首页 > 最新文献

2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)最新文献

英文 中文
Integrated Systems Analysis Software for Interdependency Analysis of Railway Systems 铁路系统相互依赖分析的集成系统分析软件
Muhd Sharil Reiza Ismail, Andrew Keong Ng, Oh Sin Hin, Tan Chuan Heng
As the complexity of railway network increases, tools and methods for analyzing the interactions and behaviors of railway systems are needed by system engineers. This paper aims to design and develop an integrated systems analysis software (ISAS) that can efficiently access the railway integrated system design information and effectively analyze the interdependencies of railway systems, thereby increasing work productivity while reducing time and labor costs. With Microsoft Access, a relational database management system, the proposed ISAS can also extract information relevant to the user query, display it on a user-friendly graphical user interface, and summarize it in an easy-to-read report to facilitate system design discussions and meetings.
随着铁路网络复杂性的增加,系统工程师需要分析铁路系统相互作用和行为的工具和方法。本文旨在设计和开发一个集成系统分析软件(ISAS),能够高效地获取铁路集成系统设计信息,有效地分析铁路系统之间的相互依赖关系,从而在提高工作效率的同时减少时间和人工成本。利用关系型数据库管理系统Microsoft Access,提出的ISAS还可以提取与用户查询相关的信息,显示在用户友好的图形用户界面上,并将其总结为易于阅读的报告,以方便系统设计讨论和会议。
{"title":"Integrated Systems Analysis Software for Interdependency Analysis of Railway Systems","authors":"Muhd Sharil Reiza Ismail, Andrew Keong Ng, Oh Sin Hin, Tan Chuan Heng","doi":"10.1109/SOLI.2018.8476696","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476696","url":null,"abstract":"As the complexity of railway network increases, tools and methods for analyzing the interactions and behaviors of railway systems are needed by system engineers. This paper aims to design and develop an integrated systems analysis software (ISAS) that can efficiently access the railway integrated system design information and effectively analyze the interdependencies of railway systems, thereby increasing work productivity while reducing time and labor costs. With Microsoft Access, a relational database management system, the proposed ISAS can also extract information relevant to the user query, display it on a user-friendly graphical user interface, and summarize it in an easy-to-read report to facilitate system design discussions and meetings.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125460850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Servitization as a key driver for Digital Transformation of manufacturing companies’ Spare Parts Service 服务化是制造企业备件服务数字化转型的关键驱动力
U. Dombrowski, Simon Fochler
The increasing service orientation of manufacturing companies places new requirements on traditional business areas such as the Spare Parts Service. The development of Servitization is a driver of Digital Transformation, especially in the After Sales Service. For the front-end processes between customer and customer service, the Digital Transformation acts as a technological vehicle that makes it possible to satisfy the new requirements demanded by the customer. For the back-end processes between Customer Service and Spare Parts Service, on the other hand, the Digital Transformation is an opportunity to face the internal efficiency and cost pressure resulting from Servitization in line with requirements. Especially the selection of implementation projects of the technologies of Digital Transformation with regard to high investment costs as well as a vague benefit transparency face companies with huge challenges. Against this background, 743 use cases are analyzed on the basis of a network analysis in order to identify possible causal chains between target values, process characteristics and technologies used. On this basis, target figure profiles are derived that can help manufacturing companies in the Spare Parts Service to select and implement technologies that meet their individual goals in order to meet the challenges of Servitization.
