Resource Type

Journal Article 1836

Conference Videos 116

Conference Information 31

Conference Topics 3

Year

2024 4

2023 160

2022 190

2021 200

2020 127

2019 125

2018 124

2017 109

2016 67

2015 59

2014 44

2013 47

2012 43

2011 44

2010 56

2009 36

2008 58

2007 69

2006 71

2005 80

open ︾

Keywords

Machine learning 16

Deep learning 15

Artificial intelligence 12

disruptive technology 11

COVID-19 10

Multi-agent system 8

Additive manufacturing 7

mathematical model 7

numerical simulation 7

Intelligent manufacturing 6

Multi-agent systems 6

Sustainability 6

architecture 6

simulation 6

Qinba Mountain Area 5

Safety 5

neural network 5

system engineering 5

Climate change 4

open ︾

Search scope:

排序: Display mode:

A cooperative heterogeneous vehicular clustering framework for efficiency improvement Research Articles

Iftikhar Ahmad, Rafidah Md Noor, Zaheed Ahmed, Umm-e-Habiba, Naveed Akram, Fausto Pedro García Márquez,ify_ia@yahoo.com,faustopedro.garcia@uclm.es

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 9,   Pages 1247-1259 doi: 10.1631/FITEE.2000260

Abstract: Heterogeneous ing integrates multiple types of communication networks to work efficiently for various vehicular applications. One popular form of heterogeneous network is the integration of long-term evolution (LTE) and dedicated short-range communication. The of such a network infrastructure and the non- involved in sharing cost/data are potential problems to solve. A ing framework is one solution to these problems, but the framework should be formally verified and validated before being deployed in the real world. To solve these issues, first, we present a heterogeneous framework, named destination and interest-aware clustering, for ing that integrates vehicular ad hoc networks with the LTE network for improving road traffic efficiency. Then, we specify a model system of the proposed framework. The model is formally verified to evaluate its performance at the functional level using a model checking technique. To evaluate the performance of the proposed framework at the micro-level, a heterogeneous simulation environment is created by integrating state-of-the-art tools. The comparison of the simulation results with those of other known approaches shows that our proposed framework performs better.

Keywords: 车辆集群;异构性;协同;形式验证;系统模型    

Avision of post-exascale programming None

Ji-dong ZHAI, Wen-guang CHEN

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 10,   Pages 1261-1266 doi: 10.1631/FITEE.1800442

Abstract:

Exascale systems have been under development for quite some time and will be available for use in a few years. It is time to think about future post-exascale systems. There are many main challenges with regard to future post-exascale systems, such as processor architecture, programming, storage, and interconnect. In this study, we discuss three significant programming challenges for future post-exascale systems: heterogeneity, parallelism, and fault tolerance. Based on our experience of programming on current large-scale systems, we propose several potential solutions for these challenges. Nevertheless, more research efforts are needed to solve these problems.

Keywords: Computing model     Fault-tolerance     Heterogeneous     Parallelism     Post-exascale    

The provable security formal analysis of 802.11i authentication scheme

Song Yubo,Hu Aiqun,Yao Bingxin

Strategic Study of CAE 2010, Volume 12, Issue 1,   Pages 67-73

Abstract:

802.11i standard is proposed by IEEE 802.11 Standard Group to improve the security of the WLAN. In 802.11i, 802.1x standard is used for the authentication and access controll. How to analyze the security of the new protocol to prove its validity is the most interesting problem we are concerned. In order to solve this problem, an expanded Bellare-Rogaway model is established to give a provable security formal analysis on this protocol. By utilizing the expanded Bellare-Rogaway model, a flaw has been found in 802.1X authentication protocols and the corresponding man-in-the-middle attack is given here.

Keywords: 802.11i     Bellare-Rogaway model     provable security     formal analysis    

Development and Key Technologies of Maritime Unmanned Systems

Qiu Zhiming, Meng Xiangyao, Ma Yan, Chen Yi, Feng Wei

Strategic Study of CAE 2023, Volume 25, Issue 3,   Pages 74-83 doi: 10.15302/J-SSCAE-2023.03.005

Abstract:

Maritime unmanned system are crucial for future intelligent and unmanned warfare. They have become a new height of competition in the maritime domain and will play an increasingly important role in national defense security. Considering the development demand for national intelligence and unmanned strategies, the study analyzes the development status of maritime unmanned systems and corresponding technologies in China and abroad from the aspects of strategic planning and conceptual guidance, technological research and equipment development, and system demonstration and capability verification. The challenges and trends for the development of maritime unmanned systems are summarized and key technical challenges are proposed. Moreover, development pathways of maritime unmanned systems in key directions are explored and countermeasures to promote the sustained, steady, and rapid development of maritime unmanned systems are recommended from the perspectives of overall thinking, system composition, equipment development, and technology breakthroughs.

