期刊文献+
共找到26,662篇文章
< 1 2 250 >
每页显示 20 50 100
Robustness Study and Superior Method Development and Validation for Analytical Assay Method of Atropine Sulfate in Pharmaceutical Ophthalmic Solution
1
作者 Md. Nazmus Sakib Chowdhury Sreekanta Nath Dalal +4 位作者 Md. Ariful Islam Md. Anwar Hossain Pranab Kumar Das Shakawat Hossain Parajit Das 《American Journal of Analytical Chemistry》 CAS 2024年第5期151-164,共14页
Background: The robustness is a measurement of an analytical chemical method and its ability to contain unaffected by little with deliberate variation of analytical chemical method parameters. The analytical chemical ... Background: The robustness is a measurement of an analytical chemical method and its ability to contain unaffected by little with deliberate variation of analytical chemical method parameters. The analytical chemical method variation parameters are based on pH variability of buffer solution of mobile phase, organic ratio composition changes, stationary phase (column) manufacture, brand name and lot number variation;flow rate variation and temperature variation of chromatographic system. The analytical chemical method for assay of Atropine Sulfate conducted for robustness evaluation. The typical variation considered for mobile phase organic ratio change, change of pH, change of temperature, change of flow rate, change of column etc. Purpose: The aim of this study is to develop a cost effective, short run time and robust analytical chemical method for the assay quantification of Atropine in Pharmaceutical Ophthalmic Solution. This will help to make analytical decisions quickly for research and development scientists as well as will help with quality control product release for patient consumption. This analytical method will help to meet the market demand through quick quality control test of Atropine Ophthalmic Solution and it is very easy for maintaining (GDP) good documentation practices within the shortest period of time. Method: HPLC method has been selected for developing superior method to Compendial method. Both the compendial HPLC method and developed HPLC method was run into the same HPLC system to prove the superiority of developed method. Sensitivity, precision, reproducibility, accuracy parameters were considered for superiority of method. Mobile phase ratio change, pH of buffer solution, change of stationary phase temperature, change of flow rate and change of column were taken into consideration for robustness study of the developed method. Results: The limit of quantitation (LOQ) of developed method was much low than the compendial method. The % RSD for the six sample assay of developed method was 0.4% where the % RSD of the compendial method was 1.2%. The reproducibility between two analysts was 100.4% for developed method on the contrary the compendial method was 98.4%. 展开更多
关键词 robustness Method Validation HPLC Compendial Method Method Development GDP LOQ
下载PDF
Image Hiding with High Robustness Based on Dynamic Region Attention in the Wavelet Domain
2
作者 Zengxiang Li Yongchong Wu +3 位作者 Alanoud Al Mazroa Donghua Jiang Jianhua Wu Xishun Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期847-869,共23页
Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robus... Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the algorithms.In practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret image.An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms.In this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet transform.The wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding network.During the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret image.These lowresolution secret images are combined using densemodules to obtain a high-quality secret image.The experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various attacks.The proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical applications.In conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing algorithms.Its ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various applications.Further research and experimentation can explore the algorithm’s performance under different scenarios and expand its potential applications. 展开更多
关键词 Image hiding robustness wavelet transform dynamic region attention
下载PDF
Physics-Constrained Robustness Enhancement for Tree Ensembles Applied in Smart Grid
3
作者 Zhibo Yang Xiaohan Huang +2 位作者 Bingdong Wang Bin Hu Zhenyong Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第8期3001-3019,共19页
With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and int... With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and intelligence.However,tree ensemble models commonly used in smart grids are vulnerable to adversarial attacks,making it urgent to enhance their robustness.To address this,we propose a robustness enhancement method that incorporates physical constraints into the node-splitting decisions of tree ensembles.Our algorithm improves robustness by developing a dataset of adversarial examples that comply with physical laws,ensuring training data accurately reflects possible attack scenarios while adhering to physical rules.In our experiments,the proposed method increased robustness against adversarial attacks by 100%when applied to real grid data under physical constraints.These results highlight the advantages of our method in maintaining efficient and secure operation of smart grids under adversarial conditions. 展开更多
