Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Series

PDF

Computer Engineering

Institution
Keyword
Publication

Articles 61 - 90 of 391

Full-Text Articles in Engineering

An Open-Source Integration Platform For Multiple Peripheral Modules With Kuka Robots, Mahyar Abdeetedal, Mehrdad Kermani Ph.D., P.Eng. Nov 2019

An Open-Source Integration Platform For Multiple Peripheral Modules With Kuka Robots, Mahyar Abdeetedal, Mehrdad Kermani Ph.D., P.Eng.

Electrical and Computer Engineering Publications

This paper presents an open-source software interface for the integration of a Kuka robot with peripheral tools and sensors, KUI: Kuka User Interface. KUI is developed based on Kuka Fast Research Interface (FRI) which enables soft real-time control of the robot. Simulink Desktop Real-Time™ or any User Datagram Protocol (UDP) client can send real-time commands to Kuka robot via KUI. In KUI, third-party tools can be added and controlled synchronously with Kuka light-weight robot (LWR). KUI can send the control commands via serial communication to the attached devices. KUI can generate low-level commands using data acquisition (DAQ) boards. This feature …


The Stability Analysis For Wind Turbines With Doubly Fed Induction Generators, Baohua Dong Nov 2019

The Stability Analysis For Wind Turbines With Doubly Fed Induction Generators, Baohua Dong

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

The quickly increasing, widespread use of wind generation around the world reduces carbon emissions, decreases the effects of global warming, and lowers dependence on fossil fuels. However, the growing penetration of wind power requires more effort to maintain power systems stability.

This dissertation focuses on developing a novel algorithm which dynamically optimizes the proportional-integral (PI) controllers of a doubly fed induction generator (DFIG) driven by a wind turbine to increase the transient performance based on small signal stability analysis.

Firstly, the impact of wind generation is introduced. The stability of power systems with wind generation is described, including the different …


Secure Virtual Machine Placement In Cloud Data Centers, Amit Agarwal, Nguyen Binh Duong Ta Nov 2019

Secure Virtual Machine Placement In Cloud Data Centers, Amit Agarwal, Nguyen Binh Duong Ta

Research Collection School Of Computing and Information Systems

Due to an increasing number of avenues for conducting cross-VM side-channel attacks, the security of multi-tenant public IaaS cloud environments is a growing concern. These attacks allow an adversary to steal private information from a target user whose VM instance is co-located with that of the adversary. In this paper, we focus on secure VM placement algorithms which a cloud provider can use for the automatic enforcement of security against such co-location based attacks. To do so, we first establish a metric for evaluating and quantifying co-location security of multi-tenant public IaaS clouds, and then propose a novel VM placement …


Stressmon: Scalable Detection Of Perceived Stress And Depression Using Passive Sensing Of Changes In Work Routines And Group Interactions, Nur Camellia Binte Zakaria, Rajesh Balan, Youngki Lee Nov 2019

Stressmon: Scalable Detection Of Perceived Stress And Depression Using Passive Sensing Of Changes In Work Routines And Group Interactions, Nur Camellia Binte Zakaria, Rajesh Balan, Youngki Lee

Research Collection School Of Computing and Information Systems

Stress and depression are a common affliction in all walks of life. When left unmanaged, stress can inhibit productivity or cause depression. Depression can occur independently of stress. There has been a sharp rise in mobile health initiatives to monitor stress and depression. However, these initiatives usually require users to install dedicated apps or multiple sensors, making such solutions hard to scale. Moreover, they emphasise sensing individual factors and overlook social interactions, which plays a significant role in influencing stress and depression while being a part of a social system. We present StressMon, a stress and depression detection system that …


How To Create And Maintain An Effective Information Architecture And Navigation System For Science Gateway Websites, Noreen Y. Whysel, Omni Marketing Interactive Oct 2019

How To Create And Maintain An Effective Information Architecture And Navigation System For Science Gateway Websites, Noreen Y. Whysel, Omni Marketing Interactive

Publications and Research

Whether you have an existing Science Gateway website or are creating your first one, this hands-on tutorial will show you, step by step, how to create and update gateway websites so that their content is easier to find and easier to use.

