Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent syst...
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent systems with bandit feedback is to explore and understand the equilibrium state to ensure stable and tractable system performance.
The afterburning of TNT and structural constraints in confined spaces significantly amplify the blast load, leading to severe structural damage. This study investigates the mechanisms underlying the enhanced dynamic r...
详细信息
Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum...
详细信息
Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum communication, and utilize the logical relationship between the measurements of each node to derive the unitary operation performed by the end node. The hierarchical simultaneous entanglement switching(HSES) method is adopted, resulting in a significant reduction in the consumption of classical information compared to multi-hop quantum teleportation(QT)based on general simultaneous entanglement switching(SES). In addition, the proposed protocol is simulated on the IBM Quantum Experiment platform(IBM QE). Then, the data obtained from the experiment are analyzed using quantum state tomography, which verifies the protocol's good fidelity and accuracy. Finally, by calculating fidelity, we analyze the impact of four different types of noise(phase-damping, amplitude-damping, phase-flip and bit-flip) in this protocol.
We study a novel replication mechanism to ensure service continuity against multiple simultaneous server failures. In this mechanism, each item represents a computing task and is replicated into ξ + 1 servers for som...
详细信息
We study a novel replication mechanism to ensure service continuity against multiple simultaneous server failures. In this mechanism, each item represents a computing task and is replicated into ξ + 1 servers for some integer ξ ≥ 1, with workloads specified by the amount of required resources. If one or more servers fail, the affected workloads can be redirected to other servers that host replicas associated with the same item, such that the service is not interrupted by the failure of up to ξ servers. This requires that any feasible assignment algorithm must reserve some capacity in each server to accommodate the workload redirected from potential failed servers without overloading, and determining the optimal method for reserving capacity becomes a key issue. Unlike existing algorithms that assume that no two servers share replicas of more than one item, we first formulate capacity reservation for a general arbitrary scenario. Due to the combinatorial nature of this problem, finding the optimal solution is difficult. To this end, we propose a Generalized and Simple Calculating Reserved Capacity(GSCRC) algorithm, with a time complexity only related to the number of items packed in the server. In conjunction with GSCRC, we propose a robust replica packing algorithm with capacity optimization(RobustPack), which aims to minimize the number of servers hosting replicas and tolerate multiple server failures. Through theoretical analysis and experimental evaluations, we show that the RobustPack algorithm can achieve better performance.
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b...
详细信息
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection between cyberspace and physical processes results in the exposure of industrial production information to unprecedented security risks. It is imperative to develop suitable strategies to ensure cyber security while meeting basic performance *** the perspective of control engineering, this review presents the most up-to-date results for privacy-preserving filtering,control, and optimization in industrial cyber-physical systems. Fashionable privacy-preserving strategies and mainstream evaluation metrics are first presented in a systematic manner for performance evaluation and engineering *** discussion discloses the impact of typical filtering algorithms on filtering performance, specifically for privacy-preserving Kalman filtering. Then, the latest development of industrial control is systematically investigated from consensus control of multi-agent systems, platoon control of autonomous vehicles as well as hierarchical control of power systems. The focus thereafter is on the latest privacy-preserving optimization algorithms in the framework of consensus and their applications in distributed economic dispatch issues and energy management of networked power systems. In the end, several topics for potential future research are highlighted.
UAV-based object detection is rapidly expanding in both civilian and military applications,including security surveillance,disaster assessment,and border ***,challenges such as small objects,occlusions,complex backgro...
