[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Next Issue
Volume 11, June-2
Previous Issue
Volume 11, May-2
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 

Electronics, Volume 11, Issue 11 (June-1 2022) – 138 articles

Cover Story (view full-size image): Collaborative robots are meant to help humans in dangerous or mundane tasks. In this paper, we review the current use of extended reality (XR) as a way to test and develop collaboration scenarios with robots. We focus on virtual reality (VR) in simulating collaboration scenarios and the use of cobot digital twins. VR is especially useful for simulating dangerous scenarios and allows combining human self-reports with objective data such as biosignals representing stress. We provide a summary of other potential applications of XR and list critical variables for most human–robot collaboration testing frameworks. The use of XR has the potential to shape the way we design and test cobots in a broad range of domains: from industry through healthcare to space operations. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
19 pages, 7288 KiB  
Article
Modified Predictive Direct Torque Control ASIC with Multistage Hysteresis and Fuzzy Controller for a Three-Phase Induction Motor Drive
by Guo-Ming Sung, Li-Fen Tung, Chong-Cheng Huang and Hong-Yuan Huang
Electronics 2022, 11(11), 1802; https://doi.org/10.3390/electronics11111802 - 6 Jun 2022
Cited by 2 | Viewed by 2286
Abstract
This paper proposes a modified predictive direct torque control (MPDTC) application-specific integrated circuit (ASIC) with multistage hysteresis and fuzzy controller to address the ripple problem of hysteresis controllers and to have a low power consumption chip. The proposed MPDTC ASIC calculates the stator’s [...] Read more.
This paper proposes a modified predictive direct torque control (MPDTC) application-specific integrated circuit (ASIC) with multistage hysteresis and fuzzy controller to address the ripple problem of hysteresis controllers and to have a low power consumption chip. The proposed MPDTC ASIC calculates the stator’s magnetic flux and torque by detecting three-phase currents, three-phase voltages, and the rotor speed. Moreover, it eliminates large ripples in the torque and flux by passing through the modified discrete multiple-voltage vector (MDMVV), and four voltage vectors were obtained on the basis of the calculated flux and torque in a cycle. In addition, the speed error was converted into a torque command by using the fuzzy PID controller, and rounding-off calculation was employed to decrease the calculation error of the composite flux. The proposed MDMVV switching table provides 294 combined voltage vectors to the following inverter. The proposed MPDTC scheme generates four voltage vectors in a cycle that can quickly achieve DTC function. The Verilog hardware description language (HDL) was used to implement the hardware architecture, and an ASIC was fabricated with a TSMC 0.18 μm 1P6M CMOS process by using a cell-based design method. Measurement results revealed that the proposed MPDTC ASIC performed with operating frequency, sampling rate, and dead time of 10 MHz, 100 kS/s, and 100 ns, respectively, at a supply voltage of 1.8 V. The power consumption and chip area of the circuit were 2.457 mW and 1.193 mm × 1.190 mm, respectively. The proposed MPDTC ASIC occupied a smaller chip area and exhibited a lower power consumption than the conventional DTC system did in the adopted FPGA development board. The robustness and convenience of the proposed MPDTC ASIC are especially advantageous. Full article
(This article belongs to the Section Power Electronics)
Show Figures

Figure 1

Figure 1
<p>Block diagram of the proposed MPDTC ASIC with fuzzy seven-stage hysteresis and a fuzzy PID controller for s a three-phase IM drive system.</p>
Full article ">Figure 2
<p>Calculation blocks of the synthetic flux with square root, round-off calculation, and DFF circuits.</p>
Full article ">Figure 3
<p>Block diagram of the predictive control model with input flux error (<span class="html-italic">λ<sub>e</sub></span>), torque error (<span class="html-italic">T<sub>e</sub></span>), and speed error (<span class="html-italic">ω<sub>e</sub></span>).</p>
Full article ">Figure 4
<p>Block diagram of a fuzzy PID controller.</p>
Full article ">Figure 5
<p>Block diagram of the error fuzzy controller.</p>
Full article ">Figure 6
<p>Seven–stage fuzzy membership function.</p>
Full article ">Figure 7
<p>Torque error fuzzy controller with five-stage hysteresis control.</p>
Full article ">Figure 8
<p>Flux error fuzzy controller with seven-stage hysteresis control.</p>
Full article ">Figure 9
<p>Time sequence of the MDMVV for the stator torque.</p>
Full article ">Figure 10
<p>Variation in <span class="html-italic">dT</span> with sampling time (<span class="html-italic">T<sub>s</sub></span>), which is equal to four times clock time <span class="html-italic">T<sub>C</sub></span>.</p>
Full article ">Figure 11
<p>Proposed short-circuit prevention scheme.</p>
Full article ">Figure 12
<p>Functional simulation chart of the proposed MPDTC system for a three-phase IM drive.</p>
Full article ">Figure 13
<p>Simulated flux errors of the proposed MPDTC and traditional DTC systems between 0 and 2 s.</p>
Full article ">Figure 14
<p>Simulated torque errors of the proposed MPDTC and traditional DTC systems between 0 and 2 s.</p>
Full article ">Figure 15
<p>Simulated stator flux trajectory of (<b>a</b>) proposed MPDTC and (<b>b</b>) traditional DTC systems.</p>
Full article ">Figure 15 Cont.
<p>Simulated stator flux trajectory of (<b>a</b>) proposed MPDTC and (<b>b</b>) traditional DTC systems.</p>
Full article ">Figure 16
<p>Simulated line voltages in U–V-, V–W-, and W–U-phases (<span class="html-italic">V<sub>ab</sub></span>, <span class="html-italic">V<sub>bc</sub></span>, and <span class="html-italic">V<sub>ca</sub></span>, respectively) for a three-phase IM drive.</p>
Full article ">Figure 17
<p>Simulated voltage waveforms of six-arm signals in the inverter at a clock frequency of 10 MHz and a basic frequency of 1800 rpm (≈33.33 ms).</p>
Full article ">Figure 18
<p>Behavioral simulation of waveforms of six–arm voltage signals of the inverter at a clock frequency of 10 MHz and a basic frequency of 1800 rpm (≈50 ms).</p>
Full article ">Figure 19
<p>Dead time of 100 ns measured in the W-phase by using the logic analyzer.</p>
Full article ">Figure 20
<p>Measured line currents <span class="html-italic">I<sub>as</sub></span> and <span class="html-italic">I<sub>bs</sub></span> at a sampling frequency of 100 kHz and a rotation frequency of 1200 rpm for a three–phase IM.</p>
Full article ">Figure 21
<p>Measured up–arm voltages in the U–phase and V–phase (US<sub>a</sub> and US<sub>b</sub>, respectively).</p>
Full article ">Figure 22
<p>Photomicrograph of the proposed MPDTC ASIC.</p>
Full article ">
27 pages, 3463 KiB  
Article
Measuring the Energy and Performance of Scientific Workflows on Low-Power Clusters
by Mehul Warade, Jean-Guy Schneider and Kevin Lee
Electronics 2022, 11(11), 1801; https://doi.org/10.3390/electronics11111801 - 6 Jun 2022
Cited by 8 | Viewed by 2566
Abstract
Scientific problems can be formulated as workflows to allow them to take advantage of cluster computing resources. Generally, the assumption is that the greater the resources dedicated to completing these tasks the better. This assumption does not take into account the energy cost [...] Read more.
Scientific problems can be formulated as workflows to allow them to take advantage of cluster computing resources. Generally, the assumption is that the greater the resources dedicated to completing these tasks the better. This assumption does not take into account the energy cost of performing the computation and the specific characteristics of each workflow. In this paper, we present a unique approach to evaluating the energy consumption of scientific workflows on compute clusters. Two workflows from different domains, Astronomy and Bioinformatics, are presented and their execution is analyzed on a cluster of low powered small board computers. The paper presents a theoretical analysis of an energy-aware execution of workflows that can reduce the energy consumption of workflows by up to 68% compared to normal execution. We demonstrate that there are limitations to the benefits of increasing cluster sizes and there are trade-offs when considering energy vs. performance of the workflows and that the performance and energy consumption of any scientific workflow is heavily dependent on its underlying structure. The study concludes that the energy consumption of workflows can be optimized to improve both aspects of the workflow and motivates the development of an energy-aware scheduler. Full article
Show Figures

Figure 1

Figure 1
<p>Computing Nodes setup.</p>
Full article ">Figure 2
<p>Data Collection Experiment Setup.</p>
Full article ">Figure 3
<p>A Simple Montage Workflow used in this study.</p>
Full article ">Figure 4
<p>Execution of a 0.5 degree workflow on a 1 node vs. 6 node cluster: (<b>a</b>) 0.5 degree Montage on a small cluster; (<b>b</b>) 0.5 degree Montage on a large cluster.</p>
Full article ">Figure 5
<p>Execution of a 1.0 degree workflow on a 1 node vs. 6 node cluster: (<b>a</b>) 1.0 degree Montage on a small cluster; (<b>b</b>) 1.0 degree Montage on a large cluster.</p>
Full article ">Figure 6
<p>Execution of a 1.5 degree workflow on a 1 node vs. 6 node cluster: (<b>a</b>) 1.5 degree Montage on a small cluster; (<b>b</b>) 1.5 degree Montage on a large cluster.</p>
Full article ">Figure 7
<p>Execution time vs. energy consumption of a Montage 1.0 degree workflow on varying size of cluster.</p>
Full article ">Figure 8
<p>Energy consumption of a Montage 1.0 degree workflow on a 6 node cluster.</p>
Full article ">Figure 9
<p>Execution of a Montage 1.0 degree workflow on 6 node cluster: (<b>a</b>) Node 1—Energy consumption over workflow execution time; (<b>b</b>) Node 2—Energy consumption over workflow execution time; (<b>c</b>) Node 3—Energy consumption over workflow execution time; (<b>d</b>) Node 4—Energy consumption over workflow execution time; (<b>e</b>) Node 5—Energy consumption over workflow execution time; (<b>d</b>) Node 6—Energy consumption over workflow execution time.</p>
Full article ">Figure 10
<p>Execution time vs. energy consumption of a Montage 0.5 degree workflow on varying sizes of cluster.</p>
Full article ">Figure 11
<p>Execution time vs. energy consumption of a Montage 1.5 degree workflow on varying size of cluster.</p>
Full article ">Figure 12
<p>Execution of a Montage 1.5 degree workflow on a 6 node cluster.</p>
Full article ">Figure 13
<p>Total number of executing jobs when <tt>mProject</tt> jobs are running (<b>right</b>) vs. no <tt>mProject</tt> jobs running (<b>left</b>)—comparison 6 nodes vs. 12 nodes.</p>
Full article ">Figure 14
<p>A Simple Bioinformatics Workflow.</p>
Full article ">Figure 15
<p>Varying number of jobs on 1 node cluster for 30 k data.</p>
Full article ">Figure 16
<p>Bioinformatics Workflow—Time vs. Energy Consumption for 10 k.</p>
Full article ">Figure 17
<p>Number of Active Threads per node for a Bioinformatics Workflow with 20 k Data, 6 Nodes and 50 Jobs.</p>
Full article ">Figure 18
<p>Number of Active Threads per node for a Montage 1.0 degree workflow on 6 cluster nodes.</p>
Full article ">Figure 19
<p>Time vs. Energy for Montage workflow as per different policies.</p>
Full article ">Figure 20
<p>Time vs. Energy for Bioinformatics workflow as per different policies.</p>
Full article ">
30 pages, 2268 KiB  
Review
Recent Advances in Machine Learning Applied to Ultrasound Imaging
by Monica Micucci and Antonio Iula
Electronics 2022, 11(11), 1800; https://doi.org/10.3390/electronics11111800 - 6 Jun 2022
Cited by 22 | Viewed by 13900
Abstract
Machine learning (ML) methods are pervading an increasing number of fields of application because of their capacity to effectively solve a wide variety of challenging problems. The employment of ML techniques in ultrasound imaging applications started several years ago but the scientific interest [...] Read more.
Machine learning (ML) methods are pervading an increasing number of fields of application because of their capacity to effectively solve a wide variety of challenging problems. The employment of ML techniques in ultrasound imaging applications started several years ago but the scientific interest in this issue has increased exponentially in the last few years. The present work reviews the most recent (2019 onwards) implementations of machine learning techniques for two of the most popular ultrasound imaging fields, medical diagnostics and non-destructive evaluation. The former, which covers the major part of the review, was analyzed by classifying studies according to the human organ investigated and the methodology (e.g., detection, segmentation, and/or classification) adopted, while for the latter, some solutions to the detection/classification of material defects or particular patterns are reported. Finally, the main merits of machine learning that emerged from the study analysis are summarized and discussed. Full article
(This article belongs to the Special Issue Ultrasonic Pattern Recognition by Machine Learning)
Show Figures

Figure 1

Figure 1
<p>A possible schematization of machine learning algorithms.</p>
Full article ">Figure 2
<p>Example of B-mode image of the right liver lobe and right kidney obtained with a convex probe. The kidney is indicated by the arrow [<a href="#B48-electronics-11-01800" class="html-bibr">48</a>].</p>
Full article ">Figure 3
<p>Example of color Doppler image showing high-grade stenosis of internal carotid artery [<a href="#B51-electronics-11-01800" class="html-bibr">51</a>].</p>
Full article ">Figure 4
<p>Ultrasound depictions of malignant breast lesions: (<b>a</b>) lesion characterized by irregular shape, calcification indicated by large arrow and not circumscribed margin by thin arrow (<b>b</b>) lesion characterized by the an oval shape, circumscribed margins indicated by thin arrow and enhancement posterior features by large arrow [<a href="#B93-electronics-11-01800" class="html-bibr">93</a>].</p>
Full article ">Figure 5
<p>Main steps of LI and MA segmentation: (<b>a</b>) B-mode images,(<b>b</b>) edge map, (<b>c</b>) contour segmentation, (<b>d</b>) final segmentation. LI and MA are marked in red and green, respectively [<a href="#B128-electronics-11-01800" class="html-bibr">128</a>].</p>
Full article ">Figure 6
<p>Prognosis of myocardial fibrosis. Three ultrasound renderings and the corresponding myocardial textures [<a href="#B97-electronics-11-01800" class="html-bibr">97</a>].</p>
Full article ">Figure 7
<p>Frequency of ML algorithms application across all organs.</p>
Full article ">
13 pages, 2864 KiB  
Article
Band Bending and Trap Distribution along the Channel of Organic Field-Effect Transistors from Frequency-Resolved Scanning Photocurrent Microscopy
by Gion Kalemai, Nikolaos Vagenas, Athina Giannopoulou and Panagiotis Kounavis
Electronics 2022, 11(11), 1799; https://doi.org/10.3390/electronics11111799 - 6 Jun 2022
Cited by 1 | Viewed by 1961
Abstract
The scanning photocurrent microscopy (SPCM) method is applied to pentacene field-effect transistors (FETs). In this technique, a modulated laser beam is focused and scanned along the channel of the transistors. The resulting spatial photocurrent profile is attributed to extra free holes generated from [...] Read more.
The scanning photocurrent microscopy (SPCM) method is applied to pentacene field-effect transistors (FETs). In this technique, a modulated laser beam is focused and scanned along the channel of the transistors. The resulting spatial photocurrent profile is attributed to extra free holes generated from the dissociation of light-created excitons after their interaction with trapped holes. The trapped holes result from the local upward band bending in the accumulation layer depending on the applied voltages. Thus, the photocurrent profile along the conducting channel of the transistors reflects the pattern of the trapped holes and upward band bending under the various operating conditions of the transistor. Moreover, it is found here that the frequency-resolved SPCM (FR-SPCM) is related to the interaction of free holes via trapping and thermal release from active probed traps of the first pentacene monolayers in the accumulation layer. The active probed traps are selected by the modulation frequency of the laser beam so that the FR-SPCM can be applied as a spectroscopic technique to determine the energy distribution of the traps along the transistor channel. In addition, a crossover is found in the FR-SPCM spectra that signifies the transition from empty to partially empty probed trapping states near the corresponding trap quasi-Fermi level. From the frequency of this crossover, the energy gap from the quasi-Fermi Etp level to the corresponding local valence band edge Ev, which is bent up by the gate voltage, can be estimated. This allows us to spatially determine the magnitude of the band bending under different operation conditions along the channel of the organic transistors. Full article
Show Figures

