Introduction to Computer Science,as one of the fundamental courses in computer-related majors,plays an important role in the cultivation of computer professionals.However,traditional teaching models and content can no...Introduction to Computer Science,as one of the fundamental courses in computer-related majors,plays an important role in the cultivation of computer professionals.However,traditional teaching models and content can no longer fully meet the needs of modern information technology development.In response to these issues,this article introduces the concept of computational creative thinking,optimizes course content,adopts exploratory teaching methods,and innovates course assessment methods,aiming to comprehensively enhance students’computational thinking and innovative abilities.By continuously improving and promoting this teaching model,it will undoubtedly promote computer education in universities to a new level.展开更多
This paper discusses the innovative methods of school-enterprise cooperation education mode in computer applied talent training.An innovative training model based on school-enterprise cooperation is proposed to promot...This paper discusses the innovative methods of school-enterprise cooperation education mode in computer applied talent training.An innovative training model based on school-enterprise cooperation is proposed to promote the cultivation of students’practical and innovative skills,so as to better adapt to the needs of society.By analyzing the key links and influencing factors of the training mode,this paper puts forward some concrete suggestions and measures to provide guidelines for universities and enterprises in personnel training.展开更多
The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprin...The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprint based on machine learning has attracted considerable attention because it can detect vulnerable devices in complex and heterogeneous access phases.However,flexible and diversified IoT devices with limited resources increase dif-ficulty of the device fingerprint authentication method executed in IoT,because it needs to retrain the model network to deal with incremental features or types.To address this problem,a device fingerprinting mechanism based on a Broad Learning System(BLS)is proposed in this paper.The mechanism firstly characterizes IoT devices by traffic analysis based on the identifiable differences of the traffic data of IoT devices,and extracts feature parameters of the traffic packets.A hierarchical hybrid sampling method is designed at the preprocessing phase to improve the imbalanced data distribution and reconstruct the fingerprint dataset.The complexity of the dataset is reduced using Principal Component Analysis(PCA)and the device type is identified by training weights using BLS.The experimental results show that the proposed method can achieve state-of-the-art accuracy and spend less training time than other existing methods.展开更多
With the rapid advancement of social economies,intelligent transportation systems are gaining increasing atten-tion.Central to these systems is the detection of abnormal vehicle behavior,which remains a critical chall...With the rapid advancement of social economies,intelligent transportation systems are gaining increasing atten-tion.Central to these systems is the detection of abnormal vehicle behavior,which remains a critical challenge due to the complexity of urban roadways and the variability of external conditions.Current research on detecting abnormal traffic behaviors is still nascent,with significant room for improvement in recognition accuracy.To address this,this research has developed a new model for recognizing abnormal traffic behaviors.This model employs the R3D network as its core architecture,incorporating a dense block to facilitate feature reuse.This approach not only enhances performance with fewer parameters and reduced computational demands but also allows for the acquisition of new features while simplifying the overall network structure.Additionally,this research integrates a self-attentive method that dynamically adjusts to the prevailing traffic conditions,optimizing the relevance of features for the task at hand.For temporal analysis,a Bi-LSTM layer is utilized to extract and learn from time-based data nuances.This research conducted a series of comparative experiments using the UCF-Crime dataset,achieving a notable accuracy of 89.30%on our test set.Our results demonstrate that our model not only operates with fewer parameters but also achieves superior recognition accuracy compared to previous models.展开更多
The rapid evolution of artificial intelligence(AI)technologies has significantly propelled the advancement of the Internet of Vehicles(IoV).With AI support,represented by machine learning technology,vehicles gain the ...The rapid evolution of artificial intelligence(AI)technologies has significantly propelled the advancement of the Internet of Vehicles(IoV).With AI support,represented by machine learning technology,vehicles gain the capability to make intelligent decisions.As a distributed learning paradigm,federated learning(FL)has emerged as a preferred solution in IoV.Compared to traditional centralized machine learning,FL reduces communication overhead and improves privacy protection.Despite these benefits,FL still faces some security and privacy concerns,such as poisoning attacks and inference attacks,prompting exploration into blockchain integration to enhance its security posture.This paper introduces a novel blockchain-enabled federated learning(BCFL)scheme with differential privacy(DP)tailored for IoV.In order to meet the performance demanding IoV environment,the proposed methodology integrates a consortium blockchain with Practical Byzantine Fault Tolerance(PBFT)consensus,which offers superior efficiency over the conventional public blockchains.In addition,the proposed approach utilizes the Differentially Private Stochastic Gradient Descent(DP-SGD)algorithm in the local training process of FL for enhanced privacy protection.Experiment results indicate that the integration of blockchain elevates the security level of FL in that the proposed approach effectively safeguards FL against poisoning attacks.On the other hand,the additional overhead associated with blockchain integration is also limited to a moderate level to meet the efficiency criteria of IoV.Furthermore,by incorporating DP,the proposed approach is shown to have the(ε-δ)privacy guarantee while maintaining an acceptable level of model accuracy.This enhancement effectively mitigates the threat of inference attacks on private information.展开更多
