Resource Type

Journal Article 508

Year

2023 59

2022 54

2021 44

2020 37

2019 61

2018 28

2017 34

2016 20

2015 15

2014 7

2013 8

2012 4

2011 11

2010 10

2009 10

2008 9

2007 9

2006 9

2005 9

2004 11

open ︾

Keywords

Machine learning 42

Deep learning 34

Artificial intelligence 14

Reinforcement learning 14

the Belt and Road 9

Active learning 4

genetic algorithm 4

sustainable development 4

Bayesian optimization 3

Big data 3

Adaptive dynamic programming 2

Additive manufacturing 2

Attention 2

Autonomous driving 2

Autonomous learning 2

Classification 2

Data-driven 2

Distributed optimization 2

Feature learning 2

open ︾

Search scope:

排序: Display mode:

Post-quantum blind signcryption scheme from lattice Research Articles

Huifang Yu, Lu Bai,yuhuifang@xupt.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 6,   Pages 891-901 doi: 10.1631/FITEE.2000099

Abstract: (BSC) can guarantee the blindness and untrackability of signcrypted messages, and moreover, it provides simultaneous unforgeability and confidentiality. Most traditional BSC schemes are based on the number theory. However, with the rapid development of quantum computing, traditional BSC systems are faced with severe security threats. As promising candidate cryptosystems with the ability to resist attacks from quantum computing, s have attracted increasing attention in academic fields. In this paper, a post-quantum scheme from lattice (PQ-LBSCS) is devised by applying BSC to s. PQ-LBSCS inherits the advantages of the and technique. PQ-LBSCS is provably secure under the hard assumptions of the learning with error problem and small integer solution problem in the standard model. Simulations are carried out using the Matlab tool to analyze the computational efficiency, and the simulation results show that PQ-LBSCS is more efficient than previous schemes. PQ-LBSCS has extensive application prospects in e-commerce, mobile communication, and smart cards.

Keywords: 格密码系统;盲签密;抗量子计算;带错误学习问题;最短向量问题    

An error recognition method for power equipment defect records based on knowledge graph technology Regular Article

Hui-fang Wang, Zi-quan Liu,huifangwang@zju.edu.cn

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 11,   Pages 1564-1577 doi: 10.1631/FITEE.1800260

Abstract: To recognize errors in the s in real time, we propose an method based on technology. According to the characteristics of s, a method for constructing a of power equipment defects is presented. Then, a graph search algorithm is employed to recognize different kinds of errors in defect records, based on the of power equipment defects. Finally, an example in terms of transformer defect records is given, by comparing the precision, recall, -score, accuracy, and efficiency of the proposed method with those of methods, and the factors influencing the effects of various methods are analyzed. Results show that the proposed method performs better in of defect records than methods, and can satisfy real-time requirements.

Keywords: 错误识别;电力设备缺陷记录;知识图谱;机器学习    

Application Research on Vehicle Routing Problem With Time Windows Based on Dynamic Ant Algorithm

Liu Yunzhong,Xuan Huiyu

Strategic Study of CAE 2005, Volume 7, Issue 12,   Pages 35-40

Abstract:

Ant algorithm is a newly emerged stochastic searching optimization algorithm in recent years. It has been paid much attention to since the successful application in the famous traveling salesman problem. This paper further extends the idea of this new biological optimization strategy to vehicle routing problem with time windows in logistic management and designs a new kind of dynamic ant algorithm. The ability of optimization of this new ant algorithm is tested through numerical computation which gives encouraging results.

Keywords: ant algorithm     vehicle routing problem with time windows     logistic management     dynamic    

Several Strategic Issues for the Construction of Ecological Civilization in Yangtze River Economic Belt

Hao Jiming, Wang Jinnan, Zhang Shougong, Wu Fengchang, Jiang Hongqiang, Wu Wenjun, Chen Lyujun, Zhang Linbo, Liu Nianlei

Strategic Study of CAE 2022, Volume 24, Issue 1,   Pages 141-147 doi: 10.15302/J-SSCAE-2022.01.015

Abstract:

