The purpose of unsupervised domain adaptation is to use the knowledge of the source domain whose data distribution is different from that of the target domain for promoting the learning task in the target *** key bott...
详细信息
The purpose of unsupervised domain adaptation is to use the knowledge of the source domain whose data distribution is different from that of the target domain for promoting the learning task in the target *** key bottleneck in unsupervised domain adaptation is how to obtain higher-level and more abstract feature representations between source and target domains which can bridge the chasm of domain ***,deep learning methods based on autoencoder have achieved sound performance in representation learning,and many dual or serial autoencoderbased methods take different characteristics of data into consideration for improving the effectiveness of unsupervised domain ***,most existing methods of autoencoders just serially connect the features generated by different autoencoders,which pose challenges for the discriminative representation learning and fail to find the real cross-domain *** address this problem,we propose a novel representation learning method based on an integrated autoencoders for unsupervised domain adaptation,called *** capture the inter-and inner-domain features of the raw data,two different autoencoders,which are the marginalized autoencoder with maximum mean discrepancy(mAE)and convolutional autoencoder(CAE)respectively,are proposed to learn different feature *** higher-level features are obtained by these two different autoencoders,a sparse autoencoder is introduced to compact these inter-and inner-domain *** addition,a whitening layer is embedded for features processed before the mAE to reduce redundant features inside a local *** results demonstrate the effectiveness of our proposed method compared with several state-of-the-art baseline methods.
Accurately estimating the State of Health(SOH)and Remaining Useful Life(RUL)of lithium-ion batteries(LIBs)is crucial for the continuous and stable operation of battery management ***,due to the complex internal chemic...
详细信息
Accurately estimating the State of Health(SOH)and Remaining Useful Life(RUL)of lithium-ion batteries(LIBs)is crucial for the continuous and stable operation of battery management ***,due to the complex internal chemical systems of LIBs and the nonlinear degradation of their performance,direct measurement of SOH and RUL is *** address these issues,the Twin Support Vector Machine(TWSVM)method is proposed to predict SOH and ***,the constant current charging time of the lithium battery is extracted as a health indicator(HI),decomposed using Variational Modal Decomposition(VMD),and feature correlations are computed using Importance of Random Forest Features(RF)to maximize the extraction of critical factors influencing battery performance ***,to enhance the global search capability of the Convolution Optimization Algorithm(COA),improvements are made using Good Point Set theory and the Differential Evolution *** Improved Convolution Optimization Algorithm(ICOA)is employed to optimize TWSVM parameters for constructing SOH and RUL prediction ***,the proposed models are validated using NASA and CALCE lithium-ion battery *** results demonstrate that the proposed models achieve an RMSE not exceeding 0.007 and an MAPE not exceeding 0.0082 for SOH and RUL prediction,with a relative error in RUL prediction within the range of[-1.8%,2%].Compared to other models,the proposed model not only exhibits superior fitting capability but also demonstrates robust performance.
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ...
详细信息
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system based on Paillier encryption, which is claimed to protect both client C 's location privacy and service provider S's database privacy. However, Yang et al. presented a practical data privacy attack in INFOCOM'18, which allows a polynomial time attacker to obtain S's database. We propose a novel WiFi fingerprint localization system based on CastagnosLaguillaumie(CL) encryption, which has a trustless setup and is efficient due to the excellent properties of CL encryption. To prevent Yang et al.'s attack, the system requires that S selects only the locations from its database that can receive the nonzero signals from all the available access points in C 's nonzero fingerprint in order to determine C's location. Security analysis shows that our scheme is secure under Li et al.'s threat model. Furthermore, to enhance the security level of privacy-preserving WiFi fingerprint localization scheme based on CL encryption, we propose a secure and efficient zero-knowledge proof protocol for the discrete logarithm relations in C's encrypted localization queries.
This paper considers the distributed online optimization(DOO) problem over time-varying unbalanced networks, where gradient information is explicitly unknown. To address this issue, a privacy-preserving distributed on...
