期刊文献+
共找到287篇文章
< 1 2 15 >
每页显示 20 50 100
Data Component:An Innovative Framework for Information Value Metrics in the Digital Economy
1
作者 Tao Xiaoming Wang Yu +5 位作者 Peng Jieyang Zhao Yuelin Wang Yue Wang Youzheng Hu Chengsheng Lu Zhipeng 《China Communications》 SCIE CSCD 2024年第5期17-35,共19页
The increasing dependence on data highlights the need for a detailed understanding of its behavior,encompassing the challenges involved in processing and evaluating it.However,current research lacks a comprehensive st... The increasing dependence on data highlights the need for a detailed understanding of its behavior,encompassing the challenges involved in processing and evaluating it.However,current research lacks a comprehensive structure for measuring the worth of data elements,hindering effective navigation of the changing digital environment.This paper aims to fill this research gap by introducing the innovative concept of“data components.”It proposes a graphtheoretic representation model that presents a clear mathematical definition and demonstrates the superiority of data components over traditional processing methods.Additionally,the paper introduces an information measurement model that provides a way to calculate the information entropy of data components and establish their increased informational value.The paper also assesses the value of information,suggesting a pricing mechanism based on its significance.In conclusion,this paper establishes a robust framework for understanding and quantifying the value of implicit information in data,laying the groundwork for future research and practical applications. 展开更多
关键词 data component data element data governance data science information theory
下载PDF
Age of Information Based User Scheduling and Data Assignment in Multi-User Mobile Edge Computing Networks:An Online Algorithm
2
作者 Ge Yiyang Xiong Ke +3 位作者 Dong Rui Lu Yang Fan Pingyi Qu Gang 《China Communications》 SCIE CSCD 2024年第5期153-165,共13页
This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization pr... This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization problem is formulated by jointly optimizing the user scheduling and data assignment.Due to the non-analytic expression of the WSA w.r.t.the optimization variables and the unknowability of future network information,the problem cannot be solved with known solution methods.Therefore,an online Joint Partial Offloading and User Scheduling Optimization(JPOUSO)algorithm is proposed by transforming the original problem into a single-slot data assignment subproblem and a single-slot user scheduling sub-problem and solving the two sub-problems separately.We analyze the computational complexity of the presented JPO-USO algorithm,which is of O(N),with N being the number of users.Simulation results show that the proposed JPO-USO algorithm is able to achieve better AoI performance compared with various baseline methods.It is shown that both the user’s data assignment and the user’s AoI should be jointly taken into account to decrease the system WSA when scheduling users. 展开更多
关键词 age of information(aoi) mobile edge computing(mec) user scheduling
下载PDF
Matching while Learning: Wireless Scheduling for Age of Information Optimization at the Edge 被引量:3
3
作者 Kun Guo Hao Yang +2 位作者 Peng Yang Wei Feng Tony Q.S.Quek 《China Communications》 SCIE CSCD 2023年第3期347-360,共14页
In this paper,we investigate the minimization of age of information(AoI),a metric that measures the information freshness,at the network edge with unreliable wireless communications.Particularly,we consider a set of u... In this paper,we investigate the minimization of age of information(AoI),a metric that measures the information freshness,at the network edge with unreliable wireless communications.Particularly,we consider a set of users transmitting status updates,which are collected by the user randomly over time,to an edge server through unreliable orthogonal channels.It begs a natural question:with random status update arrivals and obscure channel conditions,can we devise an intelligent scheduling policy that matches the users and channels to stabilize the queues of all users while minimizing the average AoI?To give an adequate answer,we define a bipartite graph and formulate a dynamic edge activation problem with stability constraints.Then,we propose an online matching while learning algorithm(MatL)and discuss its implementation for wireless scheduling.Finally,simulation results demonstrate that the MatL is reliable to learn the channel states and manage the users’buffers for fresher information at the edge. 展开更多
