Optoelectronic devices are advantageous in in-memory light sensing for visual information processing,recognition,and storage in an energy-efficient ***,in-memory light sensors have been proposed to improve the energy,...
详细信息
Optoelectronic devices are advantageous in in-memory light sensing for visual information processing,recognition,and storage in an energy-efficient ***,in-memory light sensors have been proposed to improve the energy,area,and time efficiencies of neuromorphic computing *** study is primarily focused on the development of a single sensing-storage-processing node based on a two-terminal solution-processable MoS2 metal-oxide-semiconductor(MOS)charge-trapping memory structure—the basic structure for charge-coupled devices(CCD)—and showing its suitability for in-memory light sensing and artificial visual *** memory window of the device increased from 2.8 V to more than 6V when the device was irradiated with optical lights of different wavelengths during the program ***,the charge retention capability of the device at a high temperature(100 ℃)was enhanced from 36 to 64%when exposed to a light wavelength of 400 *** larger shift in the threshold voltage with an increasing operating voltage confirmed that more charges were trapped at the Al_(2)O_(3)/MoS_(2) interface and in the MoS_(2) layer.A small convolutional neural network was proposed to measure the optical sensing and electrical programming abilities of the *** array simulation received optical images transmitted using a blue light wavelength and performed inference computation to process and recognize the images with 91%*** study is a significant step toward the development of optoelectronic MOS memory devices for neuromorphic visual perception,adaptive parallel processing networks for in-memory light sensing,and smart CCD cameras with artificial visual perception capabilities.
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw...
详细信息
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to networks and brings huge challenge to servicing user *** caching,which utilizes the storage and computation resources of the edge to bring resources closer to end users,is a promising way to relieve network burden and enhance user *** this paper,we aim to survey the edge caching techniques from a comprehensive and systematic *** first present an overview of edge caching,summarizing the three key issues regarding edge caching,i.e.,where,what,and how to cache,and then introducing several significant caching *** then carry out a detailed and in-depth elaboration on these three issues,which correspond to caching locations,caching objects,and caching strategies,*** particular,we innovate on the issue“what to cache”,interpreting it as the classification of the“caching objects”,which can be further classified into content cache,data cache,and service ***,we discuss several open issues and challenges of edge caching to inspire future investigations in this research area.
It is not uncommon that real-world data are distributed with a long tail. For such data, the learning of deep neural networks becomes challenging because it is hard to classify tail classes correctly. In the literatur...
详细信息
We designed a large language model evaluation system based on open-ended questions. The system accomplished multidimensional evaluation of LLMs using open-ended questions, and it presented evaluation results with eval...
详细信息
Creating programming questions that are both meaningful and educationally relevant is a critical task in computerscience education. This paper introduces a fine-tuned GPT4o-mini model (C2Q). It is designed to generat...
详细信息
Colorectal intraepithelial neoplasia is a precancerous lesion of colorectal cancer, which is mainly diagnosed using pathological images. According to the characteristics of lesions, precancerous lesions can be classif...
详细信息
作者:
Ain, Qurat UlRana, TauseefAamana
Department of Computer Science Islamabad Pakistan NUST
Military College of Signals Department of Computer Software Engineering Islamabad Pakistan
Department of Software Engineering Rawalpindi Pakistan
To assess the quality, acceptability and user experience of interactive applications, usability is one of the most integral quality attributes. However, significant number of usability bugs are being experienced by th...
详细信息
The Internet of Vehicles(IoV)is a networking paradigm related to the intercommunication of vehicles using a *** a dynamic network,one of the key challenges in IoV is traffic management under increasing vehicles to avo...
详细信息
The Internet of Vehicles(IoV)is a networking paradigm related to the intercommunication of vehicles using a *** a dynamic network,one of the key challenges in IoV is traffic management under increasing vehicles to avoid ***,optimal path selection to route traffic between the origin and destination is *** research proposed a realistic strategy to reduce traffic management service response time by enabling real-time content distribution in IoV systems using heterogeneous network ***,this work proposed a novel use of the Ant Colony Optimization(ACO)algorithm and formulated the path planning optimization problem as an Integer Linear Program(ILP).This integrates the future estimation metric to predict the future arrivals of the vehicles,searching the optimal *** the mobile nature of IOV,fuzzy logic is used for congestion level estimation along with the ACO to determine the optimal *** model results indicate that the suggested scheme outperforms the existing state-of-the-art methods by identifying the shortest and most cost-effective ***,this work strongly supports its use in applications having stringent Quality of Service(QoS)requirements for the vehicles.
This article presents a protocol for conducting online think-aloud interviews as well as the reflections of the participants and interviewer on this process. The interviewer and participants commenced the interviews i...
详细信息
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity *** has led to the development and commercialization of Digital Twi...
详细信息
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity *** has led to the development and commercialization of Digital Twin(DT)*** widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical *** create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT *** high volume of user data and the ubiquitous communication systems in DTNs come with their own set of *** most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data ***,currently,there is not enough literature that focuses on privacy and security issues in DTN *** this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their ***,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective *** then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the *** also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the ***,we provide some open research issues and problems in the field of DTN privacy and security.
暂无评论