scispace - formally typeset
Search or ask a question

Showing papers in "Electronics in 2017"


Journal ArticleDOI
TL;DR: A review of state of charge (SoC) estimation for lithium-ion batteries is presented in this article, focusing on the description of the techniques and the elaboration of their weaknesses for the use in online battery management systems (BMS) applications.
Abstract: Energy storage emerged as a top concern for the modern cities, and the choice of the lithium-ion chemistry battery technology as an effective solution for storage applications proved to be a highly efficient option. State of charge (SoC) represents the available battery capacity and is one of the most important states that need to be monitored to optimize the performance and extend the lifetime of batteries. This review summarizes the methods for SoC estimation for lithium-ion batteries (LiBs). The SoC estimation methods are presented focusing on the description of the techniques and the elaboration of their weaknesses for the use in on-line battery management systems (BMS) applications. SoC estimation is a challenging task hindered by considerable changes in battery characteristics over its lifetime due to aging and to the distinct nonlinear behavior. This has led scholars to propose different methods that clearly raised the challenge of establishing a relationship between the accuracy and robustness of the methods, and their low complexity to be implemented. This paper publishes an exhaustive review of the works presented during the last five years, where the tendency of the estimation techniques has been oriented toward a mixture of probabilistic techniques and some artificial intelligence.

219 citations


Journal ArticleDOI
TL;DR: The role of CGM in the actual evolution of decision support systems for diabetes therapy is discussed and new possible horizons for wearable CGM sensor applications and perspectives in terms of big data analytics for personalized and proactive medicine are presented.
Abstract: Worldwide, the number of people affected by diabetes is rapidly increasing due to aging populations and sedentary lifestyles, with the prospect of exceeding 500 million cases in 2030, resulting in one of the most challenging socio-health emergencies of the third millennium. Daily management of diabetes by patients relies on the capability of correctly measuring glucose concentration levels in the blood by using suitable sensors. In recent years, glucose monitoring has been revolutionized by the development of Continuous Glucose Monitoring (CGM) sensors, wearable non/minimally-invasive devices that measure glucose concentration by exploiting different physical principles, e.g., glucose-oxidase, fluorescence, or skin dielectric properties, and provide real-time measurements every 1–5 min. CGM opened new challenges in different disciplines, e.g., medicine, physics, electronics, chemistry, ergonomics, data/signal processing, and software development to mention but a few. This paper first makes an overview of wearable CGM sensor technologies, covering both commercial devices and research prototypes. Then, the role of CGM in the actual evolution of decision support systems for diabetes therapy is discussed. Finally, the paper presents new possible horizons for wearable CGM sensor applications and perspectives in terms of big data analytics for personalized and proactive medicine.

155 citations


Journal ArticleDOI
TL;DR: An overview of transmission/reflection-based methods for the electromagnetic characterisation of materials is presented in this article, which is applicable to conventional transmission reflection devices such as coaxial cables or waveguides.
Abstract: An overview of transmission/reflection-based methods for the electromagnetic characterisation of materials is presented. The paper initially describes the most popular approaches for the characterisation of bulk materials in terms of dielectric permittivity and magnetic permeability. Subsequently, the limitations and the methods aimed at removing the ambiguities deriving from the application of the classical Nicolson–Ross–Weir direct inversion are discussed. The second part of the paper is focused on the characterisation of partially conductive thin sheets in terms of surface impedance via waveguide setups. All the presented measurement techniques are applicable to conventional transmission reflection devices such as coaxial cables or waveguides.

