Organic solar cells(OSCs),particularly made based on solution processing methods,have made significant progress over the past decades through the concurrent evolution of organic photovoltaic materials and device ***,h...
详细信息
Organic solar cells(OSCs),particularly made based on solution processing methods,have made significant progress over the past decades through the concurrent evolution of organic photovoltaic materials and device ***,high power conversion efficiencies around 18%and over 16%have been demonstrated in both rigid and flexible OSCs,*** most of the OSC research has centered on efficiency and cost,their emerging and potential usages in many critical applications,particularly in biomedical fields have been *** this mini-review,we will briefly discuss the high-performance organic photovoltaic materials and the representative flexible OSCs to give a scope on the recent rapid development of ***,we will review some progress on the applications of OSCs in biomedical devices and integrated *** potential challenges associated with integrating OSCs for biomedical devices will be put forward.
False data injection attacks (FDIAs) on smart power grids’ measurement data present a threat to system stability. When malicious entities launch cyberattacks to manipulate the measurement data, different grid compone...
详细信息
False data injection attacks (FDIAs) on smart power grids’ measurement data present a threat to system stability. When malicious entities launch cyberattacks to manipulate the measurement data, different grid components will be affected, which leads to failures. For effective attack mitigation, two tasks are required: determining the status of the system (normal operation/under attack) and localizing the attacked bus/power substation. Existing mitigation techniques carry out these tasks separately and offer limited detection performance. In this paper, we propose a multi-task learning-based approach that performs both tasks simultaneously using a graph neural network (GNN) with stacked convolutional Chebyshev graph layers. Our results show that the proposed model presents superior system status identification and attack localization abilities with detection rates of 98.5−100% and 99 − 100%, respectively, presenting improvements of 5 − 30% compared to benchmarks.
Training agents that are robust to environmental changes remains a significant challenge in deep reinforcement learning (RL). Unsupervised environment design (UED) has recently emerged to address this issue by generat...
详细信息
This work proposes a nonlinear model predictive control (NMPC) strategy for robot navigation in cluttered unknown environments using polynomial zonotopes. The information provided by a laser sensor is used in the comp...
This work proposes a nonlinear model predictive control (NMPC) strategy for robot navigation in cluttered unknown environments using polynomial zonotopes. The information provided by a laser sensor is used in the computation of the collision-free area. The procedure splits the area into convex subregions which are converted into polynomial zonotopes (PZs) to generate constraints for the NMPC optimal control problem. The PZ is a set representation that can describe polytopes using fewer constraints than conventional half-space representations, thus being more efficient while maintaining the accuracy equivalent to the polytopic case. Numerical experiments demonstrate the advantages of the proposed strategy.
Video Frame Interpolation (VFI) aims to synthesize intermediate frames between existing frames to enhance visual smoothness and quality. Beyond the conventional methods based on the reconstruction loss, recent works h...
详细信息
Multimodal large language models (MLLMs) excel at generating highly detailed captions but often produce hallucinations. Our analysis reveals that existing hallucination detection methods struggle with detailed caption...
详细信息
Does the SARS-CoV-2 virus cause patients' chest X-Rays ground-glass opacities? Does an IDH-mutation cause differences in patients' MRI images? Conventional causal discovery algorithms, although well developed ...
详细信息
In the realm of autonomous agents, ensuring safety and reliability in complex and dynamic environments remains a paramount challenge. Safe reinforcement learning addresses these concerns by introducing safety constrai...
详细信息
ISBN:
(数字)9798350377705
ISBN:
(纸本)9798350377712
In the realm of autonomous agents, ensuring safety and reliability in complex and dynamic environments remains a paramount challenge. Safe reinforcement learning addresses these concerns by introducing safety constraints, but still faces challenges in navigating intricate environments such as complex driving situations. To overcome these challenges, we present the safe constraint reward (Safe CoR) framework, a novel method that utilizes two types of expert demonstrations—reward expert demonstrations focusing on performance optimization and safe expert demonstrations prioritizing safety. By exploiting a constraint reward (CoR), our framework guides the agent to balance performance goals of reward sum with safety constraints. We test the proposed framework in diverse environments, including the safety gym, metadrive, and the real-world Jackal platform. Our proposed framework improves algorithm performance by 39% and reduces constraint violations by 88% on the real-world Jackal platform, highlighting its effectiveness. Through this innovative approach, we expect significant advancements in real-world performance, leading to transformative effects in the realm of safe and reliable autonomous agents.
We present Reusable Motion prior (ReMP), an effective motion prior that can accurately track the temporal evolution of motion in various downstream tasks. Inspired by the success of foundation models, we argue that a ...
详细信息
Computed tomography is a widely used imaging modality with applications ranging from medical imaging to material analysis. One major challenge arises from the lack of scanning information at certain angles, leading to...
详细信息
暂无评论