The key technology issues for fabrication of highperformance self-aligned top gate amorphous metal oxide thinfilm transistors are addressed. These issues include the sputtering deposition of active layer of metal oxi...
详细信息
Deep Learning is currently the state-of-the-art technique for various computer Vision tasks, including object counting. Despite of its highperformance, Deep Learning requires a gigantic amount of training data to sho...
详细信息
Landing gear brakes – multi-disc brakes, as the responsible mechanism of the aircraft, must have the lowest possible weight and dimensions, highperformance, increased service life and reduced life cycle cost. Solvin...
Landing gear brakes – multi-disc brakes, as the responsible mechanism of the aircraft, must have the lowest possible weight and dimensions, highperformance, increased service life and reduced life cycle cost. Solving these problems will reduce the design and development cycle of multi-disc chassis brakes. To perform the calculations, a computer mathematical model based on the use of the finite element method is proposed, replacing the classical version of the calculation based on currently used mathematical models, taking into account the heating of the aircraft landing gear braking mechanism, which will increase the speed, accuracy of calculations and reduce their labor intensity. We have developed a computer mathematical model of heat transfer processes occurring in the friction elements of multi-disc landing gear braking systems at the second stage of landing using the COMSOL Multiphysics program. Based on the calculations performed using this model, it is possible to take into account the influence of various system parameters such as the number of friction disks, their diameter and thickness, the medium in the interstitial space, the size of the solver grid on the maximum heating temperature of the brake mechanism, the cooling rate, the calculation time and the calculation error. On the basis of the obtained experimental data, we can conclude about the preferable construction of the brake mechanism. For example, it is possible to produce friction plates, steel with application to the surface of the composite friction material, allowing it to maintain the necessary friction and thus reduce the dimensions and maximum temperature, wet-disc brakes. The results of this work can be applied not only in the aviation industry, but can also be used to calculate the mechanisms of multi-disc oil-loaded brakes, which are used in agricultural, forestry, construction, quarry and other special equipment. In future work, the developed model will allow carrying out calculations
In this paper present, our ongoing work on applying Convolution Neural Network for brain tumor segmentation. CNNs have achieved state-of-the-art performance for automatic medical image segmentation. However, they have...
详细信息
In recent years, the development of the computer-aided diagnosis (CAD) systems to support radiologist is attracting attention in medical research field. One of them is temporal subtraction technique. It is a technique...
详细信息
ISBN:
(纸本)9788993215151
In recent years, the development of the computer-aided diagnosis (CAD) systems to support radiologist is attracting attention in medical research field. One of them is temporal subtraction technique. It is a technique to generate images emphasizing temporal changes in lesions by performing a differential operation between current and previous image of the same subject. In this paper, we propose an image registration method for image registration of current and previous image, to generate temporal subtraction images from CT images and enhanced bone metastasis region. The proposed registration method is composed into three main steps: i) automatic segmentation of the region of interest (ROI) using position information of the spine based on biology, ii) use global image matching to select pairs from previous and current image, and iii) final image matching based on salient region feature. We perform registration technique on synthetic data and confirm usefulness of the proposed method. Furthermore, radiologist conduct comparative experiments without and with temporal subtraction images created by proposed method. As a result, they show high reading performance by using temporal subtraction images.
This paper proposes DORA - a dynamic frequency controller that maximizes the energy efficiency of smartphones subject to user satisfaction demands in the presence of memory interference stemmed from background process...
详细信息
ISBN:
(纸本)9781538650103
This paper proposes DORA - a dynamic frequency controller that maximizes the energy efficiency of smartphones subject to user satisfaction demands in the presence of memory interference stemmed from background processes and co-scheduled applications. The proposed algorithm predicts the optimal energy-efficient frequency setting at runtime using statically-trained performance, dynamic power, and leakage power models. The parameters of the models represent web page characteristics and dynamically varying architecture and system conditions. The algorithm is designed, implemented and extensively evaluated on a Google Nexus 5 smartphone using a variety of mobile web browsing workloads. The results show high prediction accuracies for the performance and power models of 97.5% and 96%, respectively. Overall, DORA improves the smartphone's energy efficiency by an average of 16% compared to the default Android frequency governor, interactive, while maintaining the desired levels of user satisfaction (web page load time).
