Capacitance-to-voltage conversion is essential for capacitive sensors in various industries, including touch interfaces, medical devices, and moisture measurement. However, circuit design faces challenges like non-lin...
详细信息
ISBN:
(数字)9798331543952
ISBN:
(纸本)9798331543969
Capacitance-to-voltage conversion is essential for capacitive sensors in various industries, including touch interfaces, medical devices, and moisture measurement. However, circuit design faces challenges like non-linearity, noise, and small capacitance variations affecting voltage signals. This article proposes a phase-locked loop in free-running oscillator mode with a frequency-to-voltage converter to enhance accuracy and stability. Test results show a 97.9% measurement accuracy, demonstrating reduced noise and improved stability. The proposed circuit is ideal for high-precision applications in diverse environments, overcoming limitations of traditional methods.
Capacitance-to-voltage conversion is essential for capacitive sensors in various industries, including touch interfaces, medical devices, and moisture measurement. However, circuit design faces challenges like non-lin...
详细信息
We investigated the effect of copper ion concentration in zinc-copper dual-ion electrolytes to suppress dendrites and extend the cycle life of zinc ion capacitors. The devices were characterized in terms of changes in...
详细信息
ISBN:
(数字)9798331529468
ISBN:
(纸本)9798331529475
We investigated the effect of copper ion concentration in zinc-copper dual-ion electrolytes to suppress dendrites and extend the cycle life of zinc ion capacitors. The devices were characterized in terms of changes in microstructure and cycling stability. The nuclei size was decreased in the optimal copper ion concentration to promote lateral deposition and avoid vertical dendrites. The device exhibited stable cycling performance with a capacitance retention of 95% after 10,000 redox cycles, compared to the device with single zinc ion electrolyte which short circuited at around 1,250 redox cycles.
Sentence classification is an important task in natural language processing. In deep architectures, the task suffers from a serious semantic vanishing problem when stacking a large number of networks. To address this ...
详细信息
Universities can employ information technology as one means of achieving their goals and objectives. Universities can get advantages from information technology, such as effective resource management and information m...
Universities can employ information technology as one means of achieving their goals and objectives. Universities can get advantages from information technology, such as effective resource management and information management for decision-making. However, don't forget that the campus must consider what technology is appropriate to assist them achieve their goals, particularly in the current industrial era 4.0 where technology is available with many different choices. The campus requires an enterprise architecture in order to design, manage, and coordinate information technology infrastructure, applications, and processes strategically and thoroughly. The adoption of enterprise information system architecture (EA) is also intended to improve the quality of services provided to internal and external stakeholders. In this case, Enterprise Architecture can help an organization to match its information technology resources with business processes and strategies to achieve their goals. This research was conducted using TOGAF ADM, also known as the Open Group Architecture Framework Architecture Development Method. This method offers best practices for creating enterprise architecture and emphasizes several steps that include creating an architectural vision, information systems, business architecture modeling to help XYZ campus manage all their information technology.
The Plasmodium parasite, which causes malaria, is an acute fever illness that infects people when a female Anopheles mosquito bites them. It is predicted that malaria would claim 619,000 lives in 2021, with 96% of tho...
详细信息
ISBN:
(数字)9798331529376
ISBN:
(纸本)9798331529383
The Plasmodium parasite, which causes malaria, is an acute fever illness that infects people when a female Anopheles mosquito bites them. It is predicted that malaria would claim 619,000 lives in 2021, with 96% of those deaths occurring in the African continent. We can achieve this by using a microscope to examine thick and thin blood smears. The proficiency of a microscope examiner is crucial for doing microscopic examinations. Consider how time-consuming, ineffective, and costly it would be to examine thousands of malaria cases. Consequently, Creating an automated method for detecting malaria parasites is the aim of this study. We employ a MobileNetV2 pretrained model with CNN technology. Because it has been trained on dozens or even millions of data points, this pretrained model is incredibly light but dependable. There are two main benefits of automatic malaria parasite detection: firstly, it can offer a more accurate diagnosis, particularly in locations with limited resources; secondly, it lowers diagnostic expenses. The optimizer utilizes Adam Weight, the criteria uses NLLLoss, and the model is trained using 32 for batch_size. In the fourteenth epoch, we obtained the maximum accuracy score of 96.26% based on the training data. The outcomes of the predictions demonstrate how excellent this score is. EfficienceNet, DenseNet, AlexNet, and other pretrained models are among the alternatives that scientists are advised to try training with.
Our surroundings’ auditory landscapes are a wealth of knowledge, providing insights into a range of outdoor pursuits. The automatic classification of these actions using audio event detection and classification (AEDC...
Our surroundings’ auditory landscapes are a wealth of knowledge, providing insights into a range of outdoor pursuits. The automatic classification of these actions using audio event detection and classification (AEDC) systems has a great deal of potential applications in environmental monitoring, security, surveillance, and driverless cars. Even though AEDC has advanced significantly in indoor settings, difficulties still exist outside because of the variable and changing acoustic conditions brought on by elements like the weather, different sound sources, and ambient noise from traffic and industry. This study suggests an outdoor audio event categorization model based on convolutional neural networks (CNNs). The suggested model shows passable accuracy by utilizing adaptation to the downstream task using the ESC-50 dataset and transfer learning from a pre-trained model. The effectiveness of multi-class audio classification models in downstream tasks is analyzed in this paper, with an emphasis on the effect of an increasing number of output classes on accuracy. Three models—three, four, and five classes—with different output class configurations are used in the study, and their training and validation accuracies are assessed. Although the accuracy scores above 80% are commendable, the data show a discernible reduction in performance as the number of classes rises. Notably, the three-class model attains a validation accuracy exceeding 90%, whereas the four-class and five-class models exhibit reduced accuracies, falling below 90% and 85%, respectively.
computer vision algorithms can quickly analyze numerous images and identify useful information with high accuracy. Recently, computer vision has been used to identify 2D materials in microscope images. 2D materials ha...
详细信息
Biometric technologies are being considered lately for student identity management in Higher Education Institutions, as they provide several advantages over the traditional knowledge-based and token-based authenticati...
详细信息
Recently, Wang et al. proposed a computationally transferable authenticated key agreement protocol for smart healthcare by adopting the certificateless public-key cryptography. They claimed that their protocol could e...
Recently, Wang et al. proposed a computationally transferable authenticated key agreement protocol for smart healthcare by adopting the certificateless public-key cryptography. They claimed that their protocol could ensure privacy, resist various attacks, and possess superior properties. After analyzing their protocol, we find that it suffers from some flaws. Firstly, user privacy is not ensured as claimed. Secondly, some statements are inaccurate or missing. Thirdly, it cannot resist DoS attack. In this paper, the details of how these flaws threaten Wang et al.’s protocol are shown.
暂无评论