期刊文献+
共找到20,993篇文章
< 1 2 250 >
每页显示 20 50 100
Environmental and Climate Justice in Palestine
1
作者 Jad Isaac Jane Hilal 《American Journal of Climate Change》 2024年第2期251-280,共30页
To have a clean, safe, and functional environment is not only essential for the purpose of preservation, but also imperative for safeguarding the most fundamental of human rights. Resolution 45/94 of the United Nation... To have a clean, safe, and functional environment is not only essential for the purpose of preservation, but also imperative for safeguarding the most fundamental of human rights. Resolution 45/94 of the United Nations (UN) General Assembly also stresses and acknowledges that: “all individuals are entitled to live in an environment adequate for their health and wellbeing” (United Nations Digital Library System, 1991). Environmental and climate justice, which: “emerged in the context of the local environmental struggles of directly oppressed groups”, is a global movement dedicated to ensuring equal protection of people’s human rights (i.e., water, health, life, etc.) in the face of the climate crisis. Moreover, health, environment and human rights are part of the 2030 agenda (in particular, SDG 1, SDG 5, SDG 6, SDG 7, SDG 13, SDG 16, SDG 17). Individually, both environmental and climate justice are rooted in an intersectional outlook, by which they highlight the common threads between communities and the people’s inclusion, irrespective of race, class, or gender, in the pursuit of justice. On the other hand, they recognise and acknowledge the role and consequences of climate change in economic, social, and political dimensions;thus, drawing emphasis on the rights of people under the emerging inequities. In the case of Palestine, the Palestinian community is increasingly becoming vulnerable to these effects and the resulting inequalities of climate change. This vulnerability stems from: 1) The right to life;clean WASH;equitable work opportunities;access to resources;and free movement;are all examples of human rights that the Israeli colonial regime infringes upon;2) Infrastructure is essential for climate adaptation: 61% of the West Bank is ultimately barred from building infrastructure (B’Tselem, 2019) and Gaza Strip has major gaps in infrastructure due to intentional destruction by Israel;3) Palestinian deprivation of the sovereign right to natural resources by Israel;4) Apartheid system in water accessibility: Israeli water usage per person is over three times higher than that of Palestinians (their usage is under the WHO recommended minimum per day) (B’Tselem, 2023);and 5) Violent settler attacks. In 2022 alone, the Applied Research Institute-Jerusalem (ARIJ) recorded 1527 settler attacks that targeted land, properties, livestock, agriculture and even Palestinian civilians. The ongoing neglect of these concerns and the persistent colonization of Palestine by Israel unequivocally and unwaveringly affect the human rights of Palestinians. The power dynamics at play especially hamper the Palestinian ability to exercise and fulfill their inalienable human rights and to tackle the obstacles to justice in their environment. 展开更多
关键词 Environmental Degradation Climate Change Environmental and Climate justice Human Rights Causes and Solution
下载PDF
Advancement Towards Spatial Justice:The Barrier-Free Environment Construction from a Gender Perspective
2
作者 张万洪 赵金曦 NI Weisi(Translated) 《The Journal of Human Rights》 2024年第2期306-324,共19页
Space is both a product and a producer of social relations.In the spatial domain,gender blindness has long existed,limiting women’s rights of access to and use of space,leading to structural oppression of women’s ri... Space is both a product and a producer of social relations.In the spatial domain,gender blindness has long existed,limiting women’s rights of access to and use of space,leading to structural oppression of women’s rights,and giving rise to new gender inequalities.The barrier-free environment construction has the functions of eliminating physical barriers and generating societal norms,and when combined with social changes,can facilitate justice correction across multiple dimensions.However,barrier-free environment construction itself,as a means of justice correction,also suffers from gender blindness.There remains room for improvement in the areas of facility construction,information exchange,and social services within the realm of barrier-free environments.In response to this phenomenon,gender equality offers a new critical perspective.Therefore,integrating a gender perspective into the barrier-free environment construction,focusing on the spatial rights of women,especially groups with multiple vulnerabilities,such as disabled women and elderly women,can contribute to the advancement towards spatial justice. 展开更多
