167,470 Research products, page 1 of 16,747
Loading
- Publication . Conference object . 2021Authors:Tuofu Li; Javin Jia Liu; Yintao Tai; Yuxuan Tian;Tuofu Li; Javin Jia Liu; Yintao Tai; Yuxuan Tian;
doi: 10.1117/12.2623112
Publisher: SPIEBrain tumors are a hazardous type of tumor, and they build pressure inside the skull when they grow, which can potentially cause brain damage or even death. Attention mechanisms are widely adopted in state-of-the-art deep learning architectures for computer vision and neural translation tasks since they enhance networks' ability to capture spatial and channel-wise relationships. We offer an attention-based image segmentation model that outlines the brain tumors in Magnetic Resonance Imaging (MRI) scans if present. In the paper, we mainly focus on integrating Squeeze-and-Excitation Block and CBAM into the commonly used segmentation model, U-Net, to resolve the problem of concatenating unnecessary information into the decoder blocks and attempt to locate the tumor boundaries. Our research clearly shows the application of the attention mechanism in U-Net, incorporates the Squeeze-and-Excitation with CBAM, and improves the performance in the brain tumor segmentation task. The model is delivered on an app with additional text to speech and chatbot features provided.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2013Authors:S. Amini Akbarabadi; M. Sucu; Hamid Atighechi; Juri Jatskevich;S. Amini Akbarabadi; M. Sucu; Hamid Atighechi; Juri Jatskevich;Publisher: IEEE
Average-value modeling (AVM) provides an efficient tool for studying power electronic systems, including DC/DC converters. Analytical derivation of average models that are valid in different operating modes is difficult, especially when parasitics and non-idealities are included in converter circuit. Recently, a numerical computer-aided method of obtaining the average-value model of power electronic systems has been proposed based on corrected state space average-value modeling, wherein several parametric functions are obtained using the detailed simulation. This paper considers the second order flyback converter, which has transformer isolation and additional losses that have not been sufficiently addressed in the prior literature. The paper extends the parametric AVM approach and suggests a modified averaged circuit model for this type of converter. The proposed models are compared in predicting both large signal time-domain transients and small-signal frequency domain characteristics.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2010Authors:John William Hull; Lance Gosselin; Kevin Borzel;John William Hull; Lance Gosselin; Kevin Borzel;
doi: 10.2118/128304-ms
Publisher: SPEAbstract Evaluating well integrity (i.e. flow of fluids or gas) from behind casing can be challenging using existing single mode analog sensors; they offer limited representation and data acquisition can be time consuming. Further, traditional processing algorithms such as Fourier Transforms are not responsive to non-stationary, nonlinear events such as random, low volume leak signatures. Recent advancements in both fiber optic Distributed Acoustic Sensors (DAS), and processing algorithms stand to significantly simplify downhole low rate leak detection. This paper will explain the capabilities and limitations of this monitoring approach. Distributed Acoustic Sensors; Proven in demanding applications such as submarine sonar systems, optical fiber can be packaged in such a way that makes it extremely sensitive to acoustic disturbances along its entire length. Using the fiber itself as a sensor has several advantages, some of which include; extreme sensitivity, design simplicity, and the ability to obtain 1000’s of simultaneous measurements with little or no loss of fidelity. Datasets were obtained from both a specifically designed 200 ft vertical controlled test well simulator and actual problematic gas wells in Canada. Processing Algorithms: Using DSP techniques and real time methods, the engineer can tune the system to a specific leak signature which eliminates unwanted events and highlight useful acoustic components pertaining specifically to the leak. Once the data is obtained the high fidelity acoustic data undergoes various filtering and error detection processing. Algorithms were tested in Matlab and converted to executable code once verified. The integrated well monitoring and analysis system offers a more comprehensive, detailed solution. When compared to traditional technologies, future remedial strategies were often strategically more accurate using the fiber based systems, especially when low leak rates were involved. It is anticipated that engineers will be able to locate problematic leaks with higher confidence and save money by reducing the number of failed interventions; similarly, the need for experienced highly trained log analysts will be reduced. Applications for this information may include: low rate leak detection through casing, pipe integrity failures, zonal isolation issues, long term well monitoring, carbon storage and sequestration, evaluating intervention effectiveness, and locating multiple source leaks along a wellbore.
