Generative adversarial networks based adaptive modulation and coding for next-generation 5G communication systems
A. Manikandan, Rakesh Thoppaen Suresh Babu, S Jai Ganesh
et al.
Abstract In 5G based communication systems, adaptive modulation and coding (AMC) is a key approach that optimizes data transmission by constantly modifying modulation schemes and error correction coding by the current channel circumstances. AMC’s main objective is to increase data transfer efficiency and reliability while adjusting to the frequently fluctuating and unexpected nature of wireless channels. However, the channel's quality can be impacted by several variables, including distance, fading, noise, and interference in the time-varying channel. Hence it won't be easy to approximate the channel state information (CSI) accurately for time-varying channels. This paper discusses the novel rate adaptation approach that leverages generative adversarial networks (GAN) along with AMC to ensure efficient and reliable data transfer in a dynamic and often challenging environment, that maximizes data throughput even under varying conditions and offers robustness under adverse ones.
Integrating multidimensional data analytics for precision diagnosis of chronic low back pain
Sam Vickery, Frederick Junker, Rebekka Döding
et al.
Abstract Low back pain (LBP) is a leading cause of disability worldwide, with up to 25% of cases become chronic (cLBP). Whilst multi-factorial, the relative importance of contributors to cLBP remains unclear. We leveraged a comprehensive multi-dimensional data-set and machine learning-based variable importance selection to identify the most effective modalities for differentiating whether a person has cLBP. The dataset included questionnaire data, clinical and functional assessments, and spino-pelvic magnetic resonance imaging (MRI), encompassing a total of 144 parameters from 1,161 adults with (n = 512) and without cLBP (n = 649). Boruta and random forest were utilised for variable importance selection and cLBP classification respectively. A multimodal model including questionnaire, clinical, and MRI data was the most effective in differentiating people with and without cLBP. From this, the most robust variables (n = 9) were psychosocial factors, neck and hip mobility, as well as lower lumbar disc herniation and degeneration. This finding persisted in an unseen holdout dataset. Beyond demonstrating the importance of a multi-dimensional approach to cLBP, our findings will guide the development of targeted diagnostics and personalized treatment strategies for cLBP patients.
Satellite Constellation Multi-Target Robust Observation Method Based on Hypergraph Algebraic Connectivity and Observation Precision Theory
Jie Cao, Xiaogang Pan, Yuanyuan Jiao
et al.
A multi-target robust observation method for satellite constellations based on hypergraph algebraic connectivity and observation precision theory is proposed to address the challenges posed by the surge in space targets and system failures. First, a precision metric framework is constructed based on nonlinear batch least squares estimation theory, deriving the theoretical precision covariance through cumulative observation matrices to provide a theoretical foundation for tracking accuracy evaluation. Second, multi-satellite collaborative observation is modeled as an edge-dependent vertex-weighted hypergraph, enhancing system robustness by maximizing algebraic connectivity. A constrained simulated annealing (CSA) algorithm is designed, employing a precision-guided perturbation strategy to efficiently solve the optimization problem. Simulation experiments are conducted using 24 Walker constellation satellites tracking 50 targets, comparing the proposed method with greedy algorithm, CBBA, and CSA-bipartite Graph methods across three scenarios: baseline, maneuvering, and failure. Results demonstrate that the CSA-hypergraph method achieves 0.089 km steady-state precision in the baseline scenario, representing a 41.4% improvement over traditional methods; in maneuvering scenarios, detection delay is reduced by 34.3% and re-achievement time is decreased by 47.4%; with a 30% satellite failure rate, performance degradation is only 9.8%, significantly outperforming other methods.
Analysis of the dynamics of changes in factor load models for predicting failures of a spacecraft
Kraev Konstantin, Zaitsev Pavel, Kazakovtsev Vladimir
The paper considers the theoretical aspects of factor analysis as applied to the problem of predicting the failure-free operation of low-orbit communication satellites. The authors described the nature of the factors affecting the spacecraft during operation. The structure of the methodology for preparing data and creating factor load models is described. A methodology for analyzing the dynamics of changes in factor load models is proposed. The basic concepts and the algorithm are described. A numerical experiment to test the proposed hypothesis and interpreted the key factors influencing the functioning of the spacecraft is described. The factors are distributed into influence groups. As a result of the numerical experiment and the conducted analysis of the dynamics of changes in the factor load models, we made a conclusion on the validity of the proposed hypothesis. The practical applicability of the described approach for predicting failures and malfunctions during the operation of spacecraft is discussed.