详细信息
This paper considers the distributed online optimization(DOO) problem over time-varying unbalanced networks, where gradient information is explicitly unknown. To address this issue, a privacy-preserving distributed online one-point residual feedback(OPRF) optimization algorithm is proposed. This algorithm updates decision variables by leveraging one-point residual feedback to estimate the true gradient information. It can achieve the same performance as the two-point feedback scheme while only requiring a single function value query per iteration. Additionally, it effectively eliminates the effect of time-varying unbalanced graphs by dynamically constructing row stochastic matrices. Furthermore, compared to other distributed optimization algorithms that only consider explicitly unknown cost functions, this paper also addresses the issue of privacy information leakage of nodes. Theoretical analysis demonstrate that the method attains sublinear regret while protecting the privacy information of agents. Finally, numerical experiments on distributed collaborative localization problem and federated learning confirm the effectiveness of the algorithm.
Flight data anomaly detection plays an imperative role in the safety and maintenance of unmanned aerial vehicles(UAVs).It has attracted extensive attention from ***,the problems related to the difficulty in obtaining ...
详细信息
Flight data anomaly detection plays an imperative role in the safety and maintenance of unmanned aerial vehicles(UAVs).It has attracted extensive attention from ***,the problems related to the difficulty in obtaining abnormal data,low model accuracy,and high calculation cost have led to severe challenges with respect to its practical ***,in this study,firstly,several UAV flight data simulation softwares are presented based on a brief presentation of the basic concepts of anomalies,the contents of UAV flight data,and the public datasets for flight data anomaly ***,anomaly detection technologies for UAV flight data are comprehensively reviewed,including knowledge-based,model-based,and data-driven ***,UAV flight data anomaly detection applications are briefly described and ***,the future trends and directions of UAV flight data anomaly detection are summarized and prospected,which aims to provide references for the following research.
A 2-dimension linguistic lattice implication algebra(2DL-LIA)can build a bridge between logical algebra and 2-dimension fuzzy linguistic *** this paper,the notion of a Boolean element is proposed in a 2DL-LIA and some...
详细信息
A 2-dimension linguistic lattice implication algebra(2DL-LIA)can build a bridge between logical algebra and 2-dimension fuzzy linguistic *** this paper,the notion of a Boolean element is proposed in a 2DL-LIA and some properties of Boolean elements are *** derivations on 2DL-LIAs are introduced and the related properties of derivations are ***,it proves that the derivations on 2DL-LIAs can be constructed by Boolean elements.
Modulation of metal sites coordination can significantly refine the electronic architecture of catalysts,thereby improving their catalytic *** work successfully developed a core–shell Co@N-doped porous carbon(Co@NC)c...
详细信息
Modulation of metal sites coordination can significantly refine the electronic architecture of catalysts,thereby improving their catalytic *** work successfully developed a core–shell Co@N-doped porous carbon(Co@NC)catalyst by pyrolyzing the COF/MOF(IISERP-COF3/ZIF-67)composite in an inert *** Co@NC catalyst exhibited impressive oxygen evolution reaction(OER)performance,with a small overpotential of 304 mV and a modest Tafel slope of 88.6 mV·dec^(−1) in a 1 M KOH,alongside remarkable stability,maintaining 98.5%of its activity over 13 *** role of IISERP-COF3 was pivotal in preventing Co atom aggregation during the ZIF-67 pyrolysis,which facilitated the creation of mesopores for enhanced mass transport and ***,it effectively modulated the Co-N coordination to fine-tune the electronic structure,thereby optimizing the catalyst's capacity for adsorption of intermediates and boosting its intrinsic *** functional theory(DFT)studies corroborate that the exceptional OER efficiency of Co@NC can be linked to the enhanced Co-N coordination,optimizing the localized electronic structure at the Co active *** study not only proposes an innovative approach for optimizing COF/MOF as effective electrocatalysts but also clears the path for the emergence of affordable,high-performance alternatives to precious metal-based catalysts,marking a significant advancement in sustainable energy technologies.
Micro Expression (ME) is the subtle facial expressions that people show when they express their inner feelings. To address the problem that micro-expression recognition is difficult and less accurate due to the small ...
详细信息
Dear editor,This letter presents an unsupervised feature selection method based on machine *** selection is an important component of artificial intelligence,machine learning,which can effectively solve the curse of d...
详细信息
Dear editor,This letter presents an unsupervised feature selection method based on machine *** selection is an important component of artificial intelligence,machine learning,which can effectively solve the curse of dimensionality *** most of the labeled data is expensive to obtain.
Represented by evolutionary algorithms and swarm intelligence algorithms, nature-inspired metaheuristics have been successfully applied to recommender systems and amply demonstrated effectiveness, in particular, for m...
详细信息
暂无评论