关键词 information freshness Lyapunov opti-mization multi-armed bandit wireless scheduling
下载PDF
Optoelectronic Synapses Based on MXene/Violet Phosphorus van der Waals Heterojunctions for Visual‑Olfactory Crossmodal Perception 被引量:1
4
作者 Hailong Ma Huajing Fang +3 位作者 Xinxing Xie Yanming Liu He Tian Yang Chai 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第6期38-52,共15页
The crossmodal interaction of different senses,which is an important basis for learning and memory in the human brain,is highly desired to be mimicked at the device level for developing neuromorphic crossmodal percept... The crossmodal interaction of different senses,which is an important basis for learning and memory in the human brain,is highly desired to be mimicked at the device level for developing neuromorphic crossmodal perception,but related researches are scarce.Here,we demonstrate an optoelectronic synapse for vision-olfactory crossmodal perception based on MXene/violet phosphorus(VP)van der Waals heterojunctions.Benefiting from the efficient separation and transport of photogenerated carriers facilitated by conductive MXene,the photoelectric responsivity of VP is dramatically enhanced by 7 orders of magnitude,reaching up to 7.7 A W^(−1).Excited by ultraviolet light,multiple synaptic functions,including excitatory postsynaptic currents,pairedpulse facilitation,short/long-term plasticity and“learning-experience”behavior,were demonstrated with a low power consumption.Furthermore,the proposed optoelectronic synapse exhibits distinct synaptic behaviors in different gas environments,enabling it to simulate the interaction of visual and olfactory information for crossmodal perception.This work demonstrates the great potential of VP in optoelectronics and provides a promising platform for applications such as virtual reality and neurorobotics. 展开更多
关键词 Violet phosphorus MXene Van der Waals heterojunctions Optoelectronic synapses Crossmodal perception
下载PDF
Anti-Byzantine Attacks Enabled Vehicle Selection for Asynchronous Federated Learning in Vehicular Edge Computing 被引量:1
5
作者 Zhang Cui Xu Xiao +4 位作者 Wu Qiong Fan Pingyi Fan Qiang Zhu Huiling Wang Jiangzhou 《China Communications》 SCIE CSCD 2024年第8期1-17,共17页
In vehicle edge computing(VEC),asynchronous federated learning(AFL)is used,where the edge receives a local model and updates the global model,effectively reducing the global aggregation latency.Due to different amount... In vehicle edge computing(VEC),asynchronous federated learning(AFL)is used,where the edge receives a local model and updates the global model,effectively reducing the global aggregation latency.Due to different amounts of local data,computing capabilities and locations of the vehicles,renewing the global model with same weight is inappropriate.The above factors will affect the local calculation time and upload time of the local model,and the vehicle may also be affected by Byzantine attacks,leading to the deterioration of the vehicle data.However,based on deep reinforcement learning(DRL),we can consider these factors comprehensively to eliminate vehicles with poor performance as much as possible and exclude vehicles that have suffered Byzantine attacks before AFL.At the same time,when aggregating AFL,we can focus on those vehicles with better performance to improve the accuracy and safety of the system.In this paper,we proposed a vehicle selection scheme based on DRL in VEC.In this scheme,vehicle’s mobility,channel conditions with temporal variations,computational resources with temporal variations,different data amount,transmission channel status of vehicles as well as Byzantine attacks were taken into account.Simulation results show that the proposed scheme effectively improves the safety and accuracy of the global model. 展开更多
关键词 asynchronous federated learning byzantine attacks vehicle selection vehicular edge computing
下载PDF
Advances in neuromorphic computing:Expanding horizons for AI development through novel artificial neurons and in-sensor computing
6
作者 杨玉波 赵吉哲 +11 位作者 刘胤洁 华夏扬 王天睿 郑纪元 郝智彪 熊兵 孙长征 韩彦军 王健 李洪涛 汪莱 罗毅 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期1-23,共23页
