Next Issue
Volume 11, November-1
Previous Issue
Volume 11, October-1
 
 

Electronics, Volume 11, Issue 20 (October-2 2022) – 162 articles

Cover Story (view full-size image): Using graphene in different situations can be a cutting-edge solution for biomedical devices and other applications. Different layers of graphene-based materials and their varied morphologies will play significant roles in biomedical applications in the next decade and shape the future of therapeutics. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
12 pages, 3580 KiB  
Article
Reflection Suppression through Modal Filtering for Wideband Antenna Measurement in a Non-Absorbent Environment
by Yao Su and Shuxi Gong
Electronics 2022, 11(20), 3422; https://doi.org/10.3390/electronics11203422 - 21 Oct 2022
Cited by 3 | Viewed by 1153
Abstract
In order to reduce the influence of multi-path effects on the measurement results of wideband antennas, this paper proposes a method for suppressing interference in wideband antenna measurements based on modal filtering technology. This paper introduces the theory and operation process of modal [...] Read more.
In order to reduce the influence of multi-path effects on the measurement results of wideband antennas, this paper proposes a method for suppressing interference in wideband antenna measurements based on modal filtering technology. This paper introduces the theory and operation process of modal filtering, establishes the relationship between the distribution of modal coefficient terms and the location of the antenna and external interference sources, and clearly reveals the principle of filtering interference through modal filtering. It is pointed out that each location of interference sources corresponds to different pattern items. Filtering out the power of the pattern term generated by the interference source is equivalent to filtering out the interference caused by the interference source. The sources filtered by this technology are external sources that are spatially separated from the antenna, including external sources, environmental reflections, and device reflections, among others. This feature makes it possible to be used for testing in a non-absorbent environment. Its ability to operate at almost any frequency makes it ideal for suppressing interference effects in wideband antenna measurement. This paper demonstrates a recent advance wherein modal filtering techniques are used in interference suppression for wideband antenna non-absorbent measurement. In the full bandwidth range of the wideband antenna, we verify the method through numerical simulation analysis and practical measurement. In the numerical simulation, we obtain that 15 dB interference can be filtered out at the −25 dB level and 5 dB interference can be filtered out at the −35 dB level. In the experiments, within the broadband antenna bandwidth, we found that 2.5 dB can be filtered at the −10 dB level at 4 GHz, 3 dB is filtered at the −10 dB level at 6 GHz, and 5 dB is filtered at the −10 dB level at 7.5 GHz. All of the above results prove that the proposed method can effectively suppress the multi-path interference in wideband non-absorbent antenna measurement and improve the measurement results. Full article
(This article belongs to the Special Issue Wideband and Multiband Antennas for Wireless Applications)
Show Figures

Figure 1

24 pages, 241265 KiB  
Article
Novel Hybrid Fusion-Based Technique for Securing Medical Images
by Hanaa A. Abdallah, Reem Alkanhel and Abdelhamied A. Ateya
Electronics 2022, 11(20), 3421; https://doi.org/10.3390/electronics11203421 - 21 Oct 2022
Cited by 1 | Viewed by 1324
Abstract
The security of images has gained great interest in modern communication systems. This is due to the massive critical applications that are based on images. Medical imaging is at the top of these applications. However, the rising number of heterogenous attacks push toward [...] Read more.
The security of images has gained great interest in modern communication systems. This is due to the massive critical applications that are based on images. Medical imaging is at the top of these applications. However, the rising number of heterogenous attacks push toward the development of securing algorithms and methods for imaging systems. To this end, this work considers developing a novel authentication, intellectual property protection, ownership, and security technique for imaging systems, mainly for medical imaging. The developed algorithm includes two security modules for safeguarding various picture kinds. The first unit is accomplished by applying watermarking authentication in the frequency domain. The singular value decomposition (SVD) is performed for the host image’s discrete cosine transform (DCT) coefficients. The singular values (S) are divided into 64 × 64 non-overlapping blocks, followed by embedding the watermark in each block to be robust to any attack. The second unit is made up of two encryption layers to provide double-layer security to the watermarked image. The double random phase encryption (DRPE) and chaotic encryption have been tested and examined in the encryption unit. The suggested approach is resistant to common image processing attacks, including rotation, cropping, and adding Gaussian noise, according to the findings of the experiments. The encryption of watermarked images in the spatial and DCT domains and fused watermarked images in the DCT domain are all discussed. The transparency and security of the method are assessed using various measurements. The proposed approach achieves high-quality reconstructed watermarks and high security by using encryption to images and achieves robustness against any obstructive attacks. The developed hybrid algorithm recovers the watermark even in the presence of an attack with a correlation near 0.8. Full article
(This article belongs to the Special Issue Multimedia Processing: Challenges and Prospects)
Show Figures

Figure 1

13 pages, 6165 KiB  
Article
On-Chip Bandstop to Bandpass Reconfigurable Filters Using Semiconductor Distributed Doped Areas (ScDDAs)
by Rozenn Allanic, Fabien Le Borgne, Hassan Bouazzaoui, Denis Le Berre, Cédric Quendo, Douglas Silva De Vasconcellos, Virginie Grimal, Damien Valente and Jérôme Billoué
Electronics 2022, 11(20), 3420; https://doi.org/10.3390/electronics11203420 - 21 Oct 2022
Cited by 1 | Viewed by 1163
Abstract
This paper presents two novel on-chip bandstop to bandpass reconfigurable filters in C and X bands. Designed on a silicon substrate, filter reconfigurability is achieved using semiconductor-distributed doped areas (ScDDAs), such as an N+PP+ junction integrated into the substrate. The [...] Read more.
This paper presents two novel on-chip bandstop to bandpass reconfigurable filters in C and X bands. Designed on a silicon substrate, filter reconfigurability is achieved using semiconductor-distributed doped areas (ScDDAs), such as an N+PP+ junction integrated into the substrate. The active element is therefore co-designed with the passive parts, allowing flexibility in ScDDA size and position. This flexibility offers advantages in terms of integration, ease of manufacture, and performance. The synthesis was developed in the OFF-state in order to match with the well-known one in the ON-state. As proof of concept, 5 GHz and 10 GHz filters were built. The simulated and measured results showed good agreement in both bandpass and bandstop configurations. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