AN AI-POWERED SECURITY SYSTEM FOR CAN BUS ATTACKS IDENTIFICATION IN ELECTRIC AUTOMOBILES
S. B. Vinay Kumar , B. P. Singh , Raman Batra
et al.
The network connection within the car, the "Controller Area Network" (CAN) bus serves as an alternative protocol for electric automobiles. Tragically, the lack of a data authentication technique in the CAN bus protocol makes it susceptible to several types of assaults, making it easier for attackers to infiltrate the network. The CAN dataset is collected and the collected datasets attains for preprocessing stage using z-score normalization. For feature extraction, a restricted boltzmann machine (RBM) is used to extract the data. Next, our proposed method (MCFO-DANN) is used to identify and mitigate CAN Bus attacks in electric vehicles. Evaluation against other CAN bus anomaly detection methods demonstrates the superiority of MCFO-DANN, exhibiting higher accuracy. This proactive security solution fortifies electric vehicles against cyber-threats, ensuring real-time monitoring and response, thereby preserving the integrity and safety of the CAN Bus network in electric automobiles.
Engineering (General). Civil engineering (General)
On the Size Discrepancies between Datasets from China Meteorological Administration and Joint Typhoon Warning Center for the Northwestern Pacific Tropical Cyclones
Jinhe Li, Yubin Li, Jie Tang
This study analyzes the Northwestern Pacific tropical cyclone (TC) size difference between the China Meteorological Administration (CMA) dataset and the Joint Typhoon Warning Center (JTWC) dataset. The TC size is defined by the near-surface 34-knot wind radius (R34). Although there is a high correlation (correlation coefficient of 0.71) between CMA and JTWC R34 values, significant discrepancies are still found between them. The JTWC tends to report larger R34 values than the CMA for large-sized TCs, while the trend is reversed for compact TCs. Despite spatial distribution discrepancies, both datasets exhibit significant similarity (spatial correlation coefficient of 0.61), particularly in latitudinal distribution; higher R34 values are observed near 25° N. An investigation of key parameters affecting R34 estimations shows that the discrepancies in R34 values between the two agencies’ estimates of TC size are primarily influenced by the size itself and latitude. There is a high correlation between R34 difference and R34 values, with a high correlation of up to 0.58 with the JTWC’s R34 values. There is also a significant correlation between R34 difference and latitude, with a correlation coefficient of 0.26 in both the CMA and JTWC datasets. Case studies of Typhoons “Danas” and “Maysak” confirm distinct characteristics in R34 estimations during different development stages, with the JTWC capturing TC intensification better, while the CMA underestimates TC size during rapid growth phases. During the weakening stage of the TC, both agencies accurately estimate the R34 values. These findings contribute valuable insights into the discrepancies and characteristics of R34 datasets, informing the selection and utilization of data for typhoon research and forecasting.
Digitalization and cooperation between the European Union and Ukraine
Hanna Bondar
The article is devoted to the analysis of the digitization process and cooperation between Ukraine and the member states of the European Union. The peculiarities of digitization in Ukraine are analyzed as integral components of the process of reconstruction, modernization of the Ukrainian economy and the construction of high-quality European infrastructure, with the aim of joining the state to the European and Euro-Atlantic community. An analysis of the state of reforms in Ukraine in the direction of digitization of services, their accessibility to citizens, the development of electronic governance, and ensuring the transparency of public information in the form of open data was carried out. Legislative and regulatory support in the field of functioning and development of e-government in the EU countries and in Ukraine, in particular, in the direction of digital transformation of the government and fulfillment of international obligations by Ukraine, is analyzed. The research data of European and international institutions on the development of e-governance, ICT, human potential, open data and e-services in the world and Ukraine are analyzed and systematized. It has been established that in Ukraine there is a high readiness to use digital technologies. One of the forms of direct support by EU countries for digitalization in Ukraine is the signing in September 2022 of an agreement with the European Commission on Ukraine's accession to the Digital Europe Program. It is determined that Ukrainian enterprises, organizations and public administration bodies will be able to benefit from the financing and support of the Program in such areas as artificial intelligence, supercomputing and digital skills. It has been proven that since digitization in Ukraine contributes to the technological and democratic development of the country, the modernization of its economy, the availability of public services, and the transparency of government, accordingly, Ukraine will need support and further cooperation from the world's leading technology companies in Europe and the world to implement systemic reforms and post-war reconstruction.
