This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designe...This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information.展开更多
α-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating was prepared withα-Fe_(2)O_(3) nanoparticles and epoxy resin by spin coating method.The coating without epoxy resin has higher contact angle(CA)and lower ...α-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating was prepared withα-Fe_(2)O_(3) nanoparticles and epoxy resin by spin coating method.The coating without epoxy resin has higher contact angle(CA)and lower ice adhesion strength(IAS),but the mechanical properties are poor.Theα-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating exhibits good mechanical durability.In addition,compared with the bare aluminum substrate,the Ecorr of the composite coating is positive and the Jcorr is lower.The inhibition efficiency of the composite coating is as high as 99.98%in 3.5 wt%NaCl solution.The difference in the microstructure caused by the two preparation methods leads to the changes in mechanical properties and corrosion resistance of composite superhydrophobic coating.展开更多
Crude oil scheduling optimization is an effective method to enhance the economic benefits of oil refining.But uncertainties,including uncertain demands of crude distillation units(CDUs),might make the production plans...Crude oil scheduling optimization is an effective method to enhance the economic benefits of oil refining.But uncertainties,including uncertain demands of crude distillation units(CDUs),might make the production plans made by the traditional deterministic optimization models infeasible.A data-driven Wasserstein distributionally robust chance-constrained(WDRCC)optimization approach is proposed in this paper to deal with demand uncertainty in crude oil scheduling.First,a new deterministic crude oil scheduling optimization model is developed as the basis of this approach.The Wasserstein distance is then used to build ambiguity sets from historical data to describe the possible realizations of probability distributions of uncertain demands.A cross-validation method is advanced to choose suitable radii for these ambiguity sets.The deterministic model is reformulated as a WDRCC optimization model for crude oil scheduling to guarantee the demand constraints hold with a desired high probability even in the worst situation in ambiguity sets.The proposed WDRCC model is transferred into an equivalent conditional value-at-risk representation and further derived as a mixed-integer nonlinear programming counterpart.Industrial case studies from a real-world refinery are conducted to show the effectiveness of the proposed method.Out-of-sample tests demonstrate that the solution of the WDRCC model is more robust than those of the deterministic model and the chance-constrained model.展开更多
Silicon-based materials have demonstrated remarkable potential in high-energy-density batteries owing to their high theoretical capacity.However,the significant volume expansion of silicon seriously hinders its utiliz...Silicon-based materials have demonstrated remarkable potential in high-energy-density batteries owing to their high theoretical capacity.However,the significant volume expansion of silicon seriously hinders its utilization as a lithium-ion anode.Herein,a functionalized high-toughness polyimide(PDMI) is synthesized by copolymerizing the 4,4'-Oxydiphthalic anhydride(ODPA) with 4,4'-oxydianiline(ODA),2,3-diaminobenzoic acid(DABA),and 1,3-bis(3-aminopropyl)-tetramethyl disiloxane(DMS).The combination of rigid benzene rings and flexible oxygen groups(-O-) in the PDMI molecular chain via a rigidness/softness coupling mechanism contributes to high toughness.The plentiful polar carboxyl(-COOH) groups establish robust bonding strength.Rapid ionic transport is achieved by incorporating the flexible siloxane segment(Si-O-Si),which imparts high molecular chain motility and augments free volume holes to facilitate lithium-ion transport(9.8 × 10^(-10) cm^(2) s^(-1) vs.16 × 10^(-10) cm^(2) s~(-1)).As expected,the SiO_x@PDMI-1.5 electrode delivers brilliant long-term cycle performance with a remarkable capacity retention of 85% over 500 cycles at 1.3 A g^(-1).The well-designed functionalized polyimide also significantly enhances the electrochemical properties of Si nanoparticles electrode.Meanwhile,the assembled SiO_x@PDMI-1.5/NCM811 full cell delivers a high retention of 80% after 100 cycles.The perspective of the binder design strategy based on polyimide modification delivers a novel path toward high-capacity electrodes for high-energy-density batteries.展开更多
Since backlash nonlinearity is inevitably existing in actuators for bidirectional stabilization system of allelectric tank,it behaves more drastically in high maneuvering environments.In this work,the accurate trackin...Since backlash nonlinearity is inevitably existing in actuators for bidirectional stabilization system of allelectric tank,it behaves more drastically in high maneuvering environments.In this work,the accurate tracking control for bidirectional stabilization system of moving all-electric tank with actuator backlash and unmodeled disturbance is solved.By utilizing the smooth adaptive backlash inverse model,a nonlinear robust adaptive feedback control scheme is presented.The unknown parameters and unmodelled disturbance are addressed separately through the derived parametric adaptive function and the continuous nonlinear robust term.Because the unknown backlash parameters are updated via adaptive function and the backlash effect can be suppressed successfully by inverse operation,which ensures the system stability.Meanwhile,the system disturbance in the high maneuverable environment can be estimated with the constructed adaptive law online improving the engineering practicality.Finally,Lyapunov-based analysis proves that the developed controller can ensure the tracking error asymptotically converges to zero even with unmodeled disturbance and unknown actuator backlash.Contrast co-simulations and experiments illustrate the advantages of the proposed approach.展开更多
Optical mode converters are essential for enhancing the capacity of optical communication systems. However, fabrication errors restrict the further improvement of conventional mode converters. To address this challeng...Optical mode converters are essential for enhancing the capacity of optical communication systems. However, fabrication errors restrict the further improvement of conventional mode converters. To address this challenge, we have designed an on-chip TE0–TE1mode converter based on topologically protected waveguide arrays. The simulation results demonstrate that the converter exhibits a mode coupling efficiency of 93.5% near 1550 nm and can tolerate a relative fabrication error of 30%. Our design approach can be extended to enhance the robustness for other integrated photonic devices, beneficial for future development of optical network systems.展开更多
