α-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating was prepared withα-Fe_(2)O_(3) nanoparticles and epoxy resin by spin coating method.The coating without epoxy resin has higher contact angle(CA)and lower ...α-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating was prepared withα-Fe_(2)O_(3) nanoparticles and epoxy resin by spin coating method.The coating without epoxy resin has higher contact angle(CA)and lower ice adhesion strength(IAS),but the mechanical properties are poor.Theα-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating exhibits good mechanical durability.In addition,compared with the bare aluminum substrate,the Ecorr of the composite coating is positive and the Jcorr is lower.The inhibition efficiency of the composite coating is as high as 99.98%in 3.5 wt%NaCl solution.The difference in the microstructure caused by the two preparation methods leads to the changes in mechanical properties and corrosion resistance of composite superhydrophobic coating.展开更多
Background: The robustness is a measurement of an analytical chemical method and its ability to contain unaffected by little with deliberate variation of analytical chemical method parameters. The analytical chemical ...Background: The robustness is a measurement of an analytical chemical method and its ability to contain unaffected by little with deliberate variation of analytical chemical method parameters. The analytical chemical method variation parameters are based on pH variability of buffer solution of mobile phase, organic ratio composition changes, stationary phase (column) manufacture, brand name and lot number variation;flow rate variation and temperature variation of chromatographic system. The analytical chemical method for assay of Atropine Sulfate conducted for robustness evaluation. The typical variation considered for mobile phase organic ratio change, change of pH, change of temperature, change of flow rate, change of column etc. Purpose: The aim of this study is to develop a cost effective, short run time and robust analytical chemical method for the assay quantification of Atropine in Pharmaceutical Ophthalmic Solution. This will help to make analytical decisions quickly for research and development scientists as well as will help with quality control product release for patient consumption. This analytical method will help to meet the market demand through quick quality control test of Atropine Ophthalmic Solution and it is very easy for maintaining (GDP) good documentation practices within the shortest period of time. Method: HPLC method has been selected for developing superior method to Compendial method. Both the compendial HPLC method and developed HPLC method was run into the same HPLC system to prove the superiority of developed method. Sensitivity, precision, reproducibility, accuracy parameters were considered for superiority of method. Mobile phase ratio change, pH of buffer solution, change of stationary phase temperature, change of flow rate and change of column were taken into consideration for robustness study of the developed method. Results: The limit of quantitation (LOQ) of developed method was much low than the compendial method. The % RSD for the six sample assay of developed method was 0.4% where the % RSD of the compendial method was 1.2%. The reproducibility between two analysts was 100.4% for developed method on the contrary the compendial method was 98.4%.展开更多
This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designe...This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information.展开更多
Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robus...Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the algorithms.In practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret image.An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms.In this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet transform.The wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding network.During the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret image.These lowresolution secret images are combined using densemodules to obtain a high-quality secret image.The experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various attacks.The proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical applications.In conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing algorithms.Its ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various applications.Further research and experimentation can explore the algorithm’s performance under different scenarios and expand its potential applications.展开更多
Optical molecular tomography(OMT)is a potential pre-clinical molecular imaging technique with applications in a variety of biomedical areas,which can provide non-invasive quantitative three-dimensional(3D)information ...Optical molecular tomography(OMT)is a potential pre-clinical molecular imaging technique with applications in a variety of biomedical areas,which can provide non-invasive quantitative three-dimensional(3D)information regarding tumor distribution in living animals.The construction of optical transmission models and the application of reconstruction algorithms in traditional model-based reconstruction processes have affected the reconstruction results,resulting in problems such as low accuracy,poor robustness,and long-time consumption.Here,a gates joint locally connected network(GLCN)method is proposed by establishing the mapping relationship between the inside source distribution and the photon density on surface directly,thus avoiding the extra time consumption caused by iteration and the reconstruction errors caused by model inaccuracy.Moreover,gates module was composed of the concatenation and multiplication operators of three different gates.It was embedded into the network aiming at remembering input surface photon density over a period and allowing the network to capture neurons connected to the true source selectively by controlling three different gates.To evaluate the performance of the proposed method,numerical simulations were conducted,whose results demonstrated good performance in terms of reconstruction positioning accuracy and robustness.展开更多
With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and int...With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and intelligence.However,tree ensemble models commonly used in smart grids are vulnerable to adversarial attacks,making it urgent to enhance their robustness.To address this,we propose a robustness enhancement method that incorporates physical constraints into the node-splitting decisions of tree ensembles.Our algorithm improves robustness by developing a dataset of adversarial examples that comply with physical laws,ensuring training data accurately reflects possible attack scenarios while adhering to physical rules.In our experiments,the proposed method increased robustness against adversarial attacks by 100%when applied to real grid data under physical constraints.These results highlight the advantages of our method in maintaining efficient and secure operation of smart grids under adversarial conditions.展开更多
Optical mode converters are essential for enhancing the capacity of optical communication systems. However, fabrication errors restrict the further improvement of conventional mode converters. To address this challeng...Optical mode converters are essential for enhancing the capacity of optical communication systems. However, fabrication errors restrict the further improvement of conventional mode converters. To address this challenge, we have designed an on-chip TE0–TE1mode converter based on topologically protected waveguide arrays. The simulation results demonstrate that the converter exhibits a mode coupling efficiency of 93.5% near 1550 nm and can tolerate a relative fabrication error of 30%. Our design approach can be extended to enhance the robustness for other integrated photonic devices, beneficial for future development of optical network systems.展开更多
