The planning of teaching for a course that belongs to an undergraduate program usually begins with the definition of its contents,which are derived from syllabus of a political-pedagogical project.The contents listed ...The planning of teaching for a course that belongs to an undergraduate program usually begins with the definition of its contents,which are derived from syllabus of a political-pedagogical project.The contents listed are organized in a sequence considered logical.A set of actions is planned,such as lectures,laboratories,among others,through which content will be developed.The previous training of the student is considered,the concurrent and subsequent courses,the context of the course inside the program,the specific and general objectives of the program.A set of assessments is also defined as part of this planning,the associated methodologies,techniques and teaching objectives.In this context,this paper focuses on the aspect of the sequencing of content,methodologies and teaching techniques in a course.For this purpose,the Bloom's Taxonomy of Educational Objectives is applied,which provides a hierarchical structure for the cognitive process.The importance of this hierarchy of knowledge is greater awareness of the teacher about the ways to be adopted in the teaching process.展开更多
DURING our discussion at workshops for writing“What Does ChatGPT Say:The DAO from Algorithmic Intelligence to Linguistic Intelligence”[1],we had expected the next milestone for Artificial Intelligence(AI)would be in...DURING our discussion at workshops for writing“What Does ChatGPT Say:The DAO from Algorithmic Intelligence to Linguistic Intelligence”[1],we had expected the next milestone for Artificial Intelligence(AI)would be in the direction of Imaginative Intelligence(II),i.e.,something similar to automatic wordsto-videos generation or intelligent digital movies/theater technology that could be used for conducting new“Artificiofactual Experiments”[2]to replace conventional“Counterfactual Experiments”in scientific research and technical development for both natural and social studies[2]-[6].Now we have OpenAI’s Sora,so soon,but this is not the final,actually far away,and it is just the beginning.展开更多
This research presents a novel nature-inspired metaheuristic algorithm called Frilled Lizard Optimization(FLO),which emulates the unique hunting behavior of frilled lizards in their natural habitat.FLO draws its inspi...This research presents a novel nature-inspired metaheuristic algorithm called Frilled Lizard Optimization(FLO),which emulates the unique hunting behavior of frilled lizards in their natural habitat.FLO draws its inspiration from the sit-and-wait hunting strategy of these lizards.The algorithm’s core principles are meticulously detailed and mathematically structured into two distinct phases:(i)an exploration phase,which mimics the lizard’s sudden attack on its prey,and(ii)an exploitation phase,which simulates the lizard’s retreat to the treetops after feeding.To assess FLO’s efficacy in addressing optimization problems,its performance is rigorously tested on fifty-two standard benchmark functions.These functions include unimodal,high-dimensional multimodal,and fixed-dimensional multimodal functions,as well as the challenging CEC 2017 test suite.FLO’s performance is benchmarked against twelve established metaheuristic algorithms,providing a comprehensive comparative analysis.The simulation results demonstrate that FLO excels in both exploration and exploitation,effectively balancing these two critical aspects throughout the search process.This balanced approach enables FLO to outperform several competing algorithms in numerous test cases.Additionally,FLO is applied to twenty-two constrained optimization problems from the CEC 2011 test suite and four complex engineering design problems,further validating its robustness and versatility in solving real-world optimization challenges.Overall,the study highlights FLO’s superior performance and its potential as a powerful tool for tackling a wide range of optimization problems.展开更多
6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is...6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is leveraged to enhance computer vision applications’security,trustworthiness,and transparency.With the widespread use of mobile devices equipped with cameras,the ability to capture and recognize Chinese characters in natural scenes has become increasingly important.Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount,such as facial recognition or personal healthcare monitoring.Users can control their visual data and grant or revoke access as needed.Recognizing Chinese characters from images can provide convenience in various aspects of people’s lives.However,traditional Chinese character text recognition methods often need higher accuracy,leading to recognition failures or incorrect character identification.In contrast,computer vision technologies have significantly improved image recognition accuracy.This paper proposed a Secure end-to-end recognition system(SE2ERS)for Chinese characters in natural scenes based on convolutional neural networks(CNN)using 6G technology.The proposed SE2ERS model uses the Weighted Hyperbolic Curve Cryptograph(WHCC)of the secure data transmission in the 6G network with the blockchain model.The data transmission within the computer vision system,with a 6G gradient directional histogram(GDH),is employed for character estimation.With the deployment of WHCC and GDH in the constructed SE2ERS model,secure communication is achieved for the data transmission with the 6G network.The proposed SE2ERS compares the performance of traditional Chinese text recognition methods and data transmission environment with 6G communication.Experimental results demonstrate that SE2ERS achieves an average recognition accuracy of 88%for simple Chinese characters,compared to 81.2%with traditional methods.For complex Chinese characters,the average recognition accuracy improves to 84.4%with our system,compared to 72.8%with traditional methods.Additionally,deploying the WHCC model improves data security with the increased data encryption rate complexity of∼12&higher than the traditional techniques.展开更多
Recent developments in Computer Vision have presented novel opportunities to tackle complex healthcare issues,particularly in the field of lung disease diagnosis.One promising avenue involves the use of chest X-Rays,w...Recent developments in Computer Vision have presented novel opportunities to tackle complex healthcare issues,particularly in the field of lung disease diagnosis.One promising avenue involves the use of chest X-Rays,which are commonly utilized in radiology.To fully exploit their potential,researchers have suggested utilizing deep learning methods to construct computer-aided diagnostic systems.However,constructing and compressing these systems presents a significant challenge,as it relies heavily on the expertise of data scientists.To tackle this issue,we propose an automated approach that utilizes an evolutionary algorithm(EA)to optimize the design and compression of a convolutional neural network(CNN)for X-Ray image classification.Our approach accurately classifies radiography images and detects potential chest abnormalities and infections,including COVID-19.Furthermore,our approach incorporates transfer learning,where a pre-trainedCNNmodel on a vast dataset of chest X-Ray images is fine-tuned for the specific task of detecting COVID-19.This method can help reduce the amount of labeled data required for the task and enhance the overall performance of the model.We have validated our method via a series of experiments against state-of-the-art architectures.展开更多
