ID
int64 0
400k
| content
stringlengths 97
5.85k
|
---|---|
300 |
Please write an abstract with title: Challenges in KNN Classification, and key words: Training, Nearest neighbor methods, Data mining, Prediction algorithms, Training data, Partitioning algorithms, Licenses. Abstract: The KNN algorithm is one of the most popular data mining algorithms. It has been widely and successfully applied to data analysis applications across a variety of research topics in computer science. This paper illustrates that, despite its success, there remain many challenges in KNN classification, including K computation, nearest neighbor selection, nearest neighbor search and classification rules. Having established these issues, recent approaches to their resolution are examined in more detail, thereby providing a potential roadmap for ongoing KNN-related research, as well as some new classification rules regarding how to tackle the issue of training sample imbalance. To evaluate the proposed approaches, some experiments were conducted with 15 UCI benchmark datasets.
|
301 |
Please write an abstract with title: Computer Education of the Primary Years Programme Exhibition at International Baccalaureate Schools During the COVID-19 Pandemic, and key words: COVID-19, Pandemics, Conferences, Education, Software. Abstract: This paper investigates computer education and learning of the Primary Years Programme Exhibition (PYPX) project held at the end of the transitional grade of elementary to middle school at International Baccalaureate (IB) Schools during the COVID-19 pandemic. During the COVID-19 pandemic, most of the schools' study and work activities were moved online, which brought significant challenges to elementary school students who were new to computers. On the other hand, it was also a great chance for students to learn more computer skills by digitally completing their PYPX project. We researched 33 11-year-old students who completed the PYPX projects for the pandemic years 2020 and 2021.
|
302 |
Please write an abstract with title: Current Situation and Countermeasure Analysis of Big Data Network Public Opinion Research in China and Abroad Based on Bibliometrics : —Taking the study of Internet public opinion in universities as an example, and key words: Bibliometrics, Social sciences, Data visualization, Big Data. Abstract: With the development of technology and diversification of research perspectives, the study of online public opinion related to big data has gradually become a hot topic. In this study, we searched CNKI platform and web of science papers on “online public opinion”, “online public sentiment” and “big data” in the last three years, used Citespace, BibExcel to analyze and VOSviewer to visualize. The comparison showed that the Chinese and English literature differed in terms of their disciplinary fields, popular research topics, and literature citations. This study takes this category of literature as an example and summarizes six most frequently proposed policy suggestions through content analysis. It is also found that there are three main deficiencies in the literature: the method is not strict enough, the research results are targeted at a single or wrong target, and the strategy recommendations are mostly general. Finally, based on the comparison of Chinese and English bibliometrics results and content analysis results, this study makes some suggestions for domestic researchers, such as paying attention to technical exploration and application of quantitative methods, and clarifying responsible subjects in research results.
|
303 |
Please write an abstract with title: Exploiting the Flexibility Potential of Water Distribution Networks: A Pilot Project in Belgium, and key words: Flexibility, water distribution network, model predictive control. Abstract: Flexibility, and in particular, energy storage is expected to assume a key role in the efficient and secure operation of the power system, and thus, in the transition towards a carbon-free electricity sector. In this paper, we propose a methodology for exploiting the flexibility existing in water distribution systems from water storage in reservoirs. The methodology relies first on a modelling approach, from which an optimization problem is defined. The resolution of this optimization problem leads to an operating pattern for the pumps. The methodology assumes that all the electricity is bought on the day-ahead market, where the bids are placed by constructing and solving an optimization problem. The uncertain water consumption and the electricity market prices are predicted using machine learning techniques. The methodology is tested on a real-life water distribution network in Belgium and the results from the pilot project indicate a cost reduction up to 11%.
|
304 |
Please write an abstract with title: Multiple Features Driven Author Name Disambiguation, and key words: Web services, Conferences, Feature extraction, Information retrieval, Data mining, Recommender systems. Abstract: Author Name Disambiguation (AND) has received more attention recently, accompanied by the increase of academic publications. To tackle the AND problem, existing studies have proposed many approaches based on different types of information, such as raw document feature (e.g., co-author, title, and keywords), fusion feature (e.g., a hybrid publication embedding based on raw document feature), local structural information (e.g., a publication's neighborhood information on a graph), and global structural information (e.g., the interactive information between a node and others on a graph). However, there has been no work taking all the above-mentioned information into account for the AND problem so far. To fill the gap, we propose a novel framework namely MFAND (Multiple Features Driven Author Name Disambiguation). Specifically, we first employ the raw document and fusion feature to construct six similarity graphs for each author name to be disambiguated. Next, the global and local structural information extracted from these graphs is fed into a novel encoder called R3JG, which integrates and reconstructs the above-mentioned four types of information associated with an author, with the goal of learning the latent information to enhance the generalization ability of the MFAND. Then, the integrated and reconstructed information is fed into a binary classification model for disambiguation. Note that, several pruning strategies are applied before the information extraction to remove noise effectively. Finally, our proposed framework is investigated on two real-world datasets, and the experimental results show that MFAND performs better than all state-of-the-art methods.
|
305 |
Please write an abstract with title: DEFCON: Generating and Detecting Failure-prone Instruction Sequences via Stochastic Search, and key words: History, Pipelines, Biological cells, Delays, Genetic algorithms, Erbium. Abstract: The increased variability and adopted low supply voltages render nanometer devices prone to timing failures, which threaten the functionality of digital circuits. Recent schemes focused on developing instruction-aware failure prediction models and adapting voltage/frequency to avoid errors while saving energy. However, such schemes may be inaccurate when applied to pipelined cores since they consider only the currently executed instruction and the preceding one, thereby neglecting the impact of all the concurrently executing instructions on failure occurrence. In this paper, we first demonstrate that the order and type of instructions in sequences with a length equal to the pipeline depth affect significantly the failure rate. To overcome the practically impossible evaluation of the impact of all possible sequences on failures, we present DEFCON, a fully automated framework that stochastically searches for the most failure-prone instruction sequences (ISQs). DEFCON generates such sequences by integrating a properly formulated genetic algorithm with accurate post-layout dynamic timing analysis, considering the data-dependent path sensitization and instruction execution history. The generated micro-architecture aware ISQs are then used by DEFCON to estimate the failure vulnerability of any application. To evaluate the efficacy of the proposed framework, we implement a pipelined floating-point unit and perform dynamic timing analysis based on input data that we extract from a variety of applications consisting of up-to 43.5M ISQs. Our results show that DEFCON reveals quickly ISQs that maximize the output quality loss and correctly detects 99.7% of the actual faulty ISQs in different applications under various levels of variation-induced delay increase. Finally, DEFCON enable us to identify failure-prone ISQs early at the design cycle, and save 26.8% of energy on average when combined with a clock stretching mechanism.
|
306 |
Please write an abstract with title: Constructing diffeomorphic representations for the groupwise analysis of nonrigid registrations of medical images, and key words: Image analysis, Biomedical imaging, Biomedical engineering, Interpolation, Magnetic resonance imaging, Brain, Image segmentation, Euclidean distance, Law, Legal factors. Abstract: Groupwise nonrigid registrations of medical images define dense correspondences across a set of images, defined by a continuous deformation field that relates each target image in the group to some reference image. These registrations can be automatic, or based on the interpolation of a set of user-defined landmarks, but in both cases, quantifying the normal and abnormal structural variation across the group of imaged structures implies analysis of the set of deformation fields. We contend that the choice of representation of the deformation fields is an integral part of this analysis. This paper presents methods for constructing a general class of multi-dimensional diffeomorphic representations of deformations. We demonstrate, for the particular case of the polyharmonic clamped-plate splines, that these representations are suitable for the description of deformations of medical images in both two and three dimensions, using a set of two-dimensional annotated MRI brain slices and a set of three-dimensional segmented hippocampi with optimized correspondences. The class of diffeomorphic representations also defines a non-Euclidean metric on the space of patterns, and, for the case of compactly supported deformations, on the corresponding diffeomorphism group. In an experimental study, we show that this non-Euclidean metric is superior to the usual ad hoc Euclidean metrics in that it enables more accurate classification of legal and illegal variations.
|
307 |
Please write an abstract with title: Use of Machine Learning Algorithm Models to Optimize the Fleet Management System in Opencast Mines, and key words: Productivity, Costs, Machine learning algorithms, Job shop scheduling, Atmospheric measurements, Atmospheric modeling, Machine learning. Abstract: In surface mining operations, the dumper haulage system contributes the most in total operating cost of any mine. It is estimated that an average mining company spends around 50% to 60% in this truck haulage system only. So utmost priority should be given to keep up an effective haulage framework. So, to reduce the cost of operation the dumpers must be allocated and dispatched efficiently. The haulage systems should be designed in such a manner that the availability, performance and utilization of the dumper and shovel are maximized which ultimately yield in high production and reduction of operating cost. So, in this paper to enhance the productivity of truck haulage system an attempt is made to minimize the cycle time of dumpers and allocate an optimized number of dumpers to one shovel so that the idle time of dumpers can be minimized. In determining the cycle time of dumpers predicting the travelling time in different situation is given utmost importance. For this machine learning models are used which help in predicting the travelling time in different atmospheric situation of the mine. This approach of integrating the machine learning methods in minimizing the cycle time will provide a proper estimation of performance measure, truck scheduling and finally an optimized truck dispatch system.
|
308 |
Please write an abstract with title: Paper 5 breakdown of insulation caused by internal discharges, and key words: Electric breakdown, Stress, Discharges (electric), Solids, Electric fields, Insulators, Energy states. Abstract: Failure of insulation, after equipment has been in servce for some time, at values of electric stress well below its accepted breakdown value, is caused by the basic processes of intrinsic and thermal breakdown. Conditions necessary to precipitate these mechanisms are realised by a slow process of erosion caused by internal discharges within the mass of the insulation. This paper discusses briefly the discharge process and the resulting breakdown and indicates directions in which research in this field is progressing at the University of the Witwatersrand.
|
309 |
Please write an abstract with title: Erlang capacity of a CDMA cellular system with multirate sources, and key words: Multiaccess communication, Bit rate, Telecommunication traffic, Traffic control, Power system modeling, Power control, Capacity planning, Communication system traffic control, Markov processes, Frequency diversity. Abstract: The capacity in a CDMA system is defined as the maximum offered traffic load that satisfies the admission criterion 99% of the time. In this paper, the capacity is calculated using a novel approach that can accommodate different traffic sources with variable transmission bit rates. In this approach, each source is modelled using a continuous-time Markov process. The Markov processes for all sources are superimposed to obtain another Markov process which is then used to yield the capacity or blocking probability. The analysis is done for networks with both homogeneous (one class) and heterogeneous (multiple classes) traffic sources. Imperfection in power control is also considered. We show that the proposed model can capture the traffic burstiness and hence yields more realistic results.
|
310 |
Please write an abstract with title: Work-in-Progress: Automatically Generated Response-Time Proofs as Evidence of Timeliness, and key words: Analytical models, Tools, Mathematical models, Real-time systems, Time factors, Task analysis. Abstract: In this paper, we report on the ongoing development of POET, the first foundational and automated response-time analysis tool. The certificates produced by POET are short, readable, and fully commented Coq files that can be machine-checked in (usually) minutes.
|
311 |
Please write an abstract with title: A self-regulated learning system with scaffolding support for self-regulated e/m-learning, and key words: Learning systems, Scheduling, Computer science, Education, Explosions, Councils, Fractals, Control systems. Abstract: The paper proposes a self-regulated learning system with scaffold support for self-regulated e/m-learning. With the support of the self-regulated system, the learner can identify his best way for learning, where a learner can get supports from the environmental resources in a scaffolding manner and improve his performance of self-regulated learning. Based on the self-regulatory learning and scaffolding theories, two subsystems, "learning scheduler subsystem" and "content accessibility subsystem", are proposed. The learning scheduler subsystem helps learners schedule their learning process and enhance the capability of self-regulated learning. With the use of the content accessibility subsystem, the instructor can organize the contents and teaching materials such that different level of supports can be dynamically provided to learners. Comprehensively, the proposed self-regulated learning system not only assists the learner to cultivate his self-regulated learning behavior, but also provides the learner a mobile, portable, and personalized learning environment.
