39 results on '"Wu, NaiQi"'
Search Results
2. Joint Specifics and Dual-Semantic Hashing Learning for Cross-Modal Retrieval
- Author
-
Teng, Shaohua, Lin, Shengjie, Teng, Luyao, Wu, Naiqi, Zheng, Zefeng, Fei, Lunke, and Zhang, Wei
- Published
- 2024
- Full Text
- View/download PDF
3. Selected confidence sample labeling for domain adaptation
- Author
-
Zheng, Zefeng, Teng, Shaohua, Wu, Naiqi, Teng, Luyao, Zhang, Wei, and Fei, Lunke
- Published
- 2023
- Full Text
- View/download PDF
4. Many-objective optimization for scheduling of crude oil operations based on NSGA-Ⅲ with consideration of energy efficiency
- Author
-
Hou, Yan, Wu, NaiQi, Li, ZhiWu, Zhang, Yixian, Qu, Ting, and Zhu, QingHua
- Published
- 2020
- Full Text
- View/download PDF
5. Multi-agent oriented solution for forecasting-based control strategy with load priority of microgrids in an island mode – Case study: Tunisian petroleum platform
- Author
-
Abidi, Mohamed Ghaieth, Ben Smida, Moncef, Khalgui, Mohamed, Li, Zhiwu, and Wu, Naiqi
- Published
- 2017
- Full Text
- View/download PDF
6. Symbolic state estimation in bounded timed labeled Petri nets.
- Author
-
Dong, Yifan, Wu, Naiqi, and Li, Zhiwu
- Subjects
- *
PETRI nets , *DISCRETE systems , *ONLINE algorithms - Abstract
This paper addresses the state estimation of timed discrete event systems, where the occurrence of an event is associated with a time delay and the initial state of the system belongs to a set of possible initial states. A discrete event system is modeled with a bounded timed labeled Petri net whose unobservable subnet is acyclic, and the behavior of the system under a global time clock can be observed. The procedure for state estimations of partially observed Petri nets is refined by the introduction of time in discrete event systems. We apply the symbolic techniques to the representation of states and transition relations of bounded timed labeled Petri nets. Then we propose an online algorithm for the computation of state estimations generated by timed observations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. On a maximally permissive deadlock prevention policy for automated manufacturing systems by using resource-oriented Petri nets.
- Author
-
Chen, HeFeng, Wu, NaiQi, Li, ZhiWu, and Qu, Ting
- Subjects
LINEAR programming ,PETRI nets ,INTEGER programming ,PREVENTION - Abstract
It is theoretically and practically significant to synthesize a maximally permissive (optimal) controller to prevent deadlocks in an automated manufacturing system (AMS). With an AMS being modeled with Petri nets, by the existing methods, integer linear programming (ILP) problems are usually formulated and solved to obtain optimal policies by forbidding illegal markings at the same time no legal marking is excluded. Without an efficient technique for solving an ILP, such a method is usually computationally prohibitive. A resource-oriented Petri net (ROPN) is employed to model a class of AMS for resolving the deadlock control problem with maximal permissiveness in this paper. Efficient methods are developed to figure out the key structures in an ROPN model for deadlock prevention. Based on the structural properties of ROPN models, this work explores several types of illegal markings that can be prohibited optimally by structural analysis. For these markings, a deadlock prevention policy can be derived in an algebraic way without solving a notorious ILP problem. For the other markings, linear programming (LP), instead of ILP, approaches are developed to forbid them optimally. Thus, a maximally permissive controller can be developed while the computational cost is reduced greatly. The proposed methods are verified by typical examples in the literature. • Resource-oriented Petri nets are used to model systems for deadlock prevention. • Various types of illegal markings that can be simply prevented are structurally identified. • It finds that most of illegal markings can be prevented by using polynomial algorithms. • The other illegal markings can be prevented by solving a linear programming. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
8. Energy efficiency optimization in scheduling crude oil operations of refinery based on linear programming.
- Author
-
Wu, NaiQi, Li, ZhiWu, and Qu, Ting
- Subjects
- *
PETROLEUM production , *ENERGY consumption , *PRODUCTION scheduling , *MATHEMATICAL optimization , *PETROLEUM refineries , *LINEAR programming - Abstract
For sustainable development, a refinery is required to save energy as much as possible so as to reduce the emission of greenhouse gas. In crude oil operations, oil transportation from storage tanks to charging tanks via a pipeline consumes a large portion of energy. It is vitally important to minimize energy consumption for this process. Since the oil flow resistance is proportional to the square of oil flow rate, the relation between energy efficiency and flow rate is nonlinear, which makes the problem complicated. This work addresses this important issue by formulating a linear programming model for the considered problem such that it can be efficiently solved. A real-world industrial case study is used to demonstrate the applications and significance of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
9. Adaptive genetic algorithm for two-stage hybrid flow-shop scheduling with sequence-independent setup time and no-interruption requirement.
- Author
-
Qiao, Yan, Wu, NaiQi, He, YunFang, Li, ZhiWu, and Chen, Tao
- Subjects
- *
FLOW shop scheduling , *SETUP time , *GENETIC algorithms , *FLOW shops , *SCHOOL schedules , *PROBLEM solving - Abstract
• It addresses a class of two-stage flow shops with no-interruption requirement. • With feasibility conditions derived, an adaptive genetic algorithm is constructed. • The probability of crossover and mutation operations are adaptively adjusted. • A local search method is introduced to further improve the performance. • Extensive experiments demonstrate the efficiency and effectiveness. It is a trend for a production system to produce multiple product types with small batches. Thus, there are frequent switches between batches. Due to the different product types in different batches, setups may be necessary for a batch changeover. Based on practical applications, we investigate the problem of scheduling a class of two-stage hybrid flow shops, where there is significant setup time at the first stage, while the second stage should operate continuously without interruption. To solve this problem, after deriving the existence conditions of a feasible schedule, an adaptive genetic algorithm is designed to dynamically adjust the probabilities of crossover and mutation operations according to the population diversity. In this way, the whole solution space could be fully explored so as to get an optimal or near optimal solution for large-size practical problems. Also, based on the characteristics of solutions, a local search method is presented to further improve the solution accuracy. Experiments are done to test the efficiency and effectiveness of the proposed method. Results show that the algorithm can find good solutions with a gap of 1% with the lower bound within three minutes, i.e. , it is efficient and effective. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
