ID
int64 0
400k
| content
stringlengths 97
5.85k
|
---|---|
0 | Please write an abstract with title: Analysis and Experimental Verification of Overvoltage Suppression in a Hybrid DC Circuit Breaker, and key words: Resistance, Circuit breakers, Snubbers, Switches, Logic gates, Circuit faults, Voltage control. Abstract: Sequential tripping with energy balancing control in dc hybrid circuit breakers (HCBs) has shown to be an effective strategy in reducing the peak fault current and fault interruption time. However, the inevitable voltage overshoots during the tripping process need to be suppressed. Increasing turn-off gate resistance of a semiconductor switch to suppress its overvoltage is a simple method, which has been avoided in power converter applications because of its additional losses. These additional power losses, nevertheless, are not problematic in HCB applications. This paper analyzes the HCB overvoltage with respect to the switch gate resistance, and experimentally compares the performance and capability of the gate resistance method with the conventional snubber circuit solution in terms of overvoltage suppression and sequential tripping. Hardware verification corroborates the theoretical analysis and demonstrates that both methods can reduce the voltage overshoots while maintaining similar energy balancing results. |
1 | Please write an abstract with title: Applying Machine Learning Method To Identify Indo-Pacific Humpback Dolphin Click Signals, and key words: Dolphins, Acoustics, Training, Time-frequency analysis, Biological neural networks, Whales, Matlab. Abstract: Accurate and efficient identification of echolocation click signals of cetaceans plays important role in conservation studies. However, it is challenging to analyze large amounts of acoustic data by traditional manual analysis methods. In this study, two supervised machine learning algorithms (the Alexnet neural network and Libsvm) were trained to automatically identify echolocation clicks of Indo-Pacific humpback dolphins. Wavelet transform was implemented to reflect the characteristics of click signals of Indo-Pacific humpback dolphins in time-frequency images, and these images were fed into the network for training. The better performance was reported by the Alexnet neural network, the click identification accuracy of which is up to 99.7%. This study shows that the Alexnet neural network method is more efficient and available in Indo-Pacific humpback dolphin clicks identification. When this method is mature enough in the near future, then it can be applied in AUV to identify Indo-Pacific humpack dolphins on line. |
2 | Please write an abstract with title: Social media adoption and reach: The case of the Lima’s local governments, and key words: Video on demand, Social networking (online), Local government, Sociology, Urban areas, Blogs, Media. Abstract: This paper contributes to identify determinants of social media adoption by local governments and of the audience they reach through that channel, after adoption. The 43 districts of Lima, the capital city of Peru, were used as a case study. Primary data about the presence and audience of these local governments on Facebook, Twitter, and YouTube was collected to support the analyses. Main conclusions are that socioeconomic dynamism and previous experience in implementing e-government are relevant determinants of both adoption and audience; and that population size is a relevant determinant of audience but not a relevant determinant of adoption. These results contribute to the theory by further validating and complementing results that were previously obtained in other Latin-American countries and in other regions in the world. |
3 | Please write an abstract with title: Strings and Things: A Semantic Search Engine for news quotes using Named Entity Recognition, and key words: Social networking (online), Semantic search, Surveillance, Pipelines, User interfaces, Tools, Informatics. Abstract: Emerging methods for content delivery such as quote-searching and entity-searching, enable users to quickly identify novel and relevant information from unstructured texts, news articles, and media sources. These methods have widespread applications in web surveillance and crime informatics, and can help improve intention disambiguation, character evaluation, threat analysis, and bias detection. Furthermore, quote-based and entity-based searching is also an empowering information retrieval tool that can enable non-technical users to gauge the quality of public discourse, allowing for more fine-grained analysis of core sociological questions. The paper presents a prototype search engine that allows users to search a news database containing quotes using a combination of strings and things. The ingestion pipeline, which forms the backend of the service, comprises of the following modules i) a crawler that ingests data from the GDELT Global Quotation Graph ii) a named entity recognition (NER) filter that labels data on the fly iii) an indexing mechanism that serves the data to an Elasticsearch cluster and iv) a user interface that allows users to formulate queries. The paper presents the high-level configuration of the pipeline and reports basic metrics and aggregations. |
4 | Please write an abstract with title: Force control and visual servoing using planar surface identification, and key words: Force control, Visual servoing, Robot vision systems, Cameras, Robot sensing systems, Force measurement, Sensor systems, Force sensors, Force feedback, Feedforward systems. Abstract: When designing flexible multi-sensor based robot systems, one important problem is how to combine the measurements from disparate sensors such as cameras and force sensors. In this paper, we present a method for combining direct force control and visual servoing in the presence of unknown planar surfaces. The control algorithm involves a force feedback control loop and a vision based reference trajectory as a feed-forward signal. The vision system is based on a constrained image-based visual servoing algorithm designed for surface following, where the location and orientation of the planar constraint surface is estimated online using position-, force- and visual data. We show how data from a simple and efficient camera calibration method can be used in combination with force and position data to improve the estimation and reference trajectories. The method is validated through experiments involving force controlled drawing on an unknown surface. The robot will grasp a pen and use it to draw lines between a number of markers drawn on a white-board, while the contact force is kept constant. Despite its simplicity, the performance of the method is satisfactory. |
5 | Please write an abstract with title: Improving charging performance for wireless rechargeable sensor networks based on charging UAVs: a joint optimization approach, and key words: Wireless communication, Computers, Wireless sensor networks, Energy consumption, Adaptation models, Simulation, Wireless power transfer. Abstract: Wireless power transfer based on charging unmanned aerial vehicles (CUAVs) is a promising method for enhancing the lifetime of wireless rechargeable sensor networks (WRSNs). However, how to deploy the CUAVs so that enhancing the charging efficiency is still a key issue. In this work, we formulate a CUAV deployment optimization problem (CUAVDOP) to jointly increase the number of the sensor nodes that within the charging scopes of CUAVs, improve the minimum charging efficiency in the network and reduce the motion energy consumptions of CUAVs. Moreover, the formulated CUAVDOP is analyzed and proofed as NP-hard. Then, we propose an improved firefly algorithm (IFA) to solve the formulated CUAVDOP. IFA introduces two improved items that are the attraction model and adaptive step size factor to enhance the performance of conventional firefly algorithm, so that making it more suitable for CUAVDOP. Simulation results demonstrate that the proposed algorithm is effective for the formulated joint optimization. Moreover, the performance of IFA is better than some other algorithms. |
6 | Please write an abstract with title: Design Issues in e-Learning during the COVID-19 Pandemic, and key words: COVID-19, Computer science, Electronic learning, Pandemics, Education, Collaboration, Human factors. Abstract: The COVID-19 pandemic led to fast and unexpected changes in social life, including education. Institutions and social actors were forced to rethink school participation in order to respect social distance, but also to ensure quality in education and social order. Digital and collaborative platforms replaced the physical classrooms and mediated the virtual interaction between students and teacher. The paper contributes to the scientific debate on collaborative learning, by analyzing the challenges and opportunities encountered by Romanian students, teachers, and parents during the COVID-19 pandemic. The analysis is based on a national survey that elicits perspectives on quality and strategies of online education from 9401 students, 3265 teachers and 4269 parents. Online education has proven both an opportunity for systemic reform and a risk for social exclusion, rising concerns on how to leverage technology for extending, rather than diminishing, learning experiences. |
7 | Please write an abstract with title: Robust Output Feedback Stabilization of MIMO Invertible Nonlinear Systems With Output-Dependent Multipliers, and key words: Nonlinear systems, MIMO communication, Output feedback, Observers, Estimation, State feedback, Numerical stability. Abstract: This article studies the robust output feedback stabilization problem for multi-input–multi-output (MIMO) invertible nonlinear systems with output-dependent multipliers. An “ideal” state feedback is first designed under certain mild assumptions. Then, a set of extended low-power high-gain observers is systematically designed, providing a complete estimation of the “ideal” feedback law. This yields a robust output feedback stabilizer such that the origin of the closed-loop system is semiglobally asymptotically stable, while improving the numerical implementation with the power of high-gain parameters up to 2. |
8 | Please write an abstract with title: PurpleDrop: A Digital Microfluidics-Based Platform for Hybrid Molecular-Electronics Applications, and key words: Computer vision, Memory, Electrodes, Hardware, Sequential analysis, Data storage systems, Molecular computing. Abstract: Molecular manipulation and analysis are the cornerstone of life sciences. With the recent advances in molecular data storage and computing, it has become an increasingly exciting and viable alternative for the post-CMOS scaling era. Widespread use of molecular manipulation/analysis and data storage/computing requires a scalable and low-cost platform for hybrid molecular-electronics systems. This enables us to build on the best of what molecular and electronics systems can offer. In this article, we present PurpleDrop, a full-stack digital microfluidic platform for hybrid molecular-electronic systems in multiple domains, and focus on DNA data storage as a use case. We describe its design principles and relevant aspects such as closed-loop operation with computer vision and capacitive sensing, on-board magnetic bead extraction, and polymerase chain reaction, among other primitives. Importantly, we emphasize the ability to express and execute protocols and computation that include molecular and computational components. |
9 | Please write an abstract with title: An evolutionary approach for pose determination and interpretation of occluded articulated objects, and key words: Genetic algorithms, Robustness, Biological system modeling, Humans, Joints, Artificial intelligence, Motion detection, Tracking, Robot sensing systems, Navigation. Abstract: This paper proposes a novel evolutionary approach to a parameter solving problem for handling occluded articulated objects with any number of internal parameters representing articulation. The parameter solving problem is formulated as a parameter optimization problem and an objective function is also given based on the line segment features in the Hough space. The proposed approach uses a novel intelligent genetic algorithm (IGA) superior to conventional GAs in solving large parameter optimization problems to simultaneously solve pose determination and interpretation problems and consequently has the capabilities of accurate partial matching and robust pose determination. Effectiveness of the proposed IGA-based method is demonstrated by applying it to fitting a simplified artificial articulated model of a human body to monocular clutter images. |
10 | Please write an abstract with title: Achieving Positive Secrecy Rate in Wireless Multiple Access Wiretap Channels, and key words: Security, Interference, Fading channels, Communication system security, Wireless communication, Eavesdropping, Jamming. Abstract: In this paper, we study the secure transmission in multiple access wiretap channels when the instantaneous channel state information (CSI) of the wiretap channels is unknown by the legitimate users. We propose a two-phase jamming-assisted secure transmission scheme based on the randomness and independence of wireless channels. In this scheme, we appropriately design artificial noise in two transmission phases and make sure that the eavesdropper's channel is degraded by the artificial noise but the legitimate user's channel is free of the artificial noise. We analyze the capacity of the legitimate channel after using successive interference cancellation (SIC), and demonstrate that the eavesdropping capacity has an upper bound. Furthermore, we prove that a positive secrecy rate can be achieved and the achievable secrecy rate can be maximized by allocating appropriate power to the private information and the artificial noise. |
11 | Please write an abstract with title: A deep ocean suspension system for stabilizing near-surface sensors, and key words: Surface waves, Sea surface, Frequency, Damping, Springs, Motion analysis, Differential equations, Integral equations, Acceleration, Hoses. Abstract: An easily deployable oceanographic sensor system consisting of a free-floating recording buoy and a tethered sensor suspension arrangement is described. An analysis of the dynamic response of the system to surface wave excitation is presented. Design optimization criteria that ensure minimal sensor motion are established. |
