Real-time systems are widely implemented in the Internet of Things(IoT) and safety-critical systems, both of which have generated enormous social value. Aiming at the classic schedulability analysis problem in real-ti...
详细信息
Real-time systems are widely implemented in the Internet of Things(IoT) and safety-critical systems, both of which have generated enormous social value. Aiming at the classic schedulability analysis problem in real-time systems, we proposed an exact Boolean analysis based on interference(EBAI) for schedulability analysis in real-time systems. EBAI is based on worst-case interference time(WCIT), which considers both the release jitter and blocking time of the task. We improved the efficiency of the three existing tests and provided a comprehensive summary of related research results in the field. Abundant experiments were conducted to compare EBAI with other related results. Our evaluation showed that in certain cases, the runtime gain achieved using our analysis method may exceed 73% compared to the stateof-the-art schedulability test. Furthermore, the benefits obtained from our tests grew with the number of tasks, reaching a level suitable for practical application. EBAI is oriented to the five-tuple real-time task model with stronger expression ability and possesses a low runtime overhead. These characteristics make it applicable in various real-time systems such as spacecraft, autonomous vehicles, industrial robots, and traffic command systems.
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w...
详细信息
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported worldwide ***,there is a pressing need to employ diverse landmine detection techniques for their *** effective approach for landmine detection is UAV(Unmanned Aerial Vehicle)based AirborneMagnetometry,which identifies magnetic anomalies in the local terrestrial magnetic *** can generate a contour plot or heat map that visually represents the magnetic field *** the effectiveness of this approach,landmine removal remains a challenging and resource-intensive task,fraughtwith *** computing,on the other hand,can play a crucial role in critical drone monitoring applications like landmine *** processing data locally on a nearby edge server,edge computing can reduce communication latency and bandwidth requirements,allowing real-time analysis of magnetic field *** enables faster decision-making and more efficient landmine detection,potentially saving lives and minimizing the risks involved in the ***,edge computing can provide enhanced security and privacy by keeping sensitive data close to the source,reducing the chances of data exposure during *** paper introduces the MAGnetometry Imaging based Classification System(MAGICS),a fully automated UAV-based system designed for landmine and buried object detection and *** have developed an efficient deep learning-based strategy for automatic image classification using magnetometry dataset *** simulating the proposal in various network scenarios,we have successfully detected landmine signatures present in themagnetometry *** trained models exhibit significant performance improvements,achieving a maximum mean average precision value of 97.8%.
Quantum communication is rapidly developing and is gradually being commercialized due to its technological *** dense communication links among multiple users in a scalable and efficient way is of great significance fo...
详细信息
Quantum communication is rapidly developing and is gradually being commercialized due to its technological *** dense communication links among multiple users in a scalable and efficient way is of great significance for realizing a large-scale quantum communication ***,we propose a novel scheme to construct a fully connected polarizationentangled network,utilizing the engineering of spontaneous four-wave mixings(SFWMs)and a path-polarization *** does not require active optical switches which limit the communication speed,or trusted nodes which lead to potential security *** required frequency channels in the network grow linearly with the number of *** experimentally demonstrate a six-user fully connected network with on-chip SFWM processes motivated by four *** user in the network receives a frequency channel,and all fifteen connections between the users are implemented *** work opens up a promising scheme to efficiently construct fully connected large-scale networks.
Transformers have been widely studied in many natural language processing (NLP) tasks, which can capture the dependency from the whole sentence with a high parallelizability thanks to the multi-head attention and the ...
详细信息
Transformers have been widely studied in many natural language processing (NLP) tasks, which can capture the dependency from the whole sentence with a high parallelizability thanks to the multi-head attention and the position-wise feed-forward network. However, the above two components of transformers are position-independent, which causes transformers to be weak in modeling sentence structures. Existing studies commonly utilized positional encoding or mask strategies for capturing the structural information of sentences. In this paper, we aim at strengthening the ability of transformers on modeling the linear structure of sentences from three aspects, containing the absolute position of tokens, the relative distance, and the direction between tokens. We propose a novel bidirectional Transformer with absolute-position aware relative position encoding (BiAR-Transformer) that combines the positional encoding and the mask strategy together. We model the relative distance between tokens along with the absolute position of tokens by a novel absolute-position aware relative position encoding. Meanwhile, we apply a bidirectional mask strategy for modeling the direction between tokens. Experimental results on the natural language inference, paraphrase identification, sentiment classification and machine translation tasks show that BiAR-Transformer achieves superior performance than other strong baselines.
Slot filling,to extract entities for specific types of information(slot),is a vitally important modular of dialogue systems for automatic *** responses can be regarded as the weak supervision of patient *** this way,a...
详细信息
Slot filling,to extract entities for specific types of information(slot),is a vitally important modular of dialogue systems for automatic *** responses can be regarded as the weak supervision of patient *** this way,a large amount of weakly labeled data can be obtained from unlabeled diagnosis dialogue,alleviating the problem of costly and time-consuming data ***,weakly labeled data suffers from extremely noisy *** alleviate the problem,we propose a simple and effective Co-WeakTeaching *** method trains two slot filling models *** two models learn from two different weakly labeled data,ensuring learning from two ***,one model utilizes selected weakly labeled data generated by the other,*** model,obtained by the Co-WeakTeaching on weakly labeled data,can be directly tested on testing data or sequentially fine-tuned on a small amount of human-annotated *** results on these two settings illustrate the effectiveness of the method with an increase of 8.03%and 14.74%in micro and macro f1 scores,respectively.
Current motion detection and evaluation technologies face challenges such as limited scalability, imprecise feedback, and lack of personalized guidance. To address these challenges, this research integrated efficient ...
详细信息
Multi-View Stereo (MVS) is a long-standing and fundamental task in computer vision, which aims to reconstruct the 3D geometry of a scene from a set of overlapping images. With known camera parameters, MVS matches pixe...
详细信息
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr...
详细信息
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security problems brought by the mobile *** for Android system,due to its open source nature,malicious applications continue to emerge,which greatly threatens the data security of ***,this paper proposes a method of trusted embedded static measurement and data transmission protection architecture based on Android to reduce the risk of data leakage in the process of terminal storage and *** conducted detailed data and feasibility analysis of the proposed method from the aspects of time consumption,storage overhead and *** experimental results show that this method can detect Android system layer attacks such as self-booting of the malicious module and improve the security of data encryption and transmission process *** with the native system,the additional performance overhead is small.
Time series data plays a crucial role in intelligent transportation *** flow forecasting represents a precise estimation of future traffic flow within a specific region and time *** approaches,including sequence perio...
详细信息
Time series data plays a crucial role in intelligent transportation *** flow forecasting represents a precise estimation of future traffic flow within a specific region and time *** approaches,including sequence periodic,regression,and deep learning models,have shown promising results in short-term series ***,forecasting scenarios specifically focused on holiday traffic flow present unique challenges,such as distinct traffic patterns during vacations and the increased demand for long-term ***,the effectiveness of existing methods diminishes in such ***,we propose a novel longterm forecasting model based on scene matching and embedding fusion representation to forecast long-term holiday traffic *** model comprises three components:the similar scene matching module,responsible for extracting Similar Scene Features;the long-short term representation fusion module,which integrates scenario embeddings;and a simple fully connected layer at the head for making the final *** results on real datasets demonstrate that our model outperforms other methods,particularly in medium and long-term forecasting scenarios.
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many *** by the self-nonself discrimination par...
详细信息
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many *** by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network ***,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called ***,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept ***,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social *** evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social *** experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding *** experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components.
暂无评论