This paper proposed a fully LTPS-TFT-based bi-directional biomedical pixel interface with integrated a high linearity stimulator and a high-performance bio-potential sensing front-end circuit to amplify and digitize b...
详细信息
This study explores techniques to mitigate interference in assessing functions related to AM radio wave signals in digital media receivers. Signal transmission cable testing focused on BNC RG59 75-ohm cables with leng...
详细信息
As smart grids evolve, they will play an important role in shaping a more efficient, sustainable, and flexible power grid for the future. When planning to implement battery storage systems in distribution networks, co...
详细信息
This article introduces a novel model for low-quality pedestrian trajectory prediction, the social nonstationary transformers (NSTransformers), that merges the strengths of NSTransformers and spatiotemporal graph tran...
详细信息
Localization of sensor nodes in the internet of underwater things(IoUT)is of considerable significance due to its various applications,such as navigation,data tagging,and detection of underwater ***,in this paper,we p...
详细信息
Localization of sensor nodes in the internet of underwater things(IoUT)is of considerable significance due to its various applications,such as navigation,data tagging,and detection of underwater ***,in this paper,we propose a hybrid Bayesian multidimensional scaling(BMDS)based localization technique that can work on a fully hybrid IoUT network where the nodes can communicate using either optical,magnetic induction,and acoustic *** communication technologies are already used for communication in the underwater environment;however,lacking localization *** and magnetic induction communication achieves higher data rates for short *** the contrary,acoustic waves provide a low data rate for long-range underwater *** proposed method collectively uses optical,magnetic induction,and acoustic communication-based ranging to estimate the underwater sensor nodes’final ***,we also analyze the proposed scheme by deriving the hybrid Cramer-Rao lower bound(H-CRLB).Simulation results provide a complete comparative analysis of the proposed method with the literature.
Mobile Crowdsensing (MCS) has emerged as a compelling paradigm for data sensing and collection, leveraging the widespread adoption of mobile devices and the active participation of numerous users. Despite its potentia...
详细信息
In recent years, diagnosis of fetal health has prevented fetal hypoxia at birth and reduced infant mortality. The acquired data from Cardiotocography (CTG) signals are used to monitor and evaluate the status of the fe...
详细信息
This paper presents a new and efficient tree data structure for sorting and collision detection of disks in 2D based on a new tree-based data structure, called hexatree, which is introduced for the first time in this ...
详细信息
A new 17-level inverter using a couple of coupled inductors is presented in this paper. In the proposed structure, the current and voltage ratings of the switches are lower than the output rated current and voltage, r...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)is an indispensable functional module of ***,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance *** paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against ***,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of ***,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from ***,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'***,several challenges and open problems are presented to inspire further exploration and future research in this field.
暂无评论