Soroush Esmaeili;Ashraf Ali Khan;Mohsin Jamil;John E. Quaicoe
{"title":"Direct Trans-Inverse Ladder Inverter for Consumer Electronics","authors":"Soroush Esmaeili;Ashraf Ali Khan;Mohsin Jamil;John E. Quaicoe","doi":"10.1109/TCE.2025.3536325","DOIUrl":"https://doi.org/10.1109/TCE.2025.3536325","url":null,"abstract":"This paper presents a novel magnetic coupling inverter with a ladder switched-capacitor technique designed for home appliance. The inverter offers an elevated voltage gain while maintaining a minimal shoot-through duty ratio and achieving a notably high modulation index. As a result, the inverter produces substantial output voltage while placing minimal stress on switches, and improving the quality of the generated output voltage. Moreover, the proposed inverter employs trans-inverse magnetically coupled inductors, achieving high output voltage through a decreased turns ratio. This characteristic eliminates the necessity for a substantial number of winding turns or the extension of extra switched capacitors arranged in the ladder configuration. The proposed converter is modular, enhancing its flexibility and scalability. In contrast to existing magnetized ladder topologies, the proposed converter provides a direct DC-AC conversion without requiring an extra power switch on its DC side, which brings some advantages like simplicity, reduced losses, ease of control, modularity, cost and size effectiveness. Finally, a prototype with a power rating of 550 W suitable for 110 V, 60 Hz households has undergone testing to demonstrate the inverter’s performance.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 1","pages":"1758-1772"},"PeriodicalIF":4.3,"publicationDate":"2025-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144323085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaxi Tan;Shikai Guo;Zijian Tao;Zhiguo Yang;Hui Li
{"title":"Just-in-Time Detection of Outdated Comments in Software Development by Jointly Reasoning","authors":"Jiaxi Tan;Shikai Guo;Zijian Tao;Zhiguo Yang;Hui Li","doi":"10.1109/TCE.2025.3535632","DOIUrl":"https://doi.org/10.1109/TCE.2025.3535632","url":null,"abstract":"Code comments are a crucial source of software to learn various aspects of code. However, with the iterative upgrades of software, outdated code comments are increasingly prevalent. Inconsistencies in code comments can mislead developers and lead to potential errors. Due to the complexity of semantic information and interactions between source code and comments, previous studies have difficulty capturing the long-term and non-sequential dependencies in source code and the complex interaction information between code and comments. To address these challenges in outdated comment detection, we propose an approach named OutComDeter consists of the following four components, i.e., the data processing component, the jointly reasoning component, the feature extraction component and the outdated comment detection component. Firstly, the data processing component transforms source code and comments into edit sequences and comment sequences. Subsequently, to address the limitations of existing methods in capturing the interactive information between code and comments, the joint reasoning component employs two encoders with co-matching attention network to incorporate the joint relational information between code and comments into their respective feature representations. This joint relational information thereby contributes to the detection of outdated code comments. Furthermore, to mitigate the interference caused by the lack of long-term and non-sequential dependencies in source code for the task of outdated code comment detection, the feature extraction component leverages multi-head attention layers and dot-product attention layers to capture these dependencies, forming the final feature representations for both code and comments. Finally, the outdated comment detection will detect the outdated comments through a non-linear transformation. The experimental results indicate that OutComDeter outperforms the state-of-the-art methods in detecting outdated comments, as evidenced by higher Precision, Recall, and F1-Score. Compared to the state-of-the-art outdated comments detection methods, OutComDeter achieves an improvement in the F1-score by 70.1% compared to FracoDetector, 69.1% compared to RandomForest, and 11.5% compared to OCD respectively, which could efficiently detect Just-In-Time outdated comments.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 1","pages":"655-672"},"PeriodicalIF":4.3,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144314861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simin Mirzaei;Hamid Reza Tohidypour;Panos Nasiopoulos;Siddharth R. Vora;Shahriar Mirabbasi
