This paper devotes to combine the chirp basis function transformation and symplectic coordinates transformation to yield a novel Wigner distribution (WD) associated with the linear canonical transform (LCT), named as ...
详细信息
To diagnose breast cancer, an alternative approach to X-ray mammography and B-mode ultrasound is the Breast Ultrasound Computed Tomography (UCT). Concerning breast cancer detection, mammographic techniques have been c...
详细信息
Subcellular localization of proteins can provide key hints to infer their functions and structures in cells. With the breakthrough of recent molecule imaging techniques, the usage of 2D bioimages has become increasing...
详细信息
Subcellular localization of proteins can provide key hints to infer their functions and structures in cells. With the breakthrough of recent molecule imaging techniques, the usage of 2D bioimages has become increasingly popular in automatically analyzing the protein subcellular location pat- terns. Compared with the widely used protein 1D amino acid sequence data, the images of protein distribution are more intuitive and interpretable, making the images a better choice at many applications for revealing the dynamic char- acteristics of proteins, such as detecting protein translocation and quantification of proteins. In this paper, we systemati- cally reviewed the recent progresses in the field of automated image-based protein subcellular location prediction, and clas- sified them into four categories including growing of bioim- age databases, description of subcellular location distribution patterns, classification methods, and applications of the pre- diction systems. Besides, we also discussed some potential directions in this field.
Labor division provides an adaptive and scalable technique for unmanned systems. However, its designing process usually relies heavily on the manually crafted paradigms, leading to inefficiencies and insufficient perf...
Labor division provides an adaptive and scalable technique for unmanned systems. However, its designing process usually relies heavily on the manually crafted paradigms, leading to inefficiencies and insufficient performance. To overcome these challenges, this paper introduce an evolutionary approach to labor division algorithm design. Drawing inspiration from the regulatory behaviors observed in natural lion populations, we propose a bipolar feedback-guided attraction–repulsion mechanism. A formal model is developed to encapsulate this mechanism, and we provide an in-depth analysis of the algorithm’s evolution through the framework of systems science. In addition, we leverage prompt engineering techniques to integrate a large language model (LLM) with our proposed mechanism, facilitating a bidirectional enhancement between the two. This integration culminates in the development of the ARE-LLM framework, a robust and adaptive solution for designing labor division algorithms. To demonstrate the practical applicability of our approach, we apply the ARE-LLM framework to the UAV-based task allocation problem for enemy air defense suppression. The experimental results indicate that our method outperforms several advanced approaches. In a scenario involving 50 UAVs tasked with completing 300 assignments, the total distance traveled is only 9 % of that required by the ALPDA algorithm, while the processing time is reduced to 8 % of that used by ALPDA.
In real-world applications, models often encounter a sequence of unlabeled new tasks, each containing unknown classes. This paper explores class-incremental novel class discovery (class-iNCD), which requires maintaini...
详细信息
This study proposes a motion cue based pedestrian detection method with two-trame-filtering (Tff) for video surveillance. The novel motion cue is exploited by the gray value variation between two frames. Then Tff pr...
详细信息
This study proposes a motion cue based pedestrian detection method with two-trame-filtering (Tff) for video surveillance. The novel motion cue is exploited by the gray value variation between two frames. Then Tff processing filters the gradient magnitude image by the variation map. Summa- tions of the Tff gradient magnitudes in cells are applied to train a pre-deteetor to exclude most of the background regions. Histogram of Tff oriented gradient (HTffOG) feature is proposed for pedestrian detection. Experimental results show that this method is effective and suitable for real-time surveil- lance applications.
This paper presents a novel approach to compute DCT-I, DCT-III, and DCT-IV. By using a modular mapping and truncating, DCTs are approximated by linear sums of discrete moments computed fast only through additions. Thi...
详细信息
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke...
详细信息
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.
Column Generation (CG) technique is popularly applied in solving the crew scheduling problem of large size, which is generally modeled as an Integer Linear Programming (ILP) problem. The traditional CG algorithms for ...
详细信息
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d...
详细信息
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control *** quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion ***,we design an energy controller to dynamically adjust the system energy changes caused by unknown *** designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping ***,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack *** addition,this secure control method is simple to implement because it avoids complicated mathematical *** effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor.
暂无评论