Location estimation of underwater sensor networks(USNs)has become a critical technology,due to its fundamental role in the sensing,communication and control of ocean volume.However,the asynchronous clock,security atta...Location estimation of underwater sensor networks(USNs)has become a critical technology,due to its fundamental role in the sensing,communication and control of ocean volume.However,the asynchronous clock,security attack and mobility characteristics of underwater environment make localization much more challenging as compared with terrestrial sensor networks.This paper is concerned with a privacy-preserving asynchronous localization issue for USNs.Particularly,a hybrid network architecture that includes surface buoys,anchor nodes,active sensor nodes and ordinary sensor nodes is constructed.Then,an asynchronous localization protocol is provided,through which two privacy-preserving localization algorithms are designed to estimate the locations of active and ordinary sensor nodes.It is worth mentioning that,the proposed localization algorithms reveal disguised positions to the network,while they do not adopt any homomorphic encryption technique.More importantly,they can eliminate the effect of asynchronous clock,i.e.,clock skew and offset.The performance analyses for the privacy-preserving asynchronous localization algorithms are also presented.Finally,simulation and experiment results reveal that the proposed localization approach can avoid the leakage of position information,while the location accuracy can be significantly enhanced as compared with the other works.展开更多
The resource optimization plays an important role in an asynchronous Phased Array Radar Network(PARN)tracking multiple targets with Measurement Origin Uncertainty(MOU),i.e.,considering the false alarms and missed dete...The resource optimization plays an important role in an asynchronous Phased Array Radar Network(PARN)tracking multiple targets with Measurement Origin Uncertainty(MOU),i.e.,considering the false alarms and missed detections.A Joint Dwell Time Allocation and Detection Threshold Optimization(JDTADTO)strategy is proposed for resource saving in this case.The Predicted Conditional Cramér-Rao Lower Bound(PC-CRLB)with Bayesian Detector and Amplitude Information(BD-AI)is derived and adopted as the tracking performance metric.The optimization model is formulated as minimizing the difference between the PC-CRLBs and the tracking precision thresholds under the constraints of upper and lower bounds of dwell time and false alarm ratio.It is shown that the objective function is nonconvex due to the Information Reduction Factor(IRF)brought by the MOU.A cyclic minimizer-based solution is proposed for problem solving.Simulation results confirm the flexibility and robustness of the JDTADTO strategy in both sufficient and insufficient resource scenarios.The results also reveal the effectiveness of the proposed strategy compared with the strategies adopting the BD without detection threshold optimization and amplitude information.展开更多
In Software-Defined Networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of...In Software-Defined Networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of QoS can be defined as,for example,average latency,packet loss ratio,and throughput.The SDN controller can use network statistics and a Deep Reinforcement Learning(DRL)method to resolve this challenge.In this paper,we formulate dynamic routing in an SDN as a Markov decision process and propose a DRL algorithm called the Asynchronous Advantage Actor-Critic QoS-aware Routing Optimization Mechanism(AQROM)to determine routing strategies that balance the traffic loads in the network.AQROM can improve the QoS of the network and reduce the training time via dynamic routing strategy updates;that is,the reward function can be dynamically and promptly altered based on the optimization objective regardless of the network topology and traffic pattern.AQROM can be considered as one-step optimization and a black-box routing mechanism in high-dimensional input and output sets for both discrete and continuous states,and actions with respect to the operations in the SDN.Extensive simulations were conducted using OMNeT++and the results demonstrated that AQROM 1)achieved much faster and stable convergence than the Deep Deterministic Policy Gradient(DDPG)and Advantage Actor-Critic(A2C),2)incurred a lower packet loss ratio and latency than Open Shortest Path First(OSPF),DDPG,and A2C,and 3)resulted in higher and more stable throughput than OSPF,DDPG,and A2C.展开更多
