Transportation systems primarily depend on vehicular flow on roads. Developed coun-tries have shifted towards automated signal control, which manages and updates signal synchronisation automatically. In contrast, traf...Transportation systems primarily depend on vehicular flow on roads. Developed coun-tries have shifted towards automated signal control, which manages and updates signal synchronisation automatically. In contrast, traffic in underdeveloped countries is mainly governed by manual traffic light systems. These existing manual systems lead to numerous issues, wasting substantial resources such as time, energy, and fuel, as they cannot make real‐time decisions. In this work, we propose an algorithm to determine traffic signal durations based on real‐time vehicle density, obtained from live closed circuit television camera feeds adjacent to traffic signals. The algorithm automates the traffic light system, making decisions based on vehicle density and employing Faster R‐CNN for vehicle detection. Additionally, we have created a local dataset from live streams of Punjab Safe City cameras in collaboration with the local police authority. The proposed algorithm achieves a class accuracy of 96.6% and a vehicle detection accuracy of 95.7%. Across both day and night modes, our proposed method maintains an average precision, recall, F1 score, and vehicle detection accuracy of 0.94, 0.98, 0.96 and 0.95, respectively. Our proposed work surpasses all evaluation metrics compared to state‐of‐the‐art methodologies.展开更多
Traffic flow forecasting constitutes a crucial component of intelligent transportation systems(ITSs).Numerous studies have been conducted for traffic flow forecasting during the past decades.However,most existing stud...Traffic flow forecasting constitutes a crucial component of intelligent transportation systems(ITSs).Numerous studies have been conducted for traffic flow forecasting during the past decades.However,most existing studies have concentrated on developing advanced algorithms or models to attain state-of-the-art forecasting accuracy.For real-world ITS applications,the interpretability of the developed models is extremely important but has largely been ignored.This study presents an interpretable traffic flow forecasting framework based on popular tree-ensemble algorithms.The framework comprises multiple key components integrated into a highly flexible and customizable multi-stage pipeline,enabling the seamless incorporation of various algorithms and tools.To evaluate the effectiveness of the framework,the developed tree-ensemble models and another three typical categories of baseline models,including statistical time series,shallow learning,and deep learning,were compared on three datasets collected from different types of roads(i.e.,arterial,expressway,and freeway).Further,the study delves into an in-depth interpretability analysis of the most competitive tree-ensemble models using six categories of interpretable machine learning methods.Experimental results highlight the potential of the proposed framework.The tree-ensemble models developed within this framework achieve competitive accuracy while maintaining high inference efficiency similar to statistical time series and shallow learning models.Meanwhile,these tree-ensemble models offer interpretability from multiple perspectives via interpretable machine-learning techniques.The proposed framework is anticipated to provide reliable and trustworthy decision support across various ITS applications.展开更多
Lower Earth Orbit(LEO) satellite becomes an important part of complementing terrestrial communication due to its lower orbital altitude and smaller propagation delay than Geostationary satellite. However, the LEO sate...Lower Earth Orbit(LEO) satellite becomes an important part of complementing terrestrial communication due to its lower orbital altitude and smaller propagation delay than Geostationary satellite. However, the LEO satellite communication system cannot meet the requirements of users when the satellite-terrestrial link is blocked by obstacles. To solve this problem, we introduce Intelligent reflect surface(IRS) for improving the achievable rate of terrestrial users in LEO satellite communication. We investigated joint IRS scheduling, user scheduling, power and bandwidth allocation(JIRPB) optimization algorithm for improving LEO satellite system throughput.The optimization problem of joint user scheduling and resource allocation is formulated as a non-convex optimization problem. To cope with this problem, the nonconvex optimization problem is divided into resource allocation optimization sub-problem and scheduling optimization sub-problem firstly. Second, we optimize the resource allocation sub-problem via alternating direction multiplier method(ADMM) and scheduling sub-problem via Lagrangian dual method repeatedly.Third, we prove that the proposed resource allocation algorithm based ADMM approaches sublinear convergence theoretically. Finally, we demonstrate that the proposed JIRPB optimization algorithm improves the LEO satellite communication system throughput.展开更多
This study investigates resilient platoon control for constrained intelligent and connected vehicles(ICVs)against F-local Byzantine attacks.We introduce a resilient distributed model-predictive platooning control fram...This study investigates resilient platoon control for constrained intelligent and connected vehicles(ICVs)against F-local Byzantine attacks.We introduce a resilient distributed model-predictive platooning control framework for such ICVs.This framework seamlessly integrates the predesigned optimal control with distributed model predictive control(DMPC)optimization and introduces a unique distributed attack detector to ensure the reliability of the transmitted information among vehicles.Notably,our strategy uses previously broadcasted information and a specialized convex set,termed the“resilience set”,to identify unreliable data.This approach significantly eases graph robustness prerequisites,requiring only an(F+1)-robust graph,in contrast to the established mean sequence reduced algorithms,which require a minimum(2F+1)-robust graph.Additionally,we introduce a verification algorithm to restore trust in vehicles under minor attacks,further reducing communication network robustness.Our analysis demonstrates the recursive feasibility of the DMPC optimization.Furthermore,the proposed method achieves exceptional control performance by minimizing the discrepancies between the DMPC control inputs and predesigned platoon control inputs,while ensuring constraint compliance and cybersecurity.Simulation results verify the effectiveness of our theoretical findings.展开更多
Humans can perceive our complex world through multi-sensory fusion.Under limited visual conditions,people can sense a variety of tactile signals to identify objects accurately and rapidly.However,replicating this uniq...Humans can perceive our complex world through multi-sensory fusion.Under limited visual conditions,people can sense a variety of tactile signals to identify objects accurately and rapidly.However,replicating this unique capability in robots remains a significant challenge.Here,we present a new form of ultralight multifunctional tactile nano-layered carbon aerogel sensor that provides pressure,temperature,material recognition and 3D location capabilities,which is combined with multimodal supervised learning algorithms for object recognition.The sensor exhibits human-like pressure(0.04–100 kPa)and temperature(21.5–66.2℃)detection,millisecond response times(11 ms),a pressure sensitivity of 92.22 kPa^(−1)and triboelectric durability of over 6000 cycles.The devised algorithm has universality and can accommodate a range of application scenarios.The tactile system can identify common foods in a kitchen scene with 94.63%accuracy and explore the topographic and geomorphic features of a Mars scene with 100%accuracy.This sensing approach empowers robots with versatile tactile perception to advance future society toward heightened sensing,recognition and intelligence.展开更多
