Search scope:
排序: Display mode:
A cooperative heterogeneous vehicular clustering framework for efficiency improvement Research Articles
Iftikhar Ahmad, Rafidah Md Noor, Zaheed Ahmed, Umm-e-Habiba, Naveed Akram, Fausto Pedro García Márquez,ify_ia@yahoo.com,faustopedro.garcia@uclm.es
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 9, Pages 1247-1259 doi: 10.1631/FITEE.2000260
Keywords: 车辆集群;异构性;协同;形式验证;系统模型
Avision of post-exascale programming None
Ji-dong ZHAI, Wen-guang CHEN
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 10, Pages 1261-1266 doi: 10.1631/FITEE.1800442
Exascale systems have been under development for quite some time and will be available for use in a few years. It is time to think about future post-exascale systems. There are many main challenges with regard to future post-exascale systems, such as processor architecture, programming, storage, and interconnect. In this study, we discuss three significant programming challenges for future post-exascale systems: heterogeneity, parallelism, and fault tolerance. Based on our experience of programming on current large-scale systems, we propose several potential solutions for these challenges. Nevertheless, more research efforts are needed to solve these problems.
Keywords: Computing model Fault-tolerance Heterogeneous Parallelism Post-exascale
The provable security formal analysis of 802.11i authentication scheme
Song Yubo,Hu Aiqun,Yao Bingxin
Strategic Study of CAE 2010, Volume 12, Issue 1, Pages 67-73
802.11i standard is proposed by IEEE 802.11 Standard Group to improve the security of the WLAN. In 802.11i, 802.1x standard is used for the authentication and access controll. How to analyze the security of the new protocol to prove its validity is the most interesting problem we are concerned. In order to solve this problem, an expanded Bellare-Rogaway model is established to give a provable security formal analysis on this protocol. By utilizing the expanded Bellare-Rogaway model, a flaw has been found in 802.1X authentication protocols and the corresponding man-in-the-middle attack is given here.
Keywords: 802.11i Bellare-Rogaway model provable security formal analysis
Development and Key Technologies of Maritime Unmanned Systems
Qiu Zhiming, Meng Xiangyao, Ma Yan, Chen Yi, Feng Wei
Strategic Study of CAE 2023, Volume 25, Issue 3, Pages 74-83 doi: 10.15302/J-SSCAE-2023.03.005
Maritime unmanned system are crucial for future intelligent and unmanned warfare. They have become a new height of competition in the maritime domain and will play an increasingly important role in national defense security. Considering the development demand for national intelligence and unmanned strategies, the study analyzes the development status of maritime unmanned systems and corresponding technologies in China and abroad from the aspects of strategic planning and conceptual guidance, technological research and equipment development, and system demonstration and capability verification. The challenges and trends for the development of maritime unmanned systems are summarized and key technical challenges are proposed. Moreover, development pathways of maritime unmanned systems in key directions are explored and countermeasures to promote the sustained, steady, and rapid development of maritime unmanned systems are recommended from the perspectives of overall thinking, system composition, equipment development, and technology breakthroughs.
Keywords: maritime unmanned systems cluster intelligent cross-domain collaboration key technologies
Anewhierarchical software architecture towards safety-critical aspects of a drone system Special Feature on Intelligent Robats
Xiao-rui ZHU, Chen LIANG, Zhen-guo YIN, Zhong SHAO, Meng-qi LIU, Hao CHEN
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 3, Pages 353-362 doi: 10.1631/FITEE.1800636
A new hierarchical software architecture is proposed to improve the safety and reliability of a safetycritical drone system from the perspective of its source code. The proposed architecture uses formal verification methods to ensure that the implementation of each module satisfies its expected design specification, so that it prevents a drone from crashing due to unexpected software failures. This study builds on top of a formally verified operating system kernel, certified kit operating system (CertiKOS). Since device drivers are considered the most important parts affecting the safety of the drone system, we focus mainly on verifying bus drivers such as the serial peripheral interface and the inter-integrated circuit drivers in a drone system using a rigorous formal verification method. Experiments have been carried out to demonstrate the improvement in reliability in case of device anomalies.
