ID
int64
0
400k
content
stringlengths
97
5.85k
399,900
Please write an abstract with title: Enhancing Reliability-Aware Speedup Modelling via Replication, and key words: Program processors, Checkpointing, Upper bound, Reliability theory, Computational modeling, Fault tolerance. Abstract: Reliability-aware speedup models study the expected speedup of a parallel application as a function of the number of processors, on a platform susceptible to processor failures. Existing works in this area have developed models using checkpoint-restart (without replication) as the only fault tolerance mechanism, and have studied the upper bound on the number of processors beyond which the application speedup starts to degrade due to increasing likelihood of failure. In this work, we develop speedup models in which replication, specifically dual replication, is also employed for resilience. We demonstrate that the upper bound on the number of processors to execute a perfectly parallel application using dual replication is of the order λ^-^2 where λ is the individual processor failure rate. We also compare the dual replication model with that of no-replication. Specifically, we found that, given the same hardware resources, replication starts offering better speedup just before the upper bound on the number of processors for no-replication is reached. Taken together, our results indicate that replication can significantly enhance reliability-aware speedup models by i) pushing the number of processors that yield the optimal speedup to a much higher value than what is possible without replication, and ii) improving on the optimal speedup possible through checkpoint-restart alone.
399,901
Please write an abstract with title: Vision-based SLAM using natural features in indoor environments, and key words: Simultaneous localization and mapping, Indoor environments, Cameras, Phase estimation, Feature extraction, Sensor systems, Motion measurement, Position measurement, Particle measurements, Robot motion. Abstract: This paper presents a practical approach to solve the simultaneous localization and mapping (SLAM) problem for autonomous mobile platforms by using natural visual landmarks obtained from an stereoscopic camera. It is an attempt to depart from traditional sensors such as laser rangefinders in order to gain the many benefits of nature-inspired information-rich 3D vision sensors. Whilst this makes the system fully observable in that the sensor provide enough information (range and bearing) to compute the full 2D estate of the observed landmarks from a single position, it is also true that depth information is difficult to rely on, particularly on measurements beyond a few meters (in fact the full 3D estate is observable, but here robot motion is constrained to 2D and only the 2D problem is considered). The work presented here is an attempt to overcome such a drawback by tackling the problem from a partially measurable SLAM perspective in that only landmark bearing from one of the cameras is employed in the fusion estimation. Range information estimates from the stereo pair is only used during map building in the landmark initialization phase in order to provide a reasonably accurate initial estimate. An additional benefit of the approach presented here lies in the data association aspect of SLAM. The availability of powerful feature extraction algorithms from the vision community, such as SIFT, permits a more flexible SLAM implementation separated from feature representation, extraction and matching, essentially carrying out matching with minimal recourse to geometry.
399,902
Please write an abstract with title: An Extended Spatial Transformer Convolutional Neural Network for Gesture Recognition and Self-Calibration Based on Sparse sEMG Electrodes, and key words: Gesture recognition, Electrodes, Convolutional neural networks, Transformers, Muscles, Feature extraction, Calibration. Abstract: sEMG-based gesture recognition is widely applied in human-machine interaction system by its unique advantages. However, the accuracy of recognition drops significantly as electrodes shift. Besides, in applications such as VR, virtual hands should be shown in reasonable posture by self-calibration. We propose an armband fusing sEMG and IMU with autonomously adjustable gain, and an extended spatial transformer convolutional neural network (EST-CNN) with feature enhanced pretreatment (FEP) to accomplish both gesture recognition and self-calibration via a one-shot processing. Different from anthropogenic calibration methods, spatial transformer layers (STL) in EST-CNN automatically learn the transformation relation, and explicitly express the rotational angle for coarse correction. Due to the shape change of feature pattern as rotational shift, we design the fine tuning layer (FTL) which is able to regulate rotational angle within 45°. By combining STL, FTL and IMU-based posture, EST-CNN is able to calculate non-discretized angle, and achieves high resolution of posture estimation based on sparse sEMG electrodes. Experiments collect frequently-used 3 gestures of 4 subjects in equidistant angles to evaluate EST-CNN. The results under electrodes shift show that the accuracy of gesture recognition is 97.06%, which is 5.81% higher than CNN, the fitness between estimated and true rotational angle is 99.44%.
399,903
Please write an abstract with title: Thermodynamic Stabilization via Energy Dissipating Hybrid Controllers, and key words: Thermodynamics, Control systems, Potential energy, Power system dynamics, Energy dissipation, Control system analysis, Control design, Aerodynamics, Aerospace engineering, Shape control. Abstract: A novel class of fixed-order, energy-based hybrid controllers is proposed as a means for achieving enhanced energy dissipation in Euler-Lagrange, port-controlled Hamiltonian, and lossless dynamical systems. These dynamic controllers combine a logical switching architecture with continuous dynamics to guarantee that the system plant energy is strictly decreasing across switchings. The general framework leads to closed-loop systems described by impulsive differential equations. In addition, we construct hybrid dynamic controllers that guarantee that the closed-loop system is consistent with basic thermodynamic principles. In particular, the existence of an entropy function for the closed-loop system is established that satisfies a hybrid Clausius-type inequality. Special cases of energy-based hybrid controllers involving state-dependent switching are described.
399,904
Please write an abstract with title: Performance Analysis of a Grid-Connected PV Park in Ruse, Bulgaria, and key words: Photovoltaic systems, Production, Performance analysis, Industrial plants, Sustainable development, Meteorology. Abstract: The sustainable development of the industrial sector strongly depends on its energy supply and efficiency. This study analyzes the performance of a PV park that was installed on the roof of an industrial plant in 2020. Its rated power is 194.93 kWp and contains a total of 565 PV modules. Using the available annual data for the energy production and consumption of the enterprise were performed a number of performance tests. The capacity factor varies from 2.42% during the winter to 21.48% during the summer months, with an average value of 11.54%. Similarly, the performance ratio varies from 52% to 83% for the different months with an average value of 70.44%. The obtained results indicate that the installed PV park is operating efficiently, considering the local climate characteristics.
399,905
Please write an abstract with title: Smart home automation system using Arduino microcontrollers, and key words: Temperature sensors, Temperature measurement, Temperature dependence, Automation, Smart homes, Ventilation, Sensor systems and applications. Abstract: The monitoring, control, and automation of the house became possible due to the advanced technology and the objects connected via the Internet (IoT). Home automation comes as a novelty for all those passionate about innovation and technology, allowing control of the different systems implemented. Another great utility and support for home automation are helping people with disabilities who would make their lives much easier, having the opportunity to control door closures, monitor the ventilation system, and the temperature using desktop applications or directly from the smartphone. This paper presents a scale model that represents a smart home, the LEDs are connected in series and programmed to switch off and on or each one at the same time. It uses actuators that have a fixed movement from 0 degrees to 180 degrees for closing and opening windows and doors, but it is also used as a door lock controlled and operated from the web application. The automation of the garage door using inductive sensors and the control for closing and opening of the web application is another function of the system. The temperature of the rooms inside and outside the house is monitored, but also control of a ventilation system for the interior - depending on the reading of the temperature variable, the whose set value will influence the ventilation system on or off. The ventilation system can be operated independently or manually, using the actuator buttons. A web application has been implemented, which represents the control panel, with the buttons for actuating the different systems, as well as the temperature monitoring. Also, two doors with stepper motor were automated, and contact sensors and presence sensors were used for control.
399,906
Please write an abstract with title: Capacity design of fast path restorable optical networks, and key words: Optical design, Optical fiber networks, Polynomials, Telecommunication traffic, Routing. Abstract: Service restorability is a key requirement in optical networks. This means that when wavelength paths are established. both a primary path and a secondary disjoint path have to be set-up, with the secondary path being used for service restoration upon primary path failure. The secondary path may possibly be shared for efficiency. The need for secondary paths imposed by the restorability requirement has to be explicitly taken into consideration in the capacity design of optical networks. However, to our knowledge, there does not exist any algorithm for network capacity design that explicitly accounts for fast restoration requirements. The contribution of this paper is the development of algorithms for optical network capacity determination with restoration being directly taken into account. The problem is formulated as a generalization of the maximum concurrent flow problem that includes restoration requirements for the two different restoration models which are commonly used in optical networks with fast restoration requirements. We then develop fully polynomial approximation schemes that solve the restorable network capacity design problem.
399,907
Please write an abstract with title: Managing sensor network configuration and metadata in ocean observatories using instrument pucks, and key words: Oceans, Observatories, Instruments, Communication cables, Humans, Automatic control, Automation, Information retrieval, Mars, Workstations. Abstract: Cabled observatories, such as MARS or the regional scale cabled observatory system planned for in the NSF Ocean Observatories Initiative (OOI), consist of many deployed instruments that communicate with human operators and shore-side data repositories. In addition, these deployed devices may actually communicate with one another, facilitating capabilities such as autonomous event response. These potentially complex interactions between multiple entities - human and machine - require that knowledge of the system configuration be available to participants. Users of instrument data require information - metadata - about the sensor that generated the data. Software that coordinates and controls instruments requires access to the software interfaces of those devices. "Manual configuration" has been used on small-scale systems, but in a network consisting of hundreds or thousands of instruments, the configuration challenge becomes critical. We propose to address the problem through automation of the configuration process; which will be achieved at several levels. Automated configuration will simplify the system operator's task of building and maintaining the observatory network. We describe a small, low-powered information storage device that we call a "instrument puck". When plugged into a suitable computer (lab workstation, deployed observing node), information can be written to or read from the puck. While an instrument is being prepared for initial integration into observatory, a technician "loads" a puck with information necessary to configure the instrument within the observatory, and then physically attaches the puck to its instrument. Thereafter the attached puck always travels with its instrument, no matter where it is being installed in the observing network. The information loaded into the puck encompasses whatever is necessary to enable automatic configuration and system integration of the instrument when it is plugged into the observatory network, and any other information required by observatory policies. This information may include structured descriptions of the instrument's sensor and data characteristics (metadata). The information can also include actual software code that is retrieved from the puck and executed by an observatory node when the device is plugged in; this code could implement distributed instrument control and data retrieval interfaces, allowing network-wide access to the instrument functionality. We believe the puck concept to be a powerful one, a given instrument puck is configured just once; enabling automatic configuration of its instrument no matter it is installed on the network thereafter. We also describe mechanisms by which an instrument and its puck can be "discovered" by the observatory network when the devices are plugged in. Several approaches are explored, with varying degrees of automation. We evaluate these approaches with special consideration to electrical and safety aspects of the undersea environment. Information and results from our prototyping efforts are also presented.
399,908
Please write an abstract with title: Linearization of RoF Optical Source by using Light-injected Gain Modulation, and key words: Optical modulation, Optical attenuators, Radio frequency, Optical feedback, Optical filters, RF signals, Nonlinear optics, Optical distortion, Phase shifters, Optical fiber communication. Abstract: We presented a novel scheme for linearization of optical source in radio-over-fiber system. The linearization scheme consists of RF attenuator, RF phase shifter, and a different light source for the purpose of reducing the third order intermodulation products (IMD3). We experimentally demonstrated two tone SCM optical links where linearization scheme was applied. With optimizing the phase amount and IMD3 intensity from a different LD source, we obtained optimal condition, which results in reducing carrier to IMD3 ratio of 30dBc.
399,909
Please write an abstract with title: Designing Ecosystem Business Models: a Multi-Proj ect Approach, and key words: Biological system modeling, Ecosystems, Process control, Conference management, Large-scale systems, Business, Investment. Abstract: The author considers the controlled process of designing and functioning ecosystem business models, carried out by applying a multi-project approach, which implies the formation of conjugated and complementary projects that are implemented in a complex manner. A model for creating and managing an ecosystem and a methodical approach for evaluating the effectiveness of an ecosystem's functioning is proposed.
399,910
Please write an abstract with title: Hybrid Semi-Dense 3D Semantic-Topological Mapping From Stereo Visual-Inertial Odometry SLAM With Loop Closure Detection, and key words: Semantics, Three-dimensional displays, Simultaneous localization and mapping, Cameras, Navigation, Autonomous robots, Optimization. Abstract: Intelligent mobile vehicles asks for the ability to learn to comprehend immediate surroundings similar to human cognition and autonomously navigate in an unknown scene. Although simultaneous localization and mapping (SLAM) can construct a geometrically surrounding map, the map contains little semantic information. This paper presents a novel stereo visual-inertial system with loop closure detection based on a semantic-topological map framework. In our system, a hybrid 3D point cloud semantic-topological mapping framework is used to realize autonomous navigation simply by providing a map for path planning and meanwhile for storing semantic information under a dynamic environment. A stereo visual-inertial system can obtain more accurate visual-inertial odometry than a monocular system, and a visual-inertial system is capable of real-time map correction when the localization module detects a loop closure. This paper adopts state-of-the-art Mask R-CNN components to obtain 2D semantic information and project it to a semi-dense 3D semantic-topological map built by stereo visual-inertial SLAM. We perform experimental evaluation of our proposed system on the EuRoC MAV datasets and we also compare it with other competitive methods. Our results demonstrate that the proposed method is more effective than the other competitive methods.
