ID int64 0 400k | content stringlengths 97 5.85k |
|---|---|
9,900 | Please write an abstract with title: How to Mitigate DDoS Intelligently in SD-IoV: A Moving Target Defense Approach, and key words: Security, Vehicle dynamics, Denial-of-service attack, Wireless communication, Informatics, Cyberattack, Software. Abstract: Software defined Internet of Vehicles (SD-IoV) is an emerging paradigm for accomplishing Industrial Internet of Things (IIoT). Unfortunately, SD-IoV still faces security challenges. Traditional solutions respond after attacks happening, which is low-effective. To cope with this problem, moving target defense (MTD) was proposed to modify network configurations dynamically. However, current MTD for IIoT has several drawbacks: 1) it cannot handle highly dynamic environments; 2) MTD strategy lacks intelligence because it needs attack–defense models; 3) they are difficult to trace sources. In this article, we propose an intelligent MTD scheme to defend against distributed denial-of-service in SD-IoV. Firstly, we model the configuration mutation of roadside units as a Markov decision process (MDP), and adopt deep reinforcement learning to solve the optimal configuration. Next, we evaluate the trust of vehicles after shuffling, which can distinguish spy vehicles. Finally, extensive simulation results confirm the effectiveness of our solution compared with representative methods. |
9,901 | Please write an abstract with title: Nanopore Surface Charge Sensing with Ion-Step Method, and key words: Nanoelectromechanical systems, Conferences, Glass, Ions, Sensors. Abstract: We present a sensitive nanopore surface charge detection with ion-step as signal amplification method. An ion-step is applied to the inner and outer side of the glass nanopore, and ion rectification effect is recorded and analyzed. A comparison is performed for both bare glass nanopores that are negatively charged and silane modified nanopores, which are positively charged. We found that ion-step can greatly improve the current rectification during current-voltage scanning. The concentration difference and pore sizes have huge influence on the rectification ratio. With the ion-step, a nanopore with diameter of over 900 nm exhibits current rectification effect, and can be applied in surface charge detection. In addition, we herein also explore the influence of different voltage and solution pH to the rectification ratio. We conclude that the reason for the rectification ratio amplification is the incremental effect of electroosmotic flow and ionic diffusion., due to the surface charges present on the inner surface of the nanopore. |
9,902 | Please write an abstract with title: Evolution of Relative Intensity Noise in High-Power Narrow-Linewidth Fiber Laser Systems, and key words: Frequency modulation, Power lasers, Measurement by laser beam, Modulation, Lasers, Laser theory, Laser feedback. Abstract: In this work, we carry out a systematic study on the evolution of relative intensity noise (RIN) in a high-power narrow-linewidth fiber laser system based on phase-modulated single-frequency seed laser. The experimental results clarify that enhancement of the RIN mainly occurs when the seed laser gets amplified from low power to medium power. In addition, further power scaling could lead to reduction of the RIN until it reaches saturation on the condition that the transverse mode instability (TMI) effect is effectively suppressed. Apart from the power scaling process, the phase-modulation would also lead to enhancement of the RIN at specific frequencies corresponded to the modulation frequency. More importantly, the contrast experiments reveal that the TMI effect could lead to obvious enhancement of the RIN of the signal laser during amplification well below the TMI threshold defined by the traditional method. Therefore, apart from degeneration of the RIN during amplification, potential enhancement of the RIN induced by the phase-modulation or the TMI effect below its traditional threshold should be carefully considered and controlled to achieve high-power low-noise fiber laser. Overall, our experimental results could provide a well reference for design of high-power low-noise fiber lasers and high-power narrow-linewidth fiber lasers. |
9,903 | Please write an abstract with title: Creating Disaggregated Network Services with eBPF: the Kubernetes Network Provider Use Case, and key words: Performance evaluation, Codes, Linux, Conferences, Debugging, Complex networks, Routing. Abstract: The eBPF technology enables the creation of custom and highly efficient network services, running in the Linux kernel, tailored to the precise use case under consideration. However, the most prominent examples of such network services in eBPF follow a monolithic approach, in which all required code is created within the same program block. This makes the code hard to maintain, to extend, and difficult to reuse in other use cases. This paper leverages the Polycube framework to demonstrate that a disaggregated approach is feasible also with eBPF, with minimal overhead, introducing a larger degree of code reusability. This paper considers a complex network scenario, such as a complete network provider for Kubernetes, presenting the resulting architecture and a preliminary performance evaluation. |
9,904 | Please write an abstract with title: A Learning Approach Towards Power Control in Full-Duplex Underlay Cognitive Radio Networks, and key words: Simulation, Power control, Radio transmitters, Neural networks, Quality of service, Reinforcement learning, Full-duplex system. Abstract: Adopting full-duplex (FD) technique in the underlay cognitive radio network (CRN), the secondary user can sense the activity of the primary user (PU) and transmit data simultaneously to enhance spectrum reuse efficiency. However, the sensing accuracy degrades due to the self-interference compared with the discrete sensing and transmission half-duplex network. We employ deep reinforcement learning models to analyze and solve the power control problem with the objective to minimize the adjustment steps in FD underlay CRNs. The proposed power control algorithm can help the secondary transmitter search an optimal transmit power, which satisfies pre-defined quality of service (QoS) requirements while retaining interference to the PU under a threshold. Simulation results show that compared to the benchmark, our method can achieve lower average number of transactions, and reduce more than 53.3% and 98.1% of the computing time and the storage resources, which verifies the effectiveness of our scheme. |
9,905 | Please write an abstract with title: A Hybrid Waveguide Bend Scheme for Low Footprint, and key words: Hybrid waveguide, Waveguide bends, Silicon Nitride platform, Compact footprint. Abstract: We propose a hybrid waveguiding scheme with SiN for low propagation loss and a SiN/a-Si/SiN bend section for a compact footprint with a transition loss from SiN section to SiN/a-Si/SiN of 0.18 dB. |
9,906 | Please write an abstract with title: Brazilian Midwest Native Vegetation Mapping Based on Google Earth Engine, and key words: Vegetation mapping, Indexes, Earth, Forestry, Remote sensing, Artificial satellites, Vegetation. Abstract: Google Earth Engine (GEE) platform is an online tool, which generates fast solutions in terms of image classification and does not require high performance computers locally. We investigate several data input scenarios for mapping native-vegetation and nonnative-vegetation in the Atlantic Forest region encompassed in a Landsat scene (224/076) acquired on November 28, 2019. The data input scenarios were: I- spectral bands (blue to shortwave infrared); II- NDVI (Normalized Difference Vegetation Index); IIImNDWI (modified Normalized Difference Water Index); IV- scenarios I and II; and V- scenarios I to III. Our results showed that the use of spectral bands added NDVI and mNDWI (scenario V) provided the best performance for the native-vegetation mapping, with accuracy of 96.64% and kappa index of 0.91. |
9,907 | Please write an abstract with title: Log-convexity of the minimum total power in CDMA systems with certain quality-of-service guaranteed, and key words: Multiaccess communication, Quality of service, Power control, Mobile communication, Delay, Access control, Wireless communication, Resource management, Decoding, Interference. Abstract: In this correspondence, we consider a code-division multiple-access (CDMA) channel with a linear receiver structure whose inputs are subject to a total power constraint. Each user is required to satisfy a certain quality-of-service (QoS) requirement expressed, for instance, in terms of data rate or delay. The set of all feasible QoS requirements is called the feasibility region. It is shown that if the signal-to-interference ratio (SIR) at the output of each linear receiver is a bijective and log-convex function of the QoS parameter of interest, the minimum total power needed to satisfy the QoS requirements is a jointly log-convex function of the QoS parameters. Furthermore, in two special cases of practical interest, we show that the minimum total power is strictly log-convex. These results imply that the corresponding feasibility regions are convex sets. The convexity property is a key ingredient in the development of access control strategies for wireless communications systems. |
9,908 | Please write an abstract with title: Accurate Small-Signal Modeling for Charge-Controlled LLC Resonant Converter, and key words: Switching frequency, Resonant frequency, Resonant converters, Frequency conversion, Control systems, Harmonic analysis, Integrated circuit modeling. Abstract: In comparison with PWM converters, LLC resonant converters are gaining increasing popularity for cases in which efficiency and power density are at a premium. The regulation can be achieved by simple frequency control that changes the resonant tank impedance according to loading conditions. This control experiences a strong beat-frequency oscillation located at the difference between the switching frequency and resonant frequency, and therefore is difficult to compensate. The capacitor voltage is a good indicator of resonant tank energy at the instant where switching is taking place. This additional feedback effectively reduces the system order. However, the small-signal model is lacking. The recent breakthrough in resonant converter modeling is based on the extended describing function method, which takes into account all important contribution from harmonics. This paper extends this modeling for the capacitor-voltage-controlled LLC resonant converter. The corresponding equivalent circuit model is provided, and the comparison with the frequency control is discussed in detail. |
9,909 | Please write an abstract with title: The Design and Performance Test of Train Control Data Communication Systems Based on Train-to-Train Communication, and key words: Long Term Evolution, Data communication, Control systems, Wireless communication, Delays, Communication systems, Base stations. Abstract: Communication Based Train Control (CBTC) systems are signal systems to ensure the safe operation of rail transit. However, with the increasing demand for the efficiency of rail transit operations, the train control system based on train-to-ground communication has exposed many problems such as complex system structure and high construction cost. Compared with the train control system based on train-to-ground communication, the train control system based on train-to-train (T2T) communication has advantages of fast response speed, simple structure, and low operating cost. The data communication, which is the core part of the train control system based on T2T communication, realizes continuous and large-capacity two-way communication between equipment in the system which is of great significance for ensuring the safety and efficiency of the train operation. According to the requirements of the train control system based on T2T communication, the Long Term Evolution (LTE) technology is applied in this thesis to design a data communication system structure based on T2T communication. In addition, a performance testing platform is established to test system performance at the same time. |
9,910 | Please write an abstract with title: QoS Optimization of DNN Serving Systems Based on Per-Request Latency Characteristics, and key words: System performance, Stochastic processes, Quality of service, Delays, Sensors, Task analysis, Optimization. Abstract: Deep Neural Networks (DNNs) have been extensively applied in a variety of tasks, including image classification, object detection, etc. However, DNNs are computationally expensive, making on-device inference impractical due to limited hardware capabilities and high energy consumption. This paper first incorporates downside risk into characteristics of per-request processing latency for DNN serving systems. Then, considering applications' diverse preferences of latency and accuracy, we introduce a scheme for assigning applications to different DNN models in an edge site, in order to maximize QoS of all applications while reducing the risk of having large processing latency and to meet requirements of minimum accuracy at the same time. Empirical results show that our approach improves system performance and takes an acceptable amount of time for computation. |
9,911 | Please write an abstract with title: VIA: A Smart Scratchpad for Vector Units with Application to Sparse Matrix Computations, and key words: Histograms, High performance computing, Memory management, Linear algebra, Hardware, Libraries, Sparse matrices. Abstract: Sparse matrix operations are critical kernels in multiple application domains such as High Performance Computing, artificial intelligence and big data. Vector processing is widely used to improve performance on mathematical kernels with dense matrices. Unfortunately, existing vector architectures do not cope well with sparse matrix computations, achieving much lower performance in comparison with their dense counterparts.To overcome this limitation, we present the Vector Indexed Architecture (VIA), a novel hardware vector architecture that accelerates applications with irregular memory access patterns such as sparse matrix computations. There are two main bottlenecks when computing with sparse matrices: irregular memory accesses and index matching. VIA addresses these two bottlenecks with a smart scratchpad that is tightly coupled to the Vector Functional Units within the core.Thanks to this structure, VIA improves locality for sparse-dense computations and improves the index matching search process for sparse computations. As a result, VIA achieves significant performance speedup over highly optimized state-of-the-art C++ algebra libraries. On average, VIA outperforms sparse matrix vector multiplication, sparse matrix addition and sparse matrix matrix multiplication kernels by 4.22 ×, 6.14 × and 6.00 ×, respectively, when evaluated over a thousand sparse matrices that arise in real applications. In addition, we prove the generality of VIA by showing that it can accelerate histogram and stencil applications by 4.5 × and 3.5 ×, respectively. |