A significant fraction of the world’s population is living in cities. With the rapid development ofinformation and computing technologies (ICT), cities may be made smarter by embedding ICT intotheir infrastructure. B...A significant fraction of the world’s population is living in cities. With the rapid development ofinformation and computing technologies (ICT), cities may be made smarter by embedding ICT intotheir infrastructure. By smarter, we mean that the city operation will be more efficient, cost-effective,energy-saving, be more connected, more secure, and more environmentally friendly. As such, a smartcity is typically defined as a city that has a strong integration with ICT in all its components, includingits physical components, social components, and business components [1,2].展开更多
Photosensors with versatile functionalities have emerged as a cornerstone for breakthroughs in the future optoelectronic systems across a wide range of applications.In particular,emerging photoelectrochemical(PEC)-typ...Photosensors with versatile functionalities have emerged as a cornerstone for breakthroughs in the future optoelectronic systems across a wide range of applications.In particular,emerging photoelectrochemical(PEC)-type devices have recently attracted extensive interest in liquid-based biosensing applications due to their natural electrolyte-assisted operating characteristics.Herein,a PEC-type photosensor was carefully designed and constructed by employing gallium nitride(GaN)p-n homojunction semiconductor nanowires on silicon,with the p-GaN segment strategically doped and then decorated with cobalt-nickel oxide(CoNiO_(x)).Essentially,the p-n homojunction configuration with facile p-doping engineering improves carrier separation efficiency and facilitates carrier transfer to the nanowire surface,while CoNiO_(x)decoration further boosts PEC reaction activity and carrier dynamics at the nanowire/electrolyte interface.Consequently,the constructed photosensor achieves a high responsivity of 247.8 mA W^(-1)while simultaneously exhibiting excellent operating stability.Strikingly,based on the remarkable stability and high responsivity of the device,a glucose sensing system was established with a demonstration of glucose level determination in real human serum.This work offers a feasible and universal approach in the pursuit of high-performance bio-related sensing applications via a rational design of PEC devices in the form of nanostructured architecture with strategic doping engineering.展开更多
Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization problems.This approach aims to leverage the strengt...Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization problems.This approach aims to leverage the strengths of multiple algorithms,enhancing solution quality,convergence speed,and robustness,thereby offering a more versatile and efficient means of solving intricate real-world optimization tasks.In this paper,we introduce a hybrid algorithm that amalgamates three distinct metaheuristics:the Beluga Whale Optimization(BWO),the Honey Badger Algorithm(HBA),and the Jellyfish Search(JS)optimizer.The proposed hybrid algorithm will be referred to as BHJO.Through this fusion,the BHJO algorithm aims to leverage the strengths of each optimizer.Before this hybridization,we thoroughly examined the exploration and exploitation capabilities of the BWO,HBA,and JS metaheuristics,as well as their ability to strike a balance between exploration and exploitation.This meticulous analysis allowed us to identify the pros and cons of each algorithm,enabling us to combine them in a novel hybrid approach that capitalizes on their respective strengths for enhanced optimization performance.In addition,the BHJO algorithm incorporates Opposition-Based Learning(OBL)to harness the advantages offered by this technique,leveraging its diverse exploration,accelerated convergence,and improved solution quality to enhance the overall performance and effectiveness of the hybrid algorithm.Moreover,the performance of the BHJO algorithm was evaluated across a range of both unconstrained and constrained optimization problems,providing a comprehensive assessment of its efficacy and applicability in diverse problem domains.Similarly,the BHJO algorithm was subjected to a comparative analysis with several renowned algorithms,where mean and standard deviation values were utilized as evaluation metrics.This rigorous comparison aimed to assess the performance of the BHJOalgorithmabout its counterparts,shedding light on its effectiveness and reliability in solving optimization problems.Finally,the obtained numerical statistics underwent rigorous analysis using the Friedman post hoc Dunn’s test.The resulting numerical values revealed the BHJO algorithm’s competitiveness in tackling intricate optimization problems,affirming its capability to deliver favorable outcomes in challenging scenarios.展开更多
Electrochemical carbon dioxide reduction reaction(CO_(2)RR)provides a promising way to convert CO_(2)to chemicals.The multicarbon(C_(2+))products,especially ethylene,are of great interest due to their versatile indust...Electrochemical carbon dioxide reduction reaction(CO_(2)RR)provides a promising way to convert CO_(2)to chemicals.The multicarbon(C_(2+))products,especially ethylene,are of great interest due to their versatile industrial applications.However,selectively reducing CO_(2)to ethylene is still challenging as the additional energy required for the C–C coupling step results in large overpotential and many competing products.Nonetheless,mechanistic understanding of the key steps and preferred reaction pathways/conditions,as well as rational design of novel catalysts for ethylene production have been regarded as promising approaches to achieving the highly efficient and selective CO_(2)RR.In this review,we first illustrate the key steps for CO_(2)RR to ethylene(e.g.,CO_(2)adsorption/activation,formation of~*CO intermediate,C–C coupling step),offering mechanistic understanding of CO_(2)RR conversion to ethylene.Then the alternative reaction pathways and conditions for the formation of ethylene and competitive products(C_1 and other C_(2+)products)are investigated,guiding the further design and development of preferred conditions for ethylene generation.Engineering strategies of Cu-based catalysts for CO_(2)RR-ethylene are further summarized,and the correlations of reaction mechanism/pathways,engineering strategies and selectivity are elaborated.Finally,major challenges and perspectives in the research area of CO_(2)RR are proposed for future development and practical applications.展开更多
Aging is a natural process that leads to debility,disease,and dependency.Alzheimer’s disease(AD)causes degeneration of the brain cells leading to cognitive decline and memory loss,as well as dependence on others to f...Aging is a natural process that leads to debility,disease,and dependency.Alzheimer’s disease(AD)causes degeneration of the brain cells leading to cognitive decline and memory loss,as well as dependence on others to fulfill basic daily needs.AD is the major cause of dementia.Computer-aided diagnosis(CADx)tools aid medical practitioners in accurately identifying diseases such as AD in patients.This study aimed to develop a CADx tool for the early detection of AD using the Intelligent Water Drop(IWD)algorithm and the Random Forest(RF)classifier.The IWD algorithm an efficient feature selection method,was used to identify the most deterministic features of AD in the dataset.RF is an ensemble method that leverages multiple weak learners to classify a patient’s disease as either demented(DN)or cognitively normal(CN).The proposed tool also classifies patients as mild cognitive impairment(MCI)or CN.The dataset on which the performance of the proposed CADx was evaluated was sourced from the Alzheimer’s Disease Neuroimaging Initiative(ADNI).The RF ensemble method achieves 100%accuracy in identifying DN patients from CN patients.The classification accuracy for classifying patients as MCI or CN is 92%.This study emphasizes the significance of pre-processing prior to classification to improve the classification results of the proposed CADx tool.展开更多
