Abstract--This paper conducts a survey on iterative learn- ing control (ILC) with incomplete information and associated control system design, which is a frontier of the ILC field. The incomplete information, includ...Abstract--This paper conducts a survey on iterative learn- ing control (ILC) with incomplete information and associated control system design, which is a frontier of the ILC field. The incomplete information, including passive and active types, can cause data loss or fragment due to various factors. Passive incomplete information refers to incomplete data and information caused by practical system limitations during data collection, storage, transmission, and processing, such as data dropouts, delays, disordering, and limited transmission bandwidth. Active incomplete information refers to incomplete data and information caused by man-made reduction of data quantity and quality on the premise that the given objective is satisfied, such as sampling and quantization. This survey emphasizes two aspects: the first one is how to guarantee good learning performance and tracking performance with passive incomplete data, and the second is how to balance the control performance index and data demand by active means. The promising research directions along this topic are also addressed, where data robustness is highly emphasized. This survey is expected to improve understanding of the restrictive relationship and trade-off between incomplete data and tracking performance, quantitatively, and promote further developments of ILC theory. Index Terms--Data dropout, data robustness, incomplete in- formation, iterative learning controi(ILC), quantized control, sampled control, varying lengths.展开更多
Based on the rough set theory which is a powerful tool in dealing with vagueness and uncertainty, an algorithm to mine association rules in incomplete information systems was presented and the support and confidence w...Based on the rough set theory which is a powerful tool in dealing with vagueness and uncertainty, an algorithm to mine association rules in incomplete information systems was presented and the support and confidence were redefined. The algorithm can mine the association rules with decision attributes directly without processing missing values. Using the incomplete dataset Mushroom from UCI machine learning repository, the new algorithm was compared with the classical association rules mining algorithm based on Apriori from the number of rules extracted, testing accuracy and execution time. The experiment results show that the new algorithm has advantages of short execution time and high accuracy.展开更多
In this paper, for multiple attribute decision-making problem in which attribute values are interval grey numbers and some of them are null values, a decision model based on grey rough sets integration with incomplete...In this paper, for multiple attribute decision-making problem in which attribute values are interval grey numbers and some of them are null values, a decision model based on grey rough sets integration with incomplete information is proposed. We put forward incidence degree coefficient formula for grey interval, by information entropy theory and analysis technique, the method and principle is presented to fill up null values. We also establish the method of grey interval incidence cluster. Because grey system theory and Rough set theory are complementary each other, decision table with preference information is obtained by the result of grey incidence cluster. An algorithm for inducing decision rules based on rough set theory and the dominance relationship is presented. In some extent, this algorithm can deal with decision-making problem in which the attribute values are interval grey numbers and some of them are null values. Contrasted with classical model of cluster decision-making, the algorithm has an advantage of flexibility and compatibility to new information.展开更多
It is helpful for people to understand the essence of rough set theory to study the concepts and operations of rough set theory from its information view. In this paper we address knowledge expression and knowledge re...It is helpful for people to understand the essence of rough set theory to study the concepts and operations of rough set theory from its information view. In this paper we address knowledge expression and knowledge reduction in incomplete infolvnation systems from the information view of rough set theory. First, by extending information entropy-based measures in complete information systems, two new measures of incomplete entropy and incomplete conditional entropy are presented for incomplete information systems. And then, based on these measures the problem of knowledge reduction in incomplete information systems is analyzed and the reduct definitions in incomplete information system and incomplete decision table are proposed respectively. Finally, the reduct definitions based on incomplete entropy and the reduct definitions based on similarity relation are compared. Two equivalent relationships between them are proved by theorems and an in equivalent relationship between them is illustrated by an example. The work of this paper extends the research of rough set theory from information view to incomplete information systems and establishes the theoretical basis for seeking efficient algorithm of knowledge acquisition in incomplete information systems.展开更多
Switch policy is essential for small cells to properly serve variable number of users in an energy efficient way.However,frequently switching small cell base stations(SBSs) may increase the network operating cost,espe...Switch policy is essential for small cells to properly serve variable number of users in an energy efficient way.However,frequently switching small cell base stations(SBSs) may increase the network operating cost,especially when there is an nonnegligible start-up energy cost.To this end,by observing the variety of user number,we focus on the design of a switch policy which minimize the cumulative energy consumption.A given user transmission rate is guaranteed and the capability of SBSs are limited as well.According to the knowledge on user number variety,we classify the energy consumption problem into two cases.In complete information case,to minimize the cumulative energy consumption,an offline solution is proposed according to critical segments.A heuristic algorithm for incomplete information case(HAIIC) is proposed by tracking the difference of cumulative energy consumption.The upper bound of the Energy Consumption Ratio(ECR) for HAIIC is derived as well.In addition,a practical Q-learning based probabilistic policy is proposed.Simulation results show that the proposed HAIIC algorithm is able to save energy efficiently.展开更多
