In real-world applications, models often encounter a sequence of unlabeled new tasks, each containing unknown classes. This paper explores class-incremental novel class discovery (class-iNCD), which requires maintaini...
详细信息
In real-world applications, models often encounter a sequence of unlabeled new tasks, each containing unknown classes. This paper explores class-incremental novel class discovery (class-iNCD), which requires maintaining previously learned knowledge while discovering novel classes. We consider a more realistic and also more challenging scenario, which has a small number of initial known classes and a large number of unlabeled tasks, with the additional requirement of data privacy protection. A simple yet effective approach, Two-Step Prompt Tuning (TSPT), is proposed. TSPT tackles class-iNCD through prompt tuning, which is rehearsal-free and plug-and-play, protecting data privacy and significantly reducing the number of trainable parameters. TSPT consists of two main steps: (1) novel class discovery, which initializes the classifier using uniform clustering, and uses intra- and inter-sample consistency learning to discover novel classes; and, (2) knowledge fusion, where the prompt learned in the previous step is adapted as task-specific prompt, and additional optimal prompts are selected from a prompt pool to integrate knowledge from both old and new classes. Experiments on three datasets demonstrated the effectiveness of TSPT.
This paper presents a novel approach to compute DCT-I, DCT-III, and DCT-IV. By using a modular mapping and truncating, DCTs are approximated by linear sums of discrete moments computed fast only through additions. Thi...
详细信息
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d...
详细信息
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control *** quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion ***,we design an energy controller to dynamically adjust the system energy changes caused by unknown *** designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping ***,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack *** addition,this secure control method is simple to implement because it avoids complicated mathematical *** effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor.
In this paper, an optimal guidance algorithm is proposed for atmospheric ascent. The optimal guidance algorithm updates the reference trajectory to deal with the impact of disturbance by solving an optimal control pro...
详细信息
Transfer learning(TL)utilizes data or knowledge from one or more source domains to facilitate learning in a target *** is particularly useful when the target domain has very few or no labeled data,due to annotation ex...
详细信息
Transfer learning(TL)utilizes data or knowledge from one or more source domains to facilitate learning in a target *** is particularly useful when the target domain has very few or no labeled data,due to annotation expense,privacy concerns,***,the effectiveness of TL is not always *** transfer(NT),i.e.,leveraging source domain data/knowledge undesirably reduces learning performance in the target domain,and has been a long-standing and challenging problem in *** approaches have been proposed in the literature to address this ***,there does not exist a systematic *** paper fills this gap,by first introducing the definition of NT and its causes,and reviewing over fifty representative approaches for overcoming NT,which fall into three categories:domain similarity estimation,safe transfer,and NT *** areas,including computer vision,bioinformatics,natural language processing,recommender systems,and robotics,that use NT mitigation strategies to facilitate positive transfers,are also ***,we give guidelines on NT task construction and baseline algorithms,benchmark existing TL and NT mitigation approaches on three NT-specific datasets,and point out challenges and future research *** ensure reproducibility,our code is publicized at https://***/chamwen/NT-Benchmark.
This paper presented a control design methodology for a proton exchange membrane fuel cell (PEMFC) generation system for residential applications. The dynamic behavior of the generation system is complex in such appli...
详细信息
This paper presented a control design methodology for a proton exchange membrane fuel cell (PEMFC) generation system for residential applications. The dynamic behavior of the generation system is complex in such applications. A comprehensive control design is very important for achieving a steady system operation and efficiency. The control strategy for a 60 kW generation system was proposed and tested based on the system dynamic model. A two-variable single neuron proportional-integral (PI) decoupling controller was developed for anode pressure and humidity by adjusting the hydrogen flow and water injection. A similar controller was developed for cathode pressure and humidity by adjusting the exhaust flow and water injection. The desired oxygen excess ratio was kept by a feedback controller based on the load current. An optimal seeking controller was used to trace the unique optimal power point. Two negative feedback controllers were used to provide AC power and a suitable voltage for residential loads by a power conditioning unit. control simulation tests showed that 60 kW PEMFC generation system responded well for computer-simulated step changes in the load power demand. This control methodology for a 60 kW PEMFC generation system would be a competitive solution for system level designs such as parameter design, performance analysis, and online optimization.
This article studies the consensus problem for multiagent systems with transmission constraints. A novel model of multiagent systems is proposed where the information transmissions between agents are disturbed by irre...
详细信息
The aim of the present work is to assess the performance of three-dimensional Double Directional Filtering (TDDDF) algorithm for detecting and tracking a weak moving dim target against a complex cluttered background i...
详细信息
The aim of the present work is to assess the performance of three-dimensional Double Directional Filtering (TDDDF) algorithm for detecting and tracking a weak moving dim target against a complex cluttered background in infrared image sequences. This paper proposes an novel TDDDF to improve the integrated signal-to-clutter ratio (ISCR) and enhance the three-dimensional directional filter's (TDDF) target energy accumulation ability further. Since the TDDDF do well to whitening noise (or quasi whitening noise) but not so sensitive to complex cloudscene background, prior to the filtering, a newly pre-whitening method termed Spatial-Temporal Adaptive Filtering algorithm is used here to suppress clutter background. Extensive experiment results demonstrate the proposed algorithm's ability in detecting weak dim point target against cloud-cluttered background. Finally, performance comparisons of the proposed algorithm and TDDF, on real IR image data, are presented in which the advantages of the proposed TDDDF filters are shown.
In this paper, a pixel-level image fusion algorithm based on Nonsubsampled Contourlet Transform (NSCT) has been proposed. Compared with Contourlet Transform, NSCT is redundant, shift-invariant and more suitable for im...
详细信息
ISBN:
(纸本)9780819469519
In this paper, a pixel-level image fusion algorithm based on Nonsubsampled Contourlet Transform (NSCT) has been proposed. Compared with Contourlet Transform, NSCT is redundant, shift-invariant and more suitable for image fusion. Each image from different sensors could be decomposed into a low frequency image and a series of high frequency images of different directions by multi-sacle NSCT. For low and high frequency images, they are fused based on local-contrast enhancement and definition respectively. Finally, fused image is reconstructed from low and high frequency fused images. Experiment demonstrates that NSCT could preserve edge significantly and the fusion rule based on region segmentation performances well in local-contrast enhancement.
This paper proposes a new second-order continuous-time multi-agent model and analyzes the controllability of second-order multi-agent system with multiple leaders based on the asymmetric *** paper considers the more g...
详细信息
This paper proposes a new second-order continuous-time multi-agent model and analyzes the controllability of second-order multi-agent system with multiple leaders based on the asymmetric *** paper considers the more general case:velocity coupling topology is different from location coupling *** sufficient and necessary conditions are presented for the controllability of the system with multiple *** addition,the paper studies the controllability of the system with velocity damping *** results are given to illustrate the correctness of theoretical results.
暂无评论