期刊文献+
共找到45篇文章
< 1 2 3 >
每页显示 20 50 100
The Confluence of Evolutionary Computation and Multi-Agent Systems:A Survey
1
作者 Tai-You Chen Wei-Neng Chen +5 位作者 Feng-Feng Wei Xiao-Qi Guo Wen-Xiang Song Rui Zhu Qiuzhen Lin Jun Zhang 《IEEE/CAA Journal of Automatica Sinica》 2025年第11期2175-2193,共19页
Both evolutionary computation(EC)and multiagent systems(MAS)study the emergence of intelligence through the interaction and cooperation of a group of individuals.EC focuses on solving various complex optimization prob... Both evolutionary computation(EC)and multiagent systems(MAS)study the emergence of intelligence through the interaction and cooperation of a group of individuals.EC focuses on solving various complex optimization problems,while MAS provides a flexible model for distributed artificial intelligence.Since their group interaction mechanisms can be borrowed from each other,many studies have attempted to combine EC and MAS.With the rapid development of the Internet of Things,the confluence of EC and MAS has become more and more important,and related articles have shown a continuously growing trend during the last decades.In this survey,we first elaborate on the mutual assistance of EC and MAS from two aspects,agent-based EC and EC-assisted MAS.Agent-based EC aims to introduce characteristics of MAS into EC to improve the performance and parallelism of EC,while EC-assisted MAS aims to use EC to better solve optimization problems in MAS.Furthermore,we review studies that combine the cooperation mechanisms of EC and MAS,which greatly leverage the strengths of both sides.A description framework is built to elaborate existing studies.Promising future research directions are also discussed in conjunction with emerging technologies and real-world applications. 展开更多
关键词 Distributed artificial intelligence distributed optimization evolutionary computation(EC) multi-agent systems(MAS)
在线阅读 下载PDF
Teaching Reform Based on the Competency Model for Software Engineering-related Courses
2
作者 Xue Han Buqing Cao +2 位作者 Jianyong Yu Miao Liao Wei Liang 《计算机教育》 2023年第12期158-166,共9页
This paper explores the reform and practice of software engineering-related courses based on the competency model of the Computing Curricula,and proposes some measures of teaching reform and talent cultivation in soft... This paper explores the reform and practice of software engineering-related courses based on the competency model of the Computing Curricula,and proposes some measures of teaching reform and talent cultivation in software engineering.The teaching reform emphasizes student-centered education,and focuses on the cultivation and enhancement of students’knowledge,skills,and dispositions.Based on the three elements of the competency model,specific measures of teaching reform are proposed for some professional courses in software engineering,to strengthen course relevance,improve knowledge systems,reform practical modes with a focus on skill development,and cultivate good dispositions through student-centered education.The teaching reform’s attempts and practice are conducted in some courses such as Advanced Web Technologies,Software Engineering,and Intelligent Terminal Systems and Application Development.Through the analysis and comparison of the implementation effects,significant improvements are observed in teaching effectiveness,students’mastery of knowledge and skills are noticeably improved,and the expected goals of the teaching reform are achieved. 展开更多
关键词 Competency model Software engineering Reform practice Computing Curricula
在线阅读 下载PDF
Cogent and Energy Efficient Authentication Protocol for WSN in IoT 被引量:2
3
作者 Tariq Mahmood Butt Rabia Riaz +2 位作者 Chinmay Chakraborty Sanam Shahla Rizvi Anand Paul 《Computers, Materials & Continua》 SCIE EI 2021年第8期1877-1898,共22页