AI development has brought great success to upgrading the information age.At the same time,the large-scale artificial neural network for building AI systems is thirsty for computing power,which is barely satisfied by ... AI development has brought great success to upgrading the information age.At the same time,the large-scale artificial neural network for building AI systems is thirsty for computing power,which is barely satisfied by the conventional computing hardware.In the post-Moore era,the increase in computing power brought about by the size reduction of CMOS in very large-scale integrated circuits(VLSIC)is challenging to meet the growing demand for AI computing power.To address the issue,technical approaches like neuromorphic computing attract great attention because of their feature of breaking Von-Neumann architecture,and dealing with AI algorithms much more parallelly and energy efficiently.Inspired by the human neural network architecture,neuromorphic computing hardware is brought to life based on novel artificial neurons constructed by new materials or devices.Although it is relatively difficult to deploy a training process in the neuromorphic architecture like spiking neural network(SNN),the development in this field has incubated promising technologies like in-sensor computing,which brings new opportunities for multidisciplinary research,including the field of optoelectronic materials and devices,artificial neural networks,and microelectronics integration technology.The vision chips based on the architectures could reduce unnecessary data transfer and realize fast and energy-efficient visual cognitive processing.This paper reviews firstly the architectures and algorithms of SNN,and artificial neuron devices supporting neuromorphic computing,then the recent progress of in-sensor computing vision chips,which all will promote the development of AI. 展开更多
关键词 neuromorphic computing spiking neural network(SNN) in-sensor computing artificial intelligence
原文传递
Recent Advance in Synaptic Plasticity Modulation Techniques for Neuromorphic Applications
7
作者 Yilin Sun Huaipeng Wang Dan Xie 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第10期403-434,共32页
Manipulating the expression of synaptic plasticity of neuromorphic devices provides fascinating opportunities to develop hardware platforms for artifi-cial intelligence.However,great efforts have been devoted to explo... Manipulating the expression of synaptic plasticity of neuromorphic devices provides fascinating opportunities to develop hardware platforms for artifi-cial intelligence.However,great efforts have been devoted to exploring biomimetic mechanisms of plasticity simulation in the last few years.Recent progress in various plasticity modulation techniques has pushed the research of synaptic electronics from static plasticity simulation to dynamic plasticity modulation,improving the accuracy of neuromorphic computing and providing strategies for implementing neuromorphic sensing functions.Herein,several fascinating strategies for synap-tic plasticity modulation through chemical techniques,device structure design,and physical signal sensing are reviewed.For chemical techniques,the underly-ing mechanisms for the modification of functional materials were clarified and its effect on the expression of synaptic plasticity was also highlighted.Based on device structure design,the reconfigurable operation of neuromorphic devices was well demonstrated to achieve programmable neuromorphic functions.Besides,integrating the sensory units with neuromorphic processing circuits paved a new way to achieve human-like intelligent perception under the modulation of physical signals such as light,strain,and temperature.Finally,considering that the relevant technology is still in the basic exploration stage,some prospects or development suggestions are put forward to promote the development of neuromorphic devices. 展开更多
关键词 Plasticity modulation Dynamic plasticity Chemical techniques Programmable operation Neuromorphic sensing
下载PDF
Controllable thermal rectification design for buildings based on phase change composites
8
作者 Hengbin Ding Xiaoshi Li +2 位作者 Tianhang Li Xiaoyong Zhao He Tian 《Journal of Semiconductors》 EI CAS CSCD 2024年第2期40-45,共6页