详细信息
UAV-based object detection is rapidly expanding in both civilian and military applications,including security surveillance,disaster assessment,and border ***,challenges such as small objects,occlusions,complex backgrounds,and variable lighting persist due to the unique perspective of UAV *** address these issues,this paper introduces DAFPN-YOLO,an innovative model based on YOLOv8s(You Only Look Once version 8s).Themodel strikes a balance between detection accuracy and speed while reducing parameters,making itwell-suited for multi-object detection tasks from drone perspectives.A key feature of DAFPN-YOLO is the enhanced Drone-AFPN(Adaptive Feature Pyramid Network),which adaptively fuses multi-scale features to optimize feature extraction and enhance spatial and small-object *** leverage Drone-AFPN’smulti-scale capabilities fully,a dedicated 160×160 small-object detection head was added,significantly boosting detection accuracy for small *** the backbone,the C2f_Dual(Cross Stage Partial with Cross-Stage Feature Fusion Dual)module and SPPELAN(Spatial Pyramid Pooling with Enhanced LocalAttentionNetwork)modulewere *** components improve feature extraction and information aggregationwhile reducing parameters and computational complexity,enhancing inference ***,Shape-IoU(Shape Intersection over Union)is used as the loss function for bounding box regression,enabling more precise shape-based object *** results on the VisDrone 2019 dataset demonstrate the effectiveness *** to YOLOv8s,the proposedmodel achieves a 5.4 percentage point increase inmAP@0.5,a 3.8 percentage point improvement in mAP@0.5:0.95,and a 17.2%reduction in parameter *** results highlight DAFPN-YOLO’s advantages in UAV-based object detection,offering valuable insights for applying deep learning to UAV-specific multi-object detection tasks.
Software-defined networking decouples the control plane from the data plane to enable centralized flow-level network management, while requiring periodically collecting traffic statistics from the data plane to enforc...
详细信息
Software-defined networking decouples the control plane from the data plane to enable centralized flow-level network management, while requiring periodically collecting traffic statistics from the data plane to enforce optimal management. As one of the most important traffic measurement tasks, heavy flow detection has received wide attention for its providing fundamental statistics in various practical applications. Existing studies have proposed sketch-based detection solutions to address the mismatch problem between massive traffic and limited high-speed memory resources for measurement in the data plane. However,they overlook the potential of integrating the flow table, where each entry simultaneously enforces forwarding rules for specific flows and records flow statistics into the sketch design, leading to redundant measurement between the flow table and sketch and being unable to utilize their statistics to jointly enhance estimation accuracy. We propose flow entries assisted sketch(FEA-Sketch) in this work, which employs a differentiated flow recording strategy to record flow statistics jointly using the flow table and sketch for memory-efficient and computationally efficient heavy flow detection. We also propose an optimization-based estimation algorithm to accurately recover per-flow sizes for the flows that only have aggregated statistics due to the sharing of entries in the table(or counters in the sketch). We extend the FEA-Sketch to the distributed measurement setting with a hop-based collaborative measurement strategy, which reduces the measurement workload on switches across the network by avoiding redundant measurements. The experimental results on real Internet traces show that the accuracy of heavy flow detection is improved up to 1.95 times, and the bias of flow size estimation is improved up to 2.99 times, demonstrating that integrating flow entries can significantly improve the performance of heavy flow detection.
This paper examines fault-tolerant quantized control for neural networks under persistent dwell-time switching, considering the presence of actuator faults and dynamic output quantization. The dynamic scaling factor (...
详细信息
The goal of generalized zero-shot learning (GZSL) is to transfer knowledge from seen classes to unseen classes. However, a significant challenge is the single-category attributes are often inadequate to capture the in...
详细信息
Swarm Intelligence (SI) is a collective behavior that emerges from interaction between individuals in a group. Typical SI includes fish schooling, ant foraging, bird migration, and so on. A great deal of models have b...
详细信息
Swarm Intelligence (SI) is a collective behavior that emerges from interaction between individuals in a group. Typical SI includes fish schooling, ant foraging, bird migration, and so on. A great deal of models have been introduced to characterize the mechanism of SI. This article reviews several typical models and classifies them into four categories: self-driven particle models, with Boids model as the primary example;pheromone communication models, including the ant colony pheromone model which serves as the foundation for ant colony optimization;leadership decision models, utilizing the hierarchical dynamics model of pigeon flock as a prime instance;empirical research models, which employ the topological rule model of starling flock as a classic model. On this basis, each type of model is elaborated upon in terms of its typical model overview, applications, and model evaluation. More specifically, multi-agent swarm control, path optimization and obstacle avoidance, formation and consensus control, trajectory tracking in the dense crowd and social networks analysis are surveyed in the application of each category, respectively. Furthermore, the more precise and effective modeling techniques for leadership decision and empirical research models are described. Limitations and potential directions for further exploration in the study of SI are presented.
暂无评论