<![CDATA[ IEEE Access - new TOC ]]>
http://ieeexplore.ieee.org
TOC Alert for Publication# 6287639 2018February 22<![CDATA[Expressive Policy-Based Access Control for Resource-Constrained Devices]]>615465552<![CDATA[You Can Recharge With Detouring: Optimizing Placement for Roadside Wireless Charger]]>$left({1 - frac {1}{e}}right)$ is proposed for the threshold detouring mode. In addition, an improved algorithm with an approximation factor of $left({1 - frac {1}{sqrt {e}}}right)$ is presented for the linear/nonlinear detouring mode. Finally, we evaluate the performance of our algorithms by comparing them with two typical heuristic algorithms (flow-centric and random-based), and the impacts of different detouring thresholds on our algorithms by synthetic traces. Moreover, real trace-driven evaluations validate that our algorithm improves the coverage quality by 75% when compared to the two aforementioned algorithms.]]>647593635<![CDATA[VTB-RTRRP: Variable Threshold Based Response Time Reliability Real-Time Prediction]]>660717028<![CDATA[Channel Estimation With Expectation Maximization and Historical Information Based Basis Expansion Model for Wireless Communication Systems on High Speed Railways]]>672804682<![CDATA[R&P: An Low-Cost Device-Free Activity Recognition for E-Health]]>681901775<![CDATA[A Survey on Content Placement Algorithms for Cloud-Based Content Delivery Networks]]>6911148952<![CDATA[A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT]]>61151248914<![CDATA[Correlation-Filter Based Scale-Adaptive Visual Tracking With Hybrid-Scheme Sample Learning]]>61251378687<![CDATA[A Low-Overhead Timing Monitoring Technique for Variation-Tolerant Near-Threshold Digital Integrated Circuits]]>In situ timing monitoring-based adaptive techniques can mitigate excessive timing margins caused by PVT variations, but current frequency and/or voltage tuning methods cause large performance loss. In this paper, we propose a low overhead timing error prediction monitor and a super-fast clock stretching circuit to solve this problem. They are both optimized for near-threshold voltage of 0.5 V. When there are timing margins, the frequency will be increased. Until when the timing is intense due to variations, timing monitors will generate a predicted alarm signal. Accordingly, the system clock will be stretched immediately to avoid real timing errors. Applied on a 40-nm CMOS Bitcoin Miner chip, simulation results show that the whole system operating at near-threshold voltage can increase the frequency to up to $2.1times $ compared with the original non-monitored circuit. Our method can increase the energy efficiency to mitigate near-threshold variations effectively.]]>61381455950<![CDATA[A New Class of Components for Simultaneous Power Splitting Over Microwave and Millimeter-Wave Frequency Bands]]>10 mode of the SIW structure at the same time is proposed. A simple transmission model is utilized to explain the working principle along with the theoretical analysis. Based on this novel feeding approach, fourdual-/tri-band components which can achieve a large frequency ratio up to 33.3 were designed, fabricated, and measured. Besides the flexibility in operating frequency, the proposed structure can provide arbitrary coupling coefficients (3–10 dB) and even different functionalities at the two frequency bands, which had not been reported in the literature.]]>61461582286<![CDATA[SLA-Aware Fine-Grained QoS Provisioning for Multi-Tenant Software-Defined Networks]]>61591704979<![CDATA[The Modeling and Cross-Layer Optimization of 802.11p VANET Unicast]]>617118610445<![CDATA[Active Learning for Visual Image Classification Method Based on Transfer Learning]]>61871984846<![CDATA[Multi-Modal Cooperative Spectrum Sensing Based on Dempster-Shafer Fusion in 5G-Based Cognitive Radio]]>61992087679<![CDATA[Optimal Video Streaming in Dense 5G Networks With D2D Communications]]>62092232248<![CDATA[Flexible Job Shop Scheduling With Operators in Aeronautical Manufacturing: A Case Study]]>62242334735<![CDATA[Content Centric Cross-Layer Scheduling for Industrial IoT Applications Using 6TiSCH]]>623424411274<![CDATA[Energy Harvesting Aided Device-to-Device Communication in the Over-Sailing Heterogeneous Two-Tier Downlink]]>joint optimization of RB and power allocation (JORPA) is proposed, which jointly allocates the RBs and power for the D2D links, whilst relying on the results of Lagrangian constrained optimization, when the base stations (BSs) of different tiers obey one of the following regimes: (a) orthogonal; (b) co-channel; and (c) the proposed co-orthogonal channel deployments. We also propose low complexity heuristic methods for optimizing the D2D transmit power, while defining the D2D-MU matching heuristically and vice versa. The performance of both the JORPA algorithm as well as of the low-complexity heurist-
c algorithms is quantitatively analyzed using our simulation results for different channel deployments relying on diverse network parameter settings. As expected, orthogonal deployment performs best, followed by the co-orthogonal and co-channel deployments. Moreover, the throughput experienced by the MUs in presence of D2D communication is guaranteed by our co-orthogonal scheme as well as orthogonal scheme, while co-channel suffers a marginal degradation when compared with throughput threshold. We also demonstrate that our equal power allocation heuristic method is capable of achieving 96% of the sum-rate achieved by JORPA while other heuristic methods perform less well, implying that the optimization of the D2D-MU matching is indeed crucial for the system considered.]]>62452615283<![CDATA[LTCC Filtering Rat-Race Coupler Based on Eight-Line Spatially-Symmetrical Coupled Structure]]>$3.8 times 4 times 2.1$ mm^{3}, which demonstrates that by employing the eight-line spatiallysymmetrical coupled structure, the proposed rat-race coupler obtains good performance and compact size.]]>62622695375<![CDATA[Gender Dynamics: A Case Study of Role Allocation in Engineering Education]]>62702794586<![CDATA[A Holistic Approach to Reconstruct Data in Ocean Sensor Network Using Compression Sensing]]>62802864086<![CDATA[IEEE Access® Associate Editors]]>6287290209<![CDATA[Synchronization of Two Nonidentical Complex Dynamical Networks via Periodically Intermittent Pinning]]>62913002732<![CDATA[Base Station Ordering for Emergency Call Localization in Ultra-Dense Cellular Networks]]>63013152305<![CDATA[Public Safety Communications above 6 GHz: Challenges and Opportunities]]>63163293288<![CDATA[Joint-Saliency Structure Adaptive Kernel Regression with Adaptive-Scale Kernels for Deformable Registration of Challenging Images]]>63303432503<![CDATA[12-Port 5G Massive MIMO Antenna Array in Sub-6GHz Mobile Handset for LTE Bands 42/43/46 Applications]]>$pi $ -shaped antenna, longer inverted L-shaped open slot antenna, and shorter inverted L-shaped open slot antenna. In total, eight antenna elements are used for the $8 times 8$ MIMO in LTE bands 42/43, and six antenna elements are designed for the $6 times 6$ MIMO in LTE band 46. The proposed antenna was simulated, and a prototype was fabricated and tested. The measured results show that the LTE bands 42/43/46 are satisfied with reflection coefficient better than −6 dB, isolation lower than −12 dB, and total efficiencies of higher than 40%. In addition to that, the proposed antenna array has also shown good MIMO performances with an envelope correlation coefficient lower than 0.15, and ergodic channel capacities higher than 34 and 26.5 b/s/Hz in the LTE bands 42/43 and LTE band 46, respectively. The hand phantom effects are also investigated, and the results show that the proposed antenna array can still exhibit good radiation and MIMO performances when operating under data mode and read mode conditions.]]>63443542550<![CDATA[Petri Net-Based Efficient Determination of Optimal Schedules for Transport-Dominant Single-Arm Multi-Cluster Tools]]>63553651728<![CDATA[Agent-Based Simulation of Smart Beds With Internet-of-Things for Exploring Big Data Analytics]]>63663797035<![CDATA[An Enhanced Distributed Trust Computing Protocol for VANETs]]>63803927879<![CDATA[A Privacy-Preserving Framework for Trust-Oriented Point-of-Interest Recommendation]]>63934045512<![CDATA[IoT-Based Wireless Polysomnography Intelligent System for Sleep Monitoring]]>64054146035<![CDATA[Driver ECG Measuring System With a Conductive Fabric-Based Dry Electrode]]>64154271433<![CDATA[Low-Latency Approach for Secure ECG Feature Based Cryptographic Key Generation]]>64284429488<![CDATA[Visual and Infrared Sensor Data-Based Obstacle Detection for the Visually Impaired Using the Google Project Tango Tablet Development Kit and the Unity Engine]]>64434543245<![CDATA[Analysis of Message Attacks in Aviation Data-Link Communication]]>64554636898<![CDATA[Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions]]>64644785204<![CDATA[Fault Detection Based on Modified Kernel Semi-Supervised Locally Linear Embedding]]>64794876926<![CDATA[Negative $varepsilon$ Dragging Technique for Pattern Classification]]>$varepsilon $ dragging technique for robust classification of noisy and contaminated data. Different from the naïve $varepsilon $ dragging technique, the negative $varepsilon $ dragging technique argues that robust results can be obtained by properly reducing the class margin of conventional least squares regression when performing classification on noisy data. The underlying rationale of the negative $varepsilon $ dragging technique assumes that setting a relative small class margin for the training procedure of least squares regression leads to desirable generalization capability, which, therefore, considerably contributes to boosting the classification performance for the data corrupted with noise. The experimental results indicate that our technique obtains better classification accuracy.]]>64884944403<![CDATA[Signal Eigenvalue Factor for Synthetic Transmit Aperture Ultrasound Imaging]]>64955039053<![CDATA[An Identification Decision Tree Learning Model for Self-Management in Virtual Radio Access Network: IDTLM]]>65045187134<![CDATA[A Time Domain Passivity Approach for Asymmetric Multilateral Teleoperation System]]>65195314194<![CDATA[Missing Data Recovery Based on Tensor-CUR Decomposition]]>65325445348<![CDATA[Optical Character Recognition for Quranic Image Similarity Matching]]>65545624057<![CDATA[Influenza Activity Surveillance Based on Multiple Regression Model and Artificial Neural Network]]>65635752527<![CDATA[Reinforcement Learning-Based and Parametric Production-Maintenance Control Policies for a Deteriorating Manufacturing System]]>s, S), threshold-type condition based maintenance and periodic maintenance. The proposed approach is compared with the parametric policies in an extensive series of simulation experiments and it is found to clearly outperform them in all cases. Based on the numerical results obtained by the experiments, the behavior of the parametric policies as well as the structure of the control policies derived by the Reinforcement Learning-based approach is investigated.]]>65765885506<![CDATA[Multidimensional Index Modulation in Wireless Communications]]>antennas, time slots, and RF mirrors, are indexed simultaneously. Recognizing that such multidimensional index modulation schemes encourage sparsity in their transmit signal vectors, we propose efficient signal detection schemes that use compressive sensing based reconstruction algorithms. Results show that, for a given rate, improved performance is achieved when the number of indexed transmission entities is increased. We also explore indexing opportunities in load modulation (LM), which is a modulation scheme that offers power efficiency and reduced RF hardware complexity advantages in multiantenna systems. Results show that indexing time and RF mirrors in load modulated multiantenna systems can achieve improved performance. A stagewise algorithm based on message passing suited for the detection of indexed LM signals is also proposed.]]>65896045066<![CDATA[Detection of Respiration Movement Asymmetry Between the Left and Right Lungs Using Mutual Information and Transfer Entropy]]>$text{L}to text{R}$ ) and TE($text{R}to text{L}$ )) were significantly different in RS, T1RA, and T2RA. TE($text{R}to text{L}$ ) increased progressively when shifting RS to T1RA and then to T2RA. The prominent direction of transferred information in two lungs was significantly different for T1RA and T2RA. The results indicate that MI is suitable parameters for detecting respiration symmetry and asymmetry. TE is a useful tool for detecting two respiration movement asymmetry. The results provide a better understanding of the mechanisms underlying responsible for pulmonary ventilation redistribution and could provide novel clinical markers to evaluate asymmetry of two lungs effectively.]]>66056135241<![CDATA[Soft-GORA: Soft Constrained Globally Optimal Resource Allocation for Critical Links in IoT Backhaul Communication]]>66146243934<![CDATA[Robust Virtual Inertia Control of an Islanded Microgrid Considering High Penetration of Renewable Energy]]>$H_{mathbf {infty }}$ robust control method is implemented to the virtual inertial control loop, taking into account the high penetration of RESs, thus enhancing the robust performance and stability of the microgrid during contingencies. The controller’s robustness and performance are determined along with numerous disturbances and parametric uncertainties. The comparative study between $H_{mathbf {infty }}$ and optimal proportional-integral (PI)-based virtual inertia controller is also presented. The results show the superior robustness and control effect of the proposed $H_{mathbf {infty }}$ controller in terms of precise reference frequency tracking and disturbance attenuation over the optimal PI controller. It is validated that the proposed $H_{mathbf {infty }}$ -based virtual inertia controller successfully provides desired robust frequency support to a low-inertia islanded microgrid against high RESs penetration.]]>66256368054<![CDATA[Design of Wideband Circularly Polarized Vivaldi Antenna With Stable Radiation Pattern]]>66376446333<![CDATA[WARM: Workload-Aware Multi-Application Task Scheduling for Revenue Maximization in SDN-Based Cloud Data Center]]>66456575439<![CDATA[Blind Source Separation Method for Bearing Vibration Signals]]>66586644895<![CDATA[Prognostics and Health Management: A Review of Vibration Based Bearing and Gear Health Indicators]]>66656764124<![CDATA[A Hybrid Algorithm for Estimating Origin-Destination Flows]]>$K$ -nearest neighbor algorithms, neural network algorithms and classification algorithms. The results show that our proposed NMF-AR algorithm have a more effective capability in predicting OD matrices than other models.]]