Keywords: maritime unmanned systems     cluster intelligent     cross-domain collaboration     key technologies    

Anewhierarchical software architecture towards safety-critical aspects of a drone system Special Feature on Intelligent Robats

Xiao-rui ZHU, Chen LIANG, Zhen-guo YIN, Zhong SHAO, Meng-qi LIU, Hao CHEN

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 3,   Pages 353-362 doi: 10.1631/FITEE.1800636

Abstract:

A new hierarchical software architecture is proposed to improve the safety and reliability of a safetycritical drone system from the perspective of its source code. The proposed architecture uses formal verification methods to ensure that the implementation of each module satisfies its expected design specification, so that it prevents a drone from crashing due to unexpected software failures. This study builds on top of a formally verified operating system kernel, certified kit operating system (CertiKOS). Since device drivers are considered the most important parts affecting the safety of the drone system, we focus mainly on verifying bus drivers such as the serial peripheral interface and the inter-integrated circuit drivers in a drone system using a rigorous formal verification method. Experiments have been carried out to demonstrate the improvement in reliability in case of device anomalies.

Keywords: Safety-critical     Drone     Software architecture     Formal verification    

Programming bare-metal accelerators with heterogeneous threading models: a case study of Matrix-3000 Research Article

Jianbin FANG, Peng ZHANG, Chun HUANG, Tao TANG, Kai LU, Ruibo WANG, Zheng WANG,j.fang@nudt.edu.cn,zhangpeng13a@nudt.edu.cn,chunhuang@nudt.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 4,   Pages 509-520 doi: 10.1631/FITEE.2200359

Abstract: As the hardware industry moves toward using specialized heterogeneous many-core processors to avoid the effects of the power wall, software developers are finding it hard to deal with the complexity of these systems. In this paper, we share our experience of developing a programming model and its supporting compiler and libraries for Matrix-3000, which is designed for next-generation exascale supercomputers but has a complex memory hierarchy and processor organization. To assist its software development, we have developed a software stack from scratch that includes a low-level programming interface and a high-level OpenCL compiler. Our low-level programming model offers native programming support for using the bare-metal accelerators of Matrix-3000, while the high-level model allows programmers to use the OpenCL programming standard. We detail our design choices and highlight the lessons learned from developing system software to enable the programming of bare-metal accelerators. Our programming models have been deployed in the production environment of an exascale prototype system.

Keywords: Heterogeneous computing     Parallel programming models     Programmability     Compilers     Runtime systems    

Zero-failure accelerated reliability demonstration test method based on degradation model

Zhang Huirui

Strategic Study of CAE 2015, Volume 17, Issue 5,   Pages 31-37

Abstract:

Traditional life demonstration test is conducted under normal conditions and fails to use degradation observations,thus requires large amount of time and money. We can employ degradation data to predict whether a unit will pass the test by the end of test,and the test can be terminated early when this prediction does not cost unacceptable risk. Also higher stress can accelerate the degradation of the unit to cut down the test time. Thus it is necessary to propose a method that take advantage of both degradation data and accelerated test to reduce the test time and cost,which is done by this article. In particular,the article propose an approach to analyses and calculate the additional risks caused by early termination of the test and applying higher stress based on degradation model,then the minimum sample size of different test time can be picked. The article also use optimal plan to give expected test time and give deciding rules of terminating the test for each unit. At last,the method is illustrated by an example, showing that the method is efficient in reducing test time.

