Amidst rising distributed generation and its potential role in grid management, this article presents a new realistic approach to determine the operational space and flexibility potential of an unbalanced active distr...
详细信息
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communicati...
详细信息
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communication through open networks is insecure and has many vulnerabilities, making it susceptible to unauthorized access and misuse. Encryption models are used to secure medical data from unauthorized access. In this work, we propose a bit-level encryption model having three phases: preprocessing, confusion, and diffusion. This model is designed for different types of medical data including patient information, clinical data, medical signals, and images of different modalities. Also, the proposed model is effectively implemented for grayscale and color images with varying aspect ratios. Preprocessing has been applied based on the type of medical data. A random permutation has been used to scramble the data values to remove the correlation, and multilevel chaotic maps are fused with the cyclic redundancy check method. A circular shift is used in the diffusion phase to increase randomness and security, providing protection against potential attacks. The CRC method is further used at the receiver side for error detection. The performance efficiency of the proposed encryption model is proved in terms of histogram analysis, information entropy, correlation analysis, signal-to-noise ratio, peak signal-to-noise ratio, number of pixels changing rate, and unified average changing intensity. The proposed bit-level encryption model therefore achieves information entropy values ranging from 7.9669 to 8.000, which is close to the desired value of 8. Correlation coefficient values of the encrypted data approach to zero or are negative, indicating minimal correlation in encrypted data. Resistance against differential attacks is demonstrated by NPCR and UACI values exceeding 0.9960 and 0.3340, respectively. The key space of the proposed model is 1096, which is substantially mor
To accommodate the wide range of input voltages supplied by redundant batteries and ensure an adequate hold-up time for communication systems during utility power failures, power supplies used in 5 G base stations typ...
详细信息
The realization of brain-scale spiking neural networks (SNNs) is impeded by power constraints and low integration density. To address these challenges, multi-core SNNs are utilized to emulate numerous neurons with hig...
详细信息
The realization of brain-scale spiking neural networks (SNNs) is impeded by power constraints and low integration density. To address these challenges, multi-core SNNs are utilized to emulate numerous neurons with high energy efficiency, where spike packets are routed through a network-on-chip (NoC). However, the information can be lost in the NoC under high spike traffic conditions, leading to performance degradation. This work presents NEXUS, a 16-core SNN with a diamond-shaped NoC topology fabricated in 28-nm CMOS technology. It integrates 4096 leaky integrate-and-fire (LIF) neurons with 1M 4-bit synaptic weights, occupying an area of 2.16 mm2. The proposed NoC architecture is scalable to any network size, ensuring no data loss due to contending packets with a maximum routing latency of 5.1μs for 16 cores. The proposed congestion management method eliminates the need for FIFO in routers, resulting in a compact router footprint of 0.001 mm2. The proposed neurosynaptic core allows for increasing the processing speed by up to 8.5× depending on input sparsity. The SNN achieves a peak throughput of 4.7 GSOP/s at 0.9 V, consuming a minimum energy per synaptic operation (SOP) of 3.3 pJ at 0.55 V. A 4-layer feed-forward network is mapped onto the chip, classifying MNIST digits with 92.3% accuracy at 8.4Kclassification/ s and consuming 2.7-μJ/classification. Additionally, an audio recognition task mapped onto the chip achieves 87.4% accuracy at 215-μJ/classification. IEEE
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for perso...
详细信息
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for person identification through ***,such systems are susceptible to forgery,posing security *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** innovative method is intricately designed,encompassing five distinct phases:data collection,preprocessing,feature extraction,significant feature selection,and *** key advancement lies in the creation of a novel dataset specifically tailored for Bengali handwriting(BHW),setting the foundation for our comprehensive ***-preprocessing,we embarked on an exhaustive feature extraction process,encompassing integration with kinematic,statistical,spatial,and composite *** meticulous amalgamation resulted in a robust set of 91 *** enhance the efficiency of our system,we employed an analysis of variance(ANOVA)F test and mutual information scores approach,meticulously selecting the most pertinent *** the identification phase,we harnessed the power of cutting-edge deep learning models,notably the Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM).These models underwent rigorous training and testing to accurately discern individuals based on their handwriting ***,our methodology introduces a groundbreaking hybrid model that synergizes CNN and BiLSTM,capitalizing on fine motor features for enhanced individual ***,our experimental results unde
This study focuses on creating an accurate reflection prediction model that will guide the design of filters with multilayer Anti-Reflection Coating (ARC) to optimize the thickness parameters using Machine Learning (M...
