Agrivoltaic (AV) systems can simultaneously produce food and energy, providing a much-needed solution to balance the food-energy nexus for the growing global population. In this context, it is crucial to identify opti...
详细信息
The self-supervised monocular depth estimation algorithm obtains excellent results in outdoor environments. However, traditional self-supervised depth estimation methods often suffer from edge blurring in complex text...
详细信息
Emotions are a vital semantic part of human correspondence. Emotions are significant for human correspondence as well as basic for human–computer cooperation. Viable correspondence between people is possibly achieved...
详细信息
Face Presentation Attack Detection(fPAD)plays a vital role in securing face recognition systems against various presentation *** supervised learning-based methods demonstrate effectiveness,they are prone to overfittin...
详细信息
Face Presentation Attack Detection(fPAD)plays a vital role in securing face recognition systems against various presentation *** supervised learning-based methods demonstrate effectiveness,they are prone to overfitting to known attack types and struggle to generalize to novel attack *** studies have explored formulating fPAD as an anomaly detection problem or one-class classification task,enabling the training of generalized models for unknown attack ***,conventional anomaly detection approaches encounter difficulties in precisely delineating the boundary between bonafide samples and unknown *** address this challenge,we propose a novel framework focusing on unknown attack detection using exclusively bonafide facial data during *** core innovation lies in our pseudo-negative sample synthesis(PNSS)strategy,which facilitates learning of compact decision boundaries between bonafide faces and potential attack ***,PNSS generates synthetic negative samples within low-likelihood regions of the bonafide feature space to represent diverse unknown attack *** overcome the inherent imbalance between positive and synthetic negative samples during iterative training,we implement a dual-loss mechanism combining focal loss for classification optimization with pairwise confusion loss as a *** architecture effectively mitigates model bias towards bonafide samples while maintaining discriminative *** evaluations across three benchmark datasets validate the framework’s superior ***,our PNSS achieves 8%–18% average classification error rate(ACER)reduction compared with state-of-the-art one-class fPAD methods in cross-dataset evaluations on Idiap Replay-Attack and MSU-MFSD datasets.
The standard Delaunay triangulation is a geometric graph whose vertices are points in the plane, and two vertices share an edge if they lie on the boundary of an empty disk. If the disk is replaced with a homothet of ...
详细信息
In order to reduce the cost of the power generation system, reduce the rate of system wind and light abandonment, and build a cleaner, safer and more efficient power system, this paper establishes a PV-wind-battery op...
详细信息
Recurrent Neural Networks (RNNs) are commonly used in data-driven approaches to estimate the Remaining Useful Lifetime (RUL) of power electronic devices. RNNs are preferred because their intrinsic feedback mechanisms ...
详细信息
The static var generators (SVGs) installed at the point of common coupling (PCC) of wind farms can significantly impact the sub-synchronous oscillation (SSO) performance of the power system with grid-connected wind fa...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use are outdated and suffer from numerous vulnerabilities that stem from the design of the underlying BAS *** this paper,we provide a comprehensive,up-to-date survey on BASs and attacks against seven BAS protocols including BACnet,EnOcean,KNX,LonWorks,Modbus,ZigBee,and *** studies of secure BAS protocols are also presented,covering BACnet Secure Connect,KNX Data Secure,KNX/IP Secure,ModBus/TCP Security,EnOcean High Security and Z-Wave *** and ZigBee do not have security *** point out how these security protocols improve the security of the BAS and what issues remain.A case study is provided which describes a real-world BAS and showcases its vulnerabilities as well as recommendations for improving the security of *** seek to raise awareness to those in academia and industry as well as highlight open problems within BAS security.
In the independent electro-hydrogen system(IEHS)with hybrid energy storage(HESS),achieving optimal scheduling is ***,it presents a challenge due to the significant deviations in values ofmultiple optimization objectiv...
详细信息
In the independent electro-hydrogen system(IEHS)with hybrid energy storage(HESS),achieving optimal scheduling is ***,it presents a challenge due to the significant deviations in values ofmultiple optimization objective functions caused by their physical *** deviations seriously affect the scheduling process.A novel standardization fusion method has been established to address this issue by analyzing the variation process of each objective function’s *** optimal scheduling results of IEHS with HESS indicate that the economy and overall energy loss can be improved 2–3 times under different optimization *** proposed method better balances all optimization objective functions and reduces the impact of their *** the cost of BESS decreases by approximately 30%,its participation deepens by about 1 ***,if the price of the electrolyzer is less than 15¥/kWh or if the cost of the fuel cell drops below 4¥/kWh,their participation will increase *** study aims to provide a more reasonable approach to solving multi-objective optimization problems.
暂无评论