关键词 barrier-free environment construction gender equality spatial justice multiple vulnerabilities
下载PDF
Environmental Justice through Community-Policy Participatory Partnerships
3
作者 Phillip A. Boda Federica Fusi +7 位作者 Fabio Miranda Gordon J. M. Palmer Joel Flax-Hatch Michael Siciliano Apostolis Sambanis Linda Johnson Sybil Derrible Michael Cailas 《Journal of Environmental Protection》 2023年第8期616-636,共13页
Geographical information systems (GIS) are often used to design environmental justice (EJ) policy interventions. Leveraging GIS and other graphics, overburdened EJ communities can learn from maps that geographically l... Geographical information systems (GIS) are often used to design environmental justice (EJ) policy interventions. Leveraging GIS and other graphics, overburdened EJ communities can learn from maps that geographically link environmental burden (EB) and social disparity (SD) data. Visually representing EB and SD data concretizes the unjust distributions of environmental and broader inequitable societal policies. These maps can be used to efficaciously assess EJ disparities created by such policies through exploring socioeconomic characteristics with local communities. Given the great variation in how GIS EJ applications measure and visualize EB and SD, we present a community-based participatory design (CBPD) lens to collaboratively work across overburdened communities and support making EJ data accessible to all stakeholders. Our location proximity approach is a powerful way to assess overburdened EJ communities because it relies on user-predefined boundaries, and it doesn’t use a single fixed unit of reference to prioritize areas of intervention. Moreover, most areal unit applications use ordinal measures, such as percentiles, and multidimensional indexes, which are intelligible to understand by many residents. Leveraging a community-based participatory design methodology, we present our novel Proximity to Hazards Dashboard (PHD) that includes data on asphalt plants and industrial corridors, hazards often missing from state-level dashboards but very relevant for city policymaking, as well as more traditionally used environmental hazard sources. The use of the tool by policymakers and community members suggests that EJ categorization should focus less on procedural benchmarks and more on systemic change for policy impacts in ways that sustain the participatory nature of our approach. 展开更多
关键词 Environmental justice VISUALIZATIONS Community-Based Research
下载PDF
Methodology of Marx for Ecological Justice
4
作者 LI Aihua SUN Xiaoyan 《International Relations and Diplomacy》 2023年第2期107-109,共3页
Historical materialism provides a methodology for solving the problem of ecological justice,that is,consciously constructing the socialist power system is the prerequisite and foundation for realizing ecological justi... Historical materialism provides a methodology for solving the problem of ecological justice,that is,consciously constructing the socialist power system is the prerequisite and foundation for realizing ecological justice.In essence,the fundamental nature of the socialist power system,namely,“affinity to the people”,determines the realistic possibility of ecological justice. 展开更多
关键词 social power system ecological justice historical materialism METHODOLOGY
下载PDF
Marx’s Ontology of Social Power System for Ecological Justice
5
作者 LI Aihua SUN Xiaoyan 《Journal of Philosophy Study》 2023年第4期147-149,共3页
Historical materialism provides the ontology basis to understand the contemporary ecological justice problem,which is the perspective for analyzing ecological interests from the nature,structure,and transition of the ... Historical materialism provides the ontology basis to understand the contemporary ecological justice problem,which is the perspective for analyzing ecological interests from the nature,structure,and transition of the social power system.The transcendence of Marx’s thoughts on western mainstream environmental justice theory lies that it does not based on the“speculative ontology”of metaphysics,but on the basis of“realistic ontology”of social power system. 展开更多