制造企业日益增长的服务导向对传统业务领域(如备件服务)提出了新的要求。服务化的发展是数字化转型的驱动力,特别是在售后服务方面。对于客户和客户服务之间的前端流程,数字化转型充当了一种技术工具,使满足客户所要求的新需求成为可能。另一方面,对于客户服务和备件服务之间的后端流程,数字化转型是一个机会,可以根据需求面对服务化带来的内部效率和成本压力。特别是数字化转型技术实施项目的选择,投资成本高,效益透明度模糊,给企业带来巨大挑战。在此背景下,在网络分析的基础上分析了743个用例,以确定目标值、过程特征和所使用的技术之间可能的因果链。在此基础上,导出了目标图形概要,可以帮助备件服务中的制造公司选择和实施满足其个人目标的技术,以应对服务化的挑战。
{"title":"Servitization as a key driver for Digital Transformation of manufacturing companies’ Spare Parts Service","authors":"U. Dombrowski, Simon Fochler","doi":"10.1109/SOLI.2018.8476713","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476713","url":null,"abstract":"The increasing service orientation of manufacturing companies places new requirements on traditional business areas such as the Spare Parts Service. The development of Servitization is a driver of Digital Transformation, especially in the After Sales Service. For the front-end processes between customer and customer service, the Digital Transformation acts as a technological vehicle that makes it possible to satisfy the new requirements demanded by the customer. For the back-end processes between Customer Service and Spare Parts Service, on the other hand, the Digital Transformation is an opportunity to face the internal efficiency and cost pressure resulting from Servitization in line with requirements. Especially the selection of implementation projects of the technologies of Digital Transformation with regard to high investment costs as well as a vague benefit transparency face companies with huge challenges. Against this background, 743 use cases are analyzed on the basis of a network analysis in order to identify possible causal chains between target values, process characteristics and technologies used. On this basis, target figure profiles are derived that can help manufacturing companies in the Spare Parts Service to select and implement technologies that meet their individual goals in order to meet the challenges of Servitization.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126736202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Overview of Warehousing Applications based on Cable Robot Technology in Logistics 基于电缆机器人技术的物流仓储应用综述
C. Alias, I. Nikolaev, E. G. C. Magallanes, B. Noche
Robotics belongs to the megatrends radically changing the logistics industry which has long time been reluctant to the adoption of technological innovation. Facing aggravated competition by ever new and stronger actors in the industry, labor shortage due to demographic shifts, and constant cost pressure, logistics robots are considered as an effective means to tackle those problems. By taking a look at the market of logistics robots, the market condition for cable-driven parallel robots for storage purposes can be studied and a successful introduction into the market of material handling devices initiated. Hence, this paper examines the prevalence of robotics solutions in general and cable-robot applications in particular in the logistics industry.
机器人属于从根本上改变物流业的大趋势,而物流业长期以来一直不愿采用技术创新。面对日益激烈的行业竞争,人口结构变化导致的劳动力短缺,以及持续的成本压力,物流机器人被认为是解决这些问题的有效手段。通过观察物流机器人市场,可以研究用于存储目的的电缆驱动并联机器人的市场状况,并开始成功地引入物料搬运设备市场。因此,本文研究了机器人解决方案的普遍性和电缆机器人的应用,特别是在物流行业。
{"title":"An Overview of Warehousing Applications based on Cable Robot Technology in Logistics","authors":"C. Alias, I. Nikolaev, E. G. C. Magallanes, B. Noche","doi":"10.1109/SOLI.2018.8476760","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476760","url":null,"abstract":"Robotics belongs to the megatrends radically changing the logistics industry which has long time been reluctant to the adoption of technological innovation. Facing aggravated competition by ever new and stronger actors in the industry, labor shortage due to demographic shifts, and constant cost pressure, logistics robots are considered as an effective means to tackle those problems. By taking a look at the market of logistics robots, the market condition for cable-driven parallel robots for storage purposes can be studied and a successful introduction into the market of material handling devices initiated. Hence, this paper examines the prevalence of robotics solutions in general and cable-robot applications in particular in the logistics industry.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131421777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Anonymization and Analysis of Horizontally and Vertically Divided User Profile Databases with Multiple Sensitive Attributes 多敏感属性横向和纵向划分用户档案数据库的匿名化与分析
Yuki Ina, Y. Sei, Yasuyuki Tahara, Akihiko Ohsuga
Preventing the identification of individuals is important when data analyzers have to guarantee the safety of the data analysis they work with. A method proposed to solve this problem entails altering a part of the data value or deleting it. As to the processes, attributes of the individual data are divided into three groups: identifier (ID), quasi-identifier (QID), and sensitive attribute (SA). ID is the data that identify an individual directly, such as name. QID is the attributes that could identify an individual by combining them, such as age and birthplace. SA is very important information and should not be exposed when the data is identified to an individual. Utilizing these concepts, a safety metric for the data, such as l-diversity, is proposed so far. Under l-diversity, we use the assumption that the SA value is not known for anyone, and we process the data to prevent attackers from identifying. However, there are scenarios in which existing methods cannot protect the data against an invasion of privacy. In an analysis completed by multiple organizations, they integrated their data to carry out the effective data research. Although they can obtain profitable results, the integrated data could include information that attackers use to identify people. Specifically speaking, if the attacker is an institute providing data, they can use their own data’ SA value as a QID value. The assumption of l-diversity is violated, so the existing safety metric loses its effect on protecting data. In this paper, we propose a new anonymization method to conceal organizations’ important data by inserting dummy values, thereby enabling analysts to use the data safely. At the same time, we provide a calculating method to decrease the influence of the noise generated from the dummy insertion. We confirm these methods’ effectiveness by measuring accuracy in a data analysis experiments.