The joint power allocation(PA)and beamforming(BF)design problem is studied to maximize the energy efficiency of a two-user downlink millimeter-wave system with non-orthogonal multiple access under imperfect channel st...The joint power allocation(PA)and beamforming(BF)design problem is studied to maximize the energy efficiency of a two-user downlink millimeter-wave system with non-orthogonal multiple access under imperfect channel state information(CSI).By means of block coordinate descent,convex-concave procedure,and successive convex approximate,we propose a suboptimal joint PA and BF design scheme to address this non-convex problem.Simulation results verify that the proposed joint PA and BF design scheme is more effective when compared to some existing schemes.展开更多
This paper introduces a new game theoretic equilibrium which is based upon the Bayesian subjective view of probability, BEIC (Bayesian equilibrium iterative conjectures). It requires players to make predictions, sta...This paper introduces a new game theoretic equilibrium which is based upon the Bayesian subjective view of probability, BEIC (Bayesian equilibrium iterative conjectures). It requires players to make predictions, starting from first order uninformative predictive distribution functions (or conjectures) and keep updating with statistical decision theoretic and game theoretic reasoning until a convergence of conjectures is achieved. Information known by the players such as the reaction functions are thereby incorporated into their higher order conjectures and help to determine the convergent conjectures and the equilibrium. In a BEIC, conjectures are consistent with the equilibrium or equilibriums they supported and so rationality is achieved for actions, strategies and conjectures. The BEIC approach is capable of analyzing a larger set of games than current Nash Equilibrium based games theory, including games with inaccurate observations, games with unstable equilibrium and games with double or multiple sided incomplete information games. On the other hand, for the set of games analyzed by the current games theory, it generates far lesser equilibriums and normally generates only a unique equilibrium. It treats games with complete and perfect information as special cases of games with incomplete information and noisy observation whereby the variance of the prior distribution function on type and the variance of the observation noise term tend to zero. Consequently, there is the issue of indeterminacy in statistical inference and decision making in these games as the equilibrium solution depends on which variances tends to zero first. It therefore identifies equilibriums in these games that have so far eluded the classical theory of games. Finally, it also resolves inconsistencies in equilibrium results by different solution concepts in current games theory such as that between Nash Equilibrium and iterative elimination of dominated strategies and that between Perfect Bayesian Equilibrium and backward induction (Subgame Perfect Equilibrium).展开更多
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put...To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.展开更多
Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the sec...Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnorrml behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete inforrmtion game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the perforrmnce of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium.展开更多
In 2013, The Turkish Ministry of Environment and Urban Planning issued four thousand pages of a cut and paste Environmental Impact Assessment (EIA) report for the Akkuyu nuclear power plant and nuclear fuel fabricat...In 2013, The Turkish Ministry of Environment and Urban Planning issued four thousand pages of a cut and paste Environmental Impact Assessment (EIA) report for the Akkuyu nuclear power plant and nuclear fuel fabrication complex project located on Turkey's Mediterranean coastline, in the Mersin providence, which will be built on a build-own-operate basis by Russian company Rosatom. Numerous complaints have already been filed against the EIA, challenging the scientific integrity of the report on the following grounds: misrepresentation of failure to specify the radioactive inventory and of projected releases into the environment, omitting tritium and carbon-14; incomplete information about the toxic chemicals which will be injected into the cooling system throughout the nuclear complex; misleading information about the cooling water's temporal and chemical effects on marine life; lack of details on an emergency evacuation plan; lack of a comprehensive nuclear waste management plan; unspecified insurance coverage for the nuclear complex, noncompliance with third party liability requirements. Coupled with these complaints are allegations that signatures on some sensitive reports contained or referred to have been falsified.展开更多
基金supported by the National Natural Science Foundation of China(61673045)Beijing Natural Science Foundation(4152040)
文摘Abstract--This paper conducts a survey on iterative learn- ing control (ILC) with incomplete information and associated control system design, which is a frontier of the ILC field. The incomplete information, including passive and active types, can cause data loss or fragment due to various factors. Passive incomplete information refers to incomplete data and information caused by practical system limitations during data collection, storage, transmission, and processing, such as data dropouts, delays, disordering, and limited transmission bandwidth. Active incomplete information refers to incomplete data and information caused by man-made reduction of data quantity and quality on the premise that the given objective is satisfied, such as sampling and quantization. This survey emphasizes two aspects: the first one is how to guarantee good learning performance and tracking performance with passive incomplete data, and the second is how to balance the control performance index and data demand by active means. The promising research directions along this topic are also addressed, where data robustness is highly emphasized. This survey is expected to improve understanding of the restrictive relationship and trade-off between incomplete data and tracking performance, quantitatively, and promote further developments of ILC theory. Index Terms--Data dropout, data robustness, incomplete in- formation, iterative learning controi(ILC), quantized control, sampled control, varying lengths.
