With the increase of interest in digital twin, the way to link dynamic objects into digital twin is also important task as well as static environment. However, there are many situations that the developer can not know...
详细信息
ISBN:
(数字)9798350394085
ISBN:
(纸本)9798350394092
With the increase of interest in digital twin, the way to link dynamic objects into digital twin is also important task as well as static environment. However, there are many situations that the developer can not know all about real environment. This paper focus on finding camera extrinsic parameters(6-DOF camera pose) to fix misalignment between real and digital twin images. Due to the absent of knowledge about function of image $I(\theta)$ given camera parameter $\theta$, this work can’t use gradient descent algorithm known as a powerful optimization method in deep learning. So this paper propose how to apply GA(Genetic Algorithm) for optimizing camera parameters. Fitness function, one of the most important property in GA, is composed of similarity between two images. This paper propose novel approach to calculate similarity using classical feature extraction and matching methods. Even though this work use classic feature extraction method, errors are estimated within 1.42 m for camera position and 1.22° for rotation in all experiments(Averagely 0.744 m and 0.903°). The code of the algorithm can be found in the following link: https://***/Kwan-Ho-Kim/***.
Conventional presentations of quantum algorithms overwhelmingly rely on mathematical formalism, posing an unnecessary barrier to conceptual understanding. The growing influence of quantum computing across diverse doma...
详细信息
ISBN:
(数字)9798350343083
ISBN:
(纸本)9798350343090
Conventional presentations of quantum algorithms overwhelmingly rely on mathematical formalism, posing an unnecessary barrier to conceptual understanding. The growing influence of quantum computing across diverse domains necessitates more accessible education on the subject. To engage a broader audience in quantum computing, we introduce a new approach for teaching quantum algorithms: drawing parallels to classical pseudocode. This approach, which we call “QuCode,” is demonstrated through its application to several black box quantum algorithms: Deutsch-Jozsa, Bernstein-Vazirani, and Simon's algorithm.
Black Fungus is a dangerous fungal illness, commonly referred to as 'mucormycosis', usually infecting uncompromising people. Mucormycosis is generally rare, affecting less than two individuals per million each...
详细信息
A locally corrected Nystrom method is presented that better models a mixed-order, divergence-conforming space on triangular cells. The theory is developed for a space that is complete to the same order for both the un...
详细信息
ISBN:
(数字)9781733509671
ISBN:
(纸本)9798350362978
A locally corrected Nystrom method is presented that better models a mixed-order, divergence-conforming space on triangular cells. The theory is developed for a space that is complete to the same order for both the unknown quantity and its divergence. The method is implemented for the electric field integral equation, and convergence results are presented for scattering from a perfectly conducting sphere.
Recent work has revealed many intriguing empirical phenomena in neural network training, despite the poorly understood and highly complex loss landscapes and training dynamics. One of these phenomena, Linear Mode Conn...
详细信息
Dynamic mode decomposition with control (DMDc) has emerged as a powerful tool for data-driven system identification in recent years. Our work provides an extension to DMDc, namely the ability to identify systems with ...
详细信息
Dynamic mode decomposition with control (DMDc) has emerged as a powerful tool for data-driven system identification in recent years. Our work provides an extension to DMDc, namely the ability to identify systems with a delayed input. Specifically, we propose dynamic mode decomposition with input-delayed Control (DMDidc), which allows the identification of input-delayed linear time-invariant (LTI) systems given sufficient input-output data. We prove the method is able to identify delays that are a fraction of a discrete controllers sampling period and provide an extended predictive feedback control scheme that accommodates such delays. A numerical simulation illustrates the benefits of our method.
Multi-provider multi-user multi-access edge computing provides a recent market-driven networking paradigm facilitating the user data offloading process. In this paper we introduce the AGORA framework, which employs a ...
