Previous studies have shown that deep learning is very effective in detecting known attacks.However,when facing unknown attacks,models such as Deep Neural Networks(DNN)combined with Long Short-Term Memory(LSTM),Convol...Previous studies have shown that deep learning is very effective in detecting known attacks.However,when facing unknown attacks,models such as Deep Neural Networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neural Networks(CNN)combined with LSTM,and so on are built by simple stacking,which has the problems of feature loss,low efficiency,and low accuracy.Therefore,this paper proposes an autonomous detectionmodel for Distributed Denial of Service attacks,Multi-Scale Convolutional Neural Network-Bidirectional Gated Recurrent Units-Single Headed Attention(MSCNN-BiGRU-SHA),which is based on a Multistrategy Integrated Zebra Optimization Algorithm(MI-ZOA).The model undergoes training and testing with the CICDDoS2019 dataset,and its performance is evaluated on a new GINKS2023 dataset.The hyperparameters for Conv_filter and GRU_unit are optimized using the Multi-strategy Integrated Zebra Optimization Algorithm(MIZOA).The experimental results show that the test accuracy of the MSCNN-BiGRU-SHA model based on the MIZOA proposed in this paper is as high as 0.9971 in the CICDDoS 2019 dataset.The evaluation accuracy of the new dataset GINKS2023 created in this paper is 0.9386.Compared to the MSCNN-BiGRU-SHA model based on the Zebra Optimization Algorithm(ZOA),the detection accuracy on the GINKS2023 dataset has improved by 5.81%,precisionhas increasedby 1.35%,the recallhas improvedby 9%,and theF1scorehas increasedby 5.55%.Compared to the MSCNN-BiGRU-SHA models developed using Grid Search,Random Search,and Bayesian Optimization,the MSCNN-BiGRU-SHA model optimized with the MI-ZOA exhibits better performance in terms of accuracy,precision,recall,and F1 score.展开更多
The polarization properties of light are widely applied in imaging,communications,materials analy⁃sis,and life sciences.Various methods have been developed that can measure the polarization information of a target.How...The polarization properties of light are widely applied in imaging,communications,materials analy⁃sis,and life sciences.Various methods have been developed that can measure the polarization information of a target.However,conventional polarization detection systems are often bulky and complex,limiting their poten⁃tial for broader applications.To address the challenges of miniaturization,integrated polarization detectors have been extensively explored in recent years,achieving significant advancements in performance and functionality.In this review,we focus mainly on integrated polarization detectors with innovative features,including infinitely high polarization discrimination,ultrahigh sensitivity to polarization state change,full Stokes parameters measure⁃ment,and simultaneous perception of polarization and other key properties of light.Lastly,we discuss the oppor⁃tunities and challenges for the future development of integrated polarization photodetectors.展开更多
In micro-electro-mechanical system based inertial navigation system(MEMS-INS)/global position system(GPS) integrated navigation systems, there exist unknown disturbances and abnormal measurements. In order to obta...In micro-electro-mechanical system based inertial navigation system(MEMS-INS)/global position system(GPS) integrated navigation systems, there exist unknown disturbances and abnormal measurements. In order to obtain high estimation accuracy and enhance detection sensitivity to faults in measurements, this paper deals with the problem of model-based robust estimation(RE) and fault detection(FD). A filter gain matrix and a post-filter are designed to obtain a RE and FD algorithm with current measurements, which is different from most of the existing priori filters using measurements in one-step delay. With the designed filter gain matrix, the H-infinity norm of the transfer function from noise inputs to estimation error outputs is limited within a certain range; with the designed post-filter, the residual signal is robust to disturbances but sensitive to faults. Therefore, the algorithm can guarantee small estimation errors in the presence of disturbances and have high sensitivity to faults. The proposed method is evaluated in an integrated navigation system, and the simulation results show that it is more effective in position estimation and fault signal detection than priori RE and FD algorithms.展开更多
The snapshot Fault Detection(FD)algorithm of Advanced Receiver Autonomous Integrity Monitoring(ARAIM)necessitates the allocation of continuity and integrity risk requirements from the operational exposure time level t...The snapshot Fault Detection(FD)algorithm of Advanced Receiver Autonomous Integrity Monitoring(ARAIM)necessitates the allocation of continuity and integrity risk requirements from the operational exposure time level to the single epoch level.Current studies primarily focus on finding a conservative Number of Effective Samples(NES)as a risk mapping factor.However,considering that the NES varies with the observation environment and the type of the fault mode,applying a fixed NES can constrain the performance of the algorithm.To address this issue,the continuity and integrity risks over the operational exposure time are analyzed and bounded based on all epochs within the exposure time.A more adaptable method for continuity and integrity budget allocation over the operational exposure time is presented,capable of monitoring the continuity and integrity risks over the recent operational exposure time in real time,and dynamically adjusting the allocation values based on the current observation environment.Simulation results demonstrate that,compared with the allocation method based on a fixed NES,ARAIM based on the proposed allocation method exhibits superior performance in terms of the availability.At an FD execution frequency equal to the required Time-To-Alert(TTA),the dual-constellation H-ARAIM provides 100%of the global coverage with 99.5%availability of the RNP 0.1 service,and the dual-constellation V-ARAIM provides 86.38%of the global coverage with 99.5%availability of the LPV-200 service.展开更多
In detecting system fault algorithms,the false alarm rate and undectect rate generated by residual Chi-square test can affect the stability of filters.The paper proposes a fault detection algorithm based on sequential...In detecting system fault algorithms,the false alarm rate and undectect rate generated by residual Chi-square test can affect the stability of filters.The paper proposes a fault detection algorithm based on sequential residual Chi-square test and applies to fault detection of an integrated navigation system.The simulation result shows that the algorithm can accurately detect the fault information of global positioning system(GPS),eliminate the influence of false alarm and missed detection on filter,and enhance fault tolerance of integrated navigation systems.展开更多
