In the 1970s,cognitive psychology recognized that the information in the long-term memory is scene and semantic[1]and may be encoded in parallel as verbal and mental imagery[2].In 1991,I pointed out that not all verba...In the 1970s,cognitive psychology recognized that the information in the long-term memory is scene and semantic[1]and may be encoded in parallel as verbal and mental imagery[2].In 1991,I pointed out that not all verbal propositions can be derived from the verbal system,and that many can only be transformed from the imagery system[3].I have proposed the concept of visual knowledge,which consists of visual concepts,visual propositions,and visual narratives[4].Visual knowledge can simulate the various spatiotemporal operations that a person can perform on a mental imagery in his/her brain,such as the design process[5].展开更多
The problem of prescribed performance tracking control for unknown time-delay nonlinear systems subject to output constraints is dealt with in this paper. In contrast with related works, only the most fundamental requ...The problem of prescribed performance tracking control for unknown time-delay nonlinear systems subject to output constraints is dealt with in this paper. In contrast with related works, only the most fundamental requirements, i.e., boundedness and the local Lipschitz condition, are assumed for the allowable time delays. Moreover, we focus on the case where the reference is unknown beforehand, which renders the standard prescribed performance control designs under output constraints infeasible. To conquer these challenges, a novel robust prescribed performance control approach is put forward in this paper.Herein, a reverse tuning function is skillfully constructed and automatically generates a performance envelop for the tracking error. In addition, a unified performance analysis framework based on proof by contradiction and the barrier function is established to reveal the inherent robustness of the control system against the time delays. It turns out that the system output tracks the reference with a preassigned settling time and good accuracy,without constraint violations. A comparative simulation on a two-stage chemical reactor is carried out to illustrate the above theoretical findings.展开更多
Reducing the control error is vital for high-fidelity digital and analog quantum operations.In superconducting circuits,one disagreeable error arises from the reflection of microwave signals due to impedance mismatch ...Reducing the control error is vital for high-fidelity digital and analog quantum operations.In superconducting circuits,one disagreeable error arises from the reflection of microwave signals due to impedance mismatch in the control chain.Here,we demonstrate a reflection cancelation method when considering that there are two reflection nodes on the control line.We propose to generate the pre-distortion pulse by passing the envelopes of the microwave signal through digital filters,which enables real-time reflection correction when integrated into the field-programmable gate array(FPGA).We achieve a reduction of single-qubit gate infidelity from 0.67%to 0.11%after eliminating microwave reflection.Real-time correction of microwave reflection paves the way for precise control and manipulation of the qubit state and would ultimately enhance the performance of algorithms and simulations executed on quantum processors.展开更多
This paper presents a software turbo decoder on graphics processing units(GPU).Unlike previous works,the proposed decoding architecture for turbo codes mainly focuses on the Consultative Committee for Space Data Syste...This paper presents a software turbo decoder on graphics processing units(GPU).Unlike previous works,the proposed decoding architecture for turbo codes mainly focuses on the Consultative Committee for Space Data Systems(CCSDS)standard.However,the information frame lengths of the CCSDS turbo codes are not suitable for flexible sub-frame parallelism design.To mitigate this issue,we propose a padding method that inserts several bits before the information frame header.To obtain low-latency performance and high resource utilization,two-level intra-frame parallelisms and an efficient data structure are considered.The presented Max-Log-Map decoder can be adopted to decode the Long Term Evolution(LTE)turbo codes with only small modifications.The proposed CCSDS turbo decoder at 10 iterations on NVIDIA RTX3070 achieves about 150 Mbps and 50Mbps throughputs for the code rates 1/6 and 1/2,respectively.展开更多
The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections an...The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections and convergence.In this paper,with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness,this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration.Due to the conflict between the utility of different flows,the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward functions.Regarding the tradeoff between fairness and utility,this paper deals with the corresponding reward functions for the cases where the flows undergo abrupt changes and smooth changes in the flows.In addition,to accommodate the Quality of Service(QoS)requirements for multiple types of flows,this paper proposes a multi-domain autonomous routing algorithm called LSTM+MADDPG.Introducing a Long Short-Term Memory(LSTM)layer in the actor and critic networks,more information about temporal continuity is added,further enhancing the adaptive ability changes in the dynamic network environment.The LSTM+MADDPG algorithm is compared with the latest reinforcement learning algorithm by conducting experiments on real network topology and traffic traces,and the experimental results show that LSTM+MADDPG improves the delay convergence speed by 14.6%and delays the start moment of packet loss by 18.2%compared with other algorithms.展开更多
This paper presents the design,calibration,and survey strategy of the Fast Radio Burst(FRB)digital backend and its real-time data processing pipeline employed in the Tianlai Cylinder Pathfinder Array.The array,consist...This paper presents the design,calibration,and survey strategy of the Fast Radio Burst(FRB)digital backend and its real-time data processing pipeline employed in the Tianlai Cylinder Pathfinder Array.The array,consisting of three parallel cylindrical reflectors and equipped with 96 dual-polarization feeds,is a radio interferometer array designed for conducting drift scans of the northern celestial semi-sphere.The FRB digital backend enables the formation of 96 digital beams,effectively covering an area of approximately 40 square degrees with the 3 dB beam.Our pipeline demonstrates the capability to conduct an automatic search of FRBs,detecting at quasi-realtime and classifying FRB candidates automatically.The current FRB searching pipeline has an overall recall rate of88%.During the commissioning phase,we successfully detected signals emitted by four well-known pulsars:PSR B0329+54,B2021+51,B0823+26,and B2020+28.We report the first discovery of an FRB by our array,designated as FRB 20220414A.We also investigate the optimal arrangement for the digitally formed beams to achieve maximum detection rate by numerical simulation.展开更多
