-
A Study on Magnetic-sensitivity Wavelength Position of the Working Line Used by the Full-Disk Magnetograph onboard the Advanced Space based Solar Observatory (ASO-S/FMG)
Authors:
S. Liu,
J. T. Su,
X. Y. Bai,
Y. Y. Deng,
J. Chen,
Y. L. Song,
X. F. Wang,
H. Q. Xu,
X. Yang,
Shahid Idrees
Abstract:
Utilizing data from the $Solar$ $Magnetism$ and $Activity$ $Telescope$ (SMAT), analytical solutions of polarized radiative transfer equations, and in-orbit test data from the Full-disk Magnetograph (FMG) onboard the Advanced Space based Solar Observatory (ASO-S), this study reveals the magnetic-sensitivity spectral positions for the Fe {\sc i} $λ$5234.19 A, working line used by FMG. From the exper…
▽ More
Utilizing data from the $Solar$ $Magnetism$ and $Activity$ $Telescope$ (SMAT), analytical solutions of polarized radiative transfer equations, and in-orbit test data from the Full-disk Magnetograph (FMG) onboard the Advanced Space based Solar Observatory (ASO-S), this study reveals the magnetic-sensitivity spectral positions for the Fe {\sc i} $λ$5234.19 A, working line used by FMG. From the experimental data of SMAT, it is found that the most sensitivity position is located at the line center for linear polarization (Stokes-Q/U), while it is about -0.07 A away from the line center for circular polarization (Stokes-V). Moreover, both the theoretical analysis and the in-orbit test data analysis of FMG prove again the above results. Additionally, the theoretical analysis suggests the presence of distinct spectral pockets (centered at 0.08-0.15 A) from the line, harboring intense magnetic sensitivity across all three Stokes parameters. Striking a balance between high sensitivity for both linear and circular polarization while capturing additional valuable information, a spectral position of -0.08 A emerges as the champion for routine FMG magnetic-field observations.
△ Less
Submitted 26 May, 2024;
originally announced May 2024.
-
AdvMT: Adversarial Motion Transformer for Long-term Human Motion Prediction
Authors:
Sarmad Idrees,
Jongeun Choi,
Seokman Sohn
Abstract:
To achieve seamless collaboration between robots and humans in a shared environment, accurately predicting future human movements is essential. Human motion prediction has traditionally been approached as a sequence prediction problem, leveraging historical human motion data to estimate future poses. Beginning with vanilla recurrent networks, the research community has investigated a variety of me…
▽ More
To achieve seamless collaboration between robots and humans in a shared environment, accurately predicting future human movements is essential. Human motion prediction has traditionally been approached as a sequence prediction problem, leveraging historical human motion data to estimate future poses. Beginning with vanilla recurrent networks, the research community has investigated a variety of methods for learning human motion dynamics, encompassing graph-based and generative approaches. Despite these efforts, achieving accurate long-term predictions continues to be a significant challenge. In this regard, we present the Adversarial Motion Transformer (AdvMT), a novel model that integrates a transformer-based motion encoder and a temporal continuity discriminator. This combination effectively captures spatial and temporal dependencies simultaneously within frames. With adversarial training, our method effectively reduces the unwanted artifacts in predictions, thereby ensuring the learning of more realistic and fluid human motions. The evaluation results indicate that AdvMT greatly enhances the accuracy of long-term predictions while also delivering robust short-term predictions
△ Less
Submitted 19 February, 2024; v1 submitted 10 January, 2024;
originally announced January 2024.
