首页 > 最新文献

Tsinghua Science and Technology最新文献

英文 中文
Text Reasoning Chain Extraction for Multi-Hop Question Answering 为多跳问题解答提取文本推理链
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-02-09 DOI: 10.26599/TST.2023.9010060
Pengming Wang;Zijiang Zhu;Qing Chen;Weihuang Dai
With the advent of the information age, it will be more troublesome to search for a lot of relevant knowledge to find the information you need. Text reasoning is a very basic and important part of multi-hop question and answer tasks. This paper aims to study the integrity, uniformity, and speed of computational intelligence inference data capabilities. That is why multi-hop reasoning came into being, but it is still in its infancy, that is, it is far from enough to conduct multi-hop question and answer questions, such as search breadth, process complexity, response speed, comprehensiveness of information, etc. This paper makes a text comparison between traditional information retrieval and computational intelligence through corpus relevancy and other computing methods. The study finds that in the face of multi-hop question and answer reasoning, the reasoning data that traditional retrieval methods lagged behind in intelligence are about 35% worse. It shows that computational intelligence would be more complete, unified, and faster than traditional retrieval methods. This paper also introduces the relevant points of text reasoning and describes the process of the multi-hop question answering system, as well as the subsequent discussions and expectations.
随着信息时代的到来,搜索大量相关知识以找到所需信息将变得更加麻烦。文本推理是多跳问答任务中非常基础和重要的一部分。本文旨在研究计算智能推理数据能力的完整性、统一性和快速性。正因如此,多跳推理应运而生,但目前仍处于起步阶段,即在搜索广度、过程复杂度、响应速度、信息全面性等多跳问答问题上还远远不够。本文通过语料库相关性等计算方法,对传统信息检索与计算智能进行了文本比较。研究发现,面对多跳问答推理,传统检索方法落后于智能的推理数据要差35%左右。这表明,计算智能将比传统检索方法更完整、更统一、更快速。本文还介绍了文本推理的相关要点,描述了多跳问答系统的过程,以及后续的讨论和期望。
{"title":"Text Reasoning Chain Extraction for Multi-Hop Question Answering","authors":"Pengming Wang;Zijiang Zhu;Qing Chen;Weihuang Dai","doi":"10.26599/TST.2023.9010060","DOIUrl":"https://doi.org/10.26599/TST.2023.9010060","url":null,"abstract":"With the advent of the information age, it will be more troublesome to search for a lot of relevant knowledge to find the information you need. Text reasoning is a very basic and important part of multi-hop question and answer tasks. This paper aims to study the integrity, uniformity, and speed of computational intelligence inference data capabilities. That is why multi-hop reasoning came into being, but it is still in its infancy, that is, it is far from enough to conduct multi-hop question and answer questions, such as search breadth, process complexity, response speed, comprehensiveness of information, etc. This paper makes a text comparison between traditional information retrieval and computational intelligence through corpus relevancy and other computing methods. The study finds that in the face of multi-hop question and answer reasoning, the reasoning data that traditional retrieval methods lagged behind in intelligence are about 35% worse. It shows that computational intelligence would be more complete, unified, and faster than traditional retrieval methods. This paper also introduces the relevant points of text reasoning and describes the process of the multi-hop question answering system, as well as the subsequent discussions and expectations.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":null,"pages":null},"PeriodicalIF":6.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10431749","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characteristics of Controlled Bridge Circuit and Its Application in Magnetic Field Induction Measurement 受控电桥电路的特性及其在磁场感应测量中的应用
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-02-09 DOI: 10.26599/TST.2023.9010084
Yanchu Li;Qingqing Ding;Mingchen Yan;Jiyao Wang;Jun Xu;Xinzhou Dong
The article designs a new type of bridge circuit with a controlled source—when the resistance on the bridge arm of the controlled source bridge circuit meets the bridge balance condition, and the bridge branch contains only one Current-Controlled Current Source (CCCS), a Voltage-Controlled Current Source (VCCS), a Current-Controlled Voltage Source (CCVS), or a Voltage-Controlled Voltage Source (VCVS), the circuit is called a controlled bridge circuit, which has the characteristics of bridge balance. Due to the relationship between the controlled source and the bridge arm, the sensitivity of the components on the bridge is higher mathematically and logically. When applied to measurement, engineering, automatic control, and other fields, the controlled bridge circuit has higher control ac-curacy. Mathematical derivation and simulation results prove the correctness of the bridge balance conclusion and the special properties of this bridge when applied to the measurement field.
