the proceedings contain 54 papers. the special focus in this conference is on Future Data and Security Engineering. the topics include: computing History-Dependent Schedules for Processes with Temporal Constraints;fin...
ISBN:
(纸本)9783030356521
the proceedings contain 54 papers. the special focus in this conference is on Future Data and Security Engineering. the topics include: computing History-Dependent Schedules for Processes with Temporal Constraints;finding All Minimal Maximum Subsequences in Parallel;OCL2PSQL: An OCL-to-SQL Code-Generator for Model-Driven Engineering;framework for Peer-to-Peer Data Sharing over Web Browsers;efficiently Semantic-Aware Pairwise Similarity: an Applicable Use-Case;lower Bound on Network Diameter for Distributed Function Computation;a Combined Enhancing and Feature Extraction Algorithm to Improve Learning Accuracy for Gene Expression Classification;age and Gender Estimation of Asian Faces Using Deep Residual Network;Light-Weight Deep Convolutional Network-Based Approach for Recognizing Emotion on FPGA Platform;a New Test Suite Reduction Approach Based on Hypergraph Minimal Transversal Mining;metagenome-Based Disease Classification with Deep Learning and Visualizations Based on Self-organizing Maps;On Analyzing the Trade-Off Between Over-Commitment Ratio and Quality of Service in NFV Datacenter;dynamic Data Management Strategy on Cloud Network by Fog computing Model;openness in Fog computing for the Internet of things;A Top-Down Scheduling for Time Efficient Data Aggregation in WSNs;a New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes;a Visual Model for Privacy Awareness and Understanding in Online Social Networks;A Method to Enhance the Security Capability of Python IDE;studying Machine Learning Techniques for Intrusion Detection systems;enforcing Access Controls in IoT Networks;machine Learning Based Monitoring of the Pneumatic Actuators’ Behavior through Signal Processing Using Real-World Data Set;adventures in the Analysis of Access Control Policies.
the proceedings contain 125 papers. the topics discussed include: research on the influence on briquette characteristics by blended coal preparation;coordinated allocation method of opportunity constraints for thermal...
the proceedings contain 125 papers. the topics discussed include: research on the influence on briquette characteristics by blended coal preparation;coordinated allocation method of opportunity constraints for thermal power units considering source load uncertainty;research on emergency method of power cyber-physics risk area;research on failure rate of self-service payment terminal of power supply company based on cloud computing;research on safety evaluation technology of portal cranes based on analytic hierarchy process (AHP) theory;a probe into the accuracy of thermal runaway simulation model of lithium-ion battery under adiabatic condition;an empirical analysis of the impact of government subsidies on the innovation of new energy automobile companies before and after the subsidy policy declines;a wind speed prediction method based on improved empirical mode decomposition and support vector machine;and research on distribution network investment allocation method considering actual demand and investment benefit.
Patent data from various countries in the world implies the essence of scientific discovery and technological innovation of all human beings, but language differences have become a huge obstacle to patent data retriev...
详细信息
the transition from IPv4 to IPv6 marks a significant evolution in internet protocol technology, bringing forth both opportunities and challenges. this paper conducts a thorough survey of various detection techniques a...
the transition from IPv4 to IPv6 marks a significant evolution in internet protocol technology, bringing forth both opportunities and challenges. this paper conducts a thorough survey of various detection techniques and solutions specifically tailored for IPv6, addressing the unique security vulnerabilities inherent to this new protocol. We delve into the nuances of IPv6’s architecture that make traditional IPv4 detection methods inadequate, highlighting the necessity for specialized IPv6-focused strategies. the survey covers a broad range of techniques, including advanced intrusion detection systems, machine learning algorithms, and hybrid approaches. We critically analyze the effectiveness of these methods in detecting and mitigating common IPv6threats like evasion attacks, distributed denial of service (DDoS) attacks, and fragmentation exploits. Additionally, the paper explores innovative solutions developed to address IPv6-specific vulnerabilities, such as improved packet inspection methods and enhanced firewall capabilities. through this comprehensive review, we aim to provide insights into the current state of IPv6 detection techniques and offer guidance for future research and development in this crucial area of network security.
the adoption of convolutional neural network algorithms requires an increasing number of multiply-and-accumulate operations. Compute-in-memory leverages the spatial arrangement of static random access memory (SRAM) ce...