As a Science Gateway provides its web-based tools and resources, it is essential that these sites utilize specific usability tests and other research methods to ensure positive and productive experiences with the sites. Successful information architecture (IA), intuitive site navigation, and clear user interfaces (UIs) all rely on knowing where various users expect to find needed information.

Since …


Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers Oct 2019

Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers

Student Works

Android applications that conceal themselves from a user, defined as exhibiting a “self-hiding behavior,” pose a threat to the user’s privacy, as these applications can live on a device undetected by the user. Malicious applications can do this to execute without being found by the user. Three lists are analyzed in particular—the home, running, and installed lists—as they are directly related to the typical Android app life cycle. Additionally, self-hiding behavior in the device admin list is analyzed due to the potential for catastrophic actions to be taken by device admin malware. This research proposes four dynamic analysis tools that …


A Deep Learning Approach For Final Grasping State Determination From Motion Trajectory Of A Prosthetic Hand, Cihan Uyanik, Syed F. Hussaini, Erdem Erdemir, Erkan Kaplanoglu, Ali Sekmen Oct 2019

A Deep Learning Approach For Final Grasping State Determination From Motion Trajectory Of A Prosthetic Hand, Cihan Uyanik, Syed F. Hussaini, Erdem Erdemir, Erkan Kaplanoglu, Ali Sekmen

Computer Science Faculty Research

Deep Learning has been gaining popularity due to its numerous implementations and continuous growing capabilities, including the prosthetics industry which has trend of evaluation towards the smart operational decision. The aim of this study is to develop a reliable decision-making system for prosthetic hands which is responsible to grasp or point an object located in the interaction area. In order to achieve this goal, we have exploited the measurements taken from a low-cost inertial measurement unit (IMU) and proposed a convolutional neural network-based decision-making system, which utilizes 9 distinct measurement variables as input, 3 axis accelerometer, 3 axis gyroscope and …


A Deep Learning Approach For Motion Segment Estimation For Pipe Leak Detection Robot, Cihan Uyanik, Erdem Erdemir, Erkan Kaplanoglu, Ali Sekmen Oct 2019

A Deep Learning Approach For Motion Segment Estimation For Pipe Leak Detection Robot, Cihan Uyanik, Erdem Erdemir, Erkan Kaplanoglu, Ali Sekmen

Computer Science Faculty Research

The trajectory motion of a robot can be a valuable information to estimate the localization of an autonomous robotic system, especially in a very dynamic but structurally-known environments like water pipes where the sensor readings are not reliable. The main focus of this research is to estimate the location of meso-scale robots using a deep-learning-based motion trajectory segment detection system from recorded sensory measurements while the robot travels through a pipe system. The idea is based on the classification of the motion measurements, acquired by inertial measurement unit (IMU), by exploiting the deep learning approach. Proposed idea and utilized methodology …


A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay Oct 2019

A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay

FIU Electronic Theses and Dissertations

With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs) through their capabilities to communicate with the infrastructure and each other. However, charging EVs takes time and thus in-advance scheduling is needed. As this process is done frequently due to limited mileage of EVs, it may expose the locations and charging pattern of the EV to the service providers, raising privacy concerns for their users. Nevertheless, the EV still needs to be authenticated to charging providers, which means some information will need to be provided …


Work-In-Progress: Iot Device Signature Validation, Jeffrey Hemmes Oct 2019

Work-In-Progress: Iot Device Signature Validation, Jeffrey Hemmes

Regis University Faculty Publications

Device fingerprinting is an area of security that has received renewed attention in recent years, with a number of classification methods proposed that rely on characteristics unique to a particular vendor or device type. Current works are limited to determining device type for purposes of access control and MAC address spoof prevention. This work synthesizes multiple sources of information to verify device capabilities in a device profile, which can be used in a number of applications not limited to authentication and authorization. The approach proposed in this paper relies on existing protocols and methods proposed in the literature, using a …


Vrsensory: Designing Inclusive Virtual Games With Neurodiverse Children, Ben Wasserman, Derek Prate, Bryce Purnell, Alex Muse, Kaitlyn Abdo, Kendra Day, Louanne Boyd Oct 2019