文章设计了一种新型可控源电桥电路--当可控源电桥电路桥臂上的电阻满足电桥平衡条件,且电桥支路只包含一个电流可控电流源(CCCS)、一个电压可控电流源(VCCS)、一个电流可控电压源(CCVS)或一个电压可控电压源(VCVS)时,该电路被称为可控桥电路,具有电桥平衡的特性。由于受控源与电桥臂之间的关系,电桥上元件的灵敏度在数学和逻辑上都比较高。应用于测量、工程、自动控制等领域时,受控电桥电路具有更高的控制精度。数学推导和仿真结果证明了电桥平衡结论的正确性,以及该电桥在应用于测量领域时的特殊性能。
{"title":"Characteristics of Controlled Bridge Circuit and Its Application in Magnetic Field Induction Measurement","authors":"Yanchu Li;Qingqing Ding;Mingchen Yan;Jiyao Wang;Jun Xu;Xinzhou Dong","doi":"10.26599/TST.2023.9010084","DOIUrl":"https://doi.org/10.26599/TST.2023.9010084","url":null,"abstract":"The article designs a new type of bridge circuit with a controlled source—when the resistance on the bridge arm of the controlled source bridge circuit meets the bridge balance condition, and the bridge branch contains only one Current-Controlled Current Source (CCCS), a Voltage-Controlled Current Source (VCCS), a Current-Controlled Voltage Source (CCVS), or a Voltage-Controlled Voltage Source (VCVS), the circuit is called a controlled bridge circuit, which has the characteristics of bridge balance. Due to the relationship between the controlled source and the bridge arm, the sensitivity of the components on the bridge is higher mathematically and logically. When applied to measurement, engineering, automatic control, and other fields, the controlled bridge circuit has higher control ac-curacy. Mathematical derivation and simulation results prove the correctness of the bridge balance conclusion and the special properties of this bridge when applied to the measurement field.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":null,"pages":null},"PeriodicalIF":6.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10431735","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cover 封面
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-02-09
{"title":"Cover","authors":"","doi":"","DOIUrl":"https://doi.org/","url":null,"abstract":"","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":null,"pages":null},"PeriodicalIF":6.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10431754","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139714312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced IDS with Deep Learning for IoT-Based Smart Cities Security 利用深度学习增强 IDS,实现基于物联网的智慧城市安全
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-02-09 DOI: 10.26599/TST.2023.9010033
Chaimae Hazman;Azidine Guezzaz;Said Benkirane;Mourade Azrour
Cyberattacks against highly integrated Internet of Things (IoT) servers, apps, and telecoms infrastructure are rapidly increasing when issues produced by IoT networks go unnoticed for an extended period. IoT interface attacks must be evaluated in real-time for effective safety and security measures. This study implements a smart intrusion detection system (IDS) designed for IoT threats, and interoperability with IoT connectivity standards is offered by the identity solution. An IDS is a common type of network security technology that has recently received increasing interest in the research community. The system has already piqued the curiosity of scientific and industrial communities to identify intrusions. Several IDSs based on machine learning (ML) and deep learning (DL) have been proposed. This study introduces IDS-SIoDL, a novel IDS for IoT-based smart cities that integrates long shortterm memory (LSTM) and feature engineering. This model is tested using tensor processing unit (TPU) on the enhanced BoT-IoT, Edge-IIoT, and NSL-KDD datasets. Compared with current IDSs, the obtained results provide good assessment features, such as accuracy, recall, and precision, with approximately 0.9990 recording time and calculating times of approximately 600 and 6 ms for training and classification, respectively.
