In this paper, we develop a semantic-level fusion technique that is matched with semantic descriptions associated to images. Content-based semantic information can be used on image segmentation and similarity matching image retrieval through prior-knowledge support. Then we apply a weighted complex similarity retrieval algorithm (WK-NN) to implement. Finally, the integrated images with semantic information are presented. |
9,592 | Please write an abstract with title: Sub-Wavelength Channel Waveguide with Near-Zero Flattened Dispersion at 1.55 μ m on Silicon, and key words: Optical waveguides, Dispersion, Silicon, Nonlinear optics, Optical device fabrication, Tuning, Waveguide discontinuities. Abstract: We propose and study a new type of channel waveguides with sub-wavelength structures for achieving near-zero flattened dispersion band (<; 100ps/nm/km variation within 200nm bandwidth) on the silicon-on-insulator (SOI) platform at the 1.55μm telecommunication wavelength. |
9,593 | Please write an abstract with title: Extension of Projection Area using Head Orientation in Projected Virtual Hand Interface for Wheelchair Users, and key words: Head, Wheelchairs, Instruments, Turning, User experience, Usability, Task analysis. Abstract: A projected virtual hand interface, which visually extends arms of users using projection images, enables wheelchair users to reach unreachable objects; however, its projection area is narrower than the reaching area required for the users. To address this problem, we propose a wheelchair system enhanced with a projected virtual hand that allows controlling a projection area using user's head orientation. The proposed system estimates the current orientation of a user's head and controls the pan and tilt of a projector accordingly to move a projection area considering the positional relationship with a projection plane. As users can operate the projection area simply by turning their head, this operation can be executed simultaneously with operations of a virtual hand using their hands. We propose a control model for projector rotation according to the user's head direction. The conducted user experience study has revealed that the proposed method enables users to perform pointing tasks in a shorter time compared with the existing method, and moreover, it has acceptable interface usability. |
9,594 | Please write an abstract with title: Neural Network Based Android Malware Detection with Different IP Coding Methods, and key words: Training, Operating systems, Cellular phones, Transforms, Tablet computers, Malware, Encoding. Abstract: Due to the COVID-19 epidemic that has affected the whole world, internet use has increased more than in previous years. Almost all operations and transactions are done over the internet, especially with the use of cellular phones and tablet PCs. This growth results in many security deficits that need to be solved by security admins and end users. Malicious software (malware) is generally preferred for attacking the computer systems and recently for cellular phones. As a mobile operating system, Android is the main player of this sector with about 72% market share worldwide. Therefore, malware attacks especially target these devices, for reaching the maximum number of victims. The situation is getting more and more devastating with around 12,000 new Android malware attacks every day. This is one critical problem that needed to be solved by setting up an android malware detection system. Machine learning algorithms are frequently preferred in data mining-based security applications which contain lots of features in datasets. Artificial Neural networks are one of the mostly preferred learning models for training the system. Therefore, in this paper, it is aimed to implement a neural network based android malware detection system by using an up-to-date dataset presented by the Cyber Security Institute of Canada as CICMalDroid2017. Ip Addresses are one of the features in this dataset, and we focus on two different IP coding methods, as IP Splitting to Four Numbers, IP Transform to integer number, and no IP Address. In experimental study we reached a good level of accuracy rate as 98.4% by splitting an IP address to four numbers. |
9,595 | Please write an abstract with title: A Wearable IoT Pendant for Enhanced Safety Awareness in Visual Impairment Individuals, and key words: blind, IoT, object recognition. Abstract: Our research proposes the utilization of Internet of Things (IoT) in conjunction with object recognition as a wearable IoT pendant to enhance safety awareness for individuals with visual impairments. The device is designed as a chest-level locket for convenient carrying. To achieve this, we conducted preliminary experiments to demonstrate the feasibility of our approach. The deep learning algorithm Yolov8 was employed for object recognition, resulting in an overall recognition accuracy of 89.44% for 11 different types of obstacles commonly found within a household environment. Our ultimate objective is to develop this device into an artificial eye-like tool for the blind, providing them with essential information about their surroundings, enabling object identification, navigation in unfamiliar areas, and detection of potentially hazardous obstacles. This technology aims to enhance the safety and independence of visually impaired individuals in their daily lives. |
