Acoustofluidic separation of cells and particles is an emerging technology that integrates acoustics and *** the last decade,this technology has attracted significant attention due to its biocompatible,contactless,and...
详细信息
Acoustofluidic separation of cells and particles is an emerging technology that integrates acoustics and *** the last decade,this technology has attracted significant attention due to its biocompatible,contactless,and labelfree *** has been widely validated in the separation of cells and submicron bioparticles and shows great potential in different biological and biomedical *** review first introduces the theories and mechanisms of acoustofluidic ***,various applications of this technology in the separation of biological particles such as cells,viruses,biomolecules,and exosomes are ***,we discuss the challenges and future prospects of this field.
The task of enabling a multi-agent system for entrapping and escorting static/dynamic targets in the context of cluster space control is addressed. The proposed methodology consists of two main strategies. On one hand...
详细信息
While the use of machine learning techniques in high stake fields, such as medical diagnosis and criminal justice, has been increasing in recent years, concerns have been raised regarding the lack of transparency and ...
While the use of machine learning techniques in high stake fields, such as medical diagnosis and criminal justice, has been increasing in recent years, concerns have been raised regarding the lack of transparency and interpretability of the algorithms used. In this paper, we propose the use of interpretable attention-based ConvLSTM models for crime forecasting application. This approach combines the power of ConvLSTM models in capturing spatio-temporal patterns with the interpretability of attention mechanisms, allowing for the identification of key geographic areas in the input data that contribute to the prediction. We demonstrate the effectiveness of this approach through experiments on real-world crime data, showing that our model demonstrates high accuracy in crime predictions while providing insightful visualization that enhances the interpretability of prediction results.
We show that a TM leaky mode realized by subwavelength gratings (SWGs) can eliminate crosstalk between proximate waveguides. Oscillating fields i n t he SWGs allow coupling coefficient components to counteract each ot...
详细信息
Over the past few decades, the use of drones for applications such as defense, reconnaissance, agriculture, law enforcement, and others has dramatically increased. Although drones are useful for these applications, th...
详细信息
True Random Number Generators (TRNGs) form the core and foundation of secure systems, ensuring the consistency and integrity of cryptographic operations. Their robustness and reliability significantly contribute to sa...
True Random Number Generators (TRNGs) form the core and foundation of secure systems, ensuring the consistency and integrity of cryptographic operations. Their robustness and reliability significantly contribute to safeguarding sensitive information against potential threats and breaches. TRNGs rely on natural fluctuations, sourcing noise from various unpredictable physical phenomena, including thermal, electronic, and quantum effects, to generate high-entropy signals. While analog TRNGs offer effective solutions, an all-digital, CMOS-manufacturable approach is highly desir-able for several reasons: (1) low-power consumption, (2) cost-effectiveness, and (3) dependability. This proposed design is one such attempt, presenting a flexible framework that dynamically selects among several unique Ring Oscil-lators (ROs) to generate truly random bits. Remarkably, it achieves a random-number generation rate of 1 Gbits/sec while consuming only 1 *** (pJ) every 25 random bits generated and has a Gate Equivalence (GE) of only 119. These findings were validated in Cadence's Virtuoso and Design Vision software environments, respectively. As a low-power design, its average power consumption was a mere 34.12μW. Additionally, it underwent synthesis on an Altera Cyclone V FPGA, successfully passing all the NIST SP800 test suite for randomness. This validation substan-tiates its effectiveness in a real hardware implementation, making it applicable across various decentralized domains such as Edge Computing, Internet of Things, and Federated Learning.
The metaverse virtual assets are carried by smart contract, thus detecting the potential smart contract vulnerabilities and malicious intension is critical to protect the metaverse digital assets and the investors'...
详细信息
Reed-Solomon (RS) codes are widely applied in storage systems. The main bottleneck of RS codes is that the high decoding complexity defined as the number of multiplications and additions. In this paper, we propose a f...
详细信息
Trajectory representation learning (TRL) is an intermediate step in handling trajectory data to realize various downstream machine-learning tasks. While most previous TRL research focuses on modeling structured moveme...
详细信息
This paper describes a stable trot gait control system for a quadruped robot that enables faster walking with stability. Compared to other gait types, it is possible to walk faster with relatively little energy expend...
详细信息
暂无评论