The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s...The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions.展开更多
This paper investigates how to achieve integrated sensing and communication(ISAC)based on a cell-free radio access network(CF-RAN)architecture with a minimum footprint of communication resources.We propose a new passi...This paper investigates how to achieve integrated sensing and communication(ISAC)based on a cell-free radio access network(CF-RAN)architecture with a minimum footprint of communication resources.We propose a new passive sensing scheme.The scheme is based on the radio frequency(RF)fingerprint learning of the RF radio unit(RRU)to build an RF fingerprint library of RRUs.The source RRU is identified by comparing the RF fingerprints carried by the signal at the receiver side.The receiver extracts the channel parameters from the signal and estimates the channel environment,thus locating the reflectors in the environment.The proposed scheme can effectively solve the problem of interference between signals in the same time-frequency domain but in different spatial domains when multiple RRUs jointly serve users in CF-RAN architecture.Simulation results show that the proposed passive ISAC scheme can effectively detect reflector location information in the environment without degrading the communication performance.展开更多
The Internet of Unmanned Aerial Vehicles(I-UAVs)is expected to execute latency-sensitive tasks,but limited by co-channel interference and malicious jamming.In the face of unknown prior environmental knowledge,defendin...The Internet of Unmanned Aerial Vehicles(I-UAVs)is expected to execute latency-sensitive tasks,but limited by co-channel interference and malicious jamming.In the face of unknown prior environmental knowledge,defending against jamming and interference through spectrum allocation becomes challenging,especially when each UAV pair makes decisions independently.In this paper,we propose a cooperative multi-agent reinforcement learning(MARL)-based anti-jamming framework for I-UAVs,enabling UAV pairs to learn their own policies cooperatively.Specifically,we first model the problem as a modelfree multi-agent Markov decision process(MAMDP)to maximize the long-term expected system throughput.Then,for improving the exploration of the optimal policy,we resort to optimizing a MARL objective function with a mutual-information(MI)regularizer between states and actions,which can dynamically assign the probability for actions frequently used by the optimal policy.Next,through sharing their current channel selections and local learning experience(their soft Q-values),the UAV pairs can learn their own policies cooperatively relying on only preceding observed information and predicting others’actions.Our simulation results show that for both sweep jamming and Markov jamming patterns,the proposed scheme outperforms the benchmarkers in terms of throughput,convergence and stability for different numbers of jammers,channels and UAV pairs.展开更多
In the era of big data,data-driven technologies are increasingly leveraged by industry to facilitate autonomous learning and intelligent decision-making.However,the challenge of“small samples in big data”emerges whe...In the era of big data,data-driven technologies are increasingly leveraged by industry to facilitate autonomous learning and intelligent decision-making.However,the challenge of“small samples in big data”emerges when datasets lack the comprehensive information necessary for addressing complex scenarios,which hampers adaptability.Thus,enhancing data completeness is essential.Knowledge-guided virtual sample generation transforms domain knowledge into extensive virtual datasets,thereby reducing dependence on limited real samples and enabling zero-sample fault diagnosis.This study used building air conditioning systems as a case study.We innovatively used the large language model(LLM)to acquire domain knowledge for sample generation,significantly lowering knowledge acquisition costs and establishing a generalized framework for knowledge acquisition in engineering applications.This acquired knowledge guided the design of diffusion boundaries in mega-trend diffusion(MTD),while the Monte Carlo method was used to sample within the diffusion function to create information-rich virtual samples.Additionally,a noise-adding technique was introduced to enhance the information entropy of these samples,thereby improving the robustness of neural networks trained with them.Experimental results showed that training the diagnostic model exclusively with virtual samples achieved an accuracy of 72.80%,significantly surpassing traditional small-sample supervised learning in terms of generalization.This underscores the quality and completeness of the generated virtual samples.展开更多
With the widespread use of social media,the propagation of health-related rumors has become a significant public health threat.Existing methods for detecting health rumors predominantly rely on external knowledge or p...With the widespread use of social media,the propagation of health-related rumors has become a significant public health threat.Existing methods for detecting health rumors predominantly rely on external knowledge or propagation structures,with only a few recent approaches attempting causal inference;however,these have not yet effectively integrated causal discovery with domain-specific knowledge graphs for detecting health rumors.In this study,we found that the combined use of causal discovery and domain-specific knowledge graphs can effectively identify implicit pseudo-causal logic embedded within texts,holding significant potential for health rumor detection.To this end,we propose CKDG—a dual-graph fusion framework based on causal logic and medical knowledge graphs.CKDG constructs a weighted causal graph to capture the implicit causal relationships in the text and introduces a medical knowledge graph to verify semantic consistency,thereby enhancing the ability to identify the misuse of professional terminology and pseudoscientific claims.In experiments conducted on a dataset comprising 8430 health rumors,CKDG achieved an accuracy of 91.28%and an F1 score of 90.38%,representing improvements of 5.11%and 3.29%over the best baseline,respectively.Our results indicate that the integrated use of causal discovery and domainspecific knowledge graphs offers significant advantages for health rumor detection systems.This method not only improves detection performance but also enhances the transparency and credibility of model decisions by tracing causal chains and sources of knowledge conflicts.We anticipate that this work will provide key technological support for the development of trustworthy health-information filtering systems,thereby improving the reliability of public health information on social media.展开更多