详细信息
ISBN:
(数字)9798350361261
ISBN:
(纸本)9798350361278
Multi-provider multi-user multi-access edge computing provides a recent market-driven networking paradigm facilitating the user data offloading process. In this paper we introduce the AGORA framework, which employs a sophisticated multi-leader multi-follower Stackelberg game that jointly optimizes the data offloading, computing resource allocation, and computing resource pricing, all facilitated through a non-cooperative game-theoretic approach. In order to support the aforementioned modeling and approach, a novel utility function that quantifies the users satisfaction, factoring in the computing service cost, and an innovative profit function for the MEC providers is introduced, emphasizing the market penetration and the computing service provision costs. Numerical results, obtained via modeling and simulation, demonstrate AGORA’s remarkable adaptability, accommodating homogeneous and heterogeneous user computing demands, while simultaneously outperforming proportional fairness resource allocation approaches, and significantly enhancing the MEC providers’ profitability and the users’ satisfaction from the edge computing services.
We present an abbreviated survey of common Physically Unclonable Function (PUF) structures, and highlight two emerging chaotic structures, targeted towards application-driven practitioners who need reliable generation...
详细信息
ISBN:
(数字)9798331542252
ISBN:
(纸本)9798331542269
We present an abbreviated survey of common Physically Unclonable Function (PUF) structures, and highlight two emerging chaotic structures, targeted towards application-driven practitioners who need reliable generation of device specific values. Interestingly, chaotic PUF structures output entropic values over successive iterations. We also outline three distinct PUF use cases and discuss well-suited electronic structures for each case. We discuss security in limited cases and summarize suitable implementation targets, aspects affecting reliability, and notional generation rates. Altogether, this work summarizes key concepts about PUF structures in an application-driven context to aid both designers and users of these devices in the broader security community.
The Shor algorithm demonstrates the significant risk that quantum attacks pose to the security of widely used cryptographic primitives. However, code-based cryptography has been shown to be resistant to these attacks....
The Shor algorithm demonstrates the significant risk that quantum attacks pose to the security of widely used cryptographic primitives. However, code-based cryptography has been shown to be resistant to these attacks. To date, no polynomial-time attack exists that can break code-based cryptosystems such as the McEliece cryptosystem. Despite this, these cryptosystems are not employed in practical applications in domains such as online banking, blockchains, and e-commerce platforms. The primary reason is the large sizes of the public and private keys associated with code-based cryptosystems. In this paper, a new code-based cryptosystem is introduced which employs a dual matrix based on the transpose and inverse of the parity check matrix to reduce the key size compared to the McEliece cryptosystem.
Cataracts are clouding of the lens in the eye, leading to loss of vision that can progress to blindness if not treated. This paper proposed a new method for automatic cataract detection using color fundus images and d...
详细信息
ISBN:
(数字)9798331510213
ISBN:
(纸本)9798331510220
Cataracts are clouding of the lens in the eye, leading to loss of vision that can progress to blindness if not treated. This paper proposed a new method for automatic cataract detection using color fundus images and deep learning methods. A dataset of 1,105 color fundus images labeled by expert ophthalmologists was used in this process. We used seven pretrained CNNs (DenseNet121, EfficientNetB0, MobileNetV2, InceptionV3, Xception, ResNet50, VGG16, and VGG19) for feature extraction before reducing the extracted features using PCA. We used the following combination of machine learning classifiers: SVC, RF, Decision Tree, Gaussian Naive Bayes, XGBoost, K-Nearest Neighbors, and Logistic Regression. For evaluating the models' performance, we used accuracy, precision, recall, F1-score, and computational efficiency. For all metrics, MobileNetV2with Random Forest achieved perfect scores: 100% accuracy, precision, recall, and F1-score, with an average processing time of 669 ms ± 28.8 ms. Thus, it can be applied in real-time applications. EfficientNetB0 with SVC gave an average accuracy of 87.33%, with the rest of the precision and recall metrics above 86%. Then, ResNet50, VGG16, and VGG19 followed with high accuracies between the range of 89.64% to 90.50%. It systemizes the proper choice of architectures of CNNs and classifiers, making the system both accurate and computationally efficient. Future work will include augmentation of the dataset, real-time support in the clinical setting, and advanced techniques for image preprocessing, generative adversarial networks. In addition, the development of an automated annotation tool, improvement of explainable AI, will further improve the deployment of robust AI systems in early diagnosis of cataracts, enhancing the outcome for patients.
暂无评论