92 citations


Journal ArticleDOI
TL;DR: This paper is expected to serve as a comprehensive assessment and analysis of communication standards, cyber security issues and solutions for WSN based smart grid infrastructure.
Abstract: The existing power grid is going through a massive transformation. Smart grid technology is a radical approach for improvisation in prevailing power grid. Integration of electrical and communication infrastructure is inevitable for the deployment of Smart grid network. Smart grid technology is characterized by full duplex communication, automatic metering infrastructure, renewable energy integration, distribution automation and complete monitoring and control of entire power grid. Wireless sensor networks (WSNs) are small micro electrical mechanical systems that are deployed to collect and communicate the data from surroundings. WSNs can be used for monitoring and control of smart grid assets. Security of wireless sensor based communication network is a major concern for researchers and developers. The limited processing capabilities of wireless sensor networks make them more vulnerable to cyber-attacks. The countermeasures against cyber-attacks must be less complex with an ability to offer confidentiality, data readiness and integrity. The address oriented design and development approach for usual communication network requires a paradigm shift to design data oriented WSN architecture. WSN security is an inevitable part of smart grid cyber security. This paper is expected to serve as a comprehensive assessment and analysis of communication standards, cyber security issues and solutions for WSN based smart grid infrastructure.

87 citations


Journal ArticleDOI
TL;DR: This paper presents a detailed review of massive MIMO homogeneous, and heterogeneous systems, highlighting key system components, pros, cons, and research directions and emphasizes the advantage of employing millimeter wave (mmWave) frequency in the beamforming, and precoding operations in single, and multi-tier massive Mims.
Abstract: Massive multiple-input-multiple-output (MIMO) systems use few hundred antennas to simultaneously serve large number of wireless broadband terminals. It has been incorporated into standards like long term evolution (LTE) and IEEE802.11 (Wi-Fi). Basically, the more the antennas, the better shall be the performance. Massive MIMO systems envision accurate beamforming and decoding with simpler and possibly linear algorithms. However, efficient signal processing techniques have to be used at both ends to overcome the signaling overhead complexity. There are few fundamental issues about massive MIMO networks that need to be better understood before their successful deployment. In this paper, we present a detailed review of massive MIMO homogeneous, and heterogeneous systems, highlighting key system components, pros, cons, and research directions. In addition, we emphasize the advantage of employing millimeter wave (mmWave) frequency in the beamforming, and precoding operations in single, and multi-tier massive MIMO systems.

73 citations


Journal ArticleDOI
TL;DR: An obstacle avoidance system for low-cost Unmanned Aerial Vehicles using vision as the principal source of information through the monocular onboard camera using feature point detector Speeded Up Robust Features (SURF) for fast obstacle detection and a control law to avoid them is described.
Abstract: This paper describes an obstacle avoidance system for low-cost Unmanned Aerial Vehicles (UAVs) using vision as the principal source of information through the monocular onboard camera. For detecting obstacles, the proposed system compares the image obtained in real time from the UAV with a database of obstacles that must be avoided. In our proposal, we include the feature point detector Speeded Up Robust Features (SURF) for fast obstacle detection and a control law to avoid them. Furthermore, our research includes a path recovery algorithm. Our method is attractive for compact MAVs in which other sensors will not be implemented. The system was tested in real time on a Micro Aerial Vehicle (MAV), to detect and avoid obstacles in an unknown controlled environment; we compared our approach with related works.

72 citations


Journal ArticleDOI
TL;DR: In this paper, the overall research advancement in electronic and optoelectronic devices based on metal dichalcogenides (2D TMDCs) is summarized and discussed.
Abstract: Two-dimensional transition metal dichalcogenides (2D TMDCs) offer several attractive features for use in next-generation electronic and optoelectronic devices. Device applications of TMDCs have gained much research interest, and significant advancement has been recorded. In this review, the overall research advancement in electronic and optoelectronic devices based on TMDCs are summarized and discussed. In particular, we focus on evaluating field effect transistors (FETs), photovoltaic cells, light-emitting diodes (LEDs), photodetectors, lasers, and integrated circuits (ICs) using TMDCs.