In scenarios where ground-based cloud computing infrastructure is unavailable,unmanned aerial vehicles(UAVs)act as mobile edge computing(MEC)servers to provide on-demand computation services for ground terminals.To ad...In scenarios where ground-based cloud computing infrastructure is unavailable,unmanned aerial vehicles(UAVs)act as mobile edge computing(MEC)servers to provide on-demand computation services for ground terminals.To address the challenge of jointly optimizing task scheduling and UAV trajectory under limited resources and high mobility of UAVs,this paper presents PER-MATD3,a multi-agent deep reinforcement learning algorithm with prioritized experience replay(PER)into the Centralized Training with Decentralized Execution(CTDE)framework.Specifically,PER-MATD3 enables each agent to learn a decentralized policy using only local observations during execution,while leveraging a shared replay buffer with prioritized sampling and centralized critic during training to accelerate convergence and improve sample efficiency.Simulation results show that PER-MATD3 reduces average task latency by up to 23%,improves energy efficiency by 21%,and enhances service coverage compared to state-of-the-art baselines,demonstrating its effectiveness and practicality in scenarios without terrestrial networks.展开更多
(Quasi-)closed-form results for the statistical properties of unmanned aerial vehicle(UAV)airto-ground channels are derived for the first time using a novel spatial-vector-based method from a threedimensional(3-D)arbi...(Quasi-)closed-form results for the statistical properties of unmanned aerial vehicle(UAV)airto-ground channels are derived for the first time using a novel spatial-vector-based method from a threedimensional(3-D)arbitrary-elevation one-cylinder model.The derived results include a closed-form expression for the space-time correlation function and some quasi-closed-form ones for the space-Doppler power spectrum density,the level crossing rate,and the average fading duration,which are shown to be the generalizations of those previously obtained from the two-dimensional(2-D)one-ring model and the 3-D low-elevation one-cylinder model for terrestrial mobile-to-mobile channels.The close agreements between the theoretical results and the simulations as well as the measurements validate the utility of the derived channel statistics.Based on the derived expressions,the impacts of some parameters on the channel characteristics are investigated in an effective,efficient,and explicable way,which leads to a general guideline on the manual parameter estimation from the measurement description.展开更多
Reconfigurable intelligent surfaces(RISs)not only assist communication but also help the localization of user equipment(UE).This study focuses on indoor localization of UE with a single access point(AP)and multiple RI...Reconfigurable intelligent surfaces(RISs)not only assist communication but also help the localization of user equipment(UE).This study focuses on indoor localization of UE with a single access point(AP)and multiple RISs.First,we propose a two-stage channel estimation scheme where RIS phase shifts are tuned to obtain multiple channel soundings.In the first stage,the newtonized orthogonal matching pursuit algorithm extracts the parameters of multiple paths from the received signals.Then,the LOS path and RISreflected paths are identified.In the second stage,the estimated path gains of RIS-reflected paths with different phase shifts are utilized to determine the angle of arrival(AOA)at the RIS by obtaining the angular pseudo spectrum.Consequently,by taking the AP and RISs as reference points,the linear least squares estimator can locate UE with the estimated AOAs.Simulation results show that the proposed algorithm can realize centimeter-level localization accuracy in the discussed scenarios.Moreover,the higher accuracy of pseudo spectrum,a larger number of channel soundings,and a larger number of reference points can realize higher localization accuracy of UE.展开更多
Processes supported by process-aware information systems are subject to continuous and often subtle changes due to evolving operational,organizational,or regulatory factors.These changes,referred to as incremental con...Processes supported by process-aware information systems are subject to continuous and often subtle changes due to evolving operational,organizational,or regulatory factors.These changes,referred to as incremental concept drift,gradually alter the behavior or structure of processes,making their detection and localization a challenging task.Traditional process mining techniques frequently assume process stationarity and are limited in their ability to detect such drift,particularly from a control-flow perspective.The objective of this research is to develop an interpretable and robust framework capable of detecting and localizing incremental concept drift in event logs,with a specific emphasis on the structural evolution of control-flow semantics in processes.We propose DriftXMiner,a control-flow-aware hybrid framework that combines statistical,machine learning,and process model analysis techniques.The approach comprises three key components:(1)Cumulative Drift Scanner that tracks directional statistical deviations to detect early drift signals;(2)a Temporal Clustering and Drift-Aware Forest Ensemble(DAFE)to capture distributional and classification-level changes in process behavior;and(3)Petri net-based process model reconstruction,which enables the precise localization of structural drift using transition deviation metrics and replay fitness scores.Experimental validation on the BPI Challenge 2017 event log demonstrates that DriftXMiner effectively identifies and localizes gradual and incremental process drift over time.The framework achieves a detection accuracy of 92.5%,a localization precision of 90.3%,and an F1-score of 0.91,outperforming competitive baselines such as CUSUM+Histograms and ADWIN+Alpha Miner.Visual analyses further confirm that identified drift points align with transitions in control-flow models and behavioral cluster structures.DriftXMiner offers a novel and interpretable solution for incremental concept drift detection and localization in dynamic,process-aware systems.By integrating statistical signal accumulation,temporal behavior profiling,and structural process mining,the framework enables finegrained drift explanation and supports adaptive process intelligence in evolving environments.Its modular architecture supports extension to streaming data and real-time monitoring contexts.展开更多