To promote the construction of ecological civilization in the Yangtze River Economic Belt, the Chinese Academy of Engineering launched a major consulting project in 2019 titled “Study on Several Strategic Issues for the Construction of Ecological Civilization in Yangtze River Economic Belt”. Based on the results of the project, this paper summarizes the achievements of ecological civilization construction in Yangtze River Economic Belt in terms of top-level design, green demonstration, ecological protection, and environmental improvement, and then analyzes its main challenges regarding territorial development, industrial layout, river–lake relationship, ecological security, energy development, and environmental risks. Based on the concept of a life community of mountains,rivers, forests, farmland, lakes, grass, and sand, we propose several strategic suggestions focusing on ecological space management and control, water ecosystem health, green and high-quality development, ecological protection and restoration, ecological agriculture and forestry development, ecological product value realization, and ecolog¬ical civilization governance system.

Keywords: Yangtze River Economic Belt,ecological civilization,ecological space,environmental quality,strategic issue    

Analyzing Design Mistakes in the “Bean Curd Dregs” Engineering Design

Zhang Zhaoshen

Strategic Study of CAE 2004, Volume 6, Issue 11,   Pages 8-19

Abstract:

The paper discusses the omission in analyzing the worst stressed state and the mistake in strength and stability checking computations method for compression and bending member, by analyzing the available construction calculation analysis program function, in order to approach the reason of Qijiang arch bridge breakdown. Especially the paper queries whether there exists the bend section modular calculating method for dumbbell or round end rectangular section arch rib, to prove the existence of a lot of unsafe factors in the steel pipe-concrete arched bridge. Finally the paper recommends, the designer to change the idea of unilaterally chasing new and strange into the principle of safe, durable and useful,so as to design and build the structure that will never break down for a century.

Keywords: “Bean curd dregs” engineering     mistake of design     degree of safety    

Constructing pairing-free certificateless public key encryption with keyword search Research Articles

Yang LU, Ji-guo LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1049-1060 doi: 10.1631/FITEE.1700534

Abstract: Searchable public key encryption enables a storage server to retrieve the publicly encrypted data without revealing the original data contents. It offers a perfect cryptographic solution to encrypted data retrieval in encrypted data storage systems. Certificateless cryptography (CLC) is a novel cryptographic primitive that has many merits. It overcomes the key escrow problem in identity-based cryptosystems and the cumbersome certificate problem in conventional public key cryptosystems. Motivated by the appealing features of CLC, three certificateless encryption with keyword search (CLEKS) schemes were presented in the literature. However, all of them were constructed with the costly bilinear pairing and thus are not suitable for the devices that have limited computing resources and battery power. So, it is interesting and worthwhile to design a CLEKS scheme without using bilinear pairing. In this study, we put forward a pairing-free CLEKS scheme that does not exploit bilinear pairing. We strictly prove that the scheme achieves keyword ciphertext indistinguishability against adaptive chosen-keyword attacks under the complexity assumption of the computational Diffie-Hellman problem in the random oracle model. Efficiency comparison and the simulation show that it enjoys better performance than the previous pairing-based CLEKS schemes. In addition, we briefly introduce three extensions of the proposed CLEKS scheme.

Keywords: Searchable public key encryption     Certificateless public key encryption with keyword search     Bilinear pairing     Computational Diffie-Hellman problem    

Proximal policy optimization with an integral compensator for quadrotor control Research

Huan Hu, Qing-ling Wang,qlwang@seu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 5,   Pages 649-808 doi: 10.1631/FITEE.1900641

Abstract: We use the advanced (PPO) algorithm to optimize the stochastic control strategy to achieve speed control of the “model-free” quadrotor. The model is controlled by four learned s, which directly map the system states to control commands in an end-to-end style. By introducing an integral compensator into the actor-critic framework, the speed tracking accuracy and robustness have been greatly enhanced. In addition, a two-phase learning scheme which includes both offline- and online-learning is developed for practical use. A model with strong generalization ability is learned in the offline phase. Then, the flight policy of the model is continuously optimized in the online learning phase. Finally, the performances of our proposed algorithm are compared with those of the traditional PID algorithm.