Acoustic emission(AE)localization algorithms based on homogeneous media or single-velocity are less accurate when applied to the triaxial localization experiments.To the end,a robust triaxial localization method of AE...Acoustic emission(AE)localization algorithms based on homogeneous media or single-velocity are less accurate when applied to the triaxial localization experiments.To the end,a robust triaxial localization method of AE source using refraction path is proposed.Firstly,the control equation of the refraction path is established according to the sensor coordinates and arrival times.Secondly,considering the influence of time-difference-of-arrival(TDOA)errors,the residual of the governing equation is calculated to estimate the equation weight.Thirdly,the refraction points in different directions are solved using Snell’s law and orthogonal constraints.Finally,the source coordinates are iteratively solved by weighted correction terms.The feasibility and accuracy of the proposed method are verified by pencil-lead breaking experiments.The simulation results show that the new method is almost unaffected by the refraction ratio,and always holds more stable and accurate positioning performance than the traditional method under different ratios and scales of TDOA outliers.展开更多
Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robus...Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the algorithms.In practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret image.An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms.In this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet transform.The wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding network.During the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret image.These lowresolution secret images are combined using densemodules to obtain a high-quality secret image.The experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various attacks.The proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical applications.In conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing algorithms.Its ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various applications.Further research and experimentation can explore the algorithm’s performance under different scenarios and expand its potential applications.展开更多
Integrated energy systems(IESs)can improve energy efficiency and reduce carbon emissions,essential for achieving peak carbon emissions and carbon neutrality.This study investigated the characteristics of the CHP model...Integrated energy systems(IESs)can improve energy efficiency and reduce carbon emissions,essential for achieving peak carbon emissions and carbon neutrality.This study investigated the characteristics of the CHP model considering P2G and carbon capture systems,and a two-stage robust optimization model of the electricity-heat-gascold integrated energy system was developed.First,a CHP model considering the P2G and carbon capture system was established,and the electric-thermal coupling characteristics and P2G capacity constraints of the model were derived,which proved that the model could weaken the electric-thermal coupling characteristics,increase the electric power regulation range,and reduce carbon emissions.Subsequently,a two-stage robust optimal scheduling model of an IES was constructed,in which the objective function in the day-ahead scheduling stage was to minimize the start-up and shutdown costs.The objective function in the real-time scheduling stage was to minimize the equipment operating costs,carbon emission costs,wind curtailment,and solar curtailment costs,considering multiple uncertainties.Finally,after the objective function is linearized with a ψ-piecewise method,the model is solved based on the C&CG algorithm.Simulation results show that the proposed model can effectively absorb renewable energy and reduce the total cost of the system.展开更多
With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and int...With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and intelligence.However,tree ensemble models commonly used in smart grids are vulnerable to adversarial attacks,making it urgent to enhance their robustness.To address this,we propose a robustness enhancement method that incorporates physical constraints into the node-splitting decisions of tree ensembles.Our algorithm improves robustness by developing a dataset of adversarial examples that comply with physical laws,ensuring training data accurately reflects possible attack scenarios while adhering to physical rules.In our experiments,the proposed method increased robustness against adversarial attacks by 100%when applied to real grid data under physical constraints.These results highlight the advantages of our method in maintaining efficient and secure operation of smart grids under adversarial conditions.展开更多
(Multichannel)Singular spectrum analysis is considered as one of the most effective methods for seismic incoherent noise suppression.It utilizes the low-rank feature of seismic signal and regards the noise suppression...(Multichannel)Singular spectrum analysis is considered as one of the most effective methods for seismic incoherent noise suppression.It utilizes the low-rank feature of seismic signal and regards the noise suppression as a low-rank reconstruction problem.However,in some cases the seismic geophones receive some erratic disturbances and the amplitudes are dramatically larger than other receivers.The presence of this kind of noise,called erratic noise,makes singular spectrum analysis(SSA)reconstruction unstable and has undesirable effects on the final results.We robustify the low-rank reconstruction of seismic data by a reweighted damped SSA(RD-SSA)method.It incorporates the damped SSA,an improved version of SSA,into a reweighted framework.The damping operator is used to weaken the artificial disturbance introduced by the low-rank projection of both erratic and random noise.The central idea of the RD-SSA method is to iteratively approximate the observed data with the quadratic norm for the first iteration and the Tukeys bisquare norm for the rest iterations.The RD-SSA method can suppress seismic incoherent noise and keep the reconstruction process robust to the erratic disturbance.The feasibility of RD-SSA is validated via both synthetic and field data examples.展开更多