Phase-change material(PCM)is widely used in thermal management due to their unique thermal behavior.However,related research in thermal rectifier is mainly focused on exploring the principles at the fundamental device... Phase-change material(PCM)is widely used in thermal management due to their unique thermal behavior.However,related research in thermal rectifier is mainly focused on exploring the principles at the fundamental device level,which results in a gap to real applications.Here,we propose a controllable thermal rectification design towards building applications through the direct adhesion of composite thermal rectification material(TRM)based on PCM and reduced graphene oxide(rGO)aerogel to ordinary concrete walls(CWs).The design is evaluated in detail by combining experiments and finite element analysis.It is found that,TRM can regulate the temperature difference on both sides of the TRM/CWs system by thermal rectification.The difference in two directions reaches to 13.8 K at the heat flow of 80 W/m^(2).In addition,the larger the change of thermal conductivity before and after phase change of TRM is,the more effective it is for regulating temperature difference in two directions.The stated technology has a wide range of applications for the thermal energy control in buildings with specific temperature requirements. 展开更多
关键词 phase change composites controllable thermal rectification building applications
下载PDF
Simulations of superconducting quantum gates by digital flux tuner for qubits
9
作者 耿霄 何楷泳 +1 位作者 刘建设 陈炜 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期210-222,共13页
The interconnection bottleneck caused by limitations of cable number, inner space and cooling power of dilution refrigerators has been an outstanding challenge for building scalable superconducting quantum computers w... The interconnection bottleneck caused by limitations of cable number, inner space and cooling power of dilution refrigerators has been an outstanding challenge for building scalable superconducting quantum computers with the increasing number of qubits in quantum processors. To surmount such an obstacle, it is desirable to integrate qubits with quantum–classical interface(QCI) circuits based on rapid single flux quantum(RSFQ) circuits. In this work, a digital flux tuner for qubits(DFTQ) is proposed for manipulating flux of qubits as a crucial part of the interface circuit. A schematic diagram of the DFTQ is presented, consisting of a coarse tuning unit and a fine-tuning unit for providing magnetic flux with different precision to qubits. The method of using DFTQ to provide flux for gate operations is discussed from the optimization of circuit design and input signal. To verify the effectiveness of the method, simulations of a single DFTQ and quantum gates including a Z gate and an iSWAP gate with DFTQs are performed for flux-tunable transmons. The quantum process tomography corresponding to the two gates is also carried out to analyze the sources of gate error. The results of tomography show that the gate fidelities independent of the initial states of the Z gate and the iSWAP gate are 99.935% and 99.676%,respectively. With DFTQs inside, the QCI would be a powerful tool for building large-scale quantum computers. 展开更多
关键词 quantum computation superconducting electronics quantum control
原文传递
Performance Limits and Advancements in Single 2D Transition Metal Dichalcogenide Transistor
10
作者 Jing Chen Ming-Yuan Sun +8 位作者 Zhen-Hua Wang Zheng Zhang Kai Zhang Shuai Wang Yu Zhang Xiaoming Wu Tian-Ling Ren Hong Liu Lin Han 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第12期134-188,共55页
Two-dimensional(2D)transition metal dichalcogenides(TMDs)allow for atomic-scale manipulation,challenging the conventional limitations of semiconductor materials.This capability may overcome the short-channel effect,sp... Two-dimensional(2D)transition metal dichalcogenides(TMDs)allow for atomic-scale manipulation,challenging the conventional limitations of semiconductor materials.This capability may overcome the short-channel effect,sparking significant advancements in electronic devices that utilize 2D TMDs.Exploring the dimension and performance limits of transistors based on 2D TMDs has gained substantial importance.This review provides a comprehensive investigation into these limits of the single 2D-TMD transistor.It delves into the impacts of miniaturization,including the reduction of channel length,gate length,source/drain contact length,and dielectric thickness on transistor operation and performance.In addition,this review provides a detailed analysis of performance parameters such as source/drain contact resistance,subthreshold swing,hysteresis loop,carrier mobility,on/off ratio,and the development of p-type and single logic transistors.This review details the two logical expressions of the single 2D-TMD logic transistor,including current and voltage.It also emphasizes the role of 2D TMD-based transistors as memory devices,focusing on enhancing memory operation speed,endurance,data retention,and extinction ratio,as well as reducing energy consumption in memory devices functioning as artificial synapses.This review demonstrates the two calculating methods for dynamic energy consumption of 2D synaptic devices.This review not only summarizes the current state of the art in this field but also highlights potential future research directions and applications.It underscores the anticipated challenges,opportunities,and potential solutions in navigating the dimension and performance boundaries of 2D transistors. 展开更多