8 pages, 590 KiB  
Article
Effects of Introducing Confluence Rings on Ground Loss Resistance of VLF Umbrella-Type Antenna
by Ying Quan, Hui Xie, Cheng Yang, Hang Yu and Xinmiao Liu
Electronics 2022, 11(20), 3419; https://doi.org/10.3390/electronics11203419 - 21 Oct 2022
Viewed by 978
Abstract
In this work, we analyze the influence of introducing confluence rings on the ground loss resistance in the ground grid system of the VLF umbrella-type transmitting antenna. The geometric deconstruction model of the confluence ring, the model of the VLF umbrella-type transmitting antenna, [...] Read more.
In this work, we analyze the influence of introducing confluence rings on the ground loss resistance in the ground grid system of the VLF umbrella-type transmitting antenna. The geometric deconstruction model of the confluence ring, the model of the VLF umbrella-type transmitting antenna, the models of the umbrella-type antenna ground grid system, and the formulae for the average conductivity are established. The working principle of the confluence ring was analyzed, and the ground loss resistance of the confluence ring structure with different numbers of layers and varying degrees of wire damage was simulated using Feko. The simulation results demonstrated the effect of increasing the number of confluence ring layers on the ground loss resistance of a fully functional grid to be relatively weak. However, when the ground grid wire is broken, the confluence ring structure can effectively reduce the ground loss resistance, thereby improving the radiation efficiency of the antenna. Full article
Show Figures

Figure 1

14 pages, 3728 KiB  
Article
Hybrid Modulated DCDC Boost Converter for Wearable Devices
by Tong Li and Yebing Gan
Electronics 2022, 11(20), 3418; https://doi.org/10.3390/electronics11203418 - 21 Oct 2022
Cited by 2 | Viewed by 1333
Abstract
Wearable devices require power management systems to achieve high conversion efficiency over a wide range of load currents. Multi-mode mixed modulation can be used in DCDC converters to achieve high efficiency over a wide load current range. The DCDC boost converter proposed in [...] Read more.
Wearable devices require power management systems to achieve high conversion efficiency over a wide range of load currents. Multi-mode mixed modulation can be used in DCDC converters to achieve high efficiency over a wide load current range. The DCDC boost converter proposed in this paper uses a hybrid modulation of DGM (Deep Green Control Mode), PCMC (Peak current mode control)-PFM (Pulse Frequency Modulation) and PCMC-PWM (Pulse Width Modulation). The converter switches smoothly from PCMC-PFM to PCMC-PWM mode under load-current-based conditions and without any mode selection module. The proposed DCDC boost converter is fabricated in a 0.18 μm CMOS process with a Die area of 1.24 × 0.78 μm2. The input voltage range is 0.8–5 V, the output voltage is 5 V, and the load current range is 5–300 mA. Experimental results show that the boost converter can achieve 94.7% peak efficiency. Efficiency of more than 90% can be achieved in the load current range of 30–300 mA. Full article
(This article belongs to the Section Microelectronics)
Show Figures

Figure 1

12 pages, 948 KiB  
Article
Electrical Characterization of Through-Silicon-via-Based Coaxial Line for High-Frequency 3D Integration (Invited Paper)
by Zhibo Zhao, Jinkai Li, Haoyun Yuan, Zeyu Wang, Giovanni Gugliandolo, Nicola Donato, Giovanni Crupi, Liming Si and Xiue Bao
Electronics 2022, 11(20), 3417; https://doi.org/10.3390/electronics11203417 - 21 Oct 2022
Cited by 4 | Viewed by 1569
Abstract
Through-silicon-via (TSV)-based coaxial line techniques can reduce the high-frequency loss due to the low resistivity in the silicon substrate and thus can improve the efficiency of vertical signal transmission. Moreover, a TSV-based coaxial structure allows easily realizing the impedance matching in RF/microwave systems [...] Read more.
Through-silicon-via (TSV)-based coaxial line techniques can reduce the high-frequency loss due to the low resistivity in the silicon substrate and thus can improve the efficiency of vertical signal transmission. Moreover, a TSV-based coaxial structure allows easily realizing the impedance matching in RF/microwave systems for excellent electrical performance. However, due to the limitations of existing available dielectric materials and the difficulties and challenges in the manufacturing process, ideal coaxial TSVs are not easy to obtain, and thus, the achieved electrical performance might be unexpected. In order to increase the flexibility of designing and manufacturing TSV-based coaxial structures and to better evaluate the fabricated devices, modeling and analysis theories of the corresponding high-frequency electrical performance are proposed in the paper. The theories are finally well validated using the finite-element simulation results, hereby providing guiding rules for selecting materials and improving manufacturing techniques in the practical process, so as to optimize the high-frequency performance of the TSV structures. Full article
(This article belongs to the Special Issue Advanced RF, Microwave Engineering, and High-Power Microwave Sources)
Show Figures

Figure 1

17 pages, 2920 KiB  
Article
Entity-Based Integration Framework on Social Unrest Event Detection in Social Media
by Ao Shen and Kam Pui Chow
Electronics 2022, 11(20), 3416; https://doi.org/10.3390/electronics11203416 - 21 Oct 2022
Viewed by 1298
Abstract
Social unrest events have been an issue of concern to people in various countries. In the past few years, mass unrest events appeared in many countries. Meanwhile, social media has become a distinctive method of spreading event information. It is necessary to construct [...] Read more.
Social unrest events have been an issue of concern to people in various countries. In the past few years, mass unrest events appeared in many countries. Meanwhile, social media has become a distinctive method of spreading event information. It is necessary to construct an effective method to analyze the unrest events through social media platforms. Existing methods mainly target well-labeled data and take relatively little account of the event development. This paper proposes an entity-based integration event detection framework for event extraction and analysis in social media. The framework integrates two modules. The first module utilizes named entity recognition technology based on the bidirectional encoder representation from transformers (BERT) algorithm to extract the event-related entities and topics of social unrest events during social media communication. The second module suggests the K-means clustering method and dynamic topic model (DTM) for dynamic analysis of these entities and topics. As an experimental scenario, the effectiveness of the framework is demonstrated using the Lihkg discussion forum and Twitter from 1 August 2019 to 31 August 2020. In addition, the comparative experiment is performed to reveal the differences between Chinese users on Lihkg and Twitter for comparative social media studies. The experiment results somehow indicate the characteristic of social unrest events that can be found in social media. Full article
Show Figures