10. Petri net-based approach to short-term scheduling of crude oil operations with less tank requirement.
- Author
-
Zhang, SiWei, Wu, NaiQi, Li, ZhiWu, Qu, Ting, and Li, CongDong
- Subjects
- *
PETRI nets , *PETROLEUM industry , *CONTROL theory (Engineering) , *PETROLEUM sales & prices , *STORAGE tanks - Abstract
With the interaction of discrete-event and continuous processes, the short-term scheduling problem of crude oil operations is essentially combinatorial. Thus, it is preferred to develop computationally efficient techniques for a satisfactory solution other than an exactly optimal one. Based on this idea, such a scheduling issue is studied in the viewpoint of control theory. To do so, as charging tanks are a type of critical resources, it is crucial to determine how many charging tanks are required to obtain a feasible schedule. By using a hybrid Petri net to describe the behavior of crude oil operations, we show that a feasible schedule can be found for a system with two or more than two distillers if there are two charging tanks for each distiller, which is the least number of charging tanks for finding a feasible solution to reach the maximal productivity. Also, the requirements of the initial state for obtaining a feasible schedule are given and scheduling method is proposed. The scheduling method is simple and computationally efficient. An industrial case study is used to show how the proposed approach can be applied. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
11. A novel method for deadlock prevention of AMS by using resource-oriented Petri nets.
- Author
-
Chen, Hefeng, Wu, NaiQi, and Zhou, MengChu
- Subjects
- *
DEADLOCK prevention (Manufacturing) , *PETRI nets , *AUTOMATION , *SEQUENTIAL processing (Computer science) , *COMPUTER simulation , *COMPUTATIONAL intelligence - Abstract
Based on the systems of simple sequential processes with resources (S 3 PR) model, the existing methods involve prohibitive computation to synthesize a deadlock prevention controller for automated manufacturing systems (AMS). To reduce the computation, this work studies this problem by using a resource-oriented Petri net (ROPN) model. By revealing the relationship between the bad markings and structural properties of an ROPN, it presents a method such that a deadlock prevention controller can be obtained by simple calculation. By such a controller, for each strongly connected subnet in an ROPN, only one control place is needed such that it is structurally very simple. Furthermore, a condition is given under which a maximally permissive controller can be efficiently obtained, which was never seen before. Examples are used to show the application and performance of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
12. Tank cycling and scheduling analysis of high fusion point oil transportation for crude oil operations in refinery
- Author
-
Wu, Naiqi, Chu, Feng, Chu, Chengbin, and Zhou, MengChu
- Subjects
- *
PRODUCTION scheduling , *FUSION (Phase transformation) , *PETROLEUM transportation , *PETROLEUM refineries , *CONSTRAINT satisfaction , *PETRI nets , *FEASIBILITY studies - Abstract
Abstract: For short-term scheduling of crude oil operations, oil residency time and high fusion crude oil transportation constraints are difficult to model. With high setup cost for high fusion point oil transportation, it is desired that the volume of such oil should be transported as much as possible by a single setup. To do so and obtain a feasible schedule, charging tank cycling is an effective strategy. With a hybrid Petri net model, scheduling analysis is carried out and schedulability conditions under a charging tank cycling strategy are presented. They can be used for determining a refining schedule and checking if a target refining schedule is realizable. If so, a detailed feasible schedule can be easily obtained by creating the operation decisions one by one and put into immediate industrial use. [Copyright &y& Elsevier]
- Published
- 2010
- Full Text
- View/download PDF
13. Scheduling analysis of automotive glass manufacturing systems subject to sequence-independent setup time, no-idle machines, and permissive maximum total tardiness constraint.
- Author
-
He, YunFang, Qiao, Yan, Wu, NaiQi, Leng, JieWu, and Luo, Xin
- Subjects
- *
MANUFACTURING processes , *SETUP time , *PRODUCTION scheduling , *MIXED integer linear programming , *FLOW shop scheduling , *GLASS industry , *GLASS analysis - Abstract
With the increasing demand for automotive glass, improving the efficiency of automotive glass manufacturing systems can make full use of production resources and reduce the waste of natural and social resources. Therefore, this work aims to provide an efficient method for a real-world two-stage hybrid flow shop scheduling problem with small batches in an automotive glass manufacturing system. For the investigated problem, there is a significant setup time at the first stage, the second stage is served by machines that should not be interrupted, and each batch has a due date. Such constraints make this scheduling problem challenging. To solve this problem, a mixed integer linear programming model is established. Also, two properties and three theorems are given to enhance the problem-solving process. Subsequently, an efficient genetic algorithm is carefully designed to solve large-scale problems by considering the properties of the system. Meanwhile, an improvement scheme is proposed to decrease the running time of the algorithm, and experimental results show that this scheme can reduce the running time by 280 s at most from the average results of different scale problems. Finally, extensive experiments are carried out and a real-world case is solved to demonstrate the efficiency and effectiveness of the designed genetic algorithm. Also, the Taguchi method is adopted to tune the parameters for the designed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Efficient approach to cyclic scheduling of high throughput screening systems for bioengineering.
- Author
-
Zhang, SiWei, Li, Tan, Wu, NaiQi, Qiao, Yan, and Guo, Weiwen
- Subjects
- *
HIGH throughput screening (Drug development) , *LIFE sciences , *PETRI nets , *BIOENGINEERING , *MATHEMATICAL programming - Abstract
As a standard technology, high throughput screening (HTS) is widely applied for the analysis and detection of new biological substances and drugs in pharmaceutical industries and life science research. Efficient scheduling of HTS systems is a crucial issue for reducing the cost of their operations. As a typical application of high throughput screening, this work studies the scheduling problem of the enzyme-linked immunoassay (ELISA) processes in HTS systems. For this process, it requires a one-microplate cyclic schedule and a microplate visits some processing resources multiple times, making the process deadlock-prone such that its scheduling problem is very challenging. To tackle this problem, the process is modeled by a kind of Petri nets. Based on this model, by analyzing the dynamic properties of the process, it is able to directly deduce an activity sequence to form an optimal cyclic schedule. In this way, it not only efficiently solves the challenging scheduling problem without building a mathematical programming model, but also the obtained schedule is very easy to understand and implement. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Ensemble meta-heuristics and Q-learning for staff dissatisfaction constrained surgery scheduling and rescheduling.