Natural creatures and ancient cultures are full of potential sources to provide inspiration for applied sciences.Inspired by the fractal geometry in nature and the fretwork frame in ancient culture,here we design the ...Natural creatures and ancient cultures are full of potential sources to provide inspiration for applied sciences.Inspired by the fractal geometry in nature and the fretwork frame in ancient culture,here we design the acoustic metasurface to realize sound anomalous modulation,which manifests itself as an incident-dependent propagation behavior:sound wave propagating in the forward direction is allowed to transmit with high efficiency while in the backward direction is obviously suppressed.We quantitatively investigate the dependences of asymmetric transmission on the propagation direction,incident angle and operating frequency by calculating sound transmittance and energy contrast.This compact fractal fretwork metasurface for acoustic anomalous modulation would promote the development of integrated acoustic devices and expand versatile applications in acoustic communication and information encryption.展开更多
Dear Editor,This letter focuses on the distributed optimal containment control of continuous-time multi-agent systems(CTMASs)with respect to the minimum-energy performance index over fixed topology.To achieve this,we ...Dear Editor,This letter focuses on the distributed optimal containment control of continuous-time multi-agent systems(CTMASs)with respect to the minimum-energy performance index over fixed topology.To achieve this,we firstly investigate the optimal containment control problem using the inverse optimal control method,where all states of followers asymptotically converge to the convex hull spanned by the leaders while some quadratic performance indexes get minimized.A sufficient condition for existence of the distributed optimal containment control protocol is derived.By introducing the parametric algebraic Riccati equation(PARE),it is strictly proved that the global performance index can be used to approximate the standard minimumenergy performance index as the parameters tends to infinity.In consequence,the standard minimum-energy cooperative containment control can be solved by local steady state feedback protocols.展开更多
In this paper,we formulate the precoding problem of integrated sensing and communication(ISAC)waveform as a non-convex quadratically constrained quadratic programming(QCQP),in which the weighted sum of communication m...In this paper,we formulate the precoding problem of integrated sensing and communication(ISAC)waveform as a non-convex quadratically constrained quadratic programming(QCQP),in which the weighted sum of communication multi-user interference(MUI)and the gap between dual-use waveform and ideal radar waveform is minimized with peak-toaverage power ratio(PAPR)constraints.We propose an efficient algorithm based on alternating direction method of multipliers(ADMM),which is able to decouple multiple variables and provide a closed-form solution for each subproblem.In addition,to improve the sensing performance in both spatial and temporal domains,we propose a new criteria to design the ideal radar waveform,in which the beam pattern is made similar to the ideal one and the integrated sidelobe level of the ambiguity function in each target direction is minimized in the region of interest.The limited memory Broyden-Fletcher-Goldfarb-Shanno(LBFGS)algorithm is applied to the design of the ideal radar waveform which works as a reference in the design of the dual-function waveform.Numerical results indicate that the designed dual-function waveform is capable of offering good communication quality of service(QoS)and sensing performance.展开更多
This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulati...This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulation(PAM4)systems.DA-M reduced the fluctuation by averaging the signal in blocks,RF-M estimated MPI by subtracting the decision value of the corresponding block from the mean value of a signal block,and then generated interference-reduced samples by subtracting the interference signal from the product of the corresponding MPI estimate and then weighting factor.This paper firstly proposed to separate the signal before decision-making into multiple blocks,which significantly reduced the complexity of DA-M and RF-M.Simulation results showed that the MPI noise of 28 GBaud IMDD system under the linewidths of 1e5 Hz,1e6 Hz and 10e6 Hz can be effectively alleviated.展开更多
Emission and capture characteristics of a deep hole trap(H1)in n-GaN Schottky barrier diodes(SBDs)have been investigated by optical deep level transient spectroscopy(ODLTS).Activation energy(Eemi)and capture cross-sec...Emission and capture characteristics of a deep hole trap(H1)in n-GaN Schottky barrier diodes(SBDs)have been investigated by optical deep level transient spectroscopy(ODLTS).Activation energy(Eemi)and capture cross-section(σ_(p))of H1 are determined to be 0.75 eV and 4.67×10^(−15)cm^(2),respectively.Distribution of apparent trap concentration in space charge region is demonstrated.Temperature-enhanced emission process is revealed by decrease of emission time constant.Electricfield-boosted trap emission kinetics are analyzed by the Poole−Frenkel emission(PFE)model.In addition,H1 shows point defect capture properties and temperature-enhanced capture kinetics.Taking both hole capture and emission processes into account during laser beam incidence,H1 features a trap concentration of 2.67×10^(15)cm^(−3).The method and obtained results may facilitate understanding of minority carrier trap properties in wide bandgap semiconductor material and can be applied for device reliability assessment.展开更多
This paper builds a binary tree for the target based on the bounding volume hierarchy technology,thereby achieving strict acceleration of the shadow judgment process and reducing the computational complexity from the ...This paper builds a binary tree for the target based on the bounding volume hierarchy technology,thereby achieving strict acceleration of the shadow judgment process and reducing the computational complexity from the original O(N^(3))to O(N^(2)logN).Numerical results show that the proposed method is more efficient than the traditional method.It is verified in multiple examples that the proposed method can complete the convergence of the current.Moreover,the proposed method avoids the error of judging the lit-shadow relationship based on the normal vector,which is beneficial to current iteration and convergence.Compared with the brute force method,the current method can improve the simulation efficiency by 2 orders of magnitude.The proposed method is more suitable for scattering problems in electrically large cavities and complex scenarios.展开更多
