Results (36)
Search Parameters:
Keyword: ThresholdEstimating a Minimum Embedding Dimension by False Nearest Neighbors Method without an Arbitrary Threshold
The false nearest neighbors (FNN) method estimates the variables of a system by sequentially embedding a time series into a higher-dimensional delay coordinate system and finding an embedding dimension in which the neighborhood of the delay coordinate vector in the lower dimension does not extend into the higher, that is, a dimension in which no…
Read MoreApplications of TCAD Simulation Software for Fabrication and study of Process Variation Effects on Threshold Voltage in 180nm Floating-Gate Device
In this work, a study of the process variation effects on the threshold voltage of a floating- gate device is proposed. The study demonstrates the sensitivity of the threshold voltage to five geometrical parameters including gate length, gate width, tunneling gate oxide thickness, bottom oxide-nitride-oxide oxide thickness, and nitride spacer thickness. This paper also proposed…
Read MoreThreshold Multi Split-Row algorithm for decoding irregular LDPC codes
In this work, we propose a new threshold multi split-row algorithm in order to improve the multi split-row algorithm for LDPC irregular codes decoding. We give a complete description of our algorithm as well as its advantages for the LDPC codes. The simulation results over an additive white gaussian channel show that an improvement in…
Read MoreLandmarking Technique for Improving YOLOv4 Fish Recognition in Various Background Conditions
The detection and classification of fish is a prevalent and fascinating area of study. Numerous researchers develop skills in fish recognition in both aquatic and non-aquatic environments, which is beneficial for population control and the aquaculture industry, respectively. Rarely is research conducted to optimize the recognition of fish with diverse backgrounds. This paper proposes a…
Read MoreTemperature-Compensated Overcharge Protection Measurement Technology
Recently, many problems have been caused by battery fires. The existing BMS(Battery Managment System) measured the voltage of each cell of the battery through the physical connection between the battery and the control module. However, if a battery with up to 1000 VDC becomes inoperable due to an external factor, the battery is damaged, and…
Read MoreCharacterization and Investigating the Effect of Gate-Insulator Thickness on Co-Axial Cylindrical Carbon Nanotube Field Effect Transistor
Carbon nanotube field effect transistor (CNTFET) has a huge advantage over the Si- MOSFET. In MOSFET switching occurs by altering channel resistivity whereas in CNTFET switching occurs by modulation contact resistance. CNTFET generates three to four times of drive current than MOSFET. Transconductance of CNTFET is four times higher than the MOSFET. The average carrier…
Read MoreA CMOS On-Chip High-Precision PVTL Detector
A novel PVTL (Process, Voltage, Temperature, Leakage) detection circuit consisting of four individual detectors is proposed in the investigation. Voltage Variation Detector is composed of a feedback control block comprising multi-stage delay cells using high Vth devices such that 0.5% of VDD variation can be detected. Temperature Detector based on a current to pulse converter…
Read MoreSegmentation of Stocks: Dynamic Dimensioning and Space Allocation, using an Algorithm based on Consumption Policy, Case Study
This paper addresses the stock management aspect. Through this work, we provide a dynamic model of dimensioning and allocation of stocks to storage location for the automotive industry field. This model takes into consideration all constraints of the supply chain (24 constraints) from the suppliers passing by production, storage up to customer delivery and transport.…
Read MoreApplication-Programming Interface (API) for Song Recognition Systems
The main contribution of this paper is the framework of Application Programming Interface (API) to be integrated on a smartphone app. The integration with algorithm that generates fingerprints from the method ST-PSD with several parameter configurations (Windows size, threshold, and sub-score linear combination coefficient). An approach capable of recognizing an audio piece of music with…
Read MoreAnalysis and Evaluation of Competitiveness in Medical Tourism Industry in Taiwan
Tourism is relatively high profit, low-cost and high work opportunity industry. Medical tourism is special kind of business type in tourism industry. The characteristic of medical tourism is high threshold and high profit for hospital and government. But, fewer literatures research about competitiveness of medical tourism industry until now. Especially, medical tourism industry faces big…
Read MoreDocker-C2A : Cost-Aware Autoscaler of Docker Containers for Microservices-based Applications
This article proposes a cost-aware autoscaler for microservices-based applications deployed with docker containers. This autoscaler decreases the cost of the application deployment as it reduces computing resources. In elastic treatment, microservice resources are scaled when the used metric as the central processing unit (CPU) exceeds the threshold. In case of threshold exceeding, an autoscaler adds…
Read MoreMethod of Analysis and Classification of Acoustic Emission Signals to Identify Pre-Seismic Anomalies
A new method of analysis and classification of rock acoustic emission signals is proposed. It is based on symbol description of signals and involves the following processing. First, signal segments containing pulses are detected. Second, noise of the detected pulses is reduced by the wavelet filtration method. Fourth-order symlets and adaptive threshold scheme based on…
Read MoreAlgorithm Design for Accurate Steps Counting Based on Smartphone Sensors for Indoor Applications
