We propose a single-pixel imaging(SPI)method to achieve a higher-resolution image via the Hadamard transform *** traditional SPI schemes,this new method recovers images by correlating single-pixel signals with synchro...
详细信息
We propose a single-pixel imaging(SPI)method to achieve a higher-resolution image via the Hadamard transform *** traditional SPI schemes,this new method recovers images by correlating single-pixel signals with synchronized transformed patterns of Hadamard bases that are actually projected onto the digital micromirror *** transform pattern is obtained through the inverse Fourier transform of the pattern acquired by Gaussian filtering of each Hadamard basis in the frequency *** proposed scheme is based on a typical SPI experimental setup and does not add any hardware complexity,enabling the transformation of Hadamard matrices and image reconstruction through data processing ***,this approach could be considered as an alternative option for achieving fast SPI in a diffraction-limited imaging system,without the need for additional hardware.
Flexible sensors with high sensitivity and stability are essential components of electronic skin,applicable to detecting human movement,monitoring physiological health,preventing diseases,and other *** this study,we u...
详细信息
Flexible sensors with high sensitivity and stability are essential components of electronic skin,applicable to detecting human movement,monitoring physiological health,preventing diseases,and other *** this study,we utilized a straightforward and efficient femtosecond laser direct writing technique using phenolic resin(PR)as a carbon precursor to produce high-quality laser-induced graphene(LiG)characterized by high crystallinity and low defect *** fabricated LIG underwent comprehensive characterization using SEM,Raman spectroscopy,XPS,and ***,we developed strain sensors with a hexagonal honeycomb pattern and temperature sensors with a line pattern based on PR-derived *** strain sensor exhibited an outstanding measurement factor of 4.16×104 with a rapid response time of 32 ms,which is applied to detect various movements like finger movements and human ***,the temperature sensor demonstrated a sensitivity of 1.49%/°C with a linear response range of 20-5o *** PR-derived LIG shows promising potential for applications in human physiological health monitoring and other advanced wearable technologies.
In order to utilize salmon skin for high value, and investigate the structural identification and combination mechanism of iron (II)-chelating peptides systemically, Atlantic salmon (Salmo salar L.) skin, a by-product...
详细信息
In order to utilize salmon skin for high value, and investigate the structural identification and combination mechanism of iron (II)-chelating peptides systemically, Atlantic salmon (Salmo salar L.) skin, a by-product of Atlantic salmon processing, was treated by two-step enzymatic hydrolysis to obtain salmon skin active peptides (SSAP). Then they reacted with iron (II) to obtain iron (II)-chelating salmon skin active peptides (SSAP-Fe) with a high iron (II) chelating ability of 98.84%. The results of Fourier transform infrared spectroscopy (FTIR), circular dichroism (CD) spectroscopy, 8-anilino-1-naphthalenesulfonic acid ammonium salt hydrate (ANS) combined fluorescence measurement, isothermal titration calorimetry (ITC) and full wavelength ultraviolet (UV) scanning showed that the structural characteristics of SSAP changed before and after chelating iron (II). Reverse phase high performance liquid chromatography (RP-HPLC) and mass spectrometry were used to identify and quantify the peptides in SSAP-Fe. Four peptide sequences (STEGGG, GIIKYGDDFMH, PGQPGIGYDGPAGPPGPPGPPGAP and QNQRESWTTCRSQSSLPDG) were identified. The content of PGQPGIGYDGPAGPPGPPGPPGAP was the highest, at 25.17 mu g/mg. The pharmacokinetic and pharmacodynamic properties of these four peptides were also investigated, and the results indicated that they have satisfactory predicted ADMET properties. Molecular docking technology was used to analyze the binding sites between iron (II) and SSAP, and it was found that PGQPGIGYDGPAGPPGPPGPPGAP had the lowest predicted binding energy with iron (II) and the most stable predicted binding energy with iron (II). This results showed that the stability of SSAP-Fe were closely related to the number of covalent bonds and the types of amino acids. This study revealed the structure and combination mechanism of SSAP-Fe, and indicated that SSAP-Fe prepared by chelation may be used as a Fe supplement that can be applied in functional foods or ingredients.