Traditional information hiding techniques achieve information hiding by modifying carrier data,which can easily leave detectable traces that may be detected by steganalysis tools.Especially in image transmission,both ...Traditional information hiding techniques achieve information hiding by modifying carrier data,which can easily leave detectable traces that may be detected by steganalysis tools.Especially in image transmission,both geometric and non-geometric attacks can cause subtle changes in the pixels of the image during transmission.To overcome these challenges,we propose a constructive robust image steganography technique based on style transformation.Unlike traditional steganography,our algorithm does not involve any direct modifications to the carrier data.In this study,we constructed a mapping dictionary by setting the correspondence between binary codes and image categories and then used the mapping dictionary to map secret information to secret images.Through image semantic segmentation and style transfer techniques,we combined the style of secret images with the content of public images to generate stego images.This type of stego image can resist interference during public channel transmission,ensuring the secure transmission of information.At the receiving end,we input the stego image into a trained secret image reconstruction network,which can effectively reconstruct the original secret image and further recover the secret information through a mapping dictionary to ensure the security,accuracy,and efficient decoding of the information.The experimental results show that this constructive information hiding method based on style transfer improves the security of information hiding,enhances the robustness of the algorithm to various attacks,and ensures information security.展开更多
Silicon-based materials have demonstrated remarkable potential in high-energy-density batteries owing to their high theoretical capacity.However,the significant volume expansion of silicon seriously hinders its utiliz...Silicon-based materials have demonstrated remarkable potential in high-energy-density batteries owing to their high theoretical capacity.However,the significant volume expansion of silicon seriously hinders its utilization as a lithium-ion anode.Herein,a functionalized high-toughness polyimide(PDMI) is synthesized by copolymerizing the 4,4'-Oxydiphthalic anhydride(ODPA) with 4,4'-oxydianiline(ODA),2,3-diaminobenzoic acid(DABA),and 1,3-bis(3-aminopropyl)-tetramethyl disiloxane(DMS).The combination of rigid benzene rings and flexible oxygen groups(-O-) in the PDMI molecular chain via a rigidness/softness coupling mechanism contributes to high toughness.The plentiful polar carboxyl(-COOH) groups establish robust bonding strength.Rapid ionic transport is achieved by incorporating the flexible siloxane segment(Si-O-Si),which imparts high molecular chain motility and augments free volume holes to facilitate lithium-ion transport(9.8 × 10^(-10) cm^(2) s^(-1) vs.16 × 10^(-10) cm^(2) s~(-1)).As expected,the SiO_x@PDMI-1.5 electrode delivers brilliant long-term cycle performance with a remarkable capacity retention of 85% over 500 cycles at 1.3 A g^(-1).The well-designed functionalized polyimide also significantly enhances the electrochemical properties of Si nanoparticles electrode.Meanwhile,the assembled SiO_x@PDMI-1.5/NCM811 full cell delivers a high retention of 80% after 100 cycles.The perspective of the binder design strategy based on polyimide modification delivers a novel path toward high-capacity electrodes for high-energy-density batteries.展开更多
Since backlash nonlinearity is inevitably existing in actuators for bidirectional stabilization system of allelectric tank,it behaves more drastically in high maneuvering environments.In this work,the accurate trackin...Since backlash nonlinearity is inevitably existing in actuators for bidirectional stabilization system of allelectric tank,it behaves more drastically in high maneuvering environments.In this work,the accurate tracking control for bidirectional stabilization system of moving all-electric tank with actuator backlash and unmodeled disturbance is solved.By utilizing the smooth adaptive backlash inverse model,a nonlinear robust adaptive feedback control scheme is presented.The unknown parameters and unmodelled disturbance are addressed separately through the derived parametric adaptive function and the continuous nonlinear robust term.Because the unknown backlash parameters are updated via adaptive function and the backlash effect can be suppressed successfully by inverse operation,which ensures the system stability.Meanwhile,the system disturbance in the high maneuverable environment can be estimated with the constructed adaptive law online improving the engineering practicality.Finally,Lyapunov-based analysis proves that the developed controller can ensure the tracking error asymptotically converges to zero even with unmodeled disturbance and unknown actuator backlash.Contrast co-simulations and experiments illustrate the advantages of the proposed approach.展开更多
Crude oil scheduling optimization is an effective method to enhance the economic benefits of oil refining.But uncertainties,including uncertain demands of crude distillation units(CDUs),might make the production plans...Crude oil scheduling optimization is an effective method to enhance the economic benefits of oil refining.But uncertainties,including uncertain demands of crude distillation units(CDUs),might make the production plans made by the traditional deterministic optimization models infeasible.A data-driven Wasserstein distributionally robust chance-constrained(WDRCC)optimization approach is proposed in this paper to deal with demand uncertainty in crude oil scheduling.First,a new deterministic crude oil scheduling optimization model is developed as the basis of this approach.The Wasserstein distance is then used to build ambiguity sets from historical data to describe the possible realizations of probability distributions of uncertain demands.A cross-validation method is advanced to choose suitable radii for these ambiguity sets.The deterministic model is reformulated as a WDRCC optimization model for crude oil scheduling to guarantee the demand constraints hold with a desired high probability even in the worst situation in ambiguity sets.The proposed WDRCC model is transferred into an equivalent conditional value-at-risk representation and further derived as a mixed-integer nonlinear programming counterpart.Industrial case studies from a real-world refinery are conducted to show the effectiveness of the proposed method.Out-of-sample tests demonstrate that the solution of the WDRCC model is more robust than those of the deterministic model and the chance-constrained model.展开更多
Integrated energy systems(IESs)can improve energy efficiency and reduce carbon emissions,essential for achieving peak carbon emissions and carbon neutrality.This study investigated the characteristics of the CHP model...Integrated energy systems(IESs)can improve energy efficiency and reduce carbon emissions,essential for achieving peak carbon emissions and carbon neutrality.This study investigated the characteristics of the CHP model considering P2G and carbon capture systems,and a two-stage robust optimization model of the electricity-heat-gascold integrated energy system was developed.First,a CHP model considering the P2G and carbon capture system was established,and the electric-thermal coupling characteristics and P2G capacity constraints of the model were derived,which proved that the model could weaken the electric-thermal coupling characteristics,increase the electric power regulation range,and reduce carbon emissions.Subsequently,a two-stage robust optimal scheduling model of an IES was constructed,in which the objective function in the day-ahead scheduling stage was to minimize the start-up and shutdown costs.The objective function in the real-time scheduling stage was to minimize the equipment operating costs,carbon emission costs,wind curtailment,and solar curtailment costs,considering multiple uncertainties.Finally,after the objective function is linearized with a ψ-piecewise method,the model is solved based on the C&CG algorithm.Simulation results show that the proposed model can effectively absorb renewable energy and reduce the total cost of the system.展开更多