Figure 1

Figure 1
<p>Spatial photocurrent <span class="html-italic">I</span><sub>p</sub>(x) as a function of distance x measured from the source edge for the indicated voltages: −5 V (open circles), −6.5 (open triangles), −8 V (orange triangles), −9.5 V (magenta squares), −12 V (blue circles), −15 V (olive diamonds). Increasing the negative <span class="html-italic">V</span><sub>GS</sub> above −6.5 V and keeping the <span class="html-italic">V</span><sub>DS</sub> constant, the transistor gradually transits from the off-state, where <span class="html-italic">I</span><sub>p</sub>(<span class="html-italic">x</span>) is almost zero, to the on-state, in which the <span class="html-italic">I</span><sub>p</sub>(<span class="html-italic">x</span>) signal starts to increase first near the source for <span class="html-italic">V</span><sub>GS</sub> = −8 V and −9.5 V and then at the drain side for more negative gate voltages (<span class="html-italic">V</span><sub>GS</sub> &lt; −9.5 V).</p>
Full article ">Figure 2
<p>Schematic representation of the upward band bending at pentacene insulator interface for different positions in the transistor channel. The magnitude of the band bending −e<span class="html-italic">Ψ</span><sub>s</sub> (red arrows) from the negative <span class="html-italic">V</span><sub>GS</sub> voltage is deduced from the listed energy gaps (<span class="html-italic">E</span><sub>tp</sub> − <span class="html-italic">E</span><sub>v</sub>) obtained from the SR-SPCM spectra by placing the laser beam near the source (S), midway between the source and drain (M), and near the drain (D). Note that only the relative positions of <span class="html-italic">E</span><sub>tp</sub> and <span class="html-italic">E</span><sub>v</sub> levels can be determined. Their variation along the channel due to the applied <span class="html-italic">V</span><sub>DS</sub> = −10 V cannot be deduced from our measurements. However, this voltage produces a reduction in −e<span class="html-italic">Ψ</span><sub>s</sub> from source to drain, which is captured by the increase in the energy gap (<span class="html-italic">E</span><sub>tp</sub> − <span class="html-italic">E</span><sub>v</sub>). Due to the band bending, empty hole traps (blue circles) are lifted above the <span class="html-italic">E</span><sub>tp</sub> level and become filled with trapped holes (red circles) in the accumulation layer at the insulator interface, The <span class="html-italic">I</span><sub>p</sub>(<span class="html-italic">x</span>) profile (solid blue line) obtained for <span class="html-italic">V</span><sub>GS</sub> = −20 V and <span class="html-italic">V</span><sub>DS</sub> = −10 V reflects the inhomogeneous profile of trapped holes (red solid circles).</p>
Full article ">Figure 3
<p>Photocurrent <span class="html-italic">I</span><sub>p</sub>(x) as a function of distance x from the source edge for the indicated chopper frequencies <span class="html-italic">f</span>: 10 Hz (red circles), 60 Hz (green up triangles), 400 Hz (magenta squares), 800 Hz (red diamonds), 2.2 kHz (black down triangles). An overall reduction in <span class="html-italic">I</span><sub>p</sub>(x) that is relatively stronger on the drain side is produced by increasing <span class="html-italic">f</span>.</p>
Full article ">Figure 4
<p>Photocurrent spectra of three-terminal pentacene FETs compared with the photocurrent spectra of two-terminal pentacene films on glass substrate. Spectra of photocurrent <span class="html-italic">I</span><sub>p</sub>(<span class="html-italic">ω</span>) (<b>a</b>), <span class="html-italic">I</span><sub>p</sub>(<span class="html-italic">ω</span>)/<span class="html-italic">I</span><sub>pο</sub>(<span class="html-italic">ω</span>) ratio (<b>b</b>), and probed trap depth (<span class="html-italic">E</span><sub>ω</sub> − <span class="html-italic">E</span><sub>v</sub>) (<b>c</b>) of pentacene FETs obtained for probe laser beam placed near the source (S) (red squares), midway the source and drain (M) (olive triangles), and near the drain side (D) (blue circles). Spectra of the MPC amplitude <span class="html-italic">I</span><sub>ac</sub>(<span class="html-italic">ω</span>) (<b>d</b>), <span class="html-italic">I</span><sub>ac</sub>(<span class="html-italic">ω</span>)/I<sub>acο</sub>(<span class="html-italic">ω</span>) ratio (<b>e</b>), and probed trap depth (<span class="html-italic">E</span><sub>ω</sub> − <span class="html-italic">E</span><sub>v</sub>) (<b>f</b>) of pentacene two-terminal devices typically obtained by increasing intensity of the bias light: 1.2 × 10<sup>11</sup> (grey circles), 7.5 × 10<sup>11</sup> (blue circles), 4 × 10<sup>12</sup> (olive triangles), 1.8 × 10<sup>13</sup> (red squares) photons cm<sup>−2</sup> s<sup>−1</sup>. Down and up arrows indicate frequencies <span class="html-italic">ω</span><sub>s</sub> and <span class="html-italic">ω</span><sub>t</sub>, respectively. Horizontal arrows indicate <span class="html-italic">E</span><sub>tp</sub> level. Solid straight lines indicate (<span class="html-italic">E</span><sub>ω</sub> − <span class="html-italic">E</span><sub>v</sub>) calculated from Equation (5).</p>
Full article ">Figure 5
<p>The active probed trap distributions <span class="html-italic">N</span>(<span class="html-italic">E</span><sub>ωο</sub> − <span class="html-italic">E</span><sub>v</sub>) of the two- and three-terminal pentacene devices as a function of the probed trap depth (<span class="html-italic">E</span><sub>ωo</sub> − <span class="html-italic">E</span><sub>v</sub>). The trap distributions were calculated from Equation (7) using the <span class="html-italic">I</span><sub>acο</sub>(<span class="html-italic">ω</span>) values of <a href="#electronics-11-01799-f004" class="html-fig">Figure 4</a>d and the <span class="html-italic">I</span><sub>pο</sub>(<span class="html-italic">ω</span>) values of our transistor from <a href="#electronics-11-01799-f004" class="html-fig">Figure 4</a>a and the <span class="html-italic">I</span><sub>pο</sub>(<span class="html-italic">ω</span>) values of the transistor of Westermeir et al. [<a href="#B12-electronics-11-01799" class="html-bibr">12</a>] presented below in Figure 7.</p>
Full article ">Figure 6
<p>Valence band edge energy <span class="html-italic">E</span><sub>v</sub> below the <span class="html-italic">E</span><sub>tp</sub> level along the channel of FETs from different laboratories. The energy <span class="html-italic">E</span><sub>v</sub> was calculated from Equation (9) using the crossover frequencies <span class="html-italic">ω</span><sub>s</sub> of the corresponding <span class="html-italic">I</span><sub>p</sub>(<span class="html-italic">ω</span>) spectra in <a href="#electronics-11-01799-f006" class="html-fig">Figure 6</a> of our transistor (circles) and the transistors of Westermeir et al. [<a href="#B12-electronics-11-01799" class="html-bibr">12</a>] (squares) and Fiebig [<a href="#B22-electronics-11-01799" class="html-bibr">22</a>] (triangles), for ν<sub>o</sub> = 10<sup>10</sup> s<sup>−1</sup> (left axis) and ν<sub>o</sub> = 10<sup>8</sup> s<sup>−1</sup> (right axis).</p>
Full article ">Figure 7
<p>Photocurrent <span class="html-italic">I</span><sub>p</sub>(<span class="html-italic">ω</span>) spectra as a function of the angular modulation frequency of FETs from different laboratories. The <span class="html-italic">I</span><sub>p</sub>(<span class="html-italic">ω</span>) signal is shown for probe laser illumination near the source (S), midway between the source and drain (M), and near the drain side (D). <span class="html-italic">I</span><sub>p</sub>(<span class="html-italic">ω</span>) signal derived by digitizing the SPCM <span class="html-italic">I</span><sub>p</sub>(x) profiles of different modulation frequencies reported by Westermeir et al. [<a href="#B12-electronics-11-01799" class="html-bibr">12</a>] (open squares) and Fiebig [<a href="#B22-electronics-11-01799" class="html-bibr">22</a>] (open triangles). The <span class="html-italic">I</span><sub>p</sub>(<span class="html-italic">ω</span>) spectra of the present work (solid circles) are taken from <a href="#electronics-11-01799-f004" class="html-fig">Figure 4</a>a.</p>
Full article ">
27 pages, 6067 KiB  
Article
DroidFDR: Automatic Classification of Android Malware Using Model Checking
by Zhi Yang, Fan Chao, Xingyuan Chen, Shuyuan Jin, Lei Sun and Xuehui Du
Electronics 2022, 11(11), 1798; https://doi.org/10.3390/electronics11111798 - 6 Jun 2022
Cited by 1 | Viewed by 2639
Abstract
Android faces an increasing threat of malware attacks. The few existing formal detection methods have drawbacks such as complex code modeling, incomplete and inaccurate expression of family properties, and excessive manual participation. To this end, this paper proposes a formal detection method, called [...] Read more.
Android faces an increasing threat of malware attacks. The few existing formal detection methods have drawbacks such as complex code modeling, incomplete and inaccurate expression of family properties, and excessive manual participation. To this end, this paper proposes a formal detection method, called DroidFDR, for Android malware classification based on communicating sequential processes (CSP). In this method, the APK file of an application is converted to an easy-to-analyze representation, namely Jimple, in order to model the code behavior with CSP. The process describing the behavior of a sample is inputted to an FDR model checker to be simplified and verified against a process that is automatically abstracted from the malware to express the property of a family. The sample is classified by detecting whether it has the typical behavior of any family property. DroidFDR can capture the behavioral characteristics of malicious code such as control flow, data flow, procedure calls, and API calls. The experimental results show that the automated method can characterize the behavior patterns of applications from the structure level, with a high family classification accuracy of 99.06% in comparison with another formal detection method. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

Figure 1
<p>Operational semantics of CSP.</p>
Full article ">Figure 2
<p>Different representations of an example program: (<b>a</b>) Java source code; (<b>b</b>) Jimple representation.</p>
Full article ">Figure 3
<p>System design of DroidFDR.</p>
Full article ">Figure 4
<p>Examples of two switch Jimple statements: (<b>a</b>) TableSwitchStmt; (<b>b</b>) LookupSwitchStmt.</p>
Full article ">Figure 5
<p>Synchronization between InvokeStmt and the called method.</p>
Full article ">Figure 6
<p>Structural diagram: (<b>a</b>) sequential structure; (<b>b</b>) selective structure; (<b>c</b>) parallel structure; (<b>d</b>) iterative structure; (<b>e</b>) conditional control structure.</p>
Full article ">Figure 7
<p>Implementation code for root privilege escalation in the sample of DroidDream.</p>
Full article ">Figure 8
<p>Implementation code for obtaining sensitive information contained in incoming SMS in the GoldDream sample: (<b>a</b>) handling of incoming SMS; (<b>b</b>) writing to a file in the WriteRec method.</p>
Full article ">Figure 9
<p>Implementation code for luring users to install junk software in the RogueSPPush sample: (<b>a</b>) placing ads for junk software to attract users; (<b>b</b>) downloading the corresponding package.</p>
Full article ">Figure 10
<p>Implementation code for software download and installation: (<b>a</b>) opening internet connection in the doDownloadTheFile method; (<b>b</b>) tracking download progress in the doDownloadTheFile method; (<b>c</b>) installing a package in the openFile method.</p>
Full article ">Figure 10 Cont.
<p>Implementation code for software download and installation: (<b>a</b>) opening internet connection in the doDownloadTheFile method; (<b>b</b>) tracking download progress in the doDownloadTheFile method; (<b>c</b>) installing a package in the openFile method.</p>
Full article ">
14 pages, 3036 KiB  
Article
GRU with Dual Attentions for Sensor-Based Human Activity Recognition
by Jianguo Pan, Zhengxin Hu, Sisi Yin and Meizi Li
Electronics 2022, 11(11), 1797; https://doi.org/10.3390/electronics11111797 - 6 Jun 2022
Cited by 15 | Viewed by 2530
Abstract
Human Activity Recognition (HAR) is nowadays widely used in intelligent perception and medical detection, and the use of traditional neural networks and deep learning methods has made great progress in this field in recent years. However, most of the existing methods assume that [...] Read more.
Human Activity Recognition (HAR) is nowadays widely used in intelligent perception and medical detection, and the use of traditional neural networks and deep learning methods has made great progress in this field in recent years. However, most of the existing methods assume that the data has independent identical distribution (I.I.D.) and ignore the data variability of different individual volunteers. In addition, most deep learning models are characterized by many parameters and high resources consumption, making it difficult to run in real time on embedded devices. To address these problems, this paper proposes a Gate Recurrent Units (GRU) network fusing the channel attention and the temporal attention for human activity recognition method without I.I.D. By using channel attention to mitigate sensor data bias, GRU and the temporal attention are used to capture important motion moments and aggregate temporal features to reduce model parameters. Experimental results show that our model outperforms existing methods in terms of classification accuracy on datasets without I.I.D., and reduces the number of model parameters and resources consumption, which can be easily used in low-resource embedded devices. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