Traditional information hiding techniques achieve information hiding by modifying carrier data,which can easily leave detectable traces that may be detected by steganalysis tools.Especially in image transmission,both ...Traditional information hiding techniques achieve information hiding by modifying carrier data,which can easily leave detectable traces that may be detected by steganalysis tools.Especially in image transmission,both geometric and non-geometric attacks can cause subtle changes in the pixels of the image during transmission.To overcome these challenges,we propose a constructive robust image steganography technique based on style transformation.Unlike traditional steganography,our algorithm does not involve any direct modifications to the carrier data.In this study,we constructed a mapping dictionary by setting the correspondence between binary codes and image categories and then used the mapping dictionary to map secret information to secret images.Through image semantic segmentation and style transfer techniques,we combined the style of secret images with the content of public images to generate stego images.This type of stego image can resist interference during public channel transmission,ensuring the secure transmission of information.At the receiving end,we input the stego image into a trained secret image reconstruction network,which can effectively reconstruct the original secret image and further recover the secret information through a mapping dictionary to ensure the security,accuracy,and efficient decoding of the information.The experimental results show that this constructive information hiding method based on style transfer improves the security of information hiding,enhances the robustness of the algorithm to various attacks,and ensures information security.展开更多
As neural radiance fields continue to advance in 3D content representation,the copyright issues surrounding 3D models oriented towards implicit representation become increasingly pressing.In response to this challenge...As neural radiance fields continue to advance in 3D content representation,the copyright issues surrounding 3D models oriented towards implicit representation become increasingly pressing.In response to this challenge,this paper treats the embedding and extraction of neural radiance field watermarks as inverse problems of image transformations and proposes a scheme for protecting neural radiance field copyrights using invertible neural network watermarking.Leveraging 2D image watermarking technology for 3D scene protection,the scheme embeds watermarks within the training images of neural radiance fields through the forward process in invertible neural networks and extracts them from images rendered by neural radiance fields through the reverse process,thereby ensuring copyright protection for both the neural radiance fields and associated 3D scenes.However,challenges such as information loss during rendering processes and deliberate tampering necessitate the design of an image quality enhancement module to increase the scheme’s robustness.This module restores distorted images through neural network processing before watermark extraction.Additionally,embedding watermarks in each training image enables watermark information extraction from multiple viewpoints.Our proposed watermarking method achieves a PSNR(Peak Signal-to-Noise Ratio)value exceeding 37 dB for images containing watermarks and 22 dB for recovered watermarked images,as evaluated on the Lego,Hotdog,and Chair datasets,respectively.These results demonstrate the efficacy of our scheme in enhancing copyright protection.展开更多
Utilizing machine learning techniques for data-driven diagnosis of high temperature PEM fuel cells is beneficial and meaningful to the system durability. Nevertheless, ensuring the robustness of diagnosis remains a cr...Utilizing machine learning techniques for data-driven diagnosis of high temperature PEM fuel cells is beneficial and meaningful to the system durability. Nevertheless, ensuring the robustness of diagnosis remains a critical and challenging task in real application. To enhance the robustness of diagnosis and achieve a more thorough evaluation of diagnostic performance, a robust diagnostic procedure based on electrochemical impedance spectroscopy (EIS) and a new method for evaluation of the diagnosis robustness was proposed and investigated in this work. To improve the diagnosis robustness: (1) the degradation mechanism of different faults in the high temperature PEM fuel cell was first analyzed via the distribution of relaxation time of EIS to determine the equivalent circuit model (ECM) with better interpretability, simplicity and accuracy;(2) the feature extraction was implemented on the identified parameters of the ECM and extra attention was paid to distinguishing between the long-term normal degradation and other faults;(3) a Siamese Network was adopted to get features with higher robustness in a new embedding. The diagnosis was conducted using 6 classic classification algorithms—support vector machine (SVM), K-nearest neighbor (KNN), logistic regression (LR), decision tree (DT), random forest (RF), and Naive Bayes employing a dataset comprising a total of 1935 collected EIS. To evaluate the robustness of trained models: (1) different levels of errors were added to the features for performance evaluation;(2) a robustness coefficient (Roubust_C) was defined for a quantified and explicit evaluation of the diagnosis robustness. The diagnostic models employing the proposed feature extraction method can not only achieve the higher performance of around 100% but also higher robustness for diagnosis models. Despite the initial performance being similar, the KNN demonstrated a superior robustness after feature selection and re-embedding by triplet-loss method, which suggests the necessity of robustness evaluation for the machine learning models and the effectiveness of the defined robustness coefficient. This work hopes to give new insights to the robust diagnosis of high temperature PEM fuel cells and more comprehensive performance evaluation of the data-driven method for diagnostic application.展开更多
A tracking stability control problem for the vertical electric stabilization system of moving tank based on adaptive robust servo control is addressed.This paper mainly focuses on two types of possibly fast timevaryin...A tracking stability control problem for the vertical electric stabilization system of moving tank based on adaptive robust servo control is addressed.This paper mainly focuses on two types of possibly fast timevarying but bounded uncertainty within the vertical electric stabilization system:model parameter uncertainty and uncertain nonlinearity.First,the vertical electric stabilization system is constructed as an uncertain nonlinear dynamic system that can reflect the practical mechanics transfer process of the system.Second,the dynamical equation in the form of state space is established by designing the angular tracking error.Third,the comprehensive parameter of system uncertainty is designed to estimate the most conservative effects of uncertainty.Finally,an adaptive robust servo control which can effectively handle the combined effects of complex nonlinearity and uncertainty is proposed.The feasibility of the proposed control strategy under the practical physical condition is validated through the tests on the experimental platform.This paper pioneers the introduction of the internal nonlinearity and uncertainty of the vertical electric stabilization system into the settlement of the tracking stability control problem,and validates the advanced servo control strategy through experiment for the first time.展开更多
