11,328 research outputs found
Meso-scale FDM material layout design strategies under manufacturability constraints and fracture conditions
In the manufacturability-driven design (MDD) perspective, manufacturability of the product or system is the most important of the design requirements. In addition to being able to ensure that complex designs (e.g., topology optimization) are manufacturable with a given process or process family, MDD also helps mechanical designers to take advantage of unique process-material effects generated during manufacturing. One of the most recognizable examples of this comes from the scanning-type family of additive manufacturing (AM) processes; the most notable and familiar member of this family is the fused deposition modeling (FDM) or fused filament fabrication (FFF) process. This process works by selectively depositing uniform, approximately isotropic beads or elements of molten thermoplastic material (typically structural engineering plastics) in a series of pre-specified traces to build each layer of the part. There are many interesting 2-D and 3-D mechanical design problems that can be explored by designing the layout of these elements. The resulting structured, hierarchical material (which is both manufacturable and customized layer-by-layer within the limits of the process and material) can be defined as a manufacturing process-driven structured material (MPDSM). This dissertation explores several practical methods for designing these element layouts for 2-D and 3-D meso-scale mechanical problems, focusing ultimately on design-for-fracture. Three different fracture conditions are explored: (1) cases where a crack must be prevented or stopped, (2) cases where the crack must be encouraged or accelerated, and (3) cases where cracks must grow in a simple pre-determined pattern. Several new design tools, including a mapping method for the FDM manufacturability constraints, three major literature reviews, the collection, organization, and analysis of several large (qualitative and quantitative) multi-scale datasets on the fracture behavior of FDM-processed materials, some new experimental equipment, and the refinement of a fast and simple g-code generator based on commercially-available software, were developed and refined to support the design of MPDSMs under fracture conditions. The refined design method and rules were experimentally validated using a series of case studies (involving both design and physical testing of the designs) at the end of the dissertation. Finally, a simple design guide for practicing engineers who are not experts in advanced solid mechanics nor process-tailored materials was developed from the results of this project.U of I OnlyAuthor's request
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
The Metaverse offers a second world beyond reality, where boundaries are
non-existent, and possibilities are endless through engagement and immersive
experiences using the virtual reality (VR) technology. Many disciplines can
benefit from the advancement of the Metaverse when accurately developed,
including the fields of technology, gaming, education, art, and culture.
Nevertheless, developing the Metaverse environment to its full potential is an
ambiguous task that needs proper guidance and directions. Existing surveys on
the Metaverse focus only on a specific aspect and discipline of the Metaverse
and lack a holistic view of the entire process. To this end, a more holistic,
multi-disciplinary, in-depth, and academic and industry-oriented review is
required to provide a thorough study of the Metaverse development pipeline. To
address these issues, we present in this survey a novel multi-layered pipeline
ecosystem composed of (1) the Metaverse computing, networking, communications
and hardware infrastructure, (2) environment digitization, and (3) user
interactions. For every layer, we discuss the components that detail the steps
of its development. Also, for each of these components, we examine the impact
of a set of enabling technologies and empowering domains (e.g., Artificial
Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on
its advancement. In addition, we explain the importance of these technologies
to support decentralization, interoperability, user experiences, interactions,
and monetization. Our presented study highlights the existing challenges for
each component, followed by research directions and potential solutions. To the
best of our knowledge, this survey is the most comprehensive and allows users,
scholars, and entrepreneurs to get an in-depth understanding of the Metaverse
ecosystem to find their opportunities and potentials for contribution
