-
Leveraging LLM Agents for Translating Network Configurations
Authors:
Yunze Wei,
Xiaohui Xie,
Yiwei Zuo,
Tianshuo Hu,
Xinyi Chen,
Kaiwen Chi,
Yong Cui
Abstract:
Configuration translation is a critical and frequent task in network operations. When a network device is damaged or outdated, administrators need to replace it to maintain service continuity. The replacement devices may originate from different vendors, necessitating configuration translation to ensure seamless network operation. However, translating configurations manually is a labor-intensive a…
▽ More
Configuration translation is a critical and frequent task in network operations. When a network device is damaged or outdated, administrators need to replace it to maintain service continuity. The replacement devices may originate from different vendors, necessitating configuration translation to ensure seamless network operation. However, translating configurations manually is a labor-intensive and error-prone process. In this paper, we propose an intent-based framework for translating network configuration with Large Language Model (LLM) Agents. The core of our approach is an Intent-based Retrieval Augmented Generation (IRAG) module that systematically splits a configuration file into fragments, extracts intents, and generates accurate translations. We also design a two-stage verification method to validate the syntax and semantics correctness of the translated configurations. We implement and evaluate the proposed method on real-world network configurations. Experimental results show that our method achieves 97.74% syntax correctness, outperforming state-of-the-art methods in translation accuracy.
△ Less
Submitted 15 January, 2025;
originally announced January 2025.
-
Distributed Computation Offloading for Energy Provision Minimization in WP-MEC Networks with Multiple HAPs
Authors:
Xiaoying Liu,
Anping Chen,
Kechen Zheng,
Kaikai Chi,
Bin Yang,
Tarik Taleb
Abstract:
This paper investigates a wireless powered mobile edge computing (WP-MEC) network with multiple hybrid access points (HAPs) in a dynamic environment, where wireless devices (WDs) harvest energy from radio frequency (RF) signals of HAPs, and then compute their computation data locally (i.e., local computing mode) or offload it to the chosen HAPs (i.e., edge computing mode). In order to pursue a gre…
▽ More
This paper investigates a wireless powered mobile edge computing (WP-MEC) network with multiple hybrid access points (HAPs) in a dynamic environment, where wireless devices (WDs) harvest energy from radio frequency (RF) signals of HAPs, and then compute their computation data locally (i.e., local computing mode) or offload it to the chosen HAPs (i.e., edge computing mode). In order to pursue a green computing design, we formulate an optimization problem that minimizes the long-term energy provision of the WP-MEC network subject to the energy, computing delay and computation data demand constraints. The transmit power of HAPs, the duration of the wireless power transfer (WPT) phase, the offloading decisions of WDs, the time allocation for offloading and the CPU frequency for local computing are jointly optimized adapting to the time-varying generated computation data and wireless channels of WDs. To efficiently address the formulated non-convex mixed integer programming (MIP) problem in a distributed manner, we propose a Two-stage Multi-Agent deep reinforcement learning-based Distributed computation Offloading (TMADO) framework, which consists of a high-level agent and multiple low-level agents. The high-level agent residing in all HAPs optimizes the transmit power of HAPs and the duration of the WPT phase, while each low-level agent residing in each WD optimizes its offloading decision, time allocation for offloading and CPU frequency for local computing. Simulation results show the superiority of the proposed TMADO framework in terms of the energy provision minimization.
△ Less
Submitted 12 December, 2024; v1 submitted 1 November, 2024;
originally announced November 2024.
