期刊文献+
共找到48篇文章
< 1 2 3 >
每页显示 20 50 100
From Parallel Plants to Smart Plants:Intelligent Control and Management for Plant Growth 被引量:25
1
作者 Mengzhen Kang Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第2期161-166,共6页
Precision management of agricultural systems, aiming at optimizing profitability, productivity and sustainability, comprises a set of technologies including sensors, information systems, and informed management, etc. ... Precision management of agricultural systems, aiming at optimizing profitability, productivity and sustainability, comprises a set of technologies including sensors, information systems, and informed management, etc. Expert systems are expected to aid farmers in plant management or environment control, but they are mostly based on the offline and static information, deviated from the actual situation. Parallel management, achieved by virtual/artificial agricultural system, computational experiment and parallel execution, provides a generic framework of solution for online decision support. In this paper, we present the three steps toward the parallel management of plant: growth description U+0028 the crop model U+0029, prediction, and prescription. This approach can update the expert system by adding learning ability and the adaption of knowledge database according to the descriptive and predictive model. The possibilities of passing the knowledge of experienced farmers to younger generation, as well as the application to the parallel breeding of plant through such system, are discussed. © 2017 Chinese Association of Automation. 展开更多
关键词 AGRICULTURE Artificial intelligence Decision support systems Expert systems Sustainable development
下载PDF
Design of a Networked Tracking Control System With a Data-based Approach 被引量:2
2
作者 Shiwen Tong Dianwei Qian +2 位作者 Xiaoyu Yan Jianjun Fang Wei Liu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2019年第5期1261-1267,共7页
Tracking control is a very challenging problem in the networked control system(NCS), especially for the process with blurred mechanism and where only input-output data are available. This paper has proposed a data-bas... Tracking control is a very challenging problem in the networked control system(NCS), especially for the process with blurred mechanism and where only input-output data are available. This paper has proposed a data-based design approach for the networked tracking control system(NTCS). The method utilizes the input-output data of the controlled process to establish a predictive model with the help of fuzzy cluster modelling(FCM)technology. Then, the deduced error and error change in the future are treated as inputs of a fuzzy sliding mode controller(FSMC) to obtain a string of future control actions. These candidate control actions in the controller side are delivered to the plant side. Thus, the network induced time delays are compensated by selecting appropriate control action. Simulation outputs prove the validity of the proposed method. 展开更多
关键词 Delay compensation FUZZY cluster modeling (FCM) FUZZY SLIDING mode CONTROL (FSMC) NETWORKED TRACKING control(NTC)
下载PDF
Multimodal Sentiment Analysis Using BiGRU and Attention-Based Hybrid Fusion Strategy 被引量:1
3
作者 Zhizhong Liu Bin Zhou +1 位作者 Lingqiang Meng Guangyu Huang 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1963-1981,共19页
Recently,multimodal sentiment analysis has increasingly attracted attention with the popularity of complementary data streams,which has great potential to surpass unimodal sentiment analysis.One challenge of multimoda... Recently,multimodal sentiment analysis has increasingly attracted attention with the popularity of complementary data streams,which has great potential to surpass unimodal sentiment analysis.One challenge of multimodal sentiment analysis is how to design an efficient multimodal feature fusion strategy.Unfortunately,existing work always considers feature-level fusion or decision-level fusion,and few research works focus on hybrid fusion strategies that contain feature-level fusion and decision-level fusion.To improve the performance of multimodal sentiment analysis,we present a novel multimodal sentiment analysis model using BiGRU and attention-based hybrid fusion strategy(BAHFS).Firstly,we apply BiGRU to learn the unimodal features of text,audio and video.Then we fuse the unimodal features into bimodal features using the bimodal attention fusion module.Next,BAHFS feeds the unimodal features and bimodal features into the trimodal attention fusion module and the trimodal concatenation fusion module simultaneously to get two sets of trimodal features.Finally,BAHFS makes a classification with the two sets of trimodal features respectively and gets the final analysis results with decision-level fusion.Based on the CMU-MOSI and CMU-MOSEI datasets,extensive experiments have been carried out to verify BAHFS’s superiority. 展开更多
