China's distinctive resource endowment, characterized by abundant coal, limited oil, and scarce gas, shapes the long-term development focus on coal power. However, the requirement for stable combustion imposes lim...
详细信息
The promotion of quantum network applications demands the scalable connection of quantum *** is preferable to set up multiple logical networks coexisting on a single physical network infrastructure to accommodate a la...
详细信息
The promotion of quantum network applications demands the scalable connection of quantum *** is preferable to set up multiple logical networks coexisting on a single physical network infrastructure to accommodate a larger number of *** we present a quantum virtual network architecture that offers this level of scalability,without being constrained to a fixed physical-layer network relying solely on passive multiplexing *** architecture can be understood as arising from the superposition of a fully connected entanglement distribution network and port-based virtual local area network,which group multiusers by access *** terms of hardware,we leverage a semiconductor chip with a high figure-of-merit modal overlap to directly generate high-quality polarization entanglement,and a streamlined polarization analysis module,which requires only one single-photon detector for each end *** experimentally perform the BBM92 QKD protocol on the five-user quantum virtual network and demonstrate voice and image encryption on a campus area *** results may provide insights into the realization of large-scale quantum networks with integrated and cost-efficient photonic architecture.
作者:
Xu, JieZhou, JiantaoCollege of Computer Science
Engineering Research Center of Ecological Big Data Ministry of Education National and Local Joint Engineering Research Center of Mongolian Intelligent Information Processing Technology Inner Mongolia Cloud Computing and Service Software Engineering Laboratory Inner Mongolia Social Computing and Data Processing Key Laboratory Inner Mongolia Discipline Inspection and Supervision Big Data Key Laboratory Inner Mongolia Big Data Analysis Technology Engineering Laboratory Inner Mongolia University Hohhot China
Anomaly detection aims to find outliers data that do not conform to expected behaviors in a specific scenario, which is indispensable and critical in current safety environments related studies. However, when performi...
详细信息
Multiphase flows are of great importance for the sustainable utilization of geological resources and ecological protection. Numerical simulation, as a general and powerful approach for multiphase flow modeling, faces ...
详细信息
When a human body moves within the coverage range of Wi-Fi signals,the reflected Wi-Fi signals by the various parts of the human body change the propagation path,so analysis of the channel state data can achieve the p...
详细信息
When a human body moves within the coverage range of Wi-Fi signals,the reflected Wi-Fi signals by the various parts of the human body change the propagation path,so analysis of the channel state data can achieve the perception of the human *** extracting the Channel State Information(CSI)related to human motion from the Wi-Fi signals and analyzing it with the introduced machine learning classification algorithm,the human motion in the spatial environment can be *** the basis of this theory,this paper proposed an algorithm of human behavior recognition based on CSI wireless sensing to realize deviceless and over-the-air slide *** algorithm collects the environmental information containing upward or downward wave in a conference room scene,uses the local outlier factor detection algorithm to segment the actions,and then the time domain features are extracted to train Support Vector Machine(SVM)and eXtreme Gradient Boosting(XGBoost)classification *** experimental results show that the average accuracy of the XGBoost module sensing slide flipping can reach 94%,and the SVM module can reach 89%,so the module could be extended to the field of smart classroom and significantly improve speech efficiency.
作者:
Yuan, ShuaiWen, KeZhang, FengXiong, JianqiangShenyang Jianzhu University
Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang Branch of National Special Computer Engineering Technology Research Center School of Computer Science and Engineering Shengyang110168 China Shenyang Jianzhu University
School of Electrical and Control Engineering Shengyang110168 China
As for the path planning of robotic arms, Deep Reinforcement Learning (DRL) algorithms have recently been developed. However, the high-dimensional action space and state space will result in reward sparsity and low tr...
详细信息
Remote sensing(RS)technologies are extensively exploited by scientists and a vast audience of local authorities,urban managers,and city *** regions,geohazard-prone areas,and highly populated cities represent natural l...
详细信息
Remote sensing(RS)technologies are extensively exploited by scientists and a vast audience of local authorities,urban managers,and city *** regions,geohazard-prone areas,and highly populated cities represent natural laboratories to apply RS technologies and test new *** the last decades,many efforts have been spent on improving Earth's surface monitoring,including intensifying Earth Observation(EO)operations by the major national space *** oversee to plan and make operational constellations of satellite sensors providing the scientific community with extensive research and development oppor-tunities in the geoscience *** instance,within this framework,the European Space Agency(ESA)and the Ministry of Science and technology of China(MOST)have sponsored,since the early 2000s,the DRAGON initiative jointly carried out by the European and Chinese RS scientific *** manuscript aims to provide a synthetic overview of some research activities and new methods recently designed and applied and trace the route for further *** main findings are related to ⅰ)the analysis of flood risk in China,ⅱ)the potential of new methods for the estimation and removal of ground displacement biases in small-baseline oriented interferometric Synthetic Aperture Radar(SAR)methods,ⅲ)the analy-sis of the inundation risk in low-lying regions using coherent and incoherent SAR methods;andⅳ)the use of SAR-based technologies for marine applications.
datasets of visualization play a crucial role in automating data-driven visualization pipelines, serving as the foundation for supervised model training and algorithm benchmarking. In this paper, we survey the literat...
详细信息
With the growing requirements of web applications,web components are developed to package the implementation of commonly-used features for *** some cases,the developer may want to reuse some features which cannot be c...
详细信息
With the growing requirements of web applications,web components are developed to package the implementation of commonly-used features for *** some cases,the developer may want to reuse some features which cannot be customized by the component’s ***/she has to extract the implementation by *** is labor-intensive and *** the widely-used test cases which can be useful to specify the software features,a test-driven approach is proposed to extract the implementation of the desired features in web *** satisfaction of the user^requirements is transformed into the passing rate of user-specified test *** this way,the quality of the extraction result can be evaluated ***,a record/replay-based GUI test generation method is proposed to ensure that the extraction result has the correct GUI *** extract the feature implementation,a hierarchical genetic algorithm is proposed to find the code snippet that can pass all the tests and has the approximate smallest *** compare our method with two existing feature extraction *** result shows that our method can extract the correct implementation with the minimum size.A human-subject study is conducted to show the effectiveness and weaknesses of our method in helping users extract the features.
In this paper, we study steady flows in data streams, which refers to those flows whose arrival rate is always non-zero and around a fixed value for several consecutive time windows. To find steady flows in real time,...
In this paper, we study steady flows in data streams, which refers to those flows whose arrival rate is always non-zero and around a fixed value for several consecutive time windows. To find steady flows in real time, we propose a novel sketch, SteadySketch, aiming to accurately report steady flows with limited memory. To the best of our knowledge, this is the first work to define and find steady flows in data streams. The key novelty of SteadySketch is our proposed reborn technique, which reduces the required memory space by 75%. Experimental results show that SteadySketch improves the Precision Rate (PR) by 81.1% and reduces the Average Relative Error (ARE) by 955.3× compared with the strawman solution. Finally, we provide a concrete case: cache prefetch, and prove that SteadySketch can effectively improve the cache hit ratio. All related codes of SteadySketch are open-source and available at GitHub.
暂无评论