Flash flood is a naturally occurring calamity, espe-cially in tropical countries like the Philippines. The wreckage and grief caused by catastrophic typhoons emphasized the need for an Early Warning System (EWS) speci...
详细信息
We present a GSS4T1-based metagrating designed to exhibit a homogeneous-optical-medium response, when GSS4T1 amorphous, or a judicious Fano response, when GSS4T1 crystalline, which enables a negative beam steering tha...
详细信息
Power harvesting efficiency remains a key limiting factor for passive radio frequency identification (RFID) tags. This study aims to improve the power harvesting efficiency of next-generation RFID tags by implementing...
详细信息
ISBN:
(数字)9798350390698
ISBN:
(纸本)9798350390704
Power harvesting efficiency remains a key limiting factor for passive radio frequency identification (RFID) tags. This study aims to improve the power harvesting efficiency of next-generation RFID tags by implementing power-optimized waveforms (POWs) instead of continuous wave (CW) waveforms as the input interrogating signals to wake-up and communicate with RFID tags. A software-defined radio (SDR) is configured as a pseudo-RFID reader to generate and transmits POWs to newer RFID tags with the newer Impinj M750 and NXP U9 chips, showing that these recent chip manufacturer products are compatible with POWs. This novel method of programming an SDR could facilitate easier testing of POWs through an open-source software that streamlines POW modifications.
This study deals with a new method for designing a mixed ${H}_{2} / {H}_{\infty}$ dynamic output feedback controller based on reinforcement learning (RL). This paper aims to design an optimal machine learning-based co...
详细信息
ISBN:
(数字)9798331509972
ISBN:
(纸本)9798331509989
This study deals with a new method for designing a mixed ${H}_{2} / {H}_{\infty}$ dynamic output feedback controller based on reinforcement learning (RL). This paper aims to design an optimal machine learning-based controller that uses a robust and regularized reinforcement learning-based methodology to stabilize the system in the presence of disturbances. Furthermore, using the reinforcement learning algorithms, the dynamic output feedback controller is designed via policy evaluation and policy improvement steps. Eventually, the authors illustrate the advantages of the proposed methods through numerical simulations via error metrics.
We present BERTiMuS, an approach that uses CodeBERT to generate mutants for Simulink models. BERTiMuS converts Simulink models into textual representations, masks tokens from the derived text, and uses CodeBERT to pre...
Transformers have increasingly become the de facto method to model sequential data with state-of-the-art performance. Due to its widespread use, being able to estimate and calibrate its modeling uncertainty is importa...
详细信息
Traditional approaches to activity recognition involve the use of wearable sensors or cameras in order to recognise human activities. In this work, we extract fine-grained physical layer information from WiFi devices ...
详细信息
As a future energy system,the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable ***,this efficient and reliable service relies on collecting and ana...
详细信息
As a future energy system,the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable ***,this efficient and reliable service relies on collecting and analyzing users’electricity consumption data frequently,which induces various security and privacy *** address these challenges,we propose a double-blockchain assisted secure and anonymous data aggregation scheme for fog-enabled smart grid named ***,we design a three-tier architecture-based data aggregation framework by integrating fog computing and the blockchain,which provides strong support for achieving efficient and secure data collection in smart ***,we develop a secure and anonymous data aggregation mechanism with low computational overhead by jointly leveraging the Paillier encryption,batch aggregation signature and anonymous *** particular,the system achieves fine-grained data aggregation and provides effective support for power dispatching and price adjustment by the designed double-blockchain and two-level data ***,the superiority of the proposed scheme is illustrated by a series of security and computation cost analyses.
Fuzzer is widely employed for vulnerability discovery and security assessment of software systems. Based on existing protocol fuzzers, this paper proposes a more efficient fuzzing solution called AntFuzz. It draws ins...
详细信息
In the Philippines, the onion is among the major crops produced with an estimated production of 229.50 thousand metric tons last 2020. Producing these onions relies on manpower, particularly from local farmers. Howeve...
详细信息
暂无评论