To improve the hit probability of tank at high speed,a prediction method of projectile-target intersection based on adaptive robust constraint-following control and interval uncertainty analysis is proposed.The method...To improve the hit probability of tank at high speed,a prediction method of projectile-target intersection based on adaptive robust constraint-following control and interval uncertainty analysis is proposed.The method proposed provides a novel way to predict the impact point of projectile for moving tank.First,bidirectional stability constraints and stability constraint-following error are constructed using the Udwadia-Kalaba theory,and an adaptive robust constraint-following controller is designed considering uncertainties.Second,the exterior ballistic ordinary differential equation with uncertainties is integrated into the controller,and the pointing control of stability system is extended to the impact-point control of projectile.Third,based on the interval uncertainty analysis method combining Chebyshev polynomial expansion and affine arithmetic,a prediction method of projectile-target intersection is proposed.Finally,the co-simulation experiment is performed by establishing the multi-body system dynamic model of tank and mathematical model of control system.The results demonstrate that the prediction method of projectile-target intersection based on uncertainty analysis can effectively decrease the uncertainties of system,improve the prediction accuracy,and increase the hit probability.The adaptive robust constraint-following control can effectively restrain the uncertainties caused by road excitation and model error.展开更多
Recent research advances in implicit neural representation have shown that a wide range of video data distributions are achieved by sharing model weights for Neural Representation for Videos(NeRV).While explicit metho...Recent research advances in implicit neural representation have shown that a wide range of video data distributions are achieved by sharing model weights for Neural Representation for Videos(NeRV).While explicit methods exist for accurately embedding ownership or copyright information in video data,the nascent NeRV framework has yet to address this issue comprehensively.In response,this paper introduces MarkINeRV,a scheme designed to embed watermarking information into video frames using an invertible neural network watermarking approach to protect the copyright of NeRV,which models the embedding and extraction of watermarks as a pair of inverse processes of a reversible network and employs the same network to achieve embedding and extraction of watermarks.It is just that the information flow is in the opposite direction.Additionally,a video frame quality enhancement module is incorporated to mitigate watermarking information losses in the rendering process and the possibility ofmalicious attacks during transmission,ensuring the accurate extraction of watermarking information through the invertible network’s inverse process.This paper evaluates the accuracy,robustness,and invisibility of MarkINeRV through multiple video datasets.The results demonstrate its efficacy in extracting watermarking information for copyright protection of NeRV.MarkINeRV represents a pioneering investigation into copyright issues surrounding NeRV.展开更多
The Social Internet of Things(SIoT)integrates the Internet of Things(IoT)and social networks,taking into account the social attributes of objects and diversifying the relationship between humans and objects,which over...The Social Internet of Things(SIoT)integrates the Internet of Things(IoT)and social networks,taking into account the social attributes of objects and diversifying the relationship between humans and objects,which overcomes the limitations of the IoT’s focus on associations between objects.Artificial Intelligence(AI)technology is rapidly evolving.It is critical to build trustworthy and transparent systems,especially with system security issues coming to the surface.This paper emphasizes the social attributes of objects and uses hypergraphs to model the diverse entities and relationships in SIoT,aiming to build an SIoT hypergraph generation model to explore the complex interactions between entities in the context of intelligent SIoT.Current hypergraph generation models impose too many constraints and fail to capture more details of real hypernetworks.In contrast,this paper proposes a hypergraph generation model that evolves dynamically over time,where only the number of nodes is fixed.It combines node wandering with a forest fire model and uses two different methods to control the size of the hyperedges.As new nodes are added,the model can promptly reflect changes in entities and relationships within SIoT.Experimental results exhibit that our model can effectively replicate the topological structure of real-world hypernetworks.We also evaluate the vulnerability of the hypergraph under different attack strategies,which provides theoretical support for building a more robust intelligent SIoT hypergraph model and lays the foundation for building safer and more reliable systems in the future.展开更多
基金the National Natural Science Foundation of China(Nos.62272478,61872384)Natural Science Foundation of Shanxi Province(No.2023-JC-YB-584)+1 种基金National Natural Science Foundation of China(No.62172436)Engineering University of PAP’s Funding for Scientific Research Innovation Team,Engineering University of PAP’s Funding for Key Researcher(No.KYGG202011).
文摘This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information.
基金Supported by the National Natural Science Foundation of China(No.51801058)the Special Program for Guiding Local Science and Technology Development by the Central Government of Hubei Province(No.2019ZYYD006)the Education and Teaching Research Project of Hubei Polytechnic University(No.2021B01)。
文摘α-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating was prepared withα-Fe_(2)O_(3) nanoparticles and epoxy resin by spin coating method.The coating without epoxy resin has higher contact angle(CA)and lower ice adhesion strength(IAS),but the mechanical properties are poor.Theα-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating exhibits good mechanical durability.In addition,compared with the bare aluminum substrate,the Ecorr of the composite coating is positive and the Jcorr is lower.The inhibition efficiency of the composite coating is as high as 99.98%in 3.5 wt%NaCl solution.The difference in the microstructure caused by the two preparation methods leads to the changes in mechanical properties and corrosion resistance of composite superhydrophobic coating.
