Neural architecture search(NAS)plays an important role in many computer vision ***,the high computational cost of forward and backward propagations during the search,process restricts its practical *** this paper,we p...
详细信息
Neural architecture search(NAS)plays an important role in many computer vision ***,the high computational cost of forward and backward propagations during the search,process restricts its practical *** this paper,we present the search process as a multi-armed bandit problem,where we take into account the uncertainty caused by the contradiction between the huge search space and limited number of *** NAS optimizes the trade-off between exploitation and exploration for a highly efficient ***,we sampled from a set of operations in one trial,where each operation was weighted by its trial performance and a bias to allow operations with less training to be *** further reduced the search space by abandoning the operation with the lowest potential,significantly reducing the search *** results on the CIFAR-10 dataset show that the resulting architecture achieves the most advanced precision with a search speed approximately two times faster than that of partially connected differentialble architecture *** ImageNet,we attained the most advanced top-1 accuracy of 75.3%with a search time of 1.8 GPU days.
Machine learning-based methods have emerged as a promising solution to accurate battery capacity estimation for battery management ***,they are generally developed in a supervised manner which requires a considerable ...
详细信息
Machine learning-based methods have emerged as a promising solution to accurate battery capacity estimation for battery management ***,they are generally developed in a supervised manner which requires a considerable number of input features and corresponding capacities,leading to prohibitive costs and efforts for data *** response to this issue,this study proposes a convolutional neural network(CNN)based method to perform end-to-end capacity estimation by taking only raw impedance spectra as *** importantly,an input reconstruction module is devised to effectively exploit impedance spectra without corresponding capacities in the training process,thereby significantly alleviating the cost of collecting training *** large battery degradation datasets encompassing over 4700 impedance spectra are developed to validate the proposed *** results show that accurate capacity estimation can be achieved when substantial training samples with measured capacities are ***,the estimation performance of supervised machine learning algorithms sharply deteriorates when fewer samples with measured capacities are *** this case,the proposed method outperforms supervised benchmarks and can reduce the root mean square error by up to 50.66%.A further validation under different current rates and states of charge confirms the effectiveness of the proposed *** method provides a flexible approach to take advantage of unlabelled samples for developing data-driven models and is promising to be generalised to other battery management tasks.
The rapid growth of textual data across various platforms necessitates efficient real-time text classification and summarization methods. This paper presents a novel approach for developing a real-time text classifica...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
Graph processing has been widely used in many scenarios,from scientific computing to artificial *** processing exhibits irregular computational parallelism and random memory accesses,unlike traditional ***,running gra...
详细信息
Graph processing has been widely used in many scenarios,from scientific computing to artificial *** processing exhibits irregular computational parallelism and random memory accesses,unlike traditional ***,running graph processing workloads on conventional architectures(e.g.,CPUs and GPUs)often shows a significantly low compute-memory ratio with few performance benefits,which can be,in many cases,even slower than a specialized single-thread graph *** domain-specific hardware designs are essential for graph processing,it is still challenging to transform the hardware capability to performance boost without coupled software *** article presents a graph processing ecosystem from hardware to *** start by introducing a series of hardware accelerators as the foundation of this ***,the codesigned parallel graph systems and their distributed techniques are presented to support graph ***,we introduce our efforts on novel graph applications and hardware *** results show that various graph applications can be efficiently accelerated in this graph processing ecosystem.
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they...
详细信息
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they induce abundant data movements between computing units and ***-based processing-in-memory(PIM)can resolve this problem by processing embedding vectors where they are ***,the embedding table can easily exceed the capacity limit of a monolithic ReRAM-based PIM chip,which induces off-chip accesses that may offset the PIM ***,we deploy the decomposed model on-chip and leverage the high computing efficiency of ReRAM to compensate for the decompression performance *** this paper,we propose ARCHER,a ReRAM-based PIM architecture that implements fully yon-chip recommendations under resource ***,we make a full analysis of the computation pattern and access pattern on the decomposed *** on the computation pattern,we unify the operations of each layer of the decomposed model in multiply-and-accumulate *** on the access observation,we propose a hierarchical mapping schema and a specialized hardware design to maximize resource *** the unified computation and mapping strategy,we can coordinatethe inter-processing elements *** evaluation shows that ARCHER outperforms the state-of-the-art GPU-based DLRM system,the state-of-the-art near-memory processing recommendation system RecNMP,and the ReRAM-based recommendation accelerator REREC by 15.79×,2.21×,and 1.21× in terms of performance and 56.06×,6.45×,and 1.71× in terms of energy savings,respectively.
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens...
详细信息
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state *** the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay *** that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the *** this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first *** allowable regions of consensus protocol parameters are *** necessary and sufficient conditions for determining effective protocol parameters are *** designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent ***,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are ***,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems.
Connected automated vehicles(CAVs)serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety,and reducing fuel consumpti...
详细信息
Connected automated vehicles(CAVs)serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety,and reducing fuel consumption and vehicle emissions.A fundamental issue in CAVs is platooning control that empowers a convoy of CAVs to be cooperatively maneuvered with desired longitudinal spacings and identical velocities on *** paper addresses the issue of resilient and safe platooning control of CAVs subject to intermittent denial-of-service(DoS)attacks that disrupt vehicle-to-vehicle ***,a heterogeneous and uncertain vehicle longitudinal dynamic model is presented to accommodate a variety of uncertainties,including diverse vehicle masses and engine inertial delays,unknown and nonlinear resistance forces,and a dynamic platoon ***,a resilient and safe distributed longitudinal platooning control law is constructed with an aim to preserve simultaneous individual vehicle stability,attack resilience,platoon safety and ***,a numerically efficient offline design algorithm for determining the desired platoon control law is developed,under which the platoon resilience against DoS attacks can be maximized but the anticipated stability,safety and scalability requirements remain ***,extensive numerical experiments are provided to substantiate the efficacy of the proposed platooning method.
作者:
Qing-Long HanSchool of Science
Computing and Engineering TechnologiesSwinburne University of TechnologyMelbourneVIC 3122Australia
Welcome to the sixth issue of the IEEE/CAA Journal of Automatica Sinica(JAS)in 2023!In the first issue in 2023,I briefly discussed about MetaVehicles,a technological expression of intelligent vehicles,robotics,AI,bloc...
详细信息
Welcome to the sixth issue of the IEEE/CAA Journal of Automatica Sinica(JAS)in 2023!In the first issue in 2023,I briefly discussed about MetaVehicles,a technological expression of intelligent vehicles,robotics,AI,blockchain,knowledge automation,networking and communication[1].As the concept of the Metaverse continues to evolve and expand,the range of vehicle entities is diversely enlarged,including passenger vehicles,heavy duty vehicles,rail vehicles,marine vehicles,aerial vehicles,and other types of *** development and use of MetaVehicles are likely to become more ***,from a systems and control perspective,new methods of control,estimation and optimization should be developed to achieve the improved vehicular control system stability and reliability in the physical space.
The rapid growth of electric vehicle and autonomous vehicle populations has led to explosive expansion of IoV data being transmitted in the wireless communication infrastructure. Advances in IoV technologies also resu...
详细信息
暂无评论