72 citations


Journal ArticleDOI
TL;DR: In this paper, an interference detection method for multiuser-multiple input multiple output (MU-MIMO) transmission, which utilizes periodical preamble signals in the frequency domain and the concept of full-duplex transmission when assuming idle antennas at the access point (AP) in MU MIMO, is proposed.
Abstract: This paper proposes an interference detection method for multiuser-multiple input multiple output (MU-MIMO) transmission, which utilizes periodical preamble signals in the frequency domain and the concept of full-duplex transmission when assuming idle antennas at the access point (AP) in MU-MIMO. In the propose method, collision detection (CD) of MU-MIMO is achieved by utilizing asynchronous MU-MIMO called random access MU-MIMO. In random access MU-MIMO, several antennas that are not used for the transmission exist, due to asynchronous MU-MIMO. Hence, idle antennas at the AP can receive preamble signals while the transmit antennas at the AP transmit the preamble signals: this procedure is regarded as full-duplex transmission, which cancels the self-interference between AP antennas. The interference can be detected by subtracting the short preamble signal, which is multiplied by the estimated channel response using the received signal after the FFT processing. Moreover, we utilize dual polarization to reduce the mutual coupling between transmit and receive antennas at the AP. Through a computer simulation, it is shown that the proposed method can successfully detect collision from other user terminals (UTs) with OFDM signals when the interfering power from the interfering user terminal (IT) is greater than the noise power. In addition, the interfering power from IT at the AP and the desired user terminal (DT) is measured in an actual indoor environment, and the possibility of using the proposed method at the AP is discussed by using the measurement results.

64 citations


Journal ArticleDOI
TL;DR: An overview of this attack field is provided including attacks, threat directives and countermeasures to highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS) such systems are designed to provide.
Abstract: Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Operational Technology (OT) systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures) capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory). Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS) such systems are designed to provide.

50 citations


Journal ArticleDOI
TL;DR: The Raspberry Pi Foundation aims to promote the teaching of Computer Science and is inspired by devices such as the ZX81 and Spectrum, the first home computers from the 1980s, and government backed in-school devices.
Abstract: The Raspberry Pi Foundation aims to promote the teaching of Computer Science and is inspired by devices such as the ZX81 and Spectrum [1], the first home computers from the 1980s, and government backed in-school devices such as the BBC Acorn [2].[...]

49 citations


Journal ArticleDOI
TL;DR: In this paper, a review of the various types of sensors that have been developed for industries such as power generation, water treatment and services, mining, and the oil and gas sector has been performed.
Abstract: This paper reviews fiber Bragg grating sensing technology with respect to its use in mainstream industrial process applications. A review of the various types of sensors that have been developed for industries such as power generation, water treatment and services, mining, and the oil and gas sector has been performed. A market overview is reported as well as a discussion of some of the factors limiting their penetration into these markets. Furthermore, the author’s make recommendations for future work that would potentially provide significant opportunity for the advancement of fiber Bragg grating sensor networks in these mainstream industries.

Journal ArticleDOI
TL;DR: The design and implementation of a low-cost system for monitoring and remote control of a greenhouse using fuzzy logic and the use of resources for a gable roof greenhouse prototype was optimized.
Abstract: The design and implementation of a low-cost system for monitoring and remote control of a greenhouse using fuzzy logic is presented. For the control system, an Arduino Mega board was programmed with a fuzzy algorithm to monitor and perform control actions for environmental temperature, soil moisture, relative humidity, and lighting. A website was designed to visualize the main indicators of agricultural interest and to get access to tools such as forced ventilation, misting systems, and sprinkler irrigation. For connectivity to the webpage, an Arduino Ethernet Shield was used. Thus, it was possible to establish a local area network and monitor and control the greenhouse climate variables manually or automatically. The application designed allowed access to the configuration, monitoring, and control of climatic conditions in the greenhouse. The effectiveness of fuzzy logic to control nonlinear systems was therefore verified without the mathematical model of the plant. Thus, the use of resources for a gable roof greenhouse prototype was optimized.

