keyboard_arrow_up
Accepted Papers
Integrating Hw/sw Functionality for Flexiblewireless Radio

Alexander Strachan and Nigel Topham, School of Informatics, University of Edinburgh, Edinburgh, Scotland, EH8 9AB

ABSTRACT

Current methods of implementing wireless radio typically take one of two forms; either dedicated fixed-function hardware, or pure Software Defined Radio (SDR). Fixed function hardware is efficient, but being specific to each radio standard it lacks flexibility, whereas Software Defined Radio is highly flexible but requires powerful processors to meet real-time performance constraints. This paper presents a hybrid hardware/software approach that aims to combine the flexibility of SDR with the efficiency of dedicated hardware solutions. We evaluate this approach by simulating five variants of the IEEE 802.15.4 protocol, commonly known as Zigbee, and demonstrate the range of performance and power consumption characteristics for different accelerator and software configurations. Across the spectrum of configurations we see power consumption varies from 8% to 38% of a dedicated hardware implementation, and show how the hybrid approach allows a new modulation standard to be retrofitted to an existing design, with only a modest increase in power consumption.

KEYWORDS

Wireless Radio, Digital Signal Processing, Embedded Systems, Computer Architecture, Accelerators.


Sensory Technology in Eleam:innovating in Comprehensive Care and Fall Detection in Older Adults

Mauricio Figueroa Colarte, School of Informatics and Telecommunications, Fundación Instituto Profesional DUOC UC, Viña del Mar, Chile

ABSTRACT

In the Chilean context, Long Stay Establishments for the Elderly (ELEAM) face significant challenges in comprehensive care and prevention of falls, critical incidents for this population. This project, called "ELEAM@TIC", explores the incorporation of sensor-based technology as an innovative strategy to address these problems. Through a multidisciplinary approach, the research team, led by Mauricio Figueroa Colarte, evaluated the effectiveness and acceptability of different types of sensors strategically placed on users. Preliminary results indicate that technical aspects must be improved for a notable improvement in early risk detection and response to fall incidents, suggesting significant potential to improve the quality of life of older adults in ELEAM. This project lays the foundation for future research and development in the field of inclusive technology and comprehensive care for the elderly.

KEYWORDS

Falls Detection, Wereable, Sensors, Older Adults, Inclusive Technology.


Integrated Mortality Package to Construct Life Tables by Indirect Techniques

Salih Hamza Abuelyamen, Retired from the Central Bureau of Statistics in Sudan, Association of retired staff from the Central Bureau of Statistics - Sudan, Private Researcher

ABSTRACT

Because of memory lapse, social and other factors, direct questions on mortality status in demographic and health surveys or population censuses would not reveal accurate and complete information. Hence demographers used to apply indirect questions in data collection stage, and indirect techniques to estimate mortality indicators’ values from this data. One of the famous methods in this respect is Brass Combined Method to construct life tables by combination of child and adult survival data. To produce this information from surveys or censuses it takes a lot of time, in addition to that, the calculations include sophisticated equations using auxiliary information from different sources. This paper present computer integrated package to execute all stages of this job, starting from questionnaire design; data entry, data editing, data processing, calculation of child and adult mortality indicators and construction of life tables by this method. It is also designed to accept row data from different statistical censuses and surveys that include the required information.

KEYWORDS

Life table, Mortality, Adult, Child, Data entry.


Block with Holding Resilience

CYRIL GRUNSPAN AND RICARDO PEREZ-MARCO

ABSTRACT

It has been known for some time that the Nakamoto consensus as implemented in the Bitcoin protocol is not totally aligned with the individual interests of the participants. More precisely, it has been shown that block withholding mining strategies can exploit the difficulty adjustment algorithm of the protocol and obtain an unfair advantage. However, we show that a modification of the difficulty adjustment formula taking into account orphan blocks makes honest mining the only optimal strategy. Surprinsingly, this is still true when orphan blocks are rewarded with an amount smaller to the official block reward. This gives an incentive to signal orphan blocks. The results are independent of the connectivity of the attacker.

KEYWORDS

Bitcoin, blockchain, proof-of-work, selfish mining, martingale.


Lore: Logit-ranked Retriever Ensemble for Enhancing Open-domain Question Answering

Saikrishna Sanniboina, Shiv Trivedi and Sreenidhi Vijayaraghavan, University of Illinois at Urbana-Champaign, USA

ABSTRACT

Retrieval-based question answering systems often suffer from positional bias, leading to suboptimal answer generation. We propose LoRE (Logit-Ranked Retriever Ensemble), a novel approach that improves answer accuracy and relevance by mitigating positional bias. LoRE employs an ensemble of diverse retrievers, such as BM25 and sentence transformers with FAISS indexing. A key innovation is a logit-based answer ranking algorithm that combines the logit scores from a large language model (LLM), with the retrieval ranks of the passages. Experimental results on NarrativeQA, SQuAD demonstrate that LoRE significantly outperforms existing retrieval-based methods in terms of exact match and F1 scores. On SQuAD, LoRE achieves 14.5%, 22.83%, and 14.95% improvements over the baselines for ROUGE-L, EM, and F1, respectively. Qualitatively, LoRE generates more relevant and accurate answers, especially for complex queries.

KEYWORDS

Open-Domain Question Answering, Positional Bias, Sentence Transformers, Answer Ranking, Retrieval-Augmented Generation.