关键词 Two-dimensional transistors Dimension limits Performance limits Memory devices Artificial synapses
下载PDF
Secrecy Rate Maximization for 6G Cognitive Satellite-UAV Networks 被引量:5
11
作者 Chengleyang Lei Wei Feng +1 位作者 Yunfei Chen Ning Ge 《China Communications》 SCIE CSCD 2023年第1期246-260,共15页
To cover remote areas where terrestrial cellular networks may not be available,non-terrestrial infrastructures such as satellites and unmanned aerial vehicles(UAVs)can be utilized in the upcoming sixth-generation(6G)e... To cover remote areas where terrestrial cellular networks may not be available,non-terrestrial infrastructures such as satellites and unmanned aerial vehicles(UAVs)can be utilized in the upcoming sixth-generation(6G)era.Considering the spectrum scarcity problem,satellites and UAVs need to share the spectrum to save costs,leading to a cognitive satellite-UAV network.Due to the openness of both satellite links and UAV links,communication security has become a major concern in cognitive satelliteUAV networks.In this paper,we safeguard a cognitive satellite-UAV network from a physical layer security(PLS)perspective.Using only the slowlyvarying large-scale channel state information(CSI),we jointly allocate the transmission power and subchannels to maximize the secrecy sum rate of UAV users.The optimization problem is a mixed integer nonlinear programming(MINLP)problem with coupling constraints.We propose a heuristic algorithm which relaxes the coupling constraints by the penalty method and obtains a sub-optimal low-complexity solution by utilizing random matrix theory,the max-min optimization tool,and the bipartite graph matching algorithm.The simulation results corroborate the superiority of our proposed scheme. 展开更多
关键词 channel allocation cognitive satellite-UAV network physical layer security power allocation
下载PDF
Soft Electronics for Health Monitoring Assisted by Machine Learning 被引量:5
12
作者 Yancong Qiao Jinan Luo +11 位作者 Tianrui Cui Haidong Liu Hao Tang Yingfen Zeng Chang Liu Yuanfang Li Jinming Jian Jingzhi Wu He Tian Yi Yang Tian-Ling Ren Jianhua Zhou 《Nano-Micro Letters》 SCIE EI CAS CSCD 2023年第5期83-168,共86页
Due to the development of the novel materials,the past two decades have witnessed the rapid advances of soft electronics.The soft electronics have huge potential in the physical sign monitoring and health care.One of ... Due to the development of the novel materials,the past two decades have witnessed the rapid advances of soft electronics.The soft electronics have huge potential in the physical sign monitoring and health care.One of the important advantages of soft electronics is forming good interface with skin,which can increase the user scale and improve the signal quality.Therefore,it is easy to build the specific dataset,which is important to improve the performance of machine learning algorithm.At the same time,with the assistance of machine learning algorithm,the soft electronics have become more and more intelligent to realize real-time analysis and diagnosis.The soft electronics and machining learning algorithms complement each other very well.It is indubitable that the soft electronics will bring us to a healthier and more intelligent world in the near future.Therefore,in this review,we will give a careful introduction about the new soft material,physiological signal detected by soft devices,and the soft devices assisted by machine learning algorithm.Some soft materials will be discussed such as two-dimensional material,carbon nanotube,nanowire,nanomesh,and hydrogel.Then,soft sensors will be discussed according to the physiological signal types(pulse,respiration,human motion,intraocular pressure,phonation,etc.).After that,the soft electronics assisted by various algorithms will be reviewed,including some classical algorithms and powerful neural network algorithms.Especially,the soft device assisted by neural network will be introduced carefully.Finally,the outlook,challenge,and conclusion of soft system powered by machine learning algorithm will be discussed. 展开更多