Journal ArticleDOI
TL;DR: The main result of the numerical investigation performed is that non-uniform arrays are the natural choice in this kind of application, and it is shown that it is possible to achieve a better average condition number of the channel matrix and a significantly higher spectral efficiency.
Abstract: The aim of this paper is to analyze the array synthesis for 5 G massive MIMO systems in the line-of-sight working condition The main result of the numerical investigation performed is that non-uniform arrays are the natural choice in this kind of application In particular, by using non-equispaced arrays, we show that it is possible to achieve a better average condition number of the channel matrix and a significantly higher spectral efficiency Furthermore, we verify that increasing the array size is beneficial also for circular arrays, and we provide some useful rules-of-thumb for antenna array design for massive MIMO applications These results are in contrast to the widely-accepted idea in the 5 G massive MIMO literature, in which the half-wavelength linear uniform array is universally adopted

Journal ArticleDOI
TL;DR: A genetic algorithm is proposed that is hybridized with the stochastic evolution algorithm to allocate and schedule real-time tasks with precedence constraints and outperforms the other algorithms in terms of solution quality.
Abstract: Minimizing power consumption to prolong battery life has become an important design issue for portable battery-operated devices such as smartphones and personal digital assistants (PDAs) On a Dynamic Voltage Scaling (DVS) enabled processor, power consumption can be reduced by scaling down the operating frequency of the processor whenever the full processing speed is not required Real-time task scheduling is a complex and challenging problem for DVS-enabled multiprocessor systems This paper first formulates the real-time task scheduling for DVS-enabled multiprocessor systems as a combinatorial optimization problem It then proposes a genetic algorithm that is hybridized with the stochastic evolution algorithm to allocate and schedule real-time tasks with precedence constraints It presents specialized crossover and perturb operations as well as a topology preserving algorithm to generate the initial population A comprehensive simulation study has been done using synthetic and real benchmark data to evaluate the performance of the proposed Hybrid Genetic Algorithm (HGA) in terms of solution quality and efficiency The performance of the proposed HGA has been compared with the genetic algorithm, particle swarm optimization, cuckoo search, and ant colony optimization The simulation results show that HGA outperforms the other algorithms in terms of solution quality

Journal ArticleDOI
TL;DR: In this paper, the electromagnetic field and the specific absorption rate (SAR) have been calculated through an accurate finite-difference time-domain (FDTD) dispersive modeling based on the fractional derivative operator.
Abstract: Electromagnetic fields are involved in several therapeutic and diagnostic applications such as hyperthermia and electroporation. For these applications, pulsed electric fields (PEFs) and transient phenomena are playing a key role for understanding the biological response due to the exposure to non-ionizing wideband pulses. To this end, the PEF propagation in the six-layered planar structure modeling the human head has been studied. The electromagnetic field and the specific absorption rate (SAR) have been calculated through an accurate finite-difference time-domain (FDTD) dispersive modeling based on the fractional derivative operator. The temperature rise inside the tissues due to the electromagnetic field exposure has been evaluated using both the non-thermoregulated and thermoregulated Gagge’s two-node models. Moreover, additional parametric studies have been carried out with the aim to investigate the thermal response by changing the amplitude and duration of the electric pulses.

Journal ArticleDOI
TL;DR: In this paper, specular, large area films of γ-InSe and Sb2Se3 can be grown via atomic layer deposition (ALD) at relatively low temperatures, and the properties of these films have been measured and compared to those reported for exfoliated films and have been found to be similar.
Abstract: Metal chalcogenides based on the C–M–M–C (C = chalcogen, M = metal) structure possess several attractive properties that can be utilized in both electrical and optical devices. We have shown that specular, large area films of γ-InSe and Sb2Se3 can be grown via atomic layer deposition (ALD) at relatively low temperatures. Optical (absorption, Raman), crystalline (X-ray diffraction), and composition (XPS) properties of these films have been measured and compared to those reported for exfoliated films and have been found to be similar. Heterostructures composed of a layer of γ-InSe (intrinsically n-type) followed by a layer of Sb2Se3 (intrinsically p-type) that display diode characteristics were also grown.

