Both evolutionary computation(EC)and multiagent systems(MAS)study the emergence of intelligence through the interaction and cooperation of a group of individuals.EC focuses on solving various complex optimization prob...Both evolutionary computation(EC)and multiagent systems(MAS)study the emergence of intelligence through the interaction and cooperation of a group of individuals.EC focuses on solving various complex optimization problems,while MAS provides a flexible model for distributed artificial intelligence.Since their group interaction mechanisms can be borrowed from each other,many studies have attempted to combine EC and MAS.With the rapid development of the Internet of Things,the confluence of EC and MAS has become more and more important,and related articles have shown a continuously growing trend during the last decades.In this survey,we first elaborate on the mutual assistance of EC and MAS from two aspects,agent-based EC and EC-assisted MAS.Agent-based EC aims to introduce characteristics of MAS into EC to improve the performance and parallelism of EC,while EC-assisted MAS aims to use EC to better solve optimization problems in MAS.Furthermore,we review studies that combine the cooperation mechanisms of EC and MAS,which greatly leverage the strengths of both sides.A description framework is built to elaborate existing studies.Promising future research directions are also discussed in conjunction with emerging technologies and real-world applications.展开更多
This paper explores the reform and practice of software engineering-related courses based on the competency model of the Computing Curricula,and proposes some measures of teaching reform and talent cultivation in soft...This paper explores the reform and practice of software engineering-related courses based on the competency model of the Computing Curricula,and proposes some measures of teaching reform and talent cultivation in software engineering.The teaching reform emphasizes student-centered education,and focuses on the cultivation and enhancement of students’knowledge,skills,and dispositions.Based on the three elements of the competency model,specific measures of teaching reform are proposed for some professional courses in software engineering,to strengthen course relevance,improve knowledge systems,reform practical modes with a focus on skill development,and cultivate good dispositions through student-centered education.The teaching reform’s attempts and practice are conducted in some courses such as Advanced Web Technologies,Software Engineering,and Intelligent Terminal Systems and Application Development.Through the analysis and comparison of the implementation effects,significant improvements are observed in teaching effectiveness,students’mastery of knowledge and skills are noticeably improved,and the expected goals of the teaching reform are achieved.展开更多
Given the accelerating development of Internet of things(IoT),a secure and robust authentication mechanism is urgently required as a critical architectural component.The IoT has improved the quality of everyday life f...Given the accelerating development of Internet of things(IoT),a secure and robust authentication mechanism is urgently required as a critical architectural component.The IoT has improved the quality of everyday life for numerous people in many ways.Owing to the predominantly wireless nature of the IoT,connected devices are more vulnerable to security threats compared to wired networks.User authentication is thus of utmost importance in terms of security on the IoT.Several authentication protocols have been proposed in recent years,but most prior schemes do not provide sufficient security for these wireless networks.To overcome the limitations of previous schemes,we propose an efficient and lightweight authentication scheme called the Cogent Biometric-Based Authentication Scheme(COBBAS).The proposed scheme is based on biometric data,and uses lightweight operations to enhance the efficiency of the network in terms of time,storage,and battery consumption.A formal security analysis of COBBAS using Burrows–Abadi–Needham logic proves that the proposed protocol provides secure mutual authentication.Formal security verification using the Automated Validation of Internet Security Protocols and Applications tool shows that the proposed protocol is safe against man-in-the-middle and replay attacks.Informal security analysis further shows that COBBAS protects wireless sensor networks against several security attacks such as password guessing,impersonation,stolen verifier attacks,denial-of-service attacks,and errors in biometric recognition.This protocol also provides user anonymity,confidentiality,integrity,and biometric recovery in acceptable time with reasonable computational cost.展开更多
The mining sector historically drove the global economy but at the expense of severe environmental and health repercussions,posing sustainability challenges[1]-[3].Recent advancements on artificial intelligence(AI)are...The mining sector historically drove the global economy but at the expense of severe environmental and health repercussions,posing sustainability challenges[1]-[3].Recent advancements on artificial intelligence(AI)are revolutionizing mining through robotic and data-driven innovations[4]-[7].While AI offers mining industry advantages,it is crucial to acknowledge the potential risks associated with its widespread use.Over-reliance on AI may lead to a loss of human control over mining operations in the future,resulting in unpredictable consequences.展开更多
Abstract--Near field communications (NFC) is a newly thrived technology in recent years. This technology has been installed on many kinds of mobile phone systems, especially the Android. However, there is no unified...Abstract--Near field communications (NFC) is a newly thrived technology in recent years. This technology has been installed on many kinds of mobile phone systems, especially the Android. However, there is no unified and complete framework to access NFC so far. The current software stack of NFC merely implements data obtaining features, ignoring the post-processing of data and lacking a certain security mechanism for NFC, which results in inefficiency and inconvenience for software development and maintenance. Above all, security problems could be caused due to the absence of the security mechanism. To propose a solution, this paper presents a brand-new framework for NFC utilization by analyzing and constructing a service model. Thus, the proposed framework encapsulates the current NFC stack on Android, formulating a three-layer structure after implementing the encapsulation and parsing of NFC records, which ultimately enables an XML document to describe the configuration of NFC and its related service flow. Simultaneously, a context-awareness model is proposed and built in this paper to equip the framework with the capability of adapting to different'physical environment.展开更多
