Resource Type

Journal Article 464

Year

2024 1

2023 49

2022 47

2021 59

2020 50

2019 36

2018 36

2017 34

2016 39

2015 7

2014 1

2013 4

2012 3

2011 5

2010 1

2009 5

2008 9

2007 11

2006 11

2005 16

open ︾

Keywords

neural network 16

Deep learning 10

Artificial intelligence 8

Neural network 8

Software-defined networking (SDN) 7

Machine learning 5

cyberspace 5

cyberspace security 5

6G 4

ANN 3

Attention mechanism 3

BP neural network 3

Boolean control networks 3

Network security 3

fuzzy sets 3

5G 2

Accelerator 2

Artificial intelligence (AI) 2

BP algorithm 2

open ︾

Search scope:

排序: Display mode:

Output tracking of delayed logical control networks withmulti-constraint Research Articles

Ya-ting ZHENG, Jun-e FENG

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 2,   Pages 316-323 doi: 10.1631/FITEE.1900376

Abstract: In this study, the output tracking of delayed logical control networks (DLCNs) with state and control constraints is further investigated. Compared with other delays, state-dependent delay updates its value depending on the current state values and a pseudo-logical function. Multiple constraints mean that state values are constrained in a nonempty set and the design of the controller is conditioned. Using the semi-tensor product of matrices, dynamical equations of DLCNs are converted into an algebraic description, and an equivalent augmented system is constructed. Based on the augmented system, the output tracking problem is transformed into a set stabilization problem. A deformation of the state transition matrix is computed, and a necessary and sufficient condition is derived for the output tracking of a DLCN with multi-constraint. This condition is easily verified by mathematical software. In addition, the admissible state-feedback controller is designed to enable the outputs of the DLCN to track the reference signal. Finally, theoretical results are illustrated by an example.

Keywords: Logical control networks     Multi-constraint     Output tracking     Stabilization     State-dependent delay     Semi-tensor product    

Newdevelopments in control design techniques of logical control networks Review Articles

Xiang-shan KONG, Shu-ling WANG, Hai-tao LI, Fuad E. ALSAADI

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 2,   Pages 220-233 doi: 10.1631/FITEE.1900397

Abstract: The control design problem plays a fundamental role in the study of logical control networks (LCNs). This paper presents a detailed survey on new developments in control design techniques of LCNs. First, some preliminary results on the semi-tensor product method and LCNs are reviewed. Then, we move on to some new developments for control design techniques of LCNs, including the reachable set approach, the pinning control technique, the control Lyapunov function approach, the event-triggered control technique, and the sampled-data control technique. Finally, an illustrative example is given to demonstrate the effectiveness of these techniques.

Keywords: Logical control network     Control design     Semi-tensor product of matrices    

A fuzzy integrated congestion-aware routing algorithm for network on chip Research Articles

Shahrouz Yasrebi, Akram Reza, Mohammad Nikravan, Seena Vazifedan,a.reza@qodsiau.ac.ir,a.ak.reza@gmail.com

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 5,   Pages 615-766 doi: 10.1631/FITEE.2000069

Abstract: (NoC) is an infrastructure providing a communication platform to multiprocessor chips. Furthermore, the wormhole-switching method, which shares resources, was used to increase its efficiency; however, this can lead to congestion. Moreover, dealing with this congestion consumes more energy and correspondingly leads to increase in power consumption. Furthermore, consuming more power results in more heat and increases thermal fluctuations that lessen the life span of the infrastructures and, more importantly, the network’s performance. Given these complications, providing a method that controls congestion is a significant design challenge. In this paper, a is presented to enhance the NoC’s performance when facing congestion. To avoid congestion, the proposed algorithm employs the occupied input buffer and the total occupied buffers of the neighboring nodes along with the maximum possible path diversity with minimal path length from instant neighbors to the destination as the selection parameters. To enhance the path selection function, the uncertainty of the algorithm is used. As a result, the average delay, power consumption, and maximum delay are reduced by 14.88%, 7.98%, and 19.39%, respectively. Additionally, the proposed method enhances the throughput and the total number of packets received by 14.9% and 11.59%, respectively. To show the significance, the proposed algorithm is examined using transpose traffic patterns, and the average delay is improved by 15.3%. The average delay is reduced by 3.8% in TMPEG-4 (treble MPEG-4), 36.6% in QPIP (quadruplicate PIP), and 20.9% in TVOPD (treble VOPD).