Multi-modal Facial Affective Analysis based on Masked Autoencoder
Human affective behavior analysis focuses on analyzing human expressions or
other behaviors to enhance the understanding of human psychology. The CVPR 2023
Competition on Affective Behavior Analysis in-the-wild (ABAW) is dedicated to
providing high-quality and large-scale Aff-wild2 for the recognition of
commonly used emotion representations, such as Action Units (AU), basic
expression categories(EXPR), and Valence-Arousal (VA). The competition is
committed to making significant strides in improving the accuracy and
practicality of affective analysis research in real-world scenarios. In this
paper, we introduce our submission to the CVPR 2023: ABAW5. Our approach
involves several key components. First, we utilize the visual information from
a Masked Autoencoder(MAE) model that has been pre-trained on a large-scale face
image dataset in a self-supervised manner. Next, we finetune the MAE encoder on
the image frames from the Aff-wild2 for AU, EXPR and VA tasks, which can be
regarded as a static and uni-modal training. Additionally, we leverage the
multi-modal and temporal information from the videos and implement a
transformer-based framework to fuse the multi-modal features. Our approach
achieves impressive results in the ABAW5 competition, with an average F1 score
of 55.49\% and 41.21\% in the AU and EXPR tracks, respectively, and an average
CCC of 0.6372 in the VA track. Our approach ranks first in the EXPR and AU
tracks, and second in the VA track. Extensive quantitative experiments and
ablation studies demonstrate the effectiveness of our proposed method
Identifizierung prädiktiver und prognostischer Biomarker in unterschiedlichen Tumorkompartimenten des ösophagealen Adenokarzinoms
Das ösophageale Adenokarzinom zeigt eine global steigende Inzidenz und hat mit einer 5-Jahres-Überlebensrate von weniger als 25% eine schlechte Prognose. Personalisierte Therapieansätze sind selten und prognostische/prädiktive Biomarker des Tumormikromilieus sind unzureichend charakterisiert. Die kumulative Promotion nähert sich dieser Problematik in drei unterschiedlichen Schwerpunkten. 1. Zur Identifizierung Kompartiment-spezifischer Biomarker wurde eine Methode entwickelt, welche als kostengünstige Alternative zum sc-Seq Expressionsprofile individueller Zelltypen generiert. Dabei erfolgt die Extraktion der RNA nicht aus Einzelzellen, sondern aus flowzytometrisch-getrennten Zellkompartimenten. Die Separation der Proben in Epithelzellen, Immunzellen und Fibroblasten wurde durch verschiedene Verfahren validiert und eine suffiziente Ausbeute an RNA auch für kleine Gewebemengen gezeigt. 2. Biomarker des Immunzellkompartiments als therapeutische Angriffspunkte wurden in einem Patientenkollektiv von bis zu 551 Patienten auf ihre Bedeutung beim EAC überprüft. Es zeigte sich eine Expression der Immuncheckpoints LAG3, VISTA und IDO auf TILs durch IHC und RNA-Sonden basierte Verfahren in einem relevanten Anteil (LAG3: 11,4%, VISTA: 29%, IDO: 52,6%). Es konnte eine prognostisch günstige Bedeutung der VISTA, LAG3 und IDO Expression gezeigt werden. Durch den Vergleich von Genexpressionsprofilen aus therapienaiven und vorbehandelten Tumoren konnte zudem ein immunsuppressiver Effekt von neoadjuvanten Therapiekonzepten auf das Tumormikromilieu des EACs gezeigt werden. Dabei kam es zur verminderten Expression von Checkpoints und Anzahl TILs nach (Radio-) Chemotherapie. 3. Im Tumorzellkompartiment wurde die Rolle von Amplifikationen in ErbB-Rezeptor abhängigen Signalwegen durch FISH-Technik und Immunhistochemie evaluiert. Es fanden sich KRAS Amplifikationen in 17,1%, PIK3CA Amplifikationen in 5% sowie eine HER2/neu-Überexpression in 14,9% der untersuchten Tumore
Recommended from our members
A novel approach for communicating with patients suffering from completely locked-in-syndrome (CLIS) via thoughts: brain computer interface system using EEG signals and artificial intelligence