12 | Please write an abstract with title: Determining the Learner’s Profile and Context Profile in Order to Propose Adaptive Mobile Interfaces Based on Machine Learning, and key words: Electronic learning, Mobile handsets, Computer aided instruction, Databases, Machine learning algorithms, Clustering algorithms, Lips. Abstract: Sociological studies show that the use of mobile phones in the whole worldwide has attained a record level. This phenomenon has influenced the field of education. The integration of mobile technologies into teaching can improve learning conditions and the way in which learners receive educational content.Changing attitudes and behaviors in the education field, developing appropriate pedagogical models, good design (pedagogical and visual), providing methods to control the students to allow for uninterrupted mobile learning activities, seem the challenges of Mobile Learning.Though the mobile devices are important in the daily lives of learners and trainers, the use of these technologies in distance learning remains weak. To carry out our project, we used tools such Moodle and Open edX databases and Google Analytics for data collection. In this project, we try to propose an approach based on machine learning algorithms in order to personalize the mobile display and the pedagogical content on mobile devices in an online learning scenario. |
13 | Please write an abstract with title: Reporting Interval Impact on Deep Residential Energy Measurement Prediction, and key words: Training, Smart buildings, Computational modeling, Time series analysis, Energy measurement, Predictive models, Prediction algorithms. Abstract: Forecasting and anomaly detection for energy time series is emerging as an important application area for computational intelligence and learning algorithms. The training of robust data-driven models relies on large measurement datasets sampled at ever increasing rates. Thus, they demand large computational and storage resources for off-line power quality analysis and for on-line control in energy management schemes. We analyze the impact of the reporting interval of energy measurements on deep learning based forecasting models in a residential scenario. The work is also motivated by the development of embedded energy gateways for online inference and anomaly detection that avoid the dependence on costly, high-latency, cloud systems for data storage and algorithm evaluation. This, in turn, requires increased local computation and memory requirements to generate predictions within the control sampling period. We report quantitative forecasting metrics to establish an empirical trade-off between reporting interval and model accuracy. Additional results consider the time scale variable feature extraction using a time series data mining algorithm for multi-scale analytics. |
14 | Please write an abstract with title: Small signal characteristics of thin film single halo SOI MOSFET for mixed mode applications, and key words: Transistors, MOSFET circuits, CMOS technology, Silicon on insulator technology, Impurities, Transconductance, Analog circuits, Capacitance, CMOS logic circuits, System-on-a-chip. Abstract: In this paper, we report a study on the small signal characterization and simulation of single halo (SH) thin film silicon-on-insulators (SOI) nMOSFETs for analog and mixed signal applications. The single halo structure has a high pocket impurity concentration near the source end of the channel and low impurity concentration in the rest of the channel. Besides excellent DC output characteristics, the experimental characterization results of these devices show better V/sub th/-L roll-off, low DIBL, higher breakdown voltages and kink free operation. Small signal characterization of these devices shows higher AC transconductance, higher output resistance and better dynamic intrinsic gain (g/sub m/R/sub o/) in comparison with the conventional (CON) homogeneously doped SOI MOSFETs. Also, the low drain junction capacitance as a result of low impurity concentration near the drain region is beneficial for improved circuit performance. |
15 | Please write an abstract with title: Toward a methodology of graphical icon design, and key words: Natural languages, Modeling, Graphical user interfaces, Design methodology, Art, Books, Computer science, Cognitive science, Testing, Operating systems. Abstract: The current practice of graphical icon design is more an art than a science. We propose a scientific-oriented methodology for graphical icon design. It incorporates several ideas from data/system modeling and natural languages in the design and interpretation of icons. Specifically, it incorporates ideas of multileveling modeling and type-instance concepts. It also incorporates the concepts of grammar structures from alphabetic-based languages such as English and the principles of ideogram construction of graphical icon-based natural languages such as Chinese and ancient Egyptian hieroglyphs. The methodology also draws on other scientific disciplines such as cognitive science and user testing. |
16 | Please write an abstract with title: Secure and Efficient Blockchain-Based Knowledge Sharing for Intelligent Connected Vehicles, and key words: Blockchains, Data models, Adaptation models, Knowledge engineering, Vehicle dynamics, Sensors, Distance learning. Abstract: The emergence of Intelligent Connected Vehicles (ICVs) shows great potential for future intelligent traffic systems, enhancing both traffic safety and road efficiency. However, the ICVs relying on data driven perception and driving models face many challenges, such as the lack of comprehensive knowledge to deal with complicated driving context. In this paper, we investigate cooperative knowledge sharing for ICVs. We propose a secure and efficient blockchain based knowledge sharing framework, wherein a distributed learning based scheme is utilized to enhance the efficiency of knowledge sharing and a directed acyclic graph (DAG) system is designed to guarantee the security of shared learning models. To cater for the time-intense demand of highly dynamic vehicular networks, a lightweight DAG is designed to reduce the operation latency in terms of fast consensus and authentication. Moreover, to further enhance model accuracy as well as minimizing bandwidth consumption, an adaptive asynchronous distributed learning (ADL) based scheme is proposed for model uploading and downloading. Experiment results show that the DAG based framework is lightweight and secure, which reduces both chosen and confirmation delay as well as resisting malicious attacks. In addition, the proposed adaptive ADL scheme enhances driving safety related performance compared to several existing algorithms. |
17 | Please write an abstract with title: Estimation of distribution system load characteristics with time series data of PV system output, and key words: Power system simulation, Voltage control, Character generation, Distributed power generation, System identification, Power generation, Frequency control, Power system control, Power systems, Fluctuations. Abstract: Estimating load characteristics is very important from the viewpoints of voltage control of a distribution system with dispersed generators such as PV systems. This paper presents an identification method of distribution system characteristics with time series data. While one of the authors has proposed a system identification method that uses output of interruptible generators as an external disturbance, its target was load frequency control of a power system. This paper discusses the application of the method to the estimation of distribution load characteristics using time series data of both PV output and line voltage. Basic characteristics of the method were studied based on simulation data; estimated power spectra of load fluctuation prove to closely agree with that of input load. |
18 | Please write an abstract with title: Monolithically Integrated Self-Biased Circulator for mmWave T/R MMIC Applications, and key words: Ferrites, Semiconductor device measurement, Power measurement, Volume measurement, Circulators, Optical variables measurement, Size measurement. Abstract: Monolithically on-chip integrated circulator devices are demonstrated for the first time through the direct integration of polycrystalline hexaferrite magnetic material with GaN/SiC wafers. These narrow-band and broad-band self-biased (SB) circulators have an operating frequency centered at Ka-band (26.5-40 GHz) and V-band (40–75 GHz). A record SB circulator performance combining insertion loss well below 1 dB, isolation above 15 dB over a 10% fractional bandwidth and natural thermal solution on SiC substrate was achieved. Power measurements show the device is capable of handling an input power above 6 W. A full-duplex transmit/receive (T/R) MMIC, the first of its kind that is fully integrated on a semiconductor wafer, has also been demonstrated as enabled by this monolithically integrated circulator technology, showing over 100 times in size miniaturization as compared to conventional technology with promising applications in radio frequency (RF) electronics technologies for 5G and beyond. |
19 | Please write an abstract with title: Does Your Research Need a Jump-Start? [advertisement], and key words: Algorithms, Brain Mapping, Evoked Potentials, Motor, Humans, Image Enhancement, Image Interpretation, Computer-Assisted, Magnetic Resonance Imaging, Magnetoencephalography, Motor Cortex, Motor Cortex, Subtraction Technique. Abstract: Advertisement: The IEEE Engineering in Medicine and Biology Society Electronic Resource. Get to the information you need with one subscription! The IEEE EMBS Electronic Resource brings you the top publications in your field - all online, at any time. |
20 | Please write an abstract with title: Tell me what this is: Few-Shot Incremental Object Learning by a Robot, and key words: Training, Visualization, Upper bound, Service robots, Cleaning, Task analysis, Robots. Abstract: For many applications, robots will need to be incrementally trained to recognize the specific objects needed for an application. This paper presents a practical system for incrementally training a robot to recognize different object categories using only a small set of visual examples provided by a human. The paper uses a recently developed state-of-the-art method for few-shot incremental learning of objects. After learning the object classes incrementally, the robot performs a table cleaning task organizing objects into categories specified by the human. We also demonstrate the system’s ability to learn arrangements of objects and predict missing or incorrectly placed objects. Experimental evaluations demonstrate that our approach achieves nearly the same performance as a system trained with all examples at one time (batch training), which constitutes a theoretical upper bound. |
21 | Please write an abstract with title: Importance of software architectures in mobile projects, and key words: Software architecture, Computer architecture, Tools, Software, Informatics, Computational intelligence. Abstract: Mobile projects often exhibit architectural issues. In this paper, we survey three different types of persons (instructors, students, and developers) to find out how often do those who write code struggle with architectural issues and how are those issues impacting their work. Our focus was on mobile projects, but to have a comprehensive overview, we have also questioned students - who might become mobile developers, to see if they understand the importance of architecture in their projects. We were also interested in instructors and their experience with the students on whether or not they lack architectural knowledge. Our research has found that all the questioned developers struggle with architectural issues in their projects, over 60% of the students had to re-write a project due to architectural issues, and over 94% of the questioned instructors stated that students have architectural issues in the projects they develop. The vast majority of the participants to the survey (100% of instructors, 100% of students, and 90% of developers) agreed that a tool that could validate the software architecture would help them. |
22 | Please write an abstract with title: CNN-IDS: Convolutional Neural Network for Network Intrusion Detection System, and key words: Wireless communication, Network intrusion detection, Telematics, Convolutional neural networks, Security, Communication system security. Abstract: The field of information technology is undergoing a global revolution; information is exchanged globally. Such action requires the existence of an effective data and network protection system. IDS can provide security, protect the network from attacks and threats, and identify potential security breaches. In this paper, we developed a convolutional neural network-based intrusion detection system that was evaluated using the CIC-IDS2017 dataset. For newly public datasets, our model aims to deliver a low false alarm rate, high accuracy, and a high detection rate. The model achieved a 99.55 percent detection rate and 0.12 FAR using CIC-IDS2017 multiclass classification. |
23 | Please write an abstract with title: Organisational critical success factors for managing eLearning implementation, and key words: Electronic learning, Distance learning, Technology planning, Educational programs, Spirals, Conference management, Technology management, Resource management, Availability, Helium. Abstract: Since all formal eLearning programmes exist within an organisational context, such as universities, corporations or virtual learning institutes, it is clear that the organisation has the power to facilitate or to control development of eLearning courses. By imposing corporate views on course philosophies, learning models and strategies, it can restrict feasible pedagogical models. Through management of the educational setting, and decisions regarding the availability of resources, the organisational context also influences the design of courses and may restrict possible modes of evaluation. Therefore, the organisational context is critical to the success of the eLearning setting in which tutors, learners, courses and ICT are integrated. |
24 | Please write an abstract with title: Information Hygiene: The Fight Against the Misinformation “Infodemic”, and key words: Special issues and sections, Fake news, Social networking (online), Blockchains, Media, Information integrity. Abstract: The articles in this special section focus on efforts to combat misinformation in the news and media. With misinformation spreading more rapidly and more broadly than reliable information, the serious impact of the resulting “infodemic” is evident globally, in areas ranging from health to politics and even invasion and war. Although the originators of misinformation may be malicious entities exploiting social media, “fake news,” and conspiracy-theory generators, it is ourselves, consumers of such information, and our own network of people that propagate misinformation and fake content simply by sharing them often without assessing their validity. So, we can be—and should be—part of the solution to this growing problem. We should develop and adopt information hygiene practices that contribute to misinformation detection or at the least curb our contribution to its spreading. To develop such practices effectively, the research community is recommending several new and innovative technical solutions and methodologies that can help us make a more informed assessment of the trustworthiness of information we come across online, whether in posts on social media, online articles, or multimedia. |
