th This volume is an edition of the papers selected from the 12 FIRA RoboWorld C- gress, held in Incheon, Korea, August 16–18, 2009. The Federation of International Robosoccer Association (FIRA – www. fira. net) is ...
详细信息
ISBN:
(数字)9783642039867
ISBN:
(纸本)9783642039850
th This volume is an edition of the papers selected from the 12 FIRA RoboWorld C- gress, held in Incheon, Korea, August 16–18, 2009. The Federation of International Robosoccer Association (FIRA – www. fira. net) is a non-profit organization, which organizes robotic competitions and meetings around the globe annually. The RoboSoccer competitions started in 1996 and FIRA was - tablished on June 5, 1997. The Robot Soccer competitions are aimed at promoting the spirit of science and technology to the younger generation. The congress is a forum in which to share ideas and future directions of technologies, and to enlarge the human networks in robotics area. The objectives of the FIRA Cup and Congress are to explore the technical dev- opment and achievement in the field of robotics, and provide participants with a robot festival including technical presentations, robot soccer competitions and exhibits - der the theme “Where Theory and Practice Meet. ” th Under the umbrella of the 12 FIRA RoboWorld Incheon Congress 2009, six int- national conferences were held for greater impact and scientific exchange: th • 6 International Conference on Computational Intelligence, Robotics and Autonomous Systems (CIRAS) th • 5 International Symposium on Autonomous Minirobots for Research and Edutainment (AMiRE) • International Conference on Social Robotics (ICSR) • International Conference on Advanced Humanoid Robotics Research (ICAHRR) • International Conference on Entertainment Robotics (ICER) • International Robotics Education Forum (IREF) This volume consists of selected quality papers from the six conferences.
Solid State Drives (SSDs) based on the NVMe Zoned Namespaces (ZNS) interface can notably reduce the costs of address mapping, garbage collection, and over-provisioning by dividing the storage space into multiple zones...
详细信息
Solid State Drives (SSDs) based on the NVMe Zoned Namespaces (ZNS) interface can notably reduce the costs of address mapping, garbage collection, and over-provisioning by dividing the storage space into multiple zones for sequential writes and random reads. The Log-Structured Merge (LSM) tree, which is extensively used in key-value storage systems, converts random writes to sequential writes, hence a suitable scenario to utilize ZNS SSDs. However, LSM tree associated data significantly varies in lifetime due to the levels and merging mechanisms of the LSM tree. Therefore, without an accurate method to estimate data lifetime, data with disparate lifetimes may be placed in the same zone, thus causing low space utilization and high write amplification within the *** address these issues, the paper proposes two data overlapping aware optimizations to realize intelligent data placement: a zone allocation scheme and a garbage collection scheme. The key technique of these optimizations is an accurate data-lifetime estimation by considering both the associated tree level of the data and the data overlapping ratio between the data and those in the neighboring level. Using the estimation technique, the zone allocation optimization can place data with similar lifetimes in the same zone. Besides, the garbage collection optimization can reclaim zones in an adaptive manner based on overlapping ratios to reduce the amount of data migration. Experimental results demonstrate that the optimization schemes effectively reduce garbage collection-incurred data copy by average factors of 2.11 × and 1.50 × in comparison to a conventional work and a state-of-the-art work, respectively. Consequently, the proposed work successfully alleviates the write amplification effect by 18% and 6%, compared to the conventional work and the state-of-the-art work, respectively.
Over the last few decades, research on handwriting recognition has made impressive progress. The research and development on handwritten word recognition are to a large degree motivated by many application areas, such...
详细信息
ISBN:
(数字)9783540448501
ISBN:
(纸本)9783540401773;9783642072802
Over the last few decades, research on handwriting recognition has made impressive progress. The research and development on handwritten word recognition are to a large degree motivated by many application areas, such as automated postal address and code reading, data acquisition in banks, text-voice conversion, security, etc. As the prices of scanners, com puters and handwriting-input devices are falling steadily, we have seen an increased demand for handwriting recognition systems and software pack ages. Some commercial handwriting recognition systems are now available in the market. Current commercial systems have an impressive performance in recognizing machine-printed characters and neatly written texts. For in stance, High-Tech Solutions in Israel has developed several products for container ID recognition, car license plate recognition and package label recognition. Xerox in the U. S. has developed TextBridge for converting hardcopy documents into electronic document files. In spite of the impressive progress, there is still a significant perfor mance gap between the human and the machine in recognizing off-line unconstrained handwritten characters and words. The difficulties encoun tered in recognizing unconstrained handwritings are mainly caused by huge variations in writing styles and the overlapping and the interconnection of neighboring characters. Furthermore, many applications demand very high recognition accuracy and reliability. For example, in the banking sector, although automated teller machines (ATMs) and networked banking sys tems are now widely available, many transactions are still carried out in the form of cheques.
