Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each ...Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each other and achieve one requirement is to sacrifice the other. This paper presents a secure real-time concurrency control protocol based on optimistic method. The concurrency control protocol incorporates security constraints in a real-time optimistic concurrency control protocol and makes a suitable tradeoff between security and real-time requirements by introducing secure influence factor and real-time influence factor. The experimental results show the concurrency control protocol achieves data security without degrading real-time perform ance significantly.展开更多
To address the impact of wind-power fluctuations on the stability of power systems,we propose a comprehensive approach that integrates multiple strategies and methods to enhance the efficiency and reliability of a sys...To address the impact of wind-power fluctuations on the stability of power systems,we propose a comprehensive approach that integrates multiple strategies and methods to enhance the efficiency and reliability of a system.First,we employ a strategy that restricts long-and short-term power output deviations to smoothen wind power fluctuations in real time.Second,we adopt the sliding window instantaneous complete ensemble empirical mode decomposition with adaptive noise(SW-ICEEMDAN)strategy to achieve real-time decomposition of the energy storage power,facilitating internal power distribution within the hybrid energy storage system.Finally,we introduce a rule-based multi-fuzzy control strategy for the secondary adjustment of the initial power allocation commands for different energy storage components.Through simulation validation,we demonstrate that the proposed comprehensive control strategy can smoothen wind power fluctuations in real time and decompose energy storage power.Compared with traditional empirical mode decomposition(EMD),ensemble empirical mode decomposition(EEMD),and complete ensemble empirical mode decomposition with adaptive noise(CEEMDAN)decomposition strategies,the configuration of the energy storage system under the SW-ICEEMDAN control strategy is more optimal.Additionally,the state-of-charge of energy storage components fluctuates within a reasonable range,enhancing the stability of the power system and ensuring the secure operation of the energy storage system.展开更多
The real-time detection and instance segmentation of strawberries constitute fundamental components in the development of strawberry harvesting robots.Real-time identification of strawberries in an unstructured envi-r...The real-time detection and instance segmentation of strawberries constitute fundamental components in the development of strawberry harvesting robots.Real-time identification of strawberries in an unstructured envi-ronment is a challenging task.Current instance segmentation algorithms for strawberries suffer from issues such as poor real-time performance and low accuracy.To this end,the present study proposes an Efficient YOLACT(E-YOLACT)algorithm for strawberry detection and segmentation based on the YOLACT framework.The key enhancements of the E-YOLACT encompass the development of a lightweight attention mechanism,pyramid squeeze shuffle attention(PSSA),for efficient feature extraction.Additionally,an attention-guided context-feature pyramid network(AC-FPN)is employed instead of FPN to optimize the architecture’s performance.Furthermore,a feature-enhanced model(FEM)is introduced to enhance the prediction head’s capabilities,while efficient fast non-maximum suppression(EF-NMS)is devised to improve non-maximum suppression.The experimental results demonstrate that the E-YOLACT achieves a Box-mAP and Mask-mAP of 77.9 and 76.6,respectively,on the custom dataset.Moreover,it exhibits an impressive category accuracy of 93.5%.Notably,the E-YOLACT also demonstrates a remarkable real-time detection capability with a speed of 34.8 FPS.The method proposed in this article presents an efficient approach for the vision system of a strawberry-picking robot.展开更多
In recent years,frequent fire disasters have led to enormous damage in China.Effective firefighting rescues can minimize the losses caused by fires.During the rescue processes,the travel time of fire trucks can be sev...In recent years,frequent fire disasters have led to enormous damage in China.Effective firefighting rescues can minimize the losses caused by fires.During the rescue processes,the travel time of fire trucks can be severely affected by traffic conditions,changing the effective coverage of fire stations.However,it is still challenging to determine the effective coverage of fire stations considering dynamic traffic conditions.This paper addresses this issue by combining the traveling time calculationmodelwith the effective coverage simulationmodel.In addition,it proposes a new index of total effective coverage area(TECA)based on the time-weighted average of the effective coverage area(ECA)to evaluate the urban fire services.It also selects China as the case study to validate the feasibility of the models,a fire station(FS-JX)in Changsha.FS-JX station and its surrounding 9,117 fire risk points are selected as the fire service supply and demand points,respectively.A total of 196 simulation scenarios throughout a consecutiveweek are analyzed.Eventually,1,933,815 sets of valid sample data are obtained.The results showed that the TECA of FS-JX is 3.27 km^(2),which is far below the standard requirement of 7.00 km^(2) due to the traffic conditions.The visualization results showed that three rivers around FS-JX interrupt the continuity of its effective coverage.The proposed method can provide data support to optimize the locations of fire stations by accurately and dynamically determining the effective coverage of fire stations.展开更多