AIM:To develop an artificial intelligence(AI)diagnosis model based on deep learning(DL)algorithm to diagnose different types of retinal vein occlusion(RVO)by recognizing color fundus photographs(CFPs).METHODS:Totally ...AIM:To develop an artificial intelligence(AI)diagnosis model based on deep learning(DL)algorithm to diagnose different types of retinal vein occlusion(RVO)by recognizing color fundus photographs(CFPs).METHODS:Totally 914 CFPs of healthy people and patients with RVO were collected as experimental data sets,and used to train,verify and test the diagnostic model of RVO.All the images were divided into four categories[normal,central retinal vein occlusion(CRVO),branch retinal vein occlusion(BRVO),and macular retinal vein occlusion(MRVO)]by three fundus disease experts.Swin Transformer was used to build the RVO diagnosis model,and different types of RVO diagnosis experiments were conducted.The model’s performance was compared to that of the experts.RESULTS:The accuracy of the model in the diagnosis of normal,CRVO,BRVO,and MRVO reached 1.000,0.978,0.957,and 0.978;the specificity reached 1.000,0.986,0.982,and 0.976;the sensitivity reached 1.000,0.955,0.917,and 1.000;the F1-Sore reached 1.000,0.9550.943,and 0.887 respectively.In addition,the area under curve of normal,CRVO,BRVO,and MRVO diagnosed by the diagnostic model were 1.000,0.900,0.959 and 0.970,respectively.The diagnostic results were highly consistent with those of fundus disease experts,and the diagnostic performance was superior.CONCLUSION:The diagnostic model developed in this study can well diagnose different types of RVO,effectively relieve the work pressure of clinicians,and provide help for the follow-up clinical diagnosis and treatment of RVO patients.展开更多
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightene...Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightened security challenges within smart grids,IEDs pose significant risks due to inherent hardware and software vulner-abilities,as well as the openness and vulnerability of communication protocols.Smart grid security,distinct from traditional internet security,mainly relies on monitoring network security events at the platform layer,lacking an effective assessment mechanism for IEDs.Hence,we incorporate considerations for both cyber-attacks and physical faults,presenting security assessment indicators and methods specifically tailored for IEDs.Initially,we outline the security monitoring technology for IEDs,considering the necessary data sources for their security assessment.Subsequently,we classify IEDs and establish a comprehensive security monitoring index system,incorporating factors such as running states,network traffic,and abnormal behaviors.This index system contains 18 indicators in 3 categories.Additionally,we elucidate quantitative methods for various indicators and propose a hybrid security assessment method known as GRCW-hybrid,combining grey relational analysis(GRA),analytic hierarchy process(AHP),and entropy weight method(EWM).According to the proposed assessment method,the security risk level of IEDs can be graded into 6 levels,namely 0,1,2,3,4,and 5.The higher the level,the greater the security risk.Finally,we assess and simulate 15 scenarios in 3 categories,which are based on monitoring indicators and real-world situations encountered by IEDs.The results show that calculated security risk level based on the proposed assessment method are consistent with actual simulation.Thus,the reasonableness and effectiveness of the proposed index system and assessment method are validated.展开更多
Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial resources.This study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Ne...Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial resources.This study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Networks(MANETs)based real-time prediction paradigm for urban traffic challenges.MANETs are wireless networks that are based on mobile devices and may self-organize.The distributed nature of MANETs and the power of AI approaches are leveraged in this framework to provide reliable and timely traffic congestion forecasts.This study suggests a unique Chaotic Spatial Fuzzy Polynomial Neural Network(CSFPNN)technique to assess real-time data acquired from various sources within theMANETs.The framework uses the proposed approach to learn from the data and create predictionmodels to detect possible traffic problems and their severity in real time.Real-time traffic prediction allows for proactive actions like resource allocation,dynamic route advice,and traffic signal optimization to reduce congestion.The framework supports effective decision-making,decreases travel time,lowers fuel use,and enhances overall urban mobility by giving timely information to pedestrians,drivers,and urban planners.Extensive simulations and real-world datasets are used to test the proposed framework’s prediction accuracy,responsiveness,and scalability.Experimental results show that the suggested framework successfully anticipates urban traffic issues in real-time,enables proactive traffic management,and aids in creating smarter,more sustainable cities.展开更多
With the advancement of Artificial Intelligence(AI)technology,traditional industrial systems are undergoing an intelligent transformation,bringing together advanced computing,communication and control technologies,Mac...With the advancement of Artificial Intelligence(AI)technology,traditional industrial systems are undergoing an intelligent transformation,bringing together advanced computing,communication and control technologies,Machine Learning(ML)-based intelligentmodelling has become a newparadigm for solving problems in the industrial domain[1–3].With numerous applications and diverse data types in the industrial domain,algorithmic and data-driven ML techniques can intelligently learn potential correlations between complex data and make efficient decisions while reducing human intervention.However,in real-world application scenarios,existing algorithms may have a variety of limitations,such as small data volumes,small detection targets,low efficiency,and algorithmic gaps in specific application domains[4].Therefore,many new algorithms and strategies have been proposed to address the challenges in industrial applications[5–8].展开更多
Emerging technological advances are reshaping the casting sector in latest decades.Casting technology is evolving towards intelligent casting paradigm that involves automation,greenization and intelligentization,which...Emerging technological advances are reshaping the casting sector in latest decades.Casting technology is evolving towards intelligent casting paradigm that involves automation,greenization and intelligentization,which attracts more and more attention from the academic and industry communities.In this paper,the main features of casting technology were briefly summarized and forecasted,and the recent developments of key technologies and the innovative efforts made in promoting intelligent casting process were discussed.Moreover,the technical visions of intelligent casting process were also put forward.The key technologies for intelligent casting process comprise 3D printing technologies,intelligent mold technologies and intelligent process control technologies.In future,the intelligent mold that derived from mold with sensors,control devices and actuators will probably incorporate the Internet of Things,online inspection,embedded simulation,decision-making and control system,and other technologies to form intelligent cyber-physical casting system,which may pave the way to realize intelligent casting.It is promising that the intelligent casting process will eventually achieve the goal of real-time process optimization and full-scale control,with the defects,microstructure,performance,and service life of the fabricated castings can be accurately predicted and tailored.展开更多
