913 resultados para Hidden layers
Resumo:
The problem of estimating pseudobearing rate information of an airborne target based on measurements from a vision sensor is considered. Novel image speed and heading angle estimators are presented that exploit image morphology, hidden Markov model (HMM) filtering, and relative entropy rate (RER) concepts to allow pseudobearing rate information to be determined before (or whilst) the target track is being estimated from vision information.
Resumo:
Semiconductor nanowires (NWs) show tremendous applications in micro/nano-electro-mechanical systems. In order to fulfill their promising applications, an understanding of the mechanical properties of NWs becomes increasingly important. Based on the large-scale molecular dynamics simulations, this work investigated the tensile properties of Si NWs with different faulted stacking layers. Different faulted stacking layers were introduced around the centre of the NW by the insertion or removal of certain stacking layers, inducing twins, intrinsic stacking fault, extrinsic stacking fault, and 9R crystal structure. Stress–strain curves obtained from the tensile deformation tests reveal that the presence of faulted stacking layers has induced a considerable decrease to the yield strength while only a minor decrease to Young's modulus. The brittle fracture phenomenon is observed for all tested NWs. In particular, the formation of a monatomic chain is observed for the perfect NW, which exists for a relatively wide strain range. For the defected NW, the monatomic chain appears and lasts shorter. Additionally, all defected NWs show a fracture area near the two ends, in contrast to the perfect NW whose fracture area is adjacent to the middle. This study provides a better understanding of the mechanical properties of Si NWs with the presence of different faulted stacking layers.
Resumo:
Faulted stacking layers are ubiquitously observed during the crystal growth of semiconducting nanowires (NWs). In this paper, we employ the reverse non-equilibrium molecular dynamics simulation to elucidate the effect of various faulted stacking layers on the thermal conductivity (TC) of silicon (Si) NWs. We find that the stacking faults can greatly reduce the TC of the Si NW. Among the different stacking faults that are parallel to the NW's axis, the 9R polytype structure, the intrinsic and extrinsic stacking faults (iSFs and eSFs) exert more pronounced effects in the reduction of TC than the twin boundary (TB). However, for the perpendicularly aligned faulted stacking layers, the eSFs and 9R polytype structures are observed to induce a larger reduction to the TC of the NW than the TB and iSFs. For all considered NWs, the TC does not show a strong relation with the increasing number of faulted stacking layers. Our studies suggest the possibility of tuning the thermal properties of Si NWs by altering the crystal structure via the different faulted stacking layers.
Resumo:
Twitter is used for a range of communicative purposes. These extend from personal tweets that address what used to be Twitter’s default question, “What’s happening?”, through one-on-one @reply conversations between close friends and attempts at getting the attention of celebrities and other public actors, to discussions in communities built around specific issues—and back again to broadcast-style statements from well-known individuals and brands to their potentially very large retinue of followers.
Resumo:
As planners work to create more sustainable and liveable urban environments, a priority is to transition away from prioritising the automobile and towards enhancing the pedestrian experience. Thus, this research explores the experience of pedestrian accessibility in inner-urban higher-density Brisbane in Australia, drawing on findings from semi-structured in-depth interviews with 24 residents and over 100 hours of public place observations in three case-study neighbourhoods. The interviews took place in residents homes and explored their experience of higher density living and their neighbourhood, whilst observations were recorded through a combination of methods including photographs, sketch maps, recordings and field journals. Observation locations included retail and commercial space, roads, parkland and open space, with multiple observations at each location. A thematic analysis identified common themes in both interviews and the observations, with this paper focusing on residents’ lived experience in urban built environments. This analysis revealed that pedestrian accessibility is linked to access to local amenities and direct routes, aesthetics, sense of community, ownership of space and safety. In particular, observations revealed how pedestrian accessibility and route-taking works with, against or in spite of the design features of urban environments, as well as the importance of the social use of the built environment. Residents spoke about although walking quick and preferred for local amenities, the decision to walk was moderated by factors such as time of day and perceived safety. Measures to ensure and improve the pedestrian accessibility of urban areas needs to take into account the propensity for people to prefer and improvise direct routes (often to the detriment of traffic safety considerations), the importance of ongoing maintenance and upgrading of walking infrastructure and the importance of aesthetically pleasing and safe walking environments. By combining interviews and observations, this research highlights the current dominance of the automobile culture in Brisbane and the layers of meaning, experiences and complexity hidden within the pedestrian experience.