基金the supports from National Natural Science Foundation of China(61988101,62073142,22178103)National Natural Science Fund for Distinguished Young Scholars(61925305)International(Regional)Cooperation and Exchange Project(61720106008)。
文摘Crude oil scheduling optimization is an effective method to enhance the economic benefits of oil refining.But uncertainties,including uncertain demands of crude distillation units(CDUs),might make the production plans made by the traditional deterministic optimization models infeasible.A data-driven Wasserstein distributionally robust chance-constrained(WDRCC)optimization approach is proposed in this paper to deal with demand uncertainty in crude oil scheduling.First,a new deterministic crude oil scheduling optimization model is developed as the basis of this approach.The Wasserstein distance is then used to build ambiguity sets from historical data to describe the possible realizations of probability distributions of uncertain demands.A cross-validation method is advanced to choose suitable radii for these ambiguity sets.The deterministic model is reformulated as a WDRCC optimization model for crude oil scheduling to guarantee the demand constraints hold with a desired high probability even in the worst situation in ambiguity sets.The proposed WDRCC model is transferred into an equivalent conditional value-at-risk representation and further derived as a mixed-integer nonlinear programming counterpart.Industrial case studies from a real-world refinery are conducted to show the effectiveness of the proposed method.Out-of-sample tests demonstrate that the solution of the WDRCC model is more robust than those of the deterministic model and the chance-constrained model.
基金supported by the National Natural Science Foundation of China (51673017)the National Natural Science Foundation of China (21404005)+1 种基金the Fundamental Research Funds for the Central Universities (XK1802-2)the Natural Science Foundation of Jiangsu Province (BK20150273)。
文摘Silicon-based materials have demonstrated remarkable potential in high-energy-density batteries owing to their high theoretical capacity.However,the significant volume expansion of silicon seriously hinders its utilization as a lithium-ion anode.Herein,a functionalized high-toughness polyimide(PDMI) is synthesized by copolymerizing the 4,4'-Oxydiphthalic anhydride(ODPA) with 4,4'-oxydianiline(ODA),2,3-diaminobenzoic acid(DABA),and 1,3-bis(3-aminopropyl)-tetramethyl disiloxane(DMS).The combination of rigid benzene rings and flexible oxygen groups(-O-) in the PDMI molecular chain via a rigidness/softness coupling mechanism contributes to high toughness.The plentiful polar carboxyl(-COOH) groups establish robust bonding strength.Rapid ionic transport is achieved by incorporating the flexible siloxane segment(Si-O-Si),which imparts high molecular chain motility and augments free volume holes to facilitate lithium-ion transport(9.8 × 10^(-10) cm^(2) s^(-1) vs.16 × 10^(-10) cm^(2) s~(-1)).As expected,the SiO_x@PDMI-1.5 electrode delivers brilliant long-term cycle performance with a remarkable capacity retention of 85% over 500 cycles at 1.3 A g^(-1).The well-designed functionalized polyimide also significantly enhances the electrochemical properties of Si nanoparticles electrode.Meanwhile,the assembled SiO_x@PDMI-1.5/NCM811 full cell delivers a high retention of 80% after 100 cycles.The perspective of the binder design strategy based on polyimide modification delivers a novel path toward high-capacity electrodes for high-energy-density batteries.
基金the National Natural Science Foundation of China(No.52275062)and(No.52075262).
文摘Since backlash nonlinearity is inevitably existing in actuators for bidirectional stabilization system of allelectric tank,it behaves more drastically in high maneuvering environments.In this work,the accurate tracking control for bidirectional stabilization system of moving all-electric tank with actuator backlash and unmodeled disturbance is solved.By utilizing the smooth adaptive backlash inverse model,a nonlinear robust adaptive feedback control scheme is presented.The unknown parameters and unmodelled disturbance are addressed separately through the derived parametric adaptive function and the continuous nonlinear robust term.Because the unknown backlash parameters are updated via adaptive function and the backlash effect can be suppressed successfully by inverse operation,which ensures the system stability.Meanwhile,the system disturbance in the high maneuverable environment can be estimated with the constructed adaptive law online improving the engineering practicality.Finally,Lyapunov-based analysis proves that the developed controller can ensure the tracking error asymptotically converges to zero even with unmodeled disturbance and unknown actuator backlash.Contrast co-simulations and experiments illustrate the advantages of the proposed approach.
基金Project supported by the National Undergraduate Training Projects for Innovation and Entrepreneurship (Grant No. 5003182007)the National Natural Science Foundation of China (Grant No. 12074137)+1 种基金the National Key Research and Development Project of China (Grant No. 2021YFB2801903)the Natural Science Foundation from the Science,Technology,and Innovation Commission of Shenzhen Municipality (Grant No. JCYJ20220530161010023)。
文摘Optical mode converters are essential for enhancing the capacity of optical communication systems. However, fabrication errors restrict the further improvement of conventional mode converters. To address this challenge, we have designed an on-chip TE0–TE1mode converter based on topologically protected waveguide arrays. The simulation results demonstrate that the converter exhibits a mode coupling efficiency of 93.5% near 1550 nm and can tolerate a relative fabrication error of 30%. Our design approach can be extended to enhance the robustness for other integrated photonic devices, beneficial for future development of optical network systems.