The epidemic characters of Omicron(e.g.large-scale transmission)are significantly different from the initial variants of COVID-19.The data generated by large-scale transmission is important to predict the trend of epi...The epidemic characters of Omicron(e.g.large-scale transmission)are significantly different from the initial variants of COVID-19.The data generated by large-scale transmission is important to predict the trend of epidemic characters.However,the re-sults of current prediction models are inaccurate since they are not closely combined with the actual situation of Omicron transmission.In consequence,these inaccurate results have negative impacts on the process of the manufacturing and the service industry,for example,the production of masks and the recovery of the tourism industry.The authors have studied the epidemic characters in two ways,that is,investigation and prediction.First,a large amount of data is collected by utilising the Baidu index and conduct questionnaire survey concerning epidemic characters.Second,theβ-SEIDR model is established,where the population is classified as Susceptible,Exposed,Infected,Dead andβ-Recovered persons,to intelligently predict the epidemic characters of COVID-19.Note thatβ-Recovered persons denote that the Recovered persons may become Sus-ceptible persons with probabilityβ.The simulation results show that the model can accurately predict the epidemic characters.展开更多
This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the c...This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the concept of equality = limits the sensitivity of our mathematics to abstract relationships. We propose a new relation principle that does not rely on the concept of equality but is consistent with existing mathematical abstractions. In essence, this paper proposes a conceptual framework for general interaction and argues that this framework is also an abstraction that satisfies the definition of Intelligence. Hence, we define intelligence as a formalization of generality, represented by the abstraction ∆∞Ο, where each symbol represents the concepts infinitesimal, infinite, and finite respectively. In essence, this paper proposes a General Language Model (GLM), where the abstraction ∆∞Ο represents the foundational relationship of the model. This relation is colloquially termed “The theory of everything”.展开更多
Disturbance observer-based control method has achieved good results in the carfollowing scenario of intelligent and connected vehicle(ICV).However,the gain of conventional extended disturbance observer(EDO)-based cont...Disturbance observer-based control method has achieved good results in the carfollowing scenario of intelligent and connected vehicle(ICV).However,the gain of conventional extended disturbance observer(EDO)-based control method is usually set manually rather than adjusted adaptively according to real time traffic conditions,thus declining the car-following performance.To solve this problem,a car-following strategy of ICV using EDO adjusted by reinforcement learning is proposed.Different from the conventional method,the gain of proposed strategy can be adjusted by reinforcement learning to improve its estimation accuracy.Since the“equivalent disturbance”can be compensated by EDO to a great extent,the disturbance rejection ability of the carfollowing method will be improved significantly.Both Lyapunov approach and numerical simulations are carried out to verify the effectiveness of the proposed method.展开更多
How to mine valuable information from massive multisource heterogeneous data and identify the intention of aerial targets is a major research focus at present. Aiming at the longterm dependence of air target intention...How to mine valuable information from massive multisource heterogeneous data and identify the intention of aerial targets is a major research focus at present. Aiming at the longterm dependence of air target intention recognition, this paper deeply explores the potential attribute features from the spatiotemporal sequence data of the target. First, we build an intelligent dynamic intention recognition framework, including a series of specific processes such as data source, data preprocessing,target space-time, convolutional neural networks-bidirectional gated recurrent unit-atteneion (CBA) model and intention recognition. Then, we analyze and reason the designed CBA model in detail. Finally, through comparison and analysis with other recognition model experiments, our proposed method can effectively improve the accuracy of air target intention recognition,and is of significance to the commanders’ operational command and situation prediction.展开更多
The research for the Intelligent Reflecting Surface(IRS)which has the advantages of cost and energy efficiency has been studied.Channel capacity can be effectively increased by appropriately setting the phase value of...The research for the Intelligent Reflecting Surface(IRS)which has the advantages of cost and energy efficiency has been studied.Channel capacity can be effectively increased by appropriately setting the phase value of IRS elements according to the channel conditions.However,the problem of obtaining an appropriate phase value of IRs is difficult to solve due to the non-convex problem.This paper proposes an iterative algorithm for the alternating optimal solution in the Single User Multiple-Input-Multiple-Output(SU-MIMO)systems.The proposed iterative algorithm finds an alternating optimal solution that is the phase value of IRS one by one.The results show that the proposed method has better performance than that of the randomized IRS systems.The number of iterations for maximizing the performance of the proposed algorithm depends on the channel state between the IRS and the receiver.展开更多
In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lackof performance of each component, such as computing resources like CPUs and batteries, to encrypt and d...In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lackof performance of each component, such as computing resources like CPUs and batteries, to encrypt and decryptdata. Because IoT is applied and utilized in many important fields, a cyberattack on IoT can result in astronomicalfinancial and human casualties. For this reason, the application of encrypted communication to IoT has beenrequired, and the application of encrypted communication to IoT has become possible due to improvements inthe computing performance of IoT devices and the development of lightweight cryptography. The applicationof encrypted communication in IoT has made it possible to use encrypted communication channels to launchcyberattacks. The approach of extracting evidence of an attack based on the primary information of a networkpacket is no longer valid because critical information, such as the payload in a network packet, is encrypted byencrypted communication. For this reason, technology that can detect cyberattacks over encrypted network trafficoccurring in IoT environments is required. Therefore, this research proposes an encrypted cyberattack detectionsystem for the IoT (ECDS-IoT) that derives valid features for cyberattack detection from the cryptographic networktraffic generated in the IoT environment and performs cyberattack detection based on the derived features. ECDSIoT identifies identifiable information from encrypted traffic collected in IoT environments and extracts statisticsbased features through statistical analysis of identifiable information. ECDS-IoT understands information aboutnormal data by learning only statistical features extracted from normal data. ECDS-IoT detects cyberattacks basedonly on the normal data information it has trained. To evaluate the cyberattack detection performance of theproposed ECDS-IoT in this research, ECDS-IoT used CICIoT2023, a dataset containing encrypted traffic generatedby normal and seven categories of cyberattacks in the IoT environment and experimented with cyberattackdetection on encrypted traffic using Autoencoder, RNN, GRU, LSTM, BiLSTM, and AE-LSTM algorithms. Asa result of evaluating the performance of cyberattack detection for encrypted traffic, ECDS-IoT achieved highperformance such as accuracy 0.99739, precision 0.99154, recall 1.0, F1 score 0.99575, and ROC_AUC 0.99822when using the AE-LSTM algorithm. As shown by the cyberattack detection results of ECDS-IoT, it is possibleto detect most cyberattacks through encrypted traffic. By applying ECDS-IoT to IoT, it can effectively detectcyberattacks concealed in encrypted traffic, promoting the efficient operation of IoT and preventing financial andhuman damage caused by cyberattacks.展开更多
