Graph pattern matching is a technique widely used in various fields such as protein structure analysis, social group querying, and expert localization. This technique involves finding matching subgraphs in large socia...
详细信息
Novel orange-red Sr_(2)GdSbO_(6):xEu^(3+)(x=0,0.05,0.1,0.2,0.3,0.4,0.5 and 0.6) phospho rs were successfully prepared by the traditional high-temperature solid-state *** results of Rietveld refinement,energy dispersiv...
详细信息
Novel orange-red Sr_(2)GdSbO_(6):xEu^(3+)(x=0,0.05,0.1,0.2,0.3,0.4,0.5 and 0.6) phospho rs were successfully prepared by the traditional high-temperature solid-state *** results of Rietveld refinement,energy dispersive spectroscopy(EDS) spectrum and elemental mapping demonstrate that Eu^(3+) successfully replaces the Gd^(3+) sites and distributes uniformly in the particles of *** luminescence properties of Sr_(2)GdSbO_(6):Eu_(3+)phosphors were investigated in *** emission spectra of the strongest emission peak is the ^(5)D_(0)→^(7)F_(1)(593 nm) transition,which can emit orange-red light under393 nm *** the doping concentration of Eu3+ions is x=0.2,the luminescence intensity of the phosphors reaches the *** detailed mechanism of concentration quenching is attributed to dipole-dipole *** thermal stability values of Sr_(2)GdSbO_(6):0.2Eu^(3+) phosphors are 87%,82% and114% under 393,467 and 527 nm excitations,*** causes of the abnormal thermal quenching under 527 nm excitation were *** on the abnormal thermal quenching under527 nm excitation,the optical thermometry properties of Sr_(2)GdSbO_(6):0.2Eu^(3+)phosphors were investigated by fluorescence intensity ratio(FIR) technique,and appreciable relative sensitivity was *** results suggest that Sr_(2)GdSbO_(6):0.2Eu^(3+)phosphors can be potentially applied to w-LEDs and optical thermometers.
This paper considers the distributed online optimization(DOO) problem over time-varying unbalanced networks, where gradient information is explicitly unknown. To address this issue, a privacy-preserving distributed on...
详细信息
This paper considers the distributed online optimization(DOO) problem over time-varying unbalanced networks, where gradient information is explicitly unknown. To address this issue, a privacy-preserving distributed online one-point residual feedback(OPRF) optimization algorithm is proposed. This algorithm updates decision variables by leveraging one-point residual feedback to estimate the true gradient information. It can achieve the same performance as the two-point feedback scheme while only requiring a single function value query per iteration. Additionally, it effectively eliminates the effect of time-varying unbalanced graphs by dynamically constructing row stochastic matrices. Furthermore, compared to other distributed optimization algorithms that only consider explicitly unknown cost functions, this paper also addresses the issue of privacy information leakage of nodes. Theoretical analysis demonstrate that the method attains sublinear regret while protecting the privacy information of agents. Finally, numerical experiments on distributed collaborative localization problem and federated learning confirm the effectiveness of the algorithm.
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ...
详细信息
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system based on Paillier encryption, which is claimed to protect both client C 's location privacy and service provider S's database privacy. However, Yang et al. presented a practical data privacy attack in INFOCOM'18, which allows a polynomial time attacker to obtain S's database. We propose a novel WiFi fingerprint localization system based on CastagnosLaguillaumie(CL) encryption, which has a trustless setup and is efficient due to the excellent properties of CL encryption. To prevent Yang et al.'s attack, the system requires that S selects only the locations from its database that can receive the nonzero signals from all the available access points in C 's nonzero fingerprint in order to determine C's location. Security analysis shows that our scheme is secure under Li et al.'s threat model. Furthermore, to enhance the security level of privacy-preserving WiFi fingerprint localization scheme based on CL encryption, we propose a secure and efficient zero-knowledge proof protocol for the discrete logarithm relations in C's encrypted localization queries.
The detection algorithms of small objects in remote sensing images is often challenging due to the complex background and limited pixels. This can lead to reduced accuracy in detection and an increased number of misse...
详细信息
In this paper,we address the problem of unsuperised social network embedding,which aims to embed network nodes,including node attributes,into a latent low dimensional *** recent methods,the fusion mechanism of node at...
详细信息
In this paper,we address the problem of unsuperised social network embedding,which aims to embed network nodes,including node attributes,into a latent low dimensional *** recent methods,the fusion mechanism of node attributes and network structure has been proposed for the problem and achieved impressive prediction ***,the non-linear property of node attributes and network structure is not efficiently fused in existing methods,which is potentially helpful in learning a better network *** this end,in this paper,we propose a novel model called ASM(Adaptive Specific Mapping)based on encoder-decoder *** encoder,we use the kernel mapping to capture the non-linear property of both node attributes and network *** particular,we adopt two feature mapping functions,namely an untrainable function for node attributes and a trainable function for network *** the mapping functions,we obtain the low dimensional feature vectors for node attributes and network structure,***,we design an attention layer to combine the learning of both feature vectors and adaptively learn the node *** encoder,we adopt the component of reconstruction for the training process of learning node attributes and network *** conducted a set of experiments on seven real-world social network *** experimental results verify the effectiveness and efficiency of our method in comparison with state-of-the-art baselines.