Keywords: 片上网络;路由算法;拥塞控制;模糊逻辑    

A Fuzzy Neural Network Based on Rough Sets and Its Applications to Chemical Fiber Production

Chen Shuangye,Yi Jikai

Strategic Study of CAE 2001, Volume 3, Issue 12,   Pages 42-46

Abstract:

A fuzzy neural network based on rough sets is presented in this paper. First, a set of rough rules are found from the given training data by using rough sets theory, then the structure and model are designed according these rules, and then the model is trained by neural network technique. The experiments that simulate the control process of side-wind for chemical fiber are carried out. The results proved its efficiency and feasibility.

Keywords: rough sets     fuzzy logic     neural network     rules extracted    

State space optimization of finite state machines from the viewpoint of control theory Research Article

Jumei Yue, Yongyi Yan, Zengqiang Chen, He Deng,yjm@mail.nankai.edu.cn,yyyan@mail.nankai.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 12,   Pages 1551-1684 doi: 10.1631/FITEE.2000608

Abstract: Motivated by the inconvenience or even inability to explain the mathematics of the state of (FSMs) in most existing results, we consider the problem by viewing FSMs as logical dynamic systems. Borrowing ideas from the concept of equilibrium points of dynamic systems in control theory, the concepts of -equivalent states and -source equivalent states are introduced. Based on the state transition dynamic equations of FSMs proposed in recent years, several mathematical formulations of -equivalent states and -source equivalent states are proposed. These can be analogized to the necessary and sufficient conditions of equilibrium points of dynamic systems in control theory and thus give a mathematical explanation of the optimization problem. Using these mathematical formulations, two methods are designed to find all the -equivalent states and -source equivalent states of FSMs. Further, two ways of reducing the state space of FSMs are found. These can be implemented without computers but with only pen and paper in a mathematical manner. In addition, an open question is raised which can further improve these methods into unattended ones. Finally, the correctness and effectiveness of the proposed methods are verified by a practical language model.

Keywords: 有限状态自动机;有限值系统;逻辑系统;逻辑网络;矩阵半张量积;空间优化    

An approach to bandwidth management based on fuzzy logic

Li Zuxin,Wang Wanliang,Lei Bicheng,Chen Huiying

Strategic Study of CAE 2008, Volume 10, Issue 7,   Pages 104-111

Abstract:

 In networked control systems(NCSs),a fuzzy logic modulator,which is based on mapping relationship of one-dimensional input and one-dimensional output,is designed for the dynamic management of control systems' bandwidth. By adjusting a nonlinear offset factor in the fuzzy logic modulator,the control performance and requirement of bandwidth can be further improved.Moreover,the upper and lower bound of the assignable bandwidth,which guarantee the system's stability,are evaluated in terms of linear matrix inequalities and the restrained resource conditions.Finally, normalizable criterions of the quality of control (QoC) and requirement of bandwidth (RoB) are also defined,which can estimate the performance of the whole networked control systems. On those criterions, the proposed algorithm, namely fuzzy bandwidth management (FBM) , and traditional fixed bandwidth allocation (FBA) are compared. The results of simulation highlight that the proposed algorithm can significantly improve performance and save more bandwidth of control loop than the other one.

Keywords: fuzzy bandwidth management     networked control systems     quality of control     requirement ofbandwidth    

NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers Article

Yu-jun XIAO, Wen-yuan XU, Zhen-hua JIA, Zhuo-ran MA, Dong-lian QI

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 4,   Pages 519-534 doi: 10.1631/FITEE.1601540