Journal ArticleDOI
TL;DR: The results suggest that PACT2.0 presents a reliable platform for studying of smoking behavior at the community level.
Abstract: This paper presents the development and validation of a novel multi-sensory wearable system (Personal Automatic Cigarette Tracker v2 or PACT2.0) for monitoring of cigarette smoking in free-living conditions. The contributions of the PACT2.0 system are: (1) the implementation of a complete sensor suite for monitoring of all major behavioral manifestations of cigarette smoking (lighting events, hand-to-mouth gestures, and smoke inhalations); (2) a miniaturization of the sensor hardware to enable its applicability in naturalistic settings; and (3) an introduction of new sensor modalities that may provide additional insight into smoking behavior e.g., Global Positioning System (GPS), pedometer and Electrocardiogram(ECG) or provide an easy-to-use alternative (e.g., bio-impedance respiration sensor) to traditional sensors. PACT2.0 consists of three custom-built devices: an instrumented lighter, a hand module, and a chest module. The instrumented lighter is capable of recording the time and duration of all lighting events. The hand module integrates Inertial Measurement Unit (IMU) and a Radio Frequency (RF) transmitter to track the hand-to-mouth gestures. The module also operates as a pedometer. The chest module monitors the breathing (smoke inhalation) patterns (inductive and bio-impedance respiratory sensors), cardiac activity (ECG sensor), chest movement (three-axis accelerometer), hand-to-mouth proximity (RF receiver), and captures the geo-position of the subject (GPS receiver). The accuracy of PACT2.0 sensors was evaluated in bench tests and laboratory experiments. Use of PACT2.0 for data collection in the community was validated in a 24 h study on 40 smokers. Of 943 h of recorded data, 98.6% of the data was found usable for computer analysis. The recorded information included 549 lighting events, 522/504 consumed cigarettes (from lighter data/self-registered data, respectively), 20,158/22,207 hand-to-mouth gestures (from hand IMU/proximity sensor, respectively) and 114,217/112,175 breaths (from the respiratory inductive plethysmograph (RIP)/bio-impedance sensor, respectively). The proposed system scored 8.3 ± 0.31 out of 10 on a post-study acceptability survey. The results suggest that PACT2.0 presents a reliable platform for studying of smoking behavior at the community level.

Journal ArticleDOI
TL;DR: In this article, a review of the widely-adopted Doherty power amplifier and of the other load-modulation efficiency enhancement techniques is presented, and the main theoretical aspects behind each method are introduced, and most relevant practical implementations available in recent literature are reported and discussed.
Abstract: Modern mobile communication signals require power amplifiers able to maintain very high efficiency in a wide range of output power levels, which is a major issue for classical power amplifier architectures. Following the load-modulation approach, efficiency enhancement is achieved by dynamically changing the amplifier load impedance as a function of the input power. In this paper, a review of the widely-adopted Doherty power amplifier and of the other load-modulation efficiency enhancement techniques is presented. The main theoretical aspects behind each method are introduced, and the most relevant practical implementations available in recent literature are reported and discussed.

Journal ArticleDOI
TL;DR: The security of the proposed ECDSA processor is analyzed against the no correctness check for input points and restart attacks, and different types of RNG will be implemented in order to choose the most appropriate one.
Abstract: The Elliptic Curve Digital Signature Algorithm(ECDSA) is the analog to the Digital Signature Algorithm(DSA). Based on the elliptic curve, which uses a small key compared to the others public-key algorithms, ECDSA is the most suitable scheme for environments where processor power and storage are limited. This paper focuses on the hardware implementation of the ECDSA over elliptic curveswith the 163-bit key length recommended by the NIST (National Institute of Standards and Technology). It offers two services: signature generation and signature verification. The proposed processor integrates an ECC IP, a Secure Hash Standard 2 IP (SHA-2 Ip) and Random Number Generator IP (RNG IP). Thus, all IPs will be optimized, and different types of RNG will be implemented in order to choose the most appropriate one. A co-simulation was done to verify the ECDSA processor using MATLAB Software. All modules were implemented on a Xilinx Virtex 5 ML 50 FPGA platform; they require respectively 9670 slices, 2530 slices and 18,504 slices. FPGA implementations represent generally the first step for obtaining faster ASIC implementations. Further, the proposed design was also implemented on an ASIC CMOS 45-nm technology; it requires a 0.257 mm2 area cell achieving a maximum frequency of 532 MHz and consumes 63.444 (mW). Furthermore, in this paper, we analyze the security of our proposed ECDSA processor against the no correctness check for input points and restart attacks.