|
312 |
Please write an abstract with title: Analysis of bit-stuffing codes and lower bounds on capacity for 2-D constrained arrays using quasistationary measures, and key words: Two dimensional displays, Writing, Design methodology, Entropy, Capacity planning, Stochastic processes. Abstract: A method for designing quasistationary probability measures for two-dimensional (2-D) constraints is presented. This measure is derived from a modified bit-stuff coding scheme and it gives the capacity of the coding scheme. This provides a constructive lower bound on the capacity of the 2-D constraint. The main examples are checkerboard codes with binary elements. The capacity for one instance of the modified bit-stuffing for the 2-D runlength-limited RLL(2,/spl infin/) constraint is calculated to be 0.4414 bits/symbol. For the constraint given by a minimum (1-norm) distance of 3 between 1s a code with capacity 0.3497 bits/symbol is given.
|
313 |
Please write an abstract with title: Research on the Dynamic Mechanism and Countermeasures of the Integration of Sichuan Liquor Culture Tourism Industry, and key words: Technological innovation, Tourism industry, Sociology, Production, Signal processing, Product development, Global communication. Abstract: Based on a research experiment on a travel questionnaire survey, this article firstly finds out the problems in the integration of liquor culture tourism industry: lack of a strategic plan, nonintegrated organically, lack of relevant talents and publicity, poor connotation of liquor culture, superficial integration degree and simple integration mode. After then, it analyzes integration mechanism of Sichuan liquor industry and tourism industry from the three sides: the industry relevance, market convergence point, the integration path. Finally, the article gets the integration implementations: take liquor culture as the core and integrate tourism resources, carry out Eco-tourism and incorporate the production base of brewing materials into the tourism industry development system, excavating the connotation of liquor culture in depth, enriching the development of liquor culture tourism products, create a vary modes of integration.
|
314 |
Please write an abstract with title: Extensible Hardware Architecture for Mobile Robots, and key words: Hardware, Mobile robots, Intelligent robots, Instruments, NASA, Cameras, Aerospace electronics, Collaboration, Orbital robotics, Mobile communication. Abstract: The Intelligent Robotics Group at NASA Ames Research Center has developed a new mobile robot hardware architecture designed for extensibility and reconfigurability. Implemented on the K9 rover, and currently being integrated onto the K10 series of human-robot collaboration research robots, this architecture allows for rapid changes in instrumentation configuration and provides a high degree of modularity through a synergistic mix of off-the-shelf and custom designed components, easing incorporation into a wide variety of mobile robot platforms. A component level overview of this architecture is presented along with a description of the modifications required for implementation on K10, followed by plans for future work.
|
315 |
Please write an abstract with title: Online Automatic Speech Recognition With Listen, Attend and Spell Model, and key words: Hidden Markov models, Decoding, Training, Earth Observing System, Computational modeling, Acoustics, Automatic speech recognition. Abstract: The Listen, Attend and Spell (LAS) model and other attention-based automatic speech recognition (ASR) models have known limitations when operated in a fully online mode. In this letter, we analyze the online operation of LAS models to demonstrate that these limitations stem from the handling of silence regions and the reliability of online attention mechanism at the edge of input buffers. We propose a novel and simple technique that can achieve fully online recognition while meeting accuracy and latency targets. For the Mandarin dictation task, our proposed approach can achieve a character error rate in online operation that is within 4% relative to an offline LAS model. The proposed online LAS model operates at 12% lower latency relative to a conventional neural network hidden Markov model hybrid of comparable accuracy. We have validated the proposed method through a production scale deployment, which, to the best of our knowledge, is the first such deployment of a fully online LAS model.
|
316 |
Please write an abstract with title: Envelopes around cumulative distribution functions from interval parameters of standard continuous distributions, and key words: Distribution functions, Random variables, Uncertainty, Distributed computing, Computational modeling, Pervasive computing, Monte Carlo methods, Gaussian distribution, Weibull distribution. Abstract: A cumulative distribution function (CDF) states the probability that a sample of a random variable will be no greater than a value x, where x is a real value. Closed form expressions for important CDFs have parameters, such as mean and variance. If these parameters are not point values but rather intervals, sharp or fuzzy, then a single CDF is not specified. Instead, a family of CDFs is specified. Sharp intervals lead to sharp boundaries ("envelopes") around the family, while fuzzy intervals lead to fuzzy boundaries. Algorithms exist that compute the family of CDFs possible for some function g(v) where v is a vector of distributions or bounded families of distribution. We investigate the bounds on families of CDFs implied by interval values for their parameters. These bounds can then be used as inputs to algorithms that manipulate distributions and bounded spaces defining families of distributions (sometimes called probability boxes or p-boxes). For example, problems defining inputs this way may be found in. In this paper, we present the bounds for the families of a few common CDFs when parameters to those CDFs are intervals.
|
317 |
Please write an abstract with title: Enhanced Candidate Selection Algorithm for Analog Circuit Verification, and key words: Semiconductor device modeling, Performance evaluation, Fabrication, Production, Machine learning, Safety, Delays. Abstract: In latest years, the complexity and applicability of modern Integrated Circuits (ICs) grew exponentially, hence the high-pressure to deliver IC designs faster on the market. For safety, a design meeting its specification under any allowed operating condition and fabrication variation is a prerequisite. Therefore, pre-Silicon (pre-Si) analog IC verification is an extremely important task, as in certain regions of this large parameter space, the device exhibits degraded performance, or it fails completely. During verification, a designer must find these regions of the input parameter space where the circuit fails. Ideally this must be done during pre-Si phase, to avoid potential huge re-design delays during prototyping or production. In this context, this paper presents a Machine Learning (ML) approach, where we sample the input space to offer good initial coverage of the operating conditions (OCs) hyperspace, with a small number of simulations. We denote one input of a circuit as an Operating Condition. We then leverage a ML-surrogate model of the circuit instead of time-consuming simulations to propose, during a candidate selection phase, new circuit worst cases, where the circuit fails. After updating the candidate proposal algorithm to include a Gradient Descent (GD) step, we highlight the performance improvement of this new method on synthetic circuits, where we obtain relative absolute verification errors below 1%, while using less simulations than other classical approaches.
|
318 |
Please write an abstract with title: A Survey On The Design Of Thin Film Optical Bandpass Filter For Diagnosis In Aditya Tokamak, and key words: Optical filters, Band-pass filters, Optical films, Optical polarization, Optical device fabrication, Optical refraction, Optical variables control. Abstract: Thin film optical bandpass filters are widely used in Aditya Tokamak for the diagnosis of Hα and Carbon emission. In recent years, Fabry Perot based filters, polarization based filter and Bragg's mirror based filters are cited in literatures for plasma diagnosis. Performance of these filters can be improved through optimization techniques like Particle Swarm optimization, Genetic Algorithm etc. However the major challenge lies in developing thin film optical bandpass filters for the desired Central WaveLength (CWL) and expected Full Width Half Maximum (FWHM). In this paper, a detailed literature survey is performed on the physics behind the design of optical band pass filters, optimization techniques and plasma diagnostics using optical filters.
|
319 |
Please write an abstract with title: Line Segment Semi-direct Tracking Based on Stereo Odometry, and key words: Feature extraction, Image segmentation, Cameras, Visual odometry, Visualization, Robustness, Tracking. Abstract: The feature based visual SLAM self locates by detecting feature points in the image. However, it is difficult to extract effective feature points in the lack of texture environment, which is easy to cause tracking loss. In order to improve the robustness of slam in a thousand texture environment, some researchers put forward the slam method which combines feature points and feature lines. However, the extraction and matching of feature lines in these methods will consume a lot of computing resources. The paper proposes a direct tracking algorithm for line segment features, LSD algorithm is first used to extract the initial feature line segment in the key frame; in the ordinary frame, the direct tracking of line segment is realized by sampling, tracking and fitting steps. The algorithm is applied to the visual odometer, and experiments are carried out on the data sets of EuRoC and KITTI. The results show that the algorithm can improve the running speed of the visual odometer to 1.5 times compared with other algorithms, while maintaining similar trajectory accuracy.
|
320 |
Please write an abstract with title: Fuzzy looper control with neural-net based tuning for rolling mills, and key words: Fuzzy control, Milling machines, Tuning, Control systems, Automatic control, Three-term control, Robust control, Error correction, Manufacturing automation, Laboratories. Abstract: Traditional looper control methods cannot deal effectively with unmodeled dynamics and large variations which can lead to scrap runs and damages to machinery in steel industry. This paper presents the design of a fuzzy looper control with neural-net based tuning of rule-base and defuzzification. The effects of various design options are discussed and practical conclusions are made. Also, the results are compared with the results of different initial rule-bases, PID control, and with membership function tuning.
|
321 |
Please write an abstract with title: An Improved Articulated Registration Method For Neck Images, and key words: Neck, Biological tissues, Mutual information, Deformable models, Pipelines, Laboratories, Radiology, Hospitals, Biological system modeling, Filters. Abstract: This paper presents a complete method estimating the displacement field of bodies constrained by an articulated model such as the neck area. Indeed bony structures between different patient images, such as vertebras, may rigidly move while other tissues may deform. The method is divided into 3 steps. The method first registers the articulated rigid bodies together. Then it propagates the deformation into the whole volume through the use of a tetrahedral mesh and it finishes the registration using a mutual information based optical flow. Following the ITK framework, it uses a fast stochastic gradient descent optimization strategy chosen to maximize the mutual information metric. We demonstrate this method provides accurate results on 3D CT, MR and PET images.
|
322 |
Please write an abstract with title: SLM and PTS based on an IMD reduction strategy to improve the error probability performance of non-linearly distorted OFDM signals, and key words: Error probability, OFDM, Peak to average power ratio, Partial transmit sequences, Nonlinear distortion, Intermodulation distortion, Signal mapping, Power generation, Digital video broadcasting, AWGN. Abstract: In this paper, we propose using selective mapping (SLM) and partial transmit sequences (PTS) based on an intermodulation distortion (IMD) reduction strategy to improve the error probability performance of non-linearly distorted orthogonal frequency division multiplex (OFDM) signals. Simulation results demonstrate that in the presence of nonlinearities OFDM systems using SLM or PTS with IMD reduction perform better than those with peak-to-average power ratio (PAPR) reduction. Additionally, simulation results demonstrate that the average out-of-band power generated by IMD reduction strategies is lower than that generated by PAPR reduction strategies. Finally, we propose a sub-optimum solution for the practical realization of SLM OFDM and PTS OFDM systems based on IMD reduction which does not result in a significant loss in performance.
|
323 |
Please write an abstract with title: Study and Analysis of an Approach Towards the Classification of Tooth Wear in Dentistry Using Machine Learning Technique, and key words: Support vector machines, Performance evaluation, Technological innovation, Machine learning algorithms, Teeth, Medical services, Predictive models. Abstract: In current decades, an automatic detection system in healthcare field is an emergent research area. Extensive use of machine learning and deep learning algorithms can be observed in fields of medicine. A lot of research work is done in medicine but some area of oral health care in still unexplored. The emphasis is given to this field only because it is a difficult mission, due to the shortage of precise data available in dentistry for diagnosis and prediction. In this paper, an approach towards the diagnosis, prediction, and classification of oral health diseases in dentistry is implemented and discussed with the help of machine learning techniques on the self-created dataset. Dental tooth wear is considered for evaluation with its different sub categories. Mainly tooth wear is multifactorial situation, leading to the loss of dental hard tissues. Physiological enamel wears is slow process that usually does not lead to any subjective symptoms. When situation progresses periodically, it becomes difficult to restore it to normal phase easily. So to prevent this loss experimentation is performed to diagnose, classify and predict disease at an early stage. This experimentation is done by using several machine learning algorithms and its performance evaluation is done.
|
324 |
Please write an abstract with title: Target field approach for spherical coordinates, and key words: Coils, Magnetic fields, Magnetic flux leakage, Current density, Physics, Geometry, Magnetic separation, Magnetostatics, Magnetic flux density, Fusion power generation. Abstract: Using the method of separation of variables and expanding the magnetic field generated by currents flowing on a sphere by means of Fourier-Legendre expansion, we can obtain the inverse relationship between the current density and magnetic flux density. The current density required to generate a specified target field inside the sphere may be evaluated. This approach develops Turner's target field method and can generate axially directed field in large usable volumes inside the sphere, which can satisfy the requirement of high-energy physics, medical treatment, spatial detection etc. Using this method we can generate uniform or gradient magnetic field that vary linearly along the z or y direction. The commercial finite element method software also verifies the validation of this approach.