Top 10% in popularityTop 10% in popularityTop 10% in influencePopularity: Citation-based measure reflecting the current impact.Top 10% in influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2017Authors:B. Kamer; Jean-Claude Diels; Ladan Arissian;B. Kamer; Jean-Claude Diels; Ladan Arissian;Publisher: OSA
We present the signature of coherent wavepacket induced by strong field laser in the emission spectrum of plasma. Time dependent contribution of rotational states and phase relation between “P” and “R” branch is presented.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2019Closed AccessAuthors:Nikolaos Papakonstantinou; Ahmed Z. Bashir; Bryan M. O’Halloran; Douglas L. Van Bossuyt;Nikolaos Papakonstantinou; Ahmed Z. Bashir; Bryan M. O’Halloran; Douglas L. Van Bossuyt;Publisher: IEEECountry: Finland
Advancements in the domain of artificial intelligence, safety management, and on-board fault tolerance have led to autonomous devices to be considered as a key element for future remote defence and peaceful missions. Drones-Also known as autonomous or unmanned vehicles-with different capabilities and features-can be organized in a fleet and the fleet can be organized in a way that will increase the survivability of the drones and improve mission success. This can be accomplished by balancing system effectiveness design parameters such as endurance, communications, sensor fusion, domain awareness, area coverage rates and human operator interaction against mission costs.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2020Closed AccessAuthors:Navid Heydarishahreza; Saeed Ebadollahi; Reza Vahidnia; F. John Dian;Navid Heydarishahreza; Saeed Ebadollahi; Reza Vahidnia; F. John Dian;Publisher: IEEE
Wireless Sensor Networks, basically applied to gather information about the environments, consist of various elements interconnection. They are mainly deployed in the areas hard to reach, so they are routinely powered by the batteries. Due to the complexity of WSNs and the impact they have on the 21st century proceeding technology, they have received lots of attention during past decades, hence it is mandatory to study their fundamentals before any forthcoming research. This paper reviews the alphabets of WSNs in a straight scenario, categorizing them in terms of application, routing and connectivity schemes, besides, practical design challenges and energy supply ways have been classified.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2015Authors:Robyn Paul; Lynne Cowe Falls;Robyn Paul; Lynne Cowe Falls;Publisher: IEEE
Societal expectations of twenty-first century engineers have dramatically changed over the past few decades. There is a need to educate engineers not just in technical subjects, but also in many non-technical areas including globalization, communication, and leadership. There has been a growth of engineering leadership education programs offered by postsecondary engineering institutions. The effectiveness of these programs is often measured by the student's acquisition of skills, without considering the benefit of these skills on the students' careers. Using the career success competencies model, this paper seeks to determine if engineering leadership education impacts career success. The theoretical mapping analysis indicated a positive relationship between engineering leadership education and career success. The most significant competencies related to an engineer's career success were career insight, proactive personality, openness to experience, and lifelong learning.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2019Open AccessAuthors:Meiling Li; Bassant Selim; Sami Muhaidat; Paschalis C. Sofotasios; Paul D. Yoo; Jie Liang; Anhong Wang;Meiling Li; Bassant Selim; Sami Muhaidat; Paschalis C. Sofotasios; Paul D. Yoo; Jie Liang; Anhong Wang;Publisher: IEEECountry: Finland
Non-orthogonal multiple access (NOMA) has been proposed as a promising technology that is capable of improving the spectral efficiency of fifth-generation wireless networks and beyond. However, in practical communication scenarios, transceiver architectures inevitably suffer from radio frequency (RF) front-end related impairments that cause non-negligible performance degradation. This issue can be addressed by analog and digital signal processing algorithms, but factors such as time-varying hardware characteristics and imperfect compensation schemes result to detrimental residual distortions. In the present contribution we investigate the physical layer security of NOMA-based amplify-and-forward relay systems under such realistically incurred residual hardware impairment (RHI) effects. Exact and asymptotic analytic expressions for the corresponding outage probability (OP) and intercept probability (IP) of the considered set up over multipath fading channels are derived and corroborated by respective simulation results. Based on this, it is shown that RHI affects both the legitimate users and eavesdroppers by increasing the OP and decreasing the IP. For a fixed OP, RHI generally increases the corresponding IP, thereby reducing the secure performance of the system. Further interesting insights are also provided, verifying the importance of the offered results for the effective design and deployment of secure cooperative communication systems. acceptedVersion Peer reviewed
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2013Authors:Kivanc Doganay; Markus Bohlin; Ola Sellin;Kivanc Doganay; Markus Bohlin; Ola Sellin;Publisher: IEEE