关键词 social power system ecological justice historical materialism realistic ontology
下载PDF
LDAS&ET-AD:Learnable Distillation Attack Strategies and Evolvable Teachers Adversarial Distillation
6
作者 Shuyi Li Hongchao Hu +3 位作者 Xiaohan Yang Guozhen Cheng Wenyan Liu Wei Guo 《Computers, Materials & Continua》 SCIE EI 2024年第5期2331-2359,共29页
Adversarial distillation(AD)has emerged as a potential solution to tackle the challenging optimization problem of loss with hard labels in adversarial training.However,fixed sample-agnostic and student-egocentric atta... Adversarial distillation(AD)has emerged as a potential solution to tackle the challenging optimization problem of loss with hard labels in adversarial training.However,fixed sample-agnostic and student-egocentric attack strategies are unsuitable for distillation.Additionally,the reliability of guidance from static teachers diminishes as target models become more robust.This paper proposes an AD method called Learnable Distillation Attack Strategies and Evolvable Teachers Adversarial Distillation(LDAS&ET-AD).Firstly,a learnable distillation attack strategies generating mechanism is developed to automatically generate sample-dependent attack strategies tailored for distillation.A strategy model is introduced to produce attack strategies that enable adversarial examples(AEs)to be created in areas where the target model significantly diverges from the teachers by competing with the target model in minimizing or maximizing the AD loss.Secondly,a teacher evolution strategy is introduced to enhance the reliability and effectiveness of knowledge in improving the generalization performance of the target model.By calculating the experimentally updated target model’s validation performance on both clean samples and AEs,the impact of distillation from each training sample and AE on the target model’s generalization and robustness abilities is assessed to serve as feedback to fine-tune standard and robust teachers accordingly.Experiments evaluate the performance of LDAS&ET-AD against different adversarial attacks on the CIFAR-10 and CIFAR-100 datasets.The experimental results demonstrate that the proposed method achieves a robust precision of 45.39%and 42.63%against AutoAttack(AA)on the CIFAR-10 dataset for ResNet-18 and MobileNet-V2,respectively,marking an improvement of 2.31%and 3.49%over the baseline method.In comparison to state-of-the-art adversarial defense techniques,our method surpasses Introspective Adversarial Distillation,the top-performing method in terms of robustness under AA attack for the CIFAR-10 dataset,with enhancements of 1.40%and 1.43%for ResNet-18 and MobileNet-V2,respectively.These findings demonstrate the effectiveness of our proposed method in enhancing the robustness of deep learning networks(DNNs)against prevalent adversarial attacks when compared to other competing methods.In conclusion,LDAS&ET-AD provides reliable and informative soft labels to one of the most promising defense methods,AT,alleviating the limitations of untrusted teachers and unsuitable AEs in existing AD techniques.We hope this paper promotes the development of DNNs in real-world trust-sensitive fields and helps ensure a more secure and dependable future for artificial intelligence systems. 展开更多
关键词 Adversarial training adversarial distillation learnable distillation attack strategies teacher evolution strategy
下载PDF
Image segmentation of exfoliated two-dimensional materials by generative adversarial network-based data augmentation
7
作者 程晓昱 解晨雪 +6 位作者 刘宇伦 白瑞雪 肖南海 任琰博 张喜林 马惠 蒋崇云 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期112-117,共6页
Mechanically cleaved two-dimensional materials are random in size and thickness.Recognizing atomically thin flakes by human experts is inefficient and unsuitable for scalable production.Deep learning algorithms have b... Mechanically cleaved two-dimensional materials are random in size and thickness.Recognizing atomically thin flakes by human experts is inefficient and unsuitable for scalable production.Deep learning algorithms have been adopted as an alternative,nevertheless a major challenge is a lack of sufficient actual training images.Here we report the generation of synthetic two-dimensional materials images using StyleGAN3 to complement the dataset.DeepLabv3Plus network is trained with the synthetic images which reduces overfitting and improves recognition accuracy to over 90%.A semi-supervisory technique for labeling images is introduced to reduce manual efforts.The sharper edges recognized by this method facilitate material stacking with precise edge alignment,which benefits exploring novel properties of layered-material devices that crucially depend on the interlayer twist-angle.This feasible and efficient method allows for the rapid and high-quality manufacturing of atomically thin materials and devices. 展开更多
