Science China Information Sciences最新文献

筛选
英文 中文
Stability analysis and stabilization of semi-Markov jump linear systems with unavailable sojourn-time information 具有不可用停留时间信息的半马尔可夫跃迁线性系统的稳定性分析和稳定化
IF 8.8 2区 计算机科学
Science China Information Sciences Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4065-2
Xiaotai Wu, Yang Tang, Shuai Mao, Ying Zhao
{"title":"Stability analysis and stabilization of semi-Markov jump linear systems with unavailable sojourn-time information","authors":"Xiaotai Wu, Yang Tang, Shuai Mao, Ying Zhao","doi":"10.1007/s11432-023-4065-2","DOIUrl":"https://doi.org/10.1007/s11432-023-4065-2","url":null,"abstract":"<p>This study addresses the stability and stabilization problems of discrete-time semi-Markov jump linear systems (S-MJLSs) with unavailable sojourn-time information. The sojourn-time probability mass functions (S-TPMFs) of discrete-time semi-Markov chains are no longer confined to the geometric distribution, and it is difficult to obtain accurate and comprehensive information for S-TPMFs in practice. This is because S-TPMFs are usually deduced from the statistical characteristics according to the sampled-data, while adequate samples are often costly and time consuming. In this study, when the S-TPMFs for semi-Markov chains are assumed to be unavailable, the <i>σ</i>-error mean square stability is investigated for discrete-time S-MJLSs with some widely used assumptions; for semi-Markov chains, only the transition probability matrix of the embedded chain is used. In addition, the existence conditions of the effective controller are provided for closed-loop systems without using the information of S-TPMFs. Numerical examples are presented to illustrate the validity of the obtained theoretical results.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"353 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prescribed time control based on the periodic delayed sliding mode surface without singularities 基于无奇异点周期性延迟滑模面的规定时间控制
IF 8.8 2区 计算机科学
Science China Information Sciences Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4052-4
Bin Zhou, Yi Ding, Kang-Kang Zhang, Guang-Ren Duan
{"title":"Prescribed time control based on the periodic delayed sliding mode surface without singularities","authors":"Bin Zhou, Yi Ding, Kang-Kang Zhang, Guang-Ren Duan","doi":"10.1007/s11432-023-4052-4","DOIUrl":"https://doi.org/10.1007/s11432-023-4052-4","url":null,"abstract":"<p>In this paper, nonsingular prescribed-time control is studied based on periodic delayed sliding mode surfaces. Different from the existing sliding mode control, where either singularity problems may appear or the convergence time depends on the initial state, the proposed sliding mode control approaches can achieve prescribed-time convergence without singularity. The proposed nonsingular sliding mode control approaches can be applied to both second-order and high-order nonlinear systems with prescribed-time convergence. As applications of the proposed sliding mode control approaches, the control of hypersonic vehicle systems is revisited. Numerical simulations on the nonlinear model of the hypersonic vehicle system show the effectiveness of the proposed methods.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"12 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel modeling for MI-based wireless underground sensor networks with conductive objects 基于 MI 的导电物体地下无线传感器网络的信道建模
IF 8.8 2区 计算机科学
Science China Information Sciences Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4024-2
Shuhan Deng, Guanghua Liu, Ziwei Chen, Huaijin Zhang, Tao Jiang
{"title":"Channel modeling for MI-based wireless underground sensor networks with conductive objects","authors":"Shuhan Deng, Guanghua Liu, Ziwei Chen, Huaijin Zhang, Tao Jiang","doi":"10.1007/s11432-023-4024-2","DOIUrl":"https://doi.org/10.1007/s11432-023-4024-2","url":null,"abstract":"<p>We develop a comprehensive and accurate channel model forMI-WUSNs by taking into account the impact of multiple conductive objects located in different positions. The mathematical expressions for mutual inductance and received power are rigorously derived for each case. Extensive experimental results have verified our theory. Hence, this paper provides a solid foundation for subsequent system design for MI-WUSNs.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"1 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scenarios analysis and performance assessment of blockchain integrated in 6G scenarios 区块链融入 6G 场景的场景分析和性能评估
IF 8.8 2区 计算机科学
Science China Information Sciences Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4054-5
Bo Li, Guanjie Cheng, Honghao Gao, Xueqiang Yan, Shuiguang Deng