This paper presents a case study of search-based test generation for embedded system software units developed using the Function Block Diagrams (FBDs), a graphical language in the IEC 61131-3 standard aimed at programmable logic controllers (PLCs). We consider 279 different components from the train control software developed by Bombardier Transportation, a major rail vehicle manufacturer. The software is compiled into C code with a particular structure. We use a modified hill climbing algorithm for generating test data to maximize MC/DC coverage for assignments with logical expressions in the C code, while retaining the semantics of the original FBD implementation. An experimental evaluation for comparing the effectiveness (coverage rate) and the efficiency (required number of executions) of hill climbing algorithm with random testing is presented. The results show that random testing performs well for most units under test, while around 30% of the artifacts significantly benefit from the hill climbing algorithm. Structural properties of the units that affect the performance of hill climbing and random testing are also discussed.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2021Open AccessAuthors:Maureen Akolo; Joshua Kimani; Lawrence Gelmon;Maureen Akolo; Joshua Kimani; Lawrence Gelmon;Publisher: BMJ Publishing Group Ltd
Background Sex workers Outreach Program (SWOP) is an STI/HIV research center serving 35000 female sex workers (FSW) through outreach services with 18000 seek HIV/STI services from the seven SWOP facilities spread across Nairobi Kenya. Program analysis showed high use of STI syndromic management antibiotics compared to budgetary allocations. This study was done to identify the gap Methodology Systematic data review of HIV positive FSW attending SWOP clinics and having been treated STI through syndromic management was done for the last two years 2020 and 2019. Data was pulled for all female sex workers who had been managed for STI syndromically, HIV status was checked and those who had a HIV diagnosis were retained in the study data base (this is because the HIV positive frequent the sites at least four times in a year compared to HIV negative FSW) Data was then separated into one time STI treatment and revisits with the same signs and symptoms for more than once in one year. Data on consistence condom use was also extracted Results Out of the 17,900 Female sex workers accessing SWOP facilities for key population services, 3038(16.9) were HIV positive. Of this HIV positive at least 4% (122) were treated for STI through syndromic management with highest 66% (81) reporting low abdominal pains with vaginal discharge. 52% (64) come back with same symptom twice of which 79%(51) reported consistent condom use, while 23% (15) come back at least more than twice with the same complains within a year with 89% reporting consistent condom use. Conclusion Given the nature of work, female sex workers have a high possibility of STI misdiagnosis. Hence countries should strive to invest in laboratory screening of STI among female sex workers to improve on correct diagnosis and treatment to reduce unnecessary use of antibiotics
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.
167,470 Research products, page 1 of 16,747
Loading
- Publication . Conference object . 2021Authors:Tuofu Li; Javin Jia Liu; Yintao Tai; Yuxuan Tian;Tuofu Li; Javin Jia Liu; Yintao Tai; Yuxuan Tian;
doi: 10.1117/12.2623112
Publisher: SPIEBrain tumors are a hazardous type of tumor, and they build pressure inside the skull when they grow, which can potentially cause brain damage or even death. Attention mechanisms are widely adopted in state-of-the-art deep learning architectures for computer vision and neural translation tasks since they enhance networks' ability to capture spatial and channel-wise relationships. We offer an attention-based image segmentation model that outlines the brain tumors in Magnetic Resonance Imaging (MRI) scans if present. In the paper, we mainly focus on integrating Squeeze-and-Excitation Block and CBAM into the commonly used segmentation model, U-Net, to resolve the problem of concatenating unnecessary information into the decoder blocks and attempt to locate the tumor boundaries. Our research clearly shows the application of the attention mechanism in U-Net, incorporates the Squeeze-and-Excitation with CBAM, and improves the performance in the brain tumor segmentation task. The model is delivered on an app with additional text to speech and chatbot features provided.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2013Authors:S. Amini Akbarabadi; M. Sucu; Hamid Atighechi; Juri Jatskevich;S. Amini Akbarabadi; M. Sucu; Hamid Atighechi; Juri Jatskevich;Publisher: IEEE
Average-value modeling (AVM) provides an efficient tool for studying power electronic systems, including DC/DC converters. Analytical derivation of average models that are valid in different operating modes is difficult, especially when parasitics and non-idealities are included in converter circuit. Recently, a numerical computer-aided method of obtaining the average-value model of power electronic systems has been proposed based on corrected state space average-value modeling, wherein several parametric functions are obtained using the detailed simulation. This paper considers the second order flyback converter, which has transformer isolation and additional losses that have not been sufficiently addressed in the prior literature. The paper extends the parametric AVM approach and suggests a modified averaged circuit model for this type of converter. The proposed models are compared in predicting both large signal time-domain transients and small-signal frequency domain characteristics.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2010Authors:John William Hull; Lance Gosselin; Kevin Borzel;John William Hull; Lance Gosselin; Kevin Borzel;
