ID
int64 0
400k
| content
stringlengths 97
5.85k
|
---|---|
399,500 |
Please write an abstract with title: Exploring Deep-Reinforcement-Learning-Assisted Federated Learning for Online Resource Allocation in Privacy-Preserving EdgeIoT, and key words: Internet of Things, Training, Computational modeling, Resource management, Servers, Energy consumption, Data models. Abstract: Federated learning (FL) has been increasingly considered to preserve data training privacy from eavesdropping attacks in mobile-edge computing-based Internet of Things (EdgeIoT). On the one hand, the learning accuracy of FL can be improved by selecting the IoT devices with large data sets for training, which gives rise to a higher energy consumption. On the other hand, the energy consumption can be reduced by selecting the IoT devices with small data sets for FL, resulting in a falling learning accuracy. In this article, we formulate a new resource allocation problem for privacy-preserving EdgeIoT to balance the learning accuracy of FL and the energy consumption of the IoT device. We propose a new FL-enabled twin-delayed deep deterministic policy gradient (FL-DLT3) framework to achieve the optimal accuracy and energy balance in a continuous domain. Furthermore, long short-term memory (LSTM) is leveraged in FL-DLT3 to predict the time-varying network state while FL-DLT3 is trained to select the IoT devices and allocate the transmit power. Numerical results demonstrate that the proposed FL-DLT3 achieves fast convergence (less than 100 iterations) while the FL accuracy-to-energy consumption ratio is improved by 51.8% compared to the existing state-of-the-art benchmark.
|
399,501 |
Please write an abstract with title: A tunable PDL element using twisted tilted fiber gratings, and key words: Page description languages, Fiber gratings, Bragg gratings, Optical fiber polarization, Optical fiber dispersion, Optical fibers, Optical fiber devices, Band pass filters, Optical fiber filters, Fiber nonlinear optics. Abstract: We demonstrate compact, broadband, tunable PDL device using an azimuthally twisted 45/spl deg/ tilted fiber grating. We apply our device to compensate the polarization dependent responsivity of a nonlinear Si APD.
|
399,502 |
Please write an abstract with title: Type synthesis of 3R2T 5-DOF parallel mechanisms using the Lie group of displacements, and key words: Manifolds, Kinematics, Manipulators, Parallel robots, Machine tools, Costs, Control systems, Manufacturing processes, Assembly, Automation. Abstract: The use of lower mobility parallel manipulators with less than six degrees of freedom (DOFs) has drawn a lot of interest in the area of parallel robots. In this paper, the type synthesis of 3R2T 5-DOF parallel mechanisms (PMs) is performed systematically using the Lie group of displacements, where R denotes a rotational DOF, and T denotes a translational DOF. First, some necessary theoretical fundamentals about the displacement group are recalled. Then, a general approach is proposed for the type synthesis of 3R2T 5-DOF PMs. The limb kinematic chains, which produce the desired displacement manifolds, are synthesized and enumerated. Structural conditions, which guarantee that the intersection of the displacement manifolds generated by the limb is the desired 5-DOF manifold, are presented. An exhaustive enumeration of 3R2T 5-DOF symmetrical PMs is obtained. Finally, an input selection method is proposed.
|
399,503 |
Please write an abstract with title: Distributed Cooperative Transmission in MANETs with Multiple Timing and Carrier Frequency Offsets, and key words: Equalizers, Transmitters, Scalability, Broadcasting, Ad hoc networks, Routing protocols, Topology. Abstract: Cooperative transmission is a promising approach to establish robust communication in Mobile Ad-Hoc Networks (MANETs). In low-complexity MANETs several transmitters (TX) can be aggregated to a virtual multiple input system. For such a setup, the impact of various timing and carrier frequency offsets (TO, CFO) has to be mitigated. We propose an effective, purely time-domain based equalizer structure that allows to establish cooperative transmission with a transmit diversity scheme in presence of aforementioned impairments and multipath channels. Exemplarily investigating the broadcast performance by outage simulations in a MANET scenario, we can demonstrate the benefits and indicate that the proposed structure is auspicious to improve the general scalability of MANETs.
|
399,504 |
Please write an abstract with title: Calculating the complex cepstrum without phase unwrapping or integration, and key words: Cepstrum, Frequency domain analysis, Cepstral analysis, Discrete Fourier transforms, Phase estimation, Differential equations, Fourier transforms, Speech processing, Acoustic signal processing. Abstract: The complex cepstrum, as developed by Oppenheim [4] and Oppenheim, Schafer, and Stockham [5], originated from the pioneering paper of Bogert, Healy, and Tukey [3]. It is a nonlinear transformation from one signal space into another which converts two superposed signals into their sum. The cepstrum is usually computed by inverse Fourier transformation of the frequency domain complex logarithm of the original signal. The phase term or imaginary part of this complex logarithm presents a computational difficulty which is sometimes approached by integration of the derivative of the phase spectrum. An excellent approach to phase computation is the adaptive integration methodology as proposed by Tribolet [10]. Unfortunately, this technique can be computationally intensive. This note describes a simple technique for efficient computation of the complex cepstrum which requires no phase unwrapping or integration. The procedure is given in both one and two dimensions.
|
399,505 |
Please write an abstract with title: A framework for formal specification of embedded systems, and key words: Formal specifications, Embedded system, Calculus, Specification languages, Unified modeling language, Information systems, Information technology, Logic design, Time factors, Process design. Abstract: This paper presents concepts of a specification-driven framework focusing on object-oriented design of embedded systems. It deals with tools and techniques aiming to prop formal specification and early design life cycle phases. Particularly, this contribution discusses logic calculus of objects, related class specification language, and techniques both for architecture specifications and for behavior specifications generated either from UML based semiformal behavioral diagrams or, as a reengineering tool, from source code.
|
399,506 |
Please write an abstract with title: Solar-Powered House System Design, and key words: Batteries, Inverters, Relays, Buck converters, Solar panels, Switches. Abstract: This paper proposes to design a small-scale photovoltaic system to regulate, store, convert and manage solar power for use in residential settings. The system utilizes a solar panel to supply power to batteries and an AC inverter. Batteries' energy is used to satisfy the power needs of a standard household. The proposed constructed system is a scaled down physical model. The system consists of a programmable controller, photovoltaic panel, a buck converter used to charge the batteries, and a single-phase inverter to supply power for the residential loads. The controller monitors every aspect of the system including battery voltage and solar panel voltage and then determines where the home needs to draw its power from. The control system also plays a vital role in the buck converter design. An input from the solar panel is connected to the system, which then determines the duty cycle needed to step down the voltage from the panel to an acceptable and safe voltage to charge the battery. This design of a Photovoltaic system is able to meet the power demanded by an average house located in Statesboro, Georgia, and thus reduce the load on the municipal power grid.
|
399,507 |
Please write an abstract with title: Mitigating Iot Attacks In Smart Medical Networks Using Enhanced Dirichlet Based Algorithm For Trust Management System, and key words: Peer-to-peer computing, Medical services, Computational modeling, Internet of Things, Computer security. Abstract: The innumerable application domains of Internet of Things (IoT) make security a big concern for the protection of devices and shared data from unauthorized access. The existing Internet Security protocols cannot be conformed for IoT entities due to their heterogeneity and resource constrained nature. Thus, there is a requirement of trust management systems as trust grants an IoT entity the ability to differentiate and govern the information disclosure in the network which ensures privacy and security. This paper proposes an Enhanced Dirichlet Trust Management Algorithm for healthcare domain which ensures reliable trust evaluation by considering direct observations and recommendations. The functional properties of the nodes form a key part of the algorithm. The existing Dirichlet algorithm has been enhanced by introducing Neighbour Node detection mechanism which helps to grant initial estimates of trust values to the nodes in the network. The proposed algorithm has been tested against various IoT attacks and the system performance has been summarized in the paper.
|
399,508 |
Please write an abstract with title: Development of EPICS Enabled Analog I-Q Based Low Level RF Control System, and key words: Radio frequency, Prototypes, Production, Control systems, Propagation losses, Steady-state, Voltage control. Abstract: The RF system is one of the important parts of Linear Accelerator. The RF power is responsible for the acceleration of the ion beam to higher velocity. The phase mismatch between RF voltage and ion beam may result in transmission losses. The low level RF (LLRF) control system plays an important role in maintaining the proper phase and amplitude of the RF voltage inside the accelerator cavity. In VECC, an I-Q based LLRF control system with embedded EPICS [1] control architecture is designed and developed for 37.8MHz RF cavities of Radioactive Ion Beam facility. The system is designed using ARM based SBC interfaced with external DAC and ADC. I-Q modulator and demodulator modules are developed in-house. The embedded EPICS input-output controller (IOC) is designed for acquisition of I and Q data from I-Q demodulator module through ADC, executing PID algorithm and production of desired I and Q voltages to I-Q demodulator module through DAC. At the same time, the IOC broadcast several control and monitoring parameters to the channel access clients e.g. operator interface, data archiver etc. The detail design and functional testing of the system is described in this paper.
|
399,509 |
Please write an abstract with title: Time signal processing for CDMA using given receiving configuration with RAKE receivers, and key words: Signal processing, Multiaccess communication, Fading, Multipath channels, Delay effects, Matched filters, Maximum likelihood detection, Maximum likelihood estimation, Decorrelation, Receiving antennas. Abstract: In this paper we are concerned with time signal processing in the case of multipath propagation. Using the concept in Maja Sarevska (2000) we have made modifications in order to provide sufficient BER performances for signals propagating through more than one paths. This solution demands knowledge of all user spreading CDMA sequences, path delays, and path amplitudes. We assume that the signals from all paths are with same amplitude in order to stress time channel characteristics, although the complete RAKE receiver solution provide amplitude compensation. We are getting a relatively simple solution and high performances improvement. These improvements are on the account of system capacity decreasing. This scheme is specially efficient when used jointly with space signal processing Gianluca Mazzini (1997).
|
399,510 |
Please write an abstract with title: Optimal Scheduling for Residential Building Based on Virtual Energy Storage System, and key words: Mathematical model, Buildings, Load management, Energy states, Power demand, Batteries. Abstract: The virtual energy storage system (VESS) achieved by using the demand response of thermostatically controlled loads (TCLs) is becoming more popular for smart grid. Demand response of TCLs to provide a cost-effective solution in real-time for the power mismatch due to variable renewable energy generation and avoid extra expenses due to meet the peak demand. To extract energy-saving and lesser cost of electricity, residential consumers perform energy management in accordance with power by grid, renewable generation, energy storage, demand response of TCLs, and electricity price. This requires optimal scheduling of residential consumer demand with manage the energy consumption of TCLs for cost saving. Firstly, mathematical model of TCLs and VESS using TCLs are developed. Then, an optimal scheduling model is developed to minimize the electricity cost of residential consumers. The simulations results show the reduction in the cost of electricity and VESS provides services like conventional energy storage.
|
399,511 |
Please write an abstract with title: High concentration testing and performance of multijunction solar cells, and key words: Testing, Photovoltaic cells, Electrical resistance measurement, Assembly, Pulse measurements, Robust stability, Gallium arsenide, Photovoltaic systems, Solar power generation, Lighting. Abstract: The use of the appropriate characterization tools along with the use of single cell assemblies that are robust, are necessary for proper evaluation of device performance and stability tests for GaInP/sub 2//GaAs/Ge triple junction (3J) concentrator solar cells. Certain discrepancies exist between the photovoltaic (PV) values from continuous outdoor illumination measurements at high concentration levels and those from the High Intensity Pulse Solar Simulator (HIPSS) measurements, which are addressed. The series resistance inferred from the current-voltage (IV) curve, however, is similar from both measurement techniques. Outdoor tests of concentrator cells yielded efficiencies near 29% (31% from HIPSS) for an average concentration of 432 suns. Both types of measurements revealed that the fill factor (FF) limited the performance of the cell at high concentrations due to the role of the series resistance. The formation of heat from the nonuniformity in the Fresnel optics also limited the device performance. Before the cell stability can be evaluated, cells are first screened for defects from the 1-sun, indoor, IV measurements. Then, the good cells are incorporated into small assemblies for further test by forward bias injection (FBI). The stability outcome of the FBI determines whether or not the cell can be used for outdoors tests. Outdoor IV measurements are then conducted. Stability test results showed that no degradation occurs in the 1-sun IV data before and after light soak of the concentrator assemblies.