Many energy efficiency asynchronous duty-cycle MAC(media access control) protocols have been proposed in recent years.However,in these protocols,wireless sensor nodes almost choose their wakeup time randomly during th...Many energy efficiency asynchronous duty-cycle MAC(media access control) protocols have been proposed in recent years.However,in these protocols,wireless sensor nodes almost choose their wakeup time randomly during the operational cycle,which results in the packet delivery latency increased significantly on the multiple hops path.To reduce the packet delivery latency on multi-hop path and energy waste of the sender's idle listening,a new low latency routing-enhanced asynchronous duty-cycle MAC protocol was presented,called REA-MAC.In REA-MAC,each sensor node decided when it waked up to send the beacon based on cross-layer routing information.Furthermore,the sender adaptively waked up based on the relationship between the transmission request time and the wakeup time of its next hop node.The simulation results show that REA-MAC reduces delivery latency by 60% compared to RI-MAC and reduces 8.77% power consumption on average.Under heavy traffic,REA-MAC's throughput is 1.48 times of RI-MAC's.展开更多
The interactions between players of the prisoner's dilemma game are inferred using observed game data.All participants play the game with their counterparts and gain corresponding rewards during each round of the ...The interactions between players of the prisoner's dilemma game are inferred using observed game data.All participants play the game with their counterparts and gain corresponding rewards during each round of the game.The strategies of each player are updated asynchronously during the game.Two inference methods of the interactions between players are derived with naive mean-field(n MF)approximation and maximum log-likelihood estimation(MLE),respectively.Two methods are tested numerically also for fully connected asymmetric Sherrington-Kirkpatrick models,varying the data length,asymmetric degree,payoff,and system noise(coupling strength).We find that the mean square error of reconstruction for the MLE method is inversely proportional to the data length and typically half(benefit from the extra information of update times)of that by n MF.Both methods are robust to the asymmetric degree but work better for large payoffs.Compared with MLE,n MF is more sensitive to the strength of couplings and prefers weak couplings.展开更多
This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works ...This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works in synchronous model. Compared with the method of using secret share protocol m times to share m secrets, our protocol is quite efficient. The protocol can be used to improve the efficiency of secure multi-party computation (MPC) greatly in asynchronous network.展开更多
Non-Orthogonal Multiple Access(NOMA)assisted Unmanned Aerial Vehicle(UAV)communication is becoming a promising technique for future B5G/6G networks.However,the security of the NOMA-UAV networks remains critical challe...Non-Orthogonal Multiple Access(NOMA)assisted Unmanned Aerial Vehicle(UAV)communication is becoming a promising technique for future B5G/6G networks.However,the security of the NOMA-UAV networks remains critical challenges due to the shared wireless spectrum and Line-of-Sight(LoS)channel.This paper formulates a joint UAV trajectory design and power allocation problem with the aid of the ground jammer to maximize the sum secrecy rate.First,the joint optimization problem is modeled as a Markov Decision Process(MDP).Then,the Deep Reinforcement Learning(DRL)method is utilized to search the optimal policy from the continuous action space.In order to accelerate the sample accumulation,the Asynchronous Advantage Actor-Critic(A3C)scheme with multiple workers is proposed,which reformulates the action and reward to acquire complete update duration.Simulation results demonstrate that the A3C-based scheme outperforms the baseline schemes in term of the secrecy rate and stability.展开更多
针对长短期记忆神经网络(Long Short Term Memory Neural Network,LSTMNN)在辨识异步电机故障时,因人工选择网络超参数导致的辨识精度下降问题,提出一种改进的蜣螂优化算法寻优LSTMNN的重要参数。首先,建立具有定子匝间短路故障的异步...针对长短期记忆神经网络(Long Short Term Memory Neural Network,LSTMNN)在辨识异步电机故障时,因人工选择网络超参数导致的辨识精度下降问题,提出一种改进的蜣螂优化算法寻优LSTMNN的重要参数。首先,建立具有定子匝间短路故障的异步电机系统模型;其次,利用精英反向学习策略、分段线性混沌映射、动态混沌权重因子和动态权重系数等方法改进蜣螂优化算法;最后,使用改进蜣螂优化算法对LSTMNN的关键超参数进行寻优。仿真结果表明,相较于基于蜣螂优化算法和基于改进麻雀算法的LSTMNN,提出的优化LSTMNN对故障及其他变量的辨识均方根误差分别降低了51.93%、36.49%,平均绝对误差分别降低了56.83%、43.99%,平均绝对百分误差分别降低了29.91%、22.25%,表明采用改进的蜣螂优化算法对LSTMNN的关键超参数寻优,可显著提高LSTM网络对电机故障及其他变量的辨识能力。展开更多