{"title":"Scenarios analysis and performance assessment of blockchain integrated in 6G scenarios","authors":"Bo Li, Guanjie Cheng, Honghao Gao, Xueqiang Yan, Shuiguang Deng","doi":"10.1007/s11432-023-4054-5","DOIUrl":"https://doi.org/10.1007/s11432-023-4054-5","url":null,"abstract":"<p>Emerging applications such as smart city infrastructures and virtual reality landscapes are setting rigorous benchmarks for 6G mobile networks, requiring elevated levels of confidentiality, integrity, non-repudiation, authentication, and stringent access controls. Blockchain technology is heralded as a transformative enabler for meeting 6G standards, owing to its intrinsic attributes. However, a gap exists in the holistic investigation of blockchain’s applicability in 6G realms, particularly addressing the “whether”, “when”, and “how” of its deployment. Present research trails in developing robust methodologies to gauge blockchain’s efficacy within 6G use cases. Addressing this, our study introduces a novel confluence of blockchain with 6G networks, where data resides in distributed Hash tables (DHTs) while their hashes are secured in distributed ledger technology (DLT), harnessing blockchain’s core strengths-immutability, traceability, and fortified security. We delineate seven specific 6G use cases poised for enhancement through blockchain integration, and scrutinize the rationale, nature, and timing of this convergence. Furthermore, we devise a comprehensive methodology for assessing blockchain’s performance metrics and scalability in 6G environments. Our extensive experimental analyses evaluate the synergistic performance of this integration, revealing that the Quorum blockchain satisfactorily supports 80% of 6G scenarios. The findings suggest that, with appropriate configurations, consortium blockchains are well-equipped to fulfill the demanding performance and scalability requisites of 6G networks.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"14 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of double protograph LDPC codes based JSCC systems via the ACE-PEG algorithm 通过 ACE-PEG 算法设计基于双原图 LDPC 码的 JSCC 系统
IF 8.8 2区 计算机科学
Science China Information Sciences Pub Date : 2024-06-27 DOI: 10.1007/s11432-024-4074-y
Yijie Lv, Jiguang He, Shaohua Hong
{"title":"Design of double protograph LDPC codes based JSCC systems via the ACE-PEG algorithm","authors":"Yijie Lv, Jiguang He, Shaohua Hong","doi":"10.1007/s11432-024-4074-y","DOIUrl":"https://doi.org/10.1007/s11432-024-4074-y","url":null,"abstract":"<p>In this work, a novel design method of DP-LDPC codes for the JSCC system via the ACE-PEG algorithm has been proposed. The designed base matrix contains more higher-degree VNs than the conventional ones, and thus increases the amount of message between the cycles and/or stopping sets and the remaining part of the Tanner graph via the ACE-PEG algorithm. Simulation results have demonstrated that the proposed design approach of DP-LDPC codes obtains significant performance enhancement in both waterfall and error-floor regions compared to the selected benchmark schemes from the latest literature.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"30 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive 5G-and-beyond network-enabled interpretable federated learning enhanced by neuroevolution 通过神经进化增强自适应 5G 及以上网络支持的可解释联合学习
IF 8.8 2区 计算机科学
Science China Information Sciences Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4011-4
Bin Cao, Jianwei Zhao, Xin Liu, Yun Li
{"title":"Adaptive 5G-and-beyond network-enabled interpretable federated learning enhanced by neuroevolution","authors":"Bin Cao, Jianwei Zhao, Xin Liu, Yun Li","doi":"10.1007/s11432-023-4011-4","DOIUrl":"https://doi.org/10.1007/s11432-023-4011-4","url":null,"abstract":"<p>Mobile telemedicine systems based on the next-generation communication will significantly enhance deep fusion of network automation and federated learning (FL), but data privacy is a paramount issue in sectors like healthcare. This work hence considers FL augments 5G-and-beyond networks by training deep learning (DL) models without the need to exchange raw data. The substantial communication loads imposed on by extensive parameters involved in DL models are managed through adaptive scheduling mechanisms effectively. To address the opaque nature of DL models and to improve the interpretability of FL models, we introduce a convolutional fuzzy rough neural network specifically designed for medical image processing. We also develop a multiobjective memetic evolutionary algorithm to streamline and optimize the neural network architectures. Our comprehensive FL framework integrates smart scheduling, interpretable fuzzy rough logic, and neuroevolution. This framework is shown to improve communication efficiency, increase interpretability of diagnosis with protected privacy, and generate low-complexity neural architectures.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"3 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XRL-SHAP-Cache: an explainable reinforcement learning approach for intelligent edge service caching in content delivery networks XRL-SHAP-Cache:用于内容交付网络中智能边缘服务缓存的可解释强化学习方法