Dear editor,Infrared and visible image fusion(IVIF)technologies are to extract complementary information from source images and generate a single fused result[1],which is widely applied in various high-level visual ta...Dear editor,Infrared and visible image fusion(IVIF)technologies are to extract complementary information from source images and generate a single fused result[1],which is widely applied in various high-level visual tasks such as segmentation and object detection[2].展开更多
A kind of single linked lists named aggregative chain is introduced to the algorithm, thus improving the architecture of FP tree. The new FP tree is a one-way tree and only the pointers that point its parent at each n...A kind of single linked lists named aggregative chain is introduced to the algorithm, thus improving the architecture of FP tree. The new FP tree is a one-way tree and only the pointers that point its parent at each node are kept. Route information of different nodes in a same item are compressed into aggregative chains so that the frequent patterns will be produced in aggregative chains without generating node links and conditional pattern bases. An example of Web key words retrieval is given to analyze and verify the frequent pattern algorithm in this paper.展开更多
Based on the features of marine environmental data and processing requirements, a cloud computing archi- tecture of marine environment information is proposed, which provides a new cloud technology framework for the i...Based on the features of marine environmental data and processing requirements, a cloud computing archi- tecture of marine environment information is proposed, which provides a new cloud technology framework for the integration and sharing of marine environmental information resources. A physical layer, software platform layer and an application layer are illustrated systematically, at the same time, a corresponding solu- tions for many difficult technical problems such as parallel query processing of multi-dimensional, spatio- temporal information, data slice storage, software service flow customization, analysis, reorganization and so on. A prototype system is developed and many different data-size experiments and a comparative analy- sis are done based on it. The experiment results show that the cloud platform based on this framework can achieve high performance and scalability when dealing with large-scale marine data.展开更多
In converged heterogeneous wireless networks, vertical handoff is an important issue in radio resource management and occurs when an end user switches from one network to another (e.g., from wireless local area netwo...In converged heterogeneous wireless networks, vertical handoff is an important issue in radio resource management and occurs when an end user switches from one network to another (e.g., from wireless local area network to wideband code division multiple access). Efficient vertical handoff should allocate network resources efficiently and maintain good quality of service (QoS) for the end users. The objective of this work is to determine conditions under which vertical handoff can be performed. The channel usage situation of each access network is formulated as a birth-death process with the objective of predicting the avaliable bandwidth and the blocking probability. A reward function is used to capture the network bandwidth and the blocking probability is expressed as a cost function. An end user will access the certain network which maximizes the total function defined as the combination of the reward fimction and the cost function. Simulation results show that the proposed algorithm can significantly improve the network performance, including higher bandwidth for end users and lower new call blocking and handoff call blocking probability for networks.展开更多
For the issue of evaluation of capability of enterprise agent coalition,an evaluation model based on information fusion and entropy weighting method is presented. The attribute reduction method is utilized to reduce i...For the issue of evaluation of capability of enterprise agent coalition,an evaluation model based on information fusion and entropy weighting method is presented. The attribute reduction method is utilized to reduce indicators of the capability according to the theory of rough set. The new indicator system can be determined. Attribute reduction can also reduce the workload and remove the redundant information,when there are too many indicators or the indicators have strong correlation. The research complexity can be reduced and the efficiency can be improved. Entropy weighting method is used to determine the weights of the remaining indicators,and the importance of indicators is analyzed. The information fusion model based on nearest neighbor method is developed and utilized to evaluate the capability of multiple agent coalitions,compared to cloud evaluation model and D-S evidence method. Simulation results are reasonable and with obvious distinction. Thus they verify the effectiveness and feasibility of the model. The information fusion model can provide more scientific,rational decision support for choosing the best agent coalition,and provide innovative steps for the evaluation process of capability of agent coalitions.展开更多
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens...This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems.展开更多
