The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new control methods based on a novel reaching law to overcome slow convergence rate and severe chattering in sliding mode control of permanent magnet synchronous motors (PMSM). The constant reaching law converges slowly during large systematic errors. Although the power reaching law converges fast during large error, it chatters severely while approaching to the sliding surface...
We firstly demonstrate a low-bit DAC with a nonuniform quantification scheme in intensity modulated direct detection with filter bank based multicarrier (IMDD-FBMC) system for improving the signal-to-quantification noise ratio (SQNR). In this scheme, owing to the Gaussian-like distribution of FBMC signals, the low-level waveform occupies much more bits to mitigate the quantization noise hence improving...
In order to improve the channel capacity of mobile communication system, we design a base station antenna with broadband, low profile, high gain and dual polarization. The dual radiation patch is adopted to broad the bandwidth of the antenna and to increase the gain. The simulation result in CST Microwave Studio shows that the impedance bandwidths of |S11|<−10dB is 0.72GHz (1.38–2.1GHz, 41%) with...
This paper introduces an automatic calibrated pure electric (EV) mode of automatic switching based on bus road conditions. The entire vehicular control system collects bus road spectra using specific methods, identifies if the direction of the bus is along the predetermined bus lane, and records the positions where the driver manually switches the model, to finally implement an automatic EV switchover...
Analysis of brain signal complexity reveals the intrinsic network dynamics and is widely utilized in the investigation of mechanisms in mental disorders. In this study, the complexity of resting-state functional magnetic resonance imaging (fMRI) signals was explored in patients with depression using multiscale entropy (MSE). Thirty-five patients diagnosed with depression and 22 age- and gender-matched...
In this paper, we design a novel polar coded intensity modulation direct detection (IM/DD) optical orthogonal frequency division multiplexing-based (OFDM) system used in short reach interconnection. The experimental results demonstrate the 9.5-dB net coding gain (NCG) at the BER of 1e-3 after 40-km standard single mode fiber (SSMF) transmission.
Chaotic oscillation is a harmful phenomenon for power system and it threatens the safe and stable operation of power system. This paper presents fractional order fixed-time nonsingular terminal sliding mode control to suppress chaos in power system. A novel fractional order terminal sliding mode surface is first proposed to guarantee the fixed-time convergence of system states along the sliding surface,...
Key resources are important, influential and powerful performers in a social network structure. Identifying them in the social network of a business process activity is beneficial and rewarding. One of the most effective centrality measures for identification of the key nodes in a social network is to rank resources based on a selection of criteria. PageRank is a representative example of such algorithms,...
With the development of next-generation sequencing (NGS), DNA/RNA sequencing has become cheaper and more efficient. Today, a whole human genome can be sequenced under $1,000, providing opportunities for large-scale bioinformatic analysis on big datasets. However, most of existing bioinformatic analysis tools are programmed for single server based computing platform and not suitable to process such...
Outsource encrypted data has attracted attentions from industry and academics for storing sensitive data in third party clouds. Many cloud applications need privacy preserving multiple keywords search services over encrypted data with dual capabilities. On one hand, they need to keep the query keywords and associated search operations private such that data hosting service providers cannot trace and...
To locate source nodes of influence propagation given an observation set in online social networks is the source location problem. It is increasingly critical to control the diffusion of malicious information in terms of source nodes with the popularity of online social networks. In this paper, we focus on multi-source location with incomplete information. First, to track the causes that make node...
With the growing popularity of smart things and the omnipresence of wireless communications, the Internet continues to revolutionize from the Internet of hosts, the Internet of People, to the Internet of Things (IoT). Intelligent and scalable orchestration of massive IoT objects using a multitier architecture are critical to embrace the vision of IoT. This paper presents our vision and our initial...
The commonly existing employed centralized algorithms fail to be adaptive to the new storage pattern on mobile edge cloud. To address this issue, we propose an alternating-direction-method-of-multipliers-based collaborative storage algorithm called MECCAS (Mobile Edge Cloud Collaborative Storage). The proposed MECCAS is able to minimize the delay of task execution and total costs for the overall operation,...
Traditional Cloud model is not designed to handle latency-sensitive Internet of Things applications. The new trend consists on moving data to be processed close to where it was generated. To this end, Fog Computing paradigm suggests using the compute and storage power of network elements. In such environments, intelligent and scalable orchestration of thousands of heterogeneous devices in complex...
The introduction of verifiable computation came as a result of the increasingly common phenomenon of "outsourcing" computation to untrusted servers and also to the growing desire of weak clients to outsource computational tasks to more powerful computation services like in cloud computing. Verifiable computation enables a computer to offload the computation of some function, to other perhaps...
On a crowdsourcing platform, in order to cheat for rewards or sabotage the crowdsourcing processes, spam workers submit numerous random and erroneous answers to the tasks published by honest requesters. This type of behaviours extremely reduces the enthusiasm of honest users, which may lead a crowdsourcing platform to a failure. To defend the threats from spam workers, reputation-based defense mechanisms...
With the continued explosion of digitized data, data mining and data collection have become more prevalent. With this growth, we have also seen increased concern over data privacy and intellectual property. Within this environment, an important question has emerged: Can machine learning and data mining techniques be leveraged without compromising privacy? This paper revisits the concepts and techniques...
Participatory search is a population-based algorithm derived from the participatory learning paradigm. The algorithm accounts for the fact that the compatibility between individuals of the current population and the combination of compatibles, help to improve the value of an objective function during the search for an optimum. This paper focuses on the use of participatory search as a tool to develop...
We consider explicit constructions of multi-level lattice codes that universally approach the capacity of the compound block-fading channel. Specifically, building on algebraic partitions of lattices, we show how to construct codes with negligible probability of error for any channel realization and normalized log-density approaching the Poltyrev limit. Capacity analyses and numerical results on the...
High-performance analysis of big data demands more computing resources, forcing similar growth in computation cost. So, the challenge to the HPC system designers is providing not only high performance but also high performance at lower cost. For high performance yet cost effective cyberinfrastructure, we propose a new system model augmenting Amdahl's second law for balanced system to optimize price-performance-ratio...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.