With the development of artificial intelligence technology, robotics technology has become more and more mature. Ground walking robots not only develop rapidly, but also have been applied in actual production and life...
With the development of artificial intelligence technology, robotics technology has become more and more mature. Ground walking robots not only develop rapidly, but also have been applied in actual production and life. However, the development of wall climbing robot technology is still in the laboratory research and small-scale application. We live in a world where progress is continuing. Large-scale buildings, bridges and ships are becoming more and more common. In these places, it is inevitable to involve the construction, maintenance and clarity of high-rise buildings and ships. In the case of dangerous and inefficient manpower work, the application of wall climbing robots can play a very good role. Therefore, the development of wall climbing robots is of vital importance both now and in the future. Starting from the performance characteristics of wall climbing robot, this paper studies and summarizes the moving mode, control mode, conditions to be satisfied and various adsorption forms of wall climbing robot, and introduces the basic research situation in the field of wall climbing robot.
The algorithm PRINCE proposed in ASIACRYPT 2012 is a lightweight cipher, currently suitable for the implementation on RFID Smart Card of the Io T. It's studied to achieve the optimal implementation of PRINCE encry...
详细信息
The algorithm PRINCE proposed in ASIACRYPT 2012 is a lightweight cipher, currently suitable for the implementation on RFID Smart Card of the Io T. It's studied to achieve the optimal implementation of PRINCE encryption algorithm, and to add a fixed random mask to enhance the anti power attacking ability of PRINCE. In this paper, we constructed the same operations into a module called Prince Round, and used counter to control the Prince Round module, while the same round operation runs repeatedly. As a result, it can save registers and effectively reduce the amount of computation. Furthermore, we used a special method by adding the random mask to S-box. The experimental results show that the optimized PRINCE occupies area 9.8% fewer than original PRINCE on FPGA and the encryption with a fixed random mask can run correctly. Last but not least, our research is the first one about the implementation of PRINCE algorithm on FPGA, and can serve as a reference for further application of IOT encryption.
More and more research works have indicated that microRNAs (miRNAs) play indispensable roles in exploring the pathogenesis of diseases. Detecting miRNA-disease associations by experimental techniques in biology is exp...
More and more research works have indicated that microRNAs (miRNAs) play indispensable roles in exploring the pathogenesis of diseases. Detecting miRNA-disease associations by experimental techniques in biology is expensive and time-consuming. Hence, it is important to propose reliable and accurate computational methods to exploring potential miRNAs related diseases. In our work, we develop a novel method (BRWHNHA) to uncover potential miRNAs associated with diseases based on hybrid recommendation algorithm and unbalanced bi-random walk. We first integrate the Gaussian interaction profile kernel similarity into the miRNA functional similarity network and the disease semantic similarity network. Then we calculate the transition probability matrix of bipartite network by using hybrid recommendation algorithm. Finally, we adopt unbalanced bi-random walk on the heterogeneous network to infer undiscovered miRNA-disease relationships. We tested BRWHNHA on 22 diseases based on five-fold cross-validation and achieves reliable performance with average AUC of 0.857, which an area under the ROC curve ranging from 0.807 to 0.924. As a result, BRWHNHA significantly improves the performance of inferring potential miRNA-disease association compared with previous methods. Moreover, the case studies on lung neoplasms and prostate neoplasms also illustrate that BRWHNHA is superior to previous prediction methods and is more advantageous in exploring potential miRNAs related diseases. All source codes can be downloaded from https://***/myl446/BRWHNHA .
The last few decades have witnessed the rapid development of saliency detection, which can automatically extract object-of-interest from clutter scene. However, visual saliency detection in low contrast video stream s...
详细信息
Due to the diversification of software and hardware resources in cloud and ever-changing demand for deployment, Hadoop deployment is faced with great challenges in difficulty and complexity. Most of present researches...
