The remaining useful life (RUL) of bearings is critical to the proper operation of mechanical equipment, maintenance of equipment costs and availability. The existing domain adaptation methods have had great success i...
详细信息
Pushing artificial intelligence(AI) from central cloud to network edge has reached board consensus in both industry and academia for materializing the vision of artificial intelligence of things(AIoT) in the sixth-gen...
详细信息
Pushing artificial intelligence(AI) from central cloud to network edge has reached board consensus in both industry and academia for materializing the vision of artificial intelligence of things(AIoT) in the sixth-generation(6G) era. This gives rise to an emerging research area known as edge intelligence, which concerns the distillation of human-like intelligence from the vast amount of data scattered at the wireless network edge. Typically, realizing edge intelligence corresponds to the processes of sensing, communication,and computation, which are coupled ingredients for data generation, exchanging, and processing, ***, conventional wireless networks design the three mentioned ingredients separately in a task-agnostic manner, which leads to difficulties in accommodating the stringent demands of ultra-low latency, ultra-high reliability, and high capacity in emerging AI applications like auto-driving and metaverse. This thus prompts a new design paradigm of seamlessly integrated sensing, communication, and computation(ISCC) in a taskoriented manner, which comprehensively accounts for the use of the data in downstream AI tasks. In view of its growing interest, this study provides a timely overview of ISCC for edge intelligence by introducing its basic concept, design challenges, and enabling techniques, surveying the state-of-the-art advancements, and shedding light on the road ahead.
Extreme learning machine (ELM) is a competitive machine learning approach for training single hidden layer feedforward neural networks with fast learning speed and good generalization performance. However, ELM also su...
详细信息
Comparative metabolomics plays a crucial role in investigating gene function,exploring metabolite evolution,and accelerating crop genetic ***,a systematic platform for intra-and crossspecies comparison of metabolites ...
详细信息
Comparative metabolomics plays a crucial role in investigating gene function,exploring metabolite evolution,and accelerating crop genetic ***,a systematic platform for intra-and crossspecies comparison of metabolites is currently ***,we report the Plant Comparative Metabolome database(PCMD;http://***/PCMD),a multilevel comparison database based on predicted metabolic profiles of 530 plant *** PCMD serves as a platform for comparing metabolite characteristics at various levels,including species,metabolites,pathways,and biological *** database also provides a number of user-friendly online tools,such as species comparison,metabolite enrichment,and ID conversion,enabling users to perform comparisons and enrichment analyses of metabolites across different *** addition,the PCMD establishes a unified system based on existing metabolite-related databases by standardizing metabolite *** PCMD is the most speciesrich comparative plant metabolomics database currently available,and a case study demonstrates its ability to provide new insights into plant metabolic diversity.
In networked system identification,how to effectively use communication resources and improve convergence speed is the focus of ***,there is an inherent contradiction between the two *** this paper,the event-driven co...
详细信息
In networked system identification,how to effectively use communication resources and improve convergence speed is the focus of ***,there is an inherent contradiction between the two *** this paper,the event-driven communication is used to save communication resources for the identification of finite impulse response systems,and the input design is carried out to meet the requirements of convergence ***,a difference-driven communication is ***,the performance of the communication mechanism is analyzed,and the calculation method of its communication rate is *** that,according to the communication rate and the convergence rate of the identification algorithm,the input design problem is transformed into a constrained optimization problem,and the algorithm for finding the optimal solution is *** addition,considering the case that the output is quantized by multiple thresholds,the way to calculate its communication rate is given and the influence of threshold number on communication rate is ***,the effectiveness of the algorithm is verified by simulation.
Recently, Transformer-based methods for single image super-resolution (SISR) have achieved better performance advantages than the methods based on convolutional neural network (CNN). Exploiting self-attention mechanis...
详细信息
Domain adaptation (DA) -based RUL prediction methods have achieved great success for the adaptation ability of the distribution discrepancy between the source and target domains. However, DA methods are powerless when...
详细信息
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this lett...
详细信息
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this letter, targeting a more practical case, we aim to detect the oneshot DA, with the purpose of revealing the DA once it is ***, we first formulate an optimization problem to generate one-shot DAs. Then, an unsupervised data-driven approach based on a modified local outlier factor(MLOF) is proposed to detect them.
Node classification is an essential problem in graph learning. However, many models typically obtain unsatisfactory performance when applied to few-shot scenarios. Some studies have attempted to combine meta-learning ...
详细信息
For the high-performance computing in a WAN environment,the geographical locations of national supercomputing centers are scattered and the network topology is complex,so it is difficult to form a unified view of *** ...
详细信息
For the high-performance computing in a WAN environment,the geographical locations of national supercomputing centers are scattered and the network topology is complex,so it is difficult to form a unified view of *** aggregate the widely dispersed storage resources of national supercomputing centers in China,we have previously proposed a global virtual data space named GVDS in the project of“High Performance Computing Virtual data Space”,a part of the National key Research and Development Program of *** GVDS enables large-scale applications of the high-performance computing to run efficiently across ***,the applications running on the GVDS are often data-intensive,requiring large amounts of data from multiple supercomputing centers across *** this regard,the GVDS suffers from performance bottlenecks in data migration and access across *** solve the above-mentioned problem,this paper proposes a performance optimization framework of GVDS including the multitask-oriented data migration method and the request access-aware IO proxy resource allocation *** a WAN environment,the framework proposed in this paper can make an efficient migration decision based on the amount of migrated data and the number of multiple data sources,guaranteeing lower average migration latency when multiple data migration tasks are running in *** addition,it can ensure that the thread resource of the IO proxy node is fairly allocated among different types of requests(the IO proxy is a module of GVDS),so as to improve the application’s performance across *** experimental results show that the framework can effectively reduce the average data access delay of GVDS while improving the performance of the application greatly.
暂无评论