Tables,typically two-dimensional and structured to store large amounts of data,are essential in daily activities like database queries,spreadsheet manipulations,Web table question answering,and image table information...
详细信息
Tables,typically two-dimensional and structured to store large amounts of data,are essential in daily activities like database queries,spreadsheet manipulations,Web table question answering,and image table information *** these table-centric tasks with Large Language Models(LLMs)or Visual Language Models(VLMs)offers significant public benefits,garnering interest from academia and *** survey provides a comprehensive overview of table-related tasks,examining both user scenarios and technical *** covers traditional tasks like table question answering as well as emerging fields such as spreadsheet manipulation and table data *** summarize the training techniques for LLMs and VLMs tailored for table ***,we discuss prompt engineering,particularly the use of LLM-powered agents,for various tablerelated ***,we highlight several challenges,including diverse user input when serving and slow thinking using chainof-thought.
Area has become one of the main bottlenecks restricting the development of integrated circuits. The area optimization approaches of existing XNOR/OR-based mixed polarity Reed-Muller(MPRM) circuits have poor optimizati...
详细信息
Area has become one of the main bottlenecks restricting the development of integrated circuits. The area optimization approaches of existing XNOR/OR-based mixed polarity Reed-Muller(MPRM) circuits have poor optimization effect and efficiency. Given that the area optimization of MPRM logic circuits is a combinatorial optimization problem, we propose a whole annealing adaptive bacterial foraging algorithm(WAA-BFA), which includes individual evolution based on Markov chain and Metropolis acceptance criteria, and individual mutation based on adaptive probability. To address the issue of low conversion efficiency in existing polarity conversion approaches, we introduce a fast polarity conversion algorithm(FPCA). Moreover, we present an MPRM circuits area optimization approach that uses the FPCA and WAA-BFA to search for the best polarity corresponding to the minimum circuits area. Experimental results demonstrate that the proposed MPRM circuits area optimization approach is effective and can be used as a promising EDA tool.
User profiling by inferring user personality traits,such as age and gender,plays an increasingly important role in many real-world *** existing methods for user profiling either use only one type of data or ignore han...
详细信息
User profiling by inferring user personality traits,such as age and gender,plays an increasingly important role in many real-world *** existing methods for user profiling either use only one type of data or ignore handling the noisy information of ***,they usually consider this problem from only one *** this paper,we propose a joint user profiling model with hierarchical attention networks(JUHA)to learn informative user representations for user *** JUHA method does user profiling based on both inner-user and inter-user *** explore inner-user features from user behaviors(e.g.,purchased items and posted blogs),and inter-user features from a user-user graph(where similar users could be connected to each other).JUHA learns basic sentence and bag representations from multiple separate sources of data(user behaviors)as the first round of data *** this module,convolutional neural networks(CNNs)are introduced to capture word and sentence features of age and gender while the self-attention mechanism is exploited to weaken the noisy *** this,we build another bag which contains a user-user ***-user features are learned from this bag using propagation information between linked users in the *** acquire more robust data,inter-user features and other inner-user bag representations are joined into each sentence in the current bag to learn the final bag ***,all of the bag representations are integrated to lean comprehensive user representation by the self-attention *** experimental results demonstrate that our approach outperforms several state-of-the-art methods and improves prediction performance.
The work focuses on the utilization of the conventional solid-state sintering procedure to synthesize white phosphors Ca_(2)InTaO_(6):xDy^(3+)(0.02≤x≤0.12).Utilizing X-ray diffraction,the phase structure of samples ...
详细信息
The work focuses on the utilization of the conventional solid-state sintering procedure to synthesize white phosphors Ca_(2)InTaO_(6):xDy^(3+)(0.02≤x≤0.12).Utilizing X-ray diffraction,the phase structure of samples was examined,and the crystal structure was refined using the Rietveld method.A scanning electron microscope was used to analyze the microstructure of ***-principles calculations confirm that the indirect bandgap of Ca_(2)InTaO_(6)is 3.786 eV,The luminous properties and energy transfer mechanism of Ca_(2)InTaO_(6):xDy^(3+)were studied using photoluminescence ***^(4)F_(9/2)→^(6)H_(13/2)transition of Dy^(3+)ions is responsible for the greatest emission peak,which was measured at 575 *** to research,the lifespan falls as the concentration of Dy^(3+)doping amount rises because of frequent interaction and ene rgy transfer between Dy^(3+)*** correlated color temperature of the WLEDs packaged with Ca_(2)InTaO_(6):0.08Dy^(3+)is 4677 K and CIE 1931 chromaticity coordinates are(0.3578,0.3831).Meantime,the phosphor also shows outstanding te mperature stability property,which maintains 83.8%of its initial emission intensity at 450 K(activation energy of 0.1467 eV).The W-LEDs retain their performance for 100 min when powered at 3.4 V voltage and 600 mA current,demonstrating the packed W-LEDs'sustaine d operation at high temperatures.
暂无评论