针对异步电机信号的故障敏感性差异大和故障特征提取困难等问题,提出了一种基于自混合注意力机制和时-空特征挖掘模型的异步电机故障诊断方法。该方法首先将自注意力机制擅长处理长距离依赖和全局信息特征的优势与squeeze-and-excitatio...针对异步电机信号的故障敏感性差异大和故障特征提取困难等问题,提出了一种基于自混合注意力机制和时-空特征挖掘模型的异步电机故障诊断方法。该方法首先将自注意力机制擅长处理长距离依赖和全局信息特征的优势与squeeze-and-excitation(SE)网络增强通道特征相关性的优点相结合,设计了一种新型的自混合注意力机制(self-hybrid attention mechanisms,SHAM),可以有效地降低异步电机电信号的故障敏感性差异;其次,将一维卷积神经网络(1D-convolutional neural network,1D-CNN)和SHAM相结合形成卷积自混合注意力模块(C-SHAM)来提取不同视野域的空间特征和捕获信号特征长范围依赖,同时抑制不同通道下同源信号内无关分量的影响;随后,将双向长短时记忆网络(bidirectional long and short term memory networks,Bi-LSTM)和SHAM相结合提出时序自混合注意力模块(BL-SHAM),进一步实现信号时序特征的再提取和不同通道特征的自适应融合;最后,通过分类器实现电机的故障识别。实验结果表明,在异步电机实验平台上,所提出的方法能够对异步电机的故障电信号进行有效地分类,平均准确率大于98%。展开更多
A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures an...A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures and actuators failures was analyzed using hybrid systems technique based on the robust fault-tolerant control theory. The parametric expression of controller is given based on the feasible solution of linear matrix inequality. The simulation results are provided on the basis of detailed theoretical analysis, which further demonstrate the validity of the proposed schema.展开更多
In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchr...In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchronous dynamical system with rate constraints on events in the iteration domain. The stability condition is provided in the form of linear matrix inequalities (LMIS) depending on the stability of asynchronous dynamical systems. The analysis is supported by simulations.展开更多
Due to the different data rates of the sensors and communication delays in the radar netting, the research of the asynchronous multisensor data fusion problem is more practical than that of the synchronous one. Throug...Due to the different data rates of the sensors and communication delays in the radar netting, the research of the asynchronous multisensor data fusion problem is more practical than that of the synchronous one. Through discussing the sequential approach, which is the classical asynchronous multisensor data fusion algorithm, a new algorithm based on distributed computation structure is proposed. The new algorithm can meet the requirement of real-time computation of netting fusion system, and is more practical for engineering compared with the classical sequential approach. Simulation results show the validity of the presented algorithm.展开更多
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or mor...In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well.展开更多
The potential mechanisms of the spreading phenomena uncover the organizations and functions of various systems.However,due to the lack of valid data,most of early works are limited to the simulated process on model ne...The potential mechanisms of the spreading phenomena uncover the organizations and functions of various systems.However,due to the lack of valid data,most of early works are limited to the simulated process on model networks.In this paper,we track and analyze the propagation paths of real spreading events on two social networks:Twitter and Brightkite.The empirical analysis reveals that the spreading probability and the spreading velocity present the explosive growth within a short period,where the spreading probability measures the transferring likelihood between two neighboring nodes,and the spreading velocity is the growth rate of the information in the whole network.Besides,we observe the asynchronism between the spreading probability and the spreading velocity.To explain the interesting and abnormal issue,we introduce the time-varying spreading probability into the susceptible-infected(SI)and linear threshold(LT)models.Both the analytic and experimental results reproduce the spreading phenomenon in real networks,which deepens our understandings of spreading problems.展开更多
To enhance the fidelity and accuracy of the simulation of communication networks,hardware-in-the-loop(HITL) simulation was employed.HITL simulation methods was classified into three categories,of which the merits an...To enhance the fidelity and accuracy of the simulation of communication networks,hardware-in-the-loop(HITL) simulation was employed.HITL simulation methods was classified into three categories,of which the merits and shortages were compared.Combing system-in-the-loop(SITL) simulation principle with high level architecture(HLA),an HITL simulation model of asynchronous transfer mode(ATM) network was constructed.The throughput and end-to-end delay of all-digital simulation and HITL simulation was analyzed,which showed that HITL simulation was more reliable and effectively improved the simulation credibility of communication network.Meanwhile,HLA-SITL method was fast and easy to achieve and low-cost during design lifecycle.Thus,it was a feasible way to research and analyze the large-scale network.展开更多