详细信息
This study focuses on creating an accurate reflection prediction model that will guide the design of filters with multilayer Anti-Reflection Coating (ARC) to optimize the thickness parameters using Machine Learning (ML) and Deep Learning (DL) techniques. This model aims to shed light on the design process of a multilayer optical filter, making it more cost-effective by providing faster and more precise production. In creating this model, a dataset containing data obtained from 3000 (1500 Ge–Al2O3, 1500 Ge–SiO2) simulations previously performed on a computer based on the thicknesses of multilayer structural materials was used. The data are generated using Computational Electromagnetic simulation software based on the Finite-Difference Time-Domain method. To understand the mechanism of the proposed model, two different two-layer coating simulations were studied. While Ge was used as the substrate in both coatings, Al2O3 and SiO2 were used as the second layers. The data set consists of the 3–5 µm and 8–12 µm bands typical for the mid-wave infrared (MWIR) and long-wave infrared (LWIR) bands and includes reflectance values for wavelengths ranging between these spectra. In the specified 2-layer data set, the average reflectance was obtained with a minimum of 0.36 at 515 nm Ge and 910 nm SiO2 thicknesses. This value can be increased by adapting the proposed model to more than 2 layers. Six ML algorithms and a DL model, including artificial neural networks and convolutional neural networks, are evaluated to determine the most effective approach for predicting reflectance properties. Furthermore, in the proposed model, a hyperparameter tuning phase is used in the study to compare the efficiency of ML and DL methods to generate dual-band ARC and maximize the prediction accuracy of the DL algorithm. To our knowledge, this is the first time this has been implemented in this field. The results show that ML models, particularly decision tree (MSE: 0.00000069, RMSE: 0.00083), rand
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series tec...
详细信息
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series technologies of power semiconductor devices will be difficult to be applied since with uneven voltage sharing ***,this paper proposes a novel cascade method of multi-SiC JFETs based on modules *** method consists of two parts:one is a single-gate driver cascaded SiC JFETs topology which is used to form the module,the other one is an active clamp control strategy which ensures that each module is protected from overvoltage when modules are *** proposed cascade method can effectively suppress voltage overshoot of cascading power devices in the switching *** on the proposed cascade method,a 5kV/63A SSCB prototype is ***,an experiment is conducted based on the designed *** results validate the effectiveness of the proposed cascaded method for SSCB.
The dynamic pricing environment offers flexibility to the consumers to reschedule their switching *** the dynamic pricing environment results in several benefits to the utilities and consumers,it also poses some *** c...
详细信息
The dynamic pricing environment offers flexibility to the consumers to reschedule their switching *** the dynamic pricing environment results in several benefits to the utilities and consumers,it also poses some *** crowding among residential customers is one of such *** scheduling of loads at low-cost intervals causes crowding among residential customers,which leads to a fall in voltage of the distribution system below its prescribed *** order to prevent crowding phenomena,this paper proposes a priority-based demand response program for local energy *** the program,past contributions made by residential houses and demand are considered as essential parameters while calculating the priority *** non-linear programming(NLP)model proposed in this study seeks to reschedule loads at low-cost intervals to alleviate crowding *** the NLP model does not guarantee global optima due to its non-convex nature,a second-order cone programming model is proposed,which captures power flow characteristics and guarantees global *** proposed formulation is solved using General Algebraic Modeling System(GAMS)software and is tested on a 12.66 kV IEEE 33-bus distribution system,which demonstrates its applicability and efficacy.
Real-time systems experience many safety and performance issues at run time due to different uncertainties in the environment. Systems are now becoming highly interactive and must be able to execute in a changing envi...
详细信息
Real-time systems experience many safety and performance issues at run time due to different uncertainties in the environment. Systems are now becoming highly interactive and must be able to execute in a changing environment without experiencing any failure. A real-time system can have multiple modes of operation such as safety and performance. The system can satisfy its safety and performance requirements by switching between the modes at run time. It is essential for the designers to ensure that a multi-mode real-time system operates in the expected mode at run time. In this paper, we present a verification model that identifies the expected mode at run time and checks whether the multi-mode real-time system is operating in the correct mode or not. To determine the expected mode, we present a monitoring module that checks the environment of the system, identifies different real-world occurrences as events, determines their properties and creates an event-driven dataset for failure analysis. The dataset consumes less memory in comparison to the raw input data obtained from the monitored environment. The event-driven dataset also facilitates onboard decision-making because the dataset allows the system to perform a safety analysis by determining the probability of failure in each environmental situations. We use the probability of failure of the system to determine the safety mode in different environmental situations. To demonstrate the applicability of our proposed scheme, we design and implement a real-time traffic monitoring system that has two modes: safety, and performance. The experimental analysis of our work shows that the verification model can identify the expected operating mode at run time based on the safety (probability of failure) and performance (usage) requirements of the system as well as allows the system to operate in performance mode (in 3295 out of 3421 time intervals) and safety mode (in 126 out of 3421 time intervals). The experimental resul
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required i...
详细信息
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required in chemical vapor deposition, coating processes, etc. They increase scheduling complexity in cluster tools. In this paper, we focus on scheduling single-arm multi-cluster tools with chamber cleaning operations subject to wafer residency time constraints. When a chamber is being cleaned, it can be viewed as processing a virtual wafer. In this way, chamber cleaning operations can be performed while wafer residency time constraints for real wafers are not violated. Based on such a method, we present the necessary and sufficient conditions to analytically check whether a single-arm multi-cluster tool can be scheduled with a chamber cleaning operation and wafer residency time constraints. An algorithm is proposed to adjust the cycle time for a cleaning operation that lasts a long cleaning ***, algorithms for a feasible schedule are also *** an algorithm is presented for operating a multi-cluster tool back to a steady state after the cleaning. Illustrative examples are given to show the application and effectiveness of the proposed method.
暂无评论