Figure 1
<p>Framework of the proposed approach.</p>
Full article ">Figure 2
<p>Logic structure of the proposed approach.</p>
Full article ">Figure 3
<p>Visualization description of the dataset.</p>
Full article ">Figure 4
<p>Line graph of accuracy with different hidden states.</p>
Full article ">Figure 5
<p>Confusion matrix of the GRU + CA + TA model on the datasets with I.I.D.</p>
Full article ">Figure 6
<p>Confusion matrix of the GRU + CA + TA model on the datasets without I.I.D.</p>
Full article ">Figure 7
<p>Visualization of TA on different human activities.</p>
Full article ">
28 pages, 6604 KiB  
Article
A Modified RL-IGWO Algorithm for Dynamic Weapon-Target Assignment in Frigate Defensing UAV Swarms
by Mingyu Nan, Yifan Zhu, Li Kang, Tao Wang and Xin Zhou
Electronics 2022, 11(11), 1796; https://doi.org/10.3390/electronics11111796 - 6 Jun 2022
Cited by 5 | Viewed by 2987
Abstract
Unmanned aerial vehicle (UAV) swarms have significant advantages in terms of cost, number, and intelligence, constituting a serious threat to traditional frigate air defense systems. Ship-borne short-range anti-air weapons undertake terminal defense tasks against UAV swarms. In traditional air defense fire control systems, [...] Read more.
Unmanned aerial vehicle (UAV) swarms have significant advantages in terms of cost, number, and intelligence, constituting a serious threat to traditional frigate air defense systems. Ship-borne short-range anti-air weapons undertake terminal defense tasks against UAV swarms. In traditional air defense fire control systems, a dynamic weapon-target assignment (DWTA) is disassembled into several static weapon target assignments (SWTAs), but the relationship between DWTAs and SWTAs is not supported by effective analytical proof. Based on the combat scenario between a frigate and UAV swarms, a model-based reinforcement learning framework was established, and a DWAT problem was disassembled into several static combination optimization (SCO) problems by means of the dynamic programming method. In addition, several variable neighborhood search (VNS) operators and an opposition-based learning (OBL) operator were designed to enhance the global search ability of the original Grey Wolf Optimizer (GWO), thereby solving SCO problems. An improved grey wolf algorithm based on reinforcement learning (RL-IGWO) was established for solving DWTA problems in the defense of frigates against UAV swarms. The experimental results show that RL-IGWO had obvious advantages in both the decision making time and solution quality. Full article
(This article belongs to the Special Issue Modeling and Simulation Methods: Recent Advances and Applications)
Show Figures

Figure 1

Figure 1
<p>Framework of the RL-IGWO algorithm.</p>
Full article ">Figure 2
<p>Process of opposition-based learning.</p>
Full article ">Figure 3
<p>Illumination of the OB operator.</p>
Full article ">Figure 4
<p>Flow of the variable neighborhood search.</p>
Full article ">Figure 5
<p>Illumination of the balancing operator.</p>
Full article ">Figure 6
<p>Illumination of the sliding operator.</p>
Full article ">Figure 7
<p>Flow of RL-IGWO.</p>
Full article ">Figure 8
<p>(<b>A</b>–<b>L</b>) Best processes of optimization.</p>
Full article ">Figure 9
<p>(<b>A</b>–<b>F</b>) Flow of RL-IGWO.</p>
Full article ">Figure 9 Cont.
<p>(<b>A</b>–<b>F</b>) Flow of RL-IGWO.</p>
Full article ">Figure 10
<p>(<b>A</b>–<b>F</b>) Comparison of the efficiency-cost ratio.</p>
Full article ">Figure 11
<p>(<b>A</b>–<b>F</b>) Comparison of the average penetration number.</p>
Full article ">Figure 12
<p>(<b>A</b>–<b>F</b>) Comparison of defense completion rate.</p>
Full article ">
30 pages, 4824 KiB  
Review
A Review on Different State of Battery Charge Estimation Techniques and Management Systems for EV Applications
by Girijaprasanna T and Dhanamjayulu C
Electronics 2022, 11(11), 1795; https://doi.org/10.3390/electronics11111795 - 6 Jun 2022
Cited by 20 | Viewed by 4818
Abstract
Electric vehicles (EVs) have acquired significant popularity in recent decades due to their performance and efficiency. EVs are already largely acknowledged as the most promising solutions to global environmental challenges and CO2 emissions. Li-ion batteries are most frequently employed in EVs due [...] Read more.
Electric vehicles (EVs) have acquired significant popularity in recent decades due to their performance and efficiency. EVs are already largely acknowledged as the most promising solutions to global environmental challenges and CO2 emissions. Li-ion batteries are most frequently employed in EVs due to their various benefits. An effective Battery Management System (BMS) is essential to improve the battery performance, including charging–discharging control, precise monitoring, heat management, battery safety, and protection, and also an accurate estimation of the State of Charge (SOC). The SOC is required to provide the driver with a precise indication of the remaining range. At present, different types of estimation algorithms are available, but they still have several challenges due to their performance degradation, complex electrochemical reactions, and inaccuracy. The estimating techniques, average error, advantages, and disadvantages were examined methodically and independently for this paper. The article presents advanced SOC estimating techniques, such as LSTM, GRU, and CNN-LSMT, and hybrid techniques to estimate the average error of the SOC. A detailed comparison is presented with merits and demerits, which helped the researchers in the implementation of EV applications. This research also identified several factors, challenges, and potential recommendations for an enhanced BMS and efficient estimating approaches for future sustainable EV applications. Full article
(This article belongs to the Special Issue Charging Systems for Electric Vehicles)
Show Figures

Figure 1

Figure 1
<p>The number of research articles on Li-ion battery SOC estimation per year.</p>
Full article ">Figure 2
<p>The general role of a BMS [<a href="#B37-electronics-11-01795" class="html-bibr">37</a>].</p>
Full article ">Figure 3
<p>The basic outline of a BMS in an EV.</p>
Full article ">Figure 4
<p>Block diagram of the BMS.</p>
Full article ">Figure 5
<p>Overview of a few literature studies on different SOC estimation methods. “A” is referred to as [<a href="#B23-electronics-11-01795" class="html-bibr">23</a>], “B” is referred to as [<a href="#B34-electronics-11-01795" class="html-bibr">34</a>], “C” is referred to as [<a href="#B37-electronics-11-01795" class="html-bibr">37</a>] and “D” is referred to as [<a href="#B49-electronics-11-01795" class="html-bibr">49</a>].</p>
Full article ">Figure 6
<p>The general architecture of the SOC system.</p>
Full article ">Figure 7
<p>Categorization of methods for estimation of SOC.</p>
Full article ">Figure 8
<p>OCV vs. SOC was tested at 25 °C.</p>
Full article ">Figure 9
<p>The comprehensive structure of neural network for SOC estimation [<a href="#B97-electronics-11-01795" class="html-bibr">97</a>].</p>
Full article ">Figure 10
<p>Comparison between the different conventional SOC estimation methods. “A” is referred to as [<a href="#B59-electronics-11-01795" class="html-bibr">59</a>], and “B” is referred to as [<a href="#B135-electronics-11-01795" class="html-bibr">135</a>].</p>
Full article ">Figure 11
<p>Comparison between the different adaptive filter SOC estimation methods. “A” is referred to as [<a href="#B75-electronics-11-01795" class="html-bibr">75</a>], “B” is referred to as [<a href="#B135-electronics-11-01795" class="html-bibr">135</a>], “C” is referred to as [<a href="#B91-electronics-11-01795" class="html-bibr">91</a>] and “D” is referred to as [<a href="#B136-electronics-11-01795" class="html-bibr">136</a>].</p>
Full article ">Figure 12
<p>Comparison between the different learning SOC estimation algorithms. “A” is referred to as [<a href="#B137-electronics-11-01795" class="html-bibr">137</a>], “B” is referred to as [<a href="#B46-electronics-11-01795" class="html-bibr">46</a>], “C” is referred to as [<a href="#B106-electronics-11-01795" class="html-bibr">106</a>] and “D” is referred to as [<a href="#B138-electronics-11-01795" class="html-bibr">138</a>].</p>
Full article ">Figure 13
<p>Comparison between the different nonlinear observer SOC estimation methods. “A” is referred to as [<a href="#B110-electronics-11-01795" class="html-bibr">110</a>], and “B” is referred to as [<a href="#B131-electronics-11-01795" class="html-bibr">131</a>].</p>
Full article ">Figure 14
<p>Comparison between the different deep learning SOC estimation algorithms. “A” is referred to as [<a href="#B117-electronics-11-01795" class="html-bibr">117</a>], “B” is referred to as [<a href="#B119-electronics-11-01795" class="html-bibr">119</a>], and “C” is referred to as [<a href="#B120-electronics-11-01795" class="html-bibr">120</a>].</p>
Full article ">Figure 15
<p>Comparison between the different hybrid SOC estimation algorithms. “A” is referred to as [<a href="#B131-electronics-11-01795" class="html-bibr">131</a>], “B” is referred to as [<a href="#B123-electronics-11-01795" class="html-bibr">123</a>], and “C” is referred to as [<a href="#B139-electronics-11-01795" class="html-bibr">139</a>].</p>
Full article ">Figure 16
<p>Battery cycle life vs. temperature at a dissimilar charge rate of Li-ion battery [<a href="#B58-electronics-11-01795" class="html-bibr">58</a>].</p>
Full article ">Figure 17
<p>Explanations for the aging of a battery at the anode [<a href="#B145-electronics-11-01795" class="html-bibr">145</a>].</p>
Full article ">Figure 18
<p>Future trends in advanced BMS for EV applications.</p>
Full article ">
24 pages, 3727 KiB  
Article
Low-Phase-Noise CMOS Relaxation Oscillators for On-Chip Timing of IoT Sensing Platforms
by Francesco Gagliardi, Giuseppe Manfredini, Andrea Ria, Massimo Piotto and Paolo Bruschi
Electronics 2022, 11(11), 1794; https://doi.org/10.3390/electronics11111794 - 6 Jun 2022
Cited by 6 | Viewed by 3686
Abstract
The design of low-phase-noise fully integrated frequency references is often a critical aspect in the development of low-cost integrated circuits for communication interfaces, sensing platforms, and biomedical applications. This work first discusses relaxation oscillator topologies and design approaches aimed at minimizing the phase [...] Read more.
The design of low-phase-noise fully integrated frequency references is often a critical aspect in the development of low-cost integrated circuits for communication interfaces, sensing platforms, and biomedical applications. This work first discusses relaxation oscillator topologies and design approaches aimed at minimizing the phase noise; then, a single-comparator low-phase-noise RC relaxation oscillator is proposed, featuring a novel comparator self-threshold-adjustment technique. The oscillator was designed for a 10 MHz oscillation frequency. Electrical simulations performed on a 0.18 μm CMOS design confirmed that the proposed technique effectively rejects the flicker component of the comparator noise, allowing for a 152 dBc/Hz figure of merit at a 1 kHz offset frequency. The standard deviation of the jitter accumulated across 10k oscillation cycles is lower than 4 ns. The simulated current consumption of the circuit is equal to 50.8 μA with a 1.8 V supply voltage. The temperature sensitivity of the oscillation frequency is also notably low, as its worst-case value across process corners is equal to −20.8 ppm/°C from −55 °C to 125 °C. Full article
Show Figures

Figure 1

Figure 1
<p>Commonly employed elementary <span class="html-italic">RC</span> relaxation oscillators: (<b>a</b>) Dual-comparator topology, not presenting any CDS-like comparator-noise-processing mechanism; (<b>b</b>) single-comparator topology, intrinsically implementing a CDS-like technique.</p>
Full article ">Figure 2
<p>Noise-shaping function of the previously defined CTS, evaluated for <span class="html-italic">α</span><sub>1</sub> = 0.176, and of standard CDS.</p>
Full article ">Figure 3
<p>Equivalent noise circuit of an <span class="html-italic">RC</span> oscillator, accounting for <span class="html-italic">kT</span>/<span class="html-italic">C</span> noise.</p>
Full article ">Figure 4
<p>Dual-capacitor <span class="html-italic">RC</span> oscillator applying the traditional CDS to the comparator noise.</p>
Full article ">Figure 5
<p>Waveforms of relevant voltages in the dual-capacitor <span class="html-italic">RC</span> oscillator. The effects of comparator hysteresis and delays are shown; instead, for greater simplicity, the comparator noise is not represented.</p>
Full article ">Figure 6
<p>Dual-capacitor <span class="html-italic">RC</span> oscillator equipped with the proposed CSTA technique.</p>
Full article ">Figure 7
<p>Waveforms of relevant voltages in the CSTA-compensated dual-capacitor <span class="html-italic">RC</span> oscillator (steady-state conditions). The effects of comparator hysteresis and delays are shown; instead, for greater simplicity, the comparator noise is not represented.</p>
Full article ">Figure 8
<p>Normalized PSDs of the period jitter offered by the previously analyzed <span class="html-italic">RC</span> oscillator topologies.</p>
Full article ">Figure 9
<p>Proposed <span class="html-italic">RC</span> oscillator equipped with the novel CSTA technique.</p>
Full article ">Figure 10
<p>(<b>a</b>) Comparator based on a 4-transistor hysteresis cell; (<b>b</b>) single-stage differential amplifier.</p>
Full article ">Figure 11
<p>(<b>a</b>) Simulated phase noise spectrum and (<b>b</b>) simulated figure of merit as a function of the offset frequency.</p>
Full article ">Figure 12
<p>Standard deviation of the accumulated jitter as a function of the number of cycles.</p>
Full article ">Figure 13
<p>Simulated oscillation frequency as a function of temperature (<b>a</b>) and supply voltage (<b>b</b>).</p>
Full article ">Figure 14
<p>Simulated process spread of the oscillation frequency of the uncompensated oscillator (<b>a</b>) and the CSTA-compensated oscillator (<b>b</b>).</p>
Full article ">
19 pages, 476 KiB  
Article
A Fusion Decision-Making Architecture for COVID-19 Crisis Analysis and Management
by Kuang-Hua Hu, Chengjie Dong, Fu-Hsiang Chen, Sin-Jin Lin and Ming-Chin Hung
Electronics 2022, 11(11), 1793; https://doi.org/10.3390/electronics11111793 - 6 Jun 2022
Viewed by 2451
Abstract
The COVID-19 outbreak has had considerably harsh impacts on the global economy, such as shutting down and paralyzing industrial production capacity and increasing the unemployment rate. For enterprises, relying on past experiences and strategies to respond to such an unforeseen financial crisis is [...] Read more.
The COVID-19 outbreak has had considerably harsh impacts on the global economy, such as shutting down and paralyzing industrial production capacity and increasing the unemployment rate. For enterprises, relying on past experiences and strategies to respond to such an unforeseen financial crisis is not appropriate or sufficient. Thus, there is an urgent requirement to reexamine and revise an enterprise’s inherent crisis management architecture so as to help it recover sooner after having encountered extremely negative economic effects. To fulfill this need, the present paper introduces a fusion architecture that integrates artificial intelligence and multiple criteria decision making to exploit essential risk factors and identify the intertwined relations between dimensions/criteria for managers to prioritize improvement plans and deploy resources to key areas without any waste. The result indicated the accurate improvement priorities, which ran in the order of financial sustainability (A), customer and stakeholders (B), enablers’ learning and growth (D), and internal business process (C) based on the measurement of the impact. The method herein will help to effectively and efficiently support crisis management for an organization confronting COVID-19. Among all the criteria, maintaining fixed reserves was the most successful factor regarding crisis management. Full article
Show Figures