This paper presents a source localization algorithm based on the source signal's time-difference-of-arrival(TDOA) for asynchronous wireless sensor network.To obtain synchronization among anchors,all anchors broadc...This paper presents a source localization algorithm based on the source signal's time-difference-of-arrival(TDOA) for asynchronous wireless sensor network.To obtain synchronization among anchors,all anchors broadcast signals periodically,the clock offsets and skews of anchor pairs can be estimated using broadcasting signal's time-of-arrivals(TOA) at anchors.A kalman filter is adopted to improve the accuracy of clock offsets and track the clock drifts due to random fluctuations.Once the source transmits signal,the TOAs at anchors are stamped respectively and source's TDOA error due to clock offset and skew of anchor pair can be mitigated by a compensation operation.Based on a Gaussian noise model,maximum likelihood estimation(MLE) for the source position is obtained.Performance issues are addressed by evaluating the Cramer-Rao lower bound and the selection of broadcasting period.The proposed algorithm is simple and effective,which has close performance with synchronous TDOA algorithm.展开更多
A Shared Multi-buffer Banyan Network is presented in this letter. Its control algorithm and switching fabric are simple, and it fits the high speed ATM network well. The simulation results show that the throughput of ...A Shared Multi-buffer Banyan Network is presented in this letter. Its control algorithm and switching fabric are simple, and it fits the high speed ATM network well. The simulation results show that the throughput of the proposed model is high.展开更多
Today the cycle time of the product develop is requ ir ed to be shortened. At the same time the requirement of the customers becomes mo re and more diverse and complex. The capability of the develop unit is limited b ...Today the cycle time of the product develop is requ ir ed to be shortened. At the same time the requirement of the customers becomes mo re and more diverse and complex. The capability of the develop unit is limited b ecause of the existence of heterogeneous systems and distributed environments. I n this paper, we bring forward a new approach to solve the problem in product de velopment process. We also settle part key technologies in it. A great deal of information from all kinds of sources in the distributed develop ment process is interweaved. The solution to organize the workflow and manage th e information in the process is called for anxiously. We use a new approach that is asynchronous and synchronous coupling product development approach based on the network. The approach extends the develop process from the time axis. Then t he activities in the process are organized from the asynchronous and synchronous aspects. The state of every activity projects at the ASN (active semantic netwo rk). The ASN includes decision system, intelligent agent, user interface and net work. The ASN decides the types and states of the activities and deals with the couple relationship among them. The knowledge stored in ASN is open to all users through the relative interfaces. Every specialist keeps contact with their user s relying on collaborative platform implements CSCW (computer support collaborat ive work) that integrated product/process design and development. The lack of gl obal communication in product development process can be prevented in the most d egree. The key technologies that exist in the asynchronous and synchronous coupling pro duct develop approach include: integrated development structure, orderly organiz ation of information, transparent management of process, agile transfer of infor mation and rapid prototype. The development process can be completed quickly by these technologies. The technologies involve wide content. In this paper, we dis cuss some key technologies. We validate the approach by the projectrapid response manufacturing a pplication in the distributed environment. The expensive device, high technology and low using lead to RE (Rapid engineering) and RP (Rapid prototype) service a pplication by the network. RE and RP develop rapidly due to the accelerated prod uct development process. RE and RP application service platform is built in the project.展开更多