>66776872570<![CDATA[A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing]]>66887012714<![CDATA[Automatic Generation of News Comments Based on Gated Attention Neural Networks]]>67027109034<![CDATA[A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service]]>67117228944<![CDATA[An Introduction to Dew Computing: Definition, Concept and Implications]]>67237375579<![CDATA[Implementation and Comparison of Symmetric and Asymmetric Multilevel Inverters for Dynamic Loads]]>673874610183<![CDATA[A New Multiple Access Technique for 5G: Power Domain Sparse Code Multiple Access (PSMA)]]>67477595265<![CDATA[Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing]]>67607719442<![CDATA[Resource Allocation for Secure Communication in $K$ -Tier Heterogeneous Cellular Networks: A Spatial-Temporal Perspective]]>$K$ -tier dynamic heterogeneous cellular networks jointly considering the randomness of base stations (BSs) in spatial dimension and user equipment (UE) arrival and departure processes in temporal dimension. First, we develop a 3-D stochastic model by jointly taking into account the randomness of BSs in two spatial dimensions and UE arrival and departure processes in one temporal dimension. Second, we analyze the connection outage probability and secrecy outage probability of the typical UE. Their expressions admit quite simple closed-forms in some plausible special cases. Based on the outage analysis, the reliability and security performances of the network are evaluated, respectively. Third, we investigate the network-wide secrecy throughput in virtue of the outage analysis. Furthermore, we derive the optimal resource allocation factors of different tiers to maximize the secrecy throughput. Since the objective function of the maximization problem is not in closed form and non-convex, the concave upper and lower bounds are deduced and utilized, which leads to near-optimal solutions of the resource allocation factors of different tiers. It is demonstrated that apart from the spatial intensity and transmission power of each BS, UE arrival and departure processes are also key elements influencing the resource allocation factors of different tiers. Finally, numerical results show the usefulness and correctness of our theoretical conclusions.]]>677278211762<![CDATA[Exploiting LTE-Advanced HetNets and FeICIC for UAV-Assisted Public Safety Communications]]>67837966959<![CDATA[Passivity and Fault Alarm-Based Hybrid Control for a Markovian Jump Delayed System With Actuator Failures]]>67978052415<![CDATA[Automated Quality Assessment of Fundus Images via Analysis of Illumination, Naturalness and Structure]]>68068171443<![CDATA[A 700MHz to 2.5GHz Cascode GaAs Power Amplifier for Multi-Band Pico-Cell Achieving 20dB Gain, 40dBm to 45dBm OIP3 and 66% Peak PAE]]>$0.25~mu text{m}$ PHEMT. It achieves an input and output return loss of less than −10 dB followed by flat power gain of 20 dB across the operating band, while sustaining an unconditional stability performance up to 20 GHz. With 1-dB compression point output power (P1dB) of 24.0 dBm, the PA delivers an OIP3 of more than 40 dBm with peak PAE of 66%. The fully integrated circuit consumes an area of 0.8 mm^{2}. The proposed circuit serves to be a good solution to be integrated as a part of the wideband transmitter system for picocell application.]]>68188296081<![CDATA[RF Compliance Study of Temperature Elevation in Human Head Model Around 28 GHz for 5G User Equipment Application: Simulation Analysis]]>68308386791<![CDATA[Stochastic Exponential Robust Stability of Delayed Complex-Valued Neural Networks With Markova Jumping Parameters]]>68398491589<![CDATA[Framework for Multi-Operator Collaboration for Green Communication]]>68508652371<![CDATA[High-Order Affinity Extension of Normalized Cut and Its Applications]]>68668702718<![CDATA[A Framework for Hardware Efficient Reusable IP Core for Grayscale Image CODEC]]>68718829656<![CDATA[A Parallel Genetic Algorithm With Dispersion Correction for HW/SW Partitioning on Multi-Core CPU and Many-Core GPU]]>68838987336<![CDATA[Competitive Partial Computation Offloading for Maximizing Energy Efficiency in Mobile Cloud Computing]]>689991210468<![CDATA[Deep Saliency Quality Assessment Network With Joint Metric]]>691392413034<![CDATA[Experiment Study on the Control Method of Motor-Generator Pair System]]>692593610917<![CDATA[Reachable Set Estimation for a Class of Memristor-Based Neural Networks With Time-Varying Delays]]>69379431400<![CDATA[Evaluating Policies for Parking Lots Handling Electric Vehicles]]>69449617450<![CDATA[Space–Time Line Code for Massive MIMO and Multiuser Systems With Antenna Allocation]]>$M$ -by-2 massive multiple-input multiple-output (MIMO) system that transmits a single stream is investigated. For this system, we propose a space-time line code (STLC), which is a transmitting and combining (at a receiver) scheme that achieves full spatial diversity. For the STLC, two consecutive (time) information symbols are weighted as per channel gains (space), combined at each transmit antenna, and transmitted through the $M$ transmit antennas for two consecutive symbol times. With two receive antennas, the STLC receiver simply combines the signals received in the two symbol times and achieves a diversity order of $2M$ (full diversity). We show that the proposed STLC asymptotically achieves the maximum (optimal) received signal-to-noise ratio as $M$ increases with significantly reduced computational complexity compared with the optimal scheme. Because the proposed STLC receiver requires no or partial channel state information, it avoids the issue of massive MIMO channel estimation. Furthermore, the rigorous performance evaluation under spatially correlated and uncertain channel conditions reveals that the proposed STLC achieves comparable or better performance than the existing schemes, and the results verify that the proposed STLC scheme is a potential candidate for $M$ -by-2 massive MIMO systems. Next, the transmit antenna allocation algorithms are devised for a multiuser STLC system. Each user achieves full diversity order from the corresponding MIMO channels after the antenna allocation. The signal-to-interference-plus-noise ratio (S-
NR) of each user is analyzed considering the multiuser interference and channel uncertainty, and its lower bound is derived. Using the SINR lower bound, greedy algorithms that allocate the transmit antennas are devised. Rigorous simulation demonstrates that multiuser STLC with the proposed antenna allocation is robust against channel uncertainty and can improve the average SINR, improving the quality of experience. Furthermore, it is observed that the proposed STLC with antenna allocation method achieves the best performance if $M$ is sufficiently large. The results in this paper show that the STLC can be a potential candidate for an $M$ -by-2 (multiuser) massive MIMO systems.]]>69629795200<![CDATA[Development of Hydraulically Driven Fatigue Testing Machine for Insulators]]>69809889903<![CDATA[A Method to Assess Assembly Complexity of Industrial Products in Early Design Phase]]>69899997923<![CDATA[Visual Saliency Modeling for River Detection in High-Resolution SAR Imagery]]>61000101415780<![CDATA[A Porous Scaffold Design Method for Bone Tissue Engineering Using Triply Periodic Minimal Surfaces]]>6101510227910<![CDATA[Space–Time Line Code]]>$M$ and $N$ (denoted by $Mtimes N$ ), respectively. The maximum ratio combining (MRC), maximum ratio transmission (MRT), and space–time block code (STBC) schemes are rate-one full-spatial-diversity-achieving method facilitated for communication systems with: 1) $1times N$ and CSIR; 2) $Mtimes 1$ and CSIT; and 3) $Mtimes 1$ and CSIR, respectively. A novel space–time line code (STLC) is then introduced for a $1times 2$ system with CSIT, and it is extended to an $Mtimes 2$ STLC. The proposed STLC uses CSI for encoding at the transmitter and enables the receiver to decode the STLC symbols without CSI. Also, the STLC encoding matrices with various code rates and decoding (combining) schemes are designed for the $Mtimes 3$ and $Mtimes 4$ STLC systems: A code rate of 3/4, 1/2, and 3/7 for the $Mtimes 3$ systems and a -
ode rate of 3/4, 4/7, and 1/2 for the $Mtimes 4$ systems. For each STLC scheme, a full-diversity achieving STLC decoding method is designed. Based on analyses and numerical results, we verify that the proposed STLC scheme achieves a full diversity order, i.e., $MN$ , and is robust against CSI uncertainty. It is also shown that the array processing gain is inversely proportional to the code rate. To verify the merit of STLC, we introduce a joint operation with STBC and STLC schemes, called an STBLC system. The STBLC system achieves full-spatial-diversity gain in both uplink and downlink communications. The new STLC achieving full-spatial diversity is scalable for various code rates and expected to be applied to various wireless communication systems along with MRC, MRT, and STBC.]]>6102310412580<![CDATA[A Novel Non-Destructive Sensing Technology for On-Site Corrosion Failure Evaluation of Coatings]]>nX_{n}), which is highly electrically conductive and corrosion resistive. The research has commissioned for deploying this novel sensing technology for micro-defects detection, corrosion rate measurement, and condition assessment of the defected coatings. Tafel measurement facilitated by these non-destructive cells is used to detect micro-defects and corrosion rate measurement while electrochemical impedance spectroscopy measurement is facilitated to measure the coating condition. This technology has been successfully tested and commissioned on automotive, hazardous compartments with polymeric coatings and bridges to assess their coating condition in terms of their structural integrity. Post design testing involved the installation of these cells, running diagnostics, data acquisition, and macrographs to predict structural defects and the resulting corrosion rate. This technology enables the design process to incorporate operational conditions and fully realize more durable and reliable solutions to be applied to high-value large structures and complex interacting systems. Current developments in corrosion condition monitoring especially cost effective and non-destructive techniques to assess structural integrity beneath nonconductive and polymeric coating were lon-
awaited. This reported development will revolutionize durability and reliability assessment techniques to enhance safety and mitigate catastrophic failures for cost savings and avoiding fatal accidents.]]>6104210541866<![CDATA[RL-Budget: A Learning-Based Cluster Size Adjustment Scheme for Cognitive Radio Networks]]>6105510728752<![CDATA[Robust Encryption of Quantum Medical Images]]>6107310813294<![CDATA[Visible Light Communication Channel Modeling for Underwater Environments With Blocking and Shadowing]]>6108210909213<![CDATA[TDA-MAC: TDMA Without Clock Synchronization in Underwater Acoustic Networks]]>6109111087570<![CDATA[On the Analytical Calculation of the Probability Distribution of End-to-End Delay in a Two-Way Highway VANET]]>6110911255998<![CDATA[Interaction Patterns for Smart Spaces: A Confident Interaction Design Solution for Pervasive Sensitive IoT Services]]>6112611364410<![CDATA[Battery Storage for the Utility-Scale Distributed Photovoltaic Generations]]>6113711543002<![CDATA[Action Recognition in Video Sequences using Deep Bi-Directional LSTM With CNN Features]]>6115511662296<![CDATA[A PSO Optimization Scale-Transformation Stochastic-Resonance Algorithm With Stability Mutation Operator]]>6116711765576<![CDATA[Voltage THD Analysis Using Knowledge Discovery in Databases With a Decision Tree Classifier]]>6117711885899<![CDATA[Linked Data Authorization Platform]]>61189121316906<![CDATA[A Quantum Lightning Search Algorithm-Based Fuzzy Speed Controller for Induction Motor Drive]]>61214122311233<![CDATA[Cognitive Radio Networks With Primary Receiver Assisted Interference Avoidance Protocol]]>6122412356045<![CDATA[Cloud Computing Fitness for E-Government Implementation: Importance-Performance Analysis]]>6123612484685<![CDATA[Time Sequential Phase Partition and Modeling Method for Fault Detection of Batch Processes]]>6124912605966<![CDATA[An Electrically Actuated DC-to-11-GHz Liquid-Metal Switch]]>6126112662127<![CDATA[Electromagnetic Needleless Injector With Halbach Array Towards Intravitreal Delivery]]>61267127613247<![CDATA[Damage Characteristics and Response of Al Alloy 3003 to Different Components of Simulated Lightning Currents]]>$15~mu text{m}$ .]]>6127712838026<![CDATA[Lossy Asymmetrical Bandstop Filter Based on a Multiple Triplet Realization]]>$Q$ resonators. The prototype is designed and fabricated on a microstrip, Rogers RT/Duroid 5880 substrate. There is very good agreement between simulated and measured results.]]>6128412911102<![CDATA[A Hybrid Feature Selection Method for Complex Diseases SNPs]]>$k$ nearest neighbors on five different SNP data sets obtained from the National Center for Biotechnology Information gene expression omnibus genomics data repository. The experimental results demonstrate the efficiency of the adopted feature selection approach outperforming all of the compared feature selection algorithms and achieving up to 96% classification accuracy for the used data set. In general, from these results we conclude that SNPs of the whole genome can be efficiently employed to distinguish affected individuals with complex diseases from the healthy ones.]]>6129213015198<![CDATA[Uncover the Degradation Science of Silicone Under the Combined Temperature and Humidity Conditions]]>6130213113081<![CDATA[Reactive Power Compensation Using Induction Motor Driven by Nine Switch AC-DC-AC Converter]]>$delta$ with respect to utility phase voltage. The PCC phase voltage is continuously sensed to track instantaneous phase angle $theta$ using synchronous reference frame phase lock loop. The analysis of VAR compensator is presented in the d-q reference frame. The proposed system is simulated in MATLAB for VAR compensation at PCC with 5.4 hp induction motor drive to test the performance of VAR control loop. To validate the feasibility of the proposed system an experimental prototype is developed with 1 hp induction motor drive. Gate pulses are generated using digital signal controller dsPIC33EP256MU810. The simulation and experimental results proved the feasibility of the proposed VAR compensation system.]]