AIM:To evaluate the application of an intelligent diagnostic model for pterygium.METHODS:For intelligent diagnosis of pterygium,the attention mechanisms—SENet,ECANet,CBAM,and Self-Attention—were fused with the light...AIM:To evaluate the application of an intelligent diagnostic model for pterygium.METHODS:For intelligent diagnosis of pterygium,the attention mechanisms—SENet,ECANet,CBAM,and Self-Attention—were fused with the lightweight MobileNetV2 model structure to construct a tri-classification model.The study used 1220 images of three types of anterior ocular segments of the pterygium provided by the Eye Hospital of Nanjing Medical University.Conventional classification models—VGG16,ResNet50,MobileNetV2,and EfficientNetB7—were trained on the same dataset for comparison.To evaluate model performance in terms of accuracy,Kappa value,test time,sensitivity,specificity,the area under curve(AUC),and visual heat map,470 test images of the anterior segment of the pterygium were used.RESULTS:The accuracy of the MobileNetV2+Self-Attention model with 281 MB in model size was 92.77%,and the Kappa value of the model was 88.92%.The testing time using the model was 9ms/image in the server and 138ms/image in the local computer.The sensitivity,specificity,and AUC for the diagnosis of pterygium using normal anterior segment images were 99.47%,100%,and 100%,respectively;using anterior segment images in the observation period were 88.30%,95.32%,and 96.70%,respectively;and using the anterior segment images in the surgery period were 88.18%,94.44%,and 97.30%,respectively.CONCLUSION:The developed model is lightweight and can be used not only for detection but also for assessing the severity of pterygium.展开更多
Purpose–This paper analyzes the application of digital twin technology in the field of intelligent operation and maintenance of high-speed railway infrastructure from the perspective of top-level design.Design/method...Purpose–This paper analyzes the application of digital twin technology in the field of intelligent operation and maintenance of high-speed railway infrastructure from the perspective of top-level design.Design/methodology/approach–This paper provides a comprehensive overview of the definition,connotations,characteristics and key technologies of digital twin technology.It also conducts a thorough analysis of the current state of digital twin applications,with a particular focus on the overall requirements for intelligent operation and maintenance of high-speed railway infrastructure.Using the Jinan Yellow River Bridge on the Beijing–Shanghai high-speed railway as a case study,the paper details the construction process of the twin system from the perspectives of system architecture,theoretical definition,model construction and platform design.Findings–Digital twin technology can play an important role in the whole life cycle management,fault prediction and condition monitoring in the field of high-speed rail operation and maintenance.Digital twin technology is of great significance to improve the intelligent level of high-speed railway operation and management.Originality/value–This paper systematically summarizes the main components of digital twin railway.The general framework of the digital twin bridge is given,and its application in the field of intelligent operation and maintenance is prospected.展开更多
This paper analyzes the current status,technological developments,academic exchange platforms,and future challenges and solutions in the field of intelligent ophthalmology(IO)in China.In terms of technology,significan...This paper analyzes the current status,technological developments,academic exchange platforms,and future challenges and solutions in the field of intelligent ophthalmology(IO)in China.In terms of technology,significant progress has been made in various areas,including diabetic retinopathy,fundus image analysis,quality assessment of medical artificial intelligence products,clinical research methods,technical evaluation,and industry standards.Researchers continually enhance the safety and standardization of IO technology by formulating a series of clinical application guidelines and standards.The establishment of domestic and international academic exchange platforms provides extensive collaboration opportunities for professionals in various fields,and various academic journals serve as publication platforms for IO research.However,challenges such as technological innovation,data privacy and security,lagging regulations,and talent shortages still pose obstacles to future development.To address these issues,future efforts should focus on strengthening technological research and development,regulatory framework construction,talent cultivation,and increasing patient awareness and acceptance of new technologies.By comprehensively addressing these challenges,IO in China is poised to further lead the industry’s development on a global scale,bringing more innovation and convenience to the field of ophthalmic healthcare.展开更多
The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning o...The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning offers a promising solution by allowing multiple clients to train models collaboratively without sharing private data.However,despite its privacy benefits,federated learning systems are vulnerable to poisoning attacks,where adversaries alter local model parameters on compromised clients and send malicious updates to the server,potentially compromising the global model’s accuracy.In this study,we introduce PMM(Perturbation coefficient Multiplied by Maximum value),a new poisoning attack method that perturbs model updates layer by layer,demonstrating the threat of poisoning attacks faced by federated learning.Extensive experiments across three distinct datasets have demonstrated PMM’s ability to significantly reduce the global model’s accuracy.Additionally,we propose an effective defense method,namely CLBL(Cluster Layer By Layer).Experiment results on three datasets have confirmed CLBL’s effectiveness.展开更多
基金National Key R&D Program of China,Grant/Award Number:2022YFC3303600National Natural Science Foundation of China,Grant/Award Number:62077015Natural Science Foundation of Zhejiang Province,Grant/Award Number:LY23F020010。
文摘Transportation systems primarily depend on vehicular flow on roads. Developed coun-tries have shifted towards automated signal control, which manages and updates signal synchronisation automatically. In contrast, traffic in underdeveloped countries is mainly governed by manual traffic light systems. These existing manual systems lead to numerous issues, wasting substantial resources such as time, energy, and fuel, as they cannot make real‐time decisions. In this work, we propose an algorithm to determine traffic signal durations based on real‐time vehicle density, obtained from live closed circuit television camera feeds adjacent to traffic signals. The algorithm automates the traffic light system, making decisions based on vehicle density and employing Faster R‐CNN for vehicle detection. Additionally, we have created a local dataset from live streams of Punjab Safe City cameras in collaboration with the local police authority. The proposed algorithm achieves a class accuracy of 96.6% and a vehicle detection accuracy of 95.7%. Across both day and night modes, our proposed method maintains an average precision, recall, F1 score, and vehicle detection accuracy of 0.94, 0.98, 0.96 and 0.95, respectively. Our proposed work surpasses all evaluation metrics compared to state‐of‐the‐art methodologies.
