This paper aims to study the leader-following consensus of linear multi-agent systems on undirected graphs.Specifically,we construct an adaptive event-based protocol that can be implemented in a fully distributed way ...This paper aims to study the leader-following consensus of linear multi-agent systems on undirected graphs.Specifically,we construct an adaptive event-based protocol that can be implemented in a fully distributed way by using only local relative information.This protocol is also resource-friendly as it will be updated only when the agent violates the designed event-triggering function.A sufficient condition is proposed for the leader-following consensus of linear multi-agent systems based on the Lyapunov approach,and the Zeno-behavior is excluded.Finally,two numerical examples are provided to illustrate the effectiveness of the theoretical results.展开更多
This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysi...This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysis,software design analysis,and simulation analysis,all supported by data fusion technology.Hopefully,this analysis can provide some reference for the rational application of data fusion technology to meet the actual design and application requirements of the system.展开更多
Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on ...Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on over 24,000 h of observations of marmot colonies and asked whether variation in the rate that yellow-bellied marmots(Marmota faviventer)alarm called was associated with the probability of summer mortality,a proxy for predation.Using a generalized mixed model that controlled for factors that infuenced the likelihood of survival,we found that marmots who called at higher rates were substantially more likely to die over the summer.Because virtually all summer mortality is due to predation,these results suggest that calling is indeed costly for marmots.Additionally,the results from a Cox survival analysis showed that marmots that called more lived signifcantly shorter lives.Prior studies have shown that marmots reduce the risk by emitting calls only when close to their burrows,but this newly quantifed survival cost suggests a constraint on eliminating risks.Quantifying the cost of alarm calling using a similar approach in other systems will help us better understand its true costs,which is an essential value for theoretical models of calling and social behavior.展开更多
Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been exten...Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been extensively studied in adult birds, nestlings—lacking direct predation experience and heterospecific alarm exposure—represent an ideal system to investigate the response to interspecific warning cues. This study explored the recognition capabilities of 5–6-day-old nestlings in Oriental Reed Warbler (Acrocephalus orientalis), a common host of the Common Cuckoo (Cuculus canorus). We exposed the nestlings to playbacks of alarm calls directed at parasites and raptors from conspecific, Vinous-throated Parrotbill (Sinosuthora webbiana, sympatric species), Isabelline Shrike (Lanius isabellinus, allopatric species) and Common Tailorbird (Orthotomus sutorius, allopatric species) adults. Results indicated that there was no significant difference in the responses of nestlings to the alarm calls of conspecific and allopatric adults directed at cuckoos and sparrowhawks. In addition, interestingly, nestlings significantly reduced their begging in response to conspecific and unfamiliar allopatric Isabelline Shrike and Common Tailorbird alarm calls but exhibited a weak response to the sympatric Vinous-throated Parrotbill. Whether older warbler nestlings with more social experience exhibit stronger responses to the alarm calls of Vinous-throated Parrotbill adults requires further investigation.展开更多
Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of ot...Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of other species.Vocal mimicry,displayed by many bird species,aids defense against predators and may help brood parasites during parasitism.In the coevolutionary dynamics between brood parasites,such as the common cuckoo(Cuculus canorus),and their hosts,female cuckoo vocalizations can induce hosts to leave the nest,increasing the probability of successful parasitism and reducing the risk of host attacks.Such cuckoo calls were thought to mimic those of the sparrowhawk.However,owing to their similarity to alarm calls,we propose a new hypothesis:Female cuckoos cheat their hosts by mimicking the parameters of the host alarm call.In this study,we tested this new hypothesis and the sparrowhawk mimicry hypothesis simultaneously by manipulating the syllable rate in male and female common cuckoo vocalizations and playing them in front of the host Oriental reed warbler(Acrocephalus orientalis)for examination.The results indicate that similar to a normal female cuckoo call,a female call with a reduced syllable rate prompted the hosts to leave their nests more frequently and rapidly than male cuckoo calls.Additionally,the male cuckoo calls with increased syllable rate did not prompt the host to leave their nests more frequently or quickly compared with the male cuckoo calls with a normal syllable rate.Our results further confrm that female common cuckoos mimic the vocalizations of Eurasian sparrowhawks(Accipiter nisus),reveal the function mechanisms underlying such mimicry,and support the theory of imperfect mimicry.展开更多