- Author
-
Yu, Hui, Gao, Kai-zhou, Wu, Naiqi, and Suganthan, Ponnuthurai Nagaratnam
- Subjects
- *
METAHEURISTIC algorithms , *PATIENT satisfaction , *MEDICAL personnel , *SCHEDULING , *MEDICAL care costs , *SURGERY - Abstract
In this study, we investigate the multi-objective surgery scheduling and rescheduling problems with considering medical staff dissatisfaction and fuzzy surgery time. Rescheduling is activated when emergency patients arrive. First, a multi-objective mathematical model is established for maximizing the average patient satisfaction, and minimizing the fuzzy maximum completion time and total medical cost, simultaneously. Second, five meta-heuristics are employed and improved to solve the concerned problems. Five heuristic rules are developed to improve the diversity and quality of initial solutions. For improving the performance of meta-heuristics, six local search operators are designed and two Q-learning-based strategies are developed to select optimal ones intelligently. Finally, 29 instances with different scales are used to verify the performance of the proposed algorithms. Compared with the basic meta-heuristics, the average performance of the algorithms with the second Q-learning-based strategy is improved by 62.5%, 62.1%, 50%, 70.7%, and 70.7%, respectively. Through the Friedman test, the asymptotic significance values of both metrics (0.034 and 0.000) are less than 0.05, indicating that there is a significant performance gap among five algorithms with the second Q-learning-based strategy. The average rank values of the teaching-learning-based optimization with the second Q-learning strategy are 3.7069 and 2.0690 for two metrics, which are better than the compared ones. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Constrained multi-objective optimization of short-term crude oil scheduling with dual pipelines and charging tank maintenance requirement.
- Author
-
Hou, Yan, Zhang, YiXian, Wu, NaiQi, and Zhu, QingHua
- Subjects
- *
PETROLEUM , *CONSTRAINED optimization , *METAHEURISTIC algorithms , *SCHEDULING , *PROBLEM solving - Abstract
For the short-term crude oil scheduling problem, it is difficult to guarantee the feasibility of a schedule due to complicated constraints. Meanwhile, uncertainty is a very important concern in refineries, such as unexpected breakdown of charging tanks. Therefore, it is a great challenge to make a schedule feasible. Most existing works on multi-objective optimization of short-term crude oil scheduling are developed for refineries processing low-fusion-point oil (L-oil) only and little is done for the case with dual pipelines for processing both L-oil and high-fusion-point oil (H-oil). With five objectives and many constraints, it is challenging for a metaheuristic algorithm to find a feasible schedule. To solve this problem, in this work, constraint violation is used to describe the degree of constraint violation. Thus, an adaptive enhanced selection pressure algorithm based on NSGA-II-CDP (NSGA-II-APE) is proposed to efficiently solve the problem for processing both L-oil and H-oil. This algorithm can effectively enhance the selection pressure in the later iterations. Industrial case problems are used to test the proposed method and compare its performance with 11 state-of-the-art constrained multi-objective evolution algorithms (CMOEAs). Results show its superiority over the existing ones in terms of convergence, solution diversity, and time efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
17. Model-based fault identification of discrete event systems using partially observed Petri nets.
- Author
-
Zhu, Guanghui, Li, Zhiwu, and Wu, Naiqi
- Subjects
- *
FAULT location (Engineering) , *DISCRETE systems , *PETRI nets , *LINEAR programming , *INTEGER programming - Abstract
This paper deals with the problem of fault identification in a system. The system is originally modeled by a Petri net, called a nominal (fault-free) net, and faults are considered as unobservable transitions not contained in the nominal net. It is assumed that partial places of the nominal net are observable and the output of the system is defined as an observed evolution , i.e., a sequence involving transitions and markings of the observable places. When faults occur, the observed evolution cannot be generated by the nominal net. We provide an approach that identifies unobservable transitions by constructing and solving an Integer Linear Programming problem according to the observed evolution and the nominal net. A faulty net is obtained by adding the identified unobservable transitions to the nominal one such that it coincides with the observed evolution. In addition, two methods to ensure acyclicity of the identified subnet, i.e., a net that includes unobservable transitions only, are reported. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
18. On optimization of thermal sensation satisfaction rate and energy efficiency of public rooms: A case study.
- Author
-
Wang, Xu, Qiao, Yan, Wu, Naiqi, Li, Zhiwu, and Qu, Ting
- Subjects
- *
ENERGY consumption , *THERMAL comfort , *AIR conditioning efficiency , *SUSTAINABLE buildings , *REGRESSION analysis - Abstract
For sustainability, many studies have been conducted on energy saving for HVAC (heating, ventilation, and air-conditioning) systems. In a public place, different persons may have different thermal comfort requirements. Few studies are done so far for energy saving in a public place with HVAC systems that can accommodate many persons with thermal sensation differences for different persons being taken into account. In this work, during the summer from May to September in 2016, an investigation for energy saving is done in a large library room at Macau University of Science and Technology, Macau, China. In such a large room, the temperature in different areas is different and many students with different thermal sensations study in the room at the same time. Under such an environment, to save energy as well as maximize the total thermal satisfactory rate, a large number of experiments are carried out. Based on the collected data, methods are given to predict the indoor temperature for each reading area and thermal satisfactory rate under the current indoor temperature. Then, an efficient algorithm is developed to maximize the thermal satisfactory rate for the entire room by optimizing the input temperature of the ACC (air-conditioning control) system such that energy can be saved. Results show that, under the worst situation, by comparing with the manual control, the daily electricity saving is about 93 kWh and the electricity saving during the period from May to September is about 13,950 kWh. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
19. Supervisory control of state-tree structures with partial observation.
- Author
-
Gu, Chan, Wang, Xi, Wu, Naiqi, and Li, Zhiwu
- Subjects
- *
SUPERVISORY control systems , *DATA , *OBSERVABILITY (Control theory) , *PREDICATE (Logic) , *INFORMATION science - Abstract
Supervisory control of discrete-event systems (SCDES) is well developed to find a maximally permissive supervisor. As an extension to supervisory control theory, a new framework, state-tree structures (STS), has been deployed to manage the state explosion problem of SCDES. This paper aims to address this notorious issue of supervisory control with partial observation in the STS framework by state feedback control that calculates the controllers of the controllable-observable events only, which is realized by the following two steps. First, for a specification represented as a predicate, a supremal normal subpredicate that requires only the controllable-observable events enabled/disabled, is computed. Second, according to the new transition function constructed by the natural projection of the given STS, the supremal nonblocking, weakly controllable subpredicate is obtained from the supremal normal subpredicate. The proposed approach based on STS provides the possibility to supervise controllable events under partial observation in large-scale systems with the state explosion problem managed. An example with state size over 10 7 that leads to program crashes in SCDES can be solved in this paper. Moreover, in order to demonstrate the industrial applications of the contribution of this research, three examples are addressed. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
20. Optimal scheduling of electric vehicle charging operations considering real-time traffic condition and travel distance.
