A new platform software named JUSMAR-MANS based on JASMIN was developed for the massively parallel numerical simulation on compressible multimedia multiphase flow under complex conditions. Different from the tradition...
详细信息
This study mainly focus on Sybil attacks with the Identity-Augmented Proof-of-Stake (IdAPoS) protocol under different network topologies, including random, scale-free, and hierarchical networks. The study finds that s...
详细信息
The next-generation heating systems,crucial for rational heat distribution and refined management,rely heavily on accurate zone-specific heat load *** paper introduces a method for rapid zone-specific heat load predic...
详细信息
The next-generation heating systems,crucial for rational heat distribution and refined management,rely heavily on accurate zone-specific heat load *** paper introduces a method for rapid zone-specific heat load prediction based on heat consumption allocation and data-driven *** approach involves predicting the overall heat load of the building and then redistributing the total heat according to a heat consumption *** eliminates the need for real-time data collection from each room,resulting in cost savings on hardware and improved computational *** overall building heat load data is obtained through a data-driven algorithm,while the heat consumption matrix is constructed through energy software simulation *** Building 2 in the Baotou Industrial Park,China,as a case study,the paper analyzes the differences between actual measurements and room *** results indicate an average error of 7.02% for the proposed estimation *** not achieving high precision(>95%) in heat load prediction,this level of accuracy is deemed sufficient to meet the requirements of feedforward control.
Quantum computing is a promising technology that requires a sophisticated software stack to connect end users to the wide range of possible quantum backends. However, current software tools are usually hard -coded for...
详细信息
ISBN:
(纸本)9798331541378
Quantum computing is a promising technology that requires a sophisticated software stack to connect end users to the wide range of possible quantum backends. However, current software tools are usually hard -coded for single platforms and lack a dynamic interface that can automatically retrieve and adapt to changing physical characteristics and constraints of different platforms. With new hardware platforms frequently introduced and their performance changing on a daily basis, this constitutes a serious limitation. In this paper, we showcase a concept and a prototypical realization of an interface, called the Quantum Device Management Interface (QDMI), that addresses this problem by explicitly connecting the software and hardware developers, mediating between their competing interests. QDMI allows hardware platforms to provide their physical characteristics in a standardized way, and software tools to query that data to guide the compilation process accordingly. This enables software tools to automatically adapt to different platforms and to optimize the compilation process for the specific hardware constraints. QDMI is a central part of the Munich Quantum software Stack (MQSS) a sophisticated software stack to connect end users to the wide range of possible quantum backends. QDMI is publicly available as open source at https://***/Munich- Quantum- software- Stack/QDMI.
Single image deblurring aims to restore a sharp image by removing blurred areas in the single image. Although existing deblurring methods achieve significant progress, these approaches tend to require lots of network ...
详细信息
Reach-avoid analysis combines the construction of safety and specific progress guarantees,and is able to formalize many important engineering problems. In this paper we study the reach-avoid verification problem of sy...
详细信息
ISBN:
(数字)9789887581581
ISBN:
(纸本)9798350366907
Reach-avoid analysis combines the construction of safety and specific progress guarantees,and is able to formalize many important engineering problems. In this paper we study the reach-avoid verification problem of systems modelled by ordinary differential equations using Lyapunov densities. Firstly,the weak reach-avoid verification is considered. Given an initial set,a safe set and a target set,the weak reach-avoid verification is to verify whether the reach-avoid property(i.e.,the system will enter the target set eventually while staying inside the safe set before the first target hitting time) holds for almost all states in the initial set. We propose two novel sufficient conditions using Lyapunov densities for the weak reach-avoid *** two sufficient conditions are shown to be weaker than existing ones,providing more possibilities of verifying weak reach-avoid properties successfully. Then,we generalize these conditions to the verification of reach-avoid properties for all states in the initial set. Finally,two examples demonstrate theoretical developments of proposed conditions.
Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accu...
详细信息
Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accuracy. Most researchers consider intra-class dependencies to improve localization accuracy. However, some studies show that inter-class method call type faults account for more than 20%, which means such methods still have certain limitations. To solve the above problems, this paper proposes a two-phase software fault localization based on relational graph convolutional neural networks (Two-RGCNFL). Firstly, in Phase 1, the method call dependence graph (MCDG) of the program is constructed, the intra-class and inter-class dependencies in MCDG are extracted by using the relational graph convolutional neural network, and the classifier is used to identify the faulty methods. Then, the GraphSMOTE algorithm is improved to alleviate the impact of class imbalance on classification accuracy. Aiming at the problem of parallel ranking of element suspicious values in traditional SBFL technology, in Phase 2, Doc2Vec is used to learn static features, while spectrum information serves as dynamic features. A RankNet model based on siamese multi-layer perceptron is constructed to score and rank statements in the faulty method. This work conducts experiments on 5 real projects of Defects4J benchmark. Experimental results show that, compared with the traditional SBFL technique and two baseline methods, our approach improves the Top-1 accuracy by 262.86%, 29.59% and 53.01%, respectively, which verifies the effectiveness of Two-RGCNFL. Furthermore, this work verifies the importance of inter-class dependencies through ablation experiments.
To reconstruct 3D human figures with fine-grained details from sparse views, this paper proposes a novel framework called VR-Recon, which is based on a viewpoint refiner. In this framework, we first decouple geometric...
详细信息
Recent advancements in Large Language Models (LLMs) have catalyzed the exploration of Chain of Thought (CoT) approaches, particularly in extending their application to multimodal tasks to enhance reasoning capabilitie...
详细信息
Owing to the challenge of target occlusion leading to tracking failure during the target tracking process, achieving efficient and robust tracking of targets under occlusion scenarios has become a focal point of resea...
详细信息
暂无评论