Disturbance observer-based control method has achieved good results in the carfollowing scenario of intelligent and connected vehicle(ICV).However,the gain of conventional extended disturbance observer(EDO)-based cont...Disturbance observer-based control method has achieved good results in the carfollowing scenario of intelligent and connected vehicle(ICV).However,the gain of conventional extended disturbance observer(EDO)-based control method is usually set manually rather than adjusted adaptively according to real time traffic conditions,thus declining the car-following performance.To solve this problem,a car-following strategy of ICV using EDO adjusted by reinforcement learning is proposed.Different from the conventional method,the gain of proposed strategy can be adjusted by reinforcement learning to improve its estimation accuracy.Since the“equivalent disturbance”can be compensated by EDO to a great extent,the disturbance rejection ability of the carfollowing method will be improved significantly.Both Lyapunov approach and numerical simulations are carried out to verify the effectiveness of the proposed method.展开更多
When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized environment.FL allows ...When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized environment.FL allows ML models to be trained on local devices without any need for centralized data transfer,thereby reducing both the exposure of sensitive data and the possibility of data interception by malicious third parties.This paradigm has gained momentum in the last few years,spurred by the plethora of real-world applications that have leveraged its ability to improve the efficiency of distributed learning and to accommodate numerous participants with their data sources.By virtue of FL,models can be learned from all such distributed data sources while preserving data privacy.The aim of this paper is to provide a practical tutorial on FL,including a short methodology and a systematic analysis of existing software frameworks.Furthermore,our tutorial provides exemplary cases of study from three complementary perspectives:i)Foundations of FL,describing the main components of FL,from key elements to FL categories;ii)Implementation guidelines and exemplary cases of study,by systematically examining the functionalities provided by existing software frameworks for FL deployment,devising a methodology to design a FL scenario,and providing exemplary cases of study with source code for different ML approaches;and iii)Trends,shortly reviewing a non-exhaustive list of research directions that are under active investigation in the current FL landscape.The ultimate purpose of this work is to establish itself as a referential work for researchers,developers,and data scientists willing to explore the capabilities of FL in practical applications.展开更多
AIM:To quantitatively assess the changes in mean vascular tortuosity(mVT)and mean vascular width(mVW)around the optic disc and their correlation with gestational age(GA)and birth weight(BW)in premature infants without...AIM:To quantitatively assess the changes in mean vascular tortuosity(mVT)and mean vascular width(mVW)around the optic disc and their correlation with gestational age(GA)and birth weight(BW)in premature infants without retinopathy of prematurity(ROP).METHODS:A single-center retrospective study included a total of 133(133 eyes)premature infants[mean corrected gestational age(CGA)43.6wk]without ROP as the premature group and 130(130 eyes)CGA-matched fullterm infants as the control group.The peripapillary mVT and mVW were quantitatively measured using computerassisted techniques.RESULTS:Premature infants had significantly higher mVT(P=0.0032)and lower mVW(P=0.0086)by 2.68(10^(4) cm^(-3))and 1.85μm,respectively.Subgroup analysis with GA showed significant differences(P=0.0244)in mVT between the early preterm and middle to late preterm groups,but the differences between mVW were not significant(P=0.6652).The results of the multiple linear regression model showed a significant negative correlation between GA and BW with mVT after adjusting sex and CGA(P=0.0211 and P=0.0006,respectively).For each day increase in GA at birth,mVT decreased by 0.1281(10^(4) cm^(-3))and for each 1 g increase in BW,mVT decreased by 0.006(10^(4) cm^(-3)).However,GA(P=0.9402)and BW(P=0.7275)were not significantly correlated with mVW.CONCLUSION:Preterm birth significantly affects the peripapillary vascular parameters that indicate higher mVT and narrower mVW in premature infants without ROP.Alterations in these parameters may provide new insights into the pathogenesis of ocular vascular disease.展开更多
Background Deep convolutional neural networks have garnered considerable attention in numerous machine learning applications,particularly in visual recognition tasks such as image and video analyses.There is a growing...Background Deep convolutional neural networks have garnered considerable attention in numerous machine learning applications,particularly in visual recognition tasks such as image and video analyses.There is a growing interest in applying this technology to diverse applications in medical image analysis.Automated three dimensional Breast Ultrasound is a vital tool for detecting breast cancer,and computer-assisted diagnosis software,developed based on deep learning,can effectively assist radiologists in diagnosis.However,the network model is prone to overfitting during training,owing to challenges such as insufficient training data.This study attempts to solve the problem caused by small datasets and improve model detection performance.Methods We propose a breast cancer detection framework based on deep learning(a transfer learning method based on cross-organ cancer detection)and a contrastive learning method based on breast imaging reporting and data systems(BI-RADS).Results When using cross organ transfer learning and BIRADS based contrastive learning,the average sensitivity of the model increased by a maximum of 16.05%.Conclusion Our experiments have demonstrated that the parameters and experiences of cross-organ cancer detection can be mutually referenced,and contrastive learning method based on BI-RADS can improve the detection performance of the model.展开更多
Nickel-manganese binary layered oxides with high working potential and low cost are potential candidates for sodium-ion batteries,but their electrochemical properties are highly related to compositional diversity.Dive...Nickel-manganese binary layered oxides with high working potential and low cost are potential candidates for sodium-ion batteries,but their electrochemical properties are highly related to compositional diversity.Diverse composite materials with various phase structures of P3,P2/P3,P2,P2/O3,and P2/P3/O3 were synthesized by manipulating the sodium content and calcination conditions,leading to the construction of a synthetic phase diagram for Na_(x)Ni_(0.25)Mn_(0.75)O_(2)(0.45≤x≤1.1).Then,we compared the electrochemical characteristics and structural evolution during the desodiation/sodiation process of P2,P2/P3,P2/03,and P2/P3/O3-Na_(x)Ni_(0.25)Mn_(0.75)O_(2).Among them,P2/P3-Na0.75Ni0.25Mn0.75O2exhibits the best rate capability of 90.9 mA h g^(-1)at 5 C,with an initial discharge capacity of 142.62 mA h g^(-1)at 0.1 C and a capacity retention rate of 78.25%after 100 cycles at 1 C in the voltage range of 2-4.3 V.The observed superior sodium storage performance of P2/P3 hybrids compared to other composite phases can be attributed to the enhanced Na^(+)transfer dynamic,reduction of the Jahn-teller effect,and improved reaction reversibility induced by the synergistic effect of P2 and P3 phases.The systematic research and exploration of phases in Na_(x)Ni_(0.25)Mn_(0.75)O_(2)provide new sights into high-performance nickel-manganese binary layered oxide for sodium-ion batteries.展开更多