当物联网网络产生的问题长期未被察觉时,针对高度集成的物联网(IoT)服务器、应用程序和电信基础设施的网络攻击正在迅速增加。必须对物联网接口攻击进行实时评估,以采取有效的安全保障措施。本研究实施了针对物联网威胁而设计的智能入侵检测系统(IDS),身份识别解决方案提供了与物联网连接标准的互操作性。IDS 是一种常见的网络安全技术,最近越来越受到研究界的关注。该系统已经激发了科学界和工业界识别入侵的好奇心。目前已经提出了几种基于机器学习(ML)和深度学习(DL)的 IDS。本研究介绍了 IDS-SIoDL,这是一种用于基于物联网的智慧城市的新型 IDS,它集成了长短期记忆(LSTM)和特征工程。该模型使用张量处理单元(TPU)在增强型 BoT-IoT、Edge-IoT 和 NSL-KDD 数据集上进行了测试。与当前的 IDS 相比,所获得的结果提供了良好的评估特征,如准确率、召回率和精确度,记录时间约为 0.9990,训练和分类的计算时间分别约为 600 毫秒和 6 毫秒。
{"title":"Enhanced IDS with Deep Learning for IoT-Based Smart Cities Security","authors":"Chaimae Hazman;Azidine Guezzaz;Said Benkirane;Mourade Azrour","doi":"10.26599/TST.2023.9010033","DOIUrl":"https://doi.org/10.26599/TST.2023.9010033","url":null,"abstract":"Cyberattacks against highly integrated Internet of Things (IoT) servers, apps, and telecoms infrastructure are rapidly increasing when issues produced by IoT networks go unnoticed for an extended period. IoT interface attacks must be evaluated in real-time for effective safety and security measures. This study implements a smart intrusion detection system (IDS) designed for IoT threats, and interoperability with IoT connectivity standards is offered by the identity solution. An IDS is a common type of network security technology that has recently received increasing interest in the research community. The system has already piqued the curiosity of scientific and industrial communities to identify intrusions. Several IDSs based on machine learning (ML) and deep learning (DL) have been proposed. This study introduces IDS-SIoDL, a novel IDS for IoT-based smart cities that integrates long shortterm memory (LSTM) and feature engineering. This model is tested using tensor processing unit (TPU) on the enhanced BoT-IoT, Edge-IIoT, and NSL-KDD datasets. Compared with current IDSs, the obtained results provide good assessment features, such as accuracy, recall, and precision, with approximately 0.9990 recording time and calculating times of approximately 600 and 6 ms for training and classification, respectively.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":null,"pages":null},"PeriodicalIF":6.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10431757","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combined UAMP and MF Message Passing Algorithm for Multi-Target Wideband DOA Estimation with Dirichlet Process Prior 利用 Dirichlet 过程先验进行多目标宽带 DOA 估计的 UAMP 与 MF 消息传递组合算法
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-02-09 DOI: 10.26599/TST.2023.9010114
Shanwen Guan;Xinhua Lu;Ji Li;Rushi Lan;Xiaonan Luo
When estimating the direction of arrival (DOA) of wideband signals from multiple sources, the performance of sparse Bayesian methods is influenced by the frequency bands occupied by signals in different directions. This is particularly true when multiple signal frequency bands overlap. Message passing algorithms (MPA) with Dirichlet process (DP) prior can be employed in a sparse Bayesian learning (SBL) framework with high precision. However, existing methods suffer from either high complexity or low precision. To address this, we propose a low-complexity DOA estimation algorithm based on a factor graph. This approach introduces two strong constraints via a stretching transformation of the factor graph. The first constraint separates the observation from the DP prior, enabling the application of the unitary approximate message passing (UAMP) algorithm for simplified inference and mitigation of divergence issues. The second constraint compensates for the deviation in estimation angle caused by the grid mismatch problem. Compared to state-of-the-art algorithms, our proposed method offers higher estimation accuracy and lower complexity.