25 | Please write an abstract with title: Financial risk forecast analysis based on deep learning considering the data collection from different sources, and key words: Deep learning, Reflectivity, Analytical models, Image color analysis, Time series analysis, Transfer functions, Modulation. Abstract: Financial risk forecast analysis based on deep learning considering the data collection from different sources is studied in this paper. This paper combines the time series analysis method of long correlation characteristics with the self-similar business modeling analysis, and gives a method to use the FARIMA model to study the self-similar business. It is found in practice that the reflectance spectra predicted by the classic Ciapper-yuie model are generally dark. This is because according to the modulation transfer function and Gaussian linear propagation function of the paper, the probability of light entering from one color and coming out of the same color is higher than the overall probability of this color. Hence, this kernel is used to optimize the deep learning model. And then, the model is applied to the risk forecast analysis. Through the proper simulations, the performance is validated. |
26 | Please write an abstract with title: CNN-LSTM-Network Based Robot Localization Using Spherical Images of Neighboring Places, and key words: Visualization, Wheelchairs, Conferences, Robot localization, Mobile robots, Task analysis, Consumer electronics. Abstract: The weakness of vision-based localization methods is that a robot may be confused when similar scenes are observed. In this paper we propose a method to cope with this problem by using multiple spherical images captured at neighboring places; that is, the ambiguity caused by visual similarity at a place is decreased by observing the scenes of its neighboring places. Concretely, the route that a robot moves along is sampled by discrete points which correspond to the places to be localized. Then, the localization problem is formulated as a classification problem, in which a place (a sampling point along a route) corresponds to a class. A CNN Long-Short-Term-Memory network is implemented to realize this task. The effectiveness of the proposed method is shown in the preliminary experiment. |
27 | Please write an abstract with title: Theoretical investigation of the field conditions in a vibrating reverberation chamber with an unstirred component, and key words: Electromagnetic compatibility, Ray tracing, Statistics, Electromagnetic fields. Abstract: In this paper, we examine the use of a vibrating reverberation chamber in which an equipment under test (EUT) is directly illuminated by a source antenna. A three-dimensional theoretical model, based on a simplified ray tracing method has been applied on a reverberation chamber whose dimensions were varied. The field distribution together with the field homogeneity was investigated, introducing the Rice distribution due to the presence of the line-of-sight component between the antenna and the EUT. |
28 | Please write an abstract with title: A study of the reactions between rooftop test and expansion functions in inhomogeneously-filled stripline structures, and key words: Testing, Stripline, Message-oriented middleware, Computational modeling, Closed-form solution, Green's function methods, Nonuniform electric fields, Moment methods, Integral equations, Robustness. Abstract: Formulates closed-form expressions for the method of moment (MoM) reaction elements associated with x-directed, roof-top expansion and test functions that reside in inhomogeneously-filled stripline structures. This paper describes the first step in the extension of the capabilities of a recently developed full-wave layered interconnect simulator (UA-FWLIS). This simulator could previously only handle MoM reaction element evaluations associated with expansion and test functions in homogeneously-filled stripline structures. After a robust algorithm was developed for the computation of all the TM/sub z/ and TE/sub z/ modes for the inhomogeneous case, the Green's functions were incorporated into UA-FWLIS to allow for the evaluation of the MoM reaction elements in inhomogeneously layered stripline structures. In this paper, we use the resulting closed-form expressions for the reaction elements to compare the behavior of the reaction elements for the homogeneously-filled and inhomogeneously-filled stripline cases. These computational results for the reaction elements provide a better understanding of the physical phenomenology associated with coupling in stripline structures. |
29 | Please write an abstract with title: Monitor Social Distance Using Convolutional Neural Network and Image Transformation, and key words: COVID-19, Pandemics, IEEE Sections, Conferences, Human factors, Social factors, Regulation. Abstract: The COVID-19 pandemic has claimed millions of lives worldwide. In these times, the only sure-shot way to stay safe is to avoid social contact and to follow social distancing regulations. These regulations define the minimum distance people should keep from each other so as to avoid the propagation of the Coronavirus. Hence, monitoring the social distance between people becomes a real-world problem so as to ensure safety for everyone. This is especially difficult to do manually in public places. Our proposed system aims to allow an easy and effective way to measure social distance and identify the people at risk using Convolutional Neural Networks and Image Transformation techniques. |
30 | Please write an abstract with title: Wide-band network characterization by Fourier transformation of time-domain measurements, and key words: Wideband, Time domain analysis, Pulse measurements, Frequency measurement, Impedance measurement, Computer networks, Frequency domain analysis, Sampling methods, Oscilloscopes, Data acquisition. Abstract: A novel method of measuring driving-point and transfer impedance over a wide spectrum rapidly and with good accuracy uses a digital computer to transform the pulse response of a network into the frequency domain. A sampling oscilloscope provides the time transformation needed for data acquisition. The method and laboratory technique are discussed. Experimental data show agreement within 12 percent between the data from a single pulse measurement and bridge measurements over a band of 40 harmonic frequencies, i.e., 25-1000 MHz. Fundamental accuracy and bandwidth are believed to be substantially greater than these figures. |
31 | Please write an abstract with title: Performance evaluation of temporal features for detection of mild cognitive impairment: An fNIRS study, and key words: Task analysis, Electroencephalography, Diseases, Hemodynamics, Functional magnetic resonance imaging, Spatial resolution. Abstract: A decline in cognition characterized by the deficit in memory, judgment, and language is known as mild cognitive impairment (MCI). This deficiency has great likelihood of developing Alzheimer’s disease (AD). Hence, the recognition of MCI or an early stage of AD is critical at earliest for evaluation and treatment. In this study, functional near-infrared spectroscopy (fNIRS) was used to measure the concentration changes of oxygenated hemoglobin (ΔHbO) from the pre-frontal cortex of six healthy controls (HC) and six MCI patients during a working memory task. Various temporal features of ΔHbO, such as mean, slope, kurtosis, skewness, and peak-values, were tested for distinguishing MCI patients from HCs. We further investigated the impact of intervention (i.e., acupuncture treatment) on MCI patients (i.e., MCI-1: before intervention, MCI-2: after intervention). Both groups went through fNIRS recording procedure with a gap of 45 days. Before the second fNIRS measurement, only the patient group underwent interventions twice per week for six weeks. The results showed that the mean ΔHbO response of MCI-1 was significantly less than (p < 0.05) that of HC but similar (p > 0.05) with MCI-2. Out of tested temporal features, signal mean and peak values of HC were significantly different (p = 0.0409, p = 0.0430) in comparison to MCI-1 but no significant difference (p = 0.4885, p = 0.4437) if MCI-2. Moreover, these fNIRS results were positively correlated with cognitive test scores. These preliminary results showed that fNIRS can be used for distinguishing MCI patients from HCs using mean hemodynamic response as well as temporal features. |
32 | Please write an abstract with title: Stability of selfish route selections in wireless ad hoc networks, and key words: Stability, Mobile ad hoc networks, Centralized control, Programmable control, Adaptive control, Power control, Ad hoc networks, Routing, Distributed control, Degradation. Abstract: The capacity region of ad hoc networks with optimal routing or scheduling has been investigated. Since distributed network control algorithms can be applied without the centralized information, the resulting network can be scalable. On the other hand, selfish nodes can severely degrade network performances, for example the network capacity. We attempt to analyze the obtained network capacity region based upon distributed route selection by using game theory. In addition to this, we attempt to analyze the joint effect of the adaptive route selection scheme and transmit power control. Simulation results reveal that transmit power control may increase the throughput achieved by the adaptive route selection scheme as well as the network capacity assuming centralized control. |
33 | Please write an abstract with title: Characterizing Aging of Lithium-ion Batteries during Long-term Test Campaigns for Transport Applications, and key words: Lithium-ion batteries, Aging, Hardware, Time factors, Testing. Abstract: Long-term test campaigns are necessary to understand the aging behavior of lithium-ion batteries in transport applications. During them, a characterization procedure is used to track aging giving both researchers and engineers valuable information. However, no consensus has been found on the procedure to be used. In fact, it is subject to the study under consideration and above all, to time and equipment constraints. Regarding the literature, this work has analyzed and compared non-invasive procedures from past aging test campaigns. Several aspects including duration, data relevance or impact on aging have been discussed. This review aims at helping the reader to choose the most appropriate procedure in line with its application. |
34 | Please write an abstract with title: Q-concept-learning: generalization with concept lattice representation in reinforcement learning, and key words: Lattices, Learning, Delay, Neural networks, Equations, Robots, Convergence, Testing, Artificial intelligence. Abstract: One of the very interesting properties of reinforcement learning algorithms is that they allow learning without prior knowledge of the environment. However, when the agents use algorithms that enable a generalization of the learning, they are unable to explain their choices. Neural networks are good examples of this problem. After a reminder about the basis of reinforcement learning, the lattice concept will be introduced. Then, Q-concept-learning, a reinforcement learning algorithm that enables a generalization of the learning, the use of structured languages as well as an explanation of the agent's choices will be presented. |
35 | Please write an abstract with title: A novel kernel for sequences classification, and key words: Kernel, Support vector machines, Support vector machine classification, Pulse width modulation, Dynamic programming, Testing, Text categorization, Splicing, Genomics, Bioinformatics. Abstract: In this paper, a novel kernel, called position weight subsequences kernel (PWSK), is introduced for identifying gene sequences. String subsequences kernel (SSK), which is based on string alignment, performs well for text categorization problems. For gene sequences identification, not only the comprised subsequences but also the positions of them are important. To integrate the position information, the decay factor of match position in SSK was replaced by position weight in PWSK. By doing this, PWSK can integrate both the content and position information of subsequences. This kernel was used for splice site identification and the experimental results demonstrated its efficiency. The sensitivities for donor sites and acceptor sites are 94% and 95%, respectively, and the specificities for them are 96% and 96%. The performance is better than that of SSK. The reason is that the content of sequence alone is not enough to interpret splicing, and it is necessary to include the position information. Compared with the existing approaches, PWSK achieves better sensitivities for both the donor sites and the acceptor sites, and the specificities of them are comparable. |
36 | Please write an abstract with title: Performance Evaluation of Contrast Enhancement Techniques in Computed Tomography of Lung Images, and key words: Lung, Computed tomography, Histograms, Cancer, Frequency-domain analysis, Adaptive equalizers. Abstract: Death rates due to cancer are elevating day by day. Millions of people across the world are affected due to this deadly disease. US population suffers from lung cancer at a higher rate in recent years. Computed tomography is a reliable diagnostic methods for lung cancer. In this method the radiologist face challenges to accurately identify the malignant lung nodules. Due to a large number of cases often radiologists missed the malignant nodules in images. Recently, many research works carried out in the areas of automated lung nodule detection have shown remarkable improvement in the radiologist performance. It is necessary to take into consideration the quality of images in the detection of pulmonary nodules. This has inspired us to analyze the preprocessing stage that comprises of a contrast enhancement stage of lung images. In this regard, the performance of different contrast enhancement methods is compared for lung image available in the public LIDC database using standard contrast evaluation metrics. |
37 | Please write an abstract with title: Cloud Computing-Assisted Dose Verification System and Method for Tumor Pain Treatment, and key words: Cloud computing, Tumors, Biomedical imaging, Data processing, Pain, Computers. Abstract: At present, modern medical data processing systems based on cloud computing, as a very important part of the auxiliary tumor pain treatment program, have played a key role in the soft services of the entire tumor pain treatment program. This article aims at the radiation dose verification problem of tumor patients in tumor treatment. The modern medical data processing system constructed by cloud computing technology is used to solve this kind of problem. The method used in this article is to select 100 tumor patients and use cloud computing-based oncology medical data processing system to analyze patients of different ages and body types, common irradiation sites and irradiation angles, and other irradiation parameters, and calculate using Monte Carlo method. Interventional treatment of the patient's various organs and tissues and the combined results into a large database. The experimental results show that the construction and application of a tumor medical data processing system based on cloud computing can better combine the individual condition and disease characteristics of tumor patients, give an accurate radiation dose for tumor pain treatment, and reduce the incidence of risk events. Compared with the experimental and simulation data of related literature, the results show that the cloud computing-based tumor medical data processing system proposed in this paper has improved the standardization of tumor pain treatment by nearly 15% on average, and the treatment plan satisfaction has increased by nearly 20%. |