{"title":"An Advanced Denoising Technique for Low-Dose CBCT Imaging: Enhancing Image Quality and Consumer Safety in Dental Diagnostics","authors":"Simin Mirzaei;Hamid Reza Tohidypour;Panos Nasiopoulos;Siddharth R. Vora;Shahriar Mirabbasi","doi":"10.1109/TCE.2025.3535668","DOIUrl":"https://doi.org/10.1109/TCE.2025.3535668","url":null,"abstract":"Cone Beam Computed Tomography (CBCT) plays a crucial role in dentistry, providing detailed imaging for diagnosis and treatment planning. However, standard CBCT imaging involves high radiation levels, raising safety concerns and driving the adoption of low-dose imaging, which often compromises image quality. This paper presents a novel denoising pipeline specifically designed to address the complex noise characteristics of low-dose CBCT images, which we have identified as resembling speckle noise. Our approach integrates advanced filtering techniques, innovative noise estimation methods, and brightness correction for 3D image reconstruction, while also leveraging the human visual system’s sensitivity to different frequencies to enhance CBCT visual quality. Experimental results demonstrate that our method outperforms state-of-the-art denoising techniques, including deep learning-based approaches, in achieving superior visual quality. This innovation not only enhances diagnostic precision but also improves patient safety, setting a new benchmark for image quality in dental care.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 1","pages":"796-807"},"PeriodicalIF":4.3,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144314862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinyue Long;Shikai Guo;Yu Chai;Hui Li;Sumaira Ameer Jan;Qian Ma;Qiao Ning
{"title":"Lingual-Fusion Adapter-Based Transfer Learning for Low-Resource Code Vulnerability Detection","authors":"Xinyue Long;Shikai Guo;Yu Chai;Hui Li;Sumaira Ameer Jan;Qian Ma;Qiao Ning","doi":"10.1109/TCE.2025.3535638","DOIUrl":"https://doi.org/10.1109/TCE.2025.3535638","url":null,"abstract":"Software vulnerabilities pose significant security threats to modern systems, particularly those involving complex execution sequences and intricate call relationships across multiple execution points.For instance, in a scenario where a software system integrates legacy code in a low-resource programming language like PHP, detecting vulnerabilities becomes challenging due to data scarcity and the complexity of temporal relationships among code fragments. This scarcity hampers the ability to capture critical temporal features essential for identifying vulnerabilities spanning multiple execution points.Consequently, existing approaches face major limitations, including neglecting temporal information in code fragments and lacking sufficient data to enable effective generalization for models in low-resource languages.To address these challenges, we introduce TaVer, a novel approach that enhances vulnerability detection in low-resource languages by extracting complex temporal features from code fragments and employing parameter-efficient transfer learning to leverage shared knowledge from resource-rich languages. TaVer comprises two key components: 1) Code Vulnerability Detection Component: This component models temporal dependencies by leveraging execution paths extracted from Abstract Syntax Trees (ASTs), capturing both short-term variations and long-term dependencies among code fragments. This enables comprehensive extraction of complex temporal features, significantly enhancing the accuracy of vulnerability detection. 2) Cross-Lingual Transfer Component: This component learns generalizable features from resource-rich languages and efficiently transfers them to low-resource languages. By updating a small number of downstream parameters, it enhances model generalization and achieves precise vulnerability detection. We evaluated TaVer using a diverse set of programming languages from publicly available GitHub repositories, employing C as the resource-rich source language and Java, Python, and PHP as relatively low-resource target languages. Experimental results demonstrate that TaVer outperforms four state-of-the-art approaches across multiple low-resource languages. Specifically, TaVer achieves average improvements of 14.63% in Accuracy, 30.59% in Precision, 37.32% in Recall, and 33.65% in F1-Score score over the best baseline approaches.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 1","pages":"1008-1023"},"PeriodicalIF":4.3,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144314840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wen-Chung Kao;Shao-Ching Lin;Kai-Dun Hong;Yi-Chin Chiu;Ji-Lun Ho
