-
Super-Resolution Coherent Diffractive Imaging via Titled-Incidence Multi-Rotation-Angle Fusion Ptychography
Authors:
Zhou Youyang,
Shi Weiren,
Xie Yun,
Zhao Bianli,
Luo Xinyu,
Yao Mingjie,
Zhang Rui,
Tan Xin,
Li Kui,
Yang Hao,
Liu Qi,
Nan Yinggang,
Bao Jie,
Zhang Yuping,
Shu Feng,
Li Shaopan,
Zhang Xiaoshi
Abstract:
Coherent diffractive imaging (CDI) enables lensless imaging with experimental simplicity and a flexible field of view, yet its resolution is fundamentally constrained by the Abbe diffraction limit. To overcome this limitation, we introduce a novel Tilted-Incidence Multi-Rotation-Angle Fusion Ptychography technique. This approach leverages a tilted-incidence geometry to extend the collection angle…
▽ More
Coherent diffractive imaging (CDI) enables lensless imaging with experimental simplicity and a flexible field of view, yet its resolution is fundamentally constrained by the Abbe diffraction limit. To overcome this limitation, we introduce a novel Tilted-Incidence Multi-Rotation-Angle Fusion Ptychography technique. This approach leverages a tilted-incidence geometry to extend the collection angle beyond the Abbe limit, achieving up to a -fold resolution enhancement. By acquiring diffraction patterns at multiple sample rotation angles, we capture complementary spatial frequency information. A tilted-incidence multi-rotation-angle fusion ptychographic iterative engine (tmf-PIE) algorithm is then employed to integrate these datasets, enabling super-resolution image reconstruction. Additionally, this method mitigates the anisotropic resolution artifacts inherent to tilted CDI geometries. Our technique represents a novel advancement in super-resolution imaging, providing a novel alternative alongside established methods such as STED, SIM, and SMLM.
△ Less
Submitted 13 April, 2025; v1 submitted 6 April, 2025;
originally announced April 2025.
-
On-demand Quick Metasurface Design with Neighborhood Attention Transformer
Authors:
Zhi Sun,
Tianyue Li,
Shiqi Kuang,
Xue Yun,
Minru He,
Boyan Fu,
Yunlai Fu,
Tianyu Zhao,
Shaowei Wang,
Yansheng Liang,
Shuming Wang,
Ming Lei
Abstract:
Metasurfaces are reshaping traditional optical paradigms and are increasingly required in complex applications that demand substantial computational resources to numerically solve Maxwell's equations-particularly for large-scale systems, inhomogeneous media, and densely packed metadevices. Conventional forward design using electromagnetic solvers is based on specific approximations, which may not…
▽ More
Metasurfaces are reshaping traditional optical paradigms and are increasingly required in complex applications that demand substantial computational resources to numerically solve Maxwell's equations-particularly for large-scale systems, inhomogeneous media, and densely packed metadevices. Conventional forward design using electromagnetic solvers is based on specific approximations, which may not effectively address complex problems. In contrast, existing inverse design methods are a stepwise process that is often time-consuming and involves repetitive computations. Here, we present an inverse design approach utilizing a surrogate Neighborhood Attention Transformer, MetaE-former, to predict the performance of metasurfaces with ultrafast speed and high accuracy. This method achieves global solutions for hundreds of nanostructures simultaneously, providing up to a 250,000-fold speedup compared with solving for individual meta-atoms based on the FDTD method. As examples, we demonstrate a binarized high-numerical-aperture (about 1.31) metalens and several optimized structured-light meta-generators. Our method significantly improves the beam shaping adaptability with metasurfaces and paves the way for fast designing of large-scale metadevices for shaping extreme light fields with high accuracy.
△ Less
Submitted 11 December, 2024;
originally announced December 2024.
-
Imaginary Poynting momentum driven particle rotation by cylindrically polarized Gaussian beams
Authors:
Xue Yun,
Yansheng Liang,
Linquan Guo,
Minru He,
Tianyu Zhao,
Shaowei Wang,
Ming Lei
Abstract:
Imaginary Poynting momentum (IPM) provides a new degree of freedom for particle manipulation. However, the application of IPM in experiments has been largely unexplored. Here, we demonstrate the IPM driven particle rotation by cylindrically polarized Gaussian beams with no spin or orbital angular momentum. Theoretical analysis and experimental measurements demonstrate that gold microparticles will…
▽ More
Imaginary Poynting momentum (IPM) provides a new degree of freedom for particle manipulation. However, the application of IPM in experiments has been largely unexplored. Here, we demonstrate the IPM driven particle rotation by cylindrically polarized Gaussian beams with no spin or orbital angular momentum. Theoretical analysis and experimental measurements demonstrate that gold microparticles will be rotated in the azimuthal direction while confined in the radial direction. We achieved controllable rotation of the particle by tuning the cylindrical polarization state. Interestingly, the transfer of IPM to a gold particle is demonstrated to be competitive with that of spin angular momentum. These findings hold promising in light-matter interactions and particle manipulations.
△ Less
Submitted 14 August, 2024;
originally announced August 2024.