当数据分析人员必须保证他们所使用的数据分析的安全性时,防止识别个人是很重要的。解决这个问题的一种方法是修改数据值的一部分或删除它。在处理方面,将单个数据的属性分为三组:标识符(ID)、准标识符(QID)和敏感属性(SA)。ID是直接标识个人的数据,如姓名。QID是可以通过组合这些属性来识别个人的属性,比如年龄和出生地。SA是非常重要的信息,当数据被识别给个人时,不应该公开SA。利用这些概念,目前提出了一种数据的安全度量,如l-diversity。在l-diversity下,我们假设SA值不为任何人所知,并对数据进行处理以防止攻击者识别。然而,在某些情况下,现有方法无法保护数据免受隐私侵犯。在一个由多个组织完成的分析中,他们整合了他们的数据来进行有效的数据研究。虽然他们可以获得有利可图的结果,但整合的数据可能包括攻击者用来识别人的信息。具体来说,如果攻击者是提供数据的机构,他们可以使用自己数据的SA值作为QID值。违反了l-分集的假设,使现有的安全度量失去了保护数据的作用。在本文中,我们提出了一种新的匿名化方法,通过插入虚拟值来隐藏组织的重要数据,从而使分析人员能够安全地使用数据。同时,给出了一种减小假人插入噪声影响的计算方法。在数据分析实验中,我们通过测量精度来验证这些方法的有效性。
{"title":"Anonymization and Analysis of Horizontally and Vertically Divided User Profile Databases with Multiple Sensitive Attributes","authors":"Yuki Ina, Y. Sei, Yasuyuki Tahara, Akihiko Ohsuga","doi":"10.1109/SOLI.2018.8476730","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476730","url":null,"abstract":"Preventing the identification of individuals is important when data analyzers have to guarantee the safety of the data analysis they work with. A method proposed to solve this problem entails altering a part of the data value or deleting it. As to the processes, attributes of the individual data are divided into three groups: identifier (ID), quasi-identifier (QID), and sensitive attribute (SA). ID is the data that identify an individual directly, such as name. QID is the attributes that could identify an individual by combining them, such as age and birthplace. SA is very important information and should not be exposed when the data is identified to an individual. Utilizing these concepts, a safety metric for the data, such as l-diversity, is proposed so far. Under l-diversity, we use the assumption that the SA value is not known for anyone, and we process the data to prevent attackers from identifying. However, there are scenarios in which existing methods cannot protect the data against an invasion of privacy. In an analysis completed by multiple organizations, they integrated their data to carry out the effective data research. Although they can obtain profitable results, the integrated data could include information that attackers use to identify people. Specifically speaking, if the attacker is an institute providing data, they can use their own data’ SA value as a QID value. The assumption of l-diversity is violated, so the existing safety metric loses its effect on protecting data. In this paper, we propose a new anonymization method to conceal organizations’ important data by inserting dummy values, thereby enabling analysts to use the data safely. At the same time, we provide a calculating method to decrease the influence of the noise generated from the dummy insertion. We confirm these methods’ effectiveness by measuring accuracy in a data analysis experiments.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Inductive Perforated Ground Backed Thin Electrically Large Zero-Phase-Shift Line Loop Antenna for UHF Near-Field RFID Reader 一种用于超高频近场RFID阅读器的电感式穿孔接地背薄电大零相移线环天线
Wei E. I. Liu, Zhi Ning Chen, Edna Ng Kai Yin, Yunjia Zeng, X. Qing
An electrically large zero-phase-shift line (ZPSL) segmented loop antenna backed by an inductive perforated ground plane is proposed for ultra-high frequency near-field RFID systems. The ZPSL segmented loop configuration enables a uniform distribution of magnetic field over an electrically large interrogation zone, while the backed inductive perforated ground plane is introduced to realize a stronger magnetic field for a longer reading range, even with a thinner overall profile as compared with a metal ground plane backed counterpart.
