The importance of Model Predictive Control(MPC)has significant applications in the agricultural industry,more specifically for greenhouse’s control ***,the complexity of the greenhouse and its limited prior knowledge...
详细信息
The importance of Model Predictive Control(MPC)has significant applications in the agricultural industry,more specifically for greenhouse’s control ***,the complexity of the greenhouse and its limited prior knowledge prevent an exact mathematical description of the *** methods provide a promising solution to this issue through their capacity to identify the system’s comportment using the fit between model output and observed *** this paper,we introduce an application of Constrained Model Predictive Control(CMPC)for a greenhouse temperature and relative *** this purpose,two Multi Input Single Output(MISO)systems,using Numerical Subspace State Space System Identification(N4SID)algorithm,are firstly suggested to identify the temperature and the relative humidity comportment to heating and ventilation *** this sense,linear state space models were adopted in order to evaluate the robustness of the control *** the system is identified,the MPC technique is applied for the temperature and the humidity *** results show that the regulation of the temperature and the relative humidity under constraints was guaranteed,both parameters respect the ranges 15℃≤T_(int)≤30℃and 50%≤H_(int)≤70%*** the other hand,the control signals uf and uh applied to the fan and the heater,respect the hard constraints notion,the control signals for the fan and the heater did not exceed 0≤uf≤4.3 Volts and 0≤uh≤5 Volts,respectively,which proves the effectiveness of the MPC and the tracking ***,we show that with the proposed technique,using a new optimization toolbox,the computational complexity has been significantly *** greenhouse in question is devoted to Schefflera Arboricola cultivation.
With the development of deep learning in recent years, code representation learning techniques have become the foundation of many software engineering tasks such as program classification [1] and defect detection. Ear...
With the development of deep learning in recent years, code representation learning techniques have become the foundation of many software engineering tasks such as program classification [1] and defect detection. Earlier approaches treat the code as token sequences and use CNN, RNN, and the Transformer models to learn code representations.
Graph neural networks(GNNs) have emerged as powerful approaches to learn knowledge about graphs and *** rapid employment of GNNs poses requirements for processing *** to incompatibility of general platforms,dedicated ...
详细信息
Graph neural networks(GNNs) have emerged as powerful approaches to learn knowledge about graphs and *** rapid employment of GNNs poses requirements for processing *** to incompatibility of general platforms,dedicated hardware devices and platforms are developed to efficiently accelerate training and inference of *** conduct a survey on hardware acceleration for *** first include and introduce recent advances of the domain,and then provide a methodology of categorization to classify existing works into three ***,we discuss optimization techniques adopted at different *** finally we propose suggestions on future directions to facilitate further works.
Deep learning has gained superior accuracy on Euclidean structure data in neural *** a result,nonEuclidean structure data,such as graph data,has more sophisticated structural information,which can be applied in neural...
详细信息
Deep learning has gained superior accuracy on Euclidean structure data in neural *** a result,nonEuclidean structure data,such as graph data,has more sophisticated structural information,which can be applied in neural networks as well to address more complex and practical ***,actual graph data obeys a power-law distribution,so the adjacent matrix of a graph is random and *** processing accelerator(GPA)is designed to handle the problems ***,graph computing only processes 1-dimensional *** graph neural networks(GNNs),graph data is ***,GNNs include the execution processes of both traditional graph processing and neural network,which have irregular memory access and regular computation,*** obtain more information in graph data and require better model generalization ability,the layers of GNN are deeper,so the overhead of memory access and computation is *** present,GNN accelerators are designed to deal with this *** this paper,we conduct a systematic survey regarding the design and implementation of GNN ***,we review the challenges faced by GNN accelerators,and existing related works in detail to process ***,we evaluate previous works and propose future directions in this booming field.
When searching for a dynamic target in an unknown real world scene,search efficiency is greatly reduced if users lack information about the spatial structure of the *** target search studies,especially in robotics,foc...