IF 8.8 2区 计算机科学
Science China Information Sciences Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-3987-y
Xiaolong Xu, Fan Wu, Muhammad Bilal, Xiaoyu Xia, Wanchun Dou, Lina Yao, Weiyi Zhong
{"title":"XRL-SHAP-Cache: an explainable reinforcement learning approach for intelligent edge service caching in content delivery networks","authors":"Xiaolong Xu, Fan Wu, Muhammad Bilal, Xiaoyu Xia, Wanchun Dou, Lina Yao, Weiyi Zhong","doi":"10.1007/s11432-023-3987-y","DOIUrl":"https://doi.org/10.1007/s11432-023-3987-y","url":null,"abstract":"<p>Content delivery networks (CDNs) play a pivotal role in the modern internet infrastructure by enabling efficient content delivery across diverse geographical regions. As an essential component of CDNs, the edge caching scheme directly influences the user experience by determining the caching and eviction of content on edge servers. With the emergence of 5G technology, traditional caching schemes have faced challenges in adapting to increasingly complex and dynamic network environments. Consequently, deep reinforcement learning (DRL) offers a promising solution for intelligent zero-touch network governance. However, the black-box nature of DRL models poses challenges in understanding and making trusting decisions. In this paper, we propose an explainable reinforcement learning (XRL)-based intelligent edge service caching approach, namely XRL-SHAP-Cache, which combines DRL with an explainable artificial intelligence (XAI) technique for cache management in CDNs. Instead of focusing solely on achieving performance gains, this study introduces a novel paradigm for providing interpretable caching strategies, thereby establishing a foundation for future transparent and trustworthy edge caching solutions. Specifically, a multi-level cache scheduling framework for CDNs was formulated theoretically, with the D3QN-based caching scheme serving as the targeted interpretable model. Subsequently, by integrating Deep-SHAP into our framework, the contribution of each state input feature to the agent’s Q-value output was calculated, thereby providing valuable insights into the decision-making process. The proposed XRL-SHAP-Cache approach was evaluated through extensive experiments to demonstrate the behavior of the scheduling agent in the face of different environmental inputs. The results demonstrate its strong explainability under various real-life scenarios while maintaining superior performance compared to traditional caching schemes in terms of cache hit ratio, quality of service (QoS), and space utilization.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"25 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ControlService: a containerized solution for control-algorithm-as-a-service in cloud control systems ControlService:云控制系统中控制算法即服务的容器化解决方案
IF 8.8 2区 计算机科学
Science China Information Sciences Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4017-0
Chenggang Shan, Runze Gao, Zhen Yang, Wei Zhang, Yuanqing Xia
{"title":"ControlService: a containerized solution for control-algorithm-as-a-service in cloud control systems","authors":"Chenggang Shan, Runze Gao, Zhen Yang, Wei Zhang, Yuanqing Xia","doi":"10.1007/s11432-023-4017-0","DOIUrl":"https://doi.org/10.1007/s11432-023-4017-0","url":null,"abstract":"<p>As an extension of networked control systems, cloud control systems (CCSs) have emerged as a new control paradigm to improve the service quality of emerging control missions, such as data-driven modeling and automated vehicles. Existing studies have used the workflow-based restructured method to optimize the computation-intensive algorithms in the CCSs. However, the challenges here are how to define and submit these algorithms’ workflows as cloud services and execute these algorithms’ workflows in a containerized manner. Based on these challenges, we propose a containerized solution for the control-algorithm-as-a-service (C3aS) in the CCSs, namely ControlService. It offers the control algorithm as a cloud workflow service and uses a customized workflow engine to realize the containerized execution. First, we employ a cloud workflow representation method to define a control algorithm into an abstract cloud workflow form. Afterward, we provide a cloud service representation of the abstract cloud workflow. Next, we design a workflow engine and submit the cloud service to this workflow engine to implement containerized execution of this cloud service in the CCSs. In the experiment, we discuss the cloud service form and containerized implementation of the subspace identification method. Experimental results show that the proposed ControlService has significant performance advantages in computational time, reduction percentage, and speedup ratio compared with the baseline method.