>6131213205942<![CDATA[Source-Level Energy Consumption Estimation for Cloud Computing Tasks]]>6132113304143<![CDATA[Using Firefighter Mobility Traces to Understand Ad-Hoc Networks in Wildfires]]>6133113419346<![CDATA[Impedance-Based Fault Location Method for Four-Wire Power Distribution Networks]]>6134213494602<![CDATA[Efficient and Accurate Hausdorff Distance Computation Based on Diffusion Search]]>6135013616077<![CDATA[Ontology-Based Education/Industry Collaboration System]]>6136213719295<![CDATA[A Semi-Supervised Image Classification Model Based on Improved Ensemble Projection Algorithm]]>61372137914717<![CDATA[Hyperspectral Image Denoising With Group Sparse and Low-Rank Tensor Decomposition]]>61380139010078<![CDATA[A Novel QoS Prediction Approach for Cloud Services Using Bayesian Network Model]]>6139114068652<![CDATA[Feature Enhancement in Visually Impaired Images]]>6140714155313<![CDATA[A Cache-Aided Communication Scheme for Downlink Coordinated Multipoint Transmission]]>6141614274656<![CDATA[What Do Software Developers Need to Know to Build Secure Energy-Efficient Android Applications?]]>6142814502946<![CDATA[To Smart City: Public Safety Network Design for Emergency]]>6145114606295<![CDATA[An Image Reconstruction Method Based on Total Variation and Wavelet Tight Frame for Limited-Angle CT]]>$ell _{1} $ and $ell _{0} $ regularization terms and solved by a TV-based simultaneous algebraic reconstruction technique and an alternating direction method of multipliers. Compared with some TV-based reconstruction methods, the experimental results show that our method can further improve the quality of reconstructed images and suppress the limited-angle artifacts as well as preserve the low-contrast objects.]]>6146114709469<![CDATA[An Annotation Technique for In-Home Smart Monitoring Environments]]>61471147914984<![CDATA[Towards Service-Oriented 5G: Virtualizing the Networks for Everything-as-a-Service]]>61480148915891<![CDATA[A New Nested Array Configuration With Increased Degrees of Freedom]]>$2L-6$ for an array with $L$ physical sensors. Moreover, the virtual array aperture can be enlarged by nearly $({L^{2}}/{2}-L-2)d_{1}$ , where $d_{1}$ is the inter-element spacing of the first ULA. Owing to these advantages, our proposed array configuration has enhanced resolution and achieves better performance in parameter estimation, such as direction-of-arrival (DOA) estimation. Numerical simulations of DOA estimation exhibit the effectiveness and superiority of this array configuration.]]>6149014975960<![CDATA[Data-Based Predictive Control for Wastewater Treatment Process]]>6149815126087<![CDATA[Decentralized Consensus for Edge-Centric Internet of Things: A Review, Taxonomy, and Research Issues]]>61513152415201<![CDATA[Revisiting Source Routing for Underwater Networking: The SUN Protocol]]>6152515411941<![CDATA[Heuristic Approach to Determining Cache Node Locations in Content-Centric Networks]]>6154215495131<![CDATA[An Integrated Switched Reluctance Motor Drive Topology With Voltage-Boosting and On-Board Charging Capabilities for Plug-In Hybrid Electric Vehicles (PHEVs)]]>61550155914674<![CDATA[Task Placement Across Multiple Public Clouds With Deadline Constraints for Smart Factory]]>6156015648929<![CDATA[Energy Efficiency Consideration for Indoor Femtocell Networks in TV White Spaces]]>6156515765135<![CDATA[Belief Reliability Distribution Based on Maximum Entropy Principle]]>$k$ th moments of what can be obtained. An estimation method using linear interpolation and a genetic algorithm is subsequently applied to the optimal model. When only the expected value and the variance are available, the optimal results are in accordance with the maximum entropy principle. It could be observed in the sensitivity analysis that the accuracy of the optimal results is a decreasing function of the width of variances and an increasing function of the number of interpolation points. Therefore, researchers could adapt to different widths of variances and requirements of accuracy by adjusting the number of interpolation points. It could be concluded that this new method to acquire belief reliability distribution is important in the application of belief reliability.]]>6157715823214<![CDATA[Learning Binary Descriptors for Fingerprint Indexing]]>61583159415522<![CDATA[Coupled Eighth-Mode Substrate Integrated Waveguide Antenna: Small and Wideband With High-Body Antenna Isolation]]>6159516022583<![CDATA[An Analytical Model Based on Population Processes to Characterize Data Dissemination in 5G Opportunistic Networks]]>6160316158011<![CDATA[User Impact on Phased and Switch Diversity Arrays in 5G Mobile Terminals]]>6161616239275<![CDATA[Spectrum Optimization for Cognitive Satellite Communications With Cournot Game Model]]>6162416344612<![CDATA[Self-Localization of a Deforming Swarm of Underwater Vehicles Using Impulsive Sound Sources of Opportunity]]>6163516461375<![CDATA[Radar Image Colorization: Converting Single-Polarization to Fully Polarimetric Using Deep Neural Networks]]>6164716614422<![CDATA[LSTM Fully Convolutional Networks for Time Series Classification]]>6166216695605<![CDATA[Robust Adaptive Tracking Control for Manipulators Based on a TSK Fuzzy Cerebellar Model Articulation Controller]]>6167016793998<![CDATA[Identifying Product Opportunities Using Social Media Mining: Application of Topic Modeling and Chance Discovery Theory]]>6168016938181<![CDATA[Human Expertise in Mobile Robot Navigation]]>6169417051363<![CDATA[Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment]]>6170617173594<![CDATA[From Partition-Based Clustering to Density-Based Clustering: Fast Find Clusters With Diverse Shapes and Densities in Spatial Databases]]>6171817299108<![CDATA[Detection and Mitigation of Congestion in SDN Enabled Data Center Networks: A Survey]]>6173017408987<![CDATA[Latent Dirichlet Truth Discovery: Separating Trustworthy and Untrustworthy Components in Data Sources]]>a posteriori criterion over the observed claims. We note that a typical source is usually made of mixed trustworthy and untrustworthy components, since it can make true or false claims on different objects. While most of the existing algorithms do not attempt separate the untrustworthy component from the trustworthy one in each source, the proposed model explicitly identifies untrustworthy component in each source. This makes the LDT model more capable of separating the trustworthy and untrustworthy components, and in turn improves the accuracy of truth discovery. Experiments on real data sets show competitive results compared with existing algorithms.]]>6174117528760<![CDATA[Scalable and Distributed Detection Analysis on Wormhole Links in Wireless Sensor Networks for Networked Systems]]>6175317635280<![CDATA[Automated Construction and Maintenance of Wi-Fi Radio Maps for Crowdsourcing-Based Indoor Positioning Systems]]>6176417776428<![CDATA[Image Processing and Analysis of Phase-Contrast Microscopic Images of Activated Sludge to Monitor the Wastewater Treatment Plants]]>6177817917841<![CDATA[HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection]]>61792180610171<![CDATA[An Evolutionary Game Theory Approach for Joint Offloading and Interference Management in a Two-Tier HetNet]]>threshold pricing scheme, which a macrocell adopts, with a view to influencing low data rate MUs to join a small-cell network. Small-cell networks also charge a price, which includes an access price and an interference compensation price, proportional to the number of MUs who choose the small-cells instead of the macrocellular network. We assume that the small-cells adopt existing cell range expansion techniques to accommodate MUs. We formulate an evolutionary game to model and analyze the behavioral dynamics of the large number of MUs under the proposed pricing strategies of both networks. Replicator dynamics is used to find the evolutionary equilibrium of the evolutionary game. Sequentially, we provide the proof of the existence, uniqueness and stability of the evolutionary equilibrium through extensive analysis. Numerical results are provided to demonstrate that the proposed pricing strategies are able to shape the network dynamics by fine-tuning the rate-threshold and price. The ability to control the macrocell population share by itself with an application of the proposed pricing scheme remains the prime contribution of this paper.]]>6180718216445<![CDATA[Towards Quantified Data Analysis of Information Flow Tracking for Secure System Design]]>6182218316171<![CDATA[Critical Review on the Battery State of Charge Estimation Methods for Electric Vehicles]]>6183218435274<![CDATA[A Nonlinear Decoupling Control Approach Using RBFNNI-Based Robust Pole Placement for a Permanent Magnet In-Wheel Motor]]>6184418545716<![CDATA[Distributed Dynamic Scheduling for Cyber-Physical Production Systems Based on a Multi-Agent System]]>6185518699081<![CDATA[A Graph-Based QoS-Aware Resource Management Scheme for OFDMA Femtocell Networks]]>6187018816276<![CDATA[PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments]]>PriGuarder, a novel privacy-aware access control method. This method spans the three stages of a cloud service, i.e., user registration, data creation, and data access. At each stage, users can choose two modes to interact with the cloud service provider, i.e., direct or indirect. With the indirect mode, an attribute fuzzy grouping scheme is introduced to ensure user identity privacy and attribute privacy in all the three stages. Furthermore, exploiting data encryption and timestamp techniques, new access control protocols are proposed to regulate interactions between users and the cloud service provider. We illustrate the use of our method in the context of Amazon S3. Theoretical analysis and comprehensive simulation experiments have been conducted, which demonstrate the efficacy of PriGuarder.]]>6188218939208<![CDATA[Joint Cell Activation and Selection for Green Communications in Ultra-Dense Heterogeneous Networks]]>6189419043365<![CDATA[Multi-Scheme Frame Rate Up-Conversion Using Space-Time Saliency]]>6190519151947<![CDATA[Lossy Coupling Matrix Synthesis Approach for the Realization of Negative Group Delay Response]]>6191619261392<![CDATA[A Comparative Experimental Study of Robust Sliding Mode Control Strategies for Underactuated Systems]]>6192719396909<![CDATA[Density Table-Based Synchronization for Multi-Hop Wireless Sensor Networks]]>6194019531597<![CDATA[Adaptive Backstepping-Based Neural Network Control for Hypersonic Reentry Vehicle With Input Constraints]]>6195419663476<![CDATA[Stabilizing the Buck Converter With a First-Order-Filter-Based Time Delay Feedback Controller]]>6196719736019<![CDATA[Optimal Transfer Point Locations in Two-Stage Distribution Systems]]>6197419847667<![CDATA[Augmenting Computer-Aided Design Software With Multi-Functional Capabilities to Automate Multi-Process Additive Manufacturing]]>in situ placement of components, thereby creating multi-process parts with additional functionality, such as customized printed electronics. As AM has evolved to become an established method for creating end-use parts, this interest in multi-process printing has increased. Although progress has been made in developing multi-process hardware, which can combine AM with other technologies, holistic design software, capable of readily integrating these processes, is developing at a slower rate. In this paper, an integrated software solution capable of supporting multi-process 3D printing from design through manufacture is described, featuring the integration of electronic components and circuits interconnected by copper wires. This solution features automated generation of the cavities that accommodate electronic components as well as toolpath generation for a multi-process 3D printer capable of automated wire embedding. As a case study of the developed technology, a hexagonal 3D printed body, which included a microcontroller, four LEDs, a USB connector, two resistors, and a Zener diode, all interconnected by embedded copper wires, was fabricated within a short cycle time: 5.75 h from design to fabricated part. Short cycle times allow multiple design iterations to be realized and printed within the same day.]]>6198519941705<![CDATA[Vehicular Multi-Access Edge Computing With Licensed Sub-6 GHz, IEEE 802.11p and mmWave]]>6199520047207<![CDATA[Automatic Magnetic Resonance Image Prostate Segmentation Based on Adaptive Feature Learning Probability Boosting Tree Initialization and CNN-ASM Refinement]]>6200520152016<![CDATA[Line Junction Detection Without Prior-Delineation of Curvilinear Structure in Biomedical Images]]>62016202723325<![CDATA[EC<sup>3</sup>: Cutting Cooling Energy Consumption Through Weather-Aware Geo-Scheduling Across Multiple Datacenters]]>3, is proposed to distribute end-users’ loads among data centers so as to reduce the cooling energy consumption. The trace-driven experiments on real clouds and data center workload traces show the effectiveness of our design for reducing data center cooling consumption.]]>6202820384457<![CDATA[Binary Hashing for Approximate Nearest Neighbor Search on Big Data: A Survey]]>6203920545020<![CDATA[Fault Diagnosis Based on Belief Rule Base With Considering Attribute Correlation]]>6205520676637<![CDATA[HybridFTW: Hybrid Computation of Dynamic Time Warping Distances]]>HybridFTW, which combines the advantages of both FastDTW and FTW. First, HybridFTW takes the advantage of FastDTW that provides fast computation through the limitation of allowable ranges. We call these allowable ranges dynamic (warping) bands, which reduce the computation spaces on the fly, and we reanalyze previous FastDTW and FTW in the viewpoint of static and dynamic bands. Second, HybridFTW also takes the advantage of FTW that exploits the early abandon effect by using the segment-based tight lower bound. To maximize the synergy of combining two methods, we obtain the dynamic band of FastDTW during the process of computing the lower bound in FTW. Using HybridFTW, we next propose range search and $k$ -NN search algorithms and prove their correctness through formal theorems. Experimental results on real and synthetic data sets show that HybridFTW improves the search performance by up to 38 times over FastDTW and by up to 12 times over FTW.]]