-
Attention-based SIC Ordering and Power Allocation for Non-orthogonal Multiple Access Networks
Authors:
Liang Huang,
Bincheng Zhu,
Runkai Nan,
Kaikai Chi,
Yuan Wu
Abstract:
Non-orthogonal multiple access (NOMA) emerges as a superior technology for enhancing spectral efficiency compared to orthogonal multiple access. In NOMA networks, successive interference cancellation (SIC) plays a crucial role in decoding user signals sequentially. The challenge lies in the joint optimization of SIC ordering and power allocation, due to the factorial nature of ordering combination…
▽ More
Non-orthogonal multiple access (NOMA) emerges as a superior technology for enhancing spectral efficiency compared to orthogonal multiple access. In NOMA networks, successive interference cancellation (SIC) plays a crucial role in decoding user signals sequentially. The challenge lies in the joint optimization of SIC ordering and power allocation, due to the factorial nature of ordering combinations. This study introduces an innovative solution, the Attention-based SIC Ordering and Power Allocation (ASOPA) framework, targeting an uplink NOMA network with dynamic SIC ordering. ASOPA aims to maximize weighted proportional fairness by employing deep reinforcement learning, strategically decomposing the problem into two manageable subproblems: SIC ordering optimization and optimal power allocation. Our approach utilizes an attention-based neural network, which processes instantaneous channel gains and user weights to determine the SIC decoding sequence for each user. Once the SIC ordering is established, the power allocation subproblem transforms into a convex optimization problem, enabling efficient calculation. Extensive simulations validate ASOPA's efficacy, demonstrating a performance closely paralleling the exhaustive method, with over 97% confidence in normalized network utility. Notably, ASOPA maintains a low execution latency of approximately 50 milliseconds in a ten-user NOMA network, aligning with static SIC ordering algorithms. Furthermore, ASOPA demonstrates superior performance in various NOMA network configurations, including scenarios with imperfect channel state information, multiple base stations, and multiple-antenna setups. Such results underscore ASOPA's robustness and effectiveness, highlighting its ability to excel across various NOMA network environments. The complete source code for ASOPA is accessible at https://github.com/Jil-Menzerna/ASOPA.
△ Less
Submitted 19 July, 2024;
originally announced July 2024.
-
Cross-Modal Spherical Aggregation for Weakly Supervised Remote Sensing Shadow Removal
Authors:
Kaichen Chi,
Wei Jing,
Junjie Li,
Qiang Li,
Qi Wang
Abstract:
Remote sensing shadow removal, which aims to recover contaminated surface information, is tricky since shadows typically display overwhelmingly low illumination intensities. In contrast, the infrared image is robust toward significant light changes, providing visual clues complementary to the visible image. Nevertheless, the existing methods ignore the collaboration between heterogeneous modalitie…
▽ More
Remote sensing shadow removal, which aims to recover contaminated surface information, is tricky since shadows typically display overwhelmingly low illumination intensities. In contrast, the infrared image is robust toward significant light changes, providing visual clues complementary to the visible image. Nevertheless, the existing methods ignore the collaboration between heterogeneous modalities, leading to undesired quality degradation. To fill this gap, we propose a weakly supervised shadow removal network with a spherical feature space, dubbed S2-ShadowNet, to explore the best of both worlds for visible and infrared modalities. Specifically, we employ a modal translation (visible-to-infrared) model to learn the cross-domain mapping, thus generating realistic infrared samples. Then, Swin Transformer is utilized to extract strong representational visible/infrared features. Simultaneously, the extracted features are mapped to the smooth spherical manifold, which alleviates the domain shift through regularization. Well-designed similarity loss and orthogonality loss are embedded into the spherical space, prompting the separation of private visible/infrared features and the alignment of shared visible/infrared features through constraints on both representation content and orientation. Such a manner encourages implicit reciprocity between modalities, thus providing a novel insight into shadow removal. Notably, ground truth is not available in practice, thus S2-ShadowNet is trained by cropping shadow and shadow-free patches from the shadow image itself, avoiding stereotypical and strict pair data acquisition. More importantly, we contribute a large-scale weakly supervised shadow removal benchmark, including 4000 shadow images with corresponding shadow masks.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Minimizing End-to-End Latency for Joint Source-Channel Coding Systems
Authors:
Kaiyi Chi,
Qianqian Yang,
Yuanchao Shu,
Zhaohui Yang,
Zhiguo Shi
Abstract:
While existing studies have highlighted the advantages of deep learning (DL)-based joint source-channel coding (JSCC) schemes in enhancing transmission efficiency, they often overlook the crucial aspect of resource management during the deployment phase. In this paper, we propose an approach to minimize the transmission latency in an uplink JSCC-based system. We first analyze the correlation betwe…
▽ More
While existing studies have highlighted the advantages of deep learning (DL)-based joint source-channel coding (JSCC) schemes in enhancing transmission efficiency, they often overlook the crucial aspect of resource management during the deployment phase. In this paper, we propose an approach to minimize the transmission latency in an uplink JSCC-based system. We first analyze the correlation between end-to-end latency and task performance, based on which the end-to-end delay model for each device is established. Then, we formulate a non-convex optimization problem aiming at minimizing the maximum end-to-end latency across all devices, which is proved to be NP-hard. We then transform the original problem into a more tractable one, from which we derive the closed form solution on the optimal compression ratio, truncation threshold selection policy, and resource allocation strategy. We further introduce a heuristic algorithm with low complexity, leveraging insights from the structure of the optimal solution. Simulation results demonstrate that both the proposed optimal algorithm and the heuristic algorithm significantly reduce end-to-end latency. Notably, the proposed heuristic algorithm achieves nearly the same performance to the optimal solution but with considerably lower computational complexity.
