An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Future advances in deep learning and its impact on the development of artificial intelligence (AI) in all fields depends heavily on data size and computational power. Sacrificing massive computing resources in exchange for better precision rates of the
This work presents the design of an optimal disturbance rejecting tracking controller based on reinforcement learning. The problem involves finding the optimal control parameters that yield asymptotic output tracking in the presence of unmeasurable
Ruimin Chen, Yan Lu, Paul Witherell, Timothy Simpson, Soundar Kumara, Hui Yang
Additive manufacturing (AM) enables the creation of complex geometries that are difficult to realize using conventional manufacturing techniques. Advanced sensing is increasingly being used to improve AM processes, and installing different sensors onto AM
Aditya Joglekar, Omid Sadjadi, Meena Chandra-Shekar, Christopher Cieri, John Hansen
The Fearless Steps Challenge (FSC) initiative was designed to host a series of progressively complex tasks to promote advanced speech research across naturalistic "Big Data" corpora. The Center for Robuts Speech Systems at UT-Dallas in collaboration with
Harold Booth, James Glasbrenner, Howard Huang, Cory Miniter, Julian Sexton
The NCCoE has built an experimentation testbed to begin to address the broader challenge of evaluation for attacks and defenses. The testbed aims to facilitate security evaluations of ML algorithms under a diverse set of conditions. To that end, it has a
We present a new collection of processing techniques, collectively "factorized Kramers-Kroenig and error correction" (fKK-EC), for (a) Raman signal extraction, (b) denoising, and (c) phase- and scale- error correction in coherent anti-Stokes Raman
Justyna Zwolak, Thomas McJunkin, Sandesh Kalantre, Samuel Neyens, Evan MacQuarrie, Mark A. Eriksson, Jacob Taylor
Quantum dots (QDs) defined with electrostatic gates are a leading platform for a scalable quantum computing implementation. However, with increasing numbers of qubits, the complexity of the control parameter space also grows. Traditional measurement
We address the problem of performing exact (tiling-error free) out-of-core semantic segmentation inference of arbitrarily large images using fully convolutional neural networks (FCN). FCN models have the property that once a model is trained, it can be
Heterogeneous ultra-dense networking (HUDN) with energy harvesting technology is a promising approach to deal with the ever-growing traffic that can severely impact the power consumption of small-cell networks. Unfortunately, the amount of harvested energy
Ian Soboroff, George Awad, Asad Butt, Keith Curtis
Evaluating information access tasks, including textual and multimedia search, question answering, and understanding has been the core mission of NIST's Retrieval Group since 1989. The TRECVID Evaluations of Multimedia Access began in 2001 with a goal of
There are increasing calls for systems that are able to explain themselves to their end users to increase transparency and help engender trust. But, what should such explanations contain, and how should that information be presented? A pilot study of
This paper addresses the problem of detecting trojans in neural networks (NNs) by analyzing how NN accuracy responds to systematic pruning. This study leverages the NN models generated for the TrojAI challenges. Our pruning-based approach (1) detects any
To design and construct hardware for general intelligence, we must consider principles of both neuroscience and very-large-scale integration. For large neural systems capable of general intelligence, the attributes of photonics for communication and
Future industrial cyber-physical system (CPS) devices are expected to request a large amount of delay-sensitive services that need to be processed at the edge of a network. Due to limited resources, service placement at the edge of the cloud has attracted