Images with complementary spectral information can be recorded using image sensors that can identify visible and near-infrared spectrum.The fusion of visible and nearinfrared(NIR)aims to enhance the quality of images ...Images with complementary spectral information can be recorded using image sensors that can identify visible and near-infrared spectrum.The fusion of visible and nearinfrared(NIR)aims to enhance the quality of images acquired by video monitoring systems for the ease of user observation and data processing.Unfortunately,current fusion algorithms produce artefacts and colour distortion since they cannot make use of spectrum properties and are lacking in information complementarity.Therefore,an information complementarity fusion(ICF)model is designed based on physical signals.In order to separate high-frequency noise from important information in distinct frequency layers,the authors first extracted texture-scale and edge-scale layers using a two-scale filter.Second,the difference map between visible and near-infrared was filtered using the extended-DoG filter to produce the initial visible-NIR complementary weight map.Then,to generate a guide map,the near-infrared image with night adjustment was processed as well.The final complementarity weight map was subsequently derived via an arctanI function mapping using the guide map and the initial weight maps.Finally,fusion images were generated with the complementarity weight maps.The experimental results demonstrate that the proposed approach outperforms the state-of-the-art in both avoiding artificial colours as well as effectively utilising information complementarity.展开更多
The knowledge graph(KG) that represents structural relations among entities has become an increasingly important research field for knowledge-driven artificial intelligence. In this survey, a comprehensive review of K...The knowledge graph(KG) that represents structural relations among entities has become an increasingly important research field for knowledge-driven artificial intelligence. In this survey, a comprehensive review of KG and KG reasoning is provided. It introduces an overview of KGs, including representation, storage, and essential technologies. Specifically, it summarizes several types of knowledge reasoning approaches, including logic rules-based, representation-based, and neural network-based methods. Moreover, this paper analyzes the representation methods of knowledge hypergraphs. To effectively model hyper-relational data and improve the performance of knowledge reasoning, a three-layer knowledge hypergraph model is proposed. Finally, it analyzes the advantages of three-layer knowledge hypergraphs through reasoning and update algorithms which could facilitate future research.展开更多
Latent factor(LF)models are highly effective in extracting useful knowledge from High-Dimensional and Sparse(HiDS)matrices which are commonly seen in various industrial applications.An LF model usually adopts iterativ...Latent factor(LF)models are highly effective in extracting useful knowledge from High-Dimensional and Sparse(HiDS)matrices which are commonly seen in various industrial applications.An LF model usually adopts iterative optimizers,which may consume many iterations to achieve a local optima,resulting in considerable time cost.Hence,determining how to accelerate the training process for LF models has become a significant issue.To address this,this work proposes a randomized latent factor(RLF)model.It incorporates the principle of randomized learning techniques from neural networks into the LF analysis of HiDS matrices,thereby greatly alleviating computational burden.It also extends a standard learning process for randomized neural networks in context of LF analysis to make the resulting model represent an HiDS matrix correctly.Experimental results on three HiDS matrices from industrial applications demonstrate that compared with state-of-the-art LF models,RLF is able to achieve significantly higher computational efficiency and comparable prediction accuracy for missing data.I provides an important alternative approach to LF analysis of HiDS matrices,which is especially desired for industrial applications demanding highly efficient models.展开更多
Dear editor,Along with the progress of science and technology and the development of social civilization,control system brings an increasingly significant function in daily life.The application field of control system...Dear editor,Along with the progress of science and technology and the development of social civilization,control system brings an increasingly significant function in daily life.The application field of control system is very wide,for instance,in mobile technology[1],artificial earth satellite[2],pest control[3],etc.Ribeiro[4]first put forward the concept of random pulse in 1967.At present,impulsive control is used in networked control[5],secure communication[6],etc.In the 21st century,the impulsive control has been used in synchronization of coupled system,intelligent fault identification,image encryption.展开更多
Cerebral perfusion computed tomography(PCT)is an important imaging modality for evaluating cerebrovascular diseases and stroke symptoms.With widespread public concern about the potential cancer risks and health hazard...Cerebral perfusion computed tomography(PCT)is an important imaging modality for evaluating cerebrovascular diseases and stroke symptoms.With widespread public concern about the potential cancer risks and health hazards associated with cumulative radiation exposure in PCT imaging,considerable research has been conducted to reduce the radiation dose in X-ray-based brain perfusion imaging.Reducing the dose of X-rays causes severe noise and artifacts in PCT images.To solve this problem,we propose a deep learning method called NCS-Unet.The exceptional characteristics of non-subsampled contourlet transform(NSCT)and the Sobel filter are introduced into NCS-Unet.NSCT decomposes the convolved features into high-and low-frequency components.The decomposed high-frequency component retains image edges,contrast imaging traces,and noise,whereas the low-frequency component retains the main image information.The Sobel filter extracts the contours of the original image and the imaging traces caused by the contrast agent decay.The extracted information is added to NCS-Unet to improve its performance in noise reduction and artifact removal.Qualitative and quantitative analyses demonstrated that the proposed NCS-Unet can improve the quality of low-dose cone-beam CT perfusion reconstruction images and the accuracy of perfusion parameter calculations.展开更多
