Distributed secondary control,depending on the sparse communication topology,excels for its flexibility and expandability in microgrids.The communication network plays an important role in microgrid control,but it is ...Distributed secondary control,depending on the sparse communication topology,excels for its flexibility and expandability in microgrids.The communication network plays an important role in microgrid control,but it is vulnerable to cyber-attacks.In this paper,the mathematical model for false data injection(FDI)attacks in AC microgrids is established,and the corresponding detection mechanism based on the morphological gradient is designed for the location of cyber-attacks in communication topology.Then,we propose a median-based resilient consensus voltage control strategy to mitigate the negative effects caused by malicious cyber-attacks and ensure the safe operation of the microgrid.Combining the detection method and resilient consensus control,a novel eventdriven mitigation scheme is derived to improve the resilience of microgrids under cyber-attacks.Finally,a tested microgrid model composed of five different distributed generation(DG)units is simulated in the MATLAB/Simulink environment.The feasibility and effectiveness of the presented detection mechanism and resilient consensus strategy are verified by simulation results applying different scenarios.展开更多
Bundle recommendation offers users more holistic insights by recommending multiple compatible items at once.However,the intricate correlations between items,varied user preferences,and the pronounced data sparsity in ...Bundle recommendation offers users more holistic insights by recommending multiple compatible items at once.However,the intricate correlations between items,varied user preferences,and the pronounced data sparsity in combinations present significant challenges for bundle recommendation algorithms.Furthermore,current bundle recommendation methods fail to identify mismatched items within a given set,a process termed as‘‘outlier item detection’’.These outlier items are those with the weakest correlations within a bundle.Identifying them can aid users in refining their item combinations.While the correlation among items can predict the detection of such outliers,the adaptability of combinations might not be adequately responsive to shifts in individual items during the learning phase.This limitation can hinder the algorithm’s performance.To tackle these challenges,we introduce an encoder–decoder architecture tailored for outlier item detection.The encoder learns potential item correlations through a self-attention mechanism.Concurrently,the decoder garners efficient inference frameworks by directly assessing item anomalies.We have validated the efficacy and efficiency of our proposed algorithm using real-world datasets.展开更多
Target detection is an important task in computer vision research, and such an anomaly detection and the topic of small target detection task is more concerned. However, there are still some problems in this kind of r...Target detection is an important task in computer vision research, and such an anomaly detection and the topic of small target detection task is more concerned. However, there are still some problems in this kind of researches, such as small target detection in complex environments is susceptible to background interference and poor detection results. To solve these issues, this study proposes a method which introduces the attention mechanism into the you only look once(YOLO) network. In addition, the amateur-produced mask dataset was created and experiments were conducted. The results showed that the detection effect of the proposed mothed is much better.展开更多
Intelligent Intrusion Detection System(IIDS)for networks provide a resourceful solution to network security than conventional intrusion defence mechanisms like a firewall.The efficiency of IIDS highly relies on the al...Intelligent Intrusion Detection System(IIDS)for networks provide a resourceful solution to network security than conventional intrusion defence mechanisms like a firewall.The efficiency of IIDS highly relies on the algorithm performance.The enhancements towards these methods are utilized to enhance the classification accuracy and diminish the testing and training time of these algorithms.Here,a novel and intelligent learning approach are known as the stabbing of intrusion with learning framework(SILF),is proposed to learn the attack features and reduce the dimensionality.It also reduces the testing and training time effectively and enhances Linear Support Vector Machine(l-SVM).It constructs an auto-encoder method,an efficient learning approach for feature construction unsupervised manner.Here,the inclusive certified signature(ICS)is added to the encoder and decoder to preserve the sensitive data without being harmed by the attackers.By training the samples in the preliminary stage,the selected features are provided into the classifier(lSVM)to enhance the prediction ability for intrusion and classification accuracy.Thus,the model efficiency is learned linearly.The multi-classification is examined and compared with various classifier approaches like conventional SVM,Random Forest(RF),Recurrent Neural Network(RNN),STL-IDS and game theory.The outcomes show that the proposed l-SVM has triggered the prediction rate by effectual testing and training and proves that the model is more efficient than the traditional approaches in terms of performance metrics like accuracy,precision,recall,F-measure,pvalue,MCC and so on.The proposed SILF enhances network intrusion detection and offers a novel research methodology for intrusion detection.Here,the simulation is done with a MATLAB environment where the proposed model shows a better trade-off compared to prevailing approaches.展开更多