Abstract: Industrial control systems (ICSs) are widely used in critical infrastructures, making them popular targets for attacks to cause catastrophic physical damage. As one of the most critical components in ICSs, the programmable logic controller (PLC) controls the actuators directly. A PLC executing a malicious program can cause significant property loss or even casualties. The number of attacks targeted at PLCs has increased noticeably over the last few years, exposing the vulnerability of the PLC and the importance of PLC protection. Unfortunately, PLCs cannot be protected by traditional intrusion detection systems or antivirus software. Thus, an effective method for PLC protection is yet to be designed. Motivated by these concerns, we propose a non-invasive powerbased anomaly detection scheme for PLCs. The basic idea is to detect malicious software execution in a PLC through analyzing its power consumption, which is measured by inserting a shunt resistor in series with the CPU in a PLC while it is executing instructions. To analyze the power measurements, we extract a discriminative feature set from the power trace, and then train a long short-term memory (LSTM) neural network with the features of normal samples to predict the next time step of a normal sample. Finally, an abnormal sample is identified through comparing the predicted sample and the actual sample. The advantages of our method are that it requires no software modification on the original system and is able to detect unknown attacks effectively. The method is evaluated on a lab testbed, and for a trojan attack whose difference from the normal program is around 0.63%, the detection accuracy reaches 99.83%.

Keywords: Industrial control system     Programmable logic controller     Side-channel     Anomaly detection     Long short-term memory neural networks    

The Strict Avalanche Criterion of Order k Spectral Properties of m-Valued Logical Functions

Guojinhui,LiShiqu

Strategic Study of CAE 2005, Volume 7, Issue 12,   Pages 45-48

Abstract:

Many cryptographic properties of m - valued logical functions are often described by their Chrestenson cyclic spectrums and auto-correlation functions, so Chrestenson cyclic spectrums and autocorrelation functions play important roles in properties and construct ions for m-valued logical functions. In this paper, in residue class ring Zm, the concept of the strict avalanche criterion of order k of m-valued logical functions is presented. Then, by applying probabilistic thought and methods, the rule that a w-valued logical function fulfills the SAC of lower order if it fulfills the SAC of higher order is proved. Finally, by Chrestenson cyclic spectrums, a necessary and sufficient condition on a m-valued logical function is given, which fulfills the strict avalanche criterion of order k.

Keywords: m-valued logical function     Chrestenson cyclic spectrum     auto-correlation function     the strict avalanche criterion    

Design of an eco-gearshift control strategy under a logic system framework Research Articles

Ming-xin KANG, Jin-wu GAO

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 2,   Pages 340-350 doi: 10.1631/FITEE.1900459

Abstract: Good access to traffic information provides enormous potential for automotive powertrain control. We propose a logical control approach for the gearshift strategy, aimed at improving the fuel efficiency of vehicles. The driver power demand in a specific position usually exhibits stochastic features and can be statistically analyzed in accordance with historical driving data and instant traffic conditions; therefore, it offers opportunities for the design of a gearshift control scheme. Due to the discrete characteristics of a gearshift, the control design of the gearshift strategy can be formulated under a logic system framework. To this end, vehicle dynamics are discretized with several logic states, and then modeled as a logic system with the Markov process model. The fuel optimization problem is constructed as a receding-horizon optimal control problem under the logic system framework, and a dynamic programming algorithm with algebraic operations is applied to determine the optimal strategy online. Simulation results demonstrate that the proposed control design has better potential for fuel efficiency improvement than the conventional method.

Keywords: Stochastic logic system     Gearshift strategy     Receding-horizon optimization     Traffic information     Eco-driving    

Design and analysis of carbon nanotube FET based quaternary full adders Article

Mohammad Hossein MOAIYERI,Shima SEDIGHIANI,Fazel SHARIFI,Keivan NAVI

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 10,   Pages 1056-1066 doi: 10.1631/FITEE.1500214

Abstract: CMOS binary logic is limited by short channel effects, power density, and interconnection restrictions. The effective solution is non-silicon multiple-valued logic (MVL) computing. This study presents two high-performance quaternary full adder cells based on carbon nanotube field effect transistors (CNTFETs). The proposed designs use the unique properties of CNTFETs such as achieving a desired threshold voltage by adjusting the carbon nanotube diameters and having the same mobility as p-type and n-type devices. The proposed circuits were simulated under various test conditions using the Synopsys HSPICE simulator with the 32 nm Stanford comprehensive CNTFET model. The proposed designs have on average 32% lower delay, 68% average power, 83% energy consumption, and 77% static power compared to current state-of-the-art quaternary full adders. Simulation results indicated that the proposed designs are robust against process, voltage, and temperature variations, and are noise tolerant.