This paper considers the guidance and control problem of a flight vehicle with sidewindow detection. In order to guarantee the target remaining in the seeker's sight of view, the line of sight and the attitude of the...This paper considers the guidance and control problem of a flight vehicle with sidewindow detection. In order to guarantee the target remaining in the seeker's sight of view, the line of sight and the attitude of the flight vehicle should be under some constraints caused by the sidewindow, which leads to coupling between the guidance and the attitude dynamics model. To deal with the side-window constraints and the coupling, a novel Integrated Guidance and Control(IGC)design approach is proposed. Firstly, the relative motion equations are derived in the body-Line of Sight(LOS) coordinate system. And the guidance and control problem of the flight vehicle is formulated into an IGC problem with state constraints. Then, based on the singular perturbation method, the IGC problem is decomposed into the control design of the quasi-steady-state subsystem and the boundary-layer subsystem which can be designed separately. Finally, the receding horizon control is applied to the control design for the two subsystems. Simulation results show the effectiveness of the proposed approach.展开更多
Passive detection of moving target is an important part of intelligent surveillance. Satellite has the potential to play a key role in many applications of space-air-ground integrated networks(SAGIN). In this paper, w...Passive detection of moving target is an important part of intelligent surveillance. Satellite has the potential to play a key role in many applications of space-air-ground integrated networks(SAGIN). In this paper, we propose a novel intelligent passive detection method for aerial target based on reservoir computing networks. Specifically, delayed feedback networks are utilized to refine the direct signals from the satellite in the reference channels. In addition, the satellite direct wave interference in the monitoring channels adopts adaptive interference suppression using the minimum mean square error filter. Furthermore, we employ decoupling echo state networks to predict the clutter interference in the monitoring channels and construct the detection statistics accordingly. Finally, a multilayer perceptron is adopted to detect the echo signal after interference suppression. Extensive simulations is conducted to evaluate the performance of our proposed method. Results show that the detection probability is almost 100% when the signal-to-interference ratio of echo signal is-36 dB, which demonstrates that our proposed method achieves efficient passive detection for aerial targets in typical SAGIN scenarios.展开更多
Objective To develop a highly sensitive and rapid nucleic acid detection method for the severe acute respiratory syndrome coronavirus 2(SARS-CoV-2).Methods We designed,developed,and manufactured an integrated disposab...Objective To develop a highly sensitive and rapid nucleic acid detection method for the severe acute respiratory syndrome coronavirus 2(SARS-CoV-2).Methods We designed,developed,and manufactured an integrated disposable device for SARS-CoV-2 nucleic acid extraction and detection.The precision of the liquid transfer and temperature control was tested.A comparison between our device and a commercial kit for SARS-Cov-2 nucleic acid extraction was performed using real-time fluorescence reverse transcription polymerase chain reaction(RT-PCR).The entire process,from SARS-CoV-2 nucleic acid extraction to amplification,was evaluated.Results The precision of the syringe transfer volume was 19.2±1.9μL(set value was 20),32.2±1.6(set value was 30),and 57.2±3.5(set value was 60).Temperature control in the amplification tube was measured at 60.0±0.0℃(set value was 60)and 95.1±0.2℃(set value was 95)respectively.SARS-Cov-2 nucleic acid extraction yield through the device was 7.10×10^(6) copies/mL,while a commercial kit yielded 2.98×10^(6) copies/mL.The mean time to complete the entire assay,from SARS-CoV-2 nucleic acid extraction to amplification detection,was 36 min and 45 s.The detection limit for SARS-CoV-2 nucleic acid was 250 copies/mL.Conclusion The integrated disposable devices may be used for SARS-CoV-2 Point-of-Care test(POCT).展开更多
A self-organized integrated air-ground detection swarmis tentatively applied to achieve reentry vehicle landing detection,such as searching and rescuing a manned spaceship. The detectionswarm consists of multiple unma...A self-organized integrated air-ground detection swarmis tentatively applied to achieve reentry vehicle landing detection,such as searching and rescuing a manned spaceship. The detectionswarm consists of multiple unmanned aerial vehicles (UAVs)and unmanned ground vehicles (UGVs). The UAVs can accessa detected object quickly for high mobility, while the UGVs cancomprehensively investigate the object due to the variety of carriedequipment. In addition, the integrated air-ground detectionswarm is capable of detecting from the ground and the air simultaneously.To accomplish the coordination of the UGVs andUAVs, they are all regarded as individuals of the artificial swarm.Those individuals make control decisions independently of othersbased on the self-organizing strategy. The overall requirements forthe detection swarm are analyzed, and the theoretical model ofthe self-organizing strategy based on a combined individual andenvironmental virtual function is established. The numerical investigationproves that the self-organizing strategy is suitable andscalable to control the detection swarm. To further inspect the engineeringreliability, an experiment set is established in laboratory,and the experimental demonstration shows that the self-organizingstrategy drives the detection swarm forming a close range and multiangularsurveillance configuration of a landing spot.展开更多
The integrated circuit chip with high performance has a high sensitivity to the defects in manufacturing environments.When there are defects on a wafer,the defects may lead to the degradation of chip performance.It is...The integrated circuit chip with high performance has a high sensitivity to the defects in manufacturing environments.When there are defects on a wafer,the defects may lead to the degradation of chip performance.It is necessary to design effective detection approaches for the defects in order to ensure the reliability of wafer.In this paper,a new method based on image boundary extraction is presented for the detection of defects on a wafer.The method uses island model genetic algorithms to perform the segmentation of wafer images,and gets the optimal threshold values.The island model genetic algorithm uses two distinct subpopulations,it is a coarse grain parallel model.The individuals migration can occur between the two subpopulations to share genetic materials.A lot of experimental results show that the defect detection method proposed in this paper can obtain the features of defects effectively.展开更多
In the Internet, computers and network equipments are threatened by malicious intrusion, which seriously affects the security of the network. Intrusion behavior has the characteristics of fast upgrade, strong concealm...In the Internet, computers and network equipments are threatened by malicious intrusion, which seriously affects the security of the network. Intrusion behavior has the characteristics of fast upgrade, strong concealment and randomness, so that traditional methods of intrusion detection?system (IDS) are difficult to prevent the attacks effectively. In this paper, an integrated network?intrusion detection algorithm by combining support vector machine (SVM) with AdaBoost was?presented. The SVM is used to construct base classifiers, and the AdaBoost is used for training?these learning modules and generating the final intrusion detection model by iterating to update the weight of samples and detection model, until the number of iterations or the accuracy of detection model achieves target setting. The effectiveness of the proposed IDS is evaluated using?DARPA99 datasets. Accuracy, a criterion, is used to evaluate the detection performance of the proposed IDS. Experimental results show that it achieves better performance when compared?with two state-of-the-art IDS.展开更多