|
325 |
Please write an abstract with title: DRG2vec: Learning Word Representations from Definition Relational Graph, and key words: Dictionaries, Semantics, Automobiles, Public transportation, Wheels, Linear programming. Abstract: Even with larger and larger text data available, encoding linguistic knowledge into word embeddings directly from corpora is still difficult. The most intuitive way to incorporate knowledge into word embeddings is to use external resources, such as the largest datasource for describing words - natural language dictionaries. However, previous methods usually neglect the recursive nature of dictionaries and cannot capture the high-order relation. In this paper, we present DRG2vec, a novel and efficient approach for learning word representations, which exploits the inherent recursiveness of dictionaries by modeling the whole dictionary as a homogeneous graph based on the co-occurrence of entry and word in the definition. Moreover, a tailor-made sampling strategy is introduced to generate word sequences from the definition relational graph, and then, the generated sequences are fed to the Skip-gram model with semantic negative sampling for word representation learning. Extensive experiments on sixteen benchmark datasets show that leveraging the recursive dictionary graph indeed achieves better performance than other state-of-the-art methods, especially exhibits a weighted average improvement of 8.6% in the word similarity task.
|
326 |
Please write an abstract with title: Connection Resource Testing Technology on FPGA Based on SOC core, and key words: Wiring, Codes, Instruments, Loading, Field programmable gate arrays, Testing. Abstract: For FPGA testing, usually hundreds of code streams need to be loaded. Because SoC FPGA is embedded with processor system, its code stream loading method is very different from traditional FPGA. This article provides a configuration code selection interface for ATE by designing a startup program, and makes PS reconfigure PL according to the user's choice, and load a different configuration code for each test. The deterministic wiring test method can fully cover the FPGA wiring resources. This paper proposes a deterministic wiring method based on Zynq-7000 series chips to traverse the wiring resources of the SoC FPGA and generate configuration codes. Finally, the wiring resource test of SoC FPGA is realized through ATE and the above code stream loading scheme.
|
327 |
Please write an abstract with title: 3D-RadViz: Three Dimensional Radial Visualization for Large-Scale Data Visualization, and key words: Visualization, Filtration, Data visualization, Lattices, Machine learning, Evolutionary computation, Benchmark testing. Abstract: This paper presents 3D-RadViz, a visualization method for high dimensional data using a three dimensional radial visualization technique. The proposed technique extends the capabilities of the classical two dimensional radial visualization (RadViz) in order to reduce overlapping data points. For evaluation purposes, the paper applies the proposed 3D-RadViz alongside with t-SNE and a recently published 3-dimensional radial visualization technique to the same real-world datasets from the UCI machine learning repository. The contribution of the work is an interactive, deterministic, and high-performance library, implemented in Python, that can be utilized to realize better high dimensional data visualization using the proposed 3D-RadViz technique. The paper also suggests some directions for future enhancements to the proposed visualization approach.
|
328 |
Please write an abstract with title: An agent-based hydrogen vehicle/infrastructure model, and key words: Fuel cell vehicles, Hydrogen, Costs, High temperature superconductors, Security, Transportation, Automotive engineering, Road vehicles, Carbon dioxide, Fossil fuels. Abstract: An agent-based model is presented of the transition of a personal transportation system based on conventional fuels to one based on an alternative fuel, such as hydrogen, requiring a new support infrastructure. The model allows two types of agents, vehicle owners and hydrogen fuel suppliers, to interact on a grid of roads representing a metropolitan region, and shows how their initial placement on the grid can lead either to successful or to unsuccessful transitions.
|
329 |
Please write an abstract with title: Preemption-aware routing for QoS-enabled networks, and key words: Routing, Quality of service, Cost function, Interference constraints, Bandwidth, Constraint optimization, Video on demand, Optical computing, Availability, Computational modeling. Abstract: This paper presents a new preemption-aware quality of service (QoS) routing algorithm for instantaneous request (IR) call connections in a QoS-enabled network where resources are shared between instantaneous request (IR) and book-ahead (BA) call connections. Book-ahead reservation which confirms the availability of resources in advance is a highly attractive technique for time sensitive applications that require high amount of bandwidth with guaranteed QoS. One of the major concerns in the implementation of BA reservation is the preemption of on-going instantaneous requests (IR) call connections. Preemption disrupts service continuity which is seen as detrimental from users' perceived QoS definition found in recent studies. Existing QoS routing algorithms focus on resource conservation or load balancing as the key objective to attain in addition to guaranteed QoS. No work known to these authors has yet focused on the preemption problem of on-going IR call connections at routing stage. We present a mathematical formulation to compute the preemption probability of an IR call connection at routing stage based on the current IR and future BA load information. We propose a routing strategy by formulating a link cost function comprising of calculated preemption probability of incoming IR call connection and hop count. Simulation results confirm that QoS routing based on the proposed link cost function significantly outperforms both shortest path and widest path routing algorithms in terms of preemption and call blocking rate.
|
330 |
Please write an abstract with title: WICE: a Web-based intelligent cost estimator for real-time decision support, and key words: Costs, Construction industry, Fuzzy neural networks, Electronic mail, Intelligent systems, System testing, Real time systems, Financial management, Quality management, Project management. Abstract: Real-time response to construction cost estimation request is crucial for firms to survive and grow in the construction industry. However, no existing construction cost estimating system fulfills this need thus far. We describe a joint effort by the academia and the industrial partner on developing such a system. Advanced Web-based intelligence techniques are employed in the proposed system including WWW, neuro-fuzzy system, and data mining. The industrial partner is in charge of providing knowledge sources, including expert judgments and historical data, for conceptual cost estimation. A Web-based intelligent cost estimator (WICE) is resulted. The testing results show that the proposed system provides not only a globally accessible and promptly responding means for cost estimation, but also an effective and reliable tool for real-time decision-making.
|
331 |
Please write an abstract with title: Research on Readability Grade Formula Based on HSK Compositions, and key words: Vocabulary, Systematics, Linear regression, Semantics, Writing, Syntactics, Natural language processing. Abstract: The Chinese language proficiency test (Hanyu Shuiping Kaoshi, HSK) is an international Chinese proficiency standardized test. Composition research has always been a hotspot in HSK research. However, the readability of HSK compositions has not been systematically researched. In this paper, 5498 compositions were selected from the HSK examination papers over the years, and then rated by experts according to the differences of readability grades. A standard corpus of HSK compositions marked by experts was constructed. By means of multiple linear regression, the readability grade formula of HSK compositions was derived. The formula shows that the predictive ability of vocabulary features is stronger than that of character features, and the predictive abilities of Chinese character writing features, word length features, syntactic features and emotional features are poor.
|
332 |
Please write an abstract with title: A Text Code Recognition and Positioning System for Engineering Drawings of Nuclear Power Equipment, and key words: Codes, Mechatronics, Text recognition, Engineering drawings, Maintenance engineering, Libraries, Encoding. Abstract: In this paper, a text code recognition and positioning system for engineering drawings of nuclear power equipment is designed to promote the informatization and automation of paper work created in nuclear power projects including construction procedure and maintenance procedure. Its core function is to analyze engineering drawings, and identify the user-searched code contents in them, and then extract the codes and related information, so that the staff can more quickly retrieve the required codes, obtain the drawing files containing the codes, and locate the codes on the engineering drawings precisely. The code recognition system proposed in this paper is based on the Teigha toolkit, ezdxf open source library, CRNN and PaddleOCR open source library. For engineering drawings in picture format, VGG16 is used for feature extraction of code regions. CRNN based on VGG16 is used to divide the entire coding area, and PaddleOCR is used to identify the coding information. The experiment results show that the system can be effectively used in engineering practice of nuclear power project with high usability, which can greatly improve the work efficiency of staff.
|
333 |
Please write an abstract with title: A Simple Evolutionary Algorithm for Multi-modal Multi-objective Optimization, and key words: Measurement, Sociology, Clustering algorithms, Evolutionary computation, Steady-state, Indexes, Statistics. Abstract: In solving multi-modal, multi-objective optimization problems (MMOPs), the objective is not only to find a good representation of the Pareto-optimal front (PF) in the objective space but also to find all equivalent Pareto-optimal subsets (PSS) in the variable space. Such problems are practically relevant when a decision maker (DM) is interested in identifying alternative designs with similar performance. There has been significant research interest in recent years to develop efficient algorithms to deal with MMOPs. However, the existing algorithms still require prohibitive number of function evaluations (often in several thousands) to deal with problems involving as low as two objectives and two variables. The algorithms are typically embedded with sophisticated, customized mechanisms that require additional parameters to manage the diversity and convergence in the variable and the objective spaces. In this paper, we introduce a steady-state evolutionary algorithm for solving MMOPs, with a simple design and no additional user-defined parameters that need tuning compared to a standard EA. We report its performance on 21 MMOPs from various test suites that are widely used for benchmarking using a low computational budget of 1000 function evaluations. The performance of the proposed algorithm is compared with six state-of-the-art algorithms (MO_Ring_PSO_SCD, DN-NSGAII, TriMOEA-TA&R, CPDEA, MMOEA/DC and MMEA-WI). The proposed algorithm exhibits significantly better performance than the above algorithms based on the established metrics including IGDX, PSP and IGD. We hope this study would encourage design of simple, efficient and generalized algorithms to improve their uptake for practical applications.
|
334 |
Please write an abstract with title: Transcutaneous powering of implantable micro-stimulators for functional restoration of impaired gastrointestinal motility, and key words: Gastrointestinal tract, Power system modeling, Humans, Neuromuscular stimulation, Power supplies, Coupling circuits, Animals, Frequency, Electrodes, Application software. Abstract: Recent experiments in functional electrical stimulation of gastrointestinal organs have demonstrated effective techniques for producing controlled movement of content in dogs and humans. However, as a result of the substantive power requirements of the proposed stimulation techniques, which impede the use of traditional power supply methods such as implantable batteries, the feasibility of transcutaneously powering multiple implanted micro-stimulators through inductive coupling remains an unresolved issue. This paper proposes the use of a well-established circuit model for calculating the transcutaneous power transfer to an implanted micro-stimulator. In addition, techniques for modeling all aspects of the inductive link are proposed. The comprehensive model is then used in the design of an inductive link capable of delivering over 80 mW of power to multiple implanted micro-stimulators.
|
335 |
Please write an abstract with title: Providing consistent SMIL 2.0 documents, and key words: Formal verification, Context modeling, Formal specifications, Reachability analysis, Design methodology, Feedback. Abstract: This paper presents a methodology to provide the formal verification, scheduling and presentation of consistent SMIL 2.0 documents. The second version of SMIL provides a temporal model much more flexible enabling the author to specify synchronization constraints that can not be potentially satisfied during the presentation of his document. For this reason, some types of inconsistency that can be produced in a SMIL 2.0 document are characterized in this paper and the effect of these inconsistencies were analysed using some SMIL 2.0 players. Furthermore, some results are also presented in order to provide a consistent diagnosis of the verification analysis based on a simple and operational scheduling graph.
|
336 |
Please write an abstract with title: Magnetoelastic resonance characterization of core plane assemblies, and key words: Magnetic resonance, Magnetic cores, Assembly, Magnetostriction, Magnetoelasticity, Saturation magnetization, Magnetic anisotropy, Perpendicular magnetic anisotropy, Frequency, Ferrites. Abstract: Magnetostrictively induced elastic resonance (MER) of a ferrite core serves as a technique for characterizing the core in the environment of the plane assembly and differentiating core anomalies from wiring induced anomalies not discernable by pulse techniques alone. The shifts of the resonant frequencies as a result of the change in a core from a constrained to an unconstrained mechanical state explains the ability of the MER technique to discriminate unambiguously between damaged and undamaged cores.
