期刊文献+
共找到179篇文章
< 1 2 9 >
每页显示 20 50 100
System Identification in the Network Era:A Survey of Data Issues and Innovative Approaches
1
作者 Qing-Guo Wang Liang Zhang 《IEEE/CAA Journal of Automatica Sinica》 2025年第7期1305-1319,共15页
System identification is a data-driven modeling technique that originates from the control field.It constructs models from data to mimic the behavior of dynamic systems.However,in the network era,scenarios such as sen... System identification is a data-driven modeling technique that originates from the control field.It constructs models from data to mimic the behavior of dynamic systems.However,in the network era,scenarios such as sensor malfunctions,packet loss,cyber-attacks,and big data affect the quality,integrity,and security of the data.These data issues pose significant challenges to traditional system identification methods.This paper presents a comprehensive survey of the emergent challenges and advances in system identification in the network era.It explores cutting-edge methodologies to address data issues such as data loss,outliers,noise and nonlinear system identification for complex systems.To tackle the data loss,the methods based on imputation and likelihood-based inference(e.g.,expectation maximization)have been employed.For outliers and noise,methods like robust regression(e.g.,least median of squares,least trimmed squares)and lowrank matrix decomposition show progress in maintaining data integrity.Nonlinear system identification has advanced through kernel-based methods and neural networks,which can model complex data patterns.Finally,this paper provides valuable insights into potential directions for future research. 展开更多
关键词 Data-driven modeling data issues NONLINEARITY system identification
在线阅读 下载PDF
Identifying Data-Flow Errors in Cyber-Physical Systems Based on the Simplified Merged Process of Petri Nets
2
作者 Min Wang Yike Wang +4 位作者 Xiao Chen Lu Liu MengChu Zhou Xiaobing Sun Shanchen Pang 《IEEE/CAA Journal of Automatica Sinica》 2025年第10期2002-2014,共13页
Data-flow errors are prevalent in cyber-physical systems(CPS).Although various approaches based on business process modeling notation(BPMN)have been devised for CPS modeling,the absence of formal specifications compli... Data-flow errors are prevalent in cyber-physical systems(CPS).Although various approaches based on business process modeling notation(BPMN)have been devised for CPS modeling,the absence of formal specifications complicates the verification of data-flow.Formal techniques such as Petri nets are popularly used for identifying data-flow errors.However,due to their interleaving semantics,they suffer from the state-space explosion problem.As an unfolding method for Petri nets,the merged process(MP)technique can well represent concurrency relationships and thus be used to address this issue.Yet generating MP is complex and incurs substantial overhead.By designing and applyingα-deletion rules for Petri nets with data(PNDs),this work simplifies MP,thus resulting in simplified MP(SMP)that is then used to identify data-flow errors.Our approach involves converting a BPMN into a PND and then constructing its SMP.The algorithms are developed to identify data-flow errors,e.g.,redundantdata and lost-data ones.The proposed method enhances the efficiency and effectiveness of identifying data-flow errors in CPS.It is expected to prevent the problems caused by data-flow errors,e.g.,medical malpractice and economic loss in some practical CPS.Its practicality and efficiency of the proposed method through several CPS.Its significant advantages over the state of the art are demonstrated. 展开更多
关键词 Business process modelling notation(BPMN) cyberphysical system(CPS) data-flow errors discrete event system fault detection model simplification Petri net
在线阅读 下载PDF
Design of a Proportional-Integral-Derivative Controller for an Automatic Generation Control of Multi-area Power Thermal Systems Using Firefly Algorithm 被引量:8
3
作者 K.Jagatheesan B.Anand +3 位作者 Sourav Samanta Nilanjan Dey Amira S.Ashour Valentina E.Balas 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2019年第2期503-515,共13页