关键词 Multimdoal sentiment analysis BiGRU attention mechanism features-level fusion hybrid fusion strategy
下载PDF
End-to-end verifiable electronic voting scheme of blockchain based on random linear block code
4
作者 Liu Ting Cui Zhe +1 位作者 Pu Hongquan Peng Xingyi 《High Technology Letters》 EI CAS 2020年第1期25-33,共9页
Blockchain is an emerging decentralized technology of electronic voting.The current main consensus protocols are not flexible enough to manage the distributed blockchain nodes to achieve high efficiency of consensus.F... Blockchain is an emerging decentralized technology of electronic voting.The current main consensus protocols are not flexible enough to manage the distributed blockchain nodes to achieve high efficiency of consensus.For practical implementation,the consensus based on random linear block code(RLBC)is proposed and applied to blockchain voting scheme.Along with achieving the record correctness and consistency among all nodes,the consensus method indicates the active and inactive consensus nodes.This ability can assist the management of consensus nodes and restrain the generating of chain forks.To achieve end-to-end verifiability,cast-or-audit and randomized partial checking(RPC)are used in the proposed scheme.The voter can verify the high probability of correctness in ballot encryption and decryption.The experiments illustrate that the efficiency of proposed consensus is suitable for blockchain.The proposed electronic voting scheme is adapted to practical implementation of voting. 展开更多
关键词 RANDOM linear block code(RLBC) ELECTRONIC voting(e-voting) blockchain CONSENSUS END-TO-END verifiable
下载PDF
Simulation Analysis of Control System in an Innovative Magnetically-Saturated Controllable Reactor
5
作者 Xiao Jin Guoqiang Zhang Runrui Guo 《Journal of Power and Energy Engineering》 2014年第4期403-410,共8页
Controllable saturation reactors are widely used in reactive power compensation. The control system of controllable saturation reactor determines adaption speed, accuracy, and stability. First, an innovative type of c... Controllable saturation reactors are widely used in reactive power compensation. The control system of controllable saturation reactor determines adaption speed, accuracy, and stability. First, an innovative type of controllable saturation reactor is introduced. After that the control system is designed, and a self-tuning algorithm in PID controller is proposed in the paper. The algorithm tunes PID parameters automatically with different error signals caused by varied loads in power system. Then the feasibility of the above algorithm is verified by Simulink module of Matlab software. The results of simulation indicate that the control system can efficiently reduce adaption time and overshoot. 展开更多
关键词 CONTROLLABLE SATURATION REACTOR Parameter SELF-TUNING PID Controller REACTIVE Power Compensation
下载PDF
Research of the DBN Algorithm Based on Multi-innovation Theory and Application of Social Computing
6
作者 Pinle Qin Meng Li +1 位作者 Qiguang Miao Chuanpeng Li 《国际计算机前沿大会会议论文集》 2016年第1期147-149,共3页
Aimed at the problems of small gradient, low learning rate, slow convergence error when the DBN using back-propagation process to fix the network connection weight and bias, proposing a new algorithm that combines wit... Aimed at the problems of small gradient, low learning rate, slow convergence error when the DBN using back-propagation process to fix the network connection weight and bias, proposing a new algorithm that combines with multi-innovation theory to improve standard DBN algorithm, that is the multi-innovation DBN(MI-DBN). It sets up a new model of back-propagation process in DBN algorithm, making the use of single innovation in previous algorithm extend to the use of innovation of the preceding multiple period, thus increasing convergence rate of error largely. To study the application of the algorithm in the social computing, and recognize the meaningful information about the handwritten numbers in social networking images. This paper compares MI-DBN algorithm with other representative classifiers through experiments. The result shows that MI-DBN algorithm, comparing with other representative classifiers, has a faster convergence rate and a smaller error for MNIST dataset recognition. And handwritten numbers on the image also have a precise degree of recognition. 展开更多
关键词 DBN ALGORITHM CONVERGENCE error Multi-innovation THEORY MI-DBN ALGORITHM SOCIAL computing
下载PDF
A GAN-EfficientNet-Based Traceability Method for Malicious Code Variant Families
7
作者 Li Li Qing Zhang Youran Kong 《Computers, Materials & Continua》 SCIE EI 2024年第7期801-818,共18页