Given the accelerating development of Internet of things(IoT),a secure and robust authentication mechanism is urgently required as a critical architectural component.The IoT has improved the quality of everyday life f... Given the accelerating development of Internet of things(IoT),a secure and robust authentication mechanism is urgently required as a critical architectural component.The IoT has improved the quality of everyday life for numerous people in many ways.Owing to the predominantly wireless nature of the IoT,connected devices are more vulnerable to security threats compared to wired networks.User authentication is thus of utmost importance in terms of security on the IoT.Several authentication protocols have been proposed in recent years,but most prior schemes do not provide sufficient security for these wireless networks.To overcome the limitations of previous schemes,we propose an efficient and lightweight authentication scheme called the Cogent Biometric-Based Authentication Scheme(COBBAS).The proposed scheme is based on biometric data,and uses lightweight operations to enhance the efficiency of the network in terms of time,storage,and battery consumption.A formal security analysis of COBBAS using Burrows–Abadi–Needham logic proves that the proposed protocol provides secure mutual authentication.Formal security verification using the Automated Validation of Internet Security Protocols and Applications tool shows that the proposed protocol is safe against man-in-the-middle and replay attacks.Informal security analysis further shows that COBBAS protects wireless sensor networks against several security attacks such as password guessing,impersonation,stolen verifier attacks,denial-of-service attacks,and errors in biometric recognition.This protocol also provides user anonymity,confidentiality,integrity,and biometric recovery in acceptable time with reasonable computational cost. 展开更多
关键词 Internet of things wireless sensor networks AUTHENTICATION Burrows-Abadi-Needham logic fuzzy extractor elliptic curve cryptography
在线阅读 下载PDF
Sustainable Mining in the Era of Artificial Intelligence 被引量:1
4
作者 Long Chen Yuting Xie +2 位作者 Yutong Wang Shirong Ge Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期1-4,共4页
The mining sector historically drove the global economy but at the expense of severe environmental and health repercussions,posing sustainability challenges[1]-[3].Recent advancements on artificial intelligence(AI)are... The mining sector historically drove the global economy but at the expense of severe environmental and health repercussions,posing sustainability challenges[1]-[3].Recent advancements on artificial intelligence(AI)are revolutionizing mining through robotic and data-driven innovations[4]-[7].While AI offers mining industry advantages,it is crucial to acknowledge the potential risks associated with its widespread use.Over-reliance on AI may lead to a loss of human control over mining operations in the future,resulting in unpredictable consequences. 展开更多
关键词 SUSTAINABLE MINING consequences
在线阅读 下载PDF
A Framework for the Service Model of NFC Stack
5
作者 Ying-Jue Cai Jie Shen 《Journal of Electronic Science and Technology》 CAS 2013年第3期249-257,共9页
Abstract--Near field communications (NFC) is a newly thrived technology in recent years. This technology has been installed on many kinds of mobile phone systems, especially the Android. However, there is no unified... Abstract--Near field communications (NFC) is a newly thrived technology in recent years. This technology has been installed on many kinds of mobile phone systems, especially the Android. However, there is no unified and complete framework to access NFC so far. The current software stack of NFC merely implements data obtaining features, ignoring the post-processing of data and lacking a certain security mechanism for NFC, which results in inefficiency and inconvenience for software development and maintenance. Above all, security problems could be caused due to the absence of the security mechanism. To propose a solution, this paper presents a brand-new framework for NFC utilization by analyzing and constructing a service model. Thus, the proposed framework encapsulates the current NFC stack on Android, formulating a three-layer structure after implementing the encapsulation and parsing of NFC records, which ultimately enables an XML document to describe the configuration of NFC and its related service flow. Simultaneously, a context-awareness model is proposed and built in this paper to equip the framework with the capability of adapting to different'physical environment. 展开更多
关键词 Index Terms---Android CONTEXT-AWARENESS near fieldcommunication record type definition service flow XML.