Figure 1

19 pages, 11064 KiB  
Article
TCP Parameters Monitoring of Robotic Stations
by Andrzej Burghardt, Dariusz Szybicki, Piotr Gierlak, Krzysztof Kurc, Magdalena Muszyńska, Artur Ornat and Marek Uliasz
Electronics 2022, 11(20), 3415; https://doi.org/10.3390/electronics11203415 - 21 Oct 2022
Cited by 1 | Viewed by 1975
Abstract
The impulse for writing the paper is the observation of the works related to the implementation of robotization of processes such as machining, glue application, welding and painting. The abovementioned processes, in addition to the correct implementation of the trajectory, require the definition [...] Read more.
The impulse for writing the paper is the observation of the works related to the implementation of robotization of processes such as machining, glue application, welding and painting. The abovementioned processes, in addition to the correct implementation of the trajectory, require the definition of various parameters (e.g., speed) in the robot’s software. In the trajectories where the reconfiguration of the robot arms is observed, there are significant errors in the implementation of the defined speed. Robotic technology suppliers, in the event of speed disturbances, manually increase the defined speed value or experimentally select other parameters. It is a cumbersome process, and the lack of information about the process parameters makes it time-consuming and inaccurate. In this paper, one representative process is selected, namely machining performed with various tools by ABB robots. In order for the robotic process to be controlled, it is necessary to compare the defined path with the speed profile. Then, the speed parameters can be controlled and corrected. The approach proposed in the paper allows for improving the quality of implemented robotic processes. It presents the available IT tools for station monitoring and how to use them. The advantages of the proposed solutions and their limitations are shown in the examples of implementation of robotic stations in the industry. Full article
Show Figures

Figure 1

20 pages, 2434 KiB  
Article
A Machine Learning Method for Prediction of Stock Market Using Real-Time Twitter Data
by Saleh Albahli, Aun Irtaza, Tahira Nazir, Awais Mehmood, Ali Alkhalifah and Waleed Albattah
Electronics 2022, 11(20), 3414; https://doi.org/10.3390/electronics11203414 - 21 Oct 2022
Cited by 4 | Viewed by 4377
Abstract
Finances represent one of the key requirements to perform any useful activity for humanity. Financial markets, e.g., stock markets, forex, and mercantile exchanges, etc., provide the opportunity to anyone to invest and generate finances. However, to reap maximum benefits from these financial markets, [...] Read more.
Finances represent one of the key requirements to perform any useful activity for humanity. Financial markets, e.g., stock markets, forex, and mercantile exchanges, etc., provide the opportunity to anyone to invest and generate finances. However, to reap maximum benefits from these financial markets, effective decision making is required to identify the trade directions, e.g., going long/short by analyzing all the influential factors, e.g., price action, economic policies, and supply/demand estimation, in a timely manner. In this regard, analysis of the financial news and Twitter posts plays a significant role to predict the future behavior of financial markets, public sentiment estimation, and systematic/idiosyncratic risk estimation. In this paper, our proposed work aims to analyze the Twitter posts and Google Finance data to predict the future behavior of the stock markets (one of the key financial markets) in a particular time frame, i.e., hourly, daily, weekly, etc., through a novel StockSentiWordNet (SSWN) model. The proposed SSWN model extends the standard opinion lexicon named SentiWordNet (SWN) through the terms specifically related to the stock markets to train extreme learning machine (ELM) and recurrent neural network (RNN) for stock price prediction. The experiments are performed on two datasets, i.e., Sentiment140 and Twitter datasets, and achieved the accuracy value of 86.06%. Findings show that our work outperforms the state-of-the-art approaches with respect to overall accuracy. In future, we plan to enhance the capability of our method by adding other popular social media, e.g., Facebook and Google News etc. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

9 pages, 2652 KiB  
Communication
Study on Single Event Upsets in a 28 nm Technology Static Random Access Memory Device Based on Micro-Beam Irradiation
by Haohan Sun, Gang Guo, Ruinan Sun, Wen Zhao, Fengqi Zhang, Jiancheng Liu, Zheng Zhang, Ya Chen and Yongle Zhao
Electronics 2022, 11(20), 3413; https://doi.org/10.3390/electronics11203413 - 21 Oct 2022
Cited by 2 | Viewed by 1179
Abstract
As an important spaceborne electronic device, the static random access memory (SRAM) device is inevitably affected by the radiation of high-energy particles in space during its space mission. To reveal the single event effect (SEE) mechanism of 28 nm technology SRAM caused by [...] Read more.
As an important spaceborne electronic device, the static random access memory (SRAM) device is inevitably affected by the radiation of high-energy particles in space during its space mission. To reveal the single event effect (SEE) mechanism of 28 nm technology SRAM caused by high-energy particles, the sensitive area positioning of single event upsets (SEUs) and the distribution characteristics of multi-cell upsets (MCUs) were studied based on the pinhole heavy ion micro-beam facility. The results show that the actual range of SEUs caused by micro-beam irradiation is 4.8 μm × 7.8 μm. By moving the device platform in small steps (1 μm each step), a one-dimensional positioning method for locating the sensitive area of SEUs was established, which can reduce the dependence of localization accuracy on beam spot size, and the positioning accuracy can be improved to 1 μm. The MCU test indicates that the upset pattern is closely related to the spacing of sensitive areas within adjacent SRAM cells, and the probability of MCUs is reduced by well contacts and bit interleaving. Full article
(This article belongs to the Section Semiconductor Devices)
Show Figures

Figure 1

13 pages, 687 KiB  
Article
Emotion-Based Literature Book Classification Using Online Reviews
by Elena-Ruxandra Luţan and Costin Bădică
Electronics 2022, 11(20), 3412; https://doi.org/10.3390/electronics11203412 - 21 Oct 2022
Cited by 1 | Viewed by 1603
Abstract
Reading is not only a recreational activity; it also shapes the emotional and cognitive competences of the reader. In this paper, we present a method and tools for the analysis of emotions extracted from online reviews of literature books. We implement a scraper [...] Read more.
Reading is not only a recreational activity; it also shapes the emotional and cognitive competences of the reader. In this paper, we present a method and tools for the analysis of emotions extracted from online reviews of literature books. We implement a scraper to create a new experimental dataset of reviews gathered from Goodreads, a website dedicated to readers that contains a large database of books and readers’ reviews. We propose a system which extracts the emotions from the reviews and associates them with the reviewed book. Afterwards, this information can be used to find similarities between the books based on readers’ impressions. Lastly, we show the experimental setup, consisting of the user interface developed for the proposed system, together with the experimental results. Full article
(This article belongs to the Special Issue Trends and Applications in Information Systems and Technologies)
Show Figures