|
337 |
Please write an abstract with title: Score Genaration for Taiko no Tatsujin Based on Machine Learning, and key words: Games, Time measurement, Feature extraction, Databases, Machine learning, Rhythm. Abstract: Taiko no Tatsujin is one of the most popular rhythm-based games. Players simulate playing a drum in time with music. In order for players to play songs, an additional percussion part need to be composed based on the audio an existing song, the additional percussion part is not exactly the original percussion part of the song, but it is related to the melody, rhythm and other feathers of the song. This paper introduces two ways to generate the score of the additional percussion part that follow beat and melody of songs. One is that we split the raw audio into many measures, record some certain features of each measure, and build a database for measures and a database for features whose relationship is one on one. Using KNN model, we find every predicted measure for a target song which becomes the score in a whole. In another way, we pre-process the raw audio to extract MFCCs feature and utilize onset detection using CNN to classify notes at any time. Through these approaches, the score can be created in 5 seconds while its approach 86% similarity of the human written score.
|
338 |
Please write an abstract with title: Modeling of carbon nanotube Schottky barrier reduction for holes in air, and key words: Carbon nanotubes, Schottky barriers, Electrodes, Oxidation, Thermoelectricity, FETs, Charge carrier processes, Gold, NASA, Semiconductivity. Abstract: A model is proposed for the previously reported lower Schottky barrier for holes /spl Phi//sub Bh/ in air than in vacuum at a metallic electrode-semiconducting carbon nanotube (CNT) junction. We consider that there is a transition region between the electrode and the CNT, and an appreciable potential can drop there. The role of the oxidation is to increase this potential drop with negatively charged oxygen molecules on the CNT, leading to lower /spl Phi//sub Bh/ after oxidation. The mechanism prevails in both p- and n-CNTs, and the model consistently explains the key experimental findings.
|
339 |
Please write an abstract with title: Learning the Precise Feature for Cluster Assignment, and key words: Task analysis, Clustering algorithms, Standards, Entropy, Training, Minimization, Optimization. Abstract: Clustering is one of the fundamental tasks in computer vision and pattern recognition. Recently, deep clustering methods (algorithms based on deep learning) have attracted wide attention with their impressive performance. Most of these algorithms combine deep unsupervised representation learning and standard clustering together. However, the separation of representation learning and clustering will lead to suboptimal solutions because the two-stage strategy prevents representation learning from adapting to subsequent tasks (e.g., clustering according to specific cues). To overcome this issue, efforts have been made in the dynamic adaption of representation and cluster assignment, whereas current state-of-the-art methods suffer from heuristically constructed objectives with the representation and cluster assignment alternatively optimized. To further standardize the clustering problem, we audaciously formulate the objective of clustering as finding a precise feature as the cue for cluster assignment. Based on this, we propose a general-purpose deep clustering framework, which radically integrates representation learning and clustering into a single pipeline for the first time. The proposed framework exploits the powerful ability of recently developed generative models for learning intrinsic features, and imposes an entropy minimization on the distribution of the cluster assignment by a dedicated variational algorithm. The experimental results show that the performance of the proposed method is superior, or at least comparable to, the state-of-the-art methods on the handwritten digit recognition, fashion recognition, face recognition, and object recognition benchmark datasets.
|
340 |
Please write an abstract with title: Flight dynamics of a butterfly-type ornithopter, and key words: Insects, Aerodynamics, Frequency, Cameras, Motion analysis, Visualization, Force measurement, Vehicle dynamics, Information science, Gravity. Abstract: We developed a very small and light butterfly-type ornithopter (BTO) to investigate butterfly flight. Its weight is 0.4 g, wing span is 140 mm and flapping frequency is 10 Hz. It flies forward passively. The flights were recorded with a highspeed video camera and the longitudinal motion of the BTO was analyzed. When the center of gravity was appropriate, the angle of attack of the body varied cyclically. We found that the cyclical change of the angle of attack produced total upward aerodynamic force. Then we visualized air flow around the BTO both in tethered flight and in free flight. We revealed that free body motion caused a stable attachment of leading edge vortex. We also found that the free body motion helped the wings' smooth upstroke, which was not found in tethered flight.
|
341 |
Please write an abstract with title: VMAF based quantization parameter prediction model for low resolution video coding, and key words: Measurement, Quantization (signal), PSNR, Bit rate, Rate-distortion, Predictive models, Visual systems. Abstract: Perceptual video quality assessment (VQA) is now essential part of various video applications by controlling the quality for the videos delivered to the users. Recently, Video Multimethod Assessment Fusion (VMAF) is developed by Netflix, known as a full refence VQA model that combines spatial and temporal features to predict perceptual quality. This metric has stronger correlation with human visual system than the conventional metrics such as Peak Signal to Noise Ratio (PSNR) and Structure Similarity Index (SSIM). However, the perceptual video quality is normally degraded due to the content and bitrate variation. This leads to uncomfortable experience for the viewers. In this context, this paper proposes an adaptive quantization parameter (QP) prediction model based on VMAF for video coding to achieve better perceptual quality at a reasonable bitrate. In particular, the Rate Distortion Optimization (RDO) progress of x.264 video codec is improved by using the VMAF scores to find optimal QP map. The results showed that the compression performance of x.264 codec with the proposed method achieved up to 5.95% bitrate saving when compared to the conventional x.264 encoder.
|
342 |
Please write an abstract with title: Design and Performance of Spectral Efficient Modified Diagonal Code for OFDM-OCDMA System using AND-Subtraction Detection, and key words: Optical filters, Correlation, Spectral efficiency, OFDM, Bit error rate, Optical receivers, Adaptive optics. Abstract: The paper contains a performance of Orthogonal Frequency Division Multiplexing - Optical Code Division Multiple Access System using Modified New Diagona code. The OFDM-OCDMA system is combined and analyzed, which considers orthogonal subcarrier hopping. The MND code has advantages as very low cross correlation value compare with other code sequences. Also, the code has short length for higher code weight value, which makes system spectral efficient. The modified diagonal code based OFDM system is compared with Multi Diagonal Code and Flexible Cross Correlation Code based OFDM system in terms of Bit Error Rate at receiver end. The MND based OCDMA-OFDM system improves result by 2.08 dB bit error rate compare to MD code based OCDMA-OFDM system for 100 users at a time. Also, the MND code based OFDM-OCDMA system is compared for various receiver power. As the AND subtraction detection technique based photo-detector receives higher optical power, the BER improves significantly, which allows more users in the system.
|
343 |
Please write an abstract with title: New orbit algorithms for data symmetries, and key words: State-space methods, Tree graphs, Partitioning algorithms, Space technology, Computer science, Contracts, Petri nets, Terminology, Refining, Iterative algorithms. Abstract: State space symmetries can be exploited in model checking of concurrent systems by identifying states that are equivalent under the symmetries. The core problem during the generation of the symmetry reduced state space is to determine whether two states are equivalent, or alternatively, to transform states into equivalent, canonical representatives. This paper introduces new algorithms for these orbit problems under state space symmetries that are produced by symmetric use of data values. Some experimental results comparing the efficiency of the proposed algorithms against the ones in the Mur/spl phi/ tool are provided.
|
344 |
Please write an abstract with title: Compact Textile Wearable Antenna for Security Applications, and key words: Textiles, Antennas, Antenna measurements, Security, Frequency measurement, Bandwidth, Substrates. Abstract: A compact planar inverted-F antenna on textile felt substrate is proposed in this contribution as wearable sensor to be adopted for security purposes. A very small size of about 2 cm × 2 cm is achieved at 2.4 GHz (Industrial Scientific Medical - ISM - band), with a useful bandwidth of about 8%. Preliminary experimental validations are provided to demonstrate the usefulness of the proposed textile antenna for security services in the framework of wearable communications.
|
345 |
Please write an abstract with title: A Simple System for Telemonitoring the Daily Life of An Aged Person Living Alone, and key words: Aging, Electrical products, TV, Biosensors, Animation, Internet, Data security, Biology computing, Sensor systems, Power engineering and energy. Abstract: A simple system for telemonitoring the daily life of an aged person living alone was developed. The system consists of a current sensor and a pair of computers. The sensor detects changes in the power line current of electrical appliances. The computer at the aged person's end transfers the output signal of the sensor every minute to the computer at the family end via the Internet. In this preliminary study, three days trial was conducted, and changes in the output signal of the sensor were monitored without any trouble. If this system is used, a family may be able to estimate a parent's living condition inexpensively and in real time
|
346 |
Please write an abstract with title: E-Initiative for Food Security: Design of Mobile Crowdfunding Platform to Reduce Food Insecurity in Indonesia, and key words: Prototypes, Task analysis, Mobile applications, Interviews, Computer science, Usability, Testing. Abstract: Indonesia is a country with the fourth-largest economy power in the world. However, Indonesia is threatened by a severe problem, namely food insecurity. The aim of this research is to produce a mobile design of the e-initiative mobile application as a crowdfunding platform that can help overcome food insecurity and realize food security in Indonesia. The mobile apps designed using The Wheel method which focuses on the user experience of the application. This method is in the form of a cycle phase that starts from the analysis phase of user needs with the interview, questionnaire distribution, and competitive analysis. The design phase is by persona, sketch, storyboard, and wireframes. Then the results of the design phase are implemented in the form of a medium-fidelity prototype. At the evaluation stage of prototype medium-fidelity, usability testing is using the think-aloud method, and the results of the performance task with a success rate of 85.32% are obtained.
|
347 |
Please write an abstract with title: SNIS: Storage-Network Iterative Simulation for Disaggregated Storage Systems, and key words: Protocols, Conferences, Interference, Delays, Iterative methods, Reliability, Optimization. Abstract: In recent years, designs and optimizations on disaggregated storage systems supported by cutting-edge storage and network techniques emerge dramatically. However, conducting experiments in a disaggregated architecture is often expensive. A comprehensive modeling system of disaggregated storage systems is indispensable for researchers to construct fast and reliable experiments. Modeling and evaluating the performance of disaggregated storage systems is a challenge for the following reasons. First, the performance of a disaggregated storage system depends on network protocols and storage solutions jointly. Second, the available trace datasets for generating the workload may not suffice the need for the simulation, as they are collected without considering the integration of network delay and storage processing time. This work proposes a storage-network iterative simulation (SNIS) for disaggregated storage systems by considering the issues above. Our simulation methodology integrates storage and network simulations to model the end-to-end performance of disaggregated storage systems and conducts multiple rounds of simulations to update arrival times of read/write requests. The evaluation results show that SNIS can converge to a relatively stable state after a certain number of iterations.
|
348 |
Please write an abstract with title: A fixed-cost variable-length auralization filter model utilizing the precedence effect, and key words: Finite impulse response filter, Auditory system, Acoustic reflection, IIR filters, Humans, Absorption, Art, Computer science, Computational efficiency, Degradation. Abstract: The precedence effect refers to a group of properties of the human hearing system which enables us to localize sounds in closed environments. Although its foundations are laid out clearly, the precedence effect has not been exploited fully in auralization systems. We propose a new auralization model which uses the onset dominance and buildup properties of the precedence effect as a starting point to increase auralization fidelity while keeping the computational cost fixed. The proposed model uses a graceful degradation approach for auralizing the direct sound to increase localization fidelity without affecting the perception of the early reflections.
|
349 |
Please write an abstract with title: Gamification Intensity in Web-Based Virtual Training Environments and Its Effect on Learning, and key words: Games, Training, Usability, Task analysis, Visualization, Productivity, Manifolds. Abstract: Gamification approaches to learning use game-inspired design elements to improve learning. Given manifold design options to implement gamification in virtual environments, an important but underexplored research area is how the composition of gamification elements affects learning. To advance research in this area, we systematically identified key design elements that have shown promise in leading to positive learning results. We then conducted an experiment in which we varied gamification intensity in web-based virtual training environments for a procedural industrial task. In total, 355 participants were divided into a baseline group without gamification, a basic, and an advanced gamification group. Analysis of participants’ learning included learning outcomes (time-to-completion and number of mistakes), affective learning factors (motivation, self-efficacy, and satisfaction), learning system usability, and perceived cognitive load throughout the learning process. The results did not show any statistically significant differences between the lower and higher levels of gamification intensity. Conversely, we found that participants’ computer gaming habits and technical equipment (display size and computer pointing device) significantly influenced learning.
