Label distribution learning (LDL) suffers from the dilemma of insufficient target data in real-world applications, while domain adaptation (DA) seems to be able to provide a solution. However, most existing methods of...
详细信息
Log parsing, the process of transforming raw logs into structured data, is a key step in the complex computer system's intelligent operation and maintenance and therefore has received extensive attention. Among al...
详细信息
This paper designs distributed Nash equilibrium seeking strategies for heterogeneous dynamic cyber-physical *** particular, we are concerned with parametric uncertainties in the control channel of the players. Moreove...
详细信息
This paper designs distributed Nash equilibrium seeking strategies for heterogeneous dynamic cyber-physical *** particular, we are concerned with parametric uncertainties in the control channel of the players. Moreover, the weights on communication links can be compromised by time-varying uncertainties, which can result from possibly malicious attacks,faults and disturbances. To deal with the unavailability of measurement of optimization errors, an output observer is constructed,based on which adaptive laws are designed to compensate for physical uncertainties. With adaptive laws, a new distributed Nash equilibrium seeking strategy is designed by further integrating consensus protocols and gradient search ***, to further accommodate compromised communication weights resulting from cyber-uncertainties, the coupling strengths of the consensus module are designed to be adaptive. As a byproduct, the coupling strengths are independent of any global information. With theoretical investigations, it is proven that the proposed strategies are resilient to these uncertainties and players' actions are convergent to the Nash equilibrium. Simulation examples are given to numerically validate the effectiveness of the proposed strategies.
Aerosol hygroscopicity and liquid water content(ALWC)have important influences on the environmental and climate effect of *** this study,we measured the hygroscopic growth factors(GF)of particles with dry diameters of...
详细信息
Aerosol hygroscopicity and liquid water content(ALWC)have important influences on the environmental and climate effect of *** this study,we measured the hygroscopic growth factors(GF)of particles with dry diameters of 40,80,150,and 200 nm during the wintertime in *** the GF-derived hygroscopicity parameter(κ_(gf))and ALWC increased with particle size,but displayed differing diurnal variations,withκ_(gf)peaking around the midday,while ALWC peaking in the early ***,ammonium and oxygenated organic aerosols(OOA)were found as the chemical components mostly strongly correlated with ALWC.A closure study suggests that during midday photo-oxidation and nighttime high ALWC periods,theκof organic aerosols(κ_(org))was underestimated when using previous ***,we re-constructed parameterizations forκ_(org)and the oxidation level of organics for these periods,which indicates a higher hygroscopicity of photochemically formed OOA than the aqueous OOA,yet both being much higher than the generally assumed OOA ***,in a typical high ALWC episode,concurrently increased ALWC,nitrate,OOA as well as aerosol surface area and mass concentrations were observed under elevated ambient *** strongly indicates a coupled effect that the hygroscopic secondary aerosols,in particular nitratewith strong hygroscopicity,led to large increase in ALWC,which in turn synergistically boosted nitrate and OOA formation by heterogeneous/aqueous *** interaction may represent an important mechanism contributing to enhanced formation of secondary aerosols and rapid growth of fine particulate matter under relatively high RH conditions.
In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scal...
详细信息
In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scale object detection algorithm based on an improved YOLOv8 has been proposed. Firstly, a lightweight attention mechanism, Triplet Attention, is introduced to enhance the algorithm’s ability to extract multi-dimensional and multi-scale features, thereby improving the receptive capability of the feature maps. Secondly, the Diverse Branch Block (DBB) is integrated into the CSP Bottleneck with two Convolutions (C2F) module to strengthen the fusion of semantic information across different layers. Thirdly, a new decoupled detection head is proposed by redesigning the original network head based on the Diverse Branch Block module to improve detection accuracy and reduce missed and false detections. Finally, the Minimum Point Distance based Intersection-over-Union (MPDIoU) is used to replace the original YOLOv8 Complete Intersection-over-Union (CIoU) to accelerate the network’s training convergence. Comparative experiments and dehazing pre-processing tests were conducted on the RTTS and VOC-Fog datasets. Compared to the baseline YOLOv8 model, the improved algorithm achieved mean Average Precision (mAP) improvements of 4.6% and 3.8%, respectively. After defogging pre-processing, the mAP increased by 5.3% and 4.4%, respectively. The experimental results demonstrate that the improved algorithm exhibits high practicality and effectiveness in foggy traffic scenarios.
Generative image steganography is a technique that directly generates stego images from secret *** traditional methods,it theoretically resists steganalysis because there is no cover ***,the existing generative image ...