|
399,512 |
Please write an abstract with title: Authors' reply, and key words: Nonlinear control systems, Control systems, Programmable control, Adaptive control, Nonlinear dynamical systems, Nonlinear systems, Fuzzy control, Least squares approximation, Neural networks, Fuzzy systems. Abstract: Presents the authors reply to comments by Tong, Li and Wei (ibid. p.703-5). For original paper see ibid., vol. 10, p. 39-49, Feb.2002.
|
399,513 |
Please write an abstract with title: Memristor-based signal processing for edge computing, and key words: Memristors, Signal processing, Array signal processing, Finite impulse response filters, Edge computing, Switches, Signal processing algorithms. Abstract: The rapid growth of the Internet of Things (IoTs) has resulted in an explosive increase in data, and thus has raised new challenges for data processing units. Edge computing, which settles signal processing and computing tasks at the edge of networks rather than uploading data to the cloud, can reduce the amount of data for transmission and is a promising solution to address the challenges. One of the potential candidates for edge computing is a memristor, an emerging nonvolatile memory device that has the capability of in-memory computing. In this article, from the perspective of edge computing, we review recent progress on memristor-based signal processing methods, especially on the aspects of signal preprocessing and feature extraction. Then, we describe memristor-based signal classification and regression, and end-to-end signal processing. In all these applications, memristors serve as critical accelerators to greatly improve the overall system performance, such as power efficiency and processing speed. Finally, we discuss existing challenges and future outlooks for memristor-based signal processing systems.
|
399,514 |
Please write an abstract with title: Sparsity Constrained Recursive Generalized Maximum Correntropy Criterion With Variable Center Algorithm, and key words: Filtering algorithms, Kernel, Adaptive filters, Parameter estimation, Optimization, Circuits and systems, Signal processing algorithms. Abstract: This brief developed a novel sparsity constrained recursive adaptive filtering algorithm via the generalized correntropy criterion with variable center (GMCC-VC) for sparse system parameters estimation. In order to improve the performance of the adaptive filtering algorithm with GMCC under the non-Gaussian and non-zero mean noise environments, the GMCC is extended by adding a center which can be located at any position in the generalized Gaussian kernel function. Specifically, we proposed a novel adaptive online update method to optimize the kernel method and center. In addition, we mainly derived a recursive GMCC-VC algorithm based on the GMCC with the sparse constraint to exploit sparsity. Numerical simulation results are given to show that the proposed algorithm is efficient for sparse system parameter estimation problems in non-Gaussian and non-mean noise environments.
|
399,515 |
Please write an abstract with title: Physical Layer Encryption for WDM Optical Communication Systems Using Private Chaotic Phase Scrambling, and key words: Optical fibers, Optical receivers, Encryption, Wavelength division multiplexing, High-speed optical techniques, Cryptography, Optical fiber networks. Abstract: Protecting the security of optical network is a major worldwide challenge. The conventional schemes for securing communications are based on cryptography at the MAC layer and its higher layers, which are facing a great threat with the development of quantum computers. Optical encryption is a promising way for building security on the physical layer of optical communications. In this work, we propose a novel optical encryption scheme for wavelength division multiplexing (WDM) fiber-optic communication systems, by utilizing the private chaotic phase scrambling. Secure transmission of 50 Gbps signal over 50-km standard single-mode fiber is experimentally and numerically demonstrated. The results show that the WDM signal is efficiently encrypted into a noise-like signal, due to the spectral broadening effect of chaotic phase scrambling. Since the processes of encryption and decryption are totally implemented in the optical domain, the proposed scheme can encrypt the entire network traffic with low latency and high speed. Moreover, the proposed encryption scheme is compatible with the existing WDM optical networks, and only one pair of encryption and decryption devices is sufficient to encrypt all WDM channels, thus the scheme can be easily implemented at low hardware cost.
|
399,516 |
Please write an abstract with title: Image Super-Resolution based on Multi-Convolution Neural Network, and key words: Convolution, Image reconstruction, Image resolution, Reconstruction algorithms, Feature extraction, Neurons, Neural networks. Abstract: In recent years, convolutional neural network method has been widely and successfully applied in the field of image super-resolution. With the development of CNN structure, the reconstruction algorithm based on CNN has also been developed. However, in these reconstruction models, the scale of convolution operator is single. This will greatly limit the model's learning ability about input image and impact the reconstruction effect. In order to improve the accuracy of the convolution network to the input image, a reconstruction method based on multi-scale convolution operator is proposed. In this method, multi-scale convolution operators are set up in each layer network to calculate multi-scale features of the input image. Experiments show that this method can effectively improve the accuracy of the reconstructed image in detail.
|
399,517 |
Please write an abstract with title: Hybrid Modeling for LCC Circuit Based on Machine Learning, and key words: Machine learning algorithms, Simulation, Machine learning, Mathematical models, Data models, Power electronics, Hybrid power systems. Abstract: This paper investigates a hybrid modeling method for LCC resonate circuit. The hybrid model includes traditional mathematical model and machine learning error model. First, the traditional mathematical modeling method and equivalent circuit are presented. Second, a practical LCC circuit is simulated based on PLECS and real hardware parameter, and actually output data is obtained. Then, based on the comparison between real data and mathematical model output data, the error data is obtained. Third, machine learning algorithm is introduced to model this error data, and with a proper weight coefficient, a hybrid model for LCC circuit is obtained. Finally, comparison the hybrid model output under different working condition with simulation results can certify the effectiveness and advancement of this proposed method.
|
399,518 |
Please write an abstract with title: Joint Frequency Offset Estimation and Timing Synchronization for DSSS MSK Receiver, and key words: Frequency estimation, Timing, Frequency synchronization, Spread spectrum communication, Partial transmit sequences, Fading, Receivers, Wireless communication, Power system modeling, Transmitters. Abstract: A new data-aided algorithm for joint frequency offset and timing synchronization of DSSS MSK receiver is presented. Compared with the existing low complexity algorithm, the complexity of this algorithm is further reduced by half reduce the complex multiplication operations. Simulation results in Raleigh flat fading channel show that the estimation error is decreased dramatically.
|
399,519 |
Please write an abstract with title: Child Speech Recognition on End-to-End Neural ASR Models, and key words: Error analysis, Speech recognition, Data models, Recording, Machine translation, Task analysis, Speech processing. Abstract: Automatic speech recognition (ASR) is an area which is having maximum improvement and is developing to a very high extent as far as adult speech is concerned. Nevertheless, child speech recognition is an area which is least explored. This is because of the scarcity of a neatly labelled corpora. Precisely, to train a speech recognition model from scratch and to make it work child speech is a challenging task as the availability of child speech data is limited. In this context, exploring child speech recognition can also help us improve the current speech recognition systems since on validating it in such a manner that it will be useful for child speech may help the systems work in a good way such that we will be able to validate it for everyone irrespective of the age variation in which a speech utterance is produced. State-of-art models in this domain perform various complex speech recognition tasks such as machine translation and ASR on multilingual datasets as well as it is useful in performing self supervised speech recognition tasks. This process has proved to work well for speech data which consists of recordings with adult data and it is not yet validated on child speech. So the present work tries to validate the performance six state-of-the-art ASR models on children speech and report the corresponding word error rate.
|
399,520 |
Please write an abstract with title: A Water Wave Optimization Algorithm for Order Selection and Delivery Path Optimization for Takeaway Deliverymen, and key words: Information science, Evolutionary computation, Search problems, Path planning, Optimization. Abstract: Over the last years, the food delivery market has seen significant growth and provide a lot of jobs for deliverymen. The revenue of a takeaway deliveryman depends on not only reasonable order taking but also efficient delivery path planning. However, it is challenging to select among a large number of candidate orders and plan an efficient route passing all involved pickup points and service points. In this paper, we present a problem integrating order selection and delivery path optimization for takeaway deliverymen. The objective is to maximize the revenue per unit time subject to overtime penalty and high-workload reward. To efficiently solve this problem, we propose a hybrid intelligent algorithm, which adapts the water wave optimization (WWO) metaheuristic to evolve solutions to the main order selection problem and employs tabu search to optimize the path for each order selection solution. Experimental results on test instances demonstrate the performance advantages of the proposed algorithm compared to a set of popular metaheuristic optimization algorithms.
|
399,521 |
Please write an abstract with title: Influence of surface state on the magnetic core loss at high frequency in amorphous Fe-based alloys with low magnetostriction, and key words: Magnetic cores, Magnetic losses, Frequency, Amorphous materials, Magnetostriction, Annealing, Atmosphere, Nitrogen, Amorphous magnetic materials, Electrons. Abstract: Magnetic core losses at high frequency up to 100 kHz were investigated on low magnetostrictive amorphous Fe-based alloys annealed in various atmospheres (nitrogen, air and moderate vacuum). The lowest magnetic core loss was attained by the annealing in nitrogen atmosphere. The Auger electron spectroscopy showed oxidation for all the samples annealed at various atmospheres mentioned above, but oxygen concentration for the sample annealed in nitrogen atmosphere sharply drops at about 1000 A depth from the surface, which is quite different from the results of the samples annealed in air and moderate vacuum. The magnetic core loss of the sample annealed in nitrogen atmosphere becomes fairly large from chemical etching, which implies the importance of surface state for the magnetic core loss reduction at high frequency.
|
399,522 |
Please write an abstract with title: Defending Malicious Check-In Using Big Data Analysis of Indoor Positioning System: An Access Point Selection Approach, and key words: Wireless fidelity, Robustness, Big Data, Feature extraction, Optimization, Data analysis, Mobile handsets. Abstract: The integration of WiFi fingerprint-based indoor positioning technology and big data analysis emerges as a new research prospect. Through the analysis of big data collected from users' submission, we can discover many other applications of fingerprint positioning. A popular application is the check-in to point of interest (POI) for its crowd traffic evaluation according to the volume of received signal strength (RSS) fingerprints submitted by users. However, this crowd traffic evaluation method may be susceptible to the intrusion of malicious check-in behaviors. Attackers who are not at the target POI submit the self-modification RSS fingerprints that can be located at the target POI in order to illegally increase its crowd traffic. To this end, we propose a malicious check-in defense scheme based on the access point (AP) selection to resist attackers who aim to successfully initiate the fingerprint modification. Specifically, the distance between different POIs in fingerprint space is firstly developed for AP selection. Then, in order to increase the robustness of selected AP subset, we propose the mutual information among different classes as a selection condition. Through the multiobjective optimization and Pareto optimality, we can obtain the best AP subset to participate in the computation of positioning algorithm. Furthermore, the optimal modified fingerprint is searched by the level set method (LSM), which can be utilized to measure the costs of attackers and the robustness of the system. In addition, we propose an iterative weight updating method based on classification error to learn the optimal weight in order to balance the positioning accuracy and robustness. We finally carry out extensive simulations to validate that the POI crowd traffic can be assessed in terms of the RSS fingerprint-related information and our proposed scheme can perform high robustness to resist malicious check-in.
|
399,523 |
Please write an abstract with title: Mutual Noise Estimation Algorithm for Video Denoising, and key words: Procurement, Measurement, Noise figure, Correlation, Noise reduction, Estimation, Approximation algorithms. Abstract: An innovative algorithm is recommended to approximate spatial-time based variance of noise in videos. This procedure practices mutual data from the three-dimensional and time-based noise figures to discover standardized wedges in a video border and evaluate the occurrence of noise. In this project we describe the implementation of algorithm titled mutual noise estimation for eliminating noise in the video. Videos are besmirched by noise while transmitting and video procurement, dispensation and broadcast. Noise worsens the filmic eminence of the videos and eradicating the noise significantly influences the efficacy and enactment of video handling solicitations like compression of video signal, breakdown, format alteration, motion approximation and filtering. Many noise estimation algorithms were recommended in the proposal to guess the amount of noise available in videos. Some of the noise assessment algorithms merely take aid of time-based information of videos, while some methods virginally rely on three-dimensional information. Other approaches make the aid of spatio-temporal domain of videos to upsurge the exactitude and dependability of their algorithms. The investigational outcomes demonstrate the precision and strength of the algorithm over videos with low to high three-dimensional and time-based complexities, and varying levels of noise power and noise correlations. By using this mutual algorithm, we can find the image quality metrics.