To study the fluid dynamic response mechanism under the working condition of water injection well borehole,based on the microelement analysis of fluid mechanics and the classical theory of hydrodynamics,a fluid microe...To study the fluid dynamic response mechanism under the working condition of water injection well borehole,based on the microelement analysis of fluid mechanics and the classical theory of hydrodynamics,a fluid microelement pressure-flow rate relationship model is built to derive and solve the dynamic distribution of fluid pressure and flow rate in the space of well borehole.Combined with the production data of a typical deviated well in China,numerical simulations and analyses are carried out to analyze the dynamic distribution of wellbore pressure at different injection pressures and injection volumes,the delayed and attenuated characteristics of fluid transmission in tube,and the dynamic distribution of wellbore pressure amplitude under the fluctuation of wellhead pressure.The pressure loss along the wellbore has nothing to do with the absolute pressure,and the design of the coding and decoding scheme for wave code communication doesn’t need to consider the absolute pressure during injecting.When the injection pressure is constant,the higher the injection flow rate at the wellhead,the larger the pressure loss along the wellbore.The fluid wave signal delay amplitude mainly depends on the length of the wellbore.The smaller the tubing diameter,the larger the fluid wave signal attenuation amplitude.The higher the target wave code amplitude(differential pressure identification root mean square)generated at the same well depth,the greater the wellhead pressure wave amplitude required to overcome the wellbore pressure loss.展开更多
The method of singular coefficient of water inrush to achieve safety mining has limitation and one sidedness. Aiming at the problem above, large amounts of data about water inrush were collected. Then the data, includ...The method of singular coefficient of water inrush to achieve safety mining has limitation and one sidedness. Aiming at the problem above, large amounts of data about water inrush were collected. Then the data, including the maximum water inrush, water inrush coefficient and water abundance in aquifers of working face, were processed by the statistical analysis. The analysis results indicate that both water inrush coefficient and water abundance in aquifers should be taken into consideration when evaluating the danger of water inrush from coal seam floor. The prediction model of safe-mining evaluation grade was built by using the support vector machine, and the result shows that this model has high classification accuracy. A feasible classification system of water-inrush safety evaluation can be got by using the data visualization method which makes the implicit support vector machine models explicit.展开更多
Real-time monitoring and wireless transmission of farmland soil moisture have been paid with more and more attention in the research of agricultural drought monitoring, early warning and prevention and control technol...Real-time monitoring and wireless transmission of farmland soil moisture have been paid with more and more attention in the research of agricultural drought monitoring, early warning and prevention and control technology. The hardware design and software design of soil moisture monitoring in farmland were carried out, and a monitoring system based on the principles of ZigBee and GPRS technologies was developed and applied to the actual monitoring of soil moisture in farmland. This study provides a good idea to promote real-time monitoring, wireless transmission and intelligent management of soil moisture in farmland.展开更多
The purpose of this research is a quantitative analysis of movement patterns of dance, which cannot be analyzed with a motion capture system alone, using simultaneous measurement of body motion and biophysical informa...The purpose of this research is a quantitative analysis of movement patterns of dance, which cannot be analyzed with a motion capture system alone, using simultaneous measurement of body motion and biophysical information. In this research, two kinds of same leg movement are captured by simultaneous measurement; one is a leg movement with given strength, the other is a leg movement without strength on condition of basic experiment using optical motion capture and electromyography (EMG) equipment in order to quantitatively analyze characteristics of leg movement. Also, we measured the motion of the traditional Japanese dance using the constructed system. We can visualize leg movement of Japanese dance by displaying a 3D CG character animation with motion data and EMG data. In addition, we expect that our research will help dancers and researchers on dance through giving new information on dance movement which cannot be analyzed with only motion capture.展开更多
This study presents the authors' recent research and application of a new visual programming language and its development environment: VIPLE (Visual IoT/Robotics Programming Language Environment) at Arizona State ...This study presents the authors' recent research and application of a new visual programming language and its development environment: VIPLE (Visual IoT/Robotics Programming Language Environment) at Arizona State University (ASU). ASU VIPLE supports a variety of loT devices and robots based on an open architecture. Based on computational thinking, VIPLE supports the integration of engineering design process, workflow, fundamental programming concepts, control flow, parallel computing, event-driven programming, and service-oriented computing seamlessly into a wide range of curricula, such as introduction to computing, introduction to engineering, service-oriented computing, and software integration. It is actively used at ASU in several sections of FSE 100: Introduction to Engineering and in CSE 446: Software Integration and Engineering, as well as in several other universities worldwide.展开更多
基金supported in part by the National Natural Science Foundation of China under Grant 62371181in part by the Changzhou Science and Technology International Cooperation Program under Grant CZ20230029+1 种基金supported by a National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(2021R1A2B5B02087169)supported under the framework of international cooperation program managed by the National Research Foundation of Korea(2022K2A9A1A01098051)。
文摘The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions.
基金supported in part by the National Key Research and Development Program under Grant(2021YFB2900300)by the National Natural Science Foundation of China(NSFC)under Grants 61971127,61871122by the Southeast University-China Mobile Research Institute Joint Innovation Center,and by the Major Key Project of PCL(PCL2021A01-2).