This study established a novel method for the simultaneous detection of two-component gases.Radio frequency(RF)white noise disturbance laser current and wavelength modulation were simultaneously used to improve the of...This study established a novel method for the simultaneous detection of two-component gases.Radio frequency(RF)white noise disturbance laser current and wavelength modulation were simultaneously used to improve the off-axis integrated cavity output spectroscopy technique,and a high-precision dual modulation OA-ICOS(RF-WM-OA-ICOS)system was established.The two laser beams were coupled into one laser beam that was applied incident to the cavity of RF-WM-OA-ICOS system.The second harmonic signals of CH_(4)and CO_(2)gas simultaneously appeared in the rising or falling edge of a triangular wave.This method was used to measure CH_(4)and CO_(2)with different concentrations.The results indicated that the proposed system has high stability and can accurately and simultaneously measure the concentrations of CH_(4)and CO_(2),with an optimal integration time of 220 s.The minimum detection limit was 10 ppb for CH_(4)and 1.5 ppm for CO_(2).The corresponding noise equivalent absorption sensitivity values were calculated as 2.67×10^(-13)cm^(-1)·Hz^(-1/2)and 5.18×10^(-11)cm^(-1)·Hz^(-1/2),respectively.The proposed dual-component gas simultaneous detection method can also be used for high-precision simultaneous detection of other gases.Therefore,this study may serve as a reference for developing portable multicomponent gas analyzers.展开更多
Gravimetric resonant-inspired biosensors have attracted increasing attention in industrial and point-ofcare applications,enabling label-free detection of biomarkers such as DNA and antibodies.Capacitive micromachined ...Gravimetric resonant-inspired biosensors have attracted increasing attention in industrial and point-ofcare applications,enabling label-free detection of biomarkers such as DNA and antibodies.Capacitive micromachined ultrasonic transducers(CMUTs)are promising tools for developing miniaturized highperformance biosensing complementary metal–oxide–silicon(CMOS)platforms.However,their operability is limited by inefficient functionalization,aggregation,crosstalk in the buffer,and the requirement for an external high-voltage(HV)power supply.In this study,we aimed to propose a CMUTs-based resonant biosensor integrated with a CMOS front–end interface coupled with ethylene–glycol alkanethiols to detect single-stranded DNA oligonucleotides with large specificity.The topography of the functionalized surface was characterized by energy-dispersive X-ray microanalysis.Improved selectivity for onchip hybridization was demonstrated by comparing complementary and non-complementary singlestranded DNA oligonucleotides using fluorescence imaging technology.The sensor array was further characterized using a five-element lumped equivalent model.The 4 mm^(2) application-specific integrated circuit chip was designed and developed through 0.18 lm HV bipolar-CMOS-double diffused metal–oxide–silicon(DMOS)technology(BCD)to generate on-chip 20 V HV boosting and to track feedback frequency under a standard 1.8 V supply,with a total power consumption of 3.8 mW in a continuous mode.The measured results indicated a detection sensitivity of 7.943×10^(-3) lmol·L^(-1)·Hz^(-1) over a concentration range of 1 to 100 lmol·L^(-1).In conclusion,the label-free biosensing of DNA under dry conditions was successfully demonstrated using a microfabricated CMUT array with a 2 MHz frequency on CMOS electronics with an internal HV supplier.Moreover,ethylene–glycol alkanethiols successfully deposited self-assembled monolayers on aluminum electrodes,which has never been attempted thus far on CMUTs,to enhance the selectivity of bio-functionalization.The findings of this study indicate the possibility of full-on-chip DNA biosensing with CMUTs.展开更多
Python is widely used in web crawler, machine learning, data analysis and so on. However, there is no guarantee that Python scripts are trusted in their whole lifetime because of system insecurity. When the system is ...Python is widely used in web crawler, machine learning, data analysis and so on. However, there is no guarantee that Python scripts are trusted in their whole lifetime because of system insecurity. When the system is attacked, scripts in the computer are likely to be tampered with. Therefore, the trustworthiness of Python scripts needs to be checked through different configuration strategies, including integrity verification and vulnerability detection. In this paper, integrity verification and vulnerability detection are based on two Python scripts, an original Python script and a current Python script, and the original Python script is assumed to has no vulnerabilities. By comparing with the original script, we can find out whether the current script is integrity or not and detect whether there are vulnerabilities if the integrity of the current file is destroyed. Integrity verification with Hash functions is not applied in some cases. In this mode, any changes including blank lines added are considered illegal. So loose integrity verification by combining UNIX diff tool with abstract syntax trees is proposed. The vulnerability detection starts from the premise that the original Python script has no vulnerabilities, and taint analysis is applied on the vulnerability detection framework Bandit to find vulnerabilities. Besides, in order not to change the usage of Python, both integrity verification and vulnerability detection modules are embedded in Python interpreter. The experiments show that the performance of security analysis framework is good and Bandit with taint can greatly reduce the false positive results without affecting the performance.展开更多
To detect highly maneuvering radar targets in low signal-to-noise ratio conditions, a hybrid long-time integration method is proposed, which combines Radon-Fourier Transform(RFT), Dynamic Programming(DP), and Binary I...To detect highly maneuvering radar targets in low signal-to-noise ratio conditions, a hybrid long-time integration method is proposed, which combines Radon-Fourier Transform(RFT), Dynamic Programming(DP), and Binary Integration(BI), named RFT-DP-BI. A Markov model with unified range-velocity quantification is formulated to describe the maneuvering target’s motion. Based on this model, long-time hybrid integration is performed. Firstly, the whole integration time is divided into multiple time segments and coherent integration is performed in each segment via RFT. Secondly, non-coherent integration is performed in all segments via DP. Thirdly, 2/4 binary integration is performed to further improve the detection performance. Finally, the detection results are exported together with target range and velocity trajectories. The proposed method can perform the long-time integration of highly maneuvering targets with arbitrary forms of motion.Additionally, it has a low computational cost that is linear to the integration time. Both simulated and real radar data demonstrate that it offers good detection and estimation performances.展开更多
