To enhance solar photo absorption of III-N semiconductors, we demonstrate Arsenic implantation at elevated temperatures, improving doping activation and reducing crystal damage.
ISBN:
(纸本)9798350369311
To enhance solar photo absorption of III-N semiconductors, we demonstrate Arsenic implantation at elevated temperatures, improving doping activation and reducing crystal damage.
Superconducting-nanostrip photon detectors with optical sampling method now function as true photon-number resolving detectors in real-time without multiplexing. We applied this technique for quantum state generation ...
详细信息
HPC systems encompass more components with each new generation. As a result, the process of interacting with stable storage systems like parallel file systems (PFS) becomes increasingly difficult. Larger systems often...
HPC systems encompass more components with each new generation. As a result, the process of interacting with stable storage systems like parallel file systems (PFS) becomes increasingly difficult. Larger systems often result in more frequent failures, increasing the need and frequency to incorporate fault-tolerant mechanisms. One example is checkpoint-restart (C/R), where applications or systems save their data to non-volatile storage devices, such as a PFS. On failure, the system or application is restored to a saved state and computation continues. Today, asynchronous C/R is gaining traction for its ability to checkpoint data to permanent storage concurrently with the application. However, asynchronous C/R brings about many new challenges. For starters, asynchronous C/R introduces complex resource contention between the application and the C/R implementation. Additionally, some implementations adopt file-per-process writing strategies, which overwhelm PFS’ at high core counts. In this work, we explore how multi-threaded POSIX I/O impacts aggregated throughput. To this extent we characterize the influence of different I/O parameters, such as the number of writer threads and how they access storage devices, has on aggregated I/O. We use the information gathered in this study to identify best practices when performing aggregated I/O as a first step in designing an efficient I/O aggregation scheme for asynchronous C/R.
Hypervolume subset selection (HSS) has received significant attention since it has a strong connection with evolutionary multi-objective optimization (EMO), such as environment selection and post-processing to identif...
详细信息
This paper presents the current use of the Internet of Things (IoT) in fire evacuation and extinction. It examines the different approaches to the problem and technologies like Building Information Modeling (BIM) and ...
This paper presents the current use of the Internet of Things (IoT) in fire evacuation and extinction. It examines the different approaches to the problem and technologies like Building Information Modeling (BIM) and mathematical algorithms that can be used to determine the optimal evacuation route. It also evaluates existing fire security solutions such as smoke, flame, motion, and gas sensors, LED lights, buzzers, and SMS modules. Entities that specialize in Residential and Commercial Security Systems and Home Automation are also discussed, along with the services they offer. The main objective of this study is to understand current systems and resources regarding fire evacuation and extinction systems and to analyze different developments in smart buildings to create an efficient system for fire detection and evacuation.
This research proposes a system that leverages stereo vision and monocular depth estimation to form a depth map from which a 3D point cloud scene is extracted. The emergence of competitive neural networks for depth ma...
详细信息
UAV missions often require specific geometric con-straints to be satisfied between ground locations and the vehicle location. Such requirements are typical for contexts where line-of-sight must be maintained between t...
UAV missions often require specific geometric con-straints to be satisfied between ground locations and the vehicle location. Such requirements are typical for contexts where line-of-sight must be maintained between the vehicle location and the ground control location and are also important in surveillance applications where the UAV wishes to be able to sense, e.g., with a camera sensor, a specific region within a complex geometric environment. This problem is further complicated when the ground location is generalized to a convex 2D polygonal region. This article describes the theory and implementation of a system which can quickly calculate the 3D volume that encloses all 3D coordinates from which a 2D convex planar region can be entirely viewed; referred to as a visibility volume. The proposed approach computes visibility volumes using a combination of depth map computation using GPU-acceleration and geometric boolean operations. Solutions to this problem require complex 3D geometric analysis techniques that must execute using arbitrary precision arithmetic on a collection of discontinuous and non-analytic surfaces. Post-processing steps incorporate navigational constraints to further restrict the enclosed coordinates to include both visibility and navigation constraints. Integration of sensing visibility constraints with navigational constraints yields a range of navigable space where a vehicle will satisfy both perceptual sensing and navigational needs of the mission. This algorithm then provides a synergistic perception and navigation sensitive solution yielding a volume of coordinates in 3D that satisfy both the mission path and sensing needs.
The new era of technology is being greatly influenced by the field of artificial intelligence. computer vision and deep learning have become increasingly important due to their ability to process vast amounts of data ...
The new era of technology is being greatly influenced by the field of artificial intelligence. computer vision and deep learning have become increasingly important due to their ability to process vast amounts of data and provide insights and solutions in a variety of fields. computer vision, deep learning and signal analysis have been used in a growing number of applications and services including smart devices, image, and speech recognition, healthcare, etc., one such device is an infant monitoring system. It monitors the daily activities of the infant such as their sleeping patterns, sounds, and movements. In this paper, deep learning and computer vision libraries were used to develop algorithms to detect whether the infant was in any uncomfortable situation such as sleeping on its back, face being covered and whether the infant was awake. The smart infant monitoring system detects the infant's unsafe resting situation in real time and sent immediate alerts to the caretaker's device. This paper presents the design flow of a smart infant monitoring system consisting of a night vision camera, a Jetson Nano, and a Wi-Fi internet connection. The pose estimation and awake detection algorithms were developed and tested successfully for different infant resting/sleeping situations. The smart infant monitoring system provides significant benefits for safety and an improved understanding of infants' sleep patterns and behavior.
Human bones have formed the preferred configuration for high-strength and lightweight after long-time evolution. Taking human's longest and strongest bone - the femur - as an example, it is consist of two characte...
作者:
Cao, GanghuiWang, JinzhiPolycarpou, Marios M.Peking University
State Key Laboratory for Turbulence and Complex Systems Department of Mechanics and Engineering Science College of Engineering Beijing100871 China University of Cyprus
KIOS Research and Innovation Center of Excellence and the Department of Electrical and Computer Engineering Nicosia1678 Cyprus
This paper investigates the design of distributed observers for a class of nonlinear systems. The designed distributed observers reside in a network of sensor nodes. The communication links in the network enable each ...
详细信息
暂无评论