In this paper,a new distributed consensus tracking protocol incorporating local disturbance rejection is devised for a multi-agent system with heterogeneous dynamic uncertainties and disturbances over a directed graph...In this paper,a new distributed consensus tracking protocol incorporating local disturbance rejection is devised for a multi-agent system with heterogeneous dynamic uncertainties and disturbances over a directed graph.It is of two-degree-of-freedom nature.Specifically,a robust distributed controller is designed for consensus tracking,while a local disturbance estimator is designed for each agent without requiring the input channel information of disturbances.The condition for asymptotic disturbance rejection is derived.Moreover,even when the disturbance model is not exactly known,the developed method also provides good disturbance-rejection performance.Then,a robust stabilization condition with less conservativeness is derived for the whole multi-agent system.Further,a design algorithm is given.Finally,comparisons with the conventional one-degree-of-freedombased distributed disturbance-rejection method for mismatched disturbances and the distributed extended-state observer for matched disturbances validate the developed method.展开更多
This paper proposes a method for detecting a helmet for thesafety of workers from risk factors and a mask worn indoors and verifying aworker’s identity while wearing a helmet and mask for security. The proposedmethod...This paper proposes a method for detecting a helmet for thesafety of workers from risk factors and a mask worn indoors and verifying aworker’s identity while wearing a helmet and mask for security. The proposedmethod consists of a part for detecting the worker’s helmet and mask and apart for verifying the worker’s identity. An algorithm for helmet and maskdetection is generated by transfer learning of Yolov5’s s-model and m-model.Both models are trained by changing the learning rate, batch size, and epoch.The model with the best performance is selected as the model for detectingmasks and helmets. At a learning rate of 0.001, a batch size of 32, and anepoch of 200, the s-model showed the best performance with a mAP of0.954, and this was selected as an optimal model. The worker’s identificationalgorithm consists of a facial feature extraction part and a classifier partfor the worker’s identification. The algorithm for facial feature extraction isgenerated by transfer learning of Facenet, and SVMis used as the classifier foridentification. The proposed method makes trained models using two datasets,a masked face dataset with only a masked face, and a mixed face datasetwith both a masked face and an unmasked face. And the model with the bestperformance among the trained models was selected as the optimal model foridentification when using a mask. As a result of the experiment, the model bytransfer learning of Facenet and SVM using a mixed face dataset showed thebest performance. When the optimal model was tested with a mixed dataset,it showed an accuracy of 95.4%. Also, the proposed model was evaluated asdata from 500 images of taking 10 people with a mobile phone. The resultsshowed that the helmet and mask were detected well and identification wasalso good.展开更多
Traditional Chinese Medicine(TCM)is one of the most promising programs for disease prevention and treatment.Meanwhile,the quality of TCM has garnered much attention.To ensure the quality of TCM,many works are based on...Traditional Chinese Medicine(TCM)is one of the most promising programs for disease prevention and treatment.Meanwhile,the quality of TCM has garnered much attention.To ensure the quality of TCM,many works are based on the blockchain scheme to design the traceability scheme of TCM to trace its origin.Although these schemes can ensure the integrity,sharability,credibility,and immutability of TCM more effectively,many problems are exposed with the rapid growth of TCM data in blockchains,such as expensive overhead,performance bottlenecks,and the traditional blockchain architecture is unsuitable for TCM data with dynamic growth.Motivated by the aforementioned problems,we propose a novel and lightweight TCM traceability architecture based on the blockchain using sharding(LBS-TCM).Compared to the existing blockchain-based TCM traceability system,our architecture utilizes sharding to develop a novel traceability mechanism that supports more convenient traceability operations for TCM requirements such as uploading,querying,and downloading.Specifically,our architecture consists of a leader shard blockchain layer as its main component,which employs a sharding mechanism to conveniently TCM tracing.Empirical evaluations demonstrated that our architecture showed better performance in many aspects compared to traditional blockchain architectures,such as TCM transaction processing,TCM transaction querying,TCM uploading,etc.In our architecture,tracing TCM has become a very efficient operation,which ensures the quality of TCM and provides great convenience for subsequent TCM analysis and retrospective research.展开更多
Dear Editor,This letter proposes a robust control strategy for the autonomous landing of a quadrotor on a moving target.Specifically,a force command that consists of a cascade dynamics estimator and an optimal guarant...Dear Editor,This letter proposes a robust control strategy for the autonomous landing of a quadrotor on a moving target.Specifically,a force command that consists of a cascade dynamics estimator and an optimal guaranteed cost control law is exploited for the position-loop tracking.Then,an orientation constraint torque command is employed for the attitude-loop tracking such that the quadrotor refrains from flipping during the landing operation.展开更多
This paper presents a dynamic model and performance constraint control of a line-driven soft robotic arm.The dynamics model of the soft robotic arm is established by combining the screw theory and the Cosserat theory....This paper presents a dynamic model and performance constraint control of a line-driven soft robotic arm.The dynamics model of the soft robotic arm is established by combining the screw theory and the Cosserat theory.The unmodeled dynamics of the system are considered,and an adaptive neural network controller is designed using the backstepping method and radial basis function neural network.The stability of the closed-loop system and the boundedness of the tracking error are verified using Lyapunov theory.The simulation results show that our approach is a good solution to the motion constraint problem of the line-driven soft robotic arm.展开更多