This paper used the statistical methods of quality control to assess receiver autonomous integrity monitoring(RAIM) availability and fault detection(FD) capability of BeiDou14(Phase II with 14 satellites),BeiDou(Phase...This paper used the statistical methods of quality control to assess receiver autonomous integrity monitoring(RAIM) availability and fault detection(FD) capability of BeiDou14(Phase II with 14 satellites),BeiDou(Phase III with 35 satellites) and GPS(with 31 satellites) for the first time. The three constellations are simulated and their RAIM performances are quantified by the global, Asia-Pacific region and temporal variations respectively. RAIM availability must be determined before RAIM detection. It is proposed that RAIM availability performances from satellites and constellation geometry configuration are evaluated by the number of visible satellites(NVS, NVS > 5) and geometric dilution of precision(GDOP, GDOP < 6) together. The minimal detectable bias(MDB) and minimal detectable effect(MDE) are considered as a measure of the minimum FD capability of RAIM in the measurement level and navigation position level respectively. The analyses of simulation results testify that the average global RAIM performances for BeiDou are better than that for GPS except global RAIM holes proportion. Moreover, the Asia-Pacific RAIM performances for BeiDou are much better than that for GPS in all indexes. RAIM availability from constellation geometry configuration and RAIM minimum FD capability for BeiDou14 are better than that for GPS in Asia-Pacific region in all cases, but the BeiDou14 RAIM availability from satellites are worse than GPS's. The methods and conclusions can be used for RAIM prediction and real-time assessment of all kinds of Global Navigation Satellite Systems(GNSS) constellation.展开更多
To ensure the structural integrity of life-limiting component of aeroengines,Probabilistic Damage Tolerance(PDT)assessment is applied to evaluate the failure risk as required by airworthiness regulations and military ...To ensure the structural integrity of life-limiting component of aeroengines,Probabilistic Damage Tolerance(PDT)assessment is applied to evaluate the failure risk as required by airworthiness regulations and military standards.The PDT method holds the view that there exist defects such as machining scratches and service cracks in the tenon-groove structures of aeroengine disks.However,it is challenging to conduct PDT assessment due to the scarcity of effective Probability of Detection(POD)model and anomaly distribution model.Through a series of Nondestructive Testing(NDT)experiments,the POD model of real cracks in tenon-groove structures is constructed for the first time by employing the Transfer Function Method(TFM).A novel anomaly distribution model is derived through the utilization of the POD model,instead of using the infeasible field data accumulation method.Subsequently,a framework for calculating the Probability of Failure(POF)of the tenon-groove structures is established,and the aforementioned two models exert a significant influence on the results of POF.展开更多
Aiming at the problem that it is difficult to locate all the aperture positions of the large size component using Houghcircle detection method,this article presents a non-contact measurement method combining the integ...Aiming at the problem that it is difficult to locate all the aperture positions of the large size component using Houghcircle detection method,this article presents a non-contact measurement method combining the integral imaging technology withHough circle detection algorithm.Firstly,a set of integral imaging information acquisition algorithms were proposed accordingto the classical imaging theory.Secondly,the camera array experiment device was built by using two-dimensional translationstage and charge coupled device(CCD)camera.When the system is operating,element image array captured with the camera isused to achieve the positioning of the component aperture using Hough circle detection and coordinate acquisition algorithm.Based on the above theory,a verification experiment was carried out.The results show that the detection error of the componentaperture position is within0.3mm,which provides effective theoretical support for the application of integral imagingtechnology in high precision detection展开更多
With the rapid growth of the low-altitude economy,the demand for typical low-altitude ap-plications has accelerated the advancement of inte-grated sensing and communications(ISAC)networks.This paper begins by analyzin...With the rapid growth of the low-altitude economy,the demand for typical low-altitude ap-plications has accelerated the advancement of inte-grated sensing and communications(ISAC)networks.This paper begins by analyzing representative ap-plication scenarios to clarify the core requirements of the low-altitude economy for modern ISAC net-works.By investigating the distinctive characteris-tics of ISAC networks in low-altitude environments,it presents a comprehensive analysis of key challenges and identifies four major issues:challenges in pre-cise target detection,interference management,in-consistent sensing and communication coverage,and the complexity of air-ground coordination and han-dover.Based on fundamental theories and principles,the paper proposes corresponding solutions,encom-passing advanced technologies for precise target de-tection and recognition,high-reliability networked de-tection,robust interference management,and seamless air-ground collaboration.These solutions aim to es-tablish a solid foundation for the future development of intelligent low-altitude networks and ensure effec-tive support for emerging applications.展开更多
The increasing fluency of advanced language models,such as GPT-3.5,GPT-4,and the recently introduced DeepSeek,challenges the ability to distinguish between human-authored and AI-generated academic writing.This situati...The increasing fluency of advanced language models,such as GPT-3.5,GPT-4,and the recently introduced DeepSeek,challenges the ability to distinguish between human-authored and AI-generated academic writing.This situation is raising significant concerns regarding the integrity and authenticity of academic work.In light of the above,the current research evaluates the effectiveness of Bidirectional Long Short-TermMemory(BiLSTM)networks enhanced with pre-trained GloVe(Global Vectors for Word Representation)embeddings to detect AIgenerated scientific Abstracts drawn from the AI-GA(Artificial Intelligence Generated Abstracts)dataset.Two core BiLSTM variants were assessed:a single-layer approach and a dual-layer design,each tested under static or adaptive embeddings.The single-layer model achieved nearly 97%accuracy with trainable GloVe,occasionally surpassing the deeper model.Despite these gains,neither configuration fully matched the 98.7%benchmark set by an earlier LSTMWord2Vec pipeline.Some runs were over-fitted when embeddings were fine-tuned,whereas static embeddings offered a slightly lower yet stable accuracy of around 96%.This lingering gap reinforces a key ethical and procedural concern:relying solely on automated tools,such as Turnitin’s AI-detection features,to penalize individuals’risks and unjust outcomes.Misclassifications,whether legitimate work is misread as AI-generated or engineered text,evade detection,demonstrating that these classifiers should not stand as the sole arbiters of authenticity.Amore comprehensive approach is warranted,one which weaves model outputs into a systematic process supported by expert judgment and institutional guidelines designed to protect originality.展开更多
基金supported by Science and Technology Innovation Programfor Postgraduate Students in IDP Subsidized by Fundamental Research Funds for the Central Universities(Project No.ZY20240335)support of the Research Project of the Key Technology of Malicious Code Detection Based on Data Mining in APT Attack(Project No.2022IT173)the Research Project of the Big Data Sensitive Information Supervision Technology Based on Convolutional Neural Network(Project No.2022011033).