Essentially, it is significant to supply the consumer with reliable and sufficient power. Since, power quality is measured by the consistency in frequency and power flow between control areas. Thus, in a power system ... Essentially, it is significant to supply the consumer with reliable and sufficient power. Since, power quality is measured by the consistency in frequency and power flow between control areas. Thus, in a power system operation and control,automatic generation control(AGC) plays a crucial role. In this paper, multi-area(Five areas: area 1, area 2, area 3, area 4 and area 5) reheat thermal power systems are considered with proportional-integral-derivative(PID) controller as a supplementary controller. Each area in the investigated power system is equipped with appropriate governor unit, turbine with reheater unit, generator and speed regulator unit. The PID controller parameters are optimized by considering nature bio-inspired firefly algorithm(FFA). The experimental results demonstrated the comparison of the proposed system performance(FFA-PID)with optimized PID controller based genetic algorithm(GAPID) and particle swarm optimization(PSO) technique(PSOPID) for the same investigated power system. The results proved the efficiency of employing the integral time absolute error(ITAE) cost function with one percent step load perturbation(1 % SLP) in area 1. The proposed system based FFA achieved the least settling time compared to using the GA or the PSO algorithms, while, it attained good results with respect to the peak overshoot/undershoot. In addition, the FFA performance is improved with the increased number of iterations which outperformed the other optimization algorithms based controller. 展开更多
关键词 Automatic generation control(AGC) FIREFLY ALGORITHM GENETIC algorithm(GA) particle SWARM optimization(PSO) proportional-integral-derivative(PID) controller
在线阅读 下载PDF
Estimating the State of Health for Lithium-ion Batteries:A Particle Swarm Optimization-Assisted Deep Domain Adaptation Approach 被引量:4
4
作者 Guijun Ma Zidong Wang +4 位作者 Weibo Liu Jingzhong Fang Yong Zhang Han Ding Ye Yuan 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第7期1530-1543,共14页
The state of health(SOH)is a critical factor in evaluating the performance of the lithium-ion batteries(LIBs).Due to various end-user behaviors,the LIBs exhibit different degradation modes,which makes it challenging t... The state of health(SOH)is a critical factor in evaluating the performance of the lithium-ion batteries(LIBs).Due to various end-user behaviors,the LIBs exhibit different degradation modes,which makes it challenging to estimate the SOHs in a personalized way.In this article,we present a novel particle swarm optimization-assisted deep domain adaptation(PSO-DDA)method to estimate the SOH of LIBs in a personalized manner,where a new domain adaptation strategy is put forward to reduce cross-domain distribution discrepancy.The standard PSO algorithm is exploited to automatically adjust the chosen hyperparameters of developed DDA-based method.The proposed PSODDA method is validated by extensive experiments on two LIB datasets with different battery chemistry materials,ambient temperatures and charge-discharge configurations.Experimental results indicate that the proposed PSO-DDA method surpasses the convolutional neural network-based method and the standard DDA-based method.The Py Torch implementation of the proposed PSO-DDA method is available at https://github.com/mxt0607/PSO-DDA. 展开更多
关键词 Deep transfer learning domain adaptation hyperparameter selection lithium-ion batteries(LIBs) particle swarm optimization state of health estimation(SOH)
在线阅读 下载PDF
Security Architecture on the Trusting Internet of Things 被引量:2
5
作者 Bing Zhang Xin-Xin Ma Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第4期364-367,共4页
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi... By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided. 展开更多
关键词 Combined public key elliptic curves cryptography Internet of Things radio frequency identification security system trusting system.
