With the development of artificial intelligence,neural network provides unique opportunities for holography,such as high fidelity and dynamic *** to obtain real 3D scene and generate high fidelity hologram in real tim...
详细信息
With the development of artificial intelligence,neural network provides unique opportunities for holography,such as high fidelity and dynamic *** to obtain real 3D scene and generate high fidelity hologram in real time is an urgent ***,we propose a liquid lens based holographic camera for real 3D scene hologram acquisition using an end-to-end physical model-driven network(EEPMD-Net).As the core component of the liquid camera,the first 10 mm large aperture electrowetting-based liquid lens is proposed by using specially fabricated *** design of the liquid camera ensures that the multi-layers of the real 3D scene can be obtained quickly and with great imaging *** EEPMD-Net takes the information of real 3D scene as the input,and uses two new structures of encoder and decoder networks to realize low-noise phase *** comparing the intensity information between the reconstructed image after depth fusion and the target scene,the composite loss function is constructed for phase optimization,and the high-fidelity training of hologram with true depth of the 3D scene is realized for the first *** holographic camera achieves the high-fidelity and fast generation of the hologram of the real 3D scene,and the reconstructed experiment proves that the holographic image has the advantage of low *** proposed holographic camera is unique and can be used in 3D display,measurement,encryption and other fields.
The concept of the digital twin,also known colloquially as the DT,is a fundamental principle within Industry 4.0 *** recent years,the concept of digital siblings has generated considerable academic and practical ***,a...
详细信息
The concept of the digital twin,also known colloquially as the DT,is a fundamental principle within Industry 4.0 *** recent years,the concept of digital siblings has generated considerable academic and practical ***,academia and industry have used a variety of interpretations,and the scientific literature lacks a unified and consistent definition of this *** purpose of this study is to systematically examine the definitional landscape of the digital twin concept as outlined in scholarly literature,beginning with its origins in the aerospace domain and extending to its contemporary interpretations in the manufacturing ***,this investigationwill focus on the research conducted on Industry 4.0 and smartmanufacturing,elucidating the diverse applications of digital twins in fields including aerospace,intelligentmanufacturing,intelligent transportation,and intelligent cities,among others.
This paper proposes a coordinated frequency control scheme for emergency frequency regulation of isolated power systems with a high penetration of wind *** proposed frequency control strategy is based on the novel non...
详细信息
This paper proposes a coordinated frequency control scheme for emergency frequency regulation of isolated power systems with a high penetration of wind *** proposed frequency control strategy is based on the novel nonlinear regulator theory,which takes advantage of nonlinearity of doubly fed induction generators(DFIGs)and generators to regulate the frequency of the power *** deviations and power imbalances are used to design nonlinear feedback controllers that achieve the reserve power distribution between generators and DFIGs,in various wind speed *** effectiveness and dynamic performance of the proposed nonlinear coordinated frequency control method are validated through simulations in an actual isolated power grid.
AC optimal power flow (AC OPF) is a fundamental problem in power system operations. Accurately modeling the network physics via the AC power flow equations makes AC OPF a challenging nonconvex problem. To search for g...
详细信息
Topology is usually perceived intrinsically immutable for a given *** argue that optical topologies do not immediately enjoy such ***'optical skyrmions'as an example,we show that they will exhibit varying text...
详细信息
Topology is usually perceived intrinsically immutable for a given *** argue that optical topologies do not immediately enjoy such ***'optical skyrmions'as an example,we show that they will exhibit varying textures and topological invariants(skyrmion numbers),depending on how to construct the skyrmion vector when projecting from real to parameter *** demonstrate the fragility of optical skyrmions under a ubiquitous scenario-simple reflection off an optical *** topology is not without benefit,but it must not be assumed.
In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image ***,there has been limited research on combining deep learning neural networks with chaotic mappi...
详细信息
In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image ***,there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital ***,this paper addresses this gap by studying the generation of pseudo-random sequences(PRS)chaotic signals using dual logistic chaotic *** signals are then predicted using long and short-term memory(LSTM)networks,resulting in the reconstruction of a new chaotic *** the research process,it was discovered that there are numerous training parameters associated with the LSTM network,which can hinder training *** overcome this challenge and improve training efficiency,the paper proposes an improved particle swarm optimization(IPSO)algorithm to optimize the LSTM ***,the obtained chaotic signal from the optimized model training is further scrambled,obfuscated,and diffused to achieve the final encrypted *** research presents a digital image encryption(DIE)algorithm based on a double chaotic map(DCM)and *** algorithm demonstrates a high average NPCR(Number of Pixel Change Rate)of 99.56%and a UACI(Unified Average Changing Intensity)value of 33.46%,indicating a strong ability to resist differential ***,the proposed algorithm realizes secure and sensitive digital image encryption,ensuring the protection of personal information in the Internet environment.
Off-axis digital holography plays a crucial role in high-precision three-dimensional imaging. However, high-resolution phase images are often affected by the limited pixel size of the sensor. To address this issue, th...
详细信息
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least t...
详细信息
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least two ***, the performance of FedRecs is compromised due to highly sparse on-device data for each client. Second, the system's robustness is undermined by the vulnerability to model poisoning attacks launched by malicious users. In this paper, we introduce a novel contrastive learning framework designed to fully leverage the client's sparse data through embedding augmentation, referred to as CL4FedRec. Unlike previous contrastive learning approaches in FedRecs that necessitate clients to share their private parameters, our CL4FedRec aligns with the basic FedRec learning protocol, ensuring compatibility with most existing FedRec implementations. We then evaluate the robustness of FedRecs equipped with CL4FedRec by subjecting it to several state-of-the-art model poisoning attacks. Surprisingly, our observations reveal that contrastive learning tends to exacerbate the vulnerability of FedRecs to these attacks. This is attributed to the enhanced embedding uniformity, making the polluted target item embedding easily proximate to popular items. Based on this insight, we propose an enhanced and robust version of CL4FedRec(rCL4FedRec) by introducing a regularizer to maintain the distance among item embeddings with different popularity levels. Extensive experiments conducted on four commonly used recommendation datasets demonstrate that rCL4FedRec significantly enhances both the model's performance and the robustness of FedRecs.
The adversarial wiretap channel of type II (AWTC-II) is a communication channel that can a) read a fraction of the transmitted symbols up to a given bound and b) induce both errors and erasures in a fraction of the sy...
详细信息
This paper investigates guesswork over ordered statistics and formulates the achievable guesswork complexity of ordered statistics decoding (OSD) in binary additive white Gaussian noise (AWGN) channels. The achievable...
详细信息
暂无评论