Search scope:
排序: Display mode:
Post-quantum blind signcryption scheme from lattice Research Articles
Huifang Yu, Lu Bai,yuhuifang@xupt.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 6, Pages 891-901 doi: 10.1631/FITEE.2000099
Keywords: 格密码系统;盲签密;抗量子计算;带错误学习问题;最短向量问题
An error recognition method for power equipment defect records based on knowledge graph technology Regular Article
Hui-fang Wang, Zi-quan Liu,huifangwang@zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 11, Pages 1564-1577 doi: 10.1631/FITEE.1800260
Keywords: 错误识别;电力设备缺陷记录;知识图谱;机器学习
Application Research on Vehicle Routing Problem With Time Windows Based on Dynamic Ant Algorithm
Liu Yunzhong,Xuan Huiyu
Strategic Study of CAE 2005, Volume 7, Issue 12, Pages 35-40
Ant algorithm is a newly emerged stochastic searching optimization algorithm in recent years. It has been paid much attention to since the successful application in the famous traveling salesman problem. This paper further extends the idea of this new biological optimization strategy to vehicle routing problem with time windows in logistic management and designs a new kind of dynamic ant algorithm. The ability of optimization of this new ant algorithm is tested through numerical computation which gives encouraging results.
Keywords: ant algorithm vehicle routing problem with time windows logistic management dynamic
Hao Jiming, Wang Jinnan, Zhang Shougong, Wu Fengchang, Jiang Hongqiang, Wu Wenjun, Chen Lyujun, Zhang Linbo, Liu Nianlei
Strategic Study of CAE 2022, Volume 24, Issue 1, Pages 141-147 doi: 10.15302/J-SSCAE-2022.01.015
To promote the construction of ecological civilization in the Yangtze River Economic Belt, the Chinese Academy of Engineering launched a major consulting project in 2019 titled “Study on Several Strategic Issues for the Construction of Ecological Civilization in Yangtze River Economic Belt”. Based on the results of the project, this paper summarizes the achievements of ecological civilization construction in Yangtze River Economic Belt in terms of top-level design, green demonstration, ecological protection, and environmental improvement, and then analyzes its main challenges regarding territorial development, industrial layout, river–lake relationship, ecological security, energy development, and environmental risks. Based on the concept of a life community of mountains,rivers, forests, farmland, lakes, grass, and sand, we propose several strategic suggestions focusing on ecological space management and control, water ecosystem health, green and high-quality development, ecological protection and restoration, ecological agriculture and forestry development, ecological product value realization, and ecolog¬ical civilization governance system.
Analyzing Design Mistakes in the “Bean Curd Dregs” Engineering Design
Zhang Zhaoshen
Strategic Study of CAE 2004, Volume 6, Issue 11, Pages 8-19
The paper discusses the omission in analyzing the worst stressed state and the mistake in strength and stability checking computations method for compression and bending member, by analyzing the available construction calculation analysis program function, in order to approach the reason of Qijiang arch bridge breakdown. Especially the paper queries whether there exists the bend section modular calculating method for dumbbell or round end rectangular section arch rib, to prove the existence of a lot of unsafe factors in the steel pipe-concrete arched bridge. Finally the paper recommends, the designer to change the idea of unilaterally chasing new and strange into the principle of safe, durable and useful,so as to design and build the structure that will never break down for a century.
Keywords: “Bean curd dregs” engineering mistake of design degree of safety
Constructing pairing-free certificateless public key encryption with keyword search Research Articles
Yang LU, Ji-guo LI
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8, Pages 1049-1060 doi: 10.1631/FITEE.1700534
Keywords: Searchable public key encryption Certificateless public key encryption with keyword search Bilinear pairing Computational Diffie-Hellman problem
Proximal policy optimization with an integral compensator for quadrotor control Research
Huan Hu, Qing-ling Wang,qlwang@seu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 5, Pages 649-808 doi: 10.1631/FITEE.1900641
Keywords: 强化学习;近端策略优化;四旋翼控制;神经网络
A descent method for the Dubins traveling salesman problem with neighborhoods Research Articles
Zheng Chen, Chen-hao Sun, Xue-ming Shao, Wen-jie Zhao,z_chen@zju.edu.cn,mecsxm@zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 5, Pages 615-766 doi: 10.1631/FITEE.2000041
Keywords: Dubins飞行器;坐标下降法;Dubins旅行商问题
Miniaturized five fundamental issues about visual knowledge Perspectives
Yun-he Pan,panyh@zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 5, Pages 615-766 doi: 10.1631/FITEE.2040000
Keywords: 视觉知识表达;视觉识别;视觉形象思维模拟;视觉知识学习;多重知识表达
Message delay time distribution analysis for controller area network under errors Research Papers
Lei-ming ZHANG, Yi-chao SUN, Yong LEI
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6, Pages 760-772 doi: 10.1631/FITEE.1700815
Controller area network (CAN) is a widely used fieldbus protocol in various industrial applications. To understand the network behavior under errors for the optimal design of networked control systems, the message response time of the CAN network needs to be analyzed. In this study, a novel delay time distribution analysis method for the response messages is proposed when considering errors. In this method the complex message queues are decomposed into typical message patterns and cases. First, a stochastic fault model is developed, and the probability factor is defined to calculate the error distribution. Then the message delay time distribution for the single slave node configuration is analyzed based on the error distribution. Next, based on the delay time distribution analysis of typical patterns and cases, an analysis framework of message delay time distribution for the master/slave configuration is developed. The testbed is constructed and case studies are conducted to demonstrate the proposed methodology under different network configurations. Experimental results show that the delay time distributions calculated by the proposed method agree well with the actual observations.
