In this paper, a low-design effort, compact analog-to-digital converter (ADC) based on pulse-width modulation with a high level of digital (highly synthesizable) building block is described. Thus, the topology can tak...
详细信息
ISBN:
(数字)9798350330991
ISBN:
(纸本)9798350331004
In this paper, a low-design effort, compact analog-to-digital converter (ADC) based on pulse-width modulation with a high level of digital (highly synthesizable) building block is described. Thus, the topology can take advantage of exploiting digital design tools offering supply-voltage scalability although relying on minimum re-design of the core block. The operating principle is based on the charge and discharge of a timing capacitor that allows an input-voltage-to-duty-cycle conversion. The duty cycle, in turn, enables the count of a counter exited by a ring oscillator. Post-layout time-domain simulations of the ADC performed at 180nm show a power consumption of 494 nW with a sample rate of 5 kS/s, 5.6 ENOB at 0.4 V supply voltage, and a compact area of 7200 μm
2
. The very low power consumption makes the proposed circuits very well suited for energy-harvested systems-on-chip for Internet of Things applications.
Machine learning method is efficient and effective in detecting DDoS attacks, but it all begins from identifying and selecting their important features. This paper presents an implementation of feature selection for D...
Machine learning method is efficient and effective in detecting DDoS attacks, but it all begins from identifying and selecting their important features. This paper presents an implementation of feature selection for DDoS detection based on Random Forest method. In our implementation, we use a LOIC software flood DDoS requests to a target computer, then control the target to extract the features from the captured IP packets, and finally calculate their Gini feature importance and ranking for subsequent feature selection.
Federated learning-based strategy can confirm data privacy, as well as other related ones like split learning and differential privacy. When enjoying secured data sharing, we also worry that the data privacy preservin...
Federated learning-based strategy can confirm data privacy, as well as other related ones like split learning and differential privacy. When enjoying secured data sharing, we also worry that the data privacy preserving may harm the model’s overall performance. Given the most recent progress in machine learning and AI methodology, we incorporate self-supervised learning to plug in the federated learning framework and the integrated system can guarantee the model performance and data privacy preservation simultaneously. In the integrated framework, we have different clients to keep their own data, and the data are well separated into the attribute half and the label half, for enhanced privacy, not to mention the additional privacy-preserving skill like differential privacy. Given all the aforementioned components, we can still have the privacy-preserving components equipped model performed superior to or is compatible with the performance without the privacy-preserving components. That is, one client can perform better when adding more information from other clients, without the data sharing in between, and no clients own both the attributes and the corresponding labels. The focused topic is anomaly detection and we pay attention to the imbalanced nature of the data which shows additional challenges to the problem. Given the problem, self-supervised learning is especially useful when obtaining the label information is considered non-trivial. After all, we demonstrate the overall model effectiveness when compared to methods without any federated learning components.
In a world with an overgrowing elderly population, there exists a critical need for a greater number of skilled individuals in the nursing industry. AI-based systems can be useful, compared to traditional ones with re...
详细信息
ISBN:
(数字)9798350375503
ISBN:
(纸本)9798350375510
In a world with an overgrowing elderly population, there exists a critical need for a greater number of skilled individuals in the nursing industry. AI-based systems can be useful, compared to traditional ones with require in-person assistance, to accurately identify nursing activities and assess the nursing trainees to help them become proficient. This paper addresses classifying activities in one such procedure, endotracheal suctioning, using skeletal keypoint data of the subject performing the procedure. A multi-step structured prompt engineering method was established and utilized on several LLMs to select or calculate key features from the data. Then the features are passed onto several tuned machine learning models to obtain results. A tuned XGBoost prevailed across all models, achieving 90% accuracy on the validation set.
This research investigates the use of machine learning methods to forecast students’ academic performance in a school setting. Students’ data with behavioral, academic, and demographic details were used in implement...
详细信息
ISBN:
(数字)9798331530983
ISBN:
(纸本)9798331530990
This research investigates the use of machine learning methods to forecast students’ academic performance in a school setting. Students’ data with behavioral, academic, and demographic details were used in implementations with standard classical machine learning models including multi-layer perceptron classifier (MLPC). MLPC obtained 86.46% maximum accuracy for test set across all implementations while for train set, it was 99.45%. Under 10-fold cross validation, MLPC obtained 79.58% average accuracy for test set while for train set, it was 99.65%. MLP’s better performance over other machine learning models strongly suggest the potential use of neural networks as data-efficient models. Feature selection approach played a crucial role in improving the performance and multiple evaluation approaches were used in order to compare with existing literature. Explainable machine learning methods were utilized to demystify the black box models and to validate the feature selection approach.
Power prediction tasks are of significant importance in time-series prediction research due to their close association with energy issues. However, when applying traditional clustering algorithms to predict power cons...
Power prediction tasks are of significant importance in time-series prediction research due to their close association with energy issues. However, when applying traditional clustering algorithms to predict power consumption using time-series data, three main problems often arise. Firstly, clustering results may be of poor quality due to insufficient users in the cluster. Secondly, users in the same cluster may have similar total power consumption values for the year, but their data may differ in some fine-grained time periods. Finally, users in different clusters may still have similar data in certain time periods. To address these issues, we propose a new Two-Stage Clustering Framework (TSCF). Our framework can divide user data into proper data segments, making it applicable even if there is only one single user, thereby addressing the issue of weak clustering performance caused by insufficient users. Additionally, TSCF segments data into finer pieces to address the issue of fine-grained dissimilarity between users in the same cluster, and groups similar data segments into the same cluster to address the issue of similar data in different clusters. Finally, TSCF leverages the model selection process to find the model that best fits current user data. Extensive experiments are conducted on real-world power consumption data of commercial users in Taiwan and the United States to compare our proposed framework with various baseline approaches. The results show that our proposed framework outperforms baseline methods by approximately 49.67% and 144.22% on the MAE and MAPE indicators, respectively.
A new closed-air-system enabled by clean unit system platform (CUSP) and Gas-Exchange-Membrane (GEM) is demonstrated to be versatile for sleep assessment, or in general, improving Quality-of-Life (QOL). In a new high ...
详细信息
This research investigates the use of machine learning methods to forecast students' academic performance in a school setting. Students' data with behavioral, academic, and demographic details were used in imp...
详细信息
Recently, Bansal et al. proposed a dual-layer message security technique using steganography and cryptography. An index table maps each text data to an index point and an elliptic curve point. The text data are encryp...
Recently, Bansal et al. proposed a dual-layer message security technique using steganography and cryptography. An index table maps each text data to an index point and an elliptic curve point. The text data are encrypted using elliptic curve cryptography, and the corresponding index values are embedded in a cover image using the Least Significant Bit Inversion technique. The proposed paper breaks the security of the key exchange technique in the Bansal et al. method and the secret text is extracted.
In recent years, developments in artificial intelligence (AI) and computer vision (CV) have led to an increase in research regarding retail product detection. However, effective CV use for identifying objects continue...
详细信息
暂无评论