文摘This paper investigates how to achieve integrated sensing and communication(ISAC)based on a cell-free radio access network(CF-RAN)architecture with a minimum footprint of communication resources.We propose a new passive sensing scheme.The scheme is based on the radio frequency(RF)fingerprint learning of the RF radio unit(RRU)to build an RF fingerprint library of RRUs.The source RRU is identified by comparing the RF fingerprints carried by the signal at the receiver side.The receiver extracts the channel parameters from the signal and estimates the channel environment,thus locating the reflectors in the environment.The proposed scheme can effectively solve the problem of interference between signals in the same time-frequency domain but in different spatial domains when multiple RRUs jointly serve users in CF-RAN architecture.Simulation results show that the proposed passive ISAC scheme can effectively detect reflector location information in the environment without degrading the communication performance.
基金supported in part by the National Natural Science Foundation of China under Grants 62001225,62071236,62071234 and U22A2002in part by the Major Science and Technology plan of Hainan Province under Grant ZDKJ2021022+1 种基金in part by the Scientific Research Fund Project of Hainan University under Grant KYQD(ZR)-21008in part by the Key Technologies R&D Program of Jiangsu(Prospective and Key Technologies for Industry)under Grants BE2023022 and BE2023022-2.
文摘The Internet of Unmanned Aerial Vehicles(I-UAVs)is expected to execute latency-sensitive tasks,but limited by co-channel interference and malicious jamming.In the face of unknown prior environmental knowledge,defending against jamming and interference through spectrum allocation becomes challenging,especially when each UAV pair makes decisions independently.In this paper,we propose a cooperative multi-agent reinforcement learning(MARL)-based anti-jamming framework for I-UAVs,enabling UAV pairs to learn their own policies cooperatively.Specifically,we first model the problem as a modelfree multi-agent Markov decision process(MAMDP)to maximize the long-term expected system throughput.Then,for improving the exploration of the optimal policy,we resort to optimizing a MARL objective function with a mutual-information(MI)regularizer between states and actions,which can dynamically assign the probability for actions frequently used by the optimal policy.Next,through sharing their current channel selections and local learning experience(their soft Q-values),the UAV pairs can learn their own policies cooperatively relying on only preceding observed information and predicting others’actions.Our simulation results show that for both sweep jamming and Markov jamming patterns,the proposed scheme outperforms the benchmarkers in terms of throughput,convergence and stability for different numbers of jammers,channels and UAV pairs.
基金supported by the National Natural Science Foundation of China(No.62306281)the Natural Science Foundation of Zhejiang Province(Nos.LQ23E060006 and LTGG24E050005)the Key Research Plan of Jiaxing City(No.2024BZ20016).
文摘In the era of big data,data-driven technologies are increasingly leveraged by industry to facilitate autonomous learning and intelligent decision-making.However,the challenge of“small samples in big data”emerges when datasets lack the comprehensive information necessary for addressing complex scenarios,which hampers adaptability.Thus,enhancing data completeness is essential.Knowledge-guided virtual sample generation transforms domain knowledge into extensive virtual datasets,thereby reducing dependence on limited real samples and enabling zero-sample fault diagnosis.This study used building air conditioning systems as a case study.We innovatively used the large language model(LLM)to acquire domain knowledge for sample generation,significantly lowering knowledge acquisition costs and establishing a generalized framework for knowledge acquisition in engineering applications.This acquired knowledge guided the design of diffusion boundaries in mega-trend diffusion(MTD),while the Monte Carlo method was used to sample within the diffusion function to create information-rich virtual samples.Additionally,a noise-adding technique was introduced to enhance the information entropy of these samples,thereby improving the robustness of neural networks trained with them.Experimental results showed that training the diagnostic model exclusively with virtual samples achieved an accuracy of 72.80%,significantly surpassing traditional small-sample supervised learning in terms of generalization.This underscores the quality and completeness of the generated virtual samples.
基金funded by the Hunan Provincial Natural Science Foundation of China(Grant No.2025JJ70105)the Hunan Provincial College Students’Innovation and Entrepreneurship Training Program(Project No.S202411342056)The article processing charge(APC)was funded by the Project No.2025JJ70105.
文摘With the widespread use of social media,the propagation of health-related rumors has become a significant public health threat.Existing methods for detecting health rumors predominantly rely on external knowledge or propagation structures,with only a few recent approaches attempting causal inference;however,these have not yet effectively integrated causal discovery with domain-specific knowledge graphs for detecting health rumors.In this study,we found that the combined use of causal discovery and domain-specific knowledge graphs can effectively identify implicit pseudo-causal logic embedded within texts,holding significant potential for health rumor detection.To this end,we propose CKDG—a dual-graph fusion framework based on causal logic and medical knowledge graphs.CKDG constructs a weighted causal graph to capture the implicit causal relationships in the text and introduces a medical knowledge graph to verify semantic consistency,thereby enhancing the ability to identify the misuse of professional terminology and pseudoscientific claims.In experiments conducted on a dataset comprising 8430 health rumors,CKDG achieved an accuracy of 91.28%and an F1 score of 90.38%,representing improvements of 5.11%and 3.29%over the best baseline,respectively.Our results indicate that the integrated use of causal discovery and domainspecific knowledge graphs offers significant advantages for health rumor detection systems.This method not only improves detection performance but also enhances the transparency and credibility of model decisions by tracing causal chains and sources of knowledge conflicts.We anticipate that this work will provide key technological support for the development of trustworthy health-information filtering systems,thereby improving the reliability of public health information on social media.