关键词 Tree ensemble robustness enhancement adversarial attack smart grid
下载PDF
Dynamic Hypergraph Modeling and Robustness Analysis for SIoT
4
作者 Yue Wan Nan Jiang Ziyu Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期3017-3034,共18页
The Social Internet of Things(SIoT)integrates the Internet of Things(IoT)and social networks,taking into account the social attributes of objects and diversifying the relationship between humans and objects,which over... The Social Internet of Things(SIoT)integrates the Internet of Things(IoT)and social networks,taking into account the social attributes of objects and diversifying the relationship between humans and objects,which overcomes the limitations of the IoT’s focus on associations between objects.Artificial Intelligence(AI)technology is rapidly evolving.It is critical to build trustworthy and transparent systems,especially with system security issues coming to the surface.This paper emphasizes the social attributes of objects and uses hypergraphs to model the diverse entities and relationships in SIoT,aiming to build an SIoT hypergraph generation model to explore the complex interactions between entities in the context of intelligent SIoT.Current hypergraph generation models impose too many constraints and fail to capture more details of real hypernetworks.In contrast,this paper proposes a hypergraph generation model that evolves dynamically over time,where only the number of nodes is fixed.It combines node wandering with a forest fire model and uses two different methods to control the size of the hyperedges.As new nodes are added,the model can promptly reflect changes in entities and relationships within SIoT.Experimental results exhibit that our model can effectively replicate the topological structure of real-world hypernetworks.We also evaluate the vulnerability of the hypergraph under different attack strategies,which provides theoretical support for building a more robust intelligent SIoT hypergraph model and lays the foundation for building safer and more reliable systems in the future. 展开更多
关键词 Large-scale artificial intelligence Social Internet of Things hypernetwork robustness analysis
下载PDF
Data-driven diagnosis of high temperature PEM fuel cells based on the electrochemical impedance spectroscopy: Robustness improvement and evaluation
5
作者 Dan Yu Xingjun Li +2 位作者 Samuel Simon Araya Simon Lennart Sahlin Vincenzo Liso 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第9期544-558,共15页
Utilizing machine learning techniques for data-driven diagnosis of high temperature PEM fuel cells is beneficial and meaningful to the system durability. Nevertheless, ensuring the robustness of diagnosis remains a cr... Utilizing machine learning techniques for data-driven diagnosis of high temperature PEM fuel cells is beneficial and meaningful to the system durability. Nevertheless, ensuring the robustness of diagnosis remains a critical and challenging task in real application. To enhance the robustness of diagnosis and achieve a more thorough evaluation of diagnostic performance, a robust diagnostic procedure based on electrochemical impedance spectroscopy (EIS) and a new method for evaluation of the diagnosis robustness was proposed and investigated in this work. To improve the diagnosis robustness: (1) the degradation mechanism of different faults in the high temperature PEM fuel cell was first analyzed via the distribution of relaxation time of EIS to determine the equivalent circuit model (ECM) with better interpretability, simplicity and accuracy;(2) the feature extraction was implemented on the identified parameters of the ECM and extra attention was paid to distinguishing between the long-term normal degradation and other faults;(3) a Siamese Network was adopted to get features with higher robustness in a new embedding. The diagnosis was conducted using 6 classic classification algorithms—support vector machine (SVM), K-nearest neighbor (KNN), logistic regression (LR), decision tree (DT), random forest (RF), and Naive Bayes employing a dataset comprising a total of 1935 collected EIS. To evaluate the robustness of trained models: (1) different levels of errors were added to the features for performance evaluation;(2) a robustness coefficient (Roubust_C) was defined for a quantified and explicit evaluation of the diagnosis robustness. The diagnostic models employing the proposed feature extraction method can not only achieve the higher performance of around 100% but also higher robustness for diagnosis models. Despite the initial performance being similar, the KNN demonstrated a superior robustness after feature selection and re-embedding by triplet-loss method, which suggests the necessity of robustness evaluation for the machine learning models and the effectiveness of the defined robustness coefficient. This work hopes to give new insights to the robust diagnosis of high temperature PEM fuel cells and more comprehensive performance evaluation of the data-driven method for diagnostic application. 展开更多