Powder hot isostatic pressing(HIP) is an effective method to achieve near-net-shape manufacturing of high-quality complex thinwalled titanium alloy parts, and it has received extensive attention in recent years. Howev...Powder hot isostatic pressing(HIP) is an effective method to achieve near-net-shape manufacturing of high-quality complex thinwalled titanium alloy parts, and it has received extensive attention in recent years. However, there are few reports about the microstructure characteristics on the strengthening and toughening mechanisms of powder hot isostatic pressed(HIPed) titanium alloys. Therefore, TA15powder was prepared into alloy by HIP approach, which was used to explore the microstructure characteristics at different HIP temperatures and the corresponding tensile properties and fracture toughness. Results show that the fabricated alloy has a “basket-like structure” when the HIP temperature is below 950℃, consisting of lath clusters and surrounding small equiaxed grains belts. When the HIP temperature is higher than 950℃, the microstructure gradually transforms into the Widmanstatten structure, accompanied by a significant increase in grain size. The tensile strength and elongation are reduced from 948 MPa and 17.3% for the 910℃ specimen to 861 MPa and 10% for the 970℃ specimen.The corresponding tensile fracture mode changes from transcrystalline plastic fracture to mixed fracture including intercrystalline cleavage.The fracture toughness of the specimens increases from 82.64 MPa·m^(1/2)for the 910℃ specimen to 140.18 MPa·m^(1/2)for the 970℃ specimen.Specimens below 950℃ tend to form holes due to the prior particle boundaries(PPBs), which is not conducive to toughening. Specimens above 950℃ have high fracture toughness due to the crack deflection, crack branching, and shear plastic deformation of the Widmanstatten structure. This study provides a valid reference for the development of powder HIPed titanium alloy.展开更多
The state of charge(SOC)estimation of lithium-ion battery is an important function in the battery management system(BMS)of electric vehicles.The long short term memory(LSTM)model can be employed for SOC estimation,whi...The state of charge(SOC)estimation of lithium-ion battery is an important function in the battery management system(BMS)of electric vehicles.The long short term memory(LSTM)model can be employed for SOC estimation,which is capable of estimating the future changing states of a nonlinear system.Since the BMS usually works under complicated operating conditions,i.e the real measurement data used for model training may be corrupted by non-Gaussian noise,and thus the performance of the original LSTM with the mean square error(MSE)loss may deteriorate.Therefore,a novel LSTM with mixture kernel mean p-power error(MKMPE)loss,called MKMPE-LSTM,is developed by using the MKMPE loss to replace the MSE as the learning criterion in LSTM framework,which can achieve robust SOC estimation under the measurement data contaminated with non-Gaussian noises(or outliers)because of the MKMPE containing the p-order moments of the error distribution.In addition,a meta-heuristic algorithm,called heap-based-optimizer(HBO),is employed to optimize the hyper-parameters(mainly including learning rate,number of hidden layer neuron and value of p in MKMPE)of the proposed MKMPE-LSTM model to further improve its flexibility and generalization performance,and a novel hybrid model(HBO-MKMPE-LSTM)is established for SOC estimation under non-Gaussian noise cases.Finally,several tests are performed under various cases through a benchmark to evaluate the performance of the proposed HBO-MKMPE-LSTM model,and the results demonstrate that the proposed hybrid method can provide a good robustness and accuracy under different non-Gaussian measurement noises,and the SOC estimation results in terms of mean square error(MSE),root MSE(RMSE),mean absolute relative error(MARE),and determination coefficient R2are less than 0.05%,3%,3%,and above 99.8%at 25℃,respectively.展开更多
The prognostics health management(PHM)fromthe systematic viewis critical to the healthy continuous operation of processmanufacturing systems(PMS),with different kinds of dynamic interference events.This paper proposes...The prognostics health management(PHM)fromthe systematic viewis critical to the healthy continuous operation of processmanufacturing systems(PMS),with different kinds of dynamic interference events.This paper proposes a three leveled digital twinmodel for the systematic PHMof PMSs.The unit-leveled digital twinmodel of each basic device unit of PMSs is constructed based on edge computing,which can provide real-time monitoring and analysis of the device status.The station-leveled digital twin models in the PMSs are designed to optimize and control the process parameters,which are deployed for the manufacturing execution on the fog server.The shop-leveled digital twin maintenancemodel is designed for production planning,which gives production instructions fromthe private industrial cloud server.To cope with the dynamic disturbances of a PMS,a big data-driven framework is proposed to control the three-level digital twin models,which contains indicator prediction,influence evaluation,and decisionmaking.Finally,a case study with a real chemical fiber system is introduced to illustrate the effectiveness of the digital twin model with edge-fog-cloud computing for the systematic PHM of PMSs.The result demonstrates that the three-leveled digital twin model for the systematic PHM in PMSs works well in the system’s respects.展开更多
Helicopter systems present numerous benefits over fixed-wing aircraft in several fields of application.Developing control schemes for improving the tracking accuracy of such systems is crucial.This paper proposes a ne...Helicopter systems present numerous benefits over fixed-wing aircraft in several fields of application.Developing control schemes for improving the tracking accuracy of such systems is crucial.This paper proposes a neural-network(NN)-based adaptive finite-time control for a two-degree-of-freedom helicopter system.In particular,a radial basis function NN is adopted to solve uncertainty in the helicopter system.Furthermore,an event-triggering mechanism(ETM)with a switching threshold is proposed to alleviate the communication burden on the system.By proposing an adaptive parameter,a bounded estimation,and a smooth function approach,the effect of network measurement errors is effectively compensated for while simultaneously avoiding the Zeno phenomenon.Additionally,the developed adaptive finite-time control technique based on an NN guarantees finitetime convergence of the tracking error,thus enhancing the control accuracy of the system.In addition,the Lyapunov direct method demonstrates that the closed-loop system is semiglobally finite-time stable.Finally,simulation and experimental results show the effectiveness of the control strategy.展开更多