Keywords: degradation model;accelerated testing;life demonstration;risk analysis;optimum plan    

Federated mutual learning: a collaborative machine learning method for heterogeneous data, models, and objectives Research Article

Tao SHEN, Jie ZHANG, Xinkang JIA, Fengda ZHANG, Zheqi LV, Kun KUANG, Chao WU, Fei WU,chao.wu@zju.edu.cn,wufei@zju.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 10,   Pages 1390-1402 doi: 10.1631/FITEE.2300098

Abstract: (FL) is a novel technique in deep learning that enables clients to collaboratively train a shared model while retaining their decentralized data. However, researchers working on FL face several unique challenges, especially in the context of heterogeneity. Heterogeneity in data distributions, computational capabilities, and scenarios among clients necessitates the development of customized models and objectives in FL. Unfortunately, existing works such as FedAvg may not effectively accommodate the specific needs of each client. To address the challenges arising from heterogeneity in FL, we provide an overview of the heterogeneities in data, model, and objective (DMO). Furthermore, we propose a novel framework called federated mutual learning (FML), which enables each client to train a personalized model that accounts for the data heterogeneity (DH). A "meme model" serves as an intermediary between the personalized and global models to address model heterogeneity (MH). We introduce a technique called deep mutual learning (DML) to transfer knowledge between these two models on local data. To overcome objective heterogeneity (OH), we design a shared global model that includes only certain parts, and the personalized model is task-specific and enhanced through mutual learning with the meme model. We evaluate the performance of FML in addressing DMO heterogeneities through experiments and compare it with other commonly used FL methods in similar scenarios. The results demonstrate that FML outperforms other methods and effectively addresses the DMO challenges encountered in the FL setting.

Keywords: Federated learning     Knowledge distillation     Privacy preserving     Heterogeneous environment    

A novel confidence estimation method for heterogeneous implicit feedback Article

Jing WANG, Lan-fen LIN, Heng ZHANG, Jia-qi TU, Peng-hua YU

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11,   Pages 1817-1827 doi: 10.1631/FITEE.1601468

Abstract: Implicit feedback, which indirectly reflects opinion through user behaviors, has gained increasing attention in rec-ommender system communities due to its accessibility and richness in real-world applications. A major way of exploiting implicit feedback is to treat the data as an indication of positive and negative preferences associated with vastly varying confidence levels. Such algorithms assume that the numerical value of implicit feedback, such as time of watching, indicates confidence, rather than degree of preference, and a larger value indicates a higher confidence, although this works only when just one type of implicit feedback is available. However, in real-world applications, there are usually various types of implicit feedback, which can be referred to as heterogeneous implicit feedback. Existing methods cannot efficiently infer confidence levels from heterogeneous implicit feedback. In this paper, we propose a novel confidence estimation approach to infer the confidence level of user prefer-ence based on heterogeneous implicit feedback. Then we apply the inferred confidence to both point-wise and pair-wise matrix factorization models, and propose a more generic strategy to select effective training samples for pair-wise methods. Experiments on real-world e-commerce datasets from Tmall.com show that our methods outperform the state-of-the-art approaches, consid-ering several commonly used ranking-oriented evaluation criteria.

Keywords: Recommender systems     Heterogeneous implicit feedback     Confidence     Collaborative filtering     E-commerce    

Study of Existing Problems and Solution in Vehicle Monitoring System

Zhu Zhuangsheng,Wan Dejun,Wang Qing,Zhang Xiaoguo

Strategic Study of CAE 2003, Volume 5, Issue 9,   Pages 49-54

Abstract:

The purpose of this paper was providing some experience and ready reference for people who could design a utile and abroad popular GPS vehicle monitoring system. The author demonstrated some problems existing in the vehicle monitoring system, such as digital map model errors lead to map matching errors; telecommunication system information lag results in vehicle real time position error and global position system multipath error affects vehicle position. The authors had provided some schemes for solving the problems,e. g. GIS/DR protocol for solving telecommunication system information lag, nerve cell for solving global position system multipath. Experiment showed that the solution schemes had eliminated the system errors. The solution schemes had been applied to some projects,and had acquired very good application effect.