Keywords: 强化学习;近端策略优化;四旋翼控制;神经网络    

A descent method for the Dubins traveling salesman problem with neighborhoods Research Articles

Zheng Chen, Chen-hao Sun, Xue-ming Shao, Wen-jie Zhao,z_chen@zju.edu.cn,mecsxm@zju.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 5,   Pages 615-766 doi: 10.1631/FITEE.2000041

Abstract: In this study, we focus mainly on the problem of finding the minimum-length path through a set of circular regions by a fixed-wing unmanned aerial vehicle. Such a problem is referred to as the with neighborhoods (DTSPN). Algorithms developed in the literature for solving DTSPN either are computationally demanding or generate low-quality solutions. To achieve a better trade-off between solution quality and computational cost, an efficient gradient-free is designed. The core idea of the is to decompose DTSPN into a series of subproblems, each of which consists of finding the minimum-length path of a from a configuration to another configuration via an intermediate circular region. By analyzing the geometric properties of the subproblems, we use a bisection method to solve the subproblems. As a result, the can efficiently address DTSPN by successively solving a series of subproblems. Finally, several numerical experiments are carried out to demonstrate the in comparison with several existing algorithms.

Keywords: Dubins飞行器;坐标下降法;Dubins旅行商问题    

Miniaturized five fundamental issues about visual knowledge Perspectives

Yun-he Pan,panyh@zju.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 5,   Pages 615-766 doi: 10.1631/FITEE.2040000

Abstract: 认知心理学早已指出,人类知识记忆中的重要部分是视觉知识,被用来进行形象思维。因此,基于视觉的人工智能(AI)是AI绕不开的课题,且具有重要意义。本文继《论视觉知识》一文,讨论与之相关的5个基本问题:(1)视觉知识表达;(2)视觉识别;(3)视觉形象思维模拟;(4)视觉知识的学习;(5)多重知识表达。视觉知识的独特优点是具有形象的综合生成能力,时空演化能力和形象显示能力。这些正是字符知识和深度神经网络所缺乏的。AI与计算机辅助设计/图形学/视觉的技术联合将在创造、预测和人机融合等方面对AI新发展提供重要的基础动力。视觉知识和多重知识表达的研究是发展新的视觉智能的关键,也是促进AI 2.0取得重要突破的关键理论与技术。这是一块荒芜、寒湿而肥沃的“北大荒”,也是一块充满希望值得多学科合作勇探的“无人区”。

Keywords: 视觉知识表达;视觉识别;视觉形象思维模拟;视觉知识学习;多重知识表达    

Message delay time distribution analysis for controller area network under errors Research Papers

Lei-ming ZHANG, Yi-chao SUN, Yong LEI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6,   Pages 760-772 doi: 10.1631/FITEE.1700815

Abstract:

Controller area network (CAN) is a widely used fieldbus protocol in various industrial applications. To understand the network behavior under errors for the optimal design of networked control systems, the message response time of the CAN network needs to be analyzed. In this study, a novel delay time distribution analysis method for the response messages is proposed when considering errors. In this method the complex message queues are decomposed into typical message patterns and cases. First, a stochastic fault model is developed, and the probability factor is defined to calculate the error distribution. Then the message delay time distribution for the single slave node configuration is analyzed based on the error distribution. Next, based on the delay time distribution analysis of typical patterns and cases, an analysis framework of message delay time distribution for the master/slave configuration is developed. The testbed is constructed and case studies are conducted to demonstrate the proposed methodology under different network configurations. Experimental results show that the delay time distributions calculated by the proposed method agree well with the actual observations.

Keywords: Controller area network     Message delay     Probability distribution     Errors    

A new constrained maximum margin approach to discriminative learning of Bayesian classifiers None

Ke GUO, Xia-bi LIU, Lun-hao GUO, Zong-jie LI, Zeng-min GENG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 5,   Pages 639-650 doi: 10.1631/FITEE.1700007

Abstract: We propose a novel discriminative learning approach for Bayesian pattern classification, called ‘constrained maximum margin (CMM)’. We define the margin between two classes as the difference between the minimum decision value for positive samples and the maximum decision value for negative samples. The learning problem is to maximize the margin under the constraint that each training pattern is classified correctly. This nonlinear programming problem is solved using the sequential unconstrained minimization technique. We applied the proposed CMM approach to learn Bayesian classifiers based on Gaussian mixture models, and conducted the experiments on 10 UCI datasets. The performance of our approach was compared with those of the expectation-maximization algorithm, the support vector machine, and other state-of-the-art approaches. The experimental results demonstrated the effectiveness of our approach.