在估计来自多个信号源的宽带信号的到达方向(DOA)时,稀疏贝叶斯方法的性能会受到不同方向信号所占频带的影响。当多个信号频带重叠时尤其如此。在稀疏贝叶斯学习(SBL)框架中,可以采用具有 Dirichlet 过程(DP)先验的消息传递算法(MPA),且精度很高。然而,现有方法要么复杂度高,要么精度低。为此,我们提出了一种基于因子图的低复杂度 DOA 估计算法。这种方法通过因子图的拉伸变换引入了两个强约束。第一个约束条件将观测与 DP 先验分离开来,使单元近似信息传递(UAMP)算法得以应用,从而简化推理并缓解分歧问题。第二个约束条件弥补了网格不匹配问题造成的估计角度偏差。与最先进的算法相比,我们提出的方法具有更高的估计精度和更低的复杂度。
{"title":"Combined UAMP and MF Message Passing Algorithm for Multi-Target Wideband DOA Estimation with Dirichlet Process Prior","authors":"Shanwen Guan;Xinhua Lu;Ji Li;Rushi Lan;Xiaonan Luo","doi":"10.26599/TST.2023.9010114","DOIUrl":"https://doi.org/10.26599/TST.2023.9010114","url":null,"abstract":"When estimating the direction of arrival (DOA) of wideband signals from multiple sources, the performance of sparse Bayesian methods is influenced by the frequency bands occupied by signals in different directions. This is particularly true when multiple signal frequency bands overlap. Message passing algorithms (MPA) with Dirichlet process (DP) prior can be employed in a sparse Bayesian learning (SBL) framework with high precision. However, existing methods suffer from either high complexity or low precision. To address this, we propose a low-complexity DOA estimation algorithm based on a factor graph. This approach introduces two strong constraints via a stretching transformation of the factor graph. The first constraint separates the observation from the DP prior, enabling the application of the unitary approximate message passing (UAMP) algorithm for simplified inference and mitigation of divergence issues. The second constraint compensates for the deviation in estimation angle caused by the grid mismatch problem. Compared to state-of-the-art algorithms, our proposed method offers higher estimation accuracy and lower complexity.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":null,"pages":null},"PeriodicalIF":6.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10431731","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LSTM Network-Based Adaptation Approach for Dynamic Integration in Intelligent End-Edge-Cloud Systems 基于 LSTM 网络的智能终端-边缘-云系统动态集成自适应方法
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-02-09 DOI: 10.26599/TST.2023.9010086
Xuan Yang;James A. Esquivel
Edge computing, which migrates compute-intensive tasks to run on the storage resources of edge devices, efficiently reduces data transmission loss and protects data privacy. However, due to limited computing resources and storage capacity, edge devices fail to support real-time streaming data query and processing. To address this challenge, first, we propose a Long Short-Term Memory (LSTM) network-based adaptive approach in the intelligent end-edge-cloud system. Specifically, we maximize the Quality of Experience (QoE) of users by automatically adapting their resource requirements to the storage capacity of edge devices through an event mechanism. Second, to reduce the uncertainty and non-complete adaption of the edge device towards the user's requirements, we use the LSTM network to analyze the storage capacity of the edge device in real time. Finally, the storage features of the edge devices are aggregated to the cloud to reevaluate the comprehensive capability of the edge devices and ensure the fast response of the user devices during the dynamic adaptation matching process. A series of experimental results show that the proposed approach has superior performance compared with traditional centralized and matrix decomposition based approaches.
