Differential privacy is a widely used framework for evaluating privacy loss in data anonymization. While the continuous noise-adding mechanism has been extensively studied, there is a dearth of research on discrete ra...
详细信息
This paper outlines the initial steps and basic framework for developing foundation/infrastructure robots/robotics based on foundation models and parallel intelligence,as well as the potential applications of new art...
详细信息
This paper outlines the initial steps and basic framework for developing foundation/infrastructure robots/robotics based on foundation models and parallel intelligence,as well as the potential applications of new artificial intelligence(AI)techniques such as AlphaGO,ChatGPT,and Sora.
In recent years,green concepts have been integrated into the product iterative design in the manufacturing field to address global competition and sustainability ***,previous efforts for green material optimal selecti...
详细信息
In recent years,green concepts have been integrated into the product iterative design in the manufacturing field to address global competition and sustainability ***,previous efforts for green material optimal selection disregarded the interaction and fusion among physical entities,virtual models,and users,resulting in distortions and inaccuracies among user,physical entity,and virtual model such as inconsistency among the expected value,predicted simulation value,and actual performance value of evaluation ***,this study proposes a digital twin-driven green material optimal selection and evolution method for product iterative ***,a novel framework is ***,an analysis is carried out from six perspectives:the digital twin model construction for green material optimal selection,evolution mechanism of the digital twin model,multi-objective prediction and optimization,algorithm design,decision-making,and product function ***,taking the material selection of a shared bicycle frame as an example,the proposed method was verified by the prediction and iterative optimization of the carbon emission index.
Recently,computation offloading has become an effective method for overcoming the constraint of a mobile device(MD)using computationintensivemobile and offloading delay-sensitive application tasks to the remote cloud-...
详细信息
Recently,computation offloading has become an effective method for overcoming the constraint of a mobile device(MD)using computationintensivemobile and offloading delay-sensitive application tasks to the remote cloud-based data *** city benefitted from offloading to edge *** a mobile edge computing(MEC)network in multiple *** comprise N MDs and many access points,in which everyMDhasM independent real-time *** study designs a new Task Offloading and Resource Allocation in IoT-based MEC using Deep Learning with Seagull Optimization(TORA-DLSGO)*** proposed TORA-DLSGO technique addresses the resource management issue in the MEC server,which enables an optimum offloading decision to minimize the system *** addition,an objective function is derived based on minimizing energy consumption subject to the latency requirements and restricted *** TORA-DLSGO technique uses the deep belief network(DBN)model for optimum offloading ***,the SGO algorithm is used for the parameter tuning of the DBN *** simulation results exemplify that the TORA-DLSGO technique outperformed the existing model in reducing client overhead in the MEC systems with a maximum reward of 0.8967.
Non-rigid point set registration is an essential technique in fields such as robotics, computer vision, image-guided surgery, and augmented reality. However, effectively addressing non-rigid deformations and handling ...
详细信息
This paper derives an efficient control algorithm to deal with the output voltage tracking control problem of threephase inverters with multiple disturbances (including parametric perturbations of filter, abrupt distu...
详细信息
This paper studies the secure and accurate clock synchronization problem for sensor networks with time-varying delays and malicious attacks.A novel clock synchronization scheme based on the attack detection mechanism,...
详细信息
This paper studies the secure and accurate clock synchronization problem for sensor networks with time-varying delays and malicious attacks.A novel clock synchronization scheme based on the attack detection mechanism,attack compensation,and maximum consensus protocol is *** proposed scheme starts with the detection of the malicious attacks and the clock data under attacks is *** the basis,software clock parameters are updated so that all the nodes in the network can have the same software skew and offset,so the clock synchronization can be ***,it is theoretically proved that the proposed scheme can achieve the attack detection correctly,and further can guarantee a secure and accurate clock *** addition,extensive simulations are also conducted to validate the effectiveness of the proposed scheme.
Dear editor, Vehicle control is one of the key steps of intelligent driving [1]. Algorithms based on receding horizon optimization(RHO) can predict future trajectories and handle multiobjective constraint conditions; ...
Dear editor, Vehicle control is one of the key steps of intelligent driving [1]. Algorithms based on receding horizon optimization(RHO) can predict future trajectories and handle multiobjective constraint conditions; therefore, RHO-based methods have attracted considerable attention in the field of vehicle control. Although existing methods use RHO to design controllers, they do not simultaneously meet the multiobjective optimal control performance requirements on tracking, fuel economy, and ride comfort.
Orbital angular momentum (OAM) and rate splitting (RS) are the potential key techniques for the future wireless communications. As a new orthogonal resource, OAM can achieve the multifold increase of spectrum efficien...
详细信息
As China's steel production accounts for an increasing share of the world's output, the intelligent transformation of the steel industry is becoming increasingly urgent. To address issues such as low levels of...
详细信息
暂无评论