Inspired by the clonal selection theory together with the immune network model, we present a new artificial immune algorithm named the immune memory clonai algorithm (IMCA). The clonal operator,inspired by the immune ...
详细信息
Inspired by the clonal selection theory together with the immune network model, we present a new artificial immune algorithm named the immune memory clonai algorithm (IMCA). The clonal operator,inspired by the immune system, is discussed first. The IMCA includes two versions based on different immune memory mechanisms; they are the adaptive immune memory clonal algorithm (AIMCA) and the immune memory clonal strategy (IMCS). In the AIMCA, the mutation rate and memory unit size of each antibody is adjusted dynamically. The IMCS realizes the evolution of both the antibody population and the memory unit at the same time. By using the clonal selection operator, global searching is effectively combined with local *** to the antibody-antibody (Ab-Ab) affinity and the antibody-antigen (Ab-Ag) affinity, The IMCA can adaptively allocate the scale of the memory units and the antibody population. In the experiments, 18 multimodal functions ranging in dimensionality from two, to one thousand and combinatorial optimization problems such as the traveling salesman and knapsack problems (KPs)are used to validate the performance of the IMCA. The computational cost per iteration is presented. Experimental results show that the IMCA has a high convergence speed and a strong ability in enhancing the diversity of the population and avoiding premature convergence to some degree. Theoretical roof is provided that the IMCA is convergent with probability 1.
We present the first framework capable of synthesizing the all-in-focus neural radiance field (NeRF) from inputs without manual refocusing. Without refocusing, the camera will automatically focus on the fixed object f...
Wheat head detection can measure wheat traits such as head density and head *** wheat breeding largely relies on manual observation to detect wheat heads,yielding a tedious and inefficient *** emergence of affordable ...
详细信息
Wheat head detection can measure wheat traits such as head density and head *** wheat breeding largely relies on manual observation to detect wheat heads,yielding a tedious and inefficient *** emergence of affordable camera platforms provides opportunities for deploying computer vision(CV)algorithms in wheat head detection,enabling automated measurements of wheat *** wheat head detection,however,is challenging due to the variability of observation circumstances and the uncertainty of wheat head *** this work,we propose a simple but effective idea—dynamic color transform(DCT)—for accurate wheat head detection.
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke...
详细信息
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.
In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol *** performance degradation introduced by the heterogeneous and dynamic commun...
详细信息
In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol *** performance degradation introduced by the heterogeneous and dynamic communication environment has intensified the need for the reconfigurable protocol *** this paper,a novel architecture for the reconfigurable protocol stack is proposed,which is a unified specification of the protocol components and service interfaces supporting both static and dynamic reconfiguration for existing industrial communication *** the architecture,a triple-level self-organization structure is designed to manage the dynamic reconfiguration procedure based on information exchanges inside and outside the protocol ***,the protocol stack can be self-adaptive to various environment and system requirements through the reconfiguration of working mode,routing and scheduling ***,the study on the protocol of dynamic address management is conducted for the system of controller area network (CAN).The results show the efficiency of our self-organizing architecture for the implementation of a reconfigurable protocol stack.
When chaotic systems are implemented on finite precision machines, it will lead to the problem of dynamical degradation. Aiming at this problem, most previous related works have been proposed to improve the dynamical ...
详细信息
When chaotic systems are implemented on finite precision machines, it will lead to the problem of dynamical degradation. Aiming at this problem, most previous related works have been proposed to improve the dynamical degradation of low-dimensional chaotic maps. This paper presents a novel method to construct high-dimensional digital chaotic systems in the domain of finite computing precision. The model is proposed by coupling a high-dimensional digital system with a continuous chaotic system. A rigorous proof is given that the controlled digital system is chaotic in the sense of Devaney's definition of chaos. Numerical experimental results for different high-dimensional digital systems indicate that the proposed method can overcome the degradation problem and construct high-dimensional digital chaos with complicated dynamical properties. Based on the construction method, a kind of pseudorandom number generator (PRNG) is also proposed as an application.
This paper investigates controllability of discrete-time multi-agent systems with multiple leaders on fixed networks. The leaders are particular agents playing a part in external inputs to steer other member agents. T...
详细信息
This paper investigates controllability of discrete-time multi-agent systems with multiple leaders on fixed networks. The leaders are particular agents playing a part in external inputs to steer other member agents. The followers can arrive at any predetermined configuration by regulating the behaviors of the leaders. Some sufficient and necessary conditions are proposed for the controllability of discrete-time multi-agent systems with multiple leaders. Moreover, the case with isolated agents is discussed. Numerical examples and simulations are proposed to illustrate the theoretical results we established.
In this paper, within the prescribed performance control framework, we revisit the output tracking problem of a nonlinear system with input saturation, user-specified performance and external disturbances. To handle t...
详细信息
A novel image retrieval approach based on color features and anisotropic directional information is proposed for content based image retrieval systems (CBIR). The color feature is described by the color histogram ...
详细信息
A novel image retrieval approach based on color features and anisotropic directional information is proposed for content based image retrieval systems (CBIR). The color feature is described by the color histogram (CH), which is translation and rotation invariant. However, the CH does not contain spatial information which is very important for the image retrieval. To overcome this shortcoming, the subband energy of the lifting directionlet transform (L-DT) is proposed to describe the directional information, in which L-DT is characterized by multi-direction and anisotropic basis functions compared with the wavelet transform. A global similarity measure is designed to implement the fusion of both color feature and anisotropic directionality for the retrieval process. The retrieval experiments using a set of COREL images demonstrate that the higher query precision and better visual effect can be achieved.
It is a positive trend for hemiplegia with wearable robots in rehabilitation training. Recently, wearable Supernumerary Robotic Limb (SRL) is rising to a hot spot. The difficulty in modeling SRL for hemiplegia is how ...
详细信息
暂无评论