在线阅读 下载PDF
Evaluating the Topology Coverage of BGP Monitors 被引量:1
6
作者 Shen Su Zhihong Tian +5 位作者 Jing Qiu Yu Jiang Yanbin Sun Mohan Li Dunqiu Fan Haining Yu 《Computers, Materials & Continua》 SCIE EI 2020年第3期1397-1412,共16页
BGP monitors are currently the main data resource of AS-level topology measurement,and the integrity of measurement result is limited to the location of such BGP monitors.However,there is currently no work to conduct ... BGP monitors are currently the main data resource of AS-level topology measurement,and the integrity of measurement result is limited to the location of such BGP monitors.However,there is currently no work to conduct a comprehensive study of the range of measurement results for a single BGP monitor.In this paper,we take the first step to describe the observed topology of each BGP monitor.To that end,we first investigate the construction and theoretical up-limit of the measured topology of a BGP monitor based on the valley-free model,then we evaluate the individual parts of the measured topology by comparing such theoretical results with the actually observed data.We find that:1)for more than 90%of the monitors,the actually observed peer-peer links merely takes a small part of all theoretical visible links;2)increasing the BGP monitors in the same AS may improve the measurement result,but with limited improvement;and 3)deploying multiple BGP monitors in different ASs can significantly improve the measurement results,but non-local BGP monitors can hardly replace the local AS BGP monitors.We also propose a metric for monitor selection optimization,and prove its effectiveness with experiment evaluation. 展开更多
关键词 Autonomous System(AS) border gateway protocol AS-level topology visible links
在线阅读 下载PDF
A new technology perspective of the Metaverse:Its essence,framework and challenges
7
作者 Feifei Shi Huansheng Ning +6 位作者 Xiaohong Zhang Rongyang Li Qiaohui Tian Shiming Zhang Yuanyuan Zheng Yudong Guo Mahmoud Daneshmand 《Digital Communications and Networks》 CSCD 2024年第6期1653-1665,共13页
The Metaverse depicts a parallel digitalized world where virtuality and reality are fused.It has economic and social systems like those in the real world and provides intelligent services and applications.In this pape... The Metaverse depicts a parallel digitalized world where virtuality and reality are fused.It has economic and social systems like those in the real world and provides intelligent services and applications.In this paper,we introduce the Metaverse from a new technology perspective,including its essence,corresponding technical framework,and potential technical challenges.Specifically,we analyze the essence of the Metaverse from its etymology and point out breakthroughs promising to be made in time,space,and contents of the Metaverse by citing Maslow's Hierarchy of Needs.Subsequently,we conclude four pillars of the Metaverse,named ubiquitous connections,space convergence,virtuality and reality interaction,and human-centered communication,and establish a corresponding technical framework.Additionally,we envision open issues and challenges of the Metaverse in the technical aspect.The work proposes a new technology perspective of the Metaverse and will provide further guidance for its technology development in the future. 展开更多
关键词 Metaverse Technical framework Ubiquitous connections Space convergence Virtuality and reality interaction Human-centered communication
在线阅读 下载PDF
Task offloading delay minimization in vehicular edge computing based on vehicle trajectory prediction
8
作者 Feng Zeng Zheng Zhang Jinsong Wu 《Digital Communications and Networks》 2025年第2期537-546,共10页
In task offloading,the movement of vehicles causes the switching of connected RSUs and servers,which may lead to task offloading failure or high service delay.In this paper,we analyze the impact of vehicle movements o... In task offloading,the movement of vehicles causes the switching of connected RSUs and servers,which may lead to task offloading failure or high service delay.In this paper,we analyze the impact of vehicle movements on task offloading and reveal that data preparation time for task execution can be minimized via forward-looking scheduling.Then,a Bi-LSTM-based model is proposed to predict the trajectories of vehicles.The service area is divided into several equal-sized grids.If the actual position of the vehicle and the predicted position by the model belong to the same grid,the prediction is considered correct,thereby reducing the difficulty of vehicle trajectory prediction.Moreover,we propose a scheduling strategy for delay optimization based on the vehicle trajectory prediction.Considering the inevitable prediction error,we take some edge servers around the predicted area as candidate execution servers and the data required for task execution are backed up to these candidate servers,thereby reducing the impact of prediction deviations on task offloading and converting the modest increase of resource overheads into delay reduction in task offloading.Simulation results show that,compared with other classical schemes,the proposed strategy has lower average task offloading delays. 展开更多