基金the National Natural Science Foundation of China (Nos.52304123 and 52104077)the Postdoctoral Fellowship Program of CPSF (No.GZB20230914)+1 种基金the China Postdoctoral Science Foundation (No.2023M730412)the National Key Research and Development Program for Young Scientists (No.2021YFC2900400)。
文摘Acoustic emission(AE)localization algorithms based on homogeneous media or single-velocity are less accurate when applied to the triaxial localization experiments.To the end,a robust triaxial localization method of AE source using refraction path is proposed.Firstly,the control equation of the refraction path is established according to the sensor coordinates and arrival times.Secondly,considering the influence of time-difference-of-arrival(TDOA)errors,the residual of the governing equation is calculated to estimate the equation weight.Thirdly,the refraction points in different directions are solved using Snell’s law and orthogonal constraints.Finally,the source coordinates are iteratively solved by weighted correction terms.The feasibility and accuracy of the proposed method are verified by pencil-lead breaking experiments.The simulation results show that the new method is almost unaffected by the refraction ratio,and always holds more stable and accurate positioning performance than the traditional method under different ratios and scales of TDOA outliers.
基金partly supported by the National Natural Science Foundation of China(Jianhua Wu,Grant No.62041106).
文摘Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the algorithms.In practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret image.An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms.In this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet transform.The wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding network.During the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret image.These lowresolution secret images are combined using densemodules to obtain a high-quality secret image.The experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various attacks.The proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical applications.In conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing algorithms.Its ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various applications.Further research and experimentation can explore the algorithm’s performance under different scenarios and expand its potential applications.
基金supported by the National Natural Science Foundation of China(Grant number 51977154)。
文摘Integrated energy systems(IESs)can improve energy efficiency and reduce carbon emissions,essential for achieving peak carbon emissions and carbon neutrality.This study investigated the characteristics of the CHP model considering P2G and carbon capture systems,and a two-stage robust optimization model of the electricity-heat-gascold integrated energy system was developed.First,a CHP model considering the P2G and carbon capture system was established,and the electric-thermal coupling characteristics and P2G capacity constraints of the model were derived,which proved that the model could weaken the electric-thermal coupling characteristics,increase the electric power regulation range,and reduce carbon emissions.Subsequently,a two-stage robust optimal scheduling model of an IES was constructed,in which the objective function in the day-ahead scheduling stage was to minimize the start-up and shutdown costs.The objective function in the real-time scheduling stage was to minimize the equipment operating costs,carbon emission costs,wind curtailment,and solar curtailment costs,considering multiple uncertainties.Finally,after the objective function is linearized with a ψ-piecewise method,the model is solved based on the C&CG algorithm.Simulation results show that the proposed model can effectively absorb renewable energy and reduce the total cost of the system.
基金This work was supported by Natural Science Foundation of China(Nos.62303126,62362008,62066006,authors Zhenyong Zhang and Bin Hu,https://www.nsfc.gov.cn/,accessed on 25 July 2024)Guizhou Provincial Science and Technology Projects(No.ZK[2022]149,author Zhenyong Zhang,https://kjt.guizhou.gov.cn/,accessed on 25 July 2024)+1 种基金Guizhou Provincial Research Project(Youth)forUniversities(No.[2022]104,author Zhenyong Zhang,https://jyt.guizhou.gov.cn/,accessed on 25 July 2024)GZU Cultivation Project of NSFC(No.[2020]80,author Zhenyong Zhang,https://www.gzu.edu.cn/,accessed on 25 July 2024).
文摘With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and intelligence.However,tree ensemble models commonly used in smart grids are vulnerable to adversarial attacks,making it urgent to enhance their robustness.To address this,we propose a robustness enhancement method that incorporates physical constraints into the node-splitting decisions of tree ensembles.Our algorithm improves robustness by developing a dataset of adversarial examples that comply with physical laws,ensuring training data accurately reflects possible attack scenarios while adhering to physical rules.In our experiments,the proposed method increased robustness against adversarial attacks by 100%when applied to real grid data under physical constraints.These results highlight the advantages of our method in maintaining efficient and secure operation of smart grids under adversarial conditions.
基金supported by the National Natural Science Foundation of China under grant no.42374133the Beijing Nova Program under grant no.2022056+1 种基金the Fundamental Research Funds for the Central Universities under grant no.2462020YXZZ006the Young Elite Scientists Sponsorship Program by CAST(YESS)under grant no.2018QNRC001。
文摘(Multichannel)Singular spectrum analysis is considered as one of the most effective methods for seismic incoherent noise suppression.It utilizes the low-rank feature of seismic signal and regards the noise suppression as a low-rank reconstruction problem.However,in some cases the seismic geophones receive some erratic disturbances and the amplitudes are dramatically larger than other receivers.The presence of this kind of noise,called erratic noise,makes singular spectrum analysis(SSA)reconstruction unstable and has undesirable effects on the final results.We robustify the low-rank reconstruction of seismic data by a reweighted damped SSA(RD-SSA)method.It incorporates the damped SSA,an improved version of SSA,into a reweighted framework.The damping operator is used to weaken the artificial disturbance introduced by the low-rank projection of both erratic and random noise.The central idea of the RD-SSA method is to iteratively approximate the observed data with the quadratic norm for the first iteration and the Tukeys bisquare norm for the rest iterations.The RD-SSA method can suppress seismic incoherent noise and keep the reconstruction process robust to the erratic disturbance.The feasibility of RD-SSA is validated via both synthetic and field data examples.