9,596 | Please write an abstract with title: Light Sheet Flow Cytometry: Study of Polyelectrolyte Microcapsules in Whole Blood, and key words: Magnetic separation, Lasers, Magnetic nanoparticles, Optics, Blood. Abstract: Lightsheet-based flow cytometry system with the ability of measuring in the whole undiluted blood and magnetic separation of objects of interest was developed. It was used to investigate how the magnetic targeting of polyelectrolyte microcapsules influenced by the concentration of magnetic nanoparticles, microcapsule size and flow speed in the vessel. |
9,597 | Please write an abstract with title: Novel modeling technique for the stator of traveling wave ultrasonic motors, and key words: Stators, Teeth, Deformable models, Ceramics, Finite element methods, Piezoelectric materials, Torque, Prosthetics, Solid modeling, Piezoelectric transducers. Abstract: Traveling wave ultrasonic motors (TWUM) are a promising type of piezoelectric transducers, which are based on the friction transmission of mechanical propagating waves. These waves are excited on the stator by using high Q piezoelectric ceramics. This article presents a modeling strategy, which allows for a quick and precise modal and forced analysis of the stator of TWUM. First-order shear deformation laminated plate theory is applied to annular subdomains (super-elements) of the stator. In addition to shear deformations, the model takes into account the effect of rotary inertia, the stiffness contribution of the teeth, and the linear varying thickness of the stator. Moreover, the formulation considers a more realistic function for the electric field inside the piezoelectric ceramic, i.e., a linear function, instead of the generally assumed constant electric field. The Ritz method is used to find an approximated solution for the dynamic equations. Finally, the modal response is obtained and compared against the results from classical simplified models and the finite element method. Thus, the high accuracy and short computation times of the novel strategy were demonstrated. |
9,598 | Please write an abstract with title: Assessing the Digitalization Footprint from Agricultural Fields on Required Data Storage Space, and key words: Image sensors, Cloud computing, Satellites, Soft sensors, Memory, Metrology, Telematics. Abstract: The digital revolution in agriculture resulted in an accumulation of big archived data at the farmers level. Many sources of data for farmers are now available from satellite and drone images beside tractors telematics and different sensors applications. This study reports an assessment for the evolution of accumulated data from different sources at field scale. Data sources from satellite images were analysed considering the evolution of required data storage in MB/ha while drones cameras resolution and corresponding image file size were analysed from the last ten years. Moreover, archived data from a 22ha field, collected through different sensors were reported from 2005 to 2020 to assess the required data storage space. Results showed that the required data storage space from the studied 22ha field was ˂0.05 MB in 2005 and reached ˃1500 MB in 2020. Moreover, a continuous and exponential increase in the required data storage at the farmer level and a continuous increase in recent sensors generated data were reported. |
9,599 | Please write an abstract with title: Cost-Aware Resource Allocation with Probabilistic Latency Guarantee in B5G Industrial Private Networks, and key words: Costs, Conferences, Computational modeling, Simulation, Scalability, Probabilistic logic, Resource management. Abstract: Industrial private networks (IPNs), having enhanced communication characteristics in a specific area, emerge to fulfill the demanding industrial use cases. However, users' demands for flexibility and low latency in the B5G era are in inevitable conflict with limited and isolated resources in IPNs; thus, scalability and flexibility of resources are required, which can be realized by jointly funneling users' traffic and resource allocation spanning IPN s to promote load balancing and resource efficiency. In this paper, we devise a cost-aware resource allocation (CARA) approach embedded with a proba-bilistic latency guarantee for resource efficiency achievement and low latency fulfillment. Specifically, we first establish a unified cost model for coupling funneled traffic and resource allocated in each lPN, avoiding the optimization penalty of alternating them. Then, to solve the conflict between limited computing and communication resources, we propose the CARA approach based on the non-dominated sorting genetic algorithm-III (NSGA-III). Furthermore, a probabilistic latency guarantee sub-algorithm is embedded in CARA to fulfill the latency constraint and relax it for advanced industrial implementation. Additionally, compared with other existing algorithms, simulation results reveal that our proposed algorithm not only globally minimizes unified cost across IPNs, but also individually balances the funneled traffic. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.