In this work we combine a high flow cytometry experimental setup and a 10Kframe/sec capable neuromorphic event-based camera, followed by lightweight machine learning schemes, thus allowing the simultaneous imaging and...
详细信息
ISBN:
(纸本)9798350345995
In this work we combine a high flow cytometry experimental setup and a 10Kframe/sec capable neuromorphic event-based camera, followed by lightweight machine learning schemes, thus allowing the simultaneous imaging and real-time classification of test particles, moving at a speed of 0.8m/sec with an accuracy of 97.6%. The key advantage of the utilized microscopy system, is the use of an event-based camera, generating spiking events, triggered by pixel's contrast changes. This bio-inspired operation, contrary to conventional CMOS cameras [1], alleviates bandwidth constraints and can significantly boost frame-rate capabilities, thus capturing high speed events. Following this paradigm, medical imaging modalities, where the detection and analysis of fast-moving particles is a necessity, such as high-flow cytometry, can greatly proliferate from the proposed approach.
Tandem solar cells combining perovskite and CIGS have rapidly gained prominence as highly efficient photovoltaic devices. Recent advancements in enhancing their efficiency in-volve adjusting the thickness of distinct ...
Tandem solar cells combining perovskite and CIGS have rapidly gained prominence as highly efficient photovoltaic devices. Recent advancements in enhancing their efficiency in-volve adjusting the thickness of distinct layers with tunable bandgaps, demonstrating superior performance compared to al-ternative tandem solar cells. The upper cell, employing perovskite material chosen for its excellent light absorption coefficient and optoelectronic properties, collaborates with the bottom CIGS cell, characterized by a tunable bandgap and low thermal requirements, contributing significantly to overall efficiency improvement. Through numerical simulations conducted with wxAMPS software, our proposed model, which incorporates a 3μm thick perovskite absorber layer as the upper cell and a 3.5μm thick CIGS absorber layer as the lower cell, demonstrated outstanding power conversion efficiency of 40.0209%, Voc of 1.8675 V, Jsc of 23.2146 mA/cm 2 , and FF of 92.3152
In order to quantify the user's experience of haptic interactions in networked teleoperation systems, we design a virtual environment with computer-aid design and conduct extensive subjective tests to explore the ...
详细信息
For companies in the embedded systems domain, digitalization and digital technologies allow endless opportunities for new business models and continuous value delivery. While physical products still provide the core r...
详细信息
For companies in the embedded systems domain, digitalization and digital technologies allow endless opportunities for new business models and continuous value delivery. While physical products still provide the core revenue, these are rapidly being complemented with offerings that allow for recurring revenue and that are based on software, data and artificial intelligence (AI). However, while new digital offerings allow for fundamentally new and recurring revenue streams and continuous value delivery to customers, the creation of these proves to be a challenging endeavour. In this paper, we study how companies explore ways to create new or additional value with the intention to complement their product portfolio with offerings that allow for recurring revenue. Based on multi-case study research, we identify the key challenges that companies in the embedded systems domain experience and we derive four organizational patterns that we see slow down innovation. Second, we present a framework outlining alternative types of offerings to customers. Third, we provide a value taxonomy in which we detail the different types of offerings and the value these provide to customers. For each value offering, we indicate whether this offering is (1) static or evolving, (2) bundled or unbundled, (3) free or monetized, and we provide examples from the case companies we studied.
Leakage of any type of gas has emerged as a hazard in recent years, whether in a typical workplace, boiler, a commercial setting, a café, or a canteen, industries natural gas, coal, refinery products, crude oil, ...
详细信息
Leakage of any type of gas has emerged as a hazard in recent years, whether in a typical workplace, boiler, a commercial setting, a café, or a canteen, industries natural gas, coal, refinery products, crude oil, cement, electricity, steel, and fertilizers etc. In this article, I proposed a new invention of an IoT-based gas waste monitoring, leak detection, and alerting system. The research extends on the development of such an intelligent system that can intelligently preserve gas, ensure the safety precaution and pre vent accidents. The technique must be connected to the stove. The design incorporates ultrasonic sensors which identify bio gas leakage in circumstance with in square metre is usage area of industries or cooking place. The Proposed work smart intelligence system is cuts off the gas supply using an automated shutting off device. Whenever a gas leak is detected, consumers will be notified through SMS via GSM, location using GPRS, and will be able to resolve the situation as quickly as feasible. The flame sensor in the technology will supervise flame and fire. The buzzer starts to sound when a fire is detected. Aside from that, the system may save data on the cloud. With the help of this cloud storage solution, every user’s daily gas use may be traced. Finally, this approach will aid in recognizing per user natural gas consumption. The system has been examined and is capable of monitoring gas loss, evacuation, and sending an SMS notification and location aid to the user. The precipitate demonstrated its usefulness in conserving a considerable amount of domestically squandered gas.
