Trigger-action programming (TAP) is an Internet of Things (IoT) paradigm that enables nonprofessional end-users to automate smart devices by formulating rules, such as "IF you leave home, THEN turn off lights.&qu...
详细信息
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its **...
详细信息
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its *** current WMC solvers work on Conjunctive Normal Form(CNF)***,CNF is not a natural representation for human-being in many *** by the stronger expressive power of Pseudo-Boolean(PB)formulas than CNF,we propose to perform WMC on PB *** on a recent dynamic programming algorithm framework called ADDMC for WMC,we implement a weighted PB counting tool *** compare PBCounter with the state-of-the-art weighted model counters SharpSAT-TD,ExactMC,D4,and ADDMC,where the latter tools work on CNF with encoding methods that convert PB constraints into a CNF *** experiments on three domains of benchmarks show that PBCounter is superior to the model counters on CNF formulas.
The rapid proliferation of connected vehicles has significantly expanded the attack surface of the Internet of Vehicles (IoV), introducing severe security risks. In such resource-constrained environments, developing l...
详细信息
The development of alkaline fuel cells is moving forward at an accelerated pace,and the application of ether-free bonded polymers to anion exchange membranes(AEMs)has been widely ***,the question of the“trade-off”be...
详细信息
The development of alkaline fuel cells is moving forward at an accelerated pace,and the application of ether-free bonded polymers to anion exchange membranes(AEMs)has been widely ***,the question of the“trade-off”between AEM ionic conductivity and dimensional stability remains *** strategy of inducing microphase separation to improve the performance of AEM has attracted much attention recently,but the design of optimal molecular structures is still being ***,this work introduced different ratios of 3-bromo-1,1,1-trifluoroacetone(x=40,50,and 60)into the main chain of poly(p-terphenylene isatin).Because fluorinated groups have excellent hydrophobicity,hydrophilic hydroxyl-containing side chains are introduced to jointly adjust the formation of phase separation *** results show that PTI-PTF_(50)-NOH AEM with the appropriate fluorinated group ratio has the best ionic conductivity and alkali stability under the combined effect of *** has an ionic conductivity of 133.83 mS cm^(-1)at 80°*** addition,the OH-conductivity remains at 89%of the initial value at 80°C and 3 M KOH for 1056 h of *** cell polarization curve based on PTI-PTF_(50)-NOH shows a power density of 734.76 mW cm^(-2)at a current density of 1807.7 mA cm^(-2).
Container-based virtualization technology has been more widely used in edge computing environments recently due to its advantages of lighter resource occupation, faster startup capability, and better resource utilizat...
详细信息
Container-based virtualization technology has been more widely used in edge computing environments recently due to its advantages of lighter resource occupation, faster startup capability, and better resource utilization efficiency. To meet the diverse needs of tasks, it usually needs to instantiate multiple network functions in the form of containers interconnect various generated containers to build a Container Cluster(CC). Then CCs will be deployed on edge service nodes with relatively limited resources. However, the increasingly complex and timevarying nature of tasks brings great challenges to optimal placement of CC. This paper regards the charges for various resources occupied by providing services as revenue, the service efficiency and energy consumption as cost, thus formulates a Mixed Integer Programming(MIP) model to describe the optimal placement of CC on edge service nodes. Furthermore, an Actor-Critic based Deep Reinforcement Learning(DRL) incorporating Graph Convolutional Networks(GCN) framework named as RL-GCN is proposed to solve the optimization problem. The framework obtains an optimal placement strategy through self-learning according to the requirements and objectives of the placement of CC. Particularly, through the introduction of GCN, the features of the association relationship between multiple containers in CCs can be effectively extracted to improve the quality of *** experiment results show that under different scales of service nodes and task requests, the proposed method can obtain the improved system performance in terms of placement error ratio, time efficiency of solution output and cumulative system revenue compared with other representative baseline methods.
Malware detection is a critical issue in software engineering as it directly threatens user information security. Existing approaches often focus on individual modality (either source code or binary code) for the dete...
详细信息
Under the background of high-speed train production performance degradation, aiming at the problem of insufficient sensitivity of high-speed train traction system for early fault detection, we propose an early fault d...
详细信息
In this paper,a reasoning enhancement method based on RGCN(Relational Graph Convolutional Network)is proposed to improve the detection capability of UAV(Unmanned Aerial Vehicle)on fast-moving military targets in urban...
详细信息
In this paper,a reasoning enhancement method based on RGCN(Relational Graph Convolutional Network)is proposed to improve the detection capability of UAV(Unmanned Aerial Vehicle)on fast-moving military targets in urban battlefield *** combining military images with the publicly available VisDrone2019 dataset,a new dataset called VisMilitary was built and multiple YOLO(You Only Look Once)models were tested on *** to the low confidence problem caused by fuzzy targets,the performance of traditional YOLO models on real battlefield images decreases ***,we propose an improved RGCN inference model,which improves the performance of the model in complex environments by optimizing the data processing and graph network *** results show that the proposed method achieves an improvement of 0.4%to 1.7%on mAP@0.50,which proves the effectiveness of the model in military target *** research of this paper provides a new technical path for UAV target detection in urban battlefield,and provides important enlightenment for the application of deep learning in military field.
With the continuous development of deep counterfeiting technology, the information security in our daily life is under serious threat. While existing face forgery detection methods exhibit impressive accuracy when app...
详细信息
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of t...
详细信息
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of the critical issues. Due to its flexible and efficient fine-grained access control feature, Ciphertext-Policy Attribute-Based Encryption(CP-ABE) is suitable for data sharing in IoV. However, there are many flaws in most existing CP-ABE schemes, such as attribute privacy leakage and key misuse. This paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP). A partially hidden access structure is adopted to hide sensitive user attribute values, and attribute categories are sent along with the ciphertext to effectively avoid privacy exposure. In addition, key tracking and malicious user revocation are introduced with broadcast encryption to prevent key misuse. Since the main computation task is outsourced to the cloud, the burden of the user side is relatively low. Analysis of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
暂无评论