Withthe emergence of increasingly complex modern energy networks, there is a need for flexible and reliable methods to solve economic dispatch problems in smart grids. For this purpose, a broadcast gossip algorithm i...
详细信息
In high security locations, anomaly detection in surveillance systems is essential for maintaining public safety. this work proposes an object detection approach utilizing model renowned for its real-time performance ...
详细信息
the purpose of this research is to generate findings to support the reduction of computer supply chain greenhouse gas emissions. this is achieved by answering the question, 'can greenhouse gas abatement be deliver...
详细信息
the purpose of this research is to generate findings to support the reduction of computer supply chain greenhouse gas emissions. this is achieved by answering the question, 'can greenhouse gas abatement be delivered by alternative computer operating system displacement strategies?' We hypothesised that extending the useful lifespan of end user computing devices to 8 years by repurposing a device with a new operating system can reduce scope 3 supply chain emissions, which account for 73% of an end user computing device's carbon footprint. To test the hypothesis, we measure the carbon footprint reduction delivered by repurposing 3,150 obsolete desktop computers, which were installed with a Linux based operating system to become thin clients and support a remote working solution for a major financial institution during the recent Covid-19 pandemic. We calculate scope 3 supply chain emissions avoided by not purchasing new thin client solutions. Legacy device power consumption is also measured and extrapolated to represent the one-year period of use and compared withthat of new devices to calculate the excess scope 2 emissions of the former. We find that while new devices reduce scope 2 emissions, this gain is outweighed by the reductions in scope 3 emissions from not replacing the legacy devices. Furthermore, we find that the new Linux based operating system reduces energy consumption by 22% compared with Microsoft Windows. We also calculate the financial gains from the repurposing strategy to test the perception that sustainable information technology adoption is costly. Finally, the impact of remote working on commuting emissions is estimated. In conclusion, the findings show that repurposing end user computing devices contributes meaningfully to sustainability strategies from both an environmental and financial perspective.
the proceedings contain 56 papers. the topics discussed include: positioning interference mitigation method based on LSTM network and robust cubature Kalman estimation;a formal analysis of emergency communication syst...
ISBN:
(纸本)9798350331714
the proceedings contain 56 papers. the topics discussed include: positioning interference mitigation method based on LSTM network and robust cubature Kalman estimation;a formal analysis of emergency communication system based on model checking;a highly trustworthy fusion localization method based on evidence theory;improvement on knowledge-grounded dialogue generation with continuous prompt tuning;map-less end-to-end navigation of mobile robots via deep reinforcement learning;research on emergency management information business and information system framework;lightweight and data-imbalance-aware defect detection approach based on federated learning in industrial edge networks;a non-contact human-computer interaction method based on gaze;and dynamic traffic limiting algorithm based on token bucket for distributed digital trunk.
the paper introduces a method to assess the robustness of deep neural networks against adversarial attacks. It employs a geometric-based separation metric called the Separation Index, which measures the distance betwe...
详细信息
the proceedings contain 88 papers. the topics discussed include: doing responsibilities with automated grading systems: an empirical multi-stakeholder exploration;promoting criticality with design futuring with young ...
ISBN:
(纸本)9798400709661
the proceedings contain 88 papers. the topics discussed include: doing responsibilities with automated grading systems: an empirical multi-stakeholder exploration;promoting criticality with design futuring with young children;tangible interactions for pain assessment in palliative care;informed by yarns – proposing knitting patterns for revealing digital system activities;how to respect bystanders’ privacy in smart homes – a co-creation study;caring for a companion as a form of self-care. exploring the design space for irritating companion technologies for mental health;say you, say me: investigating the personal insights generated from one’s own data and other’s data;user-centric design of social robots in city libraries: exploration of the interplay of social roles and user expectations;and what we took from metaphors: a case of designing for care after abortion.
Code reuse is a pivotal practice in software development, promoting efficiency, reducing redundancy, and ensuring higher quality software products. Recommender systems play a crucial role in this process by suggesting...
详细信息
the proceedings contain 101 papers. the special focus in this conference is on computer Engineering and networks. the topics include: Two Stream Multi-Attention Graph Convolutional Network for Skeleton-Based Acti...