Crime is an unlawful act that carries legal repercussions. Bangladesh has a high crime rate due to poverty, population growth, and many other socio-economic issues. For law enforcement agencies, understanding crime pa...
详细信息
Over the past several years, ATSC has continued to develop new technologies that can be integrated into the standard, making it a leading innovator in the broadcasting industry. The spectrum efficiency of the waveform...
详细信息
ISBN:
(数字)9798350364262
ISBN:
(纸本)9798350364279
Over the past several years, ATSC has continued to develop new technologies that can be integrated into the standard, making it a leading innovator in the broadcasting industry. The spectrum efficiency of the waveforms and coding, combined with new infrastructure based on the integration of a core network, has proposed ATSC 3.0 as a strong candidate for implementing new multimedia-related use cases. However, the requirements for certain use cases (e.g., AR/VR, 360-degree video) are very harsh, for instance, regarding the signal quality needed at the receiver end. A set of ATSC 3.0 physical layer configurations cannot be implemented with the current channel estimation and equalization solutions. Consequently, Artificial Intelligence (AI) is presented as the necessary enabler for these cases. Specifically, AI has demonstrated better use of the knowledge of the propagation channel than traditional processing methods. Therefore, this paper aims to propose AI-based channel estimation techniques for ATSC. Specifically, two solutions are proposed. The first is a super-resolution estimation enhancer, whereas the second performs the interpolation process within the AI. The results show that both techniques improve the performance of current processing techniques by around one order of magnitude.
In this paper, we have presented an extended and generalized version of dislocated metric in the frame of complex valued metric space, which has been introduced as complex valued double controlled dislocated metric sp...
详细信息
Influence maximization techniques emphasize selecting a set of influential nodes in order to maximize influence. Because the algorithms presented in this field ignore the topology of cliques for diffusion, there are t...
Influence maximization techniques emphasize selecting a set of influential nodes in order to maximize influence. Because the algorithms presented in this field ignore the topology of cliques for diffusion, there are two major challenges in influence maximization algorithms: optimal diffusion and computational overhead reduction. As a result, the CDP algorithm is presented in this article to address these issues. This algorithm first selects suitable cliques for diffusion based on their position and strategy in social networks. Furthermore, for each clique, a score is calculated based on the topological criteria of the clique, and suitable cliques are selected for diffusion by applying a threshold limit. The seed nodes are chosen from the cliques in the second step. To avoid the rich club phenomenon, only a few nodes from each clique are chosen as seed candidate nodes. Finally, the seed nodes are chosen based on the node’s topology and the strength of the node’s level one neighbor. In the experiment section, the CDP algorithm significantly outperforms the best algorithms presented in recent years in terms of influence spread rate and execution time.
The increasing popularity of smart home devices has led to a growing concern over cyberthreats to these devices. This study aims to investigate the perceived cyberthreats to smart home devices and identify ways to pro...
The increasing popularity of smart home devices has led to a growing concern over cyberthreats to these devices. This study aims to investigate the perceived cyberthreats to smart home devices and identify ways to protect privacy and countermeasure against these threats. Five experts in the field of smart home technology were selected for this study. Semi-structured interviews were conducted with the selected experts over the telephone. The transcripts of the interviews were analyzed using thematic analysis. The main findings of the study indicate that the most significant cyberthreats to smart home devices are: Voice recordings (35.5 % ), Camera and microphone access (30.1 %), Location tracking (24.9 % ). Personal information (20.1%), Data breaches (15.1 %), Third-party access (7.4 %), Privacy invasion (7.4%), Lack of control over personal information (5.0 % ), Cyber-attacks (4.8%), Security vulnerabilities in smart devices (4.8 % ) were also identified as potential threats. The study suggests that protecting personal data and ensuring device security are key considerations for safeguarding smart home devices and that it is important to take the necessary precautions to protect smart home devices from cyber threats, and to be aware of the potential risks that these devices pose to personal privacy and security.
暂无评论