Vrsensory: Designing Inclusive Virtual Games With Neurodiverse Children, Ben Wasserman, Derek Prate, Bryce Purnell, Alex Muse, Kaitlyn Abdo, Kendra Day, Louanne Boyd

Engineering Faculty Articles and Research

We explore virtual environments and accompanying interaction styles to enable inclusive play. In designing games for three neurodiverse children, we explore how designing for sensory diversity can be understood through a formal game design framework. Our process reveals that by using sensory processing needs as requirements we can make sensory and social accessible play spaces. We contribute empirical findings for accommodating sensory differences for neurodiverse children in a way that supports inclusive play. Specifically, we detail the sensory driven design choices that not only support the enjoyability of the leisure activities, but that also support the social inclusion of sensory-diverse …


High-Sensitivity Magnetic Sensors Based On Gmi Microwire-Saw Idt Design, Akila Khatun, Florian Bender, Fabien Josse Phd, Arnold Kweku Mensah-Brown, R. Dyche Anderson Oct 2019

High-Sensitivity Magnetic Sensors Based On Gmi Microwire-Saw Idt Design, Akila Khatun, Florian Bender, Fabien Josse Phd, Arnold Kweku Mensah-Brown, R. Dyche Anderson

Electrical and Computer Engineering Faculty Research and Publications

This work presents a design approach for a highly sensitive, miniaturized magnetic sensor. The design makes use of GMI microwires and a multi-electrode SAW IDT. The use of SAW IDTs allows for the magnetic effect of the GMI microwire to be measured through the transduction process. This approach permits simultaneous measurement at different frequencies of operation, enabling highly sensitive measurement over a wide range of magnetic fields. This technique may find application in magnetic sensing for non-invasive battery SOC measurement.


Vibration Alert Bracelet For Notification Of The Visually And Hearing Impaired, Kelsey Conley, Alex Foyer, Patrick Hara, Tom Janik, Jason Reichard, Jon D'Souza, Chandana Tamma, Cristinel Ababei Oct 2019

Vibration Alert Bracelet For Notification Of The Visually And Hearing Impaired, Kelsey Conley, Alex Foyer, Patrick Hara, Tom Janik, Jason Reichard, Jon D'Souza, Chandana Tamma, Cristinel Ababei

Electrical and Computer Engineering Faculty Research and Publications

This paper presents the prototype of an electronic vibration bracelet designed to help the visually and hearing impaired to receive and send emergency alerts. The bracelet has two basic functions. The first function is to receive a wireless signal and respond with a vibration to alert the user. The second function is implemented by pushing one button of the bracelet to send an emergency signal. We report testing on a prototype system formed by a mobile application and two bracelets. The bracelets and the application form a complete system intended to be used in retirement apartment communities. However, the system …


Enginews, Fall 2019, School Of Computer Science & Engineering Oct 2019

Enginews, Fall 2019, School Of Computer Science & Engineering

News, Magazines and Reports

The IDEA Lab at SHU offers a variety of state of the art equipment available for students to use.


Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez Oct 2019

Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez

Independent Study Project (ISP) Collection

Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una …


Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian Oct 2019

Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian

Publications

Low latency applications, such as multimedia communications, autonomous vehicles, and Tactile Internet are the emerging applications for next-generation wireless networks, such as 5th generation (5G) mobile networks. Existing physical layer channel models, however, do not explicitly consider quality of service (QoS) aware related parameters under specific delay constraints. To investigate the performance of low-latency applications in future networks, a new mathematical framework is needed. Effective capacity (EC), which is a link-layer channel model with QoS-awareness, can be used to investigate the performance of wireless networks under certain statistical delay constraints. In this paper, we provide a comprehensive survey on existing …


Explaining Regressions Via Alignment Slicing And Mending, Haijun Wang, Yun Lin, Zijiang Yang, Jun Sun, Yang Liu, Jinsong Dong, Qinghua Zheng, Ting Liu Oct 2019

Explaining Regressions Via Alignment Slicing And Mending, Haijun Wang, Yun Lin, Zijiang Yang, Jun Sun, Yang Liu, Jinsong Dong, Qinghua Zheng, Ting Liu

