Graph neural networks (GNNs), as a cutting-edge technology in deep learning, perform particularly well in various tasks that process graph structure data. However, their foundation on pairwise graphs often limits thei...
详细信息
In this paper,we investigate the application of the Unmanned Aerial Vehicle(UAV)-enabled relaying system in emergency communications,where one UAV is applied as a relay to help transmit information from ground users t...
详细信息
In this paper,we investigate the application of the Unmanned Aerial Vehicle(UAV)-enabled relaying system in emergency communications,where one UAV is applied as a relay to help transmit information from ground users to a Base Station(BS).We maximize the total transmitted data from the users to the BS,by optimizing the user communication scheduling and association along with the power allocation and the trajectory of the *** solve this non-convex optimization problem,we propose the traditional Convex Optimization(CO)and the Reinforcement Learning(RL)-based ***,we apply the block coordinate descent and successive convex approximation techniques in the CO approach,while applying the soft actor-critic algorithm in the RL *** simulation results show that both approaches can solve the proposed optimization problem and obtain good ***,the RL approach establishes emergency communications more rapidly than the CO approach once the training process has been completed.
Phase noise is inevitably present in wireless communications, arising from both hardware impairments and imperfect channel estimation, and has substantial implications on the integrity and efficiency of communication ...
详细信息
The optimal control of nonlinear systems is crucial to improve system performance. However, the uncertainties of cost functions and systems dynamics make it difficult to solve the optimal control laws. To cope with th...
详细信息
Transformer-based approaches have significantly driven recent progress in three-dimensional human pose estimation. However, existing transformer-based approaches are still deficient in capturing localized features, an...
详细信息
In this paper, the containment control problem in nonlinear multi-agent systems(NMASs) under denial-of-service(DoS) attacks is addressed. Firstly, a prediction model is obtained using the broad learning technique to t...
详细信息
In this paper, the containment control problem in nonlinear multi-agent systems(NMASs) under denial-of-service(DoS) attacks is addressed. Firstly, a prediction model is obtained using the broad learning technique to train historical data generated by the system offline without DoS attacks. Secondly, the dynamic linearization method is used to obtain the equivalent linearization model of NMASs. Then, a novel model-free adaptive predictive control(MFAPC) framework based on historical and online data generated by the system is proposed, which combines the trained prediction model with the model-free adaptive control method. The development of the MFAPC method motivates a much simpler robust predictive control solution that is convenient to use in the case of DoS attacks. Meanwhile, the MFAPC algorithm provides a unified predictive framework for solving consensus tracking and containment control problems. The boundedness of the containment error can be proven by using the contraction mapping principle and the mathematical induction method. Finally, the proposed MFAPC is assessed through comparative experiments.
In this paper,we study a posteriori error estimates of the L1 scheme for time discretizations of time fractional parabolic differential equations,whose solutions have generally the initial *** derive optimal order a p...
详细信息
In this paper,we study a posteriori error estimates of the L1 scheme for time discretizations of time fractional parabolic differential equations,whose solutions have generally the initial *** derive optimal order a posteriori error estimates,the quadratic reconstruction for the L1 method and the necessary fractional integral reconstruction for the first-step integration are *** using these continuous,piecewise time reconstructions,the upper and lower error bounds depending only on the discretization parameters and the data of the problems are *** numerical experiments for the one-dimensional linear fractional parabolic equations with smooth or nonsmooth exact solution are used to verify and complement our theoretical results,with the convergence ofαorder for the nonsmooth case on a uniform *** recover the optimal convergence order 2-αon a nonuniform mesh,we further develop a time adaptive algorithm by means of barrier function recently *** numerical implementations are performed on nonsmooth case again and verify that the true error and a posteriori error can achieve the optimal convergence order in adaptive mesh.
The primary objective in aircraft transportation is to minimize turbulent drag, thereby conserving energy and reducing emissions. We propose a sector-shaped counter-flow dielectric barrier discharge plasma actuator, w...
详细信息
The primary objective in aircraft transportation is to minimize turbulent drag, thereby conserving energy and reducing emissions. We propose a sector-shaped counter-flow dielectric barrier discharge plasma actuator, which leverages jet synthesis for drag reduction. A drag control experiment was conducted in a low-speed wind tunnel with a controlled flow velocity of 9.6 m/s(Re = 1.445 × 10^(4)). This study investigated the effects of varying pulse frequencies and actuation voltages on the turbulent boundary layer. Using a hot-wire measurement system, we analyzed the pulsating and time-averaged velocity distributions within the boundary layer to evaluate the streamwise turbulent drag reduction. The results show that the local TDR decreases as the pulse frequency increases, reaching a maximum reduction of approximately 20.97% at a pulse frequency of 50 Hz. In addition, as the actuation voltage increases, the friction coefficient decreases, increasing the drag reduction rate. The maximum drag reduction of approximately 33.34% is achieved at an actuation voltage of 10 kV.
Authentication is a fundamental requirement and a crucial topic in wireless communications. This paper focuses on improving the security of the prior tag-based Physical-Layer Authentication (PLA) schemes. We propose t...
详细信息
Wireless power transmission has been widely used to replenish energy for wireless sensor networks, where the energy consumption rate of sensor nodes is usually time varying and indefinite. However, few works have inve...
详细信息
暂无评论