关键词 PEM fuel cell Data-driven diagnosis robustness improvement and evaluation Electrochemical impedance spectroscopy
下载PDF
Anti-Disturbance Control for Tethered Aircraft System With Deferred Output Constraints 被引量:3
6
作者 Mengshi Song Fan Zhang +1 位作者 Bingxiao Huang Panfeng Huang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第2期474-485,共12页
In this paper,we investigate the peaking issue of extended state observers and the anti-disturbance control problem of tethered aircraft systems subject to the unstable flight of the main aircraft,airflow disturbances... In this paper,we investigate the peaking issue of extended state observers and the anti-disturbance control problem of tethered aircraft systems subject to the unstable flight of the main aircraft,airflow disturbances and deferred output constraints.Independent of exact initial values,a modified extended state observer is constructed from a shifting function such that not only the peaking issue inherently in the observer is circumvented completely but also the accurate estimation of the lumped disturbance is guaranteed.Meanwhile,to deal with deferred output constraints,an improved output constrained controller is employed by integrating the shifting function into the barrier Lyapunov function.Then,by combining the modified observer and the improved controller,an anti-disturbance control scheme is presented,which ensures that the outputs with any bounded initial conditions satisfy the constraints after a pre-specified finite time,and the tethered aircraft tracks the desired trajectory accurately.Finally,both a theoretical proof and simulation results verify the effectiveness of the proposed control scheme. 展开更多
关键词 anti-disturbance control deferred output constraint extended state observer shifting function tethered aircraft system(TAS)
下载PDF
Adversarial Attack-Based Robustness Evaluation for Trustworthy AI
7
作者 Eungyu Lee Yongsoo Lee Taejin Lee 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1919-1935,共17页
Artificial Intelligence(AI)technology has been extensively researched in various fields,including the field of malware detection.AI models must be trustworthy to introduce AI systems into critical decisionmaking and r... Artificial Intelligence(AI)technology has been extensively researched in various fields,including the field of malware detection.AI models must be trustworthy to introduce AI systems into critical decisionmaking and resource protection roles.The problem of robustness to adversarial attacks is a significant barrier to trustworthy AI.Although various adversarial attack and defense methods are actively being studied,there is a lack of research on robustness evaluation metrics that serve as standards for determining whether AI models are safe and reliable against adversarial attacks.An AI model’s robustness level cannot be evaluated by traditional evaluation indicators such as accuracy and recall.Additional evaluation indicators are necessary to evaluate the robustness of AI models against adversarial attacks.In this paper,a Sophisticated Adversarial Robustness Score(SARS)is proposed for AI model robustness evaluation.SARS uses various factors in addition to the ratio of perturbated features and the size of perturbation to evaluate robustness accurately in the evaluation process.This evaluation indicator reflects aspects that are difficult to evaluate using traditional evaluation indicators.Moreover,the level of robustness can be evaluated by considering the difficulty of generating adversarial samples through adversarial attacks.This paper proposed using SARS,calculated based on adversarial attacks,to identify data groups with robustness vulnerability and improve robustness through adversarial training.Through SARS,it is possible to evaluate the level of robustness,which can help developers identify areas for improvement.To validate the proposed method,experiments were conducted using a malware dataset.Through adversarial training,it was confirmed that SARS increased by 70.59%,and the recall reduction rate improved by 64.96%.Through SARS,it is possible to evaluate whether an AI model is vulnerable to adversarial attacks and to identify vulnerable data types.In addition,it is expected that improved models can be achieved by improving resistance to adversarial attacks via methods such as adversarial training. 展开更多
关键词 AI robustness adversarial attack adversarial robustness robustness indicator trustworthy AI
下载PDF
Influence of High-Robustness Polycarboxylate Superplasticizer on the Performances of Concrete Incorporating Fly Ash and Manufactured Sand
8
作者 Panpan Cao Xiulin Huang +1 位作者 Shenxu Bao Jin Yang 《Fluid Dynamics & Materials Processing》 EI 2023年第8期2041-2051,共11页