基金the National Natural Science Foundation of China(Nos.62272478,61872384,62172436,62102451)Natural Science Foundation of Shanxi Province(No.2023-JC-YB-584)Engineering University of PAP’s Funding for Key Researcher(No.KYGG202011).
文摘Traditional information hiding techniques achieve information hiding by modifying carrier data,which can easily leave detectable traces that may be detected by steganalysis tools.Especially in image transmission,both geometric and non-geometric attacks can cause subtle changes in the pixels of the image during transmission.To overcome these challenges,we propose a constructive robust image steganography technique based on style transformation.Unlike traditional steganography,our algorithm does not involve any direct modifications to the carrier data.In this study,we constructed a mapping dictionary by setting the correspondence between binary codes and image categories and then used the mapping dictionary to map secret information to secret images.Through image semantic segmentation and style transfer techniques,we combined the style of secret images with the content of public images to generate stego images.This type of stego image can resist interference during public channel transmission,ensuring the secure transmission of information.At the receiving end,we input the stego image into a trained secret image reconstruction network,which can effectively reconstruct the original secret image and further recover the secret information through a mapping dictionary to ensure the security,accuracy,and efficient decoding of the information.The experimental results show that this constructive information hiding method based on style transfer improves the security of information hiding,enhances the robustness of the algorithm to various attacks,and ensures information security.
基金supported by the National Natural Science Foundation of China,with Fund Numbers 62272478,62102451the National Defense Science and Technology Independent Research Project(Intelligent Information Hiding Technology and Its Applications in a Certain Field)and Science and Technology Innovation Team Innovative Research Project Research on Key Technologies for Intelligent Information Hiding”with Fund Number ZZKY20222102.
文摘As neural radiance fields continue to advance in 3D content representation,the copyright issues surrounding 3D models oriented towards implicit representation become increasingly pressing.In response to this challenge,this paper treats the embedding and extraction of neural radiance field watermarks as inverse problems of image transformations and proposes a scheme for protecting neural radiance field copyrights using invertible neural network watermarking.Leveraging 2D image watermarking technology for 3D scene protection,the scheme embeds watermarks within the training images of neural radiance fields through the forward process in invertible neural networks and extracts them from images rendered by neural radiance fields through the reverse process,thereby ensuring copyright protection for both the neural radiance fields and associated 3D scenes.However,challenges such as information loss during rendering processes and deliberate tampering necessitate the design of an image quality enhancement module to increase the scheme’s robustness.This module restores distorted images through neural network processing before watermark extraction.Additionally,embedding watermarks in each training image enables watermark information extraction from multiple viewpoints.Our proposed watermarking method achieves a PSNR(Peak Signal-to-Noise Ratio)value exceeding 37 dB for images containing watermarks and 22 dB for recovered watermarked images,as evaluated on the Lego,Hotdog,and Chair datasets,respectively.These results demonstrate the efficacy of our scheme in enhancing copyright protection.
基金supported by the Chinese Scholarship Council(Nos.202208320055 and 202108320111)the support from the energy department of Aalborg University was acknowledged.
文摘Utilizing machine learning techniques for data-driven diagnosis of high temperature PEM fuel cells is beneficial and meaningful to the system durability. Nevertheless, ensuring the robustness of diagnosis remains a critical and challenging task in real application. To enhance the robustness of diagnosis and achieve a more thorough evaluation of diagnostic performance, a robust diagnostic procedure based on electrochemical impedance spectroscopy (EIS) and a new method for evaluation of the diagnosis robustness was proposed and investigated in this work. To improve the diagnosis robustness: (1) the degradation mechanism of different faults in the high temperature PEM fuel cell was first analyzed via the distribution of relaxation time of EIS to determine the equivalent circuit model (ECM) with better interpretability, simplicity and accuracy;(2) the feature extraction was implemented on the identified parameters of the ECM and extra attention was paid to distinguishing between the long-term normal degradation and other faults;(3) a Siamese Network was adopted to get features with higher robustness in a new embedding. The diagnosis was conducted using 6 classic classification algorithms—support vector machine (SVM), K-nearest neighbor (KNN), logistic regression (LR), decision tree (DT), random forest (RF), and Naive Bayes employing a dataset comprising a total of 1935 collected EIS. To evaluate the robustness of trained models: (1) different levels of errors were added to the features for performance evaluation;(2) a robustness coefficient (Roubust_C) was defined for a quantified and explicit evaluation of the diagnosis robustness. The diagnostic models employing the proposed feature extraction method can not only achieve the higher performance of around 100% but also higher robustness for diagnosis models. Despite the initial performance being similar, the KNN demonstrated a superior robustness after feature selection and re-embedding by triplet-loss method, which suggests the necessity of robustness evaluation for the machine learning models and the effectiveness of the defined robustness coefficient. This work hopes to give new insights to the robust diagnosis of high temperature PEM fuel cells and more comprehensive performance evaluation of the data-driven method for diagnostic application.
