A critical function of wireless sensor networks (WSNs) is data gathering. While, one is often only interested in collecting a relevant function of the sensor measurements at a sink node, rather than downloading all th...
详细信息
ISBN:
(纸本)9781424499199
A critical function of wireless sensor networks (WSNs) is data gathering. While, one is often only interested in collecting a relevant function of the sensor measurements at a sink node, rather than downloading all the data from all the sensors. This paper studies the capacity of computing and transporting the specific functions of sensor measurements to the sink node, called aggregation capacity, for WSNs. It focuses on random WSNs that can be classified into two types: random extended WSN and random dense WSN. All existing results about aggregation capacity are studied for dense WSNs, including random cases and arbitrary cases, under the protocol model (ProM) or physical model (PhyM). In this paper, we propose the first aggregation capacity scaling laws for random extended WSNs. We point out that unlike random dense WSNs, for random extended WSNs, the assumption made in ProM and PhyM that each successful transmission can sustain a constant rate is over-optimistic and unpractical due to transmit power *** derive the first result on aggregation capacity for random extended WSNs under the generalized physical model. Particularly, we prove that, for the type-sensitive perfectly compressible functions and type-threshold perfectly compressible functions, the aggregation capacities for random extended WSNs with n nodes are of order Θ ((log n) -β/2-1 ) and Θ (((log n) -β/2 )/(log log n)), respectively, where β >; 2 denotes the power attenuation exponent in the generalized physical model.
There are wafer fabrication processes in cluster tools that require revisiting. It is shown that swapping is efficient in operating a dual-arm cluster tool. For dual-arm cluster tools with wafer revisiting, if a swap ...
详细信息
There are wafer fabrication processes in cluster tools that require revisiting. It is shown that swapping is efficient in operating a dual-arm cluster tool. For dual-arm cluster tools with wafer revisiting, if a swap strategy is applied, it forms a three wafer periodical process with three wafers completed in each period. Such a period contains three cycles in a revisiting process and another three cycles in non-revisiting process. Hence, analysis and scheduling of dual-arm cluster tools with wafer revisiting become very complicated. In this work, a Petri net model is developed to describe the operations of such tools. Based on it, it is found that if a swap strategy is applied to a dual-arm cluster tool with wafer revisiting, it is always in a transient state. A systematic method is presented to analyze its performance.
Convolution neural networks (CNNs) have succeeded in compressive image sensing. However, due to the inductive bias of locality and weight sharing, the convolution operations demonstrate the intrinsic limitations in mo...
详细信息
The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system that is secure or safe can be judged by whether the behavior of certain a...
详细信息
The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system that is secure or safe can be judged by whether the behavior of certain agent(s) is appropriate or not. Specifically, a so-called appropriate behavior involves the right agent performing the right actions at the right time under certain conditions. Then, according to different levels of appropriateness and degrees of custodies, behavioral authentication can be graded into three levels, i.e., the authentication of behavioral Identity, Conformity, and Benignity. In a broad sense, for the security and safety issue, behavioral authentication is not only an innovative and promising method due to its inherent advantages but also a critical and fundamental problem due to the ubiquity of behavior generation and the necessity of behavior regulation in any system. By this classification, this review provides a comprehensive examination of the background and preliminaries of behavioral authentication. It further summarizes existing research based on their respective focus areas and characteristics. The challenges confronted by current behavioral authentication methods are analyzed, and potential research directions are discussed to promote the diversified and integrated development of behavioral authentication.
This paper presents a novel and effective deep reinforcement learning (DRL)-based approach to addressing joint resource management (JRM) in a practical multi-carrier non-orthogonal multiple access (MC-NOMA) system, wh...
详细信息
For Dubois rough fuzzy sets, the membership of the lower or upper approximations is defined as the elements memberships' infimum or supsmum in equivalent class. As a result of not considering the elements whose me...
详细信息
For Dubois rough fuzzy sets, the membership of the lower or upper approximations is defined as the elements memberships' infimum or supsmum in equivalent class. As a result of not considering the elements whose memberships are between the minimum and maximum, some useful information of these elements may be lost in the information processing. The paper presents a new operator of rough fuzzy sets that every element's membership in equivalent class is taken into account. Based on the new operator, algebra properties are put forward and rough fuzzy membership is defined. Moreover, the paper presents accurate degree, classified quality, dependence degree and attribute reduction algorithm. At last, an example proves that the algorithm is efficient.
Based on the fundamental evaluation index system of intelligent optimization, a type of optimization dynamics evaluation mode for particle swarm algorithm is presented here. The mode is used for general optimization p...
详细信息
Based on the fundamental evaluation index system of intelligent optimization, a type of optimization dynamics evaluation mode for particle swarm algorithm is presented here. The mode is used for general optimization performance and particles'population dynamics. In the evaluation mode, primary indexes include optimum value, population dynamic aggregation, population center convergence and population diversity. Numerical optimization simulation based on several benchmarks is studied, and the typical population dynamic results of primary indexes show that the proposed optimization dynamics evaluation mode is effective.
Mobile Edge computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network’s edge. By shifting the load of cloud computing to individu...
详细信息
Integrated circuits(ICs) and optoelectronic chips are the foundation stones of the modern information society. The IC industry has been driven by the so-called "Moore's law" in the past 60 years, and now...
详细信息
Integrated circuits(ICs) and optoelectronic chips are the foundation stones of the modern information society. The IC industry has been driven by the so-called "Moore's law" in the past 60 years, and now has entered the post Moore's law era. In this paper, we review the recent progress of ICs and optoelectronic chips. The research status, technical challenges and development trend of devices, chips and integrated technologies of typical IC and optoelectronic chips are focused on. The main contents include the development law of IC and optoelectronic chip technology, the IC design and processing technology, emerging memory and chip architecture, brain-like chip structure and its mechanism, heterogeneous integration, quantum chip technology, silicon photonics chip technology, integrated microwave photonic chip, and optoelectronic hybrid integrated chip.
Multi-task learning (MTL) is an important subject in machine learning and artificial intelligence. Its applications to computer vision, signal processing, and speech recognition are ubiquitous. Although this subject h...
详细信息
暂无评论