Navigating the complex legal and regulatory landscape requires a sophisticated platform that is not only comprehensive but also user-friendly and enables seamless analysis and document comparison in the legal realm. T...
详细信息
Germanium selenide (GeSe) is a highly promising material with several attractive characteristics, particularly in the field of ferroelectric and phase-change memories due to its outstanding electronic behavior. Howeve...
Germanium selenide (GeSe) is a highly promising material with several attractive characteristics, particularly in the field of ferroelectric and phase-change memories due to its outstanding electronic behavior. However, the potential of GeSe as a charge-trapping layer in flash memory has received less attention. Herein, the fabrication of a nonvolatile MOS memory device using GeSe nanosheets as a charge-trapping layer was demonstrated and the materials flakes were examined extensively. The electrical performance of the memory device was investigated. Intriguingly, it exhibited an extraordinarily wide memory window of 9 V under ±10 V electrical biasing. Additionally, the devices presented high endurance of $10^{4}$ programming and erasing cycles, and reliable charge storage of only 56% loss after 10 years.
This study introduced a capacitive sensing interactive game platform aimed at promoting emotional stability, which we have named the 'Sunrise and Sunset' game. This game primarily consists of two pieces of reg...
详细信息
This paper presents a novel algorithm for reachability analysis of nonlinear discrete-time systems. The proposed method combines constrained zonotopes (CZs) with polyhedral relaxations of factorable representations of...
详细信息
Reduction of active power losses in distribution networks is an important issue, which is usually addressed through a separate, sequential, or simultaneous feeder reconfiguration (FR), volt-var regulation (e.g., capac...
详细信息
The rising occurrence and notable public health consequences of skin cancer, especially of the most challenging form known as melanoma, have created an urgent demand for more advanced approaches to disease management....
详细信息
This work compares illumination and communication performance of 2 × 2, 3 × 2 and 4 × 2 MIMO-OFDM VLC links. Results show that not every configuration complies with the recommended illumination levels (...
详细信息
ISBN:
(数字)9798350388176
ISBN:
(纸本)9798350388183
This work compares illumination and communication performance of 2 × 2, 3 × 2 and 4 × 2 MIMO-OFDM VLC links. Results show that not every configuration complies with the recommended illumination levels (≥300 Ix) for operation in indoor environments.
In recent years, several industries have increased their demand for processing precision, automatic detection, and visualization interfaces. Therefore, to keep pace with the fourth industrial revolution, machine tool ...
详细信息
In recent years, several industries have increased their demand for processing precision, automatic detection, and visualization interfaces. Therefore, to keep pace with the fourth industrial revolution, machine tool operators install a large number of sensors on machine tools to obtain more precise physical quantities during processing and use a variety of sensors to obtain measurements in various situations. However, these additional sensors on machine tools result in complicated wire layouts, which exhibit negative effects on processing. Such problems lead to the birth of wireless data transmission, which is expected to become the new standard in the future. At present, there is more and more interactive integration between relevant embedded system and the machine tool, which allows information communication between each other in the wireless domain. However, generally, the majority of machine tool operators focus on optimizing the sensing conditions during processing, but they disregard the importance of information security. In the current era of the Internet of Things (IoT), information security is regarded as a crucial factor. For the wireless communication between the IoT equipment for each machine in the machining field, the transmitted data are almost exposed within public space directly due to the loss in constraint and protection of physical wiring. Therefore, such a process can easily be intercepted by other devices that capture information on relevant status of the machine or command messages received by the controller, where intentional individual may possibly control the operating mechanism and progress of entire plant. This leads to theft of relevant secrets in manufacturing technology for the subject company, or intentional shutdown, machine damage, and vicious blackmailing attacks. Therefore, introducing the mechanism of safety protection during wireless signal transmission is an inevitable technology to maintain the company interests and also the
Counterfactuals, or modified inputs that lead to a different outcome, are an important tool for understanding the logic used by machine learning classifiers and how to change an undesirable classification. Even if a c...
Counterfactuals, or modified inputs that lead to a different outcome, are an important tool for understanding the logic used by machine learning classifiers and how to change an undesirable classification. Even if a counterfactual changes a classifier's decision, however, it may not affect the true underlying class probabilities, i.e. the counterfactual may act like an adversarial attack and "fool" the classifier. We propose a new framework for creating modified inputs that change the true underlying probabilities in a beneficial way which we call Trustworthy Actionable Perturbations (TAP). This includes a novel verification procedure to ensure that TAP change the true class probabilities instead of acting adversarially. Our framework also includes new cost, reward, and goal definitions that are better suited to effectuating change in the real world. We present PAC-learnability results for our verification procedure and theoretically analyze our new method for measuring reward. We also develop a methodology for creating TAP and compare our results to those achieved by previous counterfactual methods.
The diagnosis of faults in grid-connected photovoltaic (GCPV) systems is a challenging task due to their complex nature and the high similarity between faults. To address this issue, we propose a wrapper approach call...
详细信息
暂无评论