|
350 |
Please write an abstract with title: Modeling Opinion Dynamics: Ranking Algorithms on Heterogeneous Populations, and key words: Social networking (online), Heuristic algorithms, Sociology, Predictive models, Ordinary differential equations, Approximation algorithms, Mathematical models. Abstract: The heterogeneity of the influence processes is an important feature of social systems: how we perceive social influence and how we influence other individuals is heavily influenced by our opinion and non-opinion attributes. The latter include demographic, cultural, and structural (how we are embedded in social networks) characteristics. Furthermore, the results of the influence processes may also depend on how similar the interacting individuals are in terms of their features. This paper addresses this issue and elaborates on an agent-based model that is sensitive to the individual characteristics, both opinion and non-opinion ones. The model is fortified with a ranking algorithm that mimics the ranking algorithms widely adopted in real-world online social networks. For the resulting model, I elaborate a mean-field approximation that describes the behavior of the model at the macroscopic level via an autonomous system of ordinary differential equations. The properties of this system are thoroughly studied.
|
351 |
Please write an abstract with title: System Verilog versus UVM-based Verification of AXI4-Lite Arbitration, and key words: AXI4-Lite, verification, arbitration, Universal Verification Methodology (UVM), System Verilog (SV). Abstract: The communication bus is one of the critical components in System-of-Chip design. The on-chip bus communication architecture impacts the overall performance of an SoC design. As design complexity increases, they become more error-prone, and verification becomes challenging. According to a few studies, verification consumes about 70% of the total development time and is considered a bottleneck in the ASIC design cycle. This paper focuses on the design and verification of the AXI4-Lite arbitration algorithm. We present a design and implementation of a high-performance AXI4-Lite interconnect using System Verilog (SV) to connect three managers and six subordinate devices. We performed the verification of an AXI4-Lite arbitration system using two methodologies i.e., SV and Universal Verification Methodology (UVM). Several test cases were applied to check all possible scenarios for arbitration verification. The SV and UVM verification techniques are compared in this paper, and it is observed that the UVM methodology is a better choice for verifying large and complex designs.
|
352 |
Please write an abstract with title: Vibration mechanism of gear system with angular misalignment error based on an improved meshing stiffness calculation method, and key words: Gears, Vibrations, Reliability, Maintenance engineering, Mathematical model, Analytical models, Dynamics. Abstract: Angular misalignment is a common error in gear system, which has a direct influence on gear system vibration characteristics. so the study of the error is significance to improve the reliability and stability of gear system. At present, many researchers use dynamic model to study vibration characteristics of gear system with misalignment. However, most of the studies ignore the effects of the errors on the meshing contact area. Therefore, based on analytical method and quadratic integration method, a meshing stiffness calculation model is proposed in this paper. With the proposed method, the varying of length and position of contact line during the gear pair meshing process is first taken into consideration. Then the time-varying meshing stiffness and the vibration responses is calculated through the modified stiffness calculation method and gear pair dynamic model. The results show that the contact line length with misalignment error yields a parabolic growth trend during the meshing period, and meshing stiffness of spur gear pair achieve an almost linear decrease as the misalignment increases.
|
353 |
Please write an abstract with title: Rainfall Estimation From TEMPEST-D CubeSat Observations: A Machine-Learning Approach, and key words: Spaceborne radar, Meteorology, Storms, Radar, CubeSat, Satellite broadcasting, Meteorological radar. Abstract: In this study, a machine-learning model was used to produce surface rainfall estimates from Temporal Experiment for Storms and Tropical Systems – Demonstration (TEMPEST-D) microwave radiance observations from a CubeSat. The machine-learning model is based on an artificial neural network (ANN). The space-borne TEMPEST-D sensor performed brightness temperature (TB) observations at five frequencies (i.e., 87, 164, 174, 178, and 181 GHz) during its nearly three-year mission. The TEMPEST-D TBs were used as inputs, and the multiradar/multisensor system (MRMS) radar-only quantitative precipitation estimation product at the surface was used as the ground truth to train the ANN model. A total of 19 storms were identified that were simultaneously observed by TEMPEST-D and ground weather radar over the contiguous United States. The training dataset used 14 of the 19 storm cases. The other five storm cases, consisting of three continental storms and two land-falling hurricanes, were used for independent testing. A spatial alignment algorithm was developed to align the TEMPEST-D observed storm with the ground radar measurement of the storm. This study showed that the TEMPEST-D TBs captured storm features as well as current-generation satellite sensors, such as the global precipitation mission microwave imager. The results of this study demonstrated that the rainfall estimated from TEMPEST-D matches well with the MRMS surface rainfall product in terms of rainfall intensity, area, and precipitation system pattern. The average structural similarity index measure score for the five independent test cases is 0.78.
|
354 |
Please write an abstract with title: An Extension to Least Committed Graphplan for Handling Conditional Effects, and key words: Intelligent robots, Artificial intelligence, Intelligent agent, Computer science, Natural languages, Problem-solving, Strips, Application software, Technology planning, Intelligent systems. Abstract: Since Graphplan was proposed, intelligent planning has become a research focus in AI. This paper provides a new algorithm that extends Least Committed Graphplan to handling conditional effects. Different from the previous work on it, we employ the sub-mutex relations between action components, which makes the construction of planning graph much faster. In addition, we distinguish brotherhood components and non-brotherhood components, and treat them respectively during solution extraction, in which efficiency of plan synthesis can be improved greatly. The algorithm can find the valid plan just as Graphplan can do, and the problems handled by the algorithm are more than those of Graphplan. Moreover, because of wide application of intelligent planning, our research is very helpful to the development of robotology, natural language understanding, intelligent agent and so on.
|
355 |
Please write an abstract with title: Fault Diagnosis of an Autonomous Vehicle With an Improved SVM Algorithm Subject to Unbalanced Datasets, and key words: Support vector machines, Fault diagnosis, Actuators, Observers, Autonomous vehicles, Measurement. Abstract: Safety is one of the key requirements for automated vehicles and fault diagnosis is an effective technique to enhance the vehicle safety. The model-based fault diagnosis method models the fault into the system model and estimates the faults by observer. In this article, to avoid the complexity of designing observer, we investigate the problem of steering actuator fault diagnosis for automated vehicles based on the approach of model-based support vector machine (SVM) classification. The system model is utilized to generate the residual signal as the training data and the data-based algorithm of the SVM classification is employed to diagnose the fault. Due to the phenomena of data unbalance induced poor performance of the data-driven method, an undersampling procedure with the approach of linear discriminant analysis and a threshold adjustment using the algorithm of grey wolf optimizer are proposed to modify and improve the performance of classification and fault diagnosis. Various comparisons are carried out based on widely used datasets. The comparison results show that the proposed algorithm has superiority on the classification over existing methods. Experimental results and comparisons of an automated vehicle illustrate the effectiveness of the proposed algorithm on the steering actuator fault diagnosis.
|
356 |
Please write an abstract with title: Grade of Service of Direct Traffic Mixed With Store-and-Forward Traffic, and key words: Communication system traffic, Senior members, Costs, Distributed computing, Telecommunication traffic, Degradation, Monitoring, Contracts, Missiles, Space vehicles. Abstract: The dual use of trunks for both direct and store-andforward (S/F) traffic makes high trunk efficiency possible. The resultant trunk savings are important in communication systems in which long-haul trunks contribute heavily to the cost of the system. This paper reports work on the computation of trunking tables that could be used to engineer trunk requirements for prescribed loads and distributions of direct and S/F traffic. A method of computation and some specific results in terms of grade of service of direct traffic and traffic capacity for S/F traffic are presented. The numerical results are for two to forty-eight trunks. The results apply to the case of exponentially distributed holding times of both the direct and the S/F traffic.
|
357 |
Please write an abstract with title: A Multi-population Water Wave Optimization Algorithm, and key words: Sociology, Vehicular ad hoc networks, Traveling salesman problems, Routing, Internet of Things, Statistics, Particle swarm optimization. Abstract: The water wave optimization algorithm (WWO) is a new swarm intelligence searching method inspired by shallow water wave theory. It has the advantages of small population size and simple parameter configuration. But it still has the risks of slow convergence rate and low solution precision. In this paper, an inter-population cooperation strategy based on two populations is proposed for WWO. The sub-population is used to record the best individuals in the search processes and to guide the iteration of the main population. The above operations also enhance the ability of the algorithm, which can better balance exploration and exploitation. The proposed SPWWO algorithm is compared with the classical WWO algorithm and three other optimization algorithms on CEC2017 benchmarks. The results show that the SPWWO has good optimization ability and a fast convergence rate.
|
358 |
Please write an abstract with title: A novel current-injected sensorless control scheme for squirrel-cage induction motors, and key words: Sensorless control, Induction motors, Rotors, Pulse width modulation, Stators, Position control, Shafts, Voltage, AC motors, Inductance. Abstract: This paper presents a novel sensorless control scheme of squirrel-cage induction motors by using a PWM waveform injection technique for the estimation of rotor dependent stator leakage inductances. To increase the signal-to-noise ratio when operating in low-speed region, the magnitude of the injected signal is adaptively adjusted according to motor operating condition. Practical realization issues of the detection of the reflected signals and estimation of the rotor position have been addressed. The developed sensorless control scheme has been implemented by using a high-performance single-chip DSP controller. Experimental verification of the developed adaptive injection scheme and rotor position estimation scheme has been carried out. Experimental results show the proposed sensorless position control scheme can reach a position control resolution of 0.05 rad with a rated holding torque.
|
359 |
Please write an abstract with title: Short-term load forecasting of power system based on genetic algorithm improved BP neural network algorithm, and key words: Analytical models, Load forecasting, Computational modeling, Neural networks, Urban areas, Predictive models, Power system stability. Abstract: Forecasting method is the key in short-term load forecasting. Genetic algorithm is used in this paper to improve the BP neural network short-term load prediction model of power system, and the BP neural network model of hidden layer 10 is optimized and improved by genetic algorithm, so as to solve the problem that the prediction effect is not ideal due to excessive internal optimization of the model. The 24 o ’clock historical load, the meteorological characteristics of the day, the maximum and minimum temperature and other information were input into the prediction model as input variables. Finally, the genetic algorithm was used to get the prediction results of power load in different time periods and took them as output variables. In view of the proportion and threshold initialization problems in the model, and I use the genetic algorithm to optimize BP network. According to the daily meteorological characteristics, this paper uses genetic algorithm to improve BP network. prediction model. In the empirical study, our prediction results also meet the expected requirements, which fully shows that genetic algorithm is used to improve the prediction accuracy of BP network in this paper.
|
360 |
Please write an abstract with title: Experiments in keypad-aided spelling recognition, and key words: Automatic speech recognition, Telephony, Speech recognition, Keyboards, Error analysis, Databases, Humans, Natural languages, Vocabulary, Dictionaries. Abstract: Accurate recognition of spellings is necessary in many call-center applications. Recognition of spellings over the telephone is inherently a difficult task and achieving very low error rates, using automatic speech recognition, is difficult. Augmenting speech input with input from the telephone keypad can reduce the error rate significantly. A variety of schemes for combining the keypad and speech input are presented. Experiments on a name entry task show that spellings can be recognized nearly perfectly using combined keypad and speech input, especially when a directory lookup is possible.
|
361 |
Please write an abstract with title: Real-Time Median Filtering for Embedded Smart Cameras, and key words: Filtering, Smart cameras, Transform coding, Hardware, Filters, Partitioning algorithms, Compression algorithms, Video compression, Streaming media, Gray-scale. Abstract: This paper describes a new median filter algorithm optimized for real-time performance in smart cameras with embedded processors. As in the JPEG and MPEG compression algorithms, each frame of the video stream is first partitioned into a regular array of non-overlapping square blocks. The median value for each block is then computed and compared with corresponding values of neighboring blocks. If the magnitude of the difference does not exceed a threshold, the output value for all the pixels in the block is set to the median value. Otherwise, the output value for each pixel in the block is computed as the median value within a window of the same size centered at this pixel. We describe variations for binary and grayscale images. The algorithm has been implemented and tested in an embedded single-board-computer (SBC) with no hardware acceleration, as a component of a Visual Sensor Network (VSN) system for real-time indoor person detection and tracking. In this system, where the SBCs have the additional overhead of decoding JPEG frames from IP cameras, our new algorithm is 5 to 20 times faster than the traditional algorithms for typical window sizes. We expect further speedups to frame-rate performance on smart cameras with embedded image sensors and reconfigurable hardware.
