Search results for "500"
showing 10 items of 3244 documents
A Machine Learning Approach for Fall Detection Based on the Instantaneous Doppler Frequency
2019
Modern societies are facing an ageing problem that is accompanied by increasing healthcare costs. A major share of this ever-increasing cost is due to fall-related injuries, which urges the development of fall detection systems. In this context, this paper paves the way for the development of radio-frequency-based fall detection systems, which do not require the user to wear any device and can detect falls without compromising the user's privacy. For the design of such systems, we present an activity simulator that generates the complex path gain of indoor channels in the presence of one person performing three different activities: slow fall, fast fall, and walking. We have developed a mac…
Face Inpainting via Nested Generative Adversarial Networks
2019
Face inpainting aims to repaired damaged images caused by occlusion or cover. In recent years, deep learning based approaches have shown promising results for the challenging task of image inpainting. However, there are still limitation in reconstructing reasonable structures because of over-smoothed and/or blurred results. The distorted structures or blurred textures are inconsistent with surrounding areas and require further post-processing to blend the results. In this paper, we present a novel generative model-based approach, which consisted by nested two Generative Adversarial Networks (GAN), the sub-confrontation GAN in generator and parent-confrontation GAN. The sub-confrontation GAN…
A Language and Platform Independent Co-Simulation Framework Based on the Functional Mock-Up Interface
2019
The main goal of the Functional Mock-up Interface (FMI) standard is to allow the sharing of simulation models across tools. To accomplish this, FMI relies on a combination of XML-files and compiled C-code packaged in a zip archive. This archive is called a Functional Mock-up Unit (FMU). In theory, an FMU can support multiple platforms, but not necessarily in practice. Furthermore, software libraries for interacting with FMUs may not be available in a particular language or platform. Another issue is related to the protection of intellectual property (IP). While an FMU is free to only provide the C-code in its binary form, other resources within the FMU may be unprotected. Distributing model…
Four-Level Three-Phase Inverter With Reduced Component Count for Low and Medium Voltage Applications
2021
This paper proposes a novel three-phase topology with a reduced component count for low- and medium-voltage systems. It requires three bidirectional switches and twelve unidirectional switches for producing four-level voltages without using flying capacitors or clamping diodes, reducing the size, cost, and losses. Removing flying capacitors and clamping diodes allows it to simplify control algorithms and increase the reliability, efficiency, and lifetime. A modified low-frequency modulation (LFM) scheme is developed and implemented on the proposed topology to produce a staircase voltage with four steps. Further, a level-shifted pulse width modulation (LSPWM) is used to reduce the filter siz…
Low-Power Wide-Area Networks: A Broad Overview of its Different Aspects
2022
Low-power wide-area networks (LPWANs) are gaining popularity in the research community due to their low power consumption, low cost, and wide geographical coverage. LPWAN technologies complement and outperform short-range and traditional cellular wireless technologies in a variety of applications, including smart city development, machine-to-machine (M2M) communications, healthcare, intelligent transportation, industrial applications, climate-smart agriculture, and asset tracking. This review paper discusses the design objectives and the methodologies used by LPWAN to provide extensive coverage for low-power devices. We also explore how the presented LPWAN architecture employs various topol…
SFTSDH: Applying Spring Security Framework with TSD-Based OAuth2 to Protect Microservice Architecture APIs
2022
The Internet of Medical Things (IoMT) combines medical devices and applications that use network technologies to connect healthcare information systems (HIS). IoMT is reforming the medical industry by adopting information and communication technologies (ICTs). Identity verification, secure collection, and exchange of medical data are essential in health applications. In this study, we implemented a hybrid security solution to secure the collection and management of personal health data using Spring Framework (SF), Services for Sensitive Data (TSD) as a service platform, and Hyper-Text-Transfer-Protocol (HTTP (H)) security methods. The adopted solution (SFTSDH = SF + TSD + H) instigated the …
Reinforcement Learning based Fault-Tolerant Routing Algorithm for Mesh based NoC and its FPGA Implementation
2022
Network-on-Chip (NoC) has emerged as the most promising on-chip interconnection framework in Multi-Processor System-on-Chips (MPSoCs) due to its efficiency and scalability. In the deep submicron level, NoCs are vulnerable to faults, which leads to the failure of network components such as links and routers. Failures in NoC components diminish system efficiency and reliability. This paper proposes a Reinforcement Learning based Fault-Tolerant Routing (RL-FTR) algorithm to tackle the routing issues caused by link and router faults in the mesh-based NoC architecture. The efficiency of the proposed RL-FTR algorithm is examined using System-C based cycle-accurate NoC simulator. Simulations are c…
Field Reconstruction for Modeling Multiple Faults in Permanent Magnet Synchronous Motors in Transient States
2021
Conventional field reconstruction model (FRM) for electrical machines has proved its main strength in efficient computations of magnetic fields and forces in healthy permanent magnet synchronous machines (PMSM) or faulty machines in steady states. This study aims to develop a magnet library of different magnet defects and include inter-turn short-circuit (ITSC) in the FRM for PMSM. The developed FRM can model a combination fault between ITSC, and magnet defect in a PMSM in transient states. Within the framework, an 8-turn ITSC was modelled in both finite element analysis (FEA) and FRM, and then identified by the extended Park’s vector approach. The air-gap magnetic field reproduced b…
Managing information security risks during new technology adoption
2012
Author's version of an article in the journal: Computers and Security. Also available from the publisher at: http://dx.doi.org/10.1016/j.cose.2012.09.001 In the present study, we draw on previous system dynamics research on operational transition and change of vulnerability to investigate the role of incident response capability in controlling the severity of incidents during the adoption of new technology. Toward this end, we build a system dynamics model using the Norwegian Oil and Gas Industry as the context. The Norwegian Oil and Gas Industry has started to adopt new information communication technology to connect its offshore platforms, onshore control centers, and suppliers. In oil co…
Joint Resource Allocation and UAV Scheduling With Ground Radio Station Sleeping
2021
Applications of Unmanned aerial vehicles (UAVs) have advanced rapidly in recent years. The UAVs are used for a variety of applications, including surveillance, disaster management, precision agriculture, weather forecasting, etc. In near future, the growing number of UAV applications would necessitate densification of UAV infrastructure (ground radio station (GRS) and ground control station (GCS)) at the expense of increased energy consumption for UAV communications. Maximizing the energy efficiency of this UAV infrastructure is important. Motivated by this, we propose joint resource allocation and UAV scheduling with GRS sleeping (GRSS). Further, we propose the use of coordinated multi-poi…