Acoustic emission(AE)localization algorithms based on homogeneous media or single-velocity are less accurate when applied to the triaxial localization experiments.To the end,a robust triaxial localization method of AE...Acoustic emission(AE)localization algorithms based on homogeneous media or single-velocity are less accurate when applied to the triaxial localization experiments.To the end,a robust triaxial localization method of AE source using refraction path is proposed.Firstly,the control equation of the refraction path is established according to the sensor coordinates and arrival times.Secondly,considering the influence of time-difference-of-arrival(TDOA)errors,the residual of the governing equation is calculated to estimate the equation weight.Thirdly,the refraction points in different directions are solved using Snell’s law and orthogonal constraints.Finally,the source coordinates are iteratively solved by weighted correction terms.The feasibility and accuracy of the proposed method are verified by pencil-lead breaking experiments.The simulation results show that the new method is almost unaffected by the refraction ratio,and always holds more stable and accurate positioning performance than the traditional method under different ratios and scales of TDOA outliers.展开更多
The Social Internet of Things(SIoT)integrates the Internet of Things(IoT)and social networks,taking into account the social attributes of objects and diversifying the relationship between humans and objects,which over...The Social Internet of Things(SIoT)integrates the Internet of Things(IoT)and social networks,taking into account the social attributes of objects and diversifying the relationship between humans and objects,which overcomes the limitations of the IoT’s focus on associations between objects.Artificial Intelligence(AI)technology is rapidly evolving.It is critical to build trustworthy and transparent systems,especially with system security issues coming to the surface.This paper emphasizes the social attributes of objects and uses hypergraphs to model the diverse entities and relationships in SIoT,aiming to build an SIoT hypergraph generation model to explore the complex interactions between entities in the context of intelligent SIoT.Current hypergraph generation models impose too many constraints and fail to capture more details of real hypernetworks.In contrast,this paper proposes a hypergraph generation model that evolves dynamically over time,where only the number of nodes is fixed.It combines node wandering with a forest fire model and uses two different methods to control the size of the hyperedges.As new nodes are added,the model can promptly reflect changes in entities and relationships within SIoT.Experimental results exhibit that our model can effectively replicate the topological structure of real-world hypernetworks.We also evaluate the vulnerability of the hypergraph under different attack strategies,which provides theoretical support for building a more robust intelligent SIoT hypergraph model and lays the foundation for building safer and more reliable systems in the future.展开更多
Utilizing machine learning techniques for data-driven diagnosis of high temperature PEM fuel cells is beneficial and meaningful to the system durability. Nevertheless, ensuring the robustness of diagnosis remains a cr...Utilizing machine learning techniques for data-driven diagnosis of high temperature PEM fuel cells is beneficial and meaningful to the system durability. Nevertheless, ensuring the robustness of diagnosis remains a critical and challenging task in real application. To enhance the robustness of diagnosis and achieve a more thorough evaluation of diagnostic performance, a robust diagnostic procedure based on electrochemical impedance spectroscopy (EIS) and a new method for evaluation of the diagnosis robustness was proposed and investigated in this work. To improve the diagnosis robustness: (1) the degradation mechanism of different faults in the high temperature PEM fuel cell was first analyzed via the distribution of relaxation time of EIS to determine the equivalent circuit model (ECM) with better interpretability, simplicity and accuracy;(2) the feature extraction was implemented on the identified parameters of the ECM and extra attention was paid to distinguishing between the long-term normal degradation and other faults;(3) a Siamese Network was adopted to get features with higher robustness in a new embedding. The diagnosis was conducted using 6 classic classification algorithms—support vector machine (SVM), K-nearest neighbor (KNN), logistic regression (LR), decision tree (DT), random forest (RF), and Naive Bayes employing a dataset comprising a total of 1935 collected EIS. To evaluate the robustness of trained models: (1) different levels of errors were added to the features for performance evaluation;(2) a robustness coefficient (Roubust_C) was defined for a quantified and explicit evaluation of the diagnosis robustness. The diagnostic models employing the proposed feature extraction method can not only achieve the higher performance of around 100% but also higher robustness for diagnosis models. Despite the initial performance being similar, the KNN demonstrated a superior robustness after feature selection and re-embedding by triplet-loss method, which suggests the necessity of robustness evaluation for the machine learning models and the effectiveness of the defined robustness coefficient. This work hopes to give new insights to the robust diagnosis of high temperature PEM fuel cells and more comprehensive performance evaluation of the data-driven method for diagnostic application.展开更多
Digital watermarking technology plays an essential role in the work of anti-counterfeiting and traceability.However,image watermarking algorithms are weak against hybrid attacks,especially geometric attacks,such as cr...Digital watermarking technology plays an essential role in the work of anti-counterfeiting and traceability.However,image watermarking algorithms are weak against hybrid attacks,especially geometric attacks,such as cropping attacks,rotation attacks,etc.We propose a robust blind image watermarking algorithm that combines stable interest points and deep learning networks to improve the robustness of the watermarking algorithm further.First,to extract more sparse and stable interest points,we use the Superpoint algorithm for generation and design two steps to perform the screening procedure.We first keep the points with the highest possibility in a given region to ensure the sparsity of the points and then filter the robust interest points by hybrid attacks to ensure high stability.The message is embedded in sub-blocks centered on stable interest points using a deep learning-based framework.Different kinds of attacks and simulated noise are added to the adversarial training to guarantee the robustness of embedded blocks.We use the ConvNext network for watermark extraction and determine the division threshold based on the decoded values of the unembedded sub-blocks.Through extensive experimental results,we demonstrate that our proposed algorithm can improve the accuracy of the network in extracting information while ensuring high invisibility between the embedded image and the original cover image.Comparison with previous SOTA work reveals that our algorithm can achieve better visual and numerical results on hybrid and geometric attacks.展开更多
