Cybersecurity has become a significant concern for automotive manufacturers as modern cars increasingly incorporate electronic components. Electronic Control Units (ECUs) have evolved to become the central control uni...
详细信息
Integrating MEMS devices with electronic textiles (E-Textiles) and fabrics requires an understanding of how these devices interact with circuit components in different operating conditions. In this paper, we character...
详细信息
We show that multi-GeV laser wakefield electron accelerators in meter-scale, low density hydrodynamic plasma waveguides operate in a new nonlinear propagation regime dominated by sustained beating of lowest order mode...
详细信息
We show that multi-GeV laser wakefield electron accelerators in meter-scale, low density hydrodynamic plasma waveguides operate in a new nonlinear propagation regime dominated by sustained beating of lowest order modes of the ponderomotively modified channel; this occurs whether or not the injected pulse is linearly matched to the guide. For a continuously doped gas jet, this emergent mode beating effect leads to axially modulated enhancement of ionization injection and a multi-GeV energy spectrum of multiple quasimonoenergetic peaks; the same process in a locally doped jet produces single multi-GeV peaks with <10% energy spread. A three-stage model of drive laser pulse evolution and ionization injection characterizes the beating effect and explains our experimental results.
The amount of data that we retrieve and use every day is increasing rapidly. As data naturally exist in different data domains, the number of data domains that we retrieve and use every day has also increased as a res...
详细信息
Given a graph G (V, E) having vertices as points in the two-dimensional Euclidean space and edge-weights representing the Euclidean distances between those vertices, the Euclidean Leaf-Constrained Minimum Spanning Tre...
详细信息
We report measurements of the ratio of the scalar polarizability α to the vector polarizability β for the 6sS1/22→7sS1/22 transition in atomic cesium. These measurements are motivated by a discrepancy between the v...
详细信息
We report measurements of the ratio of the scalar polarizability α to the vector polarizability β for the 6sS1/22→7sS1/22 transition in atomic cesium. These measurements are motivated by a discrepancy between the values of the vector transition polarizability as determined using two separate methods. In the present measurement, we use a two-pathway, coherent-control technique in which we observe the interference between a two-photon interaction driven by infrared light at 1079 nm and a linear Stark-induced interaction driven by the mutually coherent second harmonic of this infrared beam at 540 nm. The result of our measurements is α/β=−9.902(9), in good agreement with the previous determination of this ratio. This measurement, critical to the study of atomic parity violation in cesium, does not reduce the discrepancy between the two methods for the determination of the vector polarizability β for this transition.
We propose a novel framework for incorporating unlabeled data into semi-supervised classification problems, where scenarios involving the minimization of either i) adversarially robust or ii) non-robust loss functions...
详细信息
This paper adopts Arimoto's α -Mutual Information as a tunable privacy measure, in a privacy-preserving data release setting that aims to prevent disclosing private data to adversaries. By fine-tuning the privacy...
详细信息
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)*** functional advantages of IoV include online communication services,accident preventi...
详细信息
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)*** functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic *** these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle *** paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection systems in the Internet of Vehicles(IDS-IoV)based on anomaly ***-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by *** systems can autonomously create specific models based on network data to differentiate between regular traffic and *** these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational *** evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and *** review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV *** examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.
Inductive wireless power transfer (WPT) faces significant challenges in achieving high efficiency and stable output power for charging mobile devices like EVs. Using circular pads (CP) as the transmitter (Tx) and rece...
详细信息
暂无评论