关键词 two-dimensional materials deep learning data augmentation generating adversarial networks
下载PDF
An Empirical Study on the Effectiveness of Adversarial Examples in Malware Detection
8
作者 Younghoon Ban Myeonghyun Kim Haehyun Cho 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3535-3563,共29页
Antivirus vendors and the research community employ Machine Learning(ML)or Deep Learning(DL)-based static analysis techniques for efficient identification of new threats,given the continual emergence of novel malware ... Antivirus vendors and the research community employ Machine Learning(ML)or Deep Learning(DL)-based static analysis techniques for efficient identification of new threats,given the continual emergence of novel malware variants.On the other hand,numerous researchers have reported that Adversarial Examples(AEs),generated by manipulating previously detected malware,can successfully evade ML/DL-based classifiers.Commercial antivirus systems,in particular,have been identified as vulnerable to such AEs.This paper firstly focuses on conducting black-box attacks to circumvent ML/DL-based malware classifiers.Our attack method utilizes seven different perturbations,including Overlay Append,Section Append,and Break Checksum,capitalizing on the ambiguities present in the PE format,as previously employed in evasion attack research.By directly applying the perturbation techniques to PE binaries,our attack method eliminates the need to grapple with the problem-feature space dilemma,a persistent challenge in many evasion attack studies.Being a black-box attack,our method can generate AEs that successfully evade both DL-based and ML-based classifiers.Also,AEs generated by the attack method retain their executability and malicious behavior,eliminating the need for functionality verification.Through thorogh evaluations,we confirmed that the attack method achieves an evasion rate of 65.6%against well-known ML-based malware detectors and can reach a remarkable 99%evasion rate against well-known DL-based malware detectors.Furthermore,our AEs demonstrated the capability to bypass detection by 17%of vendors out of the 64 on VirusTotal(VT).In addition,we propose a defensive approach that utilizes Trend Locality Sensitive Hashing(TLSH)to construct a similarity-based defense model.Through several experiments on the approach,we verified that our defense model can effectively counter AEs generated by the perturbation techniques.In conclusion,our defense model alleviates the limitation of the most promising defense method,adversarial training,which is only effective against the AEs that are included in the training classifiers. 展开更多
关键词 Malware classification machine learning adversarial examples evasion attack CYBERSECURITY
下载PDF
Boosting Adversarial Training with Learnable Distribution
9
作者 Kai Chen Jinwei Wang +2 位作者 James Msughter Adeke Guangjie Liu Yuewei Dai 《Computers, Materials & Continua》 SCIE EI 2024年第3期3247-3265,共19页
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural networks.Adversarial training is one of the most potent methods to defend against adversarial attacks.How... In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural networks.Adversarial training is one of the most potent methods to defend against adversarial attacks.However,the difference in the feature space between natural and adversarial examples hinders the accuracy and robustness of the model in adversarial training.This paper proposes a learnable distribution adversarial training method,aiming to construct the same distribution for training data utilizing the Gaussian mixture model.The distribution centroid is built to classify samples and constrain the distribution of the sample features.The natural and adversarial examples are pushed to the same distribution centroid to improve the accuracy and robustness of the model.The proposed method generates adversarial examples to close the distribution gap between the natural and adversarial examples through an attack algorithm explicitly designed for adversarial training.This algorithm gradually increases the accuracy and robustness of the model by scaling perturbation.Finally,the proposed method outputs the predicted labels and the distance between the sample and the distribution centroid.The distribution characteristics of the samples can be utilized to detect adversarial cases that can potentially evade the model defense.The effectiveness of the proposed method is demonstrated through comprehensive experiments. 展开更多