The surface acoustic wave (SAW) technique is a precise and nondestructive method to detect the mechanical charac- teristics of the thin low dielectric constant (low-k) film by matching the theoretical dispersion c...The surface acoustic wave (SAW) technique is a precise and nondestructive method to detect the mechanical charac- teristics of the thin low dielectric constant (low-k) film by matching the theoretical dispersion curve with the experimental dispersion curve. In this paper, the influence of sample roughness on the precision of SAW mechanical detection is inves- tigated in detail. Random roughness values at the surface of low-k film and at the interface between this low-k film and the substrate are obtained by the Monte Carlo method. The dispersive characteristic of SAW on the layered structure with rough surface and rough interface is modeled by numerical simulation of finite element method. The Young's moduli of the Black DiamondTM samples with different roughness values are determined by SAWs in the experiment. The results show that the influence of sample roughness is very small when the root-mean-square (RMS) of roughness is smaller than 50 nm and correlation length is smaller than 20 μm. This study indicates that the SAW technique is reliable and precise in the nondestructive mechanical detection for low-k films.展开更多
To diagnose the aeroengine faults accurately,the supervised Kohonen(S-Kohonen)network is proposed for fault diagnosis.Via adding the output layer behind competitive layer,the network was modified from the unsupervised...To diagnose the aeroengine faults accurately,the supervised Kohonen(S-Kohonen)network is proposed for fault diagnosis.Via adding the output layer behind competitive layer,the network was modified from the unsupervised structure to the supervised structure.Meanwhile,the hybrid particle swarm optimization(H-PSO)was used to optimize the connection weights,after using adaptive inheritance mode(AIM)based on the elite strategy,and adaptive detecting response mechanism(ADRM),HPSO could guide the particles adaptively jumping out of the local solution space,and ensure obtaining the global optimal solution with higher probability.So the optimized S-Kohonen network could overcome the problems of non-identifiability for recognizing the unknown samples,and the non-uniqueness for classification results existing in traditional Kohonen(T-Kohonen)network.The comparison study on the GE90 engine borescope image texture feature recognition is carried out,the research results show that:the optimized S-Kohonen network has a strong ability of practical application in the classification fault diagnosis;the classification accuracy is higher than the common neural network model.展开更多
Two novel rhodamine-based polystyrene solid-phase fluorescence sensors PS-PA-Ⅰ and PS・PA-Ⅱ with different lengths of polyamines were synthesized for Hg(Ⅱ)determination.Thedetection mechanism involving the Hg(Ⅱ)che...Two novel rhodamine-based polystyrene solid-phase fluorescence sensors PS-PA-Ⅰ and PS・PA-Ⅱ with different lengths of polyamines were synthesized for Hg(Ⅱ)determination.Thedetection mechanism involving the Hg(Ⅱ)chelation-induced spirocycle open of rhodamine was proposed with the aid of theoretical calculation.The stronger N—Hg bond and the longer polyamine chain in PS-PA-Ⅱ led to a better selectivity,much higher and more quickly fluorescence response to Hg(Ⅱ).展开更多
This work presents the design of a novel static-triggered power-rail electrostatic discharge(ESD)clamp circuit. The superior transient-noise immunity of the static ESD detection mechanism over the transient one is fir...This work presents the design of a novel static-triggered power-rail electrostatic discharge(ESD)clamp circuit. The superior transient-noise immunity of the static ESD detection mechanism over the transient one is firstly discussed. Based on the discussion, a novel power-rail ESD clamp circuit utilizing the static ESD detection mechanism is proposed. By skillfully incorporating a thyristor delay stage into the trigger circuit(TC), the proposed circuit achieves the best ESD-conduction behavior while consuming the lowest leakage current(Ileak) at the normal bias voltage among all investigated circuits in this work. In addition, the proposed circuit achieves an excellent false-triggering immunity against fast power-up pulses. All investigated circuits are fabricated in a 65-nm CMOS process. Performance superiorities of the proposed circuit are fully verified by both simulation and test results. Moreover, the proposed circuit offers an efficient on-chip ESD protection scheme considering the worst discharge case in the utilized process.展开更多
Decoding genetic information is crucial for gene therapy and cancer diagnosis,which has attracted growing interest in the field of clinical medicine and life science.In this study,we conducted a comprehensive explorat...Decoding genetic information is crucial for gene therapy and cancer diagnosis,which has attracted growing interest in the field of clinical medicine and life science.In this study,we conducted a comprehensive exploration to obtain the detection mechanism of molecular beacons from a mechanics point of view.The potential energy function of molecular beacon/target system is established firstly,based on which the profile of molecular beacons is solved by genetic algorithm optimization.The length of stem and the total energy are further calculated when the target is hybridized with loop and stem.The results show that the hybridization between target and stem is energetically favorable compared with that between target and loop,indicating a new detection strategy.These analyses may cast light on understanding the mechanism of molecular beacons detection,and further help to design novel molecular beacons with high resolution and quantification.展开更多
基金supported by the National Key Research and Development Program of China(2020YFE0200400)。
文摘Distributed secondary control,depending on the sparse communication topology,excels for its flexibility and expandability in microgrids.The communication network plays an important role in microgrid control,but it is vulnerable to cyber-attacks.In this paper,the mathematical model for false data injection(FDI)attacks in AC microgrids is established,and the corresponding detection mechanism based on the morphological gradient is designed for the location of cyber-attacks in communication topology.Then,we propose a median-based resilient consensus voltage control strategy to mitigate the negative effects caused by malicious cyber-attacks and ensure the safe operation of the microgrid.Combining the detection method and resilient consensus control,a novel eventdriven mitigation scheme is derived to improve the resilience of microgrids under cyber-attacks.Finally,a tested microgrid model composed of five different distributed generation(DG)units is simulated in the MATLAB/Simulink environment.The feasibility and effectiveness of the presented detection mechanism and resilient consensus strategy are verified by simulation results applying different scenarios.