Under illumination by 405,520 and 655 nm monochromatic visible light(light intensity of 30 kW/m^(2)),large photostriction(ΔL/L)of 0.19%,0.13%and 0.26%for 67BiFeO_(3)-33BaTiO_(3)(67BF-33BT)lead-free ferroelectric cera...
详细信息
Under illumination by 405,520 and 655 nm monochromatic visible light(light intensity of 30 kW/m^(2)),large photostriction(ΔL/L)of 0.19%,0.13%and 0.26%for 67BiFeO_(3)-33BaTiO_(3)(67BF-33BT)lead-free ferroelectric ceramics are obtained,*** studying the ferroelectric and photoelectric properties in conjunction with in situ Raman spectroscopy,it is found that the photostrictive effect of 67BF-33BT is not caused by the electrical strain induced by abnormal photovoltaic voltage,but related to the optical induced oxygen octahedral *** 67BF-33BT lead-free ferroelectric material with excellent photostrictive response in the visible light region is expected to play an important role in the field of optical drive electromechanical devices.
The technology of distributed cooperative consensushas been widely used in inverter-based microgrids. However,the traditional information interaction will lead to the problemof data disclosure. Although privacy issues...
详细信息
The technology of distributed cooperative consensushas been widely used in inverter-based microgrids. However,the traditional information interaction will lead to the problemof data disclosure. Although privacy issues have been widely researched in the tertiary control layer of microgrids, the issues of secondary control layer have not been properly *** fill this gap, taking voltage restoration as the object, the privacy preserving consensus problem for secondary controllayer of nDGs is landed microgrids is considered in this *** mask approach, the basic idea of which is to inserta dynamic mask to the transmitted information, is adoptedto achieve an accurate consensus rather than a pre-specified convergence accuracy level by differential private method. Afterthat, a newly state decomposition mechanism is proposed, the DG agent is decomposed into two subagents, called x(i)( alpha)and x(i)(beta).Among the agent pairs(x(i)( alpha),x(i)(beta)), choose only one subagent ofpairiarbitrarily connected to one subagent of its neighboragent pair. Furthermore, only the communication lines among theagent pairs are masked. Compared with the existing literature,the constraint on the communication topology can be firstremoved without additional computational burden. Moreover,the consensus and privacy analysis of the controlled systemare carried out. In the end, the simulation results verify theeffectiveness of the proposed privacy preserving mechanism inthe MATLAB/Simulink environment.
Imbalanced label distribution is usually the case for real-world data, which poses a challenge for training unbiased recognition model. In this paper, we study two underlying mismatches, i.e., distribution mismatch an...
详细信息
Imbalanced label distribution is usually the case for real-world data, which poses a challenge for training unbiased recognition model. In this paper, we study two underlying mismatches, i.e., distribution mismatch and probability space mismatch, present in class-imbalanced learning. Firstly, we analyze the label distribution mismatch between imbalanced training data and balanced test data, and introduce a distribution unified framework to unify the two distributions through probability conversion. Secondly, we analyze that the utilization of cross-entropy loss under the proposed framework may lead to probability space mismatch, where the conversion of the predictive probability is implemented in softmax probability space while the comparison with one-hot label is implemented in true probability space. To alleviate this dilemma, we involve a teacher model and formulate a teacher-student learning strategy, which contains two novel techniques. The Teacher Guided Label Smoothing (TGLS) is first proposed to relax the one-hot label to smoother pseudo softmax probability, which is more aligned with the softmax probability space. Additionally, we propose Distribution Unified Knowledge Distillation (DU-KD) under the proposed framework to further reduce both the mismatches. Experiments on several benchmarks confirm the top-level performance of the proposed method.
Fasteners are a critical part of the rail and are used to fix the rail, which are important for train operation. Rail vibrations during train operation can cause anomalies in fasteners. At present, the 3-D structured ...
详细信息
Fasteners are a critical part of the rail and are used to fix the rail, which are important for train operation. Rail vibrations during train operation can cause anomalies in fasteners. At present, the 3-D structured light camera is used to detect anomalies on railway sites, but there is a lack of sufficient mining of 3-D data and effective fusion of multisensor data. To address this issue, this article proposes a novel approach for railway fastener anomaly detection via multisensor fusion and self-driven loss reweighting. First, a pixel-level attention mechanism multisensor fusion method is applied, where the depth map is used as an attention factor to highlight edge contours and enhance abrupt changes in the gray level. Second, a feature fusion-decoupled module is proposed to obtain the dense feature maps and then decouple the detection task to output class, location, and confidence. Finally, given the characteristics of the sample imbalance in the fastener dataset, a dynamic self-driven loss reweighting method is used to improve the detection accuracy of difficult samples. The experimental results show that the proposed method can achieve 86.6% precision and 61.72-FPS detection speed, better than other state-of-the-art algorithms.