The coronavirus(COVID-19)is a lethal virus causing a rapidly infec-tious disease throughout the globe.Spreading awareness,taking preventive mea-sures,imposing strict restrictions on public gatherings,wearing facial ma...The coronavirus(COVID-19)is a lethal virus causing a rapidly infec-tious disease throughout the globe.Spreading awareness,taking preventive mea-sures,imposing strict restrictions on public gatherings,wearing facial masks,and maintaining safe social distancing have become crucial factors in keeping the virus at bay.Even though the world has spent a whole year preventing and curing the disease caused by the COVID-19 virus,the statistics show that the virus can cause an outbreak at any time on a large scale if thorough preventive measures are not maintained accordingly.Tofight the spread of this virus,technologically developed systems have become very useful.However,the implementation of an automatic,robust,continuous,and lightweight monitoring system that can be efficiently deployed on an embedded device still has not become prevalent in the mass community.This paper aims to develop an automatic system to simul-taneously detect social distance and face mask violation in real-time that has been deployed in an embedded system.A modified version of a convolutional neural network,the ResNet50 model,has been utilized to identify masked faces in peo-ple.You Only Look Once(YOLOv3)approach is applied for object detection and the DeepSORT technique is used to measure the social distance.The efficiency of the proposed model is tested on real-time video sequences taken from a video streaming source from an embedded system,Jetson Nano edge computing device,and smartphones,Android and iOS applications.Empirical results show that the implemented model can efficiently detect facial masks and social distance viola-tions with acceptable accuracy and precision scores.展开更多
Current techniques of forest inventory rely on manual measurements and are slow and labor intensive.Recent developments in computer vision and depth sensing can produce accurate measurement data at significantly reduc...Current techniques of forest inventory rely on manual measurements and are slow and labor intensive.Recent developments in computer vision and depth sensing can produce accurate measurement data at significantly reduced time and labor costs.We developed the ForSense system to measure the diameters of trees at various points along the stem as well as stem straightness.Time use,mean absolute error(MAE),and root mean squared error(RMSE)metrics were used to compare the system against manual methods,and to compare the system against itself(reproducibility).Depth-derived diameter measurements of the stems at the heights of 0.3,1.4,and 2.7 m achieved RMSE of 1.7,1.5,and 2.7 cm,respectively.The ForSense system produced straightness measurement data that was highly correlated with straightness ratings by trained foresters.The ForSense system was also consistent,achieving sub-centimeter diameter difference with subsequent measures and less than 4%difference in straightness value between runs.This method of forest inventory,which is based on depth-image computer vision,is time efficient compared to manual methods and less computationally and technologically intensive compared to Structure-from-Motion(SFM)photogrammetry and ground-based LiDAR or terrestrial laser scanning(TLS).展开更多
Alzheimer’s disease (AD) is a brain disorder that eventually causes memory loss and the ability to perform simple cognitive functions;research efforts within pharmaceuticals and other medical treatments have minimal ...Alzheimer’s disease (AD) is a brain disorder that eventually causes memory loss and the ability to perform simple cognitive functions;research efforts within pharmaceuticals and other medical treatments have minimal impact on the disease. Our preliminary biological studies showed that Repeated Electromagnetic Field Stimulation (REFMS) applying an EM frequency of 64 MHz and a specific absorption rate (SAR) of 0.4 - 0.9 W/kg decrease the level of amyloid-β peptides (Aβ), which is the most likely etiology of AD. This study emphasizes uniform E/H field and SAR distribution with adequate penetration depth penetration through multiple human head layers driven with low input power for safety treatments. In this work, we performed numerical modeling and computer simulations of a portable Meander Line antenna (MLA) to achieve the required EMF parameters to treat AD. The MLA device features a low cost, small size, wide bandwidth, and the ability to integrate into a portable system. This study utilized a High-Frequency Simulation System (HFSS) in the design of the MLA with the desired characteristics suited for AD treatment in humans. The team designed a 24-turn antenna with a 60 cm length and 25 cm width and achieved the required resonant frequency of 64 MHz. Here we used two numerical human head phantoms to test the antenna, the MIDA and spherical head phantom with six and seven tissue layers, respectively. The antenna was fed from a 50-Watt input source to obtain the SAR of 0.6 W/kg requirement in the center of the simulated brain tissue layer. We found that the E/H field and SAR distribution produced was not homogeneous;there were areas of high SAR values close to the antenna transmitter, also areas of low SAR value far away from the antenna. This paper details the antenna parameters, the scattering parameters response, the efficiency response, and the E and H field distribution;we presented the computer simulation results and discussed future work for a practical model.展开更多
A deep fusion model is proposed for facial expression-based human-computer Interaction system.Initially,image preprocessing,i.e.,the extraction of the facial region from the input image is utilized.Thereafter,the extr...A deep fusion model is proposed for facial expression-based human-computer Interaction system.Initially,image preprocessing,i.e.,the extraction of the facial region from the input image is utilized.Thereafter,the extraction of more discriminative and distinctive deep learning features is achieved using extracted facial regions.To prevent overfitting,in-depth features of facial images are extracted and assigned to the proposed convolutional neural network(CNN)models.Various CNN models are then trained.Finally,the performance of each CNN model is fused to obtain the final decision for the seven basic classes of facial expressions,i.e.,fear,disgust,anger,surprise,sadness,happiness,neutral.For experimental purposes,three benchmark datasets,i.e.,SFEW,CK+,and KDEF are utilized.The performance of the proposed systemis compared with some state-of-the-artmethods concerning each dataset.Extensive performance analysis reveals that the proposed system outperforms the competitive methods in terms of various performance metrics.Finally,the proposed deep fusion model is being utilized to control a music player using the recognized emotions of the users.展开更多
The earliest and most accurate detection of the pathological manifestations of hepatic diseases ensures effective treatments and thus positive prognostic outcomes.In clinical settings,screening and determining the ext...The earliest and most accurate detection of the pathological manifestations of hepatic diseases ensures effective treatments and thus positive prognostic outcomes.In clinical settings,screening and determining the extent of a pathology are prominent factors in preparing remedial agents and administering approp-riate therapeutic procedures.Moreover,in a patient undergoing liver resection,a realistic preoperative simulation of the subject-specific anatomy and physiology also plays a vital part in conducting initial assessments,making surgical decisions during the procedure,and anticipating postoperative results.Conventionally,various medical imaging modalities,e.g.,computed tomography,magnetic resonance imaging,and positron emission tomography,have been employed to assist in these tasks.In fact,several standardized procedures,such as lesion detection and liver segmentation,are also incorporated into prominent commercial software packages.Thus far,most integrated software as a medical device typically involves tedious interactions from the physician,such as manual delineation and empirical adjustments,as per a given patient.With the rapid progress in digital health approaches,especially medical image analysis,a wide range of computer algorithms have been proposed to facilitate those procedures.They include pattern recognition of a liver,its periphery,and lesion,as well as pre-and postoperative simulations.Prior to clinical adoption,however,software must conform to regulatory requirements set by the governing agency,for instance,valid clinical association and analytical and clinical validation.Therefore,this paper provides a detailed account and discussion of the state-of-the-art methods for liver image analyses,visualization,and simulation in the literature.Emphasis is placed upon their concepts,algorithmic classifications,merits,limitations,clinical considerations,and future research trends.展开更多
