Search
Search Results
-
The Weighted Vector Finite Element Method for Vector Wave Equation with Singularity
Boundary value problems for wave vector equations with singularity are used in mathematical models of electromagnetism problems in domains with a... -
Unlocking the Lookup Singularity with Lasso
This paper introduces Lasso, a new family of lookup arguments, which allow an untrusted prover to commit to a vector... -
Singularity separation Chebyshev collocation method for weakly singular Volterra integral equations of the second kind
Volterra integral equation of the second kind with weakly singular kernel usually exhibits singular behavior at the origin, which deteriorates the...
-
Event-based singularity-free fixed-time fuzzy control for active suspension systems with displacement constraint
This paper investigates the event-based adaptive fixed-time (FT) control problem for active suspension systems (ASSs) with actuator faults. The fuzzy...
-
Distributed fixed-time NN tracking control of vehicular platoon systems with singularity-free
This paper focuses on a distributed adaptive singularity-free fixed-time neural network tracking control problem for vehicular platoon with model...
-
Are We Nearing Singularity? A Study of Language Capabilities of ChatGPT
There has been a huge uproar about ChatGPT in recent times. There are widespread fears that generative models such as ChatGPT will affect... -
Singularity Analysis for the Perspective-Four and Five-Line Problems
This paper deals with image-based visual servoing and pose estimation by observing four and five lines. Our main interest is to determine the...
-
A philosophical view on singularity and strong AI
More intellectual modesty, but also conceptual clarity is urgently needed in AI, perhaps more than in many other disciplines. AI research has been...
-
Locating the Closest Singularity in a Polynomial Homotopy
A polynomial homotopy is a family of polynomial systems, where the systems in the family depend on one parameter. If for one value of the parameter... -
HPX with Spack and Singularity Containers: Evaluating Overheads for HPX/Kokkos Using an Astrophysics Application
Cloud computing for high performance computing resources is an emerging topic. This service is of interest to researchers who care about reproducible... -
Error analysis of a high-order fully discrete method for two-dimensional time-fractional convection-diffusion equations exhibiting weak initial singularity
This study presents a novel high-order numerical method designed for solving the two-dimensional time-fractional convection-diffusion (TFCD)...
-
Historicism, Science Fiction, and the Singularity
Many writers who have discussed the SingularityThe Singularity have treated it not only as the inevitable outcome of advancements in cybernetic... -
Complete Singularity Analysis for the Perspective-Four-Point Problem
This paper is concerned with pose estimation and visual servoing from four points. We determine the configurations for which the corresponding...
-
The Singularity Hoax: Why Computers Will Never Be More Intelligent than Humans
We argue that the dream of the supporters of the technological singularity, the notion that computers will one day be smarter than their human... -
Ethical Design in an AI-Driven World
In the fields of quantum mechanics and general relativity, there is a term called “singularity.” It refers to the theoretical phenomenon where... -
Autonomy and Singularity - Work, Ubiquity and Operational Fluidity
The differential value of an ergonomic intervention is to bring an innovative approach in the models and practices of treatment of risks at work, in... -
Numerical correction of finite difference solution for two-dimensional space-fractional diffusion equations with boundary singularity
In this paper, an efficient algorithm is presented by adopting the extrapolation technique to improve the accuracy of finite difference schemes for...
-
Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities
It is essential to ensure the data security of data analytical frameworks as any security vulnerability existing in the system can lead to a data...
-
Topological operations for editing the singularity on a hex mesh
This paper introduces topological operations for editing the singularity on a hex mesh while maintaining the connectivity of hexahedral mesh. The...
-
Prescribed time control based on the periodic delayed sliding mode surface without singularities
In this paper, nonsingular prescribed-time control is studied based on periodic delayed sliding mode surfaces. Different from the existing sliding...