WI-FI-6/6E is now commercialized and the WI-FI community is currently developing the IEEE 802.11be standard, namely WI-FI-7, which will offer enhanced throughput and higher data rate than its predecessors. In this art...
WI-FI-6/6E is now commercialized and the WI-FI community is currently developing the IEEE 802.11be standard, namely WI-FI-7, which will offer enhanced throughput and higher data rate than its predecessors. In this article, a compact triple-band printed inverted-F (IF) antenna operating at 2.4 GHz, 5 GHz, and 6 GHz frequency bands is designed for WI-FI-7 applications. We design a novel antenna structure that is well-suited for triple-band operation. The core idea is to use a stripline as a feeder that also couples two modified IF designs. A nature-inspired optimization method, namely the artificial hummingbird algorithm (AHA), is used to achieve an optimal design solution for the triple-band IF antenna. Computed results demonstrate that the proposed antenna achieves satisfactory results regarding the reflection coefficient and the realized gain in all the frequency bands of interest.
Despite the abundance of subphenotype clustering studies on sepsis and acute kidney injury (AKI), few models consider the real-time information of clinical features. The lack of supervision may lead to patient subgrou...
详细信息
Monitoring a tributary's water depth and velocity can provide a wealth of information for ecological systems. Typically, tributaries are located deep within the jungle, and manual measurement is the norm. The rese...
详细信息
Customer churn is a situation that receives extensive analysis using a variety of techniques from data mining or machine learning. Data mining techniques may be used to anticipate customer churn. A data mining algorit...
详细信息
Customer churn is a situation that receives extensive analysis using a variety of techniques from data mining or machine learning. Data mining techniques may be used to anticipate customer churn. A data mining algorithm was used in this study to forecast client turnover. Logistic Regression and gradient boosting models were employed as one of the data mining techniques for implementing customer churn forecasts. The gradient boosting model could be said to perform better in predicting customer churn when compared to the logistic regression model, which produced accuracy training 87% and testing 88%. The results showed that the gradient boosting model was able to carry out the training and testing process with a training accuracy of 93% and a testing accuracy of 91%.
Recently, single image super-resolution (SR) under large scaling factors has witnessed impressive progress by introducing pre-trained generative adversarial networks (GANs) as priors. However, most GAN-Priors based SR...
详细信息
Optimal percolation concerns the identification of the minimum-cost strategy for the destruction of any extensive connected components in a network. Solutions of such a dismantling problem are important for the design...
详细信息
Optimal percolation concerns the identification of the minimum-cost strategy for the destruction of any extensive connected components in a network. Solutions of such a dismantling problem are important for the design of optimal strategies of disease containment based either on immunization or social distancing. Depending on the specific variant of the problem considered, network dismantling is performed via the removal of nodes or edges, and different cost functions are associated to the removal of these microscopic elements. In this paper, we show that network representations in geometric space can be used to solve several variants of the network dismantling problem in a coherent fashion. Once a network is embedded, dismantling is implemented using intuitive geometric strategies. We demonstrate that the approach well suits both Euclidean and hyperbolic network embeddings. Our systematic analysis on synthetic and real networks demonstrates that the performance of embedding-aided techniques is comparable to, if not better than, the one of the best dismantling algorithms currently available on the market.
Bone Age Assessment (BAA) is crucial for the biological maturity evaluation of children. Developing automated techniques of BAA has gained a lot of attention from both academia and medicine. This paper presents a nove...
Bone Age Assessment (BAA) is crucial for the biological maturity evaluation of children. Developing automated techniques of BAA has gained a lot of attention from both academia and medicine. This paper presents a novel deep-learning-based BAA method including refining and multi-scale processing of hand X-ray images. The refining step removes unnecessary background and noises in the images, resulting in a high-quality dataset. Such image refinement is beneficial for Region of Interest (ROI) localization step with self-attention mechanism. The localization model is trained with multiscale hand X-ray images separately to obtain multiple ROIs for each image. Eventually, the multiscale ROIs are used as complementary features of an image in training a regression model for BAA. We evaluate the performance of the proposed method using 2017 RSNA pediatric bone age challenge dataset. The results show mean absolute error of 3.52, which is 24.9% lower than state-of-the-art results.
This study explored the application of CNN-Transfer Learning for nondestructive chicken egg fertility detection for precise poultry hatchery practices. Four models, VGG16, ResNet50, InceptionNet, and MobileNet, were t...
详细信息
The use of sensors in smart vehicles brings benefits and vulnerabilities. Different kinds of sensors in smart vehicles are vulnerable to cyber-attack. Until now, the investigation of challenges and solutions for in-ve...
The use of sensors in smart vehicles brings benefits and vulnerabilities. Different kinds of sensors in smart vehicles are vulnerable to cyber-attack. Until now, the investigation of challenges and solutions for in-vehicle cybersecurity hasn't discussed various sensor objects and their correlation. In this study, we studied the cyber security problems of sensors in smart vehicles and how to overcome them. The research was designed as Systematic Literature Review (SLR) using the Kitchenham methodology with modification in the filtering phase using the artificial intelligence application, Elicit, to identify the problems, conclusions, and methodology description. Seventeen publications from 2016 until 2023 were gained from five databases. As a result, we find that the most discussed object related to cybersecurity sensors on smart vehicles are Electronic Control Units. Spoofing and jamming is still the most addressed threat, and machine learning is the most utilized solution to be implemented in detection systems. Advanced detection systems are incorporating updated attack models. We also suggest using updated attack models and machine learning algorithms to ensure the safety and security of smart vehicle technology. All identified sensor technology correlated using mind maps under the Intelligent Transport System theory.
Cooperative, Connected and Automated Mobility will enable the close coordination of actions between vehicles, road users and traffic infrastructures, resulting in profound socioeconomic impacts. In this context, locat...
详细信息
ISBN:
(数字)9781665406734
ISBN:
(纸本)9781665406741
Cooperative, Connected and Automated Mobility will enable the close coordination of actions between vehicles, road users and traffic infrastructures, resulting in profound socioeconomic impacts. In this context, location and yaw angle of vehicles is considered vital for safe, secured and efficient driving. Motivated by this fact, we formulated a multimodal sensor fusion problem which provides more accurate localization and yaw information than the original sources. Simultaneously estimating location and yaw parameters of vehicles can be treated as the task of cooperative odometry or awareness. To do so, V2V communication as well as multimodal self and inter-vehicular measurements from various sensors are considered for the problem formulation. The solution strategy is based on the maximum likelihood criterion as well as a novel alternating gradient descent approach. To simulate realistic traffic conditions, CARLA autonomous driving simulator has been used. The detailed evaluation study has shown that each vehicle, relying only on its neighborhood, is able to accurately re-estimate both its own and neighboring states (comprised of locations and yaws), effectively realising the vision of 360 ◦ awareness.
暂无评论