Figure 1

16 pages, 4412 KiB  
Article
Modeling of Botnet Detection Using Barnacles Mating Optimizer with Machine Learning Model for Internet of Things Environment
by Fatma S. Alrayes, Mohammed Maray, Abdulbaset Gaddah, Ayman Yafoz, Raed Alsini, Omar Alghushairy, Heba Mohsen and Abdelwahed Motwakel
Electronics 2022, 11(20), 3411; https://doi.org/10.3390/electronics11203411 - 21 Oct 2022
Cited by 8 | Viewed by 1567
Abstract
Owing to the development and expansion of energy-aware sensing devices and autonomous and intelligent systems, the Internet of Things (IoT) has gained remarkable growth and found uses in several day-to-day applications. However, IoT devices are highly prone to botnet attacks. To mitigate this [...] Read more.
Owing to the development and expansion of energy-aware sensing devices and autonomous and intelligent systems, the Internet of Things (IoT) has gained remarkable growth and found uses in several day-to-day applications. However, IoT devices are highly prone to botnet attacks. To mitigate this threat, a lightweight and anomaly-based detection mechanism that can create profiles for malicious and normal actions on IoT networks could be developed. Additionally, the massive volume of data generated by IoT gadgets could be analyzed by machine learning (ML) methods. Recently, several deep learning (DL)-related mechanisms have been modeled to detect attacks on the IoT. This article designs a botnet detection model using the barnacles mating optimizer with machine learning (BND-BMOML) for the IoT environment. The presented BND-BMOML model focuses on the identification and recognition of botnets in the IoT environment. To accomplish this, the BND-BMOML model initially follows a data standardization approach. In the presented BND-BMOML model, the BMO algorithm is employed to select a useful set of features. For botnet detection, the BND-BMOML model in this study employs an Elman neural network (ENN) model. Finally, the presented BND-BMOML model uses a chicken swarm optimization (CSO) algorithm for the parameter tuning process, demonstrating the novelty of the work. The BND-BMOML method was experimentally validated using a benchmark dataset and the outcomes indicated significant improvements in performance over existing methods. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

19 pages, 20263 KiB  
Article
Unlicensed Taxi Detection Model Based on Graph Embedding
by Zhe Long, Zuping Zhang, Jinjin Chen, Faiza Riaz Khawaja and Shaolong Li
Electronics 2022, 11(20), 3410; https://doi.org/10.3390/electronics11203410 - 20 Oct 2022
Viewed by 1378
Abstract
It is widely considered that unlicensed taxis pose a risk to public safety and interfere with the effective management of traffic. Significant human and material resources are expended by traffic control departments to locate these vehicles with limited success. This study suggests a [...] Read more.
It is widely considered that unlicensed taxis pose a risk to public safety and interfere with the effective management of traffic. Significant human and material resources are expended by traffic control departments to locate these vehicles with limited success. This study suggests a smart, trajectory big data-based approach entitled Trajectory Graph Embedding-based Unlicensed Taxi Detection (TGE-UTD) to identify suspected unlicensed taxis and address this issue. The model implementation comprises three stages: first, the Automatic Number Plate Recognition (ANPR) data are transformed into a trajectory graph; second, a biased random walk is deployed to embed the trajectory graph; and finally, the set of vehicles similar to the known licensed taxis is obtained as the set of suspected unlicensed taxis using the cosine similarity of the vehicle embedding vector. Through precision evaluation and dimension reduction experiments, the performance of the walk model TGE-UTD is compared to that of the no-walk models Word2Vec and Doc2Vec in detecting large vehicles and taxis. TGE-UTD is observed to exhibit the best performance among the three models. This study pioneers the application of machine learning for feature extraction in detecting unlicensed taxis. The model proposed in the study can be deployed to detect unlicensed taxis; moreover, its application can be extended to detect other types of vehicles, providing traffic management departments with supporting vehicle detection information. Full article
(This article belongs to the Topic Intelligent Transportation Systems)
Show Figures

Figure 1

14 pages, 8366 KiB  
Article
Transformer-Based Multimodal Infusion Dialogue Systems
by Bo Liu, Lejian He, Yafei Liu, Tianyao Yu, Yuejia Xiang, Li Zhu and Weijian Ruan
Electronics 2022, 11(20), 3409; https://doi.org/10.3390/electronics11203409 - 20 Oct 2022
Cited by 1 | Viewed by 1855
Abstract
The recent advancements in multimodal dialogue systems have been gaining importance in several domains such as retail, travel, fashion, among others. Several existing works have improved the understanding and generation of multimodal dialogues. However, there still exists considerable space to improve the quality [...] Read more.
The recent advancements in multimodal dialogue systems have been gaining importance in several domains such as retail, travel, fashion, among others. Several existing works have improved the understanding and generation of multimodal dialogues. However, there still exists considerable space to improve the quality of output textual responses due to insufficient information infusion between the visual and textual semantics. Moreover, the existing dialogue systems often generate defective knowledge-aware responses for tasks such as providing product attributes and celebrity endorsements. To address the aforementioned issues, we present a Transformer-based Multimodal Infusion Dialogue (TMID) system that extracts the visual and textual information from dialogues via a transformer-based multimodal context encoder and employs a cross-attention mechanism to achieve information infusion between images and texts for each utterance. Furthermore, TMID uses adaptive decoders to generate appropriate multimodal responses based on the user intentions it has determined using a state classifier and enriches the output responses by incorporating domain knowledge into the decoders. The results of extensive experiments on a multimodal dialogue dataset demonstrate that TMID has achieved a state-of-the-art performance by improving the BLUE-4 score by 13.03, NIST by 2.77, image selection Recall@1 by 1.84%. Full article
Show Figures

Figure 1

21 pages, 9994 KiB  
Article
Compact Quad-Port MIMO Antenna with Ultra-Wideband and High Isolation
by Zhengrui He and Jie Jin
Electronics 2022, 11(20), 3408; https://doi.org/10.3390/electronics11203408 - 20 Oct 2022
Cited by 9 | Viewed by 1746
Abstract
In this paper, we propose a compact and highly isolated four-port ultra-wideband MIMO antenna. The antenna elements achieve broadband characteristics by etching a metamaterial structure on the radiating patch and stepping the coplanar waveguide feed. The test results show that the unit antenna [...] Read more.
In this paper, we propose a compact and highly isolated four-port ultra-wideband MIMO antenna. The antenna elements achieve broadband characteristics by etching a metamaterial structure on the radiating patch and stepping the coplanar waveguide feed. The test results show that the unit antenna can operate from 1.8 GHz to 16.38 GHz with an absolute bandwidth of 14.58 GHz and a relative bandwidth of 160.4% with good radiation properties and gain. After that, a compact four-cell ultra-wideband MIMO antenna is designed by using polarization diversity technology with an overall size of 51.2 mm × 51.2 mm × 1.524 mm. The MIMO antenna can operate from 1 GHz to 17 GHz with an absolute bandwidth of 16 GHz and a relative bandwidth of 177.78%. To reduce the coupling between cells, four angled slits are etched on the common ground to improve the isolation of the MIMO antennas to 27.8 dB. The performance parameters of the proposed MIMO antennas are further validated through simulation analysis and measurements. Moreover, the diversity properties of MIMO antennas are analyzed in detail, demonstrating the applicability of the proposed antennas in UWB communication systems, which can also be used for satellite mobile communications and satellite fixed communication services. Full article
(This article belongs to the Special Issue MIMO System Technology for Wireless Communications)
Show Figures