|
362 |
Please write an abstract with title: Human Machine Interface Wheel Chair by using Wi-Fi Communication for Disabled Person, and key words: Wheelchairs, Wheels, Engines, Servomotors, Smart phones, Cellular phones, Accelerometers. Abstract: The truly tested individuals are facing the challenges in strolling due to the disease, injury, or inability. Wheelchair offers them portability with the ability to enhance their quality of lives. The individual gives their voice through the android versatile and further the voice will get transformed into content. Then, the yield will be given to the small scale controller. This framework development is controlled by utilizing Bluetooth module with the help of servo engines. This proposed framework has a battery controlled wheelchair with servo engines. Moreover, the existing joystick-based framework should also get appended to the current framework. This framework remains straight forward and effective to disentangle the matter of truly tested individuals and furthermore, it remains as the least difficult usefulness with increased straight forwardness and minimal effort.
|
363 |
Please write an abstract with title: VMSIM: Virtual Machine Based a Full System Simulation Platform for Microprocessors' Functional Verification, and key words: Virtual machining, Microprocessors, Computational modeling, Timing, Hardware design languages, Space exploration, Operating systems, Space technology, Programming, Computer simulation. Abstract: As the complexity of high-performance microprocessors increases, functional verification becomes more and more important and emerges as the bottleneck of the design cycle. At present, verification based simulation is widely used. However, most of simulation tools are focus on design space explore or software development. They cannot provide the ability of verification for designs’ HDL implement. In this paper, we present a full system simulation platform based on the virtual machine, which is called VMSIM. VMSIM can evaluate operating systems and applications on microprocessors’ HDL implement and check execution results automatically. VMSIM emphasizes on the microprocessors’ functional verification. VMSIM implements many abilities for functional verification, including configurable verification procedure, error tolerance and fast error reproducibility. We have evaluated VMSIM in functional verification of a microprocessor designed in our lab. It demonstrates VMSIM is an efficient functional verification platform for microprocessors.
|
364 |
Please write an abstract with title: Radar Distance Measurement With Viterbi Algorithm to Resolve Phase Ambiguity, and key words: Radar measurements, Radar antennas, Distance measurement, Frequency estimation, Viterbi algorithm. Abstract: In this article, a precise phase-based radar distance measurement system using a Viterbi decoder to resolve phase ambiguity is presented. Relying on the frequency-modulated continuous-wave radar principle, the introduced method evaluates both the frequency and the phase of the intermediate frequency signal, thus achieving absolute distance measurement with high accuracy. To avoid ambiguity in the distance estimates by half the wavelength of the radio frequency signal, which commonly arises due to 2π ambiguity in the measurement of the phase, the proposed Viterbi-based method estimates the most likely sequence of distances between the radar front end and the target. To verify the system concept, measurements using a commercial 77 GHz radar module were carried out, whereby the contour of a predefined surface containing steps in the height profile had to be determined. The experimental results confirm that the Viterbi-based approach is suitable to resolve phase ambiguity since accurate and repeatable distance estimates were obtained.
|
365 |
Please write an abstract with title: Brain Storm Optimization based directional sensors deployment for coverage of targets, and key words: Military communication, Heuristic algorithms, Surveillance, Simulation, Sensors, Multimedia communication, Particle swarm optimization. Abstract: Sensors are used in various areas and have numerous applications including military surveillance, weather monitoring, maritime communication etc. Most of the applications need the multimedia sensors with directional sensing range of the sensors to perform advance task. Additionally, there are some constraints on the targets namely Q-constraints, such that each target must be covered by different number of sensors. The crucial issue in this case is deployment of minimum number of multimedia sensors to satisfy the Q-constraints. The optimization of the placement of the sensors can result in reduced number of sensors needed for the coverage of the specified targets. In this paper, the placement of the sensors is optimized using the Brain Storm Optimization Algorithm (BSO) which is inspired by the human brainstorming process. BSO algorithm efficiently designed for the considered problem to identify the optimal position of the sensors. The performance of the proposed algorithm is verified by simulation results, which performs better than the random deployment of the sensors.
|
366 |
Please write an abstract with title: Robust Filtering for 2-D Systems With Uncertain-Variance Noises and Weighted Try-Once-Discard Protocols, and key words: Protocols, Two dimensional displays, Symmetric matrices, Stochastic processes, Noise measurement, Job shop scheduling, Data communication. Abstract: The robust filtering problem is tackled for a class of shift-varying two-dimensional systems with uncertain-variance noises under the scheduling of the weighted try-once-discard (WTOD) protocol. The measurements collected from the sensors are transmitted to a remote filter via a shared network. To alleviate the communication burden and obviate the network congestion, the WTOD protocol is adopted to orchestrate the data transmission, where a sensor node is solely permitted to broadcast its information to the remote filter at every transmission step. Moreover, the resilient filter is exploited to regulate the possible gain perturbation. The objective of the addressed problem is to design a robust filter in a recursive structure such that, in the simultaneous presence of the uncertain-variance noises and the WTOD protocol, the minimal upper bounds (UBs) on the filtering error variances (EVs) are developed for the considered system. First, by means of induction and stochastic analysis technique, certain UBs in terms of coupled recursive difference equations are derived for the actual EVs. Then, a proper filter is carefully designed which achieves the minimization of the obtained UBs at each step. Finally, an illustrative example is presented to verify the usefulness of the proposed protocol-based filtering method.
|
367 |
Please write an abstract with title: A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things, and key words: Authentication, Protocols, Internet of Things, Security, Device-to-device communication, Radiofrequency identification, Privacy. Abstract: The Internet of Things (IoT) is a heterogeneous environment that connects billions of devices. Thus, it is a significantly high-value target for attackers and suffers from several threats, especially impersonation attacks during the session. Moreover, the denial of service attack (DoS) threatens IoT environments, as it affects the availability and energy of communicating devices. Continuous authentication solves session hijacking since it checks user legitimacy during the session. Several continuous authentication schemes were proposed to authenticate users to IoT devices, while few works addressed device-to-device authentication. Therefore, it is essential to authenticate devices because if one device gets compromised, then the whole system is at risk. Continuous authentication between devices differs from user-to-device authentication since it cannot rely on biometrics and passwords. This research proposes a fast and secure device-to-device continuous authentication protocol that relies on devices' features (token, battery, and location), and mitigates DoS attacks using shadow IDs and emergency keys. Moreover, it takes the sensor movement into account while preserving privacy. To evaluate the robustness and validate the security of the proposed protocol, we conducted informal and formal analyses using Scyther. In addition, we tested its performance to establish computation costs relative to the system counterparts. The results show the protocol is robust against security threats, incurring reasonable computational costs.
|
368 |
Please write an abstract with title: The Time aspect in Usability: Case of DHIS2 Program Rule Variable Generator, and key words: Productivity, Software, Time measurement, Generators, Software measurement, Usability, Task analysis. Abstract: Time efficiency and design consistency are key measures in evaluating software usability. Literature suggests that usability influences software acceptance. This paper focuses on efforts to improve efficiency and consistency of a configurable software platform that provides functionality for users to define software interface skip-logic. The study was conducted using the District Information Software version 2 (DHIS2), a configurable software platform. In DHIS2, skip-logic is implemented using program rule variables and program rule expressions. In particular, the paper focuses on the development of a custom app for defining program variables, in place of an inbuilt DHIS2 app, whose design was found to be inconsistent with other DHIS2 apps and less time efficient. The inbuilt DHIS2 app restricts users to the creation of one program rule variable at a time. The custom app was evaluated by 11 users to check its efficiency. Users were able to batch-create program rule variables, when using the custom app, reducing development time. An average of 9 minutes 24 seconds was taken to create five program rules variables using the DHIS2 inbuilt app. The same task took an average of 2 minutes and 3 seconds when using our custom app.
|
369 |
Please write an abstract with title: Self-Cleaning Micro-Windows for In-Tailpipe Optical Exhaust Gas Measurements, and key words: Heating systems, Optical variables measurement, Temperature sensors, Optical sensors, Temperature measurement, Temperature distribution, Silicon carbide. Abstract: Exhaust gas measurement in the harsh environment of the tailpipe of a combustion engine by optical techniques is a highly robust technique, provided that optical access is maintained in the presence of particulate matter (PM). The considerations are presented for the systematic design of membranes with integrated heaters in SiC-on-Si technology for generating a well-defined lateral temperature profile with peak temperatures above 600 °C. Periodically raising the temperature of the membranes to such a level is demonstrated to keep the surface transparent by oxidation of soot deposits. This paper is about continuous heating of the membrane to a temperature slightly higher than that of the exhaust gas. At such temperatures thermophoretic repulsion of PM allows allows long-term optical measurement in the exhaust without the thermo-mechanical loading by repetitive thermal cycling.
|
370 |
Please write an abstract with title: Lisanssız Yazılım Kullanımı ve Farkındalık, and key words: Ethics, Software, Software measurement. Abstract: The use of unlicensed software can be vulnerable to cyber-attacks that cause a lot of material or moral loss. This study conducted a survey of unlicensed software usage. Research aims to measure the level of pirated software usage and community awareness. The data is collected in Turkey. As a result of the information obtained, an overall assessment has been made, recommendations are given to reduce the use and adverse effects of unlicensed software.
|
371 |
Please write an abstract with title: Theory of active mode locking of a semiconductor laser in an external cavity, and key words: Laser mode locking, Laser theory, Semiconductor lasers, Optical pulses, Laser noise, Pulse modulation, Diode lasers, Optical resonators, Space vector pulse width modulation, Frequency. Abstract: An analytical treatment is given for the active mode locking of a semiconductor laser in an external resonator. The width of the mode-locked pulses is obtained as a function of the laser and cavity parameters and the amount of frequency detuning. The effects of self-modulation and saturation are included in the treatment. The pulse output is compared with that obtained by a strong modulation of the laser diode with no external cavity.
|
372 |
Please write an abstract with title: Magnetic Design of an Alternating Gradient Canted-Cosine-Theta Superconducting Magnet for Proton Therapy, and key words: Superconducting magnets, Toroidal magnetic fields, Proton therapy, Computational modeling, Harmonic analysis, Apertures. Abstract: Canted-Cosine-Theta (CCT) magnets exhibit superior field quality and structural compactness in superconducting magnet schemes. When combined with an alternating gradient (AG) field, CCT magnets can be applied to proton therapy gantries to achieve a significantly increased momentum acceptance. This paper introduces design considerations for a 67.5 degree AG-CCT magnet for a proton therapy gantry, including the design and optimization of a magnetic field combined with an AG function. The calculation of the magnetic field used to simulate the CCT coil with multiple lines based on the Biot-Savart law is discussed in detail. Technical issues covering the choice of superconducting coils and layering scheme are also discussed.
|
373 |
Please write an abstract with title: An Integrated Observer for Real-Time Estimation of Vehicle Center of Gravity Height, and key words: Tires, Observers, Real-time systems, Rollover, Sensors, Wheels. Abstract: This paper introduces a new integrated observer for estimating the vehicle center of gravity (CG) height in real time. It can assist the vehicle in monitoring the real-time rollover risk and improving the performance of vehicle safety control systems. The proposed integrated observer consists of three parts: a linearized recursive least square (LRLS) algorithm on vehicle longitudinal motion, an adaptation law on vehicle lateral motion, and observer synthesis. First, the LRLS algorithm performs estimation of vehicle mass and CG height during longitudinal braking and exploits the characteristic that normalized longitudinal tire stiffness is the same in the front and rear axles. Second, the adaptation law, accompanied by a roll angle observer, estimates CG height on the vehicle lateral motion based on Lyapunov stability analysis. It includes the following contributions: verification of robustness to the vehicle mass estimation error and prevention of integration drift. Finally, in the observer synthesis, the final estimation of CG height combining the above two results is derived. The overall estimation algorithm has high practicality due to the following features. 1) CG height can be obtained on both longitudinal and lateral motions of the vehicle. This point leads to a fast convergence rate in CG height estimation. 2) The fact that it does not cause any computational burden issues in real-time implementation is also a great advantage in terms of practicality. 3) It utilizes only readily available sensors. An experimental study with various driving scenarios evaluates the effectiveness of the proposed algorithm in real-car application.