关键词 Soft electronics Machine learning algorithm Physiological signal monitoring Soft materials
下载PDF
Detecting While Accessing:A Semi-Supervised Learning-Based Approach for Malicious Traffic Detection in Internet of Things 被引量:2
13
作者 Yantian Luo Hancun Sun +3 位作者 Xu Chen Ning Ge Wei Feng Jianhua Lu 《China Communications》 SCIE CSCD 2023年第4期302-314,共13页
In the upcoming large-scale Internet of Things(Io T),it is increasingly challenging to defend against malicious traffic,due to the heterogeneity of Io T devices and the diversity of Io T communication protocols.In thi... In the upcoming large-scale Internet of Things(Io T),it is increasingly challenging to defend against malicious traffic,due to the heterogeneity of Io T devices and the diversity of Io T communication protocols.In this paper,we propose a semi-supervised learning-based approach to detect malicious traffic at the access side.It overcomes the resource-bottleneck problem of traditional malicious traffic defenders which are deployed at the victim side,and also is free of labeled traffic data in model training.Specifically,we design a coarse-grained behavior model of Io T devices by self-supervised learning with unlabeled traffic data.Then,we fine-tune this model to improve its accuracy in malicious traffic detection by adopting a transfer learning method using a small amount of labeled data.Experimental results show that our method can achieve the accuracy of 99.52%and the F1-score of 99.52%with only 1%of the labeled training data based on the CICDDoS2019 dataset.Moreover,our method outperforms the stateof-the-art supervised learning-based methods in terms of accuracy,precision,recall and F1-score with 1%of the training data. 展开更多
关键词 malicious traffic detection semi-supervised learning Internet of Things(Io T) TRANSFORMER masked behavior model
下载PDF
PerfMon: Measuring Application-Level Performance in a Large-Scale Campus Wireless Network 被引量:2
14
作者 Weizhen Dang Tao Yu +3 位作者 Haibo Wang Jing’An Xue Fenghua Li Jilong Wang 《China Communications》 SCIE CSCD 2023年第3期316-335,共20页
WiFi has become one of the most popular ways to access the Internet.However,in large-scale campus wireless networks,it is challenging for network administrators to provide optimized access quality without knowledge on... WiFi has become one of the most popular ways to access the Internet.However,in large-scale campus wireless networks,it is challenging for network administrators to provide optimized access quality without knowledge on fine-grained traffic characteristics and real network performance.In this paper,we implement PerfMon,a network performance measurement and diagnosis system,which integrates collected multi-source datasets and analysis methods.Based on PerfMon,we first conduct a comprehensive measurement on application-level traffic patterns and behaviors from multiple dimensions in the wireless network of T university(TWLAN),which is one of the largest campus wireless networks.Then we systematically study the application-level network performance.We observe that the application-level traffic behaviors and performance vary greatly across different locations and device types.The performance is far from satisfactory in some cases.To diagnose these problems,we distinguish locations and device types,and further locate the most crucial factors that affect the performance.The results of case studies show that the influential factors can effectively characterize performance changes and explain for performance degradation. 展开更多
关键词 WIFI traffic patterns network manage-ment performance measurement network diagnosis
下载PDF
Elimination of Spatial Side-Channel Information for Compact Quantum Key Distribution Senders
15
作者 Wei-Shao Huang Wei Zhang Yi-Dong Huang 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第3期195-203,共9页
For a compact quantum key distribution (QKD) sender for the polarization encoding BB84 protocol, an eavesdropper could take a side-channel attack by measuring the spatial information of photons to infer their polariza... For a compact quantum key distribution (QKD) sender for the polarization encoding BB84 protocol, an eavesdropper could take a side-channel attack by measuring the spatial information of photons to infer their polarizations. The possibility of this attack can be reduced by introducing an aperture in the QKD sender, however, the effect of the aperture on the QKD security lacks of quantitative analysis. In this paper, we analyze the mutual information between the actual keys encoded at this QKD sender and the inferred keys at the eavesdropper (Eve), demonstrating the effect of the aperture to eliminate the spatial side-channel information quantitatively. It shows that Eve’s potential on eavesdropping spatial side-channel information is totally dependent on the optical design of the QKD sender, including the source arrangement and the aperture. The height of compact QKD senders with integrated light-emitting diode (LED) arrays could be controlled under several millimeters, showing great potential on applications in portable equipment. 展开更多