The current research on noncircular hobbing mainly focuses on the linkage model and motion realization.However,the intermittent cutting characteristics of hobbing would increase uncertainties in the manufacturing proc...The current research on noncircular hobbing mainly focuses on the linkage model and motion realization.However,the intermittent cutting characteristics of hobbing would increase uncertainties in the manufacturing process.In this paper,a hobbing machining model with tool-shifting characteristics was proposed to solve the problems of cutting force fluctuation and inconsistency of tooth profile envelope accuracy at different positions of the pitch curve in noncircular gear hobbing.Based on the unit cutting force coefficient method,the undeformed chip volume generated by interrupted cutting was used to characterize the fluctuation trend of the hobbing force.The fluctuation characteristics of the cutting force generated by different hobbing models were compared and analyzed.Using the equivalent gear tooth and hob slotting numbers,an analysis model of the tooth profile envelope error of the noncircular gear was constructed.Subsequently,the tooth profile envelope errors at different positions of the pitch curve were compared and analyzed based on the constructed model.The transmission structure of the electronic gearbox was constructed based on the proposed hobbing model,and the hobbing experiment was conducted based on the selfdeveloped noncircular gear CNC hobbing system.This paper proposes a hobbing method that can effectively suppress the fluctuation of the peak and whole circumference cutting force and reduce the maximum envelope error of the whole circumference gear teeth.展开更多
Belief propagation(BP)decoding outputs soft information and can be naturally used in iterative receivers.BP list(BPL)decoding provides comparable error-correction performance to the successive cancellation list(SCL)de...Belief propagation(BP)decoding outputs soft information and can be naturally used in iterative receivers.BP list(BPL)decoding provides comparable error-correction performance to the successive cancellation list(SCL)decoding.In this paper,we firstly introduce an enhanced code construction scheme for BPL decoding to improve its errorcorrection capability.Then,a GPU-based BPL decoder with adoption of the new code construction is presented.Finally,the proposed BPL decoder is tested on NVIDIA RTX3070 and GTX1060.Experimental results show that the presented BPL decoder with early termination criterion achieves above 1 Gbps throughput on RTX3070 for the code(1024,512)with 32 lists under good channel conditions.展开更多
Due to the recent trend of software intelligence in the Fourth Industrial Revolution,deep learning has become a mainstream workload for modern computer systems.Since the data size of deep learning increasingly grows,m...Due to the recent trend of software intelligence in the Fourth Industrial Revolution,deep learning has become a mainstream workload for modern computer systems.Since the data size of deep learning increasingly grows,managing the limited memory capacity efficiently for deep learning workloads becomes important.In this paper,we analyze memory accesses in deep learning workloads and find out some unique characteristics differentiated from traditional workloads.First,when comparing instruction and data accesses,data access accounts for 96%–99%of total memory accesses in deep learning workloads,which is quite different from traditional workloads.Second,when comparing read and write accesses,write access dominates,accounting for 64%–80%of total memory accesses.Third,although write access makes up the majority of memory accesses,it shows a low access bias of 0.3 in the Zipf parameter.Fourth,in predicting re-access,recency is important in read access,but frequency provides more accurate information in write access.Based on these observations,we introduce a Non-Volatile Random Access Memory(NVRAM)-accelerated memory architecture for deep learning workloads,and present a new memory management policy for this architecture.By considering the memory access characteristics of deep learning workloads,the proposed policy improves memory performance by 64.3%on average compared to the CLOCK policy.展开更多
Real-world networks exhibit complex topological interactions that pose a significant computational challenge to analyses of such networks.Due to limited resources,there is an urgent need to develop dimensionality redu...Real-world networks exhibit complex topological interactions that pose a significant computational challenge to analyses of such networks.Due to limited resources,there is an urgent need to develop dimensionality reduction techniques that can significantly reduce the structural complexity of initial large-scale networks.In this paper,we propose a subgraph extraction method based on the node centrality measure to reduce the size of the initial network topology.Specifically,nodes with smaller centrality value are removed from the initial network to obtain a subgraph with a smaller size.Our results demonstrate that various real-world networks,including power grids,technology,transportation,biology,social,and language networks,exhibit self-similarity behavior during the reduction process.The present results reveal the selfsimilarity and scale invariance of real-world networks from a different perspective and also provide an effective guide for simplifying the topology of large-scale networks.展开更多
文摘In the 1970s,cognitive psychology recognized that the information in the long-term memory is scene and semantic[1]and may be encoded in parallel as verbal and mental imagery[2].In 1991,I pointed out that not all verbal propositions can be derived from the verbal system,and that many can only be transformed from the imagery system[3].I have proposed the concept of visual knowledge,which consists of visual concepts,visual propositions,and visual narratives[4].Visual knowledge can simulate the various spatiotemporal operations that a person can perform on a mental imagery in his/her brain,such as the design process[5].