9,912 | Please write an abstract with title: Break the Blackbox! Desensitize Intra-domain Information for Inter-domain Routing, and key words: Data privacy, Costs, Network topology, Autonomous systems, Quality of service, Routing, Routing protocols. Abstract: Along with the ever-increasing amount of data generated from edge networks, cross domain (also known as Autonomous Systems, AS) transmission problem has attracted more and more attention. As mature and widely used inter-domain routing protocols, BGP-based solutions often use the number of domains (i.e. AS hops) of each path to make inter-domain routing decisions, which is simple and effective, but usually can not get the optimal routing results due to the lack of real state/information within ASes. These protocols choose the path with less AS hops as the forwarding path, even if the total latency or cost of the domains on this path is higher. While to solve this problem, directly access to intra-domain information as the assistance to make routing decisions is impractical due to data privacy.In this paper, we propose DIT, which makes near-optimal inter-domain routing decisions with desensitized intra-domain information. To do so, we design a homomorphic encrypted-based private number comparison scheme to export intra-domain information securely and thus assist in routing decisions. We conduct a series of experiments according to five real network topologies with nearly 900 simulated flows, and the results show that DIT reduces the number of forwarding hops by about 45% in average and reduces flow completion time by about 60%. |
9,913 | Please write an abstract with title: Tapered Fabry-Pe/spl acute/rot filters, and key words: Mirrors, Resonator filters, Wavelength measurement, Filtering theory, Optical filters, Decoding, Nonhomogeneous media, Optical refraction, Diffraction, Absorption. Abstract: A simple tapered interferometric filter and spatially varying method for wavelength decoding are described. Two all-dielectric multilayer mirrors on opposing sides of a wedged spacer layer form a tapered Fabry-Pe/spl acute/rot (TFP) filter. The TFP filter shows a spatially varying transmittance which enables high-resolution low-loss wavelength decoding of a broad-band input signal. Theory and design of the filter are followed by experimental results and future applications. |
9,914 | Please write an abstract with title: Filtering of shrew DDoS attacks in frequency domain, and key words: Filtering, Frequency domain analysis, Computer crime, Digital signal processing, Telecommunication traffic, Signal analysis, Floods, Web and internet services, Communication system traffic control, Pressing. Abstract: The shrew distributed denial of service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as reduction of quality (RoQ) attacks. Such attacks could be even more detrimental than the widely known flooding DDoS attacks because they damage the victim servers for a long time without being noticed, thereby denying new visitors to the victim servers, which are mostly e-commerce sites. Thus, in order to minimize the huge monetary losses, there is a pressing need to effectively detect such attacks in real-time. Unfortunately, effective detection of shrew attacks remains an open problem. In this paper, we meet this challenge by proposing a new signal processing approach to identifying and detecting the attacks by examining the frequency-domain characteristics of incoming traffic flows to a server. A major strength of our proposed technique is that its detection time is less than a few seconds. Furthermore, the technique entails simple software or hardware implementations, making it easily deployable in a real-life network environment. |
9,915 | Please write an abstract with title: RF signal fluctuation induced by optical multipath interference in analog fiber system, and key words: Fluctuations, Radiofrequency interference, Optical interferometry, Optical fiber polarization, Radio frequency, RF signals, Chirp, Optical noise, Signal analysis, Optical fibers. Abstract: The radio-frequency (RF) signal fluctuation produced by optical multipath interference together with environment variance is analyzed in this letter. Optical signal chirping is considered during the analysis, as well as the variation in optical polarization states of multipath signals. Results indicate that the RF signal fluctuation increases with the chirping parameter of the optical signal, and are in agreement with experiment results. |
9,916 | Please write an abstract with title: Performance of a fault diagnosis method based on wavelet characterization, and key words: Fault diagnosis, Voltage, Sociotechnical systems, Circuit faults, Fault detection, Wavelet transforms, Electrical fault detection, Switches, Power quality, Power system faults. Abstract: This paper shows performance of a fault diagnosis method in a typical application in which fast detection of fault is necessary. The fault diagnosis method is based on characterizing the signal features using wavelet transform. The power system is a static transfer switch (STS) which requires a fast detection of the fault instant. The method is experimentally verified and compared to a conventional method. Results approve superiority of the wavelet characterization method. |
9,917 | Please write an abstract with title: Studying the Effect of Physical Realism on Time Perception in a HAZMAT VR Simulation, and key words: Hazardous materials, Solid modeling, Three-dimensional displays, Conferences, Computational modeling, Virtual reality, User interfaces. Abstract: Our research focuses on how physical props in virtual reality (VR) can affect users' time perception. We designed an experiment with the goal of comparing users' perception of time when using physical props in VR as compared to standard controllers and only virtual elements. In order to quantify this effect, time estimates for both conditions are compared to time estimates for a matching real-world task. In this experiment, participants assume the role of a firefighter trainee, going through a HAZMAT scenario, where they touch and interact with different physical props that match the virtual elements of the scene. |
9,918 | Please write an abstract with title: Research on Cost-Benefit Analysis and Arbitrage Strategy of Energy Storage for Industrial Users, and key words: Energy storage, Industrial load, Peak-valley electricity price, Cost-benefit analysis. Abstract: The reduction of energy storage cost and the improvement of time of ues(TOU) mechanism jointly promote the development of energy storage on user side. The energy storage on user side can reduce the power consumption cost and even realize arbitrage through peak shaving and valley filling. This paper evaluates the economy of energy storage on user side by calculating the net annual value(NAV) while considering the benefits of saving electricity, reducing transformer capacity, residual value recovery, energy storage system cost, civil engineering and installation cost, operation and maintenance cost and other factors. In this paper, the economy of adding energy storage to four typical industrial loads is calculated respectively, and the charging and discharging scheme of energy storage device is given. |
9,919 | Please write an abstract with title: Price Control for Heterogeneous Thermostatically Controlled Loads in Communication and Computation Delay Environments, and key words: Inverters, Optimization, Cooling, Delays, Real-time systems, Biological system modeling. Abstract: In this paper, we examine the potential of thermostatically controlled loads (TCLs) to provide demand response services in real-time energy markets (15 minutes) to optimize the tradeoff between the electricity bills and occupants' comfort requirements. A distributed optimization scheme is presented based on the derived second-order thermal dynamics and heterogeneous TCL models, in which a central controller is allowed to collect information from and broadcast control signals to TCLs. However, due to the real-time consideration, traditional synchronized computation does not scale well with the problem size, as the speed of the algorithm is limited by the slowest agent. This is particularly true in a heterogeneous network where the computing nodes experience different computation and communication delays. To perform distributed optimization in the presence of delay, we apply an asynchronous distributed alternating direction method of multipliers (ADMM) where the central controller makes decisions when it receives information from a predefined number of TCL in the population. Through rigorous theoretical results we show that the proposed algorithm converges to the optimal solution. We also provide numerical results in which different populations of TCLs with varying levels heterogeneity are optimized. |
9,920 | Please write an abstract with title: Debye Representation of Frequency Dependent Ground for LEMP Analysis With RC-FDTD, and key words: Dispersion, Soil, Mathematical models, Time-domain analysis, Finite difference methods, Conductivity, Permittivity. Abstract: Finite-difference time-domain (FDTD) method combined with the recursive convolution technique is applied to compute lightning electromagnetic pulses (LEMP) for dispersive ground adopting Longmire and Smith (LS) model in two-dimensional cylindrical coordinates. The novelty of our study is that, to the best of our knowledge, the LEMP simulation has been realized in the time-domain for the first time by directly using the parameters of the LS dispersive soil model by treating the ground as a multipole Debye medium without using approximate techniques such as vector fitting. As a numerical example, the LEMP is simulated above and under the dispersive ground with buried rock formation, which is also modeled as the dispersive Debye medium. The performed simulations are compared at distances of 500 m, 5 km, and 50 km away from the lightning channel for both first stroke and subsequent stroke. The results show that the case of dispersive ground and the rock leads to a difference of up to 61.77% with respect to using constant electrical parameters. |
9,921 | Please write an abstract with title: Computer Modelling of UAV Flight, and key words: Computational modeling, Heuristic algorithms, Force, Kinematics, Differential equations, Aerodynamics, Mathematical models. Abstract: A technique which uses the method of automatically deriving differential equations of motion for computer simulation of the unmanned aerial vehicle's (UAV) flight, is proposed. To compile them, a special computer algebra system is used. It implements complex analytical transformations of the formal description for the dynamic model of the spatial UAV motion. As an example of using the developed approach, we consider the simulation of the motion of a hybrid multicopter vehicle developed at NTU “KhPI”. This UAV uses an internal combustion engine for lift providing, control and stabilization are performed using electric motors. The design features of the multicopter are described and the obtained equations used to simulate its motion are presented. |
9,922 | Please write an abstract with title: Cloud Energy Storage Configuration and Settlement for Multi-Type Users, and key words: cloud energy storage (CES), sharing model, user side, configuration, operation mechanism. Abstract: Under carbon peaking and carbon neutrality, the installed capacity of new energy and energy storage continues to increase, and how to fully consume new energy and more economically and effectively utilize the power storage and controllable transfer value of energy storage becomes critical. This paper proposes a highly adaptable cloud energy storage (CES) model, which aggregates underutilized energy storage resources in the region and trades the resources together with PV and wind power users in the model, making energy storage more reasonable while completing the local consumption of new energy. On the basis of satisfying the optimal user aggregation benefits, the impact of energy storage charge/discharge price and new energy internal sales price on the benefits of participating subjects is considered. This paper also analyzes the impact of user type, load/new energy ratio, and energy storage capacity allocation principle on their benefits under CES model. Finally, insights are provided for energy storage planning and model construction for CES operators to assure the benefits of various types of users for high-quality and sustainable performance. |
9,923 | Please write an abstract with title: Electric Field Distribution Characteristics of Human Head Under UHV DC Transmission Line, and key words: Solid modeling, Insulation, Power transmission lines, Head, Three-dimensional displays, Grounding, Biological system modeling. Abstract: In this paper, COMSOL Multiphysics software was used to simulate the electric field distribution of human body 3D model under typical ± 800kV DC transmission line. Firstly, the 3D model of human body is established, and then the electric field distribution around the whole human body and the electric field distribution inside the human body are calculated and analyzed. Secondly, the electric field distribution inside and outside the most important part of the human body (the head) closest to the transmission line is studied in more detail, and two cases of grounding and insulation from the ground are considered in the study. Finally, the correlation between transmission line height changes and electric field distribution in human head under grounding and insulation conditions is quantitatively studied. It is found that the increase of transmission lines can significantly reduce the corresponding field strength. The results show that under the current safety standards and specifications, the internal electric field of the human body under a typical ± 800kV UHV DC(Ultra-high Voltage DC Transmission) transmission line does not exceed the safety limit, and the human body is safe under the line. |
9,924 | Please write an abstract with title: OnionNet: Single-View Depth Prediction and Camera Pose Estimation for Unlabeled Video, and key words: Cameras, Training data, Pose estimation, Unsupervised learning, Robustness, Multitasking, Decoding. Abstract: In real scenes, humans can easily infer their positions and distances from other objects with their own eyes. To make the robots have the same visual ability, this article presents an unsupervised OnionNet framework, including LeafNet and ParachuteNet, for single-view depth prediction and camera pose estimation. In OnionNet, for speeding up OnionNet’s convergence and concretizing objects against the gradient locality and moving objects in videos, LeafNet adopts two decoders and enhanced upconvolution modules. Meanwhile, for improving the robustness of fast camera movement and rotation, ParachuteNet uses and integrates three pose networks to estimate multiview camera pose parameters by combining with the modified image preprocess. Different from existing methods, single-view depth prediction and camera pose estimation are trained view by view, where the variations between views is gradual reduction of view range and outer pixels disappear in next view, similar to onion peeling. Moreover, the LeafNet is optimized with pose parameter from each pose network in turn. Experimental results on the KITTI data set show the outstanding effectiveness of our method: single-view depth performs better than most supervised and unsupervised methods which contain two same subtasks, and pose estimation gets the state-of-the-art performance compared with existing methods under the comparable input settings. |
