The unprecedented growth of industrial Internet of Things applications requires the evolution of wireless networked control system (WNCS). However, independent designs between communication and control without conside...
详细信息
Calculating single-source shortest paths (SSSPs) rapidly and precisely from weighted digraphs is a crucial problem in graph theory. As a mathematical model of processing uncertain tasks, rough sets theory (RST) has be...
详细信息
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions cal...
详细信息
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions called shards that run independently and in parallel,shardingbased UAV systems can support a large number of search and rescue UAVs with improved scalability,thereby enhancing the rescue ***,the lack of adaptability and interoperability still hinder the application of sharded blockchain in UAV SAR *** refers to making adjustments to the blockchain towards real-time surrounding situations,while interoperability refers to making cross-shard interactions at the mission *** address the above challenges,we propose a blockchain UAV system for SAR missions based on dynamic sharding *** from the benefits in scalability brought by sharding,our system improves adaptability by dynamically creating configurable and mission-exclusive shards,and improves interoperability by supporting calls between smart contracts that are deployed on different *** implement a prototype of our system based on Quorum,give an analysis of the improved adaptability and interoperability,and conduct experiments to evaluate the *** results show our system can achieve the above goals and overcome the weakness of blockchain-based UAV systems in SAR scenarios.
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted *** traditional outsourcing computation model forbids communication between p...
详细信息
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted *** traditional outsourcing computation model forbids communication between players,but it has little *** on the game theory,this paper establishes an outsourcing computation model which is more in line with the actual ***,we construct a structural mapping relationship between security outsourcing computation and the optimization ***,by designing the individual potential function and the global potential function,the individual goal is consistent with the global goal to ensure the correctness of the calculation ***,in the information exchange environment between calculators,we construct a Zero-determinant strategy to ensure that the calculator chooses the strategy according to the predetermined target.
Grammatical error correction aims to correct ungrammatical sentences automatically. Recently, some work has demonstrated the excellent capabilities of closed-source Large Language Models (LLMs, e.g., ChatGPT) in gramm...
详细信息
The Cooling Storage Ring of the Heavy Ion Research Facility in Lanzhou(HIRFL-CSR)was constructed to study nuclear physics,atomic physics,interdisciplinary science,and related *** External Target Facility(ETF)is locate...
详细信息
The Cooling Storage Ring of the Heavy Ion Research Facility in Lanzhou(HIRFL-CSR)was constructed to study nuclear physics,atomic physics,interdisciplinary science,and related *** External Target Facility(ETF)is located in the main ring of the *** gamma detector of the ETF is built to measure emitted gamma rays with energies below 5 MeV in the center-of-mass frame and is planned to measure light fragments with energies up to 300 *** readout electronics for the gamma detector were designed and *** readout electronics consist of thirty-two front-end cards,thirty-two readout control units(RCUs),one common readout unit,one synchronization&clock unit,and one sub-trigger *** using the real-time peak-detection algorithm implemented in the RCU,the data volume can be significantly *** addition,trigger logic selection algorithms are implemented to improve the selection of useful events and reduce the data *** test results show that the integral nonlinearity of the readout electronics is less than 1%,and the energy resolution for measuring the 60 Co source is better than 5.5%.This study discusses the design and performance of the readout electronics.
The Wiener index W(G) of a graph G is a widely used topological invariant, which is defined as the sum of the shortest path distances between all pairs of vertices in G. It has significant applications in chemistry, n...
详细信息
With the popularization of the Internet and the rapid development of artificial intelligence, the requirements for the accuracy of sentiment analysis on text data have been continuously improved, and aspect-level sent...
详细信息
Oil-tea camellia is recognized as a healthy edible oil in the world. It has the functions of lowering blood pressure, lowering blood lipids and softening blood vessels, and it has high comprehensive utilization value....
详细信息
Face recognition has emerged as a new trend in the era of intelligence due to the rapid growth of artificial intelligence and other cutting-edge technologies. This paper investigates the research and application of fa...
详细信息
Face recognition has emerged as a new trend in the era of intelligence due to the rapid growth of artificial intelligence and other cutting-edge technologies. This paper investigates the research and application of face recognition technology based on deep learning through a comprehensive literature review and analysis. The discussion encompasses the classification and processes of facial recognition technology, the incorporation of deep learning into face recognition, and the application of face recognition across a variety of *** emphasis is placed on the use of deep belief networks(DBN) and convolutional neural networks(CNN) in face recognition. Face recognition technology, facilitated by deep learning techniques, has become pervasive in our daily lives, vastly enhancing our quality of life and productivity.
暂无评论