805 research outputs found
Effect of horror clips on the physiology of ans & heart
The current study deals with the ECG and, HRV parameter analysis to study the physiology of ANS and, the heart by taking data from 20 volunteers under the effect of horror clips. The volunteers had their ECG reading recorded under normal and, horror situations by showing them the same video clips and, at relatively the same time of the day(after dinner hours) to keep uniformity in the readings and, reduce any ambiguity that might be present. Our results showed us that the effect of HRV parameters on the physiology of heart was significant. The time series data and, the time series data using wavelet (db-6 wavelet) didn’t affect the ECG readings of horror much more than that of normal readings of the same subjects. This was also verified by t-test grouping. The results clearly show that HRV parameters affect the horror ECG readings
Watermarking Technique for Tamper Detection of Cheque Image in CTS
Digitalization of banking sector have brought all their operations online and even money transaction too. But still 70 ? 80 percent of transaction takes place through movement of physical cheque. So to overcome the drawbacks of traditional cheque clearing system, RBI proposed an idea of Cheque Truncation System. This system has faster clearing cycles and captures the image of the cheque and sends it to the drawee bank and prevents the movement of physical cheque between the banks. As CTS involves transmission of cheque images, the content of the cheque images can be modified or tampered to commit fraud. So there is a need to protect the cheque image. Thus this paper proposes a digital watermarking technique to detect the tampered regions in the cheque image
Aggressive Smartphone Thermal Mitigation at High Temperatures
Thermal mitigation at a smartphone is improved by employing an emergency disconnect mode that is entered in response to heat at the smartphone exceeding a specified threshold. In the emergency disconnect mode, the smartphone is disconnected from a cellular network. This allows the components of a radio front-end of the smartphone to be turned off or placed in a low power mode while the smartphone is in the emergency disconnect mode, thereby rapidly decreasing the amount of heat generated at the device and allowing the smartphone to return to a normal mode of operation more quickly
Thermal Downlink Throttle UE Specific Approach
During operation, temperatures of a mobile communication device of an end user (user equipment or “UE”) can increase to high levels. In particular, UE temperatures can rise when receiving large amounts of data during downlink communication with a network. Generally, there is no ability to limit the amount of downlink throughput when the UE device is in single carrier mode. However, downlink throughput throttling can be used to thermally mitigate increasing UE temperatures. As the temperature of the UE increases, the network can be notified to decrease the amount of downlink throughput, thus reducing the power levels and the temperature of the UE. Once the temperature of the UE starts to reduce, the network can then be notified to increase downlink throughput in a gradual manner
Throttling downlink throughput to mitigate device temperature increase
The temperature of a mobile device can increase due to heavy use, e.g., high-speed downloads, large computational load, etc. Sustained periods of high temperature can damage the mobile device. The techniques of this disclosure reduce downlink throughput upon detection of device temperature that exceeds a threshold. Throughput is reduced, e.g., by signaling the thermal state to the network, by reporting lower channel quality indicator (CQI) values to the network, etc. After the temperature drops to a safe level, throughput is brought back up in a phased manner
Thermal Mitigation at User Equipment Based on Ambient Temperature
User equipment (UE) or other user devices employ thermal mitigation schemes that are responsive to the ambient temperature of the device. Such schemes can employ different levels or modes of thermal mitigation techniques based on ambient temperature, the thresholds that trigger the switch between levels or modes may be scaled based on ambient temperature, or a combination thereof
NICE: Robust Scheduling through Reinforcement Learning-Guided Integer Programming
Integer programs provide a powerful abstraction for representing a wide range
of real-world scheduling problems. Despite their ability to model general
scheduling problems, solving large-scale integer programs (IP) remains a
computational challenge in practice. The incorporation of more complex
objectives such as robustness to disruptions further exacerbates the
computational challenge. We present NICE (Neural network IP Coefficient
Extraction), a novel technique that combines reinforcement learning and integer
programming to tackle the problem of robust scheduling. More specifically, NICE
uses reinforcement learning to approximately represent complex objectives in an
integer programming formulation. We use NICE to determine assignments of pilots
to a flight crew schedule so as to reduce the impact of disruptions. We compare
NICE with (1) a baseline integer programming formulation that produces a
feasible crew schedule, and (2) a robust integer programming formulation that
explicitly tries to minimize the impact of disruptions. Our experiments show
that, across a variety of scenarios, NICE produces schedules resulting in 33\%
to 48\% fewer disruptions than the baseline formulation. Moreover, in more
severely constrained scheduling scenarios in which the robust integer program
fails to produce a schedule within 90 minutes, NICE is able to build robust
schedules in less than 2 seconds on average.Comment: Accepted in 36th AAAI Conference. 7 pages + 2 pages appendix, 1
figure. Code available at https://github.com/nsidn98/NIC
Enable and Disable 5G Based on Application Identifier
A communication device, otherwise known as a user equipment (UE) (e.g., a smartphone) may be configured to support various radio access technologies, which may include fourth generation (4G) such as Long-Term Evolution (LTE) or LTE-Advanced (LTE-A), as well as fifth generation (5G) New Radio (NR) (e.g., millimeter wave (mmW)). The UE may be configured to support various types of applications (e.g., social media applications, video streaming applications, and the like) using one or more radio access technologies (e.g., 4G or 5G). As demand for efficiency increases, it may be desirable to reduce power consumption for the UE (e.g., increase battery life), while providing higher reliability and lower latency for applications running on the UE using one or more radio access technologies
Selective Disabling of Antenna Modules Affected by Handgrip or Other Blockage
User equipment (UE) employing millimeter-wave (mmWave) radio frequency (RF) signaling uses one or more techniques to detect signaling blockages caused by handgrip, body blockage, or lack of line-of-sight with the wireless base station, identifies one or more antenna modules of an array of antenna modules of the UE affected by the blockage, and temporarily disables the one or more affected antenna modules until the blockage is no longer present. As the UE otherwise would consume considerable power attempting to overcome the blockage at the affected antenna module, either by transmitting at a higher power to overcome the attenuation caused by the blockage or to continue to ineffectively scan via the affected antenna module, this selective antenna module disablement process can reduce power consumption at the UE while facilitating a high-quality user experience
- …