基金Projects(10871031, 60474070) supported by the National Natural Science Foundation of ChinaProject(07A001) supported by the Scientific Research Fund of Hunan Provincial Education Department, China
文摘Based on the rough set theory which is a powerful tool in dealing with vagueness and uncertainty, an algorithm to mine association rules in incomplete information systems was presented and the support and confidence were redefined. The algorithm can mine the association rules with decision attributes directly without processing missing values. Using the incomplete dataset Mushroom from UCI machine learning repository, the new algorithm was compared with the classical association rules mining algorithm based on Apriori from the number of rules extracted, testing accuracy and execution time. The experiment results show that the new algorithm has advantages of short execution time and high accuracy.
基金Supported by the NSF of Henan Province(082300410040)Supported by the NSF of Zhumadian City(087006)
文摘In this paper, for multiple attribute decision-making problem in which attribute values are interval grey numbers and some of them are null values, a decision model based on grey rough sets integration with incomplete information is proposed. We put forward incidence degree coefficient formula for grey interval, by information entropy theory and analysis technique, the method and principle is presented to fill up null values. We also establish the method of grey interval incidence cluster. Because grey system theory and Rough set theory are complementary each other, decision table with preference information is obtained by the result of grey incidence cluster. An algorithm for inducing decision rules based on rough set theory and the dominance relationship is presented. In some extent, this algorithm can deal with decision-making problem in which the attribute values are interval grey numbers and some of them are null values. Contrasted with classical model of cluster decision-making, the algorithm has an advantage of flexibility and compatibility to new information.
基金Sponsored by the Youth Natural Science Foundation of Yantai Normal University.
文摘It is helpful for people to understand the essence of rough set theory to study the concepts and operations of rough set theory from its information view. In this paper we address knowledge expression and knowledge reduction in incomplete infolvnation systems from the information view of rough set theory. First, by extending information entropy-based measures in complete information systems, two new measures of incomplete entropy and incomplete conditional entropy are presented for incomplete information systems. And then, based on these measures the problem of knowledge reduction in incomplete information systems is analyzed and the reduct definitions in incomplete information system and incomplete decision table are proposed respectively. Finally, the reduct definitions based on incomplete entropy and the reduct definitions based on similarity relation are compared. Two equivalent relationships between them are proved by theorems and an in equivalent relationship between them is illustrated by an example. The work of this paper extends the research of rough set theory from information view to incomplete information systems and establishes the theoretical basis for seeking efficient algorithm of knowledge acquisition in incomplete information systems.
基金partially supported by National Key Project of China under Grants No. 2013ZX03001007-004National Natural Science Foundation of China under Grants No. 61102052,61325012,61271219,91438115 and 61221001
文摘Switch policy is essential for small cells to properly serve variable number of users in an energy efficient way.However,frequently switching small cell base stations(SBSs) may increase the network operating cost,especially when there is an nonnegligible start-up energy cost.To this end,by observing the variety of user number,we focus on the design of a switch policy which minimize the cumulative energy consumption.A given user transmission rate is guaranteed and the capability of SBSs are limited as well.According to the knowledge on user number variety,we classify the energy consumption problem into two cases.In complete information case,to minimize the cumulative energy consumption,an offline solution is proposed according to critical segments.A heuristic algorithm for incomplete information case(HAIIC) is proposed by tracking the difference of cumulative energy consumption.The upper bound of the Energy Consumption Ratio(ECR) for HAIIC is derived as well.In addition,a practical Q-learning based probabilistic policy is proposed.Simulation results show that the proposed HAIIC algorithm is able to save energy efficiently.