关键词 Vehicular edge computing Task offloading Vehicle trajectory prediction Delay minimization Bi-LSTM model
在线阅读 下载PDF
Safety-Certified Parallel Model Predictive Control of Autonomous Surface Vehicles via Neurodynamic Optimization
9
作者 Guanghao Lyu Zhouhua Peng Jun Wang 《IEEE/CAA Journal of Automatica Sinica》 2025年第10期2056-2066,共11页
This paper addresses the parallel control of autonomous surface vehicles subject to external disturbances,state constraints,and input constraints in complex ocean environments with multiple obstacles.A safety-certifie... This paper addresses the parallel control of autonomous surface vehicles subject to external disturbances,state constraints,and input constraints in complex ocean environments with multiple obstacles.A safety-certified parallel model predictive control scheme with collision-avoiding capability is proposed for autonomous surface vehicles in the framework of parallel control.Specifically,an extended state observer is designed by leveraging historical and real-time data for concurrent learning to map the motion of autonomous surface vehicles from its physical system to its artificial counterpart.A parallel model predictive control law is developed on the basis of the artificial system for both physical and artificial autonomous surface vehicles to realize virtual-physical tracking control of vehicles subject to state and input constraints.To ensure safety,highorder discrete control barrier functions are encoded in the parallel model predictive control law as safety constraints such that collision avoidance with obstacles can be achieved.A recedinghorizon constrained optimization problem is constructed with the safety constraints encoded by control barrier functions for parallel model predictive control of autonomous surface vehicles and solved via neurodynamic optimization with projection neural networks.The effectiveness and characteristics of the proposed method are demonstrated via simulations for the safe trajectory tracking and automatic berthing of autonomous surface vehicles. 展开更多
关键词 Autonomous surface vehicles(ASVs) high-order control barrier functions neurodynamic optimization parallel model
在线阅读 下载PDF
Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
10
作者 Yu-Ang Wang Zidong Wang +2 位作者 Lei Zou Bo Shen Hongli Dong 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期114-125,共12页
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu... In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks. 展开更多
关键词 Attack detection cyber-physical systems(CPSs) perfect stealthy attacks watermark-based strategy
在线阅读 下载PDF
A Survey of Evolutionary Algorithms for Multi-Objective Optimization Problems With Irregular Pareto Fronts 被引量:32
11
作者 Yicun Hua Qiqi Liu +1 位作者 Kuangrong Hao Yaochu Jin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第2期303-318,I0001-I0004,共20页
Evolutionary algorithms have been shown to be very successful in solving multi-objective optimization problems(MOPs).However,their performance often deteriorates when solving MOPs with irregular Pareto fronts.To remed... Evolutionary algorithms have been shown to be very successful in solving multi-objective optimization problems(MOPs).However,their performance often deteriorates when solving MOPs with irregular Pareto fronts.To remedy this issue,a large body of research has been performed in recent years and many new algorithms have been proposed.This paper provides a comprehensive survey of the research on MOPs with irregular Pareto fronts.We start with a brief introduction to the basic concepts,followed by a summary of the benchmark test problems with irregular problems,an analysis of the causes of the irregularity,and real-world optimization problems with irregular Pareto fronts.Then,a taxonomy of the existing methodologies for handling irregular problems is given and representative algorithms are reviewed with a discussion of their strengths and weaknesses.Finally,open challenges are pointed out and a few promising future directions are suggested. 展开更多
关键词 Evolutionary algorithm machine learning multi-objective optimization problems(MOPs) irregular Pareto fronts
在线阅读 下载PDF
Discrete Event System Framework for Fault Diagnosis with Measurement Inconsistency:Case Study of Rogue DHCP Attack 被引量:4
12
作者 Mayank Agarwal Santosh Biswas Sukumar Nandi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2019年第3期789-806,共18页
