Based on the fifth and/or sixth generation of mobile communication(5G/6G), and cloud sea computing (CSC) in 5G open gridcomputing environment (OGCE), a model of wing-in-ground (WIG) effect aircraft carrier (EAC) base...
Based on the fifth and/or sixth generation of mobile communication(5G/6G), and cloud sea computing (CSC) in 5G open gridcomputing environment (OGCE), a model of wing-in-ground (WIG) effect aircraft carrier (EAC) based on model of manta ray and an intelligent airfield isomer robot (IAIR) are presented by this paper. The structure of the WIG EAC consists of a multi-hull ship model and a center-body of a blended wing body (BWB) configuration of commercial aircraft framework, which is based on the reconfiguring tube-and-(sweptback) wing (TAW) (e.g., Airbus A380, Boeing 777X), the combinatorial structure of a center-body can be configured by intersecting and overlapping framework variant (IOFV) of two aircraft (2A) (IOFV-2A) with the TAW configuration, or, IOFV of three aircraft (IOFV-3A) with the TAW configuration. This IAIR is composed of a takeoff-landing (runway) working deck platform (TOLWDP, or WDP) robot and a three-overlapping Venus flytrap Nelumbo lutea (hand type) robot (TO-VFNL-R), a telescopic positioning grip hand (grab-hook) type robot (TPGHTR), and its other robots. A TOLWDP (WDP) robot can bear the weight of the heaviest fighter jet, which is able to take off and land on the WIG EAC, such as Shenyang J-15, J-16D, J-35, and Sukhoi Su-35, Su-57, and also can take off and land and catapult the unmanned aerial vehicle (UAV). This WIG EAC has a large hangar that used for sea rescue and support, and when supported by carrier-based aircraft and underwater robots, can intercept the aircraft carrier fleets and submarine fleets and unmanned submarine. Under the support of the CSC in 5G OGCE, the aircraft can safely be berthed and docked and land on the TOLWDP under the command and control (C2) of the distributed control cloud, to realize the various tasks of air-sea WIG EAC based on CSC in 5G OGCE.
This paper considers a digital twin network (DTN) assisted mobile edge computing (MEC) system. When wireless device (WD) users request services from MECs, we assume in the system there are a cloud server, storing all ...
详细信息
This paper considers a digital twin network (DTN) assisted mobile edge computing (MEC) system. When wireless device (WD) users request services from MECs, we assume in the system there are a cloud server, storing all of service entities, and a lightweight digital twin network, providing the digital replicas of state information of all MECs instead of service entities. We aim to maximize the number of service requests served by the MECs, or, equivalently, to minimize the load of the cloud. This is formulated as a mixed-integer non-convex optimization problem. We propose a service placement algorithm based on hash-based data structure called Merkle tree to solve the problem. The introduction of candidate mode pruning effectively reduces the time complexity of the algorithm in iterations. Simulation results show that our proposed method has a better performance compared with the other benchmarks.
Natural products are substances produced by organisms in nature and often possess biological activity and structural diversity. Drug development based on natural products has been common for many years. However, the i...
详细信息
Lane detection technology is of great significance in intelligent transportation. Standard Hough transform is easy to generate false peak value and to cause error detection of line when extracting line. In this paper,...
详细信息
Lane detection technology is of great significance in intelligent transportation. Standard Hough transform is easy to generate false peak value and to cause error detection of line when extracting line. In this paper, the wavelet algorithm is combined to extract the area of interest in lane line recognition, and then the wavelet reconstruction and Canny algorithm are used to obtain the image edge, and the lane line is detected by the Hough transform algorithm based on linear parameter space reduction. This algorithm can improve the correct detection rate of lane lines, avoid the interaction between lane lines and reduce the misdetection of both sides of the lane. The improved algorithm is more conducive to the real-time control of intelligent vehicle assistance and automatic driving in time.
To support large-scale intelligent applications, distributed machine learning based on JointCloud is an intuitive solution scheme. However, the distributed machine learning is difficult to train due to that the corres...
详细信息
ISBN:
(纸本)9781728169811
To support large-scale intelligent applications, distributed machine learning based on JointCloud is an intuitive solution scheme. However, the distributed machine learning is difficult to train due to that the corresponding optimization solver algorithms converge slowly, which highly demand on computing and memory resources. To overcome the challenges, we propose a computing framework for L-BFGS optimization algorithm based on variance reduction method, which can utilize a fixed big learning rate to linearly accelerate the convergence speed. To validate our claims, we have conducted several experiments on multiple classical datasets. Experimental results show that the computing framework accelerate the training process of solver and obtain accurate results for machine learning algorithms.
Cloud computing has become an essential technology for delivering infrastructure and data service needs with lower cost, low effort and high scalability, hence it is increasingly implemented in all aspects of the IT i...
详细信息
Cloud computing has become an essential technology for delivering infrastructure and data service needs with lower cost, low effort and high scalability, hence it is increasingly implemented in all aspects of the IT industry. Despite the quick adoption of cloud computing, the problem of information security is still not fully resolved. Information security issues are still hampering the evolution of cloud computing to some extent and need to be addressed. Blockchain is one of the decentralized processes in a worldview that works with parallel and distributed ledger technology, the application process, and service-oriented design. However, the primary security issue is key leakage and third parties easily hack the secured information. To address this issues, in this novel presents Blockchain based Proof of staking with Elliptic Curve Encryption (BPECE) algorithm is used to secure data transmission in the cloud. This proposed method efficiently checks each node verification using Policy based Key Authentication (PBKA) algorithm. The proposed technique generates public key for each document. Thus the proposed method gives better security performance than previous methods.
There are many problems in distributed energy access, such as many access points, different access distances and miscellaneous access protocols, which results in low reliability of synchronous operation of the whole s...
详细信息
The identity-based encryption (IBE) scheme SM9 is a commercial encryption standard in China and has been used as a basic building block for authentication. Currently, to accommodate large-scale application scenarios, ...
详细信息
The identity-based encryption (IBE) scheme SM9 is a commercial encryption standard in China and has been used as a basic building block for authentication. Currently, to accommodate large-scale application scenarios, a variant hierarchical identity-based encryption (HIBE) scheme has been constructed on the basis of SM9. However, there still a problem that the ciphertext may leak the identity of the recipients. An anonymous HIBE has been developed based on SM9 to realize the anonymization of data recipients. Moreover, the anonymous HIBE scheme will be proven to have adaptive secure under the standard model. The performance of the anonymous HIBE is evaluated, the experimental results are comparable to the classical AHIBE algorithm which show the practicability of the scheme.
Poetry generation has been a classic natural language generation task recently. But so far the methods for this topic mainly imitate and reproduce the poems on the training data set, which indicates that they either h...
详细信息
In this paper, a virtual human dribbling strategy is proposed to realize the programmed animation of virtual human dribbling. First, the dribbling interactive elements are extracted and their shapes, sizes and positio...
详细信息
In this paper, a virtual human dribbling strategy is proposed to realize the programmed animation of virtual human dribbling. First, the dribbling interactive elements are extracted and their shapes, sizes and positions are planned. Then the balls are attributed and divided. Also, the dominant of the ball trajectory is configured to a specific virtual human to solve the control problem of the ball movement curve in the virtual environment. Finally, according to the division of dribbling behavior, the states of the feet and the ball are analyzed and calculated under different behaviors, and the action transition of the virtual human is carried out through two basic actions to solve the number of action limitation, and combined with ball curve to realize the virtual human dribbling behavior strategy. And the actions are verified by the ”Cuju” virtual environment, which confirms the feasibility of individual dribbling of the virtual human.
暂无评论