The rise of the Internet and identity authentication systems has brought convenience to people's lives but has also introduced the potential risk of privacy leaks.Existing biometric authentication systems based on...The rise of the Internet and identity authentication systems has brought convenience to people's lives but has also introduced the potential risk of privacy leaks.Existing biometric authentication systems based on explicit and static features bear the risk of being attacked by mimicked data.This work proposes a highly efficient biometric authentication system based on transient eye blink signals that are precisely captured by a neuromorphic vision sensor with microsecond-level temporal resolution.The neuromorphic vision sensor only transmits the local pixel-level changes induced by the eye blinks when they occur,which leads to advantageous characteristics such as an ultra-low latency response.We first propose a set of effective biometric features describing the motion,speed,energy and frequency signal of eye blinks based on the microsecond temporal resolution of event densities.We then train the ensemble model and non-ensemble model with our Neuro Biometric dataset for biometrics authentication.The experiments show that our system is able to identify and verify the subjects with the ensemble model at an accuracy of 0.948 and with the non-ensemble model at an accuracy of 0.925.The low false positive rates(about 0.002)and the highly dynamic features are not only hard to reproduce but also avoid recording visible characteristics of a user's appearance.The proposed system sheds light on a new path towards safer authentication using neuromorphic vision sensors.展开更多
In recent years, theoretical and practical research on event-based communication strategies has gained considerable research attention due primarily to their irreplaceable superiority in resource-constrained systems(...In recent years, theoretical and practical research on event-based communication strategies has gained considerable research attention due primarily to their irreplaceable superiority in resource-constrained systems(especially networked systems). For networked systems, event-based transmission scheme is capable of improving the efficiency in resource utilization and prolonging the lifetime of the network components compared with the widely adopted periodic transmission scheme. As such, it would be interesting to 1) examining how the event-triggering mechanisms affect the control or filtering performance for networked systems, and 2) developing some suitable approaches for the controller and filter design problems. In this paper, a bibliographical review is presented on event-based control and filtering problems for various networked systems. First, the event-driven communication scheme is introduced in detail according to its engineering background, characteristic, and representative research frameworks. Then, different event-based control and filtering(or state estimation) problems are categorized and then discussed. Finally, we conclude the paper by outlining future research challenges for event-based networked systems.展开更多
Estimating the global state of a networked system is an important problem in many application domains.The classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it ...Estimating the global state of a networked system is an important problem in many application domains.The classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it often observes states at a very high frequency.This inefficiency has motivated the idea of event-based method,which leverages the evolution dynamics in question and makes observations only when some rules are triggered(i.e.,only when certain conditions hold).This paper initiates the investigation of using the event-based method to estimate the equilibrium in the new application domain of cybersecurity,where equilibrium is an important metric that has no closed-form solutions.More specifically,the paper presents an event-based method for estimating cybersecurity equilibrium in the preventive and reactive cyber defense dynamics,which has been proven globally convergent.The presented study proves that the estimated equilibrium from our trigger rule i)indeed converges to the equilibrium of the dynamics and ii)is Zeno-free,which assures the usefulness of the event-based method.Numerical examples show that the event-based method can reduce 98%of the observation cost incurred by the periodic method.In order to use the event-based method in practice,this paper investigates how to bridge the gap between i)the continuous state in the dynamics model,which is dubbed probability-state because it measures the probability that a node is in the secure or compromised state,and ii)the discrete state that is often encountered in practice,dubbed sample-state because it is sampled from some nodes.This bridge may be of independent value because probability-state models have been widely used to approximate exponentially-many discrete state systems.展开更多
