The Robotics Major at the University of Michigan was successfully launched inthe 2022-23 academic year as an innovative step forward to better servestudents, our communities, and our society. Building on our guiding p...
详细信息
作者:
Garcia, Andre Dalla BernardinaCeleste, JimuelCheng, IrenePrudente, Victor Hugo RohdenDel’Arco Sanches, IedaINPE
National Institute for Space Research PGSER Remote Sensing Graduate Program Coordination of Teaching COEPE São José dos Campos São Paulo12227-010 Brazil UoA
University of Alberta Dept. Of Computing Science EdmontonABT6G 2S4 Canada UofM
University of Michigan School for Environment and Sustainability Ann ArborMI48109 United States Multimedia Research Centre
University of Alberta EdmontonABT6G 2E8 Canada DIOTG
Earth Observation and Geoinformatics Division CG-TG General Coodination of Earth Science INPE National Institute for Space Research Teaching COEPE São Paulo São José dos Campos12227-010 Brazil
Monitoring irrigated rice crops is essential for efficient agricultural management, and Synthetic Aperture Radar (SAR) images are beneficial due to their capability to function in all weather conditions. However, spec...
详细信息
We study the variability of vertically stacked gate-all-around silicon nanosheet (GAA Si NS) complementary field-effect transistors (CFETs). The process variation effect (PVE), the work function fluctuation (WKF), and...
详细信息
We study the variability of vertically stacked gate-all-around silicon nanosheet (GAA Si NS) complementary field-effect transistors (CFETs). The process variation effect (PVE), the work function fluctuation (WKF), and the random dopant fluctuation (RDF) of CFETs are statistically estimated using an experimentally validated device simulation technique. Among five factors of PVE, the channel thickness (T Nch /T Pch ), the channel width (W ch ), and the gate length (L G ) are significant. Owing to superior GAA channel control and increased effective gate area, both WKF and RDF are suppressed. Notably, the PVE on both N-/P-FETs of GAA Si CFET induce the largest off-state current fluctuations of 80% and 278%, respectively, because the device characteristic is very sensitive to the layer thickness and width of channel.
Our research introduces a novel method for safe hydrogen detection. We've developed an advanced nano-candle sensor, combining Pd with nano-candles, enabling accurate detection of low-concentration hydrogen (<3%...
详细信息
ISBN:
(数字)9798350372076
ISBN:
(纸本)9798350372083
Our research introduces a novel method for safe hydrogen detection. We've developed an advanced nano-candle sensor, combining Pd with nano-candles, enabling accurate detection of low-concentration hydrogen (<3%) and intuitive leakage identification, demonstrating its potential.
The purpose of this research is the segmentation of lungs computed tomography(CT)scan for the diagnosis of COVID-19 by using machine learning *** dataset contains data from patients who are prone to the *** contains t...
详细信息
The purpose of this research is the segmentation of lungs computed tomography(CT)scan for the diagnosis of COVID-19 by using machine learning *** dataset contains data from patients who are prone to the *** contains three types of lungs CT images(Normal,Pneumonia,and COVID-19)collected from two different sources;the first one is the Radiology Department of Nishtar Hospital Multan and Civil Hospital Bahawalpur,Pakistan,and the second one is a publicly free available medical imaging database known as *** the preprocessing,a novel fuzzy c-mean automated region-growing segmentation approach is deployed to take an automated region of interest(ROIs)and acquire 52 hybrid statistical features for each ***,12 optimized statistical features are selected via the chi-square feature reduction *** the classification,five machine learning classifiers named as deep learning J4,multilayer perceptron,support vector machine,random forest,and naive Bayes are deployed to optimize the hybrid statistical features *** is observed that the deep learning J4 has promising results(sensitivity and specificity:0.987;accuracy:98.67%)among all the deployed *** a complementary study,a statistical work is devoted to the use of a new statistical model to fit the main datasets of COVID-19 collected in Pakistan.
The popularity of Metaverse as an entertainment, social, and work platform has led to a great need for seamless avatar integration in the virtual world. In Metaverse, avatars must be updated and rendered to reflect us...