文摘Previous studies have shown that deep learning is very effective in detecting known attacks.However,when facing unknown attacks,models such as Deep Neural Networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neural Networks(CNN)combined with LSTM,and so on are built by simple stacking,which has the problems of feature loss,low efficiency,and low accuracy.Therefore,this paper proposes an autonomous detectionmodel for Distributed Denial of Service attacks,Multi-Scale Convolutional Neural Network-Bidirectional Gated Recurrent Units-Single Headed Attention(MSCNN-BiGRU-SHA),which is based on a Multistrategy Integrated Zebra Optimization Algorithm(MI-ZOA).The model undergoes training and testing with the CICDDoS2019 dataset,and its performance is evaluated on a new GINKS2023 dataset.The hyperparameters for Conv_filter and GRU_unit are optimized using the Multi-strategy Integrated Zebra Optimization Algorithm(MIZOA).The experimental results show that the test accuracy of the MSCNN-BiGRU-SHA model based on the MIZOA proposed in this paper is as high as 0.9971 in the CICDDoS 2019 dataset.The evaluation accuracy of the new dataset GINKS2023 created in this paper is 0.9386.Compared to the MSCNN-BiGRU-SHA model based on the Zebra Optimization Algorithm(ZOA),the detection accuracy on the GINKS2023 dataset has improved by 5.81%,precisionhas increasedby 1.35%,the recallhas improvedby 9%,and theF1scorehas increasedby 5.55%.Compared to the MSCNN-BiGRU-SHA models developed using Grid Search,Random Search,and Bayesian Optimization,the MSCNN-BiGRU-SHA model optimized with the MI-ZOA exhibits better performance in terms of accuracy,precision,recall,and F1 score.
基金Supported by the National Key Research and Development Program of China(2022YFA1404602)the Strategic Priority Research Program of the Chinese Academy of Sciences(XDB0580000)+3 种基金the National Natural Science Foundation of China(U23B2045,62305362)the Program of Shanghai Academic/Technology Research Leader(22XD1424400)the Fund of SITP Innovation Foundation(CX-461 and CX-522)Special Project to Seize the Commanding Heights of Science and Technology of Chinese Academy of Sciences,subtopic(GJ0090406-6).
文摘The polarization properties of light are widely applied in imaging,communications,materials analy⁃sis,and life sciences.Various methods have been developed that can measure the polarization information of a target.However,conventional polarization detection systems are often bulky and complex,limiting their poten⁃tial for broader applications.To address the challenges of miniaturization,integrated polarization detectors have been extensively explored in recent years,achieving significant advancements in performance and functionality.In this review,we focus mainly on integrated polarization detectors with innovative features,including infinitely high polarization discrimination,ultrahigh sensitivity to polarization state change,full Stokes parameters measure⁃ment,and simultaneous perception of polarization and other key properties of light.Lastly,we discuss the oppor⁃tunities and challenges for the future development of integrated polarization photodetectors.
基金co-supported by the National Natural Science Foundation of China(No.61153002)the Aeronautical Science Foundation of China(No.20130153002)
文摘In micro-electro-mechanical system based inertial navigation system(MEMS-INS)/global position system(GPS) integrated navigation systems, there exist unknown disturbances and abnormal measurements. In order to obtain high estimation accuracy and enhance detection sensitivity to faults in measurements, this paper deals with the problem of model-based robust estimation(RE) and fault detection(FD). A filter gain matrix and a post-filter are designed to obtain a RE and FD algorithm with current measurements, which is different from most of the existing priori filters using measurements in one-step delay. With the designed filter gain matrix, the H-infinity norm of the transfer function from noise inputs to estimation error outputs is limited within a certain range; with the designed post-filter, the residual signal is robust to disturbances but sensitive to faults. Therefore, the algorithm can guarantee small estimation errors in the presence of disturbances and have high sensitivity to faults. The proposed method is evaluated in an integrated navigation system, and the simulation results show that it is more effective in position estimation and fault signal detection than priori RE and FD algorithms.
基金supported by the National Key Research and Development Program of China(No.2023YFB4302804)the National Natural Science Foundation of China(Nos.U2233217,62371029,62471023,62301016,and 62101015)。
文摘The snapshot Fault Detection(FD)algorithm of Advanced Receiver Autonomous Integrity Monitoring(ARAIM)necessitates the allocation of continuity and integrity risk requirements from the operational exposure time level to the single epoch level.Current studies primarily focus on finding a conservative Number of Effective Samples(NES)as a risk mapping factor.However,considering that the NES varies with the observation environment and the type of the fault mode,applying a fixed NES can constrain the performance of the algorithm.To address this issue,the continuity and integrity risks over the operational exposure time are analyzed and bounded based on all epochs within the exposure time.A more adaptable method for continuity and integrity budget allocation over the operational exposure time is presented,capable of monitoring the continuity and integrity risks over the recent operational exposure time in real time,and dynamically adjusting the allocation values based on the current observation environment.Simulation results demonstrate that,compared with the allocation method based on a fixed NES,ARAIM based on the proposed allocation method exhibits superior performance in terms of the availability.At an FD execution frequency equal to the required Time-To-Alert(TTA),the dual-constellation H-ARAIM provides 100%of the global coverage with 99.5%availability of the RNP 0.1 service,and the dual-constellation V-ARAIM provides 86.38%of the global coverage with 99.5%availability of the LPV-200 service.
基金supported by the National Natural Science Foundation of China(6063403060702066)+1 种基金the Aerospace Science Foundation(20090853013)Fundmental Research Foundation of NWPU(JC201015),Soaring Star of NWPU
文摘In detecting system fault algorithms,the false alarm rate and undectect rate generated by residual Chi-square test can affect the stability of filters.The paper proposes a fault detection algorithm based on sequential residual Chi-square test and applies to fault detection of an integrated navigation system.The simulation result shows that the algorithm can accurately detect the fault information of global positioning system(GPS),eliminate the influence of false alarm and missed detection on filter,and enhance fault tolerance of integrated navigation systems.