Post-earthquake rescue missions are full of challenges due to the unstable structure of ruins and successive aftershocks.Most of the current rescue robots lack the ability to interact with environments,leading to low ...Post-earthquake rescue missions are full of challenges due to the unstable structure of ruins and successive aftershocks.Most of the current rescue robots lack the ability to interact with environments,leading to low rescue efficiency.The multimodal electronic skin(e-skin)proposed not only reproduces the pressure,temperature,and humidity sensing capabilities of natural skin but also develops sensing functions beyond it—perceiving object proximity and NO2 gas.Its multilayer stacked structure based on Ecoflex and organohydrogel endows the e-skin with mechanical properties similar to natural skin.Rescue robots integrated with multimodal e-skin and artificial intelligence(AI)algorithms show strong environmental perception capabilities and can accurately distinguish objects and identify human limbs through grasping,laying the foundation for automated post-earthquake rescue.Besides,the combination of e-skin and NO2 wireless alarm circuits allows robots to sense toxic gases in the environment in real time,thereby adopting appropriate measures to protect trapped people from the toxic environment.Multimodal e-skin powered by AI algorithms and hardware circuits exhibits powerful environmental perception and information processing capabilities,which,as an interface for interaction with the physical world,dramatically expands intelligent robots’application scenarios.展开更多
Functionally referential signals are a complex form of communication that conveys information about the external environment.Such signals have been found in a range of mammal and bird species and have helped us unders...Functionally referential signals are a complex form of communication that conveys information about the external environment.Such signals have been found in a range of mammal and bird species and have helped us understand the complexities of animal communication.Corvids are well known for their extraordinary cognitive abilities,but relatively little attention has been paid to their vocal function.Here,we investigated the functionally referential signals of a cooperatively breeding corvid species,Azure-winged Magpie(Cyanopica cyanus).Through field observations,we suggest that Azure-winged Magpie uses referential alarm calls to distinguish two types of threats:’rasp’ calls for terrestrial threats and ’chatter’ calls for aerial threats.A playback experiment revealed that Azure-winged Magpies responded to the two call types with qualitatively different behaviors.They sought cover by flying into the bushes in response to the ’chatter’ calls,and flew to or stayed at higher positions in response to ’rasp’ calls,displaying a shorter response time to ’chatter’ calls.Significant differences in acoustic structure were found between the two types of calls.Given the extensive cognitive abilities of corvids and the fact that referential signals were once thought to be unique to primates,these findings are important for expanding our understanding of social communication and language evolution.展开更多
Overlooking the issue of false alarm suppression in heterogeneous change detection leads to inferior detection per-formance.This paper proposes a method to handle false alarms in heterogeneous change detection.A light...Overlooking the issue of false alarm suppression in heterogeneous change detection leads to inferior detection per-formance.This paper proposes a method to handle false alarms in heterogeneous change detection.A lightweight network of two channels is bulit based on the combination of convolutional neural network(CNN)and graph convolutional network(GCN).CNNs learn feature difference maps of multitemporal images,and attention modules adaptively fuse CNN-based and graph-based features for different scales.GCNs with a new kernel filter adaptively distinguish between nodes with the same and those with different labels,generating change maps.Experimental evaluation on two datasets validates the efficacy of the pro-posed method in addressing false alarms.展开更多
To improve the reliability of the light emitting diode(LED)signal lamp filament current monitoring alarm instrument for metro systems,a new type of hot standby online monitoring apparatus was developed which is based ...To improve the reliability of the light emitting diode(LED)signal lamp filament current monitoring alarm instrument for metro systems,a new type of hot standby online monitoring apparatus was developed which is based on synchronous transmission data(STD)bus technology.In this system,a double hot standby mode can be achieved by adopting bus arbitration.In addition,to detect the effective value of alternating current which is from 0 to 200 mA in the signal lamp lighting circuit,a precision rectifier signal conditioning circuit and an isolated acquisition circuit were designed.This new type of alarm instrument has high detection accuracy and could meet the functional requirements for metro signal systems after comparing it with some industry products that were applied on the spot.展开更多