In Beyond the Fifth Generation(B5G)heterogeneous edge networks,numerous users are multiplexed on a channel or served on the same frequency resource block,in which case the transmitter applies coding and the receiver u...In Beyond the Fifth Generation(B5G)heterogeneous edge networks,numerous users are multiplexed on a channel or served on the same frequency resource block,in which case the transmitter applies coding and the receiver uses interference cancellation.Unfortunately,uncoordinated radio resource allocation can reduce system throughput and lead to user inequity,for this reason,in this paper,channel allocation and power allocation problems are formulated to maximize the system sum rate and minimum user achievable rate.Since the construction model is non-convex and the response variables are high-dimensional,a distributed Deep Reinforcement Learning(DRL)framework called distributed Proximal Policy Optimization(PPO)is proposed to allocate or assign resources.Specifically,several simulated agents are trained in a heterogeneous environment to find robust behaviors that perform well in channel assignment and power allocation.Moreover,agents in the collection stage slow down,which hinders the learning of other agents.Therefore,a preemption strategy is further proposed in this paper to optimize the distributed PPO,form DP-PPO and successfully mitigate the straggler problem.The experimental results show that our mechanism named DP-PPO improves the performance over other DRL methods.展开更多
Degradation under challenging conditions such as rain, haze, and low light not only diminishes content visibility, but also results in additional degradation side effects, including detail occlusion and color distorti...Degradation under challenging conditions such as rain, haze, and low light not only diminishes content visibility, but also results in additional degradation side effects, including detail occlusion and color distortion. However, current technologies have barely explored the correlation between perturbation removal and background restoration, consequently struggling to generate high-naturalness content in challenging scenarios. In this paper, we rethink the image enhancement task from the perspective of joint optimization: Perturbation removal and texture reconstruction. To this end, we advise an efficient yet effective image enhancement model, termed the perturbation-guided texture reconstruction network(PerTeRNet). It contains two subnetworks designed for the perturbation elimination and texture reconstruction tasks, respectively. To facilitate texture recovery,we develop a novel perturbation-guided texture enhancement module(PerTEM) to connect these two tasks, where informative background features are extracted from the input with the guidance of predicted perturbation priors. To alleviate the learning burden and computational cost, we suggest performing perturbation removal in a sub-space and exploiting super-resolution to infer high-frequency background details. Our PerTeRNet has demonstrated significant superiority over typical methods in both quantitative and qualitative measures, as evidenced by extensive experimental results on popular image enhancement and joint detection tasks. The source code is available at https://github.com/kuijiang94/PerTeRNet.展开更多
With the development of wireless networks and mobile computing, more advanced applications with context-awareness and adaptability to their changing context are needed. However, building context-aware applications is ...With the development of wireless networks and mobile computing, more advanced applications with context-awareness and adaptability to their changing context are needed. However, building context-aware applications is difficult due to the lack of adequate infrastructure support. In this paper, a web middleware architecture for the development of context-awareness applications using near field communication (NFC) is proposed. Based on it, the efficient support for acquiring, interpreting, and accessing context is provided, and the user's quality of experience is improved. Moreover, a mobile web middleware for the testing and full realization of NFC context-awareness applications has been developed together with two application examples.展开更多
Transfer learning is the predominant method for adapting pre-trained models on another task to new domains while preserving their internal architectures and augmenting them with requisite layers in Deep Neural Network...Transfer learning is the predominant method for adapting pre-trained models on another task to new domains while preserving their internal architectures and augmenting them with requisite layers in Deep Neural Network models.Training intricate pre-trained models on a sizable dataset requires significant resources to fine-tune hyperparameters carefully.Most existing initialization methods mainly focus on gradient flow-related problems,such as gradient vanishing or exploding,or other existing approaches that require extra models that do not consider our setting,which is more practical.To address these problems,we suggest employing gradient-free heuristic methods to initialize the weights of the final new-added fully connected layer in neural networks froma small set of training data with fewer classes.The approach relies on partitioning the output values from pre-trained models for a small set into two separate intervals determined by the targets.This process is framed as an optimization problem for each output neuron and class.The optimization selects the highest values as weights,considering their direction towards the respective classes.Furthermore,empirical 145 experiments involve a variety of neural networkmodels tested acrossmultiple benchmarks and domains,occasionally yielding accuracies comparable to those achieved with gradient descent methods by using only small subsets.展开更多
Robot interaction control with variable impedance parameters may conform to task requirements during continuous interaction with dynamic environments.Iterative learning(IL)is effective to learn desired impedance param...Robot interaction control with variable impedance parameters may conform to task requirements during continuous interaction with dynamic environments.Iterative learning(IL)is effective to learn desired impedance parameters for robots under unknown environments,and Gaussian process(GP)is a nonparametric Bayesian approach that models complicated functions with provable confidence using limited data.In this paper,we propose an impedance IL method enhanced by a sparse online Gaussian process(SOGP)to speed up learning convergence and improve generalization.The SOGP for variable impedance modeling is updated in the same iteration by removing similar data points from previous iterations while learning impedance parameters in multiple iterations.The proposed IL-SOGP method is verified by high-fidelity simulations of a collaborative robot with 7 degrees of freedom based on the admittance control framework.It is shown that the proposed method accelerates iterative convergence and improves generalization compared to the classical IL-based impedance learning method.展开更多