|
399,524 |
Please write an abstract with title: Exploring PIM Architecture for High-Performance Graph Pattern Mining, and key words: Computer architecture, Pattern matching, Bandwidth, Hardware, Through-silicon vias. Abstract: Graph mining applications, such as subgraph pattern matching and mining, are widely used in real-world domains such as bioinformatics, social network analysis, and computer vision. Such applications are considered as a new class of data-intensive applications that generate massive irregular computation workloads and memory accesses, which are different from many well-studied graph applications such as BFS and page rank. In this letter, we use the emerging process-in-memory architecture to accelerate data-intensive operations in graph mining tasks. We first identify the code blocks that are best suitable for PIM execution. Then, we observe a significant load imbalance on PIM architecture and analyze the root cause for such imbalance in graph mining applications. Lastly, we evaluate several scheduling schemes that help reduce the load imbalance and discuss potential optimizations to enhance performance further.
|
399,525 |
Please write an abstract with title: Integrating AJAX Approach into GIS Visualization Web Services, and key words: Geographic Information Systems, Visualization, Web services, XML, Java, Power system modeling, Access protocols, Simple object access protocol, Service oriented architecture, Web server. Abstract: As the Web platform continues to mature, we see an increasing number of amazing technologies that take Geographic Information Systems (GIS) visualization applications to new levels of power and usability. By integrating new powerful technologies into GIS systems, we get higher performance results with additional functionalities. The most recent development capturing the attention of the browser based application developers is AJAX (Asynchronous JavaScript and XML). In this paper we present a generic and performance efficient framework for integrating AJAX models into the browser based GIS Visualization Web Services systems.
|
399,526 |
Please write an abstract with title: Pragmatic type interoperability, and key words: Programming profession, Operating systems, Laboratories, Transport protocols, Linux, Computer languages, Java, Application software, Simple object access protocol, Hardware. Abstract: Providing type interoperability consists in ensuring that, even if written by different programmers, possibly in different languages and running on different platforms, types that are supposed to represent the same software module are indeed treated as one single type. This form of interoperability is crucial in modern distributed programming. We present a pragmatic approach to deal with type interoperability in a dynamic and distributed environment. Our approach is based on an optimistic transport protocol, specific serialization mechanisms and a set of implicit type conformance rules. We experiment the approach over the .NET platform which we indirectly evaluate.
|
399,527 |
Please write an abstract with title: A Safe Overtaking Control Scheme for Autonomous Vehicles using Rapid-Exploration Random Tree, and key words: Interpolation, Heuristic algorithms, Software algorithms, Vehicular ad hoc networks, Path planning, Safety, Planning. Abstract: In order to enhance the commuting ability of autonomous vehicles on the road and ensure the comfort and safety of passengers, the Rapid-exploration Random Tree (RRT) algorithm is applied to the research of safe overtaking control of autonomous vehicles. Firstly, the kinematics and dynamic model of the vehicle are implemented. Secondly, the RRT algorithm and the A-star algorithm are expounded, and the idea of the A-star algorithm is applied to the RRT algorithm for improvement. The improved algorithm is used to obtain the rough obstacle avoidance of the vehicle. The rough path is optimized by applying the cubic spline interpolation method to solve the problem that the path cannot be applied to the actual vehicle driving task. Finally, the simulation of the overtaking scheme is carried out. The results reveal that the safe overtaking scheme based on RRT algorithm achieves the predetermined requirements in the two actual cases under the premise of ensuring safety, controlling the swing of the sideslip angle of the vehicle's center of mass within a reasonable range. It has certain practical significance for ensuring the road safety of autonomous vehicles.
|
399,528 |
Please write an abstract with title: A new metric for probability distributions, and key words: Gaussian noise, Probability distribution, Iterative algorithms, Writing, Algorithm design and analysis, Wavelet analysis, Adaptive estimation, White noise, Bayesian methods, Convergence. Abstract: We introduce a metric for probability distributions, which is bounded, information-theoretically motivated, and has a natural Bayesian interpretation. The square root of the well-known /spl chi//sup 2/ distance is an asymptotic approximation to it. Moreover, it is a close relative of the capacitory discrimination and Jensen-Shannon divergence.
|
399,529 |
Please write an abstract with title: Study on crack detection of beam using harmonic responses, and key words: Structural beams, Frequency, Continuous wavelet transforms, Laboratories, Electric shock, Springs, Shape measurement, Wavelet transforms, Vibrations, Mathematics. Abstract: In this paper, a torsional spring is adopted to simulate a crack in a cantilever beam, approximated dispilacement and slope modes of the cracked cantilever beam are obtained. Its displacement and slope responses under single harmonic excitation and zero initial conditions are obtained by using approximated modes. It is shown that slope responses of the cracked cantilever beam has stepping type change at crack location and its partial derivative with respect to x has peak type change. From these dynamiic characteristics of cracked cantilever beam, a crack detection criterion using slope responses under harmonic excitation is proposed. Moreover, numerical examples and experimental results show that the crack location and depth can be identified by proposed criterion.
|
399,530 |
Please write an abstract with title: Deepfake Detection using a Two-Stream Capsule Network, and key words: Training, Analytical models, Computational modeling, Neural networks, Computer architecture, Particle swarm optimization, Optimization. Abstract: This paper aims to address the problem of Deepfake Detection using a Two-Stream Capsule Network. First we review methods used to create Deepfake content, as well as methods proposed in the literature to detect such Deepfake content. We then propose a novel architecture to detect Deepfakes, which consists of a two-stream Capsule network running in parallel that takes in both RGB images/frames as well as Error Level Analysis images. Results show that the proposed approach exhibits the detection accuracy of 73.39 % and 57.45 % for the Deepfake Detection Challenge (DFDC) and the Celeb-DF datasets respectively. These results are, however, from a preliminary implementation of the proposed approach. As part of future work, population-based optimization techniques such as Particle Swarm Optimization (PSO) will be used to tune the hyper parameters for better performance.
|
399,531 |
Please write an abstract with title: TwiTrace: A New Approach of Contact Tracing Based on Multilingual Tweets, and key words: Contact Tracing, Epidemic prediction, Graph modelling, Twitter, Multilingual tweets. Abstract: By the end of 2019, the world has known a resurgence of epidemics by the sudden outbreak of the COVID-19 virus, that claimed millions of lives, and overwhelmed public health systems. Compared to other known viruses, this one is thought to be more contagious. An individual may be infectious without showing symptoms, so until he tests positive, he might infect many people who meet him. Therefore, to keep the numbers under control, governments apply various strategies such social distancing, remote work and investigative methods like contact tracing to identify potential infected people. Many researchers proposed effective digital contact tracing solutions; nevertheless, they rely on user's cooperation to install applications or to carry sensor devices. However, social networks present a suitable alternative to gather contact-tracing data since they are public and available. In this paper, we propose TwiTrace a new contact tracing approach based on multilingual tweets and graph modelling. TwiTrace creates a dataset for Covid-19 positive cases using Twitter API, and then identifies close contacts and risk places. Next, a graph is generated and queried using Neo4j database. Our approach indicates high accuracy and shows good results in terms of size compared to suspected cases and high-risk places extracted manually.
|
399,532 |
Please write an abstract with title: Improved model-free adaptive control method using recursive least-squares estimation algorithm, and key words: Estimation, Cranes, Data models, MIMO communication, Adaptation models, Parameter estimation, Nonlinear systems. Abstract: Model-free control is a data-based control approach which can be applied when a dynamic model of the controlled system is difficult to obtain or identify. To realize the controller, a linearized data model is often established locally by using only input-output information from the closed-loop system. The data-based model contains a time-varying parameter matrix called pseudo-jacobian matrix (PJM) which can be estimated and updated recursively at every time instant of the system operation using different on-line parameter estimation methods. As a traditional estimation approach, projection algorithm is generally used only for single-input single-output (SISO) systems. In this contribution, the novel idea of using recursive least-squares (RLS) algorithm is discussed and implemented to improve parameter estimation accuracy. A modified model-free adaptive controller (MMFAC) is designed by considering minimization of the output error and its derivative for tracking control improvement. The proposed method is applied to reduce vibration of a ship-mounted crane representing a multi-input multi-output (MIMO) system. Simulation results indicate that the RLS-based MMFAC has significant improvement in vibration control of the elastic boom and the payload position compared to other traditional approaches.
|
399,533 |
Please write an abstract with title: Island Power System Operation with Single-Wire Earth Return (SWER), Solar PV and Diesel Generation –Marinduque, Philippines case study, and key words: Load modeling, Generators, Mathematical model, Power systems, Batteries, Matlab, Earth. Abstract: Single-wire earth return system (SWER) is a cost-effective solution to rural electrification. SWER systems operate by drawing power from the grid to supply the end load. With the increasing solar PV system penetration in the consumer side with a back-up diesel generator the concept ofbi-directional operation of SWER system during surplus generation at the load side need to be understood Initial modelling and theoretical network assessment showed that the system could operate if SWER were supported from both ends.A realistic 2 MW capacity case-study using rooftop solar PV was identified for Marinduque, Philippines. Using a sample household demand of serving 1600 households with a 1.34-kWp rooftop solar PV capacity in order to offset a 2MW-capacity from the grid has been undertaken. This has been extended to further analyze energizing five out of the remaining 20 unenergized sitios in the province of Marinduque using SWER system. The additional 2MW capacity and the designed SWER system were modelled to be integrated with the existing power system of Marinduque, Philippines. The designed SWER system and the integration to the existing power system of the province was modelled in DIgSILENT using the power systems data given by the Technical Services Department of Marinduque Electric Cooperative (MARELCO).
|
399,534 |
Please write an abstract with title: A method for reducing the order of multivariable stochastic systems, and key words: Stochastic systems, Reduced order systems, Minimization methods, Equations. Abstract: This correspondence considers the problem of modeling a given linear time-invariant system by a reduced-order model. The method proposed here is based on the minimization of an equation error, which leads to a linear problem. An expression for a reduced-order model is given in the case when a random input is used.
|
399,535 |
Please write an abstract with title: Digital competences at university level: analysis from personal learning environments, and key words: Technological innovation, Tutorials, Production, Tools, Aerospace electronics, Search problems, Particle measurements. Abstract: The objective of this research is to analyze digital competencies in a group of university communication students, through the use of personal learning environments (PLEs). It is based on theories of connectivism and constructivism, with a constructivist paradigmatic vision, a mixed approach, a nonexperimental design and a descriptive scope. Participants were 562 university students enrolled in the School of Communications of a private university in Lima, Peru. PLEs were measured with the Competencies for Lifelong Learning based on the use of PLEs (CAPPLE), while qualitatively they were analyzed through interviews. Among the findings, it was found that 52.2% of the female students mostly use PLEs. Though 90% of students prefer to use virtual environments, only 32.2% usually interact with teachers. In terms of students' digital competencies, the ability to solve problems related to the use of technology, identification of inappropriate behaviors and digital protection, as well as the recognition of limitations in the complex handling of technology stand out. According to the findings, it is considered necessary to implement programs and tutorials related to virtual learning spaces for teachers.
|
399,536 |
Please write an abstract with title: The estimation of static breakdown voltage for gas-filled tubes at low pressures using dynamic method, and key words: Electron tubes, Breakdown voltage, Electric breakdown, Delay effects, Nitrogen, Voltage control, Electrodes, Cathodes, Polynomials, Surface discharges. Abstract: The paper presents experimental data of breakdown voltage as a function of voltage increase rate for nitrogen-filled tubes at pressures of 133 and 399 Pa. By fitting this data using polynomial approximation, static breakdown voltages for these tubes were estimated. The influence of voltage increase rate, voltage step, time interval between successive voltage step, and relaxation time on the static breakdown voltage was analyzed. The processes in gas advanced during breakdown were also analyzed, as well as their influence on the breakdown voltage.