基金supported in part by the National Natural Science Foundation of China(61873345,61973263)the Youth Talent Support Program of Hebei(BJ2018050,BJ2020031)+2 种基金the Teturned Overseas Chinese Scholar Foundation of Hebei(C201829)the Natural Science Foundation of Hebei(F2020203002)the Postgraduate Innovation Fund Project of Hebei(CXZZSS2019047)。
文摘Location estimation of underwater sensor networks(USNs)has become a critical technology,due to its fundamental role in the sensing,communication and control of ocean volume.However,the asynchronous clock,security attack and mobility characteristics of underwater environment make localization much more challenging as compared with terrestrial sensor networks.This paper is concerned with a privacy-preserving asynchronous localization issue for USNs.Particularly,a hybrid network architecture that includes surface buoys,anchor nodes,active sensor nodes and ordinary sensor nodes is constructed.Then,an asynchronous localization protocol is provided,through which two privacy-preserving localization algorithms are designed to estimate the locations of active and ordinary sensor nodes.It is worth mentioning that,the proposed localization algorithms reveal disguised positions to the network,while they do not adopt any homomorphic encryption technique.More importantly,they can eliminate the effect of asynchronous clock,i.e.,clock skew and offset.The performance analyses for the privacy-preserving asynchronous localization algorithms are also presented.Finally,simulation and experiment results reveal that the proposed localization approach can avoid the leakage of position information,while the location accuracy can be significantly enhanced as compared with the other works.
基金supported by the National Natural Science Foundation of China(Nos.62001506 and 62071482).
文摘The resource optimization plays an important role in an asynchronous Phased Array Radar Network(PARN)tracking multiple targets with Measurement Origin Uncertainty(MOU),i.e.,considering the false alarms and missed detections.A Joint Dwell Time Allocation and Detection Threshold Optimization(JDTADTO)strategy is proposed for resource saving in this case.The Predicted Conditional Cramér-Rao Lower Bound(PC-CRLB)with Bayesian Detector and Amplitude Information(BD-AI)is derived and adopted as the tracking performance metric.The optimization model is formulated as minimizing the difference between the PC-CRLBs and the tracking precision thresholds under the constraints of upper and lower bounds of dwell time and false alarm ratio.It is shown that the objective function is nonconvex due to the Information Reduction Factor(IRF)brought by the MOU.A cyclic minimizer-based solution is proposed for problem solving.Simulation results confirm the flexibility and robustness of the JDTADTO strategy in both sufficient and insufficient resource scenarios.The results also reveal the effectiveness of the proposed strategy compared with the strategies adopting the BD without detection threshold optimization and amplitude information.
基金fully supported by GUET Excellent Graduate Thesis Program(Grant No.19YJPYBS03)Innovation Project of Guangxi Graduate Education(Grant No.YCBZ2022109)New Technology Research University Cooperation Project of the 34th Research Institute of China Electronics Technology Group Corporation,2021(Grant No.SF2126007)。
文摘In Software-Defined Networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of QoS can be defined as,for example,average latency,packet loss ratio,and throughput.The SDN controller can use network statistics and a Deep Reinforcement Learning(DRL)method to resolve this challenge.In this paper,we formulate dynamic routing in an SDN as a Markov decision process and propose a DRL algorithm called the Asynchronous Advantage Actor-Critic QoS-aware Routing Optimization Mechanism(AQROM)to determine routing strategies that balance the traffic loads in the network.AQROM can improve the QoS of the network and reduce the training time via dynamic routing strategy updates;that is,the reward function can be dynamically and promptly altered based on the optimization objective regardless of the network topology and traffic pattern.AQROM can be considered as one-step optimization and a black-box routing mechanism in high-dimensional input and output sets for both discrete and continuous states,and actions with respect to the operations in the SDN.Extensive simulations were conducted using OMNeT++and the results demonstrated that AQROM 1)achieved much faster and stable convergence than the Deep Deterministic Policy Gradient(DDPG)and Advantage Actor-Critic(A2C),2)incurred a lower packet loss ratio and latency than Open Shortest Path First(OSPF),DDPG,and A2C,and 3)resulted in higher and more stable throughput than OSPF,DDPG,and A2C.