This paper investigates the development of an intelligent system method to address completely locked-in-syndrome (CLIS) that is caused by some illnesses such as Amyotrophic Lateral Sclerosis (ALS) as the most predominant type of Motor Neuron Disease (MND). In the last stages of ALS and despite the limitations in body movements, patients however will have a fully functional brain and cognitive capabilities and able to feel pain but fail to communicate. This paper aims to address the CLIS problem by utilizing EEG signals that human brain generates when thinking about a specific feeling or imagination as a way to communicate. The aim is to develop a low-cost and affordable system for patients to use to communicate with carers and family members. In this paper, the novel implementation of the ASPS (Automated Sensor and Signal Processing Selection) approach for feature extraction of EEG is presented to select the most suitable Sensory Characteristic Features (SCFs) to detect human thoughts and imaginations. Artificial Neural Networks (ANN) are used to verify the results. The findings show that EEG signals are able to capture imagination information that can be used as a means of communication; and the ASPS approach allows the selection of the most important features for reliable communication. This paper explains the implementation and validation of ASPS approach in brain signal classification for bespoke arrangement. Hence, future work will present the results of relatively high number of volunteers, sensors and signal processing methods
Examples of works to practice staccato technique in clarinet instrument
Klarnetin staccato tekniğini güçlendirme aşamaları eser çalışmalarıyla uygulanmıştır. Staccato
geçişlerini hızlandıracak ritim ve nüans çalışmalarına yer verilmiştir. Çalışmanın en önemli amacı
sadece staccato çalışması değil parmak-dilin eş zamanlı uyumunun hassasiyeti üzerinde de
durulmasıdır. Staccato çalışmalarını daha verimli hale getirmek için eser çalışmasının içinde etüt
çalışmasına da yer verilmiştir. Çalışmaların üzerinde titizlikle durulması staccato çalışmasının ilham
verici etkisi ile müzikal kimliğe yeni bir boyut kazandırmıştır. Sekiz özgün eser çalışmasının her
aşaması anlatılmıştır. Her aşamanın bir sonraki performans ve tekniği güçlendirmesi esas alınmıştır.
Bu çalışmada staccato tekniğinin hangi alanlarda kullanıldığı, nasıl sonuçlar elde edildiği bilgisine
yer verilmiştir. Notaların parmak ve dil uyumu ile nasıl şekilleneceği ve nasıl bir çalışma disiplini
içinde gerçekleşeceği planlanmıştır. Kamış-nota-diyafram-parmak-dil-nüans ve disiplin
kavramlarının staccato tekniğinde ayrılmaz bir bütün olduğu saptanmıştır. Araştırmada literatür
taraması yapılarak staccato ile ilgili çalışmalar taranmıştır. Tarama sonucunda klarnet tekniğin de
kullanılan staccato eser çalışmasının az olduğu tespit edilmiştir. Metot taramasında da etüt
çalışmasının daha çok olduğu saptanmıştır. Böylelikle klarnetin staccato tekniğini hızlandırma ve
güçlendirme çalışmaları sunulmuştur. Staccato etüt çalışmaları yapılırken, araya eser çalışmasının
girmesi beyni rahatlattığı ve istekliliği daha arttırdığı gözlemlenmiştir. Staccato çalışmasını yaparken
doğru bir kamış seçimi üzerinde de durulmuştur. Staccato tekniğini doğru çalışmak için doğru bir
kamışın dil hızını arttırdığı saptanmıştır. Doğru bir kamış seçimi kamıştan rahat ses çıkmasına
bağlıdır. Kamış, dil atma gücünü vermiyorsa daha doğru bir kamış seçiminin yapılması gerekliliği
vurgulanmıştır. Staccato çalışmalarında baştan sona bir eseri yorumlamak zor olabilir. Bu açıdan
çalışma, verilen müzikal nüanslara uymanın, dil atış performansını rahatlattığını ortaya koymuştur.
Gelecek nesillere edinilen bilgi ve birikimlerin aktarılması ve geliştirici olması teşvik edilmiştir.
Çıkacak eserlerin nasıl çözüleceği, staccato tekniğinin nasıl üstesinden gelinebileceği anlatılmıştır.
Staccato tekniğinin daha kısa sürede çözüme kavuşturulması amaç edinilmiştir. Parmakların
yerlerini öğrettiğimiz kadar belleğimize de çalışmaların kaydedilmesi önemlidir. Gösterilen azmin ve
sabrın sonucu olarak ortaya çıkan yapıt başarıyı daha da yukarı seviyelere çıkaracaktır
Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review
Globally, the external Internet is increasingly being connected to the
contemporary industrial control system. As a result, there is an immediate need
to protect the network from several threats. The key infrastructure of
industrial activity may be protected from harm by using an intrusion detection
system (IDS), a preventive measure mechanism, to recognize new kinds of
dangerous threats and hostile activities. The most recent artificial
intelligence (AI) techniques used to create IDS in many kinds of industrial
control networks are examined in this study, with a particular emphasis on
IDS-based deep transfer learning (DTL). This latter can be seen as a type of
information fusion that merge, and/or adapt knowledge from multiple domains to
enhance the performance of the target task, particularly when the labeled data
in the target domain is scarce. Publications issued after 2015 were taken into
account. These selected publications were divided into three categories:
DTL-only and IDS-only are involved in the introduction and background, and
DTL-based IDS papers are involved in the core papers of this review.