Journal ArticleDOI
TL;DR: In this paper, a bistatic radar configuration named BIRALET (BIstatic RAdar for LEO Tracking) is used to detect a set of space debris at 410 MHz, using the Sardinia Radio Telescope as the receiver antenna.
Abstract: Space debris are orbiting objects that represent a major threat for space operations. The most used countermeasure to face this threat is, by far, collision avoidance, namely the set of maneuvers that allow to avoid a collision with the space debris. Since collision avoidance is tightly related to the knowledge of the debris state (position and speed), the observation of the orbital debris is the key of the problem. In this work a bistatic radar configuration named BIRALET (BIstatic RAdar for LEO Tracking) is used to detect a set of space debris at 410 MHz, using the Sardinia Radio Telescope as the receiver antenna. The signal-to-noise ratio, the Doppler shift and the frequency spectrum for each debris are reported.

Journal ArticleDOI
TL;DR: In this review article for Internet of Things (IoT) applications, important low-power design techniques for digital and mixed-signal analog–digital converter (ADC) circuits are presented and a novel ultra-low power design using bio-inspired neuromorphic computing and spiking neural network security are discussed.
Abstract: In this review article for Internet of Things (IoT) applications, important low-power design techniques for digital and mixed-signal analog–digital converter (ADC) circuits are presented. Emerging low voltage logic devices and non-volatile memories (NVMs) beyond CMOS are illustrated. In addition, energy-constrained hardware security issues are reviewed. Specifically, light-weight encryption-based correlational power analysis, successive approximation register (SAR) ADC security using tunnel field effect transistors (FETs), logic obfuscation using silicon nanowire FETs, and all-spin logic devices are highlighted. Furthermore, a novel ultra-low power design using bio-inspired neuromorphic computing and spiking neural network security are discussed.

Journal ArticleDOI
TL;DR: In this article, a modified Biolek model is proposed for computer simulations of titanium dioxide memristors for a large region of memristor voltages, which is based both on the Generalized Boundary Condition Memristor (GBCM) model and on the Bioleek model, but it has an improved property that an increased extent of nonlinearity of the ionic drift due to the additional weighted sinusoidal window function.
Abstract: The main idea of the present research is to propose a new memristor model with a highly nonlinear ionic drift suitable for computer simulations of titanium dioxide memristors for a large region of memristor voltages. For this purpose, a combination of the original Biolek window function and a weighted sinusoidal window function is applied. The new memristor model is based both on the Generalized Boundary Condition Memristor (GBCM) Model and on the Biolek model, but it has an improved property—an increased extent of nonlinearity of the ionic drift due to the additional weighted sinusoidal window function. The modified memristor model proposed here is compared with the Pickett memristor model, which is used here as a reference model. After that, the modified Biolek model is adjusted so that its basic relationships are made almost identical with these of the Pickett model. After several simulations of our new model, it is established that its behavior is similar to the realistic Pickett model but it operates without convergence problems and due to this, it is also appropriate for computer simulations. The modified memristor model proposed here is also compared with the Joglekar memristor model and several advantages of the new model are established.

Journal ArticleDOI
TL;DR: In this paper, the successful exploitation of harmonic radar for moving target imaging and synthetic aperture imaging of targets, while suppressing clutter signals from linear targets, is presented, which demonstrates some unique advantages of nonlinear radar over its traditional linear counterpart.
Abstract: Nonlinear radar exploits the difference in frequency between radar waves that illuminate and are reflected from electromagnetically nonlinear targets. Harmonic radar is a special type of nonlinear radar that transmits one or multiple frequencies and listens for frequencies at or near their harmonics. Nonlinear radar differs from traditional linear radar by offering high clutter rejection and is particularly suited to the detection of devices containing metals and semiconductors. Examples include tags for tracking insects, tags worn by humans for avoiding collisions with vehicles, or for monitoring vital signs. Such tags contain a radio-frequency (RF) nonlinearity, often a Schottky diode, connected to a suitable antenna. Targets with inherent nonlinearities, such as metal contacts, semiconductors, transmission lines, antennas, filters, and ferroelectrics, also respond to nonlinear radar. In this paper, the successful exploitation of harmonic radar for moving target imaging and synthetic aperture imaging of targets, while suppressing clutter signals from linear targets, are presented. Our results demonstrate some unique advantages of harmonic radar over its traditional linear counterpart.