ISBN:
(纸本)9789819992461
the proceedings contain 101 papers. the special focus in this conference is on computer Engineering and networks. the topics include: Two Stream Multi-Attention Graph Convolutional Network for Skeleton-Based Action Recognition;aesthetic Multi-attributes Captioning Network for Photos;improving Road Extraction in Hyperspectral Data with Deep Learning Models;human Related Information Extraction from Chinese Archive Images;multi-virtual View Scoring Network for 3D Hand Pose Estimation from a Single Depth Image;digital Archive Stamp Detection and Extraction;Underwater Image Enhancement Using Improved Shallow-UWnet;single Image Reflection Removal Using DeepLabv3+;Improved GR-Convnet for Antipodal Robotic Grasping;enhanced Object Detection of Abnormal Light Based on Multi-scale Retinex with Chromacity Preservation;an Indirect State-of-Health Estimation Method for Lithium-Ion Battery Based on Correlation Analysis and Long Short-Term Memory Network;a Quantum Behaved Particle Swarm Optimization with a Chaotic Operator;a Novel Small Object Detection Method Based on Improved Transformer Model;A Novel Full-Scale Skip Connections Approach Based on U-Net for COVID-19 Lesion Segmentation in CT Images;Personnel Intrusion Detection in Railway Perimeter with Improved YOLOv7;research on Watermark Embedding of Fax Channel Images Based on U-Net Network;an Enhanced Downsampling Transformer Network for Point Cloud Semantic Segmentation;Improved DGCNN Based on Transformer for Point Cloud Segmentation;symmetry Analysis of Face from a Video Image of 3D Point Cloud;a Contrastive Learning-Based Interpretable Prediction Model for Patients with Heart Failure;CS-Net: A Stain Style Transfer Network for Histology Images with CS-Gate Attention;a Dictionary-Based Concept Extraction Method for Chinese Course Knowledge;image Recoloring for Color Blindness Considering Naturalness and Harmony;Improving PSO-SVM for Fatigue Recognition.
Timely identification of abnormal ships through trajectories make daily commercial trade transportation safer. However, current methods for identifying abnormal ships through vessel trajectories have issues such as hi...
详细信息
the proceedings contain 101 papers. the special focus in this conference is on computer Engineering and networks. the topics include: Two Stream Multi-Attention Graph Convolutional Network for Skeleton-Based Acti...
ISBN:
(纸本)9789819992423
the proceedings contain 101 papers. the special focus in this conference is on computer Engineering and networks. the topics include: Two Stream Multi-Attention Graph Convolutional Network for Skeleton-Based Action Recognition;aesthetic Multi-attributes Captioning Network for Photos;improving Road Extraction in Hyperspectral Data with Deep Learning Models;human Related Information Extraction from Chinese Archive Images;multi-virtual View Scoring Network for 3D Hand Pose Estimation from a Single Depth Image;digital Archive Stamp Detection and Extraction;Underwater Image Enhancement Using Improved Shallow-UWnet;single Image Reflection Removal Using DeepLabv3+;Improved GR-Convnet for Antipodal Robotic Grasping;enhanced Object Detection of Abnormal Light Based on Multi-scale Retinex with Chromacity Preservation;an Indirect State-of-Health Estimation Method for Lithium-Ion Battery Based on Correlation Analysis and Long Short-Term Memory Network;a Quantum Behaved Particle Swarm Optimization with a Chaotic Operator;a Novel Small Object Detection Method Based on Improved Transformer Model;A Novel Full-Scale Skip Connections Approach Based on U-Net for COVID-19 Lesion Segmentation in CT Images;Personnel Intrusion Detection in Railway Perimeter with Improved YOLOv7;research on Watermark Embedding of Fax Channel Images Based on U-Net Network;an Enhanced Downsampling Transformer Network for Point Cloud Semantic Segmentation;Improved DGCNN Based on Transformer for Point Cloud Segmentation;symmetry Analysis of Face from a Video Image of 3D Point Cloud;a Contrastive Learning-Based Interpretable Prediction Model for Patients with Heart Failure;CS-Net: A Stain Style Transfer Network for Histology Images with CS-Gate Attention;a Dictionary-Based Concept Extraction Method for Chinese Course Knowledge;image Recoloring for Color Blindness Considering Naturalness and Harmony;Improving PSO-SVM for Fatigue Recognition.
暂无评论