提出了一种用于超高频近场RFID系统的电感式穿孔接地面的电大零相移线(ZPSL)分段环路天线。ZPSL分段环路配置使磁场均匀分布在一个电大的询问区,而背面的感应穿孔接地面被引入实现更强的磁场,更长的读取范围,即使与金属接地面相比,更薄的整体轮廓。
{"title":"An Inductive Perforated Ground Backed Thin Electrically Large Zero-Phase-Shift Line Loop Antenna for UHF Near-Field RFID Reader","authors":"Wei E. I. Liu, Zhi Ning Chen, Edna Ng Kai Yin, Yunjia Zeng, X. Qing","doi":"10.1109/SOLI.2018.8476763","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476763","url":null,"abstract":"An electrically large zero-phase-shift line (ZPSL) segmented loop antenna backed by an inductive perforated ground plane is proposed for ultra-high frequency near-field RFID systems. The ZPSL segmented loop configuration enables a uniform distribution of magnetic field over an electrically large interrogation zone, while the backed inductive perforated ground plane is introduced to realize a stronger magnetic field for a longer reading range, even with a thinner overall profile as compared with a metal ground plane backed counterpart.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115624576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Inter-organizational Knowledge Flow and R&D portfolio of Patent Citation Network - The Case of the Socket Wrench Industry 专利引用网络的组织间知识流动与研发组合——以套筒扳手行业为例
Hwa-Nan Chang, Su-Chuan Liu, C. Chiang, Kei-Kei Lai
Manufacturers invest in research and development, absorb the technical knowledge of competing operators, to become the core competencies, and further construct a different portfolio of technical capacities. This study, from the perspective of patent statistics, examines retrieved patent information and formulates patent statistics to use patent backward citation, then group the information of the knowledge betweenness is obtained. The patent between the citation network and the relative citation propensity in order to measure the source of technology and direction of movement, explore the industrial technical competitive advantages of Socket Wrench Industry. This study analyzes the strengths and weaknesses of the research and development portfolio of knowledge betweenness of Socket Wrench Industry. Knowledge betweenness companies can effectively monitor their own technical capabilities, and technological advantages to adjust the direction of R&D.