-
CTISum: A New Benchmark Dataset For Cyber Threat Intelligence Summarization
Authors:
Wei Peng,
Junmei Ding,
Wei Wang,
Lei Cui,
Wei Cai,
Zhiyu Hao,
Xiaochun Yun
Abstract:
Cyber Threat Intelligence (CTI) summarization involves generating concise and accurate highlights from web intelligence data, which is critical for providing decision-makers with actionable insights to swiftly detect and respond to cyber threats in the cybersecurity domain. Despite that, the development of efficient techniques for summarizing CTI reports, comprising facts, analytical insights, att…
▽ More
Cyber Threat Intelligence (CTI) summarization involves generating concise and accurate highlights from web intelligence data, which is critical for providing decision-makers with actionable insights to swiftly detect and respond to cyber threats in the cybersecurity domain. Despite that, the development of efficient techniques for summarizing CTI reports, comprising facts, analytical insights, attack processes, and more, has been hindered by the lack of suitable datasets. To address this gap, we introduce CTISum, a new benchmark dataset designed for the CTI summarization task. Recognizing the significance of understanding attack processes, we also propose a novel fine-grained subtask: attack process summarization, which aims to help defenders assess risks, identify security gaps, and uncover vulnerabilities. Specifically, a multi-stage annotation pipeline is designed to collect and annotate CTI data from diverse web sources, alongside a comprehensive benchmarking of CTISum using both extractive, abstractive and LLMs-based summarization methods. Experimental results reveal that current state-of-the-art models face significant challenges when applied to CTISum, highlighting that automatic summarization of CTI reports remains an open research problem. The code and example dataset can be made publicly available at https://github.com/pengwei-iie/CTISum.
△ Less
Submitted 29 June, 2025; v1 submitted 12 August, 2024;
originally announced August 2024.
-
Efficiently and Effectively: A Two-stage Approach to Balance Plaintext and Encrypted Text for Traffic Classification
Authors:
Wei Peng,
Lei Cui,
Wei Cai,
Zhenquan Ding,
Zhiyu Hao,
Xiaochun Yun
Abstract:
Encrypted traffic classification is the task of identifying the application or service associated with encrypted network traffic. One effective approach for this task is to use deep learning methods to encode the raw traffic bytes directly and automatically extract features for classification (byte-based models). However, current byte-based models input raw traffic bytes, whether plaintext or encr…
▽ More
Encrypted traffic classification is the task of identifying the application or service associated with encrypted network traffic. One effective approach for this task is to use deep learning methods to encode the raw traffic bytes directly and automatically extract features for classification (byte-based models). However, current byte-based models input raw traffic bytes, whether plaintext or encrypted text, for automated feature extraction, neglecting the distinct impacts of plaintext and encrypted text on downstream tasks. Additionally, these models primarily focus on improving classification accuracy, with little emphasis on the efficiency of models. In this paper, for the first time, we analyze the impact of plaintext and encrypted text on the model's effectiveness and efficiency. Based on our observations and findings, we propose a two-phase approach to balance the trade-off between plaintext and encrypted text in traffic classification. Specifically, Stage one is to Determine whether the Plain text is enough to be accurately Classified (DPC) using the proposed DPC Selector. This stage quickly identifies samples that can be classified using plaintext, leveraging explicit byte features in plaintext to enhance model's efficiency. Stage two aims to adaptively make a classification with the result from stage one. This stage incorporates encrypted text information for samples that cannot be classified using plaintext alone, ensuring the model's effectiveness on traffic classification tasks. Experiments on two datasets demonstrate that our proposed model achieves state-of-the-art results in both effectiveness and efficiency.
△ Less
Submitted 5 November, 2024; v1 submitted 29 July, 2024;
originally announced July 2024.
-
Zero-shot Compound Expression Recognition with Visual Language Model at the 6th ABAW Challenge
Authors:
Jiahe Wang,
Jiale Huang,
Bingzhao Cai,
Yifan Cao,
Xin Yun,
Shangfei Wang
Abstract:
Conventional approaches to facial expression recognition primarily focus on the classification of six basic facial expressions. Nevertheless, real-world situations present a wider range of complex compound expressions that consist of combinations of these basics ones due to limited availability of comprehensive training datasets. The 6th Workshop and Competition on Affective Behavior Analysis in-t…
▽ More
Conventional approaches to facial expression recognition primarily focus on the classification of six basic facial expressions. Nevertheless, real-world situations present a wider range of complex compound expressions that consist of combinations of these basics ones due to limited availability of comprehensive training datasets. The 6th Workshop and Competition on Affective Behavior Analysis in-the-wild (ABAW) offered unlabeled datasets containing compound expressions. In this study, we propose a zero-shot approach for recognizing compound expressions by leveraging a pretrained visual language model integrated with some traditional CNN networks.
△ Less
Submitted 17 March, 2024;
originally announced March 2024.
-
Versatile non-diffracting beams generator based on free lens modulation
Authors:
Xue Yun,
Yansheng Liang,
Minru He,
Linquan Guo,
Xinyu Zhang,
Tianyu Zhao1,
Ming Lei
Abstract:
Non-diffracting beams, notable for their self-healing properties, high-localized intensity profiles over extended propagation distances, and resistance to diffraction, present significant utility across various fields. In this letter, we present a versatile and highly efficient non-diffracting beams (NDBs) generator predicated on the Fourier transformation of the focal plane field produced through…
▽ More
Non-diffracting beams, notable for their self-healing properties, high-localized intensity profiles over extended propagation distances, and resistance to diffraction, present significant utility across various fields. In this letter, we present a versatile and highly efficient non-diffracting beams (NDBs) generator predicated on the Fourier transformation of the focal plane field produced through the free lens modulation. We demonstrate the experimental generation of high-quality Bessel beams, polymorphic generalized NDBs, tilted NDBs, asymmetric NDBs, NDBs array and specially structured beams formed by the superposition of co-propagating beams. The versatile generalized NDBs generator is anticipated to find applications in laser processing, optical manipulation, and other fields.