9,925 | Please write an abstract with title: The economics of classification: error vs. complexity, and key words: Computational complexity, Pattern recognition, Concurrent computing, Physics, Electronic mail, Programmable logic arrays, Testing, Face recognition, Image databases, Information retrieval. Abstract: Although usually classifier error is the main concern in publications, in real applications classifier evaluation complexity may play a large role as well. In the paper, a simple economic model is proposed with which a trade-off between classifier error and calculated evaluation complexity can be formulated. This trade-off can then be used to judge the necessity of increasing sample size or number of features to decrease classification error or, conversely, feature extraction or prototype selection to decrease evaluation complexity. The model is applied to the benchmark problem of handwritten digit recognition and is shown to lead to interesting conclusions, given certain assumptions. |
9,926 | Please write an abstract with title: Research and practice of blended teaching based on TVTHM supported by mobile learning platform, and key words: Analytical models, Education, Organizations, Mobile learning, Cognition. Abstract: Blended teaching is a subversion and reconstruction of the traditional lecture-based teaching mode. It builds a new teaching mode with students as the main body and teacher guidance. With the help of a mobile teaching platform, a new teaching organization method that integrates physical classrooms and virtual classrooms. According to constructivism, situational cognition and learning theory, construct three vertical and three horizontal mixed teaching model (TVTHM), and design and carry out mixed teaching according to this model; fully apply the questionnaire Tool, introducing TAM model to analyze and compare learners’ abilities and blended teaching environment, design a six-dimensional teaching method, and carry out teaching practice in the course of “Self-learning Ability”. Knowledge, ability and quality have a significant effect. (Abstract) |
9,927 | Please write an abstract with title: Design of the Glue Conveying System for Powder-paved 3D Printer, and key words: 3D printing, hydraulic control system, simulation, PID controller. Abstract: For the powder-paved 3D printing technology, an effective conveying glue control system is proposed. Taking the speed control of piston that squeezes the glue as the core of this design, a set of hydraulic control system for glue conveying is designed. The test model of the glue conveying control system is established. The system is simulated based on the MATLAB/ Simulink module, and the PID controller is applied to improve the dynamic performance of the system. The simulation results show that this design of the glue conveying control system for powder-paved 3D printer has good stability, accuracy and rapidity under the premise of ensuring safety, and can meet the requirements of glue conveying. |
9,928 | Please write an abstract with title: Cache Replacement Based on LSTM in the Second Cache in Virtualized Environment, and key words: Deep learning, Simulation, Time series analysis, Prototypes, Throughput, Kernel, Tuning. Abstract: Virtualized environments have become one of the most important platforms in current information systems. In the cases of a virtualized environment using both guest and host operating systems, two caches in the guest and host operating systems work concurrently and improvement of hit ratios of both caches are important. However, the second cache, which is the host operating system cache, has a negative locality of reference and the most popular cache replacement algorithm called LRU (least recently used) does not work well. For this issue, we propose to apply LSTM (Long short-term memory), which is a deep learning network for time series data, for cache replacement in the second cache. First, we explain a famous issue in the second cache. Second, we propose an LSTM-based cache replacement. Third, we evaluate this method with our prototype implementation and show that our method can improve I/O performance. |
9,929 | Please write an abstract with title: Reliable and Low-Latency Routing Mechanism for IoT-based Networks, and key words: Internet of Things, low-power lossy network, wireless sensor network, RPL, routing, load balancing, IEEE 802.15.4. Abstract: Routing discovery is an essential component of the communication stack in low-power and lossy networks (LLNs). IPv6 routing protocol for LLNs, termed RPL, has been recently standardized for routing in LLNs leading to the Internet of Things (IoT) concept. RPL is designed with an assumption of gathering data towards a single destination, typically the root node. On the other hand, the arbitrary communication, where neither the source nor the destination is the root, is a prime requirement in most of LLNs-based actuating, decision making, and controlling applications. In this paper, we propose a reliable and low-latency routing mechanism based on RPL for high arbitrary communications in LLNs that is referred to herein by RL-RPL. RL-RPL utilizes the original RPL control features to guarantee backward-compatibility with RPL specifications. Using the cooja emulator as a platform, RL-RPL shows enhanced packet delivery ratio relative to the standard routing mechanism. In addition, it shows an average 74% reduction in delay together with an average 21.3% reduction in energy consumption across the considered traffic intensities. |
9,930 | Please write an abstract with title: Development and Implementation of Border Tourism Resources Evaluation System Based on GIS, and key words: Satellites, Graphical models, Smart cities, Web and internet services, Decision making, Programming, Information age. Abstract: Traditional evaluation methods cannot highlight the characteristics of border tourism resources, which is not conducive to highlight the characteristics of border tourism, so this paper introduces the related theories of tourism resources evaluation, establishes a tourism resources investigation and evaluation system based on GIS, and analyzes the structure and spatial distribution characteristics of tourism resources with the help of GIS technology. In the evaluation method, the quantitative mathematical evaluation model is used, and the satellite image network map is used to plot, which realizes the functions of tourism resource collection and tourism resource attribute information input. The system test results show that the scheme can provide the partition statistics of excellent tourism resources, realize the visualization of the collected data, such as numbers, words, charts and images, and play an auxiliary decision-making function for the scientific management and utilization of tourism resources data. |
9,931 | Please write an abstract with title: Drone applications in transportation, and key words: Transportation, Time measurement, Planning, Security, Reliability, Monitoring, Drones. Abstract: This article provides an overview of existing drone applications in the delivery of goods, planning, design and monitoring of transport infrastructure, as well as an overview of the possibilities of drone applications in the professional and scientific traffic and transportation engineering problems. |
9,932 | Please write an abstract with title: A Simulation Model of the Impact of Solar Panel Dust Cover on them Performance, and key words: Temperature, Surface contamination, Conferences, Urban areas, Green products, Humidity, Data models. Abstract: The article discusses about the issues of photovoltaic related applications by using models developed by simulation, which also includes the dust consequences. The environmental factors influencing the generation of electrical energy by photovoltaic modules are considered. The main factors are analyzed, such as ambient temperature, humidity, wind, amount of precipitation, dust and the influence of these factors on each other. The results of comparison of the improved simulation model with existing models and a real object are presented. The importance and possibility of cleaning photovoltaic modules from dust is considered. |
9,933 | Please write an abstract with title: Design of 5G SISL BPFs Using Differential Inductor-Based Resonators, and key words: Band-pass filters, Q-factor, 5G mobile communication, Resonator filters, Resonant frequency, Microwave theory and techniques, Microwave circuits. Abstract: In this paper, 5G bandpass filters (BPFs) are designed and demonstrated using a novel differential inductor-based resonator (DINR) with compact size and second-order mode extension. The filter is implemented on the substrate integrated suspended line (SISL) platform that has high quality factor and self-packaging property. In the demo, two BPFs are designed and fabricated at center frequency of 760 MHz and 770MHz with miniature sizes, 0.035λg *0.065λg and 0.037λg *0.14λg respectively. The parasitic modes are at about 5.70 and 3.92 times of the basic mode separately. In future, the proposed resonator may help guide the design in other passive design as well. |
9,934 | Please write an abstract with title: Development of Visible Light Communication System for Automotive Applications Based on Organic Light Emitting Diode Panels, and key words: Road accidents, Roads, Urban areas, Organic light emitting diodes, Real-time systems, Safety, Automobiles. Abstract: Classical traffic light systems in various forms have served public transport for more than a hundred years now. Their basic principle is to inform drivers of all types of vehicles and also pedestrians of their current active status. The number of cars has increased drastically so that it is very common to get stuck in traffic in rush hours. The road infrastructures in cities use multiple lanes and also traffic lights to direct traffic and to ensure and safety. Today traffic lights can also be used simultaneously to establish communication between vehicles and infrastructure with the help of visible light communication (VLC). This new feature could be key in attempting to diminish road accidents with the use of important information. Real-time analysis of traffic information is required in order to pass relevant information to the driver. This can be gained with an interconnected infrastructure throughout the city. Therefore when a certain level of traffic is reached, redirection of traffic would prevent traffic jams, and also urgent messages like an incoming ambulance/fire truck/police car in the mission would be passed to drivers to allow free passage. In this era of information, informing prevents panic and also the sudden course of action. This paper describes the development of such capable traffic light, based on OLED decorative panels. The obtained traffic light system has been tested indoor for its suitability for vehicular applications. |
9,935 | Please write an abstract with title: Robust local localization of a mobile robot using a 180/spl deg/ 2-D laser range finder, and key words: Robustness, Mobile robots, Sonar detection, Robot sensing systems, Optimization methods, Working environment noise, Computer vision, Buildings, Data mining, Laser theory. Abstract: This paper describes a robust method for local self-localization using point-to-point and point-to-line matching with a Lorentzian estimator. A 2D laser telemeter is used to obtain distance measurements around the mobile robot within a 180/spl deg/ range. The goal is to find the rigid transformation (displacement and rotation) that match two consecutive laser scans despite noisy measurements (outliers). In order to obtain the transformation parameters, the Newton-Levenberg-Marquardt optimization method is used. Experimental results compare this approach with a correlation method and a point-to-point correspondence based on least squares. The proposed method shows better results, particularly when there is noisy data. |
9,936 | Please write an abstract with title: Approach to Compare Point Distribution Patterns Produced by Dimension Reduction Techniques, and key words: Measurement, Dimensionality reduction, HVAC, Sensor systems, Sensors, Object recognition, Principal component analysis. Abstract: Visualization techniques based on multidimensional data projection techniques are often applied to explore heterogeneous data from multiple sensors of the system. They could be used to produce graphical patterns of both normal and abnormal states of system functioning. However, it is necessary to define metrics and criteria to assess the applicability of different multi-dimensional data projection techniques to detect typical patterns and outliers. This paper analyzes approach based on Delaunay triangulation compare and evaluate distribution of points. The authors also discuss the choice of metric depending on type of multidimensional data projection technique. They are tested on the dataset describing functioning of HVAC system that contains different modes of system functioning. |
9,937 | Please write an abstract with title: Energy-Use Internet and Friendly Interaction with Power Grid: A Perspective, and key words: Internet, Business, Power grids, Companies, Biological system modeling, Energy consumption, Production. Abstract: The new round of Internet era will completely change the way of energy consumption and greatly improve the efficiency of energy utilization. It is imperative to integrate the energy industrial Internet with the widely known consumption Internet. In order to improve energy efficiency and introduce market competition mechanism, the concept of Energy-Use Internet (EUI) has been proposed in this paper. Within the scope of EUI, energy suppliers, energy service providers, energy aggregators and energy consumers are collectively referred to as energy elements. These energy elements with trading and circulation functions are regarded as the basis of EUI. Using the Internet thinking for reference, a fair and free energy service and trading platform needs to be constructed. The friendly interaction mechanism between EUI and power grid has been extensively studied, mainly focusing on interaction mode, business mode, and regulation from grid company. Finally, some key technologies to realize the perspective of EUI and interaction with power grid are discussed. |
9,938 | Please write an abstract with title: OFDM multi-antenna designs with concatenated codes, and key words: Concatenated codes, MIMO, Receiving antennas, Maximum likelihood decoding, Modulation coding, OFDM modulation, Communication systems, Laboratories, Error analysis, Channel coding. Abstract: This paper considers practical link designs that include different transmit, receive, and coding schemes for an OFDM system with two transmit and two receive antennas. In conjunction with studies on theoretical outage capacity, we compare link designs in terms of simulated frame error rate (FER) performance in different propagation environments. For channel coding, serial and parallel concatenated turbo-like codes are used and compared. For receive schemes, we compare maximum likelihood (ML) and linear MIMO receive algorithms and propose modifications to improve turbo decoding. For transmit schemes, we compare the Alamouti (1998) diversity scheme, a single-stream MIMO, and a multi-stream MIMO design. Interestingly, a 2/spl times/2 MIMO-OFDM design with ML receivers is found to under-perform the 2/spl times/2 Alamouti-OFDM design at low spectral efficiencies (e.g., 2, 4 b/subcarrier), even though MIMO has a slightly higher theoretical capacity. Also, the gap between the SNR required by the theoretical 1% outage capacity and that required by the single-stream MIMO-ML design at 10/sup -2/ FER is only 1-2 dB at spectral efficiencies of 2, 4 and 6 b/subcarrier, in an environment with rich spatial and frequency diversity. |