An algorithm for face description and recognition based on multi-resolution with multi-scale local binary pattern(multi-LBP)features is proposed.The facial image pyramid is constructed and each facial image is divided...An algorithm for face description and recognition based on multi-resolution with multi-scale local binary pattern(multi-LBP)features is proposed.The facial image pyramid is constructed and each facial image is divided into various regions from which partial and holistic local binary patter(LBP)histograms are extracted.All LBP features of each image are concatenated to a single LBP eigenvector with different resolutions.The dimensionaUty of LBP features is then reduced by a local margin alignment(LMA)algorithm based on manifold,which can preserve the between-class variance.Support vector machine(SVM)is applied to classify facial images.Extensive experiments on ORL and CMU face databases clearly show the superiority of the proposed scheme over some existed algorithms,especially on the robustness of the method against different facial expressions and postures of the subjects.展开更多
A peer-to-peer(P2P)network is a distributed application architecture which provides many attractive features,such as availability,self-organization,load-balancing,and anonymity.However,P2P network has created signific...A peer-to-peer(P2P)network is a distributed application architecture which provides many attractive features,such as availability,self-organization,load-balancing,and anonymity.However,P2P network has created significant problems to network operators by generating large volumes of inter autonomous system(inter-AS)traffic.Focusing on the BitTorrent swarming protocol,this paper proposes an approach which aims to reduce P2P generated inter-AS traffic.In particular,the approach can reduce inter-AS traffic by 50%to 70%.Moreover,it can improve the downloading speed by 60%for the popular torrents.The evaluation shows that controlled regional-based contents replication can effectively achieve this goal.Furthermore,the approach is incrementally deployable.Network regions in which the system gets deployed can solve their P2P generated inter-AS traffic problems autonomously,i.e.,without any Internet service providers-collaboration and any requirement,the system can be deployed in the entire Internet.展开更多
Insomnia,whether situational or chronic,affects over a third of the general population in today’s society.However,given the lack of non-contact and non-inductive quantitative evaluation approaches,most insomniacs are...Insomnia,whether situational or chronic,affects over a third of the general population in today’s society.However,given the lack of non-contact and non-inductive quantitative evaluation approaches,most insomniacs are often unrecognized and untreated.Although Polysomnographic(PSG)is considered as one of the assessment methods,it is poorly tolerated and expensive.In this paper,with the recent development of Internet-of-Things devices and edge computing techniques,we propose a detrended fractal dimension(DFD)feature for the analysis of heart-rate signals,which can be easily acquired by many wearables,of good sleepers and insomniacs.This feature was derived by calculating the fractal dimension(FD)of detrended signals.For the trend component removal,we improved the null space pursuit algorithm and proposed an adaptive trend extraction algorithm.The experimental results demonstrated the efficacy of the proposed DFD index through numerical statistics and significance testing for healthy and insomnia groups,which renders it a potential biomarker for insomnia assessment and management.展开更多
ARINC653 systems,which have been widely used in avionics industry,are an important class of safety-critical applications.Partitions are the core concept in the Arinc653 system architecture.Due to the existence of part...ARINC653 systems,which have been widely used in avionics industry,are an important class of safety-critical applications.Partitions are the core concept in the Arinc653 system architecture.Due to the existence of partitions,the system designer must allocate adequate time slots statically to each partition in the design phase.Although some time slot allocation policies could be borrowed from task scheduling policies,no existing literatures give an optimal allocation policy.In this paper,we present a partition configuration policy and prove that this policy is optimal in the sense that if this policy fails to configure adequate time slots to each partition,nor do other policies.Then,by simulation,we show the effects of different partition configuration policies on time slot allocation of partitions and task response time,respectively.展开更多
In programming courses, the traditional assessment approach tends to evaluate student performance by scoring one or more project-level summative assignments. This approach no longer meets the requirements of a quality...In programming courses, the traditional assessment approach tends to evaluate student performance by scoring one or more project-level summative assignments. This approach no longer meets the requirements of a quality programming language education. Based on an upgraded peer code review model, we propose a formative assessment approach to assess the learning of computer programming languages, and develop an online assessment system(OOCourse) to implement this approach. Peer code review and inspection is an effective way to ensure the high quality of a program by systematically checking the source code. Though it is commonly applied in industrial and open-source software development, it is rarely taught and practiced in undergraduate-level programming courses. We conduct a case study using the formative assessment method in a sophomore level Object-Oriented Design and Construction course with more than 240 students. We use Moodle(an online learning system) and some relevant plugins to conduct peer code review. We also conduct data mining on the running data from the peer assessment activities. The case study shows that formative assessment based on peer code review gradually improved the programming ability of students in the undergraduate class.展开更多
基金supported in part by the National Key Research and Development Project(2023YFE0206200)the National Natural Science Foundation of China(U23B2058)+3 种基金in part by Guangdong Regional Joint Foundation Key Project(2022B1515120076)the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(RS-2025-00555463&RS-2025-25456394)the Tianjin Top Scientist Studio Project(24JRRCRC00030)the Tianjin Belt and Road Joint Laboratory(24PTLYHZ00250).