In petroleum engineering,real-time lithology identification is very important for reservoir evaluation,drilling decisions and petroleum geological exploration.A lithology identification method while drilling based on ...In petroleum engineering,real-time lithology identification is very important for reservoir evaluation,drilling decisions and petroleum geological exploration.A lithology identification method while drilling based on machine learning and mud logging data is studied in this paper.This method can effectively utilize downhole parameters collected in real-time during drilling,to identify lithology in real-time and provide a reference for optimization of drilling parameters.Given the imbalance of lithology samples,the synthetic minority over-sampling technique(SMOTE)and Tomek link were used to balance the sample number of five lithologies.Meanwhile,this paper introduces Tent map,random opposition-based learning and dynamic perceived probability to the original crow search algorithm(CSA),and establishes an improved crow search algorithm(ICSA).In this paper,ICSA is used to optimize the hyperparameter combination of random forest(RF),extremely random trees(ET),extreme gradient boosting(XGB),and light gradient boosting machine(LGBM)models.In addition,this study combines the recognition advantages of the four models.The accuracy of lithology identification by the weighted average probability model reaches 0.877.The study of this paper realizes high-precision real-time lithology identification method,which can provide lithology reference for the drilling process.展开更多
Understanding the variations in microscopic pore-fracture structures(MPFS) during coal creep under pore pressure and stress coupling is crucial for coal mining and effective gas treatment. In this manuscript, a triaxi...Understanding the variations in microscopic pore-fracture structures(MPFS) during coal creep under pore pressure and stress coupling is crucial for coal mining and effective gas treatment. In this manuscript, a triaxial creep test on deep coal at various pore pressures using a test system that combines in-situ mechanical loading with real-time nuclear magnetic resonance(NMR) detection was conducted.Full-scale quantitative characterization, online real-time detection, and visualization of MPFS during coal creep influenced by pore pressure and stress coupling were performed using NMR and NMR imaging(NMRI) techniques. The results revealed that seepage pores and microfractures(SPM) undergo the most significant changes during coal creep, with creep failure gradually expanding from dense primary pore fractures. Pore pressure presence promotes MPFS development primarily by inhibiting SPM compression and encouraging adsorption pores(AP) to evolve into SPM. Coal enters the accelerated creep stage earlier at lower stress levels, resulting in more pronounced creep deformation. The connection between the micro and macro values was established, demonstrating that increased porosity at different pore pressures leads to a negative exponential decay of the viscosity coefficient. The Newton dashpot in the ideal viscoplastic body and the Burgers model was improved using NMR experimental results, and a creep model that considers pore pressure and stress coupling using variable-order fractional operators was developed. The model’s reasonableness was confirmed using creep experimental data. The damagestate adjustment factors ω and β were identified through a parameter sensitivity analysis to characterize the effect of pore pressure and stress coupling on the creep damage characteristics(size and degree of difficulty) of coal.展开更多
AIM:To investigate the stability of the seven housekeeping genes:beta-actin(ActB),glyceraldehyde-3-phosphate dehydrogenase(GAPDH),18s ribosomal unit 5(18s),cyclophilin A(CycA),hypoxanthine-guanine phosphoribosyl trans...AIM:To investigate the stability of the seven housekeeping genes:beta-actin(ActB),glyceraldehyde-3-phosphate dehydrogenase(GAPDH),18s ribosomal unit 5(18s),cyclophilin A(CycA),hypoxanthine-guanine phosphoribosyl transferase(HPRT),ribosomal protein large P0(36B4)and terminal uridylyl transferase 1(U6)in the diabetic retinal tissue of rat model.METHODS:The expression of these seven genes in rat retinal tissues was determined using real-time quantitative reverse transcription polymerase chain reaction(RT-qPCR)in two groups;normal control rats and streptozotocininduced diabetic rats.The stability analysis of gene expression was investigated using geNorm,NormFinder,BestKeeper,and comparative delta-Ct(ΔCt)algorithms.RESULTS:The 36B4 gene was stably expressed in the retinal tissues of normal control animals;however,it was less stable in diabetic retinas.The 18s gene was expressed consistently in both normal control and diabetic rats’retinal tissue.That this gene was the best reference for data normalisation in RT-qPCR studies that used the retinal tissue of streptozotocin-induced diabetic rats.Furthermore,there was no ideal gene stably expressed for use in all experimental settings.CONCLUSION:Identifying relevant genes is a need for achieving RT-qPCR validity and reliability and must be appropriately achieved based on a specific experimental setting.展开更多
Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The m...Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