|
399,537 |
Please write an abstract with title: Modeling and control of a self-bearing switched reluctance motor, and key words: Reluctance motors, Force control, Rotors, Torque control, Reluctance machines, Shafts, Stator windings, Inductance, Teeth, Induction motors. Abstract: Due to its special structure, the shaft radial force and torque of a three-phase 12/8 switched reluctance motor can be separately controlled by proper selection of pole currents. When all the pole currents are controlled independently, it is possible to control the radial force to counterbalance the external force acting on the shaft In this paper, a control scheme for self-bearing of a 12/8 pole SRM drive is proposed. The rotor needs only one bearing for rotation and to constrain the axial movement The other end can move freely in radial direction but is balanced with the radial force produced by the motor. Motor torque is controlled with the conventional method, but two additional poles in the phase with descending inductance are excited to produce the required radial force for rotor balancing. A model suitable for torque and radial force control is derived and then used for the synthesis of self-bearing control. The proposed control scheme is also implemented and verified experimentally.
|
399,538 |
Please write an abstract with title: Study on preparation and properties of organic-montmorillonite modified epoxy nanocomposites, and key words: Nanocomposites, Design optimization, Design for experiments, Epoxy resins, X-ray diffraction, Dielectrics, Mechanical factors, Temperature, Delay, Polymers. Abstract: Montmorillonite (MMT) modified with alkyl ammonium ions was dispersed in an epoxy/methyl nadic anhydride (MNA) system to form epoxy/MMT composites. Processing conditions of the composites were optimized by the orthogonal experimental design. The dispersion of the MMT in the epoxy resins was investigated by X-ray diffraction and AFM. The mechanical and dielectric properties were analyzed. The results showed that with respect to the pure epoxy, the impact strength of the composites was improved approximately 12.4%. The increase of the /spl epsi//sub r/ and tan/spl delta/ with the temperature was delayed owing to the mobility of polymer chains was restricted between the layers of MMT.
|
399,539 |
Please write an abstract with title: Multi-level models for a light electric vehicle propulsion system using EMR organisation, and key words: Mathematical model, Computational modeling, Couplings, Torque, Inductance, Electromagnetics, Propulsion. Abstract: The paper describes the implementation and developing of the multi-level models for the electrical machine under study. The targeted approach was to create simulation programs with 3 different complexity levels. The first one was designed to use constant parameters of the machine, the second one engaged look-up table based DQ inductance variations vs. currents while the most complex one, was based on 3D matrixes for the DQ flux variations vs the currents. All these studies were engaged on a known permanent magnet synchronous machine for which the complete identification and design data is available. A finite element analysis (FEA) of the machine is performed in order to evaluate its electromagnetic behavior and perform the parameter computation. All the models are built in MATLAB/Simulink using Energetic Macroscopic Representation (EMR), an efficient tool for the control design and model organization.
|
399,540 |
Please write an abstract with title: Stability and Non-Uniqueness of Equilibrium in an Open Market Model, and key words: Supply and demand, Elasticity, Conference management, Stability analysis, Large-scale systems. Abstract: In this paper we consider an open market model, where the supply and demand functions are restored by their price elasticities. We obtained the conditions on the stability and non-uniqueness of equilibrium in the model as the corollaries of the coincidence point theorems for a covering and Lipschitz continuous mappings.
|
399,541 |
Please write an abstract with title: The Models for Evaluation of Environment Impact for the Circuit Board with Modal Reservation Using N-norms, and key words: Temperature, Transmission line matrix methods, Systematics, Printed circuits, Geometric modeling, Humidity, Conductors. Abstract: The paper describes the effect of humidity and temperature on printed circuit board with a modal reservation and edge-coupling. Step by step, the development of a geometric model of a cross section, the calculation of matrices of primary and secondary parameters, the development of a schematic model, the obtaining simulation models, the development of N-norm models are presented. The calculated per-unit-length delays and time responses are given. Three cases of environmental impact were considered: the initial structure at a temperature of 25°C, a structure with a 1 mm thick layer of water covering it at a temperature of 25°C, and a structure with a 1 mm thick layer of ice covering it at a temperature of minus 50°C. Portraits of five N-norms along the conductor are shown with a comparison of their maximum and minimum values for three cases. It was found that humidity and temperature can significantly affect the values of N-norms, including their values along the conductor. The models obtained in this article will allow us to investigate the impact of the environment on printed circuit boards with MR. The paper for the first time presents the results of the systematic use of N-norm models.
|
399,542 |
Please write an abstract with title: A Fuzzy-based Convolutional LSTM Network Approach for Citywide Traffic Flow Prediction, and key words: Deep learning, Training, Uncertainty, Smart cities, Neural networks, Transportation, Predictive models. Abstract: Citywide traffic flow prediction is of great importance to intelligent transportation systems and smart cities. Although many deep learning methods have been applied for citywide traffic flow prediction, deep learning is a deterministic representation and sheds little light on data uncertainty. In this paper, a fuzzy-based convolutional LSTM neural network (FConvLSTM) method is proposed to improve the accuracy of citywide traffic flow prediction by taking data uncertainty into consideration. FConvLSTM is a hybrid model which combines fuzzy learning with a convolutional LSTM neural network (ConvLSTM). The impact of data uncertainty is lessened with the help of fuzzy neural networks and ConvLSTM is adopted to explore the spatio-temporal characteristics of traffic data, which can learn spatial dependencies and temporal dependencies jointly. Experimental results on a real dataset verify the outperformance of the FConvLSTM method.
|
399,543 |
Please write an abstract with title: Detecting Intrusions in Communication-Based Train Control Systems, and key words: Wireless communication, Image edge detection, Intrusion detection, Transportation, Control systems, Rail transportation, Safety. Abstract: Communication-Based Train Control (CBTC) systems are being widely used as a control and signalling system for railways. They allow trains to communicate with infrastructural components through wireless communications to receive operational commands, and to include Ethernet-based communications inside them to perform traction and braking operations. These communication technologies make railway systems vulnerable to cyber-attacks that can disrupt traction and braking operations and threaten trains’ safety. Attacks can take place without the driver noticing, which might lead to collisions. In this work, we propose an Intrusion Detection System (IDS) based on Machine Learning (ML) to detect attacks on traction and braking operations performed inside the train. This IDS analyzes trains’ mobility data and classifies them into normal and attack data. No previous work proposed an IDS to detect attacks on trains’ mobility. Therefore, the proposed IDS helps train control centers to detect such attacks and take appropriate measures to avoid hazardous incidents. To evaluate this system, a realistic network of trains was simulated using Simulation of Urban MObility (SUMO) on part of the railway in Berlin, Germany. We compared the performance of three ML classifiers: K-Nearest Neighbours, Naive Bayes and Random Forests. The results show that Random Forests performed the best with a classification accuracy between 94% and 99%. Additionally, three plausibility checks were proposed to enhance the detection accuracy by 1% to 3%.
|
399,544 |
Please write an abstract with title: Partial MaxSAT Computation of Conformance Checking Artefacts, and key words: Adaptation models, Computational modeling, Memory management, Encoding, Optimization. Abstract: To reason about observed behaviour of processes and their models, conformance checking techniques are rooted in the computation of artefacts. Related artefacts like alignments, multi-alignments and anti-alignments are defined over a distance function, most commonly Hamming or Levenshtein distances. In this paper we provide a new Partial MaxSAT encoding of these artefacts based on the Levenshtein distance and compare with their current state-of-the-art SAT encodings. We show a reduction in the resulting formula size for our proposed encoding, while also obtaining good performance results on the computation of the artefacts.
|
399,545 |
Please write an abstract with title: Analysis of Deep Depletion Effect in SOI LDMOS Substrate with Numerical Simulation, and key words: Analytical models, Power demand, Silicon-on-insulator, Reliability engineering, Software, Silicon, Semiconductor process modeling. Abstract: In the paper, the deep depletion (DD) effect in silicon on insulator (SOI) laterally-diffused metal-oxide semiconductor (LDMOS) substrate is analyzed with the device simulation software medici. DD layers appear in the substrate when the device turns off quickly. It gradually decreases with increasing time and eventually disappears in off-state. During this process, charge is distributed in the substrate depletion layer and the electron inversion layer. Distribution of charge changes with time. The electric field in the drift region is affected by the charge distribution of the substrate, which at the source end is continuously weakened, and the drain end is continuously enhanced. The maximum time, in which the device is turned off, and the duration of substrate DD effect decrease with the increase of temperature, the decrease of Shockley-Read-Hall electron and hole lifetime, and the increase of substrate doping concentration.
|
399,546 |
Please write an abstract with title: Controle por Lógica Difusa de um Ventilador Industrial de uma Planta de Pelotização, and key words: Fans, Ovens, Conferences, Industry applications, Iron. Abstract: This article presents the implementation of a specialist system with diffuse logic for controlling a fan in a mobile grid oven in an iron ore pelletizing plant. These fans are important to maintain the temperature of the pellets at predetermined values, this process is multivariable and has multiple restrictions, thus, diffuse logics were chosen for their ability to adapt to different operating conditions. The constraints and experiences of the employees were used to create rules with the objective of improving the efficiency of the process, in the article results are presented showing the improvement of the performance.
|
399,547 |
Please write an abstract with title: Air-to-Ground Large-Scale Channel Characterization by Ray Tracing, and key words: Ray tracing, Urban areas, Wireless communication, Probability, Receivers, Autonomous aerial vehicles, Transmitters, Urban areas. Abstract: Through ray tracing simulation on three-dimensional (3D) urban environments, we characterize air-to-ground (A2G) channels for 5G and beyond wireless communications. In this study, we review four types of elevation angle-dependent probability of line-of-sight (LoS) expressions according to building distribution types. With channel characterization data extracted from the ray tracing (RT) simulation, LoS probability versus elevation angle agrees better with the elevation angle-dependent probability expressions of LoS that assumes the buildings are randomly distributed. Furthermore, we provide a more accurate LoS probability expression that enables better curve-fitting for the LoS probability data obtained from RT simulations. In addition, the A2G channel parameters such as LoS and non-line-of-sight (NLoS) channel path loss exponents (PLEs) and the shadow fading with UAV altitudes are obtained in four typical and realistic urban environments. The LoS PLEs increase slowly with the height of the UAV, while the NLoS one decreases significantly with the increase of the UAV height.
|
399,548 |
Please write an abstract with title: Theory and operation of high-power CW and long-pulse dye lasers, and key words: Laser theory, Pump lasers, Absorption, Laser modes, Laser excitation, Laser tuning, Bandwidth, Wavelength measurement, Power generation, Solvents. Abstract: A complete theoretical model for CW and long-pulse dye lasers is developed. The effects of excited singlet-state absorption of pump and laser fight and triplet absorption of pump and laser light are included. Expressions are derived for gain, actual dye transmission, and output power. Experimental work is presented to verify the theory and to obtain values of excited-state absorption cross sections for rhodamine 6G by matching experimental to theoretical curves.
|
399,549 |
Please write an abstract with title: Design of Vertical Bicycle Parking Device, and key words: Fasteners, Conferences, Wireless communication, Smart grids, Stress, Wheels, Clamps. Abstract: In order to solve the problem of chaotic parking of bicycles in colleges and universities, which is easy to cause traffic jams, a bicycle parking device suitable for colleges and universities is designed. The whole structure of bicycle parking device is designed and modeled by using SolidWorks software. Through theoretical calculation and static stress analysis, we can know that the structural strength of the device designed in this paper can meet the strength requirements of practical use. The bicycle parking device designed in this paper plays a good guiding role in solving the problem of campus congestion caused by random parking of bicycles and centralized parking of bicycles occupying pedestrian passageways.
|
399,550 |
Please write an abstract with title: Thru-Load-Delay: An Improved Technique for Calibrating the Dual Six-Port, and key words: Calibration, Circuits, Reflection, Scattering parameters, Impedance, Microwave Theory and Techniques Society, Microwave measurements, Paper technology, NIST, Power transmission lines. Abstract: In some earlier papers the use of a "thru-short-delay" technique for calibrating the dual six-port was described. Another scheme required only a length of precision transmission line and a calibration circuit. The better features of these two somewhat different approaches have now been combined and the requirement for either a known short, or a "calibration circuit" eliminated. This paper will discuss this new procedure and also describe its application in a practical dual six-port system.