文摘Both evolutionary computation(EC)and multiagent systems(MAS)study the emergence of intelligence through the interaction and cooperation of a group of individuals.EC focuses on solving various complex optimization problems,while MAS provides a flexible model for distributed artificial intelligence.Since their group interaction mechanisms can be borrowed from each other,many studies have attempted to combine EC and MAS.With the rapid development of the Internet of Things,the confluence of EC and MAS has become more and more important,and related articles have shown a continuously growing trend during the last decades.In this survey,we first elaborate on the mutual assistance of EC and MAS from two aspects,agent-based EC and EC-assisted MAS.Agent-based EC aims to introduce characteristics of MAS into EC to improve the performance and parallelism of EC,while EC-assisted MAS aims to use EC to better solve optimization problems in MAS.Furthermore,we review studies that combine the cooperation mechanisms of EC and MAS,which greatly leverage the strengths of both sides.A description framework is built to elaborate existing studies.Promising future research directions are also discussed in conjunction with emerging technologies and real-world applications.
基金supported by the Teaching Reform Projects of Colleges in Hunan Province(No.HNJG-2022-1410,No.HNJG-2020-0489,No.HNJG-2022-0785,and No.HNJG-2022-0792)Industry-universityCooperative Project of Ministry of Education(No.220506194233806)the Teaching Reform Project of Hunan University of Science and Technology(No.2020XXJG07)。
文摘This paper explores the reform and practice of software engineering-related courses based on the competency model of the Computing Curricula,and proposes some measures of teaching reform and talent cultivation in software engineering.The teaching reform emphasizes student-centered education,and focuses on the cultivation and enhancement of students’knowledge,skills,and dispositions.Based on the three elements of the competency model,specific measures of teaching reform are proposed for some professional courses in software engineering,to strengthen course relevance,improve knowledge systems,reform practical modes with a focus on skill development,and cultivate good dispositions through student-centered education.The teaching reform’s attempts and practice are conducted in some courses such as Advanced Web Technologies,Software Engineering,and Intelligent Terminal Systems and Application Development.Through the analysis and comparison of the implementation effects,significant improvements are observed in teaching effectiveness,students’mastery of knowledge and skills are noticeably improved,and the expected goals of the teaching reform are achieved.
基金funded by the National Research Foundation of Korea.Grant Number:2020R1A2C1012196.
文摘Given the accelerating development of Internet of things(IoT),a secure and robust authentication mechanism is urgently required as a critical architectural component.The IoT has improved the quality of everyday life for numerous people in many ways.Owing to the predominantly wireless nature of the IoT,connected devices are more vulnerable to security threats compared to wired networks.User authentication is thus of utmost importance in terms of security on the IoT.Several authentication protocols have been proposed in recent years,but most prior schemes do not provide sufficient security for these wireless networks.To overcome the limitations of previous schemes,we propose an efficient and lightweight authentication scheme called the Cogent Biometric-Based Authentication Scheme(COBBAS).The proposed scheme is based on biometric data,and uses lightweight operations to enhance the efficiency of the network in terms of time,storage,and battery consumption.A formal security analysis of COBBAS using Burrows–Abadi–Needham logic proves that the proposed protocol provides secure mutual authentication.Formal security verification using the Automated Validation of Internet Security Protocols and Applications tool shows that the proposed protocol is safe against man-in-the-middle and replay attacks.Informal security analysis further shows that COBBAS protects wireless sensor networks against several security attacks such as password guessing,impersonation,stolen verifier attacks,denial-of-service attacks,and errors in biometric recognition.This protocol also provides user anonymity,confidentiality,integrity,and biometric recovery in acceptable time with reasonable computational cost.
文摘The mining sector historically drove the global economy but at the expense of severe environmental and health repercussions,posing sustainability challenges[1]-[3].Recent advancements on artificial intelligence(AI)are revolutionizing mining through robotic and data-driven innovations[4]-[7].While AI offers mining industry advantages,it is crucial to acknowledge the potential risks associated with its widespread use.Over-reliance on AI may lead to a loss of human control over mining operations in the future,resulting in unpredictable consequences.
文摘Abstract--Near field communications (NFC) is a newly thrived technology in recent years. This technology has been installed on many kinds of mobile phone systems, especially the Android. However, there is no unified and complete framework to access NFC so far. The current software stack of NFC merely implements data obtaining features, ignoring the post-processing of data and lacking a certain security mechanism for NFC, which results in inefficiency and inconvenience for software development and maintenance. Above all, security problems could be caused due to the absence of the security mechanism. To propose a solution, this paper presents a brand-new framework for NFC utilization by analyzing and constructing a service model. Thus, the proposed framework encapsulates the current NFC stack on Android, formulating a three-layer structure after implementing the encapsulation and parsing of NFC records, which ultimately enables an XML document to describe the configuration of NFC and its related service flow. Simultaneously, a context-awareness model is proposed and built in this paper to equip the framework with the capability of adapting to different'physical environment.
