In IEC-61850-based digital substations, the protection IED’s performance is dependent on merging unit’s vendor implementation, communication networks, and measurement circuit’s health conditions. As the process bus...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
Two-dimensional endoscopic images are susceptible to interferences such as specular reflections and monotonous texture illumination,hindering accurate three-dimensional lesion reconstruction by surgical *** study prop...
详细信息
Two-dimensional endoscopic images are susceptible to interferences such as specular reflections and monotonous texture illumination,hindering accurate three-dimensional lesion reconstruction by surgical *** study proposes a novel end-to-end disparity estimation model to address these *** approach combines a Pseudo-Siamese neural network architecture with pyramid dilated convolutions,integrating multi-scale image information to enhance robustness against lighting *** study introduces a Pseudo-Siamese structure-based disparity regression model that simplifies left-right image comparison,improving accuracy and *** model was evaluated using a dataset of stereo endoscopic videos captured by the Da Vinci surgical robot,comprising simulated silicone heart sequences and real heart video *** results demonstrate significant improvement in the network’s resistance to lighting interference without substantially increasing ***,the model exhibited faster convergence during training,contributing to overall performance *** study advances endoscopic image processing accuracy and has potential implications for surgical robot applications in complex environments.
The use of inverter-based motor controllers that can generate fast voltage level transitions is increasing in the field of electric drive systems because of their ability to achieve higher efficiency. However, the fas...
详细信息
Fractional order algorithms have shown promising results in various signal processing applications due to their ability to improve performance without significantly increasing *** goal of this work is to inves-tigate ...
详细信息
Fractional order algorithms have shown promising results in various signal processing applications due to their ability to improve performance without significantly increasing *** goal of this work is to inves-tigate the use of fractional order algorithm in the field of adaptive beam-forming,with a focus on improving performance while keeping complexity *** effectiveness of the algorithm will be studied and evaluated in this *** this paper,a fractional order least mean square(FLMS)algorithm is proposed for adaptive beamforming in wireless applications for effective utilization of *** algorithm aims to improve upon existing beam-forming algorithms,which are inefficient in performance,by offering faster convergence,better accuracy,and comparable computational *** FLMS algorithm uses fractional order gradient in addition to the standard ordered gradient in weight *** derivation of the algorithm is provided and supported by mathematical convergence *** is evaluated through simulations using mean square error(MSE)minimization as a metric and compared with the standard LMS algorithm for various *** results,obtained through Matlab simulations,show that the FLMS algorithm outperforms the standard LMS in terms of convergence speed,beampattern accuracy and scatter *** outperforms LMS in terms of convergence speed by 34%.From this,it can be concluded that FLMS is a better candidate for adaptive beamforming and other signal processing applications.
This paper studies the power density limits of propulsion motor for electric aircraft considering thermal aspects and breakdown voltage reduction of insulation. The study em-ploys multi-objective optimization (MOO) to...
详细信息
Inverse Reinforcement Learning (IRL) and Reinforcement Learning from Human Feedback (RLHF) are pivotal methodologies in reward learning, which involve inferring and shaping the underlying reward function of sequential...
详细信息
Inverse Reinforcement Learning (IRL) and Reinforcement Learning from Human Feedback (RLHF) are pivotal methodologies in reward learning, which involve inferring and shaping the underlying reward function of sequential decision-making problems based on observed human demonstrations and feedback. Most prior work in reward learning has relied on prior knowledge or assumptions about decision or preference models, potentially leading to robustness issues. In response, this paper introduces a novel linear programming (LP) framework tailored for offline reward learning. Utilizing pre-collected trajectories without online exploration, this framework estimates a feasible reward set from the primal-dual optimality conditions of a suitably designed LP, and offers an optimality guarantee with provable sample efficiency. Our LP framework also enables aligning the reward functions with human feedback, such as pairwise trajectory comparison data, while maintaining computational tractability and sample efficiency. We demonstrate that our framework potentially achieves better performance compared to the conventional maximum likelihood estimation (MLE) approach through analytical examples and numerical experiments. Copyright 2024 by the author(s)
In the environment of smart examination rooms, it is important to quickly and accurately detect abnormal behavior(human standing) for the construction of a smart campus. Based on deep learning, we propose an intellige...
详细信息
In the environment of smart examination rooms, it is important to quickly and accurately detect abnormal behavior(human standing) for the construction of a smart campus. Based on deep learning, we propose an intelligentstanding human detection (ISHD) method based on an improved single shot multibox detector to detect thetarget of standing human posture in the scene frame of exam room video surveillance at a specific examinationstage. ISHD combines the MobileNet network in a single shot multibox detector network, improves the posturefeature extractor of a standing person, merges prior knowledge, and introduces transfer learning in the trainingstrategy, which greatly reduces the computation amount, improves the detection accuracy, and reduces the trainingdifficulty. The experiment proves that the model proposed in this paper has a better detection ability for the smalland medium-sized standing human body posture in video test scenes on the EMV-2 dataset.
In natural language processing, data acquisition and preprocessing techniques are significant for experiments involving training models on cleaned data. This paper describes the formation of a dataset of ugly and dero...
详细信息
This paper presents a novel distributed computing framework, DCbMF (Distributed Computing by Matrix Factorization), for the efficient computation of linearly separable functions. Our framework operates within a multic...
详细信息
暂无评论