In parallel real-time database systems, concurrency control protocols must satisfy time constraints as well as the integrity constraints. The authors present a validation concurrency control(VCC) protocol, which can e...In parallel real-time database systems, concurrency control protocols must satisfy time constraints as well as the integrity constraints. The authors present a validation concurrency control(VCC) protocol, which can enhance the performance of real-time concurrency control mechanism by reducing the number of transactions that might miss their deadlines, and compare the performance of validation concurrency control protocol with that of HP2PL(High priority two phase locking) protocol and OCC-TI-WAIT-50(Optimistic concurrency control-time interval-wait-50) protocol under shared-disk architecture by simulation. The simulation results reveal that the protocol the author presented can effectively reduce the number of transactions restarting which might miss their deadlines and performs better than HP2PL and OCC-TI-WAIT-50. It works well when arrival rate of transaction is lesser than threshold. However, due to resource contention the percentage of missing deadline increases sharply when arrival rate is greater than the threshold.展开更多
An integrated method for concurrency control in parallel real-time databases has been proposed in this paper. The nested transaction model has been investigated to offer more atomic execution units and finer grained c...An integrated method for concurrency control in parallel real-time databases has been proposed in this paper. The nested transaction model has been investigated to offer more atomic execution units and finer grained control within in a transaction. Based on the classical nested locking protocol and the speculative concurrency control approach, a two-shadow adaptive concurrency control protocol, which combines the Sacrifice based Optimistic Concurrency Control (OPT-Sacrifice) and High Priority two-phase locking (HP2PL) algorithms together to support both optimistic and pessimistic shadow of each sub-transaction, has been proposed to increase the likelihood of successful timely commitment and to avoid unnecessary replication overload.展开更多
Given the asymmetric communication capabilities in mobile real time environments, traditional serializability based approaches are too restrictive, unnecessary, and impractical. Thus propose the use of a new weaker co...Given the asymmetric communication capabilities in mobile real time environments, traditional serializability based approaches are too restrictive, unnecessary, and impractical. Thus propose the use of a new weaker correctness criterion is proposed. This paper first formally defines the new notion of correctness called weak serializability. After the necessary and sufficient conditions for weak serializability are shown, corresponding concurrency control protocol based on this criterion is outlined for real time broadcast environments. Finally, the simulation results confirmed that the proposed techniques help mobile transactions to meet their deadlines and improve query response time.展开更多
Most of the proposed concurrency control protocols for real time database systems are based on serializability theorem. Owing to the unique characteristics of real time database applications and the importance of sa...Most of the proposed concurrency control protocols for real time database systems are based on serializability theorem. Owing to the unique characteristics of real time database applications and the importance of satisfying the timing constraints of transactions, serializability is too strong as a correctness criterion and not suitable for real time databases in most cases. On the other hand, relaxed serializability including epsilon serializability and similarity serializability can allow more real time transactions to satisfy their timing constraints, but database consistency may be sacrificed to some extent. We thus propose the use of weak serializability(WSR) that is more relaxed than conflicting serializability while database consistency is maintained. In this paper, we first formally define the new notion of correctness called weak serializability. After the necessary and sufficient conditions for weak serializability are shown, corresponding concurrency control protocol WDHP(weak serializable distributed high priority protocol) is outlined for distributed real time databases, where a new lock mode called mask lock mode is proposed for simplifying the condition of global consistency. Finally, through a series of simulation studies, it is shown that using the new concurrency control protocol the performance of distributed real time databases can be greatly improved.展开更多
This paper formally defines and analyses the new notion of correctness called quasi serializability, and then outlines corresponding concurrency control protocol QDHP for distributed real-time databases. Finally, thro...This paper formally defines and analyses the new notion of correctness called quasi serializability, and then outlines corresponding concurrency control protocol QDHP for distributed real-time databases. Finally, through a series of simulation studies, it shows that using the new concurrency control protocol the performance of distributed real-time databases can be much improved.展开更多
基金Supported by the Defense Pre-Research Project ofthe"Tenth Five-Year-Plan"of China (413150403)
文摘Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each other and achieve one requirement is to sacrifice the other. This paper presents a secure real-time concurrency control protocol based on optimistic method. The concurrency control protocol incorporates security constraints in a real-time optimistic concurrency control protocol and makes a suitable tradeoff between security and real-time requirements by introducing secure influence factor and real-time influence factor. The experimental results show the concurrency control protocol achieves data security without degrading real-time perform ance significantly.
