This paper introduces a novel RISC-V processor architecture designed for ultra-low-power and energy-efficient applications,particularly for Internet of things(IoT)*** architecture enables runtime dynamic reconfigurati...
详细信息
This paper introduces a novel RISC-V processor architecture designed for ultra-low-power and energy-efficient applications,particularly for Internet of things(IoT)*** architecture enables runtime dynamic reconfiguration of the datapath,allowing efficient balancing between computational performance and power *** is achieved through interchangeable components and clock gating mechanisms,which help the processor adapt to varying workloads.A prototype of the architecture was implemented on a Xilinx Artix 7 field programmable gate array(FPGA).Experimental results show significant improvements in power efficiency and *** mini configuration achieves an impressive reduction in power consumption,using only 36%of the baseline ***,the full configuration boosts performance by 8%over the *** flexible and adaptable nature of this architecture makes it highly suitable for a wide range of low-power IoT applications,providing an effective solution to meet the growing demands for energy efficiency in modern IoT devices.
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr...
详细信息
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security problems brought by the mobile *** for Android system,due to its open source nature,malicious applications continue to emerge,which greatly threatens the data security of ***,this paper proposes a method of trusted embedded static measurement and data transmission protection architecture based on Android to reduce the risk of data leakage in the process of terminal storage and *** conducted detailed data and feasibility analysis of the proposed method from the aspects of time consumption,storage overhead and *** experimental results show that this method can detect Android system layer attacks such as self-booting of the malicious module and improve the security of data encryption and transmission process *** with the native system,the additional performance overhead is small.
Images are present in everything these days, from satellite photography to medical scans, and they have a profound impact on how people view and understand the world. The daily generation of an ever-increasing volume ...
详细信息
This study introduces CLIP-Flow,a novel network for generating images from a given image or *** effectively utilize the rich semantics contained in both modalities,we designed a semantics-guided methodology for image-...
详细信息
This study introduces CLIP-Flow,a novel network for generating images from a given image or *** effectively utilize the rich semantics contained in both modalities,we designed a semantics-guided methodology for image-and text-to-image *** particular,we adopted Contrastive Language-Image Pretraining(CLIP)as an encoder to extract semantics and StyleGAN as a decoder to generate images from such ***,to bridge the embedding space of CLIP and latent space of StyleGAN,real NVP is employed and modified with activation normalization and invertible *** the images and text in CLIP share the same representation space,text prompts can be fed directly into CLIP-Flow to achieve text-to-image *** conducted extensive experiments on several datasets to validate the effectiveness of the proposed image-to-image synthesis *** addition,we tested on the public dataset Multi-Modal CelebA-HQ,for text-to-image *** validated that our approach can generate high-quality text-matching images,and is comparable with state-of-the-art methods,both qualitatively and quantitatively.
In this paper,the authors consider the stabilization and blow up of the wave equation with infinite memory,logarithmic nonlinearity and acoustic boundary *** authors discuss the existence of global solutions for the i...
详细信息
In this paper,the authors consider the stabilization and blow up of the wave equation with infinite memory,logarithmic nonlinearity and acoustic boundary *** authors discuss the existence of global solutions for the initial energy less than the depth of the potential well and investigate the energy decay estimates by introducing a Lyapunov ***,the authors establish the finite time blow up results of solutions and give the blow up time with upper bounded initial energy.
Gridlet allocation in a computational grid environment is a major research issue to obtain not only the efficient gridlet allocation technique but also the time needed to obtain the efficient allocation technique. Gri...
详细信息
Convex clustering,turning clustering into a convex optimization problem,has drawn wide *** overcomes the shortcomings of traditional clustering methods such as K-means,Density-Based Spatial Clustring of Applications w...
详细信息
Convex clustering,turning clustering into a convex optimization problem,has drawn wide *** overcomes the shortcomings of traditional clustering methods such as K-means,Density-Based Spatial Clustring of Applications with Noise(DBSCAN)and hierarchical clustering that can easily fall into the local optimal ***,convex clustering is vulnerable to the occurrence of outlier features,as it uses the Frobenius norm to measure the distance between data points and their corresponding cluster centers and evaluate *** accurately identify outlier features,this paper decomposes data into a clustering structure component and a normalized component that captures outlier *** from existing convex clustering evaluating features with the exact measurement,the proposed model can overcome the vast difference in the magnitude of different features and the outlier features can be efficiently identified and *** solve the proposed model,we design an efficient algorithm and prove the global convergence of the *** on both synthetic datasets and UCI datasets demonstrate that the proposed method outperforms the compared approaches in convex clustering.
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this ***,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its ***,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation ***,it is used toward secure communication application *** it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)***,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
Food waste is a significant contributor to greenhouse gas emissions when it ends up in *** turns out to be a sustainable solution to this problem,but it requires controlled and continuous airflow for optimal *** study...
详细信息
Food waste is a significant contributor to greenhouse gas emissions when it ends up in *** turns out to be a sustainable solution to this problem,but it requires controlled and continuous airflow for optimal *** study focused on the effect of aeration rates and airflow directions on food waste composting using a closed system with forced *** was entered into the composting vessel in three directions,which were upward,downward,and a combination of both *** direction was run at aeration rates of 0.1,0.4,and 0.7 L/*** findings showed that the compost pile aerated at 0.4 L/min by using two-directional airflow can reach the thermophilic temperature within half of the *** compost pile achieved temperature of 40.94℃ after 10.5 *** the compost experienced slightly high in moisture loss(4.3%),the compost still attained the standard values for *** compost produced from food waste could be applied in soil to improve its fertility.
The rapid growth of textual data across various platforms necessitates efficient real-time text classification and summarization methods. This paper presents a novel approach for developing a real-time text classifica...
详细信息
暂无评论