The integration of drone technology and Artificial Intelligence (AI) has opened up new possibilities for wildlife conservation and habitat monitoring. In this paper, we present a new system for efficiently and accurat...
The world of digitization is growing exponentially;data optimization, security of a network, and energy efficiency are becoming more prominent. The Internet of Things (IoT) is the core technology of modern society. Th...
详细信息
Coping with noise in computing is an important problem to consider in large systems. With applications in fault tolerance (Hastad et al., 1987;Pease et al., 1980;Pippenger et al., 1991), noisy sorting (Shah and Wainwr...
详细信息
Coping with noise in computing is an important problem to consider in large systems. With applications in fault tolerance (Hastad et al., 1987;Pease et al., 1980;Pippenger et al., 1991), noisy sorting (Shah and Wainwright, 2018;Agarwal et al., 2017;Falahatgar et al., 2017;Heckel et al., 2019;Wang et al., 2024a;Gu and Xu, 2023;Kunisky et al., 2024), noisy searching (Berlekamp, 1964;Horstein, 1963;Burnashev and Zigangirov, 1974;Pelc, 1989;Karp and Kleinberg, 2007), among many others, the goal is to devise algorithms with the minimum number of queries that are robust enough to detect and correct the errors that can happen during the computation. In this work, we consider the noisy computing of the threshold-k function. For n Boolean variables x = (x1, ..., xn) ∈ {0, 1}n, the threshold-k function THk(·) computes whether the number of 1's in x is at least k or not, i.e., (Equation presented) The noisy queries correspond to noisy readings of the bits, where at each time step, the agent queries one of the bits, and with probability p, the wrong value of the bit is returned. It is assumed that the constant p ∈ (0, 1/2) is known to the agent. Our goal is to characterize the optimal query complexity for computing the THk function with error probability at most δ. This model for noisy computation of the THk function has been studied by Feige et al. (1994), where the order of the optimal query complexity is established;however, the exact tight characterization of the optimal number of queries is still open. In this paper, our main contribution is tightening this gap by providing new upper and lower bounds for the computation of the THk function, which simultaneously improve the existing upper and lower bounds. The main result of this paper can be stated as follows: for any 1 ≤ k ≤ n, there exists an algorithm that computes the THk function with an error probability at most δ = o(1), and the algorithm uses at most (Equation presented) queries in expectation. Here we define m (Eq
Weather-adaptive energy harvesting of omnipresent waste heat and rain droplets,though promising in the field of environmental energy sustainability,is still far from practice due to its low electrical output owing to ...
详细信息
Weather-adaptive energy harvesting of omnipresent waste heat and rain droplets,though promising in the field of environmental energy sustainability,is still far from practice due to its low electrical output owing to diele ctric structure irrationality and *** we present atypical upcycling of ambient heat and raindrop energy via an all-in-one non-planar energy harvester,simultaneously increasing solar pyroelectricity and droplet-based triboelectricity by two-fold,in contrast to conventional *** delivered non-planar dielectric with high transmittance confines the solar irradiance onto a focal hotspot,offering transverse thermal field propagation towards boosted inhomogeneous polarization with a generated power density of 6.1 mW m-2at 0.2 ***,the enlarged lateral surface area of curved architecture promotes droplet spreading/separation,thus travelling the electrostatic field towards increased *** enhanced pyroelectric and triboelectric outputs,upgraded with advanced manufacturing,demonstrate applicability in adaptive sustainable energy harvesting on sunny,cloudy,night,and rainy *** findings highlight a facile yet efficient strategy,not only for weather-adaptive environmental energy recovery but also in providing key insights for spatial thermal/electrostatic field manipulation in thermo electrics and ferroelectrics.
Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs). However, adversarial fals...
详细信息
We show that a classical spin liquid phase can emerge from an ordered magnetic state in the two-dimensional frustrated Shastry-Sutherland Ising lattice due to lateral confinement. Two distinct classical spin liquid st...
详细信息
We show that a classical spin liquid phase can emerge from an ordered magnetic state in the two-dimensional frustrated Shastry-Sutherland Ising lattice due to lateral confinement. Two distinct classical spin liquid states are stabilized: (i) long-range spin-correlated dimers, and (ii) exponentially decaying spin-correlated disordered states, depending on widths of W=3n, 3n+1 or W=3n+2,n being a positive integer. Stabilization of spin liquids in a square-triangular lattice moves beyond the conventional geometric paradigm of kagome, triangular, or tetrahedral arrangements of antiferromagnetic ions, where spin liquids have been discussed conventionally.
Background With the development of virtual reality(VR)technology,there is a growing need for customized 3D ***,traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to t...
详细信息
Background With the development of virtual reality(VR)technology,there is a growing need for customized 3D ***,traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to the person being *** study presents a novel framework for generating animatable 3D cartoon faces from a single portrait *** First,we transferred an input real-world portrait to a stylized cartoon image using *** then proposed a two-stage reconstruction method to recover a 3D cartoon face with detailed *** two-stage strategy initially performs coarse estimation based on template models and subsequently refines the model by nonrigid deformation under landmark ***,we proposed a semantic-preserving face-rigging method based on manually created templates and deformation *** Compared with prior arts,the qualitative and quantitative results show that our method achieves better accuracy,aesthetics,and similarity ***,we demonstrated the capability of the proposed 3D model for real-time facial animation.
Multi-armed bandits (MAB) is a sequential decision-making model in which the learner controls the trade-off between exploration and exploitation to maximize its cumulative reward. Federated multi-armed bandits (FMAB) ...
详细信息
The rapid advancements in deepfake technology are imposing significant challenges in detecting manipulated media contents. In this work, we have introduced a deepfake detection method that utilizes three pre-trained c...
详细信息
The extraction of atomic-level material features from electron microscope images is crucial for studying structure-property relationships and discovering new materials. However, traditional electron microscope analyse...
详细信息
The extraction of atomic-level material features from electron microscope images is crucial for studying structure-property relationships and discovering new materials. However, traditional electron microscope analyses rely on time-consuming and complex human operations; thus, they are only applicable to images with a small number of atoms. In addition, the analysis results vary due to observers' individual deviations. Although efforts to introduce automated methods have been performed previously, many of these methods lack sufficient labeled data or require various conditions in the detection process that can only be applied to the target material. Thus, in this study, we developed AtomGAN, which is a robust, unsupervised learning method, that segments defects in classical 2D material systems and the heterostructures of MoS2/WS2automatically. To solve the data scarcity problem, the proposed model is trained on unpaired simulated data that contain point and line defects for MoS2/WS2. The proposed AtomGAN was evaluated on both simulated and real electron microscope images. The results demonstrate that the segmented point defects and line defects are presented perfectly in the resulting figures, with a measurement precision of 96.9%. In addition, the cycled structure of AtomGAN can quickly generate a large number of simulated electron microscope images.
暂无评论