关键词 Adversarial training feature space learnable distribution distribution centroid
下载PDF
Multi-distortion suppression for neutron radiographic images based on generative adversarial network
10
作者 Cheng-Bo Meng Wang-Wei Zhu +4 位作者 Zhen Zhang Zi-Tong Wang Chen-Yi Zhao Shuang Qiao Tian Zhang 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第4期176-188,共13页
Neutron radiography is a crucial nondestructive testing technology widely used in the aerospace,military,and nuclear industries.However,because of the physical limitations of neutron sources and collimators,the result... Neutron radiography is a crucial nondestructive testing technology widely used in the aerospace,military,and nuclear industries.However,because of the physical limitations of neutron sources and collimators,the resulting neutron radiographic images inevitably exhibit multiple distortions,including noise,geometric unsharpness,and white spots.Furthermore,these distortions are particularly significant in compact neutron radiography systems with low neutron fluxes.Therefore,in this study,we devised a multi-distortion suppression network that employs a modified generative adversarial network to improve the quality of degraded neutron radiographic images.Real neutron radiographic image datasets with various types and levels of distortion were built for the first time as multi-distortion suppression datasets.Thereafter,the coordinate attention mechanism was incorporated into the backbone network to augment the capability of the proposed network to learn the abstract relationship between ideally clear and degraded images.Extensive experiments were performed;the results show that the proposed method can effectively suppress multiple distortions in real neutron radiographic images and achieve state-of-theart perceptual visual quality,thus demonstrating its application potential in neutron radiography. 展开更多
关键词 Neutron radiography Multi-distortion suppression Generative adversarial network Coordinate attention mechanism
下载PDF
Generative adversarial networks based motion learning towards robotic calligraphy synthesis
11
作者 Xiaoming Wang Yilong Yang +3 位作者 Weiru Wang Yuanhua Zhou Yongfeng Yin Zhiguo Gong 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期452-466,共15页
Robot calligraphy visually reflects the motion capability of robotic manipulators.While traditional researches mainly focus on image generation and the writing of simple calligraphic strokes or characters,this article... Robot calligraphy visually reflects the motion capability of robotic manipulators.While traditional researches mainly focus on image generation and the writing of simple calligraphic strokes or characters,this article presents a generative adversarial network(GAN)-based motion learning method for robotic calligraphy synthesis(Gan2CS)that can enhance the efficiency in writing complex calligraphy words and reproducing classic calligraphy works.The key technologies in the proposed approach include:(1)adopting the GAN to learn the motion parameters from the robot writing operation;(2)converting the learnt motion data into the style font and realising the transition from static calligraphy images to dynamic writing demonstration;(3)reproducing high-precision calligraphy works by synthesising the writing motion data hierarchically.In this study,the motion trajectories of sample calligraphy images are firstly extracted and converted into the robot module.The robot performs the writing with motion planning,and the writing motion parameters of calligraphy strokes are learnt with GANs.Then the motion data of basic strokes is synthesised based on the hierarchical process of‘stroke-radicalpart-character’.And the robot re-writes the synthesised characters whose similarity with the original calligraphy characters is evaluated.Regular calligraphy characters have been tested in the experiments for method validation and the results validated that the robot can actualise the robotic calligraphy synthesis of writing motion data with GAN. 展开更多