边缘计算将计算密集型任务迁移到边缘设备的存储资源上运行,可有效减少数据传输损失并保护数据隐私。然而,由于计算资源和存储容量有限,边缘设备无法支持实时流数据查询和处理。为了应对这一挑战,我们首先在智能端-边缘-云系统中提出了一种基于长短期记忆(LSTM)网络的自适应方法。具体来说,我们通过一种事件机制,根据边缘设备的存储容量自动调整用户的资源需求,从而最大限度地提高用户的体验质量(QoE)。其次,为了减少边缘设备对用户需求的不确定性和不完全适应性,我们使用 LSTM 网络实时分析边缘设备的存储容量。最后,将边缘设备的存储特征汇总到云端,重新评估边缘设备的综合能力,确保用户设备在动态适配匹配过程中的快速响应。一系列实验结果表明,与传统的集中式方法和基于矩阵分解的方法相比,所提出的方法具有更优越的性能。
{"title":"LSTM Network-Based Adaptation Approach for Dynamic Integration in Intelligent End-Edge-Cloud Systems","authors":"Xuan Yang;James A. Esquivel","doi":"10.26599/TST.2023.9010086","DOIUrl":"https://doi.org/10.26599/TST.2023.9010086","url":null,"abstract":"Edge computing, which migrates compute-intensive tasks to run on the storage resources of edge devices, efficiently reduces data transmission loss and protects data privacy. However, due to limited computing resources and storage capacity, edge devices fail to support real-time streaming data query and processing. To address this challenge, first, we propose a Long Short-Term Memory (LSTM) network-based adaptive approach in the intelligent end-edge-cloud system. Specifically, we maximize the Quality of Experience (QoE) of users by automatically adapting their resource requirements to the storage capacity of edge devices through an event mechanism. Second, to reduce the uncertainty and non-complete adaption of the edge device towards the user's requirements, we use the LSTM network to analyze the storage capacity of the edge device in real time. Finally, the storage features of the edge devices are aggregated to the cloud to reevaluate the comprehensive capability of the edge devices and ensure the fast response of the user devices during the dynamic adaptation matching process. A series of experimental results show that the proposed approach has superior performance compared with traditional centralized and matrix decomposition based approaches.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":null,"pages":null},"PeriodicalIF":6.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10431758","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Call for Papers: Special Issue on Neural Networks Depicted in ODEs with Applications 论文征集:关于用 ODEs 描述的神经网络及其应用的特刊
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-02-09 DOI: 10.26599/TST.2024.9010014
With the exponential growth in data availability and the advancements in computing power, the importance of neural networks lies in its ability to process large-scale data, enable automation tasks, support decision-making, etc. The transformative power of neural networks has the potential to reshape industries, improve lives, and contribute to the advancement of society as a whole. Neural networks depicted in ordinary differential equations (ODEs) ingeniously integrate neural networks and differential equations, two prominent modeling approaches widely applied in various fields such as chemistry, physics, engineering, and economics. Serving as equations that describe the relationship between a class of functions and their derivatives, ODEs possess rich mathematical analysis methods and are thus integral tools in classical mathematical theory. Neural networks depicted in ODEs leverage the differential equation description of physical processes, combining it with the potent fitting capabilities of neural networks. In contrast to traditional neural networks that overlook physical information and rely solely on numerous neurons for fitting, neural networks depicted in ODEs can achieve more accurate estimates with fewer neurons, while maintaining robustness, generalization, and interpretability in the learned systems. To fulfill the powerful potential of robots, plenty of algorithms based on neural networks depicted in ODEs are researched to simulate human-like learning processes, realize decision-making tasks, and address the issues of uncertain models and control strategies. Robots have great application value in the fields of artificial intelligence, information technology, and intelligent manufacturing due to their efficient perception, decision-making, and execution capabilities.
随着数据可用性的指数级增长和计算能力的进步,神经网络的重要性在于它能够处理大规模数据、实现自动化任务、支持决策等。神经网络的变革能力有可能重塑产业、改善生活并促进整个社会的进步。常微分方程(ODE)中描绘的神经网络巧妙地将神经网络和微分方程这两种广泛应用于化学、物理、工程和经济学等各个领域的著名建模方法结合在一起。作为描述一类函数及其导数之间关系的方程,常微分方程拥有丰富的数学分析方法,因此是经典数学理论中不可或缺的工具。用 ODE 描述的神经网络充分利用了微分方程对物理过程的描述,并将其与神经网络强大的拟合能力相结合。传统的神经网络忽略了物理信息,仅依靠大量神经元进行拟合,与之相比,用 ODE 描述的神经网络可以用更少的神经元实现更精确的估计,同时保持所学系统的鲁棒性、泛化和可解释性。为了发挥机器人的强大潜能,人们研究了大量基于 ODE 神经网络的算法,以模拟类似人类的学习过程,实现决策任务,并解决不确定模型和控制策略的问题。由于机器人具有高效的感知、决策和执行能力,因此在人工智能、信息技术和智能制造领域具有巨大的应用价值。