△ Less
Submitted 29 March, 2024;
originally announced March 2024.
-
RobWE: Robust Watermark Embedding for Personalized Federated Learning Model Ownership Protection
Authors:
Yang Xu,
Yunlin Tan,
Cheng Zhang,
Kai Chi,
Peng Sun,
Wenyuan Yang,
Ju Ren,
Hongbo Jiang,
Yaoxue Zhang
Abstract:
Embedding watermarks into models has been widely used to protect model ownership in federated learning (FL). However, existing methods are inadequate for protecting the ownership of personalized models acquired by clients in personalized FL (PFL). This is due to the aggregation of the global model in PFL, resulting in conflicts over clients' private watermarks. Moreover, malicious clients may tamp…
▽ More
Embedding watermarks into models has been widely used to protect model ownership in federated learning (FL). However, existing methods are inadequate for protecting the ownership of personalized models acquired by clients in personalized FL (PFL). This is due to the aggregation of the global model in PFL, resulting in conflicts over clients' private watermarks. Moreover, malicious clients may tamper with embedded watermarks to facilitate model leakage and evade accountability. This paper presents a robust watermark embedding scheme, named RobWE, to protect the ownership of personalized models in PFL. We first decouple the watermark embedding of personalized models into two parts: head layer embedding and representation layer embedding. The head layer belongs to clients' private part without participating in model aggregation, while the representation layer is the shared part for aggregation. For representation layer embedding, we employ a watermark slice embedding operation, which avoids watermark embedding conflicts. Furthermore, we design a malicious watermark detection scheme enabling the server to verify the correctness of watermarks before aggregating local models. We conduct an exhaustive experimental evaluation of RobWE. The results demonstrate that RobWE significantly outperforms the state-of-the-art watermark embedding schemes in FL in terms of fidelity, reliability, and robustness.
△ Less
Submitted 29 February, 2024;
originally announced February 2024.
-
Research on Older Adults' Interaction with E-Health Interface Based on Explainable Artificial Intelligence
Authors:
Xueting Huang,
Zhibo Zhang,
Fusen Guo,
Xianghao Wang,
Kun Chi,
Kexin Wu
Abstract:
This paper proposed a comprehensive mixed-methods framework with varied samples of older adults, including user experience, usability assessments, and in-depth interviews with the integration of Explainable Artificial Intelligence (XAI) methods. The experience of older adults' interaction with the Ehealth interface is collected through interviews and transformed into operatable databases whereas X…
▽ More
This paper proposed a comprehensive mixed-methods framework with varied samples of older adults, including user experience, usability assessments, and in-depth interviews with the integration of Explainable Artificial Intelligence (XAI) methods. The experience of older adults' interaction with the Ehealth interface is collected through interviews and transformed into operatable databases whereas XAI methods are utilized to explain the collected interview results in this research work. The results show that XAI-infused e-health interfaces could play an important role in bridging the age-related digital divide by investigating elders' preferences when interacting with E-health interfaces. Furthermore, the study identifies important design factors, such as intuitive visualization and straightforward explanations, that are critical for creating efficient Human Computer Interaction (HCI) tools among older users. Furthermore, this study emphasizes the revolutionary potential of XAI in e-health interfaces for older users, emphasizing the importance of transparency and understandability in HCI-driven healthcare solutions. This study's findings have far-reaching implications for the design and development of user-centric e-health technologies, intending to increase the overall well-being of older adults.
△ Less
Submitted 1 February, 2024;
originally announced February 2024.