关键词 calligraphy synthesis generative adversarial networks Motion learning robot writing
下载PDF
Sparse Adversarial Learning for FDIA Attack Sample Generation in Distributed Smart
12
作者 Fengyong Li Weicheng Shen +1 位作者 Zhongqin Bi Xiangjing Su 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2095-2115,共21页
False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad data.Existing FDIA detection methods usually employ complex neural ... False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad data.Existing FDIA detection methods usually employ complex neural networkmodels to detect FDIA attacks.However,they overlook the fact that FDIA attack samples at public-private network edges are extremely sparse,making it difficult for neural network models to obtain sufficient samples to construct a robust detection model.To address this problem,this paper designs an efficient sample generative adversarial model of FDIA attack in public-private network edge,which can effectively bypass the detectionmodel to threaten the power grid system.A generative adversarial network(GAN)framework is first constructed by combining residual networks(ResNet)with fully connected networks(FCN).Then,a sparse adversarial learning model is built by integrating the time-aligned data and normal data,which is used to learn the distribution characteristics between normal data and attack data through iterative confrontation.Furthermore,we introduce a Gaussian hybrid distributionmatrix by aggregating the network structure of attack data characteristics and normal data characteristics,which can connect and calculate FDIA data with normal characteristics.Finally,efficient FDIA attack samples can be sequentially generated through interactive adversarial learning.Extensive simulation experiments are conducted with IEEE 14-bus and IEEE 118-bus system data,and the results demonstrate that the generated attack samples of the proposed model can present superior performance compared to state-of-the-art models in terms of attack strength,robustness,and covert capability. 展开更多
关键词 Distributed smart grid FDIA adversarial learning power public-private network edge
下载PDF
CMAES-WFD:Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy
13
作者 Di Wang Yuefei Zhu +1 位作者 Jinlong Fei Maohua Guo 《Computers, Materials & Continua》 SCIE EI 2024年第5期2253-2276,共24页
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on de... Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent. 展开更多
关键词 Traffic analysis deep neural network adversarial sample TOR website fingerprinting
下载PDF
Climate Justice Dimensions:Approaching Loss and Damage and Adaptation towards a Just City
14
作者 Pedro Henrique Campello Torres Gabriel Pires de Araújo +2 位作者 Marcos Tavares de Arruda Filho Isabela Carmo Cavaco Beatriz Dunder 《Journal of Geographical Research》 2023年第4期26-44,共19页
The escalating occurrence of severe climatic events over the past decade,with a projection for further intensification due to the climate emergency,underscores the critical role of urban and regional planning in clima... The escalating occurrence of severe climatic events over the past decade,with a projection for further intensification due to the climate emergency,underscores the critical role of urban and regional planning in climate action towards just cities.Municipalities and regions are both significant contributors to CO_(2)emissions and are vulnerable to the adverse impacts of climate change.This paper contends that urban and regional planning must undergo a paradigm shift to address this challenge.Climate justice,encompassing dimensions of inequality and environmental equity,is a pivotal dialogue in these contexts.Through a comprehensive review,this study contributes to the evolving landscape of climate justice planning and policy,offering insights that could resonate across the Global South and beyond.As an illustrative case,the authors delve into Brazil’s climate challenges,discussing adaptation planning and post-disaster response,and emphasizing the need for localized and community-driven initiatives.This article delves into the interplay between Loss and Damage,adaptation,and just cities,with a focus on the Global South.The authors scrutinize the emerging discourse on Loss and Damage,its associations with climate impacts,and the quest for a just and equitable approach.The work advances the understanding of the distinction between adaptation and Loss and Damage actions,highlighting the significance of a dedicated fund for addressing Loss and Damage in vulnerable countries. 展开更多