|
399,551 |
Please write an abstract with title: A Novel Approach For Configuration Identification of Distribution Network Utilizing μPMU Data, and key words: Phasor measurement units, Power measurement, Observability, Topology, Manganese, Network topology, Current measurement. Abstract: This paper presents a two-stage approach to detect the configuration of the three-phase distribution network by processing and analyzing the real-time measurement from the optimally placed μPMU. Initial stage constitutes the μPMU placement problem subjected to the various working configuration of the distribution network. The basic technique is to compare time series measurements with the estimated version, derived using power flow analysis. Eventually, in the second stage, the voltages phasor of the μPMU nodes and the current phasors of the directly connected lines are utilized to evaluate active power flow in the lines. Then, using the expected value of deviation between measured and estimated power, the correct configuration is identified fluently. Simulation results prove the accurateness of the configuration detection algorithm in the 8-node test network and 33-node standard distribution test systems.
|
399,552 |
Please write an abstract with title: Research on Optimized Energy Management Strategy Based on Micro-trip Recognition, and key words: Simulation, Clustering methods, Fuel cells, Electric vehicles, Power electronics, Power systems, Energy management. Abstract: The energy management strategy of fuel cell electric vehicle can greatly influence the performance of vehicle, so a lot of research in this field were done by researchers. In order to improve the adaptability to complex work conditions of traditional strategies, the work condition recognition methods based on intelligence algorithms were introduced to energy management strategies. However, there are a lot of disadvantages of present recognition methods, such as low recognition accuracy and low generality. Aiming at solving these problems, an optimized fuzzy energy management strategy based on micro-trip recognition is proposed in this paper. In this strategy, firstly the work conditions prepared for recognition are divided into several micro-trips to improve the accuracy of recognition. Then, the strategy is simulated on the simplified power system built in this paper and compared with the simulation result of a general rule-based strategy. The better performance of the strategy proposed proves the effectiveness and optimality of this method.
|
399,553 |
Please write an abstract with title: Towards the definition of a water risk index and its automatic calculation from NetCDF multidimensional data files, and key words: Precipitation, Decision making, Data visualization, Prototypes, Software, Indexes, Geographic information systems. Abstract: This work presents the definition of a water risk index based on temperatures and precipitation during the years 1979 to 2019 in the Ñuble Region (Chile). Its calculation has been implemented in a software application that allows working with multidimensional data files in NetCDF format. In addition, our prototype allows to load and visualize this type of data in an easy way without the need of having an advanced knowledge in the management of geographic information systems. The result is an application that we would like to use in the future to improve water management and decision making in the region.
|
399,554 |
Please write an abstract with title: Data analytics and machine learning: root-cause problem-solving approach to prevent yield loss and quality issues in semiconductor industry for automotive applications, and key words: Solid modeling, Electronics industry, Predictive models, Reliability engineering, Manufacturing, Safety, Problem-solving. Abstract: Quality requirements in the semiconductor industry for automotive products are increasing rapidly with the movement to autonomous vehicles and higher levels of safety. It is no longer possible to express maximum failure requirements in parts per million (ppm). Individual failing parts observed in the field and reported by customers can trigger a significant quality response. ‘Zero-defect’ (ZD) is no longer considered a utopian ideal, but a required potentially reachable goal for semiconductor manufacturers. Projects and studies that include artificial intelligence and big data, are seen as key drivers to reach a ZD level of quality. Competing objectives targeted in any industrial project, such as quality improvement and gross margin, must also be considered. Initial projects in machine learning (ML), focusing on yield-loss issues, are being deployed within the manufacturing sites. These projects interconnect typical internal data collected from the manufacturing and assembly lines with engineering, qualification and reliability data. For a specific case study of unexpected abnormally high variability on some parameters, this paper presents a problem-solving approach in a big-data environment. Models implemented and results obtained towards root-cause problem solving for this issue, are discussed. This overall approach may be replicated in other ML projects.
|
399,555 |
Please write an abstract with title: Artificial Intelligence based Station Protection Concept for Medium Voltage Microgrids, and key words: Artificial neural networks, Discrete wavelet transforms, Microgrids, Fault location, Voltage measurement, Current measurement. Abstract: Despite the rapid improvements in the field of microgrid protection, it continues to be one of the most important challenges faced by the distribution system operators. With the introduction of this new operation concept, the existing protection devices are not able to successfully identify, classify and localize different types of faults that occur in the microgrids due to their dynamic behaviour, especially in the islanded mode of operation. This paper presents a methodology that provides the station protection functionalities that include detection and classification of faults, isolation of the faulty feeder and fault location estimation. The proposed method is based on discrete wavelet transform and artificial neural networks. The test system based on the real data, completely developed in MATLAB Simulink, is used to demonstrate the accuracy of all functionalities of the station protection algorithm that can be easily applied in microgrids. The presented results demonstrated the method accuracy and showed that it can be used as an upgrade of the existing protection equipment for the future implementation of the advanced microgrid station protection system.
|
399,556 |
Please write an abstract with title: Particle Swarm Optimization on Deep Reinforcement Learning for Detecting Social Spam Bots and Spam-Influential Users in Twitter Network, and key words: Social networking (online), Blogs, Feature extraction, Particle swarm optimization, Machine learning algorithms, Reinforcement learning, Heuristic algorithms. Abstract: In online social networks (OSNs), detection of malicious social bots is an important research challenge to provide legitimacy of user profiles and trustworthy service ratings. Further, spam-influential users must be minimal to control the fake information-spread in OSNs. Learning from example patterns using supervised learning may not provide accurate results in cases where existing data items are biased and bot behavior dynamically changes over a period of time. Moreover, deep reinforcement learning provides improved learning by repeated interactions with the environment. However, a typical deep reinforcement leaning algorithm converges slower to find an optimal sequence of actions to reach out a goal state. In this article, we design a particle swarm optimization (PSO) based deep Q-learning algorithm for detecting social spam bots by integrating PSO with Q-value function. In addition, spam-influential users are identified using the proposed spam influence minimization model and it helps in restricting the flow of illegitimate tweets in Twitter network. Further, an influential community detection algorithm has been proposed to reduce the spreading of spam content through influential communities in Twitter network. Experimental results illustrate the efficacy of our proposed algorithms by considering two Twitter datasets and performance metrics such as precision, recall, and modularity.
|
399,557 |
Please write an abstract with title: Fault-Tolerant Approach for Photovoltaic Module-Level Power Electronic Applications, and key words: Switches, Pulse width modulation, Voltage control, Capacitors, Windings, Fault tolerance. Abstract: This paper presents research findings regarding the post-fault operation possibility of photovoltaic module-level power electronic systems. As the main contribution, it proposes an approach for the realization of photovoltaic microconverters with tolerance to power switch failures. The hybrid switching cell is proposed as a power electronic building block, which enables post-fault operation in the case of the open- or short-circuit failure of any of its power switches. Paper discusses the operation principle and provides experimental results of the 250 W fault-tolerant photovoltaic microconverter.
|
399,558 |
Please write an abstract with title: A Multi-Objective Approach for Voltage Stability Enhancement and Loss Reduction Under PQV and P Buses Through Reconfiguration and Distributed Generation Allocation, and key words: Voltage, Stability criteria, Reactive power, Power system stability, Optimization, Indexes, Distributed power generation. Abstract: This paper proposes a novel approach of voltage stability enhancement and power loss minimization in addition to maintenance of good voltage profile in radial distribution networks through optimally placed distributed generation, network reconfiguration and voltage control of PQV bus through variable reactive power source at P bus. A multi-objective function has been proposed that considers maximum system loadability enhancement and network loss minimization. Optimization of proposed multi-objective function, under distributed generation and network reconfiguration with presence of PQV and P buses in the system have been done using grey wolf optimization technique. Case studies performed on IEEE 33-bus radial distribution system shows that presence of PQV and P buses in the system yields significant enhancement in voltage stability margin under optimal placement of distributed generations and network reconfiguration.
|
399,559 |
Please write an abstract with title: Research on Distributed Power Flow Controller and Application, and key words: Circuit topology, Power transmission lines, Power supplies, Valves, Power grids, Regulation, Voltage control. Abstract: The distributed power flow controller (DPFC) works to increase or reduce the reactance of the transmission line by injecting series compensation voltage. The DPFC control system, including DPFC centralized control device and valve layer controller, is designed based on the analysis of DPFC main circuit topology, control architecture, control strategy and protection configuration. It is verified by engineering application that the device can regulate power flow, and effectively solve the problem of the limit-exceeding of the power supply section of the power grid.
|
399,560 |
Please write an abstract with title: Overcoming Complexity and Tradition-Related Shortcomings of Enabling Technologies: Solutions for Advanced Information Displays in LCA, and key words: Displays, Data visualization, Automotive engineering, Design engineering, Product design, Documentation, Humans, Design optimization, Modems, Design methodology. Abstract: In practice, enabling technologies, along with digital models and computer-aided / computer-based systems, are still not sufficiently integrated to make life cycle modeling and life cycle assessment methods and technologies suitable tools for designers and engineers. For example, life cycle assessment is becoming more and more an integral tool in today's product design and design evaluation during analysis and optimization. However, approaches and tools that still feature old fashioned paradigms and structures in critical areas such as human-computer interaction and information representation are somewhat counter-productive, considering the increase of both the complexity of the problem and the quantities of data to be handled. In this paper we aim at presenting, in a transparent way, the motivations, structure, and consequences of one approach leading to solutions which overcome such obstacles. This approach also supports the application and successful translation into practice of one modern methodology which is central for the cradle-to-grave evaluation used to improve environmentally conscious products and service designs.
|
399,561 |
Please write an abstract with title: Planar microwave retroreflector based on a split ring resonator metasurface, and key words: Optical ring resonators, Bandwidth, Reflection, Dielectrics, Microwave theory and techniques, Electromagnetic scattering, Metals. Abstract: Metasurfaces provide an exciting platform to control and manipulate incident electromagnetic wave both in transmission and reflection mode. Up to now, to reflect an incident wave with its origin direction (i.e. planar retroreflector) with wide angle and wide bandwidth is still difficult and challenging. In this paper, we report a reflective metasurface unit element of circular split ring resonator combined with ground metal plate sandwiched by a dielectric. The numerical simulation shows that the proposed reflective unit cell can produce a huge phase variation over 320° by changing its radius at around 15GHz. Based on the reflective metasurface, we design a planar retroreflector according to the predesigned gradient metasurface. The numerical simulations demonstrate that the proposed planar retroreflector can reflect the incident wave back to its origin direction with a large angle of at least 30°. The operation bandwidth is also notable. It is about 2GHz around the operation frequency of 15GHz. The presented studies provide a good candidate to develop wide angle and wideband planar microwave retroreflector.
|
399,562 |
Please write an abstract with title: Real-World Virtual Reality With Head-Motion Parallax, and key words: Cameras, Rendering (computer graphics), Head, Real-time systems, Licenses, Image color analysis, Robot vision systems. Abstract: Most of the real-world virtual reality (VR) content available today is captured and rendered from a fixed vantage point. The visual–vestibular conflict arising from the lack of head-motion parallax degrades the feeling of presence in the virtual environment and has been shown to induce nausea and visual discomfort. We present an end-to-end framework for VR with head-motion parallax for real-world scenes. To capture both horizontally and vertically separated perspectives, we use a camera rig with two vertically stacked rings of outward-facing cameras. The data from the rig are processed offline and stored into a compact intermediate representation, which is used to render novel views for a head-mounted display, in accordance with the viewer’s head movements. We compare two promising intermediate representations—Stacked OmniStereo and Layered Depth Panoramas—and evaluate them in terms of objective image quality metrics and the occurrence of disocclusion holes in synthesized novel views.