基金supported by National Natural Science Foundation of China (Nos. 61473099 and 61333001)
文摘This paper considers the guidance and control problem of a flight vehicle with sidewindow detection. In order to guarantee the target remaining in the seeker's sight of view, the line of sight and the attitude of the flight vehicle should be under some constraints caused by the sidewindow, which leads to coupling between the guidance and the attitude dynamics model. To deal with the side-window constraints and the coupling, a novel Integrated Guidance and Control(IGC)design approach is proposed. Firstly, the relative motion equations are derived in the body-Line of Sight(LOS) coordinate system. And the guidance and control problem of the flight vehicle is formulated into an IGC problem with state constraints. Then, based on the singular perturbation method, the IGC problem is decomposed into the control design of the quasi-steady-state subsystem and the boundary-layer subsystem which can be designed separately. Finally, the receding horizon control is applied to the control design for the two subsystems. Simulation results show the effectiveness of the proposed approach.
基金supported by the National Natural Science Foundation of China under Grant 62071364in part by the Aeronautical Science Foundation of China under Grant 2020Z073081001+2 种基金in part by the Fundamental Research Funds for the Central Universities under Grant JB210104in part by the Shaanxi Provincial Key Research and Development Program under Grant 2019GY-043in part by the 111 Project under Grant B08038。
文摘Passive detection of moving target is an important part of intelligent surveillance. Satellite has the potential to play a key role in many applications of space-air-ground integrated networks(SAGIN). In this paper, we propose a novel intelligent passive detection method for aerial target based on reservoir computing networks. Specifically, delayed feedback networks are utilized to refine the direct signals from the satellite in the reference channels. In addition, the satellite direct wave interference in the monitoring channels adopts adaptive interference suppression using the minimum mean square error filter. Furthermore, we employ decoupling echo state networks to predict the clutter interference in the monitoring channels and construct the detection statistics accordingly. Finally, a multilayer perceptron is adopted to detect the echo signal after interference suppression. Extensive simulations is conducted to evaluate the performance of our proposed method. Results show that the detection probability is almost 100% when the signal-to-interference ratio of echo signal is-36 dB, which demonstrates that our proposed method achieves efficient passive detection for aerial targets in typical SAGIN scenarios.
基金supported by National Key R&D Program of China[2021YFC2301103 and 2022YFE0202600]Shenzhen Science and Technology Program[JSGG20220606142605011].
文摘Objective To develop a highly sensitive and rapid nucleic acid detection method for the severe acute respiratory syndrome coronavirus 2(SARS-CoV-2).Methods We designed,developed,and manufactured an integrated disposable device for SARS-CoV-2 nucleic acid extraction and detection.The precision of the liquid transfer and temperature control was tested.A comparison between our device and a commercial kit for SARS-Cov-2 nucleic acid extraction was performed using real-time fluorescence reverse transcription polymerase chain reaction(RT-PCR).The entire process,from SARS-CoV-2 nucleic acid extraction to amplification,was evaluated.Results The precision of the syringe transfer volume was 19.2±1.9μL(set value was 20),32.2±1.6(set value was 30),and 57.2±3.5(set value was 60).Temperature control in the amplification tube was measured at 60.0±0.0℃(set value was 60)and 95.1±0.2℃(set value was 95)respectively.SARS-Cov-2 nucleic acid extraction yield through the device was 7.10×10^(6) copies/mL,while a commercial kit yielded 2.98×10^(6) copies/mL.The mean time to complete the entire assay,from SARS-CoV-2 nucleic acid extraction to amplification detection,was 36 min and 45 s.The detection limit for SARS-CoV-2 nucleic acid was 250 copies/mL.Conclusion The integrated disposable devices may be used for SARS-CoV-2 Point-of-Care test(POCT).
基金supported by the National Natural Science Foundation of China(11002076)the National High Technology Research and Development Program of China(863 Program)(2014AA7041002)
文摘A self-organized integrated air-ground detection swarmis tentatively applied to achieve reentry vehicle landing detection,such as searching and rescuing a manned spaceship. The detectionswarm consists of multiple unmanned aerial vehicles (UAVs)and unmanned ground vehicles (UGVs). The UAVs can accessa detected object quickly for high mobility, while the UGVs cancomprehensively investigate the object due to the variety of carriedequipment. In addition, the integrated air-ground detectionswarm is capable of detecting from the ground and the air simultaneously.To accomplish the coordination of the UGVs andUAVs, they are all regarded as individuals of the artificial swarm.Those individuals make control decisions independently of othersbased on the self-organizing strategy. The overall requirements forthe detection swarm are analyzed, and the theoretical model ofthe self-organizing strategy based on a combined individual andenvironmental virtual function is established. The numerical investigationproves that the self-organizing strategy is suitable andscalable to control the detection swarm. To further inspect the engineeringreliability, an experiment set is established in laboratory,and the experimental demonstration shows that the self-organizingstrategy drives the detection swarm forming a close range and multiangularsurveillance configuration of a landing spot.
基金supported by Guangdong Provincial Natural Science Foundation of China (7005833)
文摘The integrated circuit chip with high performance has a high sensitivity to the defects in manufacturing environments.When there are defects on a wafer,the defects may lead to the degradation of chip performance.It is necessary to design effective detection approaches for the defects in order to ensure the reliability of wafer.In this paper,a new method based on image boundary extraction is presented for the detection of defects on a wafer.The method uses island model genetic algorithms to perform the segmentation of wafer images,and gets the optimal threshold values.The island model genetic algorithm uses two distinct subpopulations,it is a coarse grain parallel model.The individuals migration can occur between the two subpopulations to share genetic materials.A lot of experimental results show that the defect detection method proposed in this paper can obtain the features of defects effectively.