>6208520965648<![CDATA[Energy-Efficiency Maximization for Secure Multiuser MIMO SWIPT Systems With CSI Uncertainty]]>6209721098331<![CDATA[Mobility as a Service (MaaS): A D2D-Based Information Centric Network Architecture for Edge-Controlled Content Distribution]]>62110212914397<![CDATA[Fast FRFT-Based Algorithm for 3-D LFM Source Localization With Uniform Circular Array]]>6213021353413<![CDATA[A Ray-Tracing Uncertainty Estimation Tool for Ocean Mapping]]>6213621448999<![CDATA[Investigation of Wideband Substrate-Integrated Vertically-Polarized Electric Dipole Antenna and Arrays for mm-Wave 5G Mobile Devices]]>ELEV), high gain and high front-to-back radiation ratio (F/B). For enhanced gain, parasitic-vias are added in front of the dipole as directors. To improve HPBW without sacrificing gain, the directors are implemented as V-shaped bisection parasitic-vias. A via-fence surrounds the dipole structure to suppress back radiation and enhance F/B. The dipole is connected to a parallel-strip line (PS) which is interfaced to the main SIW feed through a novel SIW-to-PS transition. Thorough investigation, optimization, and parametric study are provided for each design parameter of the proposed structure. A single dipole, $2times 1$ , and $4times 1$ arrays were designed and fabricated showing close agreement between the simulated and measured results. The single-dipole operates over 7.23-GHz bandwidth with stable radiation performance. The $4times 1$ array achieves HPBW_{ELEV} of 133.1°, F/B of 36.6-dB, cross-polarization less than −39.6-dB and 12.61-dBi gain with 95.8% radiation efficiency. The low cost, compactness, and good performance of the proposed dipole make it a competing candidate for the future 5G mobile devices transceivers.]]>62145215713940<![CDATA[Estimation of Large Covariance Matrices by Shrinking to Structured Target in Normal and Non-Normal Distributions]]>6215821695055<![CDATA[Foveated Retinal Optimization for See-Through Near-Eye Multi-Layer Displays]]>$38^circ times 19^circ $ field of view, continuous focus cues, low aberration, small form factor, and clear see-through property.]]>6217021802153<![CDATA[Fixed Frequency Pulse-Width Modulation Based Integrated Sliding Mode Controller for Phase-Shifted Full-Bridge Converters]]>6218121929927<![CDATA[A Highway-Driving System Design Viewpoint Using an Agent-Based Modeling of an Affordance-Based Finite State Automata]]>6219322059489<![CDATA[Vehicle Detection and Counting in High-Resolution Aerial Images Using Convolutional Regression Neural Network]]>6222022301464<![CDATA[Blind Tone-Mapped Image Quality Assessment Based on Brightest/Darkest Regions, Naturalness and Aesthetics]]>6223122407830<![CDATA[Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks]]>6224122506623<![CDATA[Enabling Adaptability in Web Forms Based on User Characteristics Detection Through A/B Testing and Machine Learning]]>6225122653955<![CDATA[Adaptive Neural Network Saturated Control for MDF Continuous Hot Pressing Hydraulic System With Uncertainties]]>6226622734506<![CDATA[BIDaaS: Blockchain Based ID As a Service]]>6227422782883<![CDATA[Ultra-Low Power High Stability 8T SRAM for Application in Object Tracking System]]>$I_{ mathrm{scriptscriptstyle ON}}/I_{ mathrm{scriptscriptstyle OFF}}$ . It is observed that the leakage power is reduced to $82times $ (times) and $75times $ as compared with the conventional 6T SRAM and read decoupled (RD)-8T SRAM, respectively, at 300 mV VDD. In addition, write static noise margin (WSNM), write trip point (WTP), read dynamic noise margin, and $I_{ mathrm{scriptscriptstyle ON}}/I_{ mathrm{scriptscriptstyle OFF}}$ ratio are also improved by 7.1%, 43%, 7.4%, and $74times $ than conventional 6T SRAM, respectively, at 0.3 V VDD. Moreover, the WSNM, WTP, and $I_{ mathrm{scriptscriptstyle ON}}/I_{ mathrm{scriptscriptstyle OFF}}$ values are improved by 6.67%, 7.14%, and $68times $ as compared with RD-8T SRAM, respectively, at 0.3 V VDD. Furthermore, a fast, reliable, less memory usage object tracking algorithm and implementation of its memory block using ULP 8T SRAM are proposed. A quadtree-based approach is employed to diminish the bounding box and to reduce the computations for fast and low power object tracking. This, in turn, minimizes the complexity of the algorithm and reduces the memory req-
irement for tracking. The proposed object detection and tracking method are based on macroblock resizing, which demonstrates an accuracy rate of 96.5%. In addition, the average total power consumption for object detection and tracking which includes writing, read and hold power is $1.63times $ and $1.45times $ lesser than C6T and RD8T SRAM at 0.3 V VDD.]]>6227922902816<![CDATA[Wideband Fabry-Perot Cavity Antenna With a Shaped Ground Plane]]>62291229711848<![CDATA[Dynamic QoS-Aware Resource Assignment in Cloud-Based Content-Delivery Networks]]>6229823094802<![CDATA[Feedback Linearizing Model Predictive Excitation Controller Design for Multimachine Power Systems]]>6231023194056<![CDATA[Influence Maximization-Cost Minimization in Social Networks Based on a Multiobjective Discrete Particle Swarm Optimization Algorithm]]>6232023291906<![CDATA[Pinning Group Consensus-Based Distributed Coordination Control for Active Distribution Systems]]>6233023397070<![CDATA[Non-Orthogonal Multiple Access Assisted Multi-Region Geocast]]>non-orthogonal multiple access (NOMA)-assisted multi-region geocast. This novel spectrum sharing framework exploits the NOMA technology to realize the simultaneous delivery of different messages to different user groups characterized by different geographical locations. The essence of the proposed framework is that the geographical information of user groups unites NOMA and multi-group multicast to enhance the spectral efficiency (SE) and the energy efficiency (EE) of wireless transmissions. Specifically, we investigate the downlink beamforming design of the proposed framework in multiple-input single-output settings. The decoding strategy for NOMA is designed and guaranteed by users’ geographical information and required quality of service. The majorization and minimization algorithm is exploited to solve the non-convex and intractable problems therein. Comprehensive numerical experiments are further provided to show that NOMA holds tremendous promise but also limitations in terms of SE and EE, compared with spatial division multiple access and orthogonal multiple access.]]>62340235512085<![CDATA[Low ICI Symbol Boundary Alignment for 5G Numerology Design]]>62356236611553<![CDATA[BundleNet: Learning with Noisy Label via Sample Correlations]]>6236723771606<![CDATA[Massive Fishing Website URL Parallel Filtering Method]]>6237823885656<![CDATA[Ensemble Transfer Learning Algorithm]]>6238923964416<![CDATA[High Efficiency Energy Harvesters in 65nm CMOS Process for Autonomous IoT Sensor Applications]]>6239724091710<![CDATA[Wired and Wireless Network Cooperation for Wide-Area Quick Disaster Recovery]]>6241024246750<![CDATA[Finite-Time Trajectory Tracking Fault-Tolerant Control for Surface Vessel Based on Time-Varying Sliding Mode]]>6242524337001<![CDATA[Evolutionary Feature Learning for 3-D Object Recognition]]>6243424441471<![CDATA[Robust Test Statistic for Cooperative Spectrum Sensing Based on the Gerschgorin Circle Theorem]]>6244524565193<![CDATA[Energy-Efficient Resource Allocation for mmWave Massive MIMO HetNets With Wireless Backhaul]]>6245724715891<![CDATA[A Hierarchical Energy Scheduling Framework of Microgrids With Hybrid Energy Storage Systems]]>6247224835327<![CDATA[A Distributed Interference Alignment Approach Based on Grouping in Heterogeneous Network]]>6248424956817<![CDATA[Improving Performance by a Dynamic Adaptive Success-Collision Backoff Algorithm for Contention-Based Vehicular Network]]>$CW$ ) size and it depends on the traffic loads. A threshold is defined to judge the low or high traffic loads. In addition, the DASC backoff algorithm takes proactive measures to optimize throughput and delay through decreasing $CW$ after “$S$ ” times consecutive successful transmissions and increasing $CW$ after “$C$ ” times consecutive collisions. The simulation results indicate that the proposed DASC backoff algorithm provides better performance in terms of throughput and delay than dynamic control backoff time algorithm, exponential linear backoff algorithm, and binary exponential backoff algorithm.]]>6249625054286<![CDATA[Nonintrusive Vital Signs Monitoring for Sleep Apnea Patients: A Preliminary Study]]>62506251410546<![CDATA[A Sidelobe and Energy Optimization Array Node Selection Algorithm for Collaborative Beamforming in Wireless Sensor Networks]]>6251525302607<![CDATA[Design of Broadband Modified Class-J Doherty Power Amplifier With Specific Second Harmonic Terminations]]>6253125409521<![CDATA[Reinforcement Learning-Based Adaptive Transmission in Time-Varying Underwater Acoustic Channels]]>6254125584574<![CDATA[Detecting Spammer Groups From Product Reviews: A Partially Supervised Learning Model]]>6255925682988<![CDATA[Fingerprint-Based Device-Free Localization in Changing Environments Using Enhanced Channel Selection and Logistic Regression]]>6256925774795<![CDATA[Prefix-Free Frequency Domain Equalization for Underwater Acoustic Single Carrier Transmissions]]>$q$ -function, has a stable and compact peak. To further enhance receiver performance, we incorporate two strategies. One is overlapping partitioning. The other is iterative prefix reconstruction. The proposed schemes have been tested using the field measurements obtained from the Gulf of Mexico in August 2016. Communications over four ranges at the carrier frequency of 85 kHz with a symbol rate of 17 kHz have been demonstrated. The overlapping partitioning and iterative prefix reconstruction strategies have been shown to generate improvements in the receiver performance.]]>6257825886264<![CDATA[On the Energy Efficient Multi-Pair Two-Way Massive MIMO AF Relaying With Imperfect CSI and Optimal Power Allocation]]>6258926035508<![CDATA[On Full Duplex Scheduling for Energy Efficiency Maximization in Multi-Hop Wireless Networks]]>6260426145069<![CDATA[Dual Learning-Based Safe Semi-Supervised Learning]]>6261526213733<![CDATA[Energy Aware Multi-Hop Routing Protocol for WSNs]]>6262226339547<![CDATA[Comparison of Radio Frequency and Visible Light Propagation Channels for Vehicular Communications]]>62634264411089<![CDATA[Procedural Restoration of Texture and Restructuring Geometry From Facade Image]]>62645265313088<![CDATA[Robust Optimal Operation of AC/DC Hybrid Microgrids Under Market Price Uncertainties]]>6265426679118<![CDATA[Handling Stability Improvement for a Four-Axle Hybrid Electric Ground Vehicle Driven by In-Wheel Motors]]>62668268213939<![CDATA[Enhancing PV Penetration in LV Networks Using Reactive Power Control and On Load Tap Changer With Existing Transformers]]>6268326918553<![CDATA[Connectivity Modeling and Analysis for Internet of Vehicles in Urban Road Scene]]>6269227026857<![CDATA[Low-Voltage Ride-Through Control Strategy for a Virtual Synchronous Generator Based on Smooth Switching]]>6270327111465<![CDATA[Burst-Interference Suppression Based on Space-Time Processing]]>6271227193787<![CDATA[Novel Upper-Limb Rehabilitation System Based on Attention Technology for Post-Stroke Patients: A Preliminary Study]]>6272027311147<![CDATA[Orbital-Angular-Momentum Embedded Massive MIMO: Achieving Multiplicative Spectrum-Efficiency for mmWave Communications]]>62732274514681<![CDATA[An Iterative Method for Moving Target Localization Using TDOA and FDOA Measurements]]>6274627543377<![CDATA[Mutual Coupling Reduction Using F-Shaped Stubs in UWB-MIMO Antenna]]>$50times 30$ mm^{2}. F-shaped stubs are introduced in the shared ground plane of the proposed antenna to produce high isolation between the MIMO antenna elements. The designed MIMO antenna has very low mutual coupling of (S_{21} < −20 dB), low envelop correlation coefficient (ECC <0.04), high diversity gain (DG >7.4 dB), high multiplexing efficiency (${eta }_{mathrm {Mux}}> -3.5$ ), and high peak gain over the entire UWB frequencies. The antenna performance is studied in terms of S-Parameters, radiation properties, peak gain, diversity gain, envelop correlation coefficient, and multiplexing efficiency. A good agreement between the simulated and measured results is observed.]]>6275527595988<![CDATA[Data Offloading in Mobile Edge Computing: A Coalition and Pricing Based Approach]]>6276027673197<![CDATA[Reduced-Reference Stereoscopic Image Quality Assessment Using Natural Scene Statistics and Structural Degradation]]>62768278014971<![CDATA[An Adaptive Multi-Channel Assignment and Coordination Scheme for IEEE 802.11P/1609.4 in Vehicular Ad-Hoc Networks]]>6278128023267<![CDATA[Prediction of Lung Motion From Four-Dimensional Computer Tomography (4DCT) Images Using Bayesian Registration and Trajectory Modelling]]>6280328119366<![CDATA[Downlink Multi-User MIMO Precoding Design Via Signal-Over-Leakage Capacity]]>6281228244064<![CDATA[$k$ -Coverage Estimation Problem in Heterogeneous Camera Sensor Networks With Boundary Deployment]]>$k$ -coverage probabilistic expression to estimate the minimum number of camera sensors required for a desired level of $k$ -coverage. To evaluate the performance of the proposed $k$ -coverage estimation expression, several simulation experiments are conducted to validate the theoretical results.]]>6282528334074<![CDATA[Method to Improve the Positioning Accuracy of Vehicular Nodes Using IEEE 802.11p Protocol]]>6283428438808<![CDATA[A Framework for Software Defect Prediction and Metric Selection]]>6284428586658<![CDATA[Optimal Allocation of Cashiers and Pharmacists in Large Hospitals: A Point-Wise Fluid-Based Dynamic Queueing Network Approach]]>6285928707057<![CDATA[Characteristic Mode Analysis of Complex Spoof Localized Surface Plasmon Resonators]]>62871287814599<![CDATA[Gender Identification via Reposting Behaviors in Social Media]]>6287928887125<![CDATA[Energy Efficient Congestion Control for Multipath TCP in Heterogeneous Networks]]>6288928984720<![CDATA[Experimental Study of the Benefits of a Second Antenna at the User Side in a Massive MIMO System]]>6289929074534<![CDATA[IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications]]>a secure and practical searchable symmetric encryption scheme with provable security strength for cloud applications, called IDCrypt, which improves the search efficiency, and enhances the security strength of SE using symmetric cryptography. We further point out the main challenges in securely searching on multiple indexes and sharing encrypted data between multiple users. To address the above issues, we propose a token-adjustment search scheme to preserve the search functionality among multi-indexes, and a key sharing scheme which combines identity-based encryption and public-key encryption. Our experimental results show that the overhead of the key sharing scheme is fairly low.]]