基金supported by the National Natural Science Foundation of China under Grant No.61701100.
文摘In scenarios where ground-based cloud computing infrastructure is unavailable,unmanned aerial vehicles(UAVs)act as mobile edge computing(MEC)servers to provide on-demand computation services for ground terminals.To address the challenge of jointly optimizing task scheduling and UAV trajectory under limited resources and high mobility of UAVs,this paper presents PER-MATD3,a multi-agent deep reinforcement learning algorithm with prioritized experience replay(PER)into the Centralized Training with Decentralized Execution(CTDE)framework.Specifically,PER-MATD3 enables each agent to learn a decentralized policy using only local observations during execution,while leveraging a shared replay buffer with prioritized sampling and centralized critic during training to accelerate convergence and improve sample efficiency.Simulation results show that PER-MATD3 reduces average task latency by up to 23%,improves energy efficiency by 21%,and enhances service coverage compared to state-of-the-art baselines,demonstrating its effectiveness and practicality in scenarios without terrestrial networks.
基金supported in part by the National Key Research and Development Program of China(2021YFB2900501)in part by the Shaanxi Science and Technology Innovation Team(2023-CX-TD-03)+3 种基金in part by the Science and Technology Program of Shaanxi Province(2021GXLH-Z-038)in part by the Natural Science Foundation of Hunan Province(2023JJ40607 and 2023JJ50045)in part by the Scientific Research Foundation of Hunan Provincial Education Department(23B0713 and 24B0603)in part by the National Natural Science Foundation of China(62401371,62101275,and 62372070).
文摘(Quasi-)closed-form results for the statistical properties of unmanned aerial vehicle(UAV)airto-ground channels are derived for the first time using a novel spatial-vector-based method from a threedimensional(3-D)arbitrary-elevation one-cylinder model.The derived results include a closed-form expression for the space-time correlation function and some quasi-closed-form ones for the space-Doppler power spectrum density,the level crossing rate,and the average fading duration,which are shown to be the generalizations of those previously obtained from the two-dimensional(2-D)one-ring model and the 3-D low-elevation one-cylinder model for terrestrial mobile-to-mobile channels.The close agreements between the theoretical results and the simulations as well as the measurements validate the utility of the derived channel statistics.Based on the derived expressions,the impacts of some parameters on the channel characteristics are investigated in an effective,efficient,and explicable way,which leads to a general guideline on the manual parameter estimation from the measurement description.
基金supported in part by the Fundamental Research Funds for the Central Universities under Grant 2242022k60004in part by the National Natural Science Foundation of China(NSFC)under Grants 62261160576,624B2036,W2421087,62422105+1 种基金in part by the Young Elite Scientists Sponsorship Program by CAST 2022QNRC001,and the“Zhishan”Scholars Programs of Southeast Universityin part by the Key Technologies R&D Program of Jiangsu(Prospective and Key Technologies for Industry)under Grants BE2023022,BE2023022-1 and BE2023022-2.
文摘Reconfigurable intelligent surfaces(RISs)not only assist communication but also help the localization of user equipment(UE).This study focuses on indoor localization of UE with a single access point(AP)and multiple RISs.First,we propose a two-stage channel estimation scheme where RIS phase shifts are tuned to obtain multiple channel soundings.In the first stage,the newtonized orthogonal matching pursuit algorithm extracts the parameters of multiple paths from the received signals.Then,the LOS path and RISreflected paths are identified.In the second stage,the estimated path gains of RIS-reflected paths with different phase shifts are utilized to determine the angle of arrival(AOA)at the RIS by obtaining the angular pseudo spectrum.Consequently,by taking the AP and RISs as reference points,the linear least squares estimator can locate UE with the estimated AOAs.Simulation results show that the proposed algorithm can realize centimeter-level localization accuracy in the discussed scenarios.Moreover,the higher accuracy of pseudo spectrum,a larger number of channel soundings,and a larger number of reference points can realize higher localization accuracy of UE.