△ Less
Submitted 12 December, 2023; v1 submitted 27 November, 2023;
originally announced November 2023.
-
Versatile manipulation of low-refractive-index particles using customized optical building blocks
Authors:
Minru He,
Yansheng Liang,
Xue Yun,
Linquan Guo,
Tianyu Zhao,
Ming Lei
Abstract:
Low-refractive-index (LRI) particles play significant roles in physics, drug delivery, biomedical science, and other fields. However, they have not attained sufficient utilization in active manipulation due to the repulsive effect of light. Here, we demonstrate the establishment of optical building blocks (OBBs) to fulfill the demands of versatile manipulation of LRI particles. The OBBs are genera…
▽ More
Low-refractive-index (LRI) particles play significant roles in physics, drug delivery, biomedical science, and other fields. However, they have not attained sufficient utilization in active manipulation due to the repulsive effect of light. Here, we demonstrate the establishment of optical building blocks (OBBs) to fulfill the demands of versatile manipulation of LRI particles. The OBBs are generated by assembling generalized perfect optical vortices based on the free lens modulation (FLM) method, by which the beams shape, intensity, and position can be elaborately designed with size independent of topological charge. Using the OBBs with high quality and high efficiency, we realized rotating LRI particles along arbitrary trajectories with controllable speed and parallel manipulation of multiple LRI particles. Importantly, we further achieved the sorting of LRI particles by size with specially structured OBBs. With unprecedented flexibility and quality, OBBs provide tremendous potential in optical trapping, lithography, and biomedicine.
△ Less
Submitted 27 November, 2023;
originally announced November 2023.
-
Detection of magnetospheric ion drift patterns at Mars
Authors:
Chi Zhang,
Hans Nilsson,
Yusuke Ebihara,
Masatoshi Yamauchi,
Moa Persson,
Zhaojin Rong,
Jun Zhong,
Chuanfei Dong,
Yuxi Chen,
Xuzhi Zhou,
Yixin Sun,
Yuki Harada,
Jasper Halekas,
Shaosui Xu,
Yoshifumi Futaana,
Zhen Shi,
Chongjing Yuan,
Xiaotong Yun,
Song Fu,
Jiawei Gao,
Mats Holmström,
Yong Wei,
Stas Barabash
Abstract:
Mars lacks a global magnetic field, and instead possesses small-scale crustal magnetic fields, making its magnetic environment fundamentally different from intrinsic magnetospheres like those of Earth or Saturn. Here we report the discovery of magnetospheric ion drift patterns, typical of intrinsic magnetospheres, at Mars usingmeasurements fromMarsAtmosphere and Volatile EvolutioNmission. Specific…
▽ More
Mars lacks a global magnetic field, and instead possesses small-scale crustal magnetic fields, making its magnetic environment fundamentally different from intrinsic magnetospheres like those of Earth or Saturn. Here we report the discovery of magnetospheric ion drift patterns, typical of intrinsic magnetospheres, at Mars usingmeasurements fromMarsAtmosphere and Volatile EvolutioNmission. Specifically, we observewedge-like dispersion structures of hydrogen ions exhibiting butterfly-shaped distributions within the Martian crustal fields, a feature previously observed only in planetary-scale intrinsic magnetospheres. These dispersed structures are the results of driftmotions that fundamentally resemble those observed in intrinsic magnetospheres. Our findings indicate that the Martian magnetosphere embodies an intermediate case where both the unmagnetized and magnetized ion behaviors could be observed because of the wide range of strengths and spatial scales of the crustal magnetic fields around Mars.
△ Less
Submitted 10 November, 2023;
originally announced November 2023.
-
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features
Authors:
Xiaochun Yun,
Jiang Xie,
Shuhao Li,
Yongzheng Zhang,
Peishuai Sun
Abstract:
Malicious communication behavior is the network communication behavior generated by malware (bot-net, spyware, etc.) after victim devices are infected. Experienced adversaries often hide malicious information in HTTP traffic to evade detection. However, related detection methods have inadequate generalization ability because they are usually based on artificial feature engineering and outmoded dat…
▽ More
Malicious communication behavior is the network communication behavior generated by malware (bot-net, spyware, etc.) after victim devices are infected. Experienced adversaries often hide malicious information in HTTP traffic to evade detection. However, related detection methods have inadequate generalization ability because they are usually based on artificial feature engineering and outmoded datasets. In this paper, we propose an HTTP-based Malicious Communication traffic Detection Model (HMCD-Model) based on generated adversarial flows and hierarchical traffic features. HMCD-Model consists of two parts. The first is a generation algorithm based on WGAN-GP to generate HTTP-based malicious communication traffic for data enhancement. The second is a hybrid neural network based on CNN and LSTM to extract hierarchical spatial-temporal features of traffic. In addition, we collect and publish a dataset, HMCT-2020, which consists of large-scale malicious and benign traffic during three years (2018-2020). Taking the data in HMCT-2020(18) as the training set and the data in other datasets as the test set, the experimental results show that the HMCD-Model can effectively detect unknown HTTP-based malicious communication traffic. It can reach F1 = 98.66% in the dataset HMCT-2020(19-20), F1 = 90.69% in the public dataset CIC-IDS-2017, and F1 = 83.66% in the real traffic, which is 20+% higher than other representative methods on average. This validates that HMCD-Model has the ability to discover unknown HTTP-based malicious communication behavior.