Figure 1

22 pages, 2812 KiB  
Article
Research on a Charging Mechanism of Electric Vehicles for Photovoltaic Nearby Consumption Strategy
by Qingsu He, Muqing Wu, Pei Sun, Jinglin Guo, Lina Chen, Lihua Jiang and Zhiwei Zhang
Electronics 2022, 11(20), 3407; https://doi.org/10.3390/electronics11203407 - 20 Oct 2022
Cited by 5 | Viewed by 1344
Abstract
With the promotion of the pilot development of distributed whole county roof photovoltaics in China, problems such as power consumption, energy regional balance, and grid stability have become prominent. In this paper, an application mode of electric vehicle (EV) charging network and distributed [...] Read more.
With the promotion of the pilot development of distributed whole county roof photovoltaics in China, problems such as power consumption, energy regional balance, and grid stability have become prominent. In this paper, an application mode of electric vehicle (EV) charging network and distributed photovoltaic power generation local consumption is studied. The management idea of two-layer and four model has been established, including the regional distributed photovoltaic output model, electricity consumption model, EV consumption model, and regional grid load dispatching model, which can realize the scheduling of the energy flow formed by photovoltaic, induce the charging of EVs, and make the photovoltaic consumption in office building areas and residential building areas complementary. Firstly, according to the randomness of photovoltaic power generation and EV charging, the dynamic response capability, power support capability, effective convergence time, system stability, system failure rate, and other characteristics of regional loads are comprehensively analyzed, and the grid energy management model of EV charging network and distributed photovoltaic is proposed. Secondly, according to certain statistical characteristics, the distributed photovoltaic will be concentrated, and EV charging will be prioritized to achieve nearby consumption. Finally, different scenarios are described, and the scenarios of charging in the park, community life, and power supply service are selected for analysis. This mode is intended to guide the consumption of new energy through economic leverage, which can realize the unified regulation of distributed energy convergence, consumption and storage. Full article
Show Figures

Figure 1

10 pages, 3853 KiB  
Article
Modeling of a Compact Dual Band and Flexible Elliptical-Shape Implantable Antenna in Multi-Layer Tissue Model
by Sanaa Salama, Duaa Zyoud and Ashraf Abuelhaija
Electronics 2022, 11(20), 3406; https://doi.org/10.3390/electronics11203406 - 20 Oct 2022
Cited by 2 | Viewed by 1265
Abstract
A flexible antenna of compact size with a dual band elliptical-shape implantable is designed for biomedical purposes. The suggested antenna has an elliptical shape to be more comfortable for being implanted in human tissue. The implantable antenna is printed on RO3010 substrate with [...] Read more.
A flexible antenna of compact size with a dual band elliptical-shape implantable is designed for biomedical purposes. The suggested antenna has an elliptical shape to be more comfortable for being implanted in human tissue. The implantable antenna is printed on RO3010 substrate with 2 mm as a thickness and 10.2 as a dielectric constant. It consists of an active planar C-shaped element and a parasitic planar inverted C-shaped element. The proposed antenna is designed with a major axis radius of 12 mm and a minor axis radius of 8 mm. It operates in dual bands: The Industrial Scientific and Medical band (ISM) [2.4 GHz–3.5 GHz] and Medical Implant Communications Service band (MICS) [394 MHz–407.61 MHz]. A short-circuited pin is used to minimize the antenna’s overall size and for further size reduction a capacitive load is used between the radiator and the ground plane. For biocompatibility, a thin-thickness layer of Alumina is used as a superstrate. The suggested antenna is tested in a multi-layer tissue model and the Specific Absorption Rate (SAR) value is computed. The proposed antenna was fabricated, and the reflection coefficient is measured and compared with simulated results. Full article
(This article belongs to the Special Issue Advances and Applications of Microwave Imaging)
Show Figures

Figure 1

19 pages, 4711 KiB  
Article
Development of a Dedicated Application for Robots to Communicate with a Laser Tracker
by Dariusz Szybicki, Paweł Obal, Paweł Penar, Krzysztof Kurc, Magdalena Muszyńska and Andrzej Burghardt
Electronics 2022, 11(20), 3405; https://doi.org/10.3390/electronics11203405 - 20 Oct 2022
Cited by 2 | Viewed by 2609
Abstract
The paper presents the concept of operation and methods of using laser trackers in robotics. So far, a small amount of research on software for sharing and exchanging data with trackers has been done. As a result of the identified demand, a proprietary [...] Read more.
The paper presents the concept of operation and methods of using laser trackers in robotics. So far, a small amount of research on software for sharing and exchanging data with trackers has been done. As a result of the identified demand, a proprietary application for communication between the laser tracker and robots, as well as other software, was developed. The developed solution is based on the software development kit (SDK) provided by Leica and the Python language. The structure and functioning of the developed software were described in detail. The software meets the goals set at the beginning of the design process regarding online communication with the tracker and using the universal, popular TCP/IP standard. The functioning of the developed software was shown in the paper in a few examples related to manipulating robots and mobile robots. The capabilities of the developed software were described, as well as the planned work on its development. Full article
Show Figures