During the prodromal stage of Alzheimer’s disease (AD), neurodegenerative changes can be identified by measuring volumetric loss in AD-prone brain regions on MRI. Cognitive assessments that are sensitive enough to me...During the prodromal stage of Alzheimer’s disease (AD), neurodegenerative changes can be identified by measuring volumetric loss in AD-prone brain regions on MRI. Cognitive assessments that are sensitive enough to measure the early brain-behavior manifestations of AD and that correlate with biomarkers of neurodegeneration are needed to identify and monitor individuals at risk for dementia. Weak sensitivity to early cognitive change has been a major limitation of traditional cognitive assessments. In this study, we focused on expanding our previous work by determining whether a digitized cognitive stress test, the Loewenstein-Acevedo Scales for Semantic Interference and Learning, Brief Computerized Version (LASSI-BC) could differentiate between Cognitively Unimpaired (CU) and amnestic Mild Cognitive Impairment (aMCI) groups. A second focus was to correlate LASSI-BC performance to volumetric reductions in AD-prone brain regions. Data was gathered from 111 older adults who were comprehensively evaluated and administered the LASSI-BC. Eighty-seven of these participants (51 CU;36 aMCI) underwent MR imaging. The volumes of 12 AD-prone brain regions were related to LASSI-BC and other memory tests correcting for False Discovery Rate (FDR). Results indicated that, even after adjusting for initial learning ability, the failure to recover from proactive semantic interference (frPSI) on the LASSI-BC differentiated between CU and aMCI groups. An optimal combination of frPSI and initial learning strength on the LASSI-BC yielded an area under the ROC curve of 0.876 (76.1% sensitivity, 82.7% specificity). Further, frPSI on the LASSI-BC was associated with volumetric reductions in the hippocampus, amygdala, inferior temporal lobes, precuneus, and posterior cingulate.展开更多
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since...Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.展开更多
Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and ...Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and its applications to various advanced control fields. First, the background of the development of ADP is described, emphasizing the significance of regulation and tracking control problems. Some effective offline and online algorithms for ADP/adaptive critic control are displayed, where the main results towards discrete-time systems and continuous-time systems are surveyed, respectively.Then, the research progress on adaptive critic control based on the event-triggered framework and under uncertain environment is discussed, respectively, where event-based design, robust stabilization, and game design are reviewed. Moreover, the extensions of ADP for addressing control problems under complex environment attract enormous attention. The ADP architecture is revisited under the perspective of data-driven and RL frameworks,showing how they promote ADP formulation significantly.Finally, several typical control applications with respect to RL and ADP are summarized, particularly in the fields of wastewater treatment processes and power systems, followed by some general prospects for future research. Overall, the comprehensive survey on ADP and RL for advanced control applications has d emonstrated its remarkable potential within the artificial intelligence era. In addition, it also plays a vital role in promoting environmental protection and industrial intelligence.展开更多
The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have be...The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have been raised over the security and privacy of the tons of traffic and vehicle data.In this regard,Federated Learning(FL)with privacy protection features is considered a highly promising solution.However,in the FL process,the server side may take advantage of its dominant role in model aggregation to steal sensitive information of users,while the client side may also upload malicious data to compromise the training of the global model.Most existing privacy-preserving FL schemes in IoV fail to deal with threats from both of these two sides at the same time.In this paper,we propose a Blockchain based Privacy-preserving Federated Learning scheme named BPFL,which uses blockchain as the underlying distributed framework of FL.We improve the Multi-Krum technology and combine it with the homomorphic encryption to achieve ciphertext-level model aggregation and model filtering,which can enable the verifiability of the local models while achieving privacy-preservation.Additionally,we develop a reputation-based incentive mechanism to encourage users in IoV to actively participate in the federated learning and to practice honesty.The security analysis and performance evaluations are conducted to show that the proposed scheme can meet the security requirements and improve the performance of the FL model.展开更多
Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to est...Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to establish relationships between distant but relevant points. To overcome the limitation of local spatial attention, we propose a point content-based Transformer architecture, called PointConT for short. It exploits the locality of points in the feature space(content-based), which clusters the sampled points with similar features into the same class and computes the self-attention within each class, thus enabling an effective trade-off between capturing long-range dependencies and computational complexity. We further introduce an inception feature aggregator for point cloud classification, which uses parallel structures to aggregate high-frequency and low-frequency information in each branch separately. Extensive experiments show that our PointConT model achieves a remarkable performance on point cloud shape classification. Especially, our method exhibits 90.3% Top-1 accuracy on the hardest setting of ScanObjectN N. Source code of this paper is available at https://github.com/yahuiliu99/PointC onT.展开更多
文摘The planning of teaching for a course that belongs to an undergraduate program usually begins with the definition of its contents,which are derived from syllabus of a political-pedagogical project.The contents listed are organized in a sequence considered logical.A set of actions is planned,such as lectures,laboratories,among others,through which content will be developed.The previous training of the student is considered,the concurrent and subsequent courses,the context of the course inside the program,the specific and general objectives of the program.A set of assessments is also defined as part of this planning,the associated methodologies,techniques and teaching objectives.In this context,this paper focuses on the aspect of the sequencing of content,methodologies and teaching techniques in a course.For this purpose,the Bloom's Taxonomy of Educational Objectives is applied,which provides a hierarchical structure for the cognitive process.The importance of this hierarchy of knowledge is greater awareness of the teacher about the ways to be adopted in the teaching process.