|
399,563 |
Please write an abstract with title: Content-based Remote Sensing Image Retrieval Based on Ant Colony Optimization and Convolutional Neural Networks, and key words: Weight measurement, Ant colony optimization, Computational modeling, Semantics, Image retrieval, Neural networks, Convolutional neural networks. Abstract: Content-based Remote sensing image retrieval (CBRSIR) methods usually only use the distance between a query image and retrieved images to retrieve and neglect the semantic similarity among images on the retrieval dataset during the retrieval process. The semantic similarity of these retrieved images helps improve the performance of CBRSIR. Hence, we propose a new retrieval method based on ant colony optimization (ACO) to use the semantic similarity between these retrieved images. The pheromone concentration is used to measure the semantic similarity between these retrieved images for improving retrieval performance. We first present how to initial the pheromone concentration of images. Next, we construct retrieval paths by mimicking the foraging process of ants and use a CNN regression model to accurately evaluate the length of these paths. Then, we update the pheromone concentration of images according to the length of the paths. Finally, we integrate the pheromone of images into the process of CBRSIR for improving retrieval performance. Experiments are conducted on a publicly available remote sensing image (UCMD) dataset. Compared with the state-of-the-art methods, the proposed method can improve retrieval precision.
|
399,564 |
Please write an abstract with title: Metamorphic InP/InGaAs heterojunction bipolar transistors under high-current and high temperature stress, and key words: Indium phosphide, Indium gallium arsenide, Heterojunction bipolar transistors, Gallium arsenide, Stability, Current density, Temperature, Testing, Capacitive sensors, Buffer layers. Abstract: The reliability of InP/InGaAs metamorphic heterojunction bipolar transistors (MHBTs) on GaAs substrates under excessive current density (100 kA/cm/sup 2/) at high junction temperature (250/spl deg/C) has been tested. Experimental data indicate that, by proper growth optimization of the strain relief buffer layer, MHBTs on GaAs substrates with electrical stability similar to that of HBTs on InP substrates could be achieved. It has been found that compared to MHEMTs, growth of a high quality metamorphic buffer is more critical for the stability of MHBTs.
|
399,565 |
Please write an abstract with title: The anthropomorphic flutist robot WF-4R: from mechanical to perceptual improvements, and key words: Anthropomorphism, Humanoid robots, Educational robots, Speech recognition, Human robot interaction, Education, Hidden Markov models, Cognitive robotics, Arm, Mechanical engineering. Abstract: One of the earliest motivations for developing humanoid robots centered on creating robots that may coexist with humans in environments created for human beings. For several years, at Waseda University, the development of the anthropomorphic flutist player has been focused on improving the musical interaction between the human and the robot to clarify the human flute playing and to propose novel assisted music teaching tools. In this paper, a new architecture for autonomously transferring skills from robot to human using the flutist robot is introduced. Furthermore, the new version of the flutist robot, the WF-4R (Waseda Flutist No.4 Refined) is presented; where the arm system was added to assure the positioning accuracy of the flute and the development of a melody recognition system to enable the robot to interact with students at the same logical level of perception. An experimental setup has been performed in order to verify the effectiveness of both mechanical and perceptual systems. As a result, using the arms system, we have assured the repetitiveness of the flute positioning. Furthermore, the implemented music recognition system was able to recognize the melody of flutist players (an overall recognition rate of 90%); demonstrating that HMM (usually used for speech recognition) is also effective for flute melody identification.
|
399,566 |
Please write an abstract with title: Implementation oriented theory design issues on the DTCNN template generation, and key words: Robustness, Hardware, Cellular neural networks, Active contours, Algorithm design and analysis, Guidelines, CMOS technology, Computer science, Electronic circuits, Laboratories. Abstract: This paper collects all the hardware constraints considered during the system-level design phase of the so-called DTCNN pixel-level snake algorithm (PLS-algorithm). These constraints, although focused on a particular algorithm, can be taken as general guidelines aimed to achieve the lowest coefficient circuit area in DTCNN. The validity of this approach is illustrated with some data about a 9/spl times/9 DTCNN PLS-algorithm chip, which nowadays is being made in the 0.25 /spl mu/m CMOS technology process provided by THOMSON.
|
399,567 |
Please write an abstract with title: Symbiotic Sensing and Communications Towards 6G: Vision, Applications, and Technology Trends, and key words: Symbiosis, 6G mobile communication, Measurement, Vehicular and wireless technologies, Extended reality, Wireless networks, Digital twin. Abstract: Driven by the vision of intelligent connection of everything and digital twin towards 6G, a myriad of new applications, such as immersive extended reality, autonomous driving, holographic communications, intelligent industrial internet, will emerge in the near future, holding the promise to revolutionize the way we live and work. These trends inspire a novel technical design principle that seamlessly integrates two originally decoupled functionalities, i.e., wireless communication and sensing, into one system in a symbiotic way, which is dubbed symbiotic sensing and communications (SSaC), to endow the wireless network with the capability to “see” and “talk” to the physical world simultaneously. Noting that the term SSaC is used instead of ISAC (integrated sensing and communications) because the word “symbiotic/symbiosis” is more inclusive and can better accommodate different integration levels and evolution stages of sensing and communications. Aligned with this understanding, this article makes the first attempts to clarify the concept of SSaC, illustrate its vision, envision the three-stage evolution roadmap, namely neutralism, commensalism, and mutualism of SaC. Then, three categories of applications of SSaC are introduced, followed by detailed description of typical use cases in each category. Finally, we summarize the major performance metrics and key enabling technologies for SSaC.
|
399,568 |
Please write an abstract with title: Research Topic Modeling: A Use Case for Data Analytics on Research Project Data, and key words: Analytical models, Social sciences, Market research, Data models, Planning, Resource management, Proposals. Abstract: To provide assistance in effectively planning and designing Thailand's research direction, a topic modeling algorithm is performed on the country's research project data in order to extract their information in greater details. For this study, publications from the records of government-funded research projects over the period of 12 years (2008-2019) were collected. The projects' abstracts were preprocessed and categorized based on their OECDs. Then, Latent Dirichlet Allocation (LDA) was applied to the abstracts in each category and suitable numbers of research topics were found. The examples of the topic modeling results are presented and analyzed. Overall, the work described was able to uncover current research themes and trends within the country. The information obtained are expected to be beneficial for developing national research strategies in the future.
|
399,569 |
Please write an abstract with title: Improving Covid-19 vaccine literacy among undergraduate students in Burkina Faso, and key words: COVID-19, Pandemics, Sociology, Education, Psychology, Chatbots, Vaccines. Abstract: The Covid-19 pandemic has had a major effect on education. University students are going through a high level of psychological pressure and the pandemic has called for people to seek and use covid19 related information to adapt their behaviours. In this study, we present an AI-enabled chatbot designed to provide covid19 related health information. We conduct an impact study on how can an intelligent chatbot impact Covid-19 vaccine literacy among undergraduate students.
|
399,570 |
Please write an abstract with title: Mechanism optimization of biomimitic microrobot by finite element modeling, and key words: Heating systems, Solid modeling, Three-dimensional displays, Stability analysis, Thermal stability, Robots, Strain. Abstract: The manuscript favors the internal mechanism of a flying micro-robot in a context linking the mechatronic parameter and aerodynamic constraints. The results are based on the modeling under the COMSOL multiphysics CAD tool and the experimental analysis. The study is carried out on different structures achieving an optimal wing flap. The simulation is made with the characteristics of a commercial micro-motor. We determine the wing beat frequency necessary for flight analytically. The mechanism is made with different 3D printable materials. Different contexts will be examined and compared according to the constraints studied "thermal, physical, structural". In this study, we demonstrate the influence of heat, thickness, and 3D printable material as a function of the modeled structure. We concluded that the structure requires a compromise between flexibility and rigidity. The material chosen is heat resistant. The thickness and the weight influence the stability of the micro-robot.
|
399,571 |
Please write an abstract with title: Evaluation of Position Error of Terahertz Polarimetric Encoder By Ray-Tracing Method, and key words: Simulation, Ray tracing, Sensors. Abstract: This paper describes the performance comparison between the proposed polarimetric linear encoder and the conventional encoder which detects position based on intensity information. We simulated polarization dependent signals and evaluated position error. The simulation results show the error due to beam roll-off can be prevented by the polarimetric sensing.
|
399,572 |
Please write an abstract with title: Smart Secure Healthcare Cloud Data Model By Fog, and key words: Ultrasonic imaging, Endoscopes, Magnetic resonance imaging, Computed tomography, Computational modeling, Medical services, Data models. Abstract: Fog computing provides a security model for privacy-preserving healthcare data in the cloud, such as video (surgery footage, endoscope, ultrasound) and images (X-ray, CT scan, MRI). Here, a decoy approach is used to prevent data tampering and information leakage. In the case of video, hiding AES encrypted video inside an image then the output becomes uploaded image and for images use decoy algorithm, blowfish, and Hmac. This paper provides integrity, confidentiality, and availability
|
399,573 |
Please write an abstract with title: 5.4 A Hybrid Thermal-Diffusivity/Resistor-Based Temperature Sensor with a Self-Calibrated Inaccuracy of ±0.25° C(3 Σ) from -55°C to 125°C, and key words: Temperature sensors, Ovens, Thermal resistance, Oils, Calibration, System-on-chip, Solid state circuits. Abstract: Resistor-based temperature sensors can achieve higher resolution and energy-efficiency than traditional BJT-based sensors. To reach similar accuracy, however, they typically require 2-point (2-pt) calibration, compared to the low-cost 1-pt calibration required by BJT-based sensors. This paper presents a hybrid temperature sensor that uses an inherently accurate, but power-hungry, thermal-diffusivity (TD) sensor [1] to selfcalibrate an inaccurate, but efficient, resistor-based sensor [2]. The use of an on-chip reference obviates the need for accurate temperature stabilized ovens or oil baths, drastically reducing calibration time and costs. Furthermore, by sharing most of the readout circuitry, the associated area overhead can be reduced. After self-calibration at room temperature (RT, -25°C) and at an elevated temperature (-85°C), the proposed hybrid temperature sensor achieves an inaccuracy of 0.25°C (3σ) from -55°C to 125°C.
|
399,574 |
Please write an abstract with title: Flipper-Style Locomotion Through Strong Expanding Modular Robots, and key words: Robots, Force, Faces, Auxetic materials, Shape, Actuators, Lead. Abstract: Volume-changing robotic units present an exciting pathway for modular robotics. However, current attempts have been relatively limited, requiring tethers, complex fabrication or slow cycle times. In this letter, we present AuxBots: an auxetic-based approach to create high force, fast cycle time self-contained modules. By driving the auxetic shell's expansion with a motor and leadscrew, these robots are capable of expanding their volume by 274% in 0.8 seconds with a maximum strength to weight ratio of 76x. These force and expansion properties enable us to use these modules in conjunction with flexible wire constraints to get shape changing behavior and independent locomotion. We demonstrate the power of this modular system by using a limited number of AuxBots to mimic the flipper-style locomotion of mudskippers and sea turtles. These structures are entirely untethered and can still move forward even as some AuxBots stall and enter a fault state, achieving the key modular robotics goals of versatility and robustness.
|
399,575 |
Please write an abstract with title: Intelligent Technology of Oxide Layer Formation by Micro-Arc Oxidation, and key words: Coatings, Electrolytes, Intelligent systems, Voltage measurement, Mathematical model, Immune system, Oxidation. Abstract: A methodology for the controlled synthesis of multifunctional coatings of valve metals by the method of micro-arc oxidation (MAO) was developed. It includes theoretical models describing the mechanism of oxide layers’ formation and the effect of technological parameters of the MAO process on them, and the methods of controlled synthesis. The latter allows us to carry out an automated selection of the optimal technological parameters of oxidation based on the obtained regression equations for the experimental dependences of the oxide layers’ properties on dissimilar influencing factors for the sake of required coating properties. We further propose the structure of an intelligent system for the synthesis and study of MAO coatings with a unique hardware. In particular, a pulsed technological current source provides a full range of regulation of the current pulses’ parameters; a measurement module combines measuring transducers of the parameters of the technological process and the electrophysical characteristics of oxide layers in the process of their obtainment with a guaranteed accuracy. The software contains an intelligent application that implements the proposed theoretical models and methods for obtaining coatings with the required properties. Information support contains databases and knowledge bases used in the operation of intelligent application. The results achieved in this work allow to increase the efficiency of MAO processing by reducing the time for selecting the optimal technological mode at least twice, which is a prerequisite for the development of an intelligent technology for the formation of oxide layers by the MAO method.