Using ethylene glycol monovinyl polyoxyethylene ether,2-acrylamido-2-methylpropane sulfonic acid(AMPS)and acrylic acid as the main synthetic monomers,a high robustness polycarboxylate superplasticizer was prepared.The... Using ethylene glycol monovinyl polyoxyethylene ether,2-acrylamido-2-methylpropane sulfonic acid(AMPS)and acrylic acid as the main synthetic monomers,a high robustness polycarboxylate superplasticizer was prepared.The effects of initial temperature,ratio of acid to ether,amount of chain transfer agent,and synthesis process on the properties of the superplasticizer were studied.The molecular structure was characterized by GPC(Gel Permeation Chromatography)and IR(Infrared Spectrometer).As shown by the results,when the initial reaction temperature is 15℃,the ratio of acid to ether is 3.4:1 and the acrylic acid pre-neutralization is 15%,The AMPS substitution is 10%,the amount of chain transfer agent is 8%,and the performance of the synthesized superplasticizer is the best.Compared with commercially available ordinary polycarboxylate superplasticizer in C30 concrete prepared with manufactured sand and fly ash,the bleeding rate decreases by 52%,T50 decreases by 1.2 s,and the slump time decreases by 1.1 s.In C60 concrete prepared with fly ash and river sand,the bleeding rate decreases by 46%,T50 decreases by 0.8 s,and the slump time decreases by 3.2 s. 展开更多
关键词 Polycarboxylate superplasticizer EPEG robustness WORKABILITY
下载PDF
Research on the model of high robustness computational optical imaging system
9
作者 苏云 席特立 邵晓鹏 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期264-272,共9页
Computational optical imaging is an interdisciplinary subject integrating optics, mathematics, and information technology. It introduces information processing into optical imaging and combines it with intelligent com... Computational optical imaging is an interdisciplinary subject integrating optics, mathematics, and information technology. It introduces information processing into optical imaging and combines it with intelligent computing, subverting the imaging mechanism of traditional optical imaging which only relies on orderly information transmission. To meet the high-precision requirements of traditional optical imaging for optical processing and adjustment, as well as to solve its problems of being sensitive to gravity and temperature in use, we establish an optical imaging system model from the perspective of computational optical imaging and studies how to design and solve the imaging consistency problem of optical system under the influence of gravity, thermal effect, stress, and other external environment to build a high robustness optical system. The results show that the high robustness interval of the optical system exists and can effectively reduce the sensitivity of the optical system to the disturbance of each link, thus realizing the high robustness of optical imaging. 展开更多
关键词 computational optical imaging high robustness sensitivity
下载PDF
Robustness of community networks against cascading failures with heterogeneous redistribution strategies
10
作者 宋波 吴惠明 +3 位作者 宋玉蓉 蒋国平 夏玲玲 王旭 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第9期611-618,共8页
Network robustness is one of the core contents of complex network security research.This paper focuses on the robustness of community networks with respect to cascading failures,considering the nodes influence and com... Network robustness is one of the core contents of complex network security research.This paper focuses on the robustness of community networks with respect to cascading failures,considering the nodes influence and community heterogeneity.A novel node influence ranking method,community-based Clustering-LeaderRank(CCL)algorithm,is first proposed to identify influential nodes in community networks.Simulation results show that the CCL method can effectively identify the influence of nodes.Based on node influence,a new cascading failure model with heterogeneous redistribution strategy is proposed to describe and analyze node fault propagation in community networks.Analytical and numerical simulation results on cascading failure show that the community attribute has an important influence on the cascading failure process.The network robustness against cascading failures increases when the load is more distributed to neighbors of the same community instead of different communities.When the initial load distribution and the load redistribution strategy based on the node influence are the same,the network shows better robustness against node failure. 展开更多
关键词 community networks cascading failure model network robustness nodes influence identification
下载PDF
Doping-enhanced robustness of anomaly-related magnetoresistance in WTe_(2±α)flakes
11
作者 孟建超 陈鑫祥 +6 位作者 邵婷娜 刘明睿 姜伟民 张子涛 熊昌民 窦瑞芬 聂家财 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第4期634-638,共5页
We study systematically the negative magnetoresistance(MR)effect in WTe_(2±α)flakes with different thicknesses and doping concentrations.The negative MR is sensitive to the relative orientation between electrica... We study systematically the negative magnetoresistance(MR)effect in WTe_(2±α)flakes with different thicknesses and doping concentrations.The negative MR is sensitive to the relative orientation between electrical-/magnetic-field and crystallographic orientation of WTe_(2±α).The analysis proves that the negative MR originates from chiral anomaly and is anisotropic.Maximum entropy mobility spectrum is used to analyze the electron and hole concentrations in the flake samples.It is found that the negative MR observed in WTe_(2±α)flakes with low doping concentration is small,and the high doping concentration is large.The doping-induced disorder obviously inhibits the positive MR,so the negative MR can be more easily observed.In a word,we introduce disorder to suppress positive MR by doping,and successfully obtain the negative MR in WTe_(2±α)flakes with different thicknesses and doping concentrations,which indicates that the chiral anomaly effect in WTe_(2)is robust. 展开更多
