Excitons,bound electron–hole pairs,in two-dimensional hybrid organic inorganic perovskites(2D HOIPs)are capable of forming hybrid light-matter states known as exciton-polaritons(E–Ps)when the excitonic medium is con...
详细信息
Excitons,bound electron–hole pairs,in two-dimensional hybrid organic inorganic perovskites(2D HOIPs)are capable of forming hybrid light-matter states known as exciton-polaritons(E–Ps)when the excitonic medium is confined in an optical *** the case of 2D HOIPs,they can self-hybridize into E–Ps at specific thicknesses of the HOIP crystals that form a resonant optical cavity with the ***,the fundamental properties of these self-hybridized E–Ps in 2D HOIPs,including their role in ultrafast energy and/or charge transfer at interfaces,remain ***,we demonstrate that>0.5µm thick 2D HOIP crystals on Au substrates are capable of supporting multiple-orders of self-hybridized E–P *** E–Ps have high Q factors(>100)and modulate the optical dispersion for the crystal to enhance sub-gap absorption and *** varying excitation energy and ultrafast measurements,we also confirm energy transfer from higher energy E–Ps to lower energy E–***,we also demonstrate that E–Ps are capable of charge transport and transfer at *** findings provide new insights into charge and energy transfer in E–Ps opening new opportunities towards their manipulation for polaritonic devices.
Brain-inspired computer vision aims to learn from biological systems to develop advanced image processing ***,its progress so far is not *** recognize that a main obstacle comes from that the current paradigm for brai...
详细信息
Brain-inspired computer vision aims to learn from biological systems to develop advanced image processing ***,its progress so far is not *** recognize that a main obstacle comes from that the current paradigm for brain-inspired computer vision has not captured the fundamental nature of biological vision,i.e.,the biological vision is targeted for processing spatio-temporal ***,a new paradigm for developing brain-inspired computer vision is emerging,which emphasizes on the spatio-temporal nature of visual signals and the brain-inspired models for processing this type of *** this paper,we review some recent primary works towards this new paradigm,including the development of spike cameras which acquire spiking signals directly from visual scenes,and the development of computational models learned from neural systems that are specialized to process spatio-temporal patterns,including models for object detection,tracking,and *** also discuss about the future directions to improve the paradigm.
Generalized-linear dynamical models (GLDMs) remain a widely-used framework within neuroscience for modeling time-series data, such as neural spiking activity or categorical decision outcomes. Whereas the standard usag...
ISBN:
(纸本)9798331314385
Generalized-linear dynamical models (GLDMs) remain a widely-used framework within neuroscience for modeling time-series data, such as neural spiking activity or categorical decision outcomes. Whereas the standard usage of GLDMs is to model a single data source, certain applications require jointly modeling two generalized-linear time-series sources while also dissociating their shared and private dynamics. Most existing GLDM variants and their associated learning algorithms do not support this capability. Here we address this challenge by developing a multi-step analytical subspace identification algorithm for learning a GLDM that explicitly models shared vs. private dynamics within two generalized-linear time-series. In simulations, we demonstrate our algorithm's ability to dissociate and model the dynamics within two time-series sources while being agnostic to their respective observation distributions. In neural data, we consider two specific applications of our algorithm for modeling discrete population spiking activity with respect to a secondary time-series. In both synthetic and real data, GLDMs learned with our algorithm more accurately decoded one time-series from the other using lower-dimensional latent states, as compared to models identified using existing GLDM learning algorithms.
Intelligent reflecting surface (IRS) has recently stimulated an upsurge of research interest due to its capability of enhancing the spectral and energy efficiencies for future sixth generation (6G) wireless communicat...
详细信息
An elaborate repertoire of emotions is one feature that distinguishes humans from animals. Language offers a critical form of emotion expression. However, it is unclear whether the meaning of an emotion word remains s...
详细信息
In this paper, we study Chinese Spelling Correction (CSC) as a joint decision made by two separate models: a language model and an error model. Through empirical analysis, we find that fine-tuning BERT tends to over-f...
详细信息
Many existing metric learning methods are based on fixed similarity constraints. However, the quality of fixed similarity constraints is usually hard to guarantee, and inflexible constraints also limit the performance...
详细信息
Passenger transport is one of the most common ways of commuting in Taiwan. It plays an important role in the transportation system due to its large number of stations, dense frequency, and cheap transportation. Due to...
Passenger transport is one of the most common ways of commuting in Taiwan. It plays an important role in the transportation system due to its large number of stations, dense frequency, and cheap transportation. Due to the unfriendly transportation environment and a large number of passengers, a blind spot of passenger transportation exists, which leads to traffic accidents at the station. We research to make the "Bus Stop Passenger Detection System". Taking the object detection of "Wheelchairs" into consideration, it is more convenient to assist the disabled to find the passenger transportation system, which makes Taiwan's transportation system more convenient.
RSA is an asymmetric encryption algorithm that uses two different keys, a public key to encrypt the plain text and a private key to decrypt the cipher text. Fernet is a symmetric encryption algorithm that uses a singl...
RSA is an asymmetric encryption algorithm that uses two different keys, a public key to encrypt the plain text and a private key to decrypt the cipher text. Fernet is a symmetric encryption algorithm that uses a single key to encrypt and decrypt information. This study uses Fernet and RSA which is the combination of symmetric and asymmetric encryption called hybrid encryption. In addition, the cipher text will be hidden inside an image using Stepic. Hybrid Encryption uses asymmetric encryption to encrypt the symmetric encryption secret key, it will secure the symmetric encryption. The result of this study is the lowest error that we got as the MSE is 0.00% and is inversely proportional with the Peak Signal to Noise Ratio (PSNR) and Avalanche (AVA) with 79.00% and 42.34% in order. Inversely proportional to the length of the text that is hidden in the image, the longest text that is hidden, the more changes that we get in the image with the highest Unified Average Changing Intensity (UACI) and Number of Pixels Change Rate (NPCR) with the biggest image size with 46.48% for UACI and 99.86% for the NPCR.
Characteristic variability induced by process variation effect (PVE) is one of technological challenges in semiconductor industry. In this work, we computationally study electrical characteristic and power fluctuation...
详细信息
暂无评论