In this paper, we developed a hand gesture recognition technology in a human-computer interaction system with several hand gestures. The proposed system can help teacher to control the multi-screen touchable teaching ...
详细信息
ISBN:
(纸本)9781450364607
In this paper, we developed a hand gesture recognition technology in a human-computer interaction system with several hand gestures. The proposed system can help teacher to control the multi-screen touchable teaching tools, such as sweeping right or left to access the previous or next slide, with a fist to call the eraser tool to rub out the wrong content. To verify its efficiency and other qualities, we conducted a quasi-experiment in our program site in east part of China which analyzed the pre- and post-test scores in Math class of each experimental groups. Moreover, the error recognition rate is reduced by increasing the relevant features and threshold training for the teaching application. Experimental results demonstrate that the proposed system achieves the high accuracy and real-time performance.
With more and more sensitive and private data transferred on the Internet, various security protocols have been developed to secure end-to-end communication. However, in practical situations, applying these protocols ...
详细信息
ISBN:
(纸本)9783319895000;9783319894997
With more and more sensitive and private data transferred on the Internet, various security protocols have been developed to secure end-to-end communication. However, in practical situations, applying these protocols would decline the overall performance of the whole system, of which frequently-used symmetric cryptographic operations on the server side is the bottleneck. In this contribution, we present a high-performance symmetric cryptography server. Firstly, a symmetric algorithm SM4 is carefully scheduled in GPUs, including instruction-level implementation and variable location improvement. Secondly, optimization methods is provided to speed up the inefficient data transfer between CPU and GPU. Finally, the overall server architecture is adopted for mass data encryption, which can deliver 15.96 Gbps data encryption through network, 1.23 times of the existing fastest symmetric cryptographic server. Furthermore, the server can be boosted by 2.02 times with the high-speed pre-calculation technique for long-term-key applications such as IPSec VPN gateways.
While the popularity of high-resolution, computer-vision applications (e.g. mixed reality, autonomous vehicles) is increasing, there have been complementary advances in time-of-flight depth sensor resolution and quali...
详细信息
ISBN:
(纸本)9781728102474
While the popularity of high-resolution, computer-vision applications (e.g. mixed reality, autonomous vehicles) is increasing, there have been complementary advances in time-of-flight depth sensor resolution and quality. These advances in time-of-flight sensors provide a platform for new research into realtime, depth-upsampling algorithms targeted at high-resolution video systems with low-latency requirements. This paper describes a case study in which a previously developed bilateral-filter-style upsampling algorithm is profiled, parallelized, and accelerated on an FPGA using high-level synthesis tools from Xilinx We show that our accelerated algorithm can effectively upsample the resolution and reduce the noise of time-of-flight sensors. We also demonstrate that this algorithm exceeds the real-time requirements of 90 frames per second necessitated by mixed-reality hardware, achieving a lower-bound speedup of 40 times over the fastest CPU-only version.
Summary form only given, as follows. The complete presentation was not made available for publication as part of the conference proceedings. Recent work has shown that architectural isolation can be violated through s...
详细信息
ISBN:
(纸本)9781538683866
Summary form only given, as follows. The complete presentation was not made available for publication as part of the conference proceedings. Recent work has shown that architectural isolation can be violated through software side channel attacks that exploit microarchitectural performance optimizations such as speculation to leak secrets. While turning off microarchitectural optimizations can preclude some classes of attacks, we argue that performance and security do not have be in conflict, provided processors are designed with security in mind. We espouse a principled approach to eliminating entire attack surfaces through microarchitectural isolation, rather than plugging attack-specific privacy leaks. We argue that minimal modifications to hardware can defend against all currently-practical side channel attacks and without significant performance impact. As an application of this approach, we describe the Sanctum processor architecture that offers strong provable isolation of software modules running concurrently and sharing resources, and Sanctoom, a speculative, out-of-order variant with similar properties. These processors provide isolation even when large parts of the operating system are compromised, and their open-source implementations allow security properties to be independently verified.
暂无评论