Deepfake-generated fake faces,commonly utilized in identity-related activities such as political propaganda,celebrity impersonations,evidence forgery,and familiar fraud,pose new societal *** current deepfake generator...
详细信息
Deepfake-generated fake faces,commonly utilized in identity-related activities such as political propaganda,celebrity impersonations,evidence forgery,and familiar fraud,pose new societal *** current deepfake generators strive for high realism in visual effects,they do not replicate biometric signals indicative of cardiac *** this gap,many researchers have developed detection methods focusing on biometric *** methods utilize classification networks to analyze both temporal and spectral domain features of the remote photoplethysmography(rPPG)signal,resulting in high detection ***,in the spectral analysis,existing approaches often only consider the power spectral density and neglect the amplitude spectrum—both crucial for assessing cardiac *** introduce a novel method that extracts rPPG signals from multiple regions of interest through remote photoplethysmography and processes them using Fast Fourier Transform(FFT).The resultant time-frequency domain signal samples are organized into matrices to create Matrix Visualization Heatmaps(MVHM),which are then utilized to train an image classification ***,we explored various combinations of time-frequency domain representations of rPPG signals and the impact of attention *** experimental results show that our algorithm achieves a remarkable detection accuracy of 99.22%in identifying fake videos,significantly outperforming mainstream algorithms and demonstrating the effectiveness of Fourier Transform and attention mechanisms in detecting fake faces.
In this study, the event-triggered asymptotic tracking control problem is considered for a class of nonholonomic systems in chained form for the time-varying reference input. First, to eliminate the ripple phenomenon ...
详细信息
In this study, the event-triggered asymptotic tracking control problem is considered for a class of nonholonomic systems in chained form for the time-varying reference input. First, to eliminate the ripple phenomenon caused by the imprecise compensation of the time-varying reference input, a novel time-varying event-triggered piecewise continuous control law and a triggering mechanism with a time-varying triggering function are developed. Second, an explicit integral input-to-state stable Lyapunov function is constructed for the time-varying closed-loop system regarding the sampling error as the external input. The origin of the closed-loop system is shown to be uniformly globally asymptotically stable for any global exponential decaying threshold signals, which in turn rules out the Zeno behavior. Moreover, infinitely fast sampling can be avoided by appropriately tuning the exponential convergence rate of the threshold signal. A numerical simulation example is provided to illustrate the proposed control approach.
Cordyceps sinensis, a highly valued traditional Chinese medicine, faces challenges in collection due to inefficiencies in manual searching, strenuous labor, and the impact of subjective expertise. The integration of d...
详细信息
We demonstrate a toroidal classification for quantum spin systems, revealing an intrinsic geometric duality within this structure. Through our classification and duality, we reveal that various bipartite quantum featu...
详细信息
We demonstrate a toroidal classification for quantum spin systems, revealing an intrinsic geometric duality within this structure. Through our classification and duality, we reveal that various bipartite quantum features in magnon systems can manifest equivalently in both bipartite ferromagnetic and antiferromagnetic materials, based upon the availability of relevant Hamiltonian parameters. Additionally, the results highlight the antiferromagnetic regime as an ultrafast dual counterpart to the ferromagnetic regime, both exhibiting identical capabilities for quantum spintronics and technological applications. Concrete illustrations are provided, demonstrating how splitting and squeezing types of two-mode magnon quantum correlations can be realized across ferro- and antiferromagnetic regimes.
With the continuous development of China's financial market and the gradual improvement of the financial system, investors are increasingly interested in participating in investments. At the same time, there is a ...
详细信息
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...
详细信息
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of *** technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the *** the traditional blockchain,data is stored in a Merkle *** data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based ***,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of *** solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC ***,this paper uses PVC instead of the Merkle tree to store big data generated by *** can improve the efficiency of traditional VC in the process of commitment and ***,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of *** mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,whic...
详细信息
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,which makes task assignment inefficient due to insufficient *** this paper,an Intelligent and Trustworthy task assignment method based on Trust and Social relations(ITTS)is proposed for scenarios with many tasks and few ***,ITTS first makes initial assignments based on trust and social influences,thereby transforming the complex large-scale industrial task assignment of the platform into the small-scale task assignment for each ***,an intelligent Q-decision mechanism based on workers'social relation is proposed,which adopts the first-exploration-then-utilization principle to allocate *** when a worker cannot cope with the assigned tasks,it initiates dynamic worker recruitment,thus effectively solving the worker shortage problem as well as the cold start *** importantly,we consider trust and security issues,and evaluate the trust and social circles of workers by accumulating task feedback,to provide the platform a reference for worker recruitment,thereby creating a high-quality worker ***,extensive simulations demonstrate ITTS outperforms two benchmark methods by increasing task completion rates by 56.49%-61.53%and profit by 42.34%-47.19%.
In this paper,a two-step iteration method is established which can be viewed as a generalization of the existing modulus-based methods for vertical linear complementarity problems given by He and Vong(***.134:108344,2...
详细信息
In this paper,a two-step iteration method is established which can be viewed as a generalization of the existing modulus-based methods for vertical linear complementarity problems given by He and Vong(***.134:108344,2022).The convergence analysis of the proposed method is established,which can improve the existing *** examples show that the proposed method is efficient with the two-step technique.
This paper introduces a memristor-based neural network with bidirectional cyclic constructed from square wave pulse functions. Additionally, we design an image encryption and compression network framework incorporatin...
详细信息
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tile...
详细信息
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tiles in turn until they complete a winning hand. An important notion in Mahjong is the deficiency number(*** number in Japanese Mahjong) of a hand, which estimates how many tile changes are necessary to complete the hand into a winning hand. The deficiency number plays an essential role in major decision-making tasks such as selecting a tile to discard. This paper proposes a fast algorithm for computing the deficiency number of a Mahjong hand. Compared with the baseline algorithm, the new algorithm is usually 100 times faster and, more importantly,respects the agent's knowledge about available tiles. The algorithm can be used as a basic procedure in all Mahjong variants by both rule-based and machine learning-based Mahjong AI.
暂无评论