Keywords: Discriminative learning     Statistical modeling     Bayesian pattern classifiers     Gaussian mixture models     UCI datasets    

Controller area network node reliability assessment based on observable node information Article

Lei-ming ZHANG, Long-hao TANG, Yong LEI

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 5,   Pages 615-626 doi: 10.1631/FITEE.1601029

Abstract: Controller area network (CAN) based fieldbus technologies have been widely used in networked manufacturing systems. As the information channel of the system, the reliability of the network is crucial to the system throughput, product quality, and work crew safety. However, due to the inaccessibility of the nodes’ internal states, direct assessment of the reliability of CAN nodes using the nodes’ internal error counters is infeasible. In this paper, a novel CAN node reliability assessment method, which uses node’s time to bus-off as the reliability measure, is proposed. The method estimates the transmit error counter (TEC) of any node in the network based on the network error log and the information provided by the observable nodes whose error counters are accessible. First, a node TEC estimation model is established based on segmented Markov chains. It considers the sparseness of the distribution of the CAN network errors. Second, by learning the differences between the model estimates and the actual values from the observable node, a Bayesian network is developed for the estimation updating mechanism of the observable nodes. Then, this estimation updating mechanism is transferred to general CAN nodes with no TEC value accessibility to update the TEC estimation. Finally, a node reliability assessment method is developed to predict the time to reach bus-off state of the nodes. Case studies are carried out to demonstrate the effectiveness of the proposed methodology. Experimental results show that the estimates using the proposed model agree well with actual observations.

Keywords: Controller area network (CAN)     Transmit error counter (TEC)     TEC value estimation     Bayesian network     Bus-off hitting time    

Quantum security analysis of a lattice-basedoblivious transfer protocol Article

Mo-meng LIU, Juliane KRÄMER, Yu-pu HU, Johannes BUCHMANN

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 9,   Pages 1348-1369 doi: 10.1631/FITEE.1700039

Abstract: Because of the concise functionality of oblivious transfer (OT)protocols, they have been widely used as building blocks in securemultiparty computation and high-level protocols. The security of OTprotocols built upon classical number theoretic problems, such asthe discrete logarithm and factoring, however, is threatened as aresult of the huge progress in quantum computing. Therefore, post-quantumcryptography is needed for protocols based on classical problems,and several proposals for post-quantum OT protocols exist. However,most post-quantum cryptosystems present their security proof onlyin the context of classical adversaries, not in the quantum setting.In this paper, we close this gap and prove the security of the lattice-basedOT protocol proposed by Peikert . (CRYPTO, 2008), which is universally composably secure under theassumption of learning with errors hardness, in the quantum setting.We apply three general quantum security analysis frameworks. First,we apply the quantum lifting theorem proposed by Unruh (EUROCRYPT,2010) to prove that the security of the lattice-based OT protocolcan be lifted into the quantum world. Then, we apply two more securityanalysis frameworks specified for post-quantum cryptographic primitives,i.e., simple hybrid arguments (CRYPTO, 2011) and game-preserving reduction(PQCrypto, 2014).

Keywords: Oblivious transfer     Post-quantum     Lattice-based     Learning with errors     Universally composable    

Behavioral control task supervisor with memory based on reinforcement learning for human–multi-robot coordination systems Research Article

Jie HUANG, Zhibin MO, Zhenyi ZHANG, Yutao CHEN,yutao.chen@fzu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 8,   Pages 1174-1188 doi: 10.1631/FITEE.2100280

Abstract: In this study, a novel (RLTS) with memory in a behavioral control framework is proposed for ; (HMRCSs). Existing HMRCSs suffer from high decision-making time cost and large task tracking errors caused by repeated human intervention, which restricts the autonomy of multi-robot systems (MRSs). Moreover, existing s in the (NSBC) framework need to formulate many priority-switching rules manually, which makes it difficult to realize an optimal behavioral priority adjustment strategy in the case of multiple robots and multiple tasks. The proposed RLTS with memory provides a detailed integration of the deep Q-network (DQN) and long short-term memory (LSTM) within the NSBC framework, to achieve an optimal behavioral priority adjustment strategy in the presence of task conflict and to reduce the frequency of human intervention. Specifically, the proposed RLTS with memory begins by memorizing human intervention history when the robot systems are not confident in emergencies, and then reloads the history information when encountering the same situation that has been tackled by humans previously. Simulation results demonstrate the effectiveness of the proposed RLTS. Finally, an experiment using a group of mobile robots subject to external noise and disturbances validates the effectiveness of the proposed RLTS with memory in uncertain real-world environments.

