The increase in global average life expectancy over the past century has been largely attributed to medical science developments. In this study, we demonstrate a polymer-based capacitive pressure sensor for measuring ...
详细信息
The exponential increase in IoT device usage has spawned numerous cyberspace *** devices,sensors,and actuators bridge the gap between physical processes and the cyber network in a cyber-physical system(CPS).Cyber-phys...
详细信息
The exponential increase in IoT device usage has spawned numerous cyberspace *** devices,sensors,and actuators bridge the gap between physical processes and the cyber network in a cyber-physical system(CPS).Cyber-physical system is a complex system from a security perspective due to the heterogeneous nature of its components and the fact that IoT devices can serve as an entry point for *** adversaries design their attack strategies on systems to gain an advantage at a relatively lower cost,whereas abusive adversaries initiate an attack to inflict maximum damage without regard to cost or *** this paper,a sensor spoofing attack is modelled as a malicious adversary attempting to cause system failure by interfering with the feedback control *** is accomplished by feeding spoofed sensor values to the controller and issuing erroneous commands to the *** on a Simulink-simulated linear CPS support the proof of concept for the proposed abusive ideology,demonstrating three attack *** impact of the evaluations stresses the importance of testing the CPS security against adversaries with abusive settings for preventing ***,the research concludes by highlighting the limitations of the proposed work,followed by recommendations for the future.
With the development of artificial intelligence,neural network provides unique opportunities for holography,such as high fidelity and dynamic *** to obtain real 3D scene and generate high fidelity hologram in real tim...
详细信息
With the development of artificial intelligence,neural network provides unique opportunities for holography,such as high fidelity and dynamic *** to obtain real 3D scene and generate high fidelity hologram in real time is an urgent ***,we propose a liquid lens based holographic camera for real 3D scene hologram acquisition using an end-to-end physical model-driven network(EEPMD-Net).As the core component of the liquid camera,the first 10 mm large aperture electrowetting-based liquid lens is proposed by using specially fabricated *** design of the liquid camera ensures that the multi-layers of the real 3D scene can be obtained quickly and with great imaging *** EEPMD-Net takes the information of real 3D scene as the input,and uses two new structures of encoder and decoder networks to realize low-noise phase *** comparing the intensity information between the reconstructed image after depth fusion and the target scene,the composite loss function is constructed for phase optimization,and the high-fidelity training of hologram with true depth of the 3D scene is realized for the first *** holographic camera achieves the high-fidelity and fast generation of the hologram of the real 3D scene,and the reconstructed experiment proves that the holographic image has the advantage of low *** proposed holographic camera is unique and can be used in 3D display,measurement,encryption and other fields.
This article presents a compact temperature detection system using amorphous-InGaZnO thin-film transistor (TFT) technology. The proposed system is fabricated on a 30-μ m-thick polymide substrate. This system consists...
详细信息
Purpose: The rapid spread of COVID-19 has resulted in significant harm and impacted tens of millions of people globally. In order to prevent the transmission of the virus, individuals often wear masks as a protective ...
详细信息
Coping with noise in computing is an important problem to consider in large systems. With applications in fault tolerance (Hastad et al., 1987;Pease et al., 1980;Pippenger et al., 1991), noisy sorting (Shah and Wainwr...