{"title":"Call for Papers: Special Issue on Neural Networks Depicted in ODEs with Applications","authors":"","doi":"10.26599/TST.2024.9010014","DOIUrl":"https://doi.org/10.26599/TST.2024.9010014","url":null,"abstract":"With the exponential growth in data availability and the advancements in computing power, the importance of neural networks lies in its ability to process large-scale data, enable automation tasks, support decision-making, etc. The transformative power of neural networks has the potential to reshape industries, improve lives, and contribute to the advancement of society as a whole. Neural networks depicted in ordinary differential equations (ODEs) ingeniously integrate neural networks and differential equations, two prominent modeling approaches widely applied in various fields such as chemistry, physics, engineering, and economics. Serving as equations that describe the relationship between a class of functions and their derivatives, ODEs possess rich mathematical analysis methods and are thus integral tools in classical mathematical theory. Neural networks depicted in ODEs leverage the differential equation description of physical processes, combining it with the potent fitting capabilities of neural networks. In contrast to traditional neural networks that overlook physical information and rely solely on numerous neurons for fitting, neural networks depicted in ODEs can achieve more accurate estimates with fewer neurons, while maintaining robustness, generalization, and interpretability in the learned systems. To fulfill the powerful potential of robots, plenty of algorithms based on neural networks depicted in ODEs are researched to simulate human-like learning processes, realize decision-making tasks, and address the issues of uncertain models and control strategies. Robots have great application value in the fields of artificial intelligence, information technology, and intelligent manufacturing due to their efficient perception, decision-making, and execution capabilities.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":null,"pages":null},"PeriodicalIF":6.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10431755","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Privacy and Security of Edge Computing in Smart Healthcare Systems: Issues, Challenges, and Research Directions 智能医疗系统中边缘计算的隐私与安全问题综述:问题、挑战和研究方向
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-02-09 DOI: 10.26599/TST.2023.9010080
Ahmad Alzu'bi;Ala'a Alomar;Shahed Alkhaza'leh;Abdelrahman Abuarqoub;Mohammad Hammoudeh
The healthcare industry is rapidly adapting to new computing environments and technologies. With academics increasingly committed to developing and enhancing healthcare solutions that combine the Internet of Things (IoT) and edge computing, there is a greater need than ever to adequately monitor the data being acquired, shared, processed, and stored. The growth of cloud, IoT, and edge computing models presents severe data privacy concerns, especially in the healthcare sector. However, rigorous research to develop appropriate data privacy solutions in the healthcare sector is still lacking. This paper discusses the current state of privacy-preservation solutions in IoT and edge healthcare applications. It identifies the common strategies often used to include privacy by the intelligent edges and technologies in healthcare systems. Furthermore, the study addresses the technical complexity, efficacy, and sustainability limits of these methods. The study also highlights the privacy issues and current research directions that have driven the IoT and edge healthcare solutions, with which more insightful future applications are encouraged.
医疗保健行业正在迅速适应新的计算环境和技术。随着学术界越来越多地致力于开发和增强结合物联网 (IoT) 和边缘计算的医疗保健解决方案,现在比以往任何时候都更需要对正在获取、共享、处理和存储的数据进行充分监控。云、物联网和边缘计算模式的发展带来了严重的数据隐私问题,尤其是在医疗保健领域。然而,在医疗保健领域开发适当数据隐私解决方案的严谨研究仍然缺乏。本文讨论了物联网和边缘医疗应用中隐私保护解决方案的现状。它指出了医疗保健系统中的智能边缘和技术在保护隐私方面常用的策略。此外,研究还探讨了这些方法的技术复杂性、功效和可持续性限制。研究还强调了推动物联网和边缘医疗解决方案的隐私问题和当前研究方向,并鼓励在未来应用中采用更具洞察力的方法。