Keywords: Human–     multi-robot coordination systems     Null-space-based behavioral control     Task supervisor     Reinforcement learning     Knowledge base    

Distributed fault-tolerant strategy for electric swing system of hybrid excavators under communication errors Article

Da-hui GAO, Qing-feng WANG, Yong LEI

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7,   Pages 941-954 doi: 10.1631/FITEE.1601021

Abstract: A distributed fault-tolerant strategy for the controller area network based electric swing system of hybrid excavators is proposed to achieve good performance under communication errors based on the adaptive compensation of the delays and packet dropouts. The adverse impacts of communication errors are effectively reduced by a novel delay compensation scheme, where the feedback signal and the control command are compensated in each control period in the central controller and the swing motor driver, respectively, without requiring additional network bandwidth. The recursive least-squares algorithm with forgetting factor algorithm is employed to identify the time-varying model parameters due to pose variation, and a reverse correction law is embedded into the feedback compensation in consecutive packet dropout scenarios to overcome the impacts of the model error. Simulations and practical experiments are conducted. The results show that the proposed fault-tolerant strategy can effectively reduce the communication-error-induced overshoot and response time variation.

Keywords: Fault tolerant     Delay compensation     Controller area network     Communication errors     Electric swing system of hybrid excavator    

Title Author Date Type Operation

Post-quantum blind signcryption scheme from lattice

Huifang Yu, Lu Bai,yuhuifang@xupt.edu.cn

Journal Article

An error recognition method for power equipment defect records based on knowledge graph technology

Hui-fang Wang, Zi-quan Liu,huifangwang@zju.edu.cn

Journal Article

Application Research on Vehicle Routing Problem With Time Windows Based on Dynamic Ant Algorithm

Liu Yunzhong,Xuan Huiyu

Journal Article

Several Strategic Issues for the Construction of Ecological Civilization in Yangtze River Economic Belt

Hao Jiming, Wang Jinnan, Zhang Shougong, Wu Fengchang, Jiang Hongqiang, Wu Wenjun, Chen Lyujun, Zhang Linbo, Liu Nianlei

Journal Article

Analyzing Design Mistakes in the “Bean Curd Dregs” Engineering Design

Zhang Zhaoshen

Journal Article

Constructing pairing-free certificateless public key encryption with keyword search

Yang LU, Ji-guo LI

Journal Article

Proximal policy optimization with an integral compensator for quadrotor control

Huan Hu, Qing-ling Wang,qlwang@seu.edu.cn

Journal Article

A descent method for the Dubins traveling salesman problem with neighborhoods

Zheng Chen, Chen-hao Sun, Xue-ming Shao, Wen-jie Zhao,z_chen@zju.edu.cn,mecsxm@zju.edu.cn

Journal Article

Miniaturized five fundamental issues about visual knowledge

Yun-he Pan,panyh@zju.edu.cn

Journal Article

Message delay time distribution analysis for controller area network under errors

Lei-ming ZHANG, Yi-chao SUN, Yong LEI

Journal Article

A new constrained maximum margin approach to discriminative learning of Bayesian classifiers

Ke GUO, Xia-bi LIU, Lun-hao GUO, Zong-jie LI, Zeng-min GENG

Journal Article

Controller area network node reliability assessment based on observable node information

Lei-ming ZHANG, Long-hao TANG, Yong LEI

Journal Article

Quantum security analysis of a lattice-basedoblivious transfer protocol

Mo-meng LIU, Juliane KRÄMER, Yu-pu HU, Johannes BUCHMANN

Journal Article

Behavioral control task supervisor with memory based on reinforcement learning for human–multi-robot coordination systems

Jie HUANG, Zhibin MO, Zhenyi ZHANG, Yutao CHEN,yutao.chen@fzu.edu.cn

Journal Article

Distributed fault-tolerant strategy for electric swing system of hybrid excavators under communication errors

Da-hui GAO, Qing-feng WANG, Yong LEI

Journal Article