Fault detection and diagnosis(FDD) facilitates reliable operation of systems. Various approaches have been proposed for FDD like Analytical redundancy(AR), Principal component analysis(PCA), Discrete event system(DES)... Fault detection and diagnosis(FDD) facilitates reliable operation of systems. Various approaches have been proposed for FDD like Analytical redundancy(AR), Principal component analysis(PCA), Discrete event system(DES) model etc., in the literature. Performance of FDD schemes greatly depends on accuracy of the sensors which measure the system parameters.Due to various reasons like faults, communication errors etc.,sensors may occasionally miss or report erroneous values of some system parameters to FDD engine, resulting in measurement inconsistency of these parameters. Schemes like AR, PCA etc.,have mechanisms to handle measurement inconsistency, however,they are computationally heavy. DES based FDD techniques are widely used because of computational simplicity, but they cannot handle measurement inconsistency efficiently. Existing DES based schemes do not use Measurement inconsistent(MI)parameters for FDD. These parameters are not permanently unmeasurable or erroneous, so ignoring them may lead to weak diagnosis. To address this issue, we propose a Measurement inconsistent discrete event system(MIDES) framework, which uses MI parameters for FDD at the instances they are measured by the sensors. Otherwise, when they are unmeasurable or erroneously reported, the MIDES invokes an estimator diagnoser that predicts the state(s) the system is expected to be in, using the subsequent parameters measured by the other sensors. The efficacy of the proposed method is illustrated using a pumpvalve system. In addition, an MIDES based intrusion detection system has been developed for detection of rogue dynamic host configuration protocol(DHCP) server attack by mapping the attack to a fault in the DES framework. 展开更多
关键词 Fault diagnosis instrasion detection SYSTEM (IDS) MEASUREMENT inconsistent discrete event SYSTEM (DES) rogue dynamic HOST configuration protocol (DHCP) server
在线阅读 下载PDF
Hybrid NOMA Based MIMO Offloading for Mobile Edge Computing in 6G Networks 被引量:4
13
作者 Yunus Dursun Fang Fang Zhiguo Ding 《China Communications》 SCIE CSCD 2022年第10期12-20,共9页
Non-orthogonal multiple access (NOMA), multiple-input multiple-output (MIMO) and mobile edge computing (MEC) are prominent technologies to meet high data rate demand in the sixth generation (6G) communication networks... Non-orthogonal multiple access (NOMA), multiple-input multiple-output (MIMO) and mobile edge computing (MEC) are prominent technologies to meet high data rate demand in the sixth generation (6G) communication networks. In this paper, we aim to minimize the transmission delay in the MIMO-MEC in order to improve the spectral efficiency, energy efficiency, and data rate of MEC offloading. Dinkelbach transform and generalized singular value decomposition (GSVD) method are used to solve the delay minimization problem. Analytical results are provided to evaluate the performance of the proposed Hybrid-NOMA-MIMO-MEC system. Simulation results reveal that the H-NOMA-MIMO-MEC system can achieve better delay performance and lower energy consumption compared to OMA. 展开更多
关键词 NOMA MEC MIMO Generalized sin-gular value decomposition sixth generation networks(6G) delay minimization
在线阅读 下载PDF
Beyond 5G Networks: Integration of Communication, Computing, Caching, and Control 被引量:5
14
作者 Musbahu Mohammed Adam Liqiang Zhao +1 位作者 Kezhi Wang Zhu Han 《China Communications》 SCIE CSCD 2023年第7期137-174,共38页
In recent years,the exponential proliferation of smart devices with their intelligent applications poses severe challenges on conventional cellular networks.Such challenges can be potentially overcome by integrating c... In recent years,the exponential proliferation of smart devices with their intelligent applications poses severe challenges on conventional cellular networks.Such challenges can be potentially overcome by integrating communication,computing,caching,and control(i4C)technologies.In this survey,we first give a snapshot of different aspects of the i4C,comprising background,motivation,leading technological enablers,potential applications,and use cases.Next,we describe different models of communication,computing,caching,and control(4C)to lay the foundation of the integration approach.We review current stateof-the-art research efforts related to the i4C,focusing on recent trends of both conventional and artificial intelligence(AI)-based integration approaches.We also highlight the need for intelligence in resources integration.Then,we discuss the integration of sensing and communication(ISAC)and classify the integration approaches into various classes.Finally,we propose open challenges and present future research directions for beyond 5G networks,such as 6G. 展开更多
关键词 4C 6G integration of communication computing caching and control i4C multi-access edge computing(MEC)
在线阅读 下载PDF
Global Synchronization of Stochastically Disturbed Memristive Neurodynamics via Discontinuous Control Laws 被引量:3
15
作者 Zhenyuan Guo Shaofu Yang Jun Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2016年第2期121-131,共11页