Figure 1

Figure 1
<p>The INRM results of the influence relationships based on FDEMATEL.</p>
Full article ">
15 pages, 4556 KiB  
Article
The Enhanced Energy Density of rGO/TiO2 Based Nanocomposite as Electrode Material for Supercapacitor
by Palani Anandhi, Santhanam Harikrishnan, Veerabadran Jawahar Senthil Kumar, Wen-Cheng Lai and Alaa El Din Mahmoud
Electronics 2022, 11(11), 1792; https://doi.org/10.3390/electronics11111792 - 6 Jun 2022
Cited by 31 | Viewed by 3186
Abstract
TiO2 electrode material is a poor choice for supercapacitor electrodes because it has low conductivity, poor cyclic stability, and a low capacitance value. It is inevitable to enhance electrode materials of this kind by increasing the surface area and combining high electronic [...] Read more.
TiO2 electrode material is a poor choice for supercapacitor electrodes because it has low conductivity, poor cyclic stability, and a low capacitance value. It is inevitable to enhance electrode materials of this kind by increasing the surface area and combining high electronic conductivity materials. In the current research work, it was proposed to combine reduced graphene oxide (rGO) as it might provide a large surface area for intercalation and deintercalation, and also, it could establish the shorter paths to ion transfer, leading to a reduction in ionic resistance. The size, surface morphology, and crystalline structure of as-prepared rGO/TiO2 nanocomposites were studied using HRTEM, FESEM, and XRD, respectively. Using an electrochemical workstation, the capacitive behaviors of the rGO/TiO2 electrode materials were assessed with respect to scan rate and current density. The capacitances obtained through cyclic voltammetry and galvanostatic charge-discharge techniques were found to be higher when compared to TiO2 alone. Furthermore, the as-synthesized nanocomposites were able to achieve a higher energy density and better cycle stability. Full article
(This article belongs to the Special Issue Advanced Design of RF/Microwave Circuit)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>,<b>b</b>) FESEM images of TiO<sub>2</sub> nanospheres. (<b>c</b>,<b>d</b>) FESEM images of rGO/TiO<sub>2</sub> nanocomposites, (<b>e</b>) EDX Spectrum of the rGO/TiO<sub>2</sub> nanocomposites with the chemical composition (inset).</p>
Full article ">Figure 2
<p>(<b>a</b>,<b>b</b>) HRTEM images of TiO<sub>2</sub> nanospheres. (<b>c</b>,<b>d</b>) HRTEM images of rGO/TiO<sub>2</sub> nanocomposites at two different magnifications.</p>
Full article ">Figure 3
<p>XRD spectra of (<b>a</b>) TiO<sub>2</sub> nanospheres and (<b>b</b>) rGO/TiO<sub>2</sub> nanocomposites.</p>
Full article ">Figure 3 Cont.
<p>XRD spectra of (<b>a</b>) TiO<sub>2</sub> nanospheres and (<b>b</b>) rGO/TiO<sub>2</sub> nanocomposites.</p>
Full article ">Figure 4
<p>CV profile of (<b>a</b>) TiO<sub>2</sub> and (<b>b</b>) rGO/TiO<sub>2.</sub></p>
Full article ">Figure 5
<p>The relationship between scan rate and specific capacitance.</p>
Full article ">Figure 6
<p>(<b>a</b>) Galvanostatic Charge-discharge curve of TiO<sub>2</sub> (<b>b</b>) Galvanostatic Charge-discharge curve of rGO/TiO<sub>2.</sub></p>
Full article ">Figure 7
<p>Current density versus specific capacitance.</p>
Full article ">Figure 8
<p>Nyquist plot of TiO<sub>2</sub> and rGO/TiO<sub>2</sub>.</p>
Full article ">Figure 9
<p>Specific capacitance versus cycle number.</p>
Full article ">Figure 10
<p>Ragone plot of the electrode.</p>
Full article ">
16 pages, 1580 KiB  
Article
The Design of a Low Noise and Low Power Current Readout Circuit for Sub-pA Current Detection Based on Charge Distribution Model
by Dahai Jiang, Qinan Chen, Zheng Li, Qiang Shan, Zihui Wei, Jinjin Xiao and Shuilong Huang
Electronics 2022, 11(11), 1791; https://doi.org/10.3390/electronics11111791 - 5 Jun 2022
Cited by 1 | Viewed by 2998
Abstract
In this article, we proposed an analytical model based on charge distribution for switched-capacitor trans-impedance amplifiers (SCTIAs). The changes in the load state of the amplifier under different operating conditions and the influence of the gain of the operational amplifier (Opamp) on the [...] Read more.
In this article, we proposed an analytical model based on charge distribution for switched-capacitor trans-impedance amplifiers (SCTIAs). The changes in the load state of the amplifier under different operating conditions and the influence of the gain of the operational amplifier (Opamp) on the trans-impedance gain are analyzed to improve the design theory of switched-capacitor trans-impedance amplifiers. According to the conclusion drawn from the analysis, the trans-impedance amplifier (TIA) has been designed by adopting “correlated double sampling technology” and “cross-connection technology” to optimize input-referred noise current, power consumption, and trans-impedance gain. As a result, the trans-impedance gain reaches up to 206 dB, while the bandwidth is 3 kHz. The current readout system achieves an input-referred noise current floor of 2.96 fA/Hz at 1 kHz, and the power consumption of the system is 0.643 mW. The circuit has been simulated with the technology of 0.18 μm, and the layout area is 1000 μm × 500 μm. Full article
(This article belongs to the Section Circuit and Signal Processing)
Show Figures

Figure 1

Figure 1
<p>The architecture of the weak current signal detection system.</p>
Full article ">Figure 2
<p>The schematic of the weak current detection system.</p>
Full article ">Figure 3
<p>The schematic of the switched-capacitor trans-impedance amplifier (SCTIA).</p>
Full article ">Figure 4
<p>The diagram of timing phase.</p>
Full article ">Figure 5
<p>The schematic of telescopic cascade amplifier.</p>
Full article ">Figure 6
<p>The brief waveform of the trans-impedance amplifier (TIA). (<b>a</b>) The waveforms depict the voltage of <math display="inline"><semantics> <msub> <mi>V</mi> <mrow> <mn>1</mn> <mo>−</mo> </mrow> </msub> </semantics></math>,<math display="inline"><semantics> <msub> <mi>V</mi> <mrow> <mn>2</mn> <mo>−</mo> </mrow> </msub> </semantics></math>,<math display="inline"><semantics> <msub> <mi>V</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> <mo>−</mo> </mrow> </msub> </semantics></math> when the input current is displayed as <math display="inline"><semantics> <msub> <mi>I</mi> <mrow> <mi>i</mi> <mi>n</mi> <mo>−</mo> </mrow> </msub> </semantics></math>. (<b>b</b>) The waveforms depict the voltage of <math display="inline"><semantics> <msub> <mi>V</mi> <mrow> <mn>1</mn> <mo>+</mo> </mrow> </msub> </semantics></math>,<math display="inline"><semantics> <msub> <mi>V</mi> <mrow> <mn>2</mn> <mo>+</mo> </mrow> </msub> </semantics></math>,<math display="inline"><semantics> <msub> <mi>V</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> <mo>+</mo> </mrow> </msub> </semantics></math> when the input current is displayed as <math display="inline"><semantics> <msub> <mi>I</mi> <mrow> <mi>i</mi> <mi>n</mi> <mo>+</mo> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 7
<p>The principle of correlated double sampling (CDS). (<b>a</b>) The switch state of the first stage of CDS; (<b>b</b>) The switch state of the second stage of CDS.</p>
Full article ">Figure 8
<p>The comparison result of the frequency response of the input and the output of the buffer.</p>
Full article ">Figure 9
<p>The different working states of the TIA. (<b>a</b>) The working state when <math display="inline"><semantics> <mrow> <msub> <mi>t</mi> <mn>1</mn> </msub> <mo>&lt;</mo> <mi>t</mi> <mo>&lt;</mo> <msub> <mi>t</mi> <mn>2</mn> </msub> </mrow> </semantics></math>; (<b>b</b>) The working state when <math display="inline"><semantics> <mrow> <msub> <mi>t</mi> <mn>2</mn> </msub> <mo>&lt;</mo> <mi>t</mi> <mo>&lt;</mo> <msub> <mi>t</mi> <mn>3</mn> </msub> </mrow> </semantics></math>; (<b>c</b>) The working state when <math display="inline"><semantics> <mrow> <msub> <mi>t</mi> <mn>3</mn> </msub> <mo>&lt;</mo> <mi>t</mi> <mo>&lt;</mo> <msub> <mi>t</mi> <mn>4</mn> </msub> </mrow> </semantics></math>; (<b>d</b>) The working state when <math display="inline"><semantics> <mrow> <msub> <mi>t</mi> <mn>4</mn> </msub> <mo>&lt;</mo> <mi>t</mi> <mo>&lt;</mo> <msub> <mi>t</mi> <mn>5</mn> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 10
<p>Schematic of the resistive feedback TIA describing the noise performance.</p>
Full article ">Figure 11
<p>The schematic of fully differential folded-cascade amplifier (CMFB is not displayed).</p>
Full article ">Figure 12
<p>The schematic of the low noise buffer.</p>
Full article ">Figure 13
<p>Frequency response of the complete system.</p>
Full article ">Figure 14
<p>Frequency response of the input node of the buffer.</p>
Full article ">Figure 15
<p>Noise performance of the TIA.</p>
Full article ">Figure 16
<p>Noise performance of the low noise buffer.</p>
Full article ">Figure 17
<p>The layout of the TIA with buffer.</p>
Full article ">
23 pages, 10263 KiB  
Article
Three-Dimensional Reconstruction Method for Bionic Compound-Eye System Based on MVSNet Network
by Xinpeng Deng, Su Qiu, Weiqi Jin and Jiaan Xue
Electronics 2022, 11(11), 1790; https://doi.org/10.3390/electronics11111790 - 5 Jun 2022
Cited by 5 | Viewed by 2382
Abstract
In practical scenarios, when shooting conditions are limited, high efficiency of image shooting and success rate of 3D reconstruction are required. To achieve the application of bionic compound eyes in small portable devices for 3D reconstruction, auto-navigation, and obstacle avoidance, a deep learning [...] Read more.
In practical scenarios, when shooting conditions are limited, high efficiency of image shooting and success rate of 3D reconstruction are required. To achieve the application of bionic compound eyes in small portable devices for 3D reconstruction, auto-navigation, and obstacle avoidance, a deep learning method of 3D reconstruction using a bionic compound-eye system with partial-overlap fields was studied. We used the system to capture images of the target scene, then restored the camera parameter matrix by solving the PnP problem. Considering the unique characteristics of the system, we designed a neural network based on the MVSNet network structure, named CES-MVSNet. We fed the captured image and camera parameters to the trained deep neural network, which can generate 3D reconstruction results with good integrity and precision. We used the traditional multi-view geometric method and neural networks for 3D reconstruction, and the difference between the effects of the two methods was analyzed. The efficiency and reliability of using the bionic compound-eye system for 3D reconstruction are proved. Full article
(This article belongs to the Topic Computer Vision and Image Processing)
Show Figures