38 | Please write an abstract with title: Robust Hypothesis Testing with Kernel Uncertainty Sets, and key words: Measurement, Uncertainty, Smoothing methods, Error probability, Hilbert space, Bayes methods, Kernel. Abstract: In this paper, the robust hypothesis testing problem is investigated, where under the null and the alternative hypotheses, the distributions are assumed to be in some uncertainty sets. The uncertainty sets are constructed in a data-driven manner, i.e., they are centered around empirical distributions. The distance between kernel mean embeddings of distributions in the reproducing kernel Hilbert space is used as the distance metric of uncertainty sets. The Bayesian setting is studied, where the goal is to minimize the worst-case error probability. An optimal test is firstly obtained for the case with a finite alphabet. For the case with an infinite alphabet, a tractable approximation is proposed to quantify the worst-case error probability, and a kernel smoothing method is further applied to design test that generalizes to unseen samples. A heuristic robust kernel test is also proposed and proved to be exponentially consistent. Numerical results are provided to demonstrate the performance of the proposed tests. |
39 | Please write an abstract with title: Optimal Guaranteed Cost Control of Switched Singular Systems, and key words: Switches, Lyapunov methods, Control systems, Performance analysis, Linear matrix inequalities, State feedback, Closed loop systems. Abstract: In this paper, we consider the problem of optimal guaranteed cost control (GCC) for linear switched singular systems. A sufficient condition is given to guarantee that the GCC problem has feasible solutions according to the multiple Lyapunov function theory. Switching proportional-derivative (PD) state feedback guaranteed cost controllers are designed using step-by-step design. Next, optimal guaranteed cost controllers are designed by solving a convex optimization problem with some inequalities constraints. Numerical simulation shows the merits and the efficiency of the proposed methods. |
40 | Please write an abstract with title: Learning the min-max gait comfort region when wearing shoes, and key words: Footwear, Legged locomotion, Foot, Knee, Sensors, Joints, Cameras. Abstract: Shoe-embedded sensors are a recent, common and convenient choice for devices intended for locomotion-related applications. They are advantageous, compared to other wearable devices, since they allow performing gait assessment in real-world environments, recognizing the user walking pattern in real-time and directly on the feet level. However, shoe with embedded sensors, while providing affore-mentioned advantages, must in no way disturb the walk. In this paper, we present a simple, reliable and cheap method to check whether, and in which manner, the shoe affects the gait. The ultimate goal of the developed methodology is to provide a way to assess the performance of an innovative sole adaptable to changes in the external environment and in the dynamic state of the user. The proposed method is based on using a 2D camera to monitor three geometrical angles (knee, ankle, shoe) which reflect, in a simple but exhaustive manner, the lower limb behavior during the gait cycle. The ability of the shoe not to affect the normal gait is tested by comparison between the three angles trends of a person wearing the shoe and the person's min-max gait comfort regions, with respect to the three angles. Min-max comfort regions are learned through real experiments on different subjects and shoes. |
41 | Please write an abstract with title: Comparison of RSSI Processing Methods for Improved Estimation Accuracy in BLE Indoor Position and Movement Direction Estimation System Using DNN, and key words: Legged locomotion, Deep learning, Estimation error, Interpolation, Bluetooth, Conferences, Position measurement. Abstract: We investigated a method for simultaneously estimating the position and movement direction of a pedestrian walking indoors, using multiple time instances of Received Signal Strength Indicators (RSSIs) from multiple Bluetooth Low Energy beacons detected by a smartphone carried by a pedestrian moving in eight different directions. A deep neural network is trained to estimate the position and movement direction of this smartphone from the measured RSSIs.We compared the estimation accuracy when an RSSI set was interpolated, extrapolated, and unprocessed to obtain its value at the required time instance. We also tried to reduce the estimation error by treating the direction of movement as a continuous value. The conclusion was that interpolation was the most effective, with a position estimation error of 0.410m and a movement direction estimation error of 15.10° was achieved. The estimation direction accuracy as a continuous value was 12.8% better than that estimated by previous categorical experiments. |
42 | Please write an abstract with title: Adaptive Doping of Spatially Coupled LDPC Codes, and key words: Adaptation models, Analytical models, Error analysis, Simulation, Doping, Numerical simulation, Parity check codes. Abstract: In this paper, we study the problem of error propagation in sliding window decoding (SWD) of spatially coupled LDPC (SC-LDPC) codes. A general decoder model that accounts for error propagation is proposed and analyzed, and the decoded block error rate (BLER) is calculated using the model. In order to improve the BLER performance under decoder error propagation conditions, adaptive variable node (VN) doping is proposed, assuming a noiseless binary feedback channel is available. Example calculations using the proposed model, as well as numerical simulation results, are used to show that adaptive VN doping improves the BLER performance compared to the periodic VN doping and to the undoped case. |
43 | Please write an abstract with title: Improving Fault-Localization Accuracy by Referencing Debugging History to Alleviate Structure Bias in Code Suspiciousness, and key words: Debugging, Software, History, Java, Analytical models, Testing. Abstract: Spectrum-based fault localization (SBFL) techniques can automatically localize software faults. They employ the program spectrum, such as code coverage profile with test verdicts, to rank the program entities based on their code suspiciousness. In the past decades, researchers have proposed many approaches to optimize these techniques; however, the program structure, which can influence their performance, is not taken into consideration in developing and improving these techniques. In this article, we identify and analyze the effect of the program structure on the application of SBFL techniques. We observe that some specific program structures may introduce structure bias to code suspiciousness and negatively influence the output of SBFL techniques. To mitigate these effects and improve the performance of fault localization, we propose Delta4Ts, a structure-aware technique. Delta4Ts references debugging history to alleviate the impact of structure bias in the calculation of code suspiciousness. It reasons from the observable suspicious value towards the desired suspicious value and the impact of structure bias. To evaluate Delta4Ts under practical constraints, we conduct a controlled experiment using nine widely-studied SBFL formulae on 12 C programs and 6 Java programs. The experiment results show that Delta4Ts can significantly improve the accuracy of the studied SBFL formulae by an average of 34.8% on 12 C programs and 30.6% on 6 Java programs, and improve more on subject programs associated with more history versions or having larger code sizes. |
44 | Please write an abstract with title: TCP Veno revisited, and key words: Degradation, Throughput, Robustness, Proposals, Satellites, Internet, IP networks, Guidelines, Protocols, Additives. Abstract: Diverse links (i.e., wireless links, satellite links and ADSL links) are being widely deployed in current Internet, unlike wired links, these heterogeneous links are causing significant performance degradation of TCP. Recently one sender-side enhancement of TCP, called Veno TCP, is proposed to mainly eliminate TCP's suffering in wireless environments. Real network measurements and live Internet results validated Veno's throughput improvement and its harmonious co-existence with legacy TCP connections. In this paper, we revisit Veno TCP and evaluate its performance in more practical way. Specifically, we measure Veno from four metrics - compatibility, flexibility, robustness and deployablity. Our extensive arguments not only prove Veno's advantages, but also illuminate some basic philosophies behind Veno, which could provide helpful guidelines for future protocol design. |
45 | Please write an abstract with title: Principle of Optimal Voltage Regulation and Energy-Saving for Induction Motor With Unknown Constant-Torque Working Condition, and key words: Induction motors, Stators, Voltage control, Rotors, Torque, Copper, Regulation. Abstract: To achieve optimal voltage regulation and energy savings of an AC induction motor operating under constant-torque and variable-working-load conditions, and consider a motor's T-type and Γ-type equivalent circuit, the copper and iron losses of the stator were regarded as invariable losses that were only related to the stator voltage, and the copper losses of the rotor were regarded as variable losses that varied with the load torque. The total electrical loss formula and the optimal voltage regulation formula for the motor were deduced. The formulas revealed that the total electrical loss of the motor was affected by the stator voltage and the rotor load torque, and the optimal voltage regulation changed exponentially with the load torque of the motor. The calculation results of an engineering example showed that when s =0.01-0.03 and the motor operated stably, the motor load torque error was not more than 1.8 N·m based on the exact and approximate solutions of the slip s. The total electrical loss showed almost no calculation error when the working voltage of the motor was higher than 230 V. The optimal voltage regulation and its error increased with the increase in the motor load torque, but within the working voltage range of the motor, the optimal voltage regulation error did not exceed 6 V. The total electrical loss with the optimal voltage regulation mode and a variable load torque was less than the total electrical loss of a 380- or 220-V constant driving mode. With the increase in the load rate, the total electrical loss increased. When the motor's load did not exceed the medium load and the motor operated with optimal voltage regulation, the energy-saving effect was significant. In particular, when the motor operated without a load, the total electrical loss was almost 0. |
46 | Please write an abstract with title: Transformer Loss of Life Monitoring: A review of in-service highlighting achieved benefits, and key words: Protective relaying, Transformers, Monitoring. Abstract: Most protection relays detect abnormal conditions or an existing fault in the primary equipment as fast as possible and isolate the minimum portion of the electric system. However, some protection elements like thermal overload, for instance, are intentionally delayed and will trip the breaker when the operation condition is close to permanent damage. |
47 | Please write an abstract with title: Modeling the self-similar behavior of packetized MPEG-4 video using wavelet-based methods, and key words: MPEG 4 Standard, Wavelet packets, Video on demand, Video compression, Streaming media, Telecommunication traffic, Traffic control, Web and internet services, Bit rate, Wireless networks. Abstract: Video streaming has already been very popular on the Internet through services such as news bulletins from different parts of the world and on-demand music-video clips. With rapidly developing wireless technologies, video streaming to mobile devices will be very common. We investigate the self-similar scaling behavior that is present in variable bit rate (VBR) MPEG-4 video. As the usage of video services over packet-based wireless networks increases, new workload models will be necessary to study the quality of service aspects of video traffic. A key finding of our study is that MPEG-4 video encoder output traffic has fractal behavior and this behavior exists regardless of the compression ratio. |
48 | Please write an abstract with title: On learning asymmetric dissimilarity measures, and key words: Clustering algorithms, Unsupervised learning, Information retrieval, Zoology, Extraterrestrial measurements, Constraint optimization, Computer aided instruction, Proposals, Data mining. Abstract: Many practical applications require that distance measures to be asymmetric and context-sensitive. We introduce context-sensitive learnable asymmetric dissimilarity (CLAD) measures, which are defined to be a weighted sum of a fixed number of dissimilarity measures where the associated weights depend on the point from which the dissimilarity is measured. The parameters used in defining the measure capture the global relationships among the features. We provide an algorithm to learn the dissimilarity measure automatically from a set of user specified comparisons in the form "x is closer to y than to z" and study its performance. The experimental results show that the proposed algorithm outperforms other approaches due to the context sensitive nature of the CLAD measures. |
49 | Please write an abstract with title: Design of packet detection system for high-speed network environment, and key words: High-speed networks, Intrusion detection, Acceleration, Filtering, Electronic mail, Protection, Software systems, Monitoring, Telecommunication traffic, Event detection. Abstract: As matching rules used in packet detection systems are more complicated, performance accelerating techniques are more needed. In this paper, we review a packet matching problem in NIDS and suggest a new fast packet matching teehnique which can adapt to packet matching rules made up of multiple fields. It first prepares a table which is arranged intrusion detection rules on the basis of comparative basis value extracted in each fields, finds a correct rule after comparing the comparative basis value with each field in every incoming new packets. Suggesting technique helps high speed packet matching system. |