制造商投资研发,吸收竞争运营商的技术知识,成为核心竞争力,并进一步构建不同的技术能力组合。本研究从专利统计的角度,对检索到的专利信息进行检验,并制定专利统计数据,利用专利后向引文,对知识间度信息进行分组。通过专利之间的引文网络和相对引文倾向性来衡量技术的来源和运动方向,探索套筒扳手行业的产业技术竞争优势。本研究分析了套筒扳手行业知识间性研发组合的优势与不足。知识间企业可以有效监控自身的技术能力,并根据技术优势调整研发方向。
{"title":"Inter-organizational Knowledge Flow and R&D portfolio of Patent Citation Network - The Case of the Socket Wrench Industry","authors":"Hwa-Nan Chang, Su-Chuan Liu, C. Chiang, Kei-Kei Lai","doi":"10.1109/SOLI.2018.8476786","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476786","url":null,"abstract":"Manufacturers invest in research and development, absorb the technical knowledge of competing operators, to become the core competencies, and further construct a different portfolio of technical capacities. This study, from the perspective of patent statistics, examines retrieved patent information and formulates patent statistics to use patent backward citation, then group the information of the knowledge betweenness is obtained. The patent between the citation network and the relative citation propensity in order to measure the source of technology and direction of movement, explore the industrial technical competitive advantages of Socket Wrench Industry. This study analyzes the strengths and weaknesses of the research and development portfolio of knowledge betweenness of Socket Wrench Industry. Knowledge betweenness companies can effectively monitor their own technical capabilities, and technological advantages to adjust the direction of R&D.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115366180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UNSTRUCTURED BIG DATA ANALYTICS FOR AIR CARGO LOGISTICS MANAGEMENT 航空货运物流管理的非结构化大数据分析
Pei-Ju Wu, Chun-Kai Yang
Air cargo logistics plays a crucial role in speedy distribution enabling products to be promptly shipped between locations, but few studies have explored the business knowledge of air cargo logistics by unstructured big data. Hence, this study develops a hybrid data mining model to tackle critical issues of air cargo logistics as well as to generate operational strategies for those who would like to manage aviation logistics. Eight vital themes of air cargo logistics from the analytical results of the proposed hybrid data mining model are runway expansion, the air cargo platform, special logistics and certification, e-commerce logistics, cooperation, network expansion, market observation, and airplane conversion. Furthermore, innovation diffusion theory and resource dependence theory are incorporated into the empirical results of a hybrid data mining model to generate the following air cargo logistics strategies: "develop innovative aviation logistics in a suitable manner" and "establish strategic cooperation to enhance aviation logistics performance."
航空货运物流在快速配送中发挥着至关重要的作用,使产品能够在不同地点之间迅速运送,但很少有研究利用非结构化大数据探索航空货运物流的业务知识。因此,本研究开发了一种混合数据挖掘模型,以解决航空货运物流的关键问题,并为那些想要管理航空物流的人提供操作策略。从混合数据挖掘模型的分析结果来看,航空货运物流的八个重要主题是跑道扩展、航空货运平台、特种物流和认证、电子商务物流、合作、网络扩展、市场观察和飞机转换。并将创新扩散理论和资源依赖理论纳入混合数据挖掘模型的实证结果,得出“适当发展创新航空物流”和“建立战略合作提升航空物流绩效”的航空货运物流策略。
{"title":"UNSTRUCTURED BIG DATA ANALYTICS FOR AIR CARGO LOGISTICS MANAGEMENT","authors":"Pei-Ju Wu, Chun-Kai Yang","doi":"10.1109/SOLI.2018.8476741","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476741","url":null,"abstract":"Air cargo logistics plays a crucial role in speedy distribution enabling products to be promptly shipped between locations, but few studies have explored the business knowledge of air cargo logistics by unstructured big data. Hence, this study develops a hybrid data mining model to tackle critical issues of air cargo logistics as well as to generate operational strategies for those who would like to manage aviation logistics. Eight vital themes of air cargo logistics from the analytical results of the proposed hybrid data mining model are runway expansion, the air cargo platform, special logistics and certification, e-commerce logistics, cooperation, network expansion, market observation, and airplane conversion. Furthermore, innovation diffusion theory and resource dependence theory are incorporated into the empirical results of a hybrid data mining model to generate the following air cargo logistics strategies: \"develop innovative aviation logistics in a suitable manner\" and \"establish strategic cooperation to enhance aviation logistics performance.\"","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124628318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
High-Isolated Coplanar-Fed Circularly Polarized 2×2 Curl Antenna for MIMO Applications 用于MIMO应用的高隔离共面馈电圆极化2×2旋度天线
Yuanyan Su, Zhi Ning Chen
This paper proposes a coplanar-fed circularly polarized curl antenna for MIMO applications, whose feeding element consists of a metal strip and an inner conductor of coaxial line to match the 50Ω system and to ease the fabrication process. The radiation element including a horizontal strip and a curl strip is etched on the Rogers4003C substrate to enhance the robustness of the antenna system. Besides, a design guideline of a high-isolated 2×2 MIMO antenna is provided such that the antenna isolation of > 25 dB can be obtained theoretically. Both the simulation and measurement results are quite in agreement with each other, indicating that the isolation of > 22 dB is achieved within the axial ratio bandwidth of ~ 4%.