Keywords: Nanoelectronics     Carbon nanotube FET     Multiple-valued logic     Quaternary logic    

A quality requirements model and verification approach for system of systems based on description logic Article

Qing-long WANG,Zhi-xue WANG,Ting-ting ZHANG,Wei-xing ZHU

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3,   Pages 346-361 doi: 10.1631/FITEE.1500309

Abstract: System of systems engineering (SoSE) involves the complex procedure of translating capability needs into the high-level requirements for system of systems (SoS) and evaluating how the SoS quality requirements meet their capability needs. One of the key issues is to model the SoS requirements and automate the verification procedure. To solve the problem of modeling and verification, meta-models are proposed to refine both functional and non-functional characteristics of the SoS requirements. A domain-specific modeling language is defined by extending Unified Modeling Language (UML) class and association with fuzzy constructs to model the vague and uncertain concepts of the SoS quality requirements. The efficiency evaluation function of the cloud model is introduced to evaluate the efficiency of the SoS quality requirements. Then a concise algorithm transforms the fuzzy UML models into the description logic (DL) ontology so that the verification can be automated with a DL reasoner. This method implements modeling and verification of high-level SoS quality requirements. A crisp case is used to facilitate and demonstrate the correctness and feasibility of this method.

Keywords: System of systems (SoS)     Cloud model     Description logic (DL)     Requirements verification    

Internal Logic and Development Path of the“Two Mountains” Theory for Ecological Civilization Construction

Hu Yongjun, Wu Jian, Hu Ruishan

Strategic Study of CAE 2019, Volume 21, Issue 5,   Pages 151-158 doi: 10.15302/J-SSCAE-2019.05.004

Abstract:

The “two mountain” theory (i.e., lucid waters and lush mountains are invaluable assets) is the core concept for ecological civilization construction in China, and it will guide the development of ecological civilization throughout the country for a long time.This paper aims to provide paths and models for ecological civilization construction and rural revitalization, thus to enrich the “two mountains” theory. The economic growth theory and the externality theory are applied to analyze the core logic for realizing the value of ecological products and the internal logic of green growth, and the basic routes for “two mountains” practices are proposed. The core logic for realizing the value of ecological products is to guide and standardize the ecologization of economic subjects in the micro level, and the main paths include collecting ecological tax and dues, building up eco-market, taking ecological compensation, and establishing a green financial market. The internal logic of regional green growth is a positive cycle of transformation, coordination, and feedback between the ecology and “space–industry–main body”, and the main paths include space planning, ecological construction, ecological beautification, ecological industry, ecologization of traditional industry, high-end industry, ecological culture,ecological system, and ecological technology. This study is hoped to provide a reference for the top-level framework and development models for national ecological civilization construction and rural revitalization.

Keywords: ecological civilization construction     “two mountains” theory     logic     path    

The Cryptographic Properties of Select Logic Functions

Liang Zeng,Li Shiqu

Strategic Study of CAE 2005, Volume 7, Issue 7,   Pages 50-54

Abstract:

In this paper, the main results are concerned with the Walsh transform and the autocorrelation function of select logic functions. Select logic functions with large number of variables have perfect stability and can resist towards cryptanalysis of best affine approximation, but they can't resist towards differential cryptanalysis efficiently because of weak propagation property. By a linear transformation of coordinates, an explicit construction for functions satisfying the strict avalanche criterion or Being correlation immune is provided.

Keywords: select logic function     Walsh transform     autocorrelation function     strict avalanche criterion     correlation immune     probability expressions    

Research on the Structure Model and Mining Algorithm for Knowledge Discovery Based on Knowledge Base (KDK)

Yang Bingru,Shen Jiangtao,Chen Hongjie

Strategic Study of CAE 2003, Volume 5, Issue 6,   Pages 49-54

Abstract:

Knowledge discovery in knowledge base (KDK) is a brand-new task. Its success will directly act on the construction of large knowledge base, and, at present, it is important to the solving of the bottleneck of machine study—discovering knowledge. The main work of this paper is: The inductive structure of KDK based on the facts in knowledge base, and its algorithm and experimental verification; The inductive structure algorithm of KDK for the rules in knowledge base and its experimental verification.