9,939 | Please write an abstract with title: A Temporary Transformer Network for Guide- Wire Segmentation, and key words: Image segmentation, Hospitals, Wires, Signal processing, Transformers, Convolutional neural networks, Task analysis. Abstract: In this paper, we solve the task of guide-wire segmentation in X-ray fluoroscopy sequences. Existing deep learning-based guide-wire segmentation models are mainly based on U-Net - a famous convolutional neural network (CNN) in the field of medical image segmentation. Despite its effectiveness, U-Net lacks the ability of modeling long-range dependency. Recently, transformers have attracted increasing attention due to its outstanding performance on modeling long-range dependency. Therefore, we try to adopt transformers to guide-wire segmentation task in this paper. In addition, existing models usually take the single frame as input and ignore the related information between different X-ray fluoroscopy frames in the same sequence. However, the related information can help networks to distinguish the common object through the entire sequence. From this insight, in this paper, we propose a temporary transformer network for guide-wire segmentation. Our network takes the current frame and the previous frames as inputs to obtain temporary information. And the transformers layers utilized in our network help capturing the long-range dependency in X-ray fluoroscopy sequences. Experimental results on the dataset from three hospitals demonstrate the-state-of-the-art performance of our network. |
9,940 | Please write an abstract with title: A Survey on Visual Speech Recognition Approaches, and key words: Visualization, Lips, Working environment noise, Speech recognition, Feature extraction, History, Visual databases. Abstract: The robustness of automatic speech recognition (ASR) systems degrade due to the factors such as environmental noises, speaker variability, and channel distortion, among others. The approaches such as speech signal processing, model adaptation, hybrid techniques and integration of multiple sources are used for ASR system development. This paper focuses on building a robust ASR system by combining the complementary evidence present is the multiple modalities through which speech is expressed. Speech sounds are produced with lip radiation accompanied lip movements called Visual Speech Recognition (VSR). VSR system converts lip movement into spoken words. This system consists of lip region detection, visual speech feature extraction method and modeling techniques. Robust feature extraction from visual lip movement is a challenging task in VSR system. Hence, this paper reviews the feature extraction methods and existing databases used for VSR system. The fusion of visual lip movements with ASR system at different levels is also presented. |
9,941 | Please write an abstract with title: Simulation Strategy of Bidding Behavior for Electricity Retailers in Direct Transactions, and key words: Companies, Contracts, Energy conservation, Linear programming, Power systems, Power generation, Analytical models. Abstract: In the medium and long-term electricity direct transactions, electricity retailers account for most of the demand-side market. Study the bidding behavior of electricity retailers is of great significance for evaluation of market model and trading rules. The article analyzes the main factors that affect the bidding behavior of electricity sales companies from three aspects: the market environment, market rules, and the electricity supplier’s own factors. Based on this, comprehensive consideration of the asset background, operating objectives, retail contracts and other factors of the power retail company, an agency bidding model was established, which covering three types of typical power retail companies, including expansion, stability, conservativeness and price acceptance. And the RE-learning algorithm is used to optimize the bidding strategy. Finally, the bidding model is verified by a simulation example. |
9,942 | Please write an abstract with title: Applications of Machine Learning Techniques in the Realm of Cybersecurity, and key words: Computer security, Computer crime, Security, Intrusion detection, Classification algorithms, Prediction algorithms, Machine learning algorithms. Abstract: Machine learning (ML) is the latest buzzword growing rapidly across the world, and ML possesses massive potential in numerous domains. ML technology is a subset of Artificial Intelligence (AI) and empowers digital machines with the ability to learn without being explicitly programmed, i.e., the capability to learn from past experiences. Since the last decade, ML technology has been used in various domains because it possesses numerous interesting characteristics such as adaptability, robustness, learnability, and its ability to take instant actions against unexpected challenges. The traditional cybersecurity systems are built on rules, attack signatures, and fixed algorithms. Thus, the systems can act only upon the <i>‘knowledge'</i> fed to them and human intervention is continually required for the proper functioning of traditional cybersecurity systems. On the other hand, ML technology can recognize various patterns from past experiences and is capable of predicting or detecting future attacks based on seen or unseen data. The ML technology is capable of handling massive real‐time network data which allows various issues present in conventional cybersecurity systems to be overcome. In the present chapter, various issues related to the applications of ML in cybersecurity have been discussed. The effectiveness of applying ML technology in cybersecurity affairs has been thoroughly investigated. The contemporary challenges being faced by researchers in the realm have been identified and discussed. The current chapter presents available datasets and algorithms for the successful implementation of ML technology in the domain of cybersecurity. The datasets are also compared across various parameters. Finally, applications of ML practices by three renowned businesses, Facebook, Microsoft, and Google are explored. |
9,943 | Please write an abstract with title: Miniaturized Reconfigurable Filtering Power Divider with Arbitrary Output Phase Difference and Improved Isolation, and key words: Power dividers, Wireless communication, Power filters, Filtering, Couplers, Microwave communication, Frequency conversion. Abstract: In this paper, a miniaturized reconfigurable power divider with frequency selectivity, arbitrary output phase difference and improved isolation is proposed. It is a cascade design of a filtering power divider (FPD) with a miniaturized quadrature coupler (MQC). Both the phase difference (0° or 180°) and the power division ratio of the FPD can be changed as desired, and the output phase difference of the cascaded circuit can be arbitrarily tuned within 360° based on the states of the reflected waves at the outputs of the FPD. Furthermore, a modified isolation network is designed and the isolation between the reflected waves of the cascaded circuit has been significantly improved. The experimental results show that the output phase difference can be continuously tuned from 0° to 360° with the isolation better than 14 dB within the whole frequency tuning range from 1 GHz to 1.3 GHz. |
9,944 | Please write an abstract with title: Simulation study on emergency evacuation of subway station considering panic emotions, and key words: Panic emotions, Subway station, Evacuation model, Analog simulation. Abstract: In order to analyze the emergency evacuation mechanism of subway station in panic emotions, improvng evacuation efficiency and reducing casualties and property losses. Based on the traditional cellular automata model and the improvement of A * and SIS algorithms, this paper fully considered the influence of the panic emotions of evacuees on evacuation behavior. At the same time, SIS algorithm was used to quantify the degree of individual panic, and A * algorithm was used to consider the optimal obstacle avoidance path selection in the context of obstacles. The combination of the two improved the cellular automata model. By drawing the model structure diagram, based on MATLAB simulation software, the evacuation model was programmed to show the escape behavior of evacuees under emergencies. Based on the questionnaire survey and theoretical analysis, the effects of four indicators, including the presence or absence of panic, panic threshold, emotional decay rate and pedestrian density, on evacuation efficiency were analyzed. The results show that there is a significant difference in the evacuation time between the platform layer and the station hall layer of the subway station with or without panic emotions. The evacuation time of pedestrians with panic is much longer than that without panic. When the emotional threshold increases, the evacuation time will gradually decrease. When it reaches a certain level, the evacuation time is not related to the panic emotional threshold. When the rate of emotional decay is less than 0.06, the panic value will remain at a high level. The greater the rate of emotional decay, the faster the panic value decreases. Pedestrian density is also the key to affecting evacuation. The greater the pedestrian density is, the more panic emotions spread in the room and then continue to strengthen. The increase in panic value leads to longer evacuation time. |
9,945 | Please write an abstract with title: Wheel Loader Scooping Controller Using Deep Reinforcement Learning, and key words: Wheels, Trajectory, Robots, Reinforcement learning, Earth, Task analysis, Soil. Abstract: This article presents a deep reinforcement learning-based controller for an unmanned ground vehicle with a custom-built scooping mechanism. The robot's aim is to autonomously perform earth scooping cycles with three degrees of freedom: lift, tilt and the robot's velocity. While the majority of previous studies on automated scooping processes are based on data recorded by expert operators, we present a method to autonomously control a wheel loader to perform the scooping cycle using deep reinforcement learning methods without any user-provided demonstrations. The controller's learning approach is based on the actorcritic, Deep Deterministic Policy Gradient algorithm which we use to map online sensor data as input to continuously update the actuator commands. The training of the scooping policy network is done solely in a simplified simulation environment using a virtual physics engine, which converges to an average of a 65% fill factor from the full bucket capacity and a 5 [sec] average cycle time. We illustrate the performance of the trained policy in simulations and in real-world experiments with 3 different inclination angles of the earth. An additional scooping experiment compared the performance of our controller to remote manual human control. Overall, the deep reinforcement learning-based controller exhibited good performance in terms of both achieved visually bucket fill with varying scooped earth weights of 4.1 - 7.2[kg], and a 5.1 - 7.1[sec] cycle time. The experimental results confirm the ability of our planner to fill bucket as required, indicating that our controller can be used for excavation purposes. |
9,946 | Please write an abstract with title: An approach to identification for robust control, and key words: Robust control, Length measurement, Linear systems, Energy states, System identification, Robustness, Upper bound, Ellipsoids, Power engineering and energy, Noise level. Abstract: Given measured data generated by a discrete-time linear system, we propose a model consisting of a linear time-invariant system affected by norm-bounded perturbation. Under mild assumptions, the plants belonging to the resulting uncertain family form a convex set. The approach depends on two key parameters: an a priori given bound of the perturbation and the input used to generate the data. It turns out that the size of the uncertain family can be reduced by intersecting the model families obtained by making use of different inputs. The model validation problem in this identification scheme is analyzed. For a given energy level, the invalidation problem yields the family of those models which can never be invalidated for any possible input of fixed energy and any possible perturbation; this leads to the intersection of all uncertain families. A consequence of the invalidation problem is that for finite length measurements not all models can be invalidated, using fixed-energy inputs. |
9,947 | Please write an abstract with title: Document Metadata, and key words: Metadata, Global Positioning System, Software, Image resolution, Transform coding, Python, Image coding. Abstract: This chapter looks at document metadata, which is information located within a file that is used to describe the contents of that file. It discusses different file types, the type of sensitive information that can potentially be left behind within a document, and tools that can be used to automatically discover and extract potentially sensitive metadata information from publicly accessible documents. The tools covered include Exiftool, Metagoofil, Recon‐NG metadata modules, Intrigue.io, and Fingerprinting Organizations with Collected Archives (FOCA). While Exiftool is great at reading metadata from files people already have, Metagoofil can help take the investigation further by allowing an investigator to find files about his/her target. A useful feature of FOCA is that it analyzes the document metadata prior to downloading the file and limits the downloads to only files that contain useful metadata information. |
9,948 | Please write an abstract with title: Computationally efficient neural network classifiers for next generation closed loop neuromodulation therapy - a case study in epilepsy, and key words: Pulse generation, Neural networks, Epilepsy, Medical treatment, Computer architecture, Programming, Neurostimulation. Abstract: This work explores the potential utility of neural network classifiers for real- time classification of field-potential based biomarkers in next-generation responsive neuromodulation systems. Compared to classical filter-based classifiers, neural networks offer an ease of patient-specific parameter tuning, promising to reduce the burden of programming on clinicians. The paper explores a compact, feed - forward neural network architecture of only dozens of units for seizure-state classification in refractory epilepsy. The proposed classifier offers comparable accuracy to filter- classifiers on clinician-labeled data, while reducing detection latency. As a trade-off to classical methods, the paper focuses on keeping the complexity of the architecture minimal, to accommodate the on-board computational constraints of implantable pulse generator systems. Clinical relevance-A neural network-based classifier is presented for responsive neurostimulation, with comparable accuracy to classical methods at reduced latency. |