在线阅读 下载PDF
Visible and near-infrared image fusion based on information complementarity
6
作者 Zhuo Li Shiliang Pu +2 位作者 Mengqi Ji Feng Zeng Bo Li 《CAAI Transactions on Intelligence Technology》 2025年第1期193-206,共14页
Images with complementary spectral information can be recorded using image sensors that can identify visible and near-infrared spectrum.The fusion of visible and nearinfrared(NIR)aims to enhance the quality of images ... Images with complementary spectral information can be recorded using image sensors that can identify visible and near-infrared spectrum.The fusion of visible and nearinfrared(NIR)aims to enhance the quality of images acquired by video monitoring systems for the ease of user observation and data processing.Unfortunately,current fusion algorithms produce artefacts and colour distortion since they cannot make use of spectrum properties and are lacking in information complementarity.Therefore,an information complementarity fusion(ICF)model is designed based on physical signals.In order to separate high-frequency noise from important information in distinct frequency layers,the authors first extracted texture-scale and edge-scale layers using a two-scale filter.Second,the difference map between visible and near-infrared was filtered using the extended-DoG filter to produce the initial visible-NIR complementary weight map.Then,to generate a guide map,the near-infrared image with night adjustment was processed as well.The final complementarity weight map was subsequently derived via an arctanI function mapping using the guide map and the initial weight maps.Finally,fusion images were generated with the complementarity weight maps.The experimental results demonstrate that the proposed approach outperforms the state-of-the-art in both avoiding artificial colours as well as effectively utilising information complementarity. 展开更多
关键词 color distortion image fusion information complementarity low light NEAR-INFRARED
在线阅读 下载PDF
Knowledge Graph and Knowledge Reasoning:A Systematic Review 被引量:16
7
作者 Ling Tian Xue Zhou +3 位作者 Yan-Ping Wu Wang-Tao Zhou Jin-Hao Zhang Tian-Shu Zhang 《Journal of Electronic Science and Technology》 CAS CSCD 2022年第2期159-186,共28页
The knowledge graph(KG) that represents structural relations among entities has become an increasingly important research field for knowledge-driven artificial intelligence. In this survey, a comprehensive review of K... The knowledge graph(KG) that represents structural relations among entities has become an increasingly important research field for knowledge-driven artificial intelligence. In this survey, a comprehensive review of KG and KG reasoning is provided. It introduces an overview of KGs, including representation, storage, and essential technologies. Specifically, it summarizes several types of knowledge reasoning approaches, including logic rules-based, representation-based, and neural network-based methods. Moreover, this paper analyzes the representation methods of knowledge hypergraphs. To effectively model hyper-relational data and improve the performance of knowledge reasoning, a three-layer knowledge hypergraph model is proposed. Finally, it analyzes the advantages of three-layer knowledge hypergraphs through reasoning and update algorithms which could facilitate future research. 展开更多
关键词 methods. REPRESENTATION REASONING
在线阅读 下载PDF
Randomized Latent Factor Model for High-dimensional and Sparse Matrices from Industrial Applications 被引量:14
8
作者 Mingsheng Shang Xin Luo +3 位作者 Zhigang Liu Jia Chen Ye Yuan MengChu Zhou 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2019年第1期131-141,共11页
Latent factor(LF)models are highly effective in extracting useful knowledge from High-Dimensional and Sparse(HiDS)matrices which are commonly seen in various industrial applications.An LF model usually adopts iterativ... Latent factor(LF)models are highly effective in extracting useful knowledge from High-Dimensional and Sparse(HiDS)matrices which are commonly seen in various industrial applications.An LF model usually adopts iterative optimizers,which may consume many iterations to achieve a local optima,resulting in considerable time cost.Hence,determining how to accelerate the training process for LF models has become a significant issue.To address this,this work proposes a randomized latent factor(RLF)model.It incorporates the principle of randomized learning techniques from neural networks into the LF analysis of HiDS matrices,thereby greatly alleviating computational burden.It also extends a standard learning process for randomized neural networks in context of LF analysis to make the resulting model represent an HiDS matrix correctly.Experimental results on three HiDS matrices from industrial applications demonstrate that compared with state-of-the-art LF models,RLF is able to achieve significantly higher computational efficiency and comparable prediction accuracy for missing data.I provides an important alternative approach to LF analysis of HiDS matrices,which is especially desired for industrial applications demanding highly efficient models. 展开更多