Due to the diversity and unpredictability of changes in malicious code,studying the traceability of variant families remains challenging.In this paper,we propose a GAN-EfficientNetV2-based method for tracing families ... Due to the diversity and unpredictability of changes in malicious code,studying the traceability of variant families remains challenging.In this paper,we propose a GAN-EfficientNetV2-based method for tracing families of malicious code variants.This method leverages the similarity in layouts and textures between images of malicious code variants from the same source and their original family of malicious code images.The method includes a lightweight classifier and a simulator.The classifier utilizes the enhanced EfficientNetV2 to categorize malicious code images and can be easily deployed on mobile,embedded,and other devices.The simulator utilizes an enhanced generative adversarial network to simulate different variants of malicious code and generates datasets to validate the model’s performance.This process helps identify model vulnerabilities and security risks,facilitating model enhancement and development.The classifier achieves 98.61%and 97.59%accuracy on the MMCC dataset and Malevis dataset,respectively.The simulator’s generated image of malicious code variants has an FID value of 155.44 and an IS value of 1.72±0.42.The classifier’s accuracy for tracing the family of malicious code variants is as high as 90.29%,surpassing that of mainstream neural network models.This meets the current demand for high generalization and anti-obfuscation abilities in malicious code classification models due to the rapid evolution of malicious code. 展开更多
关键词 Malicious code variant traceability feature reuse lightweight neural networks code visualization attention mechanism
下载PDF
Lightweight Malicious Code Classification Method Based on Improved Squeeze Net
8
作者 Li Li Youran Kong Qing Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第1期551-567,共17页
With the growth of the Internet,more and more business is being done online,for example,online offices,online education and so on.While this makes people’s lives more convenient,it also increases the risk of the netw... With the growth of the Internet,more and more business is being done online,for example,online offices,online education and so on.While this makes people’s lives more convenient,it also increases the risk of the network being attacked by malicious code.Therefore,it is important to identify malicious codes on computer systems efficiently.However,most of the existing malicious code detection methods have two problems:(1)The ability of the model to extract features is weak,resulting in poor model performance.(2)The large scale of model data leads to difficulties deploying on devices with limited resources.Therefore,this paper proposes a lightweight malicious code identification model Lightweight Malicious Code Classification Method Based on Improved SqueezeNet(LCMISNet).In this paper,the MFire lightweight feature extraction module is constructed by proposing a feature slicing module and a multi-size depthwise separable convolution module.The feature slicing module reduces the number of parameters by grouping features.The multi-size depthwise separable convolution module reduces the number of parameters and enhances the feature extraction capability by replacing the standard convolution with depthwise separable convolution with different convolution kernel sizes.In addition,this paper also proposes a feature splicing module to connect the MFire lightweight feature extraction module based on the feature reuse and constructs the lightweight model LCMISNet.The malicious code recognition accuracy of LCMISNet on the BIG 2015 dataset and the Malimg dataset reaches 98.90% and 99.58%,respectively.It proves that LCMISNet has a powerful malicious code recognition performance.In addition,compared with other network models,LCMISNet has better performance,and a lower number of parameters and computations. 展开更多
关键词 Lightweight neural network malicious code classification feature slicing feature splicing multi-size depthwise separable convolution
下载PDF
Mobile Crowdsourcing Task Allocation Based on Dynamic Self-Attention GANs
9
作者 Kai Wei Song Yu Qingxian Pan 《Computers, Materials & Continua》 SCIE EI 2024年第4期607-622,共16页
Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encoun... Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encounter challenges when dealing with abnormal data flow nodes,leading to decreased allocation accuracy and efficiency.To address these issues,this study proposes a novel two-part invalid detection task allocation framework.In the first step,an anomaly detection model is developed using a dynamic self-attentive GAN to identify anomalous data.Compared to the baseline method,the model achieves an approximately 4%increase in the F1 value on the public dataset.In the second step of the framework,task allocation modeling is performed using a twopart graph matching method.This phase introduces a P-queue KM algorithm that implements a more efficient optimization strategy.The allocation efficiency is improved by approximately 23.83%compared to the baseline method.Empirical results confirm the effectiveness of the proposed framework in detecting abnormal data nodes,enhancing allocation precision,and achieving efficient allocation. 展开更多
