In this paper, stochastic optimal control problems in continuous time and space are considered. In recent years, such problems have received renewed attention from the lens of reinforcement learning (RL) which is also...
详细信息
Robotic systems to assist with movement rehabil-itation are transitioning from providing fixed pre-programmed assistance towards adaptive challenge-oriented strategies that present patients with tasks that are demandi...
详细信息
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency...
详细信息
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility *** order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client *** enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for *** problem is decoupled into two convex *** to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration *** on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their *** simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.
作者:
Zhang, HaoyuWong, Man-ChungUniversity of Macau
State Key Laboratory of Internet of Things for Smart City Department of Electrical and Computer Engineering Faculty of Science and Technology China
To increase the power density of voltage source converters (VSC) usually use parallel structures. However, parallel VSC will easily introduce circulating current, which can cause a power efficiency decline. This paper...
详细信息
This work demonstrates a high-performance in-cell polarizer adopting photo-aligned azobenzene dyes. On the strength of the multilayered design, a simple fabrication process has been developed to assemble an in-cell po...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
An approach to developing a thin-film polarizer with high polarization efficiency in liquid crystal cells is presented. The in- cell polarizer facilitates the realization of novel color-conversion liquid crystal displ...
详细信息
Automatic Speaker Identification (ASI) is so crucial for security. Current ASI systems perform well in quiet and clean surroundings. However, in noisy situations, the robustness of an ASI system against additive noise...
详细信息
Automatic Speaker Identification (ASI) is so crucial for security. Current ASI systems perform well in quiet and clean surroundings. However, in noisy situations, the robustness of an ASI system against additive noise and interference is a crucial factor. An investigation of the impact of interference on ASI system performance is presented in this paper, which introduces algorithms for achieving high ASI system performance. The objective is to resist the interference of various forms. This paper presents two models for the ASI task in the presence of interference. The first one depends on Normalized Pitch Frequency (NPF) and Mel-Frequency Cepstral Coefficients (MFCCs) as extracted features and Multi-Layer Perceptron (MLP) as a classifier. In this model, we investigate the utilization of a Discrete Transform (DT), such as Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Discrete Sine Transform (DST), to increase the robustness of extracted features against different types of degradation through exploiting the sub-band decomposition characteristics of DWT and the energy compaction property of DCT and DST. This is achieved by extracting features directly from contaminated speech signals in addition to features extracted from discrete transformed signals to create hybrid feature vectors. The enhancement techniques, such as Spectral Subtraction (SS), Winer Filter, and adaptive Wiener filter, are used in a preprocessing stage to eliminate the effect of the interference on the ASI system. In the second model, we investigate the utilization of Deep Learning (DL) based on a Convolutional Neural Network (CNN) with speech signal spectrograms and their Radon transforms to increase the robustness of the ASI system against interference effects. One of this paper goals is to introduce a comparison between the two models and build a more robust ASI system against severe interference. The experimental results indicate that the two proposed models lead to satisfa
With the extensive penetration of distributed renewable energy and self-interested prosumers,the emerging power market tends to enable user autonomy by bottom-up control and distributed *** paper is devoted to solving...
详细信息
With the extensive penetration of distributed renewable energy and self-interested prosumers,the emerging power market tends to enable user autonomy by bottom-up control and distributed *** paper is devoted to solving the specific problems of distributed energy management and autonomous bidding and peer-to-peer(P2P)energy sharing among prosumers.A novel cloud-edge-based We-Market is presented,where the prosumers,as edge nodes with independent control,balance the electricity cost and thermal comfort by formulating a dynamic household energy management system(HEMS).Meanwhile,the autonomous bidding is initiated by prosumers via the modified Stone-Geary utility *** the cloud center,a distributed convergence bidding(CB)algorithm based on consistency criterion is developed,which promotes faster and fairer bidding through the interactive iteration with the edge ***,the proposed scheme is built on top of the commercial cloud platform with sufficiently secure and scalable computing *** results show the effectiveness and practicability of the proposed We-Market,which achieves 15%cost reduction with shorter running *** analysis indicates better scalability,which is more suitable for largerscale We-Market implementation.
暂无评论