How to maximize embedding capacity is one of the current challenges in the field of reversible data hiding. A reversible data hiding scheme is proposed based on the rearrangement and compression of prediction error bi...
详细信息
Quality-of-Service (QoS) guarantees are crucial for meeting the diverse performance requirements of applications in packet networks. The Proportional Delay Differentiation (PDD) model offers relative service different...
详细信息
Dear Editor,This letter focuses on leveraging the object information in images to improve the performance of the U-Net based change *** detection is fundamental to many computer vision *** existing solutions based on ...
详细信息
Dear Editor,This letter focuses on leveraging the object information in images to improve the performance of the U-Net based change *** detection is fundamental to many computer vision *** existing solutions based on deep neural networks are able to achieve impressive results.
As society progresses, liquid identification plays an increasingly important role in human life. But for now, minority of existing liquid identification solutions on the market can meet daily requirements of being ubi...
详细信息
In this study,we analyzed the performance of an Unmanned Aerial Vehicle(UAV)-based mixed Underwater Power Line Communication-Radio Frequency(UPLC-RF)*** this network,a buoy located at the sea is used as a relay to tra...
详细信息
In this study,we analyzed the performance of an Unmanned Aerial Vehicle(UAV)-based mixed Underwater Power Line Communication-Radio Frequency(UPLC-RF)*** this network,a buoy located at the sea is used as a relay to transmit signals from the underwater signal source to the UAV through the PLC *** assume that the UPLC channel obeys a log-normal distribution and that the RF link follows the Rician *** this model,we obtained the closed-form expressions for the Outage Probability(OP),Average Bit-error-rate(ABER),and Average Channel Capacity(ACC).In addition,the asymptotic analysis of the OP and ABER was performed,and an upper bound for the average capacity was ***,the analytical results were verified by Monte Carlo simulation thereby demonstrating the effect of impulse noise and the altitude of the UAV on network performance.
This paper focuses on the optimal output synchronization control problem of heterogeneous multiagent systems(HMASs) subject to nonidentical communication delays by a reinforcement learning *** with existing studies as...
详细信息
This paper focuses on the optimal output synchronization control problem of heterogeneous multiagent systems(HMASs) subject to nonidentical communication delays by a reinforcement learning *** with existing studies assuming that the precise model of the leader is globally or distributively accessible to all or some of the followers, the leader's precise dynamical model is entirely inaccessible to all the followers in this paper. A data-based learning algorithm is first proposed to reconstruct the leader's unknown system matrix online. A distributed predictor subject to communication delays is further devised to estimate the leader's state, where interaction delays are allowed to be nonidentical. Then, a learning-based local controller, together with a discounted performance function, is projected to reach the optimal output synchronization. Bellman equations and game algebraic Riccati equations are constructed to learn the optimal solution by developing a model-based reinforcement learning(RL) algorithm online without solving regulator equations, which is followed by a model-free off-policy RL algorithm to relax the requirement of all agents' dynamics faced by the model-based RL algorithm. The optimal tracking control of HMASs subject to unknown leader dynamics and communication delays is shown to be solvable under the proposed RL algorithms. Finally, the effectiveness of theoretical analysis is verified by numerical simulations.
Remote sensing (RS) images are frequently observed from multiviews. In this paper, we propose the tensor canonical correlation analysis network (TCCANet) to tackle the multiview RS recognition problem. Particularly, T...
详细信息
A common strategy for Parameter-Efficient Fine-Tuning (PEFT) of pre-trained Vision Transformers (ViTs) involves adapting the model to downstream tasks by learning a low-rank adaptation matrix. This matrix is decompose...
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
Fault diagnosis of rotating machinery driven by induction motors has received increasing attention. Current diagnostic methods, which can be performed on existing inverters or current transformers of three-phase induc...
详细信息
暂无评论