Assessing Esg Compliance and Impact: a Zero-shot Learning Approach to Analyzing Fortune 500 Companies’ Sustainability Reports

Armaan Agrawal, Princeton Day School Princeton, NJ, USA

ABSTRACT

In the evolving landscape of sustainable investing, environment, social, and governance (ESG) metrics are crucial for evaluating companies beyond financial performance. Recognizing the growing importance of ESG to stakeholders, companies release annual sustainability reports outlining their ESG goals and progress. This paper analyzes how Fortune 500 companies integrate ESG considerations into their operations and reporting. We extract the text from the sustainability reports, separate them into different sentences, classify them into nineteen ESG subcategories using a zero-shot learning model, and compare the determined ESG focuses to actual data to evaluate the authenticity and effectiveness of these reports. This examination unveils the current state of ESG compliance among leading corporations and provides insights into the challenges and successes of implementing sustainable practices. More importantly, this research aims to facilitate the process of analyzing lengthy and complex sustainability reports by offering a scalable and flexible approach through the use of zero-shot learning. By streamlining the analysis of these reports, this research contributes to a better understanding of corporate ESG efforts and their impact on a sustainable future.

KEYWORDS

ESG, NLP, Sustainability, Zero-Shot learning.


Multimodal Emotion Recognition in Text Using Advanced NLP and Deep Learning Techniques

Lucas G. M. de Castro, Adriana L. Damian, and Celso B. Carvalho, Federal University of Amazonas, Brazil

ABSTRACT

This study focuses on developing a multimodal emotion recognition system for analyzing text, audio, and video data. We propose an advanced approach that integrates natural language processing and deep learning techniques, utilizing hierarchical attention mechanisms and cross-modal transformers to improve emotion detection accuracy. Our system achieved notable performance metrics, including a 90.8% accuracy and an 89.5% F1-score, surpassing existing state-of-the-art methods. These results demonstrate the system’s effectiveness in accurately identifying emotions and its potential application in enhancing human-computer interaction and sentiment analysis tools.

KEYWORDS

Multimodal Emotion Recognition, Natural Language Processing (NLP), Sentiment Analysis, Deep Learning, Hierarchical Attention Mechanisms, Audio-Visual Data Analysis


An Efficient Sampling Framework for Graph Convolutional Network Training

Abderaouf GACEM, Mohammed HADDAD, and Hamida SEBA Univ Lyon, UCBL, CNRS, INSA Lyon, LIRIS, UMR5205

ABSTRACT

Graph Convolutional Networks(GCNs)have recently gained significant attention due to the success of Convolutional Neural Networks in imageand language processing,as well as the prevalence of data that can be represented as graphs. However, GCNs are limited by the size of the graphs they can handle and by the oversmoothing problem, which can be caused by the depth or the large receptive field of these networks. Various approaches have been proposed to address these limitations. One promising approach involves considering the minibatch training paradigm and extending it to graph-structured data by extracting subgraphs and using them as batches. Unlike the entries in a dataset of images, which are independent from one another, the essence of a graph lies in its topology, hence the dependency between its nodes. Consequently, the strategy of selecting subgraphs to form minibatches is a challenging task with a significant impact on the training process results. In this work, we propose a general framework for generating minibatches in an effective way that ensures minimal loss of node interdependence information, preserves the original graph properties, and diversifies the samples for the GCN to improve generalization. We test our training process on real-world datasets with several well-known GCN models and demonstrate the improved results compared to existing methods.

KEYWORDS

Graph Convolutional Networks, Graph Sampling, Minibatch Training.


A Transition Towards Virtual Representations of Visual Scenes

Am´erico Pereira1, 2, Pedro Carvalho1, 3, and Lu´ıs Cˆorte-Real1, 2, 1Centre for Telecommunications and Multimedia, INESC TEC, Porto, Portugal, 2Faculty of Engineering, University of Porto, Porto, Portugal, 3Polytechnic of Porto, School of Engineering, Porto, Portugal

ABSTRACT

Visual scene understanding is a fundamental task in computer vision that aims to extract meaningful information from visual data. It traditionally involves disjoint and specialized algorithms for different tasks that are tailored for specific application scenarios. This can be cumbersome when designing complex systems that include processing of visual and semantic data extracted from visual scenes, which is even more noticeable nowadays with the influx of applications for virtual or augmented reality. When designing a system that employs automatic visual scene understanding to enable a precise and semantically coherent description of the underlying scene, which can be used to fuel a visualization component with 3D virtual synthesis, the lack of flexibility and unified frameworks become more prominent. To alleviate this issue and its inherent problems, we propose an architecture that addresses the challenges of visual scene understanding and description towards a 3D virtual synthesis that enables an adaptable, unified and coherent solution. Furthermore, we expose how our proposition can be of use into multiple application areas. Additionally, we also present a proof of concept system that employs our architecture to further prove its usability in practice.

KEYWORDS

Visual Scene Understanding, Scene Understanding, 3D Reconstruction, Semantic Compression.


Wireless Communications

Nikitha Merilena Jonnada, PhD in Information Technology (Information Security Emphasis), University of the Cumberlands, Williamsburg, Kentucky, USA

ABSTRACT

In this paper, the authors discuss about the rise of wireless communications, if they are secure and safe, future of wireless industry, wireless communication security, protection methods and techniques that could help the organizations in establishing a secure wireless connection with their employees, and other factors that are important to learn and note when manufacturing, selling, or using the wireless networks and wireless communication systems.

KEYWORDS

Wireless, Network, Security, Hackers, VPN, IP address.


menu
Reach Us

emailiote@acity2024.org


emailioteconf@yahoo.com

close