399,911
Please write an abstract with title: New solutions for high frequency electronic packaging, and key words: Frequency, Electronics packaging, Apertures, Electronics cooling, Vents, Testing, Electromagnetic shielding, Telecommunications, Electromagnetic measurements, Information technology. Abstract: A new concept for shielded enclosures of electronics is presented in this paper. An inexpensive doubled heat sink in extruded aluminum forms the base of the enclosure. The electronics are inserted into one part and is enclosed by a complementary shielding surface. The outer heat sink is cooled by forced ventilation. As openings are made redundant, seams between the parts of the enclosure are the only path for significant electromagnetic emissions. EMC-issues are also addressed in this paper; seams are modeled and simulated as short wave guides intercepted by screw joints. The simulations were carried out in CST Microwave Studio.
399,912
Please write an abstract with title: A Josephson sampler with 2.1 ps resolution, and key words: Sampling methods, Oscilloscopes, Signal resolution, Pulse circuits, Pulse generation, Laboratories, Niobium, Propagation delay, Inductance, Voltage. Abstract: A Josephson sampler with 2.1 ps resolution is reported. The sampler was made with Nb edge junctions, and consists of a sampling junction to which a Faris pulser is coupled directly. Two experiments are connected to the sampler: a two-junction interferometer and another Faris pulser. A new and simple electronic delay allows a flicker-free display on an oscilloscope of the waveform sampled. A current sensitivity of 0.8 μA was achieved. It was possible to measure the switching transitions of the two-junction interferometer over its whole vortex boundary, including vortex-to-vortex transitions which occur at low bias currents. To our knowledge, this is the fastest Josephson sampler made to date.
399,913
Please write an abstract with title: An Alternative to the Exponential and Weibull Reliability Models, and key words: Mathematical models, Reliability engineering, Data models, Computational modeling, Predictive models, Transforms, Microcomputers, Oscillators. Abstract: The two reliability models most widely used in engineering applications are the exponential and the Weibull. Both models are deficient because their failure rates do not conform to the bathtub curve nor specify the infant mortality period. In addition, Weibull applications require lifetime data which entails testing or field observations and is usually proprietary. The advantage of the exponential model is that it can be supported by both lifetime and MIL handbook data, the latter being publicly available. In this article, an alternative single parameter model—called lifetime—is formulated whose failure rate conforms to the shape of an asymmetric bathtub curve. It is shown that, unlike present multiparameter bathtub curve models, the alternative model can be supported by MIL handbook data. The reliability ramifications of the alternative model will be demonstrated through three applied examples: engine fan, microcomputer, and crystal oscillator. The data supportability claim is substantiated by constructing an estimation procedure demonstrated in the microcomputer and crystal oscillator examples. Calculations will show that both the exponential and Weibull models predict twice as many engine fan failures as the article model. For the microcomputer example, the exponential model gives three and one-half times as many faults.
399,914
Please write an abstract with title: Dataflow Management Platform for Smart Communities using an Edge Computing Environment, and key words: Industrial electronics, Data privacy, Privacy, Smart cities, Computational modeling, Data models, Regulation. Abstract: As various data services are provided to realize Society 5.0, the usage of personal data is estimated to increase along with the explosive increase in data traffic. It is important that the protection of privacy keeps pace with increases in the exchange of data containing personal information. Starting from the enforcement of the General Data Protection Regulation (GDPR), stricter privacy protection regulations are expanding to more countries. These restrictions require that personal data should be hidden or anonymized before they are propagated over the network. The secondary usage of data is assumed in smart communities, and systems that can protect privacy are required for secure network infrastructures. In this study, we propose an edge-based computing platform that manages the privacy of users on the network of a smart community. For the platform, we prepared three models: The Basic, Preceding Packet, and Piggyback models. These are considered OpenFlow models, and the network efficiency for each was evaluated.
399,915
Please write an abstract with title: Methodology for the Development of Broadband Multilayer Microwave Absorbers, and key words: Power transmission lines, Magnetic multilayers, Meetings, Bandwidth, Nonhomogeneous media, Microwave theory and techniques, Reflection coefficient. Abstract: In this work, a methodology is proposed to optimize the parameters of the multilayer microwave absorber (MMA), such as thickness and selection of materials to obtain the desired reflection coefficient bandwidth (RCBW). The transmission line method is used to compute the absorption bandwidth. The aim is to obtain the broadband MMA operating in the frequency range from 1 to 20 GHz. Consequently, genetic algorithm (GA) is employed to optimize the parameters of MMA. Moreover, the proposed methodology is implemented by using a database of the lossy magnetic and dielectric which are commercially available materials. For an example, two layers of MMA are optimized and computed the desired RCBW, where the level of RC is varied from −5 to −10 dB.
399,916
Please write an abstract with title: Model of the electromagnetic power pattern of the AIDS virus, and key words: Electromagnetic modeling, Acquired immune deficiency syndrome, Dipole antennas, Equations, Toroidal magnetic fields, Antenna arrays, Receiving antennas, Computer science, Mathematics, Biomedical engineering. Abstract: We designed an antenna model of the spherically distributed receptors of the HIV. The model consisted of a combination of electric Hertzian dipole and magnetic dipole antennas. We derived field equations for a 72-element spherical array of electric dipoles, and field equations for a 72-element array of magnetic dipoles. We combined these equations using superposition to model the virus receptors as receiving antennas. The resulting power pattern showed definite maximums at 80- and 280-degree positions, suggesting the virus acted as a radar when scanning for objects such as foreign cells. This work extended results of treating the AIDS virus as an antenna.
399,917
Please write an abstract with title: Optimal Order Picking Route in Automotive Part Warehouse using Integer Programming, and key words: Integer programming, Technological innovation, Transportation, Traveling salesman problems, Mathematical models, Libraries, Automobiles. Abstract: Many factories are facing the problem of transportation time consumption. In the car assembly line, there are more than ten thousand parts to pick for assembling a single car. Order picking is the process which transport and collect the items in the warehouse to serve both internal and external customer. Consequently, this is generally known as the most consumed time in warehouse activities, especially in the traveling activity. Traveling Salesman Problem (TSP) is the technique which deals with finding the shortest route. This paper presents a mathematical model of TSP to minimize the traveled distance of pickers and provide the optimal sequence of order picking. Binary integer programming (BIP) is applied to solve the model. The MIP library is used as the problem solver which operates in Python. The case studies are introduced to demonstrate the solution quality of the proposed model. The result shows that order picking route is optimized by decreasing the distance traveled.
399,918
Please write an abstract with title: Designing adaptive educational Web sites: general framework, and key words: Web page design, Communications technology, Education, Educational institutions, Collaborative work, Laboratories, Proposals, Knowledge management, Software engineering, Feedback. Abstract: This paper proposes a general framework for the development of adaptive Web sites by showing its application to a real case study: Conexiones Santander Web site. The paper gives a brief introduction to Conexiones model and to other initiatives for the development of academic communities in Colombia, aiming to highlight the relevance of customised learning environments and the pertinence of applying adaptivity techniques to such environments. Additionally, this work illustrates some aspects of the modelling phase of the case study following the MAS-CommonKADS methodology emphasising on agent and expertise models.
399,919
Please write an abstract with title: CAR-Net: A Deep Learning-Based Deformation Model for 3D/2D Coronary Artery Registration, and key words: Arteries, Strain, Three-dimensional displays, Image segmentation, Bifurcation, Solid modeling, Detectors. Abstract: Percutaneous coronary intervention is widely applied for the treatment of coronary artery disease under the guidance of X-ray coronary angiography (XCA) image. However, the projective nature of XCA causes the loss of 3D structural information, which hinders the intervention. This issue can be addressed by the deformable 3D/2D coronary artery registration technique, which fuses the pre-operative computed tomography angiography volume with the intra-operative XCA image. In this study, we propose a deep learning-based neural network for this task. The registration is conducted in a segment-by-segment manner. For each vessel segment pair, the centerlines that preserve topological information are decomposed into an origin tensor and a spherical coordinate shape tensor as network input through independent branches. Features of different modalities are fused and processed for predicting angular deflections, which is a special type of deformation field implying motion and length preservation constraints for vessel segments. The proposed method achieves an average error of 1.13 mm on the clinical dataset, which shows the potential to be applied in clinical practice.
399,920
Please write an abstract with title: Analysis of unbalanced force for high-speed slotless permanent magnet machine with Halbach array, and key words: Magnetic analysis, Permanent magnet machines, Toroidal magnetic fields, Rotors, Permanent magnet motors, Magnetostatics, Fluctuations, Topology, Magnetic levitation, Traction motors. Abstract: This paper reports on the comparison of two types of high-speed slotless permanent magnet machines with the rotor eccentricity as the motor/generator for an electromechanical battery. Using a two-dimensional finite-element method, this paper deals with the magneto static field and unbalanced forces. Specifically, the advantages of Halbach array are discussed when the rotor has eccentricity.
399,921
Please write an abstract with title: Degradation of Electrical Contacts Caused by Oscillatory Micromotion Between the Contact Members, and key words: Degradation, Contact resistance, Temperature, Aluminum, Conductors, Chemicals, Conductivity, Surface resistance, Springs, Thermal expansion. Abstract: The influence of oscillatory movement on the contact resistance is discussed on the basis of experiments with contacts in a crossed rod configuration, the contact members being Al-Al and Cu-Cu. Measurements were carried out for movements of amplitudes within the range 0.4-18 µm and mechanical loads between 20-170 N at frequencies 10-100 cycles/h. The experimental results show that micromotion under certain conditions causes rapid and extensive degradation. For Al contacts with load 20 N, the resistance increases to 50 times the initial value after 200 cycles.
399,922
Please write an abstract with title: LuxCis/sup /spl reg// a new fiber optic interconnect solution, and key words: Optical fibers, Contacts, Connectors, Optical interconnections, Optical attenuators, Optical fiber cables, Optical design, Aerospace industry, Telecommunication standards, Testing. Abstract: LuxCis/sup /spl reg// is a new generation high density and high performance fiber optic interconnect solution. Designed specifically for aerospace and harsh environment applications, the LuxCis/sup /spl reg// is currently fielded on military and commercial platforms.
399,923
Please write an abstract with title: FDA Beampattern Synthesis With Both Nonuniform Frequency Offset and Array Spacing, and key words: Frequency diversity, Phased arrays, Couplings, Transmitting antennas, Signal to noise ratio, Radar imaging, Propagation losses. Abstract: The frequency diverse array (FDA) can generate a beampattern with dual dependence on angle and range by adding a smaller frequency component to the carrier frequency. To overcome the range-angle dependent in the classical FDA, several FDA frameworks with nonuniform frequency offset are proposed to obtain a dot-shaped beampattern. To obtain the dot-shaped beampattern with better performance, a symmetry FDA with both nonuniform frequency offset and array spacing is proposed. The symmetry nonuniform frequency offset is adopted to generate the dot-shaped beampattern, whereas the nonuniform array spacing is introduced to suppress sidelobes in the both range and angle directions. Numerical simulation results validate the improved performances of the proposed FDA in terms of the suppressed sidelobe level and the improved anti-interference ability, compared with the symmetric logarithmic frequency offset FDA.
399,924
Please write an abstract with title: New allocation technique for renewable power trading, and key words: Power markets, Power generation, Renewable energy resources, Production, Energy consumption, Wind energy, Biomass, Testing, Laboratories, Power systems. Abstract: A power marketer (PM), which is selling mixed energy, can have certain problems of allocating the power production of his generators to the power consumption of his customers. The generators are normally allocated in a special order according to some priority-grades that the PM gives them. The conventional ordering can result in an end situation where the composition of the power consumption, i.e. the energy mix, can not be fulfilled and/or unessential generators are allocated. A new technique, which makes it possible to do such allocation in an optimal way and hence get rid of the problems mentioned above, is introduced in this paper.
399,925
Please write an abstract with title: Information Systems Architecture Framework for National Official Statistics Organizations, and key words: Design methodology, Organizations, Production, Information technology, Information systems, Pragmatics. Abstract: Several studies in the area of Frameworks for Information Systems Architectures recommend carrying out additional research on the support of Information Systems Architectures to the organization's businesses, using models of reference frameworks. The subject is so important mainly with regard to the support of the architectural maturity model in National Organizations for Official Statistics. However, this research has not yet been carried out, which means that there is a gap in relation to scientific knowledge. This project, therefore, aims to conduct new research in order to build a new framework to address this issue, and thus contribute to knowledge. The design science research method was selected for this research, as it is suitable for design, in addition to its pragmatic and positivist character. Two organizations producing official statistics from two different countries (Portugal and Mozambique) were selected for the empirical study and the validation of the final result. The expectation is that the new framework allows technological solutions to meet the requirements of the organizations involved in the statistical production process, generating compliance and alignment with its strategic objectives and ensuring that Information Technology takes the right actions to deliver benefits in short time.
