To predict the lithium-ion(Li-ion)battery degradation trajectory in the early phase,arranging the maintenance of battery energy storage systems is of great ***,under different operation conditions,Li-ion batteries pre...
详细信息
To predict the lithium-ion(Li-ion)battery degradation trajectory in the early phase,arranging the maintenance of battery energy storage systems is of great ***,under different operation conditions,Li-ion batteries present distinct degradation patterns,and it is challenging to capture negligible capacity fade in early *** the data-driven method showing promising performance,insufficient data is still a big issue since the ageing experiments on the batteries are too slow and *** this study,we proposed twin autoencoders integrated into a two-stage method to predict the early cycles'degradation *** two-stage method can properly predict the degradation from course to *** twin autoencoders serve as a feature extractor and a synthetic data generator,***,a learning procedure based on the long-short term memory(LSTM)network is designed to hybridize the learning process between the real and synthetic *** performance of the proposed method is verified on three datasets,and the experimental results show that the proposed method can achieve accurate predictions compared to its competitors.
Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network bandwidth. T...
详细信息
In recent years,deep learning has been the mainstream technology for fingerprint liveness detection(FLD)tasks because of its remarkable ***,recent studies have shown that these deep fake fingerprint detection(DFFD)mod...
详细信息
In recent years,deep learning has been the mainstream technology for fingerprint liveness detection(FLD)tasks because of its remarkable ***,recent studies have shown that these deep fake fingerprint detection(DFFD)models are not resistant to attacks by adversarial examples,which are generated by the introduction of subtle perturbations in the fingerprint image,allowing the model to make fake *** of the existing adversarial example generation methods are based on gradient optimization,which is easy to fall into local optimal,resulting in poor transferability of adversarial *** addition,the perturbation added to the blank area of the fingerprint image is easily perceived by the human eye,leading to poor visual *** response to the above challenges,this paper proposes a novel adversarial attack method based on local adaptive gradient variance for *** ridge texture area within the fingerprint image has been identified and designated as the region for perturbation ***,the images are fed into the targeted white-box model,and the gradient direction is optimized to compute gradient ***,an adaptive parameter search method is proposed using stochastic gradient ascent to explore the parameter values during adversarial example generation,aiming to maximize adversarial attack *** results on two publicly available fingerprint datasets show that ourmethod achieves higher attack transferability and robustness than existing methods,and the perturbation is harder to perceive.
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use are outdated and suffer from numerous vulnerabilities that stem from the design of the underlying BAS *** this paper,we provide a comprehensive,up-to-date survey on BASs and attacks against seven BAS protocols including BACnet,EnOcean,KNX,LonWorks,Modbus,ZigBee,and *** studies of secure BAS protocols are also presented,covering BACnet Secure Connect,KNX Data Secure,KNX/IP Secure,ModBus/TCP Security,EnOcean High Security and Z-Wave *** and ZigBee do not have security *** point out how these security protocols improve the security of the BAS and what issues remain.A case study is provided which describes a real-world BAS and showcases its vulnerabilities as well as recommendations for improving the security of *** seek to raise awareness to those in academia and industry as well as highlight open problems within BAS security.
The goal of generalized zero-shot learning (GZSL) is to transfer knowledge from seen classes to unseen classes. However, a significant challenge is the single-category attributes are often inadequate to capture the in...
详细信息
Rapid urbanization has made road construction and maintenance imperative, but detecting road diseases has been time-consuming with limited accuracy. To overcome these challenges, we propose an efficient YOLOv7 road di...
详细信息
Semi-supervised learning (SSL) aims to reduce reliance on labeled data. Achieving high performance often requires more complex algorithms, therefore, generic SSL algorithms are less effective when it comes to image cl...
详细信息
Reinforcement learning holds promise in enabling robotic tasks as it can learn optimal policies via trial and ***,the practical deployment of reinforcement learning usually requires human intervention to provide episo...
详细信息
Reinforcement learning holds promise in enabling robotic tasks as it can learn optimal policies via trial and ***,the practical deployment of reinforcement learning usually requires human intervention to provide episodic resets when a failure *** manual resets are generally unavailable in autonomous robots,we propose a reset-free reinforcement learning algorithm based on multi-state recovery and failure prevention to avoid failure-induced *** multi-state recovery provides robots with the capability of recovering from failures by self-correcting its behavior in the problematic state and,more importantly,deciding which previous state is the best to return to for efficient *** failure prevention reduces potential failures by predicting and excluding possible unsafe actions in specific *** simulations and real-world experiments are used to validate our algorithm with the results showing a significant reduction in the number of resets and failures during the learning.
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of v...
详细信息
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of view,leading to limited performance and increased size and *** particular,simultaneously achieving a wide field of view and large aperture for light collection is desirable but challenging to realize in a compact ***,we demonstrate a wide field of view(greater than 60°)meta-optic doublet eyepiece with an entrance aperture of 2.1 *** the design wavelength of 633 nm,the meta-optic doublet achieves comparable performance to a refractive lens-based eyepiece *** meta-doublet eyepiece illustrates the potential for meta-optics to play an important role in the development of high-quality monochrome near-eye displays and night vision systems.
In this paper,the authors propose an adaptive Barrier-Lyapunov-Functions(BLFs)based control scheme for nonlinear pure-feedback systems with full state *** to the coexist of the non-affine structure and full state cons...
详细信息
In this paper,the authors propose an adaptive Barrier-Lyapunov-Functions(BLFs)based control scheme for nonlinear pure-feedback systems with full state *** to the coexist of the non-affine structure and full state constraints,it is very difficult to construct a desired controller for the considered *** to the mean value theorem,the authors transform the pure-feedback system into a system with strict-feedback structure,so that the well-known backstepping method can be ***,in the backstepping design process,the BLFs are employed to avoid the violation of the state constraints,and neural networks(NNs)are directly used to online approximate the unknown packaged nonlinear *** presented controller ensures that all the signals in the closed-loop system are bounded and the tracking error asymptotically converges to ***,it is shown that the constraint requirement on the system will not be violated during the ***,two simulation examples are provided to show the effectiveness of the proposed control scheme.
暂无评论