关键词 Diffraction-limited imaging system mutual INFORMATION quantum key distribution SPATIAL side-channel INFORMATION
下载PDF
Robustness Evaluation of Remote-Sensing Image Feature Detectors with TH Priori-Information Data Set
16
作者 Yiping Duan Xiaoming Tao +1 位作者 Xijia Liu Ning Ge 《China Communications》 SCIE CSCD 2020年第10期218-228,共11页
In this paper,we build a remote-sensing satellite imagery priori-information data set,and propose an approach to evaluate the robustness of remote-sensing image feature detectors.The building TH Priori-Information(TPI... In this paper,we build a remote-sensing satellite imagery priori-information data set,and propose an approach to evaluate the robustness of remote-sensing image feature detectors.The building TH Priori-Information(TPI)data set with 2297 remote sensing images serves as a standardized high-resolution data set for studies related to remote-sensing image features.The TPI contains 1)raw and calibrated remote-sensing images with high spatial and temporal resolutions(up to 2 m and 7 days,respectively),and 2)a built-in 3-D target area model that supports view position,view angle,lighting,shadowing,and other transformations.Based on TPI,we further present a quantized approach,including the feature recurrence rate,the feature match score,and the weighted feature robustness score,to evaluate the robustness of remote-sensing image feature detectors.The quantized approach gives general and objective assessments of the robustness of feature detectors under complex remote-sensing circumstances.Three remote-sensing image feature detectors,including scale-invariant feature transform(SIFT),speeded up robust features(SURF),and priori information based robust features(PIRF),are evaluated using the proposed approach on the TPI data set.Experimental results show that the robustness of PIRF outperforms others by over 6.2%. 展开更多
关键词 REMOTE-SENSING TH data set image feature robustness evaluation
下载PDF
Multi-Agent Deep Reinforcement Learning for Cross-Layer Scheduling in Mobile Ad-Hoc Networks
17
作者 Xinxing Zheng Yu Zhao +1 位作者 Joohyun Lee Wei Chen 《China Communications》 SCIE CSCD 2023年第8期78-88,共11页
Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus o... Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus on enabling congestion control to minimize network transmission delays through flexible power control.To effectively solve the congestion problem,we propose a distributed cross-layer scheduling algorithm,which is empowered by graph-based multi-agent deep reinforcement learning.The transmit power is adaptively adjusted in real-time by our algorithm based only on local information(i.e.,channel state information and queue length)and local communication(i.e.,information exchanged with neighbors).Moreover,the training complexity of the algorithm is low due to the regional cooperation based on the graph attention network.In the evaluation,we show that our algorithm can reduce the transmission delay of data flow under severe signal interference and drastically changing channel states,and demonstrate the adaptability and stability in different topologies.The method is general and can be extended to various types of topologies. 展开更多
关键词 Ad-hoc network cross-layer scheduling multi agent deep reinforcement learning interference elimination power control queue scheduling actorcritic methods markov decision process
下载PDF
Research on system combination of machine translation based on Transformer
18
作者 刘文斌 HE Yanqing +1 位作者 LAN Tian WU Zhenfeng 《High Technology Letters》 EI CAS 2023年第3期310-317,共8页
