We investigate resource allocation for quantum entanglement distribution over an optical network. We characterize and model a network architecture that employs a single broadband quasi-deterministic time-frequency her...
详细信息
Aiming at realizing high-efficiency distributed strain sensing through optical frequency domain reflectometry (OFDR), this paper introduces a fast demodulation algorithm to determine strain-induced spectral shifts fro...
详细信息
This paper aims to develop a novel robust multi-dialect end-to-end ASR system with beam search threshold pruning. The efficacy of our proposed model is evaluated using word error rate (WER). Our key contributions are:...
详细信息
The permanent magnet (PM) Vernier machines enhance torque density and decrease cogging torque compared to conventional permanent magnet synchronous motor. This paper presents a novel fractional-slot H-shaped PM Vernie...
详细信息
Electromagnetic radiation (EMR) exposure from fifth-generation (5G) mobile technology influences human health. This article proposes a numerical analysis to investigate the specific absorption rate (SAR) using an anat...
详细信息
Electromagnetic radiation (EMR) exposure from fifth-generation (5G) mobile technology influences human health. This article proposes a numerical analysis to investigate the specific absorption rate (SAR) using an anatomical human head and accurate dipole model to examine the EMR effect at 700 MHz, a low-band frequency for 5G mobile communication. A three-dimensional (3D) digital model of a realistic human head is reconstructed using a series of magnetic resonance imaging (MRI) scans. This model encompasses various tissue types with their respective bio-material properties. The radiation from a mobile terminal is modeled using a dipole-based structure. In this study, the Unsplit-Field Finite-Difference Time-Domain (UF-FDTD) algorithm is modified for numerical analysis, with a perfectly matched layer (PML) serving as the boundary condition. The electromagnetic (EM) simulation is conducted to study the interaction between the two computational objects in the artificial absorbing environment. The Yee cell is utilized for a structured lattice in the UF-FDTD approach, characterized by its uniformity and consistent application throughout the model. The research problem involves correlating the size of the human head model with the unit cell size, which is associated with the average weight of the human brain for adults. The Yee cell is optimized based on the Courant-Friedrichs-Lewy (CFL) condition. This work enhances simulation accuracy twofold. First, the optimization of the unit cell size relative to the wavelength is refined in comparison to other unit cells without a phase error. This optimization leads to an accurate time-step parameter via the CFL criterion, ensuring the stability of the computer simulation. Second, the optimized grid structure of the UF-FDTD algorithm closely approximates the infinitesimal feeding gap, ensuring precise alignment with the exact dimensions of the feed-gap point in the dipole antenna configuration and accurately reflecting the effects
This article addresses the velocity-free predefined-time consensus tracking for multiagent systems (MASs) with input and output quantization via adaptive sliding mode control (SMC). First, a distributed predefined-tim...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
Leakage of private information in machine learning models can lead to breaches of confidentiality, identity theft, and unauthorized access to personal data. Ensuring the safe and trustworthy deployment of AI systems n...
详细信息
DeepFakes and face image manipulation methods have been widely distributed in the last few years and several techniques have been presented to check the authenticity of the face image and detect manipulation if exists...
详细信息
In this manuscript, an American Zebra Optimization Algorithm (AZOA) is proposed for minimising torque-ripple in an 8/6 switched reluctance motor (SRM) drive. The major objective of the proposed technique is to improve...
详细信息
暂无评论