399,926
Please write an abstract with title: Personalized Estimation and Modification of Elbow Angular Displacement for Upper Limb Exoskeletons:A Fuzzy Logic-Based Approach, and key words: Actuator control, exoskeleton trajectory, fuzzy inference system, personalized trajectory, surface electromyography signals. Abstract: This study introduces an innovative method for estimating and modifying elbow angular displacement using surface electromyography (sEMG) signals, with the goal of achieving transparency between the wearer and upper limb exoskeleton robots while enhancing human mobility. The approach presented in this research offers a personalized control system that is driven by the user's preferences. The control system incorporates a fuzzy logic-based approach, which dynamically adjusts the estimated elbow angle based on the user's desired interaction with the rehabilitation device. Three distinct fuzzy systems are developed: a) one for estimating the joint angle trajectory, b) another for estimating the user's preferences, and c) a third system to control the angular displacement of the actuator. To evaluate the performance of the control strategy, an experimental setup is designed and tested using surface electromyography (sEMG) signal and external user input. The experimental results demonstrate that the proposed controller is capable of modifying the angle trajectory of the exoskeleton robot in accordance with the user's preferences
399,927
Please write an abstract with title: Ultrasound-enhanced drug delivery for efficient cancer therapy, and key words: Ultrasonic imaging, Drug delivery, Cancer, Medical treatment, Neoplasms, Nanoparticles, Mice, Suspensions, Polymers, Cells (biology). Abstract: Poor penetration of anti-cancer drugs through tumor vasculature and cancer cell membrane as well as slow diffusion of the drugs in the interstitium limit efficacy of cancer chemo- and biotherapy. Recently we proposed to use ultrasound-induced cavitation (formation, growth, and collapse of microbubbles) to enhance anti-cancer drug delivery through these barriers. Cavitation can be selectively induced in tumors by using interaction of ultrasound with nanoparticles that lower cavitation threshold and can be accumulated in tumors. In this paper, we measured cavitation threshold in water suspensions of polymer (polystyrene) nanoparticles and studied efficacy of cancer therapy in nude mice with the use of this technique. Experiments were performed at different irradiation conditions and concentration and size of nanoparticles. In vivo studies were conducted in nude mice bearing human colon (KM20) tumors at optimum conditions found in the experiments in water suspensions. Our studies demonstrated that: (1) polystyrene nanoparticles decrease cavitation threshold in water; and (2) application of this drug delivery technique substantially improve the efficacy of cancer therapy in nude mice when ultrasound was used in combination with polymer nanoparticle injections. Our results suggest that the ultrasound-induced cavitation enhances drug delivery in tumors and may provide efficient cancer chemo- and biotherapy.
399,928
Please write an abstract with title: Thermal Imaging for Rapid Noninvasive On-site Insulation Diagnostics, and key words: Discharges (electric), Cameras, Surface discharges, Partial discharges, High-voltage techniques, Corona. Abstract: High voltage electrical failures are dangerous and costly events in any type of power system. The troubleshooting and diagnostic time required to identify and locate these failures can be significant. Partial discharge is one of the early warning signs for electrical degradation. In insulation systems, partial discharge typically occurs in voids located within the dielectric, at material interfaces, or along energized electrode surfaces. Effective methods for finding this failure precursor enabling circumvention of future catastrophic events are highly valuable as successful detection can improve safety, reduce service interruptions, and result in significant financial savings. The presented method was successful in localizing the excess stress without direct line of sight, a clear advantage over night vision and corona cameras. The investigated methodology provides the ability for any user in varying on-site conditions to quickly and noninvasively diagnose the health of a component or device while maintaining safe clearance from energized parts.
399,929
Please write an abstract with title: N-Sliced Informed RRT*: Intelligent Sampling-Based Path Planning In High Eccentricity Informed Ellipsis, and key words: Industrial electronics, Service robots, Roads, Focusing, Approximation algorithms, Trajectory, Planning. Abstract: Many algorithms have been developed based on the Rapidly-exploring Random Tree (RRT). Among them, the Informed-RRT* stands out, because it aims to sample only a particular elliptical sub-region of the map to facilitate the optimal path convergence process. This way, it can find an optimal path in a shorter time by reducing the search area. However, this algorithm loses its benefits and acts similar to the the RRT* algorithm on multi-curve paths. In this study, we propose the n-Sliced Informed RRT*(nSIRRT*) to address this issue by dividing the reference path into a certain number of path segments and optimizing these segments one by one. Using this approximation, we addressed the convergence problem of Informed-RRT* in multi curved paths. Results showed that our method is more sample-efficient and converges the optimal trajectory faster than Informed-RRT* method. This method optimizes the path by focusing the sampling area around small segments on the path. Therefore generated trajectory converges optimal results faster.
399,930
Please write an abstract with title: Wearable Social Distancing Detection System, and key words: Temperature measurement, Microwave measurement, Microcontrollers, Human factors, Social factors, Acoustics, Pollution measurement, COVID-19. Abstract: The conventional method of keeping people at a safe distance in the Covid-19 Standard Operating System could not ensure everyone obeys the rule. An automatic social distancing system needs to be created to assist and train individuals to stay at a safe distance of at least 1 m. This paper proposes a wearable social distancing detector that uses a microcontroller with an ultrasonic sensor to detect the distance between two persons and provides a warning if the person fails to obey the rule. The system could perform social distancing detection accurately and can assist in the movement of people in an area.
399,931
Please write an abstract with title: Towards Surgical Tools Detection and Operative Skill Assessment Based on Deep Learning, and key words: Surgery, Feature extraction, Laparoscopes, Convolution, Convolutional neural networks, Real-time systems, Tensors. Abstract: Surgical tool detection and automatic operation skill assessment (AOSA) have important and extensive application scenarios in minimally invasive surgery (MIS). However, most of the deep learning methods currently used for surgical tool detection cannot achieve a good balance between speed and accuracy. We propose a new real-time detection algorithm for MIS tools, which called depth-wise separable convolutional network with convolutional long short-term memory (DSCNet-CLSTM). The network combines the advantages of the one-stage multi-scale feature maps’ concept in the state-of-art detection methods and the convolutional variant of the LSTM. This combination makes full use of the complementary information of spatial and temporal features learned from the laparoscopic video frames. In addition, we have established AOSA system. By processing the output information of the MIS tool detection algorithm, we can obtain the operation tool usage information in the laparoscopic video. Then, this information is taken as the dataset of AOSA system, which makes it possible to realize AOSA based on convolutional neural network (CNN). The proposed method achieved the mAP values of 100, 90.07 and 89.96% at a speed of 50.0 fps for the Endovis Challenge, ATLAS Dione, and Cholec80-locations datasets, respectively. The AOSA system obtained the mean squared error of 2.281, 0.987, 0.069, and 0.009 for the action timeline, heat map, motion trajectory, and all, respectively. The experimental results prove that the framework can be efficiently trained in an end-to-end manner and improves the algorithm’s detection accuracy and speed. Finally, we verify the feasibility of the designed AOSA system through experiments.
399,932
Please write an abstract with title: Learning Human-Object Interaction Detection Using Interaction Points, and key words: Object detection, Feature extraction, Detectors, Computer architecture, Heating systems, Streaming media, Visualization. Abstract: Understanding interactions between humans and objects is one of the fundamental problems in visual classification and an essential step towards detailed scene understanding. Human-object interaction (HOI) detection strives to localize both the human and an object as well as the identification of complex interactions between them. Most existing HOI detection approaches are instance-centric where interactions between all possible human-object pairs are predicted based on appearance features and coarse spatial information. We argue that appearance features alone are insufficient to capture complex human-object interactions. In this paper, we therefore propose a novel fully-convolutional approach that directly detects the interactions between human-object pairs. Our network predicts interaction points, which directly localize and classify the inter-action. Paired with the densely predicted interaction vectors, the interactions are associated with human and object detections to obtain final predictions. To the best of our knowledge, we are the first to propose an approach where HOI detection is posed as a keypoint detection and grouping problem. Experiments are performed on two popular benchmarks: V-COCO and HICO-DET. Our approach sets a new state-of-the-art on both datasets. Code is available at https://github.com/vaesl/IP-Net.
399,933
Please write an abstract with title: System level leakage reduction considering the interdependence of temperature and leakage, and key words: Temperature, Thermal management, Power system modeling, Microarchitecture, Energy management, Nanoscale devices, System-on-a-chip, Power system management, Dynamic voltage scaling, Integrated circuit packaging. Abstract: The high leakage devices in nanometer technologies as well as the low activity rates in system-on-a-chip (SOC) contribute to the growing significance of leakage power at the system level. We first present system-level leakage-power modeling and characteristics and discuss ways to reduce leakage for caches. Considering the interdependence between leakage power and temperature, we then discuss thermal runaway and dynamic power and thermal management (DPTM) to reduce power and prevent thermal violations. We show that a thermal-independent leakage model may hide actual failures of DPTM. Finally, we present voltage scaling considering DPTM for different packaging options. We show that the optimal Vdd for the hest throughput may be smaller than the largest Vdd allowed by the given packaging platform, and that advanced cooling techniques can improve throughput significantly.
399,934
Please write an abstract with title: Behavior prediction based on daily-life record database in distributed sensing space, and key words: Distributed databases, Space technology, Sensor phenomena and characterization, Sensor systems, Humans, Switches, Information science, Association rules, Monitoring, Home appliances. Abstract: This paper proposes a behavior prediction system for supporting our daily lives. The behaviors in daily-life are recorded in an environment with embedded sensors, and the prediction system learns the characteristic patterns that would be followed by the behaviors to be predicted. In this research, the authors applied a method of discovering time-series association rules, which discovers frequent combinations of events called episodes. The prediction system observes behaviors with the sensors and outputs the prediction of the future behaviors based on the rules.
399,935
Please write an abstract with title: Correction of Speed Calculation in SADM-GPS Method, and key words: Global navigation satellite system, Azimuth, Data models, Velocity measurement, Electromagnetics. Abstract: The article is devoted to the modernization of the SADM-GPS method, previously developed in ISTP SB RAS. The method was intended to determine the horizontal velocity and direction of movement of travelling ionospheric disturbances (TID) according to data of global navigation satellite systems (GNSS). The method is based on measurements of spatial and temporal derivatives of the total electronic content (TEC) variations. Positive aspects of the SADM-GPS method: a small amount of calculations and a sufficiently high accuracy in determining the azimuth of the TID movement. However, when using the method, there was a large scatter in the determination of instantaneous velocity values. The article analyzes the causes of the observed errors in the calculation of TID speed. For example, it turned out that SADM-GPS tended to systematically underestimate the values of the determined speed. We have proposed a number of measures to eliminate the identified shortcomings of the SADM-GPS method, which made it possible to significantly increase the accuracy of calculating the TID velocity.
399,936
Please write an abstract with title: On the Benefits of Deep Convolutional Neural Networks on Animal Activity Recognition, and key words: Animals, Accelerometers, Legged locomotion, Gyroscopes, Feature extraction, Training, Horses. Abstract: Monitoring the behavior of animals (e.g., eating habits) can lead to conclusions regarding animal's welfare. To achieve this, remote monitoring of animal activity with the aid of inertial sensors and use of machine learning algorithms over the collected data can be used. However, these algorithms rely on handcrafted features extracted by statistical or heuristic functions over raw motion data. To this purpose, we employ deep Convolutional Neural Networks (ConvNets) for activity recognition of livestock animals, such as goats and horses. We investigate the potential gains of ConvNets compared with other machine learning algorithms of the literature, which are about 12.5% greater accuracy and more than 7% higher F1-score. Moreover, we designate the advantages of late sensor fusion (2D convolution) and also show that an increase on the number of filters on each layer does not necessarily lead to a greater classification accuracy. To this end, we benchmark various ConvNet architectures and demonstrate the role of hyperparameter tuning to optimize the overall accuracy. To the best of our knowledge, ConvNets are employed for animal activity recognition here for the first time.
