Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical...
详细信息
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical *** paper analyzes two fundamental failure cases in the baseline AD model and identifies key reasons that limit the recognition accuracy of existing approaches. Specifically, by Case-1, we found that the main reason detrimental to current AD methods is that the inputs to the recovery model contain a large number of detailed features to be recovered, which leads to the normal/abnormal area has not/has been recovered into its original state. By Case-2, we surprisingly found that the abnormal area that cannot be recognized in image-level representations can be easily recognized in the feature-level representation. Based on the above observations, we propose a novel recover-then-discriminate(ReDi) framework for *** takes a self-generated feature map(e.g., histogram of oriented gradients) and a selected prompted image as explicit input information to address the identified in Case-1. Additionally, a feature-level discriminative network is introduced to amplify abnormal differences between the recovered and input representations. Extensive experiments on two widely used yet challenging AD datasets demonstrate that ReDi achieves state-of-the-art recognition accuracy.
Integration of phase-change materials(PCMs)created a unique opportunity to implement reconfigurable photonics devices that their performance can be tuned depending on the target *** PCMs such as Ge-Sb-Te(GST)and Ge-Sb...
详细信息
Integration of phase-change materials(PCMs)created a unique opportunity to implement reconfigurable photonics devices that their performance can be tuned depending on the target *** PCMs such as Ge-Sb-Te(GST)and Ge-Sb-Se-Te(GSST)rely on melt-quench and high temperature annealing processes to change the organization of the molecules in the materials’*** a reorganization leads to different optical,electrical,and thermal properties which can be exploited to implement photonic memory cells that are able to store the data at different resistance or optical transmission *** the great promise of conventional PCMs for realizing reconfigurable photonic memories,their slow and extremely power-hungry thermal mechanisms make scaling the systems based on such devices *** addition,such materials do not offer a stable multi-level response over a long period of *** address these shortcomings,the research carried out in this study shows the proof of concept to implement next-generation photonic memory cells based on two-dimensional(2D)birefringence PCMs such as SnSe,which offer anisotropic optical properties that can be switched *** demonstrate that by leveraging the ultrafast and low-power crystallographic direction change of the material,the optical polarization state of the input optical signal can be *** enables the implementation of next-generation high-speed polarization-encodable photonic memory cells for future photonic computing *** to the conventional PCMs,the proposed SnSe-based photonic memory cells offer an ultrafast switching and low-loss optical response relying on ferroelectric property of SnSe to encode the data on the polarization state of the input optical *** a polarization encoding scheme also reduces memory read-out errors and alleviates the scalability limitations due to the optical insertion loss often seen in optical transmission encoding.
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context ...
详细信息
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context of IoT fog *** suggested framework,called"BlocFogSec",secures key management and data sharing through blockchain consensus and smart *** existing solutions,BlocFogSec utilizes two types of smart contracts for secure key exchange and data sharing,while employing a consensus protocol to validate transactions and maintain blockchain *** process and store data effectively at the network edge,the framework makes use of fog computing,notably reducing latency and raising *** successfully blocks unauthorized access and data breaches by restricting transactions to authorized *** addition,the framework uses a consensus protocol to validate and add transactions to the blockchain,guaranteeing data accuracy and *** compare BlocFogSec's performance to that of other models,a number of simulations are *** simulation results indicate that BlocFogSec consistently outperforms existing models,such as Security Services for Fog Computing(SSFC)and Blockchain-based Key Management Scheme(BKMS),in terms of throughput(up to 5135 bytes per second),latency(as low as 7 ms),and resource utilization(70%to 92%).The evaluation also takes into account attack defending accuracy(up to 100%),precision(up to 100%),and recall(up to 99.6%),demonstrating BlocFogSec's effectiveness in identifying and preventing potential attacks.
Large language models (LLMs) have recently shown remarkable performance in a variety of natural language processing (NLP) *** further explore LLMs'reasoning abilities in solving complex problems,recent research [1...
Large language models (LLMs) have recently shown remarkable performance in a variety of natural language processing (NLP) *** further explore LLMs'reasoning abilities in solving complex problems,recent research [1-3]has investigated chain-of-thought (CoT) reasoning in complex multimodal scenarios,such as science question answering (scienceQA) tasks [4],by fine-tuning multimodal models through human-annotated CoT ***,collected CoT rationales often miss the necessary rea-soning steps and specific expertise.