Researchers will be able to have a better grasp of the current state of DTL
approaches used in IDS in many different types of networks by reading this
review paper. Other useful information, such as the datasets used, the sort of
DTL employed, the pre-trained network, IDS techniques, the evaluation metrics
including accuracy/F-score and false alarm rate (FAR), and the improvement
gained, were also covered. The algorithms, and methods used in several studies,
or illustrate deeply and clearly the principle in any DTL-based IDS subcategory
are presented to the reader
Metaphors of London fog, smoke and mist in Victorian and Edwardian Art and Literature
Julian Wolfreys has argued that after 1850 writers employed stock images of the city without allowing them to transform their texts. This thesis argues, on the contrary, that metaphorical uses of London fog were complex and subtle during the Victorian and Edwardian periods, at least until 1914. Fog represented, in particular, formlessness and the dissolution of boundaries. Examining the idea of fog in literature, verse, newspaper accounts and journal articles, as well as in the visual arts, as part of a common discourse about London and the state of its inhabitants, this thesis charts how the metaphorical appropriation of this idea changed over time. Four of Dickens's novels are used to track his use of fog as part of a discourse of the natural and unnatural in individual and society, identifying it with London in progressively more negative terms. Visual representations of fog by Constable, Turner, Whistler, Monet, Markino, O'Connor, Roberts and Wyllie and Coburn showed an increasing readiness to engage with this discourse. Social tensions in the city in the 1880s were articulated in art as well as in fiction. Authors like Hay and Barr showed the destruction of London by its fog because of its inhabitants' supposed degeneracy. As the social threat receded, apocalyptic scenarios gave way to a more optimistic view in the work of Owen and others. Henry James used fog as a metaphorical representation of the boundaries of gendered behaviour in public, and the problems faced by women who crossed them. The dissertation also examines fog and individual transgression, in novels and short stories by Lowndes, Stevenson, Conan Doyle and Joseph Conrad. After 1914, fog was no more than a crude signifier of Victorian London in literature, film and, later, television, deployed as a cliche instead of the subtle metaphorical idea discussed in this thesis
Image classification over unknown and anomalous domains
A longstanding goal in computer vision research is to develop methods that are simultaneously applicable to a broad range of prediction problems. In contrast to this, models often perform best when they are specialized to some task or data type. This thesis investigates the challenges of learning models that generalize well over multiple unknown or anomalous modes and domains in data, and presents new solutions for learning robustly in this setting.
Initial investigations focus on normalization for distributions that contain multiple sources (e.g. images in different styles like cartoons or photos). Experiments demonstrate the extent to which existing modules, batch normalization in particular, struggle with such heterogeneous data, and a new solution is proposed that can better handle data from multiple visual modes, using differing sample statistics for each.
While ideas to counter the overspecialization of models have been formulated in sub-disciplines of transfer learning, e.g. multi-domain and multi-task learning, these usually rely on the existence of meta information, such as task or domain labels. Relaxing this assumption gives rise to a new transfer learning setting, called latent domain learning in this thesis, in which training and inference are carried out over data from multiple visual domains, without domain-level annotations. Customized solutions are required for this, as the performance of standard models degrades: a new data augmentation technique that interpolates between latent domains in an unsupervised way is presented, alongside a dedicated module that sparsely accounts for hidden domains in data, without requiring domain labels to do so.
In addition, the thesis studies the problem of classifying previously unseen or anomalous modes in data, a fundamental problem in one-class learning, and anomaly detection in particular. While recent ideas have been focused on developing self-supervised solutions for the one-class setting, in this thesis new methods based on transfer learning are formulated. Extensive experimental evidence demonstrates that a transfer-based perspective benefits new problems that have recently been proposed in anomaly detection literature, in particular challenging semantic detection tasks
- …