This paper presents the theoretical results on the master-slave (or driving-response) synchronization of two memristive neural networks in the presence of additive noise. First, a control law with a linear time-delay ... This paper presents the theoretical results on the master-slave (or driving-response) synchronization of two memristive neural networks in the presence of additive noise. First, a control law with a linear time-delay feedback term and a discontinuous feedback term is introduced. By utilizing the stability theory of stochastic differential equations, sufficient conditions are derived for ascertaining global synchronization in mean square using this control law. Second, an adaptive control law consisting of a linear feedback term and a discontinuous feedback term is designed to achieve global synchronization in mean square, and it does not need prior information of network parameters or random disturbances. Finally, simulation results are presented to substantiate the theoretical results. © 2014 Chinese Association of Automation. 展开更多
关键词 Additive noise Control theory Delay control systems Differential equations Stochastic systems Synchronization Time delay
在线阅读 下载PDF
Computation of an Emptiable Minimal Siphon in a Subclass of Petri Nets Using Mixed-Integer Programming 被引量:4
16
作者 Shouguang Wang Wenli Duo +4 位作者 Xin Guo Xiaoning Jiang Dan You Kamel Barkaoui MengChu Zhou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第1期219-226,共8页
Deadlock resolution strategies based on siphon control are widely investigated.Their computational efficiency largely depends on siphon computation.Mixed-integer programming(MIP)can be utilized for the computation of ... Deadlock resolution strategies based on siphon control are widely investigated.Their computational efficiency largely depends on siphon computation.Mixed-integer programming(MIP)can be utilized for the computation of an emptiable siphon in a Petri net(PN).Based on it,deadlock resolution strategies can be designed without requiring complete siphon enumeration that has exponential complexity.Due to this reason,various MIP methods are proposed for various subclasses of PNs.This work proposes an innovative MIP method to compute an emptiable minimal siphon(EMS)for a subclass of PNs named S^(4)PR.In particular,many particular structural characteristics of EMS in S4 PR are formalized as constraints,which greatly reduces the solution space.Experimental results show that the proposed MIP method has higher computational efficiency.Furthermore,the proposed method allows one to determine the liveness of an ordinary S^(4)PR. 展开更多
关键词 Automated manufacturing systems DEADLOCKS discrete event system mixed-integer programming(MIP) Petri nets(PN) SIPHONS
在线阅读 下载PDF
Multi-stage online task assignment driven by offline data under spatio-temporal crowdsourcing 被引量:3
17
作者 Qi Zhang Yingjie Wang +1 位作者 Zhipeng Cai Xiangrong Tong 《Digital Communications and Networks》 SCIE CSCD 2022年第4期516-530,共15页
In the era of the Internet of Things(IoT),the crowdsourcing process is driven by data collected by devices that interact with each other and with the physical world.As a part of the IoT ecosystem,task assignment has b... In the era of the Internet of Things(IoT),the crowdsourcing process is driven by data collected by devices that interact with each other and with the physical world.As a part of the IoT ecosystem,task assignment has become an important goal of the research community.Existing task assignment algorithms can be categorized as offline(performs better with datasets but struggles to achieve good real-life results)or online(works well with real-life input but is difficult to optimize regarding in-depth assignments).This paper proposes a Cross-regional Online Task(CROT)assignment problem based on the online assignment model.Given the CROT problem,an Online Task Assignment across Regions based on Prediction(OTARP)algorithm is proposed.OTARP is a two-stage graphics-driven bilateral assignment strategy that uses edge cloud and graph embedding to complete task assignments.The first stage uses historical data to make offline predictions,with a graph-driven method for offline bipartite graph matching.The second stage uses a bipartite graph to complete the online task assignment process.This paper proposes accelerating the task assignment process through multiple assignment rounds and optimizing the process by combining offline guidance and online assignment strategies.To encourage crowd workers to complete crowd tasks across regions,an incentive strategy is designed to encourage crowd workers’movement.To avoid the idle problem in the process of crowd worker movement,a drop-by-rider problem is used to help crowd workers accept more crowd tasks,optimize the number of assignments,and increase utility.Finally,through comparison experiments on real datasets,the performance of the proposed algorithm on crowd worker utility value and the matching number is evaluated. 展开更多
关键词 Spatiotemporal crowdsourcing Cross-regional Edge cloud Offline prediction Oline task assignment
在线阅读 下载PDF
Where Does AlphaGo Go: From Church-Turing Thesis to AlphaGo Thesis and Beyond 被引量:60