文摘In the Internet, computers and network equipments are threatened by malicious intrusion, which seriously affects the security of the network. Intrusion behavior has the characteristics of fast upgrade, strong concealment and randomness, so that traditional methods of intrusion detection?system (IDS) are difficult to prevent the attacks effectively. In this paper, an integrated network?intrusion detection algorithm by combining support vector machine (SVM) with AdaBoost was?presented. The SVM is used to construct base classifiers, and the AdaBoost is used for training?these learning modules and generating the final intrusion detection model by iterating to update the weight of samples and detection model, until the number of iterations or the accuracy of detection model achieves target setting. The effectiveness of the proposed IDS is evaluated using?DARPA99 datasets. Accuracy, a criterion, is used to evaluate the detection performance of the proposed IDS. Experimental results show that it achieves better performance when compared?with two state-of-the-art IDS.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62005108 and 62205134)the National Key Research and Development Program of China(Grant No.2022YFC2807701)the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province,China(Grant Nos.20KJB140009 and 21KJB140008)。
文摘This study established a novel method for the simultaneous detection of two-component gases.Radio frequency(RF)white noise disturbance laser current and wavelength modulation were simultaneously used to improve the off-axis integrated cavity output spectroscopy technique,and a high-precision dual modulation OA-ICOS(RF-WM-OA-ICOS)system was established.The two laser beams were coupled into one laser beam that was applied incident to the cavity of RF-WM-OA-ICOS system.The second harmonic signals of CH_(4)and CO_(2)gas simultaneously appeared in the rising or falling edge of a triangular wave.This method was used to measure CH_(4)and CO_(2)with different concentrations.The results indicated that the proposed system has high stability and can accurately and simultaneously measure the concentrations of CH_(4)and CO_(2),with an optimal integration time of 220 s.The minimum detection limit was 10 ppb for CH_(4)and 1.5 ppm for CO_(2).The corresponding noise equivalent absorption sensitivity values were calculated as 2.67×10^(-13)cm^(-1)·Hz^(-1/2)and 5.18×10^(-11)cm^(-1)·Hz^(-1/2),respectively.The proposed dual-component gas simultaneous detection method can also be used for high-precision simultaneous detection of other gases.Therefore,this study may serve as a reference for developing portable multicomponent gas analyzers.
基金supported by the National Key Research and Development Program of China(2022YFB3205400)the National Natural Science Foundation of China(52275570)+1 种基金the Postdoctoral Innovation Talents Support Program(BX20230288)the Postdoctoral Science Foundation of Shaanxi Province(2018BSHEDZZ08).
文摘Gravimetric resonant-inspired biosensors have attracted increasing attention in industrial and point-ofcare applications,enabling label-free detection of biomarkers such as DNA and antibodies.Capacitive micromachined ultrasonic transducers(CMUTs)are promising tools for developing miniaturized highperformance biosensing complementary metal–oxide–silicon(CMOS)platforms.However,their operability is limited by inefficient functionalization,aggregation,crosstalk in the buffer,and the requirement for an external high-voltage(HV)power supply.In this study,we aimed to propose a CMUTs-based resonant biosensor integrated with a CMOS front–end interface coupled with ethylene–glycol alkanethiols to detect single-stranded DNA oligonucleotides with large specificity.The topography of the functionalized surface was characterized by energy-dispersive X-ray microanalysis.Improved selectivity for onchip hybridization was demonstrated by comparing complementary and non-complementary singlestranded DNA oligonucleotides using fluorescence imaging technology.The sensor array was further characterized using a five-element lumped equivalent model.The 4 mm^(2) application-specific integrated circuit chip was designed and developed through 0.18 lm HV bipolar-CMOS-double diffused metal–oxide–silicon(DMOS)technology(BCD)to generate on-chip 20 V HV boosting and to track feedback frequency under a standard 1.8 V supply,with a total power consumption of 3.8 mW in a continuous mode.The measured results indicated a detection sensitivity of 7.943×10^(-3) lmol·L^(-1)·Hz^(-1) over a concentration range of 1 to 100 lmol·L^(-1).In conclusion,the label-free biosensing of DNA under dry conditions was successfully demonstrated using a microfabricated CMUT array with a 2 MHz frequency on CMOS electronics with an internal HV supplier.Moreover,ethylene–glycol alkanethiols successfully deposited self-assembled monolayers on aluminum electrodes,which has never been attempted thus far on CMUTs,to enhance the selectivity of bio-functionalization.The findings of this study indicate the possibility of full-on-chip DNA biosensing with CMUTs.
基金Supported by the National Natural Science Foundation of China(61572066)
文摘Python is widely used in web crawler, machine learning, data analysis and so on. However, there is no guarantee that Python scripts are trusted in their whole lifetime because of system insecurity. When the system is attacked, scripts in the computer are likely to be tampered with. Therefore, the trustworthiness of Python scripts needs to be checked through different configuration strategies, including integrity verification and vulnerability detection. In this paper, integrity verification and vulnerability detection are based on two Python scripts, an original Python script and a current Python script, and the original Python script is assumed to has no vulnerabilities. By comparing with the original script, we can find out whether the current script is integrity or not and detect whether there are vulnerabilities if the integrity of the current file is destroyed. Integrity verification with Hash functions is not applied in some cases. In this mode, any changes including blank lines added are considered illegal. So loose integrity verification by combining UNIX diff tool with abstract syntax trees is proposed. The vulnerability detection starts from the premise that the original Python script has no vulnerabilities, and taint analysis is applied on the vulnerability detection framework Bandit to find vulnerabilities. Besides, in order not to change the usage of Python, both integrity verification and vulnerability detection modules are embedded in Python interpreter. The experiments show that the performance of security analysis framework is good and Bandit with taint can greatly reduce the false positive results without affecting the performance.
基金supported by the National Natural Science Foundation of China(No.6157010118)。
文摘To detect highly maneuvering radar targets in low signal-to-noise ratio conditions, a hybrid long-time integration method is proposed, which combines Radon-Fourier Transform(RFT), Dynamic Programming(DP), and Binary Integration(BI), named RFT-DP-BI. A Markov model with unified range-velocity quantification is formulated to describe the maneuvering target’s motion. Based on this model, long-time hybrid integration is performed. Firstly, the whole integration time is divided into multiple time segments and coherent integration is performed in each segment via RFT. Secondly, non-coherent integration is performed in all segments via DP. Thirdly, 2/4 binary integration is performed to further improve the detection performance. Finally, the detection results are exported together with target range and velocity trajectories. The proposed method can perform the long-time integration of highly maneuvering targets with arbitrary forms of motion.Additionally, it has a low computational cost that is linear to the integration time. Both simulated and real radar data demonstrate that it offers good detection and estimation performances.