本文提出了一种用于MIMO应用的共面馈电圆极化旋度天线,其馈电元件由金属带和同轴线内导体组成,以匹配50Ω系统并简化制造工艺。包括水平条和卷曲条的辐射元件蚀刻在罗杰斯4003c基板上,以增强天线系统的鲁棒性。此外,还提出了一种高隔离度2×2 MIMO天线的设计准则,理论上可以获得> 25 dB的天线隔离度。仿真结果与实测结果相当吻合,表明在~ 4%的轴比带宽范围内实现了>22db的隔离。
{"title":"High-Isolated Coplanar-Fed Circularly Polarized 2×2 Curl Antenna for MIMO Applications","authors":"Yuanyan Su, Zhi Ning Chen","doi":"10.1109/SOLI.2018.8476762","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476762","url":null,"abstract":"This paper proposes a coplanar-fed circularly polarized curl antenna for MIMO applications, whose feeding element consists of a metal strip and an inner conductor of coaxial line to match the 50Ω system and to ease the fabrication process. The radiation element including a horizontal strip and a curl strip is etched on the Rogers4003C substrate to enhance the robustness of the antenna system. Besides, a design guideline of a high-isolated 2×2 MIMO antenna is provided such that the antenna isolation of > 25 dB can be obtained theoretically. Both the simulation and measurement results are quite in agreement with each other, indicating that the isolation of > 22 dB is achieved within the axial ratio bandwidth of ~ 4%.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116449955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Faster Number Theoretic Transform on Graphics Processors for Ring Learning with Errors Based Cryptography 基于错误密码环学习的图形处理器更快的数论变换
Ahmad Al Badawi, B. Veeravalli, Khin Mi Mi Aung
The Number Theoretic Transform (NTT) has been revived recently by the advent of the Ring-Learning with Errors (Ring-LWE) Homomorphic Encryption (HE) schemes. In these schemes, the NTT is used to calculate the product of high degree polynomials with multi-precision coefficients in quasilinear time. This is known as the most time-consuming operation in Ring–based HE schemes. Therefore; accelerating NTT is key to realize efficient implementations. As such, in its current version, a fast NTT implementation is included in cuHE, which is a publicly available HE library in Compute Unified Device Architecture (CUDA). We analyzed cuHE NTT kernels and found out that they suffer from two performance pitfalls: shared memory conflicts and thread divergence. We show that by using a set of CUDA tailored-made optimizations, we can improve on the speed of cuHE NTT computation by 20%-50% for different problem sizes.