The advancement of the Internet of Medical Things (IoMT) has led to the emergence of various health and emotion care services, e.g., health monitoring. To cater to increasing computational requirements of IoMT service...
详细信息
The advancement of the Internet of Medical Things (IoMT) has led to the emergence of various health and emotion care services, e.g., health monitoring. To cater to increasing computational requirements of IoMT services, Mobile Edge Computing (MEC) has emerged as an indispensable technology in smart health. Benefiting from the cost-effectiveness of deployment, unmanned aerial vehicles (UAVs) equipped with MEC servers in Non-Orthogonal Multiple Access (NOMA) have emerged as a promising solution for providing smart health services in proximity to medical devices (MDs). However, the escalating number of MDs and the limited availability of communication resources of UAVs give rise to a significant increase in transmission latency. Moreover, due to the limited communication range of UAVs, the geographically-distributed MDs lead to workload imbalance of UAVs, which deteriorates the service response delay. To this end, this paper proposes a UAV-enabled Distributed computation Offloading and Power control method with Multi-Agent, named DOPMA, for NOMA-based IoMT environment. Specifically, this paper introduces computation and transmission queue models to analyze the dynamic characteristics of task execution latency and energy consumption. Moreover, a credit assignment scheme-based reward function is designed considering both system-level rewards and rewards tailored to each MD, and an improved multi-agent deep deterministic policy gradient algorithm is developed to derive offloading and power control decisions independently. Extensive simulations demonstrate that the proposed method outperforms existing schemes, achieving \(7.1\%\) reduction in energy consumption and \(16\%\) decrease in average delay.
Graph pattern mining is essential for deciphering complex networks. In the real world, graphs are dynamic and evolve over time, necessitating updates in mining patterns to reflect these changes. Traditional methods us...
详细信息
Graph pattern mining is essential for deciphering complex networks. In the real world, graphs are dynamic and evolve over time, necessitating updates in mining patterns to reflect these changes. Traditional methods use fine-grained incremental computation to avoid full re-mining after each update, which improves speed but often overlooks potential gains from examining inter-update interactions holistically, thus missing out on overall efficiency *** this paper, we introduce Cheetah, a dynamic graph mining system that processes updates in a coarse-grained manner by leveraging exploration domains. These domains exploit the community structure of real-world graphs to uncover data reuse opportunities typically missed by existing approaches. Exploration domains, which encapsulate extensive portions of the graph relevant to updates, allow multiple updates to explore the same regions efficiently. Cheetah dynamically constructs these domains using a management module that identifies and maintains areas of redundancy as the graph changes. By grouping updates within these domains and employing a neighbor-centric expansion strategy, Cheetah minimizes redundant data accesses. Our evaluation of Cheetah across five real-world datasets shows it outperforms current leading systems by an average factor of 2.63 ×.
The agriculture is the backbone of economic system, and it plays an essential part in the survival of a nation’s prosperity. In addition to providing raw materials and food, it also offers numerous employment opportu...
详细信息
The agriculture is the backbone of economic system, and it plays an essential part in the survival of a nation’s prosperity. In addition to providing raw materials and food, it also offers numerous employment opportunities. Consequently, agriculture necessitates modern technology to increase productivity. In these circumstances, Wireless Sensor Networks (WSNs) are used to detect climatic parameters like light, humidity, carbon dioxide, acidity, soil moisture, and temperature in an agricultural field. However, the research that is being done at the moment is unable to circumvent the issue that safety and effectiveness cannot coexist. Several studies employ time-consuming cryptographic security structures, whereas the majority of lightweight systems are designed without reviewing certain security aspects like resistance to ephemeral secret leakage (ESL) attacks, perfect forward secrecy, and so on. According to our opinion, this issue may be overcome through the use of lightweight cryptographic primitives, paying particular attention to protocol weaknesses, and keeping in mind the ever-changing security needs of individuals. We present an extensive lightweight three-factor authentication protocol with diverse security criteria, along with the adaptive privacy preservation, that is suited for user-friendly situation in the WSN enviroment. This is accomplished by removing all extraneous cryptographic structures. It has been illustrated that proposed protocol is much better in terms of the privacy and security aspects via the usage of security aspects, proof of the real-or-random (ROR) model, protocols of internet security, and applications that are subjected to experimental validation utilizing automated validation. and comparison with other protocols’ security aspects. The performance analysis shows how superior our proposed protocol is to other competing protocols in terms of communication and computational overheads, with respective efficiencies of 53% and 39%. Moreov
暂无评论