9,949 | Please write an abstract with title: Minimal distortion principle for blind source separation, and key words: Blind source separation, Particle separators, Signal processing, Source separation, Predistortion, Independent component analysis, Noise reduction, Signal analysis, Transfer functions, Principal component analysis. Abstract: In blind source separation, the number of sensors is usually assumed to be equal to the number of sources. In this case, an indeterminacy appears with which any linear transform of an estimated source signal can also be considered another estimation of the source signal. Moreover, in the case that the number of sensors is greater than the number of sources, another indeterminacy arises due to the redundancy of the sensors. Although these indeterminacies are often considered unsubstantial and have been eliminated without definite bases, an appropriate normalization of the separator is important to enhance the accuracy of the separation result, particularly in the case of a convolutive mixture. The paper shows two principles for eliminating these indeterminacies: (i) minimal distortion principle; (ii) inverse minimal distortion principle. |
9,950 | Please write an abstract with title: Review on Ray Tracing Channel Simulation Accuracy in Sub-6 GHz Outdoor Deployment Scenarios, and key words: Channel models, Tools, Computational modeling, Antennas, Ray tracing, Predictive models, Loss measurement. Abstract: In this article, a review of the achieved accuracy in the literature for ray tracing (RT) based channel modeling is presented with a focus on outdoor propagation scenarios in the sub-6 GHz frequency range. The achieved accuracy is analyzed from three perspectives: 1) The input parameters which include the environmental description in the form of digital maps and the corresponding constitutive material parameters; 2) from the interaction mechanisms perspective and 3) from the output perspective where the achieved accuracy of predicted path loss is reviewed. Uniform assignment of materials to the entire propagation scenario is observed in most of the works in the literature which is attributed to the composite nature of common building materials and the difficulty of characterizing all material properties especially for outdoor scenarios. The digital maps are shown to introduce a certain degree of uncertainty in the RT predictions as most common sources of the maps hardly publish the accuracy. Notwithstanding, the prediction of path loss in most RT tools is observed to be rather robust against the inaccuracies in the input parameters with most RT tools achieving a prediction accuracy with a mean error below 4 dB and a standard deviation (STD) below 8 dB. |
9,951 | Please write an abstract with title: Suitability of pulse train control technique for BIFRED converter, and key words: Stress control, Lighting control, Rectifiers, Energy storage, DC-DC power converters, Voltage control, Pulse generation, Inductors, Magnetic analysis, Prototypes. Abstract: Pulse Train/spl trade/ control scheme is presented and applied to a boost integrated flyback rectifier/energy storage dc-dc (BIFRED) converter operating in discontinuous conduction mode (DCM), which avoids the light-load high-voltage stress problem. In contrast to the conventional control techniques, the principal idea of Pulse Train technique is to regulate the output voltage using a series of high and low energy pulses generated by the current of the inductor. The applicability of the proposed technique to both the input and magnetizing inductances of BIFRED converter is investigated. Analysis of BIFRED converter operating in DCM as well as the output voltage ripple estimation is given. Experimental results on a prototype converter are also presented. |
9,952 | Please write an abstract with title: STP Approach to Formulate k-Externally Stable Sets of Graphs, and key words: Sufficient conditions, Tools, Minimization, Mathematical models, Graph theory, Eigenvalues and eigenfunctions, Network systems. Abstract: In this paper the structure of graphs in terms of k-externally stable set (k-ESS) is investigated based on a new matrix product, called semi-tensor product of matrices. By defining an eigenvector and an eigenvalue of node subset of a graph, three necessary and sufficient conditions of k-ESS are proposed in a matrix form. Using these conditions, the concepts of k-ESS matrix are introduced. The k-ESS matrix provides the complete information of the corresponding structures of a graph. Further, an algorithm is designed to find all the structures of a graph by conducting a series of matrix operation. The proposed method and results may offer a new way to investigate the problems related to graph structures in the field of network systems. |
9,953 | Please write an abstract with title: Quality mesh generation for molecular skin surfaces using restricted union of balls, and key words: Mesh generation, Skin, Robustness, Visualization, Isosurfaces, Computational biology, Biology computing, Proteins, Shape, Software quality. Abstract: Quality surface meshes for molecular models are desirable in the studies of protein shapes and functionalities. However, there is still no robust software that is capable to generate such meshes with good quality. In this paper, we present a Delaunay-based surface triangulation algorithm generating quality surface meshes for the molecular skin model. We expand the restricted union of balls along the surface and generate an /spl epsiv/-sampling of the skin surface incrementally. At the same time, a quality surface mesh is extracted from the Delaunay triangulation of the sample points. The algorithm supports robust and efficient implementation and guarantees the mesh quality and topology as well. Our results facilitate molecular visualization and have made a contribution towards generating quality volumetric tetrahedral meshes for the macromolecules. |
9,954 | Please write an abstract with title: Sparse Bayesian Learning based on Fast Marginal Likelihood Maximization for Joint User Activity Detection and Channel Estimation in Grant-Free NOMA, and key words: Training, NOMA, Correlation, Simulation, Channel estimation, Signal processing algorithms, Signal reconstruction. Abstract: Grant-free non-orthogonal multiple access (GF-NOMA) is a promising solution to solve the massive connectivity problem with low latency and signaling overhead. User activity detection (UAD) and channel estimation (CE) are two enabling technologies in GF-NOMA systems. In this paper, a correlation-enhanced sparse Bayesian learning algorithm based on fast marginal likelihood maximization (CSBL-FM) is proposed, which can improve the performance of the UAD and CE without prior knowledge of channel state information and sparsity. Firstly, a multi-frame sparse model is proposed so as to exploit the correlation and sparsity characteristics of single time slot and among multiple frames. Then, in order to accurately realize signal reconstruction, channel estimation process is described as sparse signal recovery process based on user indicators and training sequences. Next, based on the proposed multi-frame sparse model, the loss function is derived and optimized to detect active users by utilizing fast marginal likelihood maximization. Simulation results show that the proposed CSBL-FM algorithm is practical to be applied in GF-NOMA system by achieving the balance between high reconstruction performance and fast convergence speed. |
9,955 | Please write an abstract with title: Efficient bit-oriented implementation of FIR filter using a new compressor, and key words: Finite impulse response filter, Computer architecture, Tree data structures, Adaptive filters, Digital filters, Automation, Delay, Frequency, Filtering, Kernel. Abstract: In this paper, we present a bit-oriented architecture for the digital finite impulse response (FIR) filter with adaptive coefficients. Instead of using multipliers, the FIR operation is regarded as the summation of a larger number of operands. Our architecture utilizes a new compressor called the six-to-triple compressor, which converts six data bits of equal weights into a triple-digit representation. Using such a compressor as the basic building block, an FIR can be implemented as an efficient and regular structure that lends itself to automation. Experiments show that the proposed architecture could achieve a 28.4 % reduction on the area-delay product as compared to the traditional high-speed transposed form for an FIR design. |
9,956 | Please write an abstract with title: Application of Magnitude and Phase Angle to Boundary Area-Based Algorithm for Unbalance Relay Protection Scheme in 115-kV Capacitor Bank, and key words: Capacitors, Relays, Capacitance, Fault location, PSCAD, Maintenance engineering, IEEE Standards. Abstract: Identification of fault locations in capacitor banks is still under development. Although, faults in capacitor banks can be detected by an unbalance relay, it cannot identify the fault location. To address this issue, this study proposes an algorithm that can categorize protection zones, identify fault phases, and identify the fault locations in a capacitor bank using the phase angle boundary area. The result showed that the proposed algorithm was effective in indicating the fault location. Performance of the proposed algorithm was compared with conventional methods based on the Electricity Generating Authority of Thailand standard and phasor diagrams. It was verified that the proposed algorithm was more effective than the conventional methods. It is useful for the development of the unbalance relay operation. |
9,957 | Please write an abstract with title: A novel design of optical cross-connects with multi-granularity provisioning support for the next-generation Internet, and key words: Optical design, Internet, Telecommunication traffic, Switches, Next generation networking, Optical fiber networks, Strategic planning, Wavelength routing, Wavelength assignment, Integer linear programming. Abstract: This paper proposes a scalable design for next-generation optical cross-connects (OXCs), where a novel strategy for dimensioning the network switching capability as a long term planning is presented. When traffic demand grows, the proposed scheme simply expands the switching capacity of OXCs in waveband- and fiber-switching tiers. To minimize the number of extra fibers for waveband- and fiber-switching tiers required to satisfy a given traffic matrix, we formulate the problem of routing and wavelength assignment with tunnel allocation (RWAT) into two integer linear programming (ILP) processes that are performed sequentially. Experiments are conducted on two sample networks to compare the throughput and the number of switch points when the networks adopt different switching architectures with different traffic loads. We conclude that the proposed optimization scheme can dimension the networks with expandability and scalability to the growing traffic demand. |
9,958 | Please write an abstract with title: CloakLoRa: A Covert Channel over LoRa PHY, and key words: Chirp, Cascading style sheets, Security, Receivers, Frequency modulation, Buildings, Payloads. Abstract: This paper describes our design and implementation of a covert channel over LoRa physical layer (PHY). LoRa adopts a unique modulation scheme (chirp spread spectrum (CSS)) to enable long range communication at low-power consumption. CSS uses the initial frequencies of LoRa chirps to differentiate LoRa symbols, while simply ignoring other RF parameters (e.g., amplitude and phase). Our study reveals that the LoRa physical layer leaves sufficient room to build a covert channel by embedding covert information with a modulation scheme orthogonal to CSS. To demonstrate the feasibility of building a covert channel, we implement CloakLoRa. CloakLoRa embeds covert information into a regular LoRa packet by modulating the amplitudes of LoRa chirps while keeping the frequency intact. As amplitude modulation is orthogonal to CSS, a regular LoRa node receives the LoRa packet as if no secret information is embedded into the packet. Such an embedding method is transparent to all security mechanisms at upper layers in current LoRaWAN. As such, an attacker can create an amplitude modulated covert channel over LoRa without being detected by current LoRaWAN security mechanism. We conduct comprehensive evaluations with COTS LoRa nodes and receive-only software defined radios and experiment results show that CloakLoRa can send covert information over 250m. |
9,959 | Please write an abstract with title: Efficient design of a frequency selective surface for a multi functional radar: theory and measurements, and key words: Frequency selective surfaces, Radar measurements, Radar theory, Frequency measurement, Electromagnetic waveguides, Antenna arrays, Radar antennas, Interference, Integral equations, Waveguide junctions. Abstract: This paper describes an efficient methodology for the design of steep roll-off Frequency Selective Surfaces (FSS's). The proposed technique is based on the Multimode Equivalent Network (MEN) approach, which was originally developed for the analysis of waveguide junctions. The MEN has been extended to the study of multi-layer patch based and aperture based FSS's. The result is a general formulation that allows characterizing complex structures, consisting of radiating apertures and FSS's, in the same framework used to account for feeding and filtering elements inside the waveguides. Moreover, thanks to the modularity of this approach, it will he shown in the paper that it can he used as agile design tool. In particular, this paper describes the design procedure for a multi-layer FSS to he integrated with the X-hand phased array of a Multi Functional Radar (MFR) in order to prevent interference from an antenna located in its proximity and operating in a partially overlapping frequency range. The analysis results of this integrated structure, obtained with our tools, were compared with those produced by a commercial code, showing very good agreements. The designed FSS has been manufactured and measured for different incidence angles. |
9,960 | Please write an abstract with title: Open Set Driver Activity Recognition, and key words: Vehicles, Activity recognition, Benchmark testing, Uncertainty, Support vector machines, Training, Task analysis. Abstract: A common obstacle for applying computer vision models inside the vehicle cabin is the dynamic nature of the surrounding environment, as unforeseen situations may occur at any time. Driver monitoring has been widely researched in the context of closed set recognition i.e. under the premise that all categories are known a priori. Such restrictions represent a significant bottleneck in real-life, as the driver observation models are intended to handle the uncertainty of an open world. In this work, we aim to introduce the concept of open sets to the area of driver observation, where methods have been evaluated only on a static set of classes in the past. First, we formulate the problem of open set recognition for driver monitoring, where a model is intended to identify behaviors previously unseen by the classifier and present a novel Open-Drive&Act benchmark. We combine current closed set models with multiple strategies for novelty detection adopted from general action classification [1] in a generic open set driver behavior recognition framework. In addition to conventional approaches, we employ the prominent I3D architecture extended with modules for assessing its uncertainty via Monte-Carlo dropout. Our experiments demonstrate clear benefits of uncertainty-sensitive models, while leveraging the uncertainty of all the output neurons in a voting-like fashion leads to the best recognition results. To create an avenue for future work, we make Open-Drive&Act public at www.github.com/aroitberg/open-set-driver-activity-recognition. |
