Skip to main content

and
  1. No Access

    Article

    Transformer in reinforcement learning for decision-making: a survey

    Reinforcement learning (RL) has become a dominant decision-making paradigm and has achieved notable success in many real-world applications. Notably, deep neural networks play a crucial role in unlocking RL’s ...

    Weilin Yuan 袁唯淋, Jiaxing Chen 陈佳星 in Frontiers of Information Technology & Elec… (2024)

  2. No Access

    Article

    Computing-aware network (CAN): a systematic design of computing and network convergence

    网络资源的覆盖范围日益广泛, 算力资源也逐渐成为能够提供泛在计算服务的基础设施. 然而, 在广域网络, 底层网络和计算资源缺乏密切的研究或协同设计, 仍然存在计算服务调度缓慢、 数据分发不灵活、 数据传输效率低等问题. 本文提出算力感知网络(CAN)的系统架构设计, 其核心贡献在于引入感知**面来收集、 管理并综合计算和网络的信息. 这样, 感知**面、控制**面和数据**面组成一个闭环控制系统, 增**了整个系统的感知能力...

    **aoyun Wang 王晓云, **aodong Duan 段晓东 in Frontiers of Information Technology & Elec… (2024)

  3. No Access

    Article

    Target detection for multi-UAVs via digital pheromones and navigation algorithm in unknown environments

    Coordinating multiple unmanned aerial vehicles (multi-UAVs) is a challenging technique in highly dynamic and sophisticated environments. Based on digital pheromones as well as current mainstream unmanned syste...

    Yan Shao, Zhi-feng Zhao, Rong-peng Li in Frontiers of Information Technology & Elec… (2020)

  4. No Access

    Article

    Design of a PCB stator coreless axial flux permanent magnet synchronous motor based on a novel topology Halbach array

    A novel topology Halbach permanent magnet array is proposed and applied to the design of a printed circuit board (PCB) axial flux permanent magnet (AFPM) motor. Compared with the traditional coreless AFPM moto...

    **ao-yuan Wang, **ang Li, Chun-peng Li in Frontiers of Information Technology & Elec… (2019)

  5. No Access

    Article

    Time-varying formation tracking for uncertain second-order nonlinear multi-agent systems

    Our study is concerned with the time-varying formation tracking problem for second-order multi-agent systems that are subject to unknown nonlinear dynamics and external disturbance, and the states of the follo...

    Mao-Peng Ran, Li-Hua **e, Jun-Cheng Li in Frontiers of Information Technology & Elec… (2019)

  6. No Access

    Article

    Safe navigation of quadrotors with jerk limited trajectory

    Many aerial applications require unmanned aerial systems operate in safe zones because of the presence of obstacles or security regulations. It is a non-trivial task to generate a smooth trajectory satisfying ...

    Shu-peng Lai, Meng-lu Lan, Ya-xuan Li in Frontiers of Information Technology & Elec… (2019)

  7. No Access

    Article

    An underwater acoustic direct sequence spread spectrum communication system using dual spread spectrum code

    With the goal of achieving high stability and reliability to support underwater point-to-point communications and code division multiple access (CDMA) based underwater networks, a direct sequence spread spectr...

    Lan-jun Liu, Jian-fen Li, Lin Zhou in Frontiers of Information Technology & Elec… (2018)

  8. No Access

    Article

    An embedded lightweight GUI component library and ergonomics optimization method for industry process monitoring

    Develo** an efficient and robust lightweight graphic user interface (GUI) for industry process monitoring is always a challenging task. Current implementation methods for embedded GUI are with the matters of...

    Da-peng Tan, Shu-ting Chen, Guan-jun Bao in Frontiers of Information Technology & Elec… (2018)

  9. No Access

    Article

    Supervised topic models with weighted words: multi-label document classification

    Supervised topic modeling algorithms have been successfully applied to multi-label document classification tasks. Representative models include labeled latent Dirichlet allocation (L-LDA) and dependency-LDA. H...

    Yue-peng Zou, Ji-hong Ouyang, **-ming Li in Frontiers of Information Technology & Elec… (2018)

  10. No Access

    Article

    Improved binary similarity measures for software modularization

    Various binary similarity measures have been employed in clustering approaches to make homogeneous groups of similar entities in the data. These similarity measures are mostly based only on the presence or abs...

    Rashid Naseem, Mustafa Bin Mat Deris in Frontiers of Information Technology & Elec… (2017)

  11. No Access

    Article

    VirtMan: design and implementation of a fast booting system for homogeneous virtual machines in iVCE

    Internet-based virtual computing environment (iVCE) has been proposed to combine data centers and other kinds of computing resources on the Internet to provide efficient and economical services. Virtual machin...

    Zi-yang Li, Yi-ming Zhang, Dong-sheng Li in Frontiers of Information Technology & Elec… (2016)

  12. No Access

    Article

    An anthropomorphic controlled hand prosthesis system

    Based on HIT/DLR (Harbin Institute of Technology/Deutsches Zentrum für Luft- und Raumfahrt) Prosthetic Hand II, an anthropomorphic controller is developed to help the amputees use and perceive the prosthetic h...

    Hai Huang, Hong Liu, Nan Li, Li Jiang in Journal of Zhejiang University SCIENCE C (2012)

  13. No Access

    Article

    Miniaturized fractal-shaped branch-line coupler for dual-band applications based on composite right/left handed transmission lines

    In this paper, novel dual-band (DB) branch-line couplers (BLCs) employing a composite right/left handed transmission line (CRLH TL) and fractal geometry are presented for the first time. The CRLH TL, with spec...

    He-xiu Xu, Guang-ming Wang, Pei-lin Chen in Journal of Zhejiang University SCIENCE C (2011)