Influenced by its training corpus,the performance of different machine translation systems varies greatly.Aiming at achieving higher quality translations,system combination methods combine the translation results of m... Influenced by its training corpus,the performance of different machine translation systems varies greatly.Aiming at achieving higher quality translations,system combination methods combine the translation results of multiple systems through statistical combination or neural network combination.This paper proposes a new multi-system translation combination method based on the Transformer architecture,which uses a multi-encoder to encode source sentences and the translation results of each system in order to realize encoder combination and decoder combination.The experimental verification on the Chinese-English translation task shows that this method has 1.2-2.35 more bilingual evaluation understudy(BLEU)points compared with the best single system results,0.71-3.12 more BLEU points compared with the statistical combination method,and 0.14-0.62 more BLEU points compared with the state-of-the-art neural network combination method.The experimental results demonstrate the effectiveness of the proposed system combination method based on Transformer. 展开更多
关键词 TRANSFORMER system combination neural machine translation(NMT) attention mechanism multi-encoder
下载PDF
Blockchain-Based Privacy-Preserving Public Auditing for Group Shared Data
19
作者 Yining Qi Yubo Luo +1 位作者 Yongfeng Huang Xing Li 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2603-2618,共16页
Cloud storage has been widely used to team work or cooperation devel-opment.Data owners set up groups,generating and uploading their data to cloud storage,while other users in the groups download and make use of it,wh... Cloud storage has been widely used to team work or cooperation devel-opment.Data owners set up groups,generating and uploading their data to cloud storage,while other users in the groups download and make use of it,which is called group data sharing.As all kinds of cloud service,data group sharing also suffers from hardware/software failures and human errors.Provable Data Posses-sion(PDP)schemes are proposed to check the integrity of data stored in cloud without downloading.However,there are still some unmet needs lying in auditing group shared data.Researchers propose four issues necessary for a secure group shared data auditing:public verification,identity privacy,collusion attack resis-tance and traceability.However,none of the published work has succeeded in achieving all of these properties so far.In this paper,we propose a novel block-chain-based ring signature PDP scheme for group shared data,with an instance deployed on a cloud server.We design a linkable ring signature method called Linkable Homomorphic Authenticable Ring Signature(LHARS)to implement public anonymous auditing for group data.We also build smart contracts to resist collusion attack in group auditing.The security analysis and performance evalua-tion prove that our scheme is both secure and efficient. 展开更多
关键词 Provable data possession data integrity blockchain ring signature
下载PDF
The Roadmap of 2D Materials and Devices Toward Chips 被引量:4
20
作者 Anhan Liu Xiaowei Zhang +16 位作者 Ziyu Liu Yuning Li Xueyang Peng Xin Li Yue Qin Chen Hu Yanqing Qiu Han Jiang Yang Wang Yifan Li Jun Tang Jun Liu Hao Guo Tao Deng Songang Peng He Tian Tian‑Ling Ren 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第6期343-438,共96页
Due to the constraints imposed by physical effects and performance degra certain limitations in sustaining the advancement of Moore’s law.Two-dimensional(2D)materials have emerged as highly promising candidates for t... Due to the constraints imposed by physical effects and performance degra certain limitations in sustaining the advancement of Moore’s law.Two-dimensional(2D)materials have emerged as highly promising candidates for the post-Moore era,offering significant potential in domains such as integrated circuits and next-generation computing.Here,in this review,the progress of 2D semiconductors in process engineering and various electronic applications are summarized.A careful introduction of material synthesis,transistor engineering focused on device configuration,dielectric engineering,contact engineering,and material integration are given first.Then 2D transistors for certain electronic applications including digital and analog circuits,heterogeneous integration chips,and sensing circuits are discussed.Moreover,several promising applications(artificial intelligence chips and quantum chips)based on specific mechanism devices are introduced.Finally,the challenges for 2D materials encountered in achieving circuit-level or system-level applications are analyzed,and potential development pathways or roadmaps are further speculated and outlooked. 展开更多
关键词 Two-dimensional materials ROADMAP Integrated circuits Post-Moore era
下载PDF
上一页 1 2 15 下一页 到第
使用帮助 返回顶部