Figure 1

Figure 1
<p>Structure of compound-eye system.</p>
Full article ">Figure 2
<p>The end face of the optical fiber bundle.</p>
Full article ">Figure 3
<p>Image captured by compound-eye system.</p>
Full article ">Figure 4
<p>Images before and after processing. (<b>a</b>) Image before processing; (<b>b</b>) image after processing.</p>
Full article ">Figure 5
<p>NVIDIA Jetson AGX Xavier Developer Kit.</p>
Full article ">Figure 6
<p>Diagram of the entire system.</p>
Full article ">Figure 7
<p>Epipolar geometry constraint.</p>
Full article ">Figure 8
<p>Network structure of CES-MVSNet.</p>
Full article ">Figure 9
<p>Images of experimental environment. (<b>a</b>) Overall appearance. (<b>b</b>) Tables and lockers.</p>
Full article ">Figure 10
<p>Sample images in BlendedMVS dataset.</p>
Full article ">Figure 11
<p>Image of experimental scene.</p>
Full article ">Figure 12
<p>Three-dimensional reconstruction results of images shot by the compound-eye system.</p>
Full article ">Figure 13
<p>Three-dimensional reconstruction results of images shot by a monocular camera.</p>
Full article ">Figure 14
<p>Image of another experimental scene.</p>
Full article ">Figure 15
<p>Three-dimensional reconstruction results of images shot by the compound-eye system.</p>
Full article ">Figure 16
<p>Three-dimensional reconstruction results of images shot by a monocular camera.</p>
Full article ">Figure 17
<p>Sample images of scene 1.</p>
Full article ">Figure 18
<p>Overall 3D reconstruction results of the different methods. (<b>a</b>) Traditional method; (<b>b</b>) MVSNet; (<b>c</b>) CES-MVSNet.</p>
Full article ">Figure 19
<p>Detailed 3D reconstruction results of the different methods. (<b>a</b>,<b>b</b>) Traditional method; (<b>c</b>,<b>d</b>) MVSNet; (<b>e</b>,<b>f</b>) CES-MVSNet.</p>
Full article ">Figure 20
<p>Cloud-to-cloud distance results. (<b>a</b>) Compared cloud: CES-MVSNet. Reference cloud: traditional method; (<b>b</b>) compared cloud: CES-MVSNet. Reference cloud: MVSNet; (<b>c</b>) histogram of the compared cloud in (<b>a</b>); (<b>d</b>) histogram of the compared cloud in (<b>b</b>).</p>
Full article ">Figure 21
<p>Sample images of scene 2.</p>
Full article ">Figure 22
<p>Overall 3D reconstruction results of the different methods. (<b>a</b>) Traditional method; (<b>b</b>) MVSNet; (<b>c</b>) CES-MVSNet.</p>
Full article ">Figure 23
<p>Detailed 3D reconstruction results of the different methods. (<b>a</b>,<b>b</b>) Traditional method; (<b>c</b>,<b>d</b>) MVSNet; (<b>e</b>,<b>f</b>) CES-MVSNet.</p>
Full article ">Figure 24
<p>Cloud-to-cloud distance result. (<b>a</b>) Compared cloud: CES-MVSNet. Reference cloud: traditional method; (<b>b</b>) compared cloud: CES-MVSNet. Reference cloud: MVSNet; (<b>c</b>) histogram of the compared cloud in (<b>a</b>); (<b>d</b>) histogram of the compared cloud in (<b>b</b>).</p>
Full article ">
15 pages, 4499 KiB  
Article
Study on Co-Estimation of SoC and SoH for Second-Use Lithium-Ion Power Batteries
by Nan Jiang and Hui Pang
Electronics 2022, 11(11), 1789; https://doi.org/10.3390/electronics11111789 - 5 Jun 2022
Cited by 14 | Viewed by 3239
Abstract
Lithium-ion batteries are an ideal power supplier for electric vehicles (EVs) due to their high-power density and wide operating voltage, but their performance decays to 80% before retirement from EVs. Nevertheless, they still have a particular use value after decommissioning, so recycling the [...] Read more.
Lithium-ion batteries are an ideal power supplier for electric vehicles (EVs) due to their high-power density and wide operating voltage, but their performance decays to 80% before retirement from EVs. Nevertheless, they still have a particular use value after decommissioning, so recycling the retired power battery in cascade can be considered. Therefore, accurate estimation of battery state-of-charge (SoC) and state-of-health (SoH) is crucial for extending the service life and echelon utilization of power lithium-ion battery packs. This paper proposes a comprehensive co-estimation scheme of battery SoC/SoH for the second-use of lithium-ion power batteries in EVs under different cycles using an adaptive extended Kalman filter (AEKF). First, according to the collected battery test data at different aging cycle levels, the external battery characteristics are analyzed, and then a cycle-dependent equivalent circuit model (cECM) is built up. Next, the parameter estimation of this battery model is performed via a recursive least square (RLS) algorithm. Meanwhile, the variations in internal battery parameters of the cycle numbers are fitted and synthesized. Moreover, validation of the estimated parameters is further carried out. Based on this enhanced battery model, the AEKF algorithm is utilized to fulfill battery SoC/SoH estimation simultaneously. The estimated results of SoC/SoH are obtained for a LiCoO2 cell in the case of CCC (constant current condition) under different cycle times. The results show that this proposed co-estimation scheme can predict battery SoC and SoH well, wherein the peak values of the SoC errors are less than 2.2%, and the peak values of SoH, calculated by the estimated capacity and internal resistance, are less than 1.7% and 2.2%, respectively. Hence, this has important guiding significance for realizing the cascade utilization of lithium-ion power batteries. Full article
Show Figures

Figure 1

Figure 1
<p>The framework for determining second-use power LIBs.</p>
Full article ">Figure 2
<p>Schematic of battery experimental setup.</p>
Full article ">Figure 3
<p>(<b>a</b>) Constant current discharge curves; (<b>b</b>) maximum available capacity curves; and (<b>c</b>) the OCV-SOC curves at different cycle times.</p>
Full article ">Figure 4
<p>The schematic of battery cECM.</p>
Full article ">Figure 5
<p>The variations of parameters vs. Cyc by curve fitting method.</p>
Full article ">Figure 6
<p>The validation results at (<b>a</b>) Cyc = 30, (<b>b</b>) Cyc = 300 and (<b>c</b>) Cyc = 1000 in the CCC test profile.</p>
Full article ">Figure 7
<p>The implementation flowchart of AEKF-based SoC/SoH co-estimation.</p>
Full article ">Figure 8
<p>SoC estimation results and SoC errors at (<b>a</b>) Cyc = 30, (<b>b</b>) Cyc = 300 and (<b>c</b>) Cyc = 1000 under CCC test profile.</p>
Full article ">Figure 9
<p>Capacity estimation results and errors at (<b>a</b>) Cyc = 30, (<b>b</b>) Cyc = 300, (<b>c</b>) Cyc = 1000 under CCC test profile.</p>
Full article ">Figure 10
<p>(<b>a</b>) Capacity and SoH<sub>[Ccap]</sub> estimation results; (<b>b</b>) capacity error and SoH<sub>[Ccap]</sub> error under different cycle times.</p>
Full article ">Figure 11
<p><span class="html-italic">R</span><sub>0</sub> estimation results and errors at (<b>a</b>) Cyc = 30, (<b>b</b>) Cyc = 300 and (<b>c</b>) Cyc = 1000 under CCC test profile.</p>
Full article ">Figure 12
<p>(<b>a</b>) <span class="html-italic">R</span><sub>0</sub> and SoH<sub>[R0]</sub> estimation results; (<b>b</b>) <span class="html-italic">R</span><sub>0</sub> error and SoH<sub>[R0]</sub> error under different cycle times.</p>
Full article ">
19 pages, 4391 KiB  
Article
Active Disturbance Rejection Adaptive Control for Hydraulic Lifting Systems with Valve Dead-Zone
by Fengbo Yang, Hongping Zhou and Wenxiang Deng
Electronics 2022, 11(11), 1788; https://doi.org/10.3390/electronics11111788 - 5 Jun 2022
Cited by 4 | Viewed by 1993
Abstract
In this article, the motion control problem of hydraulic lifting systems subject to parametric uncertainties, unmodeled disturbances, and a valve dead-zone is studied. To surmount the problem, an active disturbance rejection adaptive controller was developed for hydraulic lifting systems. Firstly, the dynamics, including [...] Read more.
In this article, the motion control problem of hydraulic lifting systems subject to parametric uncertainties, unmodeled disturbances, and a valve dead-zone is studied. To surmount the problem, an active disturbance rejection adaptive controller was developed for hydraulic lifting systems. Firstly, the dynamics, including both mechanical dynamics and hydraulic actuator dynamics with a valve dead-zone of the hydraulic lifting system, were modeled. Then, by adopting the system model and a backstepping technique, a composite parameter adaptation law and extended state disturbance observer were successfully combined, which were employed to dispose of the parametric uncertainties and unmodeled disturbances, respectively. This much decreased the learning burden of the extended state disturbance observer, and the high-gain feedback issue could be shunned. An ultimately bounded tracking performance can be assured with the developed control method based on the Lyapunov theory. A simulation example of a hydraulic lifting system was carried out to demonstrate the validity of the proposed controller. Full article
(This article belongs to the Special Issue High Performance Control and Industrial Applications)
Show Figures

Figure 1

Figure 1
<p>A sketch of the lifting system.</p>
Full article ">Figure 2
<p>The valve dead-zone characteristics.</p>
Full article ">Figure 3
<p>The tracking performance of the ADRAC.</p>
Full article ">Figure 4
<p>The tracking errors of the three controllers.</p>
Full article ">Figure 5
<p>The parameter estimations of <span class="html-italic">θ</span><sub>1</sub>~<span class="html-italic">θ</span><sub>3</sub> with the ADRAC.</p>
Full article ">Figure 6
<p>The parameter estimations of <span class="html-italic">θ</span><sub>4</sub>~<span class="html-italic">θ</span><sub>6</sub> with the ADRAC.</p>
Full article ">Figure 7
<p>The disturbance estimations of the ADRAC.</p>
Full article ">Figure 8
<p>The control input of the ADRAC.</p>
Full article ">Figure 9
<p>The tracking performance of the ADRAC.</p>
Full article ">Figure 10
<p>The tracking errors of the three controllers.</p>
Full article ">Figure 11
<p>The parameter estimations of <span class="html-italic">θ</span><sub>1</sub>~<span class="html-italic">θ</span><sub>3</sub> with the ADRAC.</p>
Full article ">Figure 12
<p>The parameter estimations of <span class="html-italic">θ</span><sub>4</sub>~<span class="html-italic">θ</span><sub>6</sub> with the ADRAC.</p>
Full article ">Figure 13
<p>The disturbance estimations of the ADRAC.</p>
Full article ">Figure 14
<p>The control input of the ADRAC.</p>
Full article ">
13 pages, 4031 KiB  
Article
A Compact CSRR-Based Sensor for Characterization of the Complex Permittivity of Dielectric Materials
by Jurgen K. A. Nogueira, João G. D. Oliveira, Samuel B. Paiva, Valdemir P. Silva Neto and Adaildo G. D’Assunção
Electronics 2022, 11(11), 1787; https://doi.org/10.3390/electronics11111787 - 4 Jun 2022
Cited by 8 | Viewed by 2570
Abstract
A sensor is proposed to characterize the complex permittivity of dielectric materials in a non-destructive and non-invasive way. The proposed sensor is based on a rectangular patch microstrip two-port circuit with a complementary split-ring resonator (CSRR) element. The slotted CSRR element of the [...] Read more.
A sensor is proposed to characterize the complex permittivity of dielectric materials in a non-destructive and non-invasive way. The proposed sensor is based on a rectangular patch microstrip two-port circuit with a complementary split-ring resonator (CSRR) element. The slotted CSRR element of the sensor plays a key role in determining the electrical properties of the materials under test (MUT). The sensitivity analysis is determined by varying the permittivity of the MUT. The proposed sensor is simulated and analyzed using Ansoft HFSS software. A prototype was fabricated and measurements were made on two different samples of dielectric materials with complex permittivity values available in the literature. The simulated and measured results showed good agreement. Full article
(This article belongs to the Special Issue RF/Microwave Circuits for 5G and Beyond)
Show Figures

Figure 1

Figure 1
<p>Modeling of the proposed circuit geometry assuming lossless transmission line sections.</p>
Full article ">Figure 2
<p>Top view of the proposed microstrip planar circuit geometry on an FR-4 dielectric substrate.</p>
Full article ">Figure 3
<p>Equivalent circuit model of the proposed sensor.</p>
Full article ">Figure 4
<p>Three different CSRR element positions on the proposed microstrip planar circuit patch: (<b>a</b>) position 1, (<b>b</b>) position 2 and (<b>c</b>) position 3.</p>
Full article ">Figure 5
<p>Simulated results of the transmission coefficient (S<sub>21</sub>) for three different CSRR element positions on the microstrip planar circuit patch.</p>
Full article ">Figure 6
<p>Simulated results of the proposed planar circuit without and with the CSRR element.</p>
Full article ">Figure 7
<p>Frequency division LTE bands, compiled from 3GPP 36.101 [<a href="#B25-electronics-11-01787" class="html-bibr">25</a>].</p>
Full article ">Figure 8
<p>Transmission coefficient (S<sub>21</sub>) simulated results as a function of the resonance frequency of the sensor for different MUTs.</p>
Full article ">Figure 9
<p>Results of the sensitivity parameter of the proposed sensor.</p>
Full article ">Figure 10
<p>Simulated results and curve fitting for permittivity variation as a function of frequency.</p>
Full article ">Figure 11
<p>Field distribution on the sensor surface: (<b>a</b>) E and (<b>b</b>) H.</p>
Full article ">Figure 12
<p>Results of the electric loss tangent as a function of the inverse normalized quality factor for different values of magnetic loss tangent.</p>
Full article ">Figure 13
<p>Photos of the (<b>a</b>) sensor prototype and (<b>b</b>) sensor geometry with an FR-4 MUT sample over the CSRR region.</p>
Full article ">Figure 14
<p>(<b>a</b>). Measured results of the transmission coefficient (S<sub>21</sub>) for unloaded and loaded sensor geometries. (<b>b</b>). Simulated and measured results of the transmission coefficient (S<sub>21</sub>) for the sensor geometries loaded with FR-4 and glass MUT samples.</p>
Full article ">
25 pages, 4343 KiB  
Article
Implementation of Machine Learning Algorithms on Multi-Robot Coordination
by Tuncay Yiğit and Şadi Fuat Çankaya
Electronics 2022, 11(11), 1786; https://doi.org/10.3390/electronics11111786 - 4 Jun 2022
Cited by 2 | Viewed by 2817
Abstract
Occasionally, professional rescue teams encounter issues while rescuing people during earthquake collapses. One such issue is the localization of wounded people from the earthquake. Machines used by rescue teams may cause crucial issues due to misleading localization. Usually, robot technology is utilized to [...] Read more.
Occasionally, professional rescue teams encounter issues while rescuing people during earthquake collapses. One such issue is the localization of wounded people from the earthquake. Machines used by rescue teams may cause crucial issues due to misleading localization. Usually, robot technology is utilized to address this problem. Many research papers addressing rescue operations have been published in the last two decades. In the literature, there are few studies on multi-robot coordination. The systems designed with a single robot should also overcome time constraints. A sophisticated algorithm should be developed for multi-robot coordination to solve that problem. Then, a fast rescuing operation could be performed. The distinctive property of this study is that it proposes a multi-robot system using a novel heuristic bat-inspired algorithm for use in search and rescue operations. Bat-inspired techniques gained importance in soft-computing experiments. However, there are only single-robot systems for robot navigation. Another original aspect of this paper is that this heuristic algorithm is employed to coordinate the robots. The study is devised to encourage extended work related to earthquake collapse rescue operations. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

