In this paper, we study the statistical difficulty of learning to control linear systems. We focus on two standard benchmarks, the sample complexity of stabilization, and the regret of the online learning of the Linea...
详细信息
Inverse lithography technology (ILT) is a pivotal approach to correct the optical proximity effect in a lithography process by optimizing the mask pattern at the pixel level. However, traditional ILT algorithms are co...
详细信息
It was recently claimed1 that reported focusing efficiency values of high numerical aperture metalenses are inconsistent with a theoretical bound, and their measurement results are incorrectly interpreted. We review t...
详细信息
This work investigates the potential for cooling a radial permanent magnet motor by means of stator lamination fins. To form the fins, certain stator laminations have a larger external diameter. The optimal number of ...
This work investigates the potential for cooling a radial permanent magnet motor by means of stator lamination fins. To form the fins, certain stator laminations have a larger external diameter. The optimal number of fins, as well as fm thickness, was determined to reach the maximal heat transfer between the motor stator and the coolant. Finite element and computational fluid dynamics modelling were used to calculate the thermal performance of the motor.
The smart environment is a crucial application of the Internet of Things(IoT). Due to its growing security and efficiency needs, recent years have seen the proposal of numerous authentication and key agreement (AKA) p...
详细信息
The smart environment is a crucial application of the Internet of Things(IoT). Due to its growing security and efficiency needs, recent years have seen the proposal of numerous authentication and key agreement (AKA) protocols. Unfortunately, most of existing AKA protocols only support one-to-one AKA and rely on the elliptic curve cryptosystem, resulting in huge overhead. In addition, these protocols fail to consider the resource-asymmetric characteristics of this scenario. That is, the resources on the gateway side are abundant, while the resources on user sides and device sides are limited. In order to achieve efficient and secure one-to-many AKA establishment in this scenario, where one-to-many means that users can realize key agreements with multiple smart devices at the same time. For the first time, this paper uses the one-to-many computing structure of the Chinese Remainder Theorem (CRT) to design an efficient one-to-many AKA establishment, which is perfectly adapted to resource-asymmetric allocation in smart environments. Compared with existing solutions, this solution has the following advantages. Firstly, our protocol is suitable for resource-asymmetric environments, where the gateway acts as an intermediate node and uses rich resources to integrate multiple AKA requests. Secondly, the solution supports users to negotiate session keys with multiple smart devices at the same time. Thirdly, we prove the protocol’s security under the Real-or-Random (ROR) model. In addition, we perform formal security verification of the protocol using the Automated Validation of Internet Security Protocols and Applications(AVISPA) tool. Finally, the security and efficiency of this solution are superior to similar solutions. Specifically, our solution can meet 18 security and functionality requirements. Compared with the latest similar scheme, assuming that the number of smart devices is 10, our scheme reduces the computational cost by 75.75%. At the same time, in terms of comm
A latent denoising semantic communication (SemCom) framework is proposed for robust image transmission over noisy channels. By incorporating a learnable latent denoiser into the receiver, the received signals are prep...
We reveal the unique and fundamental advantage of inerter-based elastic metamaterials by a comparative study among different configurations. When the embedded inerter is connected to the matrix material on both ends, ...
详细信息
In this paper, we carry out finite-sample analysis of decentralized Q-learning algorithms in the tabular setting for a significant subclass of general-sum stochastic games (SGs) – weakly acyclic SGs, which includes p...
In this paper, we carry out finite-sample analysis of decentralized Q-learning algorithms in the tabular setting for a significant subclass of general-sum stochastic games (SGs) – weakly acyclic SGs, which includes potential games and Markov team problems as special cases. In the practical while challenging decentralized setting, neither the rewards nor the actions of other agents can be observed by each agent. In fact, each agent can be completely oblivious to the presence of other decision makers. In this work, the sample complexity of the decentralized tabular Q-learning algorithm in [1] to converge to a Markov perfect equilibrium is developed.
Mapless navigation has emerged as a promising approach for enablingautonomous robots to navigate in environments where pre-existing maps may beinaccurate, outdated, or unavailable. In this work, we propose an image-ba...
详细信息
Wireless Charger Network (WCN) emerges as a promising networking paradigm, employing wireless chargers with Wireless Power Transfer (WPT) technology to provide long-term and sustainable energy supply for future networ...
详细信息
暂无评论