The use of generative adversarial network(GAN)-based models for the conditional generation of image semantic segmentation has shown promising results in recent ***,there are still some limitations,including limited di...
详细信息
The use of generative adversarial network(GAN)-based models for the conditional generation of image semantic segmentation has shown promising results in recent ***,there are still some limitations,including limited diversity of image style,distortion of detailed texture,unbalanced color tone,and lengthy training *** address these issues,we propose an asymmetric pre-training and fine-tuning(APF)-GAN model.
Hydrogen is now being used as a renewable clean energy *** of the main issues with the application of hydrogen energy is a shortage of security and efficient hydrogen storage ***-based alloys are considered promising ...
详细信息
Hydrogen is now being used as a renewable clean energy *** of the main issues with the application of hydrogen energy is a shortage of security and efficient hydrogen storage ***-based alloys are considered promising hydrogen storage materials,but their comprehensive hydrogen storage properties and cyclic stable performance limit their further practical *** hydrogen storage properties of alloys can be enhanced by substituting transition metal ***,the comprehensive hydrogen storage performance of the Ti0.9Zr0.1Mn0.95Cr0.7V0.2M0.15(M=Fe,Co,Ni,Cu,Mo) alloys was systematically investigated according to the Mn element on the B side is partially replaced by variety of transition metal *** M=Ni alloy,which showed the highest hydrogen storage capacity among the group of alloys,was used to explore cycle *** plateau pressures of the series alloys decreased in order,Fe>Co>Ni>Cu>*** of hydrogen absorption kinetics,all of the alloys can reach full hydrogen absorption saturation within 400 s at 303 *** Ti0.9Zr0.1Mn0.95Cr0.7V0.2Mo0.15alloy possessed the fastest hydrogen absorption kinetic rate(t0.9=65 s) and the smallest hysteresis *** suggests that the substitution of Mo elements is effective in improving the hysteresis of the Laves phase *** the series of alloys,the M=Ni alloy exhibited the best overall hydrogen storage performance,which hydrogen storage capacity can reach 1.81 wt% and 97% of its capacity is kept after 100 cycles.
Cloud Computing (CC) is widely adopted in sectors like education, healthcare, and banking due to its scalability and cost-effectiveness. However, its internet-based nature exposes it to cyber threats, necessitating ad...
详细信息
This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown *** takes individua...
详细信息
This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown *** takes individual discrepancies into consideration and can handle unknown faults with incomplete *** experiment results demonstrate high DSA accuracy and computational efficiency of the proposed RTL *** analysis shows RTL can guarantee system performance.
While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious *** address the issues of traditional machine learning methods re...
详细信息
While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious *** address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic,we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features,called BERT-based Spatio-Temporal Features Network(BSTFNet).At the packet-level granularity,the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers(BERT)*** the byte-level granularity,we initially employ the Bidirectional Gated Recurrent Unit(BiGRU)model to extract temporal features from bytes,followed by the utilization of the Text Convolutional Neural Network(TextCNN)model with multi-sized convolution kernels to extract local multi-receptive field spatial *** fusion of features from both granularities serves as the ultimate multidimensional representation of malicious *** approach achieves accuracy and F1-score of 99.39%and 99.40%,respectively,on the publicly available USTC-TFC2016 dataset,and effectively reduces sample confusion within the Neris and Virut *** experimental results demonstrate that our method has outstanding representation and classification capabilities for encrypted malicious traffic.
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ...
详细信息
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of the electronic spectrum auction network environment,the security of spectrum auction can not be *** scholars focus on researching the security of the single-sided auctions,while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and *** begin to design the secure double spectrum auction mechanisms,in which two semi-honest agents are introduced to finish the spectrum auction *** these two agents may collude with each other or be bribed by buyers and sellers,which may create security risks,therefore,a secure double spectrum auction is proposed in this *** traditional secure double spectrum auctions,the spectrum auction server with Software Guard Extensions(SGX)component is used in this paper,which is an Ethereum blockchain platform that performs spectrum auctions.A secure double spectrum protocol is also designed,using SGX technology and cryptographic tools such as Paillier cryptosystem,stealth address technology and one-time ring signatures to well protect the private information of spectrum *** addition,the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification,and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum ***,security analysis and performance evaluation of our protocol are discussed.
This paper focuses on the finite-time control(FTC) of the composite formation consensus(CFC)problems for multi-robot systems(MRSs). The CFC problems are firstly proposed for MRSs under the complex network topology of ...
详细信息
This paper focuses on the finite-time control(FTC) of the composite formation consensus(CFC)problems for multi-robot systems(MRSs). The CFC problems are firstly proposed for MRSs under the complex network topology of cooperative or cooperative-competitive networks. Regarding the problems of FTC and CFC on multiple Lagrange systems(MLSs), coupled sliding variables are introduced to deal with the robustness and consistent convergence. Then, the adaptive finite-time protocols are given based on the displacement approaches. With the premised FTC, tender-tracking methods are further developed for the problems of tracking information disparity. Stability analyses of those MLSs mentioned above are clarified with Lyapunov candidates considering the coupled sliding vectors, which provide new verification for tender-tracking systems. Under the given coupled-sliding-variable-based finite-time protocols, MLSs distributively adjust the local formation error to achieve global CFC and perform uniform convergence in time-varying tracking. Finally, simulation experiments are conducted while providing practical solutions for the theoretical results.
To enhance the capability of classifying and localizing defects on the surface of hot-rolled strips, this paper proposed an algorithm based on YOLOv7 to improve defect detection. The BI-SPPFCSPC structure was incorpor...
详细信息
With the development of information technology and cloud computing,data sharing has become an important part of scientific *** traditional data sharing,data is stored on a third-party storage platform,which causes the...
详细信息
With the development of information technology and cloud computing,data sharing has become an important part of scientific *** traditional data sharing,data is stored on a third-party storage platform,which causes the owner to lose control of the *** a result,there are issues of intentional data leakage and tampering by third parties,and the private information contained in the data may lead to more significant ***,data is frequently maintained on multiple storage platforms,posing significant hurdles in terms of enlisting multiple parties to engage in data sharing while maintaining *** this work,we propose a new architecture for applying blockchains to data sharing and achieve efficient and reliable data sharing among heterogeneous *** design a new data sharing transaction mechanism based on the system architecture to protect the security of the raw data and the processing *** also design and implement a hybrid concurrency control protocol to overcome issues caused by the large differences in blockchain performance in our system and to improve the success rate of data sharing *** took Ethereum and Hyperledger Fabric as examples to conduct crossblockchain data sharing *** results show that our system achieves data sharing across heterogeneous blockchains with reasonable performance and has high scalability.
The exponential growth of IoT devices has led to the proposal of edge computing for data processing. The decentralized nature of edge computing servers and IoT devices makes blockchain ideal for connecting IoT users a...
详细信息
暂无评论