基金Projects(61103011,61170261) supported by the National Natural Science Foundation of China
文摘Many energy efficiency asynchronous duty-cycle MAC(media access control) protocols have been proposed in recent years.However,in these protocols,wireless sensor nodes almost choose their wakeup time randomly during the operational cycle,which results in the packet delivery latency increased significantly on the multiple hops path.To reduce the packet delivery latency on multi-hop path and energy waste of the sender's idle listening,a new low latency routing-enhanced asynchronous duty-cycle MAC protocol was presented,called REA-MAC.In REA-MAC,each sensor node decided when it waked up to send the beacon based on cross-layer routing information.Furthermore,the sender adaptively waked up based on the relationship between the transmission request time and the wakeup time of its next hop node.The simulation results show that REA-MAC reduces delivery latency by 60% compared to RI-MAC and reduces 8.77% power consumption on average.Under heavy traffic,REA-MAC's throughput is 1.48 times of RI-MAC's.
基金supported by the National Natural Science Foundation of China(Grant Nos.11705079 and 11705279)the Scientific Research Foundation of Nanjing University of Posts and Telecommunications(Grant Nos.NY221101 and NY222134)the Science and Technology Innovation Training Program(Grant No.STITP 202210293044Z)。
文摘The interactions between players of the prisoner's dilemma game are inferred using observed game data.All participants play the game with their counterparts and gain corresponding rewards during each round of the game.The strategies of each player are updated asynchronously during the game.Two inference methods of the interactions between players are derived with naive mean-field(n MF)approximation and maximum log-likelihood estimation(MLE),respectively.Two methods are tested numerically also for fully connected asymmetric Sherrington-Kirkpatrick models,varying the data length,asymmetric degree,payoff,and system noise(coupling strength).We find that the mean square error of reconstruction for the MLE method is inversely proportional to the data length and typically half(benefit from the extra information of update times)of that by n MF.Both methods are robust to the asymmetric degree but work better for large payoffs.Compared with MLE,n MF is more sensitive to the strength of couplings and prefers weak couplings.
基金the National Natural Science Foundation of China(No.60803146)
文摘This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works in synchronous model. Compared with the method of using secret share protocol m times to share m secrets, our protocol is quite efficient. The protocol can be used to improve the efficiency of secure multi-party computation (MPC) greatly in asynchronous network.
基金supported by the Fundamental Research Funds for the Central Universities,China(No.2024MS115).
文摘Non-Orthogonal Multiple Access(NOMA)assisted Unmanned Aerial Vehicle(UAV)communication is becoming a promising technique for future B5G/6G networks.However,the security of the NOMA-UAV networks remains critical challenges due to the shared wireless spectrum and Line-of-Sight(LoS)channel.This paper formulates a joint UAV trajectory design and power allocation problem with the aid of the ground jammer to maximize the sum secrecy rate.First,the joint optimization problem is modeled as a Markov Decision Process(MDP).Then,the Deep Reinforcement Learning(DRL)method is utilized to search the optimal policy from the continuous action space.In order to accelerate the sample accumulation,the Asynchronous Advantage Actor-Critic(A3C)scheme with multiple workers is proposed,which reformulates the action and reward to acquire complete update duration.Simulation results demonstrate that the A3C-based scheme outperforms the baseline schemes in term of the secrecy rate and stability.
