In smaller components of industrial or energy automation systems, such as device controllers of Protection and Control (PAC) systems in smart grids, controller functionality is tightly coupled with the physical device...
详细信息
ISBN:
(数字)9781665464543
ISBN:
(纸本)9781665464550
In smaller components of industrial or energy automation systems, such as device controllers of Protection and Control (PAC) systems in smart grids, controller functionality is tightly coupled with the physical device or sensor capabilities. At this level, software is small and therefore easy to maintain and test. However, when multiple controllers are interconnected and higher-level functionality is added, software applications grow exponentially, and ensuring maintainability becomes proportionally challenging. In this paper, we extend the IEC 61499 reference architecture used to develop industrial automation software with the principles of Abstraction Layered Architecture (ALA) that has shown up to 400% improvements in industrial software maintainability. We show that even a light application of abstraction layering on the top, application-level of IEC 61499 applications makes them significantly more readable and slightly more maintainable. More concrete gains in maintainability are expected when abstraction layering is integrated into lower layers.
For many distribution network operators (DNOs), the phases to which single-phase loads are connected is unknown. This can present a problem in terms of unbalanced loading across phases, which will be significantly exa...
详细信息
Motion tracking via Inertial Measurement Units(IMUs)on mobile and wearable devices has attracted significant interest in recent ***-accuracy IMU-tracking can be applied in various applications,such as indoor navigatio...
详细信息
Motion tracking via Inertial Measurement Units(IMUs)on mobile and wearable devices has attracted significant interest in recent ***-accuracy IMU-tracking can be applied in various applications,such as indoor navigation,gesture recognition,text input,*** efforts have been devoted to improving IMU-based motion tracking in the last two decades,from early calibration techniques on ships or airplanes,to recent arm motion models used on wearable smart *** this paper,we present a comprehensive survey on IMU-tracking techniques on mobile and wearable *** also reveal the key challenges in IMU-based motion tracking on mobile and wearable devices and possible directions to address these challenges.
Despite their stunning performance, developing deep learning models from scratch is a formidable task. Therefore, it popularizes Machine-Learning-as-a-Service (MLaaS), where general users can access the trained models...
Despite their stunning performance, developing deep learning models from scratch is a formidable task. Therefore, it popularizes Machine-Learning-as-a-Service (MLaaS), where general users can access the trained models of MLaaS providers via Application programming Interfaces (APIs) on a pay-per-query basis. Unfortunately, the success of MLaaS is under threat from model extraction attacks, where attackers intend to extract a local model of equivalent functionality to the target MLaaS model. However, existing studies on model extraction of text analytics APIs frequently assume adversaries have strong knowledge about the victim model, like its architecture and parameters, which hardly holds in practice. Besides, since the attacker's and the victim's training data can be considerably discrepant, it is non-trivial to perform efficient model extraction. In this paper, to advance the understanding of such attacks, we propose a framework, PEEP, for practical and efficient model extraction of sentiment analysis APIs with only query access. Specifically, PEEP features a learning-based scheme, which employs out-of-domain public corpora and a novel query strategy to construct proxy training data for model extraction. Besides, PEEP introduces a greedy search algorithm to settle an appropriate architecture for the extracted model. We conducted extensive experiments with two victim models across three datasets and two real-life commercial sentiment analysis APIs. Experimental results corroborate that PEEP can consistently outperform the state-of-the-art baselines in terms of effectiveness and efficiency.
Foreign Exchange market is the world's largest daily currency turnover. Two of the popular currencies Euro and Pound sterling traded against the US Dollar. Since the Russia and Ukraine war started in February 2022...
详细信息
Multispectral stereoscopy is an emerging field. A lot of work has been done in classical stereoscopy, but multispectral stereoscopy is not studied as frequently. This type of stereoscopy can be used in autonomous vehi...
详细信息
Origami structures have been widely explored in robotics due to their many potential advantages. Origami robots can be very compact, as well as cheap and efficient to produce. In particular, they can be constructed in...
详细信息
Irregular algorithms are often encountered in highly data-centric application domains. These algorithms operate on irregular data structures such as sparse graphs with irregular access patterns, which may also modify ...
详细信息
ISBN:
(数字)9781665497473
ISBN:
(纸本)9781665497480
Irregular algorithms are often encountered in highly data-centric application domains. These algorithms operate on irregular data structures such as sparse graphs with irregular access patterns, which may also modify the underlying topology unpredictably. High computational time and inherent data parallelism present in these algorithms motivate the use of GPUs for speeding things up, however there are challenges for their efficient implementations due to: difficulty in protecting the shared data consistency in the presence of concurrent dynamic transactions; irregular access patterns due to unstructured data structures; and dynamic structural modifications of the underlying topology. One approach to overcome these challenges is to use software Transactional Memory (STM). However, overly complex design and implementations of contemporary STM-based approaches and lack of proper framework to employ them in conjunction with the irregular algorithms stalls their adoption by the programming community. To overcome some of these challenges, this research proposes a lightweight STM with a simple design (Lite GSTM), based on a lock stealing algorithm, and an associated extensible framework to hide the complexity of the STM from a programmer. The framework is extensible by allowing plug-ins of customized STMs designed for different needs of transactions. The use of the framework is elaborated with two use cases which employ completely different irregular algorithms, however, have some common features: the underlying data structure is a graph, and the graph is structurally modified (coarsened) unpredictably in the course of execution. The paper presents the performance comparisons of the STM-based implementations with respect to their sequential and non-STM based counterparts, which show promising results.
In recent years, next Point-of-Interest (POI) recommendation is essential for many location-based services, aiming to predict the most likely POI a user will visit next. Current research employs graph-based and sequen...
详细信息
In recent years, next Point-of-Interest (POI) recommendation is essential for many location-based services, aiming to predict the most likely POI a user will visit next. Current research employs graph-based and sequential methods, which have significantly improved performance. However, there are still limitations: numerous methods overlook the fact that user intent is constantly changing and complex. Furthermore, prior studies have seldom addressed spatiotemporal correlations while considering differences in user behavior patterns. Additionally, implicit feedback contains noise. To address these issues, we propose a recommender model named HGDRec for the next POI recommendation. Specifically, we introduce an approach for extracting trajectory intent by integrating multi-dimensional trajectory representations to achieve a multi-level understanding of user trajectories. Then, by analyzing users’ long trajectories, we construct global hypergraph structures across spatiotemporal regions to comprehensively capture user behavior patterns. Additionally, to further optimize trajectory intent representation, we employ a feature optimization method based on the improved diffusion model. Extensive experiments on three real-world datasets validate the superiority of HGDRec over the state-of-the-art methods.
In this paper, we present the results of research on the design and development of a gas analytical unit, an electronic nose, with an autonomous power supply, as well as the function of wireless data transmission via ...
详细信息
暂无评论