9,961 | Please write an abstract with title: Mobi-Track: Distilling Direct Path in Time Domain for High Accuracy WiFi Tracking, and key words: Location awareness, Pervasive computing, Target tracking, Conferences, Prototypes, Hidden Markov models, Trajectory. Abstract: Thanks to the ability to decompose multipath from raw data, decimeter-level localization and tracking solutions have come to reality. Yet, one daunting task in such solutions is how to robustly and efficiently identify the direct path from multiple candidates. In this paper, we present Mobi-Track to explore the mobility of target to handle this challenge and output the trajectory precisely. Through a novel likelihood function, Mobi-Track can distill the direct-path with high probability. We further propose a Forward Pruning algorithm to reduce the computational burden and make it more applicable in practice. A prototype is implemented based on commercial WiFi NICs. Our extensive experiments show that Mobi-Track can achieve AOA error of about 16.1° in Line-of-Sight (LOS) scenario and 21.7° in Non-Line-of-Sight scenario, and a median tracking error of 0.86 m in LOS scenario, making Mobi-Track an excellent option for a wide range of indoor localization and tracking applications to significantly boost their performance. |
9,962 | Please write an abstract with title: Guest Editorial Multi-Modal Computing for Biomedical Intelligence Systems, and key words: Special issues and sections, Computational modeling, Biomedical imaging, Feature extraction, Intelligent systems, Magnetic resonance imaging. Abstract: The papers in this special section focus on multi-modal computing in biomedical applications. n recent years, the development of biomedical imaging techniques, integrative sensors, and machine learning, brings many benefits to the diagnosis of various diseases. We can collect, measure, and analyze vast volumes of health-related data using the technologies of computing and networking, leading to tremendous opportunities for the health and biomedical community. Meanwhile, these technologies have also brought new challenges and issues. Biomedical intelligence, especially precision medicine, is considered one of the most promising directions for healthcare development. |
9,963 | Please write an abstract with title: A novel frequency agile beam scanning reconfigurable antenna, and key words: Frequency, Wire, Geometry, Capacitors, Beam steering, Azimuthal plane, Algorithm design and analysis, Genetic algorithms, Design methodology, Tuning. Abstract: A new and novel design methodology is introduced for a frequency agile planar reconfigurable antenna capable of 360/spl deg/ beam scanning in the azimuthal plane. The versatility of the reconfigurable antenna is demonstrated through several design examples. A similar approach is then used to design a volumetric antenna which is capable of beam steering in three dimensions. Tuning of both 2D and 3D reconfigurable antenna designs is accomplished by means of variable capacitors, whose values are determined via a genetic algorithm optimization process. |
9,964 | Please write an abstract with title: Multi-Agent Simulation of Relationality Assets to Enable Community Vitalization, and key words: Visualization, MONOS devices, Postal services, Sociology, Statistics, Telephone sets, Urban areas. Abstract: This research aims to visualize the relationality between “Hito”, “Mono,” and “Koto”, in a community as relationality assets. The purpose is to develop an awareness of the relationality in communities and rebuild communities. In this paper, we explain a design of relationality assets. We built a simulation model using a multi-agent system to investigate how the proposed mechanisms work and influence the behaviors of the community as a system. |
9,965 | Please write an abstract with title: Online Black-Box Confidence Estimation of Deep Neural Networks, and key words: Training, Deep learning, Neural networks, Estimation, Training data, Prediction algorithms, Real-time systems. Abstract: Autonomous driving (AD) and advanced driver assistance systems (ADAS) increasingly utilize deep neural networks (DNNs) for improved perception or planning. Nevertheless, DNNs are quite brittle when the data distribution during inference deviates from the data distribution during training. This represents a challenge when deploying in partly unknown environments like in the case of ADAS. At the same time, the standard confidence of DNNs remains high even if the classification reliability decreases. This is problematic since following motion control algorithms consider the apparently confident prediction as reliable even though it might be considerably wrong. To reduce this problem real-time capable confidence estimation is required that better aligns with the actual reliability of the DNN classification. Additionally, the need exists for black-box confidence estimation to enable the homogeneous inclusion of externally developed components to an entire system. In this work we explore this use case and introduce the neighborhood confidence (NHC) which estimates the confidence of an arbitrary DNN for classification. The metric can be used for black-box systems since only the top-1 class output is required and does not need access to the gradients, the training dataset or a hold-out validation dataset. Evaluation on different data distributions, including small in-domain distribution shifts, out-of-domain data or adversarial attacks, shows that the NHC performs better or on par with a comparable method for online white-box confidence estimation in low data regimes which is required for real-time capable AD/ADAS. |
9,966 | Please write an abstract with title: Spontaneous Parametric Down Conversion in Linearly Uncoupled Resonators, and key words: Lasers and electrooptics, Harmonic analysis, Resonators, Electrooptical waveguides. Abstract: We study degenerate spontaneous parametric down conversion in a structure composed of two linearly uncoupled resonators, in which the linear properties of the fundamental and second harmonic field can be engineered independently. |
9,967 | Please write an abstract with title: Digital Tool for Prevention, Identification and Emergency Handling of Heart Attacks, and key words: Heart, Cardiac arrest, Medical services, Machine learning, Internet of Things, Object recognition, Informatics. Abstract: Heart attack is one of the most frequent causes of death in adults. The majority of heart attacks lead to death before any treatment is given to patients. The conventional mode of healthcare is passive, whereby patients themselves call the healthcare services requesting assistance. Consequently, if they are unconscious when heart failure occurs, they normally fail to call the service. To prevent patients from further harm and save their lives, the early and on-time diagnosis important. This paper presents an innovative web and mobile solution designed using it as Internet of Things (IoT) technology and Machine learning concepts to effectively manage heart patients, the ‘CARDIIAC’ system. This system can predict potential heart attack based on a set of identified risk factors. The system also can identify an actual heart attack using the readings from a wearable IoT device and notify the patient. The system is also equipped with emergency event coordination functionalities. Therefore, ‘CARDIIAC’ provides a holistic care for heart patients by effectively monitoring and managing emergencies related to heart diseases. This would be a socially important system to reduce the number of heart patients who die due to the inability to get immediate treatment. |
9,968 | Please write an abstract with title: Microcontroller-Based Design and Implementation of Flight Control System for a Small Quadrotor, and key words: Attitude control, Software design, Mathematical model, Microcontrollers, Tracking loops, Silicon compounds. Abstract: This paper aims to build up a control platform for a small quadrotor to complete the design work of flight control system, so that the quadrotor can move freely in three-dimensional space. Firstly, a reference coordinate system and the motion control model of quadrotor are established. The PID method of flight control system of quadrotor is chosen, and the attitude and position control of the aircraft are modeled and simulated in MATLAB. Secondly, the detection data of gyroscope and accelerometer are calculated preliminarily and then processed through filtering algorithm by using STM32 micro-controller. The results showed that the attitude and position loop are controlled smoothly under small-angle action, and the control law is verified. The design of the function modules of the quadrotor's attitude detection and flight control is completed. Therefore, the content of the research is generally correct and feasible. From these results, it is concluded that the hardware platform of quadrotor should be built up primarily, and the design of system software should be completed after the integration of each module. The attitude control and fixed altitude flight control of quadrotor and tracking flight mission can be achieved preliminarily in our control platform. |
9,969 | Please write an abstract with title: Application of Lightweight Wire in High Orbit Satellite, and key words: Connectors, Electrical engineering, Satellites, Wires, Reliability engineering, Extraterrestrial measurements, Orbits. Abstract: Aiming at the lightweight requirements for high-orbit satellite harness, this paper analyzes the key factors affecting the harness weight and puts forward two lightweight design schemes. One is for the signal transmission cable, which accounts for about 70% of the total mass of the whole satellite harness, using lightweight conductor AWG28 wires instead of AWG26 wires in a high-orbit satellite, and design the special assembly process. After optimization, the whole satellite harness weight is reduced 9.92kg. Another is using the domestic C55/x3 series, which is a lightweight insulated material aerospace wire, and designing the installation and protective measures for high-orbit satellite harness. Application results show that the whole satellite harness weight is reduced 6.21kg than before. The two lightweight design schemes presented in this paper are feasible and effective on the premise of ensuring technical performance, reliability and security design. |
9,970 | Please write an abstract with title: Uncheatable grid computing, and key words: Grid computing, Supercomputers, Computer industry, Costs, Distributed computing, Internet, Application software, Sampling methods, Microcomputers, Workstations. Abstract: Grid computing is a type of distributed computing that has shown promising applications in many fields. A great concern in grid computing is the cheating problem described in the following: a participant is given D = {x/sub 1/,...,x/sub n/}, it needs to compute f(x) for all x/spl isin/D and return the results of interest to the supervisor. How does the supervisor efficiently ensure that the participant has computed f(x) for all the inputs in D, rather than a subset of it? If participants get paid for conducting the task, there are incentives for cheating. We propose a novel scheme to achieve the uncheatable grid computing. Our scheme uses a sampling technique and the Merkle-tree based commitment technique to achieve efficient and viable uncheatable grid computing. |
9,971 | Please write an abstract with title: A Self-Sustained Smart Monitoring Platform for Capacitive De-Ionization Cell in Wireless Sensor Network, and key words: Electrodes, Monitoring, Computer architecture, Wireless sensor networks, Switched mode power supplies, Carbon, Microprocessors. Abstract: Water treatment is the most concerned research area as it is closely related to the quality of human life. Capacitive de-ionization (CDI) has become a popular desalination technique for water treatment in recent years; however, transferring CDI technology to practice industrial applications face many problems due to the lack of experience and ability of monitoring on its operation status. Thus, in this article, a novel self-powered smart monitoring platform (SMP) is codesigned with a laboratory-scale CDI cell by providing regulated polarized voltage to prevent faradaic reactions and to evaluate CDI's performance using desalination metrics. The proof-of-concept SMP can acquire sensory data and wirelessly transmit information to the reader by radio-frequency identification (RFID) technique. A laboratory-scale CDI cell is fabricated in house by the cost-effective carbon electrodes with high electrochemical stability. Experiments are conducted to evaluate the function of the system on real-time monitoring of the CDI cell for their conductivity, salt absorption, and charge efficiency. The measurement results demonstrate that the proposed prototype is effective in terms of supplying, monitoring, and diagnosing the operation condition of the CDI cell. Furthermore, the proof-of-concept SMP developed for the CDI reactor can achieve up to 8.8-m communication distance, while consuming 402.6 μW active power during operation. Therefore, it is a suitable choice for low-power and low-cost wireless sensor network. |
9,972 | Please write an abstract with title: Study on Maintenance Methods of Local Communication in Low-voltage Electric Data Acquisition System, and key words: Meters, Location awareness, Low voltage, Systematics, Data acquisition, Maintenance engineering, Power system stability. Abstract: The performance of low-voltage electric data acquisition depends on local communication quality, and routine maintenance should not be ignored. Showing communication situation visibly is helpful in problem diagnosis. This paper proposes maintenance methods of local communication to improve the stability and efficiency of data acquisition system. The key steps such as meter localization, belongingness and visible network description are given. The application experiments in advanced metering infrastructure(AMI) are conducted to validate the proposed method. |
9,973 | Please write an abstract with title: Visualisation of the results of human body thermal state simulation, and key words: Humans, Biological system modeling, Graphics, Object oriented modeling, Temperature distribution, Data visualization, Manufacturing, Hyperthermia, Personnel, Three dimensional displays. Abstract: The use is discussed of ActiveX Flash Player 6 for interface construction of human body thermal state calculation software. |