关键词 Big data high-dimensional and sparse matrix latent factor analysis latent factor model randomized learning
在线阅读 下载PDF
A Sandwich Control System with Dual Stochastic Impulses 被引量:1
9
作者 Chuanlin Liao Dan Tu +3 位作者 Yuming Feng Wei Zhang Zitao Wang B.O.Onasanya 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第4期741-744,共4页
Dear editor,Along with the progress of science and technology and the development of social civilization,control system brings an increasingly significant function in daily life.The application field of control system... Dear editor,Along with the progress of science and technology and the development of social civilization,control system brings an increasingly significant function in daily life.The application field of control system is very wide,for instance,in mobile technology[1],artificial earth satellite[2],pest control[3],etc.Ribeiro[4]first put forward the concept of random pulse in 1967.At present,impulsive control is used in networked control[5],secure communication[6],etc.In the 21st century,the impulsive control has been used in synchronization of coupled system,intelligent fault identification,image encryption. 展开更多
关键词 system IMPULSIVE instance
在线阅读 下载PDF
Robust restoration of low-dose cerebral perfusion CT images using NCS-Unet 被引量:1
10
作者 Kai Chen Li-Bo Zhang +7 位作者 Jia-Shun Liu Yuan Gao Zhan Wu Hai-Chen Zhu Chang-Ping Du Xiao-Li Mai Chun-Feng Yang Yang Chen 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2022年第3期62-76,共15页
Cerebral perfusion computed tomography(PCT)is an important imaging modality for evaluating cerebrovascular diseases and stroke symptoms.With widespread public concern about the potential cancer risks and health hazard... Cerebral perfusion computed tomography(PCT)is an important imaging modality for evaluating cerebrovascular diseases and stroke symptoms.With widespread public concern about the potential cancer risks and health hazards associated with cumulative radiation exposure in PCT imaging,considerable research has been conducted to reduce the radiation dose in X-ray-based brain perfusion imaging.Reducing the dose of X-rays causes severe noise and artifacts in PCT images.To solve this problem,we propose a deep learning method called NCS-Unet.The exceptional characteristics of non-subsampled contourlet transform(NSCT)and the Sobel filter are introduced into NCS-Unet.NSCT decomposes the convolved features into high-and low-frequency components.The decomposed high-frequency component retains image edges,contrast imaging traces,and noise,whereas the low-frequency component retains the main image information.The Sobel filter extracts the contours of the original image and the imaging traces caused by the contrast agent decay.The extracted information is added to NCS-Unet to improve its performance in noise reduction and artifact removal.Qualitative and quantitative analyses demonstrated that the proposed NCS-Unet can improve the quality of low-dose cone-beam CT perfusion reconstruction images and the accuracy of perfusion parameter calculations. 展开更多
关键词 Cerebral perfusion CT LOW-DOSE Image denoising Perfusion parameters
在线阅读 下载PDF
Channel assignment and power allocation for throughput improvement with PPO in B5G heterogeneous edge networks
11
作者 Xiaoming He Yingchi Mao +3 位作者 Yinqiu Liu Ping Ping Yan Hong Han Hu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期109-116,共8页
In Beyond the Fifth Generation(B5G)heterogeneous edge networks,numerous users are multiplexed on a channel or served on the same frequency resource block,in which case the transmitter applies coding and the receiver u... In Beyond the Fifth Generation(B5G)heterogeneous edge networks,numerous users are multiplexed on a channel or served on the same frequency resource block,in which case the transmitter applies coding and the receiver uses interference cancellation.Unfortunately,uncoordinated radio resource allocation can reduce system throughput and lead to user inequity,for this reason,in this paper,channel allocation and power allocation problems are formulated to maximize the system sum rate and minimum user achievable rate.Since the construction model is non-convex and the response variables are high-dimensional,a distributed Deep Reinforcement Learning(DRL)framework called distributed Proximal Policy Optimization(PPO)is proposed to allocate or assign resources.Specifically,several simulated agents are trained in a heterogeneous environment to find robust behaviors that perform well in channel assignment and power allocation.Moreover,agents in the collection stage slow down,which hinders the learning of other agents.Therefore,a preemption strategy is further proposed in this paper to optimize the distributed PPO,form DP-PPO and successfully mitigate the straggler problem.The experimental results show that our mechanism named DP-PPO improves the performance over other DRL methods. 展开更多