doi: 10.2118/128304-ms
Publisher: SPEAbstract Evaluating well integrity (i.e. flow of fluids or gas) from behind casing can be challenging using existing single mode analog sensors; they offer limited representation and data acquisition can be time consuming. Further, traditional processing algorithms such as Fourier Transforms are not responsive to non-stationary, nonlinear events such as random, low volume leak signatures. Recent advancements in both fiber optic Distributed Acoustic Sensors (DAS), and processing algorithms stand to significantly simplify downhole low rate leak detection. This paper will explain the capabilities and limitations of this monitoring approach. Distributed Acoustic Sensors; Proven in demanding applications such as submarine sonar systems, optical fiber can be packaged in such a way that makes it extremely sensitive to acoustic disturbances along its entire length. Using the fiber itself as a sensor has several advantages, some of which include; extreme sensitivity, design simplicity, and the ability to obtain 1000’s of simultaneous measurements with little or no loss of fidelity. Datasets were obtained from both a specifically designed 200 ft vertical controlled test well simulator and actual problematic gas wells in Canada. Processing Algorithms: Using DSP techniques and real time methods, the engineer can tune the system to a specific leak signature which eliminates unwanted events and highlight useful acoustic components pertaining specifically to the leak. Once the data is obtained the high fidelity acoustic data undergoes various filtering and error detection processing. Algorithms were tested in Matlab and converted to executable code once verified. The integrated well monitoring and analysis system offers a more comprehensive, detailed solution. When compared to traditional technologies, future remedial strategies were often strategically more accurate using the fiber based systems, especially when low leak rates were involved. It is anticipated that engineers will be able to locate problematic leaks with higher confidence and save money by reducing the number of failed interventions; similarly, the need for experienced highly trained log analysts will be reduced. Applications for this information may include: low rate leak detection through casing, pipe integrity failures, zonal isolation issues, long term well monitoring, carbon storage and sequestration, evaluating intervention effectiveness, and locating multiple source leaks along a wellbore.
Top 10% in popularityTop 10% in popularityTop 10% in influencePopularity: Citation-based measure reflecting the current impact.Top 10% in influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2017Authors:B. Kamer; Jean-Claude Diels; Ladan Arissian;B. Kamer; Jean-Claude Diels; Ladan Arissian;Publisher: OSA
We present the signature of coherent wavepacket induced by strong field laser in the emission spectrum of plasma. Time dependent contribution of rotational states and phase relation between “P” and “R” branch is presented.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2019Closed AccessAuthors:Nikolaos Papakonstantinou; Ahmed Z. Bashir; Bryan M. O’Halloran; Douglas L. Van Bossuyt;Nikolaos Papakonstantinou; Ahmed Z. Bashir; Bryan M. O’Halloran; Douglas L. Van Bossuyt;Publisher: IEEECountry: Finland
Advancements in the domain of artificial intelligence, safety management, and on-board fault tolerance have led to autonomous devices to be considered as a key element for future remote defence and peaceful missions. Drones-Also known as autonomous or unmanned vehicles-with different capabilities and features-can be organized in a fleet and the fleet can be organized in a way that will increase the survivability of the drones and improve mission success. This can be accomplished by balancing system effectiveness design parameters such as endurance, communications, sensor fusion, domain awareness, area coverage rates and human operator interaction against mission costs.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2020Closed AccessAuthors:Navid Heydarishahreza; Saeed Ebadollahi; Reza Vahidnia; F. John Dian;Navid Heydarishahreza; Saeed Ebadollahi; Reza Vahidnia; F. John Dian;Publisher: IEEE
Wireless Sensor Networks, basically applied to gather information about the environments, consist of various elements interconnection. They are mainly deployed in the areas hard to reach, so they are routinely powered by the batteries. Due to the complexity of WSNs and the impact they have on the 21st century proceeding technology, they have received lots of attention during past decades, hence it is mandatory to study their fundamentals before any forthcoming research. This paper reviews the alphabets of WSNs in a straight scenario, categorizing them in terms of application, routing and connectivity schemes, besides, practical design challenges and energy supply ways have been classified.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2015Authors:Robyn Paul; Lynne Cowe Falls;Robyn Paul; Lynne Cowe Falls;Publisher: IEEE
