We have previously reported on a nondestructive moisture analysis technique for gaskets that seal a high-pressure cell in the production of polycrystalline diamond. Moisture content plays a crucial role in the perform...
We have previously reported on a nondestructive moisture analysis technique for gaskets that seal a high-pressure cell in the production of polycrystalline diamond. Moisture content plays a crucial role in the performance of these gaskets. Gasket failure may cause explosive decompression that can damage the press anvils; therefore, testing of gaskets for moisture is desired. Radiofrequency measurements were successfully correlated to moisture content, but were disproportionately sensitive to moisture absorbed from the air relative to that remaining from the drying process. In this paper we attempt to spatially differentiate these two moisture types using a new multimode cavity sensor.
In this paper, the problem of detecting correlated components in a p-dimensional Gaussian vector is considered. In the setup considered, s unknown components are correlated with a known covariance structure. Hence, th...
详细信息
In this paper, the problem of detecting correlated components in a p-dimensional Gaussian vector is considered. In the setup considered, s unknown components are correlated with a known covariance structure. Hence, there are equation possible hypotheses for the unknown set of correlated components. Instead of taking a full-vector observation at each time index, in this paper we assume that the observer is capable of observing any subset of components in the vector. With this flexibility in taking observations, the observer is interested in finding the optimal sampling strategy to maximize the error exponent (per sample) of the multi-hypothesis testing problem. We show that, when the correlation of these s components is weak, it is optimal for the observer to take full-vector observations; when the correlation is strong, the strategy of taking full-vector observation is not optimal anymore, and the optimal sampling strategy increases the detection error exponent by 25% at least, compared with the full-vector observation strategy.
This paper presents a novel time division multiple access-medium access control (TDMA-MAC) protocol for vehicular ad hoc networks (VANETs), in which both cooperative and opportunistic transmissions are employed for en...
详细信息
This paper presents a novel time division multiple access-medium access control (TDMA-MAC) protocol for vehicular ad hoc networks (VANETs), in which both cooperative and opportunistic transmissions are employed for enhanced communications. When vehicle density is low, the idle time slots of a licensed VANET channel are used for cooperative transmission through a relay. When the vehicle density is high, cognitive radio technique is applied to seek additional time slots available on the cognitive channels for opportunistic transmission. Simulation results show that the proposed TDMA-MAC protocol can reduce latency and packet loss rate significantly when compared with the existing protocols.
Many advanced EMG-based upper-limb prosthesis control methods require model training in which subjects produce supervised forces/movements. Since unilateral limb-absent subjects cannot produce forces/movements on thei...
详细信息
Many advanced EMG-based upper-limb prosthesis control methods require model training in which subjects produce supervised forces/movements. Since unilateral limb-absent subjects cannot produce forces/movements on their affected side, one technique (mirrored bi-lateral training) relates forces/motions produced on the sound side to EMG on the affected side. However, the efforts made by the phantom limb may not fully reflect those of the sound limb. To understand this issue, three able-bodied subjects produced mirrored bi-lateral forces during constant-posture contraction at the wrist. EMG-force models were formed for 1- and 2-degree of freedom tasks and results compared to previous trials in which ipsilateral training had been conducted. We found that contralateral training generally, but not always, produced errors (in percent maximum voluntary contraction) that were 6-56% larger than those found from ipsilateral training. Our results suggest that a substantial portion-but not all-of the errors found in mirrored tasks may be due to contralateral tracking errors. Further study with a larger population is indicated.
This paper presents a real-time system that can monitor an infant's respiration and detect apnea when it occurs. For infants, bedside monitoring of respiratory signals using noncontact sensors is desirable at the ...
详细信息
ISBN:
(纸本)9781467370066
This paper presents a real-time system that can monitor an infant's respiration and detect apnea when it occurs. For infants, bedside monitoring of respiratory signals using noncontact sensors is desirable at the hospital and for in-home care. Traditional approach employs acoustic sensors which can hardly detect infant breathing due to low SNR. In this paper, a novel method is introduced by using ultra-wideband (UWB) radar that obtains breathing signal from an infant's weak chest vibration. Furthermore, advanced signal processing techniques are proposed to monitor the breathing signal and to detect apnea. Since an infant may move in the crib, a location algorithm is applied periodically to track the current location of the infant's chest. An apnea warning is issued when the respiration is absent for a pre-defined period of time.
Planned and unplanned outages on distribution networks may cause major economic loss to the customers, and can result in substantial reparation payments by the utilities. This paper analyzes the use of a Battery Energ...
详细信息
Motivated by distributed learning with big data sets problems, we study a distributed testing against independence problem with multiple terminals. We connect the problem at hand to a source coding with multiple helpe...
详细信息
Malware, or malicious software, degrades the performance of cyber-physical systems by infecting cyber systems and compromising the information exchange between cyber and physical components. Advanced malwares have the...
详细信息
ISBN:
(纸本)9781479978878
Malware, or malicious software, degrades the performance of cyber-physical systems by infecting cyber systems and compromising the information exchange between cyber and physical components. Advanced malwares have the ability to modify their code over time to escape detection, while also removing competing malwares from a targeted host. In this paper, we model the interaction of multiple adaptive, competing malwares and a system owner via a resource takeover game known as FlipIt, or a game of "stealthy takeover." We characterize the unique Nash equilibrium of a generalization of FlipIt with an arbitrary number of players. We then prove that, by greedily updating their strategies at each time step using only local information, the malwares will converge to a unique Nash equilibrium. In addition, we derive the optimal mitigation strategy against competing malwares as the solution to a Stackelberg game and develop an efficient algorithm for computing the equilibrium. Our results are demonstrated via a numerical study, in which we analyze the behavior of the malwares prior to convergence to the equilibrium and compare the impact of heterogeneous and homogeneous malwares on the system owner's utility.
Fluorescence Recovery After Photobleaching (FRAP) is a commonly used technique for quantifying the movement of small biological systems. To aid in the evaluation of experimentally produced data, we used the parallel p...
详细信息
暂无评论