A tracking stability control problem for the vertical electric stabilization system of moving tank based on adaptive robust servo control is addressed.This paper mainly focuses on two types of possibly fast timevaryin...A tracking stability control problem for the vertical electric stabilization system of moving tank based on adaptive robust servo control is addressed.This paper mainly focuses on two types of possibly fast timevarying but bounded uncertainty within the vertical electric stabilization system:model parameter uncertainty and uncertain nonlinearity.First,the vertical electric stabilization system is constructed as an uncertain nonlinear dynamic system that can reflect the practical mechanics transfer process of the system.Second,the dynamical equation in the form of state space is established by designing the angular tracking error.Third,the comprehensive parameter of system uncertainty is designed to estimate the most conservative effects of uncertainty.Finally,an adaptive robust servo control which can effectively handle the combined effects of complex nonlinearity and uncertainty is proposed.The feasibility of the proposed control strategy under the practical physical condition is validated through the tests on the experimental platform.This paper pioneers the introduction of the internal nonlinearity and uncertainty of the vertical electric stabilization system into the settlement of the tracking stability control problem,and validates the advanced servo control strategy through experiment for the first time.展开更多
To improve the hit probability of tank at high speed,a prediction method of projectile-target intersection based on adaptive robust constraint-following control and interval uncertainty analysis is proposed.The method...To improve the hit probability of tank at high speed,a prediction method of projectile-target intersection based on adaptive robust constraint-following control and interval uncertainty analysis is proposed.The method proposed provides a novel way to predict the impact point of projectile for moving tank.First,bidirectional stability constraints and stability constraint-following error are constructed using the Udwadia-Kalaba theory,and an adaptive robust constraint-following controller is designed considering uncertainties.Second,the exterior ballistic ordinary differential equation with uncertainties is integrated into the controller,and the pointing control of stability system is extended to the impact-point control of projectile.Third,based on the interval uncertainty analysis method combining Chebyshev polynomial expansion and affine arithmetic,a prediction method of projectile-target intersection is proposed.Finally,the co-simulation experiment is performed by establishing the multi-body system dynamic model of tank and mathematical model of control system.The results demonstrate that the prediction method of projectile-target intersection based on uncertainty analysis can effectively decrease the uncertainties of system,improve the prediction accuracy,and increase the hit probability.The adaptive robust constraint-following control can effectively restrain the uncertainties caused by road excitation and model error.展开更多
(Multichannel)Singular spectrum analysis is considered as one of the most effective methods for seismic incoherent noise suppression.It utilizes the low-rank feature of seismic signal and regards the noise suppression...(Multichannel)Singular spectrum analysis is considered as one of the most effective methods for seismic incoherent noise suppression.It utilizes the low-rank feature of seismic signal and regards the noise suppression as a low-rank reconstruction problem.However,in some cases the seismic geophones receive some erratic disturbances and the amplitudes are dramatically larger than other receivers.The presence of this kind of noise,called erratic noise,makes singular spectrum analysis(SSA)reconstruction unstable and has undesirable effects on the final results.We robustify the low-rank reconstruction of seismic data by a reweighted damped SSA(RD-SSA)method.It incorporates the damped SSA,an improved version of SSA,into a reweighted framework.The damping operator is used to weaken the artificial disturbance introduced by the low-rank projection of both erratic and random noise.The central idea of the RD-SSA method is to iteratively approximate the observed data with the quadratic norm for the first iteration and the Tukeys bisquare norm for the rest iterations.The RD-SSA method can suppress seismic incoherent noise and keep the reconstruction process robust to the erratic disturbance.The feasibility of RD-SSA is validated via both synthetic and field data examples.展开更多
The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grou...The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grouping videos.Grounded in the H.264 video coding standard,the algorithm first employs traditional robust watermark stitching technology to embed watermark information in the low-frequency coefficient domain of the U channel.Subsequently,it utilizes histogram migration techniques in the high-frequency coefficient domain of the U channel to embed auxiliary information,enabling successful watermark extraction and lossless recovery of the original video content.Experimental results demonstrate the algorithm’s strong imperceptibility,with each embedded frame in the experimental videos achieving a mean peak signal-to-noise ratio of 49.3830 dB and a mean structural similarity of 0.9996.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 7.59%and 0.4%on average.At the same time,the proposed algorithm has strong robustness to both offline and online attacks:In the face of offline attacks,the average normalized correlation coefficient between the extracted watermark and the original watermark is 0.9989,and the average bit error rate is 0.0089.In the face of online attacks,the normalized correlation coefficient between the extracted watermark and the original watermark is 0.8840,and the mean bit error rate is 0.2269.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 1.27%and 18.16%on average,highlighting the algorithm’s robustness.Furthermore,the algorithm exhibits low computational complexity,with the mean encoding and the mean decoding time differentials during experimental video processing being 3.934 and 2.273 s,respectively,underscoring its practical utility.展开更多
基金Supported by the National Natural Science Foundation of China(No.51801058)the Special Program for Guiding Local Science and Technology Development by the Central Government of Hubei Province(No.2019ZYYD006)the Education and Teaching Research Project of Hubei Polytechnic University(No.2021B01)。
文摘α-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating was prepared withα-Fe_(2)O_(3) nanoparticles and epoxy resin by spin coating method.The coating without epoxy resin has higher contact angle(CA)and lower ice adhesion strength(IAS),but the mechanical properties are poor.Theα-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating exhibits good mechanical durability.In addition,compared with the bare aluminum substrate,the Ecorr of the composite coating is positive and the Jcorr is lower.The inhibition efficiency of the composite coating is as high as 99.98%in 3.5 wt%NaCl solution.The difference in the microstructure caused by the two preparation methods leads to the changes in mechanical properties and corrosion resistance of composite superhydrophobic coating.
