With the Internet of Things (IoT) playing an increasingly crucial role in connecting diverse devices, applications have different requirements for communication and various evaluation metrics have emerged, such as Age...
详细信息
ISBN:
(数字)9798350368369
ISBN:
(纸本)9798350368376
With the Internet of Things (IoT) playing an increasingly crucial role in connecting diverse devices, applications have different requirements for communication and various evaluation metrics have emerged, such as Age of Information (AoI) and estimation error. Considering the fundamental trade-off between reliability and latency of the communication system, the relationship among reliability, latency, AoI and estimation error is complex. This paper proposes a remote state observation system with application-layer rateless codes to explore above relationships, addressing how to design the system for optimal performance based on varying requirements by adjusting coding parameters. By emphasizing flexible and adaptable coding strategies, we aim to convey the idea that the error-correction codes can be designed to optimize the communication system for diverse practical metrics. It is different from the traditional designs that focus on approaching the Shannon limit.
Inspired by the fact that in most existing swarm models of multi-agent systems the velocity of an agent can be infinite, which is not in accordance with the real applications, we propose a novel swarm model of multi-a...
详细信息
Inspired by the fact that in most existing swarm models of multi-agent systems the velocity of an agent can be infinite, which is not in accordance with the real applications, we propose a novel swarm model of multi-agent systems where the velocity of an agent is finite. The Lyapunov function method and LaSalle's invariance principle are employed to show that by using the proposed model all of the agents eventually enter into a bounded region around the swarm center and finally tend to a stationary state. Numerical simulations are provided to demonstrate the effectiveness of the theoretical results.
Based on the concept and principles of quantum computing and the principle of the immune clonal selection, a new algorithm for multi-objective 0/1 knapsack problems is introduced. In the algorithm, for the novel repre...
详细信息
Based on the concept and principles of quantum computing and the principle of the immune clonal selection, a new algorithm for multi-objective 0/1 knapsack problems is introduced. In the algorithm, for the novel representation, qubit antibodies in the antibody population are updated by applying a new chaos update strategy. A quantitative metric is used for testing the convergence to the Pareto-optimal front. Simulation results on the 0/1 knapsack problems show that the new algorithm, in most cases, is more effective.
To execute a variety of collaborative tasks, the cooperation for unmanned aerial vehicles (UAVs) with complicated interactions under dynamic environments is a challenging and critical issue. This paper studies the coo...
详细信息
Inspired by the clonal selection theory together with the immune network model, we present a new artificial immune algorithm named the immune memory clonai algorithm (IMCA). The clonal operator,inspired by the immune ...
详细信息
Inspired by the clonal selection theory together with the immune network model, we present a new artificial immune algorithm named the immune memory clonai algorithm (IMCA). The clonal operator,inspired by the immune system, is discussed first. The IMCA includes two versions based on different immune memory mechanisms; they are the adaptive immune memory clonal algorithm (AIMCA) and the immune memory clonal strategy (IMCS). In the AIMCA, the mutation rate and memory unit size of each antibody is adjusted dynamically. The IMCS realizes the evolution of both the antibody population and the memory unit at the same time. By using the clonal selection operator, global searching is effectively combined with local *** to the antibody-antibody (Ab-Ab) affinity and the antibody-antigen (Ab-Ag) affinity, The IMCA can adaptively allocate the scale of the memory units and the antibody population. In the experiments, 18 multimodal functions ranging in dimensionality from two, to one thousand and combinatorial optimization problems such as the traveling salesman and knapsack problems (KPs)are used to validate the performance of the IMCA. The computational cost per iteration is presented. Experimental results show that the IMCA has a high convergence speed and a strong ability in enhancing the diversity of the population and avoiding premature convergence to some degree. Theoretical roof is provided that the IMCA is convergent with probability 1.
Wheat head detection can measure wheat traits such as head density and head *** wheat breeding largely relies on manual observation to detect wheat heads,yielding a tedious and inefficient *** emergence of affordable ...
详细信息
Wheat head detection can measure wheat traits such as head density and head *** wheat breeding largely relies on manual observation to detect wheat heads,yielding a tedious and inefficient *** emergence of affordable camera platforms provides opportunities for deploying computer vision(CV)algorithms in wheat head detection,enabling automated measurements of wheat *** wheat head detection,however,is challenging due to the variability of observation circumstances and the uncertainty of wheat head *** this work,we propose a simple but effective idea—dynamic color transform(DCT)—for accurate wheat head detection.
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke...
详细信息
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.
We describe NLSExplorer, an interpretable approach for nuclear localization signal (NLS) prediction. By utilizing the extracted information on nuclear-specific sites from the protein language model to assist in NLS de...
详细信息
We describe NLSExplorer, an interpretable approach for nuclear localization signal (NLS) prediction. By utilizing the extracted information on nuclear-specific sites from the protein language model to assist in NLS detection, NLSExplorer achieves superior performance with greater than 10% improvement in the F1 score compared with existing methods on benchmark datasets and highlights other nuclear transport segments. We applied NLSExplorer to the nucleus-localized proteins in the Swiss-Prot database to extract valuable segments. A comprehensive analysis of these segments revealed a potential NLS landscape and uncovered features of nuclear transport segments across 416 species. This study introduces a powerful tool for exploring the NLS universe and provides a versatile network that can efficiently detect characteristic domains and motifs.
Column Generation (CG) technique is popularly applied in solving the crew scheduling problem of large size, which is generally modeled as an Integer Linear Programming (ILP) problem. The traditional CG algorithms for ...
详细信息
In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol *** performance degradation introduced by the heterogeneous and dynamic commun...
详细信息
In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol *** performance degradation introduced by the heterogeneous and dynamic communication environment has intensified the need for the reconfigurable protocol *** this paper,a novel architecture for the reconfigurable protocol stack is proposed,which is a unified specification of the protocol components and service interfaces supporting both static and dynamic reconfiguration for existing industrial communication *** the architecture,a triple-level self-organization structure is designed to manage the dynamic reconfiguration procedure based on information exchanges inside and outside the protocol ***,the protocol stack can be self-adaptive to various environment and system requirements through the reconfiguration of working mode,routing and scheduling ***,the study on the protocol of dynamic address management is conducted for the system of controller area network (CAN).The results show the efficiency of our self-organizing architecture for the implementation of a reconfigurable protocol stack.
暂无评论