文摘Processes supported by process-aware information systems are subject to continuous and often subtle changes due to evolving operational,organizational,or regulatory factors.These changes,referred to as incremental concept drift,gradually alter the behavior or structure of processes,making their detection and localization a challenging task.Traditional process mining techniques frequently assume process stationarity and are limited in their ability to detect such drift,particularly from a control-flow perspective.The objective of this research is to develop an interpretable and robust framework capable of detecting and localizing incremental concept drift in event logs,with a specific emphasis on the structural evolution of control-flow semantics in processes.We propose DriftXMiner,a control-flow-aware hybrid framework that combines statistical,machine learning,and process model analysis techniques.The approach comprises three key components:(1)Cumulative Drift Scanner that tracks directional statistical deviations to detect early drift signals;(2)a Temporal Clustering and Drift-Aware Forest Ensemble(DAFE)to capture distributional and classification-level changes in process behavior;and(3)Petri net-based process model reconstruction,which enables the precise localization of structural drift using transition deviation metrics and replay fitness scores.Experimental validation on the BPI Challenge 2017 event log demonstrates that DriftXMiner effectively identifies and localizes gradual and incremental process drift over time.The framework achieves a detection accuracy of 92.5%,a localization precision of 90.3%,and an F1-score of 0.91,outperforming competitive baselines such as CUSUM+Histograms and ADWIN+Alpha Miner.Visual analyses further confirm that identified drift points align with transitions in control-flow models and behavioral cluster structures.DriftXMiner offers a novel and interpretable solution for incremental concept drift detection and localization in dynamic,process-aware systems.By integrating statistical signal accumulation,temporal behavior profiling,and structural process mining,the framework enables finegrained drift explanation and supports adaptive process intelligence in evolving environments.Its modular architecture supports extension to streaming data and real-time monitoring contexts.
基金the National Natural Science Foundation of China(61966037,61833005,61463052)China Postdoctoral Science Foundation(2017M621586)+1 种基金Program of Yunnan Key Laboratory of Intelligent Systems and Computing(202205AG070003)Postgraduate Science Foundation of Yunnan University(2021Y263)。
文摘Dear editor,Infrared and visible image fusion(IVIF)technologies are to extract complementary information from source images and generate a single fused result[1],which is widely applied in various high-level visual tasks such as segmentation and object detection[2].
基金Supported by the Natural Science Foundation ofLiaoning Province (20042020)
文摘A kind of single linked lists named aggregative chain is introduced to the algorithm, thus improving the architecture of FP tree. The new FP tree is a one-way tree and only the pointers that point its parent at each node are kept. Route information of different nodes in a same item are compressed into aggregative chains so that the frequent patterns will be produced in aggregative chains without generating node links and conditional pattern bases. An example of Web key words retrieval is given to analyze and verify the frequent pattern algorithm in this paper.
基金the Ocean Public Welfare Scientific Research Project of State Oceanic Administration of China under contract No.201105033
文摘Based on the features of marine environmental data and processing requirements, a cloud computing archi- tecture of marine environment information is proposed, which provides a new cloud technology framework for the integration and sharing of marine environmental information resources. A physical layer, software platform layer and an application layer are illustrated systematically, at the same time, a corresponding solu- tions for many difficult technical problems such as parallel query processing of multi-dimensional, spatio- temporal information, data slice storage, software service flow customization, analysis, reorganization and so on. A prototype system is developed and many different data-size experiments and a comparative analy- sis are done based on it. The experiment results show that the cloud platform based on this framework can achieve high performance and scalability when dealing with large-scale marine data.
基金Project(20040533035) supported by the National Research Foundation for the Doctoral Program of Higher Education of ChinaProject (50275150) supported by the National Natural Science Foundation of China
文摘In converged heterogeneous wireless networks, vertical handoff is an important issue in radio resource management and occurs when an end user switches from one network to another (e.g., from wireless local area network to wideband code division multiple access). Efficient vertical handoff should allocate network resources efficiently and maintain good quality of service (QoS) for the end users. The objective of this work is to determine conditions under which vertical handoff can be performed. The channel usage situation of each access network is formulated as a birth-death process with the objective of predicting the avaliable bandwidth and the blocking probability. A reward function is used to capture the network bandwidth and the blocking probability is expressed as a cost function. An end user will access the certain network which maximizes the total function defined as the combination of the reward fimction and the cost function. Simulation results show that the proposed algorithm can significantly improve the network performance, including higher bandwidth for end users and lower new call blocking and handoff call blocking probability for networks.
基金Sponsored by the National Natural Science Foundation of China(Grant No.61173052)the China Postdoctoral Scinece Foundation(Grant No.2014M561363)
文摘For the issue of evaluation of capability of enterprise agent coalition,an evaluation model based on information fusion and entropy weighting method is presented. The attribute reduction method is utilized to reduce indicators of the capability according to the theory of rough set. The new indicator system can be determined. Attribute reduction can also reduce the workload and remove the redundant information,when there are too many indicators or the indicators have strong correlation. The research complexity can be reduced and the efficiency can be improved. Entropy weighting method is used to determine the weights of the remaining indicators,and the importance of indicators is analyzed. The information fusion model based on nearest neighbor method is developed and utilized to evaluate the capability of multiple agent coalitions,compared to cloud evaluation model and D-S evidence method. Simulation results are reasonable and with obvious distinction. Thus they verify the effectiveness and feasibility of the model. The information fusion model can provide more scientific,rational decision support for choosing the best agent coalition,and provide innovative steps for the evaluation process of capability of agent coalitions.