Keywords: Safety-critical Drone Software architecture Formal verification
Programming bare-metal accelerators with heterogeneous threading models: a case study of Matrix-3000 Research Article
Jianbin FANG, Peng ZHANG, Chun HUANG, Tao TANG, Kai LU, Ruibo WANG, Zheng WANG,j.fang@nudt.edu.cn,zhangpeng13a@nudt.edu.cn,chunhuang@nudt.edu.cn
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 4, Pages 509-520 doi: 10.1631/FITEE.2200359
Keywords: Heterogeneous computing Parallel programming models Programmability Compilers Runtime systems
Zero-failure accelerated reliability demonstration test method based on degradation model
Zhang Huirui
Strategic Study of CAE 2015, Volume 17, Issue 5, Pages 31-37
Traditional life demonstration test is conducted under normal conditions and fails to use degradation observations,thus requires large amount of time and money. We can employ degradation data to predict whether a unit will pass the test by the end of test,and the test can be terminated early when this prediction does not cost unacceptable risk. Also higher stress can accelerate the degradation of the unit to cut down the test time. Thus it is necessary to propose a method that take advantage of both degradation data and accelerated test to reduce the test time and cost,which is done by this article. In particular,the article propose an approach to analyses and calculate the additional risks caused by early termination of the test and applying higher stress based on degradation model,then the minimum sample size of different test time can be picked. The article also use optimal plan to give expected test time and give deciding rules of terminating the test for each unit. At last,the method is illustrated by an example, showing that the method is efficient in reducing test time.
Keywords: degradation model;accelerated testing;life demonstration;risk analysis;optimum plan
Federated mutual learning: a collaborative machine learning method for heterogeneous data, models, and objectives Research Article
Tao SHEN, Jie ZHANG, Xinkang JIA, Fengda ZHANG, Zheqi LV, Kun KUANG, Chao WU, Fei WU,chao.wu@zju.edu.cn,wufei@zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 10, Pages 1390-1402 doi: 10.1631/FITEE.2300098
Keywords: Federated learning Knowledge distillation Privacy preserving Heterogeneous environment
A novel confidence estimation method for heterogeneous implicit feedback Article
Jing WANG, Lan-fen LIN, Heng ZHANG, Jia-qi TU, Peng-hua YU
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11, Pages 1817-1827 doi: 10.1631/FITEE.1601468
Keywords: Recommender systems Heterogeneous implicit feedback Confidence Collaborative filtering E-commerce
Study of Existing Problems and Solution in Vehicle Monitoring System
Zhu Zhuangsheng,Wan Dejun,Wang Qing,Zhang Xiaoguo
Strategic Study of CAE 2003, Volume 5, Issue 9, Pages 49-54
The purpose of this paper was providing some experience and ready reference for people who could design a utile and abroad popular GPS vehicle monitoring system. The author demonstrated some problems existing in the vehicle monitoring system, such as digital map model errors lead to map matching errors; telecommunication system information lag results in vehicle real time position error and global position system multipath error affects vehicle position. The authors had provided some schemes for solving the problems,e. g. GIS/DR protocol for solving telecommunication system information lag, nerve cell for solving global position system multipath. Experiment showed that the solution schemes had eliminated the system errors. The solution schemes had been applied to some projects,and had acquired very good application effect.
Keywords: GPS digital map vehicle monitoring system telecommunication system
Exploring financially constrained small- and medium-sized enterprises based on a multi-relation translational graph attention network Research Article
Qianqiao LIANG, Hua WEI, Yaxi WU, Feng WEI, Deng ZHAO, Jianshan HE, Xiaolin ZHENG, Guofang MA, Bing HAN
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 3, Pages 388-402 doi: 10.1631/FITEE.2200151
Keywords: Financing needs exploration Graph representation learning Transfer heterogeneity Behavior heterogeneity
Study on Data Locality and Its Optimization Technologies in Multiprocessor Systems
Yang Xuejun,Dai Huadong,Xia Jun
Strategic Study of CAE 2002, Volume 4, Issue 5, Pages 44-52
As one of the most important issues in multiprocessor systems, data locality is a main direction of studies on such systems. Combining the recent research achievements by the authors with the current state of studies in this field, a systematic discussion on data locality and its optimization technologies in multiprocessor systems was brought forth. Driven by the deficiency of current locality measurement models, an enhanced model suitable for hierarchy parallel computer architectures was proposed. Besides, from the viewpoint of static locality optimization technologies, a data transformation framework based on projection and delaminating policy was designed. While on the side of dynamic locality optimization technologies, a dynamic page migration mechanism based on instantaneous access information was implemented. More discussion about both static and dynamic optimization policies was presented in this paper. In addition, in-depth investigation on memory consistency model ,which raised as a key problem in exploiting locality optimization, was also stressed and a new model centered on operating system——thread consistency model was put forward.