关键词 Mobile crowdsourcing task allocation anomaly detection GAN attention mechanisms
下载PDF
A Novel Method of Heart Failure Prediction Based on DPCNN-XGBOOST Model 被引量:4
10
作者 Yuwen Chen Xiaolin Qin +1 位作者 Lige Zhang Bin Yi 《Computers, Materials & Continua》 SCIE EI 2020年第10期495-510,共16页
The occurrence of perioperative heart failure will affect the quality of medical services and threaten the safety of patients.Existing methods depend on the judgment of doctors,the results are affected by many factors... The occurrence of perioperative heart failure will affect the quality of medical services and threaten the safety of patients.Existing methods depend on the judgment of doctors,the results are affected by many factors such as doctors’knowledge and experience.The accuracy is difficult to guarantee and has a serious lag.In this paper,a mixture prediction model is proposed for perioperative adverse events of heart failure,which combined with the advantages of the Deep Pyramid Convolutional Neural Networks(DPCNN)and Extreme Gradient Boosting(XGBOOST).The DPCNN was used to automatically extract features from patient’s diagnostic texts,and the text features were integrated with the preoperative examination and intraoperative monitoring values of patients,then the XGBOOST algorithm was used to construct the prediction model of heart failure.An experimental comparison was conducted on the model based on the data of patients with heart failure in southwest hospital from 2014 to 2018.The results showed that the DPCNN-XGBOOST model improved the predictive sensitivity of the model by 3%and 31%compared with the text-based DPCNN Model and the numeric-based XGBOOST Model. 展开更多
关键词 Deep pyramid convolutional neural networks extreme gradient boosting heart failure prediction
下载PDF
Multi-stage online task assignment driven by offline data under spatio-temporal crowdsourcing 被引量:2
11
作者 Qi Zhang Yingjie Wang +1 位作者 Zhipeng Cai Xiangrong Tong 《Digital Communications and Networks》 SCIE CSCD 2022年第4期516-530,共15页
In the era of the Internet of Things(IoT),the crowdsourcing process is driven by data collected by devices that interact with each other and with the physical world.As a part of the IoT ecosystem,task assignment has b... In the era of the Internet of Things(IoT),the crowdsourcing process is driven by data collected by devices that interact with each other and with the physical world.As a part of the IoT ecosystem,task assignment has become an important goal of the research community.Existing task assignment algorithms can be categorized as offline(performs better with datasets but struggles to achieve good real-life results)or online(works well with real-life input but is difficult to optimize regarding in-depth assignments).This paper proposes a Cross-regional Online Task(CROT)assignment problem based on the online assignment model.Given the CROT problem,an Online Task Assignment across Regions based on Prediction(OTARP)algorithm is proposed.OTARP is a two-stage graphics-driven bilateral assignment strategy that uses edge cloud and graph embedding to complete task assignments.The first stage uses historical data to make offline predictions,with a graph-driven method for offline bipartite graph matching.The second stage uses a bipartite graph to complete the online task assignment process.This paper proposes accelerating the task assignment process through multiple assignment rounds and optimizing the process by combining offline guidance and online assignment strategies.To encourage crowd workers to complete crowd tasks across regions,an incentive strategy is designed to encourage crowd workers’movement.To avoid the idle problem in the process of crowd worker movement,a drop-by-rider problem is used to help crowd workers accept more crowd tasks,optimize the number of assignments,and increase utility.Finally,through comparison experiments on real datasets,the performance of the proposed algorithm on crowd worker utility value and the matching number is evaluated. 展开更多
关键词 Spatiotemporal crowdsourcing Cross-regional Edge cloud Offline prediction Oline task assignment
下载PDF
What are the differences in yield formation among two cucumber (Cucumis sativus L.) cultivars and their F1 hybrid? 被引量:1
12
作者 WANG Xiu-juan KANG Meng-zhen +5 位作者 FAN Xing-rong YANG Li-li ZHANG Bao-gui HUANG San-wen Philippe DE REFFYE WANG Fei-yue 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2020年第7期1789-1801,共13页