基金supported by the National Natural Science Foundation of China(Grant No.51677058)。
文摘To address the impact of wind-power fluctuations on the stability of power systems,we propose a comprehensive approach that integrates multiple strategies and methods to enhance the efficiency and reliability of a system.First,we employ a strategy that restricts long-and short-term power output deviations to smoothen wind power fluctuations in real time.Second,we adopt the sliding window instantaneous complete ensemble empirical mode decomposition with adaptive noise(SW-ICEEMDAN)strategy to achieve real-time decomposition of the energy storage power,facilitating internal power distribution within the hybrid energy storage system.Finally,we introduce a rule-based multi-fuzzy control strategy for the secondary adjustment of the initial power allocation commands for different energy storage components.Through simulation validation,we demonstrate that the proposed comprehensive control strategy can smoothen wind power fluctuations in real time and decompose energy storage power.Compared with traditional empirical mode decomposition(EMD),ensemble empirical mode decomposition(EEMD),and complete ensemble empirical mode decomposition with adaptive noise(CEEMDAN)decomposition strategies,the configuration of the energy storage system under the SW-ICEEMDAN control strategy is more optimal.Additionally,the state-of-charge of energy storage components fluctuates within a reasonable range,enhancing the stability of the power system and ensuring the secure operation of the energy storage system.
基金funded by Anhui Provincial Natural Science Foundation(No.2208085ME128)the Anhui University-Level Special Project of Anhui University of Science and Technology(No.XCZX2021-01)+1 种基金the Research and the Development Fund of the Institute of Environmental Friendly Materials and Occupational Health,Anhui University of Science and Technology(No.ALW2022YF06)Anhui Province New Era Education Quality Project(Graduate Education)(No.2022xscx073).
文摘The real-time detection and instance segmentation of strawberries constitute fundamental components in the development of strawberry harvesting robots.Real-time identification of strawberries in an unstructured envi-ronment is a challenging task.Current instance segmentation algorithms for strawberries suffer from issues such as poor real-time performance and low accuracy.To this end,the present study proposes an Efficient YOLACT(E-YOLACT)algorithm for strawberry detection and segmentation based on the YOLACT framework.The key enhancements of the E-YOLACT encompass the development of a lightweight attention mechanism,pyramid squeeze shuffle attention(PSSA),for efficient feature extraction.Additionally,an attention-guided context-feature pyramid network(AC-FPN)is employed instead of FPN to optimize the architecture’s performance.Furthermore,a feature-enhanced model(FEM)is introduced to enhance the prediction head’s capabilities,while efficient fast non-maximum suppression(EF-NMS)is devised to improve non-maximum suppression.The experimental results demonstrate that the E-YOLACT achieves a Box-mAP and Mask-mAP of 77.9 and 76.6,respectively,on the custom dataset.Moreover,it exhibits an impressive category accuracy of 93.5%.Notably,the E-YOLACT also demonstrates a remarkable real-time detection capability with a speed of 34.8 FPS.The method proposed in this article presents an efficient approach for the vision system of a strawberry-picking robot.
基金support from the National Natural Science Foundation of China (No.52204202)the Hunan Provincial Natural Science Foundation of China (No.2023JJ40058)the Science and Technology Program of Hunan Provincial Departent of Transportation (No.202122).