基金supports in part by the Natural Science Foundation of China(NSFC)under contract No.62171253the Young Elite Scientists Sponsorship Program by CAST under program No.2022QNRC001,as well as the Fundamental Research Funds for the Central Universities.
文摘Images with complementary spectral information can be recorded using image sensors that can identify visible and near-infrared spectrum.The fusion of visible and nearinfrared(NIR)aims to enhance the quality of images acquired by video monitoring systems for the ease of user observation and data processing.Unfortunately,current fusion algorithms produce artefacts and colour distortion since they cannot make use of spectrum properties and are lacking in information complementarity.Therefore,an information complementarity fusion(ICF)model is designed based on physical signals.In order to separate high-frequency noise from important information in distinct frequency layers,the authors first extracted texture-scale and edge-scale layers using a two-scale filter.Second,the difference map between visible and near-infrared was filtered using the extended-DoG filter to produce the initial visible-NIR complementary weight map.Then,to generate a guide map,the near-infrared image with night adjustment was processed as well.The final complementarity weight map was subsequently derived via an arctanI function mapping using the guide map and the initial weight maps.Finally,fusion images were generated with the complementarity weight maps.The experimental results demonstrate that the proposed approach outperforms the state-of-the-art in both avoiding artificial colours as well as effectively utilising information complementarity.
基金supported by the Key Science and Technology R&D Project of Sichuan Province under Grants No. 2022YFG0038 and No. 2021YFG0018
文摘The knowledge graph(KG) that represents structural relations among entities has become an increasingly important research field for knowledge-driven artificial intelligence. In this survey, a comprehensive review of KG and KG reasoning is provided. It introduces an overview of KGs, including representation, storage, and essential technologies. Specifically, it summarizes several types of knowledge reasoning approaches, including logic rules-based, representation-based, and neural network-based methods. Moreover, this paper analyzes the representation methods of knowledge hypergraphs. To effectively model hyper-relational data and improve the performance of knowledge reasoning, a three-layer knowledge hypergraph model is proposed. Finally, it analyzes the advantages of three-layer knowledge hypergraphs through reasoning and update algorithms which could facilitate future research.
基金supported in part by the National Natural Science Foundation of China (6177249391646114)+1 种基金Chongqing research program of technology innovation and application (cstc2017rgzn-zdyfX0020)in part by the Pioneer Hundred Talents Program of Chinese Academy of Sciences
文摘Latent factor(LF)models are highly effective in extracting useful knowledge from High-Dimensional and Sparse(HiDS)matrices which are commonly seen in various industrial applications.An LF model usually adopts iterative optimizers,which may consume many iterations to achieve a local optima,resulting in considerable time cost.Hence,determining how to accelerate the training process for LF models has become a significant issue.To address this,this work proposes a randomized latent factor(RLF)model.It incorporates the principle of randomized learning techniques from neural networks into the LF analysis of HiDS matrices,thereby greatly alleviating computational burden.It also extends a standard learning process for randomized neural networks in context of LF analysis to make the resulting model represent an HiDS matrix correctly.Experimental results on three HiDS matrices from industrial applications demonstrate that compared with state-of-the-art LF models,RLF is able to achieve significantly higher computational efficiency and comparable prediction accuracy for missing data.I provides an important alternative approach to LF analysis of HiDS matrices,which is especially desired for industrial applications demanding highly efficient models.
基金supported by the Foundation of Chongqing Municipal Key Laboratory of Institutions of Higher Education([2017]3)Foundation of Chongqing Development and Reform Commission(2017[1007])。
文摘Dear editor,Along with the progress of science and technology and the development of social civilization,control system brings an increasingly significant function in daily life.The application field of control system is very wide,for instance,in mobile technology[1],artificial earth satellite[2],pest control[3],etc.Ribeiro[4]first put forward the concept of random pulse in 1967.At present,impulsive control is used in networked control[5],secure communication[6],etc.In the 21st century,the impulsive control has been used in synchronization of coupled system,intelligent fault identification,image encryption.
基金supported in part by Science and Technology Program of Guangdong (No. 2018B030333001)the State’s Key Project of Research and Development Plan (Nos. 2017YFC0109202,2017YFA0104302 and 2017YFC0107900)the National Natural Science Foundation (Nos. 81530060 and 61871117)
文摘Cerebral perfusion computed tomography(PCT)is an important imaging modality for evaluating cerebrovascular diseases and stroke symptoms.With widespread public concern about the potential cancer risks and health hazards associated with cumulative radiation exposure in PCT imaging,considerable research has been conducted to reduce the radiation dose in X-ray-based brain perfusion imaging.Reducing the dose of X-rays causes severe noise and artifacts in PCT images.To solve this problem,we propose a deep learning method called NCS-Unet.The exceptional characteristics of non-subsampled contourlet transform(NSCT)and the Sobel filter are introduced into NCS-Unet.NSCT decomposes the convolved features into high-and low-frequency components.The decomposed high-frequency component retains image edges,contrast imaging traces,and noise,whereas the low-frequency component retains the main image information.The Sobel filter extracts the contours of the original image and the imaging traces caused by the contrast agent decay.The extracted information is added to NCS-Unet to improve its performance in noise reduction and artifact removal.Qualitative and quantitative analyses demonstrated that the proposed NCS-Unet can improve the quality of low-dose cone-beam CT perfusion reconstruction images and the accuracy of perfusion parameter calculations.