基金supported in part by the Fundamental Research Funds of Nanjing University of Aeronautics and Astronautics(No.kfjj20200414)the Natural Science Foundation of Jiangsu Province in China (No. BK20181289)the Open Research Fund of State Key Laboratory of Millimeter Waves of Southeast University (No.K202215)
文摘The joint power allocation(PA)and beamforming(BF)design problem is studied to maximize the energy efficiency of a two-user downlink millimeter-wave system with non-orthogonal multiple access under imperfect channel state information(CSI).By means of block coordinate descent,convex-concave procedure,and successive convex approximate,we propose a suboptimal joint PA and BF design scheme to address this non-convex problem.Simulation results verify that the proposed joint PA and BF design scheme is more effective when compared to some existing schemes.
文摘This paper introduces a new game theoretic equilibrium which is based upon the Bayesian subjective view of probability, BEIC (Bayesian equilibrium iterative conjectures). It requires players to make predictions, starting from first order uninformative predictive distribution functions (or conjectures) and keep updating with statistical decision theoretic and game theoretic reasoning until a convergence of conjectures is achieved. Information known by the players such as the reaction functions are thereby incorporated into their higher order conjectures and help to determine the convergent conjectures and the equilibrium. In a BEIC, conjectures are consistent with the equilibrium or equilibriums they supported and so rationality is achieved for actions, strategies and conjectures. The BEIC approach is capable of analyzing a larger set of games than current Nash Equilibrium based games theory, including games with inaccurate observations, games with unstable equilibrium and games with double or multiple sided incomplete information games. On the other hand, for the set of games analyzed by the current games theory, it generates far lesser equilibriums and normally generates only a unique equilibrium. It treats games with complete and perfect information as special cases of games with incomplete information and noisy observation whereby the variance of the prior distribution function on type and the variance of the observation noise term tend to zero. Consequently, there is the issue of indeterminacy in statistical inference and decision making in these games as the equilibrium solution depends on which variances tends to zero first. It therefore identifies equilibriums in these games that have so far eluded the classical theory of games. Finally, it also resolves inconsistencies in equilibrium results by different solution concepts in current games theory such as that between Nash Equilibrium and iterative elimination of dominated strategies and that between Perfect Bayesian Equilibrium and backward induction (Subgame Perfect Equilibrium).
基金Supported by the National Natural Science Foundation of China(No.60872041,61072066)Fundamental Research Funds for the Central Universities(JYI0000903001,JYI0000901034)
文摘To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.
基金This work was partially supported by the National Natural Science Foundation of China under Cxants No. 61272451, No. 61103220, No. 61173154, No. 61173175 the National Critical Patented Projects in the next generation broadband wireless mobile communication network under Grant No. 2010ZX03006-001-01.
文摘Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnorrml behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete inforrmtion game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the perforrmnce of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium.
文摘In 2013, The Turkish Ministry of Environment and Urban Planning issued four thousand pages of a cut and paste Environmental Impact Assessment (EIA) report for the Akkuyu nuclear power plant and nuclear fuel fabrication complex project located on Turkey's Mediterranean coastline, in the Mersin providence, which will be built on a build-own-operate basis by Russian company Rosatom. Numerous complaints have already been filed against the EIA, challenging the scientific integrity of the report on the following grounds: misrepresentation of failure to specify the radioactive inventory and of projected releases into the environment, omitting tritium and carbon-14; incomplete information about the toxic chemicals which will be injected into the cooling system throughout the nuclear complex; misleading information about the cooling water's temporal and chemical effects on marine life; lack of details on an emergency evacuation plan; lack of a comprehensive nuclear waste management plan; unspecified insurance coverage for the nuclear complex, noncompliance with third party liability requirements. Coupled with these complaints are allegations that signatures on some sensitive reports contained or referred to have been falsified.