Research Collection School Of Computing and Information Systems

Regression faults, which make working code stop functioning, are often introduced when developers make changes to the software. Many regression fault localization techniques have been proposed. However, issues like inaccuracy and lack of explanation are still obstacles for their practical application. In this work, we propose a trace-based approach to identifying not only where the root cause of a regression bug lies, but also how the defect is propagated to its manifestation as the explanation. In our approach, we keep the trace of original correct version as reference and infer the faulty steps on the trace of regression version so …


Deep Hashing By Discriminating Hard Examples, Cheng Yan, Guansong Pang, Xiao Bai, Chunhua Shen, Jun Zhou, Edwin Hancock Oct 2019

Deep Hashing By Discriminating Hard Examples, Cheng Yan, Guansong Pang, Xiao Bai, Chunhua Shen, Jun Zhou, Edwin Hancock

Research Collection School Of Computing and Information Systems

This paper tackles a rarely explored but critical problem within learning to hash, i.e., to learn hash codes that effectively discriminate hard similar and dissimilar examples, to empower large-scale image retrieval. Hard similar examples refer to image pairs from the same semantic class that demonstrate some shared appearance but have different fine-grained appearance. Hard dissimilar examples are image pairs that come from different semantic classes but exhibit similar appearance. These hard examples generally have a small distance due to the shared appearance. Therefore, effective encoding of the hard examples can well discriminate the relevant images within a small Hamming distance, …


Generic Construction Of Elgamal-Type Attribute-Based Encryption Schemes With Revocability And Dual-Policy, Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang Oct 2019

Generic Construction Of Elgamal-Type Attribute-Based Encryption Schemes With Revocability And Dual-Policy, Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang

Research Collection School Of Computing and Information Systems

Cloud is a computing paradigm for allowing data owners to outsource their data to enjoy on-demand services and mitigate the burden of local data storage. However, secure sharing of data via cloud remains an essential issue since the cloud service provider is untrusted. Fortunately, asymmetric-key encryption, such as identity-based encryption (IBE) and attribute-based encryption (ABE), provides a promising tool to offer data confidentiality and has been widely applied in cloud-based applications. In this paper, we summarize the common properties of most of IBE and ABE and introduce a cryptographic primitive called ElGamal type cryptosystem. This primitive can be used to …


Exercises Integrating High School Mathematics With Robot Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal Oct 2019

Exercises Integrating High School Mathematics With Robot Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

This paper presents progress in developing exercises for high school students incorporating level-appropriate mathematics into robotics activities. We assume mathematical foundations ranging from algebra to precalculus, whereas most prior work on integrating mathematics into robotics uses only very elementary mathematical reasoning or, at the other extreme, is comprised of technical papers or books using calculus and other advanced mathematics. The exercises suggested are relevant to any differerential-drive robot, which is an appropriate model for many different varieties of educational robots. They guide students towards comparing a variety of natural navigational strategies making use of typical movement primitives. The exercises align …


Click Fraud Detection In Online And In-App Advertisements: A Learning Based Approach, Thejas Gubbi Sadashiva Sep 2019

Click Fraud Detection In Online And In-App Advertisements: A Learning Based Approach, Thejas Gubbi Sadashiva

FIU Electronic Theses and Dissertations

Click Fraud is the fraudulent act of clicking on pay-per-click advertisements to increase a site’s revenue, to drain revenue from the advertiser, or to inflate the popularity of content on social media platforms. In-app advertisements on mobile platforms are among the most common targets for click fraud, which makes companies hesitant to advertise their products. Fraudulent clicks are supposed to be caught by ad providers as part of their service to advertisers, which is commonly done using machine learning methods. However: (1) there is a lack of research in current literature addressing and evaluating the different techniques of click fraud …


Improving The Sustainability Of The Built Environment By Training Its Workforce In More Efficient And Greener Ways Of Designing And Constructing Through The Horizon2020 Bimcert Project, Barry Mcauley, Avril Behan Sep 2019

Improving The Sustainability Of The Built Environment By Training Its Workforce In More Efficient And Greener Ways Of Designing And Constructing Through The Horizon2020 Bimcert Project, Barry Mcauley, Avril Behan