- Author
-
An, Yisheng, Gao, Yuxin, Wu, Naiqi, Zhu, Jiawei, Li, Hongzhang, and Yang, Jinhui
- Subjects
- *
ELECTRIC charge , *ELECTRIC vehicles , *PARTICLE swarm optimization , *SCHEDULING software , *SCHEDULING , *MATHEMATICAL optimization - Abstract
As the number of electric vehicles (EVs) increases rapidly, the problem of electric vehicle charging has widely become a concern. Therefore, considering the fact that charging time for one EV cannot be shortened quickly and the number of charging stations will not expand rapidly, how to schedule charging operations of electric vehicles in urban areas becomes a very important issue, since it can improve charging efficiency and relieve charging anxiety of EV users. Up to now, there is no scheduling software tool for practical use in this field. Based on the analysis of electric vehicle charging behavior characteristics, this paper investigates the EV charging problem at the scheduling level. First, a mathematical model for coordinated charging of EVs is proposed to minimize the total charging time for a given number of vehicles. Second, an earliest finish charging scheduling algorithm is presented to solve the charging problem. Then, by considering the combinatorial nature and practical applications with large number of EVs, two practical swarm-optimization-based EV charging scheduling algorithms are proposed. A real-life case study is presented to illustrate the proposed approaches. • A traffic network model with average velocity as the weight is established. • An electric vehicle charging scheduling model is developed. • An particle swarm optimization based algorithm for the charging problem. • An enhanced algorithm for the large-scale vehicle charging scheduling. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. Online verification of [formula omitted]-step opacity by Petri nets in centralized and decentralized structures.
- Author
-
Zhu, Guanghui, Li, Zhiwu, and Wu, Naiqi
- Subjects
- *
PETRI nets , *DISCRETE systems , *OFFICIAL secrets , *ONLINE algorithms , *LINEAR programming , *INTEGER programming - Abstract
This paper presents an online approach to deal with the problem of state-based K -step opacity of a discrete event system modeled with labeled Petri nets. The secret states can be described by a set of either markings or generalized mutual exclusion constraints (GMECs), which is more general than the existing approaches in which the secret states are characterized by GMECs only. We formulate an integer linear programming (ILP) model to find a marking outside the set of secret states from each of the K - delayed state estimates , avoiding a complete enumeration of reachability set. Based on the ILP model, an online algorithm is developed to verify K -step opacity of an observation (i.e., an observed sequence). As an extension of K -step opacity, we define the notion of joint K -step opacity in a decentralized structure with two local sites and extend the proposed algorithm to verify the joint K -step opacity of an observation. In addition, the relationship between joint K-step opacity and K-step opacity is formally discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. Robust predictability of stochastic discrete-event systems and a polynomial-time verification.
- Author
-
Liao, Hui, Liu, Fuchun, and Wu, Naiqi
- Subjects
- *
STOCHASTIC systems , *PROBABILISTIC automata - Abstract
The purpose of fault prediction of discrete-event systems (DESs) is to predict the occurrence of fault in advance such that some protective actions can be taken before the occurrence of the fault. The robust predictability issue under the framework of stochastic DESs (SDESs) with model uncertainty is studied. First, the notions of (ϵ , m) − robust predictability and robust predictability of SDESs are formalized. In general, a set of stochastic systems being robustly predictable can predict the occurrences of faults in the sense of probability. Then the robust predictor and robust verifier for performing the robust prediction are constructed from the given possible stochastic systems. Particularly, the necessary and sufficient conditions for (ϵ , m) − robust predictability and robust predictability of SDESs are proposed, and an approach is presented to verify the robust predictability of SDESs with polynomial-time complexity both in the state space and in the number of all possible models. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. TBM disc cutter wear prediction using stratal slicing and IPSO-LSTM in mixed weathered granite stratum.
- Author
-
Mo, Deyun, Bai, Liping, Huang, Weiran, Wu, Naiqi, and Lu, Liyao
- Subjects
- *
RAILROAD tunnels , *PARTICLE swarm optimization , *SUSTAINABLE construction , *GRANITE , *COST control , *CONSTRUCTION management - Abstract
• Propose a stratal slicing method to reflect the actual cutter working conditions. • The stratal slicing method has stronger geological information processing ability. • It can improve the prediction accuracy and has real-time prediction capability. • The error of combined method in real-time predictions is close to that of the manual measure. • It is expected to demonstrate excellent performance in more complex geological conditions and larger shield diameters. Monitoring the wear status of cutters is important for safe and sustainable shield construction and cost management. In this paper, an innovative stratal slicing method is proposed to convert segmented and discrete uniaxial compressive strength (UCS) test data into a sequential dataset by combining it with a geological profile. The sequential dataset not only accurately represents the changing strata conditions but also differentiates the working conditions of the disc cutters in various cutterhead areas on the excavation face. Its sequence characteristics can be better combined with shield operational parameters and time-series models for real-time prediction. Furthermore, the particle swarm optimization (PSO) algorithm was improved by adding variable inertia weights and elimination mechanisms, which effectively optimised the hyperparameters of the long short-term memory (LSTM) model. The proposed method was applied to a field tunnelling case with data collected from the Guangzhou Metro Line 18 railway. The results show that the UCS data obtained using the proposed stratal slicing method can improve the prediction accuracy compared to traditional methods and models. In particular, the combined IPSO + LSTM + horizontal summation method can obtain the most accurate prediction results and has real-time prediction capability. With the proposed stratal slicing method, the IPSO + LSTM modelling approach is generally applicable to more complex ground conditions and larger shield diameters. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. Finite-time group consensus via pinning control for heterogeneous multi-agent systems with disturbances by integral sliding mode.