399,937
Please write an abstract with title: Continuous measurement of systolic blood pressure using the PTT and other parameters, and key words: Pressure measurement, Blood pressure, Biomedical measurements, Patient monitoring, Biomedical engineering, Parameter estimation, Aging, Electrocardiography, Length measurement, Biomedical monitoring. Abstract: In this paper, we proposed the regression model which could estimate unspecified people's systolic blood pressure (SBP) conveniently and continuously and checked its accuracy through clinical experiments. The method for estimating each individual SBP by using only pulse transit time (PTT) has been studied, but it is difficult to estimate unspecified people's SBP with the method using only PTT. Thus we researched several physical characteristic parameters which might affect blood pressure (BP) with the standard that we can measure them easily and conveniently, chose valid physical characteristic parameters through a clinical testing and correlation analysis, and made the regression model using PTT and valid physical characteristic parameters for estimating unspecified people's SBP. Comparing the result of the proposed method with American National Standards Institute of the Association of the Advancement of Medical Instrument (ANSI/AAMI), we know that the proposed regression model gives an acceptable result
399,938
Please write an abstract with title: Capacitive Clamp Usage in Damped Oscillatory Wave Immunity Tests for IEC and ANSI Standards, and key words: Immunity testing, Generators, Calibration, ANSI Standards, Clamps, IEC Standards, Testing. Abstract: This document illustrates laboratory experiences of live usage of capacitive clamp during test sessions of damped oscillatory wave according to both IEC and ANSI Standards and their difference regarding calibration. Despite the fact that the waveform for slow and fast waves are different, matching different physical phenomena, a unique approach can be used for both Standards leading to a good calibration for capacitive clamp. The performance of a new generation damped oscillatory generator with slow and fast waves capabilities was measured by an accredited testing facility and the capacitive clamp calibration was repeated by the accredited calibration centre for both types of damped oscillatory wave and simulated by SPICE. The same IEC calibration procedure for fast damped oscillatory wave is finally recommended also for ANSI slow damped oscillatory wave at 1 MHz.
399,939
Please write an abstract with title: A Diagnostic Method for Moisture Intrusion Fault in OIP Bushing, and key words: Moisture, Insulators, Hidden Markov models, Dielectrics, Permittivity measurement. Abstract: Oil-impregnated paper (OIP) bushing is essential equipment in power substations, and moisture intrusion is one of the major faults during its operation. In this article, a method is proposed to diagnose the moisture intrusion fault by the hidden Markov model (HMM) and the shuffled frog-leaping algorithm (SFLA). First, HMM is employed to characterize the probabilistic relationship between the moisture states and frequency-domain spectroscopy (FDS). Then, SFLA is adopted to optimize the locatable results of moisture intrusion point (MIP) in the bushing. Next, extensive simulated data are used for parameter training in the HMM-SFLA model library, with cross-validation for optimal parameters' configuration of HMM and SFLA. Finally, the proposed method was validated by experiment in laboratory and field measurements. The results show that the proposed method can effectively diagnose the MIP of OIP bushings.
399,940
Please write an abstract with title: Performance analysis of the 3G network with complementary WLANs, and key words: Performance analysis, Wireless LAN, Bandwidth, Mathematics, Mathematical model, 3G mobile communication, Frequency, Interference, Internetworking, Analytical models. Abstract: An analytical modeling method is developed for the evaluation of integrated 3G/WLAN networks. To adapt the feature of the emerging wireless networks efficiently and to cover many possible situations in reality, the cell residence times are modeled generally. The channel occupancy times, the horizontal and vertical handoff rates as well as some interesting performance measures are derived and calculated. Both analysis and numerical results show that the performance of the 3G network is significantly increased when the integrated 3G/WLAN network is employed, and that the performance of integrated 3G/WLAN network is improved greatly when the WLANs are in the hot-spot areas. The method developed here is expected to be useful for modeling and performance evaluation of other type of networks, such as the 3G network with the infrastructureless-mode WLANs or ad-hoc networks
399,941
Please write an abstract with title: On the resource efficiency of virtual concatenation in next-generation SDH networks, and key words: Next generation networking, Synchronous digital hierarchy, Protection, SONET, Telecommunication traffic, Traffic control, Cost function, Resource management, Ethernet networks, Mathematical model. Abstract: Virtual concatenation (VCAT) is an SDH/SONET network functionality recently standardized by the ITU-T. VCAT provides the flexibility required to efficiently allocate network resources to Ethernet, fiber channel, ESCON and other important data traffic signals. The aim of this paper is to quantify the savings in network resources provided by VCAT, with respect to contiguous concatenation (CCAT), in SDH/SONET mesh transport networks bearing protected scheduled connection demands (SCDs). We define mathematical models to quantify the add/drop and transmission resources required to instantiate a set of protected SCDs in either a VCAT-capable or a CCAT-capable network. Quantification of transmission resources requires a routing and slot assignment (RSA) problem to be solved. We formulate the RSA problem in VCATand CCAT-capable networks as two different combinatorial optimization problems: RSAv and RSAc, respectively. Protection of the SCDs is considered in the formulations using a shared backup path protection (SBPP) technique. We propose a simulated annealing (SA) based meta-heuristic algorithm to compute approximate solutions to these problems (i.e., solutions whose cost is close to the cost of the optimal ones). The gain in transmission resources and the cost structure of add/drop resources making VCAT-capable networks more economical are analyzed for different realistic traffic types (ESCON, GbE, fibre channel, voice).
399,942
Please write an abstract with title: Dynamic Network Connectivity Analysis for Understanding Attention Deficit Hyperactivity Disorder, and key words: Measurement, Statistical analysis, Heuristic algorithms, Time series analysis, Machine learning, Functional magnetic resonance imaging, Brain modeling. Abstract: This research examines the dynamics of brain resting-state functional connectivity (rs-FC) using functional magnetic resonance imaging (fMRI) data for attention-deficit/hyperactivity disorder (ADHD). Machine learning is a high potential approach for brain disorder diagnosis based on the constructed rs-FC brain network. The dynamics of brain connectivity directly impact the choice of algorithm design and model performance evaluation. In this study, we applied a sliding window to fMRI time series data from ADHD-200 dataset for constructing a time-varying network, and we experimented three window sizes (30, 40, and 60 seconds). Then, 10 different network metrics are calculated for each network, and being compared between the ADHD vs. Control groups. We considered the brain rs-FC network as temporal graphs and provided a comprehensive statistical analysis to understand how the network metrics can help differentiate ADHD vs. Control groups. The experimental results show that the graph dynamics have a significant influence on the selection of the key network metrics. However, average shortest path and betweenness centrality show high potential to be used to diagnose ADHD in the Control groups. This study is expected to provide a preliminary study of using temporal network approaches for computer-aided ADHD diganosis.
399,943
Please write an abstract with title: Evaluation of line surge arrester failure rate for multipulse lightning stresses, and key words: Surges, Arresters, Lightning, Stress, Insulation, Flashover, Distributed parameter circuits, Poles and towers, EMTP, Electromagnetic modeling. Abstract: This paper develops a method to analyze energy stresses on transmission line surge arresters. The approach computes the failure rate of arresters due to energy stresses, convolving the density probabilities of first and subsequent pulses. Multipulse stroke effects are considered in a 138 kV line case study, typical of single circuit lines, located in regions with high densities of ground flashes, in SE Brazil. The proposed method provides an improved insight into energy stress evaluation for selection of line surge arresters.
399,944
Please write an abstract with title: Thermal-mechanical evolution of arc additive manufacturing process through digital image correlation, and key words: Temperature measurement, Temperature distribution, Tensile stress, Correlation, Digital images, Three-dimensional printing, Numerical simulation. Abstract: In this study, the digital image correlation (DIC) method was used to obtain the full-field strain in the arc additive manufacturing process successfully, and the evolution process of temperature field, stress field and strain field during the deposition of 304 stainless steel thin-walled parts was analyzed by combining infrared thermal imager and finite element method. The results show that the temperature field and strain field simulated by finite element are in good agreement with the data measured by additive experiment, and the principal strain of the deposited component shows a trend of periodical accumulation and increase with temperature. During the arc additive manufacturing process, the area near the molten pool expands under heat, and the molten pool area is tensile stress. After the deposition, the stress inside the component is mainly compressive stress, presenting a “multi-peak” symmetrical distribution.
399,945
Please write an abstract with title: Stride Reconstruction Through Frequent Location Updates and Step Detection, and key words: Annotations, Autonomous systems, Machine learning, Position measurement, Length measurement, Calibration, Safety. Abstract: Indoor positioning plays an increasingly important role in industrial spaces. Self-localizing autonomous machines are already well established and indoor positioning for pedestrians increases safety and productivity when interacting with (semi) autonomous machines. Positioning methods for pedestrians commonly use wearable or handheld sensors that rely on extensive calibration to tune gait detection heuristics. We present a method to automatically derive the target variables of these heuristics, stride length and stride orientation, for each individual user stride by using parallel location measurements during normal operation. We show that our method fits real world measurements of stride length. Additionally, we conduct simulations to verify the variance and bias of the derived stride length and orientation at varying accuracies of the reference position measurements. Our method provides a means for online annotation of raw data for pedestrian positioning, enabling both the online calibration of gait detection heuristics as well as data annotation for machine learning applications.
399,946
Please write an abstract with title: On Coded Caching With Private Demands, and key words: Libraries, Privacy, Servers, Load modeling, Silicon, Device-to-device communication, Cryptography. Abstract: Caching is an efficient way to reduce network traffic congestion during peak hours by storing some content at the user's local cache memory without knowledge of later demands. For the shared-link caching model, Maddah-Ali and Niesen (MAN) proposed a two-phase (placement and delivery) coded caching strategy, which is order optimal within a constant factor. However, in the MAN coded caching scheme, each user can obtain the information about the demands of other users, i.e., the MAN coded caching scheme is inherently prone to tampering and spying the activity/demands of other users. In this paper, we formulate an information-theoretic shared-link caching model with private demands, where there are K cache-aided users (which can cache up to M files) connected to a central server with access to N files. Each user requests L files. Our objective is to design a two-phase private caching scheme with minimum load while preserving the information-theoretic privacy of the demands of each user with respect to other users. A trivial solution is the uncoded caching scheme which lets each user recover all the N files, referred to as baseline scheme. For this problem we propose two novel schemes which achieve the information-theoretic privacy of the users' demands while also achieving a non-trivial caching gain over the baseline scheme. The general underlying idea is to satisfy the users' requests by generating a set of coded multicast messages that is symmetric with respect to the library files, such that for each user k, the mutual information between these messages and the demands of all other users given the cache content and the demand of user k is zero. In the first scheme, referred to as virtual-user scheme, we introduce a number of virtual users such that each L-subset of files is demanded by K real or virtual (effective) users and use the MAN delivery to generate multicast messages. From the viewpoint of each user, the set of multicast messages is symmetric over all files even if each single multicast message is not. This scheme incurs in an extremely large sub-packetization. Then, we propose a second scheme, referred to as MDS-based scheme, based on a novel MDS-coded cache placement. In this case, we generate multicast messages where each multicast message contains one MDS-coded symbol from each file in the library and thus is again symmetric over all the files from the viewpoint of each user. The sub-packetization level of the MDS-based scheme is exponentially smaller than that needed by the virtual-user scheme. Compared with the existing shared-link coded caching converse bounds without privacy, the virtual-user scheme is proved to be order optimal with a constant factor when N ≤ LK, or when N ≥ LK and M ≥ N/K. In addition, when M ≥ N/2, both of the virtual-user scheme and the MDS-based scheme are order optimal within a factor of 2.
399,947
Please write an abstract with title: Analysis of Photovoltaic Maximum Accessible Capacity Based on Current Protection, and key words: Photovoltaic systems, Short-circuit currents, Power systems, Circuit faults, Distribution networks, Sensitivity, Current measurement. Abstract: In distribution network, the short-circuit current generated by photovoltaics will inevitably affect the reliability and sensitivity of the existing protection with the increasing penetration of photovoltaics. In order to analyze the impact of photovoltaic access on Instantaneous Overcurrent Protection and Definite Time Overcurrent Protection, a calculation method of photovoltaic maximum accessible capacity based on the existing protection configuration was proposed. Two factors of the photovoltaic maximum accessible capacity, length of feeder line and capacity of short circuit, were analyzed respectively through the discussions under two boundary conditions. A simulation model was established on DIGSLIENT platform to verify the conclusion.
399,948
Please write an abstract with title: Security Issues of Unified Payments Interface and Challenges: Case Study, and key words: Sociology, Authentication, Mobile handsets, Real-time systems, Security, Statistics. Abstract: NPCI, which stands for National Payment Corporation of India, was the organisation behind the idea of UPI, a user-friendly system in which funds can be directly transferred from the bank account to the account using a mobile phone. UPI is based on the concept of 1 click 2-factor authentication. The first factor is the user’s mobile phone itself, and the second factor is MPIN or bio-metrics. It is based on the IMPS(Immediate Payment Service), but there are considerable differences between both services, and we will observe it. With a foresight to make the Indian economy cashless, it helps people transfer funds in an immediate and real-time process. It has played a major role in the revolution of cashless transactions in India. Although significant UPI users are minor and much lesser compared to the Indian population, over 2.07 billion transactions per month have been made by UPI by October 2020, which makes it our essential part of our day-to-day life. This paper will discuss the working of UPI, how UPI is different from conventional cashless transaction methods. After that, we will discuss how the attacker can find the UPI’s loopholes (here we reviewed UPI BHIM 1.0) and empty the victim’s bank account. The attacker can make these attacks remotely, and these attacks can affect a single user to multiple users. We will also discuss how the attacker can achieve his/her goal using a malicious App. In the end, we will see how UPI BHIM 2.0 update was successful in covering this security loophole.