Conference papers

The construction industry consumes up to 50% of mineral resources excavated from nature, generates about 33% of CO2 present in the atmosphere and is responsible for 40% of total global energy through both construction and operation of buildings. The realisation that current pervasive construction practices now face globalization, sustainability, and environmental concerns, as well as ever-changing legislation requirements and new skills needed for the information age has resulted in technologies such as Building Information Modelling (BIM) becoming a key enabler in navigating these barriers. To assist in overcoming these barriers, a number of funding initiatives have been put in place …


Centres Of Excellence And Roadmaps For Digital Transition: Lessons For Ireland’S Construction Industry, Barry Mcauley, Alan Hore, Roger West Sep 2019

Centres Of Excellence And Roadmaps For Digital Transition: Lessons For Ireland’S Construction Industry, Barry Mcauley, Alan Hore, Roger West

Conference papers

Like most sectors in today’s working world, construction businesses are challenged to work in an increasingly digitised world with sophisticated demands from intelligent clients. So much has been written about the inefficiencies of the construction industry, its fragmentation, lack of collaboration, low margins, adversarial pricing, poor productivity, financial fragility, lack of research and development, poor industry image and relatively weak use of digital solutions. The Irish government recognises the importance of digital innovation to address many of the challenges the construction industry faces. With recent high profile reports of escalating spend on signature public sector projects and weak productivity performance …


Bim In Ireland 2019: A Study Of Bim Maturity And Diffusion In Ireland, Barry Mcauley, Alan Hore, Roger West Sep 2019

Bim In Ireland 2019: A Study Of Bim Maturity And Diffusion In Ireland, Barry Mcauley, Alan Hore, Roger West

Conference papers

In 2017, the BIM Innovation Capability Programme team applied five macro BIM maturity conceptual models to capture the capability of the Irish construction industry and assess its BIM maturity. The results found that while Ireland is mature for modelling processes, it is less developed with regards to collaboration processes and policies. Ireland also ranked poorly when it came to regulatory frameworks, measurements and benchmarks compared to a number of countries which also applied the same conceptual models. At the time, the findings highlighted that Ireland’s diffusion dynamic was middle out, meaning that larger organisations or industry associations were pushing the …


An Investigation Into Current Procurement Strategies That Promote Collaboration Through Early Contractor Involvement With Regards To Their Suitability For Irish Public Work Projects, Barry Mcauley, Frederic Lefebvre Sep 2019

An Investigation Into Current Procurement Strategies That Promote Collaboration Through Early Contractor Involvement With Regards To Their Suitability For Irish Public Work Projects, Barry Mcauley, Frederic Lefebvre

Conference papers

Previous research has established that multi-disciplinary collaboration will benefit a construction project throughout its lifecycle. While Lean Construction, Building Information Modelling (BIM), and Integrated Project Delivery (IPD) can all be viewed as separate processes which add independent value to a project, they are more effective when used in partnership with each other. In order to ensure the high levels of collaboration expected for these processes to work in unison, the early involvement of the Contractor is paramount. Early contractor involvement within the design process can ensure a more focused integrated project team, improvement of both constructability and cost certainty, as …


From Roadmap To Implementation: Lessons For Ireland’S Digital Construction Programme, Barry Mcauley, Alan Hore, Roger West Sep 2019

From Roadmap To Implementation: Lessons For Ireland’S Digital Construction Programme, Barry Mcauley, Alan Hore, Roger West

Conference papers

As part of their Future of Construction initiative in 2018 the World Economic Forum published an action plan to accelerate Building Information Modelling adoption. The WEF report highlighted actions that companies, industry organisations and governments are advised to implement to accelerate BIM adoption and better capitalise on delivering better project outcomes. According the authors of the report BIM is seen as the centrepiece of the construction industry’s digital transformation, however they acknowledged that BIM adoption globally remain slow. Anecdotal experience would suggest that BIM usage in Ireland is also very low and that a similar initiative or an adaptation of …


Similarity-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian, Ljubisa Sehovac, Katarina Grolinger Sep 2019

Similarity-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian, Ljubisa Sehovac, Katarina Grolinger