基金supported by the Key Research and Development Program of China(No.2022YFC3005401)Key Research and Development Program of China,Yunnan Province(No.202203AA080009,202202AF080003)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.KYCX21_0482).
文摘In Beyond the Fifth Generation(B5G)heterogeneous edge networks,numerous users are multiplexed on a channel or served on the same frequency resource block,in which case the transmitter applies coding and the receiver uses interference cancellation.Unfortunately,uncoordinated radio resource allocation can reduce system throughput and lead to user inequity,for this reason,in this paper,channel allocation and power allocation problems are formulated to maximize the system sum rate and minimum user achievable rate.Since the construction model is non-convex and the response variables are high-dimensional,a distributed Deep Reinforcement Learning(DRL)framework called distributed Proximal Policy Optimization(PPO)is proposed to allocate or assign resources.Specifically,several simulated agents are trained in a heterogeneous environment to find robust behaviors that perform well in channel assignment and power allocation.Moreover,agents in the collection stage slow down,which hinders the learning of other agents.Therefore,a preemption strategy is further proposed in this paper to optimize the distributed PPO,form DP-PPO and successfully mitigate the straggler problem.The experimental results show that our mechanism named DP-PPO improves the performance over other DRL methods.
基金supported by the National Natural Science Foundation of China (U23B2009, 62376201, 423B2104)Open Foundation (ZNXX2023MSO2, HBIR202311)。
文摘Degradation under challenging conditions such as rain, haze, and low light not only diminishes content visibility, but also results in additional degradation side effects, including detail occlusion and color distortion. However, current technologies have barely explored the correlation between perturbation removal and background restoration, consequently struggling to generate high-naturalness content in challenging scenarios. In this paper, we rethink the image enhancement task from the perspective of joint optimization: Perturbation removal and texture reconstruction. To this end, we advise an efficient yet effective image enhancement model, termed the perturbation-guided texture reconstruction network(PerTeRNet). It contains two subnetworks designed for the perturbation elimination and texture reconstruction tasks, respectively. To facilitate texture recovery,we develop a novel perturbation-guided texture enhancement module(PerTEM) to connect these two tasks, where informative background features are extracted from the input with the guidance of predicted perturbation priors. To alleviate the learning burden and computational cost, we suggest performing perturbation removal in a sub-space and exploiting super-resolution to infer high-frequency background details. Our PerTeRNet has demonstrated significant superiority over typical methods in both quantitative and qualitative measures, as evidenced by extensive experimental results on popular image enhancement and joint detection tasks. The source code is available at https://github.com/kuijiang94/PerTeRNet.
基金supported by the Internet of Things Project 2011 of the Ministry of IndustryInformation Technology of China under Grant No.2011-046
文摘With the development of wireless networks and mobile computing, more advanced applications with context-awareness and adaptability to their changing context are needed. However, building context-aware applications is difficult due to the lack of adequate infrastructure support. In this paper, a web middleware architecture for the development of context-awareness applications using near field communication (NFC) is proposed. Based on it, the efficient support for acquiring, interpreting, and accessing context is provided, and the user's quality of experience is improved. Moreover, a mobile web middleware for the testing and full realization of NFC context-awareness applications has been developed together with two application examples.
基金supported by the BK21 FOUR project(AI-driven Convergence Software Education Research Program)funded by the Ministry of Education,School of Computer Science and Engineering,Kyungpook National University,Republic of Korea(4120240214871)supported by the New Faculty Start Up Fund from LSU Health Sciences New Orleans,LA,USA.
文摘Transfer learning is the predominant method for adapting pre-trained models on another task to new domains while preserving their internal architectures and augmenting them with requisite layers in Deep Neural Network models.Training intricate pre-trained models on a sizable dataset requires significant resources to fine-tune hyperparameters carefully.Most existing initialization methods mainly focus on gradient flow-related problems,such as gradient vanishing or exploding,or other existing approaches that require extra models that do not consider our setting,which is more practical.To address these problems,we suggest employing gradient-free heuristic methods to initialize the weights of the final new-added fully connected layer in neural networks froma small set of training data with fewer classes.The approach relies on partitioning the output values from pre-trained models for a small set into two separate intervals determined by the targets.This process is framed as an optimization problem for each output neuron and class.The optimization selects the highest values as weights,considering their direction towards the respective classes.Furthermore,empirical 145 experiments involve a variety of neural networkmodels tested acrossmultiple benchmarks and domains,occasionally yielding accuracies comparable to those achieved with gradient descent methods by using only small subsets.
