100 research outputs found

    Facilitating Self-monitored Physical Rehabilitation with Virtual Reality and Haptic feedback

    Full text link
    Physical rehabilitation is essential to recovery from joint replacement operations. As a representation, total knee arthroplasty (TKA) requires patients to conduct intensive physical exercises to regain the knee's range of motion and muscle strength. However, current joint replacement physical rehabilitation methods rely highly on therapists for supervision, and existing computer-assisted systems lack consideration for enabling self-monitoring, making at-home physical rehabilitation difficult. In this paper, we investigated design recommendations that would enable self-monitored rehabilitation through clinical observations and focus group interviews with doctors and therapists. With this knowledge, we further explored Virtual Reality(VR)-based visual presentation and supplemental haptic motion guidance features in our implementation VReHab, a self-monitored and multimodal physical rehabilitation system with VR and vibrotactile and pneumatic feedback in a TKA rehabilitation context. We found that the third point of view real-time reconstructed motion on a virtual avatar overlaid with the target pose effectively provides motion awareness and guidance while haptic feedback helps enhance users' motion accuracy and stability. Finally, we implemented \systemname to facilitate self-monitored post-operative exercises and validated its effectiveness through a clinical study with 10 patients

    Ghost in the Minecraft: Generally Capable Agents for Open-World Enviroments via Large Language Models with Text-based Knowledge and Memory

    Full text link
    The captivating realm of Minecraft has attracted substantial research interest in recent years, serving as a rich platform for developing intelligent agents capable of functioning in open-world environments. However, the current research landscape predominantly focuses on specific objectives, such as the popular "ObtainDiamond" task, and has not yet shown effective generalization to a broader spectrum of tasks. Furthermore, the current leading success rate for the "ObtainDiamond" task stands at around 20%, highlighting the limitations of Reinforcement Learning (RL) based controllers used in existing methods. To tackle these challenges, we introduce Ghost in the Minecraft (GITM), a novel framework integrates Large Language Models (LLMs) with text-based knowledge and memory, aiming to create Generally Capable Agents (GCAs) in Minecraft. These agents, equipped with the logic and common sense capabilities of LLMs, can skillfully navigate complex, sparse-reward environments with text-based interactions. We develop a set of structured actions and leverage LLMs to generate action plans for the agents to execute. The resulting LLM-based agent markedly surpasses previous methods, achieving a remarkable improvement of +47.5% in success rate on the "ObtainDiamond" task, demonstrating superior robustness compared to traditional RL-based controllers. Notably, our agent is the first to procure all items in the Minecraft Overworld technology tree, demonstrating its extensive capabilities. GITM does not need any GPU for training, but a single CPU node with 32 CPU cores is enough. This research shows the potential of LLMs in developing capable agents for handling long-horizon, complex tasks and adapting to uncertainties in open-world environments. See the project website at https://github.com/OpenGVLab/GITM

    Two-phase exhumation along major shear zones in the SE Tibetan Plateau in the late Cenozoic

    Get PDF
    Three continent-scale shear zones are arguably the most outstanding structural features in the southeastern Tibetan Plateau, and therefore, their tectonic and landscape evolution have significant implications for understanding the history and mechanisms of intracontinental mountain building and plateau growth. This study presents low-temperature thermochronology from the Gaoligong and Chongshan shear zones (GLSZ and CSSZ) and quantitative analyses of fluvial longitudinal profiles of tributaries in the Salween drainage, which lies between the shear zones. Apatite and zircon (U-Th)/He data reveal a two-stage exhumation history for both shear zones: rapid and prominent cooling in the middle Miocene followed by a second, lower magnitude cooling event in the late Miocene to early Pliocene. Ductile transpressional shearing is inferred to have caused the first cooling, continuing until ~11\ua0Ma. The northward migration of the tectonic events along the Mogok metamorphic belt and GLSZ and synchronous dextral displacement along the Jiali fault indicate the dominant role of the north advancing eastern Himalayan syntaxis on the surrounding structures. Increased river incision is identified in the middle Salween drainage, leading to two-segment river profiles and further exhumation along the GLSZ and CSSZ. The tributary transient response could result from temporal changes in uplift or adjustments of the trunk channel to climatic change. Furthermore, glaciers play an important role in shaping the landscape of the upper reaches of catchments in the northern segment of the shear zones. Different drivers for the two exhumation events may reflect distinct stages of plateau growth characterized by different crustal deformation patterns