50 | Please write an abstract with title: Performance Enhancement of Passive Distribution Network by optimal deployment of Distributed Generation, and key words: Wind energy generation, Wind, Substations, Voltage, Distribution networks, Benchmark testing, Wind power generation. Abstract: Traditionally used power plants transmit electricity over long distances to substations. The end-users accept electric power from the sub-station via passive networks. These networks are radial type distribution networks and fed by only one substation i.e., no alternative for back up. Thus, in Radial Distribution System (RDS), electric power flows unidirectionally and due to high R/X ratios, problems arise like low voltage stability, large voltage drops and large power losses. Under severe loading conditions, issues like voltage collapse also appears. A viable solution is to deploy DG in the distribution networks, but DG requires proper installation to optimize the appropriate site and size of it. Numerous methods are used in the past by the authors for DG placements. Among all, the meta-heuristic techniques, like Genetic Algorithm (GA) and other applicable techniques are rapid and alteration can be simply done. Only a single optimization technique cannot solve all type of optimization problems. Their performance varies from problem to problem. There is always a need to test different optimization techniques for various practical engineering problems. GA and Modified African Buffalo Optimization (MABO) techniques for optimized DG allocation pursued in this article. Both these algorithms are validated on benchmark 33 bus RDS. The objective functions are minimization of active power losses and node voltage deviation in the passive distribution network. The various solution techniques applicable for the solution of DG integration in distribution system are discussed and compared with the results obtained in this paper. |
51 | Please write an abstract with title: PCB Winding Coupled Inductor Design and Common-Mode EMI Noise Reduction for SiC-Based Soft-Switching Three-Phase AC–DC Converter, and key words: Inductors, Windings, Integrated circuit modeling, Equivalent circuits, Electromagnetic interference, Noise reduction, Switching frequency. Abstract: This article presents a PCB winding coupled inductor design for both high efficiency and effective common-mode (CM) noise reduction in a silicon carbide (SiC)-based soft-switching three-phase ac–dc converter. A balance technique is applied to reduce the CM noise, creating a return path with additional inductors. The inductors in the main circuit and return path are coupled in one core and implemented with PCB windings. A winding interleaving structure with strong coupling between the main inductors is selected to minimize the winding loss and to improve the converter efficiency; however, the interwinding capacitance brought on by the winding interleaving worsens the CM noise. An inductor model including the capacitance is introduced, and its impact on the CM noise is analyzed. A novel inductor structure is proposed to scale back the interwinding capacitance and to enhance the CM noise reduction capability. Experiments with a SiC-based 25-kW soft-switching three-phase ac–dc converter prototype validates the performances of the proposed PCB winding coupled inductors. |
52 | Please write an abstract with title: Multimodal Sensor Fusion Using Symmetric Skip Autoencoder Via an Adversarial Regulariser, and key words: Image fusion, Feature extraction, Visualization, Generators, Task analysis, Image reconstruction, Transforms. Abstract: The fusion of the spatial characteristics, of visual image, and spectral aspects, of infrared image, is of immense practical importance. In this work, we propose a novel spatially constrained adversarial autoencoder that extracts deep features from the infrared and visible images to obtain a more exhaustive and global representation. A residual autoencoder architecture, regularised by a residual adversarial network has been employed, to generate a more realistic fused image. The residual module serves as a primary building block for the encoder, decoder, and adversarial network, as an add on the symmetric skip connections, perform the functionality of embedding the spatial characteristics directly from the initial layers of encoder structure to the decoder part of the network. The spectral information in the infrared image is incorporated by adding the feature maps over several layers in the encoder part of the fusion structure. The encoder section is made up of two separate branches to carry out independent inference on both the visual as well as infrared images. The loss function has been designed to incorporate the characteristics of both the modalities by optimizing over the textural content of the visible image and the spectral content of its infrared counterpart. In order to efficiently optimize the network's parameters, an adversarial regulariser network has been proposed that would perform supervised learning on the fused image and the original visual image since the visual image contains most of the structural content in comparison to the infrared image. The adversarial game has been incorporated in the structure by the addition of classification loss in the generator and discriminator loss functions in addition to the content loss. |
53 | Please write an abstract with title: Construction of irregular LDPC codes with low error floors, and key words: Parity check codes, Floors, Bipartite graph, Belief propagation, Maximum likelihood decoding, Hydrogen, Algorithm design and analysis, Tree graphs, Bit error rate, Turbo codes. Abstract: This work explains the relationship between cycles, stopping sets, and dependent columns of the parity check matrix of low-density parity-check (LDPC) codes. Furthermore, it discusses how these structures limit LDPC code performance under belief propagation decoding. A new metric called extrinsic message degree (EMD) measures cycle connectivity in bipartite graph. Using an easily computed estimate of EMD, we propose a Viterbi-like algorithm that selectively avoids cycles and increases stopping set size. This algorithm yields codes with error floors that are orders of magnitude below those of girth-conditional codes. |
54 | Please write an abstract with title: Design and Implementation of an On-line Life Prediction System for TWT, and key words: Power generation, Monitoring, Calibration, Fitting, Radio transmitters. Abstract: Starting from the analysis of the field application of Traveling wave tube and aiming at the power attenuation problem caused by the aging of Traveling wave tube, this paper analyses the influence of power attenuation on the system performance and introduces the definition of service life of Traveling wave tube. An online residual life prediction method based on power coupling measurement and data fitting is presented. An online monitoring system of Traveling wave tube is developed by using this method. The system can be compared. Accurate prediction of residual life can provide scientific basis for information equipment maintenance. |
55 | Please write an abstract with title: Simulated Motion Control of a School of Microrobots with Random Walks, and key words: Microorganisms, Magnetic confinement, Force, Scattering, Magnetic liquids, Solids, Robot sensing systems. Abstract: The dynamics of individual elements in a swarm moving in biological fluids is an important aspect to ascertain the effectiveness of cumulative motion control. The hydrodynamic interaction between the swarm and surrounding walls as well as between the micro-swimmers, i.e., magnetotactic bacteria, within the swarm are affected by Brownian motion. A small group of magnetically-controlled bacteria swimming in a biological fluid could be simulated in a simplified fashion to design and test controllers for addressable motion with random walks. Furthermore, the disruptive effect of the random walks might prove detrimental to the control performance. This paper showcases a simulation study of adaptive motion control for a trio of magnetotactic bacteria swimming as a group in human synovial fluid. The bacterial group is confined by the joint geometry and maneuvered by the external magnetic field of a permanent magnet positioned by an open kinematic chain. Results show that it is possible to control the yaw angle of the bacterial group while swimming under the influence of repulsive force and the Brownian noise although each swimmer follows a different path. It is further observed that, when bacteria came in contact with solid surfaces, the control algorithm could be prone to misinterpreted sensory data. |
56 | Please write an abstract with title: A Comparison of Modulation Techniques for Quantized Voice Communications, and key words: Frequency modulation, Pulse modulation, Systems engineering and theory, Propagation losses, Network address translation, Bandwidth, Radio frequency, Communications technology, Intermodulation distortion, Assembly. Abstract: Using the requirements of a quantized multiple access voice communications system as a base, an investigation of several methods of modulation was conducted. Two frequency modulation (FM) techniques and one amplitude modulation (AM) technique were investigated in detail. The AM technique is the quantized pulse position modulation-AM (QPPM-AM) method used in the U. S. Army random access-discrete address (RADA) communications system. The quantized FM techniques were investigated as possible alternates to the RADA technique. Comparisons between the techniques are made in the areas of required transmitter power, RF bandwidth, circuit complexity, and several other areas relevant to communications systems of this type. The results indicate superior performance of one FM technique in several areas. |
57 | Please write an abstract with title: OpenSDN Southbound Traffic Characterization: Proof-of-Concept Virtualized SDN-Infrastructure, and key words: Technological innovation, Protocols, Scalability, Standards organizations, Standardization, Security, Stress. Abstract: This Proof-of-Concept (PoC) research presents a conceptualization of main OpenFlow Southbound messages found in Software-Defined Networks. The use of an open-source network emulator has allowed to conduct traffic captures in order to contrast the theory with a high reliability PoC scenario. This paper begins by defining SDN according to Open Networking Foundation (ONF), as well as identifying characteristics, elements, and fundamental protocols of this technology that is changing the traditional paradigm of sending data. In order to test theory in practice, an OpenFlow network built with an Open-vSwitch (OVS), two hosts and external SDN Docker Controller were emulated using Mininet, a very efficient controller-based emulator. Later, SDN-packet captures were done for analysis. Connectivity tests are proposed to capture OpenFlow messages exchanged between different devices of the network, and with that, verifying its encapsulation, structure, and vulnerabilities. The ultimate aim of the present paper is to provide a clearer and more understandable vision of SDN and its operation in the real world. |
58 | Please write an abstract with title: Optimization Design of Miniaturized Fiber Ring Based on PM-IFOG Optical Path Physical Model, and key words: Optical fibers, Optical interferometry, Gyroscopes, Optical design, Navigation, Stability analysis, Production. Abstract: Fiber optic ring is one of the key factors that determine the performance of interferometric fiber optic gyroscopes. To realize miniaturization of interferometric fiber optic gyroscopes, it is necessary to optimize the design of fiber optic ring in terms of volume and length according to performance requirements. At present, the production of small interferometric fiber optic gyroscopes is relatively rough in the selection of fiber optic ring length and has not been optimized. Based on the physical model of PM-IFOG optical path, this paper compares the effects of different lengths of fiber loops on the performance of small interferometric fiber optic gyroscopes, and adopts the methods of fiber loop performance simulation and length optimization design to improve the performance of small interferometric fiber optic gyroscopes. On the basis of miniaturization of fiber optic gyroscope, the length of 180m fiber optic loop is optimally designed to 290m. Through theoretical analysis and estimation, the accuracy of the gyroscope is improved by [0.259 (°)/h, 1σ)], and the zero bias stability is improved by 0.274 (°)/h. The results show that the application adaptability of interferometric fiber optic gyroscopes can be improved by reasonably designing the fiber optic ring length of small fiber optic gyroscopes. The research provides a certain reference value for miniaturization design of optical path of fiber optic gyroscope. |
59 | Please write an abstract with title: Optical fiber connectors using flexible fine ferrules, and key words: Optical fibers, Connectors, Prototypes, Optical losses, Optical fiber devices, Springs, Insertion loss, Optical devices, Optical fiber losses, Optical fiber dispersion. Abstract: A new, flexible ferrule only 0.8 mm in diameter is proposed for optical fiber connectors. Fiber-connector misalignment can be compensated for by bending the ferrule, thus making it possible to realize a short fiber pitch on the same order as electrical multiterminal connectors. New connector models are proposed which exploit the flexibility of this ferrule and are suitable for application to aggregated multiple connectors. A prototype connector employing retention springs and a V-groove make it possible to realize a zero-insertion-force mechanism. Connector insertion loss is 0.57 dB. Additional loss following 1000 connect-disconnect cycles is 0.01 dB. |
60 | Please write an abstract with title: A Robust Scheduling Model for Continuous Berth Allocation Problem under Uncertainty, and key words: Schedules, Uncertainty, Resource management, Containers, Job shop scheduling, Robustness, Stochastic processes. Abstract: In container terminals, berthing plans are the fundamental decisions, any changes to which might result in extra expense for the entire systems. This paper tackles the continuous Berth Allocation Problem (BAP) with uncertain vessel arrival time and operation time. As the traditional predictive-reactive method has systematic drawbacks, we focus on adopting robust scheduling method to construct a berthing plan which can be a reliable input for follow-up schedules in terminals. We classify the general decision variables of BAP into design variables and control variables, and introduce two new concepts: the berthing region and relative sequence. A new mathematical model is proposed to illustrate the robust scheduling approach. We also developed a simulation based algorithm to generate a proactive plan, and conducted a series of computational experiments to reveal the properties of our model, including the insensitive to uncertainty level and the trade-off between robustness and efficiency. |