关键词 Weyl semimetal WTe_(2±α)flakes DOPING chiral anomaly robustness
下载PDF
Robustness optimization for rapid prototyping of functional artifacts based on visualized computing digital twins
12
作者 Jinghua Xu Kunqian Liu +5 位作者 Linxuan Wang Hongshuai Guo Jiangtao Zhan Xiaojian Liu Shuyou Zhang Jianrong Tan 《Visual Computing for Industry,Biomedicine,and Art》 EI 2023年第1期33-50,共18页
This study presents a robustness optimization method for rapid prototyping(RP)of functional artifacts based on visualized computing digital twins(VCDT).A generalized multiobjective robustness optimization model for RP... This study presents a robustness optimization method for rapid prototyping(RP)of functional artifacts based on visualized computing digital twins(VCDT).A generalized multiobjective robustness optimization model for RP of scheme design prototype was first built,where thermal,structural,and multidisciplinary knowledge could be integrated for visualization.To implement visualized computing,the membership function of fuzzy decision-making was optimized using a genetic algorithm.Transient thermodynamic,structural statics,and flow field analyses were conducted,especially for glass fiber composite materials,which have the characteristics of high strength,corrosion resistance,temperature resistance,dimensional stability,and electrical insulation.An electrothermal experiment was performed by measuring the temperature and changes in temperature during RP.Infrared thermographs were obtained using thermal field measurements to determine the temperature distribution.A numerical analysis of a lightweight ribbed ergonomic artifact is presented to illustrate the VCDT.Moreover,manufacturability was verified based on a thermal-solid coupled finite element analysis.The physical experiment and practice proved that the proposed VCDT provided a robust design paradigm for a layered RP between the steady balance of electrothermal regulation and manufacturing efficacy under hybrid uncertainties. 展开更多
关键词 robustness optimization design Rapid prototyping Functional artifacts Fuzzy decision-making Infrared thermographs Visualized computing digital twins
下载PDF
Robustα-Fe_(2)O_(3)/Epoxy Resin Superhydrophobic Coatings for Anti-icing Property
13
作者 乔燕明 TAO Xuan +2 位作者 LI Lei 阮敏 鲁礼林 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS CSCD 2024年第3期621-626,共6页
α-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating was prepared withα-Fe_(2)O_(3) nanoparticles and epoxy resin by spin coating method.The coating without epoxy resin has higher contact angle(CA)and lower ... α-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating was prepared withα-Fe_(2)O_(3) nanoparticles and epoxy resin by spin coating method.The coating without epoxy resin has higher contact angle(CA)and lower ice adhesion strength(IAS),but the mechanical properties are poor.Theα-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating exhibits good mechanical durability.In addition,compared with the bare aluminum substrate,the Ecorr of the composite coating is positive and the Jcorr is lower.The inhibition efficiency of the composite coating is as high as 99.98%in 3.5 wt%NaCl solution.The difference in the microstructure caused by the two preparation methods leads to the changes in mechanical properties and corrosion resistance of composite superhydrophobic coating. 展开更多
关键词 SUPERHYDROPHOBIC ANTI-CORROSION ANTI-ICING robust
下载PDF
Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence
14
作者 Xiong Zhang Minqing Zhang +3 位作者 Xu AnWang Wen Jiang Chao Jiang Pan Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期1925-1938,共14页
This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designe... This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information. 展开更多
关键词 Information hiding neural style transfer robustness
下载PDF
Gates joint locally connected network for accurate and robust reconstruction in optical molecular tomography
15
作者 Minghua Zhao Yahui Xiao +2 位作者 Jiaqi Zhang Xin Cao Lin Wang 《Journal of Innovative Optical Health Sciences》 SCIE EI CSCD 2024年第3期11-22,共12页