基金the National High Technology Research and Development Program(863)of China(No.2011AA120503)
文摘This paper used the statistical methods of quality control to assess receiver autonomous integrity monitoring(RAIM) availability and fault detection(FD) capability of BeiDou14(Phase II with 14 satellites),BeiDou(Phase III with 35 satellites) and GPS(with 31 satellites) for the first time. The three constellations are simulated and their RAIM performances are quantified by the global, Asia-Pacific region and temporal variations respectively. RAIM availability must be determined before RAIM detection. It is proposed that RAIM availability performances from satellites and constellation geometry configuration are evaluated by the number of visible satellites(NVS, NVS > 5) and geometric dilution of precision(GDOP, GDOP < 6) together. The minimal detectable bias(MDB) and minimal detectable effect(MDE) are considered as a measure of the minimum FD capability of RAIM in the measurement level and navigation position level respectively. The analyses of simulation results testify that the average global RAIM performances for BeiDou are better than that for GPS except global RAIM holes proportion. Moreover, the Asia-Pacific RAIM performances for BeiDou are much better than that for GPS in all indexes. RAIM availability from constellation geometry configuration and RAIM minimum FD capability for BeiDou14 are better than that for GPS in Asia-Pacific region in all cases, but the BeiDou14 RAIM availability from satellites are worse than GPS's. The methods and conclusions can be used for RAIM prediction and real-time assessment of all kinds of Global Navigation Satellite Systems(GNSS) constellation.
基金supported by the National Major Science and Technology Project,China(No.J2019-Ⅳ-0007-0075)the Fundamental Research Funds for the Central Universities,China(No.JKF-20240036)。
文摘To ensure the structural integrity of life-limiting component of aeroengines,Probabilistic Damage Tolerance(PDT)assessment is applied to evaluate the failure risk as required by airworthiness regulations and military standards.The PDT method holds the view that there exist defects such as machining scratches and service cracks in the tenon-groove structures of aeroengine disks.However,it is challenging to conduct PDT assessment due to the scarcity of effective Probability of Detection(POD)model and anomaly distribution model.Through a series of Nondestructive Testing(NDT)experiments,the POD model of real cracks in tenon-groove structures is constructed for the first time by employing the Transfer Function Method(TFM).A novel anomaly distribution model is derived through the utilization of the POD model,instead of using the infeasible field data accumulation method.Subsequently,a framework for calculating the Probability of Failure(POF)of the tenon-groove structures is established,and the aforementioned two models exert a significant influence on the results of POF.
基金National Natural Science Foundation of China(No.61172120)National Key Science Foundation of Tianjin(No.13JCZDJC34800)
文摘Aiming at the problem that it is difficult to locate all the aperture positions of the large size component using Houghcircle detection method,this article presents a non-contact measurement method combining the integral imaging technology withHough circle detection algorithm.Firstly,a set of integral imaging information acquisition algorithms were proposed accordingto the classical imaging theory.Secondly,the camera array experiment device was built by using two-dimensional translationstage and charge coupled device(CCD)camera.When the system is operating,element image array captured with the camera isused to achieve the positioning of the component aperture using Hough circle detection and coordinate acquisition algorithm.Based on the above theory,a verification experiment was carried out.The results show that the detection error of the componentaperture position is within0.3mm,which provides effective theoretical support for the application of integral imagingtechnology in high precision detection
基金supported by National Science and Technology Major Project of China(Project Number:2024ZD1300100)Fundamental Research Funds for the central universities(2024RC02)+1 种基金National Natural Science Foundation of China(62401077,62321001)Beijing Municipal Natural Science Foundation(L232003)。
文摘With the rapid growth of the low-altitude economy,the demand for typical low-altitude ap-plications has accelerated the advancement of inte-grated sensing and communications(ISAC)networks.This paper begins by analyzing representative ap-plication scenarios to clarify the core requirements of the low-altitude economy for modern ISAC net-works.By investigating the distinctive characteris-tics of ISAC networks in low-altitude environments,it presents a comprehensive analysis of key challenges and identifies four major issues:challenges in pre-cise target detection,interference management,in-consistent sensing and communication coverage,and the complexity of air-ground coordination and han-dover.Based on fundamental theories and principles,the paper proposes corresponding solutions,encom-passing advanced technologies for precise target de-tection and recognition,high-reliability networked de-tection,robust interference management,and seamless air-ground collaboration.These solutions aim to es-tablish a solid foundation for the future development of intelligent low-altitude networks and ensure effec-tive support for emerging applications.
文摘The increasing fluency of advanced language models,such as GPT-3.5,GPT-4,and the recently introduced DeepSeek,challenges the ability to distinguish between human-authored and AI-generated academic writing.This situation is raising significant concerns regarding the integrity and authenticity of academic work.In light of the above,the current research evaluates the effectiveness of Bidirectional Long Short-TermMemory(BiLSTM)networks enhanced with pre-trained GloVe(Global Vectors for Word Representation)embeddings to detect AIgenerated scientific Abstracts drawn from the AI-GA(Artificial Intelligence Generated Abstracts)dataset.Two core BiLSTM variants were assessed:a single-layer approach and a dual-layer design,each tested under static or adaptive embeddings.The single-layer model achieved nearly 97%accuracy with trainable GloVe,occasionally surpassing the deeper model.Despite these gains,neither configuration fully matched the 98.7%benchmark set by an earlier LSTMWord2Vec pipeline.Some runs were over-fitted when embeddings were fine-tuned,whereas static embeddings offered a slightly lower yet stable accuracy of around 96%.This lingering gap reinforces a key ethical and procedural concern:relying solely on automated tools,such as Turnitin’s AI-detection features,to penalize individuals’risks and unjust outcomes.Misclassifications,whether legitimate work is misread as AI-generated or engineered text,evade detection,demonstrating that these classifiers should not stand as the sole arbiters of authenticity.Amore comprehensive approach is warranted,one which weaves model outputs into a systematic process supported by expert judgment and institutional guidelines designed to protect originality.