Converse negative imaginary theorems for linear time-invariant systems are derived. In particular, we provide necessary and sufficient conditions for a feedback system to be robustly stable against various types of ne...
详细信息
For the first time, we introduce a rapid wavelength-swept L-band tunable mode-locked fiber laser, boasting an exceptional wavelength sweeping rate of up to 19 kHz, enabled by external modulation of the pump current. &...
详细信息
Pain management is one of the important treatments of cancer patients. This study aims to develop a classifier of chronic cancer pain patients from their brain metabolic activity measured by FDG-PET. We compared FDG-P...
详细信息
Machine learning-based improvements in anomaly detection, visualization, and segmentation are made possible by the growing digitization of medical imaging, which reduces the workload for medical specialists. Neverthel...
详细信息
In this research paper, the authors present a comprehensive overview of three key elements of Metaverse-as-a-service (MaaS) platforms: privacy and security, edge computing, and blockchain technology. The study begins ...
In this research paper, the authors present a comprehensive overview of three key elements of Metaverse-as-a-service (MaaS) platforms: privacy and security, edge computing, and blockchain technology. The study begins by examining security concerns for wireless access to the Metaverse. It then delves into privacy and security issues within the Metaverse from data-centric, learning-centric, and human-centric perspectives. The authors propose novel and less-explored methods to aid mobile network operators and Metaverse service providers in creating secure and private MaaS platforms across various layers of the Metaverse, from access to social interactions. The article also explores the potential of edge computing to enhance various aspects of the Metaverse and the challenges associated with its implementation. Furthermore, the study examines the 10 main challenges of MaaS platforms and how blockchain technology can address them. Finally, the authors present future visions and recommendations, such as content-centric security and zero-trust Metaverse, as well as unresolved challenges in blockchain technology to provide insights for network designers in the Metaverse era.
Estimating high-dimensional covariance matrices is crucial in various domains. This work considers a scenario where two collaborating agents access disjoint dimensions of m samples from a high-dimensional random vecto...
Estimating high-dimensional covariance matrices is crucial in various domains. This work considers a scenario where two collaborating agents access disjoint dimensions of m samples from a high-dimensional random vector, and they can only communicate a limited number of bits to a central server, which wants to accurately approximate the covariance matrix. We analyze the fundamental trade-off between communication cost, number of samples, and estimation accuracy. We prove a lower bound on the error achievable by any estimator, highlighting the impact of dimensions, number of samples, and communication budget. Furthermore, we present an algorithm that achieves this lower bound up to a logarithmic factor, demonstrating its near-optimality in practical settings.
Research on classifying chest CT scans as normal or abnormal using machine learning and deep learning has garnered significant attention. To address this, various feature selection (FS) methods are employed to reduce ...
详细信息
A large-scale dynamically weighted directed network(DWDN)involving numerous entities and massive dynamic interaction is an essential data source in many big-data-related applications,like in a terminal interaction pat...
详细信息
A large-scale dynamically weighted directed network(DWDN)involving numerous entities and massive dynamic interaction is an essential data source in many big-data-related applications,like in a terminal interaction pattern analysis system(TIPAS).It can be represented by a high-dimensional and incomplete(HDI)tensor whose entries are mostly *** such an HDI tensor contains a wealth knowledge regarding various desired patterns like potential links in a DWDN.A latent factorization-of-tensors(LFT)model proves to be highly efficient in extracting such knowledge from an HDI tensor,which is commonly achieved via a stochastic gradient descent(SGD)***,an SGD-based LFT model suffers from slow convergence that impairs its efficiency on large-scale *** address this issue,this work proposes a proportional-integralderivative(PID)-incorporated LFT *** constructs an adjusted instance error based on the PID control principle,and then substitutes it into an SGD solver to improve the convergence *** studies on two DWDNs generated by a real TIPAS show that compared with state-of-the-art models,the proposed model achieves significant efficiency gain as well as highly competitive prediction accuracy when handling the task of missing link prediction for a given DWDN.
The mechanism of chronic cancer pain has yet fully elucidated even though nearly 80% of cancer patients suffer from chronic pain. We investigated the difference in brain activities between painful and painless cancer ...
详细信息
Group scheduling problems have attracted much attention owing to their many practical *** work proposes a new bi-objective serial-batch group scheduling problem considering the constraints of sequence-dependent setup ...
详细信息
Group scheduling problems have attracted much attention owing to their many practical *** work proposes a new bi-objective serial-batch group scheduling problem considering the constraints of sequence-dependent setup time,release time,and due *** is originated from an important industrial process,i.e.,wire rod and bar rolling process in steel production *** objective functions,i.e.,the number of late jobs and total setup time,are minimized.A mixed integer linear program is established to describe the *** obtain its Pareto solutions,we present a memetic algorithm that integrates a population-based nondominated sorting genetic algorithm II and two single-solution-based improvement methods,i.e.,an insertion-based local search and an iterated greedy *** computational results on extensive industrial data with the scale of a one-week schedule show that the proposed algorithm has great performance in solving the concerned problem and outperforms its *** high accuracy and efficiency imply its great potential to be applied to solve industrial-size group scheduling problems.
暂无评论