>6290829216495<![CDATA[Suboptimal Learning Control for Nonlinearly Parametric Time-Delay Systems Under Alignment Condition]]>6292229292334<![CDATA[A Language-Independent Ontology Construction Method Using Tagged Images in Folksonomy]]>6293029424143<![CDATA[Evaluation of Electromagnetic Fields Induced by Wake of an Undersea-Moving Slender Body]]>6294329517545<![CDATA[Drusen Segmentation From Retinal Images via Supervised Feature Learning]]>6295229612249<![CDATA[Compact Tunable Bandpass Filter With Wide Tuning Range of Centre Frequency and Bandwidth Using Short Coupled Lines]]>$0.03lambda _{g}times 0.1lambda _{g}$ ). The simulated and measured results agree well with the derived theory, and indicate wide tunable center frequencies (0.56–1.15 GHz) and 1-dB bandwidth (65–180 MHz).]]>6296229699582<![CDATA[DE-RCO: Rotating Crossover Operator With Multiangle Searching Strategy for Adaptive Differential Evolution]]>62970298310407<![CDATA[Robust Massively Parallel Dynamic State Estimation of Power Systems Against Cyber-Attack]]>6298429956268<![CDATA[Full-Duplex Aided User Virtualization for Mobile Edge Computing in 5G Networks]]>6299630074383<![CDATA[Design and Performance Analysis of a Novel Distributed Queue Access Protocol for Cellular-Based Massive M2M Communications]]>6300830197075<![CDATA[SERGE: Successive Event Recommendation Based on Graph Entropy for Event-Based Social Networks]]>event-based social networks (EBSNs), event recommendation, which is to recommend a list of upcoming events to a user according to his preference, has attracted a lot of attentions in both academia and industry. In this paper, we propose a successive event recommendation based on graph entropy (SERGE) to deal with the new event cold start problem by exploiting diverse relations as well as asynchronous feedbacks in EBSNs. The SERGE creates recommendation lists at discrete times during each publication period. At the beginning, it constructs a primary graph (PG) based on the entities and their relations in an EBSN and computes the user-event similarity scores by applying a random walk with restart (RWR) algorithm on PG. At each recommendation time, it then constructs a feedback graph (FG) based on the up-to-date user feedbacks on event reservations and applies the RWR again on FG to compute new user-event similarity scores. We then propose to weight the two sets of similarity scores with the graph entropies of both PG and FG and create the final recommendation lists accordingly. We have crawled two datasets from a real EBSN for two cities, Beijing and Shanghai in China. Experimental results validate the effectiveness and superiority of the proposed SERGE scheme over the peer schemes.]]>6302030301625<![CDATA[Dimension Reduction of Channel Correlation Matrix Using CUR-Decomposition Technique for 3-D Massive Antenna System]]>$mathbf {C}$ , $mathbf {U}$ , and $mathbf {R}$ ). The new rotated codebook is then constructed by the new rotation matrix. Moreover, we evaluate the new decomposition matrix with the original matrix in terms of compression ratio and mismatch error. We also provide the achievable sum rate capacities for singular value decomposition, zero forcing, and a matched filter techniques to compare with the proposed method. Furthermore, the system capacity enhancement related to the number of antenna elements and the required feedback bits are analyzed. Simulation results show that the proposed method achieves much better system performance since the dimensionality problem is solved. The proposed method can be applied in the fifth generation massive antenna multi-user system with over a hundred antenna elements.]]>6303130393523<![CDATA[Ontology-Based Finite Satisfiability of UML Class Model]]>6304030506071<![CDATA[Differential Probe Fed Liquid Crystal-Based Frequency Tunable Circular Ring Patch Antenna]]>6305130585669<![CDATA[Decentralized PID Control Design for Magnetic Levitation Systems Using Extremum Seeking]]>6305930672273<![CDATA[Performance Analysis of Wireless Energy Harvesting Multihop Cluster-Based Networks Over Nakagami- ${m}$ Fading Channels]]>${m}$ fading environments and verified by Monte Carlo simulations.]]>6306830847920<![CDATA[Linear Space-Time Interference Alignment for $K$ -User MIMO Interference Channels]]>$K$ -user multi-input multi-output interference channel. The proposed LST-IA scheme effectively reduces the number of antennas required for eliminating interference completely in systems, and the closed-form solution of precoding matrices and detector matrices is obtained as well. Compared with the classical IA algorithms, the simulation results demonstrate that the proposed scheme shows distinguished advantages in terms of sum-rate and bit error rate in the strong interference communication scenarios.]]>6308530952340<![CDATA[Cascaded Regional Spatio-Temporal Feature-Routing Networks for Video Object Detection]]>6309631063888<![CDATA[Query-Focused Personalized Citation Recommendation With Mutually Reinforced Ranking]]>6310731195387<![CDATA[Fatigue Damage Mechanism-Based Dependent Modeling With Stochastic Degradation and Random Shocks]]>6312031296084<![CDATA[Dual PHY Layer for Non-Orthogonal Multiple Access Transceiver in 5G Networks]]>6313031394372<![CDATA[Experiences and Lessons Learned From Making IoT Sensing Platforms for Large-Scale Deployments]]>63140314811197<![CDATA[Classification of Methods in the SINS/CNS Integration Navigation System]]>6314931584442<![CDATA[A Protection Scheme for Multi-Terminal VSC-HVDC Transmission Systems]]>6315931666320<![CDATA[Design of RBFN Controller Based Boost Type Vienna Rectifier for Grid-Tied Wind Energy Conversion System]]>6316731756250<![CDATA[Structural Attack on Reduced-Round Skipjack]]>$n$ -bit Skipjack-like cipher, our attack can be executed within time complexity $O(2^{2.81times n/4})$ and data complexity $O(2^{n/2})$ , and thus can lead to a practical attack against 16-round Skipjack cipher.]]>6317631834305<![CDATA[Pneumatic Actuation in Haptic-Enabled Medical Simulators: A Review]]>6318432002134<![CDATA[Optimal Variable Transmission for Distributed Local Fault Detection Incorporating RA and Evolutionary Optimization]]>6320132119580<![CDATA[Massive MIMO Uplink Scheme Design and System-Level Performance Analysis]]>6321232305430<![CDATA[Research on Robust Model Predictive Control for Electro-Hydraulic Servo Active Suspension Systems]]>6323132405378<![CDATA[Palmprint Identification Using an Ensemble of Sparse Representations]]>6324132484927<![CDATA[The Influence of Acute Stress on Brain Dynamics During Task Switching Activities]]>6324932551378<![CDATA[Identifying and Evaluating User Requirements for Smartphone Group Fitness Applications]]>6325632698916<![CDATA[Interference Graph Based Channel Assignment Algorithm for D2D Cellular Networks]]>6327032794915<![CDATA[The Art of Reading Explosion Phenomena: Science and Algorithms]]>63280329911925<![CDATA[Energy Efficient Relay Matching With Bottleneck Effect Elimination Power Adjusting for Full-Duplex Relay Assisted D2D Networks Using mmWave Technology]]>6330033094807<![CDATA[Reflection-Type Topologies With Arbitrary Wideband Flat Group Delays Using Coupled Lines]]>$lambda $ /4-coupled lines. The type-I GD circuit consists of the $lambda $ /4 transmission lines and an open-circuited coupled line with a short-circuited load, whereas type-II consists of a short-circuited coupled line with an open-circuited load. For a compact circuit size, the type-III circuit is realized by a parallel combination of the open-circuited and short-circuited coupled lines. To obtain the arbitrarily prescribed response of wideband flat GD, closed-form analytical design equations are provided. An analytical analysis shows that the wideband flat GD response can be obtained by controlling the appropriate even- and odd-mode impedances of the coupled lines. For an experimental validation of the proposed structures, prototypes of the three GD circuits were designed and fabricated at the center frequency of 2.5 GHz. To realize a higher GD response over a wideband bandwidth, a number of reflection-type GD circuit units are cascaded and measured. The measurement results agree soundly with the simulation and theoretical prediction results.]]>6331033209488<![CDATA[Improvement of JPEG XT Floating-Point HDR Image Coding Using Region Adaptive Prediction]]>6332133353282<![CDATA[Correction of Wavefront Tilt Caused by Atmospheric Turbulence Using Quadrant Detectors for Enabling Fast Free-Space Quantum Communications in Daylight]]>6333633458767<![CDATA[A Neuro-Fuzzy Visual Servoing Controller for an Articulated Manipulator]]>6334633572045<![CDATA[E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm]]>6335833753366<![CDATA[Accurate Jitter Computation in CNA Breakpoints Using Hybrid Confidence Masks With Applications to SNP Array Probing]]>6337633869702<![CDATA[QoE-Based Resource Allocation for Heterogeneous Multi-Radio Communication in Software-Defined Vehicle Networks]]>6338733996764<![CDATA[The Effect of Learning-Based Adaptivity on Students’ Performance in 3D-Virtual Learning Environments]]>6340034075023<![CDATA[A Sparse Representation Method for <italic>a Priori</italic> Target Signature Optimization in Hyperspectral Target Detection]]>a priori target spectral signature as an input. However, the detection results are greatly affected by the quality of the a priori target spectral signature because the spectral variability phenomenon is universal and anisotropic in hyperspectral image data. This paper proposes a sparse representation-based method to generate an optimized target spectrum from limited target training samples, which is able to alleviate the impact of spectral variability on hyperspectral target detection. When lacking comprehensive knowledge about the target object of interest, an optimized representative target spectrum should be expected to be reconstructed by the hyperspectral data themselves in a sparse representation manner following the characteristics of the data structure and then be generated by a set of selected candidate pixels that contain the target signal with a varying status. With the optimized a priori target signature, the experimental results of the detection of different characteristics of objects with three different types of hyperspectral images confirm the effectiveness, robustness, and generality performance of the proposed method.]]>63408342413417<![CDATA[Wideband RF Self-Interference Cancellation Circuit for Phased Array Simultaneous Transmit and Receive Systems]]>6342534322421<![CDATA[Edge-Aware Spatial Denoising Filtering Based on a Psychological Model of Stimulus Similarity]]>6343334475508<![CDATA[Fuzzy Based Approach for Restoration of Distribution System During Post Natural Disasters]]>6344834585645<![CDATA[Optimal Power Splitting for Simultaneous Wireless Information and Power Transfer in Amplify-and-Forward Multiple-Relay Systems]]>6345934684645<![CDATA[An Adaptive-Gain Sliding Mode Observer for Sensorless Control of Permanent Magnet Linear Synchronous Motors]]>6346934786771<![CDATA[Optimal Spectrum Sensing Interval in MISO Cognitive Small Cell Networks]]>6347934905834<![CDATA[Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning]]>63491350812476<![CDATA[A Modified Consensus-Building Methodology for Reaching a Group Decision Using Minimum Costs]]>63509352310156<![CDATA[Impact of ICA-Based Image Enhancement Technique on Retinal Blood Vessels Segmentation]]>6352435386040<![CDATA[Multiple Targets Deception Jamming Against ISAR Based on Periodic 0- $pi$ Phase Modulation]]>$pi $ phase modulation, a method generating 2-D ISAR group targets is proposed. Radar pulses are sampled and modulated according to periodic 0-$pi $ phase sequence by the escort free-flight jammer, and then the modulated signals are retransmitted to the protected target, which can generate verisimilar false target images in ISAR. After the principle of escort free-flight jamming is introduced, the theory of periodic 0-$pi $ phase sequence is expounded. The generation process of jamming signal is analyzed. According to the 2-D output expression, the jamming effects with different modulation parameters are demonstrated. A theoretical study is carried out to determine the number, amplitude and space distribution of false targets. Experimental results of scattering model of an aircraft illuminate the effectiveness and correctness of the proposed method.]]>6353935488821<![CDATA[Recommender Systems Clustering Using Bayesian Non Negative Matrix Factorization]]>6354935648766<![CDATA[Multi-Channel Physical Random Bits Generation Using a Vertical-Cavity Surface-Emitting Laser Under Chaotic Optical Injection]]>$m$ least significant bits extraction with logical exclusive-OR (XOR) post-processing. Further utilizing the $n$ -bit cross-merging method, the PRB at a rate of 320 Gbits/s could be obtained.]]>63565357212689<![CDATA[Analyzing Technological Spillover Effects Between Technology Classes: the Case of Korea Technology Finance Corporation]]>6357335845450<![CDATA[Digital Twin and Big Data Towards Smart Manufacturing and Industry 4.0: 360 Degree Comparison]]>6358535936627<![CDATA[A Physical Insight Into the Influence of Dominant Mode of Rectangular Microstrip Antenna on Its Cross-Polarization Characteristics and Its Improvement With T-Shaped Microstrip Antenna]]>10 mode has been investigated thoroughly. The nature of the field distribution beneath the patch is found to be the key reason for cross polar radiation of such patch antenna. A quick hand computer aided design formulation has been proposed to compute the approximate cross polar radiation peak gain as well as its position in elevation plane. Based on the theoretical view, a simple single layer T shaped microstrip antenna has also been proposed for the improvement in cross polarization suppression of rectangular microstrip antenna.]]