-
12521
Deep reinforcement learning based task allocation mechanism for intelligent inspection in energy Internet
Published 2021-05-01“…In order to reduce the cost and improve efficiency of power line inspection, UAV (unmanned aerial vehicle), which use mobile edge computing technology to access and process service data, are used to inspect power lines in the energy internet.However, due to the dynamic changes of UAV data transmission demand and geographical location, the edge server load will be unbalanced, which causes higher service processing delay and network energy consumption.Thus, an intelligent inspection task allocation mechanism for energy internet based on deep reinforcement learning was proposed.First, a two-layer edge network task offloading model was established to archive joint optimization of multi-objectives, such as delay and energy consumption.It was designed by comprehensively considering the route of UAV and edge nodes, different demands of services and limited service capabilities of edge nodes.Furthermore, based on Lyapunov optimization theory and dual-time-scaled mechanism, proximal policy optimization algorithm based deep reinforcement learning was used to solve the connection relationship and offloading strategy of edge servers between fixed edge sink layer and mobile edge access layer.The simulation results show that, the proposed mechanism can reduce the service request delay and system energy consumption while ensuring the stability of system.…”
Get full text
Article -
12522
Study on Single Cycle Production Allocation and Supply Strategy for DCEs Based on the CVaR Criterion
Published 2018-01-01“…Subsequently, an approximate algorithm for solving the optimal total production amount is presented. …”
Get full text
Article -
12523
Fuzzy Coordinated PI Controller: Application to the Real-Time Pressure Control Process
Published 2008-01-01“…The proposed control algorithm is experimentally implemented for the real-time pressure control of a pilot air tank system and validated using a high-speed 32-bit ARM7 embedded microcontroller board (ATMEL AT91M55800A). …”
Get full text
Article -
12524
Cluster-projected matrix product state: Framework for engineering exact quantum many-body ground states in one and two dimensions
Published 2025-01-01“…The key to find such a solution is a systematic protocol, which projects out excited states on every cluster using MPS and effectively entangles the cluster states. This algorithm not only offers an exact solution to general frustration-free Hamiltonian, but even provide the excited eigenstates by setting a proper target. …”
Get full text
Article -
12525
Traffic classification in SDN-based IoT network using two-level fused network with self-adaptive manta ray foraging
Published 2025-01-01“…This paper presents a novel traffic classification framework for SDN-based IoT networks, introducing a Two-Level Fused Network integrated with a self-adaptive Manta Ray Foraging Optimization (SMRFO) algorithm. The framework automatically selects optimal features and fuses multi-level network insights to enhance classification accuracy. …”
Get full text
Article -
12526
An outlook on structural biology after AlphaFold: tools, limits and perspectives
Published 2025-02-01“…Indeed, user‐driven intervention is still as pivotal in the structure prediction process as in complementing state‐of‐the‐art algorithms with functional and biological knowledge.…”
Get full text
Article -
12527
Load-to-store: exploit the time leakage of store buffer transient window
Published 2023-04-01“…To research the vulnerability of modern microarchitecture and consider the mitigation, memory order buffer which was responsible for managing the execution order of memory access instructions was analyzed and found that load forward would directly bypass the data of dependent store instructions to load instructions, and speculative load would execute independent load instructions in advance.While bring efficiency optimizations, it might also lead to errors and corresponding blocking.The existing optimization mechanisms on the Intel Coffee Lake microarchitecture, and the leak attack scheme by using them were analyzed.Using the four execution modes of MOB and the corresponding duration, a variety of attacks were constructed including transient attack, covert channel, and recovery of the private key of the cryptographic algorithm.The time difference caused by MOB was used to leak the address of memory instructions, and the implementation of AES T table was attacked.Key recovery experiments were conducted on AES-128 with OpenSSL 3.0.0 on an Intel i5-9400 processor.The experimental results show that 30 000 sets of samples can recover a key byte with a probability of 63.6%.Due to the characteristics of memory order buffer, the concealment of the exploit is better than traditional cache time leaks.…”
Get full text
Article -
12528
An Investigation of the Feasibility of Feedstock to Support the UK’s Sustainable Aviation Fuel Goals
Published 2025-01-01“…These findings are fed into a novel weighting algorithm that is designed to assess a number of factors, including various technical characteristics and feasibility studies, as well as produce a detailed outlook of the future potential of each fuel blend. …”
Get full text
Article -
12529
Modeling and Dynamical Analysis of the Water Resources Supply-Demand System: A Case Study in Haihe River Basin
Published 2014-01-01“…Then, the gray code hybrid accelerating genetic algorithm (GHAGA) is adopted to identify the unknown parameters of the system based on the statistic data (1998–2009). …”
Get full text
Article -
12530
Cognitive Optimization in Assistive Living System Development
Published 2012-01-01“…Support for this approach stems from the artificial intelligence field where optimization is considered to be a critical aspect of cognition, and from the similarity between the performance metrics for the two problem domains. A search algorithm is developed using the bracketing and gradient methods as inherited knowledge. …”
Get full text
Article -
12531
Gear Fault Diagnosis Based on APIT-SA-MEMD and FLLE