To elucidate the mechanisms underlying the differences in yield formation among two parents(P1 and P2) and their F1 hybrid of cucumber, biomass production and whole source–sink dynamics were analyzed using a functio... To elucidate the mechanisms underlying the differences in yield formation among two parents(P1 and P2) and their F1 hybrid of cucumber, biomass production and whole source–sink dynamics were analyzed using a functional–structural plant model(FSPM) that simulates both the number and size of individual organs. Observations of plant development and organ biomass were recorded throughout the growth periods of the plants. The GreenLab Model was used to analyze the differences in fruit setting, organ expansion, biomass production and biomass allocation. The source–sink parameters were estimated from the experimental measurements. Moreover, a particle swarm optimization algorithm(PSO) was applied to analyze whether the fruit setting is related to the source–sink ratio. The results showed that the internal source–sink ratio increased in the vegetative stage and reached a peak until the first fruit setting. The high yield of hybrid F1 is the compound result of both fruit setting and the internal source–sink ratio. The optimization results also revealed that the incremental changes in fruit weight result from the increases in sink strength and proportion of plant biomass allocation for fruits. The model-aided analysis revealed that heterosis is a result of a delicate compromise between fruit setting and fruit sink strength. The organlevel model may provide a computational approach to define the target of breeding by combination with a genetic model. 展开更多
关键词 CUCUMBER biomass production functional-structural plant model source-sink ratio FRUIT-SETTING PSO HETEROSIS
下载PDF
Single bitmap block truncation coding of color images using hill climbing algorithm
13
作者 Zhang Lige Qin Xiaolin +2 位作者 Li Qing Peng Haoyue Hou Yu 《High Technology Letters》 EI CAS 2019年第4期355-363,共9页
In order to generate an efficient common bitmap in single bitmap block truncation coding(SBBTC)of color images,an improved SBBTC scheme based on weighted plane(W-plane)method and hill climbing algorithm is proposed.Fi... In order to generate an efficient common bitmap in single bitmap block truncation coding(SBBTC)of color images,an improved SBBTC scheme based on weighted plane(W-plane)method and hill climbing algorithm is proposed.Firstly,the incoming color image is partitioned into non-overlapping blocks and each block is encoded using the W-plane method to get an initial common bitmap and quantization values.Then,the hill climbing algorithm is applied to optimize an initial common bitmap and generate a near-optimized common bitmap.Finally,the quantization values are recalculated by the near-optimized common bitmap and the considered color image is reconstructed block by block through the common bitmap and the new quantization values.Since the processing of each image block in SBBTC is independent and identical,parallel computing is applied to reduce the time consumption of this scheme.The simulation results show that the proposed scheme has better visual quality and time consumption than those of the reference SBBTC schemes. 展开更多
关键词 block truncation coding(BTC) common bitmap parallel computing hill climbing algorithm
下载PDF
Current status of deep learning in abdominal image reconstruction
14
作者 Guang-Yuan Li Cheng-Yan Wang Jun Lv 《Artificial Intelligence in Medical Imaging》 2021年第4期86-94,共9页
Abdominal magnetic resonance imaging(MRI)and computed tomography(CT)are commonly used for disease screening,diagnosis,and treatment guidance.However,abdominal MRI has disadvantages including slow speed and vulnerabili... Abdominal magnetic resonance imaging(MRI)and computed tomography(CT)are commonly used for disease screening,diagnosis,and treatment guidance.However,abdominal MRI has disadvantages including slow speed and vulnerability to motions,while CT suffers from problems of radiation.It has been reported that deep learning reconstruction can solve such problems while maintaining good image quality.Recently,deep learning-based image reconstruction has become a hot topic in the field of medical imaging.This study reviews the latest research on deep learning reconstruction in abdominal imaging,including the widely used convolutional neural network,generative adversarial network,and recurrent neural network. 展开更多
关键词 Abdominal imaging RECONSTRUCTION Magnetic resonance imaging Computed tomography Deep learning
下载PDF
Experimental and numerical study on the shrinkage-deformation of carrot slices during hot air drying 被引量:1
15
作者 Dalong Jiang Congcong Li +4 位作者 Zifan Lin Yuntian Wu Hongjuan Pei Magdalena Zielinska Hongwei Xiao 《International Journal of Agricultural and Biological Engineering》 SCIE CAS 2023年第1期260-272,共13页