61 | Please write an abstract with title: An experiment on high-speed optical time-division switching, and key words: High speed optical techniques, Optical bistability, Road transportation, Diode lasers, Optical switches, Switching systems, Directional couplers, Read-write memory, Flip-flops, Circuits. Abstract: An experimental high-speed optical time-division switching system has been realized. The system is able to exchange digitally encoded color video signals at 256-Mbit/s highway speed. Bistable laser diodes and directional coupler switch matrices are adopted as optical memories and optical read/write gates, respectively, in an optical time switch. The bistable laser diode operates as an optical flip-flop circuit which can be set and reset by optical and electrical signals, respectively. 256-Mbit/s highway speed has been realized with sufficient input highway operating margin using the same wavelength as that of bistable laser diodes for an electrooptical converter. Results of this experiment will be helpful data for use in constructing future optical telecommunications networks, where a variety of broad-band services need to be realized. |
62 | Please write an abstract with title: A Framework for Transmission Planning in a Competitive Electricity Market, and key words: Electricity supply industry, Power system planning, Power system reliability, Costs, Strategic planning, Power system security, Electricity supply industry deregulation, Power markets, Process planning, Power system economics. Abstract: In this paper, a framework for optimal transmission system expansion planning in a competitive electricity market environment has been proposed. Open access transmission has created a deregulated power market and brought new challenges to system planning. The goal of transmission planning is to determine an optimal planning strategy for the transmission company. From the planner's view, planning is the process for balancing the multiple conflicting objectives with many constraints. The primary objective of transmission planning is to ensure the reliable supply to the demand as economically as possible. The new approach in this paper is formed to minimize the expected energy not supplied (EENS), investment cost and maximize the benefit-cost ratio lambda subject to the power flow and security constraints. The computer program for reliability evaluation of bulk power systems CRUSE is used to perform reliability evaluation of the transmission system with predetermined outages. An advanced genetic algorithms (GAs) is utilized to solve the multi-objective optimisation problem. The advantages of the new approach include 1) it achieves the possible highest reliability with less cost; 2) it maximizes the cost efficiency, which increases the competitive advantage of a transmission company; and 3) the resulting plans contain the planner's preference which is easy to adjust. The planning approach has been illustrated on the Roy Billinton Test System (RBTS) |
63 | Please write an abstract with title: Uncertainty-Aware Annotation Protocol to Evaluate Deformable Registration Algorithms, and key words: Annotations, Manuals, Visualization, Uncertainty, Gaussian processes, Covariance matrices, Biomedical imaging. Abstract: Landmark correspondences are a widely used type of gold standard in image registration. However, the manual placement of corresponding points is subject to high inter-user variability in the chosen annotated locations and in the interpretation of visual ambiguities. In this paper, we introduce a principled strategy for the construction of a gold standard in deformable registration. Our framework: (i) iteratively suggests the most informative location to annotate next, taking into account its redundancy with previous annotations; (ii) extends traditional pointwise annotations by accounting for the spatial uncertainty of each annotation, which can either be directly specified by the user, or aggregated from pointwise annotations from multiple experts; and (iii) naturally provides a new strategy for the evaluation of deformable registration algorithms. Our approach is validated on four different registration tasks. The experimental results show the efficacy of suggesting annotations according to their informativeness, and an improved capacity to assess the quality of the outputs of registration algorithms. In addition, our approach yields, from sparse annotations only, a dense visualization of the errors made by a registration method. The source code of our approach supporting both 2D and 3D data is publicly available at https://github.com/LoicPeter/evaluation-deformable-registration. |
64 | Please write an abstract with title: Computation of the abscissa of stability by repeated use of the Routh test, and key words: Stability, Polynomials, Design automation, System testing, Nonlinear systems, Aerospace control, Upper bound, Control systems, Nonlinear dynamical systems, Programmable control. Abstract: The numerical computation of the abscissa of stability of a polynomial, defined as the largest of the real parts of the zeros of the polynomial, is a problem that occurs repeatedly in computer-aided design of dynamical and control systems. The approach developed in this paper, by making repeated use of the Routh test, avoids the computation of zeros and provides a useful method. |
65 | Please write an abstract with title: Optimizing Memory Access in TCF Processors with Compute-Update Operations, and key words: Instruction sets, Optical fiber networks, Parallel processing, Memory management, Computational modeling. Abstract: The thick control flow (TCF) model is a data parallel abstraction of the thread model. It merges homogeneous threads (called fibers) flowing through the same control path to entities (called TCFs) with a single control flow and multiple data flows. Fibers of a TCF are executed synchronously with respect to each other and the number of them can be altered dynamically at runtime. Multiple TCFs can be executed in parallel to support control parallelism. In our previous work, we have outlined a special architecture, TPA (Thick control flow Processor Architecture), for executing TCF programs efficiently and shown that designing algorithms with the TCF model often leads to increased performance and simplified programs due to higher abstraction, eliminated loops and redundant program elements.Compute-update memory operations, such as multioperations and atomic instructions, are known to speed up parallel algorithms performing reductions and synchronizations. In this paper, we propose special compute-update memory operations for TCF processors to optimize iterative exclusive inter-fiber memory access patterns. Acceleration is achieved, e.g., in matrix addition and log-prefix style patterns in which multiple target locations can interchange data without reloads between the instructions that slows down execution. Our solution is based on modified active memory units and special memory operations that can send their reply value to another fiber than that initiating the access. We implement these operations in our TPA processor with a minimal HW cost and show that the expected speedups are achieved. Programming examples are given. |
66 | Please write an abstract with title: Optical resonators with whispering-gallery modes-part I: basics, and key words: Optical resonators, Optical filters, Nonlinear optics, Optical feedback, Optical interferometry, Dielectrics, Fiber nonlinear optics, Optical mixing, Laser modes, Mirrors. Abstract: We briefly review basic properties of dielectric whispering gallery mode resonators that are important for applications of the resonators in optics and photonics. |
67 | Please write an abstract with title: A Novel Circularly-Polarized T-shaped Slot Array Antenna in Ka-band, and key words: Polarization, Satellite antennas, Slot antennas, Gap waveguide, Europe, Bandwidth, Reflection coefficient. Abstract: A T-shaped slot-array antenna fed through a Groove Gap Waveguide (GGW) is presented in this paper. The array antenna operates at 30 GHz. The way the slots are excited, along with the T-shape on its lid allows a compact single-layer architecture. A uniform linear array of 12 elements is designed to demonstrate the viability of this concept for high-efficient singlelayer slot-array antennas. Preliminary results show a frequency bandwidth of 1 GHz with input reflection coefficient better than –12 dB. In addition, being a full-metal antenna, the expected efficiency is high. It is worth stressing the good polarization purity achieved, being below 1.5 dB within the band of interest. |
68 | Please write an abstract with title: Prioritization of the joint battle space infosphere (JBI) traffic and priority with reciprocity CAC protocol for the JBI network, and key words: Telecommunication traffic, Protocols, Quality of service, Logistics, Communication system traffic control, Command and control systems, Reconnaissance, Disaster management, Intelligent sensors, Satellites. Abstract: A method of prioritizing the joint battle space infosphere (JBI) input traffic with respect to the importance of it's content to an operation, urgency, traffic characteristics, quality of service (QoS) requirement and network resources is presented. This method uses the Karnaugh map plot for the critical importance of the content of the JBI traffic from both the logistic and the operational aspects of a mission to classify the JBI input traffic into four priority groups |
69 | Please write an abstract with title: Type-1 diabetes mathematical analysis based on Free Fatty Acids in the presence of insuline, and key words: Analytical models, Asymptotic stability, Upper bound, Reliability theory, Biochemistry, Stability analysis, Physiology. Abstract: This work is devoted to investigate a six-dimensional mathematical model of first-order ordinary differential equations with the presence of growth hormone. The analysis of the time-behavior dynamics of all state variables is discussed by applying the localization of compact invariant sets method; considering a treatment based on both growth hormone and insulin effects. To the best of our knowledge, this method has not been applied to explore the global dynamic of this phenomenon, and only local asymptotic stability for this particular model has been reported. The mathematical process enhances a reliable strategy to a leading path for preliminary analysis related to other types of in-silico test considerations. Moreover, a closed-loop asymptotic stability analysis by Lyapunov theory is achieved by considering two possible control inputs that could modify the concentration level of insulin and growth hormone. Finally, a discussion about biological implications and numerical simulations are presented. |
70 | Please write an abstract with title: Energy Efficiency Aspects of the AMD Zen 2 Architecture, and key words: Microarchitecture, Operating systems, Instruction sets, High performance computing, Throughput, Hardware, Energy efficiency. Abstract: In High Performance Computing, systems are evaluated based on their computational throughput. However, performance in contemporary server processors is primarily limited by power and thermal constraints. Ensuring operation within a given power envelope requires a wide range of sophisticated control mechanisms. While some of these are handled transparently by hardware control loops, others are controlled by the operating system. A lack of publicly disclosed implementation details further complicates this topic. However, understanding these mechanisms is a prerequisite for any effort to exploit the full computing capability and to minimize the energy consumption of today’s server systems. This paper highlights the various energy efficiency aspects of the AMD Zen 2 microarchitecture to facilitate system understanding and optimization. Key findings include qualitative and quantitative descriptions regarding core frequency transition delays, workload-based frequency limitations, effects of I/O die P-states on memory performance as well as discussion on the built-in power monitoring capabilities and its limitations. Moreover, we present specifics and caveats of idle states, wakeup times as well as the impact of idling and inactive hardware threads and cores on the performance of active resources such as other cores. |
71 | Please write an abstract with title: Effective Clustering via Structured Graph Learning, and key words: Optimization, Clustering methods, Clustering algorithms, Task analysis, Stability analysis, Partitioning algorithms, Eigenvalues and eigenfunctions. Abstract: Given an affinity graph of data samples, graph-based clustering aims to partition these samples into disjoint groups based on the affinities, and most previous works are based on spectral clustering. However, two problems among spectral-based methods heavily affect the clustering performance. First, the randomness of post-processing procedures, such as $K$-means, affects the stability of clustering. Second, the separated stages of spectral-based methods, including graph construction, spectral embedding learning, and clustering decision, lead to mismatched problems. In this paper, we explore a structured graph learning (SGL) framework that aims to fuse these stages to improve clustering stability. Specifically, SGL adaptively learns a structured affinity graph that contains exact $k$ connected components. Each connected component corresponds to a cluster so clustering assignments can be directly obtained according to the connectivity of the learned graph. In this way, SGL avoids the randomness brought by reliance on traditional post-processing procedures. Meanwhile, the graph construction and structured graph learning procedures happen simultaneously, which alleviates the mismatched problem effectively. Moreover, we propose an efficient algorithm to solve the involved optimization problems and discuss the connections between this work and previous works. Numerical experiments on several synthetic and real datasets demonstrate the effectiveness of our methods. |
72 | Please write an abstract with title: Self-Supervised Pre-Trained Speech Representation Based End-to-End Mispronunciation Detection and Diagnosis of Mandarin, and key words: Hidden Markov models, Speech recognition, Task analysis, Feature extraction, Computational modeling, Context modeling, Self-supervised learning. Abstract: Mispronunciation Detection and Diagnosis (MDD) is an essential basic technology in Computer-Assisted Pronunciation Training (CAPT) and Computer-Assisted Language Learning (CALL). MDD research in Mandarin is faced with the problem of lack of relevant data, which is a typical low-resource scenario. In recent years, self-supervised pre-trained speech representation has developed rapidly and achieved significant performance improvement in low-resource speech recognition scenarios, making it necessary to be applied to MDD tasks. First, we build a Mandarin MDD dataset called PSC-Reading for the Putonghua Proficiency Test (PSC) passage reading section. Then we extended the end-to-end MDD system based on CTC/Attention hybrid architecture and Transformer architecture, using features extracted from self-supervised pre-training speech representation models such as Wav2Vec 2.0 and WavLM to replace conventional speech features like MFCC and Fbank, and conduct experiments on the PSC-Reading dataset. Experimental results show that, compared with the baseline model CNN-RNN-CTC, our WavLM-based model obtains 20.5% relative improvement on the F1 score metric. |
