Recently,intelligent reflecting surfaces(IRSs)have emerged as potential candidates for overcoming the line-of-sight issue in 5 G/6 G wireless *** IRSs can manipulate the direction of reflected beams,enabling efficient...
详细信息
Recently,intelligent reflecting surfaces(IRSs)have emerged as potential candidates for overcoming the line-of-sight issue in 5 G/6 G wireless *** IRSs can manipulate the direction of reflected beams,enabling efficient beam steering to enhance the performance of wireless *** unit cell(or unit structure)of an IRS commonly consists of electrical elements for phase ***,by employing phase modulation alone,an IRS can steer the reflected electromagnetic waves toward only discrete and specific angles,leaving a wide range of out-of-beam *** this work,an IRS that uses both phase modulation and space modulation is presented to improve the beam resolution and continuously cover out-of-beam areas that phase modulation alone cannot address.A positive-intrinsic-negative diode is mounted on a unit cell for phase modulation,and a 4D-printed reconfigured structure is fabricated to demonstrate space *** beam-steering function is achieved by alternating the states of the diodes in the same columns,while the beam resolution is improved by controlling the gaps between the *** functions are frst theoretically and numerically analyzed and then experimentally verified,demonstrating that additional angles of-46°/+50°,-22°/+14°,and -16°/+12°are achieved with space modulation and -60°/+62°,-30°/+22°,and±16°are achieved by phase modulation *** proposed IRS offers the possibility of functional integration in a variety of indoor applications within the wireless communication field.
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Rec...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Recognition(HAR)***,the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained *** paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain,which reduces the model’s depth and accelerates activity *** traditional pruning methods that focus on the spatial domain and the importance of filters,this method converts sensor data,such as HAR data,to the frequency domain for *** emphasizes the low-frequency components by calculating their energy spectral density ***,filters that meet the predefined thresholds are retained,and redundant filters are removed,leading to a significant reduction in model size without compromising performance or incurring additional computational ***,the proposed algorithm’s effectiveness is empirically validated on a standard five-layer CNNs backbone *** computational feasibility and data sensitivity of the proposed scheme are thoroughly ***,the classification accuracy on three benchmark HAR datasets UCI-HAR,WISDM,and PAMAP2 reaches 96.20%,98.40%,and 92.38%,***,our strategy achieves a reduction in Floating Point Operations(FLOPs)by 90.73%,93.70%,and 90.74%,respectively,along with a corresponding decrease in memory consumption by 90.53%,93.43%,and 90.05%.
In this paper,a combined robust fault detection and isolation scheme is studied for satellite system subject to actuator faults,external disturbances,and parametric *** proposed methodology incorporates a residual gen...
详细信息
In this paper,a combined robust fault detection and isolation scheme is studied for satellite system subject to actuator faults,external disturbances,and parametric *** proposed methodology incorporates a residual generation module,including a bank of filters,into an intelligent residual evaluation ***,residual filters are designed based on an improved nonlinear differential algebraic approach so that they are not affected by external *** residual evaluation module is developed based on the suggested series and parallel ***,a new ensemble classification scheme defined as blended learning integrates heterogeneous classifiers to enhance the performance.A wide range of simulations is carried out in a high-fidelity satellite simulator subject to the constant and time-varying actuator faults in the presence of disturbances,manoeuvres,uncertainties,and *** obtained results demonstrate the effectiveness of the proposed robust fault detection and isolation method compared to the traditional nonlinear differential algebraic approach.
Topology is usually perceived intrinsically immutable for a given *** argue that optical topologies do not immediately enjoy such ***'optical skyrmions'as an example,we show that they will exhibit varying text...
详细信息
Topology is usually perceived intrinsically immutable for a given *** argue that optical topologies do not immediately enjoy such ***'optical skyrmions'as an example,we show that they will exhibit varying textures and topological invariants(skyrmion numbers),depending on how to construct the skyrmion vector when projecting from real to parameter *** demonstrate the fragility of optical skyrmions under a ubiquitous scenario-simple reflection off an optical *** topology is not without benefit,but it must not be assumed.
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanism...
详细信息
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only.
Over the past two decades, the rise in video streaming has been driven by internet accessibility and the demand for high-quality video. To meet this demand across varying network speeds and devices, transcoding is ess...
详细信息
The significance of precise energy usage forecasts has been highlighted by the increasing need for sustainability and energy efficiency across a range of *** order to improve the precision and openness of energy consu...
详细信息
The significance of precise energy usage forecasts has been highlighted by the increasing need for sustainability and energy efficiency across a range of *** order to improve the precision and openness of energy consumption projections,this study investigates the combination of machine learning(ML)methods with Shapley additive explanations(SHAP)*** study evaluates three distinct models:the first is a Linear Regressor,the second is a Support Vector Regressor,and the third is a Decision Tree Regressor,which was scaled up to a Random Forest Regressor/Additions made were the third one which was Regressor which was extended to a Random Forest *** models were deployed with the use of Shareable,Plot-interpretable Explainable Artificial Intelligence techniques,to improve trust in the *** findings suggest that our developedmodels are superior to the conventional models discussed in prior studies;with high Mean Absolute Error(MAE)and Root Mean Squared Error(RMSE)values being close to *** detail,the Random Forest Regressor shows the MAE of 0.001 for predicting the house prices whereas the SVR gives 0.21 of MAE and 0.24 *** outcomes reflect the possibility of optimizing the use of the promoted advanced AI models with the use of Explainable AI for more accurate prediction of energy consumption and at the same time for the models’decision-making procedures’*** addition to increasing prediction accuracy,this strategy gives stakeholders comprehensible insights,which facilitates improved decision-making and fosters confidence in AI-powered energy *** outcomes show how well ML and SHAP work together to enhance prediction performance and guarantee transparency in energy usage projections.
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
Cloud computing is an emerging field in information technology, enabling users to access a shared pool of computing resources. Despite its potential, cloud technology presents various challenges, with one of the most ...
详细信息
暂无评论