772 research outputs found

    Effect of horror clips on the physiology of ans & heart

    Get PDF
    The current study deals with the ECG and, HRV parameter analysis to study the physiology of ANS and, the heart by taking data from 20 volunteers under the effect of horror clips. The volunteers had their ECG reading recorded under normal and, horror situations by showing them the same video clips and, at relatively the same time of the day(after dinner hours) to keep uniformity in the readings and, reduce any ambiguity that might be present. Our results showed us that the effect of HRV parameters on the physiology of heart was significant. The time series data and, the time series data using wavelet (db-6 wavelet) didn’t affect the ECG readings of horror much more than that of normal readings of the same subjects. This was also verified by t-test grouping. The results clearly show that HRV parameters affect the horror ECG readings

    Watermarking Technique for Tamper Detection of Cheque Image in CTS

    Get PDF
    Digitalization of banking sector have brought all their operations online and even money transaction too. But still 70 ? 80 percent of transaction takes place through movement of physical cheque. So to overcome the drawbacks of traditional cheque clearing system, RBI proposed an idea of Cheque Truncation System. This system has faster clearing cycles and captures the image of the cheque and sends it to the drawee bank and prevents the movement of physical cheque between the banks. As CTS involves transmission of cheque images, the content of the cheque images can be modified or tampered to commit fraud. So there is a need to protect the cheque image. Thus this paper proposes a digital watermarking technique to detect the tampered regions in the cheque image

    Aggressive Smartphone Thermal Mitigation at High Temperatures

    Get PDF
    Thermal mitigation at a smartphone is improved by employing an emergency disconnect mode that is entered in response to heat at the smartphone exceeding a specified threshold. In the emergency disconnect mode, the smartphone is disconnected from a cellular network. This allows the components of a radio front-end of the smartphone to be turned off or placed in a low power mode while the smartphone is in the emergency disconnect mode, thereby rapidly decreasing the amount of heat generated at the device and allowing the smartphone to return to a normal mode of operation more quickly

    Thermal Downlink Throttle UE Specific Approach

    Get PDF
    During operation, temperatures of a mobile communication device of an end user (user equipment or “UE”) can increase to high levels. In particular, UE temperatures can rise when receiving large amounts of data during downlink communication with a network. Generally, there is no ability to limit the amount of downlink throughput when the UE device is in single carrier mode. However, downlink throughput throttling can be used to thermally mitigate increasing UE temperatures. As the temperature of the UE increases, the network can be notified to decrease the amount of downlink throughput, thus reducing the power levels and the temperature of the UE. Once the temperature of the UE starts to reduce, the network can then be notified to increase downlink throughput in a gradual manner

    Throttling downlink throughput to mitigate device temperature increase

    Get PDF
    The temperature of a mobile device can increase due to heavy use, e.g., high-speed downloads, large computational load, etc. Sustained periods of high temperature can damage the mobile device. The techniques of this disclosure reduce downlink throughput upon detection of device temperature that exceeds a threshold. Throughput is reduced, e.g., by signaling the thermal state to the network, by reporting lower channel quality indicator (CQI) values to the network, etc. After the temperature drops to a safe level, throughput is brought back up in a phased manner

    Thermal Mitigation at User Equipment Based on Ambient Temperature

    Get PDF
    User equipment (UE) or other user devices employ thermal mitigation schemes that are responsive to the ambient temperature of the device. Such schemes can employ different levels or modes of thermal mitigation techniques based on ambient temperature, the thresholds that trigger the switch between levels or modes may be scaled based on ambient temperature, or a combination thereof

    NICE: Robust Scheduling through Reinforcement Learning-Guided Integer Programming

    Full text link
    Integer programs provide a powerful abstraction for representing a wide range of real-world scheduling problems. Despite their ability to model general scheduling problems, solving large-scale integer programs (IP) remains a computational challenge in practice. The incorporation of more complex objectives such as robustness to disruptions further exacerbates the computational challenge. We present NICE (Neural network IP Coefficient Extraction), a novel technique that combines reinforcement learning and integer programming to tackle the problem of robust scheduling. More specifically, NICE uses reinforcement learning to approximately represent complex objectives in an integer programming formulation. We use NICE to determine assignments of pilots to a flight crew schedule so as to reduce the impact of disruptions. We compare NICE with (1) a baseline integer programming formulation that produces a feasible crew schedule, and (2) a robust integer programming formulation that explicitly tries to minimize the impact of disruptions. Our experiments show that, across a variety of scenarios, NICE produces schedules resulting in 33\% to 48\% fewer disruptions than the baseline formulation. Moreover, in more severely constrained scheduling scenarios in which the robust integer program fails to produce a schedule within 90 minutes, NICE is able to build robust schedules in less than 2 seconds on average.Comment: Accepted in 36th AAAI Conference. 7 pages + 2 pages appendix, 1 figure. Code available at https://github.com/nsidn98/NIC

    Enable and Disable 5G Based on Application Identifier

    Get PDF
    A communication device, otherwise known as a user equipment (UE) (e.g., a smartphone) may be configured to support various radio access technologies, which may include fourth generation (4G) such as Long-Term Evolution (LTE) or LTE-Advanced (LTE-A), as well as fifth generation (5G) New Radio (NR) (e.g., millimeter wave (mmW)). The UE may be configured to support various types of applications (e.g., social media applications, video streaming applications, and the like) using one or more radio access technologies (e.g., 4G or 5G). As demand for efficiency increases, it may be desirable to reduce power consumption for the UE (e.g., increase battery life), while providing higher reliability and lower latency for applications running on the UE using one or more radio access technologies

    Selective Disabling of Antenna Modules Affected by Handgrip or Other Blockage

    Get PDF
    User equipment (UE) employing millimeter-wave (mmWave) radio frequency (RF) signaling uses one or more techniques to detect signaling blockages caused by handgrip, body blockage, or lack of line-of-sight with the wireless base station, identifies one or more antenna modules of an array of antenna modules of the UE affected by the blockage, and temporarily disables the one or more affected antenna modules until the blockage is no longer present. As the UE otherwise would consume considerable power attempting to overcome the blockage at the affected antenna module, either by transmitting at a higher power to overcome the attenuation caused by the blockage or to continue to ineffectively scan via the affected antenna module, this selective antenna module disablement process can reduce power consumption at the UE while facilitating a high-quality user experience
    corecore