基金supported in part by the National Natural Science Foundation of China (62103093)the National Key Research and Development Program of China (2022YFB3305905)+6 种基金the Xingliao Talent Program of Liaoning Province of China (XLYC2203130)the Fundamental Research Funds for the Central Universities of China (N2108003)the Natural Science Foundation of Liaoning Province (2023-MS-087)the BNU Talent Seed Fund,UIC Start-Up Fund (R72021115)the Guangdong Key Laboratory of AI and MM Data Processing (2020KSYS007)the Guangdong Provincial Key Laboratory IRADS for Data Science (2022B1212010006)the Guangdong Higher Education Upgrading Plan 2021–2025 of “Rushing to the Top,Making Up Shortcomings and Strengthening Special Features” with UIC Research,China (R0400001-22,R0400025-21)。
文摘The problem of prescribed performance tracking control for unknown time-delay nonlinear systems subject to output constraints is dealt with in this paper. In contrast with related works, only the most fundamental requirements, i.e., boundedness and the local Lipschitz condition, are assumed for the allowable time delays. Moreover, we focus on the case where the reference is unknown beforehand, which renders the standard prescribed performance control designs under output constraints infeasible. To conquer these challenges, a novel robust prescribed performance control approach is put forward in this paper.Herein, a reverse tuning function is skillfully constructed and automatically generates a performance envelop for the tracking error. In addition, a unified performance analysis framework based on proof by contradiction and the barrier function is established to reveal the inherent robustness of the control system against the time delays. It turns out that the system output tracks the reference with a preassigned settling time and good accuracy,without constraint violations. A comparative simulation on a two-stage chemical reactor is carried out to illustrate the above theoretical findings.
基金the National Natural Science Foun-dation of China(Grant Nos.12034018 and 11625419).
文摘Reducing the control error is vital for high-fidelity digital and analog quantum operations.In superconducting circuits,one disagreeable error arises from the reflection of microwave signals due to impedance mismatch in the control chain.Here,we demonstrate a reflection cancelation method when considering that there are two reflection nodes on the control line.We propose to generate the pre-distortion pulse by passing the envelopes of the microwave signal through digital filters,which enables real-time reflection correction when integrated into the field-programmable gate array(FPGA).We achieve a reduction of single-qubit gate infidelity from 0.67%to 0.11%after eliminating microwave reflection.Real-time correction of microwave reflection paves the way for precise control and manipulation of the qubit state and would ultimately enhance the performance of algorithms and simulations executed on quantum processors.
基金supported by the Fundamental Research Funds for the Central Universities(FRF-TP20-062A1)Guangdong Basic and Applied Basic Research Foundation(2021A1515110070)。
文摘This paper presents a software turbo decoder on graphics processing units(GPU).Unlike previous works,the proposed decoding architecture for turbo codes mainly focuses on the Consultative Committee for Space Data Systems(CCSDS)standard.However,the information frame lengths of the CCSDS turbo codes are not suitable for flexible sub-frame parallelism design.To mitigate this issue,we propose a padding method that inserts several bits before the information frame header.To obtain low-latency performance and high resource utilization,two-level intra-frame parallelisms and an efficient data structure are considered.The presented Max-Log-Map decoder can be adopted to decode the Long Term Evolution(LTE)turbo codes with only small modifications.The proposed CCSDS turbo decoder at 10 iterations on NVIDIA RTX3070 achieves about 150 Mbps and 50Mbps throughputs for the code rates 1/6 and 1/2,respectively.
文摘The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections and convergence.In this paper,with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness,this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration.Due to the conflict between the utility of different flows,the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward functions.Regarding the tradeoff between fairness and utility,this paper deals with the corresponding reward functions for the cases where the flows undergo abrupt changes and smooth changes in the flows.In addition,to accommodate the Quality of Service(QoS)requirements for multiple types of flows,this paper proposes a multi-domain autonomous routing algorithm called LSTM+MADDPG.Introducing a Long Short-Term Memory(LSTM)layer in the actor and critic networks,more information about temporal continuity is added,further enhancing the adaptive ability changes in the dynamic network environment.The LSTM+MADDPG algorithm is compared with the latest reinforcement learning algorithm by conducting experiments on real network topology and traffic traces,and the experimental results show that LSTM+MADDPG improves the delay convergence speed by 14.6%and delays the start moment of packet loss by 18.2%compared with other algorithms.
基金support of the National SKA program of China(Nos.2022SKA0110100 and 2022SKA0110101)the National Natural Science Foundation of China(NSFC,Grant Nos.1236114814,12203061,12273070,and 12303004)。
文摘This paper presents the design,calibration,and survey strategy of the Fast Radio Burst(FRB)digital backend and its real-time data processing pipeline employed in the Tianlai Cylinder Pathfinder Array.The array,consisting of three parallel cylindrical reflectors and equipped with 96 dual-polarization feeds,is a radio interferometer array designed for conducting drift scans of the northern celestial semi-sphere.The FRB digital backend enables the formation of 96 digital beams,effectively covering an area of approximately 40 square degrees with the 3 dB beam.Our pipeline demonstrates the capability to conduct an automatic search of FRBs,detecting at quasi-realtime and classifying FRB candidates automatically.The current FRB searching pipeline has an overall recall rate of88%.During the commissioning phase,we successfully detected signals emitted by four well-known pulsars:PSR B0329+54,B2021+51,B0823+26,and B2020+28.We report the first discovery of an FRB by our array,designated as FRB 20220414A.We also investigate the optimal arrangement for the digitally formed beams to achieve maximum detection rate by numerical simulation.
基金supported by the National Natural Science Foundation of China(62003010,61873006,61673053)the Beijing Postdoctoral Research Foundation(Q6041001202001)+1 种基金the Postdoctoral Research Foundation of Chaoyang District(Q1041001202101)the National Key Research and Development Project(2018YFC1602704,2018YFB1702704)。
文摘In this paper,a new distributed consensus tracking protocol incorporating local disturbance rejection is devised for a multi-agent system with heterogeneous dynamic uncertainties and disturbances over a directed graph.It is of two-degree-of-freedom nature.Specifically,a robust distributed controller is designed for consensus tracking,while a local disturbance estimator is designed for each agent without requiring the input channel information of disturbances.The condition for asymptotic disturbance rejection is derived.Moreover,even when the disturbance model is not exactly known,the developed method also provides good disturbance-rejection performance.Then,a robust stabilization condition with less conservativeness is derived for the whole multi-agent system.Further,a design algorithm is given.Finally,comparisons with the conventional one-degree-of-freedombased distributed disturbance-rejection method for mismatched disturbances and the distributed extended-state observer for matched disturbances validate the developed method.