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"1 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed generalized Nash equilibrium seeking: event-triggered coding-decoding-based secure communication 分布式广义纳什均衡寻求:基于事件触发的编码-解码安全通信
IF 8.8 2区 计算机科学
Science China Information Sciences Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4009-4
Shaofu Yang, Wenying Xu, Wangli He, Jinde Cao
{"title":"Distributed generalized Nash equilibrium seeking: event-triggered coding-decoding-based secure communication","authors":"Shaofu Yang, Wenying Xu, Wangli He, Jinde Cao","doi":"10.1007/s11432-023-4009-4","DOIUrl":"https://doi.org/10.1007/s11432-023-4009-4","url":null,"abstract":"<p>In this paper, we consider the distributed generalized Nash equilibrium (GNE) seeking problem in strongly monotone games. The transmission among players is implemented through a digital communication network with limited bandwidth. For improving communication efficiency or/and security, an event-triggered coding-decoding-based communication is first proposed, where the data (decision variable) are first mapped to a series of finite-level codewords and, only when an event condition is satisfied, then sent to the neighboring agents. Moreover, a distributed communication-efficient GNE seeking algorithm is constructed accordingly, and the overrelaxation scheme is further taken into consideration. Through primal-dual analysis, the proposed algorithm is proven to converge to a variational GNE with fixed step-sizes by recasting it as an inexact forward-backward iteration. Finally, numerical simulations illustrate the benefit of the proposed algorithms in terms of saving communication resources.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"36 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141530881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Path signature-based XAI-enabled network time series classification 基于路径特征的 XAI 网络时间序列分类
IF 8.8 2区 计算机科学
Science China Information Sciences Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-3978-y
Le Sun, Yueyuan Wang, Yongjun Ren, Feng Xia
{"title":"Path signature-based XAI-enabled network time series classification","authors":"Le Sun, Yueyuan Wang, Yongjun Ren, Feng Xia","doi":"10.1007/s11432-023-3978-y","DOIUrl":"https://doi.org/10.1007/s11432-023-3978-y","url":null,"abstract":"<p>Classifying network time series (NTS) is crucial for automating network administration and ensuring cyberspace security. It enables the detection of anomalies, the identification of network attacks, and the monitoring of performance issues, thereby providing valuable support for network protection and optimization. However, modern communication networks pose challenges for NTS classification methods. These include handling large-scale and complex NTS data, extracting features from intricate datasets, and addressing explainability requirements. These challenges are particularly pronounced for complex 5G networks. Notably, explainability has become crucial for the widespread deployment of network automation for 5G networks and beyond. To tackle these challenges, we propose a path-signature-based NTS classification model called recurrent signature (RecurSig). This innovative model is designed to overcome the time-consuming feature selection problem by utilizing deep-learning (DL) techniques. Additionally, it provides a solution for addressing the black-box issue associated with DL models in network automation systems (NAS) by incorporating an explainable classification approach. Extensive experimentation on various public datasets demonstrates that RecurSig outperforms existing models in accuracy and explainability. The results indicate its potential for application in cyberspace security and automated network management, offering an explainable solution for network protection and optimization.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"81 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信