399,949
Please write an abstract with title: Synchronous Distance Learning for Improvement of Elementary School Teachers’ Motivation to Teach English, and key words: Training, Computer aided instruction, Conferences, Employment, Interviews, Videos. Abstract: This study aimed to provide elementary school teachers practical lessons at their own individual English level. Given that such teachers are not trained to teach English and have had little English conversation practice. The teachers have anxiety about teaching English in a foreign language class. The training provided enhanced the teachers' motivation to speak English, so they could willingly participate in it. Keller's ARCS [1] model, which impacts learning motivation, was used to design, and develop the training and test the effectiveness of its implementation. The training included a “class meeting with ALTs” because communicating with ALTs is a serious matter. The results of the Course Interest Survey (CIS) of the four participants confirmed that they were highly motivated to participate and continue learning English. On the other hand, there was no change in the participants' anxiety about speaking English.
399,950
Please write an abstract with title: Noise-Source Parameter Identification Considering Switching Fluctuation of DC-DC Converter, and key words: Degradation, Parameter estimation, Fluctuations, Measurement uncertainty, Europe, Switches, DC-DC power converters. Abstract: This paper proposes noise-source parameter identification of the noise-source equivalent-circuit model for predicting conducted noise while considering the switching fluctuation of a DC/DC converter. We decomposed measured conducted noise into ripple noise, turn-on spike noise, and turn- off spike noise to prevent the accuracy degradation in the parameter identification. The predicted conducted noise spectra show the error with the measurement was within 3 dB up to 200 MHz, which is more accurate than that in our previous study.
399,951
Please write an abstract with title: Machine Learning Adversarial Attacks: A Survey Beyond, and key words: Natural language processing, Machine learning, Neural networks, Training, Task analysis, IEEE Sections, Companies. Abstract: Machine Learning (ML) has fascinated researchers and developers to an extent that it has been now considered as an astute to most of them. To this continuation, ML integrated with Natural Language Processing (NLP) has yielded extraordinary results in many fields. ML began to splutter in early 2000 and has now been to its zenith. It has radically proved to be sure‐fire to the human level performance in many tasks. Many huge companies like Google and Amazon are providing Cloud‐based ML as a service (MLaaS) which can be efficiently used by an end user to perform numerous tasks in fields like NLP and Recommender systems. However, these services and their applications like sentiment analysis and text entailment are prone to adversarial attacks which force them to misclassify. This issue has been considered in depth in this chapter with analysis based on comparative study of some of the popular text‐based attacks. The chapter also focuses on attacks, namely, in domains like Image, Cloud‐based services, and Recommender‐based systems.
399,952
Please write an abstract with title: Experimental demonstration and scalability analysis of a 4-node 102 Gchip/s fast frequency-hopping time-spreading optical CDMA network, and key words: Scalability, Frequency, Optical fiber networks, Multiaccess communication, Bit error rate, Optical fiber testing, Fiber nonlinear optics, Nonlinear optics, Optical films, Optical filters. Abstract: This study demonstrates a 4-node OCDMA network testbed at 102 Gchip/s and studies its scalability to 10 simultaneous users. The results show small performance degradation with increased network size (/spl sim/ 0.5 dB) and /spl sim/ 4 dB for four and ten users respectively) and demonstrate the viability of OCDMA as a solution for high-speed, asynchronous optical access networks.
399,953
Please write an abstract with title: Anatomical Point-of-Interest Detection in Head MRI Using Multipoint Feature Descriptor, and key words: Feature extraction, Head, Biomedical imaging, Image registration, Magnetic resonance imaging, Magnetic heads, Cavity resonators. Abstract: Automatic detection of specific anatomical points of interest (POIs) in head magnetic resonance imaging (MRI) is a technical bottleneck in medical image registration and big data analysis for head diseases. A technique for automatically retrieving POIs in head MRI scans is explored in this study. A Haar-like feature of the image is introduced to generate the feature description vector of the POI, and the most appropriate standard vector is selected from multiple marked images. A fixed five-point joint feature description is proposed for solid POI detection, and an adaptive three-point joint feature description is proposed for cavity POI detection. A total of 516 head MRI volumes were used for anatomical point detection. A solid point detection experiment was conducted using the POIs of the right/left internal acoustic pore (RIA/LIA). The POIs of the right/left ascending segment of the internal carotid artery in the posterior cavernous sinus (RAS/LAS) were used in a cavity point detection experiment. The experimental results show that the accuracies of the solid point detection for LIA and RIA are 81.8% and 84.7%, respectively. Those of cavity point detection for LAS and RAS are 66.7% and 76.2%. The performance of the proposed method is better than those of BRIEF and SIFT algorithm. The proposed method can facilitate the marking of anatomical points for doctors, thus providing technical support for head image automatic registration and big data analysis for head diseases.
399,954
Please write an abstract with title: Viseme recognition - a comparative study, and key words: Mouth, Speech recognition, Facial animation, Head, Principal component analysis, Linear discriminant analysis, Humans, High performance computing, Information technology, Classification algorithms. Abstract: Three classification algorithms for visual mouth appearances (visemes) which correspond to phonemes and their speech contexts, were compared w.rt. recognition rate, time complexity, and ROC performance. Two feature extraction procedures were verified. The first one is based on the normalized triangle MESH covering mouth area and the color image texture vector indexed by barycentric coordinates. The second procedure performs DFT on the image rectangle including mouth w.rt. small blocks of DFT coefficients. The classifiers has been designed by PCA approach and by the optimized LDA method which uses two singular subspaces approach. It appears that DFT+LDA exhibits higher recognition rate than MESH+LDA and MESH+PCA methods - 97.6% versus 94.4 and 90.2%, respectively. It is also much faster than MESH+PCA (5 ms per one video frame versus 26 ms on Pentium IV, 3.2 GHz) and slower than MESH+LDA (5 ms versus 1 ms).
399,955
Please write an abstract with title: Digital design for a self-temperature compensating oscillator, and key words: Voltage-controlled oscillators, Calibration, Frequency, Mathematical model, Software design, Voltage control, Analog-digital conversion, Synthesizers, Correlators, Logic. Abstract: Using the self-temperature sensing capability of the two C-modes of an S/C cut crystal, an all-digital oscillator has been designed and simulated. The design is called a Software Controlled Crystal Oscillator (SCXO). The major components of the proposed design are a software controller, voltage controlled oscillator (VXCO), S/C cut crystal, digital-to-analog (DAC) and analog-to-digital (ADC) converters. The software controller consists of the crystal calibration data (f vs. T), direct digital synthesizers (DDS), correlators and control logic. The simulated crystal has a 10 MHz overtone frequency and is modeled as a linear third order system. The calibration data is from an actual 10 MHz crystal and is assumed to have no errors. The VCXO is assumed to track frequency changes with zero error. The DAC and ADC are modeled as 12 bit converters. The DDS uses a 32-bit accumulator and 16 bits for the phase. The design was simulated using MATLAB. Simulation results show a steady-state rms error performance of 0.5 ppb clock error, lock-up of less than 20 millisecond and the ability to track rapid changes in temperature. In future work, the software controller will be implemented in a digital signal processor, field programmable gate array or a microprocessor. It is envisioned that the software controller function can be embedded in the user's application such as a GPS receiver or software radio.
399,956
Please write an abstract with title: End-to-end semantic joint detection and limb-pose estimation from depth images of preterm infants in NICUs, and key words: Legged locomotion, Training, Pipelines, Semantics, Arms, Tools, Root mean square. Abstract: Continuous evaluation of preterm infants' spontaneous motility proved to be a decisive tool for timely diagnosing the presence of neurodevelopmental disorders. Automatic infants' limbs pose estimation is a powerful ally to support clinicians in infant's monitoring. This work proposes an end-to-end pipeline for limb-pose estimation based on a region-based convolutional neural network, named Mask R-CNN. The framework was validated on a custom dataset of 6000 depth images from 30 videos of 19 preterm infants acquired in a neonatal intensive care unit during the actual clinical practice. Leave-one-infant-out cross-validation was performed to evaluate the framework performance. Results for joints' detection showed a mean average precision equal to 0.9 with a standard deviation of 0.2. For limb-pose estimation, median root mean square error [pixel] was equal to 6.8 (right arm), 6.7 (left arm), 6.5 (right leg), 6.5 (left leg). The interquartile ranges [pixels] were 1.1, 1.2, 0.6, 1.2 for each limb, respectively. This end - to-end framework represents a step toward embedded monitoring solutions for on-the-edge computation.
399,957
Please write an abstract with title: On the high power limit of the laser linewidth, and key words: Power lasers, Optical bistability, Optical signal processing, Laser modes, Laser transitions, Equations, Stability, Logic, Optical computing, Resonance. Abstract: The quantum mechanical limit of the laser linewidth is shown to imply a residual Constant linewidth rather than obey an inverse power dependence as is usually assumed.
399,958
Please write an abstract with title: Rateless Coded Blockchain for Dynamic IoT Networks, and key words: coded blockchain, dynamic IoT networks, storage reduction, decoding failure probability, rateless code. Abstract: A key constraint that limits the implementation of blockchain in Internet of Things (IoT) is its large storage requirement resulting from the fact that each blockchain node has to store the entire blockchain. This increases the burden on blockchain nodes, and increases the communication overhead for new nodes joining the network since they have to copy the entire blockchain. In order to reduce storage requirements without compromising on system security and integrity, coded blockchains, based on error correcting codes with fixed rates and lengths, have been recently proposed. This approach, however, does not fit well with dynamic IoT networks in which nodes actively leave and join. In such dynamic blockchains, the existing coded blockchain approaches lead to high communication overheads for new joining nodes and may have high decoding failure probability. This paper proposes a rateless coded blockchain with coding parameters adjusted to network conditions. Our goals are to minimize both the storage requirement at each blockchain node and the communication overhead for each new joining node, subject to a target decoding failure probability. We evaluate the proposed scheme in the context of real-world Bitcoin blockchain and show that both storage and communication overhead are reduced by 99.6% with a maximum 10-12 decoding failure probability.
399,959
Please write an abstract with title: Analysis and Research About Different Cooling Structures of Piezoelectric Fans, and key words: Heating systems, Fans, Cooling, Wind speed, Layout, Heat engines, Thermal engineering. Abstract: In this paper, several different piezoelectric fan cooling forms are designed for a certain electronic equipment. The heat dissipation effect is simulated by CFD thermal simulation software to verify thermal performance differences under different installation structures and materials. Through the simulation and comparison of the horizontal installation, vertical installation, different case material, and installation layout of piezoelectric fans. The analysis data that is beneficial to engineering practice is obtained, and the structure form that is more beneficial to heat dissipation is selected accordingly to guide the subsequent practical application. The paper also analyzes several possible improved structures of piezoelectric fans in the future.
399,960
Please write an abstract with title: Principles of a three-dimensional recording model for short wavelength magnetic recording, and key words: Magnetic recording, Magnetic anisotropy, Perpendicular magnetic anisotropy, Perpendicular magnetic recording, Magnetization, Magnetic switching, Magnetic field measurement, Disk recording, Demagnetization, Mathematical model. Abstract: Principles are provided for a method of evaluating the magnetization of a magnetic recording tape element running in front of a recording gap. The distributions of switching fields P(Hc) and magnetization axes P(θ, φ) used in the calculations are derived from simple experimental results. The output level is calculated by means of the reciprocity principle. The first application of the method concerns certain phenomenological aspects of magnetic recording. As a practical example, a qualitative explanation of the output level curve versus the recording current for short wavelength signals is given; the advantage of microgaps for recording are demonstrated and finally, the circular Bitter patterns discovered by S. Iwasaki are shown to be predicted by the model. This study is a first step toward a more general solution including the demagnetizing field.
399,961
Please write an abstract with title: IoT & AI in Smart Farming: Implications and Challenges, and key words: Smart agriculture, Productivity, Planets, Decision making, Companies, Artificial intelligence, Consumer electronics. Abstract: Agriculture is a vital part in the life of people to survive in this world. An abundant food availability is highly essential for all living beings on this planet. Smart farming has been broadly considered as one of the furthermost feasible solutions for food inadequacy. In Modern era technologies has revolutionized the concept of agriculture into a new paradigm for better land productivity, better resource usage and better decision-making. The integration of the various trending technologies not only makes agriculture smarter and more efficient, but it also makes the entire system more sustainable. This paper reveals state-of-the-art technologies, their implications and the challenges associated with their implementation in the agriculture sector.