- Author
-
Li, Xiaobo, Yu, Zhenhua, Zhong, Zhaofeng, Wu, Naiqi, and Li, Zhiwu
- Subjects
- *
MULTIAGENT systems , *FINITE groups , *FLUX pinning , *INTEGRALS - Abstract
In this paper, the finite-time group consensus for a class of heterogeneous multi-agent systems (HMASs) with bounded disturbances is studied by designing a pinning control scheme with an integral sliding mode. For an HMAS without disturbance, a continuous finite-time consensus protocol with a pinning and grouping strategy is proposed. Under the designed control protocol, the HMAS achieves consensus according to the given grouping requirement in a finite time and the final states converge to the desired consistency values. The detailed theoretical proof is given on the strength of Lyapunov theory, LaSalle's invariance principle and homogeneity with dilation principle. On this basis, this paper further introduces an integral sliding mode into finite-time group consensus protocol designed above such that the HMAS with one or more pinning agents can achieve accurate finite-time group consensus even if there exist uncertain bounded disturbances. It is noted that the control input is chattering-free. Two simulation examples are presented to illustrate the effectiveness of the proposed control schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. Passenger-oriented traffic management integrating perimeter control and regional bus service frequency setting using 3D-pMFD.
- Author
-
Chen, Saifei, Fu, Hui, Wu, Naiqi, Wang, Yefei, and Qiao, Yan
- Subjects
- *
BUS transportation , *URBAN transportation , *CITY traffic , *TRAFFIC density , *TRAFFIC engineering , *TRAFFIC flow - Abstract
• Propose a control framework for two-region bi-modal traffic networks with 3D-MFD. • Integrate perimeter control with regional bus service frequency setting. • Formulate dynamics of regional bus systems with regional bus frequencies. • Develop a modified GA for optimizing control inputs. Public buses and private vehicles are two main transportation modes for urban road traffic. It has strong flow interactions between the two traffic modes. From data analysis, the vehicle density of a traffic mode not only determine its flow, but also affect the flow of the other mode. With such mixed vehicle flows, the application of traditional traffic management that controls each vehicle flow system separately is limited. Thus, it is beneficial to control both bus and private vehicle flows in an integrated way. Under such bi-modal traffic management, the network efficiency cannot be reflected by vehicle flows since the occupancies of the traffic modes are greatly different. It leads to that the control objective should be necessarily based on passengers. To do so, we adopt bi-modal passenger-based macroscopic fundamental diagram (3D-pMFD) to capture the relations among vehicle accumulations and the total passenger flow in a network. From this aggregate perspective, a passenger-oriented traffic control strategy is proposed by integrating the perimeter control and the regional bus service frequency setting. The characteristics of both traffic modes, especially the operation strategy of buses, are taken into account in the model to describe the bi-modal traffic flow dynamics. A control framework comprised of optimization and simulation is established using model predictive control. The corresponding passenger-based optimization problem is solved by a modified genetic algorithm. With multiple data collected from the network of Shenzhen City in China, numerical experiments are designed to verify the validity and efficiency of the proposed integrated control strategy. Results show that: (1) the proposed strategy can maintain a high level of passenger flow during peak hour with a relatively high demand; (2) the interest of private vehicles is guaranteed even if buses are more recommended in the control strategy; (3) the crowding degree in a bus is reduced properly, which is able to improve the attraction of buses during peak hours; and (4) the proposed passenger-oriented objective results in a comprehensively good performance of the bi-modal network system. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
26. Game current-state opacity formulation in probabilistic resource automata.
- Author
-
Li, Dong, Yin, Li, Wang, Jianzhou, and Wu, Naiqi
- Subjects
- *
PROBABILISTIC automata , *DISCRETE systems , *LOW-calorie diet - Abstract
• Resource automaton and probabilistic resource automaton models are constructed. • A new method to quantify the opacity of a system is proposed from a gaming perspective. • A game current-state analyzer is constructed to verify the game-current state opacity. • The problem of verifying the game current-state opacity is decidable. We investigate the quantitative current-state opacity problem with resource constraints in the framework of probabilistic resource automata which is partially observed. Resource information states and event payoffs capture the variations of a resource that can be consumed or replenished during a system evolution. There are a number of ways to quantify opacity in discrete event systems, but these quantification methods have certain limitations. This research mitigates this restriction by extending current-state opacity and step-based almost current-state opacity formulations to probabilistic resource automata under partial observation with payoff constraints. We define game current-state opacity with an aim of offering a quantitative measure for opacity. We also construct a game current-state analyzer for the verification of game current-state opacity and prove the decidability of verifying the game current-state opacity problem. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
27. Secret inference and attacktability analysis of discrete event systems.
- Author
-
Habbachi, Salwa, Zaghdoud, Amal, Li, Zhiwu, Wu, Naiqi, and Khalgui, Mohamed
- Subjects
- *
DISCRETE systems , *PETRI nets , *MANUFACTURING processes - Abstract
In the discrete event systems literature, the studies addressing opacity usually assume a passive intruder, who has full knowledge of the structure of a system but with only a partial observation ability. This work touches upon the opacity problem in discrete event systems modeled with labeled Petri nets, by assuming the existence of an active intruder. Herein, an active intruder, whose abilities exceed passive observations, is assumed to be able to manipulate the behavior of a system through sensor attacks in a practical manner, i.e., in an embedded way, in order to compromise the opacity of a system. In this setting, a framework for opacity verification is first proposed from the intruder's viewpoint, where opacity is referred to as "language-based opacity". A verification algorithm is then derived to identify opaque secret words. Two stealthy attack models named sensor-failure-making strategy and sensor-injection-making strategy are introduced, allowing the intruder to implant/damage some sensors, i.e., add/delete some events, in line with the original behavior of a system, in order to infer the secret information. An algorithmic procedure for attractability analysis is provided for each attack strategy. Once a system is proved to be attackable, a stealthy attack structure that synthesizes different sensor-failure-making (resp. sensor-injection-making) attacks is constructed. Furthermore, we demonstrate the validity and efficiency of the proposed approaches by implementing the presented algorithms and running experiments on a manufacturing system example. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
