The Industrial Internet of Things (IIoT) is increasingly emerging as a novel paradigm for information exchange within industrial production environments. To facilitate the efficient operation of IIoT, there is an urge...
详细信息
ISBN:
(数字)9789887581598
ISBN:
(纸本)9798331540845
The Industrial Internet of Things (IIoT) is increasingly emerging as a novel paradigm for information exchange within industrial production environments. To facilitate the efficient operation of IIoT, there is an urgent requirement for communication-efficient methods to transmit extensive production data. This paper proposes a communication-efficient distributed optimization algorithm tailored for the strongly convex and smooth convex optimization problems over a directed graph. To encompass a broader class of compressors, the assumption of compressor is relaxed to contain both relative and absolute errors. To mitigate compression errors, we adopt differential compression technique and dynamic scaling factor in the algorithm. In particular, under this compression assumption, a non-uniform quantizer is introduced to enable finite-bit transmission over communication channels and an upper bound of the required bits with this quantizer is provided. Moreover, we prove the linear convergence of the proposed algorithm with compression, and numerical examples are provided to verify the performance of the proposed algorithm.
Compressed sensing (CS) technology has been applied to topographic synthetic aperture radar (TomoSAR) imaging due to the sparsity of elevation signals. The traditional CS algorithms discretize the elevation into many ...
详细信息
Deep learning methods have achieved remarkable results in the direction of image quality assessment tasks. However, most of the related studies focus only on image unimodal, ignoring the potential advantages that come...
详细信息
Time-Critical Wireless Network (TCWN) is a promising communication technology that can satisfy the low latency, high reliability, and deterministic requirements of mission-critical applications. Multiple TCWNs require...
详细信息
In this paper, the model predictive control (MPC) problem is investigated for the constrained discrete-time Takagi-Sugeno fuzzy Markovian jump systems (FMJSs) under imperfect premise matching rules. To strike a balanc...
详细信息
This paper studies the quantitative measurement method of risk occurrence and possible spread among petrochemical supply chain enterprise nodes. Combined with the characteristics of petrochemical supply chain network,...
详细信息
We propose an unsupervised person search method for video surveillance. This method considers both the spatial features of persons within each frame and the temporal relationship of the same person among different fra...
详细信息
Although LiDAR semantic segmentation advances rapidly, state-of-the-art methods often incorporate specifically designed inductive bias derived from benchmarks originating from mechanical spinning LiDAR. This can limit...
详细信息
To solve the problem of ship heave motion in harsh marine environments, which affects the positioning accuracy and safety of its robotic arm, this paper adopts a PID parameter optimization method based on Tent cold li...
详细信息
The interaction topology plays a significant role in the collaboration of multiagent systems. How to preserve the topology against inference attacks has become an imperative task for security concerns. In this paper, ...
The interaction topology plays a significant role in the collaboration of multiagent systems. How to preserve the topology against inference attacks has become an imperative task for security concerns. In this paper, we propose a distributed topology-preserving algorithm for second-order multi-agent systems by adding noisy inputs. The major novelty is that we develop a strategic compensation approach to overcome the noise accumulation issue in the second-order dynamic process while ensuring the exact second-order consensus. Specifically, we design two distributed compensation strategies that make the topology more invulnerable against inference attacks. Furthermore, we derive the relationship between the inference error and the number of observations by taking the ordinary least squares estimator as a benchmark. Extensive simulations are conducted to verify the topology-preserving performance of the proposed algorithm.
暂无评论