This paper aims to design an accurate and robust algorithm for counting the steps based on the smartphone’s accelerometer for indoor applications. Different daily activities have been considered in the experimental scenarios, including normal walking with various smartphone positions and running activities. The detection process’s accuracy is ensured by setting an appropriate segregation approach and…
Read MoreAutomatic Stochastic Dithering Techniques on GPU: Image Quality and Processing Time Improved
Dithering or error diffusion is a technique used to obtain a binary image, suitable for printing, from a grayscale one. At each step, the algorithm computes an allowed value of a pixel from a grayscale one, applying a threshold and, therefore, causing a conversion error. To obtain the optical illusion of a continuous tone, the…
Read MoreVLSI Architecture for OMP to Reconstruct Compressive Sensing Image
A real-time embedded system requires plenty of measurements to fallow the Nyquist criteria. The hardware built for such a large number of measurements, is facing the challenges like storage and transmission rate. Practically it is very much complex to build such costly hardware. Compressive Sensing (CS) will be a future alternate technique for the Nyquist…
Read MoreEvaluation of Disadvantaged Regions in East Java Based-on the 33 Indicators of the Ministry of Villages, Development of Disadvantaged Regions, and Transmigration Using the Ensemble ROCK (Robust Clustering Using Link) Method
East Java province is a large province in Indonesia, in which Surabaya is the second largest metropolitan city after Jakarta. Various problems of development inequality in East Java have caused East Java to be defined as a disadvantaged area in 2015. The determination of disadvantaged regions is carried out every 5 years using 6 criteria…
Read MoreLow Power Bulk Driven Series Parallel OTA for Low Frequency Applications
Low power OTAs are the most preferred circuits in the realization of continuous time filters of analog front end of wearable healthcare devices. A low transconductance OTA with series parallel current mirror to realize large time constant of the filter is designed. The differential pair of the OTA uses bulk driven PMOSFETs and the subthreshold…
Read MoreAnalysis of Security-Reliability Trade-off for Multi-hop Cognitive Relaying Protocol with TAS/SC Technique
This paper studies a trade-off between security (intercept probability (IP)) and reliability (outage probability (OP)) for a multi-hop decode-and-forward (DF) relaying protocol in an underlay cognitive radio network, in presence of a multi-antenna eavesdropper. In the considered protocol, all primary and secondary terminals are equipped with multiple antennas, and they employ transmit antenna selection (TAS)…
Read MoreThe Sound of Trust: Towards Modelling Computational Trust using Voice-only Cues at Zero-Acquaintance
Trust is essential in many interdependent human relationships. Trustworthiness is measured via the effectiveness of the relationships involving human perception. The decision to trust others is often made quickly (even at zero acquaintance). Previous research has shown the significance of voice in perceived trustworthiness. However, the listeners’ characteristics were not considered. A system has yet…
Read MoreA Psychovisual Optimization of Wavelet Foveation-Based Image Coding and Quality Assessment Based on Human Quality Criterions
In the present article, we introduce a foveation-based optimized embedded and its optimized version image coders thereafter called VOEFIC/MOEFIC and its related foveation wavelet visible difference predictor FWVDP coding quality metric. It advances a visually advanced foveal weighting mask that regulates the wavelet-based image spectrum before its encoding by the SPIHT encoder. It intends to…
Read MoreAn Algorithm to Improve Data Accuracy of PMs Concentration Measured with IoT Devices
Air pollution is responsible for increased morbidity and mortality due to respiratory problems mainly caused by long term exposure. Although the emissions of principal air pollutants are highly regulated, there is a lack of information about the real extent of personal exposure for an accurate health impact assessment. To tackle these challenges, local air pollution…
Read MoreA Smart Box for Blood Bags Transport: Simulation Model of the Cooling Autonomy Control System
This paper faces the topic of blood products transport by applying simulation, control and data exchange technologies in order to implement a safe and efficient integrated transportation system. As known, the bio-chemical properties of blood and its derivatives are subjected to deterioration whenever a well determined temperature range is not respected for an excessive time…
Read MoreAn Algorithm for Automatic Measurement of KI-67 Proliferation Index in Digital Images of Breast Tissue
This paper proposes an algorithm aimed at quantifying the expression of KI-67 protein in digital images of breast biopsy tissue samples obtained through an optical microscope. The algorithm allows to obtain a report on the quantity of non-proliferating and proliferating cells through the detection and quantification of KI-67. The sample analysis via software aims to…
Read MoreSiC-FET Gas Sensor for Detecting Sub-ppm Gas Concentrations
This paper describes a silicon carbide-field effect transistor (SiC-FET) gas sensor that is able to detect NO, O2, NH3, CO, and SO2. The gate of the sensor FET is a gas detection layer that consists of yttria-stabilized zirconia, nickel oxide, and platinum. The threshold voltages of the sensor depend on the target gas concentration, measurement…
Read MoreLocalization of Emerging Leakages in Water Distribution Systems: A Complex Networks Approach
Water distribution networks are infrastructural systems designed for providing potable water to consumers. In these last decades, the importance of assessing and identifying emerging leakages has become a primary issue, because of the high level of water loss characterizing such systems worldwide. In this paper, a new approach aimed at the prompt localization of leakages…
Read More