基金supported by a grant (20015427)of Regional Customized Disaster-Safety R&D Programfunded by Ministry of Interior and Safety (MOIS,Korea)was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF)funded by the Ministry of Education (No.2022R1A6A1A03052954).
文摘This paper proposes a method for detecting a helmet for thesafety of workers from risk factors and a mask worn indoors and verifying aworker’s identity while wearing a helmet and mask for security. The proposedmethod consists of a part for detecting the worker’s helmet and mask and apart for verifying the worker’s identity. An algorithm for helmet and maskdetection is generated by transfer learning of Yolov5’s s-model and m-model.Both models are trained by changing the learning rate, batch size, and epoch.The model with the best performance is selected as the model for detectingmasks and helmets. At a learning rate of 0.001, a batch size of 32, and anepoch of 200, the s-model showed the best performance with a mAP of0.954, and this was selected as an optimal model. The worker’s identificationalgorithm consists of a facial feature extraction part and a classifier partfor the worker’s identification. The algorithm for facial feature extraction isgenerated by transfer learning of Facenet, and SVMis used as the classifier foridentification. The proposed method makes trained models using two datasets,a masked face dataset with only a masked face, and a mixed face datasetwith both a masked face and an unmasked face. And the model with the bestperformance among the trained models was selected as the optimal model foridentification when using a mask. As a result of the experiment, the model bytransfer learning of Facenet and SVM using a mixed face dataset showed thebest performance. When the optimal model was tested with a mixed dataset,it showed an accuracy of 95.4%. Also, the proposed model was evaluated asdata from 500 images of taking 10 people with a mobile phone. The resultsshowed that the helmet and mask were detected well and identification wasalso good.
基金supported by the research and innovation program for graduate students of the Guangzhou University of Traditional Chinese MedicineThis work is also partially supported by the National Key Research and Development Program of China(2019YFC1710402)the research on tracing TCM Electronic Medical Records Based on the Lightweight Blockchain of Guangdong Provincial Bureau of Traditional Chinese Medicine(20222045).
文摘Traditional Chinese Medicine(TCM)is one of the most promising programs for disease prevention and treatment.Meanwhile,the quality of TCM has garnered much attention.To ensure the quality of TCM,many works are based on the blockchain scheme to design the traceability scheme of TCM to trace its origin.Although these schemes can ensure the integrity,sharability,credibility,and immutability of TCM more effectively,many problems are exposed with the rapid growth of TCM data in blockchains,such as expensive overhead,performance bottlenecks,and the traditional blockchain architecture is unsuitable for TCM data with dynamic growth.Motivated by the aforementioned problems,we propose a novel and lightweight TCM traceability architecture based on the blockchain using sharding(LBS-TCM).Compared to the existing blockchain-based TCM traceability system,our architecture utilizes sharding to develop a novel traceability mechanism that supports more convenient traceability operations for TCM requirements such as uploading,querying,and downloading.Specifically,our architecture consists of a leader shard blockchain layer as its main component,which employs a sharding mechanism to conveniently TCM tracing.Empirical evaluations demonstrated that our architecture showed better performance in many aspects compared to traditional blockchain architectures,such as TCM transaction processing,TCM transaction querying,TCM uploading,etc.In our architecture,tracing TCM has become a very efficient operation,which ensures the quality of TCM and provides great convenience for subsequent TCM analysis and retrospective research.
基金supported in part by the Future Innovation Research Funds of Ulsan National Institute of Science and Technology,Development of Drone System for Ship and Marine Mission(1.220025.01)of Institute of Civil-Military Technology Cooperation(2.200021.01)the National Research Foundation of Korea grant funded by the Korea Government(MSIT)(2020R1F1A 1075857)+2 种基金Basic Science Research Program through the National Research Foundation of Korea funded by the Ministry of Education(2020R1A6A1A03040570)Beijing Institute of Technology Research Fund Program for Young Scholarsthe National Natural Science Foundation of China(62203054)。
文摘Dear Editor,This letter proposes a robust control strategy for the autonomous landing of a quadrotor on a moving target.Specifically,a force command that consists of a cascade dynamics estimator and an optimal guaranteed cost control law is exploited for the position-loop tracking.Then,an orientation constraint torque command is employed for the attitude-loop tracking such that the quadrotor refrains from flipping during the landing operation.
基金supported by the National Natural Science Foundation of China(62103039,62073030)the Scientific and Technological Innovation Foundation of Shunde Graduate School+8 种基金University of Science and Technology Beijing(USTB)(BK21BF003)the Korea Institute of Energy Technology Evaluation and Planning through the Auspices of the Ministry of TradeIndustry and EnergyRepublic of Korea(20213030020160)the Science and Technology Planning Project of Guangzhou City(202102010398,202201010758)the Guangzhou University-Hong Kong University of Science and Technology Joint Research Collaboration Fund(YH202205)Beijing Top Discipline for Artificial Intelligent Science and EngineeringUniversity of Science and Technology Beijing。
文摘This paper presents a dynamic model and performance constraint control of a line-driven soft robotic arm.The dynamics model of the soft robotic arm is established by combining the screw theory and the Cosserat theory.The unmodeled dynamics of the system are considered,and an adaptive neural network controller is designed using the backstepping method and radial basis function neural network.The stability of the closed-loop system and the boundedness of the tracking error are verified using Lyapunov theory.The simulation results show that our approach is a good solution to the motion constraint problem of the line-driven soft robotic arm.
