In the complex electromagnetic environment of modern electronic warfare, active deception jamming poses a serious threat to radar. This paper proposes the identification of active deception jamming based on residual n...
详细信息
Bicycle sharing system has emerged as a new mode of transportation in many big cities over the past *** the large number of bicycle stations distribute widely in the city,it is difficult to identify their unique attri...
详细信息
Bicycle sharing system has emerged as a new mode of transportation in many big cities over the past *** the large number of bicycle stations distribute widely in the city,it is difficult to identify their unique attributes and characteristics *** to the real bicycle hire dataset in Hangzhou,China,the clustering analysis for the bicycle stations based on the temporal flow data was carried out ***,based on the spatial distribution and temporal attributes of calculated clusters,visual diagram and map were used to vividly analyze the bicycle hire behavior related to station category and study the travel rules of *** experimental results demonstrate the relation between human mobility,the time of day,day of week and the station location.
Edge computing is an emerging paradigm to meet the ever-increasing computation demands from pervasive devices such as sensors, actuators, and smart things. Though the edge devices can execute complex applications, it ...
详细信息
There have two effective ways to improve the overall efficiency of the object-based distributed storage system, one is network caching technology and the other is metadata server cluster load balancing strategy. Under...
详细信息
Recently, wind and solar PV power industries have entered a stage of large-scale development in China. In this study, scenarios and an input-output model are built to assess the economic impacts of wind and solar PV p...
详细信息
Recently, wind and solar PV power industries have entered a stage of large-scale development in China. In this study, scenarios and an input-output model are built to assess the economic impacts of wind and solar PV power development in China from 2016-2030. Compared to the reference scenario, more added value is brought about in the development scenario while both scenarios generate the same amount of electricity. In the development scenario, the quantitative analysis implies that the added value brought about by wind and solar PV power industry, directly and directly, is about 5.0 times in 2030 more than that in 2015. During 2016-2030, about 8674 billion RMB (1300 billion dollars) and 6949 billion RMB (1042 billion dollars) added value could be generated respectively by wind power industry and solar PV power industry, accounting for about 0.58% and 0.47% of GDP. In addition, the main interdependent industries stimulated by wind power industry or solar PV power industry are different from those stimulated by coal-fired power industry.
The OraCDP disaster recovery system uses CDP disaster recovery technology based on the combination of block level, combining with the communication coupling between the underlying I/O and Oracle database. The experime...
详细信息
Machine Learning and Artificial Intelligence technology accelerates technological progress and promotes social development, but also brings many security problems. Machine learning models may be affected, deceived, co...
Machine Learning and Artificial Intelligence technology accelerates technological progress and promotes social development, but also brings many security problems. Machine learning models may be affected, deceived, controlled or destroyed at different stages, e.g. training and inference, which may lead to serious consequences. In view of the main stages of the life cycle of machine learning, we summarizes the related attack and defense technologies based on threat matrix, makes a comprehensive and systematic analysis on the security issues of machine learning, and puts forward several security protection suggestions for intelligent information systems.
The effectiveness evaluation of C4ISR is playing a more and more important role in its designing, developing and using. According to its characters, such as complexity and intelligence, the traditional evaluation meth...
详细信息
The effectiveness evaluation of C4ISR is playing a more and more important role in its designing, developing and using. According to its characters, such as complexity and intelligence, the traditional evaluation methods and systems are not feasible and effective enough. In this paper, a multi-agent based simulation and evaluation framework of C4ISR is advanced, which includes the architecture and the working procedure. The agent-based simulation model of C4ISR is put forward, according to which the C2 Agent, Armament Agent and the Evaluation Agent are founded. The interaction model between each agent is also designed. At final, based on the Swarm, a multi-agent based C4ISR effectiveness simulation and evaluation prototype is developed, through which NATO C2 effectiveness evaluation is thoroughly analyzed.
To offer the military personnel a good service of assisting them to get information about enemy's equipment outside Internet, we build a system named MilChat which includes a large language model that has the abil...
详细信息
ISBN:
(数字)9798350354973
ISBN:
(纸本)9798350354980
To offer the military personnel a good service of assisting them to get information about enemy's equipment outside Internet, we build a system named MilChat which includes a large language model that has the ability to generate texts and an application which is easy to use. The model of MilChat is fine-tuned by the method of LoRA with military datasets from the basic model, Qwen-7B-Chat which is opensource and has good performance. After fine-tuning, the new model has higher scores than the basic one. Besides, we use the method of Prompt Learning to limit the answers into a standard format. Therefore, it is more accurate and professional than the basic model. This study has also a value of industrial application.
The explosive growth in cloud-based services, big data analytics, and artificial intelligence related services provisioning leads to the rapid growth of construction of large scale Internet data centers (IDCs). Modern...
详细信息
暂无评论