Objective:To explore the clinical rationale of critical care nurses for personalizing monitor alarms.One of the most crucial jobs assigned to critical care nurses is monitoring patients'physiological indicators an...Objective:To explore the clinical rationale of critical care nurses for personalizing monitor alarms.One of the most crucial jobs assigned to critical care nurses is monitoring patients'physiological indicators and carrying out the necessary associated interventions.Successful use of equipment in the nursing practice environment will be improved by a thorough understanding of the nurse's approach to alarm configuration.Methods:A mixed-method design integrating quantitative and qualitative components was used.The sample of this study recruited a convenience sample of 60 nurses who have worked in critical care areas.This study took place at Lebanese American University Medical Center Rizk Hospital,utilizing a semi-structured interview with participants.Results:The study demonstrated the high incidence of nuisance alarms and the desensitization of critical care nurses to vital ones.According to the nurses,frequent false alarms and a shortage of staff are the 2 main causes of alarm desensitization.Age was significantly associated with the perception of Smart alarms,according to the data(P=0.03).Four interconnected themes and subcategories that reflect the clinical reasoning process for alarm customization were developed as a result of the study's qualitative component:(1)unit alarm environment;(2)nursing style;(3)motivation to customize;and(4)clinical and technological customization.Conclusions:According to this study,nurses believe that alarms are valuable.However,a qualitative analysis of the experiences revealed that customization has been severely limited since the healthcare team depends on nurses to complete these tasks independently.Additionally,a staffing shortage and lack of technical training at the start of placement have also hindered customization.展开更多
基金National Natural Science Foundation of China(Nos.U22B2040 and 62233003)Fundamental Research Funds for the Central Universities(No.lzujbky-2022-kb12)。
文摘This paper aims to study the leader-following consensus of linear multi-agent systems on undirected graphs.Specifically,we construct an adaptive event-based protocol that can be implemented in a fully distributed way by using only local relative information.This protocol is also resource-friendly as it will be updated only when the agent violates the designed event-triggering function.A sufficient condition is proposed for the leader-following consensus of linear multi-agent systems based on the Lyapunov approach,and the Zeno-behavior is excluded.Finally,two numerical examples are provided to illustrate the effectiveness of the theoretical results.
基金Chongqing Engineering University Undergraduate Innovation and Entrepreneurship Training Program Project:Wireless Fire Automatic Alarm System(Project No.:CXCY2024017)Chongqing Municipal Education Commission Science and Technology Research Project:Development and Research of Chongqing Wireless Fire Automatic Alarm System(Project No.:KJQN202401906)。
文摘This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysis,software design analysis,and simulation analysis,all supported by data fusion technology.Hopefully,this analysis can provide some reference for the rational application of data fusion technology to meet the actual design and application requirements of the system.
基金National Geographic Society,UCLA(Faculty Senate and the Division of Life Sciences),a Rocky Mountain Biological Laboratory research fellowship,NSF IDBR-0754247,and DEB-1119660 and 1557130 all to D.T.B.DBI-0242960,0731346,1226713,and 1755522 to the RMBL.K.A.was a NSF GRFP fellow during the fnal preparation of this MS。
文摘Emitting alarm calls may be costly,but few studies have asked whether calling increases a caller’s risk of predation and survival.Since observing animals calling and being killed is relatively rare,we capitalized on over 24,000 h of observations of marmot colonies and asked whether variation in the rate that yellow-bellied marmots(Marmota faviventer)alarm called was associated with the probability of summer mortality,a proxy for predation.Using a generalized mixed model that controlled for factors that infuenced the likelihood of survival,we found that marmots who called at higher rates were substantially more likely to die over the summer.Because virtually all summer mortality is due to predation,these results suggest that calling is indeed costly for marmots.Additionally,the results from a Cox survival analysis showed that marmots that called more lived signifcantly shorter lives.Prior studies have shown that marmots reduce the risk by emitting calls only when close to their burrows,but this newly quantifed survival cost suggests a constraint on eliminating risks.Quantifying the cost of alarm calling using a similar approach in other systems will help us better understand its true costs,which is an essential value for theoretical models of calling and social behavior.