    Automated vulnerability discovery and exploitation in the internet of things

    Get PDF
    Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiveness at discovering vulnerabilities capable of compromising IoT systems. To address this, we propose an Automated Vulnerability Discovery and Exploitation framework with a Scheduling strategy, AutoDES that aims to improve the efficiency and effectiveness of vulnerability discovery and exploitation. In the vulnerability discovery stage, we use our Anti-Driller technique to mitigate the “path explosion” problem. This approach first generates a specific input proceeding from symbolic execution based on a Control Flow Graph (CFG). It then leverages a mutation-based fuzzer to find vulnerabilities while avoiding invalid mutations. In the vulnerability exploitation stage, we analyze the characteristics of vulnerabilities and then propose to generate exploits, via the use of several proposed attack techniques that can produce a shell based on the detected vulnerabilities. We also propose a genetic algorithm (GA)-based scheduling strategy (AutoS) that helps with assigning the computing resources dynamically and efficiently. The extensive experimental results on the RHG 2018 challenge dataset and the BCTF-RHG 2019 challenge dataset clearly demonstrate the effectiveness and efficiency of the proposed framework

    Insights into the evolution of the Hindu Kush-Kohistan-Karakoram from modern river sand detrital geo- and thermochronological studies

    Get PDF
    The Hindu Kush-Kohistan-Karakoram region is critical to understanding the long-term accretion history of the south Asian margin pre- and post-India-Asia collision and the impact of these collisions on the development of high topography. However, knowledge about this region remains incomplete due to sparse studies. Here, we present a study comprising detrital zircon U-Pb geochronology, detrital muscovite 40Ar/39Ar thermochronology, and numerical modeling on 40Ar/39Ar dates. The study identifies zircon U-Pb age peaks at 200 Ma, 110–130 Ma, 60–80 Ma, and 28–40 Ma, supporting the polyphase collisions and crustal growth in the south Asian margin. Modeling study reveals fast cooling/erosion at 115–129 Ma, 69–71 Ma, 27–35 Ma, and <8 Ma, which are synchronous with collision related crustal growth, indicating the significant impact of accretion both prior to and post India-Asia collision. This study, along with studies in eastern Karakoram, reveals along-strike variations in erosion and exhumation with young (since late Miocene) intense erosion focusing on the east-central Karakoram. We suggest that this east-west spatial variation in exhumation may have been associated with more intense crustal shortening, and thus the greater crustal thickness, topographic relief and altitude observed in the eastern, compared to western, Karakoram

    Late Cretaceous–earliest Paleogene deformation in the Longmen Shan fold-and-thrust belt, eastern Tibetan Plateau margin: pre-Cenozoic thickened crust?

    Get PDF
    This study presents structural and 40Ar/39Ar geochronological data from the southern part of the Longmen Shan fold-and-thrust belt that forms the eastern margin of the Tibetan Plateau. Investigations focused on hinterland ductile top-to-the-WNW shear deformation, which has been linked previously to late Cenozoic lower crustal flow. Consistent with previous studies, the sense of deformation is mapped as top-to-the-WNW in the Longmen Shan hinterland. The timing of the deformation is constrained by 40Ar/39Ar geochronological data of recrystallized minerals aligned along the shear foliation as Late Cretaceous–earliest Paleogene, thus predating the inferred late Cenozoic crustal flow. This deformation is contemporaneous with SE verging thrusting and loading along the Longmen Shan front, which formed a coeval ~2–3 km thick foredeep sequence along the southwestern margin of the Sichuan Basin. In the context of the regional geology, this tectonic configuration could result from either extrusion of a crustal wedge or back thrust in a duplex. Compared to other orogens, where similar crustal configurations have been reported, it is speculated that the eastern Tibetan Plateau margin acquired thickened crust and highly elevated topography in Late Cretaceous–earliest Paleogene time

    Identification of Amino Acids in HA and PB2 Critical for the Transmission of H5N1 Avian Influenza Viruses in a Mammalian Host

    Get PDF
    Since 2003, H5N1 influenza viruses have caused over 400 known cases of human infection with a mortality rate greater than 60%. Most of these cases resulted from direct contact with virus-contaminated poultry or poultry products. Although only limited human-to-human transmission has been reported to date, it is feared that efficient human-to-human transmission of H5N1 viruses has the potential to cause a pandemic of disastrous proportions. The genetic basis for H5N1 viral transmission among humans is largely unknown. In this study, we used guinea pigs as a mammalian model to study the transmission of six different H5N1 avian influenza viruses. We found that two viruses, A/duck/Guangxi/35/2001 (DKGX/35) and A/bar-headed goose/Qinghai/3/2005(BHGQH/05), were transmitted from inoculated animals to naïve contact animals. Our mutagenesis analysis revealed that the amino acid asparagine (Asn) at position 701 in the PB2 protein was a prerequisite for DKGX/35 transmission in guinea pigs. In addition, an amino acid change in the hemagglutinin (HA) protein (Thr160Ala), resulting in the loss of glycosylation at 158–160, was responsible for HA binding to sialylated glycans and was critical for H5N1 virus transmission in guinea pigs. These amino acids changes in PB2 and HA could serve as important molecular markers for assessing the pandemic potential of H5N1 field isolates
    corecore