9,974 | Please write an abstract with title: Use of Augmented and 3D Visualization as a Tool to Support the Teaching of Spatial Geometry, and key words: Geometry, Visualization, Three-dimensional displays, Education, Tutorials, Tools, Software. Abstract: Geometry is a branch of Mathematics that helps us to work with distances, volumes, and areas in the real world. However, learning content related to Spatial Geometry, whose visual appeal should be an invitation to study, presents an unusual obstacle for the student: how to understand the elements of a three-dimensional object if they are normally presented in a two-dimensional way (e.g., drawn on the whiteboard or book)? There is several software that can be used in the teaching of Space Geometry. However, in most times, the teacher has no contact with these tools, either due to unavailability of hardware to interact; or due to difficulty in acquiring the software, which in turn may be due to the cost or lack of knowledge of the means to make the acquisition. The focus of this paper is to present the experience report on the use of Augmented Reality using tutorials developed by NIEP group, aiming to generate personalized material for use in the classroom by high school students in Mathematics, in the teaching/learning of Space Geometry. The results found demonstrate improved learning, better understanding of the content and reduced learning time. |
9,975 | Please write an abstract with title: Weakly Supervised Discriminative Learning With Spectral Constrained Generative Adversarial Network for Hyperspectral Anomaly Detection, and key words: Generative adversarial networks, Detectors, Hyperspectral imaging, Feature extraction, Anomaly detection, Supervised learning, Gaussian distribution. Abstract: Anomaly detection (AD) using hyperspectral images (HSIs) is of great interest for deep space exploration and Earth observations. This article proposes a weakly supervised discriminative learning with a spectral constrained generative adversarial network (GAN) for hyperspectral anomaly detection (HAD), called weaklyAD. It can enhance the discrimination between anomaly and background with background homogenization and anomaly saliency in cases where anomalous samples are limited and sensitive to the background. A novel probability-based category thresholding is first proposed to label coarse samples in preparation for weakly supervised learning. Subsequently, a discriminative reconstruction model is learned by the proposed network in a weakly supervised fashion. The proposed network has an end-to-end architecture, which not only includes an encoder, a decoder, a latent layer discriminator, and a spectral discriminator competitively but also contains a novel Kullback–Leibler (KL) divergence-based orthogonal projection divergence (OPD) spectral constraint. Finally, the well-learned network is used to reconstruct HSIs captured by the same sensor. Our work paves a new weakly supervised way for HAD, which intends to match the performance of supervised methods without the prerequisite of manually labeled data. Assessments and generalization experiments over real HSIs demonstrate the unique promise of such a proposed approach. |
9,976 | Please write an abstract with title: Lossless Data Transmission by means of IEEE 802.11aa GCR Block Ack with TXOP-Bursting and AIFS Control, and key words: Wireless communication, Adaptation models, Computer simulation, Computational modeling, Propagation losses, Data models, Data communication. Abstract: This paper utilizes IEEE 802.11aa GCR Block Ack and TXOP-Bursting for lossless groupcast of computer data. Both mechanisms are mainly for audiovisual communications. We adopt them for computer data groupcast. We propose a dynamic control method of EDCA parameters to allow TXOP-Bursting without interfering with other traffic. We perform a computer simulation to evaluate the required time for lossless transmission. As a result, we show that GCR Block Ack using TXOP-Bursting with the dynamic control of the EDCA parameters can shorten the time needed for lossless transmission. |
9,977 | Please write an abstract with title: Review on Generative Adversarial Network in Computer Vision: Methods and Metrics, and key words: Measurement, Computer vision, Superresolution, Time series analysis, Generative adversarial networks, Natural language processing, Task analysis. Abstract: Generate adversarial networks (GAN) is a popular method, which can be widely used in numerous research areas, such as computer vision, natural language processing, and time series synthesis. However, few references are proposed to give a comprehensive review on GAN based methods. This paper aims to provide a detailed review of GAN based algorithms on computer vision tasks, such as image style transfer, image/video generation, image matting, and image super-resolution. Furthermore, we conclude the evaluation metrics for those tasks to show the effectiveness of GAN based on method. Our review can help beginners recognize the GAN based methods and give a brief introduction on how to apply them to their tasks. |
9,978 | Please write an abstract with title: A "Low-Tech" design experiment improving student work, and key words: Educational institutions, Eyes, Prototypes, Bridges, Stress, Seminars, Engineering profession. Abstract: Following Collins' work (1992, 1996), a design experiment had graduate music students create an on-line journal of peer-reviewed articles to introduce them to the professional process. The students reported learning a great deal and the professor found that most produced work that greatly exceeded his expectations. Positive results were independent of previous computing or subject matter experience, and improvement was noted in all but the lowest performing student. |
9,979 | Please write an abstract with title: Empirical Estimation and Analysis of the Dark Ideality factor ‘n’ of single c-Si and c-GaAs Solar cells at Different Sun Irradiation, and key words: Photovoltaic cells, Temperature measurement, Sun, Semiconductor diodes, Temperature, P-n junctions, Voltage measurement. Abstract: The dark `n' value of an illuminated single p-n junction solar cell is a critical parameter that influences the overall performance of the cell. We have estimated the dark `n' values of single cells of c-Si and c-GaAs using an empirical approach by combining measured data of the cells with a simple and straight forward One Diode PV model of a single p-n junction solar cell. Results obtained suggest that the dark `n' values of c-Si cells are larger than that of c-GaAs cells at 1 Sun illumination. The `n' values for both types of cells increase when the illumination is reduced to 0.95 Sun. Our measurements also predict External Quantum Efficiency (EQE) of both cells indicating contributions at each wavelength of the illumination consistent with the bandgap of Si and GaAs. |
9,980 | Please write an abstract with title: Patterning nanoscale resist features on topography substrates using the 2-step NERIME FIB TSI process, and key words: Resists, Lithography, Substrates, Ion beams, Electron beams, Etching, Plasma applications, Surface topography, Integrated circuit technology, Optical scattering. Abstract: The 2-step negative resist image by dry etching (2-step NERIME) focused ion beam (FIB) top surface imaging (TSI) process was previously reported as a suitable technique for patterning nanometer scale features in DNQ/novolak based resists, on a range of planar substrate materials. We demonstrate, for the first time, 90 nm resist features patterned using Shipley SPR6600 resist and the 2-step NERIME process over substrate topography. The resultant resist features exhibit excellent profile control across topography, and demonstrate the suitability of the 2-step NERIME process as a nanolithography technique for applications requiring nanometer resist critical dimension (CD) and profile control over substrate topography. |
9,981 | Please write an abstract with title: Psachno: a dynamic and generic discovery framework within a peer-to-peer network model, and key words: Peer to peer computing, Protocols, Security, Software engineering, Distributed computing, Computer architecture, Computer science, Abstracts, Performance analysis, Network servers. Abstract: We investigate the varying discovery protocols available and abstracts common elements to provide an interoperable framework. We look into a variety of discovery domains and treating all discoverable items as resources. An analysis and abstraction of common elements is performed to provide a structured hierarchy of discovery semantics. Different network models were investigated to derive a dynamic discovery interface from all terminal types including servers, workstations and PDAs. As proof of concept, a security model has been implemented to provide an optimized and secure discovery framework that will integrate with the associated protocols' security models. This analysis motivates the design of a generic discovery framework that provides an open interface and integrates with existing and future discovery protocols. |
9,982 | Please write an abstract with title: Distance preserving mappings from binary vectors to permutations, and key words: Tin, Hamming distance, Zinc, Convolutional codes, Computer science, Technology management, Engineering management, Informatics, Modulation coding, Binary codes. Abstract: Mappings of the set of binary vectors of a fixed length to the set of permutations of the same length, preserving or increasing the Hamming distance, are useful for the construction of permutation arrays. In this paper, explicit constructions of such mappings are given. |
9,983 | Please write an abstract with title: FDTA: Fully Convolutional Scene Text Detection With Text Attention, and key words: Feature extraction, Machine learning, Object detection, Text recognition, Neural networks, Support vector machines, Shape. Abstract: Text detection is the premise and guarantee of text recognition. Multi-oriented text detection is the current research hotspot. Due to the variability in size, spatial layout, color and the arrangement direction of natural scene text, natural scene text detection is still very challenging. Therefore, this paper proposes a simple and fast multi-oriented text detection method. Our method first optimizes the regression branch by designing a diagonal adjustment factor to make the position regression more accurate, which increases F-score by 0.8. Secondly, we add an attention module to the model, which improves the accuracy of detecting small text regions and increases F-score by 1.2. Then, we introduce DR Loss to solve the problem of positive and negative sample imbalance, which increases F-score by 0.5. Finally, we conduct experimental verification and analysis on the ICDAR2015, MSRA-TD500 and ICDAR2013 datasets. The experimental results demonstrate that this method can significantly improve the precision and recall of scene text detection, and it has achieved competitive results compared with existing advanced methods. On the ICDAR 2015 dataset, the proposed method achieves an F-score of 0.849 at 9.9fps at 720p resolution. On the MSRA-TD500 dataset, the proposed method achieves an F-score of 0.772 at 720p resolution. On the ICDAR 2013 dataset, the proposed method achieves an F-score of 0.887 at 720p resolution. |
9,984 | Please write an abstract with title: A turbo coded multiple description system for multiple antennas, and key words: Turbo codes, Iterative decoding, Wireless communication, Receiving antennas, Transmitting antennas, Modulation coding, Fading, Source coding, Communication systems, Multimedia communication. Abstract: We propose a joint source-channel coding scheme for wireless communication systems with multiple transmit and receive antennas. The source coder is realized by a multiple description encoder that generates multiple bit streams for the same source. Each description is then separately turbo coded and transmitted using multiple antennas. For the receiver, we describe a suitable iterative joint source-channel decoding technique that exploits the correlations between the descriptions. Finally, we present several examples that illustrate the performance of the proposed system and compare it with other approaches. |
9,985 | Please write an abstract with title: Hybrid Face Reflectance, Illumination, and Shape From a Single Image, and key words: Faces, Lighting, Shape, Skin, Image color analysis, Estimation, Data models. Abstract: We propose HyFRIS-Net to jointly estimate the hybrid reflectance and illumination models, as well as the refined face shape from a single unconstrained face image in a pre-defined texture space. The proposed hybrid reflectance and illumination representation ensure photometric face appearance modeling in both parametric and non-parametric spaces for efficient learning. While forcing the reflectance consistency constraint for the same person and face identity constraint for different persons, our approach recovers an occlusion-free face albedo with disambiguated color from the illumination color. Our network is trained in a self-evolving manner to achieve general applicability on real-world data. We conduct comprehensive qualitative and quantitative evaluations with state-of-the-art methods to demonstrate the advantages of HyFRIS-Net in modeling photo-realistic face albedo, illumination, and shape. |
9,986 | Please write an abstract with title: Learning the Jawa Culture by using Android Smartphone, and key words: Java, Art, Machine learning algorithms, Databases, Oceans, Games, Writing. Abstract: Javanese culture is a culture that the Javanese own, and the Javanese have started to exist with their culture since before the era of the Majapahit kingdom, and the Javanese are famous for their ability to sail the oceans. In addition, the many temples built, which are currently historical sites, prove that the Javanese are a large ethnic group that inhabits the island of Java. Other Javanese cultures include Javanese handicrafts such as kris, Javanese dance, Javanese batik art, Javanese wayang art, Javanese carving art, Javanese songs, and Javanese writings. All these cultures are part of the wealth of the unitary state of the Republic of Indonesia that must be preserved and passed down from one generation to another, and current technological developments tend to make the current generation less aware of preserving the culture of their ancestors. Therefore, we use technology to create an application for learning Javanese culture by applying game elements as entertainment elements. The business process of this application is modeled using use case diagrams and class diagrams to describe the database relationships. This mobile application is built using android studio and uses a MySQL database. |
9,987 | Please write an abstract with title: Analog optical generation and transport for 5G millimeter wave systems, and key words: 5G mobile communication, Simulation, Conferences, Optical saturation, Dynamic range, Wavelength division multiplexing, Harmonic analysis. Abstract: A scheme for optical generation and transport of 5G NR signals in the analog format using a frequency upconverter is discussed with simulation and experimental results. The proposed scheme can be extended with optical WDM to transport multiple channels to meet the RRH's requirements. |