文摘In recent years,frequent fire disasters have led to enormous damage in China.Effective firefighting rescues can minimize the losses caused by fires.During the rescue processes,the travel time of fire trucks can be severely affected by traffic conditions,changing the effective coverage of fire stations.However,it is still challenging to determine the effective coverage of fire stations considering dynamic traffic conditions.This paper addresses this issue by combining the traveling time calculationmodelwith the effective coverage simulationmodel.In addition,it proposes a new index of total effective coverage area(TECA)based on the time-weighted average of the effective coverage area(ECA)to evaluate the urban fire services.It also selects China as the case study to validate the feasibility of the models,a fire station(FS-JX)in Changsha.FS-JX station and its surrounding 9,117 fire risk points are selected as the fire service supply and demand points,respectively.A total of 196 simulation scenarios throughout a consecutiveweek are analyzed.Eventually,1,933,815 sets of valid sample data are obtained.The results showed that the TECA of FS-JX is 3.27 km^(2),which is far below the standard requirement of 7.00 km^(2) due to the traffic conditions.The visualization results showed that three rivers around FS-JX interrupt the continuity of its effective coverage.The proposed method can provide data support to optimize the locations of fire stations by accurately and dynamically determining the effective coverage of fire stations.
基金supported by CNPC-CZU Innovation Alliancesupported by the Program of Polar Drilling Environmental Protection and Waste Treatment Technology (2022YFC2806403)。
文摘In petroleum engineering,real-time lithology identification is very important for reservoir evaluation,drilling decisions and petroleum geological exploration.A lithology identification method while drilling based on machine learning and mud logging data is studied in this paper.This method can effectively utilize downhole parameters collected in real-time during drilling,to identify lithology in real-time and provide a reference for optimization of drilling parameters.Given the imbalance of lithology samples,the synthetic minority over-sampling technique(SMOTE)and Tomek link were used to balance the sample number of five lithologies.Meanwhile,this paper introduces Tent map,random opposition-based learning and dynamic perceived probability to the original crow search algorithm(CSA),and establishes an improved crow search algorithm(ICSA).In this paper,ICSA is used to optimize the hyperparameter combination of random forest(RF),extremely random trees(ET),extreme gradient boosting(XGB),and light gradient boosting machine(LGBM)models.In addition,this study combines the recognition advantages of the four models.The accuracy of lithology identification by the weighted average probability model reaches 0.877.The study of this paper realizes high-precision real-time lithology identification method,which can provide lithology reference for the drilling process.
基金supported by the National Natural Science Foundation of China(Nos.52121003,51827901 and 52204110)China Postdoctoral Science Foundation(No.2022M722346)+1 种基金the 111 Project(No.B14006)the Yueqi Outstanding Scholar Program of CUMTB(No.2017A03).
文摘Understanding the variations in microscopic pore-fracture structures(MPFS) during coal creep under pore pressure and stress coupling is crucial for coal mining and effective gas treatment. In this manuscript, a triaxial creep test on deep coal at various pore pressures using a test system that combines in-situ mechanical loading with real-time nuclear magnetic resonance(NMR) detection was conducted.Full-scale quantitative characterization, online real-time detection, and visualization of MPFS during coal creep influenced by pore pressure and stress coupling were performed using NMR and NMR imaging(NMRI) techniques. The results revealed that seepage pores and microfractures(SPM) undergo the most significant changes during coal creep, with creep failure gradually expanding from dense primary pore fractures. Pore pressure presence promotes MPFS development primarily by inhibiting SPM compression and encouraging adsorption pores(AP) to evolve into SPM. Coal enters the accelerated creep stage earlier at lower stress levels, resulting in more pronounced creep deformation. The connection between the micro and macro values was established, demonstrating that increased porosity at different pore pressures leads to a negative exponential decay of the viscosity coefficient. The Newton dashpot in the ideal viscoplastic body and the Burgers model was improved using NMR experimental results, and a creep model that considers pore pressure and stress coupling using variable-order fractional operators was developed. The model’s reasonableness was confirmed using creep experimental data. The damagestate adjustment factors ω and β were identified through a parameter sensitivity analysis to characterize the effect of pore pressure and stress coupling on the creep damage characteristics(size and degree of difficulty) of coal.
基金Supported by grant from Fundamental Research Grant Scheme by Ministry of Higher Education(MoHE)600-IRMI/FRGS 5/3(101/2019).