基金supported in part by the Guangxi Key Laboratory of Trusted Software,China(KX202037)the Project of Guangxi Science and Technology,China(GuiKeAD 20297054)the Guangxi Natural Science Foundation Project,China(2020GXNSFBA297108)。
文摘Bundle recommendation offers users more holistic insights by recommending multiple compatible items at once.However,the intricate correlations between items,varied user preferences,and the pronounced data sparsity in combinations present significant challenges for bundle recommendation algorithms.Furthermore,current bundle recommendation methods fail to identify mismatched items within a given set,a process termed as‘‘outlier item detection’’.These outlier items are those with the weakest correlations within a bundle.Identifying them can aid users in refining their item combinations.While the correlation among items can predict the detection of such outliers,the adaptability of combinations might not be adequately responsive to shifts in individual items during the learning phase.This limitation can hinder the algorithm’s performance.To tackle these challenges,we introduce an encoder–decoder architecture tailored for outlier item detection.The encoder learns potential item correlations through a self-attention mechanism.Concurrently,the decoder garners efficient inference frameworks by directly assessing item anomalies.We have validated the efficacy and efficiency of our proposed algorithm using real-world datasets.
基金supported by the National Key Research and Development Program of China (No.2022YFE0196000)the National Natural Science Foundation of China (No.61502429)。
文摘Target detection is an important task in computer vision research, and such an anomaly detection and the topic of small target detection task is more concerned. However, there are still some problems in this kind of researches, such as small target detection in complex environments is susceptible to background interference and poor detection results. To solve these issues, this study proposes a method which introduces the attention mechanism into the you only look once(YOLO) network. In addition, the amateur-produced mask dataset was created and experiments were conducted. The results showed that the detection effect of the proposed mothed is much better.
文摘Intelligent Intrusion Detection System(IIDS)for networks provide a resourceful solution to network security than conventional intrusion defence mechanisms like a firewall.The efficiency of IIDS highly relies on the algorithm performance.The enhancements towards these methods are utilized to enhance the classification accuracy and diminish the testing and training time of these algorithms.Here,a novel and intelligent learning approach are known as the stabbing of intrusion with learning framework(SILF),is proposed to learn the attack features and reduce the dimensionality.It also reduces the testing and training time effectively and enhances Linear Support Vector Machine(l-SVM).It constructs an auto-encoder method,an efficient learning approach for feature construction unsupervised manner.Here,the inclusive certified signature(ICS)is added to the encoder and decoder to preserve the sensitive data without being harmed by the attackers.By training the samples in the preliminary stage,the selected features are provided into the classifier(lSVM)to enhance the prediction ability for intrusion and classification accuracy.Thus,the model efficiency is learned linearly.The multi-classification is examined and compared with various classifier approaches like conventional SVM,Random Forest(RF),Recurrent Neural Network(RNN),STL-IDS and game theory.The outcomes show that the proposed l-SVM has triggered the prediction rate by effectual testing and training and proves that the model is more efficient than the traditional approaches in terms of performance metrics like accuracy,precision,recall,F-measure,pvalue,MCC and so on.The proposed SILF enhances network intrusion detection and offers a novel research methodology for intrusion detection.Here,the simulation is done with a MATLAB environment where the proposed model shows a better trade-off compared to prevailing approaches.