|
374 |
Please write an abstract with title: Comprehensive Design and Experimental Verification of Shunt Active Power Filter, and key words: Shunts (electrical), Reactive power, Control design, Power quality, Capacitors, Active filters, Harmonic analysis. Abstract: Harmonic pollution imposed by non-linear loads has become one of the main power quality challenges. In addition, reactive power absorption related to non-linear loads may result in serious power quality issues like voltage drop or voltage instability. Among different passive and active power filters (APFs), shunt active power filter (SAPF) is used a lot since it can compensate both complete harmonic and reactive components as well as high flexibility without any resonance. However, harmonic detection, hardware, and control design play vital role in the performance of the SAPF. From hardware point of view, design of the DC-link capacitor and series inductor are two main challenges. In this paper, a comprehensive design procedure is presented to design the suitable passive elements. In addition, high performance control design is also considered. Several simulation and experimental results are provided to verify the proper design and controller performance.
|
375 |
Please write an abstract with title: Proceedings at one hundred and seventh ordinary general meeting 18th November, 1920, and key words: Telephone sets, Wireless communication, Rectifiers. Abstract: The One Hundred and Seventh Ordinary General Meeting of the South African Institute of Electrical Engineers was held in the Lecture Theatre of the South African School of Mines and Technology, Johannesburg, on Thursday, 18th November, 1920, at 8 p.m., Mr. R. F. Bolting (Vice-President) in the chair. There were also present 53 members, 8 visitors, and the Secretary.
|
376 |
Please write an abstract with title: Adaptive Block Compressed Sensing Algorithm based on Integral Imaging, and key words: Image coding, Redundancy, Imaging, Classification algorithms, Discrete cosine transforms, Image reconstruction, Compressed sensing. Abstract: In order to effectively compress and reconstruct the elemental image array in integral imaging, an improved block compressed sensing algorithm based on integral imaging is proposed. The amount of elemental image data is large and the redundancy is high, so the image is first sampled by interlaced rows and columns, and then the discrete cosine transform (DCT) is performed. The block classification is based on the discrete cosine transform coefficient difference between adjacent pixels in the image block, and is divided into four sub-blocks according to the characteristics of the image. Use different sampling rates to measure samples for different types of sub-blocks. In the reconstruction stage, the total variation algorithm is used to reconstruct each sub-block, the sub-blocks are recombined together to obtain the entire image, and then the image is restored by extracting samples, and finally a complete reconstructed image is obtained. Experimental results show that the use of this algorithm to compress and reconstruct integral imaging images has a good effect.
|
377 |
Please write an abstract with title: What's Different: Distributed, Continuous Monitoring of Duplicate-Resilient Aggregates on Data Streams, and key words: Monitoring, Aggregates, Large-scale systems, Capacitive sensors, Telecommunication traffic, Energy management, Radio spectrum management, Resource management, Web and internet services, Animals. Abstract: Emerging applications in sensor systems and network-wide IP traffic analysis present many technical challenges. They need distributed monitoring and continuous tracking of events. They have severe resource constraints not only at each site in terms of per-update processing time and archival space for highspeed streams of observations, but also crucially, communication constraints for collaborating on the monitoring task. These elements have been addressed in a series of recent works. A fundamental issue that arises is that one cannot make the "uniqueness" assumption on observed events which is present in previous works, since widescale monitoring invariably encounters the same events at different points. For example, within the network of an Internet Service Provider packets of the same flow will be observed in different routers; similarly, the same individual will be observed by multiple mobile sensors in monitoring wild animals. Aggregates of interest on such distributed environments must be resilient to duplicate observations. We study such duplicate-resilient aggregates that measure the extent of the duplication―how many unique observations are there, how many observations are unique―as well as standard holistic aggregates such as quantiles and heavy hitters over the unique items. We present accuracy guaranteed, highly communication-efficient algorithms for these aggregates that work within the time and space constraints of high speed streams. We also present results of a detailed experimental study on both real-life and synthetic data.
|
378 |
Please write an abstract with title: Speed Kit: A Polyglot & GDPR-Compliant Approach For Caching Personalized Content, and key words: Browsers, Acceleration, Servers, Optimization, Coherence, Law, Loading. Abstract: Users leave when page loads take too long. This simple fact has complex implications for virtually all modern businesses, because accelerating content delivery through caching is not as simple as it used to be. As a fundamental technical challenge, the high degree of personalization in today's Web has seemingly outgrown the capabilities of traditional content delivery networks (CDNs) which have been designed for distributing static assets under fixed caching times. As an additional legal challenge for services with personalized content, an increasing number of regional data protection laws constrain the ways in which CDNs can be used in the first place. In this paper, we present Speed Kit as a radically different approach for content distribution that combines (1) a polyglot architecture for efficiently caching personalized content with (2) a natively GDPR-compliant client proxy that handles all sensitive information within the user device. We describe the system design and implementation, explain the custom cache coherence protocol to avoid data staleness and achieve Δ-atomicity, and we share field experiences from over a year of productive use in the e-commerce industry.
|
379 |
Please write an abstract with title: Graph Soft Actor–Critic Reinforcement Learning for Large-Scale Distributed Multirobot Coordination, and key words: Distributed coordination, graph neural network (GNN), multiagent reinforcement learning (MARL), multirobot system, soft actor–critic (SAC) algorithm. Abstract: Learning distributed cooperative policies for large-scale multirobot systems remains a challenging task in the multiagent reinforcement learning (MARL) context. In this work, we model the interactions among the robots as a graph and propose a novel off-policy actor–critic MARL algorithm to train distributed coordination policies on the graph by leveraging the ability of information extraction of graph neural networks (GNNs). First, a new type of Gaussian policy parameterized by the GNNs is designed for distributed decision-making in continuous action spaces. Second, a scalable centralized value function network is designed based on a novel GNN-based value function decomposition technique. Then, based on the designed actor and the critic networks, a GNN-based MARL algorithm named graph soft actor–critic (G-SAC) is proposed and utilized to train the distributed policies in an effective and centralized fashion. Finally, two custom multirobot coordination environments are built, under which the simulation results are performed to empirically demonstrate both the sample efficiency and the scalability of G-SAC as well as the strong zero-shot generalization ability of the trained policy in large-scale multirobot coordination problems.
|
380 |
Please write an abstract with title: A formal method to guarantee a deterministic behaviour of switched Ethernet networks for time-critical applications, and key words: Ethernet networks, Time factors, Switches, Communication switching, Delay, Communication industry, Context, Calculus, Algorithm design and analysis, Upper bound. Abstract: The objective of this work is to model a switched Ethernet architecture in order to be able to evaluate the maximum end to end delays. The major interest is to apply these results in an industrial or technical context, where some of the communications are strongly time-constrained. We have chosen the network calculus theory, because it enables a good representation of the exchanges between the equipment which are connected to the network, and also to determine the maximum end to end delays. Previous models presented are improved in order to take into account the implementation of a classification of service (CoS) mechanism which enables to define priorities for the messages regarding the time constraints they have to respect This paper describes a new model of a IEEE 802.1p switch. It also presents the analytical formulas which upper bound the maximum time for crossing such a switch, and an algorithm to determine the maximum end to end delays of the time-critical messages over the whole network. A typical application shows the interest of this approach.
|
381 |
Please write an abstract with title: Near-field techniques for detecting EMI sources, and key words: Electromagnetic interference, Electromagnetic measurements, Probes, Electric variables measurement, Robot kinematics, Circuit testing, System testing, Microstrip, Laser modes, Robot vision systems. Abstract: A completely automatic near-field mapping system has been developed within IRSEEM (French research institute for electronic embedded systems) in order to determine the electric field radiated by electronic systems. This test bench uses a 3D probe positioning system to make accurate measurements. The paper presents a validation of the test bench on a microstrip line and experimental results realized on a diode limiter function.
|
382 |
Please write an abstract with title: Stiffness and Deformation Characteristics of the Rabbet Joint Structure in the Central Tie-rod Fastening Rotor, and key words: Vibrations, Rotors, Reliability theory, Reliability engineering, Faces, Strain, Load modeling. Abstract: The stiffness characteristics of rabbet joint structures in the central tie-rod fastening rotor have a direct influence on the vibration reliability and stability of the rotor system. In this paper, a stiffness model of the rabbet joint structure is established based on the Hertz theory and the fractal model, considering the cylindrical surface contact. The load distribution and the deformation characteristics of the rabbet joint structure are analyzed. A parametric investigation is conducted to estimate the effects of key parameters on the stiffness of the rabbet joint structure. The results reveal that the end face of the structure bears more than 90% bending moment and more than 60% shearing force. Moreover, a positive correlation between the connection stiffness and the real contact area can be observed, suggesting a potential improvement of vibration reliability of rabbet joint structures by optimizing the contact parameters of the end face.
|
383 |
Please write an abstract with title: Capacity Analysis of Full-Duplex Directional Wireless Mobile Networks, and key words: Mobile wireless networks, ad hoc networks, in-band full-duplex radio systems, directive communications, performance analysis. Abstract: This paper presents a comprehensive study of capacity characterization in mobile wireless networks employing directive communications and full-duplex communication technology. We address the impact of nodes’ mobility, directive beams, and full-duplex capabilities on the network capacity. Firstly, we derive the signal-to-interference-plus-noise ratio (SINR) for a reference receiver, considering the combined effects of mobility, directive beams, and full-duplex communications. The derived SINR is then utilized to calculate the network’s capacity. To validate the proposed model, extensive simulations are performed, incorporating various scenarios of mobility levels, self-interference suppression levels in the full-duplex wireless system, and different receiving thresholds. The simulation results confirm the accuracy and effectiveness of the derived SINR-based capacity characterization model under real-world conditions. Furthermore, we study the probability of a receiver simultaneously decoding multiple packets as a function of the receiver’s threshold and full-duplex self-interference suppression. The probability is crucial for assessing the network performance and facilitating future optimization schemes aimed at regulating the number of competing nodes in a given spatial region. The validated model and probability characterization offer valuable insights into network performance evaluation and can be instrumental in devising future efficient optimization strategies for managing network contention at the medium access control and enhancing the network performance.
|
384 |
Please write an abstract with title: On Possible Influence of Corona Discharge on the Propagation Speed of Lightning Surges Along a Tall Grounded Object, and key words: Corona, Lightning, Discharges (electric), Conductors, Poles and towers, Time-domain analysis, Finite difference methods. Abstract: In this article, we present a sensitivity analysis to show under what conditions corona on vertical conductors may become significant. A lightning strike to a 600-m-tall grounded metallic object (tower) on a perfectly conducting ground is simulated using the 2-D finite-difference time-domain (FDTD) method in the cylindrical coordinate system and taking into account corona discharge from the lateral surface of the object. The tall object is represented by a cylinder having a radius of 0.1, 1, or 5 m (these values are representative of tower top, not the entire tower), where the extent of radial corona is most significant. The corona discharge is represented by a radially expanding higher conductivity region around the tall object. The corona radius is largest (up to about 5 m) at the object top with no corona at its bottom. It follows from the FDTD simulations that the wavefront of lightning current surge can be distorted significantly and the apparent propagation speed can be reduced. The reduction in propagation speed becomes more significant as the magnitude of lightning current increases.
|
385 |
Please write an abstract with title: The trade-off between security and quality using permutation and substitution techniques in speech scrambling system, and key words: Speech processing, Encryption, Wavelet transforms, Chaotic communication. Abstract: Speech is one of the means of communication between people throughout the universe, so people want to communicate with each other no matter how far away since wireless networking offers, this feature, the freedom to connect from anywhere and anytime. Because speech is used extensively in wireless networks, it takes much time to encrypt it using well-known cryptographic algorithms, so, speech scrambler techniques have been used in the modern communication systems to overcome this problem. It has proven its presence in protecting data transmitted over wireless networks in the past few years. The main objective of this paper is to compare the systems that use process permutation with the systems that use the substitution process in the speech scrambling technique to protect speech information. To find out which is better use the permutation process or substitution in the technique of speech scrambling in terms of security and quality, security and quality results we will compare between our proposed system, which uses permutation process, with another system, uses substitution process. Based on the values of the segmental signal-to-noise ratio measure (SSNR), Comparison of the above two systems will take place because it used in both systems to evaluate the performance of the system in terms of security and quality of the recovered speech.