基金supported in part by the National Research Foundation of Korea(NRF)Grant Funded by the Korea Government(MSIT)(RS-2025-00555064).Recommended by Associate Editor Zengguang Hou.
文摘Robot interaction control with variable impedance parameters may conform to task requirements during continuous interaction with dynamic environments.Iterative learning(IL)is effective to learn desired impedance parameters for robots under unknown environments,and Gaussian process(GP)is a nonparametric Bayesian approach that models complicated functions with provable confidence using limited data.In this paper,we propose an impedance IL method enhanced by a sparse online Gaussian process(SOGP)to speed up learning convergence and improve generalization.The SOGP for variable impedance modeling is updated in the same iteration by removing similar data points from previous iterations while learning impedance parameters in multiple iterations.The proposed IL-SOGP method is verified by high-fidelity simulations of a collaborative robot with 7 degrees of freedom based on the admittance control framework.It is shown that the proposed method accelerates iterative convergence and improves generalization compared to the classical IL-based impedance learning method.
基金supported by the National Natural Science Foundation of China under Grant No.60973070
文摘An algorithm for face description and recognition based on multi-resolution with multi-scale local binary pattern(multi-LBP)features is proposed.The facial image pyramid is constructed and each facial image is divided into various regions from which partial and holistic local binary patter(LBP)histograms are extracted.All LBP features of each image are concatenated to a single LBP eigenvector with different resolutions.The dimensionaUty of LBP features is then reduced by a local margin alignment(LMA)algorithm based on manifold,which can preserve the between-class variance.Support vector machine(SVM)is applied to classify facial images.Extensive experiments on ORL and CMU face databases clearly show the superiority of the proposed scheme over some existed algorithms,especially on the robustness of the method against different facial expressions and postures of the subjects.
基金supported by the National Natural Science Foundation of China under Grant No.61001084
文摘A peer-to-peer(P2P)network is a distributed application architecture which provides many attractive features,such as availability,self-organization,load-balancing,and anonymity.However,P2P network has created significant problems to network operators by generating large volumes of inter autonomous system(inter-AS)traffic.Focusing on the BitTorrent swarming protocol,this paper proposes an approach which aims to reduce P2P generated inter-AS traffic.In particular,the approach can reduce inter-AS traffic by 50%to 70%.Moreover,it can improve the downloading speed by 60%for the popular torrents.The evaluation shows that controlled regional-based contents replication can effectively achieve this goal.Furthermore,the approach is incrementally deployable.Network regions in which the system gets deployed can solve their P2P generated inter-AS traffic problems autonomously,i.e.,without any Internet service providers-collaboration and any requirement,the system can be deployed in the entire Internet.
基金partly supported by the startup research funds of Nanjing University of Science and Technology。
文摘Insomnia,whether situational or chronic,affects over a third of the general population in today’s society.However,given the lack of non-contact and non-inductive quantitative evaluation approaches,most insomniacs are often unrecognized and untreated.Although Polysomnographic(PSG)is considered as one of the assessment methods,it is poorly tolerated and expensive.In this paper,with the recent development of Internet-of-Things devices and edge computing techniques,we propose a detrended fractal dimension(DFD)feature for the analysis of heart-rate signals,which can be easily acquired by many wearables,of good sleepers and insomniacs.This feature was derived by calculating the fractal dimension(FD)of detrended signals.For the trend component removal,we improved the null space pursuit algorithm and proposed an adaptive trend extraction algorithm.The experimental results demonstrated the efficacy of the proposed DFD index through numerical statistics and significance testing for healthy and insomnia groups,which renders it a potential biomarker for insomnia assessment and management.
基金supported by the National Natural Science Foundation of China under Grant No.90718019the National High-Tech Research and Development Plan of China under Grant No.2007AA010304
文摘ARINC653 systems,which have been widely used in avionics industry,are an important class of safety-critical applications.Partitions are the core concept in the Arinc653 system architecture.Due to the existence of partitions,the system designer must allocate adequate time slots statically to each partition in the design phase.Although some time slot allocation policies could be borrowed from task scheduling policies,no existing literatures give an optimal allocation policy.In this paper,we present a partition configuration policy and prove that this policy is optimal in the sense that if this policy fails to configure adequate time slots to each partition,nor do other policies.Then,by simulation,we show the effects of different partition configuration policies on time slot allocation of partitions and task response time,respectively.
文摘In programming courses, the traditional assessment approach tends to evaluate student performance by scoring one or more project-level summative assignments. This approach no longer meets the requirements of a quality programming language education. Based on an upgraded peer code review model, we propose a formative assessment approach to assess the learning of computer programming languages, and develop an online assessment system(OOCourse) to implement this approach. Peer code review and inspection is an effective way to ensure the high quality of a program by systematically checking the source code. Though it is commonly applied in industrial and open-source software development, it is rarely taught and practiced in undergraduate-level programming courses. We conduct a case study using the formative assessment method in a sophomore level Object-Oriented Design and Construction course with more than 240 students. We use Moodle(an online learning system) and some relevant plugins to conduct peer code review. We also conduct data mining on the running data from the peer assessment activities. The case study shows that formative assessment based on peer code review gradually improved the programming ability of students in the undergraduate class.