Political institutions and public administration (General)
Carbon nanotube-based double-layer microporous cathode for micro-direct methanol fuel cell
Zhengang Zhao, Jiankun Wang, Qingchan Liu
et al.
The micro-direct methanol fuel cell (μDMFC) has the advantages of high energy density, high conversion efficiency, and simple structure, which brought vast application prospects in portable devices. However, some shortcomings still exist, such as low catalyst utilization and power density. This paper proposes a new cathode electrode structure for the μDMFC. The structure consists of a multi-walled carbon nanotube layer and a cathode double microporous layer (CD-MPL) prepared from carbon powder. The outer microporous layer (OMPL) is composed of multi-walled carbon nanotubes (MWCNTs), Nafion solution, and carbon powder, and the inner microporous layer (IMPL) is composed of carbon powder and polytetrafluoroethylene (PTFE). The experimental results show that the maximum power density of the μDMFC with a CD-MPL (CD-μDMFC) is 42.8 mW/cm2, which is 31.6% higher than that of the μDMFC with a cathode single microporous layer (CS-μDMFC). The pore size distribution of the OMPL of the CNT is measured by the mercury intrusion method. It can be seen that the distribution of pore size is wider and there are more pores with larger pore sizes, which are more conducive to the utilization of catalysts. The discharge experiment of the cell shows that the CD-μDMFC shows high discharge performance and fuel utilization at different concentrations. The double microporous layer (MPL) structure increases the porosity and pore range, broadens the three-phase interface for the reaction, and allows the catalyst to have more attachment sites. The existence of MWCNTs improves the conductivity and mass transfer capacity of the cathode.
An OpenFOAM solver for computing suspended particles in water currents
Nils R. B. Olsen, Subhojit Kadia, Elena Pummer
et al.
A new OpenFOAM solver has been developed for computing the spatial variation of particle concentrations in flowing water. The new solver was programmed in C ++ using OpenFOAM libraries, and the source code has been made openly available. The current article describes the coding of how the water flow and particle movements are computed. The solver is based on a Eulearian approach, where the particles are computed as concentrations in cells of a grid that resolves the computational domain. The Reynolds-averaged Navier–Stokes equations are solved by simpleFoam, using the k-ε turbulence model. The new solver uses a drift-flux approach to take the fall or rise velocity of the particles into account in a convection-diffusion equation. The model is therefore called sediDriftFoam. The results from the solver were tested on two cases with different types of particles. The first case was a sand trap with sand particles. The geometry was three-dimensional with a recirculation zone. The computed sediment concentrations in three vertical profiles compared well with earlier numerical studies and laboratory measurements. The second case was a straight channel flume with plastic particles that had a positive rise velocity. In this case, the results also compared well with the laboratory measurements.
HIGHLIGHTS
Open source 3D sediment model.;
Based on OpenFOAM.;
Simple and easy to learn.;
Tested on computing trap efficiency of a sand trap.;
Tested on computing suspended plastic particles in a channel.;
Information technology, Environmental technology. Sanitary engineering
Design Procedure for Motion Profiles with Sinusoidal Jerk for Vibration Reduction
Yi Fang, Guo-Niu Zhu, Yudi Zhao
et al.
High-speed motions performed by industrial machines can induce severe vibrations that degrade the positioning accuracy and efficiency. To address this issue, this paper proposes a novel motion profile design method utilizing a sinusoidal jerk model to generate fast and smooth motions with low vibrations. The expressions for the acceleration, velocity, and displacement were obtained through successive integrations of the continuous jerk profile. A minimum-time solution with actuator limits was formulated based on an analysis of the critical constraint conditions. Differing from previous studies, the current study introduces an analytical optimization procedure for the profile parameters to minimize both the motion duration and excitation frequency contents corresponding to the system pole. By examining the correlation between the input motion profiles and system responses, the conditions for vibration elimination were identified, highlighting the significance of specific time intervals in controlling the vibration amplitude. Numerical and experimental studies were conducted to validate the effectiveness of the proposed method. The comparative results illustrate that this method outperforms existing baseline techniques in terms of smoothness and vibration attenuation. The residual-vibration level and settling time are significantly reduced with the optimized sinusoidal jerk profile, even in the presence of modeling errors, contributing to higher productivity.