-
Semantic-aware Transmission for Robust Point Cloud Classification
Authors:
Tianxiao Han,
Kaiyi Chi,
Qianqian Yang,
Zhiguo Shi
Abstract:
As three-dimensional (3D) data acquisition devices become increasingly prevalent, the demand for 3D point cloud transmission is growing. In this study, we introduce a semantic-aware communication system for robust point cloud classification that capitalizes on the advantages of pre-trained Point-BERT models. Our proposed method comprises four main components: the semantic encoder, channel encoder,…
▽ More
As three-dimensional (3D) data acquisition devices become increasingly prevalent, the demand for 3D point cloud transmission is growing. In this study, we introduce a semantic-aware communication system for robust point cloud classification that capitalizes on the advantages of pre-trained Point-BERT models. Our proposed method comprises four main components: the semantic encoder, channel encoder, channel decoder, and semantic decoder. By employing a two-stage training strategy, our system facilitates efficient and adaptable learning tailored to the specific classification tasks. The results show that the proposed system achieves classification accuracy of over 89\% when SNR is higher than 10 dB and still maintains accuracy above 66.6\% even at SNR of 4 dB. Compared to the existing method, our approach performs at 0.8\% to 48\% better across different SNR values, demonstrating robustness to channel noise. Our system also achieves a balance between accuracy and speed, being computationally efficient while maintaining high classification performance under noisy channel conditions. This adaptable and resilient approach holds considerable promise for a wide array of 3D scene understanding applications, effectively addressing the challenges posed by channel noise.
△ Less
Submitted 23 June, 2023;
originally announced June 2023.
-
MIMO Precoding Design with QoS and Per-Antenna Power Constraints
Authors:
Kaiyi Chi,
Yingzhi Huang,
Qianqian Yang,
Zhaohui Yang,
Zhaoyang Zhang
Abstract:
Precoding design for the downlink of multiuser multiple-input multiple-output (MU-MIMO) systems is a fundamental problem. In this paper, we aim to maximize the weighted sum rate (WSR) while considering both quality-of-service (QoS) constraints of each user and per-antenna power constraints (PAPCs) in the downlink MU-MIMO system. To solve the problem, we reformulate the original problem to an equiv…
▽ More
Precoding design for the downlink of multiuser multiple-input multiple-output (MU-MIMO) systems is a fundamental problem. In this paper, we aim to maximize the weighted sum rate (WSR) while considering both quality-of-service (QoS) constraints of each user and per-antenna power constraints (PAPCs) in the downlink MU-MIMO system. To solve the problem, we reformulate the original problem to an equivalent problem by using the well-known weighted minimal mean square error (WMMSE) framework, which can be tackled by iteratively solving three subproblems. Since the precoding matrices are coupled among the QoS constraints and PAPCs, we adopt alternating direction method of multipliers (ADMM) to obtain a distributed solution. Simulation results validate the effectiveness of the proposed algorithm.
△ Less
Submitted 4 June, 2023;
originally announced June 2023.
-
Resource Allocation for Capacity Optimization in Joint Source-Channel Coding Systems
Authors:
Kaiyi Chi,
Qianqian Yang,
Zhaohui Yang,
Yiping Duan,
Zhaoyang Zhang
Abstract:
Benefited from the advances of deep learning (DL) techniques, deep joint source-channel coding (JSCC) has shown its great potential to improve the performance of wireless transmission. However, most of the existing works focus on the DL-based transceiver design of the JSCC model, while ignoring the resource allocation problem in wireless systems. In this paper, we consider a downlink resource allo…
▽ More
Benefited from the advances of deep learning (DL) techniques, deep joint source-channel coding (JSCC) has shown its great potential to improve the performance of wireless transmission. However, most of the existing works focus on the DL-based transceiver design of the JSCC model, while ignoring the resource allocation problem in wireless systems. In this paper, we consider a downlink resource allocation problem, where a base station (BS) jointly optimizes the compression ratio (CR) and power allocation as well as resource block (RB) assignment of each user according to the latency and performance constraints to maximize the number of users that successfully receive their requested content with desired quality. To solve this problem, we first decompose it into two subproblems without loss of optimality. The first subproblem is to minimize the required transmission power for each user under given RB allocation. We derive the closed-form expression of the optimal transmit power by searching the maximum feasible compression ratio. The second one aims at maximizing the number of supported users through optimal user-RB pairing, which we solve by utilizing bisection search as well as Karmarka' s algorithm. Simulation results validate the effectiveness of the proposed resource allocation method in terms of the number of satisfied users with given resources.