基金the National Natural Science Foundation of China(62271485,61903363,U1811463,62103411,62203250)the Science and Technology Development Fund of Macao SAR(0093/2023/RIA2,0050/2020/A1)。
文摘DURING our discussion at workshops for writing“What Does ChatGPT Say:The DAO from Algorithmic Intelligence to Linguistic Intelligence”[1],we had expected the next milestone for Artificial Intelligence(AI)would be in the direction of Imaginative Intelligence(II),i.e.,something similar to automatic wordsto-videos generation or intelligent digital movies/theater technology that could be used for conducting new“Artificiofactual Experiments”[2]to replace conventional“Counterfactual Experiments”in scientific research and technical development for both natural and social studies[2]-[6].Now we have OpenAI’s Sora,so soon,but this is not the final,actually far away,and it is just the beginning.
文摘This research presents a novel nature-inspired metaheuristic algorithm called Frilled Lizard Optimization(FLO),which emulates the unique hunting behavior of frilled lizards in their natural habitat.FLO draws its inspiration from the sit-and-wait hunting strategy of these lizards.The algorithm’s core principles are meticulously detailed and mathematically structured into two distinct phases:(i)an exploration phase,which mimics the lizard’s sudden attack on its prey,and(ii)an exploitation phase,which simulates the lizard’s retreat to the treetops after feeding.To assess FLO’s efficacy in addressing optimization problems,its performance is rigorously tested on fifty-two standard benchmark functions.These functions include unimodal,high-dimensional multimodal,and fixed-dimensional multimodal functions,as well as the challenging CEC 2017 test suite.FLO’s performance is benchmarked against twelve established metaheuristic algorithms,providing a comprehensive comparative analysis.The simulation results demonstrate that FLO excels in both exploration and exploitation,effectively balancing these two critical aspects throughout the search process.This balanced approach enables FLO to outperform several competing algorithms in numerous test cases.Additionally,FLO is applied to twenty-two constrained optimization problems from the CEC 2011 test suite and four complex engineering design problems,further validating its robustness and versatility in solving real-world optimization challenges.Overall,the study highlights FLO’s superior performance and its potential as a powerful tool for tackling a wide range of optimization problems.
基金supported by the Inner Mongolia Natural Science Fund Project(2019MS06013)Ordos Science and Technology Plan Project(2022YY041)Hunan Enterprise Science and Technology Commissioner Program(2021GK5042).
文摘6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is leveraged to enhance computer vision applications’security,trustworthiness,and transparency.With the widespread use of mobile devices equipped with cameras,the ability to capture and recognize Chinese characters in natural scenes has become increasingly important.Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount,such as facial recognition or personal healthcare monitoring.Users can control their visual data and grant or revoke access as needed.Recognizing Chinese characters from images can provide convenience in various aspects of people’s lives.However,traditional Chinese character text recognition methods often need higher accuracy,leading to recognition failures or incorrect character identification.In contrast,computer vision technologies have significantly improved image recognition accuracy.This paper proposed a Secure end-to-end recognition system(SE2ERS)for Chinese characters in natural scenes based on convolutional neural networks(CNN)using 6G technology.The proposed SE2ERS model uses the Weighted Hyperbolic Curve Cryptograph(WHCC)of the secure data transmission in the 6G network with the blockchain model.The data transmission within the computer vision system,with a 6G gradient directional histogram(GDH),is employed for character estimation.With the deployment of WHCC and GDH in the constructed SE2ERS model,secure communication is achieved for the data transmission with the 6G network.The proposed SE2ERS compares the performance of traditional Chinese text recognition methods and data transmission environment with 6G communication.Experimental results demonstrate that SE2ERS achieves an average recognition accuracy of 88%for simple Chinese characters,compared to 81.2%with traditional methods.For complex Chinese characters,the average recognition accuracy improves to 84.4%with our system,compared to 72.8%with traditional methods.Additionally,deploying the WHCC model improves data security with the increased data encryption rate complexity of∼12&higher than the traditional techniques.
基金via funding from Prince Sattam bin Abdulaziz University Project Number(PSAU/2023/R/1444).
文摘Recent developments in Computer Vision have presented novel opportunities to tackle complex healthcare issues,particularly in the field of lung disease diagnosis.One promising avenue involves the use of chest X-Rays,which are commonly utilized in radiology.To fully exploit their potential,researchers have suggested utilizing deep learning methods to construct computer-aided diagnostic systems.However,constructing and compressing these systems presents a significant challenge,as it relies heavily on the expertise of data scientists.To tackle this issue,we propose an automated approach that utilizes an evolutionary algorithm(EA)to optimize the design and compression of a convolutional neural network(CNN)for X-Ray image classification.Our approach accurately classifies radiography images and detects potential chest abnormalities and infections,including COVID-19.Furthermore,our approach incorporates transfer learning,where a pre-trainedCNNmodel on a vast dataset of chest X-Ray images is fine-tuned for the specific task of detecting COVID-19.This method can help reduce the amount of labeled data required for the task and enhance the overall performance of the model.We have validated our method via a series of experiments against state-of-the-art architectures.
文摘A significant fraction of the world’s population is living in cities. With the rapid development ofinformation and computing technologies (ICT), cities may be made smarter by embedding ICT intotheir infrastructure. By smarter, we mean that the city operation will be more efficient, cost-effective,energy-saving, be more connected, more secure, and more environmentally friendly. As such, a smartcity is typically defined as a city that has a strong integration with ICT in all its components, includingits physical components, social components, and business components [1,2].