基金funded by the National Key R&D Program of China(Grant No.2023YFE0106800)the Humanity and Social Science Youth Foundation of Ministry of Education of China(Grant No.22YJC630109).
文摘Traffic flow forecasting constitutes a crucial component of intelligent transportation systems(ITSs).Numerous studies have been conducted for traffic flow forecasting during the past decades.However,most existing studies have concentrated on developing advanced algorithms or models to attain state-of-the-art forecasting accuracy.For real-world ITS applications,the interpretability of the developed models is extremely important but has largely been ignored.This study presents an interpretable traffic flow forecasting framework based on popular tree-ensemble algorithms.The framework comprises multiple key components integrated into a highly flexible and customizable multi-stage pipeline,enabling the seamless incorporation of various algorithms and tools.To evaluate the effectiveness of the framework,the developed tree-ensemble models and another three typical categories of baseline models,including statistical time series,shallow learning,and deep learning,were compared on three datasets collected from different types of roads(i.e.,arterial,expressway,and freeway).Further,the study delves into an in-depth interpretability analysis of the most competitive tree-ensemble models using six categories of interpretable machine learning methods.Experimental results highlight the potential of the proposed framework.The tree-ensemble models developed within this framework achieve competitive accuracy while maintaining high inference efficiency similar to statistical time series and shallow learning models.Meanwhile,these tree-ensemble models offer interpretability from multiple perspectives via interpretable machine-learning techniques.The proposed framework is anticipated to provide reliable and trustworthy decision support across various ITS applications.
基金supported by the National Key R&D Program of China under Grant 2020YFB1807900the National Natural Science Foundation of China (NSFC) under Grant 61931005Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Center。
文摘Lower Earth Orbit(LEO) satellite becomes an important part of complementing terrestrial communication due to its lower orbital altitude and smaller propagation delay than Geostationary satellite. However, the LEO satellite communication system cannot meet the requirements of users when the satellite-terrestrial link is blocked by obstacles. To solve this problem, we introduce Intelligent reflect surface(IRS) for improving the achievable rate of terrestrial users in LEO satellite communication. We investigated joint IRS scheduling, user scheduling, power and bandwidth allocation(JIRPB) optimization algorithm for improving LEO satellite system throughput.The optimization problem of joint user scheduling and resource allocation is formulated as a non-convex optimization problem. To cope with this problem, the nonconvex optimization problem is divided into resource allocation optimization sub-problem and scheduling optimization sub-problem firstly. Second, we optimize the resource allocation sub-problem via alternating direction multiplier method(ADMM) and scheduling sub-problem via Lagrangian dual method repeatedly.Third, we prove that the proposed resource allocation algorithm based ADMM approaches sublinear convergence theoretically. Finally, we demonstrate that the proposed JIRPB optimization algorithm improves the LEO satellite communication system throughput.
基金the financial support from the Natural Sciences and Engineering Research Council of Canada(NSERC)。
文摘This study investigates resilient platoon control for constrained intelligent and connected vehicles(ICVs)against F-local Byzantine attacks.We introduce a resilient distributed model-predictive platooning control framework for such ICVs.This framework seamlessly integrates the predesigned optimal control with distributed model predictive control(DMPC)optimization and introduces a unique distributed attack detector to ensure the reliability of the transmitted information among vehicles.Notably,our strategy uses previously broadcasted information and a specialized convex set,termed the“resilience set”,to identify unreliable data.This approach significantly eases graph robustness prerequisites,requiring only an(F+1)-robust graph,in contrast to the established mean sequence reduced algorithms,which require a minimum(2F+1)-robust graph.Additionally,we introduce a verification algorithm to restore trust in vehicles under minor attacks,further reducing communication network robustness.Our analysis demonstrates the recursive feasibility of the DMPC optimization.Furthermore,the proposed method achieves exceptional control performance by minimizing the discrepancies between the DMPC control inputs and predesigned platoon control inputs,while ensuring constraint compliance and cybersecurity.Simulation results verify the effectiveness of our theoretical findings.
基金the National Natural Science Foundation of China(Grant No.52072041)the Beijing Natural Science Foundation(Grant No.JQ21007)+2 种基金the University of Chinese Academy of Sciences(Grant No.Y8540XX2D2)the Robotics Rhino-Bird Focused Research Project(No.2020-01-002)the Tencent Robotics X Laboratory.
文摘Humans can perceive our complex world through multi-sensory fusion.Under limited visual conditions,people can sense a variety of tactile signals to identify objects accurately and rapidly.However,replicating this unique capability in robots remains a significant challenge.Here,we present a new form of ultralight multifunctional tactile nano-layered carbon aerogel sensor that provides pressure,temperature,material recognition and 3D location capabilities,which is combined with multimodal supervised learning algorithms for object recognition.The sensor exhibits human-like pressure(0.04–100 kPa)and temperature(21.5–66.2℃)detection,millisecond response times(11 ms),a pressure sensitivity of 92.22 kPa^(−1)and triboelectric durability of over 6000 cycles.The devised algorithm has universality and can accommodate a range of application scenarios.The tactile system can identify common foods in a kitchen scene with 94.63%accuracy and explore the topographic and geomorphic features of a Mars scene with 100%accuracy.This sensing approach empowers robots with versatile tactile perception to advance future society toward heightened sensing,recognition and intelligence.
基金Supported by Shenzhen Fund for Guangdong Provincial High-level Clinical Key Specialties(No.SZGSP014)Sanming Project of Medicine in Shenzhen(No.SZSM202011015)Shenzhen Science and Technology Planning Project(No.KCXFZ20211020163813019).