△ Less
Submitted 21 November, 2022;
originally announced November 2022.
-
Current-driven magnetization dynamics and their correlation with magnetization configurations in perpendicularly magnetized tunnel junctions
Authors:
Kaiyuan Zhou,
Lina Chen,
Kequn Chi,
Qingwei Fu,
Zui Tao,
Like Liang,
Zhenyu Gao,
Haotian Li,
Hao Meng,
Bo Liu,
Tiejun Zhou,
R. H. Liu
Abstract:
We study spin-transfer-torque driven magnetization dynamics of a perpendicular magnetic tunnel junction (MTJ) nanopillar. Based on the combination of spin-torque ferromagnetic resonance and microwave spectroscopy techniques, we demonstrate that the free layer (FL) and the weak pinned reference layer (RL) exhibit distinct dynamic behaviors with opposite frequency vs. field dispersion relations. The…
▽ More
We study spin-transfer-torque driven magnetization dynamics of a perpendicular magnetic tunnel junction (MTJ) nanopillar. Based on the combination of spin-torque ferromagnetic resonance and microwave spectroscopy techniques, we demonstrate that the free layer (FL) and the weak pinned reference layer (RL) exhibit distinct dynamic behaviors with opposite frequency vs. field dispersion relations. The FL can support a single coherent spin-wave (SW) mode for both parallel and antiparallel configurations, while the RL exhibits spin-wave excitation only for the antiparallel state. These two SW modes corresponding to the FL and RL coexist at an antiparallel state and exhibit a crossover phenomenon of oscillation frequency with increasing the external magnetic field, which could be helpful in the mutual synchronization of auto-oscillations for SW-based neuromorphic computing.
△ Less
Submitted 6 September, 2022;
originally announced September 2022.
-
A note on function algebras on disks
Authors:
Kieu Phuong Chi,
Mai The Tan
Abstract:
Let $D$ be a closed disk in the complex plane centered at the origin, $f, g$ complex valued continuous function on $D$. Let $P[f,g; D]$ (res. $R[f, g; D])$) be the uniform closure on $D$ of polynomials (res. rational functions) in variables $f$ and $g$. In \cite{OS}, using complex dynamical systems, O'Farrell and Sanabria-Garcia proved that…
▽ More
Let $D$ be a closed disk in the complex plane centered at the origin, $f, g$ complex valued continuous function on $D$. Let $P[f,g; D]$ (res. $R[f, g; D])$) be the uniform closure on $D$ of polynomials (res. rational functions) in variables $f$ and $g$. In \cite{OS}, using complex dynamical systems, O'Farrell and Sanabria-Garcia proved that $\{\Big(z^2, \cfrac{\overline z}{1+\overline{z}}\Big): z\in D\}$ is not polynomially convex with $D$ small enough and so that $P[z^2,\cfrac{\overline z}{1+\overline z}; D]\ne C(D)$ if $D$ is sufficient small. In this paper, we first give a certain conditions for rational convexity of union of two compact set of $\Bbb C^n$ and apply to show that $R[z^2, \cfrac{\overline z}{1+\overline z}; D]= C(D)$ for all $D$ small enough
△ Less
Submitted 6 October, 2020;
originally announced October 2020.
-
Underwater Image Enhancement Based on Structure-Texture Reconstruction
Authors:
Sen Lin,
Kaichen Chi
Abstract:
Aiming at the problems of color distortion, blur and excessive noise of underwater image, an underwater image enhancement algorithm based on structure-texture reconstruction is proposed. Firstly, the color equalization of the degraded image is realized by the automatic color enhancement algorithm; Secondly, the relative total variation is introduced to decompose the image into the structure layer…
▽ More
Aiming at the problems of color distortion, blur and excessive noise of underwater image, an underwater image enhancement algorithm based on structure-texture reconstruction is proposed. Firstly, the color equalization of the degraded image is realized by the automatic color enhancement algorithm; Secondly, the relative total variation is introduced to decompose the image into the structure layer and texture layer; Then, the best background light point is selected based on brightness, gradient discrimination, and hue judgment, the transmittance of the backscatter component is obtained by the red dark channel prior, which is substituted into the imaging model to remove the fogging phenomenon in the structure layer. Enhancement of effective details in the texture layer by multi scale detail enhancement algorithm and binary mask; Finally, the structure layer and texture layer are reconstructed to get the final image. The experimental results show that the algorithm can effectively balance the hue, saturation, and clarity of underwater image, and has good performance in different underwater environments.