Visual near-infrared imaging equipment has broad applications in various fields such as venipuncture,facial injections,and safety verification due to its noncontact,compact,and portable design.Currently,most studies u...Visual near-infrared imaging equipment has broad applications in various fields such as venipuncture,facial injections,and safety verification due to its noncontact,compact,and portable design.Currently,most studies utilize near-infrared single-wavelength for image acquisition of veins.However,many substances in the skin,including water,protein,and melanin can create significant background noise,which hinders accurate detection.In this paper,we developed a dual-wavelength imaging system with phase-locked denoising technology to acquire vein image.The signals in the effective region are compared by using the absorption valley and peak of hemoglobin at 700nm and 940nm,respectively.The phase-locked denoising algorithm is applied to decrease the noise and interference of complex surroundings from the images.The imaging results of the vein are successfully extracted in complex noise environment.It is demonstrated that the denoising effect on hand veins imaging can be improved with 57.3%by using our dual-wavelength phase-locked denoising technology.Consequently,this work proposes a novel approach for venous imaging with dual-wavelengths and phase-locked denoising algorithm to extract venous imaging results in complex noisy environment better.展开更多
Realtime trigger and localization of bursts are the key functions of GECAM,an all-sky gamma-ray monitor launched on 2020 December 10.We developed a multifunctional trigger and localization software operating in the CP...Realtime trigger and localization of bursts are the key functions of GECAM,an all-sky gamma-ray monitor launched on 2020 December 10.We developed a multifunctional trigger and localization software operating in the CPU of the GECAM Electronic Box.This onboard software has the following features:high trigger efficiency for real celestial bursts with a suppression of false triggers caused by charged particle bursts and background fluctuation,dedicated localization algorithm optimized for both short and long bursts,and low time latency of the trigger information which is downlinked through the Global Short Message Communication service of the global BeiDou navigation system.This paper provides a detailed description of the design and development of the trigger and localization software system for GECAM.It covers the general design,workflow,the main functions,and the algorithms used in the system.The paper also includes on-ground trigger tests using simulated gamma-ray bursts generated by a dedicated X-ray tube,as well as an overview of the performance for real celestial bursts during its in-orbit operation.展开更多
In this paper, both the high-complexity near-ML list decoding and the low-complexity belief propagation decoding are tested for some well-known regular and irregular LDPC codes. The complexity and performance trade-of...In this paper, both the high-complexity near-ML list decoding and the low-complexity belief propagation decoding are tested for some well-known regular and irregular LDPC codes. The complexity and performance trade-off is shown clearly and demonstrated with the paradigm of hybrid decoding. For regular LDPC code, the SNR-threshold performance and error-floor performance could be improved to the optimal level of ML decoding if the decoding complexity is progressively increased, usually corresponding to the near-ML decoding with progressively increased size of list. For irregular LDPC code, the SNR-threshold performance and error-floor performance could only be improved to a bottle-neck even with unlimited decoding complexity. However, with the technique of CRC-aided hybrid decoding, the ML performance could be greatly improved and approached with reasonable complexity thanks to the improved code-weight distribution from the concatenation of CRC and irregular LDPC code. Finally, CRC-aided 5GNR-LDPC code is evaluated and the capacity-approaching capability is shown.展开更多
This article takes the female community platform“Little Red Book”as an example to explore the optimization and innovation of mobile community e-commerce operation mode under Artificial Intelligence(AI)empowerment.Fi...This article takes the female community platform“Little Red Book”as an example to explore the optimization and innovation of mobile community e-commerce operation mode under Artificial Intelligence(AI)empowerment.Firstly,the relevant concepts were defined,and then the unique attributes of mobile community e-commerce were analyzed.As a typical representative of mobile community e-commerce,Little Red Book introduces the background and characteristics of its platform,analyzes its mobile community operation mode,and focuses on exploring how to establish a mobile community e-commerce platform and effective operation mode under the empowerment of AI technology,to provide some reference and inspiration for the development and operation of Little Red Book and other e-commerce platform enterprises.展开更多
基金2024 Education and Teaching Reform Research Project of Hainan Normal University(hsjg2024-04)。
文摘Introduction to Computer Science,as one of the fundamental courses in computer-related majors,plays an important role in the cultivation of computer professionals.However,traditional teaching models and content can no longer fully meet the needs of modern information technology development.In response to these issues,this article introduces the concept of computational creative thinking,optimizes course content,adopts exploratory teaching methods,and innovates course assessment methods,aiming to comprehensively enhance students’computational thinking and innovative abilities.By continuously improving and promoting this teaching model,it will undoubtedly promote computer education in universities to a new level.
文摘This paper discusses the innovative methods of school-enterprise cooperation education mode in computer applied talent training.An innovative training model based on school-enterprise cooperation is proposed to promote the cultivation of students’practical and innovative skills,so as to better adapt to the needs of society.By analyzing the key links and influencing factors of the training mode,this paper puts forward some concrete suggestions and measures to provide guidelines for universities and enterprises in personnel training.
基金supported by National Key R&D Program of China(2019YFB2102303)National Natural Science Foundation of China(NSFC61971014,NSFC11675199)Young Backbone Teacher Training Program of Henan Colleges and Universities(2021GGJS170).