△ Less
Submitted 7 September, 2023;
originally announced September 2023.
-
HSTF-Model: an HTTP-based Trojan Detection Model via the Hierarchical Spatio-Temporal Features of Traffics
Authors:
Jiang Xie,
Shuhao Lia,
Xiaochun Yun,
Yongzheng Zhang,
Peng Chang
Abstract:
HTTP-based Trojan is extremely threatening, and it is difficult to be effectively detected because of its concealment and confusion. Previous detection methods usually are with poor generalization ability due to outdated datasets and reliance on manual feature extraction, which makes these methods always perform well under their private dataset, but poorly or even fail to work in real network envi…
▽ More
HTTP-based Trojan is extremely threatening, and it is difficult to be effectively detected because of its concealment and confusion. Previous detection methods usually are with poor generalization ability due to outdated datasets and reliance on manual feature extraction, which makes these methods always perform well under their private dataset, but poorly or even fail to work in real network environment. In this paper, we propose an HTTP-based Trojan detection model via the Hierarchical Spatio-Temporal Features of traffics (HSTF-Model) based on the formalized description of traffic spatio-temporal behavior from both packet level and flow level. In this model, we employ Convolutional Neural Network (CNN) to extract spatial information and Long Short-Term Memory (LSTM) to extract temporal information. In addition, we present a dataset consisting of Benign and Trojan HTTP Traffic (BTHT-2018). Experimental results show that our model can guarantee high accuracy (the F1 of 98.62%-99.81% and the FPR of 0.34%-0.02% in BTHT-2018). More importantly, our model has a huge advantage over other related methods in generalization ability. HSTF-Model trained with BTHT-2018 can reach the F1 of 93.51% on the public dataset ISCX-2012, which is 20+% better than the best of related machine learning methods.
△ Less
Submitted 7 September, 2023;
originally announced September 2023.
-
A method based on hierarchical spatiotemporal features for trojan traffic detection
Authors:
Jiang Xie,
Shuhao Li,
Yongzheng Zhang,
Xiaochun Yun,
Jia Li
Abstract:
Trojans are one of the most threatening network attacks currently. HTTP-based Trojan, in particular, accounts for a considerable proportion of them. Moreover, as the network environment becomes more complex, HTTP-based Trojan is more concealed than others. At present, many intrusion detection systems (IDSs) are increasingly difficult to effectively detect such Trojan traffic due to the inherent sh…
▽ More
Trojans are one of the most threatening network attacks currently. HTTP-based Trojan, in particular, accounts for a considerable proportion of them. Moreover, as the network environment becomes more complex, HTTP-based Trojan is more concealed than others. At present, many intrusion detection systems (IDSs) are increasingly difficult to effectively detect such Trojan traffic due to the inherent shortcomings of the methods used and the backwardness of training data. Classical anomaly detection and traditional machine learning-based (TML-based) anomaly detection are highly dependent on expert knowledge to extract features artificially, which is difficult to implement in HTTP-based Trojan traffic detection. Deep learning-based (DL-based) anomaly detection has been locally applied to IDSs, but it cannot be transplanted to HTTP-based Trojan traffic detection directly. To solve this problem, in this paper, we propose a neural network detection model (HSTF-Model) based on hierarchical spatiotemporal features of traffic. Meanwhile, we combine deep learning algorithms with expert knowledge through feature encoders and statistical characteristics to improve the self-learning ability of the model. Experiments indicate that F1 of HSTF-Model can reach 99.4% in real traffic. In addition, we present a dataset BTHT consisting of HTTP-based benign and Trojan traffic to facilitate related research in the field.
△ Less
Submitted 3 September, 2023;
originally announced September 2023.
-
Robust Meta-learning with Sampling Noise and Label Noise via Eigen-Reptile
Authors:
Dong Chen,
Lingfei Wu,
Siliang Tang,
Xiao Yun,
Bo Long,
Yueting Zhuang
Abstract:
Recent years have seen a surge of interest in meta-learning techniques for tackling the few-shot learning (FSL) problem. However, the meta-learner is prone to overfitting since there are only a few available samples, which can be identified as sampling noise on a clean dataset. Moreover, when handling the data with noisy labels, the meta-learner could be extremely sensitive to label noise on a cor…
▽ More
Recent years have seen a surge of interest in meta-learning techniques for tackling the few-shot learning (FSL) problem. However, the meta-learner is prone to overfitting since there are only a few available samples, which can be identified as sampling noise on a clean dataset. Moreover, when handling the data with noisy labels, the meta-learner could be extremely sensitive to label noise on a corrupted dataset. To address these two challenges, we present Eigen-Reptile (ER) that updates the meta-parameters with the main direction of historical task-specific parameters to alleviate sampling and label noise. Specifically, the main direction is computed in a fast way, where the scale of the calculated matrix is related to the number of gradient steps instead of the number of parameters. Furthermore, to obtain a more accurate main direction for Eigen-Reptile in the presence of many noisy labels, we further propose Introspective Self-paced Learning (ISPL). We have theoretically and experimentally demonstrated the soundness and effectiveness of the proposed Eigen-Reptile and ISPL. Particularly, our experiments on different tasks show that the proposed method is able to outperform or achieve highly competitive performance compared with other gradient-based methods with or without noisy labels. The code and data for the proposed method are provided for research purposes https://github.com/Anfeather/Eigen-Reptile.