基金financially supported by the National Natural Science Foundation of China (Nos. 51874037 and 51922004)the Beijing Natural Science Foundation (No. 2212035)+1 种基金the Fundamental Research Funds for the Central Universities (No. FRF-TP-19005C1Z)the National Defense Basic Research Project (No. JCKY2017213004)。
文摘Powder hot isostatic pressing(HIP) is an effective method to achieve near-net-shape manufacturing of high-quality complex thinwalled titanium alloy parts, and it has received extensive attention in recent years. However, there are few reports about the microstructure characteristics on the strengthening and toughening mechanisms of powder hot isostatic pressed(HIPed) titanium alloys. Therefore, TA15powder was prepared into alloy by HIP approach, which was used to explore the microstructure characteristics at different HIP temperatures and the corresponding tensile properties and fracture toughness. Results show that the fabricated alloy has a “basket-like structure” when the HIP temperature is below 950℃, consisting of lath clusters and surrounding small equiaxed grains belts. When the HIP temperature is higher than 950℃, the microstructure gradually transforms into the Widmanstatten structure, accompanied by a significant increase in grain size. The tensile strength and elongation are reduced from 948 MPa and 17.3% for the 910℃ specimen to 861 MPa and 10% for the 970℃ specimen.The corresponding tensile fracture mode changes from transcrystalline plastic fracture to mixed fracture including intercrystalline cleavage.The fracture toughness of the specimens increases from 82.64 MPa·m^(1/2)for the 910℃ specimen to 140.18 MPa·m^(1/2)for the 970℃ specimen.Specimens below 950℃ tend to form holes due to the prior particle boundaries(PPBs), which is not conducive to toughening. Specimens above 950℃ have high fracture toughness due to the crack deflection, crack branching, and shear plastic deformation of the Widmanstatten structure. This study provides a valid reference for the development of powder HIPed titanium alloy.
基金supported by the National Key R.D Program of China(2021YFB2401904)the Joint Fund project of the National Natural Science Foundation of China(U21A20485)+1 种基金the National Natural Science Foundation of China(61976175)the Key Laboratory Project of Shaanxi Provincial Education Department Scientific Research Projects(20JS109)。
文摘The state of charge(SOC)estimation of lithium-ion battery is an important function in the battery management system(BMS)of electric vehicles.The long short term memory(LSTM)model can be employed for SOC estimation,which is capable of estimating the future changing states of a nonlinear system.Since the BMS usually works under complicated operating conditions,i.e the real measurement data used for model training may be corrupted by non-Gaussian noise,and thus the performance of the original LSTM with the mean square error(MSE)loss may deteriorate.Therefore,a novel LSTM with mixture kernel mean p-power error(MKMPE)loss,called MKMPE-LSTM,is developed by using the MKMPE loss to replace the MSE as the learning criterion in LSTM framework,which can achieve robust SOC estimation under the measurement data contaminated with non-Gaussian noises(or outliers)because of the MKMPE containing the p-order moments of the error distribution.In addition,a meta-heuristic algorithm,called heap-based-optimizer(HBO),is employed to optimize the hyper-parameters(mainly including learning rate,number of hidden layer neuron and value of p in MKMPE)of the proposed MKMPE-LSTM model to further improve its flexibility and generalization performance,and a novel hybrid model(HBO-MKMPE-LSTM)is established for SOC estimation under non-Gaussian noise cases.Finally,several tests are performed under various cases through a benchmark to evaluate the performance of the proposed HBO-MKMPE-LSTM model,and the results demonstrate that the proposed hybrid method can provide a good robustness and accuracy under different non-Gaussian measurement noises,and the SOC estimation results in terms of mean square error(MSE),root MSE(RMSE),mean absolute relative error(MARE),and determination coefficient R2are less than 0.05%,3%,3%,and above 99.8%at 25℃,respectively.
基金supported by the Fundamental Research Funds for The Central Universities(Grant No.2232021A-08)National Natural Science Foundation of China(GrantNo.51905091)Shanghai Sailing Program(Grand No.19YF1401500).
文摘The prognostics health management(PHM)fromthe systematic viewis critical to the healthy continuous operation of processmanufacturing systems(PMS),with different kinds of dynamic interference events.This paper proposes a three leveled digital twinmodel for the systematic PHMof PMSs.The unit-leveled digital twinmodel of each basic device unit of PMSs is constructed based on edge computing,which can provide real-time monitoring and analysis of the device status.The station-leveled digital twin models in the PMSs are designed to optimize and control the process parameters,which are deployed for the manufacturing execution on the fog server.The shop-leveled digital twin maintenancemodel is designed for production planning,which gives production instructions fromthe private industrial cloud server.To cope with the dynamic disturbances of a PMS,a big data-driven framework is proposed to control the three-level digital twin models,which contains indicator prediction,influence evaluation,and decisionmaking.Finally,a case study with a real chemical fiber system is introduced to illustrate the effectiveness of the digital twin model with edge-fog-cloud computing for the systematic PHM of PMSs.The result demonstrates that the three-leveled digital twin model for the systematic PHM in PMSs works well in the system’s respects.