基金supported in part by the Nation Natural Science Foundation of China under Grant No.52175099China Postdoctoral Science Foundation under Grant No.2020M671494Jiangsu Planned Projects for Postdoctoral Research Funds under Grant No.2020Z179。
文摘A tracking stability control problem for the vertical electric stabilization system of moving tank based on adaptive robust servo control is addressed.This paper mainly focuses on two types of possibly fast timevarying but bounded uncertainty within the vertical electric stabilization system:model parameter uncertainty and uncertain nonlinearity.First,the vertical electric stabilization system is constructed as an uncertain nonlinear dynamic system that can reflect the practical mechanics transfer process of the system.Second,the dynamical equation in the form of state space is established by designing the angular tracking error.Third,the comprehensive parameter of system uncertainty is designed to estimate the most conservative effects of uncertainty.Finally,an adaptive robust servo control which can effectively handle the combined effects of complex nonlinearity and uncertainty is proposed.The feasibility of the proposed control strategy under the practical physical condition is validated through the tests on the experimental platform.This paper pioneers the introduction of the internal nonlinearity and uncertainty of the vertical electric stabilization system into the settlement of the tracking stability control problem,and validates the advanced servo control strategy through experiment for the first time.
基金financially supported by the National Natural Science Foundation of China(Grant 52175099)the China Postdoctoral Science Foundation(Grant No.2020M671494)+1 种基金the Jiangsu Planned Projects for Postdoctoral Research Funds(Grant No.2020Z179)the Nanjing University of Science and Technology Independent Research Program(Grant No.30920021105)。
文摘To improve the hit probability of tank at high speed,a prediction method of projectile-target intersection based on adaptive robust constraint-following control and interval uncertainty analysis is proposed.The method proposed provides a novel way to predict the impact point of projectile for moving tank.First,bidirectional stability constraints and stability constraint-following error are constructed using the Udwadia-Kalaba theory,and an adaptive robust constraint-following controller is designed considering uncertainties.Second,the exterior ballistic ordinary differential equation with uncertainties is integrated into the controller,and the pointing control of stability system is extended to the impact-point control of projectile.Third,based on the interval uncertainty analysis method combining Chebyshev polynomial expansion and affine arithmetic,a prediction method of projectile-target intersection is proposed.Finally,the co-simulation experiment is performed by establishing the multi-body system dynamic model of tank and mathematical model of control system.The results demonstrate that the prediction method of projectile-target intersection based on uncertainty analysis can effectively decrease the uncertainties of system,improve the prediction accuracy,and increase the hit probability.The adaptive robust constraint-following control can effectively restrain the uncertainties caused by road excitation and model error.
基金supported by the National Natural Science Foundation of China,with Fund Numbers 62272478,62102451the National Defense Science and Technology Independent Research Project(Intelligent Information Hiding Technology and Its Applications in a Certain Field)and Science and Technology Innovation Team Innovative Research Project“Research on Key Technologies for Intelligent Information Hiding”with Fund Number ZZKY20222102.
文摘Recent research advances in implicit neural representation have shown that a wide range of video data distributions are achieved by sharing model weights for Neural Representation for Videos(NeRV).While explicit methods exist for accurately embedding ownership or copyright information in video data,the nascent NeRV framework has yet to address this issue comprehensively.In response,this paper introduces MarkINeRV,a scheme designed to embed watermarking information into video frames using an invertible neural network watermarking approach to protect the copyright of NeRV,which models the embedding and extraction of watermarks as a pair of inverse processes of a reversible network and employs the same network to achieve embedding and extraction of watermarks.It is just that the information flow is in the opposite direction.Additionally,a video frame quality enhancement module is incorporated to mitigate watermarking information losses in the rendering process and the possibility ofmalicious attacks during transmission,ensuring the accurate extraction of watermarking information through the invertible network’s inverse process.This paper evaluates the accuracy,robustness,and invisibility of MarkINeRV through multiple video datasets.The results demonstrate its efficacy in extracting watermarking information for copyright protection of NeRV.MarkINeRV represents a pioneering investigation into copyright issues surrounding NeRV.
文摘The Social Internet of Things(SIoT)integrates the Internet of Things(IoT)and social networks,taking into account the social attributes of objects and diversifying the relationship between humans and objects,which overcomes the limitations of the IoT’s focus on associations between objects.Artificial Intelligence(AI)technology is rapidly evolving.It is critical to build trustworthy and transparent systems,especially with system security issues coming to the surface.This paper emphasizes the social attributes of objects and uses hypergraphs to model the diverse entities and relationships in SIoT,aiming to build an SIoT hypergraph generation model to explore the complex interactions between entities in the context of intelligent SIoT.Current hypergraph generation models impose too many constraints and fail to capture more details of real hypernetworks.In contrast,this paper proposes a hypergraph generation model that evolves dynamically over time,where only the number of nodes is fixed.It combines node wandering with a forest fire model and uses two different methods to control the size of the hyperedges.As new nodes are added,the model can promptly reflect changes in entities and relationships within SIoT.Experimental results exhibit that our model can effectively replicate the topological structure of real-world hypernetworks.We also evaluate the vulnerability of the hypergraph under different attack strategies,which provides theoretical support for building a more robust intelligent SIoT hypergraph model and lays the foundation for building safer and more reliable systems in the future.