文摘Background: The robustness is a measurement of an analytical chemical method and its ability to contain unaffected by little with deliberate variation of analytical chemical method parameters. The analytical chemical method variation parameters are based on pH variability of buffer solution of mobile phase, organic ratio composition changes, stationary phase (column) manufacture, brand name and lot number variation;flow rate variation and temperature variation of chromatographic system. The analytical chemical method for assay of Atropine Sulfate conducted for robustness evaluation. The typical variation considered for mobile phase organic ratio change, change of pH, change of temperature, change of flow rate, change of column etc. Purpose: The aim of this study is to develop a cost effective, short run time and robust analytical chemical method for the assay quantification of Atropine in Pharmaceutical Ophthalmic Solution. This will help to make analytical decisions quickly for research and development scientists as well as will help with quality control product release for patient consumption. This analytical method will help to meet the market demand through quick quality control test of Atropine Ophthalmic Solution and it is very easy for maintaining (GDP) good documentation practices within the shortest period of time. Method: HPLC method has been selected for developing superior method to Compendial method. Both the compendial HPLC method and developed HPLC method was run into the same HPLC system to prove the superiority of developed method. Sensitivity, precision, reproducibility, accuracy parameters were considered for superiority of method. Mobile phase ratio change, pH of buffer solution, change of stationary phase temperature, change of flow rate and change of column were taken into consideration for robustness study of the developed method. Results: The limit of quantitation (LOQ) of developed method was much low than the compendial method. The % RSD for the six sample assay of developed method was 0.4% where the % RSD of the compendial method was 1.2%. The reproducibility between two analysts was 100.4% for developed method on the contrary the compendial method was 98.4%.
基金the National Natural Science Foundation of China(Nos.62272478,61872384)Natural Science Foundation of Shanxi Province(No.2023-JC-YB-584)+1 种基金National Natural Science Foundation of China(No.62172436)Engineering University of PAP’s Funding for Scientific Research Innovation Team,Engineering University of PAP’s Funding for Key Researcher(No.KYGG202011).
文摘This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information.
基金partly supported by the National Natural Science Foundation of China(Jianhua Wu,Grant No.62041106).
文摘Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the algorithms.In practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret image.An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms.In this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet transform.The wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding network.During the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret image.These lowresolution secret images are combined using densemodules to obtain a high-quality secret image.The experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various attacks.The proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical applications.In conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing algorithms.Its ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various applications.Further research and experimentation can explore the algorithm’s performance under different scenarios and expand its potential applications.
基金supported by the National Natural Science Foundation of China(No.62101439)the Key Research and Development Program of Shaanxi(No.2023-YBSF-289).
文摘Optical molecular tomography(OMT)is a potential pre-clinical molecular imaging technique with applications in a variety of biomedical areas,which can provide non-invasive quantitative three-dimensional(3D)information regarding tumor distribution in living animals.The construction of optical transmission models and the application of reconstruction algorithms in traditional model-based reconstruction processes have affected the reconstruction results,resulting in problems such as low accuracy,poor robustness,and long-time consumption.Here,a gates joint locally connected network(GLCN)method is proposed by establishing the mapping relationship between the inside source distribution and the photon density on surface directly,thus avoiding the extra time consumption caused by iteration and the reconstruction errors caused by model inaccuracy.Moreover,gates module was composed of the concatenation and multiplication operators of three different gates.It was embedded into the network aiming at remembering input surface photon density over a period and allowing the network to capture neurons connected to the true source selectively by controlling three different gates.To evaluate the performance of the proposed method,numerical simulations were conducted,whose results demonstrated good performance in terms of reconstruction positioning accuracy and robustness.
基金This work was supported by Natural Science Foundation of China(Nos.62303126,62362008,62066006,authors Zhenyong Zhang and Bin Hu,https://www.nsfc.gov.cn/,accessed on 25 July 2024)Guizhou Provincial Science and Technology Projects(No.ZK[2022]149,author Zhenyong Zhang,https://kjt.guizhou.gov.cn/,accessed on 25 July 2024)+1 种基金Guizhou Provincial Research Project(Youth)forUniversities(No.[2022]104,author Zhenyong Zhang,https://jyt.guizhou.gov.cn/,accessed on 25 July 2024)GZU Cultivation Project of NSFC(No.[2020]80,author Zhenyong Zhang,https://www.gzu.edu.cn/,accessed on 25 July 2024).
文摘With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and intelligence.However,tree ensemble models commonly used in smart grids are vulnerable to adversarial attacks,making it urgent to enhance their robustness.To address this,we propose a robustness enhancement method that incorporates physical constraints into the node-splitting decisions of tree ensembles.Our algorithm improves robustness by developing a dataset of adversarial examples that comply with physical laws,ensuring training data accurately reflects possible attack scenarios while adhering to physical rules.In our experiments,the proposed method increased robustness against adversarial attacks by 100%when applied to real grid data under physical constraints.These results highlight the advantages of our method in maintaining efficient and secure operation of smart grids under adversarial conditions.
基金Project supported by the National Undergraduate Training Projects for Innovation and Entrepreneurship (Grant No. 5003182007)the National Natural Science Foundation of China (Grant No. 12074137)+1 种基金the National Key Research and Development Project of China (Grant No. 2021YFB2801903)the Natural Science Foundation from the Science,Technology,and Innovation Commission of Shenzhen Municipality (Grant No. JCYJ20220530161010023)。
文摘Optical mode converters are essential for enhancing the capacity of optical communication systems. However, fabrication errors restrict the further improvement of conventional mode converters. To address this challenge, we have designed an on-chip TE0–TE1mode converter based on topologically protected waveguide arrays. The simulation results demonstrate that the converter exhibits a mode coupling efficiency of 93.5% near 1550 nm and can tolerate a relative fabrication error of 30%. Our design approach can be extended to enhance the robustness for other integrated photonic devices, beneficial for future development of optical network systems.