Optical molecular tomography(OMT)is a potential pre-clinical molecular imaging technique with applications in a variety of biomedical areas,which can provide non-invasive quantitative three-dimensional(3D)information ... Optical molecular tomography(OMT)is a potential pre-clinical molecular imaging technique with applications in a variety of biomedical areas,which can provide non-invasive quantitative three-dimensional(3D)information regarding tumor distribution in living animals.The construction of optical transmission models and the application of reconstruction algorithms in traditional model-based reconstruction processes have affected the reconstruction results,resulting in problems such as low accuracy,poor robustness,and long-time consumption.Here,a gates joint locally connected network(GLCN)method is proposed by establishing the mapping relationship between the inside source distribution and the photon density on surface directly,thus avoiding the extra time consumption caused by iteration and the reconstruction errors caused by model inaccuracy.Moreover,gates module was composed of the concatenation and multiplication operators of three different gates.It was embedded into the network aiming at remembering input surface photon density over a period and allowing the network to capture neurons connected to the true source selectively by controlling three different gates.To evaluate the performance of the proposed method,numerical simulations were conducted,whose results demonstrated good performance in terms of reconstruction positioning accuracy and robustness. 展开更多
关键词 Optical molecular tomography gates module positioning accuracy robustness
下载PDF
Robust optical mode converter based on topological waveguide arrays
16
作者 徐宇翔 唐文剑 +4 位作者 姜力炜 吴德兴 王恒 许冰聪 陈林 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期197-203,共7页
Optical mode converters are essential for enhancing the capacity of optical communication systems. However, fabrication errors restrict the further improvement of conventional mode converters. To address this challeng... Optical mode converters are essential for enhancing the capacity of optical communication systems. However, fabrication errors restrict the further improvement of conventional mode converters. To address this challenge, we have designed an on-chip TE0–TE1mode converter based on topologically protected waveguide arrays. The simulation results demonstrate that the converter exhibits a mode coupling efficiency of 93.5% near 1550 nm and can tolerate a relative fabrication error of 30%. Our design approach can be extended to enhance the robustness for other integrated photonic devices, beneficial for future development of optical network systems. 展开更多
关键词 on-chip integrated photonic devices topological photonics mode converter robustness
下载PDF
Constructive Robust Steganography Algorithm Based on Style Transfer
17
作者 Xiong Zhang Minqing Zhang +2 位作者 Xu’an Wang Siyuan Huang Fuqiang Di 《Computers, Materials & Continua》 SCIE EI 2024年第10期1433-1448,共16页
Traditional information hiding techniques achieve information hiding by modifying carrier data,which can easily leave detectable traces that may be detected by steganalysis tools.Especially in image transmission,both ... Traditional information hiding techniques achieve information hiding by modifying carrier data,which can easily leave detectable traces that may be detected by steganalysis tools.Especially in image transmission,both geometric and non-geometric attacks can cause subtle changes in the pixels of the image during transmission.To overcome these challenges,we propose a constructive robust image steganography technique based on style transformation.Unlike traditional steganography,our algorithm does not involve any direct modifications to the carrier data.In this study,we constructed a mapping dictionary by setting the correspondence between binary codes and image categories and then used the mapping dictionary to map secret information to secret images.Through image semantic segmentation and style transfer techniques,we combined the style of secret images with the content of public images to generate stego images.This type of stego image can resist interference during public channel transmission,ensuring the secure transmission of information.At the receiving end,we input the stego image into a trained secret image reconstruction network,which can effectively reconstruct the original secret image and further recover the secret information through a mapping dictionary to ensure the security,accuracy,and efficient decoding of the information.The experimental results show that this constructive information hiding method based on style transfer improves the security of information hiding,enhances the robustness of the algorithm to various attacks,and ensures information security. 展开更多
关键词 Information hiding neural style transfer robustness map dictionary
下载PDF
Constructing high-toughness polyimide binder with robust polarity and ion-conductive mechanisms ensuring long-term operational stability of silicon-based anodes
18
作者 Yongjun Kang Nanxi Dong +5 位作者 Fangzhou Liu Daolei Lin Bingxue Liu Guofeng Tian Shengli Qi Dezhen Wu 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第6期580-591,I0014,共13页