{"title":"A Review of Privacy and Security of Edge Computing in Smart Healthcare Systems: Issues, Challenges, and Research Directions","authors":"Ahmad Alzu'bi;Ala'a Alomar;Shahed Alkhaza'leh;Abdelrahman Abuarqoub;Mohammad Hammoudeh","doi":"10.26599/TST.2023.9010080","DOIUrl":"https://doi.org/10.26599/TST.2023.9010080","url":null,"abstract":"The healthcare industry is rapidly adapting to new computing environments and technologies. With academics increasingly committed to developing and enhancing healthcare solutions that combine the Internet of Things (IoT) and edge computing, there is a greater need than ever to adequately monitor the data being acquired, shared, processed, and stored. The growth of cloud, IoT, and edge computing models presents severe data privacy concerns, especially in the healthcare sector. However, rigorous research to develop appropriate data privacy solutions in the healthcare sector is still lacking. This paper discusses the current state of privacy-preservation solutions in IoT and edge healthcare applications. It identifies the common strategies often used to include privacy by the intelligent edges and technologies in healthcare systems. Furthermore, the study addresses the technical complexity, efficacy, and sustainability limits of these methods. The study also highlights the privacy issues and current research directions that have driven the IoT and edge healthcare solutions, with which more insightful future applications are encouraged.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":null,"pages":null},"PeriodicalIF":6.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10431732","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning 使用基于深度学习的多种特征选择方法的入侵检测系统新框架
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-02-09 DOI: 10.26599/TST.2023.9010032
A. E. M. Eljialy;Mohammed Yousuf Uddin;Sultan Ahmad
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network's incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks is an inevitable component of network security. The main challenges of such an IDS are achieving zero or extremely low false positive rates and high detection rates. Internet of Things (IoT) networks run by using devices with minimal resources. This situation makes deploying traditional IDSs in IoT networks unfeasible. Machine learning (ML) techniques are extensively applied to build robust IDSs. Many researchers have utilized different ML methods and techniques to address the above challenges. The development of an efficient IDS starts with a good feature selection process to avoid overfitting the ML model. This work proposes a multiple feature selection process followed by classification. In this study, the Software-defined networking (SDN) dataset is used to train and test the proposed model. This model applies multiple feature selection techniques to select high-scoring features from a set of features. Highly relevant features for anomaly detection are selected on the basis of their scores to generate the candidate dataset. Multiple classification algorithms are applied to the candidate dataset to build models. The proposed model exhibits considerable improvement in the detection of attacks with high accuracy and low false positive rates, even with a few features selected.
入侵检测系统(IDS)用于实时检测异常情况。它们将网络输入流量分为良性和异常(攻击)两种。软件定义网络中高效、强大的 IDS 是网络安全不可或缺的组成部分。此类 IDS 面临的主要挑战是实现零或极低的误报率和高检测率。物联网 (IoT) 网络使用资源极少的设备运行。这种情况使得在物联网网络中部署传统 IDS 变得不可行。机器学习(ML)技术被广泛应用于构建稳健的 IDS。许多研究人员利用不同的 ML 方法和技术来应对上述挑战。高效 IDS 的开发始于良好的特征选择过程,以避免 ML 模型的过度拟合。本研究提出了一个多特征选择过程,然后进行分类。本研究使用软件定义网络(SDN)数据集来训练和测试所提出的模型。该模型采用多重特征选择技术,从一组特征中选择高分特征。根据得分选出与异常检测高度相关的特征,生成候选数据集。对候选数据集采用多种分类算法来建立模型。即使只选择少量特征,所提出的模型在检测攻击方面也有相当大的改进,准确率高,误报率低。
{"title":"Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning","authors":"A. E. M. Eljialy;Mohammed Yousuf Uddin;Sultan Ahmad","doi":"10.26599/TST.2023.9010032","DOIUrl":"https://doi.org/10.26599/TST.2023.9010032","url":null,"abstract":"Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network's incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks is an inevitable component of network security. The main challenges of such an IDS are achieving zero or extremely low false positive rates and high detection rates. Internet of Things (IoT) networks run by using devices with minimal resources. This situation makes deploying traditional IDSs in IoT networks unfeasible. Machine learning (ML) techniques are extensively applied to build robust IDSs. Many researchers have utilized different ML methods and techniques to address the above challenges. The development of an efficient IDS starts with a good feature selection process to avoid overfitting the ML model. This work proposes a multiple feature selection process followed by classification. In this study, the Software-defined networking (SDN) dataset is used to train and test the proposed model. This model applies multiple feature selection techniques to select high-scoring features from a set of features. Highly relevant features for anomaly detection are selected on the basis of their scores to generate the candidate dataset. Multiple classification algorithms are applied to the candidate dataset to build models. The proposed model exhibits considerable improvement in the detection of attacks with high accuracy and low false positive rates, even with a few features selected.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":null,"pages":null},"PeriodicalIF":6.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10431760","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Univariate Time Series Anomaly Detection Based on Hierarchical Attention Network 基于层次注意网络的单变量时间序列异常检测
