In the design flow of integrated circuits, chip-level verification is an important step that sanity checks the performance is as expected. Power grid verification is one of the most expensive and time-consuming steps ...
详细信息
In this paper, we propose a semi-supervised learning method to simultaneous segmentation and labeling of parts in 3D garments. The key idea in this work is to analyze 3D garments using semi-supervised learning method ...
详细信息
High Throughput Computing plays an important role in the field of computational science. The Compressed Baryonic Matter (CBM) experiment is being planned at Facility for Antiproton and Ion Research (FAIR) accelerator ...
详细信息
High Throughput Computing plays an important role in the field of computational science. The Compressed Baryonic Matter (CBM) experiment is being planned at Facility for Antiproton and Ion Research (FAIR) accelerator complex, which is under construction at GSI laboratory in Darmstadt, Germany. This experiment is going to produce substantial data which requires high throughput computing to perform reconstruction, analysis, etc. Simulation of such a very large experiment requires computational capabilities which cannot be satisfied by a single processing system. A possible way to solve this problem is to use of heterogeneous computing which refers to the systems that use more than one kind of processors viz CPU; Graphics Processing Unit (known as GPU); Accelerated Processing Unit; Xeon Phi; Field Programmable Gate Array etc. GPU can be used as a general purpose processor as a part of heterogeneous computing. In this experiment a rare particle, J/Psi will be produced. For detection of J/Psi via di-muon decay channel, Muon Chamber Detector System is being designed, where India is playing a major role. Detection of rare particles requires very high interaction rate (upto 107 events per second), an efficient event selection algorithm is required for selecting events which contain probable candidates of J/Psi. A novel algorithm has been developed for online selection of useful events which results in faster computation time with respect to the existing algorithm capable of processing 4×105 events per second using GPU Tesla C2075 card. This paper explains in detail the difference with earlier algorithm and shows that more than 107 events can be processed per second using same GPU card.
Clothing in vision plays an important role in many applications of digital clothing, virtual fitting, fashion design and manufacturing. The research of clothing in vision is full of technical challenges, such as backg...
详细信息
Urban traffic congestion is a growing problem that we experience every day. Intersections are one of the major bottlenecks that contribute to urban traffic congestion. Traditional traffic control methods, such as traf...
详细信息
Urban traffic congestion is a growing problem that we experience every day. Intersections are one of the major bottlenecks that contribute to urban traffic congestion. Traditional traffic control methods, such as traffic signal and stop sign control are not optimal for all demand levels as demonstrated in the literature. Recently, numerous research efforts proposed Intelligent Transportation System (ITS) applications to enhance intersection capacity and hence reduce congestion. In this paper we propose a game-theory-based algorithm for controlling autonomous vehicle movements equipped with Cooperative Adaptive Cruise Control (CACC) systems at uncontrolled intersections. The goal of this research effort is to develop an algorithm capable of using the future autonomous/automated vehicle capabilities to replace the usual state-of-the-practice control systems at intersections (e.g. stop signs, traffic signals, etc.). The proposed algorithm is chicken-game inspired and is efficient for application in real-time. It assumes vehicles can communicate with a central agent at the intersection to provide their instantaneous speeds and locations. The proposed algorithm assumes that vehicles obey the Nash equilibrium solution of the game. The simulation results demonstrated reductions in vehicle travel time and delay relative to an all-way stop sign control in the range of 49 and 89 percent on average respectively.
The ubiquity of mobile devices has brought forth the concept of participatory sensing, whereby people can collect and share data from ambient environment for the benefit of themselves or community. To encourage partic...
详细信息
The ubiquity of mobile devices has brought forth the concept of participatory sensing, whereby people can collect and share data from ambient environment for the benefit of themselves or community. To encourage participation of all stakeholders and guarantee system functionality, a privacy-preserving participatory sensing system should be established to hide querier's and participant's sensitive information(e.g., interest, location and content). Meanwhile, it is also imperative for server to provide an accurate and quick service(match the “need” with “supply” and retrieve the desired result from collected data set) for queriers when queries and reports are encrypted to protect privacy. In this paper, we propose Query and Report privacy-preserving protocol(QueRe) in participatory sensing system aiming to protect the query privacy and report privacy without sacrificing the service quality. Security analysis and performance simulation show our method achieves superior performance in privacy protection and service quality. To the best of our knowledge, our work is first attempt for protecting query privacy and report privacy while considering server's service quality.
With the increase in the number of satellites, the security time synchronization protocol between satellites and servers on the ground increasingly important. But, the time protocol that existing in space lack of secu...
详细信息
ISBN:
(纸本)9781467383165
With the increase in the number of satellites, the security time synchronization protocol between satellites and servers on the ground increasingly important. But, the time protocol that existing in space lack of security protections. Also, SEIEEE1588's author has gathered the advantage of both NTP and IEEE1588 protocol raise a security enhanced IEEE1588 protocol for deep-space environment (SEIEEE1588). The protocol just using symmetric encryption algorithm, does not consider the strong identity authentication, reasonable key update and other security measures. This paper on the basis of IEEE1588 and SEIEEE1588, research the time synchronization mechanism of IEEE1588, the security measures of SEIEEE1588 and safe data transmission protocols. At last, redesign the time synchronization protocol that contains identity authentication that use digital certificate to verify the identity of both sides, asymmetric encryption algorithm and reasonable key updates, to suitable the deep-space that is poor link quality, limited node computing power.
In the usual reliability analysis, researchers often acquire the reliability information about a product by reliability tests and usually regard the product as a whole object to study. Also, the relationships between ...
详细信息
ISBN:
(纸本)9781510806450
In the usual reliability analysis, researchers often acquire the reliability information about a product by reliability tests and usually regard the product as a whole object to study. Also, the relationships between the attributes of the product are usually ignored. Base on the non-IIDness learning, the attributes of objects are more or less interacted and coupled. Thus, this paper analyzes the coupled relationships between each pair of product attributes and the coupled relationships between each product attribute and reliability lifetime of the product. Specifically, the attributes we analyzed are continuous. The level of interplay between each pair of attributes and between each attribute and product lifetime can be observed by coupled correlation matrices.
As the Internet becomes more and more deeply connected with our life, the Internet has brought together mass text material, and it is still in explosive growth. In order to quickly and accurately to help users find th...
详细信息
Assessing the survivability of mission critical information systems is essential for combat capability analysis in the cyber warfare environments, and the instantaneous availability of system is one of the key indicat...
详细信息
ISBN:
(纸本)9781479947249
Assessing the survivability of mission critical information systems is essential for combat capability analysis in the cyber warfare environments, and the instantaneous availability of system is one of the key indicators for information systems' survivability evaluation. In response to these problems, this paper formulates a network vehicle weapon system as a series repairable system. Then we investigate the probability of reliability and instantaneous availability under our proposed model. The simulation results show that maintenance ability and improved component repair rate are very important to system's reliability and instantaneous availability.
暂无评论