In order to further understand the mechanism of material volume change in the drying process,numerical simulations(considering or neglecting shrinkage)of heat and mass transfer during convective drying of carrot slice... In order to further understand the mechanism of material volume change in the drying process,numerical simulations(considering or neglecting shrinkage)of heat and mass transfer during convective drying of carrot slices under constant and controlled temperature and relative humidity were carried out.Simulated results were validated with experimental data.The results of the simulation show that the Quadratic model fitted well to the moisture ratio and the material temperature data trend with average relative errors of 5.9%and 8.1%,respectively.Additionally,the results of the simulation considering shrinkage show that the moisture and temperature distributions during drying are closer to the experimental data than the results of the simulation disregarding shrinkage.The material moisture content was significantly related to the shrinkage of dried tissue.Temperature and relative humidity significantly affected the volume shrinkage of carrot slices.The volume shrinkage increased with the rising of the constant temperature and the decline of relative humidity.This model can be used to provide more information on the dynamics of heat and mass transfer during drying and can also be adapted to other products and dryers devices. 展开更多
关键词 carrot drying numerical simulation heat and mass transfer SHRINKAGE
原文传递
Improved PBFT Consensus Algorithm Based on Node Role Division
16
作者 Xiyu Ren Xiangrong Tong Wei Zhang 《Journal of Computer and Communications》 2023年第2期20-38,共19页
The PBFT (Practical Byzantine Fault Tolerance, PBFT) consensus algorithm, which addressed the issue of malicious nodes sending error messages to disrupt the system operation in distributed systems, was challenging to ... The PBFT (Practical Byzantine Fault Tolerance, PBFT) consensus algorithm, which addressed the issue of malicious nodes sending error messages to disrupt the system operation in distributed systems, was challenging to support massive network nodes, the common participation over all nodes in the consensus mechanism would lead to increased communication complexity, and the arbitrary selection of master nodes would also lead to inefficient consensus. This paper offered a PBFT consensus method (Role Division-based Practical Byzantine Fault Tolerance, RD-PBFT) to address the above problems based on node role division. First, the nodes in the system voted with each other to divide the high reputation group and low reputation group, and determined the starting reputation value of the nodes. Then, the mobile node in the group was divided into roles according to the high reputation value, and a total of three roles were divided into consensus node, backup node, and supervisory node to reduce the number of nodes involved in the consensus process and reduced the complexity of communication. In addition, an adaptive method was used to select the master nodes in the consensus process, and an integer value was introduced to ensure the unpredictability and equality of the master node selection. Experimentally, it was verified that the algorithm has lower communication complexity and better decentralization characteristics compared with the PBFT consensus algorithm, which improved the efficiency of consensus. 展开更多
关键词 Blockchain Consensus Algorithm Practical Byzantine Fault Tolerance Node Role Division
下载PDF
Bi-layered coded metasurface for multi-functional hologram with broadband transmission and efficient reflection
17
作者 朱磊 李绪胜 +4 位作者 董亮 谢文静 尚关玉 Shah Nawaz Burokur 丁旭旻 《Chinese Optics Letters》 SCIE EI CAS CSCD 2024年第5期8-16,共9页
A multi-functional full-space metasurface based on frequency and polarization multiplexing is proposed.The metasurface unit consists of metallic patterns printed on the two faces of a single-layered dielectric substra... A multi-functional full-space metasurface based on frequency and polarization multiplexing is proposed.The metasurface unit consists of metallic patterns printed on the two faces of a single-layered dielectric substrate.The unit cell can control electromagnetic wavefronts to achieve a broadband transmission with amplitudes greater than 0.4 from 4.4 to 10.4 GHz.Meanwhile,at 11.7 GHz and 15.4 GHz,four high-efficiency reflection channels with a reflection amplitude greater than 0.8 are also realized.When illuminated by linearly polarized waves,five different functions can be realized at five different frequencies,which are demonstrated by theoretical calculations,full-wave simulations,and experimental measurements. 展开更多
关键词 multi-functional metasurface broadband transmission efficient reflection full space
原文传递
A Privacy-Preserving Mechanism Based on Local Differential Privacy in Edge Computing 被引量:7
18
作者 Mengnan Bi Yingjie Wang +1 位作者 Zhipeng Cai Xiangrong Tong 《China Communications》 SCIE CSCD 2020年第9期50-65,共16页
