IEEE Trans Neural Netw Learn Syst
April 2024
Contrastive learning (CL) has emerged as a powerful approach for self-supervised learning. However, it suffers from sampling bias, which hinders its performance. While the mainstream solutions, hard negative mining (HNM) and supervised CL (SCL), have been proposed to mitigate this critical issue, they do not effectively address graph CL (GCL).
View Article and Find Full Text PDFIEEE Trans Nanobioscience
April 2024
This paper studies the secrecy performance in a 3-D diffusive molecular communication system with the general depleted molecule shift keying (D-MoSK) modulation, where a point transmitter Alice transmits through diffusion multiple types of molecules modulation to a legitimate absorbing receiver Bob, suffering the eavesdropping from an absorbing eavesdropper Eve. We first develop a solid theoretical framework to determine the probabilistic distributions for the number of molecules absorbed by Bob and Eve, respectively. Based on the results, we then derive the average symbol error rate (SER) as well as the mutual information of Alice-Bob and Alice-Eve, and further apply the Shannon theory to determine the secrecy capacity of Alice-Bob transmission.
View Article and Find Full Text PDFIEEE/ACM Trans Comput Biol Bioinform
August 2024
Healthcare uses state-of-the-art technologies (such as wearable devices, blood glucose meters, electrocardiographs), which results in the generation of large amounts of data. Healthcare data is essential in patient management and plays a critical role in transforming healthcare services, medical scheme design, and scientific research. Missing data is a challenging problem in healthcare due to system failure and untimely filing, resulting in inaccurate diagnosis treatment anomalies.
View Article and Find Full Text PDFThe paper focuses on the observer-based consensus control issue for a class of discrete-time multi-agent systems suffering from the joint actuator and sensor attacks. An event-triggered communication rule with the adaptive threshold update is introduced to reduce the communication burden. A PI-type controller with a finite-time window integral loop is constructed to achieve bounded consensus in the mean-square sense (BCMS).
View Article and Find Full Text PDFJ Nanosci Nanotechnol
November 2019
P₃O pillared Mg/Al hydrotalcite (HTs) as a functional fire-retarding filler was successfully prepared by impregnation-reconstruction, where the HTs was used to prepare polypropylene (PP) and HTs composite (PP/HTs). Thermal decomposition was crucial for correctly identifying the thermal behavior for the PP/HTs, and studied using thermogravimetry (TG) at different heating rates. Based on single TG curves and Málek method, as well as 41 mechanism functions, the thermal decompositions of the PP/HTs composite and PP in nitrogen atmosphere were studied under non-isothermal conditions.
View Article and Find Full Text PDFThe photocatalytic performance of layered double hydroxides (LDH) is usually confined to the slow interface mobility and high recombination rate of photogenerated electron-hole pairs in material. To overcome the low photocatalytic efficiency, novel AgO/Ag decorated LDH (LDH-AgO/Ag) was successfully synthesized by depositing AgO on the surface of LDH and then converted to Ag° nanoparticles in the right position after heat treatment. The as-synthesized LDH-AgO/Ag composites were characterized by Powder X-ray diffraction (XRD), Scanning electron microscopy (SEM), transmission electron microscopy (TEM), X-ray photoelectron spectroscopy (XPS), UV-visible diffuse reflectance spectra (UV-vis DRS), photoluminescence spectra (PL) and transient photocurrent (TPC) analysis.
View Article and Find Full Text PDFWe consider a clustered wireless sensor network (WSN) under epidemic-malware propagation conditions and solve the problem of how to evaluate its reliability so as to ensure efficient, continuous, and dependable transmission of sensed data from sensor nodes to the sink. Facing the contradiction between malware intention and continuous-time Markov chain (CTMC) randomness, we introduce a strategic game that can predict malware infection in order to model a successful infection as a CTMC state transition. Next, we devise a novel measure to compute the Mean Time to Failure (MTTF) of a sensor node, which represents the reliability of a sensor node continuously performing tasks such as sensing, transmitting, and fusing data.
View Article and Find Full Text PDFA novel BA complex network model of color space is proposed based on two fundamental rules of BA scale-free network model: growth and preferential attachment. The scale-free characteristic of color space is discovered by analyzing evolving process of template's color distribution. And then the template's BA complex network model can be used to select important color pixels which have much larger effects than other color pixels in matching process.
View Article and Find Full Text PDFScientificWorldJournal
March 2015
The coordinator is a specific node that controls the whole network and has a significant impact on the performance in cooperative multihop ZigBee wireless sensor networks (ZWSNs). However, the malicious node attacks coordinator nodes in an effort to waste the resources and disrupt the operation of the network. Attacking leads to a failure of one round of communication between the source nodes and destination nodes.
View Article and Find Full Text PDF