Technology, Engineering (General). Civil engineering (General)
Application of Image Processing Variation Model Based on Network Control Robot Image Transmission and Processing System in Multimedia Enhancement Technology
Yanmin Wu, Jinli Qi
The rapid development of the information age brings convenience to human life, but it also brings great challenges to information processing technology. Multimedia enhancement technology is an organic combination of multimedia technology and information processing technology, and it is also an important way of modern multimedia image information processing. However, its usefulness and effectiveness are increasingly negatively affected by the open information environment. The processing effect is also unable to meet the development requirements of the visual field. In order to improve this problem, this paper studied the image transmission and processing system of network-controlled robot on the basis of analyzing the characteristics of the problems existing in the current stage of multimedia technology. On this basis, a new image processing variational model was established and applied to multimedia enhancement technology, which improved the efficiency and effect of image information processing. Finally, the feasibility of its application function and performance was tested by experiments. The test results showed that in the difficult mode of the image processing task, the refresh time of the model in this paper in the multimedia enhancement technology was 1.13 s in total, which was not much different from the test results in the easy mode. Also, in the load stress test, the comprehensive test values under full-function operation and partial-function operation were 42.04% and 20.92%, respectively. Compared with the traditional model, the model in this paper has stronger carrying capacity in multimedia enhancement technology and has better processing ability and stability.
Mechanical engineering and machinery
Caring for Computers: The Hidden Work of Clinical Nurses during the Introduction of Health Information Systems in a Teaching Hospital in Taiwan
Feng-Tzu Huang
Implementing health information systems for enhancing patient care and management occurs worldwide. Discovering how nurses, as important system end-users, experience technology-reliant clinical practice involved focus groups (<i>n</i> = 25) and in-depth individual interviews with nurses (<i>n</i> = 4) and informatics staff (<i>n</i> = 3) in a major Taiwanese medical center. This qualitative study explores the unintended effects of these systems on nurses’ role and clinical practice. First, nurses’ additional role caring for computer devices supporting patient care involves highly-demanding invisible effort, especially when tackling system malfunctions affecting patients with urgent conditions. Second, nurses are resourceful in developing solutions to protect patients during unexpected technical malfunctions. Third, troubleshooting using telephone technical support as the first resort is problematic. It is argued that computerization requires nurses to care for co-clients: patients and computers. Managing technical malfunctions is an unintended consequence for nurses, reflecting the hidden work required by new technology.
Theoretical study of energy, inertia and nullity of phenylene and anthracene
Ahmad Zaheer, Mufti Zeeshan Saleem, Nadeem Muhammad Faisal
et al.
Energy of a molecule plays an important role in physics, chemistry and biology. In mathematics, the concept of energy is used in graph theory to help other subjects such as chemistry and physics. In graph theory, nullity is the number of zeros extracted from the characteristic polynomials obtained from the adjacency matrix, and inertia represents the positive and negative eigenvalues of the adjacency matrix. Energy is the sum of the absolute eigenvalues of its adjacency matrix. In this study, the inertia, nullity and signature of the aforementioned structures have been discussed.
Considered Factors of Online News Based on Respondents’ Eye Activity Using Eye-Tracker Analysis
Daniel Hadrian Yohandy, Djoko Budiyanto Setyohadi, Albertus Joko Santoso
Development of the internet as a source of information has penetrated many aspects of human life, which is shown in the increasingly diverse substance of news in online news sources. Previous studies have stated that the presentation of the substance of online news information can have negative impacts, especially the emergence of anxiety in users; thus, managing the presentation of information becomes important. This study intends to explore factors that should be considered as possible anxiety-inducers for readers of news sites. Analyses of areas of interest (AOIs), fixation, and heat maps from respondents’ eye activity obtained from eye-tracker data have been compiled with Beck Anxiety Inventory (BAI) measurement results to analyze anxiety among newsreaders. The results show that text is the dominant center of attention in various types of news. The reason for the higher anxiety that arises from text on online news sites is twofold. First, there are the respondents’ experiences. Second, text usage allows for boundless possibilities in respondents’ imaginations as a response to the news that has occurred.
An Experimental Analysis of Secure-Energy Trade-Off using Optimized Routing Protocol In modern-secure-WSN
S. Venkataramana, B.V.D.S. Sekhar, Bh. Raju
et al.
