期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Retraining Deep Neural Network with Unlabeled Data Collected in Embedded Devices
1
作者 Hong-Xu Cheng Le-Tian Huang +1 位作者 Jun-Shi Wang Masoumeh Ebrahimi 《Journal of Electronic Science and Technology》 CAS CSCD 2022年第1期55-69,共15页
Because of computational complexity,the deep neural network(DNN)in embedded devices is usually trained on high-performance computers or graphic processing units(GPUs),and only the inference phase is implemented in emb... Because of computational complexity,the deep neural network(DNN)in embedded devices is usually trained on high-performance computers or graphic processing units(GPUs),and only the inference phase is implemented in embedded devices.Data processed by embedded devices,such as smartphones and wearables,are usually personalized,so the DNN model trained on public data sets may have poor accuracy when inferring the personalized data.As a result,retraining DNN with personalized data collected locally in embedded devices is necessary.Nevertheless,retraining needs labeled data sets,while the data collected locally are unlabeled,then how to retrain DNN with unlabeled data is a problem to be solved.This paper proves the necessity of retraining DNN model with personalized data collected in embedded devices after trained with public data sets.It also proposes a label generation method by which a fake label is generated for each unlabeled training case according to users’feedback,thus retraining can be performed with unlabeled data collected in embedded devices.The experimental results show that our fake label generation method has both good training effects and wide applicability.The advanced neural networks can be trained with unlabeled data from embedded devices and the individualized accuracy of the DNN model can be gradually improved along with personal using. 展开更多
关键词 Deep neural network(DNN) embedded devices fake label RETRAINING
下载PDF
Study on a clamping device of leveling equipment mounted on jacket
2
作者 姜沛然 房晓明 +2 位作者 朱绍华 李怀亮 弓海霞 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2011年第4期41-44,共4页
This paper proposes a novel clamping device for leveling equipment mounted on offshore oil platform jacket,which solves the problem of leveling equipment clamping lifting force of more than 2000 tons.The main features... This paper proposes a novel clamping device for leveling equipment mounted on offshore oil platform jacket,which solves the problem of leveling equipment clamping lifting force of more than 2000 tons.The main features are that lifting force transmits to clamp claw through wedge force amplifier,embed the teeth of claw into the pile,and the embedded depth increases with the lifting force,resulting in a gravitational self-locking function.This theoretical model of clamping device was established,and the force and material characteristic were analyzed,and the feasibility of the theoretical model was verified by thin shell elastic-plastic stability theory and thin-walled structures theory.An experimental prototype of clamping device was produced to test gravity self-locking function and bearable leveling force.Compared with the theoretical model and the experimental results,it proved that the embedded clamping devices have gravitational self-locking function and can meet the need of actual leveling equipment. 展开更多
关键词 Leveling equipment wedge force amplifier embedded clamping device SELF-LOCKING
下载PDF
FirmVulSeeker—BERT and Siamese Network-Based Vulnerability Search for Embedded Device Firmware Images
3
作者 Yingchao Yu Shuitao Gan Xiaojun Qin 《Journal on Internet of Things》 2022年第1期1-20,共20页
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine... In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine binary similarity,achieved great progress.However,we found that the existing frameworks often ignored the complex internal structure of instructions and didn’t fully consider the long-term dependencies of instructions.In this paper,we propose firmVulSeeker—a vulnerability search tool for embedded firmware images,based on BERT and Siamese network.It first builds a BERT MLM task to observe and learn the semantics of different instructions in their context in a very large unlabeled binary corpus.Then,a finetune mode based on Siamese network is constructed to guide training and matching semantically similar functions using the knowledge learned from the first stage.Finally,it will use a function embedding generated from the fine-tuned model to search in the targeted corpus and find the most similar function which will be confirmed whether it’s a real vulnerability manually.We evaluate the accuracy,robustness,scalability and vulnerability search capability of firmVulSeeker.Results show that it can greatly improve the accuracy of matching semantically similar functions,and can successfully find more real vulnerabilities in real-world firmware than other tools. 展开更多
关键词 Embedded device firmware vulnerability search BERT siamese network
下载PDF
Saving Environment Using Internet of Things: Challenges and the Possibilities
4
作者 Praneet Sah 《Advances in Internet of Things》 2016年第4期55-64,共10页
The term Internet of Things (IoT) emerged in the early 2000s but actually gained momentum only in the past few years, however we still do not get to see them in our daily life. It has generally been avoided by the mai... The term Internet of Things (IoT) emerged in the early 2000s but actually gained momentum only in the past few years, however we still do not get to see them in our daily life. It has generally been avoided by the mainstream market due to its “cryptic” nature which requires technical knowledge prior to its use. Lack of strong business model (by companies) and inability to adapt to new rapid changes (by consumers) are the two primary factors contributing to the fact that IoT is well ahead of its times but it need no longer be. In this paper, I’ve created a setup for smart home that allows the users to control their electrical appliances from internet and even makes the appliances smart enough to react to the environmental conditions on their own. Using this setup, I observed the pattern in which electricity consumption and carbon footprints reduced as compared to the conventional setup i.e. without IoT. Analyzing this data provided me a solid proof that IoT definitely helps us to save electricity and environment. Since IoT is beneficial for all, I, then focused on the challenges that are hampering the penetration of IoT into the daily lives of consumers and how the consumer is overlooking the benefits that it has to offer, which even includes a primary concern for many, i.e. saving money. This paper is overall aimed to change the way a consumer thinks about IoT and to provide a solid ground to how it is beneficial. 展开更多
关键词 Arduino Based Projects Embedded devices Internet of Things Home Area Network RELAY Smart Homes
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部