|
399,576 |
Please write an abstract with title: Bilinear Pairing-Based Hybrid Signcryption for Secure Heterogeneous Vehicular Communications, and key words: Receivers, Vehicular ad hoc networks, Safety, Electronic mail, Public key cryptography, Privacy, Hash functions. Abstract: Vehicular ad-hoc networks (VANETs) enable vehicles to exchange safety information with the surrounding vehicles and infrastructure in order to ensure safety and efficiency in traffic management. Recently however, vehicles come from different manufacturers and therefore use different protocols for the transmission of messages. As a result, communication among vehicles become heterogeneous. Because of this, VANETs face problems related to security and performance. To address this, some heterogeneous vehicular communication-based schemes have been proposed. However, they do not perform well because of an increase in computational overhead. In order to resolve this, we propose a certificateless cryptosystem (CLC) and public key infrastructure (PKI)-based conditional privacy-preserving hybrid signcryption (CP-CPPHSC) scheme. This scheme utilizes bilinear pairings and provides security requirements in a single logical step. Through the CP-CPPHSC scheme, a message is transmitted by a vehicle using the CLC to a vehicle using the PKI. Additionally, the CP-CPPHSC scheme supports the batch unsigncryption method which helps a vehicle to unsigncrypt more than one messages simultaneously. In the random oracle model (ROM), our scheme ensures existential unforgeability against adaptive chosen message attack (EUF-CMA) with respect to a hardness assumption of q-strong Diffie-Hellman (q-SDH) and modified inverse computational Diffie-Hellman (mICDH) problems and indistinguishability against adaptive chosen ciphertext attack (IND-CCA2) with respect to a hardness assumption of q-bilinear Diffie-Hellman inversion (q-BDHI) problem. Our scheme effectively reduces computational cost when compared to state-of-the-art schemes without an increase in the communication cost.
|
399,577 |
Please write an abstract with title: Use of transverse-flux machines in a free-piston generator, and key words: Combustion, Engines, Magnetic flux, Failure analysis, Manufacturing processes, Fuels, Power generation, Stacking, Equations, Prototypes. Abstract: This paper investigates the use of transverse-flux machines (TEM) in a free-piston generator. A free-piston generator integrates a combustion engine and a linear electrical machine to provide benefits in e.g., efficiency, emissions and reliability. This work is the continuation of the authors' earlier work. It was concluded then that a transverse-flux machine is the only promising candidate, if any, to meet the demands upon the electrical machine in such an application. Conventional TFM designs are investigated first. It is found that these cannot fulfil the system demands. Several improved surface-mounted TFM designs were thus investigated. Though these designs seemed promising during the analytical design phase, they faded during the 3D-FEM analysis, mainly due to the predominant armature-flux leakage in the axial direction. Improved designs for the buried-magnets TFM variant were thus sought instead. It was found that one such design allowed the fulfilment of system demands. A 5 kW proof-of-concept prototype was dimensioned. Analytical results were found to approximately hold during the 3D-FEM analysis as well. One-phase of the machine was built. Some measurements were performed, which identified some of the manufacturing defects due to small pole dimensions. Nevertheless, the electromagnetic soundness of the design was approximately verified. Problems surrounding the mechanical stability and the manufacturing process are still to be solved.
|
399,578 |
Please write an abstract with title: A MEMS-based VOA with very low PDL, and key words: Page description languages, Optical attenuators, Optical fiber polarization, Mirrors, Optical losses, Micromechanical devices, Optical receivers, Optical sensors, Optical fiber losses, Silicon. Abstract: In this letter, we study the optical performance of a microelectromechanical system reflection-type variable optical attenuator (VOA). Experimental results of packaged VOA devices show that the proposed architecture exhibits very low polarization dependence within the entire attenuation range (polarization-dependent loss (PDL)<0.1 dB at 30-dB attenuation level).
|
399,579 |
Please write an abstract with title: Compound Micro-Expression Recognition System, and key words: Emotion recognition, Computer vision, Databases, Stimulated emission, Smart cities, Psychology, Production. Abstract: Micro-expressions are facial movements with subtle amplitude and short duration. Similar to normal expressions (i.e., macro-expressions), micro-expressions correspond to six basic emotional categories: happiness, sadness, surprise, fear, anger, and disgust. However, a large number of psychological studies show that people will produce and use many more complex expressions in their daily life, called "compound expressions". Compound expressions are composed of the six basic expressions but reflect more complex mental states and more abundant human facial emotions. In this paper, we introduce the concept of compound expression into the detection and recognition of micro expression for the first time and generated the Compound Micro-Expression Database (CMED). In addition, this paper will extract the optical flow feature map of the onset frame and the apex frame in the compound micro-expression sequences and input it into the pre-designed shallow convolutional neural network. The proposed method synthesized five existing databases of spontaneous micro-expressions (CASME I, CASME II, CAS(ME)^2, SMIC, SAMM) to generate the CMED and test the validity of our network. The experimental results show that the deep network framework designed in this paper can well describe and recognize the emotional information of micro-expression and compound micro-expression.
|
399,580 |
Please write an abstract with title: Finite element based solder joint fatigue life predictions for a same die size-stacked-chip scale-ball grid array package, and key words: Finite element methods, Soldering, Fatigue, Acceleration, Temperature, Plastics, Capacitive sensors, Predictive models, Electronics packaging, Chip scale packaging. Abstract: Viscoplastic finite-element simulation methodologies were utilized to predict solder joint reliability for a same die size, stacked, chip scale, ball grid array package under accelerated temperature cycling conditions (-40C to +125C, 15 min ramps/15 min dwells). The effects of multiple die attach material configurations were investigated along with the thickness of the mold cap and spacer die. The solder structures accommodate the bulk of the plastic strain that is generated during accelerated temperature cycling due to the thermal expansion mismatch between the various materials that encompass the stacked die package. Since plastic strain is a dominant parameter that influences low-cycle fatigue, it was used as a basis for evaluation of solder joint structural integrity. The paper discusses the analysis methodologies as implemented in the ANSYS finite element simulation software tool and the corresponding results for the solder joint fatigue life.
|
399,581 |
Please write an abstract with title: The effect of device geometry on the static and dynamic response of carbon nanotube field effect transistors, and key words: Geometry, CNTFETs, Ohmic contacts, Poisson equations, FETs, Charge carrier processes, Electrons, Microelectronics, Organic materials, Materials science and technology. Abstract: A numerical study of ohmic contact carbon nanotube field effect transistors is presented. The effect of the gate-source and gate-drain spacers on the static and dynamic response of the device was studied. Simulation results suggest that by appropriately selecting the gate-source and gate-drain spacers both the dynamic and static characteristics of the device are improved.
|
399,582 |
Please write an abstract with title: Real-time human hand following system based on multiple vision sensors, and key words: Handheld computers, Skeleton, Manipulators, Kalman filters, Fingers. Abstract: This paper designs a real-time human hand following system based on multi-vision sensors. Through the KinectV2 camera, human hand behavior can be observed; the pose information of the human hand joint can also be obtained by using OpenNI2 and NITE2 interface; calculating the angle information of each joint of the six-degree-of-freedom robot can be achieved by stereo geometric correlation calculation. Through LeapMotion, accurate human joint information is obtained, then calculating the finger distance to control manipulator's tension, which is smoothed by Kalman filtering. Control, simulation and visualization for real-time follow-up of the robotic arm and the human hand are achieved under the Robot Operating System(ROS). The final experimental results are verified by Moveit's simulation environment and Kinova's Jaco arm.
|
399,583 |
Please write an abstract with title: Influence of Initial Condition on Wandering Spur Pattern in a MASH-Based Fractional-<i>N</i> Frequency Synthesizer, and key words: Multi-stage noise shaping, Quantization (signal), Frequency synthesizers, Synthesizers, Delta-sigma modulation, Spectrogram, Modulation. Abstract: A Multi-stAge noiSe sHaping Digital Delta-Sigma Modulator (MASH DDSM) is commonly employed as the divider controller in a fractional-N frequency synthesizer. Previous work has considered a time-varying pattern of spurious tones, called wandering spurs, which originate in the DDSM. Two cases have been considered, namely when the fractional part of the division ratio is (i) close to zero or (ii) close to a simple fraction. In both cases, the wandering spur pattern is independent of the initial state of the modulator. This brief considers a third case where the pattern of wandering spurs depends explicitly on the initial state. The phenomenon is explained analytically and simulation results are presented. Theoretical predictions are confirmed with spectral measurements from a representative commercial monolithic fractional-N frequency synthesizer.
|
399,584 |
Please write an abstract with title: Synthesis of Broad-Band 3-dB Hybrids Based on the 2-Way Power Divider, and key words: Power dividers, Gallium arsenide, Microwave FETs, Circuit synthesis, MESFETs, Frequency, Microwave theory and techniques, Transformers, Microwave Theory and Techniques Society, Electrons. Abstract: The synthesis of broad-band 2-way Wilkinson hybrids is well known. The even- and odd-mode analysis results in two equivalent circuits where the synthesis of the odd mode is done by computer optimization. This paper shows an exact synthesis of 2-way Wilkinson power dividers having one isolation resistor, but an arbitrary number of quarter-wave transformers. A large number of circuits have been synthesized with up to 6 quarter-wave transformers. The 2-way Wilkinson hybrid can be extended to a 4-port component. This 4-port component can operate as a 180° or 90° 3-dB hybrid depending on the input port. The hybrid has a high directivity independent of frequency when used as a 180° hybrid. Experimental results are given for a 2-way divider and a 3-dB hybrid built in microstrip with a center frequency of 5 GHz.
|
399,585 |
Please write an abstract with title: Electromechanical Events in Exercise-induced Remodeling of the Equine Heart, and key words: Heart, Prototypes, Stethoscope, Electrocardiography, Horses, Acoustic measurements, Synchronization. Abstract: Analysis of synchronized phonocardiographic (PCG) and electrocardiographic (ECG) data provides insights into cardiac electromechanics that have previously not been investigated in the context of exercise-induced cardiac remodeling. This study aimed to obtain PCG data synchronized with ECG using an electronic stethoscope and an acoustic stethoscope with an add-on (microphone inserted into the stethoscope tube and connected to a smart device), both synchronized with the ECG, and simultaneous echocardiographic and ECG data in trained and untrained horses to assess the feasibility of the devices to obtain measurements of electromechanical durations in exercise-induced remodeling of the heart. A base-apex ECG synchronized with PCG was recorded in seven trotters. A complete echocardiographic examination was performed. The electromechanical durations measured by echocardiography were not consistent with those measured by a PCG synchronized to the ECG. The approach to obtain representative measurements of electromechanical intervals with the prototype device PCG synchronized to ECG proved feasible and provided precise measurements.
|
399,586 |
Please write an abstract with title: Persian FrameNet: a Novel Approach to build FrameNet in the Persian Language Applicable to Islamic Context, and key words: Vocabulary, Terminology, Semantics, Knowledge based systems, Linguistics, Syntactics, Ontologies. Abstract: FrameNet is a lexical research project that produces a glossary containing very detailed information about syntax (semantic relationships of specific English words such as verbs, nouns, and adjectives). Both human and computer users can use this glossary, so it has become an essential lexical knowledge base for use in fields such as natural language processing and vocabulary semantics. Due to the importance of FrameNet in natural language processing, there is also a need to create FrameNet in languages other than English. There have been few attempts to produce a FrameNet in Persian so far. On the other hand, the existence of an efficient Persian FrameNet can help with the processing of natural language in Islamic texts. In this paper, we present a novel approach to building our first version of the Persian FrameNet. We will then show that although this version is in its infancy, it can be comparable to the FrameNet of some other important languages in terms of frame coverage.