-
A Retrodirective Wireless Power Transfer Scheme for Ambient Backscatter Systems
Authors:
Sahar Idrees,
Xiangyun Zhou,
Salman Durrani,
Dusit Niyato
Abstract:
One of the key challenges of the Internet of Things (IoT) is to sustainably power the large number of IoT devices in real-time. In this paper, we consider a wireless power transfer (WPT) scenario between an energy transmitter (ET) capable of retrodirective WPT and an energy receiver (ER) capable of ambient backscatter in the presence of an ambient source (AS). The ER requests WPT by backscattering…
▽ More
One of the key challenges of the Internet of Things (IoT) is to sustainably power the large number of IoT devices in real-time. In this paper, we consider a wireless power transfer (WPT) scenario between an energy transmitter (ET) capable of retrodirective WPT and an energy receiver (ER) capable of ambient backscatter in the presence of an ambient source (AS). The ER requests WPT by backscattering signals from an AS towards the ET, which then retrodirectively beamforms an energy signal towards the ER. To remove the inherent direct-link ambient interference, we propose a scheme of ambient backscatter training. Specifically, the ER varies the reflection coefficient multiple times while backscattering each ambient symbol according to a certain pattern called the training sequence, whose design criterion we also present. To evaluate the system performance, we derive an analytical expression for the average harvested power at the ER. Our numerical results show that with the proposed scheme, the ER harvests tens of $μ$W of power, without any CSI estimation or active transmission from the ER, which is a significant improvement for low-power and low-cost ambient backscatter devices.
△ Less
Submitted 13 February, 2020;
originally announced February 2020.
-
Design of Ambient Backscatter Training for Wireless Power Transfer
Authors:
Sahar Idrees,
Xiangyun Zhou,
Salman Durrani,
Dusit Niyato
Abstract:
Wireless power transfer (WPT) using energy beamforming is a promising solution for low power Internet of Things (IoT) devices. In this work, we consider WPT from an energy transmitter (ET) employing retrodirective WPT using a large phased antenna array to an energy receiver (ER) capable of ambient backscatter. The advantage of retrodirective WPT is that no explicit channel estimation is needed at…
▽ More
Wireless power transfer (WPT) using energy beamforming is a promising solution for low power Internet of Things (IoT) devices. In this work, we consider WPT from an energy transmitter (ET) employing retrodirective WPT using a large phased antenna array to an energy receiver (ER) capable of ambient backscatter. The advantage of retrodirective WPT is that no explicit channel estimation is needed at the ET and the use of ambient backscattering eliminates the need for active transmission at the ER. We propose a training sequence design, i.e., pattern of varying the reflection coefficient at the ER, to eliminate the direct-link interference from the ambient source. We show that when the ambient symbol duration is known, the ambient interference is fully cancelled by the proposed design. We analytically model the system and find the average harvested power at the ER considering Nakagami-$m$ fading channels and non-linear energy harvesting model. Our results clearly show that the proposed solution is robust to a small timing offset mismatch at the correlator. When interference from undesired neighbouring sources in the ambient environment is not significant, the ER can successfully harvest tens to hundreds of $μ$W of power, which is an important improvement for low-power IoT devices.
△ Less
Submitted 11 August, 2020; v1 submitted 2 September, 2019;
originally announced September 2019.
-
Model the System from Adversary Viewpoint: Threats Identification and Modeling
Authors:
Muhammad Sabir Idrees,
Yves Roudier,
Ludovic Apvrille
Abstract:
Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain Why (attack objective), What (i.e., system assets, goals, etc.), and How (attack method), adversary achieved his attack goals. We introduce in this paper a security a…
▽ More
Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain Why (attack objective), What (i.e., system assets, goals, etc.), and How (attack method), adversary achieved his attack goals. We introduce in this paper a security attack meta-model for our SysML-Sec framework, developed to improve the threat identification and modeling through the explicit representation of security concerns with knowledge representation techniques. Our proposed meta-model enables the specification of these concerns through ontological concepts which define the semantics of the security artifacts and introduced using SysML-Sec diagrams. This meta-model also enables representing the relationships that tie several such concepts together. This representation is then used for reasoning about the knowledge introduced by system designers as well as security experts through the graphical environment of the SysML-Sec framework.
△ Less
Submitted 16 October, 2014;
originally announced October 2014.