△ Less
Submitted 4 June, 2022;
originally announced June 2022.
-
Efficient textual explanations for complex road and traffic scenarios based on semantic segmentation
Authors:
Yiyue Zhao,
Xinyu Yun,
Chen Chai,
Zhiyu Liu,
Wenxuan Fan,
Xiao Luo
Abstract:
The complex driving environment brings great challenges to the visual perception of autonomous vehicles. It's essential to extract clear and explainable information from the complex road and traffic scenarios and offer clues to decision and control. However, the previous scene explanation had been implemented as a separate model. The black box model makes it difficult to interpret the driving envi…
▽ More
The complex driving environment brings great challenges to the visual perception of autonomous vehicles. It's essential to extract clear and explainable information from the complex road and traffic scenarios and offer clues to decision and control. However, the previous scene explanation had been implemented as a separate model. The black box model makes it difficult to interpret the driving environment. It cannot detect comprehensive textual information and requires a high computational load and time consumption. Thus, this study proposed a comprehensive and efficient textual explanation model. From 336k video frames of the driving environment, critical images of complex road and traffic scenarios were selected into a dataset. Through transfer learning, this study established an accurate and efficient segmentation model to obtain the critical traffic elements in the environment. Based on the XGBoost algorithm, a comprehensive model was developed. The model provided textual information about states of traffic elements, the motion of conflict objects, and scenario complexity. The approach was verified on the real-world road. It improved the perception accuracy of critical traffic elements to 78.8%. The time consumption reached 13 minutes for each epoch, which was 11.5 times more efficient than the pre-trained network. The textual information analyzed from the model was also accordant with reality. The findings offer clear and explainable information about the complex driving environment, which lays a foundation for subsequent decision and control. It can improve the visual perception ability and enrich the prior knowledge and judgments of complex traffic situations.
△ Less
Submitted 2 June, 2022; v1 submitted 26 May, 2022;
originally announced May 2022.
-
Cluster Head Detection for Hierarchical UAV Swarm With Graph Self-supervised Learning
Authors:
Zhiyu Mou,
Jun Liu,
Xiang Yun,
Feifei Gao,
Qihui Wu
Abstract:
In this paper, we study the cluster head detection problem of a two-level unmanned aerial vehicle (UAV) swarm network (USNET) with multiple UAV clusters, where the inherent follow strategy (IFS) of low-level follower UAVs (FUAVs) with respect to high-level cluster head UAVs (HUAVs) is unknown. We first propose a graph attention self-supervised learning algorithm (GASSL) to detect the HUAVs of a si…
▽ More
In this paper, we study the cluster head detection problem of a two-level unmanned aerial vehicle (UAV) swarm network (USNET) with multiple UAV clusters, where the inherent follow strategy (IFS) of low-level follower UAVs (FUAVs) with respect to high-level cluster head UAVs (HUAVs) is unknown. We first propose a graph attention self-supervised learning algorithm (GASSL) to detect the HUAVs of a single UAV cluster, where the GASSL can fit the IFS at the same time. Then, to detect the HUAVs in the USNET with multiple UAV clusters, we develop a multi-cluster graph attention self-supervised learning algorithm (MC-GASSL) based on the GASSL. The MC-GASSL clusters the USNET with a gated recurrent unit (GRU)-based metric learning scheme and finds the HUAVs in each cluster with GASSL. Numerical results show that the GASSL can detect the HUAVs in single UAV clusters obeying various kinds of IFSs with over 98% average accuracy. The simulation results also show that the clustering purity of the USNET with MC-GASSL exceeds that with traditional clustering algorithms by at least 10% average. Furthermore, the MC-GASSL can efficiently detect all the HUAVs in USNETs with various IFSs and cluster numbers with low detection redundancies.
△ Less
Submitted 8 March, 2022;
originally announced March 2022.
-
Zero-order-free complex beam shaping
Authors:
Yansheng Liang,
Xue Yun,
Minru He,
Zhaojun Wang,
Ming Lei
Abstract:
The unwanted zero-order diffraction is still an issue in beam shaping using pixelated spatial light modulators. In this paper, we report a new approach for zero-order free beam shaping by designing an asymmetric triangle reflector and introducing a digital blazed grating and a digital lens to the phase hologram addressed onto the spatial light modulator. By adding the digital lens phase to the pre…
▽ More
The unwanted zero-order diffraction is still an issue in beam shaping using pixelated spatial light modulators. In this paper, we report a new approach for zero-order free beam shaping by designing an asymmetric triangle reflector and introducing a digital blazed grating and a digital lens to the phase hologram addressed onto the spatial light modulator. By adding the digital lens phase to the previously reported complex-amplitude coding algorithms, we realized the generation of complex beams without the burden of zero-order diffraction. We comparatively investigated the produced complex light fields using the modified complex-amplitude coding algorithms to validate the proposed method.