详细信息
Generative image steganography is a technique that directly generates stego images from secret *** traditional methods,it theoretically resists steganalysis because there is no cover ***,the existing generative image steganography methods generally have good steganography performance,but there is still potential room for enhancing both the quality of stego images and the accuracy of secret information ***,this paper proposes a generative image steganography algorithm based on attribute feature transformation and invertible mapping ***,the reference image is disentangled by a content and an attribute encoder to obtain content features and attribute features,***,a mean mapping rule is introduced to map the binary secret information into a noise vector,conforming to the distribution of attribute *** noise vector is input into the generator to produce the attribute transformed stego image with the content feature of the reference ***,we design an adversarial loss,a reconstruction loss,and an image diversity loss to train the proposed *** results demonstrate that the stego images generated by the proposed method are of high quality,with an average extraction accuracy of 99.4%for the hidden ***,since the stego image has a uniform distribution similar to the attribute-transformed image without secret information,it effectively resists both subjective and objective steganalysis.
Edge closeness and betweenness centralities are widely used path-based metrics for characterizing the importance of edges in *** general graphs,edge closeness centrality indicates the importance of edges by the shorte...
详细信息
Edge closeness and betweenness centralities are widely used path-based metrics for characterizing the importance of edges in *** general graphs,edge closeness centrality indicates the importance of edges by the shortest distances from the edge to all the other *** betweenness centrality ranks which edges are significant based on the fraction of all-pairs shortest paths that pass through the ***,extensive research efforts go into centrality computation over general graphs that omit time ***,numerous real-world networks are modeled as temporal graphs,where the nodes are related to each other at different time *** temporal property is important and should not be neglected because it guides the flow of information in the *** state of affairs motivates the paper’s study of edge centrality computation methods on temporal *** introduce the concepts of the label,and label dominance relation,and then propose multi-thread parallel labeling-based methods on OpenMP to efficiently compute edge closeness and betweenness centralities *** types of optimal temporal *** edge closeness centrality computation,a time segmentation strategy and two observations are presented to aggregate some related temporal edges for uniform *** edge betweenness centrality computation,to improve efficiency,temporal edge dependency formulas,a labeling-based forward-backward scanning strategy,and a compression-based optimization method are further proposed to iteratively accumulate centrality *** experiments using 13 real temporal graphs are conducted to provide detailed insights into the efficiency and effectiveness of the proposed *** with state-ofthe-art methods,labeling-based methods are capable of up to two orders of magnitude speedup.
Forest fires pose a serious threat to ecological balance, air quality, and the safety of both humans and wildlife. This paper presents an improved model based on You Only Look Once version 5 (YOLOv5), named YOLO Light...
详细信息
Forest fires pose a serious threat to ecological balance, air quality, and the safety of both humans and wildlife. This paper presents an improved model based on You Only Look Once version 5 (YOLOv5), named YOLO Lightweight Fire Detector (YOLO-LFD), to address the limitations of traditional sensor-based fire detection methods in terms of real-time performance and accuracy. The proposed model is designed to enhance inference speed while maintaining high detection accuracy on resource-constrained devices such as drones and embedded systems. Firstly, we introduce Depthwise Separable Convolutions (DSConv) to reduce the complexity of the feature extraction network. Secondly, we design and implement the Lightweight Faster Implementation of Cross Stage Partial (CSP) Bottleneck with 2 Convolutions (C2f-Light) and the CSP Structure with 3 Compact Inverted Blocks (C3CIB) modules to replace the traditional C3 modules. This optimization enhances deep feature extraction and semantic information processing, thereby significantly increasing inference speed. To enhance the detection capability for small fires, the model employs a Normalized Wasserstein Distance (NWD) loss function, which effectively reduces the missed detection rate and improves the accuracy of detecting small fire sources. Experimental results demonstrate that compared to the baseline YOLOv5s model, the YOLO-LFD model not only increases inference speed by 19.3% but also significantly improves the detection accuracy for small fire targets, with only a 1.6% reduction in overall mean average precision (mAP)@0.5. Through these innovative improvements to YOLOv5s, the YOLO-LFD model achieves a balance between speed and accuracy, making it particularly suitable for real-time detection tasks on mobile and embedded devices.
Classification of quantum phases is one of the most important areas of research in condensed matter *** this work,we obtain the phase diagram of one-dimensional quasiperiodic models via unsupervised ***,we choose two ...
详细信息
Classification of quantum phases is one of the most important areas of research in condensed matter *** this work,we obtain the phase diagram of one-dimensional quasiperiodic models via unsupervised ***,we choose two advanced unsupervised learning algorithms,namely,density-based spatial clustering of applications with noise(DBSCAN)and ordering points to identify the clustering structure(OPTICS),to explore the distinct phases of the Aubry–André–Harper model and the quasiperiodic p-wave *** unsupervised learning results match well with those obtained through traditional numerical ***,we assess similarity across different algorithms and find that the highest degree of similarity between the results of unsupervised learning algorithms and those of traditional algorithms exceeds 98%.Our work sheds light on applications of unsupervised learning for phase classification.
Task offloading from edge devices to the cloud is typically modeled using Directed Acyclic Graphs (DAGs), which assume predefined task details and stable network conditions. However, obtaining detailed task informatio...
详细信息
暂无评论