>6359436028106<![CDATA[Stability of FPGA Based Emulator for Half-Bridge Inverters Operated in Stand-Alone and Grid-Connected Modes]]>6360336106565<![CDATA[Outage Performance Analysis for Wireless Non-Orthogonal Multiple Access Systems]]>6361136184114<![CDATA[A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges]]>6361936475584<![CDATA[A Bayesian Approach to Adaptive RAKE Receiver]]>a priori information is accumulated to improve the receiver performance. Thus, the mean and covariance of the channel impulse response that is modeled as a complex and uncertain Gaussian random vector are recursively estimated using Bayesian theory. Finally, the RAKE weights are obtained using the mean and covariance. As shown in the simulation results, the bit error rate (BER) decreases as the number of fingers increases. The performance of the new RAKE receiver has been greatly improved compared with the all-RAKE receiver with maximal ratio combining, RAKE receiver with singular value decomposition, and RAKE receiver with fast approximated power iteration. Under medium to high SNR conditions (i.e., ≥−5 dB), the BER performance of the new RAKE receiver provides at least $3times 10^{-4}$ less than that of the other receiver tested.]]>6364836543938<![CDATA[Semi-Empirical Model for Precise Analysis of Copper Losses in High-Frequency Transformers]]>63655366711704<![CDATA[SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network]]>63668368411962<![CDATA[A Novel Control Strategy for an Interior Permanent Magnet Synchronous Machine of a Hybrid Hydraulic Excavator]]>6368536937372<![CDATA[Physiological Measures for Human Performance Analysis in Human-Robot Teamwork: Case of Tele-Exploration]]>63694370511663<![CDATA[Bipartite Consensus Control for Coupled Harmonic Oscillators Under a Coopetitive Network Topology]]>6370637144285<![CDATA[Rolling Bearing Fault Diagnosis Using Modified LFDA and EMD With Sensitive Feature Selection]]>63715373010958<![CDATA[Robustness of Smart Manufacturing Information Systems under Conditions of Resource Failure: A Complex Network Perspective]]>6373137384421<![CDATA[Performance Analysis of Joint-Sparse Recovery from Multiple Measurement Vectors via Convex Optimization: Which Prior Information is Better?]]>$ell _{2,1}$ -norm minimization, which is our first investigation via conic geometry in this paper. Then, we are interested in the same problem but with two common constraints (or prior information): prior information relevant to the ground truth and the inherent low rank within the original signal. To figure out which constraint is most helpful, the MMVs problems are solved via $ell _{2,1}$ -$ell _{2,1}$ minimization and $ell _{2,1}$ -low rank minimization, respectively. By theoretically presenting the necessary and sufficient condition of successful recovery from MMVs, we can have a precise prediction of phase transition to judge, which constraint or prior information is better. All our findings are verified via simulations and show that, under certain conditions, $ell _{2,1}$ -$ell _{2,1}$ minimization outperforms $ell _{2,1}$ -low rank minimization. Surprisingly, $ell _{2,1}$ -low rank minimization performs even worse than $ell _{2,1}$ -norm minimization. To the best of-
our knowledge, we are the first to study the MMVs problem under different prior information in the context of compressive sensing.]]>6373937544601<![CDATA[A Flexibility Metric and Optimization Methods for Mixed Numerologies in 5G and Beyond]]>6375537641895<![CDATA[MindCamera: Interactive Sketch-Based Image Retrieval and Synthesis]]>6376537732215<![CDATA[Risk Management of Heatstroke Based on Fast Computation of Temperature and Water Loss Using Weather Data for Exposure to Ambient Heat and Solar Radiation]]>63774378510378<![CDATA[Adaptive Tracking Control Approach With Prespecified Accuracy for Uncertain Nonlinearly Parameterized Switching Systems]]>6378637934014<![CDATA[On Bit Error Probability and Power Optimization in Multihop Millimeter Wave Relay Systems]]>$M$ -ary quadrature amplitude modulation and $M$ -ary phase-shift keying in terms of multivariate Meijer’s G-function. Due to the complicated expression of the exact BEP, a tight lower bound expression for the BEP is derived using a novel Mellin-approach. Moreover, an asymptotic expression for the BEP at high SIR regime is derived and used to determine the diversity and the coding gain of the system. In addition, we optimize the power allocation at different devices subject to a sum power constraint such that the BEP is minimized. Our analysis reveals that optimal power allocation allows-
achieving more than 3-dB gain compared with the equal power allocation. This paper can serve as a framework for designing and optimizing mmWave multihop relaying systems to ensure link reliability.]]>6379438083402<![CDATA[Privacy-Preserving Search Over Encrypted Personal Health Record In Multi-Source Cloud]]>+, to more efficiently support the data queries by hierarchical data providers. Extensive analysis and experiments over real data sets demonstrate the efficacy and efficiency of MOPSE and MOPSE^{+}.]]>6380938235473<![CDATA[Non-Coherent Radar Detection Probability for Correlated Gamma Fluctuating Targets in K Distributed Clutter]]>6382438272368<![CDATA[Deep Regression Segmentation for Cardiac Bi-Ventricle MR Images]]>6382838382366<![CDATA[Contrast Enhancement of Microscopy Images Using Image Phase Information]]>6383938508483<![CDATA[Robust Adaptive Variable Structure Tracking Control for Spacecraft Chaotic Attitude Motion]]>6385138576036<![CDATA[FEP: High Fidelity Experiment Platform for Mobile Networks]]>6385838718947<![CDATA[Designs of Diplexing Power Dividers]]>$Omega $ transmission line of appropriate length or a quarter-wavelength ($lambda $ /4) transmission line.]]>63872388111221<![CDATA[A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network]]>6388238986750<![CDATA[High Voltage Gain Interleaved Boost Converter With Neural Network Based MPPT Controller for Fuel Cell Based Electric Vehicle Applications]]>6389939086406<![CDATA[Elastic Switch Migration for Control Plane Load Balancing in SDN]]>6390939195527<![CDATA[Two-Stage Superposed Transmission for Cooperative NOMA Systems]]>$N$ time slots, the source simultaneously transmits the superposition coded symbols to the relay and destination, both of which, instead of decoding, keep the receptions in reserve. At the last time slot, the relay decodes and forwards a new superposition coded symbol with corresponding power allocation factors to the destination. The destination jointly decodes the received signals during the total $N + 1$ time slots by employing maximum ratio combining. Assuming Rayleigh fading channels, the ergodic sum rate (SR), outage probability, and outage capacity of the system are investigated considering the high transmit signal-to-noise ratio cases. An approximate expression for the ergodic SR is also derived at the expense of a negligible performance loss. By means of numerical results, it is shown that the transmission rate and ergodic SR of the proposed scheme overwhelm that of the time-division multiple access and conventional NOMA schemes.]]>6392039315742<![CDATA[A Switched Controller Design for Supply Pressure Tracking of Variable Displacement Axial Piston Pumps]]>6393239429854<![CDATA[KATZMDA: Prediction of miRNA-Disease Associations Based on KATZ Model]]>6394339503325<![CDATA[An Improved Ambiguity Resolution of Three Carriers in Precise Point Positioning]]>6395139613759<![CDATA[Multi-Objective Decision-Making for Mobile Cloud Offloading: A Survey]]>6396239769626<![CDATA[Automated Detection and Measurement of Corneal Haze and Demarcation Line in Spectral-Domain Optical Coherence Tomography Images]]>6397739914061<![CDATA[Time-Frequency Scheduling and Power Optimization for Reliable Multiple UAV Communications]]>6399240053740<![CDATA[Pseudo-Dynamic Network Modeling for PMU-Based State Estimation of Hybrid AC/DC Grids]]>6400640165829<![CDATA[Shared and Distributed X-in-the-Loop Tests for Automotive Systems: Feasibility Study]]>6401740268418<![CDATA[Software-Defined Next-Generation Satellite Networks: Architecture, Challenges, and Solutions]]>6402740417399<![CDATA[Experimental Validation of a Steady State Model Synthesis Method for a Three-Phase Unbalanced Active Distribution Network Feeder]]>6404240537436<![CDATA[Information-Optimum LDPC Decoders Based on the Information Bottleneck Method]]>discrete message passing decoders for regular low-density parity-check codes. The obtained decoders process only unsigned integers and use only simple lookup tables as node operations. As a consequence, the decoders can be implemented using only unsigned integer arithmetic which makes them significantly simpler and faster than the state-of-the-art decoders which process real valued log-likelihood ratios. Anyway, included results show that the considered discrete message passing decoders perform surprisingly close to optimum message passing decoders and even outperform state-of-the-art decoders, such as the min-sum decoder. We aim to take the reader on a journey from the theoretical idea of the Information Bottleneck method to a complete design framework for the considered discrete decoders. Several included figures and examples illustrate the decoder construction process and its analysis.]]>64054407110155<![CDATA[Moment-Constrained Maximum Entropy Method for Expanded Uncertainty Evaluation]]>6407240821761<![CDATA[Autonomous Self-Backhauled LTE Mesh Network With QoS Guarantee]]>6408341174831<![CDATA[Detection of Salt and Sugar Contents in Water on the Basis of Dielectric Properties Using Microstrip Antenna-Based Sensor]]>$times22$ mm. High-frequency structure simulator and computer simulation technology are used to simulate and analyze the characteristics of the antenna. The presented antenna achieves a 10 dB return loss from 2.50 to 18 GHz with 6.10 dBi of maximum gain, considerable efficiency, and consistent radiation patterns. The presented antenna is used as a sensor to detect salt and sugar in water in terms of reflection coefficient based on the dielectric properties of the solution. The percentage of salt and sugar in water changes the dielectric properties of the solution and the reflection coefficients subsequently. Results during the practical observations show that the reflection coefficient decreases with the increment of salt and sugar contents in the solution. With the excellent basic wideband antenna performances, the antenna shows good sensitivity to detect salt and sugar content in water. The presented antenna is suitable to be used in wideband wireless communications as well as wideband sensor applications.]]>64118412610246<![CDATA[A Heuristic Algorithm for a Low Autocorrelation Binary Sequence Problem With Odd Length and High Merit Factor]]>et al.) and 1987 (Bernasconi) greatly, where the merit factor is approximately equal to 6 for long skew-symmetric sequences with length up to 199. Now, the largest best-known skew-symmetric sequence with merit factor greater than 9 has the length 225. Additionally, now all merit factors are greater than 8.5 on the interval from 159 up to 225 for odd lengths.]]>6412741344519<![CDATA[Performance Analysis of a Cognitive Radio Network With an Energy Harvesting Secondary Transmitter Under Nakagami- ${m}$ Fading]]>${m}$ fading by deriving their corresponding outage probabilities in integral-based expressions. In addition, by considering the high signal-to-noise ratio, we obtain very tight closed-form approximations of the outage probabilities. Thereafter, by further analyzing the approximations, we reveal novel insights on the diversity orders and coding gains of the two systems. Our analytical results are validated through extensive Monte-Carlo simulations.]]>6413541447589<![CDATA[Cooperative Data Aggregation and Dynamic Resource Allocation for Massive Machine Type Communication]]>6414541584807<![CDATA[Design and Security Analysis of Quantum Key Distribution Protocol Over Free-Space Optics Using Dual-Threshold Direct-Detection Receiver]]>64159417510397<![CDATA[Transforming Fuzzy Spatiotemporal Data From Relational Databases to XML]]>6417641854867<![CDATA[On the Performance of RF-FSO System Over Rayleigh and Kappa-Mu/Inverse Gaussian Fading Environment]]>$kappa $ -$mu $ /Inverse Gaussian (IG) distribution. The analytical framework proposed is based on a versatile $kappa $ -$mu $ /IG model which includes one-sided Gaussian/IG, Rice (Nakagami-$n$ )/IG, Nakagami-$m$ /IG and Rayleigh/IG distributions as special cases. The expressions for moment generating function (MGF) and its special case are derived for this mixed RF and FSO network. The MGF is further utilized to derive the expression of end-to-end ergodic channel capacity for the RF-FSO communication system. Thereafter, end-to-end bit error rate is determined for BPSK, QPSK, DPSK and NCFSK modulation schemes. In addition, we have also derived analytical and asymptotic expressions of MGF and outage probability of the proposed RF-FSO system. Furthermore, we have also investigated the diversity gain and coding gain of the considered RF-FSO system.]]>6418641983363<![CDATA[Differential Faster-Than-Nyquist Signaling]]>6419942062798<![CDATA[Automatic LPI Radar Waveform Recognition Using CNN]]>6420742194073<![CDATA[LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey]]>6422042424884<![CDATA[I3MS: Intelligent Multi-Sensor Multi-Baseline Mapping System]]>64243425410389<![CDATA[An Approach for Enumerating Minimal Siphons in a Subclass of Petri Nets]]>4PR). First, a method with polynomial complexity is proposed to decide whether a subset of resource places can generate a minimal siphon. Next, by utilizing the technique of problem partitioning, we develop an approach to compute all minimal siphons in S^{4}PR. The proposed approach is illustrated by an example and its advantage is finally demonstrated via a comparison with other approaches.]]