文摘The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprint based on machine learning has attracted considerable attention because it can detect vulnerable devices in complex and heterogeneous access phases.However,flexible and diversified IoT devices with limited resources increase dif-ficulty of the device fingerprint authentication method executed in IoT,because it needs to retrain the model network to deal with incremental features or types.To address this problem,a device fingerprinting mechanism based on a Broad Learning System(BLS)is proposed in this paper.The mechanism firstly characterizes IoT devices by traffic analysis based on the identifiable differences of the traffic data of IoT devices,and extracts feature parameters of the traffic packets.A hierarchical hybrid sampling method is designed at the preprocessing phase to improve the imbalanced data distribution and reconstruct the fingerprint dataset.The complexity of the dataset is reduced using Principal Component Analysis(PCA)and the device type is identified by training weights using BLS.The experimental results show that the proposed method can achieve state-of-the-art accuracy and spend less training time than other existing methods.
基金supported by the National Natural Science Foundation of China(61971007&61571013).
文摘With the rapid advancement of social economies,intelligent transportation systems are gaining increasing atten-tion.Central to these systems is the detection of abnormal vehicle behavior,which remains a critical challenge due to the complexity of urban roadways and the variability of external conditions.Current research on detecting abnormal traffic behaviors is still nascent,with significant room for improvement in recognition accuracy.To address this,this research has developed a new model for recognizing abnormal traffic behaviors.This model employs the R3D network as its core architecture,incorporating a dense block to facilitate feature reuse.This approach not only enhances performance with fewer parameters and reduced computational demands but also allows for the acquisition of new features while simplifying the overall network structure.Additionally,this research integrates a self-attentive method that dynamically adjusts to the prevailing traffic conditions,optimizing the relevance of features for the task at hand.For temporal analysis,a Bi-LSTM layer is utilized to extract and learn from time-based data nuances.This research conducted a series of comparative experiments using the UCF-Crime dataset,achieving a notable accuracy of 89.30%on our test set.Our results demonstrate that our model not only operates with fewer parameters but also achieves superior recognition accuracy compared to previous models.
基金supported in part by the Natural Science Foundation of Henan Province(Grant No.202300410510)the Consulting Research Project of Chinese Academy of Engineering(Grant No.2020YNZH7)+3 种基金the Key Scientific Research Project of Colleges and Universities in Henan Province(Grant Nos.23A520043 and 23B520010)the International Science and Technology Cooperation Project of Henan Province(Grant No.232102521004)the National Key Research and Development Program of China(Grant No.2020YFB1005404)the Henan Provincial Science and Technology Research Project(Grant No.212102210100).
文摘The rapid evolution of artificial intelligence(AI)technologies has significantly propelled the advancement of the Internet of Vehicles(IoV).With AI support,represented by machine learning technology,vehicles gain the capability to make intelligent decisions.As a distributed learning paradigm,federated learning(FL)has emerged as a preferred solution in IoV.Compared to traditional centralized machine learning,FL reduces communication overhead and improves privacy protection.Despite these benefits,FL still faces some security and privacy concerns,such as poisoning attacks and inference attacks,prompting exploration into blockchain integration to enhance its security posture.This paper introduces a novel blockchain-enabled federated learning(BCFL)scheme with differential privacy(DP)tailored for IoV.In order to meet the performance demanding IoV environment,the proposed methodology integrates a consortium blockchain with Practical Byzantine Fault Tolerance(PBFT)consensus,which offers superior efficiency over the conventional public blockchains.In addition,the proposed approach utilizes the Differentially Private Stochastic Gradient Descent(DP-SGD)algorithm in the local training process of FL for enhanced privacy protection.Experiment results indicate that the integration of blockchain elevates the security level of FL in that the proposed approach effectively safeguards FL against poisoning attacks.On the other hand,the additional overhead associated with blockchain integration is also limited to a moderate level to meet the efficiency criteria of IoV.Furthermore,by incorporating DP,the proposed approach is shown to have the(ε-δ)privacy guarantee while maintaining an acceptable level of model accuracy.This enhancement effectively mitigates the threat of inference attacks on private information.
基金Project supported by the National Key Research and Development Program of China(Grant No.2022YFA1404500)the National Natural Science Foundation of China(Grant Nos.T2222024 and 12034005)the STCSM Science and Technology Innovation Plan of Shanghai Science and Technology Commission(Grant Nos.20ZR1404200 and 21JC1400300)。
文摘Natural creatures and ancient cultures are full of potential sources to provide inspiration for applied sciences.Inspired by the fractal geometry in nature and the fretwork frame in ancient culture,here we design the acoustic metasurface to realize sound anomalous modulation,which manifests itself as an incident-dependent propagation behavior:sound wave propagating in the forward direction is allowed to transmit with high efficiency while in the backward direction is obviously suppressed.We quantitatively investigate the dependences of asymmetric transmission on the propagation direction,incident angle and operating frequency by calculating sound transmittance and energy contrast.This compact fractal fretwork metasurface for acoustic anomalous modulation would promote the development of integrated acoustic devices and expand versatile applications in acoustic communication and information encryption.
基金supported by the National Nat-ural Science Foundation of China(61873215,62103342)the Natural Science Foundation of Sichuan Province(2022NSFSC0470,2022NSFSC0892).
文摘Dear Editor,This letter focuses on the distributed optimal containment control of continuous-time multi-agent systems(CTMASs)with respect to the minimum-energy performance index over fixed topology.To achieve this,we firstly investigate the optimal containment control problem using the inverse optimal control method,where all states of followers asymptotically converge to the convex hull spanned by the leaders while some quadratic performance indexes get minimized.A sufficient condition for existence of the distributed optimal containment control protocol is derived.By introducing the parametric algebraic Riccati equation(PARE),it is strictly proved that the global performance index can be used to approximate the standard minimumenergy performance index as the parameters tends to infinity.In consequence,the standard minimum-energy cooperative containment control can be solved by local steady state feedback protocols.