基金the National Natural Science Foundation of China(Nos.62272478,61872384,62172436,62102451)Natural Science Foundation of Shanxi Province(No.2023-JC-YB-584)Engineering University of PAP’s Funding for Key Researcher(No.KYGG202011).
文摘Traditional information hiding techniques achieve information hiding by modifying carrier data,which can easily leave detectable traces that may be detected by steganalysis tools.Especially in image transmission,both geometric and non-geometric attacks can cause subtle changes in the pixels of the image during transmission.To overcome these challenges,we propose a constructive robust image steganography technique based on style transformation.Unlike traditional steganography,our algorithm does not involve any direct modifications to the carrier data.In this study,we constructed a mapping dictionary by setting the correspondence between binary codes and image categories and then used the mapping dictionary to map secret information to secret images.Through image semantic segmentation and style transfer techniques,we combined the style of secret images with the content of public images to generate stego images.This type of stego image can resist interference during public channel transmission,ensuring the secure transmission of information.At the receiving end,we input the stego image into a trained secret image reconstruction network,which can effectively reconstruct the original secret image and further recover the secret information through a mapping dictionary to ensure the security,accuracy,and efficient decoding of the information.The experimental results show that this constructive information hiding method based on style transfer improves the security of information hiding,enhances the robustness of the algorithm to various attacks,and ensures information security.
基金supported by the National Natural Science Foundation of China (51673017)the National Natural Science Foundation of China (21404005)+1 种基金the Fundamental Research Funds for the Central Universities (XK1802-2)the Natural Science Foundation of Jiangsu Province (BK20150273)。
文摘Silicon-based materials have demonstrated remarkable potential in high-energy-density batteries owing to their high theoretical capacity.However,the significant volume expansion of silicon seriously hinders its utilization as a lithium-ion anode.Herein,a functionalized high-toughness polyimide(PDMI) is synthesized by copolymerizing the 4,4'-Oxydiphthalic anhydride(ODPA) with 4,4'-oxydianiline(ODA),2,3-diaminobenzoic acid(DABA),and 1,3-bis(3-aminopropyl)-tetramethyl disiloxane(DMS).The combination of rigid benzene rings and flexible oxygen groups(-O-) in the PDMI molecular chain via a rigidness/softness coupling mechanism contributes to high toughness.The plentiful polar carboxyl(-COOH) groups establish robust bonding strength.Rapid ionic transport is achieved by incorporating the flexible siloxane segment(Si-O-Si),which imparts high molecular chain motility and augments free volume holes to facilitate lithium-ion transport(9.8 × 10^(-10) cm^(2) s^(-1) vs.16 × 10^(-10) cm^(2) s~(-1)).As expected,the SiO_x@PDMI-1.5 electrode delivers brilliant long-term cycle performance with a remarkable capacity retention of 85% over 500 cycles at 1.3 A g^(-1).The well-designed functionalized polyimide also significantly enhances the electrochemical properties of Si nanoparticles electrode.Meanwhile,the assembled SiO_x@PDMI-1.5/NCM811 full cell delivers a high retention of 80% after 100 cycles.The perspective of the binder design strategy based on polyimide modification delivers a novel path toward high-capacity electrodes for high-energy-density batteries.
基金the National Natural Science Foundation of China(No.52275062)and(No.52075262).
文摘Since backlash nonlinearity is inevitably existing in actuators for bidirectional stabilization system of allelectric tank,it behaves more drastically in high maneuvering environments.In this work,the accurate tracking control for bidirectional stabilization system of moving all-electric tank with actuator backlash and unmodeled disturbance is solved.By utilizing the smooth adaptive backlash inverse model,a nonlinear robust adaptive feedback control scheme is presented.The unknown parameters and unmodelled disturbance are addressed separately through the derived parametric adaptive function and the continuous nonlinear robust term.Because the unknown backlash parameters are updated via adaptive function and the backlash effect can be suppressed successfully by inverse operation,which ensures the system stability.Meanwhile,the system disturbance in the high maneuverable environment can be estimated with the constructed adaptive law online improving the engineering practicality.Finally,Lyapunov-based analysis proves that the developed controller can ensure the tracking error asymptotically converges to zero even with unmodeled disturbance and unknown actuator backlash.Contrast co-simulations and experiments illustrate the advantages of the proposed approach.
基金the supports from National Natural Science Foundation of China(61988101,62073142,22178103)National Natural Science Fund for Distinguished Young Scholars(61925305)International(Regional)Cooperation and Exchange Project(61720106008)。
文摘Crude oil scheduling optimization is an effective method to enhance the economic benefits of oil refining.But uncertainties,including uncertain demands of crude distillation units(CDUs),might make the production plans made by the traditional deterministic optimization models infeasible.A data-driven Wasserstein distributionally robust chance-constrained(WDRCC)optimization approach is proposed in this paper to deal with demand uncertainty in crude oil scheduling.First,a new deterministic crude oil scheduling optimization model is developed as the basis of this approach.The Wasserstein distance is then used to build ambiguity sets from historical data to describe the possible realizations of probability distributions of uncertain demands.A cross-validation method is advanced to choose suitable radii for these ambiguity sets.The deterministic model is reformulated as a WDRCC optimization model for crude oil scheduling to guarantee the demand constraints hold with a desired high probability even in the worst situation in ambiguity sets.The proposed WDRCC model is transferred into an equivalent conditional value-at-risk representation and further derived as a mixed-integer nonlinear programming counterpart.Industrial case studies from a real-world refinery are conducted to show the effectiveness of the proposed method.Out-of-sample tests demonstrate that the solution of the WDRCC model is more robust than those of the deterministic model and the chance-constrained model.