399,962
Please write an abstract with title: Digital Controller for Capacitance Stabilized Etalons, and key words: Optical sensors, Capacitive sensors, Interferometers, Telescopes, Prototypes, Piezoelectric actuators, Bridge circuits. Abstract: Fabry Pérot Interferometers in Capacitance Stabilized Etalon configuration are a key technology to obtain the physical properties of the solar plasma and the embedded magnetic fields at different heights in the solar atmosphere. This kind of data are fundamental both for synoptic programs and high spatial resolution new generation solar telescopes to understand the still unsolved mechanisms beneath space weather events such as solar flares and CMEs. In this paper we describe a new electronic controller for Capacitance Stabilized Etalons, based on digital approach. The controller allows digital filtering of the signal for higher stability as well as the possibility to switch operation mode as needed in the different phases of the scan and in different observing strategies.
399,963
Please write an abstract with title: Personalized Vehicular Edge Computing in 6G, and key words: 6G mobile communication, Task analysis, Edge computing, Blockchains, Quality of experience, Smart contracts, Drones. Abstract: Sixth-generation (6G) space-air-ground integrated vehicular networks (SAGIVNs) are expected to provide customized edge computing services for moving vehicles (MVs). In this article, by integrating 6G SAGIVNs and edge computing, we propose a secure and personalized vehicular edge computing framework in 6G to satisfy the diversified requirements of MVs. In the framework, we first develop a collaborative edge computing mechanism, where each 6G infrastructure (e.g., satellite, drone, and base station) cooperates with parked vehicles to provide services for MVs in order to improve the efficiency of the edge computing services. Then, considering the security issues, a smart-contract-based secure collaboration mechanism is designed to establish a reliable transaction environment for edge computing in 6G. Next, based on the personalized service requirements of MVs and the available resources in 6G SAGIVNs, the resource allocation strategy of each infrastructure and the competitiveness of different infrastructures are discussed to provide MVs with the optimal personalized service. After that, compared with the conventional schemes, a case is studied to evaluate the effectiveness of the proposed framework. Finally, we outline open research topics to identify future research opportunities and directions.
399,964
Please write an abstract with title: Design and fabrication of threat alerting system for continuous monitoring of patients with seizure and heart attack risk using IoT, and key words: Accelerometers, Sleep, Power system management, Prototypes, Cardiac arrest, Electroencephalography, Skin. Abstract: Heart attack and Seizures pose a serious threat, if not monitored and necessary preventive steps are not taken in-time it may lead to loss of life. Continuous monitoring of the patient is possible by measuring Electroencephalography (EEG), Electro-Cardiography (ECG). The work presented in this paper deals with a novel approach to monitor the patient continuously while he/she performing daily routine activities. An accelerometer, gyroscope, GSR (galvanic skin response) and hate rate measurement are used in a multimodal approach for the identification of threat. The proposed method uses exploratory data analysis (EDA) approach to synthesis the data extracted from the accelerometer and the gyroscope. Using a threshold limit an alerting system then sends signal to the nearest helpline to save the patient at risk.
399,965
Please write an abstract with title: Performance Analysis of Power Weighted Linear Array Antennas Based on Blackman Function, and key words: Linear antenna arrays, Antenna radiation patterns, Chebyshev approximation, Springs, Performance analysis, Photonics. Abstract: Nowadays, power weighted methods have been widely implemented for array antennas to optimize weighting coefficients using specific techniques. This paper deals with the performance analysis of power weighted linear array antennas based on Blackman function. Several attempts by varying number of array elements and inter element spacing are conducted for the linear array antennas working at the X-band frequency of 9.5 GHz. The use of Blackman function enhances the sidelobe level (SLL) of linear array antennas for variation of array elements number with constant inter element spacing. While for variation of inter element spacing with constant array elements number, Blackman function improves the width of mainlobe (WML) of linear array antennas. As comparison, Chebyshev and Kaiser functions are also employed for analyzing the performance of linear array antennas. The result shows that Blackman function has similar achievement to Chebyshev function for 8 radiator elements with predefined SLL of 68.8 dB and inter element spacing of λ/1.5 but with enhanced WML useful for broadside array antennas application. Furthermore, the use of Blackman function has also yielded better performance in SLL than Kaiser function with predefined SLL of 68.8 dB and β of 6.623.
399,966
Please write an abstract with title: An Investigation of the Effects of the Transform Techniques in Optical-OFDM Systems, and key words: Radio frequency, Communication systems, OFDM, Discrete Fourier transforms, Transforms, Peak to average power ratio, Numerical simulation. Abstract: In this study, it is proposed to adapt the zero-tail discrete Fourier transform spread OFDM (ZT DFT-s OFDM) waveform to the visible light communication system, which is used as an alternative to OFDM in radio frequency (RF) communication systems. It is aimed to use ZT DCT-s and ZT DST-s OFDM waveforms in optical OFDM systems by replacing conversion techniques such as discrete cosine transform (DCT) and discrete sine transform (DST) with DFT-s block in ZT DFT-s OFDM waveform. Numerical simulation studies are carried out to test the performance of the proposed ZT DCT-s/DFT-s/DST-s optical OFDM waveforms and compare them with other optical OFDM techniques such as ACO-OFDM and DCO-OFDM. From the obtained numerical results, it is understood that the recommended ZT DCT-s, ZT DFT-s and ZT DST-s O-OFDM waveforms, without sacrificing bandwidth, have a better PAPR performance of approximately 2.8 dB than the DCO-OFDM technique and 9.5 dB better than the ACO-OFDM waveform.
399,967
Please write an abstract with title: Effective Multivector-Operated Predictive Current Control of PMSM Drive With Reduced Torque and Flux Ripple, and key words: Stators, Torque, Steady-state, Stator windings, Current control, Predictive control, Permanent magnet motors. Abstract: Model predictive current control (MPCC) is a frequently used method for the control of permanent magnet synchronous motor (PMSM). It has faster execution on the modern digital platform than the previous generation microcontrollers. Conventional MPCC (C-MPCC) fails to provide satisfactory steady-state performance as a single voltage vector (VV) is applied during every sampling interval. This article proposes two novel multivector-operated MPCC methods for reducing torque and flux ripples, as well as the computational burden. The first proposed method uses one active and one null VV, whereas the second method uses two active and one null VVs to further improve the steady-state performance. Proposed methods determine the required change in stator-flux (CSF) to reduce/eliminate error in stator-current during every sample and VVs nearer to the CSF vector are chosen as optimal VVs. The duration of optimal VVs is calculated using the components of CSF along optimal VVs. CSF, obtained using calculated durations of optimal VVs, significantly reduces torque and flux ripples. The proposed methods are effective and less complex compared to other multivector-operated methods. The proposed methods are compared with existing two-VV and three-VV-based MPCC methods and their effectiveness is experimentally verified for decreased torque and stator-flux ripple in addition to a small rise in switching frequency.
399,968
Please write an abstract with title: Simple self-aligned air-gap interconnect process with Cu/FSG structure, and key words: Air gaps, Capacitance, CMOS technology, CMOS process, Dielectric constant, Delamination, Silicon carbide, Chemicals, Large scale integration, Delay. Abstract: A novel self-aligned air-gap interconnect process with Cu/FSG structure was proposed. The key feature is the use of an easily removal sacrifice film by dry-etching process with a reducing gas. This process consists of a conventional Cu damascene process with 130 nm node CMOS technology. In this study, a 2 level Cu interconnect was fabricated and the effective dielectric constant of 2.3/spl sim/2.6 has been successfully achieved. These are consistent with the capacitance reduction by 37/spl sim/41% compared with a conventional Cu/FSG structure.
399,969
Please write an abstract with title: Advance of dual-layer blue optical disk with (Ge,Sn)Te-Sb/sub 2/Te/sub 3/ memory films, and key words: Optical films, Tellurium, Dielectric films, Optical refraction, Optical variables control, Refractive index, Amorphous materials, Disk recording, Manufacturing processes, Cooling. Abstract: The requirements for dual layer optical disc from the view point of optical property were reviewed and practical approaches were demonstrated. It was experimentally confirmed that our new rewritable blue dual-layer optical disk with (Ge,Sn)Te-Sb/sub 2/Te/sub 3/ films shows high record-read performance for 50GB//spl phi/ 120mm capacity and a high data rate of 35Mbps with sufficient feasibility.
399,970
Please write an abstract with title: Near threshold pulse transit time processor for central blood pressure estimation, and key words: Heart rate, Power demand, Pulse measurements, Estimation, Electrocardiography, Signal processing, Blood pressure. Abstract: In this work a digital peripheral that can measure pulse transit time for central blood pressure estimation is presented. To do so, it processes ECG and BCG signals in real time by detecting the R-waves in the ECG and using this as time reference for measuring intervals of interest such as RJ, IJ and RR. The circuit was fabricated in a 180 nm process and experimental results are presented. The peripheral works at the near-threshold region and consumes 7 pJ/cycle with 0.43 V of supply voltage while operating at 8 kHz. We showed that state of the art performance can be achieved in the processing required for wearable estimation of central blood pressure while operating the digital circuit in the near-threshold region.
399,971
Please write an abstract with title: Model Predictive Control Considering Engine On/Off and Mode Switch for Dual-mode Hybrid Electric Vehicle, and key words: Smoothing methods, Simulation, Neural networks, Switches, Cost function, Timing, Hybrid electric vehicles. Abstract: For dual-mode hybrid electric vehicle (HEV), the design of switch strategy and energy management strategy (EMS) are always independent. However, due to the complex and changeable driving condition hybrid electric vehicle encountering, the vehicle performance, including fuel economy and battery lifetime, will be affected by the inconsistency between the two strategies. It's still open to study how to combine switch strategy with EMS. Aiming at this problem, this paper proposes a model predictive control (MPC) considering engine on/off and mode switch for dual-mode hybrid electric vehicle. Firstly, in order to get the precise input sequence, Back Propagation Neural Network is used to forecast future velocity. Secondly, a cost function, considering engine on/off and mode switch, which is solved with Pontryagin's minimum principle (PMP), is put forward. To avoid frequently mode switch and engine on/off during the process of velocity fluctuation, a smooth method is applied in the prediction domain of MPC. Finally, the proposed EMS is verified in simulation. Simulation results show that this strategy can achieve the desired goals.
399,972
Please write an abstract with title: Traceability algorithm of meat pigeon quality and safety based on cooperative sensing tracking and recognition, and key words: Design methodology, Signal processing algorithms, Throughput, Scheduling, Safety, Sensors, Internet of Things. Abstract: In order to improve the ability of quality and safety management and process supervision for meat pigeons, a design method of quality and safety traceability system for meat pigeons based on collaborative sensing tracking and identification was proposed. Firstly, the cooperative sensing RFID tag identification model is used to collect information in the process of meat pigeon quality and safety traceability, and the cooperative sensing tracking and RFID tag identification technology and Internet of Things technology are used to control the data transmission and reception of meat pigeon quality and safety traceability. A multidimensional sensor parameter fusion model is designed to track and identify meat pigeon quality and safety, and the distribution characteristics of meat pigeon quality and safety are extracted. The fuzzy clustering method is used to classify the statistical information of quality and safety information of meat pigeons, and the combination of forward tracing and reverse tracing is used to realize the fusion of multi-dimensional sensor parameters of quality and safety tracing sources of meat pigeons, and realize the optimization design of quality and safety tracing algorithm of meat pigeons. The simulation results show that the information recognition ability of the quality and safety traceability of meat pigeons is better, and the real-time and accuracy of the quality and safety traceability of meat pigeons are improved.
399,973
Please write an abstract with title: Capacity of multi-antenna array systems for HVAC ducts, and key words: Ducts, MIMO, Antennas and propagation, Receiving antennas, Transmitting antennas, Antenna arrays, Transmitters, Wireless communication, Radio frequency, Reflection. Abstract: Multi-element antenna arrays at both transmitter and receiver systems have emerged as a new technique for wireless communication systems in rich multipath environments. HVAC ducts, viewed as over-moded waveguide network systems at RF frequencies, have the multipath richness through various propagating modes and reflections within the system. This paper studies multiple-input multiple-output (MIMO) systems for HVAC ducts. Computations based on measured channel responses of a 6/spl times/6 MIMO system in 0.3 m diameter HVAC ducts in the 2.4 GHz ISM band demonstrate a five-fold increase in mean capacity over single antenna systems for an SNR of 30 dB.