Journal ArticleDOI
TL;DR: The objective of this research is to suggest a design concept which combines IoT and object‐oriented radio frequency identification (RFID) and an experimental IoT system using object‐ oriented RFID was designed and implemented.
Abstract: The Internet of Things (IoT) has increasingly become important in industry. Connectivity over the internet of not only people but also devices (such as sensors, appliances, machines, robots, and vehicles) is leading to a paradigm shift in manufacturing. The Japanese government recognizes this and has stated that IoT connectivity and the methodologies to exploit it are paramount for Japanese industry. Currently, the necessary changes have been realized in large Japanese companies; however, implementation in smaller companies has been lagging, despite the advantages of introducing IoT technologies, due to the high cost. The objective of this research is to suggest a design concept which combines IoT and object‐oriented radio frequency identification (RFID). IoT technology is used for collecting, analyzing, and managing data, and an object‐oriented RFID system is used as a control process in manufacturing systems. In previous research, the objectoriented RFID system was shown to provide flexible management through the use of a variety of OORFID tags. The current research extends this by introducing object‐oriented RFID into IoT systems to improve the flexibility in the manufacturing systems. For the verification of this concept, an experimental IoT system using object‐oriented RFID was designed and implemented

Journal ArticleDOI
TL;DR: This paper proposes to insert the multiplexer (MUX) with two cases: (i) the authors randomly insert MUXs equal to half of the output bit number (half MUX insertions); and (ii) they insertMUXsequal to the number of output bits (full MUXinsertions).
Abstract: Due to the outsourcing of chip manufacturing, countermeasures against Integrated Circuit (IC) piracy, reverse engineering, IC overbuilding and hardware Trojans (HTs) become a hot research topic. To protect an IC from these attacks, logic encryption techniques have been considered as a low-cost defense mechanism. In this paper, our proposal is to insert the multiplexer (MUX) with two cases: (i) we randomly insert MUXs equal to half of the output bit number (half MUX insertions); and (ii) we insert MUXs equal to the number of output bits (full MUX insertions). Hamming distance is adopted as a security evaluation. We also measure the delay, power and area overheads with the proposed technique.

Proceedings ArticleDOI
TL;DR: The results demonstrate that ABC algorithm based FOPID controlled systems perform significantly better performance than the other ones.
Abstract: This paper provides a discussion on the performance of the fractional order proportional-integral-derivative (FOPID)controllers designed by using artificial bee colony (ABC) algorithm for fractional order systems. Some measures of the step response, i.e., integral of time weighted absolute error (ITAE), integrated squared error (ISE), settling time, and overshoot, are used to evaluate the performance of the FOPID controlled systems. Simulation experiments are compared with the success of the classical PID controllers optimized by the ABC algorithm, and with the other methods given in literature. The results demonstrate that ABC algorithm based FOPID controlled systems perform significantly better performance than the other ones.

Journal ArticleDOI
TL;DR: In this article, the key points towards an efficient and commercially available solution by briefly reviewing the relevant literature and identifying five factors that should be addressed in order to reach an efficient solution.
Abstract: The increasing demand for more efficient energy harvesting solutions has urged research for better harvesting solutions than the presently-available ones. While p-n junction solar cells have become commercially widespread, they are expensive and suffer from poor efficiency figures hardly reaching 20%. Other radiation-electricity converters such as rectennas have a theoretical limit in excess of 80%. However, no efficient rectenna solution for the terahertz frequency band has been commercialized or presented in the academic literature. In fact, there are many obstructions to an efficient solution. The aim of this paper is to address the key points towards an efficient and commercially-available solution by briefly reviewing the relevant literature and so identifying five factors that should be addressed in order to reach an efficient solution.