基金supported by the National Natural Science Foundation of China(Grant number 51977154)。
文摘Integrated energy systems(IESs)can improve energy efficiency and reduce carbon emissions,essential for achieving peak carbon emissions and carbon neutrality.This study investigated the characteristics of the CHP model considering P2G and carbon capture systems,and a two-stage robust optimization model of the electricity-heat-gascold integrated energy system was developed.First,a CHP model considering the P2G and carbon capture system was established,and the electric-thermal coupling characteristics and P2G capacity constraints of the model were derived,which proved that the model could weaken the electric-thermal coupling characteristics,increase the electric power regulation range,and reduce carbon emissions.Subsequently,a two-stage robust optimal scheduling model of an IES was constructed,in which the objective function in the day-ahead scheduling stage was to minimize the start-up and shutdown costs.The objective function in the real-time scheduling stage was to minimize the equipment operating costs,carbon emission costs,wind curtailment,and solar curtailment costs,considering multiple uncertainties.Finally,after the objective function is linearized with a ψ-piecewise method,the model is solved based on the C&CG algorithm.Simulation results show that the proposed model can effectively absorb renewable energy and reduce the total cost of the system.
基金the National Natural Science Foundation of China (Nos.52304123 and 52104077)the Postdoctoral Fellowship Program of CPSF (No.GZB20230914)+1 种基金the China Postdoctoral Science Foundation (No.2023M730412)the National Key Research and Development Program for Young Scientists (No.2021YFC2900400)。
文摘Acoustic emission(AE)localization algorithms based on homogeneous media or single-velocity are less accurate when applied to the triaxial localization experiments.To the end,a robust triaxial localization method of AE source using refraction path is proposed.Firstly,the control equation of the refraction path is established according to the sensor coordinates and arrival times.Secondly,considering the influence of time-difference-of-arrival(TDOA)errors,the residual of the governing equation is calculated to estimate the equation weight.Thirdly,the refraction points in different directions are solved using Snell’s law and orthogonal constraints.Finally,the source coordinates are iteratively solved by weighted correction terms.The feasibility and accuracy of the proposed method are verified by pencil-lead breaking experiments.The simulation results show that the new method is almost unaffected by the refraction ratio,and always holds more stable and accurate positioning performance than the traditional method under different ratios and scales of TDOA outliers.
文摘The Social Internet of Things(SIoT)integrates the Internet of Things(IoT)and social networks,taking into account the social attributes of objects and diversifying the relationship between humans and objects,which overcomes the limitations of the IoT’s focus on associations between objects.Artificial Intelligence(AI)technology is rapidly evolving.It is critical to build trustworthy and transparent systems,especially with system security issues coming to the surface.This paper emphasizes the social attributes of objects and uses hypergraphs to model the diverse entities and relationships in SIoT,aiming to build an SIoT hypergraph generation model to explore the complex interactions between entities in the context of intelligent SIoT.Current hypergraph generation models impose too many constraints and fail to capture more details of real hypernetworks.In contrast,this paper proposes a hypergraph generation model that evolves dynamically over time,where only the number of nodes is fixed.It combines node wandering with a forest fire model and uses two different methods to control the size of the hyperedges.As new nodes are added,the model can promptly reflect changes in entities and relationships within SIoT.Experimental results exhibit that our model can effectively replicate the topological structure of real-world hypernetworks.We also evaluate the vulnerability of the hypergraph under different attack strategies,which provides theoretical support for building a more robust intelligent SIoT hypergraph model and lays the foundation for building safer and more reliable systems in the future.
基金supported by the Chinese Scholarship Council(Nos.202208320055 and 202108320111)the support from the energy department of Aalborg University was acknowledged.
文摘Utilizing machine learning techniques for data-driven diagnosis of high temperature PEM fuel cells is beneficial and meaningful to the system durability. Nevertheless, ensuring the robustness of diagnosis remains a critical and challenging task in real application. To enhance the robustness of diagnosis and achieve a more thorough evaluation of diagnostic performance, a robust diagnostic procedure based on electrochemical impedance spectroscopy (EIS) and a new method for evaluation of the diagnosis robustness was proposed and investigated in this work. To improve the diagnosis robustness: (1) the degradation mechanism of different faults in the high temperature PEM fuel cell was first analyzed via the distribution of relaxation time of EIS to determine the equivalent circuit model (ECM) with better interpretability, simplicity and accuracy;(2) the feature extraction was implemented on the identified parameters of the ECM and extra attention was paid to distinguishing between the long-term normal degradation and other faults;(3) a Siamese Network was adopted to get features with higher robustness in a new embedding. The diagnosis was conducted using 6 classic classification algorithms—support vector machine (SVM), K-nearest neighbor (KNN), logistic regression (LR), decision tree (DT), random forest (RF), and Naive Bayes employing a dataset comprising a total of 1935 collected EIS. To evaluate the robustness of trained models: (1) different levels of errors were added to the features for performance evaluation;(2) a robustness coefficient (Roubust_C) was defined for a quantified and explicit evaluation of the diagnosis robustness. The diagnostic models employing the proposed feature extraction method can not only achieve the higher performance of around 100% but also higher robustness for diagnosis models. Despite the initial performance being similar, the KNN demonstrated a superior robustness after feature selection and re-embedding by triplet-loss method, which suggests the necessity of robustness evaluation for the machine learning models and the effectiveness of the defined robustness coefficient. This work hopes to give new insights to the robust diagnosis of high temperature PEM fuel cells and more comprehensive performance evaluation of the data-driven method for diagnostic application.
文摘Digital watermarking technology plays an essential role in the work of anti-counterfeiting and traceability.However,image watermarking algorithms are weak against hybrid attacks,especially geometric attacks,such as cropping attacks,rotation attacks,etc.We propose a robust blind image watermarking algorithm that combines stable interest points and deep learning networks to improve the robustness of the watermarking algorithm further.First,to extract more sparse and stable interest points,we use the Superpoint algorithm for generation and design two steps to perform the screening procedure.We first keep the points with the highest possibility in a given region to ensure the sparsity of the points and then filter the robust interest points by hybrid attacks to ensure high stability.The message is embedded in sub-blocks centered on stable interest points using a deep learning-based framework.Different kinds of attacks and simulated noise are added to the adversarial training to guarantee the robustness of embedded blocks.We use the ConvNext network for watermark extraction and determine the division threshold based on the decoded values of the unembedded sub-blocks.Through extensive experimental results,we demonstrate that our proposed algorithm can improve the accuracy of the network in extracting information while ensuring high invisibility between the embedded image and the original cover image.Comparison with previous SOTA work reveals that our algorithm can achieve better visual and numerical results on hybrid and geometric attacks.