基金supported in part by the National Natural Science Foundation of China(62273112,62061160371,61933001,51905115)the Science and Technology Planning Project of Guangzhou City(202201010758)+2 种基金the Guangzhou University-Hong Kong University of Science and Technology Joint Research Collaboration Fund(YH202205)the Open Research Fund from the Guangdong Laboratory of Artificial Intelligence and Digital Economy(Shenzhen(SZ))(GML-KF-22-27)the Korea Institute of Energy Technology Evaluation and Planning Through the Auspices of the Ministry of Trade,Industry and Energy,Republic of Korea(20213030020160)。
文摘Helicopter systems present numerous benefits over fixed-wing aircraft in several fields of application.Developing control schemes for improving the tracking accuracy of such systems is crucial.This paper proposes a neural-network(NN)-based adaptive finite-time control for a two-degree-of-freedom helicopter system.In particular,a radial basis function NN is adopted to solve uncertainty in the helicopter system.Furthermore,an event-triggering mechanism(ETM)with a switching threshold is proposed to alleviate the communication burden on the system.By proposing an adaptive parameter,a bounded estimation,and a smooth function approach,the effect of network measurement errors is effectively compensated for while simultaneously avoiding the Zeno phenomenon.Additionally,the developed adaptive finite-time control technique based on an NN guarantees finitetime convergence of the tracking error,thus enhancing the control accuracy of the system.In addition,the Lyapunov direct method demonstrates that the closed-loop system is semiglobally finite-time stable.Finally,simulation and experimental results show the effectiveness of the control strategy.
基金Supported by National Natural Science Foundation of China(Grant Nos.52075142 and U22B2084).
文摘The current research on noncircular hobbing mainly focuses on the linkage model and motion realization.However,the intermittent cutting characteristics of hobbing would increase uncertainties in the manufacturing process.In this paper,a hobbing machining model with tool-shifting characteristics was proposed to solve the problems of cutting force fluctuation and inconsistency of tooth profile envelope accuracy at different positions of the pitch curve in noncircular gear hobbing.Based on the unit cutting force coefficient method,the undeformed chip volume generated by interrupted cutting was used to characterize the fluctuation trend of the hobbing force.The fluctuation characteristics of the cutting force generated by different hobbing models were compared and analyzed.Using the equivalent gear tooth and hob slotting numbers,an analysis model of the tooth profile envelope error of the noncircular gear was constructed.Subsequently,the tooth profile envelope errors at different positions of the pitch curve were compared and analyzed based on the constructed model.The transmission structure of the electronic gearbox was constructed based on the proposed hobbing model,and the hobbing experiment was conducted based on the selfdeveloped noncircular gear CNC hobbing system.This paper proposes a hobbing method that can effectively suppress the fluctuation of the peak and whole circumference cutting force and reduce the maximum envelope error of the whole circumference gear teeth.
基金supported by the Fundamental Research Funds for the Central Universities (FRF-TP20-062A1)Guangdong Basic and Applied Basic Research Foundation (2021A1515110070)
文摘Belief propagation(BP)decoding outputs soft information and can be naturally used in iterative receivers.BP list(BPL)decoding provides comparable error-correction performance to the successive cancellation list(SCL)decoding.In this paper,we firstly introduce an enhanced code construction scheme for BPL decoding to improve its errorcorrection capability.Then,a GPU-based BPL decoder with adoption of the new code construction is presented.Finally,the proposed BPL decoder is tested on NVIDIA RTX3070 and GTX1060.Experimental results show that the presented BPL decoder with early termination criterion achieves above 1 Gbps throughput on RTX3070 for the code(1024,512)with 32 lists under good channel conditions.
基金supported in part by the NRF(National Research Foundation of Korea)Grant(No.2019R1A2C1009275)by the Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by theKorean government(MSIT)(No.2021-0-02068,Artificial Intelligence Innovation Hub).
文摘Due to the recent trend of software intelligence in the Fourth Industrial Revolution,deep learning has become a mainstream workload for modern computer systems.Since the data size of deep learning increasingly grows,managing the limited memory capacity efficiently for deep learning workloads becomes important.In this paper,we analyze memory accesses in deep learning workloads and find out some unique characteristics differentiated from traditional workloads.First,when comparing instruction and data accesses,data access accounts for 96%–99%of total memory accesses in deep learning workloads,which is quite different from traditional workloads.Second,when comparing read and write accesses,write access dominates,accounting for 64%–80%of total memory accesses.Third,although write access makes up the majority of memory accesses,it shows a low access bias of 0.3 in the Zipf parameter.Fourth,in predicting re-access,recency is important in read access,but frequency provides more accurate information in write access.Based on these observations,we introduce a Non-Volatile Random Access Memory(NVRAM)-accelerated memory architecture for deep learning workloads,and present a new memory management policy for this architecture.By considering the memory access characteristics of deep learning workloads,the proposed policy improves memory performance by 64.3%on average compared to the CLOCK policy.
基金the Science and Technology Project of State Grid Corporation of China(Grant No.5100-202199557A-0-5-ZN)。
文摘Real-world networks exhibit complex topological interactions that pose a significant computational challenge to analyses of such networks.Due to limited resources,there is an urgent need to develop dimensionality reduction techniques that can significantly reduce the structural complexity of initial large-scale networks.In this paper,we propose a subgraph extraction method based on the node centrality measure to reduce the size of the initial network topology.Specifically,nodes with smaller centrality value are removed from the initial network to obtain a subgraph with a smaller size.Our results demonstrate that various real-world networks,including power grids,technology,transportation,biology,social,and language networks,exhibit self-similarity behavior during the reduction process.The present results reveal the selfsimilarity and scale invariance of real-world networks from a different perspective and also provide an effective guide for simplifying the topology of large-scale networks.