基金Project supported by the National Natural Science Foundation of China(Grant No.60876072)the Tianjin Research Program of Application Foundation and Advanced Technology,China(Grant No.10JCZDJC15500)
文摘The surface acoustic wave (SAW) technique is a precise and nondestructive method to detect the mechanical charac- teristics of the thin low dielectric constant (low-k) film by matching the theoretical dispersion curve with the experimental dispersion curve. In this paper, the influence of sample roughness on the precision of SAW mechanical detection is inves- tigated in detail. Random roughness values at the surface of low-k film and at the interface between this low-k film and the substrate are obtained by the Monte Carlo method. The dispersive characteristic of SAW on the layered structure with rough surface and rough interface is modeled by numerical simulation of finite element method. The Young's moduli of the Black DiamondTM samples with different roughness values are determined by SAWs in the experiment. The results show that the influence of sample roughness is very small when the root-mean-square (RMS) of roughness is smaller than 50 nm and correlation length is smaller than 20 μm. This study indicates that the SAW technique is reliable and precise in the nondestructive mechanical detection for low-k films.
基金Joint Funds of the National Natural Science Foundation of China(NSAF)(No.U1330130)General Program of Civil Aviation Flight University of China(No.J2015-39)
文摘To diagnose the aeroengine faults accurately,the supervised Kohonen(S-Kohonen)network is proposed for fault diagnosis.Via adding the output layer behind competitive layer,the network was modified from the unsupervised structure to the supervised structure.Meanwhile,the hybrid particle swarm optimization(H-PSO)was used to optimize the connection weights,after using adaptive inheritance mode(AIM)based on the elite strategy,and adaptive detecting response mechanism(ADRM),HPSO could guide the particles adaptively jumping out of the local solution space,and ensure obtaining the global optimal solution with higher probability.So the optimized S-Kohonen network could overcome the problems of non-identifiability for recognizing the unknown samples,and the non-uniqueness for classification results existing in traditional Kohonen(T-Kohonen)network.The comparison study on the GE90 engine borescope image texture feature recognition is carried out,the research results show that:the optimized S-Kohonen network has a strong ability of practical application in the classification fault diagnosis;the classification accuracy is higher than the common neural network model.
基金Supported by the Natural Science Foundation of Jiangsu Province,China(No.BK20161542)the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province,China(No.17KJB150006)the Overseas Visiting Scholar Program for University Prominent Young&Middle-aged Teachers and Presidents of Jiangsu Province,China(No.2017).
文摘Two novel rhodamine-based polystyrene solid-phase fluorescence sensors PS-PA-Ⅰ and PS・PA-Ⅱ with different lengths of polyamines were synthesized for Hg(Ⅱ)determination.Thedetection mechanism involving the Hg(Ⅱ)chelation-induced spirocycle open of rhodamine was proposed with the aid of theoretical calculation.The stronger N—Hg bond and the longer polyamine chain in PS-PA-Ⅱ led to a better selectivity,much higher and more quickly fluorescence response to Hg(Ⅱ).
基金supported by National Science and Technology Major Project of China(Grant No.2013ZX02303002)
文摘This work presents the design of a novel static-triggered power-rail electrostatic discharge(ESD)clamp circuit. The superior transient-noise immunity of the static ESD detection mechanism over the transient one is firstly discussed. Based on the discussion, a novel power-rail ESD clamp circuit utilizing the static ESD detection mechanism is proposed. By skillfully incorporating a thyristor delay stage into the trigger circuit(TC), the proposed circuit achieves the best ESD-conduction behavior while consuming the lowest leakage current(Ileak) at the normal bias voltage among all investigated circuits in this work. In addition, the proposed circuit achieves an excellent false-triggering immunity against fast power-up pulses. All investigated circuits are fabricated in a 65-nm CMOS process. Performance superiorities of the proposed circuit are fully verified by both simulation and test results. Moreover, the proposed circuit offers an efficient on-chip ESD protection scheme considering the worst discharge case in the utilized process.
基金We are grateful for financial support from the Strategic Priority Research Program of Chinese Academy of Sciences(Grant XDB36000000)the Natural Science Foundation of Beijing(Grants 2184130 and 1202023)+1 种基金the National Natural Science Foundation of China(Grant 11672079)The computation experiment was mainly supported by the Supercomputing Center of Chinese Academy of Sciences(SCCAS).
文摘Decoding genetic information is crucial for gene therapy and cancer diagnosis,which has attracted growing interest in the field of clinical medicine and life science.In this study,we conducted a comprehensive exploration to obtain the detection mechanism of molecular beacons from a mechanics point of view.The potential energy function of molecular beacon/target system is established firstly,based on which the profile of molecular beacons is solved by genetic algorithm optimization.The length of stem and the total energy are further calculated when the target is hybridized with loop and stem.The results show that the hybridization between target and stem is energetically favorable compared with that between target and loop,indicating a new detection strategy.These analyses may cast light on understanding the mechanism of molecular beacons detection,and further help to design novel molecular beacons with high resolution and quantification.