△ Less
Submitted 17 October, 2021;
originally announced October 2021.
-
Reflections in the Sky: Joint Trajectory and Passive Beamforming Design for Secure UAV Networks with Reconfigurable Intelligent Surface
Authors:
Hui Long,
Ming Chen,
Zhaohui Yang,
Bao Wang,
Zhiyang Li,
Xu Yun,
Mohammad Shikh-Bahaei
Abstract:
This paper investigates the problem of secure energy efficiency maximization for a reconfigurable intelligent surface (RIS) assisted uplink wireless communication system, where an unmanned aerial vehicle (UAV) equipped with an RIS works as a mobile relay between the base station (BS) and a group of users. We focus on maximizing the secure energy efficiency of the system via jointly optimizing the…
▽ More
This paper investigates the problem of secure energy efficiency maximization for a reconfigurable intelligent surface (RIS) assisted uplink wireless communication system, where an unmanned aerial vehicle (UAV) equipped with an RIS works as a mobile relay between the base station (BS) and a group of users. We focus on maximizing the secure energy efficiency of the system via jointly optimizing the UAV's trajectory, the RIS's phase shift, users' association and transmit power. To tackle this problem, we divide the original problem into three sub-problems, and propose an efficient iterative algorithm. In particular, the successive convex approximation method (SCA) is applied to solve the nonconvex UAV trajectory, the RIS's phase shift, and transmit power optimization sub-problems. We further provide two schemes to simplify the solution of phase and trajectory sub-problem. Simulation results demonstrate that the proposed algorithm converges fast, and the proposed design can enhance the secure energy efficiency by up to 38\% gains, as compared to the traditional schemes without any RIS.
△ Less
Submitted 5 June, 2020; v1 submitted 21 May, 2020;
originally announced May 2020.
-
Modeling Multivariate Spatial-Temporal Data with Latent Low-Dimensional Dynamics
Authors:
Elynn Y. Chen,
Xin Yun,
Rong Chen,
Qiwei Yao
Abstract:
High-dimensional multivariate spatial-temporal data arise frequently in a wide range of applications; however, there are relatively few statistical methods that can simultaneously deal with spatial, temporal and variable-wise dependencies in large data sets. In this paper, we propose a new approach to utilize the correlations in variable, space and time to achieve dimension reduction and to facili…
▽ More
High-dimensional multivariate spatial-temporal data arise frequently in a wide range of applications; however, there are relatively few statistical methods that can simultaneously deal with spatial, temporal and variable-wise dependencies in large data sets. In this paper, we propose a new approach to utilize the correlations in variable, space and time to achieve dimension reduction and to facilitate spatial/temporal predictions in the high-dimensional settings. The multivariate spatial-temporal process is represented as a linear transformation of a lower-dimensional latent factor process. The spatial dependence structure of the factor process is further represented non-parametrically in terms of latent empirical orthogonal functions. The low-dimensional structure is completely unknown in our setting and is learned entirely from data collected irregularly over space but regularly over time. We propose innovative estimation and prediction methods based on the latent low-rank structures. Asymptotic properties of the estimators and predictors are established. Extensive experiments on synthetic and real data sets show that, while the dimensions are reduced significantly, the spatial, temporal and variable-wise covariance structures are largely preserved. The efficacy of our method is further confirmed by the prediction performances on both synthetic and real data sets.
△ Less
Submitted 1 February, 2020;
originally announced February 2020.
-
Estimation of Spatial-Temporal Gait Parameters based on the Fusion of Inertial and Film-Pressure Signals
Authors:
Cheng Wang,
Xiangdong Wang,
Zhou Long,
Tian Tian,
Mingming Gao,
Xiaoping Yun,
Yueliang Qian,
Jintao Li
Abstract:
Gait analysis (GA) has been widely used in physical activity monitoring and clinical contexts, and the estimation of the spatial-temporal gait parameters is of primary importance for GA. With the quick development of smart tiny sensors, GA methods based on wearable devices have become more popular recently. However, most existing wearable GA methods focus on data analysis from inertial sensors. In…
▽ More
Gait analysis (GA) has been widely used in physical activity monitoring and clinical contexts, and the estimation of the spatial-temporal gait parameters is of primary importance for GA. With the quick development of smart tiny sensors, GA methods based on wearable devices have become more popular recently. However, most existing wearable GA methods focus on data analysis from inertial sensors. In this paper, we firstly present a two-foot-worn in-shoe system (Gaitboter) based on low-cost, wearable and multimodal sensors' fusion for GA, comprising an inertial sensor and eight film-pressure sensors with each foot for gait raw data collection while walking. Secondly, a GA algorithm for estimating the spatial-temporal parameters of gait is proposed. The algorithm fully uses the fusion of two kinds of sensors' signals: inertial sensor and film-pressure sensor, in order to estimate the spatial-temporal gait parameters, such as stance phase, swing phase, double stance phase, cadence, step time, stride time, stride length, velocity. Finally, to verify the effectiveness of this system and algorithm of the paper, an experiment is performed with 27 stoke patients from local hospital that the spatial-temporal gait parameters obtained with the system and the algorithm are compared with a GA tool used in medical laboratories. And the experimental results show that it achieves very good consistency and correlation between the proposed system and the compared GA tool.