文摘针对长短期记忆神经网络(Long Short Term Memory Neural Network,LSTMNN)在辨识异步电机故障时,因人工选择网络超参数导致的辨识精度下降问题,提出一种改进的蜣螂优化算法寻优LSTMNN的重要参数。首先,建立具有定子匝间短路故障的异步电机系统模型;其次,利用精英反向学习策略、分段线性混沌映射、动态混沌权重因子和动态权重系数等方法改进蜣螂优化算法;最后,使用改进蜣螂优化算法对LSTMNN的关键超参数进行寻优。仿真结果表明,相较于基于蜣螂优化算法和基于改进麻雀算法的LSTMNN,提出的优化LSTMNN对故障及其他变量的辨识均方根误差分别降低了51.93%、36.49%,平均绝对误差分别降低了56.83%、43.99%,平均绝对百分误差分别降低了29.91%、22.25%,表明采用改进的蜣螂优化算法对LSTMNN的关键超参数寻优,可显著提高LSTM网络对电机故障及其他变量的辨识能力。
文摘针对异步电机信号的故障敏感性差异大和故障特征提取困难等问题,提出了一种基于自混合注意力机制和时-空特征挖掘模型的异步电机故障诊断方法。该方法首先将自注意力机制擅长处理长距离依赖和全局信息特征的优势与squeeze-and-excitation(SE)网络增强通道特征相关性的优点相结合,设计了一种新型的自混合注意力机制(self-hybrid attention mechanisms,SHAM),可以有效地降低异步电机电信号的故障敏感性差异;其次,将一维卷积神经网络(1D-convolutional neural network,1D-CNN)和SHAM相结合形成卷积自混合注意力模块(C-SHAM)来提取不同视野域的空间特征和捕获信号特征长范围依赖,同时抑制不同通道下同源信号内无关分量的影响;随后,将双向长短时记忆网络(bidirectional long and short term memory networks,Bi-LSTM)和SHAM相结合提出时序自混合注意力模块(BL-SHAM),进一步实现信号时序特征的再提取和不同通道特征的自适应融合;最后,通过分类器实现电机的故障识别。实验结果表明,在异步电机实验平台上,所提出的方法能够对异步电机的故障电信号进行有效地分类,平均准确率大于98%。
基金This project was supported by the National Natural Science Foundation of China (60274014)Doctor Foundation of China Education Ministry (20020487006).
文摘A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures and actuators failures was analyzed using hybrid systems technique based on the robust fault-tolerant control theory. The parametric expression of controller is given based on the feasible solution of linear matrix inequality. The simulation results are provided on the basis of detailed theoretical analysis, which further demonstrate the validity of the proposed schema.
基金supported by General Program (No. 60774022)State Key Program (No. 60834001) of National Natural Science Foundation of China
文摘In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchronous dynamical system with rate constraints on events in the iteration domain. The stability condition is provided in the form of linear matrix inequalities (LMIS) depending on the stability of asynchronous dynamical systems. The analysis is supported by simulations.
文摘Due to the different data rates of the sensors and communication delays in the radar netting, the research of the asynchronous multisensor data fusion problem is more practical than that of the synchronous one. Through discussing the sequential approach, which is the classical asynchronous multisensor data fusion algorithm, a new algorithm based on distributed computation structure is proposed. The new algorithm can meet the requirement of real-time computation of netting fusion system, and is more practical for engineering compared with the classical sequential approach. Simulation results show the validity of the presented algorithm.
文摘In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61703281,11547040,61803266,61503140,and 61873171)the PhD Start-Up Fund of Natural Science Foundation of Guangdong Province,China(Grant Nos.2017A030310374 and 2016A030313036)+1 种基金the Science and Technology Innovation Commission of Shenzhen,China(Grant No.JCYJ20180305124628810)the China Scholarship Council(Grant No.201806340213).
文摘The potential mechanisms of the spreading phenomena uncover the organizations and functions of various systems.However,due to the lack of valid data,most of early works are limited to the simulated process on model networks.In this paper,we track and analyze the propagation paths of real spreading events on two social networks:Twitter and Brightkite.The empirical analysis reveals that the spreading probability and the spreading velocity present the explosive growth within a short period,where the spreading probability measures the transferring likelihood between two neighboring nodes,and the spreading velocity is the growth rate of the information in the whole network.Besides,we observe the asynchronism between the spreading probability and the spreading velocity.To explain the interesting and abnormal issue,we introduce the time-varying spreading probability into the susceptible-infected(SI)and linear threshold(LT)models.Both the analytic and experimental results reproduce the spreading phenomenon in real networks,which deepens our understandings of spreading problems.