△ Less
Submitted 11 April, 2020;
originally announced April 2020.
-
Pair production from Reissner-Nordström-anti-de Sitter black holes
Authors:
Jun Zhang,
Yi-Yu Lin,
Hao-Chun Liang,
Ke-Jia Chi,
Chiang-Mei Chen,
Sang Pyo Kim,
Jia-Rui Sun
Abstract:
We study the pair production of charged scalar particles from the five-dimensional near extremal Reissner- Nordström-Anti de Sitter (RN-AdS5) black hole. The pair production rate and the absorption cross section ratio in the full spacetime are obtained and are shown to have proportional relation with their counterparts in the near horizon region. In addition, the holographic descriptions of the pa…
▽ More
We study the pair production of charged scalar particles from the five-dimensional near extremal Reissner- Nordström-Anti de Sitter (RN-AdS5) black hole. The pair production rate and the absorption cross section ratio in the full spacetime are obtained and are shown to have proportional relation with their counterparts in the near horizon region. In addition, the holographic descriptions of the pair production both in the IR CFT in the near horizon region and the UV CFT at the asymptotic spatial boundary of the RN-AdS5 black hole are analyzed in the AdS2/CFT1and AdS5/CFT4correspondences, respectively. This work gives a complete description of scalar pair production in the near extremal RN-AdS5black hole.
△ Less
Submitted 13 March, 2020;
originally announced March 2020.
-
Optimal Resource Allocation with Node and Link Capacity Constraints in Complex Networks
Authors:
Li Rui,
Xia Yongxiang,
Tse K Chi
Abstract:
With the tremendous increase of the Internet traffic, achieving the best performance with limited resources is becoming an extremely urgent problem. In order to address this concern, in this paper, we build an optimization problem which aims to maximize the total utility of traffic flows with the capacity constraint of nodes and links in the network. Based on Duality Theory, we propose an iterativ…
▽ More
With the tremendous increase of the Internet traffic, achieving the best performance with limited resources is becoming an extremely urgent problem. In order to address this concern, in this paper, we build an optimization problem which aims to maximize the total utility of traffic flows with the capacity constraint of nodes and links in the network. Based on Duality Theory, we propose an iterative algorithm which adjusts the rates of traffic flows and capacity of nodes and links simultaneously to maximize the total utility. Simulation results show that our algorithm performs better than the NUP algorithm on BA and ER network models, which has shown to get the best performance so far. Since our research combines the topology information with capacity constraint, it may give some insights for resource allocation in real communication networks.
△ Less
Submitted 21 February, 2017;
originally announced February 2017.
-
RF-Based Charger Placement for Duty Cycle Guarantee in Battery-Free Sensor Networks
Authors:
Yanjun Li,
Lingkun Fu,
Min Chen,
Kaikai Chi,
Yi-hua Zhu
Abstract:
Battery-free sensor networks have emerged as a promising solution to conquer the lifetime limitation of battery-powered systems. In this paper, we study a sensor network built from battery-free sensor nodes which harvest energy from radio frequency (RF) signals transmitted by RF-based chargers, e.g., radio frequency identification (RFID) readers. Due to the insufficiency of harvested energy, the s…
▽ More
Battery-free sensor networks have emerged as a promising solution to conquer the lifetime limitation of battery-powered systems. In this paper, we study a sensor network built from battery-free sensor nodes which harvest energy from radio frequency (RF) signals transmitted by RF-based chargers, e.g., radio frequency identification (RFID) readers. Due to the insufficiency of harvested energy, the sensor nodes have to work in duty cycles to harvest enough energy before turning active and performing tasks. One fundamental issue in this kind of network design is how to deploy the chargers to ensure that the battery-free nodes can maintain a designated duty cycle for continuous operation. Based on a new wireless recharge model, we formulate the charger placement problem for node's duty cycle guarantee as a constrained optimization problem. We develop both greedy and efficient heuristics for solving the problem and validate our solutions through extensive simulations. The simulation results show that the proposed particle swarm optimization (PSO)-based divide-and-conquer approach can effectively reduce the number of chargers compared with the greedy approach.
△ Less
Submitted 10 August, 2015;
originally announced August 2015.