基金funded by the National Natural Science Foundation of China(Grant Nos.62322410,52272168,52161145404,81974530,and 82271721)the Fundamental Research Funds for the Central Universities(Grant No.WK3500000009)+1 种基金the International Projects of the Chinese Academy of Science(CAS)under Grant No.211134KYSB20210011Hubei Provincial Science and Technology Innovation Talents and Services Special Program(Grant No.2022EHB039)。
文摘Photosensors with versatile functionalities have emerged as a cornerstone for breakthroughs in the future optoelectronic systems across a wide range of applications.In particular,emerging photoelectrochemical(PEC)-type devices have recently attracted extensive interest in liquid-based biosensing applications due to their natural electrolyte-assisted operating characteristics.Herein,a PEC-type photosensor was carefully designed and constructed by employing gallium nitride(GaN)p-n homojunction semiconductor nanowires on silicon,with the p-GaN segment strategically doped and then decorated with cobalt-nickel oxide(CoNiO_(x)).Essentially,the p-n homojunction configuration with facile p-doping engineering improves carrier separation efficiency and facilitates carrier transfer to the nanowire surface,while CoNiO_(x)decoration further boosts PEC reaction activity and carrier dynamics at the nanowire/electrolyte interface.Consequently,the constructed photosensor achieves a high responsivity of 247.8 mA W^(-1)while simultaneously exhibiting excellent operating stability.Strikingly,based on the remarkable stability and high responsivity of the device,a glucose sensing system was established with a demonstration of glucose level determination in real human serum.This work offers a feasible and universal approach in the pursuit of high-performance bio-related sensing applications via a rational design of PEC devices in the form of nanostructured architecture with strategic doping engineering.
基金funded by the Researchers Supporting Program at King Saud University(RSPD2024R809).
文摘Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization problems.This approach aims to leverage the strengths of multiple algorithms,enhancing solution quality,convergence speed,and robustness,thereby offering a more versatile and efficient means of solving intricate real-world optimization tasks.In this paper,we introduce a hybrid algorithm that amalgamates three distinct metaheuristics:the Beluga Whale Optimization(BWO),the Honey Badger Algorithm(HBA),and the Jellyfish Search(JS)optimizer.The proposed hybrid algorithm will be referred to as BHJO.Through this fusion,the BHJO algorithm aims to leverage the strengths of each optimizer.Before this hybridization,we thoroughly examined the exploration and exploitation capabilities of the BWO,HBA,and JS metaheuristics,as well as their ability to strike a balance between exploration and exploitation.This meticulous analysis allowed us to identify the pros and cons of each algorithm,enabling us to combine them in a novel hybrid approach that capitalizes on their respective strengths for enhanced optimization performance.In addition,the BHJO algorithm incorporates Opposition-Based Learning(OBL)to harness the advantages offered by this technique,leveraging its diverse exploration,accelerated convergence,and improved solution quality to enhance the overall performance and effectiveness of the hybrid algorithm.Moreover,the performance of the BHJO algorithm was evaluated across a range of both unconstrained and constrained optimization problems,providing a comprehensive assessment of its efficacy and applicability in diverse problem domains.Similarly,the BHJO algorithm was subjected to a comparative analysis with several renowned algorithms,where mean and standard deviation values were utilized as evaluation metrics.This rigorous comparison aimed to assess the performance of the BHJOalgorithmabout its counterparts,shedding light on its effectiveness and reliability in solving optimization problems.Finally,the obtained numerical statistics underwent rigorous analysis using the Friedman post hoc Dunn’s test.The resulting numerical values revealed the BHJO algorithm’s competitiveness in tackling intricate optimization problems,affirming its capability to deliver favorable outcomes in challenging scenarios.
基金financially supported via Australian Research Council(FT180100705)the support by the National Natural Science Foundation of China(22209103)+3 种基金the support from UTS Chancellor's Research Fellowshipsthe support from Open Project of State Key Laboratory of Advanced Special Steel,the Shanghai Key Laboratory of Advanced Ferrometallurgy,Shanghai University(SKLASS 2021-**)Joint International Laboratory on Environmental and Energy Frontier MaterialsInnovation Research Team of High-Level Local Universities in Shanghai。
文摘Electrochemical carbon dioxide reduction reaction(CO_(2)RR)provides a promising way to convert CO_(2)to chemicals.The multicarbon(C_(2+))products,especially ethylene,are of great interest due to their versatile industrial applications.However,selectively reducing CO_(2)to ethylene is still challenging as the additional energy required for the C–C coupling step results in large overpotential and many competing products.Nonetheless,mechanistic understanding of the key steps and preferred reaction pathways/conditions,as well as rational design of novel catalysts for ethylene production have been regarded as promising approaches to achieving the highly efficient and selective CO_(2)RR.In this review,we first illustrate the key steps for CO_(2)RR to ethylene(e.g.,CO_(2)adsorption/activation,formation of~*CO intermediate,C–C coupling step),offering mechanistic understanding of CO_(2)RR conversion to ethylene.Then the alternative reaction pathways and conditions for the formation of ethylene and competitive products(C_1 and other C_(2+)products)are investigated,guiding the further design and development of preferred conditions for ethylene generation.Engineering strategies of Cu-based catalysts for CO_(2)RR-ethylene are further summarized,and the correlations of reaction mechanism/pathways,engineering strategies and selectivity are elaborated.Finally,major challenges and perspectives in the research area of CO_(2)RR are proposed for future development and practical applications.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IF-PSAU-2021/01/18596).
文摘Aging is a natural process that leads to debility,disease,and dependency.Alzheimer’s disease(AD)causes degeneration of the brain cells leading to cognitive decline and memory loss,as well as dependence on others to fulfill basic daily needs.AD is the major cause of dementia.Computer-aided diagnosis(CADx)tools aid medical practitioners in accurately identifying diseases such as AD in patients.This study aimed to develop a CADx tool for the early detection of AD using the Intelligent Water Drop(IWD)algorithm and the Random Forest(RF)classifier.The IWD algorithm an efficient feature selection method,was used to identify the most deterministic features of AD in the dataset.RF is an ensemble method that leverages multiple weak learners to classify a patient’s disease as either demented(DN)or cognitively normal(CN).The proposed tool also classifies patients as mild cognitive impairment(MCI)or CN.The dataset on which the performance of the proposed CADx was evaluated was sourced from the Alzheimer’s Disease Neuroimaging Initiative(ADNI).The RF ensemble method achieves 100%accuracy in identifying DN patients from CN patients.The classification accuracy for classifying patients as MCI or CN is 92%.This study emphasizes the significance of pre-processing prior to classification to improve the classification results of the proposed CADx tool.
