High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency...
详细信息
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility *** order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client *** enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for *** problem is decoupled into two convex *** to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration *** on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their *** simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.
Medical report generation is crucial for clinical diagnosis and patient management, summarizing diagnoses and recommendations based on medical imaging. However, existing work often overlook the clinical pipeline invol...
详细信息
作者:
Zhang, HaoyuWong, Man-ChungUniversity of Macau
State Key Laboratory of Internet of Things for Smart City Department of Electrical and Computer Engineering Faculty of Science and Technology China
To increase the power density of voltage source converters (VSC) usually use parallel structures. However, parallel VSC will easily introduce circulating current, which can cause a power efficiency decline. This paper...
详细信息
This work demonstrates a high-performance in-cell polarizer adopting photo-aligned azobenzene dyes. On the strength of the multilayered design, a simple fabrication process has been developed to assemble an in-cell po...
详细信息
An approach to developing a thin-film polarizer with high polarization efficiency in liquid crystal cells is presented. The in- cell polarizer facilitates the realization of novel color-conversion liquid crystal displ...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
Automatic Speaker Identification (ASI) is so crucial for security. Current ASI systems perform well in quiet and clean surroundings. However, in noisy situations, the robustness of an ASI system against additive noise...
详细信息
Automatic Speaker Identification (ASI) is so crucial for security. Current ASI systems perform well in quiet and clean surroundings. However, in noisy situations, the robustness of an ASI system against additive noise and interference is a crucial factor. An investigation of the impact of interference on ASI system performance is presented in this paper, which introduces algorithms for achieving high ASI system performance. The objective is to resist the interference of various forms. This paper presents two models for the ASI task in the presence of interference. The first one depends on Normalized Pitch Frequency (NPF) and Mel-Frequency Cepstral Coefficients (MFCCs) as extracted features and Multi-Layer Perceptron (MLP) as a classifier. In this model, we investigate the utilization of a Discrete Transform (DT), such as Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Discrete Sine Transform (DST), to increase the robustness of extracted features against different types of degradation through exploiting the sub-band decomposition characteristics of DWT and the energy compaction property of DCT and DST. This is achieved by extracting features directly from contaminated speech signals in addition to features extracted from discrete transformed signals to create hybrid feature vectors. The enhancement techniques, such as Spectral Subtraction (SS), Winer Filter, and adaptive Wiener filter, are used in a preprocessing stage to eliminate the effect of the interference on the ASI system. In the second model, we investigate the utilization of Deep Learning (DL) based on a Convolutional Neural Network (CNN) with speech signal spectrograms and their Radon transforms to increase the robustness of the ASI system against interference effects. One of this paper goals is to introduce a comparison between the two models and build a more robust ASI system against severe interference. The experimental results indicate that the two proposed models lead to satisfa
With the continuing prosperity of LiDAR markets, the demand of a fast-scanning, high-precision and inexpensive LiDAR system is growing rapidly. In this paper, we disclose a fast-switchable ferroelectric liquid crystal...
详细信息
Electronic ink (E-ink) displays have become increasingly popular in e-books due to their paper-like appearance, readability in direct sunlight, low power consumption, and flexible sizing. However, the slow switching s...
详细信息
暂无评论