In the United States, more than 10% of traditional electricalengineering programs have combined with computer science into a single department \Historically computer science programs emerged from mathematics or elect...
详细信息
In this paper the authors consider the operational problem of optimal signalling and control,called control-coding capacity(with feedback),C_(FB) in bits/second,of discrete-time nonlinear partially observable stochast...
详细信息
In this paper the authors consider the operational problem of optimal signalling and control,called control-coding capacity(with feedback),C_(FB) in bits/second,of discrete-time nonlinear partially observable stochastic systems in state space form,subject to an average cost constraint.C_(FB) is the maximum rate of encoding signals or messages into randomized controller-encoder strategies with feedback,which control the state of the system,and reproducing the messages at the output of the system using a decoder or estimator with arbitrary small asymptotic error *** the first part of the paper,the authors characterize C_(FB) by an information theoretic optimization problem of maximizing directed information from the inputs to the outputs of the system,over randomized strategies(controller-encoders).The authors derive equivalent characterizations of C_(FB),using randomized strategies generated by either uniform or arbitrary distributed random variables(RVs),sufficient statistics,and a posteriori distributions of nonlinear filtering *** the second part of the paper,the authors analyze C_(FB) for linear-quadratic Gaussian partially observable stochastic systems(LQG-POSSs).The authors show that randomized strategies consist of control,estimation and signalling parts,and the sufficient statistics are,two Kalman-filters and an orthogonal innovations *** authors prove a semi-separation principle which states,the optimal control strategy is determined explicitly from the solution of a control matrix difference Riccati equation(DRE),independently of the estimation and signalling ***,the authors express the optimization problem of C_(FB) in terms of two filtering matrix DREs,a control matrix DRE,and the covariance of the innovations *** the paper,the authors illustrate that the expression of C_(FB) includes as degenerate cases,problems of stochastic optimal control and channel capacity of information transmission.
One measure of continuous improvement in the electrical and computerengineeringdepartment (ECE) at the University of North Carolina at Charlotte is survey feedback from alumni on their workplace readiness. In a rece...
详细信息
One measure of continuous improvement in the electrical and computerengineeringdepartment (ECE) at the University of North Carolina at Charlotte is survey feedback from alumni on their workplace readiness. In a recent survey, alumni highlighted oral communication as an area of weakness in the curriculum. When a group of faculty teaching design courses learned about the University's Communication Across the Curriculum (CAC) program, they formed a pilot team to focus on improving student oral presentation skills in the design courses. The CAC program focuses on the oral and written communication as playing an integral role in teaching students reasoning, critical thinking, and problem solving skills. And as faculty development program, it seeks to develop a communication enhanced curriculum (CEC) at the departmental level. The CAC program hosts an annual institute during which departmental teams gain professional development in the areas of oral and written communication. At the 2010 CAC Institute, a team of ECE faculty set the strategic goal to improve ECE students' ability to clearly convey technical information orally during design presentations. The ECE team then met with the CAC coordinator to develop an oral communication rubric for uniform implementation, thus establishing a cohesive assessment across the department's design sequence. Our goal with this approach was to improve oral communication skills among our graduates to increase their opportunities for success in their professional careers. We focused on three important skills in oral presentation: Audience analysis, message coherence / focus, and message delivery. A team of five faculty-four from ECE and the CAC director-worked together to develop a rubric to evaluate students oral presentation skills in the sophomore design (ECGR 2252), junior design (ECGR 3157) and senior design (ECGR3253 and ECGR3254) courses. The implementation of the process began by using the rubric in Appendix (a) to evaluate stu
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of v...
详细信息
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of view,leading to limited performance and increased size and *** particular,simultaneously achieving a wide field of view and large aperture for light collection is desirable but challenging to realize in a compact ***,we demonstrate a wide field of view(greater than 60°)meta-optic doublet eyepiece with an entrance aperture of 2.1 *** the design wavelength of 633 nm,the meta-optic doublet achieves comparable performance to a refractive lens-based eyepiece *** meta-doublet eyepiece illustrates the potential for meta-optics to play an important role in the development of high-quality monochrome near-eye displays and night vision systems.
The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of *** authors model the system using an automaton and study the general notion of detectab...
详细信息
The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of *** authors model the system using an automaton and study the general notion of detectability where a given set of state pairs needs to be(eventually or periodically)distinguished in any estimate of the state of the *** authors adopt the ALTER sensor attack model from previous work and formulate four notions of CA-detectability in the context of this attack model based on the following attributes:strong or weak;eventual or *** authors present verification methods for strong CA-detectability and weak *** authors present definitions of strong and weak periodic CA-detectability that are based on the construction of a verifier automaton called the augmented *** development also resulted in relaxing assumptions in prior results on D-detectability,which is a special case of CA-detectability.
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial succe...
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial success [1]. In spite of the steady improvement in efficiency, the interest and enthusiasm in search for new materials and innovative device architectures for newgeneration solar cells have never diminished or subsided;
In this paper, we present a Deep Neural Network(DNN) based framework that employs Radio Frequency(RF) hologram tensors to locate multiple Ultra-High Frequency(UHF) passive Radio-Frequency Identification(RFID) tags. Th...
详细信息
In this paper, we present a Deep Neural Network(DNN) based framework that employs Radio Frequency(RF) hologram tensors to locate multiple Ultra-High Frequency(UHF) passive Radio-Frequency Identification(RFID) tags. The RF hologram tensor exhibits a strong relationship between observation and spatial location, helping to improve the robustness to dynamic environments and equipment. Since RFID data is often marred by noise, we implement two types of deep neural network architectures to clean up the RF hologram tensor. Leveraging the spatial relationship between tags, the deep networks effectively mitigate fake peaks in the hologram tensors resulting from multipath propagation and phase wrapping. In contrast to fingerprinting-based localization systems that use deep networks as classifiers, our deep networks in the proposed framework treat the localization task as a regression problem preserving the ambiguity between fingerprints. We also present an intuitive peak finding algorithm to obtain estimated locations using the sanitized hologram tensors. The proposed framework is implemented using commodity RFID devices, and its superior performance is validated through extensive experiments.
Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memris...
详细信息
Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memristors have been developed to emulate synaptic plasticity,replicating the key functionality of neurons—integrating diverse presynaptic inputs to fire electrical impulses—has remained *** this study,we developed reconfigurable metal-oxide-semiconductor capacitors(MOSCaps)based on hafnium diselenide(HfSe2).The proposed devices exhibit(1)optoelectronic synaptic features and perform separate stimulus-associated learning,indicating considerable adaptive neuron emulation,(2)dual light-enabled charge-trapping and memcapacitive behavior within the same MOSCap device,whose threshold voltage and capacitance vary based on the light intensity across the visible spectrum,(3)memcapacitor volatility tuning based on the biasing conditions,enabling the transition from volatile light sensing to non-volatile optical data *** reconfigurability and multifunctionality of MOSCap were used to integrate the device into a leaky integrate-and-fire neuron model within a spiking neural network to dynamically adjust firing patterns based on light stimuli and detect exoplanets through variations in light intensity.
暂无评论