文摘AIM:To develop an artificial intelligence(AI)diagnosis model based on deep learning(DL)algorithm to diagnose different types of retinal vein occlusion(RVO)by recognizing color fundus photographs(CFPs).METHODS:Totally 914 CFPs of healthy people and patients with RVO were collected as experimental data sets,and used to train,verify and test the diagnostic model of RVO.All the images were divided into four categories[normal,central retinal vein occlusion(CRVO),branch retinal vein occlusion(BRVO),and macular retinal vein occlusion(MRVO)]by three fundus disease experts.Swin Transformer was used to build the RVO diagnosis model,and different types of RVO diagnosis experiments were conducted.The model’s performance was compared to that of the experts.RESULTS:The accuracy of the model in the diagnosis of normal,CRVO,BRVO,and MRVO reached 1.000,0.978,0.957,and 0.978;the specificity reached 1.000,0.986,0.982,and 0.976;the sensitivity reached 1.000,0.955,0.917,and 1.000;the F1-Sore reached 1.000,0.9550.943,and 0.887 respectively.In addition,the area under curve of normal,CRVO,BRVO,and MRVO diagnosed by the diagnostic model were 1.000,0.900,0.959 and 0.970,respectively.The diagnostic results were highly consistent with those of fundus disease experts,and the diagnostic performance was superior.CONCLUSION:The diagnostic model developed in this study can well diagnose different types of RVO,effectively relieve the work pressure of clinicians,and provide help for the follow-up clinical diagnosis and treatment of RVO patients.
基金The financial support from the Program for Science and Technology of Henan Province of China(Grant No.242102210148)Henan Center for Outstanding Overseas Scientists(Grant No.GZS2022011)Songshan Laboratory Pre-Research Project(Grant No.YYJC032022022).
文摘Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightened security challenges within smart grids,IEDs pose significant risks due to inherent hardware and software vulner-abilities,as well as the openness and vulnerability of communication protocols.Smart grid security,distinct from traditional internet security,mainly relies on monitoring network security events at the platform layer,lacking an effective assessment mechanism for IEDs.Hence,we incorporate considerations for both cyber-attacks and physical faults,presenting security assessment indicators and methods specifically tailored for IEDs.Initially,we outline the security monitoring technology for IEDs,considering the necessary data sources for their security assessment.Subsequently,we classify IEDs and establish a comprehensive security monitoring index system,incorporating factors such as running states,network traffic,and abnormal behaviors.This index system contains 18 indicators in 3 categories.Additionally,we elucidate quantitative methods for various indicators and propose a hybrid security assessment method known as GRCW-hybrid,combining grey relational analysis(GRA),analytic hierarchy process(AHP),and entropy weight method(EWM).According to the proposed assessment method,the security risk level of IEDs can be graded into 6 levels,namely 0,1,2,3,4,and 5.The higher the level,the greater the security risk.Finally,we assess and simulate 15 scenarios in 3 categories,which are based on monitoring indicators and real-world situations encountered by IEDs.The results show that calculated security risk level based on the proposed assessment method are consistent with actual simulation.Thus,the reasonableness and effectiveness of the proposed index system and assessment method are validated.
基金the Deanship of Scientific Research at Majmaah University for supporting this work under Project No.R-2024-1008.
文摘Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial resources.This study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Networks(MANETs)based real-time prediction paradigm for urban traffic challenges.MANETs are wireless networks that are based on mobile devices and may self-organize.The distributed nature of MANETs and the power of AI approaches are leveraged in this framework to provide reliable and timely traffic congestion forecasts.This study suggests a unique Chaotic Spatial Fuzzy Polynomial Neural Network(CSFPNN)technique to assess real-time data acquired from various sources within theMANETs.The framework uses the proposed approach to learn from the data and create predictionmodels to detect possible traffic problems and their severity in real time.Real-time traffic prediction allows for proactive actions like resource allocation,dynamic route advice,and traffic signal optimization to reduce congestion.The framework supports effective decision-making,decreases travel time,lowers fuel use,and enhances overall urban mobility by giving timely information to pedestrians,drivers,and urban planners.Extensive simulations and real-world datasets are used to test the proposed framework’s prediction accuracy,responsiveness,and scalability.Experimental results show that the suggested framework successfully anticipates urban traffic issues in real-time,enables proactive traffic management,and aids in creating smarter,more sustainable cities.
基金supported in part by the Beijing Natural Science Foundation under Grants L211020 and M21032in part by the National Natural Science Foundation of China under Grants U1836106,62271045,and U2133218.
文摘With the advancement of Artificial Intelligence(AI)technology,traditional industrial systems are undergoing an intelligent transformation,bringing together advanced computing,communication and control technologies,Machine Learning(ML)-based intelligentmodelling has become a newparadigm for solving problems in the industrial domain[1–3].With numerous applications and diverse data types in the industrial domain,algorithmic and data-driven ML techniques can intelligently learn potential correlations between complex data and make efficient decisions while reducing human intervention.However,in real-world application scenarios,existing algorithms may have a variety of limitations,such as small data volumes,small detection targets,low efficiency,and algorithmic gaps in specific application domains[4].Therefore,many new algorithms and strategies have been proposed to address the challenges in industrial applications[5–8].
基金funded by the Beijing Natural Science Foundation-Haidian Original Innovation Joint Fund(L212002)the Tsinghua-Toyota Joint Research Fund(20223930096)the Guangdong Provincial Key Area Research and Development Program(2022B0909070001).
文摘Emerging technological advances are reshaping the casting sector in latest decades.Casting technology is evolving towards intelligent casting paradigm that involves automation,greenization and intelligentization,which attracts more and more attention from the academic and industry communities.In this paper,the main features of casting technology were briefly summarized and forecasted,and the recent developments of key technologies and the innovative efforts made in promoting intelligent casting process were discussed.Moreover,the technical visions of intelligent casting process were also put forward.The key technologies for intelligent casting process comprise 3D printing technologies,intelligent mold technologies and intelligent process control technologies.In future,the intelligent mold that derived from mold with sensors,control devices and actuators will probably incorporate the Internet of Things,online inspection,embedded simulation,decision-making and control system,and other technologies to form intelligent cyber-physical casting system,which may pave the way to realize intelligent casting.It is promising that the intelligent casting process will eventually achieve the goal of real-time process optimization and full-scale control,with the defects,microstructure,performance,and service life of the fabricated castings can be accurately predicted and tailored.