Electrical and Computer Engineering Publications

Smart meter popularity has resulted in the ability to collect big energy data and has created opportunities for large-scale energy forecasting. Machine Learning (ML) techniques commonly used for forecasting, such as neural networks, involve computationally intensive training typically with data from a single building or a single aggregated load to predict future consumption for that same building or aggregated load. With hundreds of thousands of meters, it becomes impractical or even infeasible to individually train a model for each meter. Consequently, this paper proposes Similarity-Based Chained Transfer Learning (SBCTL), an approach for building neural network-based models for many meters by …


Comparing Record Linkage Software Programs And Algorithms Using Real-World Data., Alan F. Karr, Matthew T. Taylor, Suzanne L. West, Soko Setoguchi, Tzuyung D. Kou, Tobias Gerhard, Daniel B. Horton Sep 2019

Comparing Record Linkage Software Programs And Algorithms Using Real-World Data., Alan F. Karr, Matthew T. Taylor, Suzanne L. West, Soko Setoguchi, Tzuyung D. Kou, Tobias Gerhard, Daniel B. Horton

Student Papers, Posters & Projects

Linkage of medical databases, including insurer claims and electronic health records (EHRs), is increasingly common. However, few studies have investigated the behavior and output of linkage software. To determine how linkage quality is affected by different algorithms, blocking variables, methods for string matching and weight determination, and decision rules, we compared the performance of 4 nonproprietary linkage software packages linking patient identifiers from noninteroperable inpatient and outpatient EHRs. We linked datasets using first and last name, gender, and date of birth (DOB). We evaluated DOB and year of birth (YOB) as blocking variables and used exact and inexact matching methods. …


Hybrid Superhydrophilic–Superhydrophobic Micro/ Nanostructures Fabricated By Femtosecond Laserinduced Forward Transfer For Sub-Femtomolar Raman Detection, Xiaodan Ma, Lan Jiang, Xiaowei Li, Bohong Li, Ji Huang, Jiaxing Sun, Zhi Wang, Zhijie Xu, Liangti Qu, Yongfeng Lu, Tianhong Cui Sep 2019

Hybrid Superhydrophilic–Superhydrophobic Micro/ Nanostructures Fabricated By Femtosecond Laserinduced Forward Transfer For Sub-Femtomolar Raman Detection, Xiaodan Ma, Lan Jiang, Xiaowei Li, Bohong Li, Ji Huang, Jiaxing Sun, Zhi Wang, Zhijie Xu, Liangti Qu, Yongfeng Lu, Tianhong Cui

Department of Electrical and Computer Engineering: Faculty Publications

Raman spectroscopy plays a crucial role in biochemical analysis. Recently, superhydrophobic surface-enhanced Raman scattering (SERS) substrates have enhanced detection limits by concentrating target molecules into small areas. However, due to the wet transition phenomenon, further reduction of the droplet contact area is prevented, and the detection limit is restricted. This paper proposes a simple method involving femtosecond laser-induced forward transfer for preparing a hybrid superhydrophilic–superhydrophobic SERS (HS-SERS) substrate by introducing a superhydrophilic pattern to promote the target molecules to concentrate on it for ultratrace detection. Furthermore, the HS-SERS substrate is heated to promote a smaller concentrated area. The water vapor …


Advanced Mathematical And Numerical Methods In Control And Optimization For Smart Grids, Zhan Shu, Michael Z.Q. Chen, Qing Hui Sep 2019

Advanced Mathematical And Numerical Methods In Control And Optimization For Smart Grids, Zhan Shu, Michael Z.Q. Chen, Qing Hui

Department of Electrical and Computer Engineering: Faculty Publications

While renewable energy, as a part of smart-grid technologies, brings clean energy, it also brings a series of power quality problems. An increasing number of power electronic devices and new smart-grid technologies are used to ensure a safe, reliable, and high-quality operation of the power grid. However, the effectiveness of these control devices and technologies largely depends on the accuracy of the model, the advancement of control methods, and the numerical optimization of the parameters.

This special issue focuses on recent advances in modeling, numerical analysis, control, and optimization of smart grids with some special emphasis on the mathematical problems …