Resumo:
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access keys and tokens in a connected world. Although many existing solutions can be employed to protect a long secret using a short password, those solutions typically require certain assumptions on the distribution of the secret and/or the password, and are helpful against only a subset of the possible attackers. After briefly reviewing a variety of approaches, we propose a user-centric comprehensive model to capture the possible threats posed by online and offline attackers, from the outside and the inside, against the security of both the plaintext and the password. We then propose a few very simple protocols, adapted from the Ford-Kaliski server-assisted password generator and the Boldyreva unique blind signature in particular, that provide the best protection against all kinds of threats, for all distributions of secrets. We also quantify the concrete security of our approach in terms of online and offline password guesses made by outsiders and insiders, in the random-oracle model. The main contribution of this paper lies not in the technical novelty of the proposed solution, but in the identification of the problem and its model. Our results have an immediate and practical application for the real world: they show how to implement single-sign-on stateless roaming authentication for the internet, in a ad-hoc user-driven fashion that requires no change to protocols or infrastructure.
Resumo:
In this paper, we propose a new steganalytic method to detect the message hidden in a black and white image using the steganographic technique developed by Liang, Wang and Zhang. Our detection method estimates the length of hidden message embedded in a binary image. Although the hidden message embedded is visually imperceptible, it changes some image statistic (such as inter-pixels correlation). Based on this observation, we first derive the 512 patterns histogram from the boundary pixels as the distinguishing statistic, then we compute the histogram difference to determine the changes of the 512 patterns histogram induced by the embedding operation. Finally we propose histogram quotient to estimate the length of the embedded message. Experimental results confirm that the proposed method can effectively and reliably detect the length of the embedded message.
Resumo:
Process models define allowed process execution scenarios. The models are usually depicted as directed graphs, with gateway nodes regulating the control flow routing logic and with edges specifying the execution order constraints between tasks. While arbitrarily structured control flow patterns in process models complicate model analysis, they also permit creativity and full expressiveness when capturing non-trivial process scenarios. This paper gives a classification of arbitrarily structured process models based on the hierarchical process model decomposition technique. We identify a structural class of models consisting of block structured patterns which, when combined, define complex execution scenarios spanning across the individual patterns. We show that complex behavior can be localized by examining structural relations of loops in hidden unstructured regions of control flow. The correctness of the behavior of process models within these regions can be validated in linear time. These observations allow us to suggest techniques for transforming hidden unstructured regions into block-structured ones.
Resumo:
This paper reports on the findings of an international telecollaboration study using Facebook, in which teachers studying in M. Ed programs in Australia and Greece, discussed the use of mobile phones in language classrooms. Results suggest that invisible barriers exist in the use of mobile phones in the classroom, including bans on use in schools, lack of familiarity with educational uses for mobile phones, and negative perceptions about mobile phones specifically in terms of classroom management.
Resumo:
The term ‘two cultures’ was coined more than 50 years ago by scientist and novelist C.P. Snow to describe the divergence in the world views and methods of scientists and the creative sector. This divergence has meant that innovation systems and policies have focused for decades on science, engineering, technology and medicine and the industries that depend on them. The humanities, arts and social sciences have been bit players at best; their contributions hidden from research agendas, policy and program initiatives, and the public mind. But structural changes to advanced economies and societies have brought services industries and the creative sector to greater prominence as key contributors to innovation. Hidden Innovation peels back the veil, tracing the way innovation occurs through new forms of screen production enabled by social media platforms as well as in public broadcasting. It shows that creative workers are contributing fresh ideas across the economy and how creative cities debates need reframing. It traces how policies globally are beginning to catch up with the changing social and economic realities. In his new book, Cunningham argues that the innovation framework offers the best opportunity in decades to reassess and refresh the case for the public role of the humanities, particularly the media, cultural and communication studies disciplines.
Resumo:
This paper investigates compressed sensing using hidden Markov models (HMMs) and hence provides an extension of recent single frame, bounded error sparse decoding problems into a class of sparse estimation problems containing both temporal evolution and stochastic aspects. This paper presents two optimal estimators for compressed HMMs. The impact of measurement compression on HMM filtering performance is experimentally examined in the context of an important image based aircraft target tracking application. Surprisingly, tracking of dim small-sized targets (as small as 5-10 pixels, with local detectability/SNR as low as − 1.05 dB) was only mildly impacted by compressed sensing down to 15% of original image size.
