We present a diffusion probabilistic model (DPM) capable of generating high-quality electroencephalography (EEG) signals. In particular, we investigate the fidelity of synthesized visually evoked potentials and the pe...
We present a diffusion probabilistic model (DPM) capable of generating high-quality electroencephalography (EEG) signals. In particular, we investigate the fidelity of synthesized visually evoked potentials and the performance of the novel class-conditioned continuous-time DPM that generates the signals. We carefully select our neural network architecture to prevent generated frequency artifacts in the multi-channel synthesized EEG signals. With progressive distillation, we are able to achieve a single-step diffusion model that still has a competitive performance. With generative metrics and statistical analysis, we show that using DPMs for brain signal generation is feasible.
Power-HIL simulation is one of the emerging areas in power electronics development nowadays. It offers a convenient test environment for the whole power electronics hardware but eliminates the necessity of motor test ...
详细信息
Computer vision systems depend on vast and diverse datasets to achieve optimal performance. However, in scenarios where data collection involves personal identifiable information, privacy-protecting legislation can im...
Computer vision systems depend on vast and diverse datasets to achieve optimal performance. However, in scenarios where data collection involves personal identifiable information, privacy-protecting legislation can impede the acquisition process. To address this challenge, we present a novel face anonymization pipeline capable of running on embedded platforms. The proposed methodology combines denoising diffusion probabilistic models (DDPMs) and advanced image super-resolution techniques, such as DFDNet and ESPCN, to achieve high-quality anonymized facial images while preserving crucial facial keypoint locations. We conduct a comprehensive evaluation of the pipeline's performance, encompassing image quality, keypoint precision, and efficiency on two popular single-board computers, namely the Nvidia Jetson Nano and the Raspberry Pi 4B. The source code is available at https://***/balazsmorv/facediffusion.
Application of Robust Control Toolbox for Time Delay Systems implemented in the Matlab system to the oscillating plant with uncertain time delay and astatism using the D-K iteration and algebraic approach. The algebra...
详细信息
ISBN:
(数字)9798350361025
ISBN:
(纸本)9798350361032
Application of Robust Control Toolbox for Time Delay Systems implemented in the Matlab system to the oscillating plant with uncertain time delay and astatism using the D-K iteration and algebraic approach. The algebraic approach combines the structured singular value, algebraic theory and algorithm of global optimization solving remaining issues in structured singular value framework. The algorithm for global optimization can be alternated with direct search methods such as Nelder-Mead simplex method giving solutions for problems with one local extreme. As a global optimization method, Differential Migration is used proving to be reliable in solving this type of problems. The D-K iteration represents a standard method in the structured singular value theory. The results obtained from the D-K iteration are compared with the algebraic approach.
Devices authentication and cryptographic keys production techniques are implemented in various security applications. Because of its ability to generate unique, unclonable, and unpredictable cryptographic keys, physic...
Devices authentication and cryptographic keys production techniques are implemented in various security applications. Because of its ability to generate unique, unclonable, and unpredictable cryptographic keys, physically unclonable functions (PUFs) have been utilized in various hardware security applications. However, PUFs can be vulnerable to adversary attacks like machine learning (ML)-based modeling attacks. Input-output combinations of PUFs are called challenge-response pairs (CRPs). This article provides a vulnerability assessment of three recent Ring Oscillator (RO) PUFs approaches against ML modeling attacks. Assuming that adversary obtains part of the RO-PUF CRPs, and they can be used to predict the unrevealed CRPs. The article has a secondary objective to assess the impact of aging on the tested RO-PUF approaches in regenerating the same response.
The large-scale use of electronic power sources for various applications requires the monitoring of their operation and their critical components from the reliability point of view. One type of critical component for ...
The large-scale use of electronic power sources for various applications requires the monitoring of their operation and their critical components from the reliability point of view. One type of critical component for DC-DC power supplies is the output filtering capacitor. In most situations, the condition monitoring is performed by tracking the variation in time of the capacity and/or equivalent series resistance (ESR) values of the capacitor. The present paper continues the research on the parameter observer (PO) that was the subject of previous authors' articles, proposing an implementation of the PO with a microcontroller, for a buck converter. The experiments carried out confirm the possibility of using the proposed scheme in the quasi-online mode of operation. The estimation of the two parameters of the capacitor was done in about 10 ms during the discharge of the capacitor. The experimental results obtained allow the proposal of implementation extensions that widen the range of possible applications.
Blood pressure is one of the most vital signals characterizing the health status of the human body. Based on this physiological data, many current and future diseases can be detected. Therefore, having a device that c...
详细信息
With the emergence of many low-cost development platforms, designing an embedded system has become more flexible using different microcontroller platforms. However, it is necessary to consider various factors before s...
详细信息
In this paper, a particular type of dispersion is further investigated, which is called Filling. In this problem, robots are injected one by one into an a priori not known area and have to travel across until the whol...
详细信息
Training summarization models requires substantial amounts of training data. However for less resourceful languages like Hungarian, openly available models and datasets are notably scarce. To address this gap our pape...
暂无评论