Societal expectations of twenty-first century engineers have dramatically changed over the past few decades. There is a need to educate engineers not just in technical subjects, but also in many non-technical areas including globalization, communication, and leadership. There has been a growth of engineering leadership education programs offered by postsecondary engineering institutions. The effectiveness of these programs is often measured by the student's acquisition of skills, without considering the benefit of these skills on the students' careers. Using the career success competencies model, this paper seeks to determine if engineering leadership education impacts career success. The theoretical mapping analysis indicated a positive relationship between engineering leadership education and career success. The most significant competencies related to an engineer's career success were career insight, proactive personality, openness to experience, and lifelong learning.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2019Open AccessAuthors:Meiling Li; Bassant Selim; Sami Muhaidat; Paschalis C. Sofotasios; Paul D. Yoo; Jie Liang; Anhong Wang;Meiling Li; Bassant Selim; Sami Muhaidat; Paschalis C. Sofotasios; Paul D. Yoo; Jie Liang; Anhong Wang;Publisher: IEEECountry: Finland
Non-orthogonal multiple access (NOMA) has been proposed as a promising technology that is capable of improving the spectral efficiency of fifth-generation wireless networks and beyond. However, in practical communication scenarios, transceiver architectures inevitably suffer from radio frequency (RF) front-end related impairments that cause non-negligible performance degradation. This issue can be addressed by analog and digital signal processing algorithms, but factors such as time-varying hardware characteristics and imperfect compensation schemes result to detrimental residual distortions. In the present contribution we investigate the physical layer security of NOMA-based amplify-and-forward relay systems under such realistically incurred residual hardware impairment (RHI) effects. Exact and asymptotic analytic expressions for the corresponding outage probability (OP) and intercept probability (IP) of the considered set up over multipath fading channels are derived and corroborated by respective simulation results. Based on this, it is shown that RHI affects both the legitimate users and eavesdroppers by increasing the OP and decreasing the IP. For a fixed OP, RHI generally increases the corresponding IP, thereby reducing the secure performance of the system. Further interesting insights are also provided, verifying the importance of the offered results for the effective design and deployment of secure cooperative communication systems. acceptedVersion Peer reviewed
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2013Authors:Kivanc Doganay; Markus Bohlin; Ola Sellin;Kivanc Doganay; Markus Bohlin; Ola Sellin;Publisher: IEEE
This paper presents a case study of search-based test generation for embedded system software units developed using the Function Block Diagrams (FBDs), a graphical language in the IEC 61131-3 standard aimed at programmable logic controllers (PLCs). We consider 279 different components from the train control software developed by Bombardier Transportation, a major rail vehicle manufacturer. The software is compiled into C code with a particular structure. We use a modified hill climbing algorithm for generating test data to maximize MC/DC coverage for assignments with logical expressions in the C code, while retaining the semantics of the original FBD implementation. An experimental evaluation for comparing the effectiveness (coverage rate) and the efficiency (required number of executions) of hill climbing algorithm with random testing is presented. The results show that random testing performs well for most units under test, while around 30% of the artifacts significantly benefit from the hill climbing algorithm. Structural properties of the units that affect the performance of hill climbing and random testing are also discussed.
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2021Open AccessAuthors:Maureen Akolo; Joshua Kimani; Lawrence Gelmon;Maureen Akolo; Joshua Kimani; Lawrence Gelmon;Publisher: BMJ Publishing Group Ltd
Background Sex workers Outreach Program (SWOP) is an STI/HIV research center serving 35000 female sex workers (FSW) through outreach services with 18000 seek HIV/STI services from the seven SWOP facilities spread across Nairobi Kenya. Program analysis showed high use of STI syndromic management antibiotics compared to budgetary allocations. This study was done to identify the gap Methodology Systematic data review of HIV positive FSW attending SWOP clinics and having been treated STI through syndromic management was done for the last two years 2020 and 2019. Data was pulled for all female sex workers who had been managed for STI syndromically, HIV status was checked and those who had a HIV diagnosis were retained in the study data base (this is because the HIV positive frequent the sites at least four times in a year compared to HIV negative FSW) Data was then separated into one time STI treatment and revisits with the same signs and symptoms for more than once in one year. Data on consistence condom use was also extracted Results Out of the 17,900 Female sex workers accessing SWOP facilities for key population services, 3038(16.9) were HIV positive. Of this HIV positive at least 4% (122) were treated for STI through syndromic management with highest 66% (81) reporting low abdominal pains with vaginal discharge. 52% (64) come back with same symptom twice of which 79%(51) reported consistent condom use, while 23% (15) come back at least more than twice with the same complains within a year with 89% reporting consistent condom use. Conclusion Given the nature of work, female sex workers have a high possibility of STI misdiagnosis. Hence countries should strive to invest in laboratory screening of STI among female sex workers to improve on correct diagnosis and treatment to reduce unnecessary use of antibiotics
Average/low popularityAverage/low popularityAverage/low influencePopularity: Citation-based measure reflecting the current impact.Average/low influenceInfluence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.