{"title":"System Calibration of Visible-Spectrum Gaze Tracker With Linear Models","authors":"Wen-Chung Kao;Shao-Ching Lin;Kai-Dun Hong;Yi-Chin Chiu;Ji-Lun Ho","doi":"10.1109/TCE.2025.3534823","DOIUrl":"https://doi.org/10.1109/TCE.2025.3534823","url":null,"abstract":"Calibration for infrared-based gaze trackers, which maps the estimated iris center locations in the image to monitor coordinates, is generally achieved with second-order polynomials. However, calibration performance tends to be poor for visible-spectrum gaze trackers (VSGT) due to the absence of corneal reflections from infrared light sources. This paper introduces a novel calibration method for VSGT that utilizes linear models based on the polar coordinate system. Experimental results demonstrate that false gaze data can be automatically filtered out through linear regression, significantly enhancing system accuracy.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 1","pages":"2353-2355"},"PeriodicalIF":4.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grid-Interactive Novel Resilient Control of Solar PV-Wind-Battery Storage Microgrid Under Distorted and Unbalanced Grid Voltages","authors":"Vijayakumar Gali;Prashant Kumar Jamwal;Nitin Gupta;B. Chitti Babu;Mohammad Jawid Ahmadi;Meghraj Sudhakar Morey","doi":"10.1109/TCE.2025.3534676","DOIUrl":"https://doi.org/10.1109/TCE.2025.3534676","url":null,"abstract":"Integrating solar photovoltaic (PV), wind, and battery storage (BS) systems into the grid introduces significant power quality (PQ) challenges. In particular, the intermittent nature of solar PV and wind energy systems (WES), combined with nonlinear loads, can lead to grid instability. As a result, maintaining a reliable and high-quality power supply to consumers becomes a substantial challenge. This article presents two novel solutions to address these challenges: the anti-windup mixed-order generalized integrator (AWMOGI) and the adaptive delay operation period filter (ADOPF). The AWMOGI effectively extracts fundamental components from distorted utility grid voltages, minimizing DC offset and reducing steady-state oscillations. Meanwhile, the ADOPF swiftly captures positive sequence voltage components by introducing a two-sampling-interval delay in the d-q coordinate system. The hierarchical-loop controller parameters are optimized using a customized Harris Hawks Optimization (HHO) algorithm, which enhances error reduction and facilitates rapid establishment of reference values for DC-link voltage loop control. An adaptive dynamic power management scheme also enables the microgrid (MG) to manage surplus power from MG sources, reducing stress on the BS and ensuring DC-link voltage stability. The experimental results demonstrate significant improvements in handling utility grid abnormalities, dynamic loads, and intermittent microgrid source operation. The experimental results show a zero DC-off set and steady-state errors, a fast computational time of 35e-5s, and the THD of grid currents of 3.16%, which complies with the IEEE 519 standards.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 1","pages":"1744-1757"},"PeriodicalIF":4.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144323225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zheng Zhang;Xinxing Ren;Chun Sing Lai;Ruiheng Wu;Jinzhao Lin;Zhangyong Li
{"title":"Adaptive Resource Scheduling Algorithm for Multi-Feature Optimization in Personalized Wireless Body Area Networks","authors":"Zheng Zhang;Xinxing Ren;Chun Sing Lai;Ruiheng Wu;Jinzhao Lin;Zhangyong Li","doi":"10.1109/TCE.2025.3535142","DOIUrl":"https://doi.org/10.1109/TCE.2025.3535142","url":null,"abstract":"Wireless Body Area Network (WBANs), as a crucial technology in the field of healthcare monitoring, also plays a significant role in personal consumer electronics (CE). However, existing solutions have yet to effectively address challenges such as personalized demands, data heterogeneity, and dynamic link variations caused by diverse environmental factors. To address these issues, this study proposes a novel approach based on the IEEE 802.15.6 standard, which incorporates personalized node characteristics to cater to individual needs and adapt to node heterogeneity. Furthermore, a dynamic scheduling mechanism for node data is introduced, leveraging multi-feature environmental factors to enhance the practicality of WBAN systems. Finally, for real-time scheduling of emotional anomaly data, this study incorporates skin conductance nodes for the first time to evaluate emotional factors, ensuring the efficient transmission of urgent data. Theoretical analysis and simulation results demonstrate that the proposed approach significantly outperforms traditional methods in terms of energy efficiency, latency, throughput, and resource balance.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 1","pages":"352-366"},"PeriodicalIF":4.