The potential uses of human occupancy detection (HOD) in vehicles are crucial for handling resources, passenger safety, and privacy-preserving technology. In this study, the usage of various sensor systems for non-inv...
详细信息
In real-world applications, sometimes there are uncertainties in the data sets whether from the collection process or from the natural languages. Moreover, the data may come in the form of fuzzy relation. To analyze d...
详细信息
Machine learning-based detection of false data injection attacks (FDIAs) in smart grids relies on labeled measurement data for training and testing. The majority of existing detectors are developed assuming that the a...
详细信息
Machine learning-based detection of false data injection attacks (FDIAs) in smart grids relies on labeled measurement data for training and testing. The majority of existing detectors are developed assuming that the adopted datasets for training have correct labeling information. However, such an assumption is not always valid as training data might include measurement samples that are incorrectly labeled as benign, namely, adversarial data poisoning samples, which have not been detected before. Neglecting such an aspect makes detectors susceptible to data poisoning. Our investigations revealed that detection rates (DRs) of existing detectors significantly deteriorate by up to 9-29% when subject to data poisoning in generalized and topology-specific settings. Thus, we propose a generalized graph neural network-based anomaly detector that is robust against FDIAs and data poisoning. It requires only benign datasets for training and employs an autoencoder with Chebyshev graph convolutional recurrent layers with attention mechanism to capture the spatial and temporal correlations within measurement data. The proposed convolutional recurrent graph autoencoder model is trained and tested on various topologies (from 14, 39, and 118-bus systems). Due to such factors, it yields stable generalized detection performance that is degraded by only 1.6-3.7% in DR against high levels of data poisoning and unseen FDIAs in unobserved topologies. Impact Statement-Artificial Intelligence (AI) systems are used in smart grids to detect cyberattacks. They can automatically detect malicious actions carried out bymalicious entities that falsifymeasurement data within power grids. Themajority of such systems are data-driven and rely on labeled data for model training and testing. However, datasets are not always correctly labeled since malicious entities might be carrying out cyberattacks without being detected, which leads to training on mislabeled datasets. Such actions might degrade the d
Tip-enhanced Raman spectroscopy(TERS)imaging is a super-resolution imaging technique that features the merits of both surface-enhanced Raman spectroscopy(SERS)and scanning probe microscopy(SPM),such as the high chemic...
详细信息
Tip-enhanced Raman spectroscopy(TERS)imaging is a super-resolution imaging technique that features the merits of both surface-enhanced Raman spectroscopy(SERS)and scanning probe microscopy(SPM),such as the high chemical sensitivity from the former and the nanoscale spatial resolution from the *** advantages make TERS an essential nanospectroscopic characterization technique for chemical analysis,materials science,bio-sensing,*** probes,the most critical factor determining the TERS imaging quality,are expected to provide a highly confined electromagnetic hotspot with a minimized scattering background for the generation of Raman signals with high spatial *** two decades of development,numerous probe design concepts have been proposed and *** review provides a comprehensive overview of the state-of-the-art TERS probe designs,from the working mechanism to the practical *** start with reviewing the recent development of TERS configurations and the corresponding working mechanisms,including the SPM platforms,optical excitation/collection techniques,and probe preparation *** then review the emerging novel TERS probe designs,including the remote-excitation probes,the waveguide-based nanofocusing probes,the metal-coated nanofocusing probes,the nanowire-assisted selective-coupling probes,and the tapered metal-insulator-metal *** discussion focuses on a few critical aspects,including the surface-plasmon-polariton(SPP)hotspot excitation technique,conversion efficiency,working frequency,and *** the end,we review the latest TERS applications and give a perspective on the future of TERS.
Single-lead electrocardiographic (ECG) monitoring wearables are becoming candidate technologies for long-term remote monitoring applications. Current wearable disadvantages include high power consumption from computat...
详细信息
作者:
Huang, Po-HsunHsiao, Tzu-Chien
Hsinchu300 Taiwan Nycu
Department of Computer Science College of Cs and Institute of Biomedical Engineering College of Electrical and Computer Engineering Hsinchu300 Taiwan
The determination of appropriate parameters and an appropriate window size in most entropy-based measurements of time-series complexity is a challenging problem. Inappropriate settings can lead to the loss of intrinsi...
详细信息
Dynamic Wireless Charging systems for electric vehicles offers a revolutionary approach to EV charging, enabling vehicles to charge while in motion and overcoming the limitations of stationary wireless charging. Despi...
详细信息
This study designs a microstrip patch antenna with an inverted T-type notch in the partial ground to detect tumorcells inside the human *** size of the current antenna is small enough(18mm×21mm×1.6mm)todistr...
详细信息
This study designs a microstrip patch antenna with an inverted T-type notch in the partial ground to detect tumorcells inside the human *** size of the current antenna is small enough(18mm×21mm×1.6mm)todistribute around the breast *** operating frequency has been observed from6–14GHzwith a minimumreturn loss of−61.18 dB and themaximumgain of current proposed antenna is 5.8 dBiwhich is flexiblewith respectto the size of *** the distribution of eight antennas around the breast phantom,the return loss curveswere observed in the presence and absence of tumor cells inside the breast phantom,and these observations showa sharp difference between the presence and absence of tumor *** simulated results show that this proposedantenna is suitable for early detection of cancerous cells inside the breast.
Data selection can be used in conjunction with adaptive filtering algorithms to avoid unnecessary weight updating and thereby reduce computational overhead. This paper presents a novel correntropy-based data selection...
详细信息
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,...
详细信息
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,manual screening has several limitations,including the propensity for errors,and raises concerns about passenger *** address these drawbacks,researchers have leveraged recent advances in deep learning to design threatsegmentation ***,these models require extensive training data and labour-intensive dense pixelwise annotations and are finetuned separately for each dataset to account for inter-dataset ***,this study proposes a semi-supervised contour-driven broad learning system(BLS)for X-ray baggage security threat instance segmentation referred to as *** research methodology involved enhancing representation learning and achieving faster training capability to tackle severe occlusion and class imbalance using a single training routine with limited baggage *** proposed framework was trained with minimal supervision using resource-efficient image-level labels to localize illegal items in multi-vendor baggage *** specifically,the framework generated candidate region segments from the input X-ray scans based on local intensity transition cues,effectively identifying concealed prohibited items without entire baggage *** multi-convolutional BLS exploits the rich complementary features extracted from these region segments to predict object categories,including threat and benign *** contours corresponding to the region segments predicted as threats were then utilized to yield the segmentation *** proposed C-BLX system was thoroughly evaluated on three highly imbalanced public datasets and surpassed other competitive approaches in baggage-threat segmentation,yielding 90.04%,78.92%,and 59.44%in terms of mIoU on GDXray,SIXray,and Compass-XP,***,the lim
暂无评论