Non-volatile memory has become an essential type of persistent storage. Utilizing an SSD (Solid-State Drive) as a cache device for an HDD (Hard-Disk Drive) is one of the effective ways to achieve both good storage-acc...
详细信息
Unmanned Aerial Vehicles (UAVs) are widely used in various applications, from inspection and surveillance to transportation and delivery. Navigating UAVs in complex 3D environments is a challenging task that requires ...
Unmanned Aerial Vehicles (UAVs) are widely used in various applications, from inspection and surveillance to transportation and delivery. Navigating UAVs in complex 3D environments is a challenging task that requires robust and efficient decision-making algorithms. This paper presents a novel approach to UAV navigation in 3D environments using a Curriculum-based Deep Reinforcement Learning (DRL) approach. The proposed method utilizes a deep neural network to model the UAV’s decision-making process and to learn a mapping from the state space to the action space. The learning process is guided by a reinforcement signal that reflects the performance of the UAV in terms of reaching its target while avoiding obstacles and with energy efficiency. Simulation results show that the proposed method has a positive trade off when compared to the baseline algorithm. The proposed method was able to perform well in environments with a state space size of 22 millions, allowing the usage in big environments or in maps with high resolution. The results demonstrate the potential of DRL for enabling UAVs to operate effectively in complex environments.
Pristine van der Waals (vdW) heterostructures formed between two-dimensional (2D) and other materials can be used to create optical and electronic devices. However, the weak vdW forces alone do not allow direct physic...
详细信息
We present multi-band chirped mirror pairs, adept at managing group delay variations within and across bands. These designs outperform ultra-broadband mirrors, offering enhanced dispersion control and facilitating pre...
详细信息
Recently, vehicle similarity learning, also called re-identification (ReID), has attracted significant attention in computer vision. Several algorithms have been developed and obtained considerable success. However, m...
详细信息
Multicast networks, while efficient in data transmission, are susceptible to targeted attacks. Leveraging GNS3’s capabilities, this study emulates and analyzes three types of multicast attacks: fake rendezvous point ...
Multicast networks, while efficient in data transmission, are susceptible to targeted attacks. Leveraging GNS3’s capabilities, this study emulates and analyzes three types of multicast attacks: fake rendezvous point attack, IGMP flood, and IGMP Leave attacks. Through realistic emulation performed via GNS3, the research sheds light on attack implementation. The results offer insights into investigating multicast vulnerabilities, benefiting security practitioners and researchers alike. This work enhances understanding of multicast network attacks, presenting a practical approach to evaluating and investigating against potential threats.
Reference placement is promising to handle the increasing complexity in printed circuit board (PCB) designs, which aims to find the isomorphism of the placed template in component combination to reuse the placement. I...
Reference placement is promising to handle the increasing complexity in printed circuit board (PCB) designs, which aims to find the isomorphism of the placed template in component combination to reuse the placement. In this paper, we convert the netlist information into a graph and then model the reference placement as a subgraph matching problem. Since the state-of-the-art subgraph matching methods usually recursively search the solutions and suffer from high time and memory consumption in large-scale designs, we develop a novel subgraph matching algorithm D2BS with diversity tolerance and improved backtracking to guarantee matching quality and efficiency. The D2BS algorithm is founded on a data structure called the candidate space (CS) structure. We build and filter the candidate set for each query node according to our designed features to construct the CS structure. During the CS optimization process, a graph diversity tolerance strategy is adopted to achieve efficient inexact matching. Then, hierarchical matching is developed to search the template embeddings in the CS structure guided by branch backtracking and matched-node snatching strategies. Based on the industrial PCB designs, experimental results show that D2BS outperforms the state-of-the-art subgraph matching method in matching accuracy and running time.
We present multi-band chirped mirror pairs, adept at managing group delay variations within and across bands. These designs outperform ultra-broadband mirrors, offering enhanced dispersion control and facilitating pre...
详细信息
SliQSim, originally developed as the first exact quantum circuit simulator, is extended in this paper to provide capabilities for the analysis and verification of quantum states. It provides an interface for users to ...
详细信息
We find that the double-threshold voltage-current characteristics in the insulating regime in the ultra-clean two-valley two-dimensional electron system in SiGe/Si/SiGe quantum wells are promoted by perpendicular magn...
详细信息
暂无评论