18
作者 Fei-Yue Wang Jun Jason Zhang +5 位作者 Xinhu Zheng Xiao Wang Yong Yuan Xiaoxiao Dai Jie Zhang Liuqing Yang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2016年第2期113-120,共8页
An investigation on the impact and significance of the AlphaGo vs. Lee Sedol Go match is conducted, and concludes with a conjecture of the AlphaGo Thesis and its extension in accordance with the Church-Turing Thesis i... An investigation on the impact and significance of the AlphaGo vs. Lee Sedol Go match is conducted, and concludes with a conjecture of the AlphaGo Thesis and its extension in accordance with the Church-Turing Thesis in the history of computing. It is postulated that the architecture and method utilized by the AlphaGo program provide an engineering solution for tackling issues in complexity and intelligence. Specifically, the AlphaGo Thesis implies that any effective procedure for hard decision problems such as NP-hard can be implemented with AlphaGo-like approach. Deep rule-based networks are proposed in attempt to establish an understandable structure for deep neural networks in deep learning. The success of AlphaGo and corresponding thesis ensure the technical soundness of the parallel intelligence approach for intelligent control and management of complex systems and knowledge automation. © 2014 Chinese Association of Automation. 展开更多
关键词 Religious buildings
在线阅读 下载PDF
Unsupervised Quick Reduct Algorithm Using Rough Set Theory 被引量:2
19
作者 C. Velayutham K. Thangavel 《Journal of Electronic Science and Technology》 CAS 2011年第3期193-201,共9页
Feature selection (FS) is a process to select features which are more informative. It is one of the important steps in knowledge discovery. The problem is that not all features are important. Some of the features ma... Feature selection (FS) is a process to select features which are more informative. It is one of the important steps in knowledge discovery. The problem is that not all features are important. Some of the features may be redundant, and others may be irrelevant and noisy. The conventional supervised FS methods evaluate various feature subsets using an evaluation function or metric to select only those features which are related to the decision classes of the data under consideration. However, for many data mining applications, decision class labels are often unknown or incomplete, thus indicating the significance of unsupervised feature selection. However, in unsupervised learning, decision class labels are not provided. In this paper, we propose a new unsupervised quick reduct (QR) algorithm using rough set theory. The quality of the reduced data is measured by the classification performance and it is evaluated using WEKA classifier tool. The method is compared with existing supervised methods and the result demonstrates the efficiency of the proposed algorithm. 展开更多
关键词 Index Terms--Data mining rough set supervised and unsupervised feature selection unsupervised quick reduct algorithm.
在线阅读 下载PDF
Continuous-Time Prediction of Industrial Paste Thickener System With Differential ODE-Net 被引量:3
20
作者 Zhaolin Yuan Xiaorui Li +4 位作者 Di Wu Xiaojuan Ban Nai-Qi Wu Hong-Ning Dai Hao Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第4期686-698,共13页
It is crucial to predict the outputs of a thickening system,including the underflow concentration(UC)and mud pressure,for optimal control of the process.The proliferation of industrial sensors and the availability of ... It is crucial to predict the outputs of a thickening system,including the underflow concentration(UC)and mud pressure,for optimal control of the process.The proliferation of industrial sensors and the availability of thickening-system data make this possible.However,the unique properties of thickening systems,such as the non-linearities,long-time delays,partially observed data,and continuous time evolution pose challenges on building data-driven predictive models.To address the above challenges,we establish an integrated,deep-learning,continuous time network structure that consists of a sequential encoder,a state decoder,and a derivative module to learn the deterministic state space model from thickening systems.Using a case study,we examine our methods with a tailing thickener manufactured by the FLSmidth installed with massive sensors and obtain extensive experimental results.The results demonstrate that the proposed continuous-time model with the sequential encoder achieves better prediction performances than the existing discrete-time models and reduces the negative effects from long time delays by extracting features from historical system trajectories.The proposed method also demonstrates outstanding performances for both short and long term prediction tasks with the two proposed derivative types. 展开更多
关键词 Industrial 24 paste thickener ordinary differential equation(ODE)-net recurrent neural network time series prediction
在线阅读 下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部