Proceedings of the IEEE最新文献

筛选
英文 中文
Proceedings of the IEEE: Stay Informed. Become Inspired. IEEE会刊:保持信息灵通。成为灵感。
IF 23.2 1区 计算机科学
Proceedings of the IEEE Pub Date : 2025-07-17 DOI: 10.1109/JPROC.2025.3580191
{"title":"Proceedings of the IEEE: Stay Informed. Become Inspired.","authors":"","doi":"10.1109/JPROC.2025.3580191","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3580191","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 2","pages":"C4-C4"},"PeriodicalIF":23.2,"publicationDate":"2025-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11082590","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144646592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EMG Acquisition and Processing for Hand Movement Decoding on Embedded Systems: State of the Art and Challenges 嵌入式系统手部运动解码的肌电图采集与处理:现状与挑战
IF 23.2 1区 计算机科学
Proceedings of the IEEE Pub Date : 2025-07-14 DOI: 10.1109/JPROC.2025.3581995
Simone Benatti;Elisa Donati;Ali Moin;Marcello Zanghieri;Mattia Orlandi;Alessio Burrello;Fiorenzo Artoni;Silvestro Micera;Luca Benini;Jan M. Rabaey
{"title":"EMG Acquisition and Processing for Hand Movement Decoding on Embedded Systems: State of the Art and Challenges","authors":"Simone Benatti;Elisa Donati;Ali Moin;Marcello Zanghieri;Mattia Orlandi;Alessio Burrello;Fiorenzo Artoni;Silvestro Micera;Luca Benini;Jan M. Rabaey","doi":"10.1109/JPROC.2025.3581995","DOIUrl":"10.1109/JPROC.2025.3581995","url":null,"abstract":"The electromyography (EMG) signal is particularly useful in monitoring muscle activity, and it can be acquired noninvasively on the skin surface. Thanks to these key characteristics, EMG-based human–machine interfaces (HMIs) for prosthetic myocontrol, as well as gesture recognition, are becoming widespread. A key challenge in this context is to design embedded systems to process EMG signals and generate motor commands with miniaturized, unobtrusive, and low-power devices, reliably and in real time, at a relatively low cost to provide continuous monitoring without causing stigma or discomfort. This article presents an in-depth review of the current status and future research challenges in systems and circuits for EMG acquisition and processing. We start by illustrating the sensor interfaces and acquisition systems required for signal analysis to provide efficient and effective ways of understanding the signal and its nature. We, then, focus on conventional state-of-the-art (SoA) EMG gesture recognition algorithms as well as novel architectures that tackle EMG processing challenges, i.e., hyperdimensional computing (HDC), blind source separation (BSS), and spiking neural networks (SNNs). Finally, we discuss open challenges, such as EMG variability, natural control, and efficient computation, to bring the myocontrol completely out of the laboratory, filling the gap between research prototypes and real-world applications.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 3","pages":"256-286"},"PeriodicalIF":23.2,"publicationDate":"2025-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144629904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Day-to-Day Traffic Flow Dynamics With Mixed Autonomy Considering Link-Level Penetration Rate Evolution of Autonomous Vehicles 考虑链路级渗透率演化的混合自主日常交通流动力学
IF 20.6 1区 计算机科学
Proceedings of the IEEE Pub Date : 2025-07-10 DOI: 10.1109/jproc.2025.3562946
Zelin Wang, Zhiyuan Liu, Yuqian Lin, Yicheng Zhang, Qixiu Cheng
{"title":"Day-to-Day Traffic Flow Dynamics With Mixed Autonomy Considering Link-Level Penetration Rate Evolution of Autonomous Vehicles","authors":"Zelin Wang, Zhiyuan Liu, Yuqian Lin, Yicheng Zhang, Qixiu Cheng","doi":"10.1109/jproc.2025.3562946","DOIUrl":"https://doi.org/10.1109/jproc.2025.3562946","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"15 1","pages":""},"PeriodicalIF":20.6,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144602882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Safe Reinforcement Learning Methods for Modern Power Systems 现代电力系统安全强化学习方法综述
IF 23.2 1区 计算机科学
Proceedings of the IEEE Pub Date : 2025-07-10 DOI: 10.1109/JPROC.2025.3584656
Tong Su;Tong Wu;Junbo Zhao;Anna Scaglione;Le Xie