基金supported in part by the National Natural Science Foundation of China under Grant 62271142in part by the Key Research and Development Program of Jiangsu Province BE2023021+2 种基金in part by the Jiangsu Key Research and Development Program Project under Grant BE2023011-2in part by the Young Scholar Funding of Southeast Universityin part by the Fundamental Research Funds for the Central Universities 2242022k60001。
文摘In this paper,we formulate the precoding problem of integrated sensing and communication(ISAC)waveform as a non-convex quadratically constrained quadratic programming(QCQP),in which the weighted sum of communication multi-user interference(MUI)and the gap between dual-use waveform and ideal radar waveform is minimized with peak-toaverage power ratio(PAPR)constraints.We propose an efficient algorithm based on alternating direction method of multipliers(ADMM),which is able to decouple multiple variables and provide a closed-form solution for each subproblem.In addition,to improve the sensing performance in both spatial and temporal domains,we propose a new criteria to design the ideal radar waveform,in which the beam pattern is made similar to the ideal one and the integrated sidelobe level of the ambiguity function in each target direction is minimized in the region of interest.The limited memory Broyden-Fletcher-Goldfarb-Shanno(LBFGS)algorithm is applied to the design of the ideal radar waveform which works as a reference in the design of the dual-function waveform.Numerical results indicate that the designed dual-function waveform is capable of offering good communication quality of service(QoS)and sensing performance.
基金supported by the National Key Research and Development Program of China 2021YFB2900801the Young Elite Scientists Sponsorship Program of CIC 2021QNRC001+1 种基金National Natural Science Foundation of China NSFC,62201033,U22A2005the Foundation of the Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services.
文摘This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulation(PAM4)systems.DA-M reduced the fluctuation by averaging the signal in blocks,RF-M estimated MPI by subtracting the decision value of the corresponding block from the mean value of a signal block,and then generated interference-reduced samples by subtracting the interference signal from the product of the corresponding MPI estimate and then weighting factor.This paper firstly proposed to separate the signal before decision-making into multiple blocks,which significantly reduced the complexity of DA-M and RF-M.Simulation results showed that the MPI noise of 28 GBaud IMDD system under the linewidths of 1e5 Hz,1e6 Hz and 10e6 Hz can be effectively alleviated.
基金supported by ShanghaiTech University Startup Fund 2017F0203-000-14the National Natural Science Foundation of China(Grant No.52131303)+1 种基金Natural Science Foundation of Shanghai(Grant No.22ZR1442300)in part by CAS Strategic Science and Technology Program(Grant No.XDA18000000).
文摘Emission and capture characteristics of a deep hole trap(H1)in n-GaN Schottky barrier diodes(SBDs)have been investigated by optical deep level transient spectroscopy(ODLTS).Activation energy(Eemi)and capture cross-section(σ_(p))of H1 are determined to be 0.75 eV and 4.67×10^(−15)cm^(2),respectively.Distribution of apparent trap concentration in space charge region is demonstrated.Temperature-enhanced emission process is revealed by decrease of emission time constant.Electricfield-boosted trap emission kinetics are analyzed by the Poole−Frenkel emission(PFE)model.In addition,H1 shows point defect capture properties and temperature-enhanced capture kinetics.Taking both hole capture and emission processes into account during laser beam incidence,H1 features a trap concentration of 2.67×10^(15)cm^(−3).The method and obtained results may facilitate understanding of minority carrier trap properties in wide bandgap semiconductor material and can be applied for device reliability assessment.
基金the National Natural Science Foundation of China under Grants No.62231021 and No.92373201.
文摘This paper builds a binary tree for the target based on the bounding volume hierarchy technology,thereby achieving strict acceleration of the shadow judgment process and reducing the computational complexity from the original O(N^(3))to O(N^(2)logN).Numerical results show that the proposed method is more efficient than the traditional method.It is verified in multiple examples that the proposed method can complete the convergence of the current.Moreover,the proposed method avoids the error of judging the lit-shadow relationship based on the normal vector,which is beneficial to current iteration and convergence.Compared with the brute force method,the current method can improve the simulation efficiency by 2 orders of magnitude.The proposed method is more suitable for scattering problems in electrically large cavities and complex scenarios.
基金State Key Laboratory of Automotive Safety and Energy,Grant/Award Number:KFY2208National Natural Science Foundation of China,Grant/Award Numbers:U2013601,U20A20225+1 种基金Key Research and Development Plan of Anhui Province,Grant/Award Number:202004a05020058the Natural Science Foundation of Hefei,China(Grant No.2021032)。
文摘Disturbance observer-based control method has achieved good results in the carfollowing scenario of intelligent and connected vehicle(ICV).However,the gain of conventional extended disturbance observer(EDO)-based control method is usually set manually rather than adjusted adaptively according to real time traffic conditions,thus declining the car-following performance.To solve this problem,a car-following strategy of ICV using EDO adjusted by reinforcement learning is proposed.Different from the conventional method,the gain of proposed strategy can be adjusted by reinforcement learning to improve its estimation accuracy.Since the“equivalent disturbance”can be compensated by EDO to a great extent,the disturbance rejection ability of the carfollowing method will be improved significantly.Both Lyapunov approach and numerical simulations are carried out to verify the effectiveness of the proposed method.