the adoption of convolutional neural network algorithms requires an increasing number of multiply-and-accumulate operations. Compute-in-memory leverages the spatial arrangement of static random access memory (SRAM) cells to increase parallelism and reduce power consumption, overcoming repeated data access and movement from the memory to the computing unit in von Neumann *** the proposed work, an SRAM cell with six transistors is described, explaining how the multiply-and-accumulate operation is performed and how its architecture is suitable for compute-in-memory. As multiple SRAM cells are accessed at the same time, the importance of static noise margin is discussed in the read and hold operations and the 8T Single-Ended SRAM cell presented to overcome read-disturbance *** SRAM cells are designed in 16 nm FinFET CMOS process and simulated to calculate the hold and read static noise margins in the nominal and PVT corners. Specifically, the 6T SRAM cell exhibits nominal hold and read static noise margin values of 355.8 mV and 188.0 mV respectively. the 8T Single-Ended SRAM cell has equivalent nominal hold and read static noise margin values of 354.6 mV, overcoming read disturbance and being a feasible candidate for reliable compute-in-memory arrays.
Visual Localization is gathering more and more attention in computer vision due to the spread of wearable cameras (e.g. smart glasses) and to the increase of general interest in autonomous vehicles and robots. Unfortu...
详细信息
ISBN:
(纸本)9789897584886
Visual Localization is gathering more and more attention in computer vision due to the spread of wearable cameras (e.g. smart glasses) and to the increase of general interest in autonomous vehicles and robots. Unfortunately, current localization algorithms rely on large amounts of labeled training data collected in the specific target environment in which the system needs to work. Data collection and labeling in this context is difficult and time-consuming. Moreover, the process has to be repeated when the system is adapted to a new environment. In this work, we consider a scenario in which the target environment has been scanned to obtain a 3D model of the scene suitable to generate large quantities of synthetic data automatically paired with localization labels. We hence investigate the use of Unsupervised Domain Adaptation techniques exploiting labeled synthetic data and unlabeled real data to train localization algorithms. To carry out the study, we introduce a new dataset composed of synthetic and real images labeled withtheir 6-DOF poses collected in four different indoor rooms which is available at https://***/EGO-CH-LOC-UDA. A new method based on self-supervision and attention modules is hence proposed and tested on the proposed dataset. Results show that our method improves over baselines and state-of-the-art algorithms tackling similar domain adaptation tasks.
Network technology has been evolved exponentially in the past few decades. At the same time, gazillions of network intrusion incidents are continuously forming cyberspace a shocking vulnerable domain to explore for th...
详细信息
the process of digitization, which followed the era of the third Industrial Revolution, facilitated a new era called “Industry 4.0” (the 4th Industrial Revolution). Based on the dynamics of Industry 4.0 development,...
ISBN:
(纸本)9781450399050
the process of digitization, which followed the era of the third Industrial Revolution, facilitated a new era called “Industry 4.0” (the 4th Industrial Revolution). Based on the dynamics of Industry 4.0 development, the Tourism 4.0 concept now reinforces the perception of technology-based changes in the tourism industry that are highly interconnected and similar to figital (real-world and digital technology combinations) systems. therefore, the purpose of this study is to identify the potential impacts (positive and negative) of Industry 4.0 and its components in the tourism industry, to study and to analyze the stages of development of tourism in the context of “Industry 4.0” and web technologies, as well as to suggest relevant proposals for the integration of tourism into technologies of “Industry 4.0”. the study also highlights the importance of training smart device and software developers in the field of tourism and the development of conceptual, technical and innovative skills of industry professionals in the management of technological infrastructure.
Hot Pixels are cosmic ray induced digital imaging sensor defects that accumulate as the camera ages at rates that are highly dependent on pixel size. We previously developed an empirical formula projecting hot pixel d...
详细信息
Instrumentation of an unmanned aerial vehicle (UAV) with devices for physical interaction with ground-based objects is a popular scientific branch in the domain of robotics. Physical interaction of an onboard aerial m...
详细信息
ISBN:
(数字)9783030877255
ISBN:
(纸本)9783030877255;9783030877248
Instrumentation of an unmanned aerial vehicle (UAV) with devices for physical interaction with ground-based objects is a popular scientific branch in the domain of robotics. Physical interaction of an onboard aerial manipulation system with objects complicates the UAV stabilization process, what, in turn, impairs the positioning of UAV and reduces navigational accuracy of the moving end of the mechanism. In this paper, the problem of the manipulator motion control for an unmanned aerial vehicle is considered. We also propose algorithms for the calculation of the angles of joints of the manipulator, based on the solutions of the direct and inverse kinematics problems. the developed algorithms ensure retaining of the center of mass of an aerial manipulator system on the vertical axis and minimum displacement of the center of mass horizontally when moving the end mechanism along the reference trajectory.
暂无评论