9,988 | Please write an abstract with title: Decentralized Dual Proximal Gradient Algorithms for Non-Smooth Constrained Composite Optimization Problems, and key words: Optimization, Signal processing algorithms, Power systems, Machine learning, Machine learning algorithms, Linear programming, Multi-agent systems. Abstract: Decentralized dual methods play significant roles in large-scale optimization, which effectively resolve many constrained optimization problems in machine learning and power systems. In this article, we focus on studying a class of totally non-smooth constrained composite optimization problems over multi-agent systems, where the mutual goal of agents in the system is to optimize a sum of two separable non-smooth functions consisting of a strongly-convex function and another convex (not necessarily strongly-convex) function. Agents in the system conduct parallel local computation and communication in the overall process without leaking their private information. In order to resolve the totally non-smooth constrained composite optimization problem in a fully decentralized manner, we devise a synchronous decentralized dual proximal (SynDe-DuPro) gradient algorithm and its asynchronous version (AsynDe-DuPro) based on the randomized block-coordinate method. Both SynDe-DuPro and AsynDe-DuPro algorithms are theoretically proved to achieve the globally optimal solution to the totally non-smooth constrained composite optimization problem relied on the quasi-Fejér monotone theorem. As a main result, AsynDe-DuPro algorithm attains the globally optimal solution without requiring all agents to be activated at each iteration and thus is more robust than most existing synchronous algorithms. The practicability of the proposed algorithms and correctness of the theoretical findings are demonstrated by the experiments on a constrained Decentralized Sparse Logistic Regression (DSLR) problem in machine learning and a Decentralized Energy Resources Coordination (DERC) problem in power systems. |
9,989 | Please write an abstract with title: Less can be more. Holes in polymers lead to a new paradigm of piezoelectric materials for electret transducers, and key words: Polymers, Piezoelectric materials, Electrets, Piezoelectric transducers, Pyroelectricity, History, Space charge, Biological materials, Piezoelectric effect, Thermal stability. Abstract: The review begins with a very brief history of electrets and of piezo and pyroelectricity in nonuniform space charge electrets. The development of cellular propylene as an electret-transducer material since the mid-eighties is described, and the accompanying research into the origins of (quasi-)ferro-, pyro- and piezoelectric effects in voided polymer electrets is discussed in some detail. In this context, the most relevant charging and measuring techniques for piezo and pyroelectric polymer-foam electrets are introduced. Porous fluoropolymer electrets and their investigation as single or multiple-layer piezoelectrics are considered in view of their better thermal and temporal stabilities. Finally, some proposed or demonstrated applications of voided polymer electrets are briefly mentioned. |
9,990 | Please write an abstract with title: The mechanical design of a high-power, dual-frequency, millimeter-wave antenna feed system, and key words: Frequency selective surfaces, Cooling, Optical device fabrication, Optical waveguides, Antenna feeds. Abstract: This paper describes the mechanical design and fabrication of a high power, dual-frequency, millimeter-wave feed system. The feed system consists of a 35 GHz circularly polarized monopulse subsystem and a 95 GHz circularly polarized feed. The 35 GHz feed is designed to handle 5.0 KW average power and the 95 GHz 1.2 KW average power. A Frequency Selective Surface (FSS) is incorporated to provide dual frequency capability. Each feed is liquid cooled to provide suitable cooling during high power of operation. The two feeds and FSS assembly are mounted in a supporting space frame to provide an optically integral assembly ready to be mounted at the vertex of a reflector. The paper addresses three main areas: the general feed design, which includes the manufacturing processes, flange considerations and waveguide cooling; the FSS fabrication; and beam alignment for both the primary and secondary fields. |
9,991 | Please write an abstract with title: Plasma polaritron instability in semiconductor superlattice, and key words: Semiconductor superlattices, Periodic structures, Maxwell equations, Optical materials, Plasma waves, Organizing, IEEE catalog, Optimized production technology, Geometrical optics, Optical superlattices. Abstract: The conditions of instability of plasma polaritons in infinite structures, which were derived by a periodic recurrence of two alternating semiconductor layers, was considered. It was assumed that carrier drift takes place. The conditions for the appearance of the instability and its increments of growth were derived. |
9,992 | Please write an abstract with title: A tracking system based on 2-DOF motion platform for flight simulator, and key words: Acceleration, Kinematics, Trajectory, Mathematical model, Tracking, Kalman filters. Abstract: With the development of flight control technologies, there is an increasing demand of flight simulators. Although the 6-DOF and 3-DOF flight simulators, can simulate different kinds of motion states, it has complex structure and is difficult to control and implement. Meanwhile, to improve the smooth movements, the paper designed a tracking system based on a 2-DOF motion platform, which consisted of a motion control system and 3D flight simulation software (Cessna 172 Simulator kits). The motion platform has a 2-DOF hybrid mechanism, where the motion control system realizes the tracking algorithm. The 3D flight simulation software calculates the flight data in real time. The quintic and the cubic polynomial trajectory tracking algorithms are proposed to solve the jitter problem of data transmission time. Finally the flight simulation platform is implemented to test the tracking system, and the results showed that it can track precise posture of aircraft with smooth velocity and acceleration. |
9,993 | Please write an abstract with title: Nonstationary model validation from finite data records, and key words: Power system modeling, System testing, Statistical analysis, Probability distribution, Performance evaluation, Navigation, Random variables, Distributed computing, Time varying systems. Abstract: The problems associated with testing a dynamical model, using a data record of finite length, are insufficiency of the data for statistically meaningful decisions, coupling of mean, covariance, and correlation related errors, difficulty of detecting midcourse model departures, and inadequacy of traditional techniques for computing test power for given model alternatives. This paper attempts to provide a comprehensive analysis of nonstationary models via significance tests, specifically addressing these problems. Data records from single and from multiple system operations are analyzed, and the models considered are possibly varying both with respect to time and with respect to operations. Quadratic form distributions prove effective in the statistical analysis. |
9,994 | Please write an abstract with title: A Practical Man-in-the-Middle Attack on Deep Learning Edge Device by Sparse Light Strip Injection into Camera Data Lane, and key words: Deep learning, Bridges, Strips, Perturbation methods, Image edge detection, Streaming media, Cameras. Abstract: The vulnerability of deep neural networks (DNNs) has been exposed by adversarial examples. Although the adversarial perturbations can be made visually imperceptible or photorealistic on any image, they have to be added offline on pre-captured static input in order to accomplish the malicious goal. As opposed to subtle distortion, real-time misclassification on streaming images can be realized by manipulating the objects in physical world. Recently, object-contactless physical attacks, as exemplified by a translucent sticker affixed to the lens of a camera, show that a sensor-enabled edge computing platform can be an alluring target of adversarial attack. Nevertheless, success rates of reported camera-based patch attacks are not high enough to overshadow other forms of evasion attacks even when they are performed under the white-box scenario. In this paper, we present a practical and robust fault injection approach cooperated with a hardware-friendly sparse strip pattern to deceive the deployed DNN device on real-time streaming images. The strip perturbation is generated in a line-offset form by an optimization algorithm. It can be injected into camera data lane between the image sensor and the endpoint node stealthily without disturbing the data traffic through an interface bridge implemented by a tiny off-the-shelf FPGA device. We demonstrate our attack on the Raspberry Pi 4 platform with the Pi camera v2 and the Intel NCS2 inference stick. By evaluating 280 physically captured images from ten objects in 28 viewing angles, we show that the proposed attack on four ImageNet models including ResNet50, MobileNet-v2, Inception-v3 and EfficientNet-B0 can achieve 89.2% ∼ 96.1% success rates. |
9,995 | Please write an abstract with title: Adaptive snakes using the EM algorithm, and key words: Image edge detection, Shape, Robustness, Motion estimation, Active contours, Lips, Image converters, Deformable models, Convergence, Computer vision. Abstract: Deformable models (e.g., snakes) perform poorly in many image analysis problems. The contour model is attracted by edge points detected in the image. However, many edge points do not belong to the object contour, preventing the active contour from converging toward the object boundary. A new algorithm is proposed in this paper to overcome this difficulty. The algorithm is based on two key ideas. First, edge points are associated in strokes. Second, each stroke is classified as valid (inlier) or invalid (outlier) and a confidence degree is associated to each stroke. The expectation maximization algorithm is used to update the confidence degrees and to estimate the object contour. It is shown that this is equivalent to the use of an adaptive potential function which varies during the optimization process. Valid strokes receive high confidence degrees while confidence degrees of invalid strokes tend to zero during the optimization process. Experimental results are presented to illustrate the performance of the proposed algorithm in the presence of clutter, showing a remarkable robustness. |
9,996 | Please write an abstract with title: Development a Wideband ESIW H - Plane Horn Antenna with Improved Radiation Performance, and key words: Horn antennas, Antennas, Impedance, Substrates, Reflector antennas, Slot antennas, Aperture antennas. Abstract: In this paper a wideband H-plane horn antenna using empty substrate integrated waveguide (ESIW) is introduced. In the proposed structure, the dielectric inside the antenna is completely removed and so, the waveguide losses are reduced and antenna radiation efficiency is increased. Adding a non-radiation slot on the top side of the antenna structure and an extra layer behind it, in addition to preserving the antenna profile, would increase the impedance bandwidth up to 4.3 GHz. Moreover, adding a metallic reflector plate at the radiating aperture of the antenna, improves antenna gain and Side Lobe Level (SLL). The antenna provides 16.4 % impedance bandwidth from 28 GHz up to 33 GHz. In the generated bandwidth, the antenna gain is among 7.3 dBi to 11.7 dBi and radiation efficiency is at least 96%. |
9,997 | Please write an abstract with title: Multimodal Early Septic Shock Prediction Model using Lasso Regression with Decaying Response, and key words: Electric shock, Time series analysis, Medical services, Predictive models, Real-time systems, Data models, Informatics. Abstract: Sepsis is one of the leading causes of in-hospital deaths. In this paper, we propose a multimodal early prediction system for septic shock, which is a serious complication for patients with sepsis. Our system utilizes patients vital and laboratory time series data in combination with medical notes to predict patients at risk of septic shock in real-time. Our model achieves 0.89 ROC AUC and a median detection time of 30.64 hours before the onset of the septic shock event at a specificity of 0.67. Our proposed method uses lasso regression with modified response decay to model the risk as we go further away in time from the septic shock event. We compare the performance of our model to baseline and state-of-the-art models used to predict early deterioration and septic shock in ICU patients. Our model shows improvement in both ROC AUC and median detection time at all specificities. This translates into an earlier prediction time at a higher true positive rate for the same false positive rate. Moreover, we investigate the ROC AUC and median detection time trade-off and propose an automated way for model selection under such trade-off. We also demonstrate how the model selection step could also be modified to optimize for a predefined user utility. |
9,998 | Please write an abstract with title: MODIS ocean and atmospheric applications using TeraScan software, and key words: MODIS, Oceans, Application software, Clouds, Aerosols, Software algorithms, Broadcasting, Biosensors, Biomedical optical imaging, Optical sensors. Abstract: SeaSpace Corporation's TeraScan software has been employed in generating ocean and atmospheric data products from Terra and Aqua MODIS (Moderate Resolution Imaging Spectroradiometer) direct broadcast data. TeraPGS (TeraScan Product Generation System) is a system for automatically generating and distributing products according to user specifications. TeraPGS can generate and deliver both TDF (TeraScan Data Format) and picture products. In this paper we show examples of ocean color, cloud, and aerosol products derived from Terra and Aqua MODIS sensor data using TeraPGS. Ocean color products were generated using the MOD/spl I.bar/PR18 algorithms. Ocean chlorophyll was generated using the MODIS biooptical algorithm (MODCL2A). Aerosols and aerosol optical thickness (Tau/spl I.bar/865) was computed fromMODPR/spl I.bar/04/spl I.bar/05 andMODOCL2. Cloud products were generated using NASA's cloud mask (MODS 5) and cloudtop (MOD06CT) algorithms. These algorithms are identical to the NASA GSFC DAAC operational level-2 algorithms and have been fully integrated with TeraScan's TeraPGS software. The data processing flow examples will include level 0, level 1a, level 1b, earth-location, Image navigation, atmospheric correction and level 2 product generation from MODIS. |
9,999 | Please write an abstract with title: Analysis of Spectrum Sharing in Hybrid Satellite-Terrestrial Networks, and key words: Satellite broadcasting, Mobile communication, Market research, Explosives, Resource management, Information technology, Optimization. Abstract: With the trend of integrally developing satellite communication networks and terrestrial mobile communication networks becoming more and more prevalent, hybrid satellite-terrestrial networks (HSTN) is gradually regarded as the basic expectation framework of the sixth-generation mobile communication technology. However, since frequency band resources are limited, the explosive growth of communication device and traffic data has led the frequency band resources that can be exploited and utilized by existing technologies to become increasingly scarce, which will restrict the development of HSTN as a key bottleneck. To break this development obstacle for HSTN, achieving spectrum sharing technology between satellite and terrestrial networks has become a desirable technical measure. In this paper, we study the problem of spectrum sharing in hybrid satellite-terrestrial networks, and different spectrum sharing scenarios and radio resource coordination technologies are introduced. The performance of these models related to different techniques scheme is then presented. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.