>6425542654830<![CDATA[Adaptive Model-Free Control Based on an Ultra-Local Model With Model-Free Parameter Estimations for a Generic SISO System]]>6426642756598<![CDATA[Application of Local Differential Privacy to Collection of Indoor Positioning Data]]>6427642864855<![CDATA[Multi-Traffic Scene Perception Based on Supervised Learning]]>6428742968311<![CDATA[Underwater Localization Based on Grid Computation and Its Application to Transmit Beamforming in Multiuser UWA Communications]]>a priori unknown signals received by an array of hydrophones. However, in our case, every receiver is assumed to have a single hydrophone, while an array of transducers transmit (pilot) signals known at a receiver. The receiver processes the received pilot signal to estimate the Channel State Information (CSI) and compares it with the CSI pre-computed on the grid; the best match indicates the location estimate. The proposed localization technique also enables an efficient solution to the inherent problem of informing a transmitter about the CSI available at the receiver for the purpose of transmit beamforming. The receiver only needs to send a grid point index to enable the transmitter to obtain the pre-computed CSI corresponding to the particular grid point, thereby significantly reducing transmission overheads. We apply this approach to a multiuser communication scenario with orthogonal frequency-division multiplexing (OFDM) and show that the proposed approach results in accurate localization of receivers and multiuser communications with a high detection performance.]]>6429743077982<![CDATA[Ranging Method for Navigation Based on High-Speed Frequency-Hopping Signal]]>6430843204516<![CDATA[SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System]]>64321433914999<![CDATA[Single RF Channel Digital Beamforming Array Antenna Based on Compressed Sensing for Large-Scale Antenna Applications]]>$80lambda $ under the signal-to-noise ratio of 15 dB and the scenario of six targets showed that the proposed array could save above 63.1% of sensor numbers and above 84.4% in sampling time when compared with those of conventional TSPW arrays.]]>6434043517361<![CDATA[A Situational Awareness Trust Evolution Model for Mobile Devices in D2D Communication]]>6437543865509<![CDATA[Random Fuzzy Cost-Profit Equilibrium Model for Locating a Discrete Service Enterprise]]>6438743945574<![CDATA[Compact Conditional Joint Decision and Estimation for Joint Tracking and Identification With Performance Evaluation]]>6439544044245<![CDATA[Robust Interference Cancellation of Chirp and CW Signals for Underwater Acoustics Applications]]>644054415996<![CDATA[Multicriteria-Based Active Discriminative Dictionary Learning for Scene Recognition]]>6441644266319<![CDATA[On Stability of Voltage Source Inverters in Weak Grids]]>$dq$ -frame of reference. The full-order state-space model developed in this paper is directly extracted from the pulsewidth modulation switching pattern and enables the stability analysis of concurrent variations in the three-phase circuit and control parameters. This paper demonstrates that the full-order model of a grid-tied active (P) and reactive (Q) power (PQ)-controlled voltage source inverter (VSI) can be significantly reduced to a second-order model, preserving the overall system stability in the case of grid impedance variations. This paper also shows that a decrease in the grid inductance does not necessarily improve the stability of grid-tied VSIs. The system stability is a function of both the grid R/X ratio and grid inductance. Despite the grid-side inductor of the LCL filter is in series with the grid impedance, they have different impacts on the stability of a grid-tied PQ-controlled VSI, i.e., an increase in the filter inductance may improve the system stability in a weak grid. These findings are verified through simulated and experimentally obtained data.]]>64427443914369<![CDATA[Mechanism Equivalence in Designing Optimum Step-Stress Accelerated Degradation Test Plan Under Wiener Process]]>$M$ -optimality criterion to improve the mechanism equivalence of a step-stress accelerated degradation test when designing an optimum plan. Subject to the total cost constraint, a comparison is carried out between the optimum plan designed by using $M$ -optimality criterion and other plans designed by using traditional criteria through the case of light intensity degradation of LEDs.]]>6444044516871<![CDATA[ANTSC: An Intelligent Naïve Bayesian Probabilistic Estimation Practice for Traffic Flow to Form Stable Clustering in VANET]]>6445244615250<![CDATA[Reservoir Computing With Spin Waves Excited in a Garnet Film]]>6446244692132<![CDATA[Linguistic Feature Based Filtering Mechanism for Recommending Posts in a Social Networking Group]]>6447044846848<![CDATA[Equalization Techniques of Control and Non-Payload Communication Links for Unmanned Aerial Vehicles]]>6448544964702<![CDATA[A Temperature-Dependent SiC MOSFET Modeling Method Based on MATLAB/Simulink]]>$V_{mathrm{ ds}}=300$ V, $I_{d}=15$ A, $R_{g_{}exton}=18,,Omega $ , and $R_{g_{}extoff}=12,,Omega $ at 200 °C, the maximum error was 6.7%.]]>6449745059043<![CDATA[Spread-Spectrum Techniques for Bio-Friendly Underwater Acoustic Communications]]>$1~mu $ Pa at 1 m and with Doppler effects induced by relative motion exceeding 2 m/s. Conclusion: The system developed compares favorably, in terms of SNR performance and channel utilization, with previously reported work aimed at covert communication but offers reduced transmitter/receiver complexity and discomfort to animals. This paper offers a way forward to more bio-friendly acoustic modem devices for operation in regions with sensitive fauna and/or increasingly strict environmental controls.]]>6450645206207<![CDATA[Vehicle-to-Vehicle Distance Estimation Using a Low-Resolution Camera Based on Visible Light Communications]]>6452145273628<![CDATA[Origami Segmented Helical Antenna With Switchable Sense of Polarization]]>64528453611490<![CDATA[Decentralized Robust Transceiver Designs for MISO SWIPT Interference Channel]]>$K$ -user multiple-input single-output interference channel for simultaneous wireless information and power transfer, where each multi-antenna transmitter serves a single-antenna receiver per user pair. All receivers perform simultaneously information processing and energy harvesting (EH) based on the receive power-splitting (PS) architectures. Assuming imperfect channel state information (CSI) at the transmitters, we develop a near-optimal robust transceiver design scheme that minimizes the total transmission power under the worst-case signal-to-interference-plus-noise ratio (SINR) and EH constraints at the receivers, by jointly optimizing transmit beamforming and receive PS ratio per receiver. When the CSI uncertainties are bounded by ellipsoidal regions, it is shown that the worst-case SINR and EH constraints per receiver can be recast into quadratic matrix inequality forms. Leveraging semidefinite relaxation technique, the intended robust beamforming and PS (BFPS) problem can be relaxed as a tractable (centralized) semidefinite program. More importantly, relying on the state-of-the-art alternating direction method of multipliers in convex optimization, we propose a decentralized algorithm capable of computing the robust BFPS scheme with local CSI and limited information exchange among the transmitters. It is shown that the proposed decentralized algorithm is guaranteed to converge to the centralized solution. Numerical results are provided to demonstrate the merits of the proposed approaches.]]>6453745464069<![CDATA[Measurement and Analysis of the Swarm Social Network With Tens of Millions of Nodes]]>64547455911293<![CDATA[Detection of Glaucoma Using Cup to Disc Ratio From Spectral Domain Optical Coherence Tomography Images]]>V) estimation method. Furthermore, a new criterion for cup edges determination, based on the mean value of RPE-layer end points, is proposed. The proposed system has shown a clear precedence over its contemporary systems in terms of accuracy and handling of acute cases. Satisfactory results have been obtained when compared with the clinical results.]]>64560457611917<![CDATA[Face Hallucination via Gradient Constrained Sparse Representation]]>$l_{1}$ reweighted constraint into the sparse representation to achieve better performance. An iterative algorithm is proposed to refine these reconstructed high-resolution images. The experiments on several face databases show the better performance of our algorithm compared with other baseline algorithms.]]>64577458610064<![CDATA[A Novel Secure Data Transmission Scheme Using Chaotic Compressed Sensing]]>$T$ -way Bernoulli shift chaotic system. In the proposed scheme, the Bernoulli chaotic sensing matrix (BCsM) is generated by the Bernoulli shift chaotic sequence. We prove that the BCsM meets the restricted isometry property with overwhelming probability, which guarantees good sensing performance. Compared with the state-of-the-art sensing matrices, such as the Gaussian sensing matrix, the BCsM has low complexity and is easily implemented in hardware. Meanwhile, we investigate the recovery performance, robustness, and security of the proposed scheme and show that the proposed scheme can ensure efficient secure data transmission against additive noise and malicious attacks. The proposed scheme is perfectly effective for large-scale, long-term data transmission with high energy efficiency and strong security.]]>6458745987554<![CDATA[Vertex Graph-Coloring-Based Pilot Assignment With Location-Based Channel Estimation for Massive MIMO Systems]]>6459946079934<![CDATA[An Industrial Internet of Things Feature Selection Method Based on Potential Entropy Evaluation Criteria]]>6460846175379<![CDATA[Root-Based Nonlinear Companding Technique for Reducing PAPR of Precoded OFDM Signals]]>$mu $ -law companding (MC) technique in reducing PAPR of OFDM signals, which is known to expand the amplitudes of low power signals only without impacting the higher amplitude signals. This limits the PAPR reduction performance of the MC scheme. Since companding involves simultaneously compressing/expanding high/low amplitude OFDM signals, respectively, in this paper, we refer to the new method as a root-based MC (RMC) scheme that simultaneously expands and compresses OFDM signal amplitudes unlike MC. In addition, we express a second transform independent of the MC model. The results of the two proposed schemes outperform four other widely used companding techniques [MC, log-based modified (LMC), hyperbolic arc-sine companding (HASC) and exponential companding (EC)]. Besides these, we precode the OFDM signals using discrete Hartley transform (DHT) in order to further reduce the PAPR limits achieved by RMC by distorting the phase. While preserving the BER, DHT-precoded RMC outperforms all the four other companding schemes (MC, EC, HASC, LMC) in terms of PAPR.]]>6461846295666<![CDATA[Facial Expression Recognition Using Weighted Mixture Deep Neural Network Based on Double-Channel Facial Images]]>6463046405532<![CDATA[Class Weights Random Forest Algorithm for Processing Class Imbalanced Medical Data]]>6464146527760<![CDATA[Adaptive Synchronization of Fractional-Order Nonlinearly Coupled Complex Networks With Time Delay and External Disturbances]]>6465346637792<![CDATA[A Game Based Consolidation Method of Virtual Machines in Cloud Data Centers With Energy and Load Constraints]]>6466446765511<![CDATA[Generalized DFT-s-OFDM Waveforms Without Cyclic Prefix]]>6467746897337<![CDATA[Design and Experimental Testing of a Free-Running Ship Motion Control Platform]]>6469046962022<![CDATA[Manifold Regularized Distribution Adaptation for Classification of Remote Sensing Images]]>64697470811158<![CDATA[Broadband GaN Class-E Power Amplifier for Load Modulated Delta Sigma and 5G Transmitter Applications]]>6470947197487<![CDATA[A Semi-Automatic Numerical Algorithm for Turing Patterns Formation in a Reaction-Diffusion Model]]>reaction-diffusion (RD) type partial differential equations, and it plays a crucial role in ecological studies. Big data analytics and suitable frameworks to manage and predict structures and configurations are mandatory. The processing and resolution procedures of mathematical models relies upon numerical schemes, and concurrently upon the related automated algorithms. Starting from a RD model for vegetation patterns, we propose a semi-automatic algorithm based on a smart numerical criterion for observing ecological reliable results. Numerical experiments are carried out in the case of spot’s formations.]]>6472047246218<![CDATA[A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs]]>64725474112942<![CDATA[Adaptive Semi-Periodically Intermittent and Lag Synchronization Control of Neural Networks With Mixed Delays]]>6474247494132<![CDATA[Batch Mode Active Learning for Node Classification in Assortative and Disassortative Networks]]>6475047582091<![CDATA[Research and Implementation of ECG-Based Biological Recognition Parallelization]]>6475947663339<![CDATA[Integration of Anonymous Credential Systems in IoT Constrained Environments]]>6476747787188<![CDATA[Modeling Content and Membership Growth Dynamics of User-Generated Content Sharing Networks With Two Case Studies]]>6477947968240<![CDATA[Model Predictive Power Control for Cooperative Vehicle Safety Systems]]>6479748107235<![CDATA[Improving the Quality of Software Development Process by Introducing a New Methodology–AZ-Model]]>64811482313102<![CDATA[Multi-Objective Optimal Control Allocation for an Over-Actuated Electric Vehicle]]>6482448335106<![CDATA[Optimal Thermal Unit Commitment for Solving Duck Curve Problem by Introducing CSP, PSH and Demand Response]]>® INTLINPROG optimization toolbox. To evaluate the effectiveness of the proposed method, simulation results have been compared with some other methods.]]>6483448449843<![CDATA[A Correction to the Article “Fast Optic Disc Segmentation in Retina Using Polar Transform”]]>6484548491106<![CDATA[Security for 5G Mobile Wireless Networks]]>64850487411949<![CDATA[A Systematic Review of Compressive Sensing: Concepts, Implementations and Applications]]>64875489412693<![CDATA[Trajectory Mining Using Uncertain Sensor Data]]>6489549033185<![CDATA[A Matching Algorithm Based on Voronoi Diagram for Multi-Scale Polygonal Residential Areas]]>6490449157408<![CDATA[Efficient and Agile Carrier Sense Multiple Access in Capillary Machine-to-Machine Communication Networks]]>carrier sense multiple access framework to instill efficiency and agility in random access performance in capillary machine-to-machine communication networks. Under a hierarchical infrastructure-based setting, a resourceful gateway/coordinator node serves as the conduit between the resource-limited end-nodes and the application/service level network nodes. The coordinator periodically executes the dynamic algorithm, which determines the appropriate backoff window size for the present estimated load, and the end-nodes are opportunistically updated with this window size. Based on key analytic properties derived from a stochastic model of the associated protocol, the intelligent collision avoidance mechanism is shown to be efficient in aggregate throughput, equitable among the nodes regarding packet service times and energy efficiency, and agile in responding to intermittent node activity and traffic elasticity/burstiness. Numerical results show that the intelligent collision avoidance mechanism significantly outperforms the usually deployed binary exponential backoff in most of the settings, while matching a normative protocol fair closely.]]