The popularity of Metaverse as an entertainment, social, and work platform has led to a great need for seamless avatar integration in the virtual world. In Metaverse, avatars must be updated and rendered to reflect users' behaviour. Achieving real-time synchronization between the virtual bilocation and the user is complex, placing high demands on the Metaverse Service Provider (MSP)'s rendering resource allocation scheme. To tackle this issue, we propose a semantic communication framework that leverages contest theory to model the interactions between users and MSPs and determine optimal resource allocation for each user. To reduce the consumption of network resources in wireless transmission, we use the semantic communication technique to reduce the amount of data to be transmitted. Under our simulation settings, the encoded semantic data only contains 51 bytes of skeleton coordinates instead of the image size of 8.243 megabytes. Moreover, we implement Deep Q-Network to optimize reward settings for maximum performance and efficient resource allocation. With the optimal reward setting, users are incentivized to select their respective suitable uploading frequency, reducing down-sampling loss due to rendering resource constraints by 66.076% compared with the traditional average distribution method. The framework provides a novel solution to resource allocation for avatar association in VR environments, ensuring a smooth and immersive experience for all users.
Conveyor belts are commonly used in the mining industry for efficient material transport. However, they are prone to failures such as idler anomalies, belt tears, and misalignment. Current monitoring systems only eval...
Conveyor belts are commonly used in the mining industry for efficient material transport. However, they are prone to failures such as idler anomalies, belt tears, and misalignment. Current monitoring systems only evaluate the conveyor or idle belt's condition at the installation point. This study proposes a method to detect faults in conveyor belts, specifically idler anomalies and belt deviation, using two IMUs installed at the lateral extremities of the belt to evaluate its health along its route. In a reduced-scale conveyor belt, we conducted experiments by collecting gyroscopes and accelerometer data in various scenarios, including normal conditions and anomaly situations. We modified the idlers' physical structure or changed the belt tracks to create these scenarios. We used similarity analysis techniques to compare the data collected and performed statistical hypothesis analysis to observe the influence of the anomaly scenarios on the gyroscope and accelerometer data. We used Dynamic Time Warping (DTW) for gyroscope data to compare ground truth with anomaly scenarios. For the acceleration data, we performed vibration analysis by converting the time domain data to the frequency using Fast Fourier Transform (FFT) and evaluating the difference in spectral density between the reference and anomaly data. Statistical hypothesis analysis revealed that anomaly scenar-ios influenced the gyroscope x-axis and z-axis more. According to the spectral density analysis of the accelerometer, it was revealed that belt misalignment on the y-axis may be detected.
Cloud security is challenged by constant adaptive cyber threats and traditional detection methods lack real time adaptability. In this paper, we propose a new hybrid ML approach stitching data from National institute ...
详细信息
ISBN:
(数字)9798331530983
ISBN:
(纸本)9798331530990
Cloud security is challenged by constant adaptive cyber threats and traditional detection methods lack real time adaptability. In this paper, we propose a new hybrid ML approach stitching data from National institute of Standards and Technology (NIST) and MITRE Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) databases together. In contrast to existing methods, this framework combines, in unique and unprecedented fashion, ensemble ML models and Realtime data processing for increased detection accuracy and reduced false positives. This approach addresses specific challenges in the cloud environments and by leveraging standardised frameworks, it offers actionable audiences for efficient and effective vulnerability management process. The framework is validated by the experimental results which prove its robustness to evolution of the cybersecurity demands.
Recently, Metaverse has attracted increasing attention from both industry and academia, because of the significant potential to integrate real and digital worlds ever more seam-lessly. By combining advanced wireless c...
详细信息
ISBN:
(纸本)9781665435413
Recently, Metaverse has attracted increasing attention from both industry and academia, because of the significant potential to integrate real and digital worlds ever more seam-lessly. By combining advanced wireless communications, edge computing and virtual reality (VR) technologies into Metaverse, a multidimensional, intelligent and powerful wireless edge Meta-verse is created for future human society. In this paper, we design a privacy preserving targeted advertising strategy for the wireless edge Metaverse. Specifically, a Metaverse service provider (MSP) allocates bandwidth to the VR users so that the users can access Metaverse from edge access points. To protect users' privacy, the covert communication technique is used in the downlink. Then, the MSP can offer high-quality access services to earn more profits. Motivated by the concept of “covert”, targeted advertising is used to promote the sale of bandwidth and ensure that the advertising strategy cannot be detected by competitors who may make counter-offer and by attackers who want to disrupt the services. We derive the best advertising strategy in terms of budget input, with the help of the Vidale-Wolfe model and Hamiltonian function. Furthermore, we propose a novel metric named Meta-Immersion to represent the user's experience feelings. The performance evaluation shows that the MSP can boost its revenue with an optimal targeted advertising strategy, especially compared with that without the advertising.
Currently, sample-specific backdoor attacks (SSBAs) are the most advanced and malicious methods since they can easily circumvent most of the current backdoor defenses. In this paper, we reveal that SSBAs are not suffi...
详细信息
暂无评论