Figure 1
<p>A picture of a gull.</p>
Full article ">Figure 2
<p>Flow Chart of PSO Algorithm.</p>
Full article ">Figure 3
<p>Processing Steps of GA.</p>
Full article ">Figure 4
<p>Sample of the Designed Robot.</p>
Full article ">Figure 5
<p>The Image of the Designed Robot in the Simulated Setting.</p>
Full article ">Figure 6
<p>Increase in Target Finding Time by Obstacle Density.</p>
Full article ">Figure 7
<p>Modeling of Robot Envirionment in Grid Structure.</p>
Full article ">Figure 8
<p>Environment and Motion Images for Simulation 1.</p>
Full article ">Figure 9
<p>Environment and Motion Images for Simulation 2.</p>
Full article ">Figure 10
<p>The Training Platform in detail.</p>
Full article ">Figure 11
<p>Variation of the delay time according to temperature.</p>
Full article ">Figure 12
<p>Algorithm Test Results.</p>
Full article ">Figure 13
<p>Top view.</p>
Full article ">Figure 14
<p>Side view.</p>
Full article ">Figure 15
<p>Maps Created as a Result of Simulation.</p>
Full article ">Figure 16
<p>Structure of sinogram-based map aggregation.</p>
Full article ">Figure 17
<p>Sinograms of the Scanned Areas.</p>
Full article ">Figure 18
<p>Structure of a Sensor on the Robot Graphically.</p>
Full article ">Figure 19
<p>Structure of a Sensor on the Robot Visually.</p>
Full article ">Figure 20
<p>Obtaining Error Rate for Bat Algorithm.</p>
Full article ">Figure 21
<p>Error Rates for Different Simulation Environments.</p>
Full article ">Figure 22
<p>Average error rates for 50 simulations.</p>
Full article ">
15 pages, 2086 KiB  
Article
Deep Learning-Based Context-Aware Video Content Analysis on IoT Devices
by Gad Gad, Eyad Gad, Korhan Cengiz, Zubair Fadlullah and Bassem Mokhtar
Electronics 2022, 11(11), 1785; https://doi.org/10.3390/electronics11111785 - 4 Jun 2022
Cited by 6 | Viewed by 2777
Abstract
Integrating machine learning with the Internet of Things (IoT) enables many useful applications. For IoT applications that incorporate video content analysis (VCA), deep learning models are usually used due to their capacity to encode the high-dimensional spatial and temporal representations of videos. However, [...] Read more.
Integrating machine learning with the Internet of Things (IoT) enables many useful applications. For IoT applications that incorporate video content analysis (VCA), deep learning models are usually used due to their capacity to encode the high-dimensional spatial and temporal representations of videos. However, limited energy and computation resources present a major challenge. Video captioning is one type of VCA that describes a video with a sentence or a set of sentences. This work proposes an IoT-based deep learning-based framework for video captioning that can (1) Mine large open-domain video-to-text datasets to extract video-caption pairs that belong to a particular domain. (2) Preprocess the selected video-caption pairs including reducing the complexity of the captions’ language model to improve performance. (3) Propose two deep learning models: A transformer-based model and an LSTM-based model. Hyperparameter tuning is performed to select the best hyperparameters. Models are evaluated in terms of accuracy and inference time on different platforms. The presented framework generates captions in standard sentence templates to facilitate extracting information in later stages of the analysis. The two developed deep learning models offer a trade-off between accuracy and speed. While the transformer-based model yields a high accuracy of 97%, the LSTM-based model achieves near real-time inference. Full article
(This article belongs to the Collection Image and Video Analysis and Understanding)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Overview of the proposed framework applied in a classroom monitoring application.</p>
Full article ">Figure 2
<p><b>Left</b>: Preprocessing steps to perform on MSR-VTT and custom dataset for retrieving relevant data and converting captions to the subject-verb-object (SVO) template. <b>Right</b>: An example showing the result of applying these steps on a video caption.</p>
Full article ">Figure 3
<p><b>Left</b>: 2D plot of the first two principal components of a subset of nouns’ GloVe representations of the MSR-VTT dataset. <b>Right Top</b>: samples of verbs and their respective neighbor verbs measured by the Euclidean distance between their GloVe vectors. <b>Right Bottom</b>: samples of nouns and their respective neighbor nouns measured by the Euclidean distance between their GloVe vectors.</p>
Full article ">Figure 4
<p>Overview of the proposed system. The block “Model” refers to any of the two proposed models.</p>
Full article ">Figure 5
<p>Left: the transformer block. Right: the proposed transformer-based model architecture.</p>
Full article ">Figure 6
<p>The LSTM-based model architecture.</p>
Full article ">Figure 7
<p>Examples of good and bad conversions of captions from the natural language descriptions to the SVO-based captions used in our framework.</p>
Full article ">Figure 8
<p>Transformer-based VS LSTM-based models performance comparison with different hyperparameters settings. Accuracies of transformer-based models are significantly better than accuracies of LSTM-based models.</p>
Full article ">Figure 9
<p>Model inference time comparison on different platforms.</p>
Full article ">
10 pages, 4297 KiB  
Article
Using Breast Tissue Information and Subject-Specific Finite-Element Models to Optimize Breast Compression Parameters for Digital Mammography
by Tien-Yu Chang, Jay Wu, Pei-Yuan Liu, Yan-Lin Liu, Dmytro Luzhbin and Hsien-Chou Lin
Electronics 2022, 11(11), 1784; https://doi.org/10.3390/electronics11111784 - 4 Jun 2022
Cited by 4 | Viewed by 2303
Abstract
Digital mammography has become a first-line diagnostic tool for clinical breast cancer screening due to its high sensitivity and specificity. Mammographic compression force is closely associated with image quality and patient comfort. Therefore, optimizing breast compression parameters is essential. Subjects were recruited for [...] Read more.
Digital mammography has become a first-line diagnostic tool for clinical breast cancer screening due to its high sensitivity and specificity. Mammographic compression force is closely associated with image quality and patient comfort. Therefore, optimizing breast compression parameters is essential. Subjects were recruited for digital mammography and breast magnetic resonance imaging (MRI) within a month. Breast MRI images were used to calculate breast volume and volumetric breast density (VBD) and construct finite element models. Finite element analysis was performed to simulate breast compression. Simulated compressed breast thickness (CBT) was compared with clinical CBT and the relationships between compression force, CBT, breast volume, and VBD were established. Simulated CBT had a good linear correlation with the clinical CBT (R2 = 0.9433) at the clinical compression force. At 10, 12, 14, and 16 daN, the mean simulated CBT of the breast models was 5.67, 5.13, 4.66, and 4.26 cm, respectively. Simulated CBT was positively correlated with breast volume (r > 0.868) and negatively correlated with VBD (r < –0.338). The results of this study provides a subject-specific and evidence-based suggestion of mammographic compression force for radiographers considering image quality and patient comfort. Full article
(This article belongs to the Special Issue Recent Advances in Biomedical Image Processing and Analysis)
Show Figures

Figure 1

Figure 1
<p>CAD model of a breast including (<b>a</b>) the contour of the breast, (<b>b</b>) the glandular tissue, and (<b>c</b>) the distribution of glandular tissue in the breast. Breast volume, glandular volume, and VBD are 286.8 cm<sup>3</sup>, 54.0 cm<sup>3</sup>, and 18.9%, respectively.</p>
Full article ">Figure 2
<p>Distributions of (<b>a</b>) clinical CBT, (<b>b</b>) breast volume, and (<b>c</b>) VBD.</p>
Full article ">Figure 3
<p>(<b>a</b>) Strong positive correlation between breast volume and clinical CBT (<span class="html-italic">r</span> = 0.900) and (<b>b</b>) moderately negative correlation between VBD and clinical CBT (<span class="html-italic">r</span> = −0.474).</p>
Full article ">Figure 4
<p>Box plot of VBD for b, c, and d BI-RADS categories. The horizontal line in the box represents the median, and the box contains the 25–75 percentiles. No cases of BI-RADS category a were recorded in this study.</p>
Full article ">Figure 5
<p>Applied force versus paddle displacement for breast models of (<b>a</b>) 200–400, (<b>b</b>) 400–600, (<b>c</b>) 600–800, and (<b>d</b>) 800–1400 mL.</p>
Full article ">Figure 6
<p>Node displacement of the left breast model: (<b>a</b>) medial–lateral direction and (<b>b</b>) anterior–posterior direction in the axial plane at 2 cm from the compression paddle, and (<b>c</b>) CC direction in the sagittal plane through the nipple. The length of the arrows represents the magnitude of displacement.</p>
Full article ">Figure 7
<p>(<b>a</b>) Scatter plot of the simulated CBT and the clinical CBT at the same clinical compression force, and (<b>b</b>) the studentized residual plot as a function of clinical CBT. The residuals are scattered throughout the clinical CBT without showing any clear trend.</p>
Full article ">Figure 8
<p>Simulated CBT versus (<b>a</b>) breast volume and (<b>b</b>) VBD for compression forces of 10, 12, 14, and 16 daN. A strong positive correlation between simulated CBT and breast volume (<span class="html-italic">r</span> &gt; 0.868) and a moderate negative correlation between simulated CBT and VBD (<span class="html-italic">r</span> &lt; −0.338) are shown.</p>
Full article ">
12 pages, 327 KiB  
Article
SFQ: Constructing and Querying a Succinct Representation of FASTQ Files
by Robert Bakarić, Damir Korenčić, Dalibor Hršak and Strahil Ristov
Electronics 2022, 11(11), 1783; https://doi.org/10.3390/electronics11111783 - 4 Jun 2022
Cited by 1 | Viewed by 1658
Abstract
A large and ever increasing quantity of high throughput sequencing (HTS) data is stored in FASTQ files. Various methods for data compression are used to mitigate the storage and transmission costs, from the still prevalent general purpose Gzip to state-of-the-art specialized methods. However, [...] Read more.
A large and ever increasing quantity of high throughput sequencing (HTS) data is stored in FASTQ files. Various methods for data compression are used to mitigate the storage and transmission costs, from the still prevalent general purpose Gzip to state-of-the-art specialized methods. However, all of the existing methods for FASTQ file compression require the decompression stage before the HTS data can be used. This is particularly costly with the random access to specific records in FASTQ files. We propose the sFASTQ format, a succinct representation of FASTQ files that can be used without decompression (i.e., the records can be retrieved and listed online), and that supports random access to individual records. The sFASTQ format can be searched on the disk, which eliminates the need for any additional memory resources. The searchable sFASTQ archive is of comparable size to the corresponding Gzip file. sFASTQ format outputs (interleaved) FASTQ records to the STDOUT stream. We provide SFQ, a software for the construction and usage of the sFASTQ format that supports variable length reads, pairing of records, and both lossless and lossy compression of quality scores. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

Figure 1
<p>The compression efficiency and processing time as the functions of the number of subtries. The dataset is a 16.1 GB large excerpt from a paired end <span class="html-italic">H.sapiens2</span> dataset. Processing in multiple subtries was obtained by imposing the appropriate memory restraints using the -F option in the command line.</p>
Full article ">
13 pages, 1096 KiB  
Article
Cost-Aware Bandits for Efficient Channel Selection in Hybrid Band Networks
by Sherief Hashima, Kohei Hatano, Mostafa M. Fouda, Zubair M. Fadlullah and Ehab Mahmoud Mohamed
Electronics 2022, 11(11), 1782; https://doi.org/10.3390/electronics11111782 - 3 Jun 2022
Cited by 6 | Viewed by 2073
Abstract
Recently, hybrid band communications have received much attention to fulfil the exponentially growing user demands in next-generation communication networks. Still, determining the best band to communicate over is a challenging issue, especially in the dynamic channel conditions in multi-band wireless systems. In this [...] Read more.
Recently, hybrid band communications have received much attention to fulfil the exponentially growing user demands in next-generation communication networks. Still, determining the best band to communicate over is a challenging issue, especially in the dynamic channel conditions in multi-band wireless systems. In this paper, we manipulate a practical online-learning-based solution for the best band/channel selection in hybrid radio frequency and visible light communication (RF/VLC) wireless systems. The best band selection difficulty is formulated as a multi-armed bandit (MAB) with cost subsidy, in which the learner (transmitter) endeavors not only to increase his total reward (throughput) but also reduce his cost (energy consumption). Consequently, we propose two hybrid band selection (HBS) algorithms, named cost subsidy upper confidence bound (CSUCB-HBS) and cost subsidy Thompson sampling (CSTS-HBS), to efficiently handle this problem and obtain the best band with high throughput and low energy consumption. Extensive simulations confirm that CSTS-/CSUCB-HBS outperform the naive TS/UCB and heuristic HBS approaches regarding energy consumption, energy efficiency, throughput, and convergence speed. Full article
(This article belongs to the Special Issue Deep Learning for Next-Generation Wireless Networks)
Show Figures

Figure 1

Figure 1
<p>Hybrid band system model: How to self optimize hybrid channels in fluctuating channel conditions (distance, energy level, and blocking?).</p>
Full article ">Figure 2
<p>The energy consumption (cost) vs. subsidy parameter <span class="html-italic">a</span> at <math display="inline"><semantics> <mrow> <mi>r</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> and no blocking.</p>
Full article ">Figure 3
<p>Average throughput comparison of CSTS/CSUCB-HBS approaches vs. separation distances at distinct blocking layouts. (<b>a</b>) No blockage. (<b>b</b>) Small blockage. (<b>c</b>) Large blockage.</p>
Full article ">Figure 3 Cont.
<p>Average throughput comparison of CSTS/CSUCB-HBS approaches vs. separation distances at distinct blocking layouts. (<b>a</b>) No blockage. (<b>b</b>) Small blockage. (<b>c</b>) Large blockage.</p>
Full article ">Figure 4
<p>Energy consumption vs. <span class="html-italic">r</span> without considering blockage.</p>
Full article ">Figure 5
<p>Convergence Rate Evaluation.</p>
Full article ">Figure 6
<p>Energy efficiency performance of CSTS/CSUCB-HBS approaches vs. separation distances at distinct blocking layouts. (<b>a</b>) No blockage. (<b>b</b>) Small blockage. (<b>c</b>) Large blockage.</p>
Full article ">
15 pages, 8333 KiB  
Article
Design of Capacitor-Less High Reliability LDO Regulator with LVTSCR Based ESD Protection Circuit Using Current Driving Buffer Structure
by Sang-Wook Kwon and Yong-Seo Koo
Electronics 2022, 11(11), 1781; https://doi.org/10.3390/electronics11111781 - 3 Jun 2022
Cited by 3 | Viewed by 3745
Abstract
The peak voltage depending on the load current can be affected by the external capacitors installed in the output stage of the LDO regulator. However, the capacitor-less LDO regulator proposed in this study was applied a current driving buffer structure between the output [...] Read more.
The peak voltage depending on the load current can be affected by the external capacitors installed in the output stage of the LDO regulator. However, the capacitor-less LDO regulator proposed in this study was applied a current driving buffer structure between the output stage of the error amplifier and the path transistor. Therefore, the proposed LDO regulator maintained a stable output voltage regardless of the load current by controlling an effective overshoot/undershoot voltage. In addition, the proposed LDO regulator has a built-in LVTSCR based on the ESD protection circuit. As most IC circuits are malfunctioned and destroyed by the ESD phenomenon, the reliability was verified through the built-in ESD protection circuit of the proposed LDO regulator. The proposed LDO regulator with the current driving buffer structure can effectively control the peak voltage. As a result of the measurement, the undershoot voltage of 22 mV and the overshoot voltage of 19 mV were maintained when the load current of 250 mA was provided under the conditions of 3.3 V to 4.5 V and the output power voltage of 3 V. The proposed ESD protection circuit is also guaranteed to function at temperatures as high as 500 K. Full article
(This article belongs to the Section Semiconductor Devices)
Show Figures