In app-in-app ecosystems, mobile applications (i.e., host apps) often delegate their rich resources to hosted parties (i.e., sub-apps), which can be utilized to provide millions of effective services including shoppin...
详细信息
In app-in-app ecosystems, mobile applications (i.e., host apps) often delegate their rich resources to hosted parties (i.e., sub-apps), which can be utilized to provide millions of effective services including shopping, banking, and government. These resources vary from system abilities (e.g., web socket and GPS location) to app and user data (e.g., storage and phone number). This leads to an important research question-carefully design and enforce security regulations on these cross-party delegated resources (CPDR). Real-world host apps, according to our study, adopt 11 common security regulations in protecting the integrity, confidentiality, and availability of CPDR. However, existing practice and compliance between host apps and sub-apps are vague and inconsistent, leading to violations of these security regulations. To the best of our knowledge, no prior works have studied these security regulations. In this paper, we perform the first systematic study of the security regulations and their security weaknesses in real-world app-in-app ecosystems. We propose three novel attack vectors including masquerade attack, data-driven attack, and channel hijacking. We find that violations of the common security regulations are widespread among all 9 studied app-in-app ecosystems. More importantly, such security weakness can lead to severe consequences such as manipulating sub-apps' back-end servers and stealing sensitive user data. We responsibly report all of our findings to host app developers of affected app-in-app ecosystems and help them fix their vulnerabilities. The code of this work is available at https://***/TitaniumB/***.
In this article, the problem of inferring unknown isoperimetric constraints is considered given optimal state and control trajectories that solve the optimal control problem with isoperimetric constraints. By exploiti...
详细信息
In this article, the problem of inferring unknown isoperimetric constraints is considered given optimal state and control trajectories that solve the optimal control problem with isoperimetric constraints. By exploiting Pontryagin's principle, the recovery equations for unknown isoperimetric constraints are established. Under verifiable dimensionality condition and matrix rank condition, the proposed method is guaranteed to infer the unknown isoperimetric constraints exactly. Furthermore, the proposed method is extended to multiple trajectory setting. Finally, the effectiveness of the proposed method is illustrated by two simulation examples with various settings.
Objective After endoscopic resection of colorectal cancer with submucosal invasion(pT1 CRC),additional surgical treatment is recommended if deep submucosal invasion(DSI)is *** study aimed to further elucidate the risk...
详细信息
Objective After endoscopic resection of colorectal cancer with submucosal invasion(pT1 CRC),additional surgical treatment is recommended if deep submucosal invasion(DSI)is *** study aimed to further elucidate the risk factors for lymph node metastasis(LNM)in patients with pT1 CRC,especially the effect of DSI on *** Patients with pT1 CRC who underwent lymph node dissection were *** Chi-square test and multivariate logistic regression were used to analyze the relationship between clinicopathological characteristics and *** submucosal invasion depth(SID)was measured via 4 methods and analyzed with 3 cut-off *** Twenty-eight of the 239 patients presented with LNM(11.7%),and the independent risk factors for LNM included high histological grade(P=0.003),lymphovascular invasion(LVI)(P=0.004),intermediate to high budding(Bd 2/3)(P=0.008),and cancer gland rupture(CGR)(P=0.008).Moreover,the SID,width of submucosal invasion(WSI),and area of submucosal invasion(ASI)were not significantly *** one,two,three or more risk factors were identified,the LNM rates were 1.1%(1/95),12.5%(7/56),and 48.8%(20/41),*** Indicators such as the SID,WSI,and ASI are not risk factors for LNM and are subjective in their measurement,which renders them relatively inconvenient to apply in clinical *** contrast,histological grade,LVI,tumor budding and CGR are relatively straightforward to identify and have been demonstrated to be statistically *** would be prudent to focus on these histological factors rather than subjective measurements.
暂无评论