Keywords: GPS     digital map     vehicle monitoring system     telecommunication system    

Exploring financially constrained small- and medium-sized enterprises based on a multi-relation translational graph attention network Research Article

Qianqiao LIANG, Hua WEI, Yaxi WU, Feng WEI, Deng ZHAO, Jianshan HE, Xiaolin ZHENG, Guofang MA, Bing HAN

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 3,   Pages 388-402 doi: 10.1631/FITEE.2200151

Abstract: (FNE), which explores financially constrained small- and medium-sized enterprises (SMEs), has become increasingly important in industry for financial institutions to facilitate SMEs' development. In this paper, we first perform an insightful exploratory analysis to exploit the transfer phenomenon of financing needs among SMEs, which motivates us to fully exploit the multi-relation enterprise social network for boosting the effectiveness of FNE. The main challenge lies in modeling two kinds of heterogeneity, i.e., and SMEs' , under different relation types simultaneously. To address these challenges, we propose a graph neural network named Multi-relation tRanslatIonal GrapH aTtention network (M-RIGHT), which not only models the of financing needs along different relation types based on a novel entity–relation composition operator but also enables heterogeneous SMEs' representations based on a translation mechanism on relational hyperplanes to distinguish SMEs' heterogeneous behaviors under different relation types. Extensive experiments on two large-scale real-world datasets demonstrate M-RIGHT's superiority over the state-of-the-art methods in the FNE task.

Keywords: Financing needs exploration     Graph representation learning     Transfer heterogeneity     Behavior heterogeneity    

Study on Data Locality and Its Optimization Technologies in Multiprocessor Systems

Yang Xuejun,Dai Huadong,Xia Jun

Strategic Study of CAE 2002, Volume 4, Issue 5,   Pages 44-52

Abstract:

As one of the most important issues in multiprocessor systems, data locality is a main direction of studies on such systems. Combining the recent research achievements by the authors with the current state of studies in this field, a systematic discussion on data locality and its optimization technologies in multiprocessor systems was brought forth. Driven by the deficiency of current locality measurement models, an enhanced model suitable for hierarchy parallel computer architectures was proposed. Besides, from the viewpoint of static locality optimization technologies, a data transformation framework based on projection and delaminating policy was designed. While on the side of dynamic locality optimization technologies, a dynamic page migration mechanism based on instantaneous access information was implemented. More discussion about both static and dynamic optimization policies was presented in this paper. In addition, in-depth investigation on memory consistency model ,which raised as a key problem in exploiting locality optimization, was also stressed and a new model centered on operating system——thread consistency model was put forward.

Keywords: computer     multiprocessorsystem     data locality     locality measurement model     data transformation framework     page migration     thread consistency model    

Using improved particle swarm optimization totune PID controllers in cooperative collision avoidance systems Article

Xing-chen WU, Gui-he QIN, Ming-hui SUN, He YU, Qian-yi XU

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 9,   Pages 1385-1395 doi: 10.1631/FITEE.1601427

Abstract: The introduction of proportional-integral-derivative (PID) controllersinto cooperative collision avoidance systems (CCASs) has been hinderedby difficulties in their optimization and by a lack of study of theireffects on vehicle driving stability, comfort, and fuel economy. Inthis paper, we propose a method to optimize PID controllers usingan improved particle swarm optimization (PSO) algorithm, and to bettermanipulate cooperative collision avoidance with other vehicles. First,we use PRESCAN and MATLAB/Simulink to conduct a united simulation,which constructs a CCAS composed of a PID controller, maneuver strategyjudging modules, and a path planning module. Then we apply the improvedPSO algorithm to optimize the PID controller based on the dynamicvehicle data obtained. Finally, we perform a simulation test of performancebefore and after the optimization of the PID controller, in whichvehicles equipped with a CCAS undertake deceleration driving and steeringunder the two states of low speed (≤50 km/h) and high speed (≥100km/h) cruising. The results show that the PID controller optimizedusing the proposed method can achieve not only the basic functionsof a CCAS, but also improvements in vehicle dynamic stability, ridingcomfort, and fuel economy.

Keywords: Cooperative collision avoidance system (CCAS)     Improved particle swarm optimization (PSO)     PID controller     Vehicle comfort     Fuel economy    

Reliability Sensitivity Design of Vehicle Familiar Spring

Zhang Yimin,Liu Qiaolingi,Wen Bangchun

Strategic Study of CAE 2004, Volume 6, Issue 1,   Pages 74-80

Abstract:

Based on the reliability design theory and sensitivity analysis method, the reliability sensitivity of the familiar spring for vehicles is extensively discussed and a numerical method for reliability sensitivity design is presented. The variation regularities of reliability sensitivity are obtained and the effects of design parameters on reliability of the familiar spring for vehicles are studied. The method presented in this paper provides the theoretic basis for the reliability design of the vehicle familiar spring.