文摘The coronavirus(COVID-19)is a lethal virus causing a rapidly infec-tious disease throughout the globe.Spreading awareness,taking preventive mea-sures,imposing strict restrictions on public gatherings,wearing facial masks,and maintaining safe social distancing have become crucial factors in keeping the virus at bay.Even though the world has spent a whole year preventing and curing the disease caused by the COVID-19 virus,the statistics show that the virus can cause an outbreak at any time on a large scale if thorough preventive measures are not maintained accordingly.Tofight the spread of this virus,technologically developed systems have become very useful.However,the implementation of an automatic,robust,continuous,and lightweight monitoring system that can be efficiently deployed on an embedded device still has not become prevalent in the mass community.This paper aims to develop an automatic system to simul-taneously detect social distance and face mask violation in real-time that has been deployed in an embedded system.A modified version of a convolutional neural network,the ResNet50 model,has been utilized to identify masked faces in peo-ple.You Only Look Once(YOLOv3)approach is applied for object detection and the DeepSORT technique is used to measure the social distance.The efficiency of the proposed model is tested on real-time video sequences taken from a video streaming source from an embedded system,Jetson Nano edge computing device,and smartphones,Android and iOS applications.Empirical results show that the implemented model can efficiently detect facial masks and social distance viola-tions with acceptable accuracy and precision scores.
基金funded in part by the United States Department of Agriculture Forest Service,Northern Research Station,USDA Hardwood Tree Improvement and Regeneration CenterUSDA National Institute of Food and Agriculture McIntire Stennis project (IND011523MS)。
文摘Current techniques of forest inventory rely on manual measurements and are slow and labor intensive.Recent developments in computer vision and depth sensing can produce accurate measurement data at significantly reduced time and labor costs.We developed the ForSense system to measure the diameters of trees at various points along the stem as well as stem straightness.Time use,mean absolute error(MAE),and root mean squared error(RMSE)metrics were used to compare the system against manual methods,and to compare the system against itself(reproducibility).Depth-derived diameter measurements of the stems at the heights of 0.3,1.4,and 2.7 m achieved RMSE of 1.7,1.5,and 2.7 cm,respectively.The ForSense system produced straightness measurement data that was highly correlated with straightness ratings by trained foresters.The ForSense system was also consistent,achieving sub-centimeter diameter difference with subsequent measures and less than 4%difference in straightness value between runs.This method of forest inventory,which is based on depth-image computer vision,is time efficient compared to manual methods and less computationally and technologically intensive compared to Structure-from-Motion(SFM)photogrammetry and ground-based LiDAR or terrestrial laser scanning(TLS).
文摘Alzheimer’s disease (AD) is a brain disorder that eventually causes memory loss and the ability to perform simple cognitive functions;research efforts within pharmaceuticals and other medical treatments have minimal impact on the disease. Our preliminary biological studies showed that Repeated Electromagnetic Field Stimulation (REFMS) applying an EM frequency of 64 MHz and a specific absorption rate (SAR) of 0.4 - 0.9 W/kg decrease the level of amyloid-β peptides (Aβ), which is the most likely etiology of AD. This study emphasizes uniform E/H field and SAR distribution with adequate penetration depth penetration through multiple human head layers driven with low input power for safety treatments. In this work, we performed numerical modeling and computer simulations of a portable Meander Line antenna (MLA) to achieve the required EMF parameters to treat AD. The MLA device features a low cost, small size, wide bandwidth, and the ability to integrate into a portable system. This study utilized a High-Frequency Simulation System (HFSS) in the design of the MLA with the desired characteristics suited for AD treatment in humans. The team designed a 24-turn antenna with a 60 cm length and 25 cm width and achieved the required resonant frequency of 64 MHz. Here we used two numerical human head phantoms to test the antenna, the MIDA and spherical head phantom with six and seven tissue layers, respectively. The antenna was fed from a 50-Watt input source to obtain the SAR of 0.6 W/kg requirement in the center of the simulated brain tissue layer. We found that the E/H field and SAR distribution produced was not homogeneous;there were areas of high SAR values close to the antenna transmitter, also areas of low SAR value far away from the antenna. This paper details the antenna parameters, the scattering parameters response, the efficiency response, and the E and H field distribution;we presented the computer simulation results and discussed future work for a practical model.
基金supported by the Researchers Supporting Project (No.RSP-2021/395),King Saud University,Riyadh,Saudi Arabia.
文摘A deep fusion model is proposed for facial expression-based human-computer Interaction system.Initially,image preprocessing,i.e.,the extraction of the facial region from the input image is utilized.Thereafter,the extraction of more discriminative and distinctive deep learning features is achieved using extracted facial regions.To prevent overfitting,in-depth features of facial images are extracted and assigned to the proposed convolutional neural network(CNN)models.Various CNN models are then trained.Finally,the performance of each CNN model is fused to obtain the final decision for the seven basic classes of facial expressions,i.e.,fear,disgust,anger,surprise,sadness,happiness,neutral.For experimental purposes,three benchmark datasets,i.e.,SFEW,CK+,and KDEF are utilized.The performance of the proposed systemis compared with some state-of-the-artmethods concerning each dataset.Extensive performance analysis reveals that the proposed system outperforms the competitive methods in terms of various performance metrics.Finally,the proposed deep fusion model is being utilized to control a music player using the recognized emotions of the users.
