Sequences with low/zero ambiguity zone (LAZ/ZAZ) properties are useful in modern communication and radar systems operating over mobile environments. This paper first presents a new family of ZAZ sequence sets motivate...
详细信息
The memristor, as the fourth basic circuit element, has drawn worldwide attention since its physical implementation was released by HP Labs in 2008. However, at the nano-scale, there are many difficulties for memristo...
详细信息
The memristor, as the fourth basic circuit element, has drawn worldwide attention since its physical implementation was released by HP Labs in 2008. However, at the nano-scale, there are many difficulties for memristor physical realization. So a better understanding and analysis of a good model will help us to study the characteristics of a memristor. In this paper, we analyze a possible mechanism for the switching behavior of a memristor with a Pt/TiO2/Pt structure, and explain the changes of electronic barrier at the interface of Pt/TiO2. Then, a quantitative analysis about each parameter in the exponential model of memristor is conducted based on the calculation results. The analysis results are validated by simulation results. The efforts made in this paper will provide researchers with theoretical guidance on choosing appropriate values for(α, β, χ, γ) in this exponential model.
With the Internet of Things (IoT) playing an increasingly crucial role in connecting diverse devices, applications have different requirements for communication and various evaluation metrics have emerged, such as Age...
详细信息
ISBN:
(数字)9798350368369
ISBN:
(纸本)9798350368376
With the Internet of Things (IoT) playing an increasingly crucial role in connecting diverse devices, applications have different requirements for communication and various evaluation metrics have emerged, such as Age of Information (AoI) and estimation error. Considering the fundamental trade-off between reliability and latency of the communication system, the relationship among reliability, latency, AoI and estimation error is complex. This paper proposes a remote state observation system with application-layer rateless codes to explore above relationships, addressing how to design the system for optimal performance based on varying requirements by adjusting coding parameters. By emphasizing flexible and adaptable coding strategies, we aim to convey the idea that the error-correction codes can be designed to optimize the communication system for diverse practical metrics. It is different from the traditional designs that focus on approaching the Shannon limit.
Inspired by the fact that in most existing swarm models of multi-agent systems the velocity of an agent can be infinite, which is not in accordance with the real applications, we propose a novel swarm model of multi-a...
详细信息
Inspired by the fact that in most existing swarm models of multi-agent systems the velocity of an agent can be infinite, which is not in accordance with the real applications, we propose a novel swarm model of multi-agent systems where the velocity of an agent is finite. The Lyapunov function method and LaSalle's invariance principle are employed to show that by using the proposed model all of the agents eventually enter into a bounded region around the swarm center and finally tend to a stationary state. Numerical simulations are provided to demonstrate the effectiveness of the theoretical results.
Based on the concept and principles of quantum computing and the principle of the immune clonal selection, a new algorithm for multi-objective 0/1 knapsack problems is introduced. In the algorithm, for the novel repre...
详细信息
Based on the concept and principles of quantum computing and the principle of the immune clonal selection, a new algorithm for multi-objective 0/1 knapsack problems is introduced. In the algorithm, for the novel representation, qubit antibodies in the antibody population are updated by applying a new chaos update strategy. A quantitative metric is used for testing the convergence to the Pareto-optimal front. Simulation results on the 0/1 knapsack problems show that the new algorithm, in most cases, is more effective.
To execute a variety of collaborative tasks, the cooperation for unmanned aerial vehicles (UAVs) with complicated interactions under dynamic environments is a challenging and critical issue. This paper studies the coo...
详细信息
Reversible solid oxide cell (RSOC) demonstrates considerable promise in multimodal energy conversion architectures, particularly as a technology for hydrogen-based energy storage systems. Nevertheless, under dynamic o...
详细信息
Inspired by the clonal selection theory together with the immune network model, we present a new artificial immune algorithm named the immune memory clonai algorithm (IMCA). The clonal operator,inspired by the immune ...
详细信息
Inspired by the clonal selection theory together with the immune network model, we present a new artificial immune algorithm named the immune memory clonai algorithm (IMCA). The clonal operator,inspired by the immune system, is discussed first. The IMCA includes two versions based on different immune memory mechanisms; they are the adaptive immune memory clonal algorithm (AIMCA) and the immune memory clonal strategy (IMCS). In the AIMCA, the mutation rate and memory unit size of each antibody is adjusted dynamically. The IMCS realizes the evolution of both the antibody population and the memory unit at the same time. By using the clonal selection operator, global searching is effectively combined with local *** to the antibody-antibody (Ab-Ab) affinity and the antibody-antigen (Ab-Ag) affinity, The IMCA can adaptively allocate the scale of the memory units and the antibody population. In the experiments, 18 multimodal functions ranging in dimensionality from two, to one thousand and combinatorial optimization problems such as the traveling salesman and knapsack problems (KPs)are used to validate the performance of the IMCA. The computational cost per iteration is presented. Experimental results show that the IMCA has a high convergence speed and a strong ability in enhancing the diversity of the population and avoiding premature convergence to some degree. Theoretical roof is provided that the IMCA is convergent with probability 1.
Wheat head detection can measure wheat traits such as head density and head *** wheat breeding largely relies on manual observation to detect wheat heads,yielding a tedious and inefficient *** emergence of affordable ...
详细信息
Wheat head detection can measure wheat traits such as head density and head *** wheat breeding largely relies on manual observation to detect wheat heads,yielding a tedious and inefficient *** emergence of affordable camera platforms provides opportunities for deploying computer vision(CV)algorithms in wheat head detection,enabling automated measurements of wheat *** wheat head detection,however,is challenging due to the variability of observation circumstances and the uncertainty of wheat head *** this work,we propose a simple but effective idea—dynamic color transform(DCT)—for accurate wheat head detection.
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke...
详细信息
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.
暂无评论