基金funded by the National Natural Science Foundation of China (No. 32301295 to JW, 32101242 to LM, and 32260253 to LW)High-Level Talents Research Start-Up Project of Hebei University (No. 521100222044 to JW)
文摘Avian alarm calls mediate defenses against brood parasites and predators. These calls facilitate communication among adults and alert nestlings to potential danger. While heterospecific call recognition has been extensively studied in adult birds, nestlings—lacking direct predation experience and heterospecific alarm exposure—represent an ideal system to investigate the response to interspecific warning cues. This study explored the recognition capabilities of 5–6-day-old nestlings in Oriental Reed Warbler (Acrocephalus orientalis), a common host of the Common Cuckoo (Cuculus canorus). We exposed the nestlings to playbacks of alarm calls directed at parasites and raptors from conspecific, Vinous-throated Parrotbill (Sinosuthora webbiana, sympatric species), Isabelline Shrike (Lanius isabellinus, allopatric species) and Common Tailorbird (Orthotomus sutorius, allopatric species) adults. Results indicated that there was no significant difference in the responses of nestlings to the alarm calls of conspecific and allopatric adults directed at cuckoos and sparrowhawks. In addition, interestingly, nestlings significantly reduced their begging in response to conspecific and unfamiliar allopatric Isabelline Shrike and Common Tailorbird alarm calls but exhibited a weak response to the sympatric Vinous-throated Parrotbill. Whether older warbler nestlings with more social experience exhibit stronger responses to the alarm calls of Vinous-throated Parrotbill adults requires further investigation.
基金funded by the Education Department of Hainan Province(no.HnjgY 2022-12)the National Natural Science Foundation of China(no.32260127).
文摘Alarm calls in bird vocalizations serve as acoustic signals announcing danger.Owing to the convergent evolution of alarm calls,some bird species can beneft from eavesdropping on certain parameters of alarm calls of other species.Vocal mimicry,displayed by many bird species,aids defense against predators and may help brood parasites during parasitism.In the coevolutionary dynamics between brood parasites,such as the common cuckoo(Cuculus canorus),and their hosts,female cuckoo vocalizations can induce hosts to leave the nest,increasing the probability of successful parasitism and reducing the risk of host attacks.Such cuckoo calls were thought to mimic those of the sparrowhawk.However,owing to their similarity to alarm calls,we propose a new hypothesis:Female cuckoos cheat their hosts by mimicking the parameters of the host alarm call.In this study,we tested this new hypothesis and the sparrowhawk mimicry hypothesis simultaneously by manipulating the syllable rate in male and female common cuckoo vocalizations and playing them in front of the host Oriental reed warbler(Acrocephalus orientalis)for examination.The results indicate that similar to a normal female cuckoo call,a female call with a reduced syllable rate prompted the hosts to leave their nests more frequently and rapidly than male cuckoo calls.Additionally,the male cuckoo calls with increased syllable rate did not prompt the host to leave their nests more frequently or quickly compared with the male cuckoo calls with a normal syllable rate.Our results further confrm that female common cuckoos mimic the vocalizations of Eurasian sparrowhawks(Accipiter nisus),reveal the function mechanisms underlying such mimicry,and support the theory of imperfect mimicry.
基金supported by the National Natural Science Foundation of China(61906138)the National Science and Technology Major Project of the Ministry of Science and Technology of China(2018AAA0102900)+2 种基金the Shanghai Automotive Industry Sci-Tech Development Program(1838)the European Union’s Horizon 2020 Research and Innovation Program(785907)the Shanghai AI Innovation Development Program 2018。
文摘The rise of the Internet and identity authentication systems has brought convenience to people's lives but has also introduced the potential risk of privacy leaks.Existing biometric authentication systems based on explicit and static features bear the risk of being attacked by mimicked data.This work proposes a highly efficient biometric authentication system based on transient eye blink signals that are precisely captured by a neuromorphic vision sensor with microsecond-level temporal resolution.The neuromorphic vision sensor only transmits the local pixel-level changes induced by the eye blinks when they occur,which leads to advantageous characteristics such as an ultra-low latency response.We first propose a set of effective biometric features describing the motion,speed,energy and frequency signal of eye blinks based on the microsecond temporal resolution of event densities.We then train the ensemble model and non-ensemble model with our Neuro Biometric dataset for biometrics authentication.The experiments show that our system is able to identify and verify the subjects with the ensemble model at an accuracy of 0.948 and with the non-ensemble model at an accuracy of 0.925.The low false positive rates(about 0.002)and the highly dynamic features are not only hard to reproduce but also avoid recording visible characteristics of a user's appearance.The proposed system sheds light on a new path towards safer authentication using neuromorphic vision sensors.
