期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
A survey on deploying mobile deep learning applications:A systemic and technical perspective 被引量:1
1
作者 Yingchun Wang Jingyi Wang +4 位作者 Weizhan Zhang Yufeng Zhan Song Guo qinghua zheng Xuanyu Wang 《Digital Communications and Networks》 SCIE CSCD 2022年第1期1-17,共17页
With the rapid development of mobile devices and deep learning,mobile smart applications using deep learning technology have sprung up.It satisfies multiple needs of users,network operators and service providers,and r... With the rapid development of mobile devices and deep learning,mobile smart applications using deep learning technology have sprung up.It satisfies multiple needs of users,network operators and service providers,and rapidly becomes a main research focus.In recent years,deep learning has achieved tremendous success in image processing,natural language processing,language analysis and other research fields.Despite the task performance has been greatly improved,the resources required to run these models have increased significantly.This poses a major challenge for deploying such applications on resource-restricted mobile devices.Mobile intelligence needs faster mobile processors,more storage space,smaller but more accurate models,and even the assistance of other network nodes.To help the readers establish a global concept of the entire research direction concisely,we classify the latest works in this field into two categories,which are local optimization on mobile devices and distributed optimization based on the computational position of machine learning tasks.We also list a few typical scenarios to make readers realize the importance and indispensability of mobile deep learning applications.Finally,we conjecture what the future may hold for deploying deep learning applications on mobile devices research,which may help to stimulate new ideas. 展开更多
关键词 Deep learning Mobile computing Distributed offloading Distributed caching
下载PDF
基于混合比例估计的标签噪声学习方法
2
作者 郑庆华 曹书植 +2 位作者 阮建飞 赵锐 董博 《中国科学:信息科学》 CSCD 北大核心 2024年第3期603-622,共20页
近年来,人工智能蓬勃发展,伴随着计算硬件算力的提升,深度学习已成为了人工智能算法的新范式.然而深度学习依赖大量精确标注的数据,在现实的多类别分类场景中,受限于标注成本和隐私数据保护等因素,大量精准标注的数据往往难以获得.近些... 近年来,人工智能蓬勃发展,伴随着计算硬件算力的提升,深度学习已成为了人工智能算法的新范式.然而深度学习依赖大量精确标注的数据,在现实的多类别分类场景中,受限于标注成本和隐私数据保护等因素,大量精准标注的数据往往难以获得.近些年,移动众包和网络爬虫这类经济廉价的数据收集方法被广泛采用,但他们不可避免地引入了错误标注,即标签噪声.鉴于深度神经网络强大的数据拟合能力,标签噪声的存在将造成算法的过拟合,严重制约了深度学习方法的泛化能力.针对标签噪声问题,现有研究大多显式或隐式地依赖锚点(明确属于某一类别的样本),然而在现实场景中锚点难以获取,这使得现有解决方案不再适用.为解决这一问题,本文创造性地将多类别标签噪声学习问题转化为混合比例估计(mixture proportion estimation,MPE)问题,构建了一种不依赖锚点的满足统计一致性的学习算法.本文的主要贡献包括:(1)对现有的仅适用于二组成物MPE场景的R-MPE(regrouping-MPE)方法进行推广,提出了多组成物场景下不依赖不可约假设的MPE方法MR-MPE(multi-component oriented R-MPE);(2)理论上证明了多类别分类场景下标签噪声学习算法锚点假设和MPE问题不可约假设的等价性,并基于所提出的MR-MPE方法构建了不依赖锚点的满足统计一致性的算法.本文在合成噪声数据集和真实噪声数据集上分别与现有算法进行了对比实验,结果显示本文所提算法在多个数据集上均展现出了最优的性能;同时,在移除锚点的情况下,本文对算法的鲁棒性进行了测试,验证了所提算法不依赖锚点的特性. 展开更多
关键词 混合比例估计 多类别分类 标签噪声学习 锚点 不可约假设 统计一致性
原文传递
Guest editorial:Blockchain-enabled technologies for cyber-physical systems and big data applications
3
作者 zheng Yan qinghua zheng +2 位作者 Yulei Wu Yaliang Zhao Mohammed Atiquzzaman 《Digital Communications and Networks》 SCIE CSCD 2022年第5期589-590,共2页
1.Background and motivation Cyber-Physical System(CPS)refers to the seamless integration of the physical processes,computational components,and Internet-of-Things(IoT)devices such as sensors,actuators,and so on.Exampl... 1.Background and motivation Cyber-Physical System(CPS)refers to the seamless integration of the physical processes,computational components,and Internet-of-Things(IoT)devices such as sensors,actuators,and so on.Examples of CPS include smart grids,autonomous transportation systems,medical monitoring,process control systems,robotic systems,and automatic pilot avionics. 展开更多
关键词 autonomous smart IoT
下载PDF
The Interaction of Heat and Lipopolysaccharide on the Expression Levels of Receptor Activator of NF-κB Ligand and Osteoprotegerin in Human Periodontal Ligament Cells
4
作者 Lan Zhang qinghua zheng +4 位作者 Xuedong Zhou Lu Tang Qian Wang Xiaoyu Li Dingming Huang 《Open Journal of Stomatology》 2015年第10期243-250,共8页
Aim: To investigate the expression levels of receptor activator of NF-κB ligand (RANKL) and oste-oprotegerin (OPG) in human periodontal ligament fibroblasts when stimulated with heat in infective conditions. Methods:... Aim: To investigate the expression levels of receptor activator of NF-κB ligand (RANKL) and oste-oprotegerin (OPG) in human periodontal ligament fibroblasts when stimulated with heat in infective conditions. Methods: Periodontal ligament fibroblasts were subjected to various temperature increases for 5 min with or without 10 ng/mL lipopolysaccharide (LPS) and then maintained at 37℃ for 6 h. After that, the expression levels of RANKL and OPG were investigated using real-time RT-PCR and ELISA. As a positive or negative control, the cells were cultured at 37℃ with or without 10 ng/mL LPS. Data were analyzed using one-way ANOVA at a significant level of p = 0.05. Results: The mRNA expression levels of RANKL and OPG were both down-regulated when the cells were heated in infective conditions. The release of sRANKL was increased at low temperatures in such infection;while at high temperatures heat treatment down-regulated the release of sRANKL induced by LPS. The relative RANKL/OPG expression ratios were increased at low temperatures in infective conditions. Conclusions: The interactions between heat and LPS would affect the balance between RANKL and OPG in periodontal ligament fibroblasts when they were heated in infective conditions. Such infection may be the reason why bone resorption occurs in the local area after warm vertical compaction. 展开更多