基金Key discipline construction project for traditional Chinese Medicine in Guangdong province,Grant/Award Number:20220104The construction project of inheritance studio of national famous and old traditional Chinese Medicine experts,Grant/Award Number:140000020132。
文摘The epidemic characters of Omicron(e.g.large-scale transmission)are significantly different from the initial variants of COVID-19.The data generated by large-scale transmission is important to predict the trend of epidemic characters.However,the re-sults of current prediction models are inaccurate since they are not closely combined with the actual situation of Omicron transmission.In consequence,these inaccurate results have negative impacts on the process of the manufacturing and the service industry,for example,the production of masks and the recovery of the tourism industry.The authors have studied the epidemic characters in two ways,that is,investigation and prediction.First,a large amount of data is collected by utilising the Baidu index and conduct questionnaire survey concerning epidemic characters.Second,theβ-SEIDR model is established,where the population is classified as Susceptible,Exposed,Infected,Dead andβ-Recovered persons,to intelligently predict the epidemic characters of COVID-19.Note thatβ-Recovered persons denote that the Recovered persons may become Sus-ceptible persons with probabilityβ.The simulation results show that the model can accurately predict the epidemic characters.
文摘This paper aims to formalize a general definition of intelligence beyond human intelligence. We accomplish this by re-imagining the concept of equality as a fundamental abstraction for relation. We discover that the concept of equality = limits the sensitivity of our mathematics to abstract relationships. We propose a new relation principle that does not rely on the concept of equality but is consistent with existing mathematical abstractions. In essence, this paper proposes a conceptual framework for general interaction and argues that this framework is also an abstraction that satisfies the definition of Intelligence. Hence, we define intelligence as a formalization of generality, represented by the abstraction ∆∞Ο, where each symbol represents the concepts infinitesimal, infinite, and finite respectively. In essence, this paper proposes a General Language Model (GLM), where the abstraction ∆∞Ο represents the foundational relationship of the model. This relation is colloquially termed “The theory of everything”.
基金State Key Laboratory of Automotive Safety and Energy,Grant/Award Number:KFY2208National Natural Science Foundation of China,Grant/Award Numbers:U2013601,U20A20225+1 种基金Key Research and Development Plan of Anhui Province,Grant/Award Number:202004a05020058the Natural Science Foundation of Hefei,China(Grant No.2021032)。
文摘Disturbance observer-based control method has achieved good results in the carfollowing scenario of intelligent and connected vehicle(ICV).However,the gain of conventional extended disturbance observer(EDO)-based control method is usually set manually rather than adjusted adaptively according to real time traffic conditions,thus declining the car-following performance.To solve this problem,a car-following strategy of ICV using EDO adjusted by reinforcement learning is proposed.Different from the conventional method,the gain of proposed strategy can be adjusted by reinforcement learning to improve its estimation accuracy.Since the“equivalent disturbance”can be compensated by EDO to a great extent,the disturbance rejection ability of the carfollowing method will be improved significantly.Both Lyapunov approach and numerical simulations are carried out to verify the effectiveness of the proposed method.
基金supported by the National Natural Science Foundation of China (61502523)。
文摘How to mine valuable information from massive multisource heterogeneous data and identify the intention of aerial targets is a major research focus at present. Aiming at the longterm dependence of air target intention recognition, this paper deeply explores the potential attribute features from the spatiotemporal sequence data of the target. First, we build an intelligent dynamic intention recognition framework, including a series of specific processes such as data source, data preprocessing,target space-time, convolutional neural networks-bidirectional gated recurrent unit-atteneion (CBA) model and intention recognition. Then, we analyze and reason the designed CBA model in detail. Finally, through comparison and analysis with other recognition model experiments, our proposed method can effectively improve the accuracy of air target intention recognition,and is of significance to the commanders’ operational command and situation prediction.
基金supported by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2022-2018-0-01423)supervised by the ITP(Institute for Information&Communications Technology Planning&Evaluation)supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(2020R1A6A1A03038540).
文摘The research for the Intelligent Reflecting Surface(IRS)which has the advantages of cost and energy efficiency has been studied.Channel capacity can be effectively increased by appropriately setting the phase value of IRS elements according to the channel conditions.However,the problem of obtaining an appropriate phase value of IRs is difficult to solve due to the non-convex problem.This paper proposes an iterative algorithm for the alternating optimal solution in the Single User Multiple-Input-Multiple-Output(SU-MIMO)systems.The proposed iterative algorithm finds an alternating optimal solution that is the phase value of IRS one by one.The results show that the proposed method has better performance than that of the randomized IRS systems.The number of iterations for maximizing the performance of the proposed algorithm depends on the channel state between the IRS and the receiver.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.2021-0-00493,5G Massive Next Generation Cyber Attack Deception Technology Development).
