Purpose: This study aims to investigate and compare three nonplanar (NP) slicing algorithms. The algorithms aim to control the layer thickness variation (LTV), which is a common issue in supportless fabrication of fre...
详细信息
Land cover (LC) mapping using satellite imagery is critical for environmental monitoring and management. Deep learning (DL), particularly convolutional neural networks (CNNs) and vision transformers (ViTs), have revol...
详细信息
In this paper the authors consider the operational problem of optimal signalling and control,called control-coding capacity(with feedback),C_(FB) in bits/second,of discrete-time nonlinear partially observable stochast...
详细信息
In this paper the authors consider the operational problem of optimal signalling and control,called control-coding capacity(with feedback),C_(FB) in bits/second,of discrete-time nonlinear partially observable stochastic systems in state space form,subject to an average cost constraint.C_(FB) is the maximum rate of encoding signals or messages into randomized controller-encoder strategies with feedback,which control the state of the system,and reproducing the messages at the output of the system using a decoder or estimator with arbitrary small asymptotic error *** the first part of the paper,the authors characterize C_(FB) by an information theoretic optimization problem of maximizing directed information from the inputs to the outputs of the system,over randomized strategies(controller-encoders).The authors derive equivalent characterizations of C_(FB),using randomized strategies generated by either uniform or arbitrary distributed random variables(RVs),sufficient statistics,and a posteriori distributions of nonlinear filtering *** the second part of the paper,the authors analyze C_(FB) for linear-quadratic Gaussian partially observable stochastic systems(LQG-POSSs).The authors show that randomized strategies consist of control,estimation and signalling parts,and the sufficient statistics are,two Kalman-filters and an orthogonal innovations *** authors prove a semi-separation principle which states,the optimal control strategy is determined explicitly from the solution of a control matrix difference Riccati equation(DRE),independently of the estimation and signalling ***,the authors express the optimization problem of C_(FB) in terms of two filtering matrix DREs,a control matrix DRE,and the covariance of the innovations *** the paper,the authors illustrate that the expression of C_(FB) includes as degenerate cases,problems of stochastic optimal control and channel capacity of information transmission.
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of v...
详细信息
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of view,leading to limited performance and increased size and *** particular,simultaneously achieving a wide field of view and large aperture for light collection is desirable but challenging to realize in a compact ***,we demonstrate a wide field of view(greater than 60°)meta-optic doublet eyepiece with an entrance aperture of 2.1 *** the design wavelength of 633 nm,the meta-optic doublet achieves comparable performance to a refractive lens-based eyepiece *** meta-doublet eyepiece illustrates the potential for meta-optics to play an important role in the development of high-quality monochrome near-eye displays and night vision systems.
The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of *** authors model the system using an automaton and study the general notion of detectab...
详细信息
The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of *** authors model the system using an automaton and study the general notion of detectability where a given set of state pairs needs to be(eventually or periodically)distinguished in any estimate of the state of the *** authors adopt the ALTER sensor attack model from previous work and formulate four notions of CA-detectability in the context of this attack model based on the following attributes:strong or weak;eventual or *** authors present verification methods for strong CA-detectability and weak *** authors present definitions of strong and weak periodic CA-detectability that are based on the construction of a verifier automaton called the augmented *** development also resulted in relaxing assumptions in prior results on D-detectability,which is a special case of CA-detectability.
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial succe...
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial success [1]. In spite of the steady improvement in efficiency, the interest and enthusiasm in search for new materials and innovative device architectures for newgeneration solar cells have never diminished or subsided;
In this article the legend of Fig. 6 was presented without a reference. The legend of Fig. 6 has been changed from "The general framework for knowledge distillation involving a teacher-student relationship&q...
In this paper, we present a Deep Neural Network(DNN) based framework that employs Radio Frequency(RF) hologram tensors to locate multiple Ultra-High Frequency(UHF) passive Radio-Frequency Identification(RFID) tags. Th...
详细信息
In this paper, we present a Deep Neural Network(DNN) based framework that employs Radio Frequency(RF) hologram tensors to locate multiple Ultra-High Frequency(UHF) passive Radio-Frequency Identification(RFID) tags. The RF hologram tensor exhibits a strong relationship between observation and spatial location, helping to improve the robustness to dynamic environments and equipment. Since RFID data is often marred by noise, we implement two types of deep neural network architectures to clean up the RF hologram tensor. Leveraging the spatial relationship between tags, the deep networks effectively mitigate fake peaks in the hologram tensors resulting from multipath propagation and phase wrapping. In contrast to fingerprinting-based localization systems that use deep networks as classifiers, our deep networks in the proposed framework treat the localization task as a regression problem preserving the ambiguity between fingerprints. We also present an intuitive peak finding algorithm to obtain estimated locations using the sanitized hologram tensors. The proposed framework is implemented using commodity RFID devices, and its superior performance is validated through extensive experiments.
暂无评论