Keywords: computer multiprocessorsystem data locality locality measurement model data transformation framework page migration thread consistency model
Xing-chen WU, Gui-he QIN, Ming-hui SUN, He YU, Qian-yi XU
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 9, Pages 1385-1395 doi: 10.1631/FITEE.1601427
Keywords: Cooperative collision avoidance system (CCAS) Improved particle swarm optimization (PSO) PID controller Vehicle comfort Fuel economy
Reliability Sensitivity Design of Vehicle Familiar Spring
Zhang Yimin,Liu Qiaolingi,Wen Bangchun
Strategic Study of CAE 2004, Volume 6, Issue 1, Pages 74-80
Based on the reliability design theory and sensitivity analysis method, the reliability sensitivity of the familiar spring for vehicles is extensively discussed and a numerical method for reliability sensitivity design is presented. The variation regularities of reliability sensitivity are obtained and the effects of design parameters on reliability of the familiar spring for vehicles are studied. The method presented in this paper provides the theoretic basis for the reliability design of the vehicle familiar spring.
Keywords: vehicle familiar spring reliability design sensitivity arbitrary distribution parameters
Containment control for heterogeneous nonlinear multi-agent systems under distributed event-triggered schemes Research Articles
Ya-ni Sun, Wen-cheng Zou, Jian Guo, Zheng-rong Xiang,xiangzr@njust.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 1, Pages 1-140 doi: 10.1631/FITEE.2000034
Keywords: Multi-agent systems Distributed event-triggered control Containment control Heterogeneous nonlinear systems Zeno behavior
Title Author Date Type Operation
A cooperative heterogeneous vehicular clustering framework for efficiency improvement
Iftikhar Ahmad, Rafidah Md Noor, Zaheed Ahmed, Umm-e-Habiba, Naveed Akram, Fausto Pedro García Márquez,ify_ia@yahoo.com,faustopedro.garcia@uclm.es
Journal Article
The provable security formal analysis of 802.11i authentication scheme
Song Yubo,Hu Aiqun,Yao Bingxin
Journal Article
Development and Key Technologies of Maritime Unmanned Systems
Qiu Zhiming, Meng Xiangyao, Ma Yan, Chen Yi, Feng Wei
Journal Article
Anewhierarchical software architecture towards safety-critical aspects of a drone system
Xiao-rui ZHU, Chen LIANG, Zhen-guo YIN, Zhong SHAO, Meng-qi LIU, Hao CHEN
Journal Article
Programming bare-metal accelerators with heterogeneous threading models: a case study of Matrix-3000
Jianbin FANG, Peng ZHANG, Chun HUANG, Tao TANG, Kai LU, Ruibo WANG, Zheng WANG,j.fang@nudt.edu.cn,zhangpeng13a@nudt.edu.cn,chunhuang@nudt.edu.cn
Journal Article
Zero-failure accelerated reliability demonstration test method based on degradation model
Zhang Huirui
Journal Article
Federated mutual learning: a collaborative machine learning method for heterogeneous data, models, and objectives
Tao SHEN, Jie ZHANG, Xinkang JIA, Fengda ZHANG, Zheqi LV, Kun KUANG, Chao WU, Fei WU,chao.wu@zju.edu.cn,wufei@zju.edu.cn
Journal Article
A novel confidence estimation method for heterogeneous implicit feedback
Jing WANG, Lan-fen LIN, Heng ZHANG, Jia-qi TU, Peng-hua YU
Journal Article
Study of Existing Problems and Solution in Vehicle Monitoring System
Zhu Zhuangsheng,Wan Dejun,Wang Qing,Zhang Xiaoguo
Journal Article
Exploring financially constrained small- and medium-sized enterprises based on a multi-relation translational graph attention network
Qianqiao LIANG, Hua WEI, Yaxi WU, Feng WEI, Deng ZHAO, Jianshan HE, Xiaolin ZHENG, Guofang MA, Bing HAN
Journal Article
Study on Data Locality and Its Optimization Technologies in Multiprocessor Systems
Yang Xuejun,Dai Huadong,Xia Jun
Journal Article
Using improved particle swarm optimization totune PID controllers in cooperative collision avoidance systems
Xing-chen WU, Gui-he QIN, Ming-hui SUN, He YU, Qian-yi XU
Journal Article
Reliability Sensitivity Design of Vehicle Familiar Spring
Zhang Yimin,Liu Qiaolingi,Wen Bangchun
Journal Article