Figure 1

Figure 1
<p>PMIC (Power Management Integrated Circuit) block.</p>
Full article ">Figure 2
<p>Proposed LDO Regulator.</p>
Full article ">Figure 3
<p>Current Driving Buffer Structure with undershoot in the proposed LDO regulator.</p>
Full article ">Figure 4
<p>Current Driving Buffer Structure with overshoot in the proposed LDO regulator.</p>
Full article ">Figure 5
<p>LVTSCR-Based ESD Protection Structure.</p>
Full article ">Figure 6
<p>Equivalent circuit of SCR-based ESD protection structure.</p>
Full article ">Figure 7
<p>Results of simulation of transient response characteristics of the proposed LDO regulator.</p>
Full article ">Figure 8
<p>Simulation on the performance of the current supply and discharge path operated in the current driving buffer structure according to variation of load current.</p>
Full article ">Figure 9
<p>Chip layout of the proposed LDO regulator.</p>
Full article ">Figure 10
<p>Load transient of the proposed LDO regulator (Load = 100 mA).</p>
Full article ">Figure 11
<p>Load transient of the proposed LDO regulator (Load = 200 mA).</p>
Full article ">Figure 12
<p>Load transient of the proposed LDO regulator (Load = 250 mA).</p>
Full article ">Figure 13
<p>Load regulation of the proposed LDO regulator.</p>
Full article ">Figure 14
<p>Line regulation of the proposed LDO regulator.</p>
Full article ">Figure 15
<p>Quiescent current of the proposed LDO regulator.</p>
Full article ">Figure 16
<p>Temperature characteristics of the proposed LDO regulator.</p>
Full article ">Figure 17
<p>TLP I-V curve of proposed ESD clamp.</p>
Full article ">Figure 18
<p>Holding current and voltage at high temperature (300 to 500 K).</p>
Full article ">Figure 19
<p>Secondary trigger current and on-resistance (300 to 500 K).</p>
Full article ">
12 pages, 2817 KiB  
Article
Deepsign: Sign Language Detection and Recognition Using Deep Learning
by Deep Kothadiya, Chintan Bhatt, Krenil Sapariya, Kevin Patel, Ana-Belén Gil-González and Juan M. Corchado
Electronics 2022, 11(11), 1780; https://doi.org/10.3390/electronics11111780 - 3 Jun 2022
Cited by 96 | Viewed by 28835
Abstract
The predominant means of communication is speech; however, there are persons whose speaking or hearing abilities are impaired. Communication presents a significant barrier for persons with such disabilities. The use of deep learning methods can help to reduce communication barriers. This paper proposes [...] Read more.
The predominant means of communication is speech; however, there are persons whose speaking or hearing abilities are impaired. Communication presents a significant barrier for persons with such disabilities. The use of deep learning methods can help to reduce communication barriers. This paper proposes a deep learning-based model that detects and recognizes the words from a person’s gestures. Deep learning models, namely, LSTM and GRU (feedback-based learning models), are used to recognize signs from isolated Indian Sign Language (ISL) video frames. The four different sequential combinations of LSTM and GRU (as there are two layers of LSTM and two layers of GRU) were used with our own dataset, IISL2020. The proposed model, consisting of a single layer of LSTM followed by GRU, achieves around 97% accuracy over 11 different signs. This method may help persons who are unaware of sign language to communicate with persons whose speech or hearing is impaired. Full article
Show Figures

Figure 1

Figure 1
<p>Multi-layer system architecture using InceptionResNetV2, LSTM, and GRU for sign recognition in video frames.</p>
Full article ">Figure 2
<p>The basic diagram of the long short−term memory (LSTM) neural network (Yan [<a href="#B25-electronics-11-01780" class="html-bibr">25</a>]).</p>
Full article ">Figure 3
<p>The LSTM model architecture.</p>
Full article ">Figure 4
<p>Samples from the custom Indian Sign Language (ISL) dataset (IISL2020).</p>
Full article ">Figure 5
<p>Validation Confusion matrix for all four combinations with fold value 1, the rest of the parameters are the same as in the training: (<b>a</b>) GRU-GRU; (<b>b</b>) LSTM-LSTM; (<b>c</b>) GRU-LSTM; (<b>d</b>) LSTM-GRU.</p>
Full article ">Figure 5 Cont.
<p>Validation Confusion matrix for all four combinations with fold value 1, the rest of the parameters are the same as in the training: (<b>a</b>) GRU-GRU; (<b>b</b>) LSTM-LSTM; (<b>c</b>) GRU-LSTM; (<b>d</b>) LSTM-GRU.</p>
Full article ">Figure 6
<p>Implementation of the proposed model using different benchmark datasets.</p>
Full article ">
22 pages, 4642 KiB  
Article
Target Assignment Algorithm for Joint Air Defense Operation Based on Spatial Crowdsourcing Mode
by Sheng He, Shaohua Yue, Gang Wang, Siyuan Wang, Jiayi Liu, Wei Liu and Xiangke Guo
Electronics 2022, 11(11), 1779; https://doi.org/10.3390/electronics11111779 - 3 Jun 2022
Cited by 4 | Viewed by 2138
Abstract
Spatial crowdsourcing is a mode that uses distributed artificial computing power to solve specific function sets through Internet outsourcing. It has broad application value in the networked command and control of current joint air defense operations. In this paper, we introduce the spatial [...] Read more.
Spatial crowdsourcing is a mode that uses distributed artificial computing power to solve specific function sets through Internet outsourcing. It has broad application value in the networked command and control of current joint air defense operations. In this paper, we introduce the spatial crowdsourcing theory into the field of target allocation for joint air defense operations and establish a weapon-target assignment model based on spatial crowdsourcing mode, which is more appropriate to the real situation and highlights the system cooperation capability of joint air defense operations. To solve the model, we propose a heuristic variable weight nonlinear learning factor particle swarm optimization (VWNF-PSO). This algorithm can significantly improve the efficiency and adaptability to weapon-target assignment problems under large-scale extreme conditions. Finally, we establish two kinds of joint air defense operation scenarios to verify the proposed model, then compare the proposed algorithm with variable weight PSO (VWPSO) and adaptive learning factor PSO (AFPSO), to validate the effectiveness and efficiency of the VWNF-PSO algorithm proposed in this paper. Full article
(This article belongs to the Section Systems & Control Engineering)
Show Figures

Figure 1

Figure 1
<p>Cooperative diagram tree decomposition algorithm.</p>
Full article ">Figure 2
<p>Optimal structure.</p>
Full article ">Figure 3
<p>Learning factor value diagram.</p>
Full article ">Figure 4
<p>2D schematic diagram of operational scenarios.</p>
Full article ">Figure 5
<p>3D schematic diagram of operational scenarios.</p>
Full article ">Figure 6
<p>Sequence diagram of incoming target interception.</p>
Full article ">Figure 7
<p>Combat unit tree segmentation results.</p>
Full article ">Figure 8
<p>Algorithm fitness comparison.</p>
Full article ">Figure 9
<p>Number of interceptors consumed.</p>
Full article ">Figure 10
<p>Algorithm fitness comparison.</p>
Full article ">Figure 11
<p>Number of interceptors consumed.</p>
Full article ">
14 pages, 11770 KiB  
Article
Multi-Modal Alignment of Visual Question Answering Based on Multi-Hop Attention Mechanism
by Qihao Xia, Chao Yu, Yinong Hou, Pingping Peng, Zhengqi Zheng and Wen Chen
Electronics 2022, 11(11), 1778; https://doi.org/10.3390/electronics11111778 - 3 Jun 2022
Cited by 5 | Viewed by 2566
Abstract
The alignment of information between the image and the question is of great significance in the visual question answering (VQA) task. Self-attention is commonly used to generate attention weights between image and question. These attention weights can align two modalities. Through the attention [...] Read more.
The alignment of information between the image and the question is of great significance in the visual question answering (VQA) task. Self-attention is commonly used to generate attention weights between image and question. These attention weights can align two modalities. Through the attention weight, the model can select the relevant area of the image to align with the question. However, when using the self-attention mechanism, the attention weight between two objects is only determined by the representation of these two objects. It ignores the influence of other objects around these two objects. This contribution proposes a novel multi-hop attention alignment method that enriches surrounding information when using self-attention to align two modalities. Simultaneously, in order to utilize position information in alignment, we also propose a position embedding mechanism. The position embedding mechanism extracts the position information of each object and implements the position embedding mechanism to align the question word with the correct position in the image. According to the experiment on the VQA2.0 dataset, our model achieves validation accuracy of 65.77%, outperforming several state-of-the-art methods. The experimental result shows that our proposed methods have better performance and effectiveness. Full article
(This article belongs to the Collection Image and Video Analysis and Understanding)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Overview of the proposed VQA model. ⊕ denotes concatenation operation and ⊙ denotes matrix multiplication.</p>
Full article ">Figure 2
<p>Flowchart of multi-modal factorized bilinear pooling module.</p>
Full article ">Figure 3
<p>The structure of our multi-hop attention layer. ⊕ denotes add operation and ⊙ denotes matrix multiplication.</p>
Full article ">Figure 4
<p>(<b>a</b>) An example of a question in relation to the positional relationship of objects. (<b>b</b>) Flowchart of the position embedding <math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">P</mi> <mi mathvariant="bold-italic">n</mi> </msub> </semantics></math>.</p>
Full article ">Figure 5
<p>(<b>a</b>) The training loss of our model vs. epoch of Bottom-Up and Ban; (<b>b</b>) The validation accuracy of our model vs. epoch of Bottom-Up and Ban.</p>
Full article ">Figure 6
<p>Several examples of the reasoning results of our VQA model. Different colors of the bounding boxes denote the different objects detected.</p>
Full article ">
18 pages, 5921 KiB  
Article
Research on the SDIF Failure Principle for RF Stealth Radar Signal Design
by Jinwei Jia, Zhuangzhi Han, Limin Liu, Hui Xie and Meng Lv
Electronics 2022, 11(11), 1777; https://doi.org/10.3390/electronics11111777 - 3 Jun 2022
Cited by 6 | Viewed by 2048
Abstract
Radio frequency (RF) stealth is one of the essential research hotspots in the radar field. The anti-sorting signal is an important direction of the RF stealth signal. Theoretically speaking, the anti-sorting signal design is based on the failure principle of the radar signal [...] Read more.
Radio frequency (RF) stealth is one of the essential research hotspots in the radar field. The anti-sorting signal is an important direction of the RF stealth signal. Theoretically speaking, the anti-sorting signal design is based on the failure principle of the radar signal sorting algorithm, and the SDIF algorithm is a core sorting algorithm widely used in engineering. Thus, in this paper, the SDIF algorithm is first analyzed in detail. It is pointed out that the threshold function of the SDIF algorithm will fail when the signal pulse repetition interval (PRI) value obeys the interval distribution whose length is 20 times larger than the minimum interval of PRI. Secondly, the correctness of the failure principle of SDIF threshold separation is proved by the formula. Finally, the correctness is further verified by the signal design case. The principle of SDIF sorting threshold failure provides theoretical support for anti-sorting RF stealth signal design. It also complements the shortcoming of the casual design for the anti-sorting signal. Furthermore, the principle of SDIF sorting threshold failure helps improve anti-sorting signal design efficiency. Compared with the Dwell & Switch (D&S) signal and jitter signal, the anti-sorting ability of the signal designed by using the sorting failure principle is notably enhanced through simulation and experimentation. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of the threshold function.</p>
Full article ">Figure 2
<p>Logic diagram of the derived SDIF separation failure principle.</p>
Full article ">Figure 3
<p>Histogram of the first-order TOA difference in simulation case 1.</p>
Full article ">Figure 4
<p>Histogram of first-order TOA difference in simulation case 2. (<b>a</b>) The PRI values of both signals smaller than the sorting failure critical condition; (<b>b</b>) a signal with a PRI value larger than the sorting failure critical condition; (<b>c</b>) the PRI values of both signals larger than the sorting failure critical condition.</p>
Full article ">Figure 4 Cont.
<p>Histogram of first-order TOA difference in simulation case 2. (<b>a</b>) The PRI values of both signals smaller than the sorting failure critical condition; (<b>b</b>) a signal with a PRI value larger than the sorting failure critical condition; (<b>c</b>) the PRI values of both signals larger than the sorting failure critical condition.</p>
Full article ">Figure 5
<p>Histogram of first-order TOA difference in simulation case 3. (<b>a</b>) The PRI values of the three signals all less than the sorting failure critical condition; (<b>b</b>) a signal whose PRI value is larger than the sorting failure critical condition; (<b>c</b>) two signals whose PRI values are larger than the sorting failure critical condition; (<b>d</b>) the PRI values of three signals larger than the sorting failure critical condition.</p>
Full article ">Figure 5 Cont.
<p>Histogram of first-order TOA difference in simulation case 3. (<b>a</b>) The PRI values of the three signals all less than the sorting failure critical condition; (<b>b</b>) a signal whose PRI value is larger than the sorting failure critical condition; (<b>c</b>) two signals whose PRI values are larger than the sorting failure critical condition; (<b>d</b>) the PRI values of three signals larger than the sorting failure critical condition.</p>
Full article ">Figure 6
<p>Histogram of first- and multi-order TOA differences in simulation case 4. (<b>a</b>) The histogram of the first-order TOA difference in signal PRI values uniformly distributed in an interval; (<b>b</b>) the histogram of the second-order TOA difference in signal PRI values uniformly distributed in an interval; (<b>c</b>) the histogram of the third-order TOA difference in signal PRI values uniformly distributed in an interval; (<b>d</b>) the histogram of the fourth-order TOA difference in signal PRI values uniformly distributed in an interval.</p>
Full article ">Figure 6 Cont.
<p>Histogram of first- and multi-order TOA differences in simulation case 4. (<b>a</b>) The histogram of the first-order TOA difference in signal PRI values uniformly distributed in an interval; (<b>b</b>) the histogram of the second-order TOA difference in signal PRI values uniformly distributed in an interval; (<b>c</b>) the histogram of the third-order TOA difference in signal PRI values uniformly distributed in an interval; (<b>d</b>) the histogram of the fourth-order TOA difference in signal PRI values uniformly distributed in an interval.</p>
Full article ">Figure 7
<p>SDIF algorithm for the D&amp;S signal first-to-fourth-order histogram sorting results. (<b>a</b>) The histogram of first-order TOA difference in the D&amp;S signal; (<b>b</b>) the histogram of second-order TOA difference in the D&amp;S signal; (<b>c</b>) the histogram of the third-order TOA difference in the D&amp;S signal; (<b>d</b>) the histogram of the fourth-order TOA difference in the D&amp;S signal.</p>
Full article ">Figure 8
<p>Diagram of the signal transmitting system structure.</p>
Full article ">Figure 9
<p>Schematic diagram of the signal reconnaissance system.</p>
Full article ">Figure 10
<p>Signal sorting experiment equipment connection diagram.</p>
Full article ">Figure 11
<p>Display terminal interface of the signal reconnaissance system.</p>
Full article ">Figure 12
<p>Comparison diagram of sorting results.</p>
Full article ">
25 pages, 7762 KiB  
Article
A Novel Approach for the Implementation of Fast Frequency Control in Low-Inertia Power Systems Based on Local Measurements and Provision Costs
by Jelena Stojković and Predrag Stefanov
Electronics 2022, 11(11), 1776; https://doi.org/10.3390/electronics11111776 - 2 Jun 2022
Cited by 3 | Viewed by 2006
Abstract
Transitioning towards carbon-free energy has brought severe difficulties related to reduced inertia in electric power systems. Regarding frequency stability, low-inertia systems are more sensitive to disturbance, and traditional frequency control is becoming insufficient to maintain frequency within acceptable limits. Consequently, there is a [...] Read more.
Transitioning towards carbon-free energy has brought severe difficulties related to reduced inertia in electric power systems. Regarding frequency stability, low-inertia systems are more sensitive to disturbance, and traditional frequency control is becoming insufficient to maintain frequency within acceptable limits. Consequently, there is a necessity for faster frequency support that can be activated before the primary frequency control and that can decelerate further frequency decay. This paper proposes a local control strategy for a multi-stage fast frequency response (FFR) provided as an ancillary service that considers the location of the disturbance and the distribution of system inertia. The novelty of the presented control strategy is the ranking of FFR resources by price, which takes the economic component into consideration. The proposed control is simple, based only on RoCoF measurements that trigger the activation of FFR resources. Its advantage over other methods is the ability to adapt the FFR resource response to the disturbance without complex calculations and the ability to ensure a bigger response closer to the disturbance, as well as in low-inertia parts of the system. In that way, there is a bigger activation of resources in the parts of the system that are more endangered by disturbances, which, as a result, minimizes the propagation of the disturbance’s impact on system stability. The applicability of the presented method is demonstrated in a simple 3-area power system and IEEE 68-bus system implemented in MATLAB/Simulink. The results show that the proposed control enables the largest response closer to the disturbance, thus mitigating the propagation of the disturbance. Furthermore, the results confirm that the proposed control enables lower provision costs and more support in low-inertia areas that are more vulnerable to disturbances. Full article
Show Figures

