With the rapid development of drones. The traditional 'manual feature extraction + classifier-based' object detection algorithm can no longer meet the accuracy requirements. Aiming at the problem that the reas...
详细信息
Calculating single-source shortest paths (SSSPs) rapidly and precisely from weighted digraphs is a crucial problem in graph theory. As a mathematical model of processing uncertain tasks, rough sets theory (RST) has be...
详细信息
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions cal...
详细信息
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions called shards that run independently and in parallel,shardingbased UAV systems can support a large number of search and rescue UAVs with improved scalability,thereby enhancing the rescue ***,the lack of adaptability and interoperability still hinder the application of sharded blockchain in UAV SAR *** refers to making adjustments to the blockchain towards real-time surrounding situations,while interoperability refers to making cross-shard interactions at the mission *** address the above challenges,we propose a blockchain UAV system for SAR missions based on dynamic sharding *** from the benefits in scalability brought by sharding,our system improves adaptability by dynamically creating configurable and mission-exclusive shards,and improves interoperability by supporting calls between smart contracts that are deployed on different *** implement a prototype of our system based on Quorum,give an analysis of the improved adaptability and interoperability,and conduct experiments to evaluate the *** results show our system can achieve the above goals and overcome the weakness of blockchain-based UAV systems in SAR scenarios.
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted *** traditional outsourcing computation model forbids communication between p...
详细信息
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted *** traditional outsourcing computation model forbids communication between players,but it has little *** on the game theory,this paper establishes an outsourcing computation model which is more in line with the actual ***,we construct a structural mapping relationship between security outsourcing computation and the optimization ***,by designing the individual potential function and the global potential function,the individual goal is consistent with the global goal to ensure the correctness of the calculation ***,in the information exchange environment between calculators,we construct a Zero-determinant strategy to ensure that the calculator chooses the strategy according to the predetermined target.
With the popularization of the Internet and the rapid development of artificial intelligence, the requirements for the accuracy of sentiment analysis on text data have been continuously improved, and aspect-level sent...
详细信息
Grammatical error correction aims to correct ungrammatical sentences automatically. Recently, some work has demonstrated the excellent capabilities of closed-source Large Language Models (LLMs, e.g., ChatGPT) in gramm...
详细信息
The Cooling Storage Ring of the Heavy Ion Research Facility in Lanzhou(HIRFL-CSR)was constructed to study nuclear physics,atomic physics,interdisciplinary science,and related *** External Target Facility(ETF)is locate...
详细信息
The Cooling Storage Ring of the Heavy Ion Research Facility in Lanzhou(HIRFL-CSR)was constructed to study nuclear physics,atomic physics,interdisciplinary science,and related *** External Target Facility(ETF)is located in the main ring of the *** gamma detector of the ETF is built to measure emitted gamma rays with energies below 5 MeV in the center-of-mass frame and is planned to measure light fragments with energies up to 300 *** readout electronics for the gamma detector were designed and *** readout electronics consist of thirty-two front-end cards,thirty-two readout control units(RCUs),one common readout unit,one synchronization&clock unit,and one sub-trigger *** using the real-time peak-detection algorithm implemented in the RCU,the data volume can be significantly *** addition,trigger logic selection algorithms are implemented to improve the selection of useful events and reduce the data *** test results show that the integral nonlinearity of the readout electronics is less than 1%,and the energy resolution for measuring the 60 Co source is better than 5.5%.This study discusses the design and performance of the readout electronics.
Oil-tea camellia is recognized as a healthy edible oil in the world. It has the functions of lowering blood pressure, lowering blood lipids and softening blood vessels, and it has high comprehensive utilization value....
详细信息
Few-shot object counting and detection aim to count objects along with their bounding boxes specified by exemplar bounding boxes. Current mainstream methods predict density maps by applying similarity between exemplar...
详细信息
As an important approach to overcome data silos and privacy concerns in deep learning, federated learning, which can jointly train the global model and keep data local, has shown remarkable performance in a range of i...
详细信息
暂无评论