关键词 HEAT LIPOPOLYSACCHARIDE OPG PERIODONTAL LIGAMENT FIBROBLASTS RANKL
下载PDF
Development of new electromagnetic suspension-based high-speed Maglev vehicles in China:Historical and recent progress in the field of dynamical simulation 被引量:3
5
作者 Sansan Ding Peter Eberhard +9 位作者 Georg Schneider Patrick Schmid Arnim Kargl Yong Cui Ullrich Martin Xin Liang Chao Huang Markus Bauer Florian Dignath qinghua zheng 《International Journal of Mechanical System Dynamics》 2023年第2期97-118,共22页
High-speed Maglev is a cutting-edge technology brought back into the focus of research by plans of the Chinese government for the development of a new 600 km/h Maglev train.A Chinese‐German cooperation with industria... High-speed Maglev is a cutting-edge technology brought back into the focus of research by plans of the Chinese government for the development of a new 600 km/h Maglev train.A Chinese‐German cooperation with industrial and academic partners has been established to pursue this ambitious goal and bring together experts from multiple disciplines.This contribution presents the joint work and achievements of CRRC Qingdao Sifang,thyssenkrupp Transrapid,CDFEB,and the ITM of the University of Stuttgart,regarding research and development in the field of high‐speed Maglev systems.Furthermore,an overview is given of the historical development of the Transrapid in Germany,the associated development of dynamical simulation models,and recent developments regarding high-speed Maglev trains in China. 展开更多
关键词 MAGLEV high-speed Maglev vehicle magnetic levitation simulation models dynamic simulation vehicle dynamics
原文传递
基于数据挖掘技术的税务风险检测方法评述
6
作者 qinghua zheng Yiming Xu +3 位作者 Huixiang Liu Bin Shi Jiaxiang Wang Bo Dong 《Engineering》 SCIE EI CAS 2024年第3期43-59,共17页
Tax risk behavior causes serious loss of fiscal revenue,damages the country’s public infrastructure,and disturbs the market economic order of fair competition.In recent years,tax risk detection,driven by information ... Tax risk behavior causes serious loss of fiscal revenue,damages the country’s public infrastructure,and disturbs the market economic order of fair competition.In recent years,tax risk detection,driven by information technology such as data mining and artificial intelligence,has received extensive attention.To promote the high-quality development of tax risk detection methods,this paper provides the first comprehensive overview and summary of existing tax risk detection methods worldwide.More specifi-cally,it first discusses the causes and negative impacts of tax risk behaviors,along with the development of tax risk detection.It then focuses on data-mining-based tax risk detection methods utilized around the world.Based on the different principles employed by the algorithms,existing risk detection methods can be divided into two categories:relationship-based and non-relationship-based.A total of 14 risk detection methods are identified,and each method is thoroughly explored and analyzed.Finally,four major technical bottlenecks of current data-driven tax risk detection methods are analyzed and discussed,including the difficulty of integrating and using fiscal and tax fragmented knowledge,unexplainable risk detection results,the high cost of risk detection algorithms,and the reliance of existing algorithms on labeled information.After investigating these issues,it is concluded that knowledge-guided and datadriven big data knowledge engineering will be the development trend in the field of tax risk in the future;that is,the gradual transition of tax risk detection from informatization to intelligence is the future development direction. 展开更多
关键词 Tax risk detection Data mining Knowledge guide Informatization Intellectualization
下载PDF
A method for detecting code security vulnerability based on variables tracking with validated-tree
7
作者 Zhefei ZHANG qinghua zheng +2 位作者 Xiaohong GUAN Qing WANG Tuo WANG 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2008年第2期162-166,共5页
SQL injection poses a major threat to the application level security of the database and there is no systematic solution to these attacks.Different from traditional run time security strategies such as IDS and fire-wa... SQL injection poses a major threat to the application level security of the database and there is no systematic solution to these attacks.Different from traditional run time security strategies such as IDS and fire-wall,this paper focuses on the solution at the outset;it presents a method to find vulnerabilities by analyzing the source codes.The concept of validated tree is developed to track variables referenced by database operations in scripts.By checking whether these variables are influenced by outside inputs,the database operations are proved to be secure or not.This method has advantages of high accuracy and efficiency as well as low costs,and it is universal to any type of web application platforms.It is implemented by the software code vulnerabilities of SQL injection detector(CVSID).The validity and efficiency are demonstrated with an example. 展开更多
关键词 vulnerability detection database security SQL injection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部