To obtain personalized outcomes for the low-light image enhancement, a novel interactive algorithm based on the well-designed Gamma Curve is proposed to enrich the enhancement techniques. Different from the previous w...
详细信息
Due to rapid 3D acquisition advancements, LiDAR point clouds are prevalent in emerging applications like heritage preservation, mobile robotics, and remote sensing. Yet, the sheer data volume poses challenges for tran...
详细信息
In security-critical applications, malicious Trojan Horses embedded in a CPU core could impose great threats on the security of an SoC. In this work, we propose a "Trojan-Horse detection framework" using a c...
详细信息
ISBN:
(数字)9798331529161
ISBN:
(纸本)9798331529178
In security-critical applications, malicious Trojan Horses embedded in a CPU core could impose great threats on the security of an SoC. In this work, we propose a "Trojan-Horse detection framework" using a cross-auditing scheme. Our framework takes a target RISC-V core, and then pairs it up with another reference RISC-V core to conduct the functional simulation using a set of benchmark programs. The "care outputs" of both cores are compared to reveal the potential Trojan Horses in the target core. A set of well-known Trojan Horses are implanted into an open-source RISC-V core to evaluate the effectiveness of this framework. We found that we can successfully detect almost every implanted Trojan Horse as long as it has been activated and manifested by the benchmark programs.
1 Introduction Reliability is defined as the probability that a system or component will perform its required function for a specified period of time under specified operating conditions(Ebeling,2019).Traditional reli...
详细信息
1 Introduction Reliability is defined as the probability that a system or component will perform its required function for a specified period of time under specified operating conditions(Ebeling,2019).Traditional reliability theory assumes that both a system and its components have only two possible states in the operation stage,either perfectly functioning or completely ***,as engineered systems become more sophisticated,involving larger sizes,increased functionality,and greater intelligence,and with advancements in sensing technologies,it has been extensively observed that systems and components exhibit multiple distinct states as they deteriorate over *** failure behavior,damage severity,performance capacity,and operational efficiency of the system and components vary among these states(Lisnianski et al.,2018).It,therefore,necessitates the development of advanced reliability theories and methodologies that are capable of characterizing these systems and components with multi-state nature.
The paper aims to enhance the controllability of a standalone cascade control system with Internet architecture and promote the system to be accessible by remote students. The user interactive web page is developed by...
详细信息
Polyps are mostly noncancerous tumors that occur in several locations in the digestive tract but are most com-monly found in the colon. But over time, some colon polyps can develop into cancer, especially Adenomas tha...
详细信息
Lamb waves, characterized by slow attenuation, short wavelength, and sensitivity to damage, have been widely utilized in the field of composite material damage detection. In addressing the issue of damage localization...
详细信息
Precise and automatic segmentation of the left ventricle (LV) in cardiac magnetic resonance imaging (MRI) can help cardiologists make accurate diagnoses and decisions. In the revolution of Deep Learning, many LV image...
详细信息
This paper introduces Permutation Transient Attention Encoders as a novel and efficient approach for NLOS reconstruction. Our method, utilizing Transient Attention Blocks and Permute-MLP, enhances transient feature ex...
详细信息
The main aim of future mobile networks is to provide secure,reliable,intelligent,and seamless *** also enables mobile network operators to ensure their customer’s a better quality of service(QoS).Nowadays,Unmanned Ae...
详细信息
The main aim of future mobile networks is to provide secure,reliable,intelligent,and seamless *** also enables mobile network operators to ensure their customer’s a better quality of service(QoS).Nowadays,Unmanned Aerial Vehicles(UAVs)are a significant part of the mobile network due to their continuously growing use in various *** better coverage,cost-effective,and seamless service connectivity and provisioning,UAVs have emerged as the best choice for telco *** can be used as flying base stations,edge servers,and relay nodes in mobile *** the other side,Multi-access EdgeComputing(MEC)technology also emerged in the 5G network to provide a better quality of experience(QoE)to users with different QoS ***,UAVs in a mobile network for coverage enhancement and better QoS face several challenges such as trajectory designing,path planning,optimization,QoS assurance,mobilitymanagement,*** efficient and proactive path planning and optimization in a highly dynamic environment containing buildings and obstacles are ***,an automated Artificial Intelligence(AI)enabled QoSaware solution is needed for trajectory planning and ***,this work introduces a well-designed AI and MEC-enabled architecture for a UAVs-assisted future *** has an efficient Deep Reinforcement Learning(DRL)algorithm for real-time and proactive trajectory planning and *** also fulfills QoS-aware service provisioning.A greedypolicy approach is used to maximize the long-term reward for serving more users *** results reveal the superiority of the proposed DRL mechanism for energy-efficient and QoS-aware trajectory planning over the existing models.
暂无评论