Figure 1

24 pages, 7583 KiB  
Article
Research on Fault Feature Extraction Method of Rolling Bearing Based on SSA–VMD–MCKD
by Zichang Liu, Siyu Li, Rongcai Wang and Xisheng Jia
Electronics 2022, 11(20), 3404; https://doi.org/10.3390/electronics11203404 - 20 Oct 2022
Cited by 3 | Viewed by 1609
Abstract
In response to the problem that nonlinear and non-stationary rolling bearing fault signals are easily disturbed by noise, which leads to the difficulty of fault feature extraction, to take full advantage of the superiority of variational mode decomposition (VMD) in noise reduction, and [...] Read more.
In response to the problem that nonlinear and non-stationary rolling bearing fault signals are easily disturbed by noise, which leads to the difficulty of fault feature extraction, to take full advantage of the superiority of variational mode decomposition (VMD) in noise reduction, and of maximum correlation kurtosis deconvolution (MCKD) in highlighting continuous pulses masked by noise, a method based on sparrow search algorithm (SSA), VMD, and MCKD is proposed, namely, SSA–VM–MCKD, for rolling bearing faint fault extraction. To improve the feature extraction effect, the method uses the inverse of the peak factor squared of the envelope spectrum as the fitness function, and the parameters to be determined in both algorithms are searched adaptively by SSA. Firstly, the parameter-optimized VMD is used to decompose the fault signal to obtain the intrinsic mode function (IMF) components, from which the optimal mode component is selected, and then the optimal component signal is deconvoluted by the parameter-optimized MCKD to enhance the periodic fault pulses in the optimal component signal, and finally extracts the rolling bearing fault characteristic frequency by envelope demodulation. Experiments on simulated signals and measured data show that the method can adaptively determine the parameters in VMD and MCKD, enhance the fault impact components in the signals, and effectively extract the fault characteristic frequencies of rolling bearings, with a success rate up to 100%, providing a new idea for rolling bearing fault feature extraction. Full article
Show Figures

Figure 1

17 pages, 6276 KiB  
Article
Industrial Ergonomics Risk Analysis Based on 3D-Human Pose Estimation
by Prabesh Paudel, Young-Jin Kwon, Do-Hyun Kim and Kyoung-Ho Choi
Electronics 2022, 11(20), 3403; https://doi.org/10.3390/electronics11203403 - 20 Oct 2022
Cited by 6 | Viewed by 2515
Abstract
Ergonomics is important for smooth and sustainable industrial operation. In the manufacturing industry, due to poor workstation design, workers frequently and repeatedly experience uncomfortable postures and actions (reaching above their shoulders, bending at awkward angles, bending backwards, flexing their elbows/wrists, etc.). Incorrect working [...] Read more.
Ergonomics is important for smooth and sustainable industrial operation. In the manufacturing industry, due to poor workstation design, workers frequently and repeatedly experience uncomfortable postures and actions (reaching above their shoulders, bending at awkward angles, bending backwards, flexing their elbows/wrists, etc.). Incorrect working postures often lead to specialized injuries, which reduce productivity and increase development costs. Therefore, examining workers’ ergonomic postures becomes the basis for recognizing, correcting, and preventing bad postures in the workplace. This paper proposes a new framework to carry out risk analysis of workers’ ergonomic postures through 3D human pose estimation from video/image sequences of their actions. The top-down network calculates human body joints when bending, and those angles are compared with the ground truth body bending data collected manually by expert observation. Here, we introduce the body angle reliability decision (BARD) method to calculate the most reliable body-bending angles to ensure safe working angles for workers that conform to ergonomic requirements in the manufacturing industry. We found a significant result with high accuracy in the score for ergonomics we used for this experiment. For good postures with high reliability, we have OWAS score 94%, REBA score 93%, and RULA score 93% accuracy. Similarly, for occluded postures we have OWAS score 83%, REBA score 82%, and RULA score 82%, compared with expert’s occluded scores. For future study, our research can be a reference for ergonomics score analysis with 3D pose estimation of workers’ postures. Full article
(This article belongs to the Special Issue Human Face and Motion Recognition in Video)
Show Figures

Figure 1

13 pages, 3098 KiB  
Article
Sightless but Not Blind: A Non-Ideal Spectrum Sensing Algorithm Countering Intelligent Jamming for Wireless Communication
by Ziming Pu, Yingtao Niu, Peng Xiang and Guoliang Zhang
Electronics 2022, 11(20), 3402; https://doi.org/10.3390/electronics11203402 - 20 Oct 2022
Viewed by 1116
Abstract
Aiming at the existing intelligent anti-jamming communication methods that fail to consider the problem that sensing is inaccurate, this paper puts forward an intelligent anti-jamming method for wireless communication under non-ideal spectrum sensing (NISS). Under the malicious jamming environment, the wireless communication system [...] Read more.
Aiming at the existing intelligent anti-jamming communication methods that fail to consider the problem that sensing is inaccurate, this paper puts forward an intelligent anti-jamming method for wireless communication under non-ideal spectrum sensing (NISS). Under the malicious jamming environment, the wireless communication system uses Q-learning (QL) to learn the change law of jamming, and considers the false alarm and missed detection probability of jamming sensing, and selects the channel with long-term optimal reporting in each time slot for communication. The simulation results show that under linear sweep jamming and intelligent blocking jamming, the proposed algorithm converges faster than QL with the same decision accuracy. Compared with wide-band spectrum sensing (WBSS), an algorithm which failed to consider non-ideal spectrum sensing, the decision accuracy of the proposed algorithm is higher with the same convergence rate. Full article
(This article belongs to the Topic Machine Learning in Communication Systems and Networks)
Show Figures

Figure 1

20 pages, 7083 KiB  
Article
MetaEar: Imperceptible Acoustic Side Channel Continuous Authentication Based on ERTF
by Zhuo Chang, Lin Wang, Binbin Li and Wenyuan Liu
Electronics 2022, 11(20), 3401; https://doi.org/10.3390/electronics11203401 - 20 Oct 2022
Cited by 4 | Viewed by 1664
Abstract
With the development of ubiquitous mobile devices, biometrics authentication has received much attention from researchers. For immersive experiences in AR (augmented reality), convenient continuous biometric authentication technologies are required to provide security for electronic assets and transactions through head-mounted devices. Existing fingerprint or [...] Read more.
With the development of ubiquitous mobile devices, biometrics authentication has received much attention from researchers. For immersive experiences in AR (augmented reality), convenient continuous biometric authentication technologies are required to provide security for electronic assets and transactions through head-mounted devices. Existing fingerprint or face authentication methods are vulnerable to spoof attacks and replay attacks. In this paper, we propose MetaEar, which harnesses head-mounted devices to send FMCW (Frequency-Modulated Continuous Wave) ultrasonic signals for continuous biometric authentication of the human ear. CIR (channel impulse response) leveraged the channel estimation theory to model the physiological structure of the human ear, called the Ear Related Transfer Function (ERTF). It extracts unique representations of the human ear’s intrinsic and extrinsic biometric features. To overcome the data dependency of Deep Learning and improve its deployability in mobile devices, we use the lightweight learning approach for classification and authentication. Our implementation and evaluation show that the average accuracy can reach about 96% in different scenarios with small amounts of data. MetaEar enables one to handle immersive deployable authentication and be more sensitive to replay and impersonation attacks. Full article
(This article belongs to the Special Issue Wearable Sensing Devices and Technology)
Show Figures