关键词 Climate justice Loss and Damage Global South Just adaptation Brazil
下载PDF
Quantum generative adversarial networks based on a readout error mitigation method with fault tolerant mechanism
15
作者 赵润盛 马鸿洋 +2 位作者 程涛 王爽 范兴奎 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期285-295,共11页
Readout errors caused by measurement noise are a significant source of errors in quantum circuits,which severely affect the output results and are an urgent problem to be solved in noisy-intermediate scale quantum(NIS... Readout errors caused by measurement noise are a significant source of errors in quantum circuits,which severely affect the output results and are an urgent problem to be solved in noisy-intermediate scale quantum(NISQ)computing.In this paper,we use the bit-flip averaging(BFA)method to mitigate frequent readout errors in quantum generative adversarial networks(QGAN)for image generation,which simplifies the response matrix structure by averaging the qubits for each random bit-flip in advance,successfully solving problems with high cost of measurement for traditional error mitigation methods.Our experiments were simulated in Qiskit using the handwritten digit image recognition dataset under the BFA-based method,the Kullback-Leibler(KL)divergence of the generated images converges to 0.04,0.05,and 0.1 for readout error probabilities of p=0.01,p=0.05,and p=0.1,respectively.Additionally,by evaluating the fidelity of the quantum states representing the images,we observe average fidelity values of 0.97,0.96,and 0.95 for the three readout error probabilities,respectively.These results demonstrate the robustness of the model in mitigating readout errors and provide a highly fault tolerant mechanism for image generation models. 展开更多
关键词 readout errors quantum generative adversarial networks bit-flip averaging method fault tolerant mechanisms
下载PDF
Conditional Generative Adversarial Network Enabled Localized Stress Recovery of Periodic Composites
16
作者 Chengkan Xu Xiaofei Wang +2 位作者 Yixuan Li Guannan Wang He Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期957-974,共18页
Structural damage in heterogeneousmaterials typically originates frommicrostructures where stress concentration occurs.Therefore,evaluating the magnitude and location of localized stress distributions within microstru... Structural damage in heterogeneousmaterials typically originates frommicrostructures where stress concentration occurs.Therefore,evaluating the magnitude and location of localized stress distributions within microstructures under external loading is crucial.Repeating unit cells(RUCs)are commonly used to represent microstructural details and homogenize the effective response of composites.This work develops a machine learning-based micromechanics tool to accurately predict the stress distributions of extracted RUCs.The locally exact homogenization theory efficiently generates the microstructural stresses of RUCs with a wide range of parameters,including volume fraction,fiber/matrix property ratio,fiber shapes,and loading direction.Subsequently,the conditional generative adversarial network(cGAN)is employed and constructed as a surrogate model to establish the statistical correlation between these parameters and the corresponding localized stresses.The stresses predicted by cGAN are validated against the remaining true data not used for training,showing good agreement.This work demonstrates that the cGAN-based micromechanics tool effectively captures the local responses of composite RUCs.It can be used for predicting potential crack initiations starting from microstructures and evaluating the effective behavior of periodic composites. 展开更多
关键词 Periodic composites localized stress recovery conditional generative adversarial network
下载PDF
Correcting Climate Model Sea Surface Temperature Simulations with Generative Adversarial Networks:Climatology,Interannual Variability,and Extremes
17
作者 Ya WANG Gang HUANG +6 位作者 Baoxiang PAN Pengfei LIN Niklas BOERS Weichen TAO Yutong CHEN BO LIU Haijie LI 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1299-1312,共14页