△ Less
Submitted 23 October, 2018;
originally announced October 2018.
-
Binding-energy independence of reduced single particle strengths derived from $(p,d)$ reactions
Authors:
Y. P. Xu,
D. Y. Pang,
X. Y. Yun,
C. Wen,
C. X. Yuan,
J. L. Lou
Abstract:
An overall reduction factor (ORF) is introduced for studying the quenching of single particle strengths through nucleon transfer reactions. The ORF includes contributions of all the probed bound states of the residual nucleus in a transfer reaction and permits a proper comparison with results of inclusive knockout reactions. A systematic analysis is made with 103 sets of angular distribution data…
▽ More
An overall reduction factor (ORF) is introduced for studying the quenching of single particle strengths through nucleon transfer reactions. The ORF includes contributions of all the probed bound states of the residual nucleus in a transfer reaction and permits a proper comparison with results of inclusive knockout reactions. A systematic analysis is made with 103 sets of angular distribution data of $(p,d)$ reactions on 21 even-even targets with atomic mass numbers from 8 to 56 using the consistent three-body model reaction methodology proposed in [J. Lee, J.A. Tostevin, B.A. Brown, et al., Phys. Rev. C 73, 044608 (2006)]. The extracted ORFs are found to be nearly independent on the nuclear isospin asymmetry, which is different from the systematics of inclusive knockout reactions but is consistent with the recent measurement of $(d,t)$, $(d,3He)$, $(p,2p)$, and $(p,pn)$ reactions on nitrogen and oxygen isotopes and \textit{ab initio} calculations.
△ Less
Submitted 3 October, 2018; v1 submitted 28 September, 2018;
originally announced September 2018.
-
Possible determination of high-lying single particle components with (p,d) reactions
Authors:
Y. P. Xu,
D. Y. Pang,
X. Y. Yun,
S. Kubono,
C. A. Bertulani,
C. X. Yuan
Abstract:
A detailed feasibility study on deducing the high-lying single-particle components (HLSPCs), which are important but used to be ignored, in the ground and low-lying excited states of even-even light nuclei is performed by analyses of $(p,d)$ reactions with \nuc{12}{C}, \nuc{24}{Mg}, \nuc{28}{Si}, and \nuc{40}{Ca} targets at 51.93 MeV. Coupled reaction channels (CRC) analyses have been made for…
▽ More
A detailed feasibility study on deducing the high-lying single-particle components (HLSPCs), which are important but used to be ignored, in the ground and low-lying excited states of even-even light nuclei is performed by analyses of $(p,d)$ reactions with \nuc{12}{C}, \nuc{24}{Mg}, \nuc{28}{Si}, and \nuc{40}{Ca} targets at 51.93 MeV. Coupled reaction channels (CRC) analyses have been made for $(p,d)$ transitions to the $j$-forbidden excited states in \nuc{11}{C} (${\tfrac{5}{2}}^-$, 4.32 MeV), \nuc{23}{Mg} (${\tfrac{7}{2}}^+$, 2.05 MeV), \nuc{27}{Si} (${\tfrac{7}{2}}^+$, 2.16 MeV) and \nuc{39}{Ca} (${\tfrac{9}{2}}^-$, 3.64 MeV), including the major allowed transition components together with direct components of HLSPCs. Spectroscopic amplitudes of the HLSPCs are deduced by fitting the angular distributions of the ground and the $j$-forbidden excited states simultaneously. The present analysis demonstrates for the first time that information about HLSPCs in atomic nuclei can be obtained from analysis of $(p,d)$ reactions.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
Extension of the ratio method to proton-rich nuclei
Authors:
X. Y. Yun,
F. Colomer,
D. Y. Pang,
P. Capel
Abstract:
The ratio method has been developed to improve the study of one-neutron halo nuclei through reactions. By taking the ratio of angular distributions for two processes, viz. breakup and elastic scattering, this new observable is nearly independent of the reaction mechanism and hence much more sensitive to the projectile structure than the cross sections for each single process. We study the extensio…
▽ More
The ratio method has been developed to improve the study of one-neutron halo nuclei through reactions. By taking the ratio of angular distributions for two processes, viz. breakup and elastic scattering, this new observable is nearly independent of the reaction mechanism and hence much more sensitive to the projectile structure than the cross sections for each single process. We study the extension of the ratio method to proton-rich nuclei and also explore the optimum experimental conditions for measuring this new observable. We compare accurate dynamical calculations of reactions for proton-rich projectiles to the prediction of the ratio method. We use the dynamical eikonal approximation that provides good results for this kind of reactions at intermediate energy. Our tests for 8B, an archteypical one-proton halo nucleus, on Pb, Ni, and C targets at 44 MeV/nucleon show that, the ratio works less well than for neutron halos due to the non-negligible Coulomb interaction between the valence proton and the target. Nevertheless, the ratio method still provides pertinent information about nuclear structure on the proton-rich side of the valley of stability. Interestingly the method is not affected if energy ranges-or bins-are considered in the projectile continuum. This makes the ratio easier to measure experimentally by increasing the breakup cross section. We also extend our analysis to 17F, 25Al, and 27P, whose study is of interest to both nuclear astrophysics and nuclear structure. We show that, albeit less precise than for one-neutron halo nuclei, nuclear-structure information can be inferred from the ratio method applied to exotic proton-rich nuclei. In particular, when the valence proton is loosely bound in an $s$ or $p$ orbital, viz. for proton halo nuclei, detailed structure information can be obtained through this new reaction observable.