With the development of Internet of Things(IoT),the delay caused by network transmission has led to low data processing efficiency.At the same time,the limited computing power and available energy consumption of IoT t... With the development of Internet of Things(IoT),the delay caused by network transmission has led to low data processing efficiency.At the same time,the limited computing power and available energy consumption of IoT terminal devices are also the important bottlenecks that would restrict the application of blockchain,but edge computing could solve this problem.The emergence of edge computing can effectively reduce the delay of data transmission and improve data processing capacity.However,user data in edge computing is usually stored and processed in some honest-but-curious authorized entities,which leads to the leakage of users’privacy information.In order to solve these problems,this paper proposes a location data collection method that satisfies the local differential privacy to protect users’privacy.In this paper,a Voronoi diagram constructed by the Delaunay method is used to divide the road network space and determine the Voronoi grid region where the edge nodes are located.A random disturbance mechanism that satisfies the local differential privacy is utilized to disturb the original location data in each Voronoi grid.In addition,the effectiveness of the proposed privacy-preserving mechanism is verified through comparison experiments.Compared with the existing privacy-preserving methods,the proposed privacy-preserving mechanism can not only better meet users’privacy needs,but also have higher data availability. 展开更多
关键词 Io T edge computing local differential privacy Voronoi diagram PRIVACY-PRESERVING
下载PDF
PDP: Parallel Dynamic Programming 被引量:15
19
作者 Fei-Yue Wang Jie Zhang +2 位作者 Qinglai Wei Xinhu Zheng Li Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第1期1-5,共5页
Deep reinforcement learning is a focus research area in artificial intelligence. The principle of optimality in dynamic programming is a key to the success of reinforcement learning methods. The principle of adaptive ... Deep reinforcement learning is a focus research area in artificial intelligence. The principle of optimality in dynamic programming is a key to the success of reinforcement learning methods. The principle of adaptive dynamic programming ADP is first presented instead of direct dynamic programming DP , and the inherent relationship between ADP and deep reinforcement learning is developed. Next, analytics intelligence, as the necessary requirement, for the real reinforcement learning, is discussed. Finally, the principle of the parallel dynamic programming, which integrates dynamic programming and analytics intelligence, is presented as the future computational intelligence. © 2014 Chinese Association of Automation. 展开更多
关键词 Artificial intelligence Neural networks Reinforcement learning
下载PDF
Multi-Objective Task Assignment for Maximizing Social Welfare in Spatio-Temporal Crowdsourcing 被引量:3
20
作者 Shengnan Wu Yingjie Wang Xiangrong Tong 《China Communications》 SCIE CSCD 2021年第11期11-25,共15页
With the development of the Internet of Things(IoT),spatio-temporal crowdsourcing(mobile crowdsourcing)has become an emerging paradigm for addressing location-based sensing tasks.However,the delay caused by network tr... With the development of the Internet of Things(IoT),spatio-temporal crowdsourcing(mobile crowdsourcing)has become an emerging paradigm for addressing location-based sensing tasks.However,the delay caused by network transmission has led to low data processing efficiency.Fortunately,edge computing can solve this problem,effectively reduce the delay of data transmission,and improve data processing capacity,so that the crowdsourcing platform can make better decisions faster.Therefore,this paper combines spatio-temporal crowdsourcing and edge computing to study the Multi-Objective Optimization Task Assignment(MOO-TA)problem in the edge computing environment.The proposed online incentive mechanism considers the task difficulty attribute to motivate crowd workers to perform sensing tasks in the unpopular area.In this paper,the Weighted and Multi-Objective Particle Swarm Combination(WAMOPSC)algorithm is proposed to maximize both platform’s and crowd workers’utility,so as to maximize social welfare.The algorithm combines the traditional Linear Weighted Summation(LWS)algorithm and Multi-Objective Particle Swarm Optimization(MOPSO)algorithm to find pareto optimal solutions of multi-objective optimization task assignment problem as much as possible for crowdsourcing platform to choose.Through comparison experiments on real data sets,the effectiveness and feasibility of the proposed method are evaluated. 展开更多
关键词 spatio-temporal crowdsourcing edge computing task assignment multi-objective optimization particle swarm optimization Pareto optimal solution
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部