基金Supported by the National Natural Science Foundation of China (61101129)Specialized Research Fund for the Doctoral Program of Higher Education(20091101110019)
文摘To enhance the fidelity and accuracy of the simulation of communication networks,hardware-in-the-loop(HITL) simulation was employed.HITL simulation methods was classified into three categories,of which the merits and shortages were compared.Combing system-in-the-loop(SITL) simulation principle with high level architecture(HLA),an HITL simulation model of asynchronous transfer mode(ATM) network was constructed.The throughput and end-to-end delay of all-digital simulation and HITL simulation was analyzed,which showed that HITL simulation was more reliable and effectively improved the simulation credibility of communication network.Meanwhile,HLA-SITL method was fast and easy to achieve and low-cost during design lifecycle.Thus,it was a feasible way to research and analyze the large-scale network.
基金supported by the National Natural Science Foundation of China under Grant No.61571452 and No.61201331
文摘This paper presents a source localization algorithm based on the source signal's time-difference-of-arrival(TDOA) for asynchronous wireless sensor network.To obtain synchronization among anchors,all anchors broadcast signals periodically,the clock offsets and skews of anchor pairs can be estimated using broadcasting signal's time-of-arrivals(TOA) at anchors.A kalman filter is adopted to improve the accuracy of clock offsets and track the clock drifts due to random fluctuations.Once the source transmits signal,the TOAs at anchors are stamped respectively and source's TDOA error due to clock offset and skew of anchor pair can be mitigated by a compensation operation.Based on a Gaussian noise model,maximum likelihood estimation(MLE) for the source position is obtained.Performance issues are addressed by evaluating the Cramer-Rao lower bound and the selection of broadcasting period.The proposed algorithm is simple and effective,which has close performance with synchronous TDOA algorithm.
文摘A Shared Multi-buffer Banyan Network is presented in this letter. Its control algorithm and switching fabric are simple, and it fits the high speed ATM network well. The simulation results show that the throughput of the proposed model is high.
文摘Today the cycle time of the product develop is requ ir ed to be shortened. At the same time the requirement of the customers becomes mo re and more diverse and complex. The capability of the develop unit is limited b ecause of the existence of heterogeneous systems and distributed environments. I n this paper, we bring forward a new approach to solve the problem in product de velopment process. We also settle part key technologies in it. A great deal of information from all kinds of sources in the distributed develop ment process is interweaved. The solution to organize the workflow and manage th e information in the process is called for anxiously. We use a new approach that is asynchronous and synchronous coupling product development approach based on the network. The approach extends the develop process from the time axis. Then t he activities in the process are organized from the asynchronous and synchronous aspects. The state of every activity projects at the ASN (active semantic netwo rk). The ASN includes decision system, intelligent agent, user interface and net work. The ASN decides the types and states of the activities and deals with the couple relationship among them. The knowledge stored in ASN is open to all users through the relative interfaces. Every specialist keeps contact with their user s relying on collaborative platform implements CSCW (computer support collaborat ive work) that integrated product/process design and development. The lack of gl obal communication in product development process can be prevented in the most d egree. The key technologies that exist in the asynchronous and synchronous coupling pro duct develop approach include: integrated development structure, orderly organiz ation of information, transparent management of process, agile transfer of infor mation and rapid prototype. The development process can be completed quickly by these technologies. The technologies involve wide content. In this paper, we dis cuss some key technologies. We validate the approach by the projectrapid response manufacturing a pplication in the distributed environment. The expensive device, high technology and low using lead to RE (Rapid engineering) and RP (Rapid prototype) service a pplication by the network. RE and RP develop rapidly due to the accelerated prod uct development process. RE and RP application service platform is built in the project.