文摘The earliest and most accurate detection of the pathological manifestations of hepatic diseases ensures effective treatments and thus positive prognostic outcomes.In clinical settings,screening and determining the extent of a pathology are prominent factors in preparing remedial agents and administering approp-riate therapeutic procedures.Moreover,in a patient undergoing liver resection,a realistic preoperative simulation of the subject-specific anatomy and physiology also plays a vital part in conducting initial assessments,making surgical decisions during the procedure,and anticipating postoperative results.Conventionally,various medical imaging modalities,e.g.,computed tomography,magnetic resonance imaging,and positron emission tomography,have been employed to assist in these tasks.In fact,several standardized procedures,such as lesion detection and liver segmentation,are also incorporated into prominent commercial software packages.Thus far,most integrated software as a medical device typically involves tedious interactions from the physician,such as manual delineation and empirical adjustments,as per a given patient.With the rapid progress in digital health approaches,especially medical image analysis,a wide range of computer algorithms have been proposed to facilitate those procedures.They include pattern recognition of a liver,its periphery,and lesion,as well as pre-and postoperative simulations.Prior to clinical adoption,however,software must conform to regulatory requirements set by the governing agency,for instance,valid clinical association and analytical and clinical validation.Therefore,this paper provides a detailed account and discussion of the state-of-the-art methods for liver image analyses,visualization,and simulation in the literature.Emphasis is placed upon their concepts,algorithmic classifications,merits,limitations,clinical considerations,and future research trends.
文摘During the prodromal stage of Alzheimer’s disease (AD), neurodegenerative changes can be identified by measuring volumetric loss in AD-prone brain regions on MRI. Cognitive assessments that are sensitive enough to measure the early brain-behavior manifestations of AD and that correlate with biomarkers of neurodegeneration are needed to identify and monitor individuals at risk for dementia. Weak sensitivity to early cognitive change has been a major limitation of traditional cognitive assessments. In this study, we focused on expanding our previous work by determining whether a digitized cognitive stress test, the Loewenstein-Acevedo Scales for Semantic Interference and Learning, Brief Computerized Version (LASSI-BC) could differentiate between Cognitively Unimpaired (CU) and amnestic Mild Cognitive Impairment (aMCI) groups. A second focus was to correlate LASSI-BC performance to volumetric reductions in AD-prone brain regions. Data was gathered from 111 older adults who were comprehensively evaluated and administered the LASSI-BC. Eighty-seven of these participants (51 CU;36 aMCI) underwent MR imaging. The volumes of 12 AD-prone brain regions were related to LASSI-BC and other memory tests correcting for False Discovery Rate (FDR). Results indicated that, even after adjusting for initial learning ability, the failure to recover from proactive semantic interference (frPSI) on the LASSI-BC differentiated between CU and aMCI groups. An optimal combination of frPSI and initial learning strength on the LASSI-BC yielded an area under the ROC curve of 0.876 (76.1% sensitivity, 82.7% specificity). Further, frPSI on the LASSI-BC was associated with volumetric reductions in the hippocampus, amygdala, inferior temporal lobes, precuneus, and posterior cingulate.
基金support from the National Natural Science Foundation of China (No.62005164,62222507,62175101,and 62005166)the Shanghai Natural Science Foundation (23ZR1443700)+3 种基金Shuguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission (23SG41)the Young Elite Scientist Sponsorship Program by CAST (No.20220042)Science and Technology Commission of Shanghai Municipality (Grant No.21DZ1100500)the Shanghai Municipal Science and Technology Major Project,and the Shanghai Frontiers Science Center Program (2021-2025 No.20).
文摘Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.
基金supported in part by the National Natural Science Foundation of China(62222301, 62073085, 62073158, 61890930-5, 62021003)the National Key Research and Development Program of China (2021ZD0112302, 2021ZD0112301, 2018YFC1900800-5)Beijing Natural Science Foundation (JQ19013)。
文摘Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and its applications to various advanced control fields. First, the background of the development of ADP is described, emphasizing the significance of regulation and tracking control problems. Some effective offline and online algorithms for ADP/adaptive critic control are displayed, where the main results towards discrete-time systems and continuous-time systems are surveyed, respectively.Then, the research progress on adaptive critic control based on the event-triggered framework and under uncertain environment is discussed, respectively, where event-based design, robust stabilization, and game design are reviewed. Moreover, the extensions of ADP for addressing control problems under complex environment attract enormous attention. The ADP architecture is revisited under the perspective of data-driven and RL frameworks,showing how they promote ADP formulation significantly.Finally, several typical control applications with respect to RL and ADP are summarized, particularly in the fields of wastewater treatment processes and power systems, followed by some general prospects for future research. Overall, the comprehensive survey on ADP and RL for advanced control applications has d emonstrated its remarkable potential within the artificial intelligence era. In addition, it also plays a vital role in promoting environmental protection and industrial intelligence.
基金supported by the National Natural Science Foundation of China under Grant 61972148.
文摘The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have been raised over the security and privacy of the tons of traffic and vehicle data.In this regard,Federated Learning(FL)with privacy protection features is considered a highly promising solution.However,in the FL process,the server side may take advantage of its dominant role in model aggregation to steal sensitive information of users,while the client side may also upload malicious data to compromise the training of the global model.Most existing privacy-preserving FL schemes in IoV fail to deal with threats from both of these two sides at the same time.In this paper,we propose a Blockchain based Privacy-preserving Federated Learning scheme named BPFL,which uses blockchain as the underlying distributed framework of FL.We improve the Multi-Krum technology and combine it with the homomorphic encryption to achieve ciphertext-level model aggregation and model filtering,which can enable the verifiability of the local models while achieving privacy-preservation.Additionally,we develop a reputation-based incentive mechanism to encourage users in IoV to actively participate in the federated learning and to practice honesty.The security analysis and performance evaluations are conducted to show that the proposed scheme can meet the security requirements and improve the performance of the FL model.
基金supported in part by the Nationa Natural Science Foundation of China (61876011)the National Key Research and Development Program of China (2022YFB4703700)+1 种基金the Key Research and Development Program 2020 of Guangzhou (202007050002)the Key-Area Research and Development Program of Guangdong Province (2020B090921003)。
文摘Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to establish relationships between distant but relevant points. To overcome the limitation of local spatial attention, we propose a point content-based Transformer architecture, called PointConT for short. It exploits the locality of points in the feature space(content-based), which clusters the sampled points with similar features into the same class and computes the self-attention within each class, thus enabling an effective trade-off between capturing long-range dependencies and computational complexity. We further introduce an inception feature aggregator for point cloud classification, which uses parallel structures to aggregate high-frequency and low-frequency information in each branch separately. Extensive experiments show that our PointConT model achieves a remarkable performance on point cloud shape classification. Especially, our method exhibits 90.3% Top-1 accuracy on the hardest setting of ScanObjectN N. Source code of this paper is available at https://github.com/yahuiliu99/PointC onT.