基金supported in part by the National Natural Science Foundation of China (NSFC)(61703086, 61773106)the IAPI Fundamental Research Funds (2018ZCX27)
文摘This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems.
基金Supported by the National Natural Science Foundation of China(52074345)CNPC Research and Technology Development Project(2021ZG12).
文摘To study the fluid dynamic response mechanism under the working condition of water injection well borehole,based on the microelement analysis of fluid mechanics and the classical theory of hydrodynamics,a fluid microelement pressure-flow rate relationship model is built to derive and solve the dynamic distribution of fluid pressure and flow rate in the space of well borehole.Combined with the production data of a typical deviated well in China,numerical simulations and analyses are carried out to analyze the dynamic distribution of wellbore pressure at different injection pressures and injection volumes,the delayed and attenuated characteristics of fluid transmission in tube,and the dynamic distribution of wellbore pressure amplitude under the fluctuation of wellhead pressure.The pressure loss along the wellbore has nothing to do with the absolute pressure,and the design of the coding and decoding scheme for wave code communication doesn’t need to consider the absolute pressure during injecting.When the injection pressure is constant,the higher the injection flow rate at the wellhead,the larger the pressure loss along the wellbore.The fluid wave signal delay amplitude mainly depends on the length of the wellbore.The smaller the tubing diameter,the larger the fluid wave signal attenuation amplitude.The higher the target wave code amplitude(differential pressure identification root mean square)generated at the same well depth,the greater the wellhead pressure wave amplitude required to overcome the wellbore pressure loss.
基金Financial supports for this work, provided by National Natural Key Science Foundation of China (No. 50539080)Ministry of Education Research Fund for the doctoral program of China (No. 20133718110004)+2 种基金the Natural Science Key Foundation of Shandong Province of China (No. ZR2011EEZ002)the Technology Project Development Plan of Qingdao Economic and Technological Development Zone of China (No. 2013-1-62)SDUST Research Fund of China (No. 2012KYTD101)
文摘The method of singular coefficient of water inrush to achieve safety mining has limitation and one sidedness. Aiming at the problem above, large amounts of data about water inrush were collected. Then the data, including the maximum water inrush, water inrush coefficient and water abundance in aquifers of working face, were processed by the statistical analysis. The analysis results indicate that both water inrush coefficient and water abundance in aquifers should be taken into consideration when evaluating the danger of water inrush from coal seam floor. The prediction model of safe-mining evaluation grade was built by using the support vector machine, and the result shows that this model has high classification accuracy. A feasible classification system of water-inrush safety evaluation can be got by using the data visualization method which makes the implicit support vector machine models explicit.
基金Supported by Special Scientific Research Fund of Meteorology in the Public Welfare Profession of China(GYHY201306046-05)
文摘Real-time monitoring and wireless transmission of farmland soil moisture have been paid with more and more attention in the research of agricultural drought monitoring, early warning and prevention and control technology. The hardware design and software design of soil moisture monitoring in farmland were carried out, and a monitoring system based on the principles of ZigBee and GPRS technologies was developed and applied to the actual monitoring of soil moisture in farmland. This study provides a good idea to promote real-time monitoring, wireless transmission and intelligent management of soil moisture in farmland.
基金This work was partly supported by the"21st Century COE program",the"Open Research Center program"the"Grantin-in-Aid for Scientific Research"of the Ministry of Education,Science,Sports and Culture(No.(B)16300035).
文摘The purpose of this research is a quantitative analysis of movement patterns of dance, which cannot be analyzed with a motion capture system alone, using simultaneous measurement of body motion and biophysical information. In this research, two kinds of same leg movement are captured by simultaneous measurement; one is a leg movement with given strength, the other is a leg movement without strength on condition of basic experiment using optical motion capture and electromyography (EMG) equipment in order to quantitatively analyze characteristics of leg movement. Also, we measured the motion of the traditional Japanese dance using the constructed system. We can visualize leg movement of Japanese dance by displaying a 3D CG character animation with motion data and EMG data. In addition, we expect that our research will help dancers and researchers on dance through giving new information on dance movement which cannot be analyzed with only motion capture.
文摘This study presents the authors' recent research and application of a new visual programming language and its development environment: VIPLE (Visual IoT/Robotics Programming Language Environment) at Arizona State University (ASU). ASU VIPLE supports a variety of loT devices and robots based on an open architecture. Based on computational thinking, VIPLE supports the integration of engineering design process, workflow, fundamental programming concepts, control flow, parallel computing, event-driven programming, and service-oriented computing seamlessly into a wide range of curricula, such as introduction to computing, introduction to engineering, service-oriented computing, and software integration. It is actively used at ASU in several sections of FSE 100: Introduction to Engineering and in CSE 446: Software Integration and Engineering, as well as in several other universities worldwide.