关键词 B5G Heterogeneous edge networks PPO Channel assignment Power allocation THROUGHPUT
在线阅读 下载PDF
Image Enhancement via Associated Perturbation Removal and Texture Reconstruction Learning
12
作者 Kui Jiang Ruoxi Wang +3 位作者 Yi Xiao Junjun Jiang Xin Xu Tao Lu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第11期2253-2269,共17页
Degradation under challenging conditions such as rain, haze, and low light not only diminishes content visibility, but also results in additional degradation side effects, including detail occlusion and color distorti... Degradation under challenging conditions such as rain, haze, and low light not only diminishes content visibility, but also results in additional degradation side effects, including detail occlusion and color distortion. However, current technologies have barely explored the correlation between perturbation removal and background restoration, consequently struggling to generate high-naturalness content in challenging scenarios. In this paper, we rethink the image enhancement task from the perspective of joint optimization: Perturbation removal and texture reconstruction. To this end, we advise an efficient yet effective image enhancement model, termed the perturbation-guided texture reconstruction network(PerTeRNet). It contains two subnetworks designed for the perturbation elimination and texture reconstruction tasks, respectively. To facilitate texture recovery,we develop a novel perturbation-guided texture enhancement module(PerTEM) to connect these two tasks, where informative background features are extracted from the input with the guidance of predicted perturbation priors. To alleviate the learning burden and computational cost, we suggest performing perturbation removal in a sub-space and exploiting super-resolution to infer high-frequency background details. Our PerTeRNet has demonstrated significant superiority over typical methods in both quantitative and qualitative measures, as evidenced by extensive experimental results on popular image enhancement and joint detection tasks. The source code is available at https://github.com/kuijiang94/PerTeRNet. 展开更多
关键词 Association learning attention mechanism image enhancement perturbation modeling
在线阅读 下载PDF
Mobile Web Middleware of NFC Context-Awareness Applications
13
作者 Xiang Liu Zhi-Guang Qin Jie Shen 《Journal of Electronic Science and Technology》 CAS 2013年第4期388-392,共5页
With the development of wireless networks and mobile computing, more advanced applications with context-awareness and adaptability to their changing context are needed. However, building context-aware applications is ... With the development of wireless networks and mobile computing, more advanced applications with context-awareness and adaptability to their changing context are needed. However, building context-aware applications is difficult due to the lack of adequate infrastructure support. In this paper, a web middleware architecture for the development of context-awareness applications using near field communication (NFC) is proposed. Based on it, the efficient support for acquiring, interpreting, and accessing context is provided, and the user's quality of experience is improved. Moreover, a mobile web middleware for the testing and full realization of NFC context-awareness applications has been developed together with two application examples. 展开更多
关键词 CONTEXT-AWARENESS mobile phone near field communication web middleware.
在线阅读 下载PDF
Heuristic Weight Initialization for Transfer Learning in Classification Problems
14
作者 Musulmon Lolaev Anand Paul Jeonghong Kim 《Computers, Materials & Continua》 2025年第11期4155-4171,共17页
Transfer learning is the predominant method for adapting pre-trained models on another task to new domains while preserving their internal architectures and augmenting them with requisite layers in Deep Neural Network... Transfer learning is the predominant method for adapting pre-trained models on another task to new domains while preserving their internal architectures and augmenting them with requisite layers in Deep Neural Network models.Training intricate pre-trained models on a sizable dataset requires significant resources to fine-tune hyperparameters carefully.Most existing initialization methods mainly focus on gradient flow-related problems,such as gradient vanishing or exploding,or other existing approaches that require extra models that do not consider our setting,which is more practical.To address these problems,we suggest employing gradient-free heuristic methods to initialize the weights of the final new-added fully connected layer in neural networks froma small set of training data with fewer classes.The approach relies on partitioning the output values from pre-trained models for a small set into two separate intervals determined by the targets.This process is framed as an optimization problem for each output neuron and class.The optimization selects the highest values as weights,considering their direction towards the respective classes.Furthermore,empirical 145 experiments involve a variety of neural networkmodels tested acrossmultiple benchmarks and domains,occasionally yielding accuracies comparable to those achieved with gradient descent methods by using only small subsets. 展开更多