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-02-09 DOI: 10.26599/TST.2023.9010073
Zexi Chen;Dongqiang Jia;Yushu Sun;Lin Yang;Wenjie Jin;Ruoxi Liu
In order to support the perception and defense of the operation risk of the medium and low voltage distribution system, it is crucial to conduct data mining on the time series generated by the system to learn anomalous patterns, and carry out accurate and timely anomaly detection for timely discovery of anomalous conditions and early alerting. And edge computing has been widely used in the processing of Internet of Things (IoT) data. The key challenge of univariate time series anomaly detection is how to model complex nonlinear time dependence. However, most of the previous works only model the short-term time dependence, without considering the periodic long-term time dependence. Therefore, we propose a new Hierarchical Attention Network (HAN), which introduces seven day-level attention networks to capture fine-grained short-term time dependence, and uses a week-level attention network to model the periodic long-term time dependence. Then we combine the day-level feature learned by day-level attention network and week-level feature learned by week-level attention network to obtain the high-level time feature, according to which we can calculate the anomaly probability and further detect the anomaly. Extensive experiments on a public anomaly detection dataset, and deployment in a real-world medium and low voltage distribution system show the superiority of our proposed framework over state-of-the-arts.
为了支持中低压配电系统运行风险的感知和防御,关键是要对系统产生的时间序列进行数据挖掘,学习异常模式,准确及时地进行异常检测,及时发现异常情况,及早预警。而边缘计算已广泛应用于物联网(IoT)数据的处理。单变量时间序列异常检测的关键挑战在于如何对复杂的非线性时间依赖性进行建模。然而,之前的大多数研究只对短期时间依赖性进行建模,而没有考虑周期性的长期时间依赖性。因此,我们提出了一种新的分层注意力网络(HAN),它引入了七个日级注意力网络来捕捉细粒度的短期时间依赖性,并使用周级注意力网络来模拟周期性的长期时间依赖性。然后,我们将日级注意力网络学习到的日级特征与周级注意力网络学习到的周级特征相结合,得到高级时间特征,据此计算异常概率,进一步检测异常。在公共异常检测数据集上的广泛实验以及在实际中低压配电系统中的部署表明,我们提出的框架优于现有技术。
{"title":"Univariate Time Series Anomaly Detection Based on Hierarchical Attention Network","authors":"Zexi Chen;Dongqiang Jia;Yushu Sun;Lin Yang;Wenjie Jin;Ruoxi Liu","doi":"10.26599/TST.2023.9010073","DOIUrl":"https://doi.org/10.26599/TST.2023.9010073","url":null,"abstract":"In order to support the perception and defense of the operation risk of the medium and low voltage distribution system, it is crucial to conduct data mining on the time series generated by the system to learn anomalous patterns, and carry out accurate and timely anomaly detection for timely discovery of anomalous conditions and early alerting. And edge computing has been widely used in the processing of Internet of Things (IoT) data. The key challenge of univariate time series anomaly detection is how to model complex nonlinear time dependence. However, most of the previous works only model the short-term time dependence, without considering the periodic long-term time dependence. Therefore, we propose a new Hierarchical Attention Network (HAN), which introduces seven day-level attention networks to capture fine-grained short-term time dependence, and uses a week-level attention network to model the periodic long-term time dependence. Then we combine the day-level feature learned by day-level attention network and week-level feature learned by week-level attention network to obtain the high-level time feature, according to which we can calculate the anomaly probability and further detect the anomaly. Extensive experiments on a public anomaly detection dataset, and deployment in a real-world medium and low voltage distribution system show the superiority of our proposed framework over state-of-the-arts.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":null,"pages":null},"PeriodicalIF":6.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10431752","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Tsinghua Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1