>6491649324832<![CDATA[Improved Reconstruction of Low Intensity Magnetic Resonance Spectroscopy With Weighted Low Rank Hankel Matrix Completion]]>6493349405389<![CDATA[Phase-Constrained Parallel Magnetic Resonance Imaging Reconstruction Based on Low-Rank Matrix Completion]]>6494149547046<![CDATA[Soft-Decision-Driven Sparse Channel Estimation and Turbo Equalization for MIMO Underwater Acoustic Communications]]>a posteriori soft-decision symbols, instead of the hard decision symbols or the a priori soft-decision symbols, at the equalizer output, are not only feedback to the Homotopy RLS-DCD-based channel estimator but also to the minimum mean-square-error (MMSE) equalizer. As the turbo iterations progress, the accuracy of channel estimation and the quality of the MMSE equalizer are improved gradually, leading to the enhancement in the turbo equalization performance. This also allows the reduction in pilot overhead. The proposed receiver has been tested by using the data collected from the SHLake2013 experiment. The performance of the receiver is evaluated for various modulation schemes, channel estimators, and MIMO sizes. Experimental results demonstrate that the proposed a posteriori soft-decision-driven sparse channel estimation based on the Homotopy RLS-DCD algorithm and turbo equalization offer considerable improvement in system performance over other turbo equalization schemes.]]>6495549733808<![CDATA[RF Energy Absorption by Biological Tissues in Close Proximity to Millimeter-Wave 5G Wireless Equipment]]>6497449814653<![CDATA[Low-Complexity Nonlinear Analysis of Synchrophasor Measurements for Events Detection and Localization]]>$T^{2}$ statistic is constructed to detect the abnormal states of an electrical power system. In addition, the contribution of each variable to the $T^{2}$ statistic is derived to determine the location of the fault bus. Compared with the previous works, the novel version proposed in this paper efficiently reduces the computational burden, and accurately locates the fault bus. Computer simulations using both realistic data, collected from the China power system, and simulated voltage and phase-angle data, validate the reliability of the proposed algorithm.]]>6498249931556<![CDATA[PAPR Reduction in the FBMC-OQAM System via Segment-Based Optimization]]>6499450026334<![CDATA[Neighborhood Diversity Promotes Cooperation in Social Dilemmas]]>6500350093843<![CDATA[Automatic and Efficient Denoising of Bioacoustics Recordings Using MMSE STSA]]>6501050224692<![CDATA[R-Sharing: Rendezvous for Personalized Taxi Sharing]]>6502350366773<![CDATA[ParGen: A Parallel Method for Partitioning Data Stream Applications in Mobile Edge Computing]]>6503750488350<![CDATA[Secure Transmission With Randomized Constellation Rotation for Downlink Sparse Code Multiple Access System]]>6504950637906<![CDATA[An Efficient Rate Compatible Modulation With Variable Weight Sets]]>6506450745262<![CDATA[Content Popularity Prediction and Caching for ICN: A Deep Learning Approach With SDN]]>6507550896606<![CDATA[Energy Consumption Analysis of Edge Orchestrated Virtualized Wireless Multimedia Sensor Networks]]>6509051005160<![CDATA[A Survey on Mobile Data Offloading Technologies]]>6510151113484<![CDATA[EduCTX: A Blockchain-Based Higher Education Credit Platform]]>6511251272105<![CDATA[Exploring Recurrent Neural Networks for On-Line Handwritten Signature Biometrics]]>6512851381104<![CDATA[Investigating Software Standards: A Lens of Sustainability for Software Crowdsourcing]]>6513951504457<![CDATA[Multi-State Reliability Assessment Method Based on the MDD-GO Model]]>6515151616837<![CDATA[GNSS Augmentation by FM Radio Symbiosis]]>6516251699594<![CDATA[Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario]]>6518251989081<![CDATA[Optimal Power Flow for Unbalanced Bipolar DC Distribution Grids]]>6519952077602<![CDATA[Real-Time Monitoring of Soil Compaction Using Piezoceramic-Based Embeddable Transducers and Wavelet Packet Analysis]]>65208521410052<![CDATA[Composite Controller for Antagonistic Tendon Driven Joints With Elastic Tendons and Its Experimental Verification]]>6521552262913<![CDATA[Speckle Reduction of Reconstructions of Digital Holograms Using Gamma-Correction and Filtering]]>6522752356766<![CDATA[Stabilizing an Urban Semi-Autonomous Bicycle]]>6523652467618<![CDATA[Improved Robust Vehicle Detection and Identification Based on Single Magnetic Sensor]]>in site traffic environment. The 80.5% accuracy rate on vehicle identification approves the effectiveness of the proposed features on recognizing vehicles.]]>6524752554156<![CDATA[Performance Modeling of LTP-HARQ Schemes Over OSTBC-MIMO Channels for Hybrid Satellite Terrestrial Networks]]>6525652684792<![CDATA[Image Thresholding Segmentation Based on Two Dimensional Histogram Using Gray Level and Local Entropy Information]]>6526952752354<![CDATA[Interactive Temporal Recurrent Convolution Network for Traffic Prediction in Data Centers]]>6527652892768<![CDATA[Variable Selection and Optimization in Rapid Detection of Soybean Straw Biomass Based on CARS]]>6529052995491<![CDATA[An Arc-Flow Model for the Makespan Minimization Problem on Identical Parallel Machines]]>hard instances of the literature. We present an integer linear program based on an innovative arc-flow model inspired from the duality between the bin packing problem and the parallel-machine scheduling problem. The proposed mathematical model is tested on a large set of hard instances. The results of computational experiments attest the efficiency of the new approach and prove that it outperforms the existing ones. In addition to its efficiency, the proposed method is simple and easy to use.]]>6530053077016<![CDATA[Towards Emotionally Aware AI Smart Classroom: Current Issues and Directions for Engineering and Education]]>6530853319015<![CDATA[Fair Resource Allocation for System Throughput Maximization in Mobile Edge Computing]]>6533253401341<![CDATA[Generation of Wideband Tunable Orbital Angular Momentum Vortex Waves Using Graphene Metamaterial Reflectarray]]>$l$ = ±1, ±2, and ±3 modes. Moreover, the OAM beams operating in a wide frequency band from 1.8 to 2.8 THz can be generated with the adjustment of the chemical potentials. Simulation results demonstrate good performance of the proposed reflectarray in the efficient generation and manipulation of the OAM vortex waves, which is promising to be used in wireless communication.]]>6534153474292<![CDATA[A Learning Automaton-Based Scheme for Scheduling Domestic Shiftable Loads in Smart Grids]]>distributed game-theoretic framework. In our specific instantiation, we consider the scenario when the power system has a local-area Smart Grid subnet comprising of a single power source and multiple customers. The objective of the exercise is to tacitly control the total power consumption of the customers’ shiftable loads, so to approach the rigid power budget determined by the power source, but to simultaneously not exceed this threshold. As opposed to the “traditional” paradigm that utilizes a central controller to achieve the load scheduling, we seek to achieve this by pursuing a distributed approach that allows the users^{1} to make individual decisions by invoking negotiations with other customers. The decisions are essentially of the sort, where the individual users can choose whether they want to be supplied or not. From a modeling perspective, the distributed scheduling problem is formulated as a game, and in particular, a so-called “Potential” game. This game has at least one pure strategy Nash equilibrium (NE), and we demonstrate that the NE point is a global optimal point. The solution that we propose, which utilizes the theory of learning automata (LA), permits the total supplied loads to approach the power budget of the subnet once the algorithm has converged to the NE point. The scheduling is achieved by attaching a LA to each customer. The paper discusses the applicability of three different LA schemes, and in particular, the recently-introduced Bayesian learning automata. Numerical results, obtained from testing the schemes on numerous simulated-
data sets, demonstrate the speed and the accuracy of proposed algorithms in terms of their convergence to the game’s NE point.

In this paper, we use the terms “customers” and “users” interchangeably.

]]>6534853616630<![CDATA[External Force Sensing Based on Cable Tension Changes in Minimally Invasive Surgical Micromanipulators]]>6536253733391<![CDATA[Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding]]>$n$ cover-pixels to embed secret data. It achieves good image quality and high security level of resisting RS detection. However, the embedding capacity of EMD decreases fast when $n$ increases. In 2013, a Generalized EMD (GEMD) was proposed to improve the embedding capacity of EMD, which is always more than 1 bpp (bits per pixel), and keeps the good stego-image quality. In this paper, we propose an enhanced GEMD by dividing a group of $n$ cover-pixels into multiple groups. By this method, the embedding capacity can be further improved from GEMD. Our scheme maintains the good image quality and can resist the RS detection as well.]]>6537453783998<![CDATA[Guided-Wave Properties of Mode-Selective Transmission Line]]>10 mode with reference to rectangular waveguide over the higher frequency region. To gain insight into the physical mechanism and fundamental features of this mode-selective transmission line, a detailed semi-analytical hybrid-mode analysis is developed through the application of a method of lines. This method allows accurate and effective modeling of MSTL guided-wave properties. Propagation characteristics of this proposed mode-agile structure in terms of dispersion, modal, and loss properties are examined, which leads to the establishment of some basic MSTL design guidelines. Numerical results confirm the expected mode conversion and low-loss behavior through the observation of field evolutions along the structure. For experimental verification, a set of MSTL prototypes are fabricated on two different substrates through dissimilar fabrication processes. Measurements are carried out from dc-to-500 GHz using a vector network analyzer. Excellent agreement between theoretical and experimental results is observed. It is confirmed that the low-dispersion and low-loss behavior of MSTL makes it an outstanding integrated waveguide in support of high-performance super-broadband signal transmission and/or ultra-fast pulse propagation in a fully-integrated platform.]]>6537953928239<![CDATA[An Anti-Quantum Transaction Authentication Approach in Blockchain]]>6539354014237<![CDATA[Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example]]>6540254144688<![CDATA[Opinion–Aspect Relations in Cognizing Customer Feelings via Reviews]]>6541554267740<![CDATA[An Empirical Study on Modeling and Prediction of Bitcoin Prices With Bayesian Neural Networks Based on Blockchain Information]]>6542754377999<![CDATA[Improved Imaging Performance in Super-Resolution Localization Microscopy by YALL1 Method]]>6543854465637<![CDATA[A Time-Delayed Multi-Master-Single-Slave Non-Linear Tele-Robotic System Through State Convergence]]>6544754597059<![CDATA[Cyclostationary Noise Mitigation for SIMO Powerline Communications]]>6546054844595<![CDATA[A Cloud-Based System for Improving Retention Marketing Loyalty Programs in Industry 4.0: A Study on Big Data Storage Implications]]>6548554925037<![CDATA[A Novel Edge Preserving Active Contour Model Using Guided Filter and Harmonic Surface Function for Infrared Image Segmentation]]>65493551014144<![CDATA[Multi-Semi-Couple Super-Resolution Method for Edge Computing]]>65511552012820<![CDATA[Comprehensive Analysis of Multipath Estimation Algorithms in the Framework of Information Theoretic Learning]]>6552155305048<![CDATA[Robust Covariance Representations With Large Margin Dimensionality Reduction for Visual Classification]]>6553155376442<![CDATA[Autonomic Web Services Enhanced by Asynchronous Checkpointing]]>6553855475780<![CDATA[Construction of Near-Optimal Axis-Parallel Decision Trees Using a Differential-Evolution-Based Approach]]>6554855637477<![CDATA[Compressed Sensing by Shortest-Solution Guided Decimation]]>$ell _{1}$ -norm based methods, orthogonal least squares, orthogonal matching pursuit, and approximate message passing when the sampling matrix contains strong correlations. This nice property of correlation tolerance makes SSD a versatile and robust tool for different types of real-world signal acquisition tasks.]]>6556455728298<![CDATA[Auxiliary Loss Multimodal GRU Model in Audio-Visual Speech Recognition]]>6557355831635<![CDATA[A Side-Lobe Suppression Method Based on Coherence Factor for Terahertz Array Imaging]]>6558455882000<![CDATA[Randomized Beamforming With Generalized Selection Transmission for Security Enhancement in MISO Wiretap Channels]]>$Q$ antennas out of $N$ antennas are selected at the transmitter to maximize the signal to noise ratio at the legitimate receiver. Moreover, RBF is responsible for delivering secure communications in the presence of advanced eavesdroppers. We characterize the physical layer secrecy of RBF/GST under passive and active eavesdropping scenarios, via our closed-form expressions for the ergodic secrecy rate and the exact and asymptotic secrecy outage probabilities. We demonstrate that RBF/GST can effectively improve communication secrecy with a reasonable amount of signal processing and power consumption.]]>6558955951813<![CDATA[Cognitive Multiuser Energy Harvesting Decode-and-Forward Relaying System With Direct Links]]>$N+1$ for selection DF relaying and reaches $N$ for fixed DF relaying. Numerical and simulation results are demonstrated to verify our proposed analysis.]]>6559656061886<![CDATA[A Dictionary Learning Based Automatic Modulation Classification Method]]>6560756174838<![CDATA[Anti-Shadowing Resource Allocation for General Mobile Cognitive Radio Networks]]>6561856325491<![CDATA[An Analytical Method of Network Service Scalability]]>6563356405026<![CDATA[A Fast Single-Image Dehazing Method Based on a Physical Model and Gray Projection]]>6564156532277