|
399,587 |
Please write an abstract with title: A Novel DTX Detection Approach for NB-IoT NPUSCH Format 1 Receiver, and key words: Doppler effect, 3GPP, Blogs, Uplink, Receivers, Tutorials, Signal to noise ratio. Abstract: This study proposes a novel DTX detection approach for narrow-band internet-of-things technology (NB-IoT) narrow-band physical uplink shared channel (NPUSCH) Format 1. To improve the success rate performance of this channel, it is possible to configure up to 128 repetitive transmissions. The legacy scheme simultaneously uses all these repetitions of channel estimation for DTX detection. In the proposed method, DTX detection is performed by using the average of channel estimation results at certain intervals in high repeated transmissions. Our extensive simulations show that the proposed method improves success rate especially for low Doppler frequency conditions (low mobility scenarios). In addition, the computational complexity of the proposed method seems lower than the legacy version. Thereupon, we suggest that our scheme is a promising solution for real-time networks.
|
399,588 |
Please write an abstract with title: A Tomato Leaf Diseases Classification Method Based on Deep Learning, and key words: Diseases, Training, Feature extraction, Kernel, Agriculture, Machine learning, Image segmentation. Abstract: In the process of planting crops, the detection of diseases in the leaf parts is one of the key links to the prevention and control of crop diseases. This paper takes tomato leaves as experimental objects, and uses the deep learning method to extract the disease features on leaf surface, including three most common species (Spot blight, Late blight and Yellow leaf curl disease). After continuous iterative learning, the network can predict the category of each disease picture. For each of the three diseases, 1000 pictures were selected, divided into 900 pictures for training set (2700 in total) and 100 pictures for test set (300 in total). The experiment takes Resnet-50 as the basic network model. For comparison, the activation function of the network was changed into Leaky-ReLU and the kernel size of the first convolutional layer was modified to 11×11. After the improvement, the training accuracy in training set is 98.3% (increased by 0.6%) and the test accuracy in test set is 98.0% (increased by 2.3%).
|
399,589 |
Please write an abstract with title: Racing Strategy for the Dynamic-Customer Location-Allocation Problem, and key words: Sociology, Statistics, Computational modeling, Urban areas, Adaptation models, Computational efficiency, Robustness. Abstract: In previous work, we proposed and studied a new dynamic formulation of the Location-allocation (LA) problem called the Dynamic-Customer Location-allocation (DC-LA) problem. DC-LA is based on the idea of changes in customer distribution over a defined period, and these changes have to be taken into account when establishing facilities to service changing customers distributions. This necessitated a dynamic stochastic evaluation function Which came with a high computational cost due to a large number of simulations required in the evaluation process.In this paper, we investigate the use of racing, an approach used in model selection, to reduce the high computational cost by employing the minimum number of simulations for solution selection. Our adaptation of racing uses the Friedman test to compare solutions statistically. Racing allows simulations to be performed iteratively, ensuring that the minimum number of simulations is performed to detect a statistical difference.We present experiments using Population-Based Incremental Learning (PBIL) to explore the savings achievable from using racing in this way. Our results show that racing achieves improved cost savings over the dynamic stochastic evaluation function. We also observed that on average, the computational cost of racing was about 4.5 times loWer than the computational cost of the full dynamic stochastic evaluation.
|
399,590 |
Please write an abstract with title: Experimental investigations on different insulating liquids and mixtures for power transformers, and key words: Power transformer insulation, Dielectric liquids, Power transformers, Minerals, Petroleum, Heat transfer, Aging, Electrical capacitance tomography, Dielectrics and electrical insulation, Oils. Abstract: This paper presents a comparison between mineral, ester and silicone oils, and mixtures with mineral oil based on their mean properties, namely the heat transfer, the dielectric strength, the aging stability and the electrostatic charging tendency (ECT), in order to select the most appropriate one for power transformers. The heat transfer is studied by means of kinematic viscosity. The measurements of breakdown voltage are achieved according to IEC 60156 specifications and analyzed by Gaussian's statistics method. The results of aging tests in temperature and in contact with atmosphere as well as the ECT versus the oil humidity and resistivity are also presented.
|
399,591 |
Please write an abstract with title: Robust Detectors for Signals in Non-Gaussian Noise, and key words: Noise robustness, Detectors, Signal detection, Background noise, Gaussian noise, Linearity, Degradation, Communications Society, Time measurement, Sampling methods. Abstract: The robustness of suboptimal nonlinear detectors for known discrete-time signals in non-Gaussian noise is investigated. The measure of robustness used is the degradation of asymptotic relative efficiency (compared to a linear detector) from that achieved by an optimal nonlinear detector. The first order density of non-Gaussian noise is modeled as a mixture of a small variance Gaussian background noise pdf and a large variance impulsive pdf.
|
399,592 |
Please write an abstract with title: Separation of susceptibility mechanisms for ferrites of low anisotropy, and key words: Ferrites, Anisotropic magnetoresistance, Grain size, Magnetic materials, Nickel, Chemicals, Magnetic susceptibility, Iron, Magnetostriction. Abstract: A method of separation of the mechanisms of initial susceptibility, based on the variations of the susceptibility with grain size, is proposed. For this purpose an earlier proposed model is used together with the conclusions drawn from a long study on the role of intergranular porosity which proved the independence of the susceptibility over this factor. The data on the movement of the walls are thus obtained. Furthermore, rotational susceptibility affords access to effective anisotropy, which is higher than it is generally supposed to be for materials of high susceptibility. Finally the method of separation is applied to YIG.
|
399,593 |
Please write an abstract with title: A logical viewpoint on architectures, and key words: XML, Analytical models, Bridges, Jacobian matrices, Architecture description languages, Markup languages, Art, Mathematical model, Standards organizations, Pattern analysis. Abstract: We introduce a logical viewpoint on architectures. The logical viewpoint is based on the distinction between symbolic and semantic models of architectures. The core of a symbolic model consists of its signature that specifies symbolically its structural elements and their relationships. A semantic model is defined as a formal interpretation of the symbolic model. This leads to more precise characterization of the concepts introduced in IEEE standard 1471-2000, and provides a formal approach to the design of enterprise of architectural description languages and a general mathematical foundation for the use of formal methods in enterprise architectures. Additionally, we show how this logical viewpoint allows for the definition of a simple general XML language for the description of both static and dynamic aspects of an architecture. For the meta-analysis of both these aspects we introduce a new XML tool for general XML transformations based on a rule markup language.
|
399,594 |
Please write an abstract with title: A hybrid method for parameter estimation, and key words: Parameter estimation, Artificial neural networks, Neural networks, Function approximation, Optimization methods, Convergence, Electronic mail, Reliability theory, Statistical distributions, Artificial intelligence. Abstract: In this paper a method is presented for plant model parameter estimation. The method combines the artificial neural networks ability for function approximation with a nonlinear least-squares regression technique using the Levenberg-Marquardt optimization method. This combination intends to overcome problems that arise when artificial neural networks or nonlinear least-squares regression are separately applied to parameter estimation, which is accomplished by means of potentiating each of the methods advantages. The estimation of atracurium effect concentration model parameters is used as a case study to show the efficiency of the proposed method.
|
399,595 |
Please write an abstract with title: Electricity Theft Detection Using Euclidean and Graph Convolutional Neural Networks, and key words: Load modeling, Feature extraction, Convolutional neural networks, Data models, Correlation, Analytical models, Support vector machines. Abstract: The widespread penetration of advanced metering infrastructure brings an opportunity to detect electricity theft by analyzing the electricity consumption data collected from smart meters. However, existing models have poor performance in electricity theft detection, since most of them fail to capture the time dependence, periodicity, and latent feature from complex electricity consumption data. To address above concerns, a graph convolutional neural network (GCN) and a Euclidean convolutional neural network (CNN) are combined to form a novel model for electricity theft detection in this paper. On one hand, the high-dimensional power load curves are modeled as a graph from a new perspective on graph theory. Then, the GCN depicts the time dependence and periodicity by performing graph convolutional operations. On the other hand, the CNN captures the latent features from the power load curves by carrying out Euclidean convolutional procedures. Numerical simulations show that the proposed model integrates the benefits of GCN and CNN, leading to superiority over the popular benchmarks in electricity theft detection.
|
399,596 |
Please write an abstract with title: High Driving Frequency (>54 kHz) and Wide Scanning Angle (>100 Degrees) MEMS Mirror Applying Secondary Resonance For 2K Resolution AR/MR Glasses, and key words: Micromechanical devices, Conferences, Optical device fabrication, Resonant frequency, Voltage, Drives, Mirrors. Abstract: We have successfully realized the MEMS mirror which can scan the wide optical angle of over 100 degrees at the driving frequency of 58 kHz by applying the secondary resonance mode driving design and the new stress dispersion structure to our “Double-Tuning-Fork type MEMS mirror” which was reported in “MEMS 2020” [1]. This MEMS mirror paves the way for realizing a high resolution “2K (2560 × 1440@60 fps)” in the laser beam scanning system employing the two-scanning-mirror architecture where each mirror in responsible for one axis [2], which was impossible with conventional MEMS mirrors.
|
399,597 |
Please write an abstract with title: Responsive security for stored data, and key words: Data security, Cryptography, Application software, Availability, Costs, Fault tolerance, Collaboration, Mobile computing, Environmental management, Memory. Abstract: We present the design of a distributed store that offers various levels of security guarantees while tolerating a limited number of nodes that are compromised by an adversary. The store uses secret sharing schemes to offer security guarantees, namely, availability, confidentiality, and integrity. However, a pure secret sharing scheme could suffer from performance problems and high access costs. We integrate secret sharing with replication for better performance and to keep access costs low. The trade offs involved between availability and access cost on one hand and confidentiality and integrity on the other are analyzed. Our system differs from traditional approaches such as state machine or quorum-based replication that have been developed to tolerate Byzantine failures. Unlike such systems, we augment replication with secret sharing and offer weaker consistency guarantees. We demonstrate that such a hybrid scheme offers additional flexibility that is not possible with replication alone.
|
399,598 |
Please write an abstract with title: Function-Correcting Codes, and key words: Redundancy, Memory, Machine learning, Error correction codes, Standards, Information theory. Abstract: Motivated by applications in machine learning and archival data storage, we introduce function-correcting codes, a new class of codes designed to protect a function evaluation on the data against errors. We show that function-correcting codes are equivalent to irregular-distance codes, i.e., codes that obey some given distance requirement between each pair of codewords. Using these connections, we study irregular-distance codes and derive general upper and lower bounds on their optimal redundancy. Since these bounds heavily depend on the specific function, we provide simplified, suboptimal bounds that are easier to evaluate. We further employ our general results to specific functions of interest and we show that function-correcting codes can achieve significantly less redundancy than standard error-correcting codes which protect the whole data.
|
399,599 |
Please write an abstract with title: Design and Preliminary Performance Assessment of a Wearable Tremor Suppression Glove, and key words: Wrist, Pulleys, Thumb, Force, Indexes, Steel, Solid modeling. Abstract: Objective: Approximately 25% of individualsliving with parkinsonian tremor do not respond to traditional treatments. Wearable tremor suppression devices (WTSD) provide an alternative approach, however, tremor in the fingers has not been given as much attention as tremor in the elbow and the wrist. Therefore, the objective of this study is to design a wearable tremor suppression glove that can suppress tremor simultaneously, but independently, in multiple hand joints without restricting the user's voluntary motion. Methods: A WTSD was designed for managing tremor in the index finger metacarpophalangeal (MCP) joint, thumb MCP joint, and the wrist. The prototype was tested and assessed on a participant living with parkinsonian tremor. Results: The experimental evaluation showed an overall suppression of 73.1%, 80.7%, and 85.5% in resting tremor, 70.2%, 79.5%, and 81% in postural tremor, and 60.0%, 58.7%, and 65.0% in kinetic tremor in the index finger MCP joint, the thumb MCP joint, and the wrist, respectively. Conclusion: This first assessment of a WTSD for people living with Parkinson's disease provides confirmation of the feasibility of the approach. The next step requires a comprehensive validation on a broader population in order to evaluate the performance of the WTSD. Significance: This study demonstrates the feasibility of using a WTSD to manage hand and finger tremor. The device enriches the field of upper-limb tremor management, as the first WTSD for multiple joints of the hand.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.