基金supported by National Natural Science Foundation of China(No.61329301)the Royal Society of the UK+2 种基金the Research Fund for the Taishan Scholar Project of Shandong Province of Chinathe China Postdoctoral Science Foundation(No.2016M600547)the Alexander von Humboldt Foundation of Germany
文摘In recent years, theoretical and practical research on event-based communication strategies has gained considerable research attention due primarily to their irreplaceable superiority in resource-constrained systems(especially networked systems). For networked systems, event-based transmission scheme is capable of improving the efficiency in resource utilization and prolonging the lifetime of the network components compared with the widely adopted periodic transmission scheme. As such, it would be interesting to 1) examining how the event-triggering mechanisms affect the control or filtering performance for networked systems, and 2) developing some suitable approaches for the controller and filter design problems. In this paper, a bibliographical review is presented on event-based control and filtering problems for various networked systems. First, the event-driven communication scheme is introduced in detail according to its engineering background, characteristic, and representative research frameworks. Then, different event-based control and filtering(or state estimation) problems are categorized and then discussed. Finally, we conclude the paper by outlining future research challenges for event-based networked systems.
基金supported in part by the National Natural Sciences Foundation of China(62072111)。
文摘Estimating the global state of a networked system is an important problem in many application domains.The classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it often observes states at a very high frequency.This inefficiency has motivated the idea of event-based method,which leverages the evolution dynamics in question and makes observations only when some rules are triggered(i.e.,only when certain conditions hold).This paper initiates the investigation of using the event-based method to estimate the equilibrium in the new application domain of cybersecurity,where equilibrium is an important metric that has no closed-form solutions.More specifically,the paper presents an event-based method for estimating cybersecurity equilibrium in the preventive and reactive cyber defense dynamics,which has been proven globally convergent.The presented study proves that the estimated equilibrium from our trigger rule i)indeed converges to the equilibrium of the dynamics and ii)is Zeno-free,which assures the usefulness of the event-based method.Numerical examples show that the event-based method can reduce 98%of the observation cost incurred by the periodic method.In order to use the event-based method in practice,this paper investigates how to bridge the gap between i)the continuous state in the dynamics model,which is dubbed probability-state because it measures the probability that a node is in the secure or compromised state,and ii)the discrete state that is often encountered in practice,dubbed sample-state because it is sampled from some nodes.This bridge may be of independent value because probability-state models have been widely used to approximate exponentially-many discrete state systems.
基金supports from the National Natural Science Foundation of China(61801525)the independent fund of the State Key Laboratory of Optoelectronic Materials and Technologies(Sun Yat-sen University)under grant No.OEMT-2022-ZRC-05+3 种基金the Opening Project of State Key Laboratory of Polymer Materials Engineering(Sichuan University)(Grant No.sklpme2023-3-5))the Foundation of the state key Laboratory of Transducer Technology(No.SKT2301),Shenzhen Science and Technology Program(JCYJ20220530161809020&JCYJ20220818100415033)the Young Top Talent of Fujian Young Eagle Program of Fujian Province and Natural Science Foundation of Fujian Province(2023J02013)National Key R&D Program of China(2022YFB2802051).
文摘Post-earthquake rescue missions are full of challenges due to the unstable structure of ruins and successive aftershocks.Most of the current rescue robots lack the ability to interact with environments,leading to low rescue efficiency.The multimodal electronic skin(e-skin)proposed not only reproduces the pressure,temperature,and humidity sensing capabilities of natural skin but also develops sensing functions beyond it—perceiving object proximity and NO2 gas.Its multilayer stacked structure based on Ecoflex and organohydrogel endows the e-skin with mechanical properties similar to natural skin.Rescue robots integrated with multimodal e-skin and artificial intelligence(AI)algorithms show strong environmental perception capabilities and can accurately distinguish objects and identify human limbs through grasping,laying the foundation for automated post-earthquake rescue.Besides,the combination of e-skin and NO2 wireless alarm circuits allows robots to sense toxic gases in the environment in real time,thereby adopting appropriate measures to protect trapped people from the toxic environment.Multimodal e-skin powered by AI algorithms and hardware circuits exhibits powerful environmental perception and information processing capabilities,which,as an interface for interaction with the physical world,dramatically expands intelligent robots’application scenarios.
