The trajectory planning of intelligent vehicles is the focus of the research field of intelligent vehicles. In this paper, the vehicle state is analyzed during the lane change process, the trajectory of the intelligen...
详细信息
The trajectory planning of intelligent vehicles is the focus of the research field of intelligent vehicles. In this paper, the vehicle state is analyzed during the lane change process, the trajectory of the intelligent vehicle is planned by using the quintic polynomial, the trajectory optimization function is introduced, the objective function of integrated lane change time and maximum acceleration to improve comfort and passage efficiency is constructed, the lane change trajectory is optimally selected based on particle swarm algorithm, and the lane change trajectory is referenced according to the real-time information provided by the Vehicle to Everything to realize real-time data update in order to the data is updated in real-time to provide timely feedback to the information processing center for re-planning the path when there is an unexpected situation ahead. The simulation results show that the lane change trajectory planning method can solve the problems caused by the change of speed of surrounding vehicles and the sudden intrusion of vehicles in the process of lane change, and can significantly improve the smoothness and safety of the process of lane change.
A small deep hole drilling control system based on the capuchin search algorithm to optimize fuzzy PID is proposed to improve the efficiency of small deep hole drilling. Based on the difference between the actual axia...
详细信息
A small deep hole drilling control system based on the capuchin search algorithm to optimize fuzzy PID is proposed to improve the efficiency of small deep hole drilling. Based on the difference between the actual axial force and the expected axial force, the system adaptively adjusts the quantization factor and scale factor of the fuzzy PID controller by using the capuchin search algorithm and adjusting the parameters of the controller in real-time to improve the system performance. The experimental results show that the CapSA-optimized fuzzy PID algorithm achieves the shortest stabilization time and slight overshoot. When the algorithm is applied to actual machining, the proposed algorithm has a faster response speed and more stable axial force. It can be adaptive to Change the PID drilling parameters to meet the production requirements of intelligent manufacturing..
Harmonic disturbances caused by the high-order harmonics of grid-connected inverters are observed in the medium-voltage distribution systems with a large number of distributed generations. It has been demonstrated wit...
详细信息
Harmonic disturbances caused by the high-order harmonics of grid-connected inverters are observed in the medium-voltage distribution systems with a large number of distributed generations. It has been demonstrated with the one inverter that a large harmonic voltage is observed when the switching frequency of the inverter becomes equal to the series resonance frequency of the grid-side impedance. In real distribution systems, multiple inverters are connected in parallel for the large power capacity. It is required to clarify the mechanism of the harmonic disturbance in parallel-operating conditions. This paper considers the harmonic voltage characteristics in parallel-operating conditions by the experimental results.
Users worldwide widely use cloud storage because of its efficiency, convenience, and high availability. Multi-cloud storage is usually selected to ensure the high availability of data. Unfortunately, when data is migr...
详细信息
Users worldwide widely use cloud storage because of its efficiency, convenience, and high availability. Multi-cloud storage is usually selected to ensure the high availability of data. Unfortunately, when data is migrated and replicated between multi-cloud data centers, it is not easy to guarantee data con-sistency. This paper proposes an efficient, secure, and new data consistency verification scheme using blockchain technology. In order to reduce the computation and communication overhead in the verification process, our scheme uses encrypted tags to build Merkle hash tree to generate unique and lightweight verification proofs and does not use third-party auditors. The final theoretical and experimental analysis shows that our scheme has higher security and a faster verification process in multi-cloud storage.
The accuracy of the neural networks can usually be improved by increasing the size of the dataset and the layers or operators of the network, as it has strong composability. But, it makes a challenge to train these mo...
详细信息
The accuracy of the neural networks can usually be improved by increasing the size of the dataset and the layers or operators of the network, as it has strong composability. But, it makes a challenge to train these models efficiently, due to the limited resources of a single device, such as memory, computational resource and so on. For this challenge, it has become an inevitable trend to automatically implement model parallelism across multiple devices. This paper proposes Aware, an adaptive distributedparallel training method, to search distributedparallel strategy automatically for deep learning model. It firstly proposes an operator fusion strategy with computation and communication awareness to simplify the computational graph of deep learning model. And then, it introduces position-aware graph embedding algorithm to extract the structural features of models, which can make the searched parallel strategies to transplant to other networks with similar structures. On this basis, we use reinforcement learning algorithm to search distributedparallel strategy automatically. This paper makes experiments with neural networks such as Inception V3, NMT, GNM, NasNet and ResNet, and uses CIFAR10 and PTB datasets to compare the two methods of Hierarchical and Placeto. The results show that compared with Placeto, Aware achieves up to 5% reductions in runtime. Aware achieves more than 8% reductions in runtime compared with Hierarchical. Moreover, it has better transplantation and generalization capabilities, and supports pre-training for large-scale network parallel strategy search and accelerates convergence.
