Scanning microscopy systems, such as confocal and multiphoton microscopy, are powerful imaging tools for probing deep into biological tissue. However, scanning systems have an inherent trade-off between acquisition ti...
详细信息
We develop a thermodynamic theory that takes into account the synergistic action of multiple components. We compute the optomechanical pressure and find that the type of the nonlinearity involved can lead to different...
详细信息
To solve conservation laws,efficient schemes such as essentially nonoscillatory(ENO)and weighted ENO(WENO)have been introduced to control the Gibbs *** on radial basis functions(RBFs)with the classical WENO-JS weights...
详细信息
To solve conservation laws,efficient schemes such as essentially nonoscillatory(ENO)and weighted ENO(WENO)have been introduced to control the Gibbs *** on radial basis functions(RBFs)with the classical WENO-JS weights,a new type of WENO schemes has been proposed to solve conservation laws[*** et al.,***.,70(2017),pp.551–575].The purpose of this paper is to introduce a new formulation of conservative finite difference RBFWENO schemes to solve conservation *** the usual method for reconstructing the flux functions,the flux function is generated directly with the conservative *** with Guo and Jung(2017),the main advantage of this framework is that arbitrary monotone fluxes can be employed,while in Guo and Jung(2017)only smooth flux splitting can be used to reconstruct flux *** 1D and 2D benchmark problems are prepared to demonstrate the good performance of the new scheme.
Promoting the high penetration of renewable energies like photovoltaic(PV)systems has become an urgent issue for expanding modern power grids and has accomplished several challenges compared to existing distribution *...
详细信息
Promoting the high penetration of renewable energies like photovoltaic(PV)systems has become an urgent issue for expanding modern power grids and has accomplished several challenges compared to existing distribution *** study measures the effectiveness of the Puma optimizer(PO)algorithm in parameter estimation of PSC(perovskite solar cells)dynamic models with hysteresis consideration considering the electric field effects on *** models used in this study will incorporate hysteresis effects to capture the time-dependent behavior of PSCs *** PO optimizes the proposed modified triple diode model(TDM)with a variable voltage capacitor and resistances(VVCARs)considering the hysteresis *** suggested PO algorithm contrasts with other wellknown optimizers from the literature to demonstrate its *** results emphasize that the PO realizes a lower RMSE(Root mean square errors),which proves its capability and efficacy in parameter extraction for the *** statistical results emphasize the efficiency and supremacy of the proposed PO compared to the other well-known competing *** convergence rates show good,fast,and stable convergence rates with lower RMSE via PO compared to the other five competitive ***,the lowermean realized via the PO optimizer is illustrated by the box plot for all optimizers.
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.
One of the key problems of the modern day is the presentation of an identity verification system that can perform sufficient accuracy in identity verification, is resilient to assaults and noises, and can be recorded ...
详细信息
Stochastic gradient descent is one of the most common iterative algorithms used in machine learning and its convergence analysis is a rich area of research. Understanding its convergence properties can help inform wha...
详细信息
Stochastic gradient descent is one of the most common iterative algorithms used in machine learning and its convergence analysis is a rich area of research. Understanding its convergence properties can help inform what modifications of it to use in different settings. However, most theoretical results either assume convexity or only provide convergence results in mean. This paper, on the other hand, proves convergence bounds in high probability without assuming convexity. Assuming strong smoothness, we prove high probability convergence bounds in two settings: (1) assuming the Polyak- Lojasiewicz inequality and norm sub-Gaussian gradient noise and (2) assuming norm sub-Weibull gradient noise. In the second setting, as an intermediate step to proving convergence, we prove a sub-Weibull martingale difference sequence self-normalized concentration inequality of independent interest. It extends Freedman-type concentration beyond the sub-exponential threshold to heavier-tailed martingale difference sequences. We also provide a post-processing method that picks a single iterate with a provable convergence guarantee as opposed to the usual bound for the unknown best iterate. Our convergence result for sub-Weibull noise extends the regime where stochastic gradient descent has equal or better convergence guarantees than stochastic gradient descent with modifications such as clipping, momentum, and normalization.
This paper presents a detailed investigation into the development and assessment of a real-time spectrum analyzer implemented on a 65-nm CMOS Technology Application-Specific Integrated Circuit (ASIC). The analyzer fea...
详细信息
Data lake metadata management is crucial for clearly describing stored data and ensuring efficient search query results, especially for semi-structured and unstructured data. Moreover, high-quality metadata provides t...
详细信息
This paper describes a new approach to the problem of interception of wireless communication channels between the legitimate users. Physical PHY Layer Security (PLS) is new topic enhancing the secrecy performance of a...
详细信息
暂无评论