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seeking Secure Adaptive Distributed Discrete-Time Observer for Networked Agent Systems Under External Cyber Attacks","authors":"Weihao Li;Ruichi Ren;Mengji Shi;Boxian Lin;Kaiyu Qin","doi":"10.1109/TCE.2025.3535083","DOIUrl":"https://doi.org/10.1109/TCE.2025.3535083","url":null,"abstract":"In the era of Industry 5.0, the cooperation among components in Cyber-Physical Systems (CPS) plays a crucial role in achieving digital transformation and intelligent development. Distributed observers can simplify the design complexity of cooperative control schemes in intelligent networked industrial systems. However, the open nature of the information exchange network in these systems makes them vulnerable to cyber attacks. With this in mind, this paper designs a discrete-time secure adaptive distributed observer for networked agent systems under Denial of Service (DoS) attacks. The observer enables agents to monitor reference state information effectively, even when the system matrix is globally unknown and unstable. To enhance security, we propose adaptive secure update rules that respond to compromised communication links, ensuring the ability of the observer to generate reference trajectories during DoS attacks. Furthermore, sufficient algebraic conditions are obtained for the convergence of the proposed observer, employing the analysis approach based on infinite products of sub-stochastic matrices. Finally, some numerical simulation results are provided to verify the effectiveness of the proposed secure adaptive distributed observer.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 1","pages":"918-930"},"PeriodicalIF":4.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144314713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AGFF: Attention-Gated Feature Fusion for Multi-Pose Virtual Try-On","authors":"Chenghu Du;Peiliang Zhang;Junyin Wang;Shengwu Xiong","doi":"10.1109/TCE.2025.3535237","DOIUrl":"https://doi.org/10.1109/TCE.2025.3535237","url":null,"abstract":"Image-based multi-pose virtual try-on tasks aim to synthesize a person wearing a garment in a desired posture. Current methods face three main challenges: i) natural warping of clothing images, ii) preserving identity information after pose transfer, and iii) reducing model complexity. While recent methods have made improvements, they struggle to trade off complexity and performance, limiting model generalization. To address these issues, we propose AGFF, a new image-based multi-pose virtual try-on network with <bold>A</b>ttention-<bold>G</b>ated <bold>F</b>eature <bold>F</b>usion (AGFF), which efficiently tries on garments in arbitrary poses with low complexity. First, we introduce a bi-directional feature-matching approach with feature warping to capture geometric matching information between the garment and human posture for complex posture alignment. Second, we propose an attention-gated feature fusion approach to preserve more identity information by suppressing irrelevant person features and enhancing salient ones. Additionally, our model integrates seamlessly into small-scale encoder-decoder architectures, further reducing complexity. Extensive experiments on popular benchmarks show that our method outperforms state-of-the-art approaches both qualitatively and quantitatively.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 1","pages":"819-827"},"PeriodicalIF":4.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144314732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Loss Balance Aware Algorithms for Single Image Deraining Network on Mobile Devices","authors":"Rong Chen;Sihai Qiao;Yushi Li;Yulong Fan","doi":"10.1109/TCE.2025.3534680","DOIUrl":"https://doi.org/10.1109/TCE.2025.3534680","url":null,"abstract":"Despite many recent advances in single-image deraining, a deraining neural network affordable for resource-limited or mobile devices remains desirable. Unlike the methods relying on enormous network architectures and careful hyperparameter tuning, we introduce a lightweight model integrated with a streamlined deployment schematic and dynamic weighting algorithms to achieve efficient and automated single-image deraining on mobile devices. At first, we construct the network and associate it with multiple loss functions to efficiently and effectively capture expected background textures and high-frequency oscillations caused by rain streaks. To improve usability on handheld instruments, we simplify the deployment process by omitting some time-consuming offline operations. Importantly, we present two dynamic weighting algorithms to automatically synergize varied optimization goals. These algorithms prevent our framework from tedious manual regulation, which enhances the flexibility our model on portable devices. We conduct qualitative and quantitative evaluations on synthetic and real datasets of rainy images. The experimental results demonstrate that our model can be easily deployed on mobile devices and outperforms other state-of-the-art approaches in robust rain removal, even for real images captured in heavy rain.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 1","pages":"260-272"},"PeriodicalIF":4.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144323003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}