Keywords: knowledge discovery based on knowledge base     induction logic of Carnap     induction logic of L. J. Cohen     evaluation of hypothesis    

Stochastic extra-gradient based alternating direction methods for graph-guided regularizedminimization None

Qiang LAN, Lin-bo QIAO, Yi-jie WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 6,   Pages 755-762 doi: 10.1631/FITEE.1601771

Abstract: In this study, we propose and compare stochastic variants of the extra-gradient alternating direction method, named the stochastic extra-gradient alternating direction method with Lagrangian function (SEGL) and the stochastic extra-gradient alternating direction method with augmented Lagrangian function (SEGAL), to minimize the graph-guided optimization problems, which are composited with two convex objective functions in large scale. A number of important applications in machine learning follow the graph-guided optimization formulation, such as linear regression, logistic regression, Lasso, structured extensions of Lasso, and structured regularized logistic regression. We conduct experiments on fused logistic regression and graph-guided regularized regression. Experimental results on several genres of datasets demonstrate that the proposed algorithm outperforms other competing algorithms, and SEGAL has better performance than SEGL in practical use.

Keywords: Stochastic optimization     Graph-guided minimization     Extra-gradient method     Fused logistic regression     Graph-guided regularized logistic regression    

Title Author Date Type Operation

Output tracking of delayed logical control networks withmulti-constraint

Ya-ting ZHENG, Jun-e FENG

Journal Article

Newdevelopments in control design techniques of logical control networks

Xiang-shan KONG, Shu-ling WANG, Hai-tao LI, Fuad E. ALSAADI

Journal Article

A fuzzy integrated congestion-aware routing algorithm for network on chip

Shahrouz Yasrebi, Akram Reza, Mohammad Nikravan, Seena Vazifedan,a.reza@qodsiau.ac.ir,a.ak.reza@gmail.com

Journal Article

A Fuzzy Neural Network Based on Rough Sets and Its Applications to Chemical Fiber Production

Chen Shuangye,Yi Jikai

Journal Article

State space optimization of finite state machines from the viewpoint of control theory

Jumei Yue, Yongyi Yan, Zengqiang Chen, He Deng,yjm@mail.nankai.edu.cn,yyyan@mail.nankai.edu.cn

Journal Article

An approach to bandwidth management based on fuzzy logic

Li Zuxin,Wang Wanliang,Lei Bicheng,Chen Huiying

Journal Article

NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers

Yu-jun XIAO, Wen-yuan XU, Zhen-hua JIA, Zhuo-ran MA, Dong-lian QI

Journal Article

The Strict Avalanche Criterion of Order k Spectral Properties of m-Valued Logical Functions

Guojinhui,LiShiqu

Journal Article

Design of an eco-gearshift control strategy under a logic system framework

Ming-xin KANG, Jin-wu GAO

Journal Article

Design and analysis of carbon nanotube FET based quaternary full adders

Mohammad Hossein MOAIYERI,Shima SEDIGHIANI,Fazel SHARIFI,Keivan NAVI

Journal Article

A quality requirements model and verification approach for system of systems based on description logic

Qing-long WANG,Zhi-xue WANG,Ting-ting ZHANG,Wei-xing ZHU

Journal Article

Internal Logic and Development Path of the“Two Mountains” Theory for Ecological Civilization Construction

Hu Yongjun, Wu Jian, Hu Ruishan

Journal Article

The Cryptographic Properties of Select Logic Functions

Liang Zeng,Li Shiqu

Journal Article

Research on the Structure Model and Mining Algorithm for Knowledge Discovery Based on Knowledge Base (KDK)

Yang Bingru,Shen Jiangtao,Chen Hongjie

Journal Article

Stochastic extra-gradient based alternating direction methods for graph-guided regularizedminimization

Qiang LAN, Lin-bo QIAO, Yi-jie WANG

Journal Article