Figure 1

19 pages, 7418 KiB  
Article
Vehicle Logo Detection Method Based on Improved YOLOv4
by Xiaoli Jiang, Kai Sun, Liqun Ma, Zhijian Qu and Chongguang Ren
Electronics 2022, 11(20), 3400; https://doi.org/10.3390/electronics11203400 - 20 Oct 2022
Cited by 7 | Viewed by 1609
Abstract
A vehicle logo occupies a small proportion of a car and has different shapes. These characteristics bring difficulties to machine-vision-based vehicle logo detection. To improve the accuracy of vehicle logo detection in complex backgrounds, an improved YOLOv4 model was presented. Firstly, the CSPDenseNet [...] Read more.
A vehicle logo occupies a small proportion of a car and has different shapes. These characteristics bring difficulties to machine-vision-based vehicle logo detection. To improve the accuracy of vehicle logo detection in complex backgrounds, an improved YOLOv4 model was presented. Firstly, the CSPDenseNet was introduced to improve the backbone feature extraction network, and a shallow output layer was added to replenish the shallow information of small target. Then, the deformable convolution residual block was employed to reconstruct the neck structure to capture the various and irregular shape features. Finally, a new detection head based on a convolutional transformer block was proposed to reduce the influence of complex backgrounds on vehicle logo detection. Experimental results showed that the average accuracy of all categories in the VLD-45 dataset was 62.94%, which was 5.72% higher than the original model. It indicated that the improved model could perform well in vehicle logo detection. Full article
Show Figures

Figure 1

26 pages, 2752 KiB  
Article
A Greedy Heuristic Based on Optimizing Battery Consumption and Routing Distance for Transporting Blood Using Unmanned Aerial Vehicles
by Sumayah Al-Rabiaah, Manar Hosny and Sarab AlMuhaideb
Electronics 2022, 11(20), 3399; https://doi.org/10.3390/electronics11203399 - 20 Oct 2022
Cited by 4 | Viewed by 1275
Abstract
Unmanned Aerial Vehicles (UAVs) play crucial roles in numerous applications, such as healthcare services. For example, UAVs can help in disaster relief and rescue missions, such as by delivering blood samples and medical supplies. In this work, we studied a problem related to [...] Read more.
Unmanned Aerial Vehicles (UAVs) play crucial roles in numerous applications, such as healthcare services. For example, UAVs can help in disaster relief and rescue missions, such as by delivering blood samples and medical supplies. In this work, we studied a problem related to the routing of UAVs in a healthcare approach known as the UAV-based Capacitated Vehicle Routing Problem (UCVRP). This is classified as an NP-hard problem. The problem deals with utilizing UAVs to deliver blood to patients in emergency situations while minimizing the number of UAVs and the total routing distance. The UCVRP is a variant of the well-known capacitated vehicle routing problem, with additional constraints that fit the shipment type and the characteristics of the UAV. To solve this problem, we developed a heuristic known as the Greedy Battery—Distance Optimizing Heuristic (GBDOH). The idea was to assign patients to a UAV in such a way as to minimize the battery consumption and the number of UAVs. Then, we rearranged the patients of each UAV in order to minimize the total routing distance. We performed extensive experiments on the proposed GBDOH using instances tested by other methods in the literature. The results reveal that GBDOH demonstrates a more efficient performance with lower computational complexity and provides a better objective value by approximately 27% compared to the best methods used in the literature. Full article
(This article belongs to the Special Issue Electronic Solutions for Artificial Intelligence Healthcare Volume II)
Show Figures

Figure 1

17 pages, 2305 KiB  
Article
A Noval and Efficient ECC-Based Authenticated Key Agreement Scheme for Smart Metering in the Smart Grid
by Cong Wang, Su Li, Maode Ma, Xin Tong, Yiying Zhang and Bo Zhang
Electronics 2022, 11(20), 3398; https://doi.org/10.3390/electronics11203398 - 20 Oct 2022
Cited by 1 | Viewed by 1328
Abstract
With the gradual maturity of the smart grid (SG), security challenges have become one of the important issues that needs to be addressed urgently. In SG, the identity authentication and key agreement protocol between a smart meter (SMSM) and [...] Read more.
With the gradual maturity of the smart grid (SG), security challenges have become one of the important issues that needs to be addressed urgently. In SG, the identity authentication and key agreement protocol between a smart meter (SMSM) and an aggregator (AGAG) is a prerequisite for both parties to establish a secure communication. Some of the existing solutions require high communication cost, some have key escrow problems and security defects. Elliptic curve cryptosystem (ECC) holds the feature of low-key requirement and high security to make it more suitable for the security solutions to the communications in SG. In this paper, we propose a mutual anonymous authentication with an ECC-based key agreement scheme to secure the communications in SG. In addition, we compare our scheme with other existing schemes by the number of encryption operations, the computation delay, and the communication cost. The results indicate that our scheme is more efficient without the loss of safety properties. Full article
Show Figures

Figure 1

13 pages, 1850 KiB  
Article
An Estimated δ-Based Iterative Block Decision Feedback Equalization in SC-FDE System
by Yidong Liu, Xihong Chen, Dizhe Yuan and Denghua Hu
Electronics 2022, 11(20), 3397; https://doi.org/10.3390/electronics11203397 - 20 Oct 2022
Viewed by 1097
Abstract
We provide a novel nonlinear frequency domain equalization algorithm for the frequency domain equalization of an SC-FDE system by improving the classical iterative block decision feedback equalization (IBDFE) algorithm and applying δ estimation to the improved algorithm. The improvement of the IBDFE algorithm [...] Read more.
We provide a novel nonlinear frequency domain equalization algorithm for the frequency domain equalization of an SC-FDE system by improving the classical iterative block decision feedback equalization (IBDFE) algorithm and applying δ estimation to the improved algorithm. The improvement of the IBDFE algorithm is carried out by replacing the ZF equalization in the feedback branch with the MMSE equalization and eliminating the iteration of the correlation factor, thus reducing the noise error and the computational complexity of the original algorithm. δ estimation can estimate residual inter-symbol interference in the signal after MMSE equalization and reject it, thus further improving the equalization accuracy. The simulation results show that the performance of the novel algorithm is better than that of the IBDFE algorithm with similar complexity, or the complexity of the novel algorithm is lower than that of the IBDFE algorithm with similar performance. Full article
Show Figures

