The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An artificial intelligence-based (AI-based) noninvasive Pulse AudioGram (PAG) monitoring device with arrhythmia screening algorithm has been developed in this research study. The PAG monitoring device consists of four components, including an audiogram sensor, an analog-digital converter, a microprocessor, and a data storage unit. The main function of the proposed AI-based non-invasive PAG is to measure...
In the era of digitalization, people store their data digitally on local or remote storage. To prevent data loss due to disk failures, data fault tolerance mechanisms have been widely deployed to provide different levels of reliability. However, applying data fault tolerance mechanisms incurs extra cost on storage space and energy consumption. Therefore, data with different importance should be stored...
An Improved A∗ algorithm based on time window is proposed to solve conflict-free path planning problem for the Automated Guided Vehicles (AGV) in flexible manufacturing systems. Based on the planned AGV paths, conflict-free routing was received by utilizing the improved A∗ algorithm in the next AGV routing. The algorithm of improving evaluation function to introduce the turning factors not only avoids...
Motion estimation is an essential procedure in video coding and object tracing, but it always has a high computational load. Some low bit-depth motion estimation methods, such as one/two-bit transform or gray coding based methods, have lower complexity. However, one-bit transform based methods are sensitive to noise, whereas two-bit transform and gray coding methods use many bit planes or operations...
We propose and experimentally evaluate the dispersion tolerance of a data center communication system with DSP equalization free optical duobinary-PAM4. Without dispersion compensation, its dispersion tolerance is three times higher than DFE equalized PAM4.
In this paper, we study a wireless cooperative secure transmission system with the help of a friendly cooperative jammer Chad to interfere a potential malicious eavesdropper Eve. For imperfect channel estimation, we continue to follow the optimal power allocation and the maximum secrecy rate design of the perfect channel. Considering channel estimation scenario in the actual communication environment,...
This paper considers a media access control (MAC) scheme, which employs Reed-Solomon codes for error-correction, protocol sequences for packet scheduling, and successive interference cancellation (SIC) for demodulation. The construction of the protocol sequences is based on the Chinese remainder theorem (CRT), and a bound on the pairwise Hamming cross-correlation is established. After proving some...
In this paper, the distributed fault detection (FD) problem is addressed for a class of linear stochastic multi-agent systems (MASs). A novel distributed cooperative control scheme is given for reaching bounded formation of the MAS. It is proved that by using relative outputs between neighboring agents, a set of distributed fault detection filters can be designed for each agent to detect the faults...
Magnetic shape memory alloys (MSMAs) are expected to be implemented into micro actuators and sensors because they have a large magnetic field induced strain combined and high response frequency. On the other hand, when dimensions of metallic materials are reduced from a bulk size to the micrometer scale, the mechanical response would vary along with the dimension change. Therefore, it is important...
Nowadays, people rely heavily on local or cloud storage to store their data digitally. To ensure data safety, various data fault tolerance mechanisms have been widely studied and deployed to provide reliability. Data fault tolerance mechanisms incur additional cost to the storage system. Therefore, data of different importance should be stored on storage that provides different levels of fault tolerance...
As the volume of data stored by Big data and Cloud services continues to grow, both academia and industry are seeking for high-performance storage systems. Recently, with the recent advances in write-optimized indexes (WOI), WOI-based file systems can now outperform conventional file systems with orders of magnitude on random writes, metadata updates, and small file creation. Based on the B-tree structure,...
Additive manufacturing of three-dimensional objects are now more and more realised through 3D printing, known as an evolutional paradigm in the manufacturing industry. Artificial intelligence is currently finding wide applications to 3D printing for an intelligent, efficient, high quality, mass customised and service-oriented production process. This paper presents a comprehensive survey of artificial...
The Integrated Fan Out (InFO) technology can accom-plish package miniaturization and successfully achieve “More than Moore's Law.” Its substrate-free technology also brings great cost-effective attraction to mobile and wearable applications. Ultra-thin integrated passive devices (IPDs) with high capacitance density can further shrink the InFO size and boost the bandwidth. Although the cost for the...
In our previous work, a simulation framework was proposed to focus on imitating the behavior of wireless charging vehicles (WCVs) and wireless sensor networks (WSNs) because current mainstream simulators have very limited support on simulation of WCVs. The WCV is an integration of a mobile vehicle and a wireless power transfer broadcaster, which is used to recharge sensors wirelessly to prolong the...
The aim of this study is to investigate the dose distribution in the process of X-ray imaging at Shanghai Synchrotron Radiation Facility. We used the Monte Carlo software EGSnrc based on the statistics of the beamline BL13W to simulate the actual irradiation environment and calculate the dose distribution. Three different sizes of sources and two different tomographic models were created to predict...
Compressive sensing ghost imaging has made great progress in recent years because it can reconstruct high-grade object image with less number of samples. In adition, using digital micromirror device (DMD) to set up light field has greatly promoted the development of practical application of ghost imaging, but many problems remained, such as ignoring the changes of light field in propagation. To do...
Applying metamaterial mechanism into the wireless power transfer (WPT) system is one of potential methods for improving power transfer efficiency (PTE). Different from the conventional metamaterial slab with single negative permeability (SNP), the WPT with hybrid negative permeability (HNP) slab has higher PTE. In this paper, we investigate the parameters of HNP slab at different position between...
We demonstrate a duobinary PAM4 signal for data center communication with experiments and simulations. Without any dispersion compensation mechanism, the optical duobinary PAM4 signal has about three times higher dispersion tolerance in comparison of an ordinary PAM4 signal.
A multiple hypothesis tracking (MHT) algorithm based on multi-feature fusion is presented in this paper to counter range deception jammings. Sparse decomposition coefficients and bispectrum features are extracted to distinguish the targets and the jammings. A two-stage fusion structure using neural network and Dempster-Shafer evidence theory is designed to implement multi-feature fusion so as to get...
Non-volatile memory (NVM) has widely participated in the evolution of the next-generation memory architecture by way of being the substitution of the main memory. To cope with the problem of asymmetric read/write speeds of NVM, several excellent researches have been proposed to reduce the number of writes to the NVM-based main memory. Nevertheless, most of these existing approaches do not take the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.