Keywords: Controller area network Message delay Probability distribution Errors
A new constrained maximum margin approach to discriminative learning of Bayesian classifiers None
Ke GUO, Xia-bi LIU, Lun-hao GUO, Zong-jie LI, Zeng-min GENG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 5, Pages 639-650 doi: 10.1631/FITEE.1700007
Keywords: Discriminative learning Statistical modeling Bayesian pattern classifiers Gaussian mixture models UCI datasets
Controller area network node reliability assessment based on observable node information Article
Lei-ming ZHANG, Long-hao TANG, Yong LEI
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 5, Pages 615-626 doi: 10.1631/FITEE.1601029
Keywords: Controller area network (CAN) Transmit error counter (TEC) TEC value estimation Bayesian network Bus-off hitting time
Quantum security analysis of a lattice-basedoblivious transfer protocol Article
Mo-meng LIU, Juliane KRÄMER, Yu-pu HU, Johannes BUCHMANN
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 9, Pages 1348-1369 doi: 10.1631/FITEE.1700039
Keywords: Oblivious transfer Post-quantum Lattice-based Learning with errors Universally composable
Behavioral control task supervisor with memory based on reinforcement learning for human–multi-robot coordination systems Research Article
Jie HUANG, Zhibin MO, Zhenyi ZHANG, Yutao CHEN,yutao.chen@fzu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 8, Pages 1174-1188 doi: 10.1631/FITEE.2100280
Keywords: Human– multi-robot coordination systems Null-space-based behavioral control Task supervisor Reinforcement learning Knowledge base
Da-hui GAO, Qing-feng WANG, Yong LEI
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7, Pages 941-954 doi: 10.1631/FITEE.1601021
Keywords: Fault tolerant Delay compensation Controller area network Communication errors Electric swing system of hybrid excavator
Title Author Date Type Operation
Post-quantum blind signcryption scheme from lattice
Huifang Yu, Lu Bai,yuhuifang@xupt.edu.cn
Journal Article
An error recognition method for power equipment defect records based on knowledge graph technology
Hui-fang Wang, Zi-quan Liu,huifangwang@zju.edu.cn
Journal Article
Application Research on Vehicle Routing Problem With Time Windows Based on Dynamic Ant Algorithm
Liu Yunzhong,Xuan Huiyu
Journal Article
Several Strategic Issues for the Construction of Ecological Civilization in Yangtze River Economic Belt
Hao Jiming, Wang Jinnan, Zhang Shougong, Wu Fengchang, Jiang Hongqiang, Wu Wenjun, Chen Lyujun, Zhang Linbo, Liu Nianlei
Journal Article
Analyzing Design Mistakes in the “Bean Curd Dregs” Engineering Design
Zhang Zhaoshen
Journal Article
Constructing pairing-free certificateless public key encryption with keyword search
Yang LU, Ji-guo LI
Journal Article
Proximal policy optimization with an integral compensator for quadrotor control
Huan Hu, Qing-ling Wang,qlwang@seu.edu.cn
Journal Article
A descent method for the Dubins traveling salesman problem with neighborhoods
Zheng Chen, Chen-hao Sun, Xue-ming Shao, Wen-jie Zhao,z_chen@zju.edu.cn,mecsxm@zju.edu.cn
Journal Article
Miniaturized five fundamental issues about visual knowledge
Yun-he Pan,panyh@zju.edu.cn
Journal Article
Message delay time distribution analysis for controller area network under errors
Lei-ming ZHANG, Yi-chao SUN, Yong LEI
Journal Article
A new constrained maximum margin approach to discriminative learning of Bayesian classifiers
Ke GUO, Xia-bi LIU, Lun-hao GUO, Zong-jie LI, Zeng-min GENG
Journal Article
Controller area network node reliability assessment based on observable node information
Lei-ming ZHANG, Long-hao TANG, Yong LEI
Journal Article
Quantum security analysis of a lattice-basedoblivious transfer protocol
Mo-meng LIU, Juliane KRÄMER, Yu-pu HU, Johannes BUCHMANN
Journal Article
Behavioral control task supervisor with memory based on reinforcement learning for human–multi-robot coordination systems
Jie HUANG, Zhibin MO, Zhenyi ZHANG, Yutao CHEN,yutao.chen@fzu.edu.cn
Journal Article