Published 2022-11-01“…To solve this problem, an intelligent fault diagnosis method based on adaptive projection intrinsically transformation sine-assisted multivariate empirical mode decomposition (APIT-SA-MEMD) and Floyd local linear embedding (FLLE) algorithm is proposed. Multivariate empirical mode decomposition of adaptive projection intrinsically transformation has modal aliasing phenomenon, so APIT-SA-MEMD is proposed to reduce the modal aliasing phenomenon existing in traditional empirical mode decomposition. …”
Get full text
Article -
12532
Using rule association to generate data collection policies
Published 2021-10-01“…Collecting security-related data of devices effectively is the foundation of analyzing network threats accurately.Existing data collection methods (full data collection, sampling based data collection and adaptive data collection) do not consider the validity of the collected data and their correlation, which will consume too much collection resources, resulting in low collection yield.To address this problem, considering the factors (relationship between node attributes, network topology relationship, threat status, node resource and node similarity) that impact collection costs and benefits, a rule association method to generate collection policies was designed.In the method, two types of association rules (inter-node association rules and inter-event association rules) were adopted to generate candidate data collection items and reduced the scope of data collection.Then, a multi-objective program was designed to maximize collection benefits and minimize collection costs.Further, a genetic algorithm was designed to solve this program.Proposed method was compared with existing data collection methods.The experimental results show that the number of the collected data records of proposed method is 1 000~3 000 less than that of others per 12 hours, and the validity of the collected data of proposed method is about 4%~10% higher than others, which proves the effectiveness of the proposed method.…”
Get full text
Article -
12533
Enhancing Video Games Policy Based on Least-Squares Continuous Action Policy Iteration: Case Study on StarCraft Brood War and Glest RTS Games and the 8 Queens Board Game
Published 2016-01-01“…So in this paper we proposed a new algorithm based on LSPI called Least-Squares Continuous Action Policy Iteration (LSCAPI). …”
Get full text
Article -
12534
Cognitive Inference Device for Activity Supervision in the Elderly
Published 2014-01-01“…To frame the CI-device, we propose a device design framework along with an inference algorithm and implement the designs through an artificial neural model with different configurations, mapping the CI-device’s functions to minimise the device’s prediction error. …”
Get full text
Article -
12535
A new neurodynamic model with Adam optimization method for solving generalized eigenvalue problem
Published 2021-06-01“…The experiments demonstrate that our algorithm using Adam optimizer, in comparison with other stochastic optimization methods like gradient descent works well in practice and improves complexity and accuracy of convergence.…”
Get full text
Article -
12536
Enhanced Modeling and Control of Organic Rankine Cycle Systems via AM‐LSTM Networks Based Nonlinear MPC
Published 2025-01-01“…Furthermore, a multi‐objective optimization approach that integrates nonlinear model predictive control (NMPC) with the multiverse optimizer (MVO) algorithm is implemented to ensure effective control under varying operating conditions and constraints. …”
Get full text
Article -
12537
Internal Leakage Diagnosis of a Hydraulic Cylinder Based on Optimization DBN Using the CEEMDAN Technique
Published 2021-01-01“…The reconstructed signals are regarded as the input of the optimization DBN, and the particle swarm optimization simulated annealing (PSOSA) algorithm is adopted to identify the four internal leakage levels. …”
Get full text
Article -
12538
Solving linear Fredholm-Stieltjes integral equations of the second kind by using the generalized Simpson’s rule
Published 2016-05-01“…The graph of these results is plotted. An algorithm of this application is given by using Maple. …”
Get full text
Article -
12539
Identification on the structures of block ciphers using machine learning
Published 2023-06-01“…Cryptographic identification is a critical aspect of cryptanalysis and a fundamental premise for key recovery.With the advancement of artificial intelligence, cryptanalysis based on machine learning has become increasingly mature, providing more effective methods and valuable insights for cryptographic identification.The distinguishability experiments were performed based on the Machine Learning to identify the structures of block ciphers in conditions of random keys.The identification of two structures of block ciphers from theoretical and experimental angles was studied.The differences of features in two structures’ cipher texts have been deduced by introducing the runs distribution index, feature distribution functions, KL-divergence, etc.After completing the feasibility research, experiments to identify the structures of two block ciphers using two Machine Learning models and the runs distribution index were conducted.The experiments were divided into two groups: single algorithm group and mixture algorithms group.It is found that the accuracy of both groups are more than 80%, which is around 40% higher than former work.The problem of identifying the structures of Block Ciphers in the conditions of random keys is solved in detail.Meanwhile, differences between the two structures of block ciphers are verified, which can serve as a reference for the design of cryptography algorithms.…”
Get full text
Article -
12540
Development of a standardized data collection and intelligent fabric quality prediction system for the weaving department
Published 2025-01-01“…This study leverages the standardization and interoperability features of open platform communications unified architecture technology to facilitate data acquisition within the weaving department, establishing a reliable Internet of Things framework that supports subsequent fabric quality prediction, and optimizing the back propagation neural network through the K-means clustering algorithm and particle swarm optimization to predict the type and number of fabric defects. …”
Get full text
Article