文摘AIM:To investigate the stability of the seven housekeeping genes:beta-actin(ActB),glyceraldehyde-3-phosphate dehydrogenase(GAPDH),18s ribosomal unit 5(18s),cyclophilin A(CycA),hypoxanthine-guanine phosphoribosyl transferase(HPRT),ribosomal protein large P0(36B4)and terminal uridylyl transferase 1(U6)in the diabetic retinal tissue of rat model.METHODS:The expression of these seven genes in rat retinal tissues was determined using real-time quantitative reverse transcription polymerase chain reaction(RT-qPCR)in two groups;normal control rats and streptozotocininduced diabetic rats.The stability analysis of gene expression was investigated using geNorm,NormFinder,BestKeeper,and comparative delta-Ct(ΔCt)algorithms.RESULTS:The 36B4 gene was stably expressed in the retinal tissues of normal control animals;however,it was less stable in diabetic retinas.The 18s gene was expressed consistently in both normal control and diabetic rats’retinal tissue.That this gene was the best reference for data normalisation in RT-qPCR studies that used the retinal tissue of streptozotocin-induced diabetic rats.Furthermore,there was no ideal gene stably expressed for use in all experimental settings.CONCLUSION:Identifying relevant genes is a need for achieving RT-qPCR validity and reliability and must be appropriately achieved based on a specific experimental setting.
文摘Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘In parallel real-time database systems, concurrency control protocols must satisfy time constraints as well as the integrity constraints. The authors present a validation concurrency control(VCC) protocol, which can enhance the performance of real-time concurrency control mechanism by reducing the number of transactions that might miss their deadlines, and compare the performance of validation concurrency control protocol with that of HP2PL(High priority two phase locking) protocol and OCC-TI-WAIT-50(Optimistic concurrency control-time interval-wait-50) protocol under shared-disk architecture by simulation. The simulation results reveal that the protocol the author presented can effectively reduce the number of transactions restarting which might miss their deadlines and performs better than HP2PL and OCC-TI-WAIT-50. It works well when arrival rate of transaction is lesser than threshold. However, due to resource contention the percentage of missing deadline increases sharply when arrival rate is greater than the threshold.
文摘An integrated method for concurrency control in parallel real-time databases has been proposed in this paper. The nested transaction model has been investigated to offer more atomic execution units and finer grained control within in a transaction. Based on the classical nested locking protocol and the speculative concurrency control approach, a two-shadow adaptive concurrency control protocol, which combines the Sacrifice based Optimistic Concurrency Control (OPT-Sacrifice) and High Priority two-phase locking (HP2PL) algorithms together to support both optimistic and pessimistic shadow of each sub-transaction, has been proposed to increase the likelihood of successful timely commitment and to avoid unnecessary replication overload.
文摘Given the asymmetric communication capabilities in mobile real time environments, traditional serializability based approaches are too restrictive, unnecessary, and impractical. Thus propose the use of a new weaker correctness criterion is proposed. This paper first formally defines the new notion of correctness called weak serializability. After the necessary and sufficient conditions for weak serializability are shown, corresponding concurrency control protocol based on this criterion is outlined for real time broadcast environments. Finally, the simulation results confirmed that the proposed techniques help mobile transactions to meet their deadlines and improve query response time.
文摘Most of the proposed concurrency control protocols for real time database systems are based on serializability theorem. Owing to the unique characteristics of real time database applications and the importance of satisfying the timing constraints of transactions, serializability is too strong as a correctness criterion and not suitable for real time databases in most cases. On the other hand, relaxed serializability including epsilon serializability and similarity serializability can allow more real time transactions to satisfy their timing constraints, but database consistency may be sacrificed to some extent. We thus propose the use of weak serializability(WSR) that is more relaxed than conflicting serializability while database consistency is maintained. In this paper, we first formally define the new notion of correctness called weak serializability. After the necessary and sufficient conditions for weak serializability are shown, corresponding concurrency control protocol WDHP(weak serializable distributed high priority protocol) is outlined for distributed real time databases, where a new lock mode called mask lock mode is proposed for simplifying the condition of global consistency. Finally, through a series of simulation studies, it is shown that using the new concurrency control protocol the performance of distributed real time databases can be greatly improved.
基金the National Natural Science Foundation of China and the Commission of Science,Technokgy and Industry for National Defense
文摘This paper formally defines and analyses the new notion of correctness called quasi serializability, and then outlines corresponding concurrency control protocol QDHP for distributed real-time databases. Finally, through a series of simulation studies, it shows that using the new concurrency control protocol the performance of distributed real-time databases can be much improved.