Figure 1

20 pages, 6825 KiB  
Article
A Monocular Visual Localization Algorithm for Large-Scale Indoor Environments through Matching a Prior Semantic Map
by Tianyi Lu, Yafei Liu, Yuan Yang, Huiqing Wang and Xiaoguo Zhang
Electronics 2022, 11(20), 3396; https://doi.org/10.3390/electronics11203396 - 20 Oct 2022
Cited by 1 | Viewed by 1495
Abstract
It is challenging for a visual SLAM system to keep long-term precise and robust localization ability in a large-scale indoor environment since there is a low probability of the occurrence of loop closure. Aiming to solve this problem, we propose a monocular visual [...] Read more.
It is challenging for a visual SLAM system to keep long-term precise and robust localization ability in a large-scale indoor environment since there is a low probability of the occurrence of loop closure. Aiming to solve this problem, we propose a monocular visual localization algorithm for large-scale indoor environments through matching a prior semantic map. In the approach, the line features of certain semantic objects observed by the monocular camera are extracted in real time. A cost function is proposed to represent the difference between the observed objects and the matched semantic objects in the preexisting semantic map. After that, a bundle adjustment model integrating the semantic object matching difference is given to optimize the pose of the camera and the real-time environment map. Finally, test cases are designed to evaluate the performance of our approach, in which the line features with semantic information are extracted in advance to build the semantic map for matching in real time. The test results show that the positioning accuracy of our method is improved in large-scale indoor navigation. Full article
(This article belongs to the Section Systems & Control Engineering)
Show Figures

Figure 1

17 pages, 2157 KiB  
Article
Challenging Ergonomics Risks with Smart Wearable Extension Sensors
by Nikola Maksimović, Milan Čabarkapa, Marko Tanasković and Dragan Randjelović
Electronics 2022, 11(20), 3395; https://doi.org/10.3390/electronics11203395 - 20 Oct 2022
Cited by 1 | Viewed by 1808
Abstract
Concerning occupational safety, the aim of ergonomics as a scientific discipline is to study and adjust working conditions, worker equipment, and work processes from a psychological, physiological, and anatomical aspect instead of adapting the worker to the needs of the job. This paper [...] Read more.
Concerning occupational safety, the aim of ergonomics as a scientific discipline is to study and adjust working conditions, worker equipment, and work processes from a psychological, physiological, and anatomical aspect instead of adapting the worker to the needs of the job. This paper will discuss and analyze the potential of the garment-embedded body posture tracking sensor and its usage as standard working equipment, which is meant to help correct improper and high-risk upper body positions during prolonged and static work activities. The analysis evaluation cross-reference is based on the Rapid Upper Limb Assessment ergonomics risk assessment tool. Signals generated by the wearable are meant to help the wearer and observer promptly-continuously detect and correct bad posture. The results show a positive progression of workers’ body posture to reduce the ergonomic risks this research covers. It can be concluded that wearable technology and sensors would significantly contribute to the observer as the evaluation tool and the wearer to spot the risk factors promptly and self-correct them independently. This feature would help workers learn and improve the correct habits of correcting ergonomically incorrect body postures when performing work tasks. Full article
Show Figures

Figure 1

17 pages, 11018 KiB  
Article
Agricultural Lightweight Embedded Blockchain System: A Case Study in Olive Oil
by Jalel Ktari, Tarek Frikha, Faten Chaabane, Monia Hamdi and Habib Hamam
Electronics 2022, 11(20), 3394; https://doi.org/10.3390/electronics11203394 - 20 Oct 2022
Cited by 17 | Viewed by 2299
Abstract
In Tunisia, one of the major problems of the olive oil industry is marketing. Several factors have an impact, such as quality, originality, lobbying, subsidies and the certification of extra virgin olive oil. The major problem remains the traceability of the production process [...] Read more.
In Tunisia, one of the major problems of the olive oil industry is marketing. Several factors have an impact, such as quality, originality, lobbying, subsidies and the certification of extra virgin olive oil. The major problem remains the traceability of the production process to guarantee the origin of the food at all times. This fine-grained traceability can be achieved by applying Blockchain technologies. Blockchain can be used as a solution that could bring visibility to the oil supply chain. It is proposed in order to guarantee the veracity of the product information at different stages. In this paper, a multi-Blockchain, multi-sensor traceability system using IoT will be presented. Two Blockchains that can be programmed via Smart Contract will be used. The first one is Quorum, which is a private Blockchain used by the actors of our system, and the second one is Ethereum, which is public and connects the different actors who have access to our system. This smart contract allows us to conta our system to track the olive oil manufacturing process from the farmer, through the oil mill, the transporter and the quality controller to the customer. A general approach for managing the olive oil supply chain is presented. This approach offers the possibility for the system to be configurable. It is based on smart contracts and applications that interact with the same smart contracts. The IoT is used to configure sensors. These sensors are the source of data for the supply chain process. These sensors are connected to the embedded platforms that host Quorum. Full article
Show Figures

Figure 1

11 pages, 2026 KiB  
Article
Research on Speech Emotion Recognition Based on the Fractional Fourier Transform
by Lirong Huang and Xizhong Shen
Electronics 2022, 11(20), 3393; https://doi.org/10.3390/electronics11203393 - 20 Oct 2022
Cited by 5 | Viewed by 1425
Abstract
Speech emotion recognition is an important part of human–computer interaction, and the use of computers to analyze emotions and extract speech emotion features that can achieve high recognition rates is an important step. We applied the Fractional Fourier Transform (FrFT), and then constructed [...] Read more.
Speech emotion recognition is an important part of human–computer interaction, and the use of computers to analyze emotions and extract speech emotion features that can achieve high recognition rates is an important step. We applied the Fractional Fourier Transform (FrFT), and then constructed it to extract MFCC and combined it with a deep learning method for speech emotion recognition. Since the performance of FrFT depends on the transform order p, we utilized an ambiguity function to determine the optimal order for each frame of speech. The MFCC was extracted under the optimal order of FrFT for each frame of speech. Finally, combining the deep learning network LSTM for speech emotion recognition. Our experiment was conducted on the RAVDESS, and detailed confusion matrices and accuracy were given for analysis. The MFCC extracted using FrFT was shown to have better performance than ordinal FT, and the proposed model achieved a weighting accuracy of 79.86%. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

Previous Issue
Back to TopTop