关键词 Transfer learning gradient descent HEURISTICS gradient free
在线阅读 下载PDF
Robot Impedance Iterative Learning With Sparse Online Gaussian Process
15
作者 Yongping Pan Tian Shi +2 位作者 Wei Li Bin Xu Choon Ki Ahn 《IEEE/CAA Journal of Automatica Sinica》 2025年第11期2218-2227,共10页
Robot interaction control with variable impedance parameters may conform to task requirements during continuous interaction with dynamic environments.Iterative learning(IL)is effective to learn desired impedance param... Robot interaction control with variable impedance parameters may conform to task requirements during continuous interaction with dynamic environments.Iterative learning(IL)is effective to learn desired impedance parameters for robots under unknown environments,and Gaussian process(GP)is a nonparametric Bayesian approach that models complicated functions with provable confidence using limited data.In this paper,we propose an impedance IL method enhanced by a sparse online Gaussian process(SOGP)to speed up learning convergence and improve generalization.The SOGP for variable impedance modeling is updated in the same iteration by removing similar data points from previous iterations while learning impedance parameters in multiple iterations.The proposed IL-SOGP method is verified by high-fidelity simulations of a collaborative robot with 7 degrees of freedom based on the admittance control framework.It is shown that the proposed method accelerates iterative convergence and improves generalization compared to the classical IL-based impedance learning method. 展开更多
关键词 Gaussian process(GP) impedance variation iterative learning(IL) physical robot interaction robot learning
在线阅读 下载PDF
Face Recognition on Partial and Holistic LBP Features
16
作者 Xiao-Rong Pu Yi Zhou Rui-Yi Zhou 《Journal of Electronic Science and Technology》 CAS 2012年第1期56-60,共5页
An algorithm for face description and recognition based on multi-resolution with multi-scale local binary pattern(multi-LBP)features is proposed.The facial image pyramid is constructed and each facial image is divided... An algorithm for face description and recognition based on multi-resolution with multi-scale local binary pattern(multi-LBP)features is proposed.The facial image pyramid is constructed and each facial image is divided into various regions from which partial and holistic local binary patter(LBP)histograms are extracted.All LBP features of each image are concatenated to a single LBP eigenvector with different resolutions.The dimensionaUty of LBP features is then reduced by a local margin alignment(LMA)algorithm based on manifold,which can preserve the between-class variance.Support vector machine(SVM)is applied to classify facial images.Extensive experiments on ORL and CMU face databases clearly show the superiority of the proposed scheme over some existed algorithms,especially on the robustness of the method against different facial expressions and postures of the subjects. 展开更多
关键词 Face recognition local binary pattern operator multi-resolution with multi-scale local binary pattern ocal margin alignment dimensionality reduction.
在线阅读 下载PDF
Cooperative Approach between ISP and P2P Users to Reduce Inter-AS Traffic
17
作者 Zhen Qin Fan Zhou Le-Min Li 《Journal of Electronic Science and Technology》 CAS 2012年第1期47-50,共4页
A peer-to-peer(P2P)network is a distributed application architecture which provides many attractive features,such as availability,self-organization,load-balancing,and anonymity.However,P2P network has created signific... A peer-to-peer(P2P)network is a distributed application architecture which provides many attractive features,such as availability,self-organization,load-balancing,and anonymity.However,P2P network has created significant problems to network operators by generating large volumes of inter autonomous system(inter-AS)traffic.Focusing on the BitTorrent swarming protocol,this paper proposes an approach which aims to reduce P2P generated inter-AS traffic.In particular,the approach can reduce inter-AS traffic by 50%to 70%.Moreover,it can improve the downloading speed by 60%for the popular torrents.The evaluation shows that controlled regional-based contents replication can effectively achieve this goal.Furthermore,the approach is incrementally deployable.Network regions in which the system gets deployed can solve their P2P generated inter-AS traffic problems autonomously,i.e.,without any Internet service providers-collaboration and any requirement,the system can be deployed in the entire Internet. 展开更多
关键词 Bittorrent contents replication inter-AS traffic peer-to-peer.