Journal ArticleDOI
TL;DR: The extensive experiments on different recognition tasks for physical, mental and eye-based activities validate the effectiveness, generality and usability of the codebook approach, which groups numerous subsequences collected from sequences into clusters.
Abstract: With the recent spread of mobile devices equipped with different sensors, it is possible to continuously recognise and monitor activities in daily life This sensor-based human activity recognition is formulated as sequence classification to categorise sequences of sensor values into appropriate activity classes One crucial problem is how to model features that can precisely represent characteristics of each sequence and lead to accurate recognition It is laborious and/or difficult to hand-craft such features based on prior knowledge and manual investigation about sensor data To overcome this, we focus on a feature learning approach that extracts useful features from a large amount of data In particular, we adopt a simple but effective one, called codebook approach, which groups numerous subsequences collected from sequences into clusters Each cluster centre is called a codeword and represents a statistically distinctive subsequence Then, a sequence is encoded as a feature expressing the distribution of codewords The extensive experiments on different recognition tasks for physical, mental and eye-based activities validate the effectiveness, generality and usability of the codebook approach

Journal ArticleDOI
TL;DR: EEMD was found to be a reliable, low latency, data-driven denoising technique with respect to the control SA method, achieving signal-to-noise ratio (SNR) enhancement to a standard closer to the SA control method, particularly on the upper arm-ECG bipolar leads.
Abstract: Abnormal heart rhythms (arrhythmias) are a major cause of cardiovascular disease and death in Europe. Sudden cardiac death accounts for 50% of cardiac mortality in developed countries; ventricular tachycardia or ventricular fibrillation is the most common underlying arrhythmia. In the ambulatory population, atrial fibrillation is the most common arrhythmia and is associated with an increased risk of stroke and heart failure, particularly in an aging population. Early detection of arrhythmias allows appropriate intervention, reducing disability and death. However, in the early stages of disease arrhythmias may be transient, lasting only a few seconds, and are thus difficult to detect. This work addresses the problem of extracting the far-field heart electrogram signal from noise components, as recorded in bipolar leads along the left arm, using a data driven ECG (electrocardiogram) denoising algorithm based on ensemble empirical mode decomposition (EEMD) methods to enable continuous non-invasive monitoring of heart rhythm for long periods of time using a wrist or arm wearable device with advanced biopotential sensors. Performance assessment against a control denoising method of signal averaging (SA) was implemented in a pilot study with 34 clinical cases. EEMD was found to be a reliable, low latency, data-driven denoising technique with respect to the control SA method, achieving signal-to-noise ratio (SNR) enhancement to a standard closer to the SA control method, particularly on the upper arm-ECG bipolar leads. Furthermore, the SNR performance of the EEMD was improved when assisted with an FFT (fast Fourier transform ) thresholding algorithm (EEMD-fft).

Journal ArticleDOI
TL;DR: A polymorphic logic gate is designed using silicon nanowire field effect transistors (SiNW FETs) to replace the conventional Exclusive-OR (XOR)-based logic cone and evaluated based on security metric and performance overhead.
Abstract: The outsourcing of integrated circuit (IC) fabrication services to overseas manufacturing foundry has raised security and privacy concerns with regard to intellectual property (IP) protection as well as the integrity maintenance of the fabricated chips. One way to protect ICs from malicious attacks is to encrypt and obfuscate the IP design by incorporating additional key gates, namely logic encryption or logic locking. The state-of-the-art logic encryption techniques certainly incur considerable performance overhead upon the genuine IP design. The focus of this paper is to leverage the unique property of emerging transistor technology on reducing the performance overhead as well as preserving the robustness of logic locking technique. We design the polymorphic logic gate using silicon nanowire field effect transistors (SiNW FETs) to replace the conventional Exclusive-OR (XOR)-based logic cone. We then evaluate the proposed technique based on security metric and performance overhead.