{"title":"A Review of Safe Reinforcement Learning Methods for Modern Power Systems","authors":"Tong Su;Tong Wu;Junbo Zhao;Anna Scaglione;Le Xie","doi":"10.1109/JPROC.2025.3584656","DOIUrl":"10.1109/JPROC.2025.3584656","url":null,"abstract":"Given the availability of more comprehensive measurement data in modern power systems, reinforcement learning (RL) has gained significant interest in operation and control. Conventional RL relies on trial-and-error interactions with the environment and reward feedback, which often leads to exploring unsafe operating regions and executing unsafe actions, especially when deployed in real-world power systems. To address these challenges, safe RL has been proposed to optimize operational objectives while ensuring safety constraints are met, keeping actions and states within safe regions throughout both training and deployment. Rather than relying solely on manually designed penalty terms for unsafe actions, as is common in conventional RL, safe RL methods reviewed here primarily leverage advanced and proactive mechanisms. These include techniques such as Lagrangian relaxation, safety layers, and theoretical guarantees like Lyapunov functions to rigorously enforce safety boundaries. This article provides a comprehensive review of safe RL methods and their applications across various power system operations and control domains, including security control, real-time operation, operational planning, and emerging areas. It summarizes existing safe RL techniques, evaluates their performance, analyzes suitable deployment scenarios, and examines algorithm benchmarks and application environments. This article also highlights real-world implementation cases and identifies critical challenges such as scalability in large-scale systems and robustness under uncertainty, providing potential solutions and outlining future directions to advance the reliable integration and deployment of safe RL in modern power systems.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 3","pages":"213-255"},"PeriodicalIF":23.2,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144603017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spaceborne GNSS-R Bistatic Radar Remote Sensing, CYGNSS, and Future Missions 星载GNSS-R双基地雷达遥感、CYGNSS和未来任务
IF 20.6 1区 计算机科学
Proceedings of the IEEE Pub Date : 2025-07-08 DOI: 10.1109/jproc.2025.3583997
Christopher Ruf, Scott Gleason
{"title":"Spaceborne GNSS-R Bistatic Radar Remote Sensing, CYGNSS, and Future Missions","authors":"Christopher Ruf, Scott Gleason","doi":"10.1109/jproc.2025.3583997","DOIUrl":"https://doi.org/10.1109/jproc.2025.3583997","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"51 1","pages":""},"PeriodicalIF":20.6,"publicationDate":"2025-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144603057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Talkative Power Conversion: A Tutorial 会话能力转换:教程
IF 20.6 1区 计算机科学
Proceedings of the IEEE Pub Date : 2025-07-01 DOI: 10.1109/jproc.2025.3577229
Peter Adam Hoeher, Yang Leng, Rongwu Zhu, Marco Liserre
{"title":"Talkative Power Conversion: A Tutorial","authors":"Peter Adam Hoeher, Yang Leng, Rongwu Zhu, Marco Liserre","doi":"10.1109/jproc.2025.3577229","DOIUrl":"https://doi.org/10.1109/jproc.2025.3577229","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"6 1","pages":""},"PeriodicalIF":20.6,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144533229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey and Comparative Analysis of Number Systems for Deep Neural Networks 深度神经网络数字系统的综述与比较分析
IF 23.2 1区 计算机科学
Proceedings of the IEEE Pub Date : 2025-06-26 DOI: 10.1109/JPROC.2025.3578756
Ghada Alsuhli;Vasilis Sakellariou;Hani Saleh;Mahmoud Al-Qutayri;Baker Mohammad;Thanos Stouraitis
{"title":"A Survey and Comparative Analysis of Number Systems for Deep Neural Networks","authors":"Ghada Alsuhli;Vasilis Sakellariou;Hani Saleh;Mahmoud Al-Qutayri;Baker Mohammad;Thanos Stouraitis","doi":"10.1109/JPROC.2025.3578756","DOIUrl":"10.1109/JPROC.2025.3578756","url":null,"abstract":"Deep neural networks (DNNs) are indispensable in various artificial intelligence (AI) applications. However, their inherent complexity presents significant challenges, particularly when deploying them on resource-constrained devices. To overcome these hurdles, academia and industry are actively seeking ways to accelerate and optimize DNN implementations. A significant area of research revolves around discovering more effective methods to represent the enormous data volumes processed by DNNs. Traditional number systems (NSs) have proven nonoptimal for this task, prompting extensive exploration into alternative and bespoke systems for DNNs. This survey aims to comprehensively discuss various NSs utilized to efficiently represent DNN data. These systems are categorized mainly based on their impact on DNN performance and hardware implementation. This survey offers an overview of these categorized NSs and delves into different subsystems within each, outlining their effect on DNN performance and hardware design. Furthermore, these systems are compared quantitatively and qualitatively concerning their expected quantization error, memory utilization, and computational requirements. This survey also emphasizes the challenges linked with each system and the diverse proposed solutions to address them. Insights into the utilization of these NSs for sophisticated DNNs are also presented in this survey. Readers will acquire a deeper understanding of the importance of efficient NSs for DNNs, explore commonly used systems, comprehend the tradeoffs between these systems, delve into design considerations influencing their impact on DNN performance, and discover recent trends and potential research avenues in this field.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 2","pages":"172-207"},"PeriodicalIF":23.2,"publicationDate":"2025-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11053145","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144500786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fighting Malicious Media Data: A Survey on Tampering Detection and Deepfake Detection 打击恶意媒体数据:篡改检测和深度伪造检测综述