详细信息
Coping with noise in computing is an important problem to consider in large systems. With applications in fault tolerance (Hastad et al., 1987;Pease et al., 1980;Pippenger et al., 1991), noisy sorting (Shah and Wainwright, 2018;Agarwal et al., 2017;Falahatgar et al., 2017;Heckel et al., 2019;Wang et al., 2024a;Gu and Xu, 2023;Kunisky et al., 2024), noisy searching (Berlekamp, 1964;Horstein, 1963;Burnashev and Zigangirov, 1974;Pelc, 1989;Karp and Kleinberg, 2007), among many others, the goal is to devise algorithms with the minimum number of queries that are robust enough to detect and correct the errors that can happen during the computation. In this work, we consider the noisy computing of the threshold-k function. For n Boolean variables x = (x1, ..., xn) ∈ {0, 1}n, the threshold-k function THk(·) computes whether the number of 1's in x is at least k or not, i.e., (Equation presented) The noisy queries correspond to noisy readings of the bits, where at each time step, the agent queries one of the bits, and with probability p, the wrong value of the bit is returned. It is assumed that the constant p ∈ (0, 1/2) is known to the agent. Our goal is to characterize the optimal query complexity for computing the THk function with error probability at most δ. This model for noisy computation of the THk function has been studied by Feige et al. (1994), where the order of the optimal query complexity is established;however, the exact tight characterization of the optimal number of queries is still open. In this paper, our main contribution is tightening this gap by providing new upper and lower bounds for the computation of the THk function, which simultaneously improve the existing upper and lower bounds. The main result of this paper can be stated as follows: for any 1 ≤ k ≤ n, there exists an algorithm that computes the THk function with an error probability at most δ = o(1), and the algorithm uses at most (Equation presented) queries in expectation. Here we define m (Eq
Point clouds offer realistic 3D representations of objects and scenes at the expense of large data volumes. To represent such data compactly in real-world applications, Video-Based Point Cloud Compression (V-PCC) conv...
详细信息
Near-field tides prediction for tsunami detection in the coastal area is a significant problem of the cable-based tsunami meter system in north Sipora, Indonesia. The problem is caused by its shallow water condition a...
详细信息
The transformation of age-old farming practices through the integration of digitization and automation has sparked a revolution in agriculture that is driven by cutting-edge computer vision and artificial intelligence...
详细信息
The transformation of age-old farming practices through the integration of digitization and automation has sparked a revolution in agriculture that is driven by cutting-edge computer vision and artificial intelligence(AI)*** transformation not only promises increased productivity and economic growth,but also has the potential to address important global issues such as food security and *** survey paper aims to provide a holistic understanding of the integration of vision-based intelligent systems in various aspects of precision *** providing a detailed discussion on key areas of digital life cycle of crops,this survey contributes to a deeper understanding of the complexities associated with the implementation of vision-guided intelligent systems in challenging agricultural *** focus of this survey is to explore widely used imaging and image analysis techniques being utilized for precision farming *** paper first discusses various salient crop metrics used in digital *** this paper illustrates the usage of imaging and computer vision techniques in various phases of digital life cycle of crops in precision agriculture,such as image acquisition,image stitching and photogrammetry,image analysis,decision making,treatment,and *** establishing a thorough understanding of related terms and techniques involved in the implementation of vision-based intelligent systems for precision agriculture,the survey concludes by outlining the challenges associated with implementing generalized computer vision models for real-time deployment of fully autonomous farms.
Deepfake-generated fake faces,commonly utilized in identity-related activities such as political propaganda,celebrity impersonations,evidence forgery,and familiar fraud,pose new societal *** current deepfake generator...
详细信息
Deepfake-generated fake faces,commonly utilized in identity-related activities such as political propaganda,celebrity impersonations,evidence forgery,and familiar fraud,pose new societal *** current deepfake generators strive for high realism in visual effects,they do not replicate biometric signals indicative of cardiac *** this gap,many researchers have developed detection methods focusing on biometric *** methods utilize classification networks to analyze both temporal and spectral domain features of the remote photoplethysmography(rPPG)signal,resulting in high detection ***,in the spectral analysis,existing approaches often only consider the power spectral density and neglect the amplitude spectrum—both crucial for assessing cardiac *** introduce a novel method that extracts rPPG signals from multiple regions of interest through remote photoplethysmography and processes them using Fast Fourier Transform(FFT).The resultant time-frequency domain signal samples are organized into matrices to create Matrix Visualization Heatmaps(MVHM),which are then utilized to train an image classification ***,we explored various combinations of time-frequency domain representations of rPPG signals and the impact of attention *** experimental results show that our algorithm achieves a remarkable detection accuracy of 99.22%in identifying fake videos,significantly outperforming mainstream algorithms and demonstrating the effectiveness of Fourier Transform and attention mechanisms in detecting fake faces.
暂无评论