With the advent of the Web 3.0 era, the amount and types of data in the network have sharply increased, and the application scenarios of recommendation algorithms are continuously expanding. Location recommendation ha...
详细信息
Software developers and maintainers frequently conduct software refactorings to improve software quality. Identifying the conducted software refactorings may significantly facilitate the comprehension of software evol...
详细信息
This paper introduces a simple yet effective approach for developing fuzzy logic controllers(FLCs)to identify the maximum power point(MPP)and optimize the photovoltaic(PV)system to extract the maximum power in differe...
详细信息
This paper introduces a simple yet effective approach for developing fuzzy logic controllers(FLCs)to identify the maximum power point(MPP)and optimize the photovoltaic(PV)system to extract the maximum power in different environmental *** propose a robust FLC with low computational complexity by reducing the number of membership functions and *** optimize the performance of the FLC,metaheuristic algorithms are employed to determine the parameters of the *** evaluate the proposed FLC in various panel configurations under different environmental *** results indicate that the proposed FLC can easily adapt to various panel configurations and perform better than other benchmarks in terms of enhanced stability,responsiveness,and power transfer under various scenarios.
The advent of Federated Learning (FL) empowers IoT devices to collectively train a shared model without local data exposure. In order to address the issue of Non-IID that causes model performance degradation, the rece...
详细信息
We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the c...
详细信息
We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the coupling strength via a unidirectional waveguide(IWG)can induce chaotic *** underlying reason for this phenomenon is that adjusting the phase and coupling strength via the phase shifter and IWG bring the system close to an exceptional point(EP),where field localization dynamically enhances the optomechanical nonlinearity,leading to the generation of chaotic *** addition,due to the sensitivity of chaos to phase in the vicinity of the EP,we propose a theoretical scheme to measure the optical phase perturbations using *** work may offer an alternative approach to chaos generation with current experimental technology and provide theoretical guidance for optical signal processing and chaotic secure communication.
In understanding brain functioning by Electroencephalography (EEG), it is essential to be able to not only identify more active brain areas but also understand connectivity among different areas. The functional and ef...
详细信息
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactiv...
详细信息
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactively reconfigure wireless environments to improve both sensing and communication(S&C) performance. First, we exploit a single IRS to enable wireless sensing in the base station's(BS's) non-line-of-sight(NLoS) area. In particular, we present three IRS-enabled NLoS target sensing architectures with fully-passive, semi-passive, and active IRSs, respectively. We compare their pros and cons by analyzing the fundamental sensing performance limits for target detection and parameter estimation. Next, we consider a single IRS to facilitate integrated sensing and communication(ISAC), in which the transmit signals at the BS are used for achieving both S&C functionalities, aided by the IRS through reflective beamforming. We present joint transmit signal and receiver processing designs for realizing efficient ISAC, and jointly optimize the transmit beamforming at the BS and reflective beamforming at the IRS to balance the fundamental performance tradeoff between S&C. Furthermore, we discuss multi-IRS networked ISAC, by particularly focusing on multi-IRS-enabled multi-link ISAC, multi-region ISAC, and ISAC signal routing, respectively. Finally, we highlight various promising research topics in this area to motivate future work.
Plant diseases significantly threaten global food security and economic stability by reducing crop yields, increasing production costs, and exacerbating food shortages. Early and precise detection of plant diseases is...
详细信息
Off-axis digital holography plays a crucial role in high-precision three-dimensional imaging. However, high-resolution phase images are often affected by the limited pixel size of the sensor. To address this issue, th...
详细信息
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy conce...
详细信息
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy concerns within smart ***,existing methods struggle with efficiency and security when processing large-scale *** efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent *** paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data *** approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user *** also explores the application of Boneh Lynn Shacham(BLS)signatures for user *** proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis.
暂无评论