基金the R&D&I,Spain grants PID2020-119478GB-I00 and,PID2020-115832GB-I00 funded by MCIN/AEI/10.13039/501100011033.N.Rodríguez-Barroso was supported by the grant FPU18/04475 funded by MCIN/AEI/10.13039/501100011033 and by“ESF Investing in your future”Spain.J.Moyano was supported by a postdoctoral Juan de la Cierva Formación grant FJC2020-043823-I funded by MCIN/AEI/10.13039/501100011033 and by European Union NextGenerationEU/PRTR.J.Del Ser acknowledges funding support from the Spanish Centro para el Desarrollo Tecnológico Industrial(CDTI)through the AI4ES projectthe Department of Education of the Basque Government(consolidated research group MATHMODE,IT1456-22)。
文摘When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized environment.FL allows ML models to be trained on local devices without any need for centralized data transfer,thereby reducing both the exposure of sensitive data and the possibility of data interception by malicious third parties.This paradigm has gained momentum in the last few years,spurred by the plethora of real-world applications that have leveraged its ability to improve the efficiency of distributed learning and to accommodate numerous participants with their data sources.By virtue of FL,models can be learned from all such distributed data sources while preserving data privacy.The aim of this paper is to provide a practical tutorial on FL,including a short methodology and a systematic analysis of existing software frameworks.Furthermore,our tutorial provides exemplary cases of study from three complementary perspectives:i)Foundations of FL,describing the main components of FL,from key elements to FL categories;ii)Implementation guidelines and exemplary cases of study,by systematically examining the functionalities provided by existing software frameworks for FL deployment,devising a methodology to design a FL scenario,and providing exemplary cases of study with source code for different ML approaches;and iii)Trends,shortly reviewing a non-exhaustive list of research directions that are under active investigation in the current FL landscape.The ultimate purpose of this work is to establish itself as a referential work for researchers,developers,and data scientists willing to explore the capabilities of FL in practical applications.
基金Supported by the Fundamental Research Funds for the Central Universities (No.WK2100000045)the National Natural Science Foundation of China (No.U19B2044)+1 种基金Hefei Health Care Commission 2022 Applied Medical Research Project (No.Hwk2022yb028)Zhejiang Lab Open Research Project (No.K2022QA0AB04).
文摘AIM:To quantitatively assess the changes in mean vascular tortuosity(mVT)and mean vascular width(mVW)around the optic disc and their correlation with gestational age(GA)and birth weight(BW)in premature infants without retinopathy of prematurity(ROP).METHODS:A single-center retrospective study included a total of 133(133 eyes)premature infants[mean corrected gestational age(CGA)43.6wk]without ROP as the premature group and 130(130 eyes)CGA-matched fullterm infants as the control group.The peripapillary mVT and mVW were quantitatively measured using computerassisted techniques.RESULTS:Premature infants had significantly higher mVT(P=0.0032)and lower mVW(P=0.0086)by 2.68(10^(4) cm^(-3))and 1.85μm,respectively.Subgroup analysis with GA showed significant differences(P=0.0244)in mVT between the early preterm and middle to late preterm groups,but the differences between mVW were not significant(P=0.6652).The results of the multiple linear regression model showed a significant negative correlation between GA and BW with mVT after adjusting sex and CGA(P=0.0211 and P=0.0006,respectively).For each day increase in GA at birth,mVT decreased by 0.1281(10^(4) cm^(-3))and for each 1 g increase in BW,mVT decreased by 0.006(10^(4) cm^(-3)).However,GA(P=0.9402)and BW(P=0.7275)were not significantly correlated with mVW.CONCLUSION:Preterm birth significantly affects the peripapillary vascular parameters that indicate higher mVT and narrower mVW in premature infants without ROP.Alterations in these parameters may provide new insights into the pathogenesis of ocular vascular disease.
基金Macao Polytechnic University Grant(RP/FCSD-01/2022RP/FCA-05/2022)Science and Technology Development Fund of Macao(0105/2022/A).
文摘Background Deep convolutional neural networks have garnered considerable attention in numerous machine learning applications,particularly in visual recognition tasks such as image and video analyses.There is a growing interest in applying this technology to diverse applications in medical image analysis.Automated three dimensional Breast Ultrasound is a vital tool for detecting breast cancer,and computer-assisted diagnosis software,developed based on deep learning,can effectively assist radiologists in diagnosis.However,the network model is prone to overfitting during training,owing to challenges such as insufficient training data.This study attempts to solve the problem caused by small datasets and improve model detection performance.Methods We propose a breast cancer detection framework based on deep learning(a transfer learning method based on cross-organ cancer detection)and a contrastive learning method based on breast imaging reporting and data systems(BI-RADS).Results When using cross organ transfer learning and BIRADS based contrastive learning,the average sensitivity of the model increased by a maximum of 16.05%.Conclusion Our experiments have demonstrated that the parameters and experiences of cross-organ cancer detection can be mutually referenced,and contrastive learning method based on BI-RADS can improve the detection performance of the model.