Silicon-based materials have demonstrated remarkable potential in high-energy-density batteries owing to their high theoretical capacity.However,the significant volume expansion of silicon seriously hinders its utiliz... Silicon-based materials have demonstrated remarkable potential in high-energy-density batteries owing to their high theoretical capacity.However,the significant volume expansion of silicon seriously hinders its utilization as a lithium-ion anode.Herein,a functionalized high-toughness polyimide(PDMI) is synthesized by copolymerizing the 4,4'-Oxydiphthalic anhydride(ODPA) with 4,4'-oxydianiline(ODA),2,3-diaminobenzoic acid(DABA),and 1,3-bis(3-aminopropyl)-tetramethyl disiloxane(DMS).The combination of rigid benzene rings and flexible oxygen groups(-O-) in the PDMI molecular chain via a rigidness/softness coupling mechanism contributes to high toughness.The plentiful polar carboxyl(-COOH) groups establish robust bonding strength.Rapid ionic transport is achieved by incorporating the flexible siloxane segment(Si-O-Si),which imparts high molecular chain motility and augments free volume holes to facilitate lithium-ion transport(9.8 × 10^(-10) cm^(2) s^(-1) vs.16 × 10^(-10) cm^(2) s~(-1)).As expected,the SiO_x@PDMI-1.5 electrode delivers brilliant long-term cycle performance with a remarkable capacity retention of 85% over 500 cycles at 1.3 A g^(-1).The well-designed functionalized polyimide also significantly enhances the electrochemical properties of Si nanoparticles electrode.Meanwhile,the assembled SiO_x@PDMI-1.5/NCM811 full cell delivers a high retention of 80% after 100 cycles.The perspective of the binder design strategy based on polyimide modification delivers a novel path toward high-capacity electrodes for high-energy-density batteries. 展开更多
关键词 Polyimide binder High toughness robust ionic transport Silicon-based anodes Lithium-ion batteries
下载PDF
Nonlinear robust adaptive control for bidirectional stabilization system of all-electric tank with unknown actuator backlash compensation and disturbance estimation
19
作者 Shusen Yuan Wenxiang Deng +1 位作者 Jianyong Yao Guolai Yang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期144-158,共15页
Since backlash nonlinearity is inevitably existing in actuators for bidirectional stabilization system of allelectric tank,it behaves more drastically in high maneuvering environments.In this work,the accurate trackin... Since backlash nonlinearity is inevitably existing in actuators for bidirectional stabilization system of allelectric tank,it behaves more drastically in high maneuvering environments.In this work,the accurate tracking control for bidirectional stabilization system of moving all-electric tank with actuator backlash and unmodeled disturbance is solved.By utilizing the smooth adaptive backlash inverse model,a nonlinear robust adaptive feedback control scheme is presented.The unknown parameters and unmodelled disturbance are addressed separately through the derived parametric adaptive function and the continuous nonlinear robust term.Because the unknown backlash parameters are updated via adaptive function and the backlash effect can be suppressed successfully by inverse operation,which ensures the system stability.Meanwhile,the system disturbance in the high maneuverable environment can be estimated with the constructed adaptive law online improving the engineering practicality.Finally,Lyapunov-based analysis proves that the developed controller can ensure the tracking error asymptotically converges to zero even with unmodeled disturbance and unknown actuator backlash.Contrast co-simulations and experiments illustrate the advantages of the proposed approach. 展开更多
关键词 Bidirectional stabilization system robust control Adaptive control Backlash inverse Disturbance estimation
下载PDF
Data-driven Wasserstein distributionally robust chance-constrained optimization for crude oil scheduling under uncertainty
20
作者 Xin Dai Liang Zhao +4 位作者 Renchu He Wenli Du Weimin Zhong Zhi Li Feng Qian 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2024年第5期152-166,共15页
Crude oil scheduling optimization is an effective method to enhance the economic benefits of oil refining.But uncertainties,including uncertain demands of crude distillation units(CDUs),might make the production plans... Crude oil scheduling optimization is an effective method to enhance the economic benefits of oil refining.But uncertainties,including uncertain demands of crude distillation units(CDUs),might make the production plans made by the traditional deterministic optimization models infeasible.A data-driven Wasserstein distributionally robust chance-constrained(WDRCC)optimization approach is proposed in this paper to deal with demand uncertainty in crude oil scheduling.First,a new deterministic crude oil scheduling optimization model is developed as the basis of this approach.The Wasserstein distance is then used to build ambiguity sets from historical data to describe the possible realizations of probability distributions of uncertain demands.A cross-validation method is advanced to choose suitable radii for these ambiguity sets.The deterministic model is reformulated as a WDRCC optimization model for crude oil scheduling to guarantee the demand constraints hold with a desired high probability even in the worst situation in ambiguity sets.The proposed WDRCC model is transferred into an equivalent conditional value-at-risk representation and further derived as a mixed-integer nonlinear programming counterpart.Industrial case studies from a real-world refinery are conducted to show the effectiveness of the proposed method.Out-of-sample tests demonstrate that the solution of the WDRCC model is more robust than those of the deterministic model and the chance-constrained model. 展开更多
关键词 DISTRIBUTIONS Model OPTIMIZATION Crude oil scheduling Wasserstein distance Distributionally robust chance constraints
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部