73 | Please write an abstract with title: Localization and 3D Mapping using 1D Automotive Radar Sensor, and key words: Radar, Laser radar, Three-dimensional displays, Simultaneous localization and mapping, Two dimensional displays, Genetic algorithms, Doppler radar. Abstract: This paper establishes novel methods for vehicle localization and mapping using a 1D linear automotive radar array in conjuncture with pre-existing lidar maps, and tests if the generated radar map can be made to be 3 dimensional. The basic design of this study was to implement a SLAM (Simultaneous Localization And Mapping) system that co-registers radar data to radar data, and/or register radar data to lidar data. After the execution of experiments, it was established that it is possible to localize the car by relating observed radar data to pre-made lidar maps, and to continually add to a cumulative map made with the radar data that can further aid the localization process. Furthermore, the radar map created using the 1D linear automotive array can be extended to 3D with proposed processing chain, though more experiments to establish the full potential of this capability are recommended. |
74 | Please write an abstract with title: Delay-Locked Loop Based Multiphase Clock Generator for Time-Interleaved ADCs, and key words: Power demand, Simulation, Phase frequency detectors, Delay lines, Jitter, Generators, Inverters. Abstract: This paper proposes a delay-locked loop (DLL)-based multiphase clock generator implemented using a 65 nm CMOS technology. This generator produces 16 phases at 7 GHz. Each phase can drive a sample and hold circuit in a projected time-interleaved analog-to-digital converter (TI-ADC). This allows sampling an input signal at 112 GSamples/s. The proposed clock generator employs a voltage-controlled delay line (VCDL) exploiting pseudo NMOS inverters for high-speed operation. In addition, a fast phase frequency detector (PFD) is used for closed loop frequency adjustment. This PFD has a low power consumption and produces no output glitches. Simulation results produced from pre-layout circuit model show that the proposed generator exhibits 0.170 ps RMS jitter, while consuming 54 mW from a 1 V supply. |
75 | Please write an abstract with title: Sentiment Analysis of Indonesian Government Policies In Handling Covid 19 Through Twitter Data, and key words: COVID-19, Government policies, Support vector machines, Seminars, Sentiment analysis, Social networking (online), Blogs. Abstract: This paper presented a sentiment analysis of the Indonesian government's policies in overcoming Covid 19 through twitter data using several classification methods, namely SVM, Naive Bayes, and LSTM. Based on the analysis of the twitter data, it was found that the twitter community in Indonesia gave negative sentiments to government policies in handling Covid 19. From the experimental results, it was found that SVM gave the best sentiment results compared to Naïve Bayes and LSTM by providing an accuracy of 88.5%. |
76 | Please write an abstract with title: III-V solar cells transferred to flexible substrates based on Cu, and key words: Costs, Photovoltaic cells, Contacts, Production, Epitaxial growth, Microelectronics, Copper. Abstract: High efficiency solar cells are produced on expensive rigid substrates, but indispensable as a crystallographic base and mechanical support in the production of the monocrystalline active layer. However, after obtaining the solar cell, the original substrate is completely unnecessary, as it does not exert any functionality in the cell. In this way, there is a growing interest in technologies that allow the commercialization of solar cells on light, flexible and low-cost substrates, expanding not only the range of applicability, but also reducing production, transport and installation costs. This communication describes the development of a general methodology for the transfer process of complete solar cell structures of III-V materials, epitaxially grown by Metal Organic Vapor Phase Epitaxy, to flexible copper substrate obtained by electrodeposition and to copper adhesive tape. The transfers were successfully carried out, without damaging the structure and electrical contacts of the cells. Moreover, the figures of merit of the solar cells showed only slight changes following the transfer procedure to the flexible substrates. |
77 | Please write an abstract with title: Modification of Initialization Vector for Parallel CMAC Algorithm, and key words: Advanced Encryption Standard, Field Programmable Gate Array, Initialization Vector, Parallel Cipher-based Message Authentication Code. Abstract: The growing number of threats and attacks on communication systems has encouraged researchers to identify methods for providing security for data communication. Besides the encryption and authentication algorithms provide data security services for communication systems. However, the recent attacks on communication systems reveal that the attacks utilize the analysis of plaintext/ciphertext to breach the security of communication systems. Therefore, the plaintext should be randomized to prevent correlation between ciphertext. In this work, an algorithm is proposed for increasing ciphertext randomness in Parallel Cipher-based Message Authentication Code (PCMAC) Algorithm. The proposed algorithm utilizes the high throughput of PCMAC authenticated encryption algorithm for providing high throughput and more randomized ciphertext. The proposed algorithm is implemented for generation of Initialization Vector (IV) using the GEFFE generator and right shift operation for creating randomness in the ciphertext. The comparisons result show that the proposed implementation is more randomized as compared to the previous implementation. |
78 | Please write an abstract with title: Generative Modelling of Semantic Segmentation Data in the Fashion Domain, and key words: Image segmentation, Semantics, Generators, Training, Generative adversarial networks, Gallium nitride, Computer vision. Abstract: In this work, we propose a method to generatively model the joint distribution of images and corresponding semantic segmentation masks using generative adversarial networks. We extend the Style-GAN architecture by iteratively growing the network during training, to add new output channels that model the semantic segmentation masks. We train the proposed method on a large dataset of fashion images and our experimental evaluation shows that the model produces samples that are coherent and plausible with semantic segmentation masks that closely match the semantics in the image. |
79 | Please write an abstract with title: Impact of the Expressia Platform on a Child with Autism Spectrum Disorder: Case Study, and key words: Computers, Autism, Education, Tools, Reflection. Abstract: This research work has as its theme the Impact of the Expressia platform on a Child with Autism Disorder. More and more importance has been given to intervention using technological support tools for children with Autism Spectrum Disorder (AEP). With this work, it is intended to contribute to the reinforcement of intervention intervention using the Expressia tool in the (AEP).. The methodological part of this work is directed towards observation, study, description and finding solutions for the case of Orlanda (fictitious name) a 9-year-old child with(AEP)., while using the Expressia tool. The work developed here intends to collaborate for a better reflection on the use of Expressia in children with(AEP)., so that each time more adequate and effective functions are achieved. Thus, and considering what was observed during the intervention, it can be mentioned that the use of this tool, in this student, improved her communication and learning skills. |
80 | Please write an abstract with title: CSR Strategies, Investment Efficiency and Sustainable Growth, and key words: Economics, Technology management, Law, Databases, Conferences, Legislation, Companies. Abstract: This paper aims to explore the relationship among CSR activities, investment efficiency and sustainable value. The sample includes 119 Italian certified Benefit Corporations extracted from B-Lab database at August 2021. Adopting the OLS regression model, the analysis aims to verify what CSR strategies push the firm to invest more efficiently and if a good resource allocation could shift from the profit value to social value. |
81 | Please write an abstract with title: Circuit modeling methodology for UWB omnidirectional small antennas, and key words: Circuits, Ultra wideband antennas, Receiving antennas, Transmitting antennas, Frequency dependence, Transmitters, Ultra wideband technology, Filters, Voltage, Resistors. Abstract: In ultra-wideband (UWB) systems, antennas act as filters that introduce a frequency dependent response from the transmitter to receiver. To capture the waveform dispersion so that one can equalize/compensate at the transmitter/receiver, a new circuit modeling methodology that handles omnidirectional small antennas is proposed. By transforming the antennas into the degenerated Foster canonical forms and utilizing the waveform-omnidirectional property, it is shown that the transmitted far field waveform is a scaled version of the voltage across the radiation resistor in the model. Extended Thevenin/Norton equivalent circuits with dependent sources tracking the frequency dependence of the antenna effective length are also built for UWB receiving antennas. Simulation and experimental results show that this methodology is effective over a wide bandwidth and suitable for modeling most UWB antennas. |
82 | Please write an abstract with title: Multi-agent formation control method under communication interruption, and key words: Conferences, Control systems, Mathematical models, Safety, Information technology, Matlab. Abstract: In this paper, the multi-agent coherent formation algorithm is studied. Taking the UAV system as an example, we first model the system and briefly describe the algorithm used, and then, for the coherent formation control algorithm under the communication interruption, we present the algorithm for the coherent formation control. This method is simulated using MATLAB and the results are also compared with those without this method to draw conclusions. The algorithm in this paper is more robust and the introduction of virtual intelligences can compensate well for the impact of communication interruption on the system. |
83 | Please write an abstract with title: Automated Analysis of Wound Healing Microscopy Image Series - A Preliminary Study, and key words: Wounds, Microscopy, Drugs, Optical microscopy, Optical imaging, In vitro, Image segmentation. Abstract: Collective cell analysis from microscopy image series is important for wound healing research. Computer-based automation of such analyses may help in rapid acquisition of reliable and reproducible results. In this study phase-contrast optical microscopy image series of an in-vitro wound healing essay is manually delineated by two experts and its analysis is realized, traditional image processing and deep learning based approaches for automated segmentation of wound area are developed and their performance comparisons are carried out. |
84 | Please write an abstract with title: LPV-based Cascade Control for Three Mode Non-inverting Buck-Boost Converter, and key words: Switches, Steady-state, Employee welfare, Inductors, Load modeling, Matrix converters. Abstract: Distributed energy resource (DER) has a wide operation range, fluctuating with particular working condition. To deal with the wide working range, non-inverting Buck-Boost Converter (NIBB) has been adopted for power conversion. It can work in Buck mode, Boost mode and Buck-Boost mode with flexible voltage conversion capability. At the same time, three mode operation of NIBB poses new challenge to existing modeling and control method. Each working mode has its' unique dynamic property. Conventional small-signal model fails to consider the multiple working modes. To describe converter dynamic property under three mode operation, NIBB is first modeled as linear-parameter-varying (LPV) system. Based on the LPV system, cascade control is synthesized through linear matrix inequity (LMI) approach. Influences of polytopic covering selection on NIBB control design is evaluated. The analysis results are validated by comparative simulations results. |
85 | Please write an abstract with title: 3.3 kV SiC JBS diodes employing a P<inf>2</inf>O<inf>5</inf> surface passivation treatment to improve electrical characteristics, and key words: Temperature measurement, Schottky diodes, Voltage measurement, Silicon carbide, Schottky barriers, Metals, Tungsten. Abstract: 3.3 kV Schottky barrier diodes and Junction Barrier Schottky diodes have been fabricated, employing a phosphorous pentoxide $\left(P_{2}O_{5}\right)$ surface treatment prior to metal deposition in an attempt to further condition the power device’s interface. For SBD structures, the treatment consistently reduces the leakage current in molybdenum, tungsten and niobium SBDs, for the tungsten treatment by more than four orders of magnitude. X-ray photoelectron spectroscopy (XPS) analysis on the treated SBD interface revealed formation of a metal phosphate between $P_{2}O_{5}$ and the metal. When compared to an untreated sample, the $P_{2}O_{5}$ treatment has increased the valence band to fermi level offset by 0.2 eV to 3.25 eV, indicating that the treatment results in a degenerately n-doped SiC surface. When applied to fully optimised 3.3 kV JBS power structures utilizing a hybrid JTE design, $P_{2}O_{5}$ treatments improved blocking capabilities across the entire dataset by as much as 1,000 V. |
86 | Please write an abstract with title: Controlling the Interior of Greenhouses using Elman Recurrent Neural Network, and key words: Greenhouses, Humidity, Neurons, Predictive models, Wind speed, Data acquisition, Sensors. Abstract: This work proposed Elman recurrent neural network prediction model for predicting greenhouses' interior temperature and relative humidity using four input parameters, viz., wind velocity, carbon dioxide concentration, outside temperature and humidity. Implementing a data acquisition technique we have gathered real time data for each of the parameters. The data was harvestedfrom the greenhouse found inside the premises of the Ethiopian Environmental and Forest Research Institute which is used to develop the model. Generally, 18000 data was collected and processed to develop the model using the Elman Recurrent Neural Network (ERNN). Analysis of several selection criteria has been done to decide the number of neurons in the hidden layer. After evaluating the performance by fixing the hidden neuron using convergence theorem we got a better mean square error of 0.0218 in turn showing98% accuracy of the proposed prediction model. |