28. Identification of labeled Petri nets from finite automata.
- Author
-
Zhu, Guanghui, Yin, Li, Li, Yaohui, Li, Zhiwu, and Wu, Naiqi
- Subjects
- *
PETRI nets , *FINITE state machines , *DISCRETE systems , *LINEAR programming , *INTEGER programming - Abstract
Automata and Petri nets are two typical models of discrete event systems. The paper studies the problem of converting a finite automaton into a Petri net that satisfies the specified structural features. More specifically, we identify a labeled Petri net from a nondeterminstic finite automaton such that the reachability graph of the identified net is isomorphic to the given automaton, meaning that the Petri net models exactly the same dynamic system as the automaton. The identified net necessarily satisfies the specified structural requirements, such as the numbers of places and transitions, absence of self-loops, the exact structure of a part of the net, and so on. Since label Petri nets and nondeterminstic finite automata are generalizations of Petri nets and deterministic finite automata, respectively, the proposed approach can identify a larger spectrum of Petri nets and effectively handle the nondeterminstic cases in the given automaton. Four kinds of conditions are first extracted from the given automaton, namely deterministic enabling conditions, nondeterministic enabling conditions (i.e., multiple transitions with the same label are enabled simultaneously at a marking), transition disabling conditions, and marking inequality conditions. Then, an integer linear programming problem is formulated by characterizing these four kinds of conditions using integer linear constraints. A labeled Petri net satisfying the structural requirements is obtained by solving the integer linear programming problem. We also present two examples to show the possible applications of the proposed identification approach. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Adjacent initial states-based differential privacy for probabilistic labeled Petri nets.
- Author
-
Teng, Yuanxiu, Yin, Li, Li, Zhiwu, and Wu, Naiqi
- Subjects
- *
PETRI nets , *DISCRETE systems , *PRIVACY , *SUPERVISORY control systems , *DISTRIBUTION (Probability theory) - Abstract
Privacy protection has received widespread attention from the community of discrete event systems to protect the sensitive information of users or organizations from being leaked. The existing privacy protection methods cannot protect the state information of probabilistic discrete event systems via repeated observations, which represents the information pertaining to system resource configurations. This work introduces differential privacy into the framework of probabilistic labeled Petri nets to solve the problems pertaining to the initial state protection. For two initial states that are adjacent under a specified measure, a state differential privacy verification method is proposed by determining whether the probability distributions of observations generated from adjacent initial states are similar. An external attacker is unlikely to infer the initial state via repeated observations if the system satisfies state differential privacy for certain adjacent initial states. For a probabilistic labeled Petri net, which does not satisfy state differential privacy, a supervisory control method is proposed for enforcement. A maximally permissive controller can be constructed based on the control specification proposed in this paper. Experimental studies show that the method proposed in the paper can effectively protect the privacy of given adjacent initial states. • Differential privacy is introduced into DESs to protect the secret. • Define state differential privacy to analyze whether the secret is protected. • Verify adjacent initial state-based differential privacy in probabilistic DESs. • A maximally permissive controller is constructed for privacy enforcement. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Supervisory control of discrete-event systems under external attacks.
- Author
-
Wang, Yi, Li, Yuting, Yu, Zhenhua, Wu, Naiqi, and Li, Zhiwu
- Subjects
- *
SUPERVISORY control systems , *DENIAL of service attacks , *DISCRETE systems , *PETRI nets - Abstract
• This paper involves the supervisor design for a discrete event system under attacks in the framework of labeled Petri nets. • The reachability graph of a labeled Petri net is compactly represented by an observer. • A novel structure, namely a product observation reachability graph constructed from a plant and its specification, is proposed to decide the existence of a supervisor. Resilience is a critical criterion to evaluate a networked system including discrete-event systems (DESs). This research touches upon the supervisory control problem of a DES modeled with labeled Petri nets under malicious attacks. Attacks on a system can be categorized into actuator attacks and sensor attacks. The former may cause a failure of an actuator for executing the commands issued from a supervisor that enforces a specification. The latter may corrupt an observation (i.e., a sequence of observable transition labels) from a sensor by different types of attacks such as insertion, removal, and replacement of transition labels. For actuator attacks, if we can detect them and disable some particular controllable transition labels before reaching a state that does not satisfy the specification, then we can find a modified supervisor to enforce the specification. For sensor attacks, we assume that, once a time, only one attack can be carried out, i.e., the attacker does not change the attack during an observation corruption. Given a specification, we consider in a plant model any two feasible transition sequences that share the same corrupted observation under attacks. It is shown that there exists a supervisor to enforce the specification if the one-step controllable extensions of the two transition sequences either satisfy or violate the specification simultaneously. To this end, a novel structure, namely a product observation reachability graph constructed from a plant and its specification, is proposed to decide the existence of such a supervisor by checking whether each state in the graph satisfies a particular condition. The application of the reported methods is demonstrated through examples. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
31. Current-state opacity modelling and verification in partially observed Petri nets.
- Author
-
Saadaoui, Ikram, Li, Zhiwu, and Wu, Naiqi
- Subjects
- *
PETRI nets , *DISCRETE systems , *OFFICIAL secrets , *INTEGER programming , *REDUCED-order models - Abstract
System opacity is a widely studied security notion, implying that a secret behaviour of a given system cannot be seen or assessed by an external observer based on the system evolution. This work deals with the problem of current-state opacity formulation and verification in the context of discrete event systems modelled with partially observed Petri nets (POPNs) (i.e., Petri nets containing place sensors that measure the number of tokens in observable places and event sensors that indicate the firing of observable transitions). A Petri net system is recognized as current-state opaque if the current-state estimate is never entirely contained in the set of secret states. In this regard, we introduce the notion of discernible markings to design a reduced state estimator called a discernible reachability graph, and then come up with formal modelling of current-state opacity in POPN systems. The main idea of the proposed approach consists in proving that if a system is current-state opaque, its current-state estimate, possibly established by an intruder, contains at least one non-secret state. We exploit the mathematical feasibility to formulate this concept by defining and solving an integer linear programming problem with respect to a given secret and an observation sequence collected from sensors. In the light of the proposed modelling, necessary and sufficient conditions are proposed for opacity verification, and examples are given to expose the results. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
32. Data-driven approach to optimal control of ACC systems and layout design in large rooms with thermal comfort consideration by using PSO.