详细信息
When searching for a dynamic target in an unknown real world scene,search efficiency is greatly reduced if users lack information about the spatial structure of the *** target search studies,especially in robotics,focus on determining either the shortest path when the target’s position is known,or a strategy to find the target as quickly as possible when the target’s position is ***,the target’s position is often known intermittently in the real world,e.g.,in the case of using surveillance *** goal is to help user find a dynamic target efficiently in the real world when the target’s position is intermittently *** order to achieve this purpose,we have designed an AR guidance assistance system to provide optimal current directional guidance to users,based on searching a prediction *** assume that a certain number of depth cameras are fixed in a real scene to obtain dynamic target’s *** system automatically analyzes all possible meetings between the user and the target,and generates optimal directional guidance to help the user catch up with the target.A user study was used to evaluate our method,and its results showed that compared to free search and a top-view method,our method significantly improves target search efficiency.
As wafer circuit width shrinks down to less than ten nanometers in recent years,stringent quality control in the wafer manufacturing process is increasingly *** to the coupling of neighboring cluster tools and coordin...
详细信息
As wafer circuit width shrinks down to less than ten nanometers in recent years,stringent quality control in the wafer manufacturing process is increasingly *** to the coupling of neighboring cluster tools and coordination of multiple robots in a multi-cluster tool,wafer production scheduling becomes rather *** a wafer is processed,due to high-temperature chemical reactions in a chamber,the robot should be controlled to take it out of the processing chamber at the right *** order to ensure the uniformity of integrated circuits on wafers,it is highly desirable to make the differences in wafer post-processing time among the individual tools in a multicluster tool as small as *** achieve this goal,for the first time,this work aims to find an optimal schedule for a dual-arm multi-cluster tool to regulate the wafer post-processing *** do so,we propose polynomial-time algorithms to find an optimal schedule,which can achieve the highest throughput,and minimize the total post-processing time of the processing *** propose a linear program model and another algorithm to balance the differences in the post-processing time between any pair of adjacent cluster *** industrial examples are given to illustrate the application and effectiveness of the proposed method.
Background Three-dimensional(3D)shape representation using mesh data is essential in various applications,such as virtual reality and simulation *** methods for extracting features from mesh edges or faces struggle wi...
详细信息
Background Three-dimensional(3D)shape representation using mesh data is essential in various applications,such as virtual reality and simulation *** methods for extracting features from mesh edges or faces struggle with complex 3D models because edge-based approaches miss global contexts and face-based methods overlook variations in adjacent areas,which affects the overall *** address these issues,we propose the Feature Discrimination and Context Propagation Network(FDCPNet),which is a novel approach that synergistically integrates local and global features in mesh *** FDCPNet is composed of two modules:(1)the Feature Discrimination Module,which employs an attention mechanism to enhance the identification of key local features,and(2)the Context Propagation Module,which enriches key local features by integrating global contextual information,thereby facilitating a more detailed and comprehensive representation of crucial areas within the mesh *** Experiments on popular datasets validated the effectiveness of FDCPNet,showing an improvement in the classification accuracy over the baseline ***,even with reduced mesh face numbers and limited training data,FDCPNet achieved promising results,demonstrating its robustness in scenarios of variable complexity.
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal...
详细信息
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system.
In mega-constellation Communication systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of sate...
详细信息
In mega-constellation Communication systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure *** edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed.
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive,and privacy-aware vehicular applications in Io V result in the transformation from cloud computing to edge computing,which enables tasks to be offloaded to edge nodes(ENs) closer to vehicles for efficient execution. In ITS environment,however, due to dynamic and stochastic computation offloading requests, it is challenging to efficiently orchestrate offloading decisions for application requirements. How to accomplish complex computation offloading of vehicles while ensuring data privacy remains challenging. In this paper, we propose an intelligent computation offloading with privacy protection scheme, named COPP. In particular, an Advanced Encryption Standard-based encryption method is utilized to implement privacy protection. Furthermore, an online offloading scheme is proposed to find optimal offloading policies. Finally, experimental results demonstrate that COPP significantly outperforms benchmark schemes in the performance of both delay and energy consumption.
暂无评论