Figure 1

Figure 1
<p>The maximum values of RoCoF in areas depending on inertia distribution.</p>
Full article ">Figure 2
<p>The maximum values of RoCoF in areas depending on area distance.</p>
Full article ">Figure 3
<p>The frequency of inter-area oscillations depending on inertia distribution.</p>
Full article ">Figure 4
<p>The frequency of inter-area oscillations depending on the synchronizing power coefficient.</p>
Full article ">Figure 5
<p>The value of RoCoF in area 1 for different frequencies of inter-area oscillations.</p>
Full article ">Figure 6
<p>The value of RoCoF in area 2 for different frequencies of inter-area oscillations.</p>
Full article ">Figure 7
<p>Overview of FFR control scheme and the diagram flow of the novel approach implementation.</p>
Full article ">Figure 8
<p>Representation of the transmission network divided into coherency areas.</p>
Full article ">Figure 9
<p>The provision of FFR in one stage.</p>
Full article ">Figure 10
<p>Timeline and cost associated with FFR service.</p>
Full article ">Figure 11
<p>Dispatch of FFR resources based on provision cost.</p>
Full article ">Figure 12
<p>Three-area test system.</p>
Full article ">Figure 13
<p>Three-area test system response in the case of a disturbance in Area2—Strong grid—Case 1.1.</p>
Full article ">Figure 14
<p>Three-area test system response in the case of a disturbance in Area2—Weak grid—Case 1.2.</p>
Full article ">Figure 15
<p>Three-area test system response in the case of a disturbance in Area2—Different line lengths—Case 1.3.</p>
Full article ">Figure 16
<p>Three-area test system response in the case of a disturbance in a low-inertia area—Case 2.1.</p>
Full article ">Figure 17
<p>Three-area test system response in the case of a disturbance in the high-inertia area—Case 2.2.</p>
Full article ">Figure 18
<p>FFR deployment for different location of the disturbance.</p>
Full article ">Figure 19
<p>Provision costs of FFR service.</p>
Full article ">Figure 20
<p>IEEE 68-bus system.</p>
Full article ">Figure 21
<p>Frequencies at generator buses after disturbance in Area 1.</p>
Full article ">Figure 22
<p>The RoCoF at generator buses after disturbance in Area 1.</p>
Full article ">Figure 23
<p>FFR in different areas.</p>
Full article ">Figure 24
<p>Active power flow on lines connecting Area 1 and Area 2.</p>
Full article ">Figure 25
<p>Provision costs of FFR service for the IEEE 68.</p>
Full article ">
19 pages, 3371 KiB  
Article
CXAI: Explaining Convolutional Neural Networks for Medical Imaging Diagnostic
by Zakaria Rguibi, Abdelmajid Hajami, Dya Zitouni, Amine Elqaraoui and Anas Bedraoui
Electronics 2022, 11(11), 1775; https://doi.org/10.3390/electronics11111775 - 2 Jun 2022
Cited by 11 | Viewed by 8050
Abstract
Deep learning models have been increasingly applied to medical images for tasks such as lesion detection, segmentation, and diagnosis. However, the field suffers from the lack of concrete definitions for usable explanations in different settings. To identify specific aspects of explainability that may [...] Read more.
Deep learning models have been increasingly applied to medical images for tasks such as lesion detection, segmentation, and diagnosis. However, the field suffers from the lack of concrete definitions for usable explanations in different settings. To identify specific aspects of explainability that may catalyse building trust in deep learning models, we will use some techniques to demonstrate many aspects of explaining convolutional neural networks in a medical imaging context. One important factor influencing clinician’s trust is how well a model can justify its predictions or outcomes. Clinicians need understandable explanations about why a machine-learned prediction was made so they can assess whether it is accurate and clinically useful. The provision of appropriate explanations has been generally understood to be critical for establishing trust in deep learning models. However, there lacks a clear understanding on what constitutes an explanation that is both understandable and useful across different domains such as medical image analysis, which hampers efforts towards developing explanatory tool sets specifically tailored towards these tasks. In this paper, we investigated two major directions for explaining convolutional neural networks: feature-based post hoc explanatory methods that try to explain already trained and fixed target models and preliminary analysis and choice of the model architecture with an accuracy of 98% ± 0.156% from 36 CNN architectures with different configurations. Full article
(This article belongs to the Special Issue Electronic Devices and Systems for Biomedical Applications)
Show Figures

Figure 1

Figure 1
<p>Convolutional networks.</p>
Full article ">Figure 2
<p>Feature maps phase.</p>
Full article ">Figure 3
<p>Fully connected layer.</p>
Full article ">Figure 4
<p>Probabilistic distribution.</p>
Full article ">Figure 5
<p>Nonlinear function of the input features, which produces some prediction. The function can be approximated locally as a linear model.</p>
Full article ">Figure 6
<p>Three convolution block with different batch number and learning rate.</p>
Full article ">Figure 7
<p>Five convolution block with different batch number and learning rate.</p>
Full article ">Figure 8
<p>Seven convolution block with different batch number and learning rate.</p>
Full article ">Figure 9
<p>XRAI heatmap explanation for brain tumour detection and classification with the top 8% of the salient of the image.</p>
Full article ">Figure 10
<p>XRAI heatmap explanation for brain tumour detection and classification with the top 8% of the salient of the image.</p>
Full article ">Figure 11
<p>Vanilla IG results.</p>
Full article ">Figure 12
<p>Guided integrated gradients results.</p>
Full article ">Figure 13
<p>Blur integrated gradients and SmoothGrad IG results.</p>
Full article ">
19 pages, 3832 KiB  
Article
An Enhanced DV-Hop Localization Scheme Based on Weighted Iteration and Optimal Beacon Set
by Tianfei Chen, Shuaixin Hou, Lijun Sun and Kunkun Sun
Electronics 2022, 11(11), 1774; https://doi.org/10.3390/electronics11111774 - 2 Jun 2022
Cited by 5 | Viewed by 1930
Abstract
Node localization technology has become a research hotspot for wireless sensor networks (WSN) in recent years. The standard distance vector hop (DV-Hop) is a remarkable range-free positioning algorithm, but the low positioning accuracy limits its application in certain scenarios. To improve the positioning [...] Read more.
Node localization technology has become a research hotspot for wireless sensor networks (WSN) in recent years. The standard distance vector hop (DV-Hop) is a remarkable range-free positioning algorithm, but the low positioning accuracy limits its application in certain scenarios. To improve the positioning performance of the standard DV-Hop, an enhanced DV-Hop based on weighted iteration and optimal beacon set is presented in this paper. Firstly, different weights are assigned to beacons based on the per-hop error, and the weighted minimum mean square error (MMSE) is performed iteratively to find the optimal average hop size (AHS) of beacon nodes. After that, the approach of estimating the distance between unknown nodes and beacons is redefined. Finally, considering the influence of beacon nodes with different distances to the unknown node, the nearest beacon nodes are given priority to compute the node position. The optimal coordinates of the unknown nodes are determined by the best beacon set derived from a grouping strategy, rather than all beacons directly participating in localization. Simulation results demonstrate that the average localization error of our proposed DV-Hop reaches about 3.96 m, which is significantly lower than the 9.05 m, 7.25 m, and 5.62 m of the standard DV-Hop, PSO DV-Hop, and Selective 3-Anchor DV-Hop. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

Figure 1
<p>The network topology diagram.</p>
Full article ">Figure 2
<p>Flow chart for computing the optimal AHS.</p>
Full article ">Figure 3
<p>The network topology diagram.</p>
Full article ">Figure 4
<p>Precision comparison of the AHS of each beacon node.</p>
Full article ">Figure 5
<p>Comparison for the distance precision between unknown nodes and beacon nodes.</p>
Full article ">Figure 6
<p>Normalization localization error of each unknown node: (<b>a</b>) Standard DV-Hop; (<b>b</b>) PSO DV-Hop; (<b>c</b>) Selective 3-Anchor DV-Hop; (<b>d</b>) Proposed DV-Hop.</p>
Full article ">Figure 7
<p>The effect of node density on ANLE and SDE: (<b>a</b>) normalized localization error; (<b>b</b>) localization stability.</p>
Full article ">Figure 8
<p>The effect of beacon ratio on ANLE and SDE: (<b>a</b>) normalized localization error; (<b>b</b>) localization stability.</p>
Full article ">Figure 9
<p>The effect of communication range on ANLE and SDE: (<b>a</b>) normalized localization error; (<b>b</b>) localization stability.</p>
Full article ">
21 pages, 7161 KiB  
Article
A Formal Modeling and Verification Scheme with an RNN-Based Attacker for CAN Communication System Authenticity
by Yihua Wang, Qing Zhou, Yu Zhang, Xian Zhang and Jiahao Du
Electronics 2022, 11(11), 1773; https://doi.org/10.3390/electronics11111773 - 2 Jun 2022
Cited by 1 | Viewed by 1861
Abstract
To enhance the attack resistance of the Controller Area Network (CAN) system and optimize the communication software design, a comprehensive model that combines a variable attacker with the CAN bus (VACB) is proposed to evaluate the bus communication risk. The VACB model consists [...] Read more.
To enhance the attack resistance of the Controller Area Network (CAN) system and optimize the communication software design, a comprehensive model that combines a variable attacker with the CAN bus (VACB) is proposed to evaluate the bus communication risk. The VACB model consists of a variable attacker and the CAN bus model. A variable attacker is a visualized generation of the attack traffic based on a recurrent neural network (RNN), which is used to evaluate the anti-attack performance of the CAN bus; the CAN bus model combines the data link layer and the application layer to analyze the anomalies in CAN bus data transmission after the attack message. The simulation results indicate that the transmission accuracy and successful response rate decreased by 1.8% and 4.3% under the constructed variable attacker. The CAN bus’s authenticity was promoted after the developers adopted this model to analyze and optimize the software design. The transmission accuracy and the successful response rate were improved by 2.5% and 5.1%, respectively. Moreover, the model can quantify the risk of potential attacks on the CAN bus, prompting developers to avoid it in early development to reduce the loss caused by system crashes. The comprehensive model can provide theoretical guidance for the timing design of embedded software. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

Figure 1
<p>Message format of the Controller Area Network (CAN) bus packets.</p>
Full article ">Figure 2
<p>CAN ID prediction and one-hot coding schematic.</p>
Full article ">Figure 3
<p>Time series expansion model of the recurrent neural network (RNN).</p>
Full article ">Figure 4
<p>Transformed formal model: FMA-RNN in UPPAAL.</p>
Full article ">Figure 5
<p>The interactive model of the CAN bus. (<b>a</b>) The state transitions of the master node. (<b>b</b>) The behavior patterns and state transitions of the nodes. (<b>c</b>) The state transitions of the slave node. (<b>d</b>) Arbitration state transitions.</p>
Full article ">Figure 6
<p>Timed automata (TA) of the master on the CAN bus: Main_Controller.</p>
Full article ">Figure 7
<p>TA of the CAN bus application layer: Node_Application.</p>
Full article ">Figure 8
<p>TA of the slave node in the CAN bus: txNode(i).</p>
Full article ">Figure 9
<p>TA of the arbitrator in the data link layer of CAN bus: Arbitration.</p>
Full article ">Figure 10
<p>Verification results for the basic properties of the VACB model in UPPAAL.</p>
Full article ">Figure 11
<p>Simulation results in UPPAAL SMC.</p>
Full article ">Figure 12
<p>Transmission accuracy for various values of t_Done_Time in various numbers of nodes.</p>
Full article ">Figure 13
<p>Probability distribution and cumulative probability confidence intervals of transmission accuracy on the CAN bus. (<b>a</b>) The probability of successful transmission under the FMA-RNN without optimization. (<b>b</b>) The probability of successful transmission under the FMA-RNN after optimization.</p>
Full article ">Figure 14
<p>Cumulative probability of the successful response rate in the three scenarios.</p>
Full article ">Figure 15
<p>Comparison of results before and after optimization under the FMA-RNN. (<b>a</b>) This figure shows the successful response rate under the FMA-RNN without optimization. (<b>b</b>) This figure shows the successful response rate under the FMA-RNN after optimization.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop