This study investigates the mechanical properties and behavior of palm fiber-reinforced cementitious composite (FRCC) through an experimental program. Palm fibers were utilized as reinforcement, with their physical an...
详细信息
Numerical methods that can accurately reconstruct rough surface profiles are used in various fields of engineering such as remote sensing, microwave imaging, optics, nondestructive testing, etc. These methods express ...
详细信息
ISBN:
(数字)9781733509671
ISBN:
(纸本)9798350362978
Numerical methods that can accurately reconstruct rough surface profiles are used in various fields of engineering such as remote sensing, microwave imaging, optics, nondestructive testing, etc. These methods express the electromagnetic scattered fields measured away from the surface itself as an integral function of the surface profile. This mapping is highly nonlinear and ill-posed (D. Colton and R. Kress, 1998, SpringerVerlag, Berlin), and therefore its inversion for reconstruction of the surface profile from measured scattered fields is challenging. This inversion can done using semi-analytic asymptotic approaches such as the small perturbation and the Rytov approximation methods (A.G. Voronovich, 2013, Springer-Verlag, Berlin), however the range of applicability of these approaches is rather limited. Fully numerical methods that rely on Newton-type iterative linearization techniques and regularization schemes such as those in (S. Arhab, et al., PIERS, pp. 3495–3500, 2017) and (A. Sefer, A. Yapar, IEEE Trans. Geosci Remote Sens., vol. 59, pp. 1041–1051, 2021) have a wider range of applicability but they suffer from convergence and accuracy issues.
The inherent runtime reconfiguration capability of field programmable gate array (FPGA) has been a key feature for deployment in various application scenarios, such as data centers, cloud computing, and edge computing...
详细信息
ISBN:
(数字)9798350354119
ISBN:
(纸本)9798350354126
The inherent runtime reconfiguration capability of field programmable gate array (FPGA) has been a key feature for deployment in various application scenarios, such as data centers, cloud computing, and edge computing, among others. In such applications, reconfiguration is achieved via remote access, which allows multiple users to utilize FPGA resources concurrently and modify the configuration bitstream. An adversary can exploit the accessibility of the configuration bitstream to insert a hardware Trojan (HT) into the FPGA, thereby creating a critical security vulnerability. Since the HT is designed to remain dormant to avoid detection, it can bypass conventional verification and vali-dation techniques. However, any HT inserted in a configuration bitstream must leave a trace even if it is dormant. This paper proposes a supervised learning method using a deep, recurrent neural network (RNN) algorithm to identify such malicious configuration bitstreams in FPGAs. By analysing the patterns present in the bitstream, the proposed method is able to identify any anomalies present in the implemented design. Our method is applied to three ISCAS 85 benchmark circuits of various sizes and topology, implemented on a Xilinx Artix-7 FPGA. Our experimental results showed a maximum accuracy of 93% in detecting HT in bitstreams.
Thin layers with high conductivity values, such as metal sheets, conductive paint, graphene, and other two-dimensional (2D) materials, are commonly used in various electromagnetic applications. One of the fundamental ...
详细信息
ISBN:
(数字)9789463968119
ISBN:
(纸本)9798350359497
Thin layers with high conductivity values, such as metal sheets, conductive paint, graphene, and other two-dimensional (2D) materials, are commonly used in various electromagnetic applications. One of the fundamental challenges in numerical modeling of these thin conductive layers is the requirement for an extremely fine mesh that can accurately capture field variations and account for the intricate geometrical features of the structure (H. Chen, A. J. Taylor and N. Yu, Rep. Prog. Phy., 79,10-35,2016). A dense mesh translates into high computational cost since the number of unknowns is increased and the time step size must be reduced for an explicit time marching scheme (to ensure that the Courant-Friedrichs-Lewy (CFL) condition is satisfied). One can replace the thin conductive layer with an infinitesimally thin sheet on which the resistive boundary condition (RBC) is enforced (T. B. A. Senior and J. L. Volakis, London, UK: IET, 1995). This approach completely avoids the dense mesh and the high computational cost that comes with it. However, RBC has to be incorporated into the electromagnetic solver.
The utilization of cooling systems based on phase change materials has experienced a surge in popularity due to their ability to effectively reduce the temperature of photovoltaic (PV) modules. Phase change materials ...
详细信息
Introduction: Left ventricular assist devices (LVADs) serve both as a bridge to transplantation and as destination therapy for the treatment of congestive heart failure (CHF). However, the inability of the existing co...
详细信息
Introduction: Left ventricular assist devices (LVADs) serve both as a bridge to transplantation and as destination therapy for the treatment of congestive heart failure (CHF). However, the inability of the existing control strategies to automatically adapt LVAD flow according to hemodynamic changes can significantly impact patient survival and quality of life. Physiological control strategies for LVAD show promising results, with reflux and suction detection (RSD) increasing device safety. Methods: This study presents in silico results of an RSD system based on measurements of inlet and outlet pressures in continuous-flow LVAD. Two strategies were used to investigate control feasibility, safety, and adjustments to nonlinear variations and comprehensively assess the system’s state considering a structured algorithm (SA) and ensembles of AI models (eAIm): K-nearest neighbors (KNN), support vector machine (SVM), and artificial neural network (ANN). Results: The SA submodule achieved an accuracy of 99.66% in suction detection but showed limitations in reflux events, with 80.04% accuracy and an F1-Score of 70.4%. The KNN and SVM models demonstrated performance exceeding 96% for both events, exhibiting more excellent stability than the SA submodule. The ANN excelled with low variability and an RMSE of 0.07 in R1, though its suction accuracy (96.7%) was slightly lower than for reflux (99.48%). The KNN was the most effective model, achieving 99.66% accuracy in suction and 98.44% in reflux. The SVM also produced competitive results but with variability across evaluations. The eAIm model showed satisfactory precision (97.78% for suction and 97.14% for reflux), with variations depending on the scenario. The eAIm is recommended for optimization in precision-critical situations. Discussion: These strategies are designed to fulfill the proposal’s feasibility, flexibility, and safety requirements. They address the challenges of achieving consistent reproduction using an SA and the
Document similarity is an important part of Natural Language Processing and is most commonly used for plagiarism-detection and text summarization. Thus, finding the overall most effective document similarity algorithm...
详细信息
Carbon nanotubes are explored as a means of coherently converting the orbital angular momentum of light to an excitonic form that is more amenable to quantum information *** analytical analysis,based on dynamical cond...
详细信息
Carbon nanotubes are explored as a means of coherently converting the orbital angular momentum of light to an excitonic form that is more amenable to quantum information *** analytical analysis,based on dynamical conductivity,is used to show that orbital angular momentum is conserved,modulo N,for a carbon nanotube illuminated by radially polarized,twisted *** result is numerically demonstrated using real-time time-dependent density functional theory which captures the absorption of twisted light and the subsequent transfer of twisted *** results suggest that carbon nanotubes are promising candidates for constructing optoelectronic circuits in which quantum information is more readily processed while manifested in excitonic form.
Making inference with spatial extremal dependence models can be computationally burdensome since they involve intractable and/or censored likelihoods. Building on recent advances in likelihood-free inference with neur...
详细信息
Making inference with spatial extremal dependence models can be computationally burdensome since they involve intractable and/or censored likelihoods. Building on recent advances in likelihood-free inference with neural Bayes estimators, that is, neural networks that approximate Bayes estimators, we develop highly efficient estimators for censored peaks-over-threshold models that use augmented data to encode censoring information in the neural network input. Our new method provides a paradigm shift that challenges traditional censored likelihood-based inference methods for spatial extremal dependence models. Our simulation studies highlight significant gains in both computational and statistical efficiency, relative to competing likelihood-based approaches, when applying our novel estimators to make inference with popular extremal dependence models, such as max-stable, r-Pareto, and random scale mixture process models. We also illustrate that it is possible to train a single neural Bayes estimator for a general censoring level, precluding the need to retrain the network when the censoring level is changed. We illustrate the efficacy of our estimators by making fast inference on hundreds-of-thousands of high-dimensional spatial extremal dependence models to assess extreme particulate matter 2.5 microns or less in diameter (PM2:5) concentration over the whole of Saudi Arabia.
暂无评论