We propose a method for the Bayesian prediction of shocks in scalar partial differential equations (PDEs) representing conservation equations from noisy observations of the boundary conditions. By considering the impl...
We propose a method for the Bayesian prediction of shocks in scalar partial differential equations (PDEs) representing conservation equations from noisy observations of the boundary conditions. By considering the implicit transformation from boundary conditions to shocks, we construct an arrival process interpretation of shocks as well as an associated arrival rate function. We then introduce a Monte Carlo method to approximate the arrival rate of shocks based on the probability of a sufficiently large range of values in an epsilon ball conditioned on noisy boundary measurements. We illustrate the method with simulations of Burgers’ equation with initial conditions set by Brownian motion. Despite the non-smooth boundary, our proposed method constructs a sparse and readily interpretable probabilistic structure of shock arrival and propagation.
In this article, we proposed a new extension of the Topp–Leone family of distributions. Some important properties of the model are developed, such as quantile function, stochastic ordering, model series representatio...
详细信息
Code vulnerability detection is a software security analysis technique that focuses on recognizing and resolving possible code vulnerabilities and weaknesses. Its primary objective is to mitigate the chances of malici...
Code vulnerability detection is a software security analysis technique that focuses on recognizing and resolving possible code vulnerabilities and weaknesses. Its primary objective is to mitigate the chances of malicious attacks and system failures. Vulnerabilities encompass mistakes, defects, or insecure programming methodologies found within the code, which can lead to security risks, service denials, data leaks, and various other concerns. Previous research has predominantly focused on deep learning models such as VulDeePecker, Russell, and SySeVR. With the advent of large language models, impressive advancements have been made in various domains, including natural language generation, text classification, and sentiment analysis. However, there is currently no effective method for utilizing large language models in vulnerability detection. Therefore, this study explores and validates the application of such models for code vulnerability detection. In this paper we present a context-based learning approach to enhance the capability of code vulnerability detection named VUL-GPT. Our method combines code retrieval and code analysis, leveraging in-context learning to improve the performance of the GPT model in vulnerability detection. Specifically, we use GPT to generate analysis content for the test code and employ code retrieval methods such as BM-25 and TF-IDF to retrieve the most similar code snippet and its vulnerability information from the training set. Subsequently, we input them along with the test code and its analysis into the GPT model, leveraging the contextual learning ability of the large language model for vulnerability detection. Our experiments demonstrate that combining with code retrieval and code analysis, the GPT models can detect code vulnerability detection more effectively.
The article explores the bleeding-edge intersection of neuro-haptics, brain-computer interface (BCI) technology, and machine learning to enable the creation and control of flying avatars. Our work integrates neuroscie...
详细信息
ISBN:
(数字)9798350330649
ISBN:
(纸本)9798350330656
The article explores the bleeding-edge intersection of neuro-haptics, brain-computer interface (BCI) technology, and machine learning to enable the creation and control of flying avatars. Our work integrates neuroscience and haptic feedback to develop human computer system interfaces that allow users to control cyber physical systems using their brain signals. This innovative approach uses advanced machine learning to classify signal patterns and respond to brain thoughts in real-time, providing an immersive flying bird’s eyes feeling. The article highlights the challenges and opportunities associated with Neuro-Haptics BCI for flying avatars, paving the way for a new era in human-computer interaction.
This paper presents a novel approach to body gesture recognition for powered wheelchair users, leveraging inertial data from wrist-mounted sensors to facilitate movement and enhance autonomy in Adapted Physical Activi...
详细信息
ISBN:
(数字)9798350375022
ISBN:
(纸本)9798350375039
This paper presents a novel approach to body gesture recognition for powered wheelchair users, leveraging inertial data from wrist-mounted sensors to facilitate movement and enhance autonomy in Adapted Physical Activity (APA). Gesture recognition technology interprets human gestures to allow non-direct communication with devices, enhancing human-machine interaction across various fields. APA fosters inclusion and well-being through tailored physical engagement. Our model not only identifies known gestures with high accuracy, as indicated by a mean Average Precision (mAP) score of 0.92 and a Recall@1 score of 0.983, but also demonstrates the ability to recognize gestures not included in the training set. This research contributes to the field of human-robot interaction by offering a more dynamic and inclusive form of interaction for individuals reliant on powered mobility aids.
Hashing is a widely used and efficient indexing mechanism for key-value storage. Persistent memory (PM) has attracted extensive attention in research due to its non-volatility and DRAM-like performance. Intel DCPMM, a...
Hashing is a widely used and efficient indexing mechanism for key-value storage. Persistent memory (PM) has attracted extensive attention in research due to its non-volatility and DRAM-like performance. Intel DCPMM, as a PM, can provide large capacity and low total cost of ownership, further promoting the research of PM-based hash index. However, based on real-world workloads, we found that negative searches of existing PM-based hash indexes significantly degrade system performance. A direct method to solve this problem is to use a PM-based Bloom filter to reduce negative searches, but at the cost of the decreased lifespan of PM due to extra PM writes. An alternative method is to use a DRAM-based Bloom filter, but it still faces increased multi-threaded insertion/deletion/positive-search scalability overhead as well as increased data consistency and recovery *** this paper, we propose SmartHT, a small-size DRAM-based Bloom filter to accelerate hash table operations for PM while solving the aforementioned problems. SmartHT uses efficient merge write optimization with head insertion, lazy deletion, and shortened average chained length of head-bucket to provide high insertion/deletion/positive-search scalability, respectively. On the other hand, it utilizes a merged-flush mechanism based on an 8-byte failure-atomic write method to reduce flush instructions and extra PM writes to achieve low data consistency overhead. Experimental results on Intel Optane DCPMM show that, compared with the state-of-the-art persistent hash indexes, SmartHT improves multi-threaded negative queries under uniform and skewed distributions by 4.61x-13.86x and 2.76x-12.99x respectively, achieves high multi-threaded scalability and low data consistency overhead, at the modest cost of recovery time overhead.
As the majority of Internet traffic is encrypted by the Transport Layer Security (TLS) protocol, recent advances leverage Deep Learning (DL) models to conduct encrypted traffic classification. We propose Rosetta to en...
详细信息
Network distance measurement is crucial for evaluating network performance, attracting significant research attention. However, conducting measurements for the entire network is exceedingly expensive and time-consumin...
详细信息
In this paper, we propose a novel road side unit (RSU)-assisted cooperative sensing scheme for connected autonomous vehicles (CAVs), with the objective to reduce completion time of sensing tasks. Specifically, LiDAR s...
详细信息
Calibration is the first and foremost step in dealing with sensor displacement errors that can appear during extended operation and off-time periods to enable robot object manipulation with precision. In this paper, w...
Calibration is the first and foremost step in dealing with sensor displacement errors that can appear during extended operation and off-time periods to enable robot object manipulation with precision. In this paper, we present a novel multiplanar self-calibration between the camera system and the robot's end-effector for 3D object manipulation. Our approach first takes the robot end-effector as ground truth to calibrate the camera's position and orientation while the robot arm moves the object in multiple planes in 3D space, and a 2D state-of-the-art vision detector identifies the object's center in the image coordinates system. The transformation between world coordinates and image coordinates is then computed using 2D pixels from the detector and 3D known points obtained by robot kinematics. Next, an integrated stereo-vision system estimates the distance between the camera and the object, resulting in 3D object localization. We test our proposed method on the Baxter robot with two 7-DOF arms and a 2D detector that can run in real time on an onboard GPU. After self-calibrating, our robot can localize objects in 3D using an RGB camera and depth image. The source code is available at https://***/tuantdang/calib_cobot.
暂无评论