基金funded by the National Natural Science Foundation of China (Grant No. 32170516, 31872243 to Y.Z.)。
文摘Functionally referential signals are a complex form of communication that conveys information about the external environment.Such signals have been found in a range of mammal and bird species and have helped us understand the complexities of animal communication.Corvids are well known for their extraordinary cognitive abilities,but relatively little attention has been paid to their vocal function.Here,we investigated the functionally referential signals of a cooperatively breeding corvid species,Azure-winged Magpie(Cyanopica cyanus).Through field observations,we suggest that Azure-winged Magpie uses referential alarm calls to distinguish two types of threats:’rasp’ calls for terrestrial threats and ’chatter’ calls for aerial threats.A playback experiment revealed that Azure-winged Magpies responded to the two call types with qualitatively different behaviors.They sought cover by flying into the bushes in response to the ’chatter’ calls,and flew to or stayed at higher positions in response to ’rasp’ calls,displaying a shorter response time to ’chatter’ calls.Significant differences in acoustic structure were found between the two types of calls.Given the extensive cognitive abilities of corvids and the fact that referential signals were once thought to be unique to primates,these findings are important for expanding our understanding of social communication and language evolution.
基金This work was supported by the Natural Science Foundation of Heilongjiang Province(LH2022F049).
文摘Overlooking the issue of false alarm suppression in heterogeneous change detection leads to inferior detection per-formance.This paper proposes a method to handle false alarms in heterogeneous change detection.A lightweight network of two channels is bulit based on the combination of convolutional neural network(CNN)and graph convolutional network(GCN).CNNs learn feature difference maps of multitemporal images,and attention modules adaptively fuse CNN-based and graph-based features for different scales.GCNs with a new kernel filter adaptively distinguish between nodes with the same and those with different labels,generating change maps.Experimental evaluation on two datasets validates the efficacy of the pro-posed method in addressing false alarms.
文摘To improve the reliability of the light emitting diode(LED)signal lamp filament current monitoring alarm instrument for metro systems,a new type of hot standby online monitoring apparatus was developed which is based on synchronous transmission data(STD)bus technology.In this system,a double hot standby mode can be achieved by adopting bus arbitration.In addition,to detect the effective value of alternating current which is from 0 to 200 mA in the signal lamp lighting circuit,a precision rectifier signal conditioning circuit and an isolated acquisition circuit were designed.This new type of alarm instrument has high detection accuracy and could meet the functional requirements for metro signal systems after comparing it with some industry products that were applied on the spot.
文摘Objective:To explore the clinical rationale of critical care nurses for personalizing monitor alarms.One of the most crucial jobs assigned to critical care nurses is monitoring patients'physiological indicators and carrying out the necessary associated interventions.Successful use of equipment in the nursing practice environment will be improved by a thorough understanding of the nurse's approach to alarm configuration.Methods:A mixed-method design integrating quantitative and qualitative components was used.The sample of this study recruited a convenience sample of 60 nurses who have worked in critical care areas.This study took place at Lebanese American University Medical Center Rizk Hospital,utilizing a semi-structured interview with participants.Results:The study demonstrated the high incidence of nuisance alarms and the desensitization of critical care nurses to vital ones.According to the nurses,frequent false alarms and a shortage of staff are the 2 main causes of alarm desensitization.Age was significantly associated with the perception of Smart alarms,according to the data(P=0.03).Four interconnected themes and subcategories that reflect the clinical reasoning process for alarm customization were developed as a result of the study's qualitative component:(1)unit alarm environment;(2)nursing style;(3)motivation to customize;and(4)clinical and technological customization.Conclusions:According to this study,nurses believe that alarms are valuable.However,a qualitative analysis of the experiences revealed that customization has been severely limited since the healthcare team depends on nurses to complete these tasks independently.Additionally,a staffing shortage and lack of technical training at the start of placement have also hindered customization.