详细信息
Due to the diversification of software and hardware resources in cloud and ever-changing demand for deployment, Hadoop deployment is faced with great challenges in difficulty and complexity. Most of present researches lie in environment configuration and parameter setting of deployment, they do not take into account diversification of infrastructure and scalability issues in cloud. In order to quickly customize, deploy and expand Hadoop services according to the demand, a model-driven approach to Hadoop deployment is proposed in the paper. Firstly, Hadoop demand and deployment models are presented. Secondly, the transformation method from the demand model to the deployment model is proposed. Thirdly, the bidirectional synchronization between Hadoop deployment model and running system is realized based on runtime model.
Dynamic Protocol Mining (DPM) techniques are a promising approach to infer useful API protocols automatically. However, their results are biased to input test cases and the instrumentation overhead discounts their usa...
详细信息
ISBN:
(纸本)1891706411
Dynamic Protocol Mining (DPM) techniques are a promising approach to infer useful API protocols automatically. However, their results are biased to input test cases and the instrumentation overhead discounts their usability in industrial practice. In this paper, we propose a distributed dynamic protocol mining framework NSpecMiner. Our framework is based on a client-server architecture, where the client tracer gathers Program Execution Traces (PETs) and sends them to the server for mining. Mined protocols are saved on the server to provide various kinds of remote services, such as API protocol retrieval and program verification, etc. Compared with local miners, NSpecMiner has many advantages: 1) A large number of diverse PETs are likely to be collected from multiple clients, which is essential for mining accurate and complete API protocols. 2) Instrumentation overhead can be balanced among multiple clients. 3) Via integrating the client tracer into widely used software, we can mine API protocols transparently and automatically without any human effort. To evaluate our technique, we performed a comparison test with a local miner ISpecMiner and NSpecMiner. Preliminary results show that our approach is effective to mine useful API protocols as local miners. While our method is able to gather PETs concurrently from multiple clients and other merits of the distributed technology will further benefit DPM significantly.
Previous researches on event relation classification primarily rely on lexical and syntactic features. In this paper, we use a Shallow Convolutional Neural Network (SCNN) to extract event-level and cross-event semanti...
详细信息
Canonical Artificial bee colony(ABC) algorithm with a single species is insufficient to extend the diversity of solutions and may be trapped into the local optimal solution. This paper proposes a new co-evolutionary A...
详细信息
Canonical Artificial bee colony(ABC) algorithm with a single species is insufficient to extend the diversity of solutions and may be trapped into the local optimal solution. This paper proposes a new co-evolutionary ABC algorithm(HABC) based on Hierarchical communication model(HCM). HCM combines advantages of global and local communication pattern. With adjustment strategies on species and groups, HCM can reduce the computational complexity dynamically. Performance tests show that the HABC algorithm exhibit good performance on accuracy, robustness and convergence speed. Compared with ABC and Integrated co-evolution algorithm(IABC),HABC performs better in solving complex multimodal functions.
Cross-media analysis and reasoning is an active research area in computer science, and a promising direction for artificial intelligence. However, to the best of our knowledge, no existing work has summarized the stat...
详细信息
Cross-media analysis and reasoning is an active research area in computer science, and a promising direction for artificial intelligence. However, to the best of our knowledge, no existing work has summarized the state-of-the-art methods for cross-media analysis and reasoning or presented advances, challenges, and future directions for the field. To address these issues, we provide an overview as follows: (1) theory and model for cross-media uniform representation; (2) cross-media correlation understanding and deep mining; (3) cross-media knowledge graph construction and learning methodologies; (4) cross-media knowledge evolution and reasoning; (5) cross-media description and generation; (6) cross-media intelligent engines; and (7) cross-media intelligent applications. By presenting approaches, advances, and future directions in cross-media analysis and reasoning, our goal is not only to draw more attention to the state-of-the-art advances in the field, but also to provide technical insights by discussing the challenges and research directions in these areas.
Salient object detection has become a hot topic in computer vision as it can substantially facilitate a wide range of applications. Conventional salient object detection models primarily rely on low-level image featur...
详细信息
暂无评论