基金supported by project from the National Natural Science Foundation of China(21805018)by the Sichuan Science and Technology Program(2022ZHCG0018,2023NSFSC0117,2023ZHCG0060)+1 种基金the Yibin Science and Technology Program(2022JB005)project funded by the China Postdoctoral Science Foundation(2022M722704)。
文摘Nickel-manganese binary layered oxides with high working potential and low cost are potential candidates for sodium-ion batteries,but their electrochemical properties are highly related to compositional diversity.Diverse composite materials with various phase structures of P3,P2/P3,P2,P2/O3,and P2/P3/O3 were synthesized by manipulating the sodium content and calcination conditions,leading to the construction of a synthetic phase diagram for Na_(x)Ni_(0.25)Mn_(0.75)O_(2)(0.45≤x≤1.1).Then,we compared the electrochemical characteristics and structural evolution during the desodiation/sodiation process of P2,P2/P3,P2/03,and P2/P3/O3-Na_(x)Ni_(0.25)Mn_(0.75)O_(2).Among them,P2/P3-Na0.75Ni0.25Mn0.75O2exhibits the best rate capability of 90.9 mA h g^(-1)at 5 C,with an initial discharge capacity of 142.62 mA h g^(-1)at 0.1 C and a capacity retention rate of 78.25%after 100 cycles at 1 C in the voltage range of 2-4.3 V.The observed superior sodium storage performance of P2/P3 hybrids compared to other composite phases can be attributed to the enhanced Na^(+)transfer dynamic,reduction of the Jahn-teller effect,and improved reaction reversibility induced by the synergistic effect of P2 and P3 phases.The systematic research and exploration of phases in Na_(x)Ni_(0.25)Mn_(0.75)O_(2)provide new sights into high-performance nickel-manganese binary layered oxide for sodium-ion batteries.
基金funded by National Key R&D Pro-gram of China(2021YFC2103300)National Key R&D Program of China(2021YFA0715500)+2 种基金National Natural Science Foundation of China(NSFC)(12227901)Strategic Priority Research Program(B)of the Chinese Academy of Sciences(XDB0580000)Chinese Academy of Sciences President's International Fellowship Initiative(2021PT0007).
文摘Visual near-infrared imaging equipment has broad applications in various fields such as venipuncture,facial injections,and safety verification due to its noncontact,compact,and portable design.Currently,most studies utilize near-infrared single-wavelength for image acquisition of veins.However,many substances in the skin,including water,protein,and melanin can create significant background noise,which hinders accurate detection.In this paper,we developed a dual-wavelength imaging system with phase-locked denoising technology to acquire vein image.The signals in the effective region are compared by using the absorption valley and peak of hemoglobin at 700nm and 940nm,respectively.The phase-locked denoising algorithm is applied to decrease the noise and interference of complex surroundings from the images.The imaging results of the vein are successfully extracted in complex noise environment.It is demonstrated that the denoising effect on hand veins imaging can be improved with 57.3%by using our dual-wavelength phase-locked denoising technology.Consequently,this work proposes a novel approach for venous imaging with dual-wavelengths and phase-locked denoising algorithm to extract venous imaging results in complex noisy environment better.
基金supported by the Strategic Priority Research Program on Space Science of the Chinese Academy of Sciences,the support from the Strategic Priority Research Program on Space Science(grant Nos.XDA15360300,XDA15360000,XDA15360102,XDA15052700 and E02212A02S)of the Chinese Academy of Sciencesthe National Natural Science Foundation of China(NSFC,Grant No.12173038)and BeiDou navigation system。
文摘Realtime trigger and localization of bursts are the key functions of GECAM,an all-sky gamma-ray monitor launched on 2020 December 10.We developed a multifunctional trigger and localization software operating in the CPU of the GECAM Electronic Box.This onboard software has the following features:high trigger efficiency for real celestial bursts with a suppression of false triggers caused by charged particle bursts and background fluctuation,dedicated localization algorithm optimized for both short and long bursts,and low time latency of the trigger information which is downlinked through the Global Short Message Communication service of the global BeiDou navigation system.This paper provides a detailed description of the design and development of the trigger and localization software system for GECAM.It covers the general design,workflow,the main functions,and the algorithms used in the system.The paper also includes on-ground trigger tests using simulated gamma-ray bursts generated by a dedicated X-ray tube,as well as an overview of the performance for real celestial bursts during its in-orbit operation.
文摘In this paper, both the high-complexity near-ML list decoding and the low-complexity belief propagation decoding are tested for some well-known regular and irregular LDPC codes. The complexity and performance trade-off is shown clearly and demonstrated with the paradigm of hybrid decoding. For regular LDPC code, the SNR-threshold performance and error-floor performance could be improved to the optimal level of ML decoding if the decoding complexity is progressively increased, usually corresponding to the near-ML decoding with progressively increased size of list. For irregular LDPC code, the SNR-threshold performance and error-floor performance could only be improved to a bottle-neck even with unlimited decoding complexity. However, with the technique of CRC-aided hybrid decoding, the ML performance could be greatly improved and approached with reasonable complexity thanks to the improved code-weight distribution from the concatenation of CRC and irregular LDPC code. Finally, CRC-aided 5GNR-LDPC code is evaluated and the capacity-approaching capability is shown.
基金Phased Research Key Project of Shanghai China Vocational Education Association“Research on Digital Transformation Path of Vocational Education Driven by AIGC from the Perspective of New Quality Productivity”,Phased Research Project of Shanghai Computer Industry Association“The Reform and Exploration of Cross-border E-commerce Talent Cultivation in Vocational Colleges from the Perspective of Industry Education Integration”(Project No.sctakt202404)。
文摘This article takes the female community platform“Little Red Book”as an example to explore the optimization and innovation of mobile community e-commerce operation mode under Artificial Intelligence(AI)empowerment.Firstly,the relevant concepts were defined,and then the unique attributes of mobile community e-commerce were analyzed.As a typical representative of mobile community e-commerce,Little Red Book introduces the background and characteristics of its platform,analyzes its mobile community operation mode,and focuses on exploring how to establish a mobile community e-commerce platform and effective operation mode under the empowerment of AI technology,to provide some reference and inspiration for the development and operation of Little Red Book and other e-commerce platform enterprises.