基金supported in part by the Nation Natural Science Foundation of China under Grant No.52175099China Postdoctoral Science Foundation under Grant No.2020M671494Jiangsu Planned Projects for Postdoctoral Research Funds under Grant No.2020Z179。
文摘A tracking stability control problem for the vertical electric stabilization system of moving tank based on adaptive robust servo control is addressed.This paper mainly focuses on two types of possibly fast timevarying but bounded uncertainty within the vertical electric stabilization system:model parameter uncertainty and uncertain nonlinearity.First,the vertical electric stabilization system is constructed as an uncertain nonlinear dynamic system that can reflect the practical mechanics transfer process of the system.Second,the dynamical equation in the form of state space is established by designing the angular tracking error.Third,the comprehensive parameter of system uncertainty is designed to estimate the most conservative effects of uncertainty.Finally,an adaptive robust servo control which can effectively handle the combined effects of complex nonlinearity and uncertainty is proposed.The feasibility of the proposed control strategy under the practical physical condition is validated through the tests on the experimental platform.This paper pioneers the introduction of the internal nonlinearity and uncertainty of the vertical electric stabilization system into the settlement of the tracking stability control problem,and validates the advanced servo control strategy through experiment for the first time.
基金financially supported by the National Natural Science Foundation of China(Grant 52175099)the China Postdoctoral Science Foundation(Grant No.2020M671494)+1 种基金the Jiangsu Planned Projects for Postdoctoral Research Funds(Grant No.2020Z179)the Nanjing University of Science and Technology Independent Research Program(Grant No.30920021105)。
文摘To improve the hit probability of tank at high speed,a prediction method of projectile-target intersection based on adaptive robust constraint-following control and interval uncertainty analysis is proposed.The method proposed provides a novel way to predict the impact point of projectile for moving tank.First,bidirectional stability constraints and stability constraint-following error are constructed using the Udwadia-Kalaba theory,and an adaptive robust constraint-following controller is designed considering uncertainties.Second,the exterior ballistic ordinary differential equation with uncertainties is integrated into the controller,and the pointing control of stability system is extended to the impact-point control of projectile.Third,based on the interval uncertainty analysis method combining Chebyshev polynomial expansion and affine arithmetic,a prediction method of projectile-target intersection is proposed.Finally,the co-simulation experiment is performed by establishing the multi-body system dynamic model of tank and mathematical model of control system.The results demonstrate that the prediction method of projectile-target intersection based on uncertainty analysis can effectively decrease the uncertainties of system,improve the prediction accuracy,and increase the hit probability.The adaptive robust constraint-following control can effectively restrain the uncertainties caused by road excitation and model error.
基金supported by the National Natural Science Foundation of China under grant no.42374133the Beijing Nova Program under grant no.2022056+1 种基金the Fundamental Research Funds for the Central Universities under grant no.2462020YXZZ006the Young Elite Scientists Sponsorship Program by CAST(YESS)under grant no.2018QNRC001。
文摘(Multichannel)Singular spectrum analysis is considered as one of the most effective methods for seismic incoherent noise suppression.It utilizes the low-rank feature of seismic signal and regards the noise suppression as a low-rank reconstruction problem.However,in some cases the seismic geophones receive some erratic disturbances and the amplitudes are dramatically larger than other receivers.The presence of this kind of noise,called erratic noise,makes singular spectrum analysis(SSA)reconstruction unstable and has undesirable effects on the final results.We robustify the low-rank reconstruction of seismic data by a reweighted damped SSA(RD-SSA)method.It incorporates the damped SSA,an improved version of SSA,into a reweighted framework.The damping operator is used to weaken the artificial disturbance introduced by the low-rank projection of both erratic and random noise.The central idea of the RD-SSA method is to iteratively approximate the observed data with the quadratic norm for the first iteration and the Tukeys bisquare norm for the rest iterations.The RD-SSA method can suppress seismic incoherent noise and keep the reconstruction process robust to the erratic disturbance.The feasibility of RD-SSA is validated via both synthetic and field data examples.
基金supported in part by the National Natural Science Foundation of China under Grants 62202496,62272478the Basic Frontier Innovation Project of Engineering university of People Armed Police under Grants WJY202314,WJY202221.
文摘The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grouping videos.Grounded in the H.264 video coding standard,the algorithm first employs traditional robust watermark stitching technology to embed watermark information in the low-frequency coefficient domain of the U channel.Subsequently,it utilizes histogram migration techniques in the high-frequency coefficient domain of the U channel to embed auxiliary information,enabling successful watermark extraction and lossless recovery of the original video content.Experimental results demonstrate the algorithm’s strong imperceptibility,with each embedded frame in the experimental videos achieving a mean peak signal-to-noise ratio of 49.3830 dB and a mean structural similarity of 0.9996.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 7.59%and 0.4%on average.At the same time,the proposed algorithm has strong robustness to both offline and online attacks:In the face of offline attacks,the average normalized correlation coefficient between the extracted watermark and the original watermark is 0.9989,and the average bit error rate is 0.0089.In the face of online attacks,the normalized correlation coefficient between the extracted watermark and the original watermark is 0.8840,and the mean bit error rate is 0.2269.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 1.27%and 18.16%on average,highlighting the algorithm’s robustness.Furthermore,the algorithm exhibits low computational complexity,with the mean encoding and the mean decoding time differentials during experimental video processing being 3.934 and 2.273 s,respectively,underscoring its practical utility.