399,974
Please write an abstract with title: Lightning air terminals - is shape important?, and key words: Shape, Lightning protection, Structural rods, Conductors, Charge transfer, Sparks, Laboratories, North America, Marine vehicles, Buildings. Abstract: Benjamin Franklin originally proposed the use of sharp pointed lightning rods as a way to prevent lightning strikes. Such rods do not prevent lightning strikes, but they prevent damage to a structure when it as struck by lightning. Conventional lightning protection systems consist of air terminals (lightning rods) to intercept a lightning discharge, downconductors to carry the current, and a grounding system to dissipate the current away from the protected structure. However, lightning protection systems do not prevent lightning, and the sharp points on lightning rods traditionally used in North America are not needed. To be effective, air terminals should be designed so that they are much more likely to be struck by lightning than objects on the structure they are protecting. Recent field studies indicate that a lightning rod with a blunt tip is more effective than a lightning rod with a sharp tip. Two non-conventional lightning protection systems are heavily marketed in North America - early streamer emission (ESE) air terminals and charge transfer systems (CTS). ESEs are claimed to have a much larger zone of protection than conventional air terminals. Proponents of CTS air terminals claim that corona current emitted from their arrays of sharp points can prevent lightning strikes to protected structures. Field studies of ESE air terminals show that their performance is similar to that of conventional sharp-pointed air terminals, and that they do not have the greatly enhanced zone of protection claimed for them. Field studies of charge transfer systems show that they do not prevent lightning strikes.
399,975
Please write an abstract with title: Dynamic Orchestration of Service Function Chain Based on Reinforcement Learning, and key words: Resource management, Mathematical model, Dynamic scheduling, Learning (artificial intelligence), Quality of service, Hardware, Virtualization. Abstract: Network Function Virtualization (NFV) technology decoupled Network functions from hardware resources to create more flexible Network services and support more flexible Network resource allocation. By matching and linking different virtual network functions (VNF) to form the Service Function Chain (SFC), NFV technology can provide users with end-to-end network services in a more flexible and rapid manner, and support the expansion and development of new services. In order to maintain the stability of network performance during the dynamic change of network demand, scaling is a basic task in SFC deployment. The key of the NFC scaling is the high accuracy of the time and scale quantity, which can avoid unnecessary resource provisioning and releasing process while maintaining network performance. In this paper, we propose a scaling mechanism based on Reinforcement Learning, which can make better decisions for managing network performance changes in dynamic workloads. Resource utilization is also introduced into the mechanism to avoid the idle waste of network resources. The simulation implements the scaling mechanism in a virtualized EPC network and the result proves that the proposed scaling mechanism has high accuracy in managing network performance and advantages in efficient utilization of network resources.
399,976
Please write an abstract with title: Simulating the Conductor With a Nonuniform Resistance Under High-Pulsed Magnetic Fields, and key words: Stress, Strain, Plastics, Conductivity, Conductors, Magnetoelasticity, Mathematical model. Abstract: This article is devoted to the study of magnetic field diffusion into uniform and nonuniform conductors in plane geometry. The model considers the increase of resistivity with heating. Mechanical stresses and deformations are simulated based on Hooke’s law and the von Mises criterion. The influence of the main parameters of steel on material durability in the magnetic field is studied in connection with a proposed criterion of destruction. The criterion is chosen as the amplitude of the magnetic field at the surface of a sample, at which plastic deformation at the end of the cooling stage does not occur. Various profiles of initial resistivity are simulated: from a smooth exponential function to a super-sharp step one. The modification of the surface results in an increase in the amplitude of the magnetic field by 15%–20% compared to a uniform material.
399,977
Please write an abstract with title: Worst-Case Scenario Evasive Strategies in a Two-on-One Engagement Between Dubins’ Vehicles With Partial Information, and key words: Games, Trajectory, Planning, Kinematics, Dynamic programming, Differential games, Delays. Abstract: In this letter, we consider the problem of pursuit-evasion between two pursuers against an evader with the agents modelled as Dubins’ vehicle and having partial information regarding each other’s motion. A novel, two-phase, evasive strategy based on worst-case scenario planning and proximity-based maneuvers is proposed. In the first phase, the evader assumes the pursuers to be holonomic and executes a best response strategy. An analytic and geometric approach is used to obtain the evader’s strategy. In the second phase, the evader switches to movement along high-curvature paths to side-step the pursuers when they are in proximity of the evader in an attempt to delay capture. We also propose an approximation to compute the evader strategy in the first phase, which enables it to be applicable against multiple non-holonomic pursuers. Illustrative simulation results are given.
399,978
Please write an abstract with title: Analysis of cooperation semantics for transaction processing with full and partial aborts in active database, and key words: Transaction databases, Power system modeling, Database systems, Concurrent computing, Time factors, Data engineering, Throughput, Analytical models, Condition monitoring, Interleaved codes. Abstract: Active database with ECA rule has been found suitable to provide a framework to capture database events. Processing a long duration transaction in active database is a complex affair as in case of aborts, a large amount of the work has to be undone. These transactions are also more vulnerable to failures. The long duration activities can be modeled as long duration transaction where a transaction may be viewed as collection of sub transactions. Saga, a long duration transaction model, can be expressed as a series of sub transactions and provides high degree of concurrency by releasing the locks as early as possible. Transaction processing system serving cooperative and long duration transaction in active database management system exploits the semantics of transaction to achieve better processor utilization and throughput. Our simulation studies shows quantitative analysis of transaction processing with various degree of cooperation at full and partial aborts in active database.
399,979
Please write an abstract with title: Air Quality Prediction Of Data Log By Machine Learning, and key words: Air pollution, Decision trees, Monitoring, Machine learning algorithms, Prediction algorithms, Linear regression. Abstract: The air quality monitoring system measures various air pollutants in various locations to maintain good air quality. It is the burning issue in the present scenario. Air is contaminated by the arrival of dangerous gases into the climate from the industries, vehicular emissions, etc.. Nowadays, air pollution has reached critical levels and the air pollution level in many major cities has crossed the air quality index value as set by the government. It has a major impact on the health of the human. With the advancement in technology of machine learning, it is now possible to predict the pollutants based on the past data. In this paper we are introducing a device that can continue that can take present pollutants and with the help of past pollutants, we are running an algorithm based on the machine learning to predict the future data of pollutants. The sensed data is saved inside the Excel sheet for further evaluation. These sensors are used on the Arduino Uno platform to collect the pollutant data.
399,980
Please write an abstract with title: Study of 5 and 10 mm thick CZT strip detectors, and key words: Strips, Anodes, Prototypes, Geometry, Gamma ray detection, Gamma ray detectors, X-ray detection, X-ray detectors, Spectroscopy, Energy resolution. Abstract: We report progress in the study of 5 and 10 mm thick CdZnTe strip detectors featuring orthogonal coplanar anode contacts. This novel anode geometry combines the advantages of pixel detectors with those of double-sided strip detectors. Like pixel detectors. these are electron-only devices that perform well as hard X-ray and /spl gamma/-ray spectrometers and imagers even in the thicker configurations required for reasonable detection efficiency at 1 MeV. Like double-sided strip detectors in an N/spl times/N configuration, these detectors require only 2N readout channels to form N/sup 2/ "pixels". Unlike double-sided strip detectors, all signal contacts for spectroscopy and 3-d imaging are formed on one detector surface. Polymer flip chip bonding to a ceramic substrate is employed resulting in a rugged and compact detector assembly. Prototype detector modules 5 mm thick have been fabricated and tested. Prototype modules, 10 mm thick, are currently in procurement. Measurements confirm these devices are efficient detectors throughout their volume. Sub-millimeter position resolution and energy resolution (FWHM) better than 3% at 662 keV and 15% at 60 keV throughout the detector volume are demonstrated. Options for processing the signals from the non-collecting anode strip contacts are discussed. Results from tests of one prototype circuit are presented. We also report on detector simulation studies aimed at defining an optimum geometry for the anode contacts and at determining optimum operating conditions and the requirements of the signal processing electronics.
399,981
Please write an abstract with title: Concept Design and Intelligent Control of Solar Sail With Numerous Discrete Elements, and key words: Blades, Attitude control, Degradation, Relays, Accidents, Torque, Space vehicles. Abstract: Solar sail appears to be promising and effective spacecraft in interplanetary missions; however, performance degradation is inevitable during its long-term voyage, caused by materials wastage and accidents. This study designed a solar sail with numerous discrete elements (SSNDE) and an intelligent attitude control strategy (IACS) to prevent performance degradation and decrease its harmful effect. Structural analysis of SSNDE revealed improvement in reduction of system errors caused by irregular blade deformation and mechanical abrasion via employing numerous discrete elements with rigid boundaries. Furthermore, IACS enables SSNDE to maintain control ability despite the invalidation of a quarter of blades, which can be verified by simulation results. The SSNDE design and its IACS endow an effective solution to decrease performance degradation against material wastage and unpredictable accidents in interplanetary missions. Moreover, they reveal the potential of intelligent strategy in the future aerospace industry.
399,982
Please write an abstract with title: Technology development for photonic integration in InP, and key words: Indium phosphide, Quantum wells, Optical waveguides, Photonic band gap, Photonic integrated circuits, Mirrors, Propagation losses, Optical reflection, Integrated circuit technology, Turning. Abstract: We report our development activities towards high-density photonic integrated circuits. Two key technologies, quantum well intermixing and etched turning mirrors, are demonstrated in InGaAs/InAlGaAs InP-based material at a wavelength of 1.55 microns
399,983
Please write an abstract with title: The Optimal Utilization of IES BES Emergency Reserve Based on Risk Quantification and Demand Side Response, and key words: Simulation, Transforms, Production, Optimal scheduling, Probability, Batteries, Temperature control. Abstract: This paper studies how to improve the utilization efficiency of BES (battery energy storage) emergency reserve capacity in the operation of integrated energy system on grid, and proposes a method of BES emergency reserve optimal utilization based on risk quantification and demand side response. Firstly, the equipment energy model of IES (integrated energy system) in a battery production park is constructed. Then, an unscheduled off grid probability calculation method considering weather conditions, load rate level and off grid type is proposed, and the off grid risk is quantified by combining the important load loss calculation method. On this basis, this paper considers off grid risk and on grid income, and considers the flexible characteristics of grading battery and temperature control load, constructs an IES optimal scheduling model based on risk quantification and demand side response, and transforms it into a mixed integer linear programming model through linearization. Finally, the simulation results show that the proposed method can achieve the optimal utilization of BES emergency reserve and the optimal arrangement of battery grading process in different states, which can improve the economy of IES operation under the condition of bearing less risk, and has good practicability and economy.
399,984
Please write an abstract with title: Low Carbon Operation Method for Electric Vehicle Charging Stations Using Improved Deep Reinforcement Learning, and key words: Carbon reduction strategies, Load variance, User satisfaction, Electric vehicle charging station, Deep reinforcement learning. Abstract: In response to the current problem for large scale electric vehicles with disorderly charging behavior was not fully leveraging their low-carbon benefits, the paper provide a carbon reduction strategy to electric vehicle charging stations based deep reinforcement learning (DRL). Firstly, starting from the multiple interactive entities of vehicle, station and power grid, a carbon emission reduction model for charging stations is established with the goals of minimizing carbon emissions from charging stations, minimizing variance in distribution network load, and maximizing user satisfaction. Secondly, to response to the real-time and randomness issues brought about by large-scale electric vehicles, the proposed model was transformed into a finite Markov decision process and proposed an Improved Depth Deterministic Strategy Gradient Function for the sake of training and solving. Finally, the paper designed a multi scenario simulation with distribution network system in the IEEE 33 node, and the simulation data showed that the method can guide the charging behavior of the electric vehicle group effectively, the system's carbon emissions level can be reduced, and provide a new approach for the carbon emission reduction path of urban charging stations.
399,985
Please write an abstract with title: Phyllo: a peer-to-peer overlay security framework, and key words: Peer to peer computing, Routing, Communication system control, Intrusion detection, Computer science, Computer architecture, Gain control, Network servers, Cryptography, Telecommunication network reliability. Abstract: Despite the success of peer-to-peer systems, a majority of their overlay architectures are vulnerable to exploitation. Some of the features for improved performance have created security holes that attackers can breach to gain control of the network. De facto network security solutions (e.g., trusted servers, encryption, and firewalls) offer little assistance, as they are often not compatible with the open and decentralized structure of peer-to-peer networks. To address overlay security problems, we propose Phyllo, a node-partitioning framework that isolates untrusted nodes from the core network. Yet, the isolated nodes can still participate in peer-to-peer communications. Our partitioning scheme also allows nodes to move between partitions, while introducing marginal performance overheads. Our experimental results indicate that Phyllo supports more reliable message delivery in the presence of malicious nodes.
399,986
Please write an abstract with title: Security for Jamming-Aided Energy Harvesting Cognitive Radio Networks, and key words: Monte Carlo methods, Radio transmitters, Probability, Power system reliability, Security, Energy harvesting, Cognitive radio. Abstract: We investigate cognitive radio networks where the unlicensed sender operates in the overlay mode to relay the information of the licensed transmitter as well as send its individual information. To secure information broadcasted by the unlicensed sender against the wire-tapper, we invoke jammers to limit eavesdropping. Also, to exploit efficiently radio frequency energy in licensed signals, we propose the unlicensed sender and all jammers to scavenge this energy source. To assess the security measures of both licensed and unlicensed networks, we first derive rigorous closed-form formulas of licensed/unlicensed secrecy outage probabilities. Next, we validate these formulas with Monte-Carlo simulations before using them to achieve insights into the security capability of the proposed jamming-aided energy harvesting cognitive radio networks in crucial system parameters.
