Pedestrian detection from a drone-based images has many potential applications such as searching for missing persons, surveillance of illegal immigrants, and monitoring of critical infrastructure. However, it is consi...
详细信息
This paper discusses the structural organization of the background monitoring system (BMS) of the transboundary UNESCO World Heritage Site 'Beech forests of the Carpathians and ancient beech forests of Germany'...
详细信息
We enhance the calculus of string diagrams for monoidal categories with hierarchical features in order to capture closed monoidal (and cartesian closed) structure. Using this new syntax we formulate an automatic diffe...
详细信息
The increasing prevalence of botnet attacks in IoT networks has led to the development of deep learning techniques for their detection. However, conventional centralized deep learning models pose challenges in simulta...
The increasing prevalence of botnet attacks in IoT networks has led to the development of deep learning techniques for their detection. However, conventional centralized deep learning models pose challenges in simultaneously ensuring user data privacy and detecting botnet attacks. To address this issue, this study evaluates the efficacy of Federated Learning (FL) in detecting IoT malware traffic while preserving user privacy. The study employs N-BaIoT, a dataset of real-world IoT network traffic infected by malware, and compares the effectiveness of FL models using Convolutional Neural Network, Long Short-Term Memory, and Gated Recurrent Unit models with a centralized approach. The results indicate that FL can achieve high performance in detecting abnormal traffic in IoT networks, with the CNN model yielding the best results among the three models evaluated. The study recommends the use of FL for IoT malware traffic detection due to its ability to preserve data privacy.
CdO Thin Film and powder nanoparticles have been produced using the sol-gel method. The X-ray diffraction technique is used to evaluate structural properties of powder CdO at different annealing temperatures 623, 673,...
CdO Thin Film and powder nanoparticles have been produced using the sol-gel method. The X-ray diffraction technique is used to evaluate structural properties of powder CdO at different annealing temperatures 623, 673, 723 (K). It indicates that CdO nanoparticles in nature have a polycrystalline cubic structure. The size of the crystallite (D) is in the middle of the range 23.14-46.65 (nm). As the annealing temperature increases, the crystallite size increases. Also, dislocation density (δ), strain (ε), and texture coefficient TC(hkl) were calculated. The energy band-gap and refractive index were estimated. Band gap energy decreases with increasing annealing temperature and refractive index increases with increasing annealing temperature.
A solution for the problem of controlling the unmanned quadrotor vehicles group flight in presence of obstacles of complex form is proposed. A traditional approach to construction of the target function does not solve...
详细信息
ISBN:
(纸本)9781728125930
A solution for the problem of controlling the unmanned quadrotor vehicles group flight in presence of obstacles of complex form is proposed. A traditional approach to construction of the target function does not solve the problem of control at presence of concave obstacles; the UAVs may get trapped in such a situation. The proposed target function contains the three terms. The first of them controls the UAVs' behavior with respect to attitude. The second is built on the base of a moving coordinate system bound to the trajectory of the group motion. The third addend is a standard sum that performs the function of repelling the UAVs one from another. Also, in the proposed approach the motion is bound to the virtual center of the group, instead of one UAV that is chosen to be a leader. This approach helps to avoid a discrepancy between desired and actual states of the group in case that the leader UAV experiences some problems with its motion.
Currently, there is a need in Ukraine for the design and development of multidisciplinary decision support systems (DSSs) for the medical and other related spheres - for example, the medical law sector, in particular,...
ISBN:
(数字)9781728199573
ISBN:
(纸本)9781728199580
Currently, there is a need in Ukraine for the design and development of multidisciplinary decision support systems (DSSs) for the medical and other related spheres - for example, the medical law sector, in particular, the DSS for the surrogacy's legal regulation field. This DSS will be able to protect doctors from potentially wrong decisions by taking into account all available information when making the decisions. For design such DSS, it's necessary to conduct the modelling of the decision-making process on surrogacy's legal conducting, that is the goal of this research. In this paper, there are the theoretical foundations of using the ontologies for the decision-making process on surrogacy's legal conducting, a model of base ontology with the necessary requirements and recommendations for conducting the surrogate motherhood, and ontology-based model of the decision-making process on surrogacy's legal conducting. The conducted modelling is a theoretical basis for the development of methods and design of DSS in the field of legal regulation of surrogate motherhood.
This article presents a comprehensive methodology for enhancing the capabilities of conversational AI systems, focusing on ChatGPT, through the integration of ontology-driven structured prompts and meta-learning techn...
详细信息
Escape analysis is widely used to determine the scope of variables, and is an effective way to optimize memory usage. However, the escape analysis algorithm can hardly reach 100% accurate, mistakes of which can lead t...
详细信息
ISBN:
(数字)9781450371230
ISBN:
(纸本)9781728165240
Escape analysis is widely used to determine the scope of variables, and is an effective way to optimize memory usage. However, the escape analysis algorithm can hardly reach 100% accurate, mistakes of which can lead to a waste of heap memory. It is challenging to ensure the correctness of programs for memory *** this paper, we propose an escape analysis optimization approach for Go programming language (Golang), aiming to save heap memory usage of programs. First, we compile the source code to capture information of escaped variables. Then, we change the code so that some of these variables can bypass Golang's escape analysis mechanism, thereby saving heap memory usage and reducing the pressure of memory garbage collection. Next, we present a verification method to validate the correctness of programs, and evaluate the effect of memory optimization. We implement the approach to an automatic tool and make it open-source 1 . For evaluation, we apply our approach to 10 open-source projects. For the optimized Golang code, the heap allocation is reduced by 8.88% in average, and the heap usage is reduced by 8.78% in average. Time consumption is reduced by 9.48% in average, while the cumulative time of GC pause is reduced by 5.64% in average. We also apply our approach to 16 industrial projects in Bytedance Technology. Our approach successfully finds 452 optimized cases which are confirmed by developers.
暂无评论