Keywords: vehicle familiar spring     reliability design     sensitivity     arbitrary distribution parameters    

Containment control for heterogeneous nonlinear multi-agent systems under distributed event-triggered schemes Research Articles

Ya-ni Sun, Wen-cheng Zou, Jian Guo, Zheng-rong Xiang,xiangzr@njust.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 1,   Pages 1-140 doi: 10.1631/FITEE.2000034

Abstract: We study the problem for high-order heterogeneous nonlinear under distributed event-triggered schemes. To achieve the objective and reduce communication consumption among agents, a scheme is proposed by applying the backstepping method, Lyapunov functional approach, and neural networks. Then, the results are extended to the self-triggered control case to avoid continuous monitoring of state errors. The developed protocols and triggered rules ensure that the output for each follower converges to the convex hull spanned by multi-leader signals within a bounded error. In addition, no agent exhibits . Two numerical simulations are finally presented to verify the correctness of the obtained results.

Keywords: Multi-agent systems     Distributed event-triggered control     Containment control     Heterogeneous nonlinear systems     Zeno behavior    

Title Author Date Type Operation

A cooperative heterogeneous vehicular clustering framework for efficiency improvement

Iftikhar Ahmad, Rafidah Md Noor, Zaheed Ahmed, Umm-e-Habiba, Naveed Akram, Fausto Pedro García Márquez,ify_ia@yahoo.com,faustopedro.garcia@uclm.es

Journal Article

Avision of post-exascale programming

Ji-dong ZHAI, Wen-guang CHEN

Journal Article

The provable security formal analysis of 802.11i authentication scheme

Song Yubo,Hu Aiqun,Yao Bingxin

Journal Article

Development and Key Technologies of Maritime Unmanned Systems

Qiu Zhiming, Meng Xiangyao, Ma Yan, Chen Yi, Feng Wei

Journal Article

Anewhierarchical software architecture towards safety-critical aspects of a drone system

Xiao-rui ZHU, Chen LIANG, Zhen-guo YIN, Zhong SHAO, Meng-qi LIU, Hao CHEN

Journal Article

Programming bare-metal accelerators with heterogeneous threading models: a case study of Matrix-3000

Jianbin FANG, Peng ZHANG, Chun HUANG, Tao TANG, Kai LU, Ruibo WANG, Zheng WANG,j.fang@nudt.edu.cn,zhangpeng13a@nudt.edu.cn,chunhuang@nudt.edu.cn

Journal Article

Zero-failure accelerated reliability demonstration test method based on degradation model

Zhang Huirui

Journal Article

Federated mutual learning: a collaborative machine learning method for heterogeneous data, models, and objectives

Tao SHEN, Jie ZHANG, Xinkang JIA, Fengda ZHANG, Zheqi LV, Kun KUANG, Chao WU, Fei WU,chao.wu@zju.edu.cn,wufei@zju.edu.cn

Journal Article

A novel confidence estimation method for heterogeneous implicit feedback

Jing WANG, Lan-fen LIN, Heng ZHANG, Jia-qi TU, Peng-hua YU

Journal Article

Study of Existing Problems and Solution in Vehicle Monitoring System

Zhu Zhuangsheng,Wan Dejun,Wang Qing,Zhang Xiaoguo

Journal Article

Exploring financially constrained small- and medium-sized enterprises based on a multi-relation translational graph attention network

Qianqiao LIANG, Hua WEI, Yaxi WU, Feng WEI, Deng ZHAO, Jianshan HE, Xiaolin ZHENG, Guofang MA, Bing HAN

Journal Article

Study on Data Locality and Its Optimization Technologies in Multiprocessor Systems

Yang Xuejun,Dai Huadong,Xia Jun

Journal Article

Using improved particle swarm optimization totune PID controllers in cooperative collision avoidance systems

Xing-chen WU, Gui-he QIN, Ming-hui SUN, He YU, Qian-yi XU

Journal Article

Reliability Sensitivity Design of Vehicle Familiar Spring

Zhang Yimin,Liu Qiaolingi,Wen Bangchun

Journal Article

Containment control for heterogeneous nonlinear multi-agent systems under distributed event-triggered schemes

Ya-ni Sun, Wen-cheng Zou, Jian Guo, Zheng-rong Xiang,xiangzr@njust.edu.cn

Journal Article