399,987
Please write an abstract with title: Using metadata in SLA negotiation over premium IP networks, and key words: Intelligent networks, IP networks, HTML, Proposals, Web server, Operating systems, Protocols, Laboratories, Service oriented architecture, Communication networks. Abstract: We describe a proposal to improve the negotiation of value-added services. The approach aims at supporting user-network interactions in an automatic fashion. Stemming from the concept of metadata, we designed a specific model for online delivery of digital multimedia resources with provisioning of guaranteed performance. We exploited such features in an architecture that provides network operators and service providers with the capability to perform a service creation and delivery process on top of a QoS-enabled infrastructure, with automated configuration of the underlying communication network. In this architecture neither the users nor the service operators need to have information about the QoS requirements of service content since the QoS related network operations are performed transparently and can be dynamically managed during the trading of the service.
399,988
Please write an abstract with title: A new look at the generalized distributive law, and key words: Iterative algorithms, Tree graphs, Iterative decoding, Parity check codes, Random variables, Extraterrestrial measurements, Graphical models, Turbo codes, Artificial intelligence, Viterbi algorithm. Abstract: In this paper, we develop a measure-theoretic version of the junction tree algorithm to compute desired marginals of a product function. We reformulate the problem in a measure-theoretic framework, where the desired marginals are viewed as corresponding conditional expectations of a product of random variables. We generalize the notions of independence and junction trees to collections of /spl sigma/-fields on a space with a signed measure. We provide an algorithm to find such a junction tree when one exists. We also give a general procedure to augment the /spl sigma/-fields to create independencies, which we call "lifting." This procedure is the counterpart of the moralization and triangulation procedure in the conventional generalized distributive law (GDL) framework, in order to guarantee the existence of a junction tree. Our procedure includes the conventional GDL procedure as a special case. However, it can take advantage of structures at the atomic level of the sample space to produce junction tree-based algorithms for computing the desired marginals that are less complex than those GDL can discover, as we argue through examples. Our formalism gives a new way by which one can hope to find low-complexity algorithms for marginalization problems.
399,989
Please write an abstract with title: Implementation and experimental evaluation of SSOD sampling strategy for EBC, and key words: Quantization (signal), Networked control systems, Process control, Ethernet, Solids, Stability analysis, IEC Standards. Abstract: In this work, the implementation of SSOD sampling strategy under the principles stated in standard IEC 61499 is addressed. The implementation is then tested in an experimental distributed control system, in which this sampling strategy will be used. This framework will be used to test experimentally the validity of the sampling strategy as well as the control algorithms and tuning rules proposed in previous literature about SSOD applied on networked control systems.
399,990
Please write an abstract with title: Using Spectral Sequence-to-Sequence Autoencoders to Assess Mild Cognitive Impairment, and key words: Training data, Signal processing, Feature extraction, Cognition, Alzheimer's disease, Speech coding, Speech analysis. Abstract: Dementia is a chronic or progressive clinical syndrome, mainly characterized by the deterioration of memory, thinking, reasoning and language. In Mild cognitive impairment (MCI), often considered as the prodromal stage of dementia, there is also a subtle deterioration of these functions, but they do not affect the daily life of the patient. However, due to the slight nature of the changes, it is quite hard to diagnose MCI. In this study, we employ sequence-to-sequence deep autoencoders in order to extract compact, robust and efficient attributes from the spontaneous speech of 25 MCI subjects and 25 healthy controls. From our results, this approach gives a competitive performance, as we significantly outperformed x-vectors even though they were trained on more data. Our additional efforts to identify mild Alzheimer’s (mAD) subjects as well were less successful; but since the focus is on the early detection of dementia, this is not a limitation of the methodology from a practical point of view.
399,991
Please write an abstract with title: Adaptive suppression of CCD signal-dependent noise in light space, and key words: Charge coupled devices, Noise reduction, Image restoration, Signal restoration, Image sensors, Degradation, Cameras, Optoelectronic and photonic sensors, Adaptive filters, Adaptive systems. Abstract: We propose a denoising scheme to restore images degraded by CCD noise. Typically, restoration algorithms assume a linear mapping between the incident light space and image space. However, in practice, a camera response function performs a non-linear mapping on the sensor output and, as a result, the sensor noise model becomes more complex in the image space. We correct for non-linearity by mapping the corrupted image into "light space", where the relationship between the incident light and light space values is linear. To reduce the sensor noise we accurately model the CCD sensor noise by using the photon transfer curve. We then develop a combination of adaptive filters based on the estimated noise model in light space. Our adaptive system demonstrates efficient noise removal performance in uniform regions, while preserving edges and fine details.
399,992
Please write an abstract with title: High resolution bathymetric sidescan sonar, and key words: Signal resolution, Phased arrays, Phase estimation, Signal processing, Sonar measurements, Image resolution, High-resolution imaging, Sea floor, Testing, Lakes. Abstract: We have developed a high-resolution bathymetric sidescan sonar (HRBSSS). We suppose the sea bottom is modeled as a thin layer. And there is a phase error term at the phase of the space-time correlation function of the sonar array. This phase error term may be reduced by designing a sonar array suitably. Then the depth accuracy in the vicinity of the nadir is improved obviously. In the design of HRBSSS, we use the subspace-fitting techniques. HRBSSS can resolve the signals arriving from distinct directions concurrently, i.e. can resolve multiple angles-of-arrival in swath bathymetric imaging. HRBSSS has been equipped into an AUV and been tested in a deep lake in May 2001. From the data corrected by several sensors, fine-scale digital terrain maps are obtained. HRBSSS is especially suitable for deployment in AUV, HUV, ROV and towed bodies.
399,993
Please write an abstract with title: Hybrid OFDM-Digital Filter Multiple Access PONs Utilizing Spectrally Overlapped Digital Orthogonal Filtering, and key words: Optical filters, OFDM, Passive optical networks, Optical network units, Digital filters, Optical modulation, Universal Serial Bus. Abstract: Known hybrid orthogonal frequency division multiplexing-digital filter multiple access (OFDM-DFMA) PONs show promise of seamless and cost-effective convergence of optical and mobile networks for 5G and beyond. This paper reports, for the first time, a new hybrid OFDM-DFMA PON based on intensity modulation and direct detection (IMDD), obtained by modifying digital signal processing (DSP) algorithms embedded in both the OLT and ONUs. The proposed PON allows two spectrally overlapped sub-bands to occupy each individual sub-wavelength spectral region to independently transmit upstream ONU information. A model of the proposed PON is developed and its upstream transmission performances are numerically explored for different application scenarios. Compared with the previously published PON, the proposed PON doubles the number of supported ONUs and provides >1.7-fold aggregate upstream signal transmission capacity increases with <1.5 dB upstream power budget degradations. Alternately, for the same ONU count, >2.2-fold aggregate upstream signal transmission capacity increases and >0.7 dB upstream power budget improvements are achievable. The performance improvements vary by <18% for a transmission distance range as large as 50 km. In addition, the proposed PON is tolerant to finite digital filter tap length-induced channel interferences.
399,994
Please write an abstract with title: Improved Aquila Optimizer Optimization Algorithm Based on Multi-strategy Fusion, and key words: Computer science, Sociology, Benchmark testing, Stability analysis, Iterative algorithms, Statistics, Optimization. Abstract: Aiming at the disadvantages of slow convergence speed and relatively weak local development ability of Aquila Optimizer optimization algorithm, a Tianying optimization algorithm based on adaptive cross mutation is proposed. Firstly, the inertia weight factor is introduced into the location update formula in the global development stage to adjust the influence degree of the optimal individual on the population. Secondly, the vertical and horizontal crossing strategy is introduced into the local development of the algorithm to exchange individual information across dimensions and improve the local development ability; Finally, Cauchy elite mutation is introduced to avoid the algorithm falling into local optimization. The function optimization simulation experiments of five representative comparison algorithms on 23 different feature benchmark functions show that the optimization accuracy and stability of the proposed improved algorithm are significantly improved. Keywords: Aquila Optimizer optimization algorithm; Inertia weight factor; Vertical and horizontal cross strategy; Cauchy elite variation
399,995
Please write an abstract with title: Long range thermal image object recognition for perimeter security, and key words: Analytical models, Image processing, Visual analytics, Object detection, Cameras, Real-time systems, Thermal analysis. Abstract: Nowadays, the field of long-range thermal image processing is increasingly popular. Although this technology has several advantages in terms of security and monitoring, there are not enough autonomous algorithms for processing these images. In this paper, we aim to address two of the main problems in this field: lack of long-range thermal databases and shortage of autonomous monitoring systems. Firstly, we are introducing a new proprietary database with long-range thermal images. Further, we present a thermal detection algorithm, capable of running on real-time monitoring systems. This algorithm is based on a general-purpose DNN (Deep Neural Network) object detector - the YOLO (You Only Look Once) model. Thus, with minimal computing and hardware resources, this article aims to bring a plus in the field of long-range thermal Image processing.
399,996
Please write an abstract with title: Research on Autonomous Detection Method of Underwater Unmanned Vehicle, and key words: Target tracking, Sonar, Signal processing algorithms, Interference, Detectors, Lakes, Unmanned vehicles. Abstract: Autonomous detection technology is the key technology of the intelligent underwater unmanned vehicle (UUV), and it is the prerequisite for the unmanned vehicle to perform underwater early warning, target tracking and other tasks autonomously. This paper proposes a constant false alarm rate (CFAR) detection method based on the azimuth-time two-dimensional reference window combined ordered truncated average algorithm, which is suitable for the multitarget detection of passive sonar on UUV. Firstly, an OTA algorithm is used to estimate the statistics characteristics of background noise, and equalize the undulating background. Secondly, the azimuth-time two-dimensional reference window is used to solve the problem of too few reference samples for detection of one-dimensional reference window and inaccurate estimation of the noise statistics characteristics. Finally, the constant false alarm detector is constructed by using the mean value and variance of the background noise, and the tracking before detection (TBD) technology is adopted to realize the automatic detection and tracking of multiple targets in the undulating background. The method proposed in this paper can well solve the problem that the current CF AR detection algorithm is prone to missing reports and false alarms when the near-field interference is strong and the target quantity is unknown. The test results on the lake show that the method still has a good autonomous detection effect on multiple targets under the self-noise interference of the UUV.
399,997
Please write an abstract with title: Electromagnetic-thermal characteristics of MCP BSCCO-2212 tube during quenching process in self-field, and key words: High temperature superconductors, Conductivity, Equations, Current density, Safety, Critical current density, Electromagnetic modeling, Design optimization, Superconducting magnetic energy storage, Dielectrics and electrical insulation. Abstract: A two-dimensional flux-flow model is constructed to investigate the electromagnetic characteristics of a melt cast process BSCCO-2212 tube. Solving the flux-flow equilibrium equation with numerical method, we obtain the distributions of the current density, the flux density, and the flux-flow resistivity. The effect of inner radii on the critical current is also investigated. Based on the characteristic of the average flux-flow resistivity, we simulate the quenching process of the tube by ANSYS. The calculation results are significant for optimization and safety design of the current lead.
399,998
Please write an abstract with title: Leveraging Cross-Technology Broadcast Communication to build Gateway-Free Smart Homes, and key words: Performance evaluation, IEEE 802.15 Standard, Zigbee, Smart homes, Logic gates, Sensor systems, Robustness. Abstract: Despite the growing interest in cross-technology communication, its application to real-world systems is still limited, as existing schemes are mostly unidirectional and technology-specific. The lack of generic solutions as well as the complexity of their integration reduces the applicability in a broader scope. In this paper, we propose a solution to augment Wi-Fi, BLE, and ZigBee devices with the ability to transmit and receive cross-technology broadcast frames alongside their existing functionality. After experimentally evaluating the performance of our solution on a variety of hardware platforms, we leverage it to build a gateway-free smart home, where a smartphone can simultaneously control heterogeneous smart objects. The smart objects, which include an off-the-shelf ZigBee light bulb and a BLE-enabled door lock from different vendors, perform cross-technology communication while retaining their original functionality and can maintain duty-cycled operations.
399,999
Please write an abstract with title: Algorithm for Microwave Radiation Parameters Estimation at the Output of a Passive Radar Quadratic Detector, and key words: Passive radar, Power system measurements, Sensitivity, Fluctuations, Parameter estimation, Signal processing algorithms, Detectors. Abstract: The problem of finding the algorithm for estimating the spectral power density (SPD) of the input signal of the receiver when observing the signal from the output of the quadratic detector of the receiver is solved. Formulas for calculating the boundary errors in estimating the SPD parameter and the fluctuating sensitivity of a radiometric receiver operating according to the obtained algorithm are obtained. The possibility of using the likelihood functional for stationary Gaussian processes in solving the problem of signal processing after a quadratic detector is substantiated by simulation modelling.