在线阅读 下载PDF
Heart-Rate Analysis of Healthy and Insomnia Groups with Detrended Fractal Dimension Feature in Edge 被引量:4
18
作者 Xuefei Wang Yichao Zhou Chunxia Zhao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2022年第2期325-332,共8页
Insomnia,whether situational or chronic,affects over a third of the general population in today’s society.However,given the lack of non-contact and non-inductive quantitative evaluation approaches,most insomniacs are... Insomnia,whether situational or chronic,affects over a third of the general population in today’s society.However,given the lack of non-contact and non-inductive quantitative evaluation approaches,most insomniacs are often unrecognized and untreated.Although Polysomnographic(PSG)is considered as one of the assessment methods,it is poorly tolerated and expensive.In this paper,with the recent development of Internet-of-Things devices and edge computing techniques,we propose a detrended fractal dimension(DFD)feature for the analysis of heart-rate signals,which can be easily acquired by many wearables,of good sleepers and insomniacs.This feature was derived by calculating the fractal dimension(FD)of detrended signals.For the trend component removal,we improved the null space pursuit algorithm and proposed an adaptive trend extraction algorithm.The experimental results demonstrated the efficacy of the proposed DFD index through numerical statistics and significance testing for healthy and insomnia groups,which renders it a potential biomarker for insomnia assessment and management. 展开更多
关键词 INSOMNIA fractal dimension adaptive signal separation hypothesis testing
原文传递
Optimal Static Partition Configuration in ARINC653 System 被引量:4
19
作者 Sheng-Lin Gui Lei Luo +1 位作者 Sen-Sen Tang Yang Meng 《Journal of Electronic Science and Technology》 CAS 2011年第4期373-378,共6页
ARINC653 systems,which have been widely used in avionics industry,are an important class of safety-critical applications.Partitions are the core concept in the Arinc653 system architecture.Due to the existence of part... ARINC653 systems,which have been widely used in avionics industry,are an important class of safety-critical applications.Partitions are the core concept in the Arinc653 system architecture.Due to the existence of partitions,the system designer must allocate adequate time slots statically to each partition in the design phase.Although some time slot allocation policies could be borrowed from task scheduling policies,no existing literatures give an optimal allocation policy.In this paper,we present a partition configuration policy and prove that this policy is optimal in the sense that if this policy fails to configure adequate time slots to each partition,nor do other policies.Then,by simulation,we show the effects of different partition configuration policies on time slot allocation of partitions and task response time,respectively. 展开更多
关键词 ARINC653 earliest-next release time first policy optimal partition configuration policy real-time systems.
在线阅读 下载PDF
Formative Assessment of Programming Language Learning Based on Peer Code Review: Implementation and Experience Report 被引量:2
20
作者 Qing Sun Ji Wu +1 位作者 Wenge Rong Wenbo Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第4期423-434,共12页
In programming courses, the traditional assessment approach tends to evaluate student performance by scoring one or more project-level summative assignments. This approach no longer meets the requirements of a quality... In programming courses, the traditional assessment approach tends to evaluate student performance by scoring one or more project-level summative assignments. This approach no longer meets the requirements of a quality programming language education. Based on an upgraded peer code review model, we propose a formative assessment approach to assess the learning of computer programming languages, and develop an online assessment system(OOCourse) to implement this approach. Peer code review and inspection is an effective way to ensure the high quality of a program by systematically checking the source code. Though it is commonly applied in industrial and open-source software development, it is rarely taught and practiced in undergraduate-level programming courses. We conduct a case study using the formative assessment method in a sophomore level Object-Oriented Design and Construction course with more than 240 students. We use Moodle(an online learning system) and some relevant plugins to conduct peer code review. We also conduct data mining on the running data from the peer assessment activities. The case study shows that formative assessment based on peer code review gradually improved the programming ability of students in the undergraduate class. 展开更多
关键词 PEER code review PROGRAMMING LANGUAGE learning dynamic DESIGNATION FORMATIVE assessment
原文传递
上一页 1 2 3 下一页 到第
使用帮助 返回顶部