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of v...
详细信息
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of view,leading to limited performance and increased size and *** particular,simultaneously achieving a wide field of view and large aperture for light collection is desirable but challenging to realize in a compact ***,we demonstrate a wide field of view(greater than 60°)meta-optic doublet eyepiece with an entrance aperture of 2.1 *** the design wavelength of 633 nm,the meta-optic doublet achieves comparable performance to a refractive lens-based eyepiece *** meta-doublet eyepiece illustrates the potential for meta-optics to play an important role in the development of high-quality monochrome near-eye displays and night vision systems.
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b...
详细信息
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection between cyberspace and physical processes results in the exposure of industrial production information to unprecedented security risks. It is imperative to develop suitable strategies to ensure cyber security while meeting basic performance *** the perspective of control engineering, this review presents the most up-to-date results for privacy-preserving filtering,control, and optimization in industrial cyber-physical systems. Fashionable privacy-preserving strategies and mainstream evaluation metrics are first presented in a systematic manner for performance evaluation and engineering *** discussion discloses the impact of typical filtering algorithms on filtering performance, specifically for privacy-preserving Kalman filtering. Then, the latest development of industrial control is systematically investigated from consensus control of multi-agent systems, platoon control of autonomous vehicles as well as hierarchical control of power systems. The focus thereafter is on the latest privacy-preserving optimization algorithms in the framework of consensus and their applications in distributed economic dispatch issues and energy management of networked power systems. In the end, several topics for potential future research are highlighted.
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inher...
详细信息
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inherent biases and computational burdens, especially when used to relax the rank function, making them less effective and efficient in real-world scenarios. To address these challenges, our research focuses on generalized nonconvex rank regularization problems in robust matrix completion, low-rank representation, and robust matrix regression. We introduce innovative approaches for effective and efficient low-rank matrix learning, grounded in generalized nonconvex rank relaxations inspired by various substitutes for the ?0-norm relaxed functions. These relaxations allow us to more accurately capture low-rank structures. Our optimization strategy employs a nonconvex and multi-variable alternating direction method of multipliers, backed by rigorous theoretical analysis for complexity and *** algorithm iteratively updates blocks of variables, ensuring efficient convergence. Additionally, we incorporate the randomized singular value decomposition technique and/or other acceleration strategies to enhance the computational efficiency of our approach, particularly for large-scale constrained minimization problems. In conclusion, our experimental results across a variety of image vision-related application tasks unequivocally demonstrate the superiority of our proposed methodologies in terms of both efficacy and efficiency when compared to most other related learning methods.
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial succe...
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial success [1]. In spite of the steady improvement in efficiency, the interest and enthusiasm in search for new materials and innovative device architectures for newgeneration solar cells have never diminished or subsided;
Self-supervised graph representation learning has recently shown considerable promise in a range of fields, including bioinformatics and social networks. A large number of graph contrastive learning approaches have sh...
详细信息
Self-supervised graph representation learning has recently shown considerable promise in a range of fields, including bioinformatics and social networks. A large number of graph contrastive learning approaches have shown promising performance for representation learning on graphs, which train models by maximizing agreement between original graphs and their augmented views(i.e., positive views). Unfortunately, these methods usually involve pre-defined augmentation strategies based on the knowledge of human experts. Moreover, these strategies may fail to generate challenging positive views to provide sufficient supervision signals. In this paper, we present a novel approach named graph pooling contrast(GPS) to address these *** by the fact that graph pooling can adaptively coarsen the graph with the removal of redundancy, we rethink graph pooling and leverage it to automatically generate multi-scale positive views with varying emphasis on providing challenging positives and preserving semantics, i.e., strongly-augmented view and weakly-augmented view. Then, we incorporate both views into a joint contrastive learning framework with similarity learning and consistency learning, where our pooling module is adversarially trained with respect to the encoder for adversarial robustness. Experiments on twelve datasets on both graph classification and transfer learning tasks verify the superiority of the proposed method over its counterparts.
The growing demand for renewable energy and automation technologies has led to increased interest in solar-powered robotic systems. This work focuses on the design of a solar-powered wire-traversing robot for environm...
详细信息
暂无评论