近年来,有误差环学习(Ring-LWE)同态加密(HE)方案的出现使数论变换(NTT)重新焕发了新生。在这些格式中,NTT用于在拟线性时间内计算具有多精度系数的高次多项式的乘积。这是基于ring的HE方案中最耗时的操作。因此;加速NTT是实现高效实施的关键。因此,在其当前版本中,快速NTT实现包含在cuHE中,这是计算统一设备体系结构(CUDA)中公开可用的HE库。我们分析了cuHE NTT内核,发现它们存在两个性能缺陷:共享内存冲突和线程发散。我们表明,通过使用一组CUDA量身定制的优化,我们可以将不同问题大小的cuHE NTT计算速度提高20%-50%。
{"title":"Faster Number Theoretic Transform on Graphics Processors for Ring Learning with Errors Based Cryptography","authors":"Ahmad Al Badawi, B. Veeravalli, Khin Mi Mi Aung","doi":"10.1109/SOLI.2018.8476725","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476725","url":null,"abstract":"The Number Theoretic Transform (NTT) has been revived recently by the advent of the Ring-Learning with Errors (Ring-LWE) Homomorphic Encryption (HE) schemes. In these schemes, the NTT is used to calculate the product of high degree polynomials with multi-precision coefficients in quasilinear time. This is known as the most time-consuming operation in Ring–based HE schemes. Therefore; accelerating NTT is key to realize efficient implementations. As such, in its current version, a fast NTT implementation is included in cuHE, which is a publicly available HE library in Compute Unified Device Architecture (CUDA). We analyzed cuHE NTT kernels and found out that they suffer from two performance pitfalls: shared memory conflicts and thread divergence. We show that by using a set of CUDA tailored-made optimizations, we can improve on the speed of cuHE NTT computation by 20%-50% for different problem sizes.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127388414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Blockchain-base structures for a secure and operate network of semi-autonomous Unmanned Aerial Vehicles 基于区块链的结构,用于安全和可操作的半自动无人机网络
A. Kuzmin, Evgeny Znak
Unmanned Aerial Vehicles — UAVs, or drones — are now being operated by several military forces and currently, to a more limited extent, by civilian organizations. These latter operations, however, may eventually expand to exceed, in number and diversity, those of the military. Further expected development in battery capacity, construction materials and software, especially regarding machine learning algorithms and drone integration, will definitely increase UAVs’ autonomous. Unique risks associated with UAVs like risk of hackers’ attacks to intercept the control are also increasing. More incidents likely will occur once regulations are finalized that encourage more use that is widespread. Such incidents could result in multi-million dollar claims against businesses, operators and manufacturers.Blockchain is the basis technology for cryptocurrencies. However, Blockchain can have far larger applications in the field of UAVs, because Blockchain is highly distributed and publically viewable system of sequentially linked cryptographically.This paper presents a concept of application, where each UAV in the UAVNet is a Blockchain node, has on-board functionality for creating and reading transactions from the block, as well as communication tools for exchanging transactions with other UAVs.
无人驾驶飞行器(UAVs,或称无人机)现在由几支军队使用,目前在更有限的程度上由民间组织使用。然而,后一种行动可能最终扩大,在数量和多样性上超过军事行动。电池容量、建筑材料和软件的进一步发展,特别是在机器学习算法和无人机集成方面,肯定会提高无人机的自主性。与无人机相关的独特风险,如黑客攻击拦截控制的风险也在增加。一旦鼓励更多使用的法规最终确定,可能会发生更多的事故。此类事件可能导致针对企业、运营商和制造商的数百万美元索赔。区块链是加密货币的基础技术。然而,区块链在无人机领域可以有更大的应用,因为区块链是高度分布式和公开可见的顺序链接加密系统。本文提出了一个应用概念,其中UAVNet中的每个无人机都是一个区块链节点,具有从区块中创建和读取交易的机载功能,以及用于与其他无人机交换交易的通信工具。
{"title":"Blockchain-base structures for a secure and operate network of semi-autonomous Unmanned Aerial Vehicles","authors":"A. Kuzmin, Evgeny Znak","doi":"10.1109/SOLI.2018.8476785","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476785","url":null,"abstract":"Unmanned Aerial Vehicles — UAVs, or drones — are now being operated by several military forces and currently, to a more limited extent, by civilian organizations. These latter operations, however, may eventually expand to exceed, in number and diversity, those of the military. Further expected development in battery capacity, construction materials and software, especially regarding machine learning algorithms and drone integration, will definitely increase UAVs’ autonomous. Unique risks associated with UAVs like risk of hackers’ attacks to intercept the control are also increasing. More incidents likely will occur once regulations are finalized that encourage more use that is widespread. Such incidents could result in multi-million dollar claims against businesses, operators and manufacturers.Blockchain is the basis technology for cryptocurrencies. However, Blockchain can have far larger applications in the field of UAVs, because Blockchain is highly distributed and publically viewable system of sequentially linked cryptographically.This paper presents a concept of application, where each UAV in the UAVNet is a Blockchain node, has on-board functionality for creating and reading transactions from the block, as well as communication tools for exchanging transactions with other UAVs.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115721518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1