Resumo:
In this paper, a novel data-driven approach to monitoring of systems operating under variable operating conditions is described. The method is based on characterizing the degradation process via a set of operation-specific hidden Markov models (HMMs), whose hidden states represent the unobservable degradation states of the monitored system while its observable symbols represent the sensor readings. Using the HMM framework, modeling, identification and monitoring methods are detailed that allow one to identify a HMM of degradation for each operation from mixed-operation data and perform operation-specific monitoring of the system. Using a large data set provided by a major manufacturer, the new methods are applied to a semiconductor manufacturing process running multiple operations in a production environment.
Resumo:
For Design Science Research (DSR) to gain wide credence as a research paradigm in Information Systems (IS), it must contribute to theory. “Theory cannot be improved until we improve the theorizing process, and we cannot improve the theorizing process until we describe it more explicitly, operate it more self-consciously, and decouple it from validation more deliberately” (Weick 1989, p. 516). With the aim of improved design science theorizing, we propose a DSR abstraction-layers framework that integrates, interlates, and harmonizes key methodological notions, primary of which are: 1) the Design Science (DS), Design Research (DR), and Routine Design (RD) distinction (Winter 2008); 2) Multi Grounding in IS Design Theory (ISDT) (Goldkuhl & Lind 2010); 3) the Idealized Model for Theory Development (IM4TD) (Fischer & Gregor 2011); and 4) the DSR Theorizing Framework (Lee et al. 2011). Though theorizing, or the abstraction process, has been the subject of healthy discussion in DSR, important questions remain. With most attention to date having focused on theorizing for Design Research (DR), a key stimulus of the layered view was the realization that Design Science (DS) produces abstract knowledge at a higher level of generality. The resultant framework includes four abstraction layers: (i) Design Research (DR) 1st Abstract Layer, (ii) Design Science (DS) 2nd Abstract Layer, (iii) DSR Incubation 3rd Layer, and (iv) Routine Design 4th Layer. Differentiating and inter-relating these layers will aid DSR researchers to discover, position, and amplify their DSR contributions. Additionally, consideration of the four layers can trigger creative perspectives that suggest unplanned outputs. The first abstraction layer, including its alternative patterns of activity, is well recognized in the literature. The other layers, however, are less well recognized; and the integrated representation of layers is novel.
Resumo:
As printed and flexible plastic electronic gadgets become increasingly viable today, there is a need to develop materials that suit the fabrication processes involved. Two desirable requirements are solution-processable active materials or precursors and low-temperature processability. In this article, we describe a straightforward method of depositing ZnO films by simple spin coating of an organometallic diethylzinc precursor solution and annealing the resulting film at low temperatures (≤200 °C) without involving any synthetic steps. By controlling the humidity in which annealing is conducted, we are able to adjust the intrinsic doping level and carrier concentration in diethylzinc-derived ZnO. Doped or conducting transport layers are greatly preferable to undoped layers as they enable low-resistance contacts and minimize the potential drops. This ability to controllably realize doped ZnO is a key feature of the fabrication process that we describe in this article. We employ field-effect measurements as a diagnostic tool to measure doping levels and mobilities in ZnO and demonstrate that doped ZnO with high charge carrier concentration is ideal for solar cell applications. Respectable power conversion efficiencies (up to 4.5%) are achieved in inverted solar cells that incorporate diethylzinc-derived ZnO films as the electron transport layer and organic blends as the active material. Extensions of this approach to grow ternary and quaternary films with organometallic precursor chemicals will enable solution based growth of a number of semiconductor films as well as a method to dope them.
Resumo:
“Guardians of Hidden Universes” is a playful story for experiencing on your phone in the street. You’re a Guardian of Hidden Universes, and when you check your Communication Terminal you find the Guild has made a terrible mistake they need you to repair. The experience lasts about 15-25 minutes, and takes you around whatever city you happen to be in. That’s right – you can play it in any city in the world! The app was launched at Popup Playground‘s 2013 Fresh Air Festival – a new pervasive gaming festival in Melbourne, Australia. This playful story is inspired by the idea of creating a locative-experience that is not site-specific. How can we have an experience than engages with the environment that also can work worldwide? The story is also playing with the idea of engaging with a character and a space and intuition within a short period of time. The short and playful experience is a Universe Creation 101 production. It was conceived, written, and designed by Christy Dena; with artwork, coding, and interface design by Elroy.