In modern secure Wireless Sensor Networks (WSN), the sensor-nodes need extra energy owing to secure transmission ofperceived information. So the energy-utilization of sensor-node should calculate while transfer the sensed-attributes securelyto network. In this experimentation, we are proposing a revised Low Energy Adaptive Clustering Hierarchy (LEACH)protocol as LEATCH along secure information transmission (privacy and node authentication) in various levels using Qualityof Protection Modeling Language (QoPML), which balance the Security-Energy trade-offs. This research experimentallyanalyzes the impact of data privacy, authentication operations on energy-utilization at sensor-node level while applying aLEACH & LEATCH. The obtained outcomes indicate the optimized LEATCH is outperforming correlated to the basic Leachwith respect to minimal energy-utilization, time efficiency and expands life-time of modern-secure-WSNs.
Management information systems
Quantum Image Encryption Scheme Using Arnold Transform and S-box Scrambling
Hui Liu, Bo Zhao, Linquan Huang
The paper proposes a lossless quantum image encryption scheme based on substitution tables (S-box) scrambling, mutation operation and general Arnold transform with keys. First, the key generator builds upon the foundation of SHA-256 hash with plain-image and a random sequence. Its output value is used to yield initial conditions and parameters of the proposed image encryption scheme. Second, the permutation and gray-level encryption architecture is built by discrete Arnold map and quantum chaotic map. Before the permutation of Arnold transform, the pixel value is modified by quantum chaos sequence. In order to get high scrambling and randomness, S-box and mutation operation are exploited in gray-level encryption stage. The combination of linear transformation and nonlinear transformation ensures the complexity of the proposed scheme and avoids harmful periodicity. The simulation shows the cipher-image has a fairly uniform histogram, low correlation coefficients closed to 0, high information entropy closed to 8. The proposed cryptosystem provides 2<sup>256</sup> key space and performs fast computational efficiency (speed = 11.920875 Mbit/s). Theoretical analyses and experimental results prove that the proposed scheme has strong resistance to various existing attacks and high level of security.
LPWAN – Low-power Wide-area Network. Communication for the Internet of Things.
Vladislav Viktorovich Sheshalevich
Recent advances in the field of cheaper sensors and various devices to control the parameters of industrial and household equipment has led to the emergence of new communication technologies, the so-called Internet of things, "machine-to-machine" or M2M technologies. The main feature of these technologies is a network communication of the physical objects without direct human intervention. The specifics of using the Low-power Wide-area Network (LPWAN network) for these new communication technologies are considered. The LPWAN technologies have significant prospects for development adding to already traditional technologies such as Wi-Fi and cellular. This very term describes an approach, the communication technologies, characterized by the principles of reducing the connection speed in order to achieve wider range and lower power consumption of end nodes. Based on this concept different companies have built the specific competing systems of communication, such as Sigfox (first LPWAN technology), LoRa (derived from Long Range) Ingenu RPMA, Weightless-P, “Strizh” telematics (the Russian analog of Sigfox) and others. Each of the systems applies different methods to increase the range of coverage, to lower energy consumption and to use different possibilities for scalability. The principles of functioning of these communication systems are analyzed below. The major attention is paid to describing the very popular LPWAN-technology LoRa as one of the most open technology for practical applications. It is based on the same name radio modulation using its own unique method to broaden a spectrum. The topology and the main components of this network, including the sensor (end device) with a radio module, the LoRa gateway and its network architecture are described in detail. Examples are given of the LoRa systems emerging on the domestic market of the Internet of things.
Information technology, Information theory
Applying Information Technology to Organization Design
H. Simon
Weighted Sum Transmit Power Minimization for Full-Duplex System With SWIPT and Self-Energy Recycling
Zhongwei Hu, Chaowei Yuan, Fengchao Zhu
et al.
This paper considers a full-duplex (FD) point-to-point system consisting of one multi-antenna FD access point (FD-AP) and one two-antenna FD mobile station (FD-MS). We adopt simultaneous wireless information and power transfer scheme and apply the self-energy recycling at FD-MS. In order to minimize the weighted sum transmit power, we jointly design the transmit beamforming vector of FD-AP, the receive power splitting ratio of FD-MS, and the transmit power value of FD-MS. Since the original problem is non-convex, we apply semidefinite relaxation and obtain a new convex problem. We further prove that both problems have exactly the same solutions. Finally, simulations are provided to verify our analysis, and the comparison with a half-duplex system demonstrates the significant performance gain from self-energy recycling.
Electrical engineering. Electronics. Nuclear engineering
Enhanced Secure Trusted AODV (ESTA) Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks
Dilraj Singh, Amardeep Singh
The self-organizing nature of the Mobile Ad hoc Networks (MANETs) provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV) protocol, Enhanced Secure Trusted AODV (ESTA), which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.