Climate models are vital for understanding and projecting global climate change and its associated impacts.However,these models suffer from biases that limit their accuracy in historical simulations and the trustworth... Climate models are vital for understanding and projecting global climate change and its associated impacts.However,these models suffer from biases that limit their accuracy in historical simulations and the trustworthiness of future projections.Addressing these challenges requires addressing internal variability,hindering the direct alignment between model simulations and observations,and thwarting conventional supervised learning methods.Here,we employ an unsupervised Cycle-consistent Generative Adversarial Network(CycleGAN),to correct daily Sea Surface Temperature(SST)simulations from the Community Earth System Model 2(CESM2).Our results reveal that the CycleGAN not only corrects climatological biases but also improves the simulation of major dynamic modes including the El Niño-Southern Oscillation(ENSO)and the Indian Ocean Dipole mode,as well as SST extremes.Notably,it substantially corrects climatological SST biases,decreasing the globally averaged Root-Mean-Square Error(RMSE)by 58%.Intriguingly,the CycleGAN effectively addresses the well-known excessive westward bias in ENSO SST anomalies,a common issue in climate models that traditional methods,like quantile mapping,struggle to rectify.Additionally,it substantially improves the simulation of SST extremes,raising the pattern correlation coefficient(PCC)from 0.56 to 0.88 and lowering the RMSE from 0.5 to 0.32.This enhancement is attributed to better representations of interannual,intraseasonal,and synoptic scales variabilities.Our study offers a novel approach to correct global SST simulations and underscores its effectiveness across different time scales and primary dynamical modes. 展开更多
关键词 generative adversarial networks model bias deep learning El Niño-Southern Oscillation marine heatwaves
下载PDF
Fetal MRI Artifacts: Semi-Supervised Generative Adversarial Neural Network for Motion Artifacts Reducing in Fetal Magnetic Resonance Images
18
作者 Ítalo Messias Félix Santos Gilson Antonio Giraldi +1 位作者 Heron Werner Junior Bruno Richard Schulze 《Journal of Computer and Communications》 2024年第6期210-225,共16页
This study addresses challenges in fetal magnetic resonance imaging (MRI) related to motion artifacts, maternal respiration, and hardware limitations. To enhance MRI quality, we employ deep learning techniques, specif... This study addresses challenges in fetal magnetic resonance imaging (MRI) related to motion artifacts, maternal respiration, and hardware limitations. To enhance MRI quality, we employ deep learning techniques, specifically utilizing Cycle GAN. Synthetic pairs of images, simulating artifacts in fetal MRI, are generated to train the model. Our primary contribution is the use of Cycle GAN for fetal MRI restoration, augmented by artificially corrupted data. We compare three approaches (supervised Cycle GAN, Pix2Pix, and Mobile Unet) for artifact removal. Experimental results demonstrate that the proposed supervised Cycle GAN effectively removes artifacts while preserving image details, as validated through Structural Similarity Index Measure (SSIM) and normalized Mean Absolute Error (MAE). The method proves comparable to alternatives but avoids the generation of spurious regions, which is crucial for medical accuracy. 展开更多
关键词 Fetal MRI Artifacts Removal Deep Learning Image Processing Generative Adversarial Networks
下载PDF
A generative adversarial network-based unified model integrating bias correction and downscaling for global SST
19
作者 Shijin Yuan Xin Feng +3 位作者 Bin Mu Bo Qin Xin Wang Yuxuan Chen 《Atmospheric and Oceanic Science Letters》 CSCD 2024年第1期45-52,共8页
本文提出了一种基于生成对抗网络的全球海表面温度(sea surface temperature,SST)偏差订正及降尺度整合模型.该模型的生成器使用偏差订正模块将数值模式预测结果进行校正,再用可复用的共享降尺度模块将订正后的数据分辨率逐次提高.该模... 本文提出了一种基于生成对抗网络的全球海表面温度(sea surface temperature,SST)偏差订正及降尺度整合模型.该模型的生成器使用偏差订正模块将数值模式预测结果进行校正,再用可复用的共享降尺度模块将订正后的数据分辨率逐次提高.该模型的判别器可鉴别偏差订正及降尺度结果的质量,以此为标准进行对抗训练。同时,在对抗损失函数中含有物理引导的动力学惩罚项以提高模型的性能.本研究基于分辨率为1°的GFDL SPEAR模式的SST预测结果,选择遥感系统(Remote Sensing System)的观测资料作为真值,面向月尺度ENSO与IOD事件以及天尺度海洋热浪事件开展了验证试验:模型在将分辨率提高到0.0625°×0.0625°的同时将预测误差减少约90.3%,突破了观测数据分辨率的限制,且与观测结果的结构相似性高达96.46%. 展开更多
关键词 偏差订正 降尺度 海表面温度 生成对抗网络 物理引导的神经网络
下载PDF
日本高校图书馆联盟的营销策略应用——以JUSTICE为例 被引量:8
20
作者 刘青 高波 《图书馆》 CSSCI 北大核心 2017年第6期84-90,共7页
高校图书馆联盟面临竞争激烈、成本增加、经费缩减及用户需求多样化等挑战,引入营销理论,有助于图书馆联盟提高购买力和谈判效果,推广图书馆的产品和服务,降低管理运营成本,实现组织目标。笔者以JUSTICE为例,结合联盟组织结构,运用6P营... 高校图书馆联盟面临竞争激烈、成本增加、经费缩减及用户需求多样化等挑战,引入营销理论,有助于图书馆联盟提高购买力和谈判效果,推广图书馆的产品和服务,降低管理运营成本,实现组织目标。笔者以JUSTICE为例,结合联盟组织结构,运用6P营销理论,调查日本高校图书馆联盟的营销策略,分析JUSTICE在成员关系、部门分工、成本控制、人员培训方面的特点,为我国图书馆联盟的发展提供参考。 展开更多
关键词 营销策略 图书馆营销 justice 高校图书馆联盟
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部