|
386 |
Please write an abstract with title: Industry and Computers, and key words: Computer industry, Engines, Distributed computing, Control systems, Manufacturing, Design engineering, Production facilities, Management information systems, Data engineering, Integrated circuit technology. Abstract: The use of computers by industry in operations and products is undergoing a fundamental change. The change has been made possible by technological advances in integrated circuits and software. Cost and performance trends of small (mini) and large (maxi) computers are such that future systems will be distributed and hierarchical. Both computer power and data bases (mass storage) will be distributed. The hierarchy will cover from business host functions to control on the factory floor. The integrated and on-line nature of future systems promises to increase greatly the timeliness and quality of operational data available to decision makers and lead to increased productivity. The information structure of manufacturing information and control systems will be applicable to the products of some companies.
|
387 |
Please write an abstract with title: In Memoriam: Prof. Dr. Ir. Jan A. Melkebeek [Society News], and key words: Obituaries, Melkebeek, Jan A.. Abstract: Recounts the career and contributions of Professor Dr. Ir. Jan A. Melkebeek.
|
388 |
Please write an abstract with title: An interline transfer CCD imager, and key words: Charge coupled devices, Photodiodes, Colored noise, Capacitance, Dynamic range, Charge-coupled image sensors, Circuits, Diodes, Dark current, Cameras. Abstract: This paper will report on the developmemt of a 492 × 398 element interline transfer CCD imager with a large capacity phOtodiode structure for a single chip 1/2" color camera. The imager has a dynamic range of 75dB.
|
389 |
Please write an abstract with title: Tunability Behavior of (Ba, Ca)(Zr, Ti)O Ceramic Capacitors Powered by Thermally Induced Phase Transitions With Applications to Nonlinear Transmission Lines<sub/>, and key words: Ceramics, Permittivity, Temperature measurement, Capacitors, Plasma temperature, Dielectric losses, Capacitance. Abstract: Ferroelectric ceramics with low loss dielectric, high permittivity, and nonlinear behavior are essential in capacitive nonlinear transmission lines (NLTLs) for radio frequency (RF) generation. NLTLs have the potential to generate soliton waves for high-power microwave (HPM) applications in mobile defense platforms and satellite communications. In this work, we synthesize, characterize, and investigate the nonlinear behavior of (Ba,Ca)(Zr,Ti)O3 ceramics system to be applied as nonlinear elements in capacitive NLTLs. The ceramics were structurally and microstructural characterized. Anomalies in dielectric and pyroelectric curves access the temperatures of phase transitions. The permittivity tunability was studied as a function of electric field and frequency in temperatures near phase transitions. The phase transitions of materials are identified by temperature where the permittivity and percentage of nonlinear tunability factor (NTF) are higher, which are required to produce RF on NLTLs.
|
390 |
Please write an abstract with title: Physically Secure Image Transfer using Synchronized Chaos between Silicon Optomechanical Cavities, and key words: Chaos, Optical transmitters, Cavity resonators, Optical filters, Color, Adaptive optics, Optical imaging. Abstract: We demonstrate physically-secured image transfer using dynamical chaos synchronization between silicon optomechanical nanocavities. Chaos masking and pass filtering effect and color image with error correction are all realized in the silicon chip-based synchronous chaos system.
|
391 |
Please write an abstract with title: Dependence of readback output on medium thickness in the presence of a permeable underlayer--Part 2: Wavelength responses of probe heads in the presence of a permeable underlayer, and key words: Probes, Electromagnets, Magnetic heads, Electromagnetic modeling, Conformal mapping, Bridges, Solid modeling, Geometry, Marine vehicles, Computer peripherals. Abstract: A rigorous solution for the field of a model two-dimensional electromagnet is presented. This model is equivalent to those for a ring head with arbitrary gap depth and a probe head in the presence of a permeable underlayer. Based on this solution, the wavelength responses of probe heads with arbitrary dimensions have been calculated. It is shown that the readback resolution of probe heads is quite inferior to the resolution of ring heads with conventional medium.
|
392 |
Please write an abstract with title: Joint Learning for Deformable Registration and Malignancy Classification of Lung Nodules, and key words: Training, Design automation, Computed tomography, Biopsy, Lung, Lung cancer, Tools. Abstract: The use of low-dose Computer Tomography (CT) has been effective in reducing the mortality rate of lung cancer. With the rapid increase in the number of studies, computer aided diagnosis (CAD) systems need to be developed to further assist radiologists in detecting and classifying lung nodules in CT scans. In this paper we propose a new system based on Deep Convolutional Neural Networks, U-net, and ResNet architectures. This network performs the dual task of registration of lung nodule scans in two time points and additionally performs benign/malignant classification. The training and testing data were put together based on a subset of data from the National Lung Screening Trial (NLST), referred to as NLSTx which has biopsy confirmed diagnoses for the nodules. The combination of deformable registration and binary classification performed by the network will increase the usefulness of this CADx system allowing both measurement of the growth and classification of the nodule.
|
393 |
Please write an abstract with title: Discretized Channel Access Mechanism Based on CSMA Contention and TDMA Reservation, and key words: Time division multiple access, Ad hoc networks, Resource management, Data communication, Simulation, Throughput. Abstract: With the rapid growth of multimedia services in ad-hoc networks, how to transmit a mass of data efficiently becomes an important problem. Aiming to achieve more efficient channel utilization in ad-hoc networks, this paper presents a channel resource allocation scheme by combining CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) with TDMA (Time Division Multiple Access). In the proposed scheme, nodes are allowed to randomly access the channel and reserve timeslots for multiple times, and the access process only starts at the beginning of a timeslot. Moreover, the reservation length of each node can be adjusted adaptively according to the network load and requirements of the node. Simulation results show that the proposed approach has better performance in terms of the collision probability and throughput in distributed networks, especially in the scenarios with a heavy load and a large number of nodes.
|
394 |
Please write an abstract with title: Ontology versioning in an ontology management framework, and key words: Ontologies, Libraries, Data mining, Management information systems, Spine, Bioinformatics, Collaborative tools, Maintenance engineering, Documentation, Merging. Abstract: Ontologies have become ubiquitous in information systems. They constitute the semantic Web's backbone, facilitate e-commerce, and serve such diverse application fields as bioinformatics and medicine. As ontology development becomes increasingly widespread and collaborative, developers are creating ontologies using different tools and different languages. These ontologies cover unrelated or overlapping domains at different levels of detail and granularity. A uniform framework, which we present here, helps users manage multiple ontologies by leveraging data and algorithms developed for one tool in another. For example, by using an algorithm we developed for structural evaluation of ontology versions, this framework lets developers compare different ontologies and map similarities and differences among them. Multiple-ontology management includes these tasks: maintain ontology libraries, import and reuse ontologies, translate ontologies from one formalism to another, support ontology versioning, specify transformation rules between different ontologies and version, merge ontologies, align and map between ontologies, extract an ontology's self-contained parts, support inference across multiple ontologies, support query across multiple ontologies.
|
395 |
Please write an abstract with title: Network-Aware AutoML Framework for Software-Defined Sensor Networks, and key words: Machine learning algorithms, Software architecture, Software algorithms, Machine learning, Telecommunication traffic, Tools, Denial-of-service attack. Abstract: As the current detection solutions of distributed denial of service attacks (DDoS) need additional infrastructures to handle high aggregate data rates, they are not suitable for sensor networks or the internet of things. Besides, the security architecture of software-defined sensor networks needs to pay attention to the vulnerabilities of both software-defined networks and sensor networks. In this paper, we propose a network-aware automated machine learning (AutoML) framework, which detects DDoS attacks in software-defined sensor networks. Our framework selects an ideal machine learning algorithm to detect DDoS attacks in network-constrained environments, using the metrics such as variable traffic load, heterogeneous traffic rate, and detection time while preventing over-fitting. Our contributions are two-fold: (i) we first investigate the trade-off between the efficiency of ML algorithms and network/traffic state in the scope of DDoS detection. (ii) we design and implement a software architecture containing open-source network tools, with the deployment of multiple ML algorithms. Lastly, we show that under the denial of service attacks, our framework ensures the traffic packets are still delivered within the network with additional delays.
|
396 |
Please write an abstract with title: On weakly guiding single-mode optical waveguides, and key words: Optical waveguides, Optical fiber couplers, Maxwell equations, Optical propagation, Optical refraction, Shape, Fast Fourier transforms, Spectral analysis, Optical fiber polarization, Optical polarization. Abstract: This paper presents a powerful technique to treat the problem of wave propagation along weakly guiding single-mode optical waveguides. The shape as well as the 3-D index variation of the guide may be quite arbitrary as along as the weakly guiding character is preserved. The technique is based on the solution of a scalar-wave equation by the forward-marching fast Fourier transform (FFT) method. Excellent agreements were obtained, with known solutions, for various optical guiding structures. We have also demonstrated the capability of this technique to treat other exotic single-mode structures.
|
397 |
Please write an abstract with title: Antirange-Deception Jamming From Multijammer for Multistatic SAR, and key words: Jamming, Synthetic aperture radar, Radar polarimetry, Receivers, Transmitters, Location awareness, Object detection. Abstract: Multistatic SAR is able to observe targets from different angles simultaneously, which enhances the information acquiring capability. However, multistatic SAR can still be affected by electromagnetic jamming, resulting in the misinterpretation of multistatic SAR images. This article proposes a method to locate multiple range-deception jammers and suppress jamming signals. First, the echo model of multistatic SAR under a multijammer environment is established. Second, the detection of interested targets in multistatic SAR images can be achieved through visual saliency detection methods based on spectral residual. Third, location distribution features of false targets in multistatic SAR images are analyzed, and the Euclidean distance criteria are used to effectively distinguish false targets. Accurate localization is then achieved by combing multistatic SAR configuration information. Finally, using a linear constrained minimum variance beamforming algorithm to suppress jamming signals, multistatic SAR images without jamming signals can be obtained. Simulation results validate the effectiveness of the proposed method in this article.
|
398 |
Please write an abstract with title: From DCT-based to wavelet-based video transcoding algorithm and architecture design, and key words: Transcoding, Algorithm design and analysis, Discrete wavelet transforms, Computer architecture, Video compression, Image coding, Image quality, Discrete cosine transforms, Image converters, Equations. Abstract: The main advantage of using DWT is to cope with high compression demand and still get good image quality. Nevertheless, most of the image data are discrete-time cosine-transform (DCT) based. For this reason, we propose a DCT-based to DWT-based image transcoder to convert the pre-existent image data. In our paper, we. investigate the inverse discrete-time cosine-transform (IDCT) and DWT mathematical equation in matrix form. In this way, we develop some method to speed up the computation and lower the architecture complexity. We use MATLAB to justify our theoretic study. After software simulation, we use VHDL code and Synopsys to realize our hardware architecture.
|
399 |
Please write an abstract with title: Discrete finger and palmar feature extraction for personal authentication, and key words: Fingers, Feature extraction, Authentication, Geometry, Fingerprint recognition, Shape measurement, Biometrics, Cameras, Image motion analysis, Image processing. Abstract: A practical method for a noncontacting and real-time feature extraction for personal authentication is proposed. The finger geometry and feature extraction of the palmar flexion creases are integrated into a small number of discrete points based on the anatomical observation. For a video image of either palm, a palm placed freely facing toward a video camera is acquired. The fingers are brought together, and the palm is straightened out to eliminate any constraints. The discrete feature points for the fingers involve intersection points of the three finger (digital) flexion creases on the four finger skeletal lines. The feature points for the palm involve intersection points of the major palmar flexion creases and/or prominent creases of the palm on the extended finger skeletal lines. The orientations of the creases at the intersection points are also extracted features to be matched. The matching results are perfect for about 500 palm samples from 50 subjects so far. This discrete point processing, requiring no time-consumptive palmprint image analysis and requiring less than one second processing time, will contribute to a noncontacting, real-time and reliable feature extraction, easily combinable with other traits, for the personal authentication.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.