The rapid advancement of electric vehicles (EVs) offers a significant reduction in carbon emissions by replacing fossil fuels with more sustainable energy sources. This paper studies wireless charging technology for E...
详细信息
To accommodate the wide range of input voltages supplied by redundant batteries and ensure an adequate hold-up time for communication systems during utility power failures, power supplies used in 5 G base stations typ...
详细信息
OpenAI and ChatGPT, as state-of-the-art languagemodels driven by cutting-edge artificial intelligence technology,have gained widespread adoption across diverse industries. In the realm of computer vision, these models...
详细信息
OpenAI and ChatGPT, as state-of-the-art languagemodels driven by cutting-edge artificial intelligence technology,have gained widespread adoption across diverse industries. In the realm of computer vision, these models havebeen employed for intricate tasks including object recognition, image generation, and image processing, leveragingtheir advanced capabilities to fuel transformative breakthroughs. Within the gaming industry, they have foundutility in crafting virtual characters and generating plots and dialogues, thereby enabling immersive and interactiveplayer experiences. Furthermore, these models have been harnessed in the realm of medical diagnosis, providinginvaluable insights and support to healthcare professionals in the realmof disease detection. The principal objectiveof this paper is to offer a comprehensive overview of OpenAI, OpenAI Gym, ChatGPT, DALL E, stable diffusion,the pre-trained clip model, and other pertinent models in various domains, encompassing CLIP Text-to-Image,education, medical imaging, computer vision, social influence, natural language processing, software development,coding assistance, and Chatbot, among others. Particular emphasis will be placed on comparative analysis andexamination of popular text-to-image and text-to-video models under diverse stimuli, shedding light on thecurrent research landscape, emerging trends, and existing challenges within the domains of OpenAI and *** a rigorous literature review, this paper aims to deliver a professional and insightful overview of theadvancements, potentials, and limitations of these pioneering language models.
Deep neural networks have shown promising results in the classification of skin lesion images, particularly when they focus on the most significant regions of an image. However, the identification of melanoma continue...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
Modulation depth and its associated loss pose a significant challenge in electro-optical telecommunication systems. Optimal modulators strive to enhance modulation depth while minimizing loss rates. We propose a high-...
详细信息
High penetration of renewable energy sources(RESs)induces sharply-fluctuating feeder power,leading to volt-age deviation in active distribution *** prevent voltage violations,multi-terminal soft open points(M-sOPs)hav...
详细信息
High penetration of renewable energy sources(RESs)induces sharply-fluctuating feeder power,leading to volt-age deviation in active distribution *** prevent voltage violations,multi-terminal soft open points(M-sOPs)have been integrated into the distribution systems to enhance voltage con-trol ***,the M-SOP voltage control recalculated in real time cannot adapt to the rapid fluctuations of photovol-taic(PV)power,fundamentally limiting the voltage controllabili-ty of *** address this issue,a full-model-free adaptive graph deep deterministic policy gradient(FAG-DDPG)model is proposed for M-SOP voltage ***,the attention-based adaptive graph convolutional network(AGCN)is lever-aged to extract the complex correlation features of nodal infor-mation to improve the policy learning ***,the AGCN-based surrogate model is trained to replace the power flow cal-culation to achieve model-free ***,the deep deterministic policy gradient(DDPG)algorithm allows FAG-DDPG model to learn an optimal control strategy of M-SOP by continuous interactions with the AGCN-based surrogate *** tests have been performed on modified IEEE 33-node,123-node,and a real 76-node distribution systems,which demonstrate the effectiveness and generalization ability of the proposed FAG-DDPGmodel.
In this paper,we present a Deep Neural Network(DNN)based framework that employs Radio Frequency(RF)hologram tensors to locate multiple Ultra-High Frequency(UHF)passive Radio-Frequency Identification(RFID)*** RF hologr...
详细信息
In this paper,we present a Deep Neural Network(DNN)based framework that employs Radio Frequency(RF)hologram tensors to locate multiple Ultra-High Frequency(UHF)passive Radio-Frequency Identification(RFID)*** RF hologram tensor exhibits a strong relationship between observation and spatial location,helping to improve the robustness to dynamic environments and *** RFID data is often marred by noise,we implement two types of deep neural network architectures to clean up the RF hologram *** the spatial relationship between tags,the deep networks effectively mitigate fake peaks in the hologram tensors resulting from multipath propagation and phase *** contrast to fingerprinting-based localization systems that use deep networks as classifiers,our deep networks in the proposed framework treat the localization task as a regression problem preserving the ambiguity between *** also present an intuitive peak finding algorithm to obtain estimated locations using the sanitized hologram *** proposed framework is implemented using commodity RFID devices,and its superior performance is validated through extensive experiments.
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanism...
详细信息
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only.
暂无评论