Active metasurfaces are emerging as the core of next-generation optical devices with their tunable optical responses and flat-compact *** for the terahertz band,active metasurfaces have been developed as fascinating d...
详细信息
Active metasurfaces are emerging as the core of next-generation optical devices with their tunable optical responses and flat-compact *** for the terahertz band,active metasurfaces have been developed as fascinating devices for optical chopping and compressive sensing ***,performance regulation by changing the dielectric parameters of the integrated functional materials exhibits severe limitations and parasitic ***,we introduce a C-shape-split-ring-based phase discontinuity metasurface with liquid crystal elastomer as the substrate for infrared modulation of terahertz ***-focused infrared light is applied to manipulate the deflection of the liquid crystal elastomer substrate,enabling controllable and broadband wavefront steering with a maximum output angle change of 22°at *** as another control method is also investigated and compared with infrared *** further demonstrate the performance of liquid crystal elastomer metasurface as a beam steerer,frequency modulator,and tunable beam splitter,which are highly desired in terahertz wireless communication and imaging *** proposed scheme demonstrates the promising prospects of mechanically deformable metasurfaces,thereby paving the path for the development of reconfigurable metasurfaces.
Generally, the inductively coupled plasma-reactive ion etching (ICP-RIE) mesa technology was used to remove p-GaN/MQWs and expose n-GaN for electrical contact in a fabricated micro light-emitting diode (μLED). In thi...
详细信息
We develop algorithms for online linear regression which achieve optimal static and dynamic regret guarantees even in the complete absence of prior knowledge. We present a novel analysis showing that a discounted vari...
We develop algorithms for online linear regression which achieve optimal static and dynamic regret guarantees even in the complete absence of prior knowledge. We present a novel analysis showing that a discounted variant of the Vovk-Azoury-Warmuth forecaster achieves dynamic regret of the form RT(u) ≤ O (d log(T ) ∨ √dPγT (u)T ), where PγT (u) is a measure of variability of the comparator sequence, and show that the discount factor achieving this result can be learned on-the-fly. We show that this result is optimal by providing a matching lower bound. We also extend our results to strongly-adaptive guarantees which hold over every sub-interval [a, b] ⊆ [1, T ] simultaneously. Copyright 2024 by the author(s)
Many cryptocurrency brokers nowadays offer a va-riety of derivative assets that allow traders to perform hedging or speculation. This paper proposes an effective algorithm based on neural networks to take advantage of...
详细信息
One of the most extensively used technologies for improving the security of IoT devices is blockchain *** is a new technology that can be utilized to boost the *** is a decentralized peer-to-peer network with no centr...
详细信息
One of the most extensively used technologies for improving the security of IoT devices is blockchain *** is a new technology that can be utilized to boost the *** is a decentralized peer-to-peer network with no central *** nodes on the network mine or verify the data recorded on the *** is a distributed ledger that may be used to keep track of transactions between several *** one can tamper with the data on the blockchain since it is *** the blocks are connected by hashes,the transaction data is *** is managed by a system that is based on the consensus of network users rather than a central *** immutability and tamper-proof nature of blockchain security is based on asymmetric cryptography and ***,Blockchain has an immutable and tamper-proof smart contract,which is a logic that enforces the Blockchain’s *** is a conflict between the privacy protection needs of cyber-security threat intelligent(CTI)sharing and the necessity to establish a comprehensive attack chain during blockchain *** paper presents a blockchain-based data sharing paradigm that protects the privacy of CTI sharing parties while also preventing unlawful sharing and ensuring the benefit of legitimate sharing *** builds a full attack chain using encrypted threat intelligence and exploits the blockchain’s backtracking capacity to finish the decryption of the threat source in the attack *** contracts are also used to send automatic early warning replies to possible attack *** tests are used to verify the feasibility and efficacy of the suggested model.
Generalizing deep learning for all requires individual self-assessment. However, the quality of ground-truth labels depends on the annotators’ self-awareness. Real-world datasets inevitably experience the Concept Shi...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the challenges of security risks and data analysis *** IIoT grows,cyber-attacks become more diverse and complex,making existing anomaly detection models less effective to *** this paper,an ensemble deep learning model that uses the benefits of the Long Short-Term Memory(LSTM)and the AutoEncoder(AE)architecture to identify out-of-norm activities for cyber threat hunting in IIoT is *** this model,the LSTM is applied to create a model on normal time series of data(past and present data)to learn normal data patterns and the important features of data are identified by AE to reduce data *** addition,the imbalanced nature of IIoT datasets has not been considered in most of the previous literature,affecting low accuracy and *** solve this problem,the proposed model extracts new balanced data from the imbalanced datasets,and these new balanced data are fed into the deep LSTM AE anomaly detection *** this paper,the proposed model is evaluated on two real IIoT datasets-Gas Pipeline(GP)and Secure Water Treatment(SWaT)that are imbalanced and consist of long-term and short-term dependency on *** results are compared with conventional machine learning classifiers,Random Forest(RF),Multi-Layer Perceptron(MLP),Decision Tree(DT),and Super Vector Machines(SVM),in which higher performance in terms of accuracy is obtained,99.3%and 99.7%based on GP and SWaT datasets,***,the proposed ensemble model is compared with advanced related models,including Stacked Auto-Encoders(SAE),Naive Bayes(NB),Projective Adaptive Resonance Theory(PART),Convolutional Auto-Encoder(C-AE),and Package Signatures(PS)based LSTM(PS-LSTM)model.
This paper aims to develop a novel robust multi-dialect end-to-end ASR system with beam search threshold pruning. The efficacy of our proposed model is evaluated using word error rate (WER). Our key contributions are:...
详细信息
Diabetic Retinopathy (DR) is a primary cause of blindness, necessitating early detection and diagnosis. This paper focuses on referable DR classification to enhance the applicability of the proposed method in clinical...
详细信息
This paper presents NDAS (Noise-Decomposed Abnormal Segmentation), an innovative framework for robust medical image retrieval and segmentation. By explicitly decomposing noise and abnormal features, NDAS enhances retr...
详细信息
暂无评论