IF 23.2 1区 计算机科学
Proceedings of the IEEE Pub Date : 2025-06-23 DOI: 10.1109/JPROC.2025.3576367
Junke Wang;Zhenxin Li;Chao Zhang;Jingjing Chen;Zuxuan Wu;Larry S. Davis;Yu-Gang Jiang
{"title":"Fighting Malicious Media Data: A Survey on Tampering Detection and Deepfake Detection","authors":"Junke Wang;Zhenxin Li;Chao Zhang;Jingjing Chen;Zuxuan Wu;Larry S. Davis;Yu-Gang Jiang","doi":"10.1109/JPROC.2025.3576367","DOIUrl":"10.1109/JPROC.2025.3576367","url":null,"abstract":"Online media data, in the form of images and videos, are becoming mainstream communication channels. However, recent advances in deep learning (DL), particularly deep generative models, open the doors for producing perceptually convincing images and videos at a low cost, which not only poses a serious threat to the trustworthiness of digital information but also has severe societal implications. This motivates a growing interest in research in media tampering detection (TD), i.e., using DL techniques to examine whether media data have been maliciously manipulated. Depending on the content of the targeted images, media forgery could be divided into image tampering and Deepfake techniques. The former typically moves or erases the visual elements in ordinary images, while the latter manipulates the expressions and even the identity of human faces. Accordingly, the means of defense include image TD and Deepfake detection (DFD), which share a wide variety of properties. In this article, we provide a comprehensive review of the current media TD approaches and discuss the challenges and trends in this field for future research.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 3","pages":"287-311"},"PeriodicalIF":23.2,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144370742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Quantum Tortoise and the Classical Hare: When Will Quantum Computers Outpace Classical Ones and When Will They Be Left Behind? 量子乌龟和经典兔子:量子计算机何时会超越经典计算机,何时又会被抛在后面?
IF 23.2 1区 计算机科学
Proceedings of the IEEE Pub Date : 2025-06-19 DOI: 10.1109/JPROC.2025.3574102
Sukwoong Choi;William S. Moses;Neil Thompson
{"title":"The Quantum Tortoise and the Classical Hare: When Will Quantum Computers Outpace Classical Ones and When Will They Be Left Behind?","authors":"Sukwoong Choi;William S. Moses;Neil Thompson","doi":"10.1109/JPROC.2025.3574102","DOIUrl":"10.1109/JPROC.2025.3574102","url":null,"abstract":"In the children’s story of the Tortoise and the Hare, the speedier Hare is outpaced by a Tortoise with other advantages (diligence). An analogous contest is happening in computing, between a Quantum Tortoise and a Classical Hare. Here, the Classical Hare’s speed advantage is literal—classical computers run faster than quantum ones. Like his namesake, the Quantum Tortoise is slower, but also has an advantage—in this case, the ability to run algorithms that are unavailable to classical computers. When this algorithmic advantage is substantial enough, the Quantum Tortoise can beat the Classical Hare and solve a problem faster. This article analyzes when the Quantum Tortoise will beat the Classical Hare—and when it will not.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 2","pages":"113-124"},"PeriodicalIF":23.2,"publicationDate":"2025-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11045206","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144328521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
No More Traffic Tickets: A Tutorial to Ensure Traffic-Rule Compliance of Automated Vehicles 不再有交通罚单:确保自动驾驶汽车遵守交通规则的教程
IF 20.6 1区 计算机科学
Proceedings of the IEEE Pub Date : 2025-06-11 DOI: 10.1109/jproc.2025.3570483
Matthias Althoff, Sebastian Maierhofer, Gerald Würsching, Yuanfei Lin, Florian Lercher, Roland Stolz
{"title":"No More Traffic Tickets: A Tutorial to Ensure Traffic-Rule Compliance of Automated Vehicles","authors":"Matthias Althoff, Sebastian Maierhofer, Gerald Würsching, Yuanfei Lin, Florian Lercher, Roland Stolz","doi":"10.1109/jproc.2025.3570483","DOIUrl":"https://doi.org/10.1109/jproc.2025.3570483","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"12 1","pages":""},"PeriodicalIF":20.6,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144268680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信