- Author
-
Qiao, Yan, Zhang, SiWei, Wu, NaiQi, Wang, Xu, Li, ZhiWu, Zhou, MengChu, and Qu, Ting
- Subjects
- *
ENERGY conservation in buildings , *TEMPERATURE control , *PARTICLE swarm optimization , *HEAT , *MATHEMATICAL programming , *TEMPERATURE distribution - Abstract
In recent years, there are increasing concerns in energy savings for buildings since they are responsible for a large proportion of energy use. A public room in buildings could hold a number of persons who may prefer dissimilar thermal environment. Furthermore, different areas in such rooms may have different temperatures. Also, facility layout in such a room has effect on the distribution of the people in the room. Thus, it may affect its thermal environment and energy consumption as well. It is meaningful and challenging to effectively operate an air-conditioning control (ACC) system by taking the above mentioned factors into account such that the thermal environment is improved and energy is saved. With the lack of research reports on this issue, this work aims at optimally and dynamically controlling the set-point temperature of an ACC system and designing the facility layout so as to maximize the total thermal satisfaction rate (TSR) as well as energy savings. To do so, a non-linear mathematical programming model is proposed to optimize TSR by determining the set-point of an ACC system and the room layout. Then, a particle swarm optimization (PSO) algorithm is constructed to find an optimal or near optimal solution since it is hard to solve a non-linear mathematical programming problem in a reasonable time. Besides, for further energy saving, two more mathematical programming models are proposed to find a set-point of an ACC system under a given outside temperature and room layout determined by the PSO algorithm. Finally, by using a large library room at Macau University of Science and Technology (MUST) as a case, investigations with a large number of experiments are conducted to collect necessary data. Based on the data, regression analysis is done to predict its indoor temperatures in different areas and TSR at a given temperature. Numerical results show that, by the proposed method, it can improve the thermal satisfaction rate by about 27% and save the daily power cost by about 24.3% in comparison with the currently used manual control method. • Study is conducted on energy efficiency in large public rooms. • Methods are derived to predict temperature distribution and occupants' satisfaction rate. • PSO algorithm is developed for optimal input temperature control and facility layout. • The proposed approach can significantly reduce energy consumption. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
33. Group consensus via pinning control for a class of heterogeneous multi-agent systems with input constraints.
- Author
-
Li, Xiaobo, Yu, Zhenhua, Li, Zhiwu, and Wu, Naiqi
- Subjects
- *
MULTIAGENT systems - Abstract
• A group consensus protocol with pinning scheme is provided for a linear HMAS. • We study the case that the final consistency values are given constants or functions. • The group consensus results are extended to the HMAS with the nonlinear EL dynamics. • A group consensus protocol with pinning scheme is given for an HMAS with unknown parameters. • The multiple communication restrictions are taken into account in this paper. This paper studies group consensus for a class of heterogeneous multi-agent systems (HMASs), where the dynamics of agents are described by single and double integrators. First, under the case that all the agents' control inputs are bounded and the second-order agents' velocity information cannot be obtained, we design controllers with a grouping and pinning scheme by introducing an auxiliary function. With the help of Lyapunov theory, it is proved that an HMAS with some pinning agents can achieve group consensus asymptotically under an undirected connected topology and the final states of all agents can converge to the desired consensus values. Furthermore, we investigate group consensus for an HMAS under multiple communication constraints, where the dynamics of the second-order agents are represented by linear and Euler–Lagrange (EL) nonlinear dynamics. Two control protocols and group consensus criteria are also provided to guarantee that the HMAS with or without uncertain parameters can reach group consensus. Finally, two simulation examples illustrate the obtained results. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
34. Robust deadlock control for automated manufacturing systems based on elementary siphon theory.
- Author
-
Liu, GaiYun, Zhang, LingChun, Chang, Liang, Al-Ahmari, Abdulraham, and Wu, NaiQi
- Subjects
- *
DEADLOCK prevention (Manufacturing) , *PETRI nets , *CONTROLLABILITY in systems engineering , *SIPHONS , *COMPUTER algorithms - Abstract
Resource failures may happen from time to time in an automated manufacturing system (AMS) in production practice, leading to that most of deadlock control methods in the literature are not applicable. For a generalized system of simple sequential process with resources (GS3PR), this paper develops a robust deadlock control strategy when there exists a type of unreliable resources. To do so, after computing the system's elementary and dependent strict minimal siphons (SMSs), by using the concept of max′-controllability of siphons, we then check whether an elementary SMS is self-max′-controlled or not, and whether it contains unreliable resources. Afterwards, a constraint set for a siphon is introduced and a monitor is designed for each non-max′-controlled elementary SMS and self-max′-controlled elementary one that contains unreliable resources. Then, if a dependent SMS is max′-controlled with respect to the control depth variables of its elementary siphons, it needs no monitor; otherwise, we add a monitor for such a dependent SMS. Finally, a robust deadlock control algorithm is developed to keep each SMS to be max′-controlled, even if there exists a type of unreliable resources. The proposed method is demonstrated by using examples. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
35. Optimal Petri net supervisor synthesis for forbidden state problems using marking mask.
- Author
-
Li, Yuting, Yin, Li, Chen, Yufeng, Yu, Zhenhua, and Wu, Naiqi
- Subjects
- *
PETRI nets , *DISCRETE systems , *LINEAR programming , *COMPUTER programming , *PROBLEM solving - Abstract
This article addresses the forbidden state problem in discrete-event systems (DESs) modeled with Petri nets. Given a control specification, we first decide the sets of forbidden and admissible markings. Then, the minimal mask set of first-met forbidden markings (FFMs) and the minimal root set of admissible markings are computed by marking mask that is implemented using a class of special places in a plant, called competitive places. Marking mask can effectively filtrate the markings to be processed such that the two obtained sets are in general much smaller than the sets of originally specified forbidden and admissible markings, respectively. Monitors computed by place invariants are used to forbid the forbidden markings. It is shown that a maximally permissive (optimal) supervisor can be computed if it exists. Integer linear programming is used to optimize the structure of a supervisor. The minimal mask set of FFMs and root set of admissible markings efficiently reduce the computational overhead because of much fewer constraints and variables in the formulated programming problem. The developed methodology is illustrated by parameterized examples. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