文摘In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lackof performance of each component, such as computing resources like CPUs and batteries, to encrypt and decryptdata. Because IoT is applied and utilized in many important fields, a cyberattack on IoT can result in astronomicalfinancial and human casualties. For this reason, the application of encrypted communication to IoT has beenrequired, and the application of encrypted communication to IoT has become possible due to improvements inthe computing performance of IoT devices and the development of lightweight cryptography. The applicationof encrypted communication in IoT has made it possible to use encrypted communication channels to launchcyberattacks. The approach of extracting evidence of an attack based on the primary information of a networkpacket is no longer valid because critical information, such as the payload in a network packet, is encrypted byencrypted communication. For this reason, technology that can detect cyberattacks over encrypted network trafficoccurring in IoT environments is required. Therefore, this research proposes an encrypted cyberattack detectionsystem for the IoT (ECDS-IoT) that derives valid features for cyberattack detection from the cryptographic networktraffic generated in the IoT environment and performs cyberattack detection based on the derived features. ECDSIoT identifies identifiable information from encrypted traffic collected in IoT environments and extracts statisticsbased features through statistical analysis of identifiable information. ECDS-IoT understands information aboutnormal data by learning only statistical features extracted from normal data. ECDS-IoT detects cyberattacks basedonly on the normal data information it has trained. To evaluate the cyberattack detection performance of theproposed ECDS-IoT in this research, ECDS-IoT used CICIoT2023, a dataset containing encrypted traffic generatedby normal and seven categories of cyberattacks in the IoT environment and experimented with cyberattackdetection on encrypted traffic using Autoencoder, RNN, GRU, LSTM, BiLSTM, and AE-LSTM algorithms. Asa result of evaluating the performance of cyberattack detection for encrypted traffic, ECDS-IoT achieved highperformance such as accuracy 0.99739, precision 0.99154, recall 1.0, F1 score 0.99575, and ROC_AUC 0.99822when using the AE-LSTM algorithm. As shown by the cyberattack detection results of ECDS-IoT, it is possibleto detect most cyberattacks through encrypted traffic. By applying ECDS-IoT to IoT, it can effectively detectcyberattacks concealed in encrypted traffic, promoting the efficient operation of IoT and preventing financial andhuman damage caused by cyberattacks.
基金Supported by the National Natural Science Foundation of China(No.61906066)Scientific Research Fund of Zhejiang Provincial Education Department(No.Y202147191)+2 种基金Huzhou University Graduate Research Innovation Project(No.2020KYCX21)Sanming Project of Medicine in Shenzhen(SZSM202311012)Shenzhen Science and Technology Program(No.JCYJ20220530153604010).
文摘AIM:To evaluate the application of an intelligent diagnostic model for pterygium.METHODS:For intelligent diagnosis of pterygium,the attention mechanisms—SENet,ECANet,CBAM,and Self-Attention—were fused with the lightweight MobileNetV2 model structure to construct a tri-classification model.The study used 1220 images of three types of anterior ocular segments of the pterygium provided by the Eye Hospital of Nanjing Medical University.Conventional classification models—VGG16,ResNet50,MobileNetV2,and EfficientNetB7—were trained on the same dataset for comparison.To evaluate model performance in terms of accuracy,Kappa value,test time,sensitivity,specificity,the area under curve(AUC),and visual heat map,470 test images of the anterior segment of the pterygium were used.RESULTS:The accuracy of the MobileNetV2+Self-Attention model with 281 MB in model size was 92.77%,and the Kappa value of the model was 88.92%.The testing time using the model was 9ms/image in the server and 138ms/image in the local computer.The sensitivity,specificity,and AUC for the diagnosis of pterygium using normal anterior segment images were 99.47%,100%,and 100%,respectively;using anterior segment images in the observation period were 88.30%,95.32%,and 96.70%,respectively;and using the anterior segment images in the surgery period were 88.18%,94.44%,and 97.30%,respectively.CONCLUSION:The developed model is lightweight and can be used not only for detection but also for assessing the severity of pterygium.
基金funded by the China State Railway Group Co.,Ltd.Science and technology research and development program project(K2023G085).
文摘Purpose–This paper analyzes the application of digital twin technology in the field of intelligent operation and maintenance of high-speed railway infrastructure from the perspective of top-level design.Design/methodology/approach–This paper provides a comprehensive overview of the definition,connotations,characteristics and key technologies of digital twin technology.It also conducts a thorough analysis of the current state of digital twin applications,with a particular focus on the overall requirements for intelligent operation and maintenance of high-speed railway infrastructure.Using the Jinan Yellow River Bridge on the Beijing–Shanghai high-speed railway as a case study,the paper details the construction process of the twin system from the perspectives of system architecture,theoretical definition,model construction and platform design.Findings–Digital twin technology can play an important role in the whole life cycle management,fault prediction and condition monitoring in the field of high-speed rail operation and maintenance.Digital twin technology is of great significance to improve the intelligent level of high-speed railway operation and management.Originality/value–This paper systematically summarizes the main components of digital twin railway.The general framework of the digital twin bridge is given,and its application in the field of intelligent operation and maintenance is prospected.
基金Supported by National Nature Science Foundation of China(No.62306254)SanMing Project of Medicine in Shenzhen(No.SZSM202311012)+1 种基金Shenzhen Fund for Guangdong Provincial High-level Clinical Key Specialties(No.SZGSP014)Shenzhen Science and Technology Program(No.KCXFZ20211020163813019).
文摘This paper analyzes the current status,technological developments,academic exchange platforms,and future challenges and solutions in the field of intelligent ophthalmology(IO)in China.In terms of technology,significant progress has been made in various areas,including diabetic retinopathy,fundus image analysis,quality assessment of medical artificial intelligence products,clinical research methods,technical evaluation,and industry standards.Researchers continually enhance the safety and standardization of IO technology by formulating a series of clinical application guidelines and standards.The establishment of domestic and international academic exchange platforms provides extensive collaboration opportunities for professionals in various fields,and various academic journals serve as publication platforms for IO research.However,challenges such as technological innovation,data privacy and security,lagging regulations,and talent shortages still pose obstacles to future development.To address these issues,future efforts should focus on strengthening technological research and development,regulatory framework construction,talent cultivation,and increasing patient awareness and acceptance of new technologies.By comprehensively addressing these challenges,IO in China is poised to further lead the industry’s development on a global scale,bringing more innovation and convenience to the field of ophthalmic healthcare.
基金supported by Systematic Major Project of China State Railway Group Corporation Limited(Grant Number:P2023W002).
文摘The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning offers a promising solution by allowing multiple clients to train models collaboratively without sharing private data.However,despite its privacy benefits,federated learning systems are vulnerable to poisoning attacks,where adversaries alter local model parameters on compromised clients and send malicious updates to the server,potentially compromising the global model’s accuracy.In this study,we introduce PMM(Perturbation coefficient Multiplied by Maximum value),a new poisoning attack method that perturbs model updates layer by layer,demonstrating the threat of poisoning attacks faced by federated learning.Extensive experiments across three distinct datasets have demonstrated PMM’s ability to significantly reduce the global model’s accuracy.Additionally,we propose an effective defense method,namely CLBL(Cluster Layer By Layer).Experiment results on three datasets have confirmed CLBL’s effectiveness.