87 | Please write an abstract with title: MalBERT: Malware Detection using Bidirectional Encoder Representations from Transformers, and key words: Deep learning, Codes, Conferences, Static analysis, Computer architecture, Transformers, Malware. Abstract: In recent years we have witnessed an increase in cyber threats and malicious software attacks on different platforms with important consequences to persons and businesses. It has become critical to find automated machine learning techniques to proactively defend against malware. Transformers, a category of attention-based deep learning techniques, have recently shown impressive results in solving different tasks mainly related to the field of Natural Language Processing (NLP). In this paper, we propose the use of a Transformers architecture to automatically detect malicious software. We propose MalBERT, a model based on BERT (Bidirectional Encoder Representations from Transformers) which performs a static analysis on the source code of Android applications using preprocessed features to characterize existing malware and classify it into different representative malware categories. The obtained results are promising and show the high performance obtained by Transformer-based models for malicious software detection. |
88 | Please write an abstract with title: Blockchain And Legal Protection of Copyright Technical Protection Measures for Publications in the Internet Era, and key words: Cloud computing, Law, Copyright protection, Maintenance engineering, Blockchains, Reliability. Abstract: In today’s difficult digital copyright era, the communication revolution driven by Internet technology has caused problems such as the weakening of the value foundation of publication copyright works, the proliferation of copyright infringement, and the weakening of copyright awareness. Blockchain is a decentralized and trustless maintenance data. Reliable technology is therefore considered to be the "life-saving straw" for publication copyright. This article uses blockchain technology to re-examine and improve publication copyright protection and legal application in the new era of the Internet, and build a system of balance and integration of publication copyright protection and blockchain technology. |
89 | Please write an abstract with title: Small-Signal Model of a High-Power-Factor, Three-Phase AC-DC Converter with High-Frequency Resonant Current Injection, and key words: AC-DC power converters, Resonance, RLC circuits, Frequency conversion, Rectifiers, Resonant frequency, Pulse width modulation converters, Voltage, Equations, Electronic mail. Abstract: The derivation and validation is described of a small-signal model for a high-power-factor, three-phase AC-DC converter that uses high-frequency resonant current injection. Fundamental frequency techniques are used to model the high frequency resonant stage of the system, whilst a d-q transformation is used to eliminate the time varying switching functions in the input rectifier stage. The model is linearised under small-signal conditions and the results are validated by comparison with detailed micro-cap simulations and measurements from a 2 kW prototype |
90 | Please write an abstract with title: Elastica: A Compliant Mechanics Environment for Soft Robotic Control, and key words: Robots, Soft robotics, Computational modeling, Robot kinematics, Mathematical model, Context modeling, Manipulators. Abstract: Soft robots are notoriously hard to control. This is partly due to the scarcity of models and simulators able to capture their complex continuum mechanics, resulting in a lack of control methodologies that take full advantage of body compliance. Currently available methods are either too computational demanding or overly simplistic in their physical assumptions, leading to a paucity of available simulation resources for developing such control schemes. To address this, we introduce Elastica, an open-source simulation environment modeling the dynamics of soft, slender rods that can bend, twist, shear, and stretch. We couple Elastica with five state-of-the-art reinforcement learning (RL) algorithms (TRPO, PPO, DDPG, TD3, and SAC). We successfully demonstrate distributed, dynamic control of a soft robotic arm in four scenarios with both large action spaces, where RL learning is difficult, and small action spaces, where the RL actor must learn to interact with its environment. Training converges in 10 million policy evaluations with near real-time evaluation of learned policies. |
91 | Please write an abstract with title: Science on a Shoestring - Research Vessel Conversion, and key words: Boats, Costs, Petroleum industry, Government, Drugs, US Department of Defense, Positron emission tomography, Aluminum, Inspection, Power capacitors. Abstract: One of the challenges teaching institutions in oceanography face is to provide students meaningful sea time, given the very high costs of research vessel acquisition and operations. One approach to this problem is conversion. When a vessel built for one purpose is later dedicated to another, however, substantial alteration is usually necessary. Such was the case when F.I.T. accepted a 95' Vietnam era patrol boat to convert to a coastal research vessel for teaching and funded research. This paper highlights some of the political, engineering, and financial considerations that attend such a venture, and offers some unsolicited advice to those who would go and do likewise. |
92 | Please write an abstract with title: Tilt angle and dose rate monitoring of low energy ion implantation processes with photomodulated reflectance measurement : AM: Advanced Metrology, and key words: Implants, Ion implantation, Sensitivity, Reflectivity, Measurement by laser beam, Ions, Ion beams. Abstract: Photo-modulated reflectance measurements provide a powerful, non-contact, non-destructive and inline-compatible method with low-cost operation for statistical process control of ion implantation steps on monitor and on product wafers. We present case studies describing how photo-modulated reflectivity measurements (PMR) can be used for ion implantation dose, fluence and tilt angle monitoring with excellent resolution, even for low-energy ion implantation processes. This is important because precise dopant and damage profile control is crucial in state-of-the art semiconductor processes utilizing shallow junctions and complex 3D doping profiles. |
93 | Please write an abstract with title: Oxygen monitor and control system for US navy deep diving system MK2 MOD 1, and key words: Control systems, Biomembranes, Pressure control, Proportional control, Cathodes, Electrodes, Gas detectors, Sensor systems, Atmospheric measurements, Valves. Abstract: Until recently, the limiting parameter in the design of hyperbaric life support systems has been the method of oxygen partial pressure control. This paper describes in detail a control system incorporating a new oxygen sensor especially designed for prolonged exposure to high pressures followed by rapid decompression. The electronics control system incorporates triple redundant oxygen level measurement, output limiting, and system disabling in the event of malfunction. In addition, a sampled data control system for controlling oxygen levels in small volumes, such as a closed cycle diver rebreather, is discussed. |
94 | Please write an abstract with title: Spatiotemporal Prediction Using Hierarchical Bayesian Modeling, and key words: Gaussian processes, Predictive models, Tools, Bayes methods, Spatiotemporal phenomena, Covariance matrices, Forecasting. Abstract: Hierarchical Bayesian models (HBM) are powerful tools that can be used for spatiotemporal analysis. The hierarchy feature associated with Bayesian modeling enhances the accuracy and precision of spatiotemporal predictions. This paper leverages the hierarchy of Bayesian models using the Gaussian process to predict long-term traffic status in urban settings. The Gaussian process is used with different covariance matrices: exponential, Gaussian, spherical, and Matérn to capture the spatial correlation. Performance evaluation on traffic data shows that the exponential covariance yields the best precision in spatial analysis with the Gaussian process, while the Gaussian covariance outperforms the others in temporal forecasting. |
95 | Please write an abstract with title: Control of the coalescence phenomena in InAs/GaAs quantum dots by using high-index planes, and key words: Gallium arsenide, Quantum dots, US Department of Transportation, Annealing, Atomic force microscopy, Surface morphology, Atomic layer deposition, Physics, Astronomy, Multilevel systems. Abstract: Summary form only given. Two different series of samples were examined with atomic force microscopy (AFM). In the first series of structures (S), an InAs layer of average thickness L = 2.3 MLs was deposited on a GaAs buffer layer at a temperature of 500/spl deg/C. Samples with different substrate orientation, i.e. [100]-, [311]B-, [411]B- and [511]A- orientation, were grown in the same run. Samples of the second series (A) were grown in the same way as those in series S, but were thermally annealed at 530/spl deg/C for 90 seconds. We also explore the possibility of using the [311]B QDs for opto-electronic applications by photoluminescence (PL) studies. |
96 | Please write an abstract with title: Dynamic deployment modeling tool for photolithography WIP management, and key words: Lithography, Semiconductor device modeling, Performance loss, Resists, Semiconductor device manufacture, Performance analysis, Feedback, Feeds, Load modeling, Predictive models. Abstract: In semiconductor manufacturing, according to Marcoux et al. (1999) tool deployment has been identified as a key factor driving capacity loss and lower operational efficiency. In most cases, the losses are uncovered by analysis of Cycle Time data and investigation of specific tool performance. For the photolithography sector, this feedback approach often highlights problems after they may have already past or have been fixed. This paper will discuss a feed forward model for managing deployment of a large fleet of photolithography tools. This model predicts tool loading using existing tool planning parameters, actual and forecast wafer start data and extensive turn-around-time matrices. The model provides a portable tool with immediate readout of various loading scenarios. The deployment decision process makes use of these simulations. The model output comes in the form of graphs and tables that can summarize load by tool, tool groups, resist groups, technologies, and levels at various time slices. The output identifies where tool qualifications or additional resists may be needed, and deployment adjustments for WIP balance is warranted. These changes prevent operational efficiency loss and maintain cycle time performance. |
97 | Please write an abstract with title: Identification of Nutrient Deficiency in Rice Leaves using DenseNet-121, and key words: Crops, Machine learning, Phosphorus, Nitrogen, Potassium, Standards, Testing. Abstract: India is renowned for rice farming. Rice as a most important crop has a huge bang on people's health since many cultivate it for a living, it provides jobs, and many small industries are dependent on its cultivation. There is a risk of significant losses due to various diseases and pets that can affect this planting. With the help of modern science and technology a number of research projects and methods are proposed to improve rice yields. In the plant nutrient system, leaf uniqueness varies according to potassium (K) phosphorus (P), and nitrogen (N) dietary pressures. Here we imported the dataset and performed data augmentation to enhance the mass of dataset and to obtain more accuracy. Then we applied DenseNet-121 which is one of the DenseNet group of models designed to perform image classification. It is then evaluated with Adam, RMSprop, Gradient descent optimizers which has given 95.40%, 98.49%, 93.50% of accuracy. This entire approach is done to identify the type of fertilizer that should be used in order to increase the yield of crop. |
98 | Please write an abstract with title: Influence of arrival wave with amplitude variation on autocorrelation and frequency correlation coefficients in wideband mobile propagation, and key words: Autocorrelation, Wideband, Bandwidth, Computer simulation, Propagation delay, Mobile communication, Fading, Frequency diversity, Rayleigh channels, Radio frequency. Abstract: We had investigated autocorrelation and frequency correlation coefficients of an instantaneous received signal level with bandwidth, one of the basic wideband propagation characteristics in mobile communications, by using a delay profile model with invariable arrival wave amplitude. However, the arriving wave amplitude in an actual field was known to vary with the movement of the receiving point. We clarify the dependence of the correlation coefficients on the amplitude variation of the arriving waves by using computer simulations. Our results show that the autocorrelation coefficient is independent of the amplitude variation in the arriving wave. Furthermore, the frequency correlation coefficient increases because of the median variation in the received level. |
99 | Please write an abstract with title: Non cooperative path characterization using packet spacing techniques, and key words: Shape measurement, Performance evaluation, Bandwidth, Size measurement, Protocols, Telecommunication traffic, Particle measurements, Chirp, Testing, Internet. Abstract: Non cooperative network path measurements assume that there is no cooperation from the other end of a path. Such methods have to cleverly exploit standard protocol options to initiate probing traffic. Performing measurements in this framework for the 'reverse path' is particularly challenging. We describe the design of iPathmeter2, non cooperative tool to measure capacity and available bandwidth on the reverse path. The probing traffic of iPathmeter2 consists of a chirp of packet-pairs with appropriate spacing. The spacing between the ACKs from the measuring host and the size of the advertised receive window help shape the transmitting pattern from the remote host to the measuring node. Thus, iPathmeter2 adapts the existing cooperative packet spacing techniques for reverse path, non-cooperative measurements. A utilization based estimator for the available bandwidth is also described. iPathmeter2 is validated by performing measurements under controlled conditions. Results from live tests on the Internet are also reported. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.