36. Deadlock analysis and control using Petri net decomposition techniques.
- Author
-
Zhong, Chunfu, He, Wenlong, Li, Zhiwu, Wu, Naiqi, and Qu, Ting
- Subjects
- *
PETRI nets , *DEADLOCK prevention (Manufacturing) , *FLEXIBLE manufacturing systems , *DECOMPOSITION method , *GRAPHIC methods - Abstract
Abstract Petri nets are an effective tool for modeling and analyzing deadlock problems of flexible manufacturing systems (FMSs). Based on Petri nets, this paper proposes a decomposition method for deadlock control of a class of Petri net modeling FMSs. It first decomposes a Petri net into two (or more) subnets via shared transitions and designs a liveness-enforcing Petri net supervisor for each subnet. Then the root of causing deadlocks is analyzed when merging the controlled subnets. Finally, control places are adjoined to the merged net to obtain a liveness-enforcing Petri net supervisor. The proposed method only needs to calculate the reachability graphs of the subnets, which are in general much smaller than that of the whole original net system. This method in general reduces significantly the computational overhead of designing a liveness-enforcing Petri net supervisor. A subnet can be further decomposed in a hierarchical way, which can further mitigate the computational burden. Typical examples are used to demonstrate the proposed methods. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
37. Deadlock and liveness characterization for a class of generalized Petri nets.
- Author
-
Liu, Miao, Wang, ShouGuang, Zhou, MengChu, Liu, Ding, Al-Ahmari, Abdulrahman, Qu, Ting, Wu, NaiQi, and Li, ZhiWu
- Subjects
- *
PETRI nets , *DEADLOCK prevention (Manufacturing) , *FLEXIBLE manufacturing systems , *SUPERVISORY control systems , *COMPUTATIONAL complexity - Abstract
Petri nets (PNs) are widely adopted for modeling flexible manufacturing systems (FMSs) since they are an effective tool for analyzing the latter’s dynamic behavior and synthesizing a supervisory controller to make a system deadlock-free. As an important subclass of PNs, the weighted system of simple sequential processes with resources (WS 3 PR) can be used to model many FMSs well. Based on the initial marking and structural properties of a WS 3 PR without using marking enumeration and state equations, this paper presents a method to check its liveness. We first define two classes of transitions for a resource subnet of WS 3 PR, based on which, the relationship between markings and strongly connected resource subnets (SCRSs) is analyzed. Next, functions used to check the liveness of a given WS 3 PR are developed, which take the full advantage of SCRS trees and WS 3 PR structure. It is shown that, by the proposed method, the computational complexity for a subclass of WS 3 PR named k -sharing bounded WS 3 PR is polynomial. Sufficient conditions to check liveness of a WS 3 PR are finally established. Two examples are used to illustrate the results. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
38. Deadlock recovery for flexible manufacturing systems modeled with Petri nets.
- Author
-
Chen, YuFeng, Li, ZhiWu, Al-Ahmari, Abdulrahman, Wu, NaiQi, and Qu, Ting
- Subjects
- *
FLEXIBLE manufacturing systems , *PETRI nets , *LINEAR programming , *MATHEMATICAL models , *ITERATIVE methods (Mathematics) - Abstract
This paper deals with deadlock problems in Petri nets by adding a set of recovery transitions. Different from traditional deadlock control methods by deploying control places for a net model to be controlled, this work adds transitions to a net model to recover all deadlock markings. First, we present an iterative approach. At each iteration step, an integer linear programming problem (ILPP) is formulated to design a recovery transition and the objective function is used to maximize the number of deadlock markings recovered by the obtained transition. The process is carried out until all deadlock markings are recovered. As a result, only a small number of recovery transitions are needed to recover all the deadlock markings, i.e., the resulting net model with recovery transitions is live. Second, we develop another ILPP to find all recovery transitions at a time. The constraints of the ILPP ensure that every deadlock marking is recovered by at least one selected recovery transition and the objective function is used to minimize the number of selected recovery transitions. Then, a minimal number of recovery transitions are obtained by solving one ILPP only. Both approaches can make a net model live with all reachable markings. Finally, serval examples are provided to demonstrate the proposed approach. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
39. A novel consensus learning approach to incomplete multi-view clustering.
- Author
-
Liu, Jianlun, Teng, Shaohua, Fei, Lunke, Zhang, Wei, Fang, Xiaozhao, Zhang, Zhuxiu, and Wu, Naiqi
- Subjects
- *
MATRIX decomposition , *MATHEMATICAL optimization , *DATA entry - Abstract
• A framework of jointly exploiting the complementary multi-view information of original data representation and the underlying cross-view relations among data points is proposed. • The proposed method can partition unlabeled data with or without negative entries and handle complete as well as various incomplete multi-view scenarios with missing instances. • An iterative optimization algorithm is proposed for solving the objective function. • Extensive experiments on eight multi-view datasets demonstrate that the proposed method outperforms eight state-of-the-art methods. Multi-view data may lose some instances in real applications. Most existing methods for clustering such incomplete multi-view data still have at least one of the following limitations: 1) The common relations among data points across all views are ignored. 2) The complementary multi-view information of original data representation is not well exploited. 3) Arbitrary incomplete scenarios or data with negative entries cannot be handled. To address these limitations, in this paper, we propose a novel Consensus Learning approach to Incomplete Multi-view Clustering (CLIMC). Specifically, a low-dimensional consensus representation is introduced to exploit complementary multi-view information from the original feature representation of available instances by integrating index matrices into matrix factorization. In addition, by combining self-representation, index matrices, and consensus term, a consensus similarity graph is leveraged to explore the underlying cross-view relations among data points. Further, the key of the proposed CLIMC is that the consensus representation is correlated with the similarity graph by a graph Laplacian regularization. Consequently, the compactness of the low-dimensional representation and the accuracy of similarity degree of the graph are reciprocally promoted. Extensive experiments on several multi-view datasets demonstrate the effectiveness of CLIMC over state-of-the-arts. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.