Cloud computing is widely recognized as distributedcomputing paradigm for the next generation of dynamically scalable applications. Recently a novel service model, called Function-as-a-Service (FaaS), has been propos...
详细信息
ISBN:
(纸本)9783030483401;9783030483395
Cloud computing is widely recognized as distributedcomputing paradigm for the next generation of dynamically scalable applications. Recently a novel service model, called Function-as-a-Service (FaaS), has been proposed, that enables users to exploit the computational power of cloud infrastructures, without the need to configure and manage complex computations systems. FaaS paradigm represents an opportunity to easily develop and execute extreme-scale applications as it allows fine-grain decomposition of the application with a much more efficient scheduling on cloud provider infrastructure. We introduce FLY, a domain-specific language for designing, deploying and executing scientific computing applications by exploiting the FaaS service model on different cloud infrastructures. In this paper, we present the design and the language definition of FLY on several computing (local and FaaS) back-ends: Symmetric multiprocessing (SMP), Amazon AWS Lambda, Microsoft Azure Functions, Google Cloud Functions, and IBM Bluemix/Apache OpenWhisk. We also present the first FLY source-to-source compiler, publicly available on GitHub, which supports SMP and AWS back-ends.
As a new decentralized infrastructure and distributedcomputing paradigm, blockchain is of great significance to break through the mutual trust problem between statistical specialty and basic data providing department...
详细信息
Convolutional neural networks(CNN) have made significant advances in offline handwritten Chinese character recognition, CNN recognize characters based on local feature but not making use of the overall topology of the...
详细信息
Convolutional neural networks(CNN) have made significant advances in offline handwritten Chinese character recognition, CNN recognize characters based on local feature but not making use of the overall topology of the character to improve recognition accuracy. In this paper, we propose a method for handwritten Chinese character recognition by using CNN combined with TrueType font template matching. Firstly, a trained CNN is used to recognize the handwritten Chinese character, the output Top-N are selected as the candidate characters, and then the handwritten Chinese character is linearly transformed and matched with the TrueType font templates of the candidate characters respectively, the best matching candidate character is selected as the result. The experiments show that the method can combine the speed of CNN and the accuracy of template matching effectively, has higher accuracy than conventional CNN, especially for specific types of handwritten Chinese characters recognition.
In view of the deficiencies in the current situation of various types of system centers in the field of aerospace measurement, transportation and control, especially the in-depth analysis and summary of the inadaptabi...
详细信息
The present work investigates the modeling of preexascale input/output (I/O) workloads of Adaptive Mesh Refinement (AMR) simulations through a simple proxy application. We collect data from the AMReX Castro framework ...
详细信息
ISBN:
(数字)9781665497473
ISBN:
(纸本)9781665497480
The present work investigates the modeling of preexascale input/output (I/O) workloads of Adaptive Mesh Refinement (AMR) simulations through a simple proxy application. We collect data from the AMReX Castro framework running on the Summit supercomputer for a wide range of scales and mesh partitions for the hydrodynamic Sedov case as a baseline to provide sufficient coverage to the formulated proxy model. The non-linear analysis data production rates are quantified as a function of a set of input parameters such as output frequency, grid size, number of levels, and the Courant-Friedrichs-Lewy (CFL) condition number for each rank, mesh level and simulation time step. Linear regression is then applied to formulate a simple analytical model which allows to translate AMReX inputs into MACSio proxy I/O application parameters, resulting in a simple “kernel” approximation for data production at each time step. Results show that MACSio can simulate actual AMReX nonlinear “static” I/O workloads to a certain degree of confidence on the Summit supercomputer using the present methodology. The goal is to provide an initial level of understanding of AMR I/O workloads via lightweight proxy applications models to facilitate autotune data management strategies in anticipation of exascale systems.
暂无评论