△ Less
Submitted 22 July, 2019; v1 submitted 3 May, 2018;
originally announced May 2018.
-
Counting vertices in plane and $k$-ary trees with given outdegree
Authors:
Rosena R. X. Du,
Jia He,
Xueli Yun
Abstract:
We count the number of vertices in plane trees and $k$-ary trees with given outdegree, and prove that the total number of vertices of outdegree $i$ over all plane trees with $n$ edges is ${2n-i-1 \choose n-1}$, and the total number of vertices of outdegree $i$ over all $k$-ary trees with $n$ edges is ${k\choose i}{kn\choose n-i}$. For both results we give bijective proofs as well as generating fun…
▽ More
We count the number of vertices in plane trees and $k$-ary trees with given outdegree, and prove that the total number of vertices of outdegree $i$ over all plane trees with $n$ edges is ${2n-i-1 \choose n-1}$, and the total number of vertices of outdegree $i$ over all $k$-ary trees with $n$ edges is ${k\choose i}{kn\choose n-i}$. For both results we give bijective proofs as well as generating function proofs.
△ Less
Submitted 17 March, 2019; v1 submitted 29 January, 2015;
originally announced January 2015.
-
Effective Absorption Enhancement in Small Molecule Organic Solar Cells by Employing Trapezoid Gratings
Authors:
Xiang Chun-Ping,
Liu Jie-Tao,
Jin Yu,
Xu Bin-Zong,
Wang Wei-Min,
Wei Xin,
Song Guo-Feng,
Xu Yun
Abstract:
We demonstrate the optical absorption has been enhanced in the small molecule organic solar cells by employing trapezoid grating structure. The enhanced absorption is mainly attributed to both waveguide modes and surface plasmon modes, which has been simulated by using finite-difference time-domain method. The simulated results show that the surface plasmon along the semitransparent metallic Ag an…
▽ More
We demonstrate the optical absorption has been enhanced in the small molecule organic solar cells by employing trapezoid grating structure. The enhanced absorption is mainly attributed to both waveguide modes and surface plasmon modes, which has been simulated by using finite-difference time-domain method. The simulated results show that the surface plasmon along the semitransparent metallic Ag anode is excited by introducing the periodical trapezoid gratings, which induce high intensity field increment in the donor layer. Meanwhile, the waveguide modes result a high intensity field in acceptor layer. The increment of field improves the absorption of organic solar cells, significantly, which has been demonstrated by simulating the electrical properties. The simulated results exhibiting 31 % increment of the short-circuit current has been achieved in the optimized device, which is supported by the experimental measurement. The power conversion efficiency of the grating sample obtained in experiment exhibits an enhancement of 7.7 %.
△ Less
Submitted 19 July, 2013;
originally announced July 2013.
-
Unsteady Flow and Force Control in Butterfly Take-off Flight
Authors:
Haibo Dong,
Chengyu Li,
Zongxian Liang,
Xiang Yun
Abstract:
In this work, high-resolution, high-speed videos of a Monarch butterfly (Danaus plexippus) in take-off flight were obtained using a photogrammetry system. Using a 3D subdivision surface reconstruction methodology, the butterfly's body/wing deformation and kinematics were modeled and reconstructed from those videos. High fidelity simulations were then carried out in order to understand vortex forma…
▽ More
In this work, high-resolution, high-speed videos of a Monarch butterfly (Danaus plexippus) in take-off flight were obtained using a photogrammetry system. Using a 3D subdivision surface reconstruction methodology, the butterfly's body/wing deformation and kinematics were modeled and reconstructed from those videos. High fidelity simulations were then carried out in order to understand vortex formation in both near-field and far-field of butterfly wings and examine the associated aerodynamic performance. A Cartesian grid based sharp interface immersed boundary solver was used to handle such flows in all their complexity.
△ Less
Submitted 14 October, 2012;
originally announced October 2012.
-
Randomness Testing of Compressed Data
Authors:
Weiling Chang,
Binxing Fang,
Xiaochun Yun,
Shupeng Wang,
Xiangzhan Yu
Abstract:
Random Number Generators play a critical role in a number of important applications. In practice, statistical testing is employed to gather evidence that a generator indeed produces numbers that appear to be random. In this paper, we reports on the studies that were conducted on the compressed data using 8 compression algorithms or compressors. The test results suggest that the output of compres…
▽ More
Random Number Generators play a critical role in a number of important applications. In practice, statistical testing is employed to gather evidence that a generator indeed produces numbers that appear to be random. In this paper, we reports on the studies that were conducted on the compressed data using 8 compression algorithms or compressors. The test results suggest that the output of compression algorithms or compressors has bad randomness, the compression algorithms or compressors are not suitable as random number generator. We also found that, for the same compression algorithm, there exists positive correlation relationship between compression ratio and randomness, increasing the compression ratio increases randomness of compressed data. As time permits, additional randomness testing efforts will be conducted.
△ Less
Submitted 20 January, 2010;
originally announced January 2010.