期刊文献+
共找到1,953篇文章
< 1 2 98 >
每页显示 20 50 100
For LEO Satellite Networks: Intelligent Interference Sensing and Signal Reconstruction Based on Blind Separation Technology
1
作者 Chengjie Li Lidong Zhu Zhen Zhang 《China Communications》 SCIE CSCD 2024年第2期85-95,共11页
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal... In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system. 展开更多
关键词 blind source separation greedy optimization algorithm interference sensing LEO satellite communication networks signal reconstruction
下载PDF
For Mega-Constellations: Edge Computing and Safety Management Based on Blockchain Technology
2
作者 Zhen Zhang Bing Guo Chengjie Li 《China Communications》 SCIE CSCD 2024年第2期59-73,共15页
In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of sate... In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed. 展开更多
关键词 blockchain consensus mechanism edge computing mega-constellation reputation management
下载PDF
Research on Automatic Elimination of Laptop Computer in Security CT Images Based on Projection Algorithm and YOLOv7-Seg
3
作者 Fei Wang Baosheng Liu +1 位作者 Yijun Tang Lei Zhao 《Journal of Computer and Communications》 2023年第9期1-17,共17页
In civil aviation security screening, laptops, with their intricate structural composition, provide the potential for criminals to conceal dangerous items. Presently, the security process necessitates passengers to in... In civil aviation security screening, laptops, with their intricate structural composition, provide the potential for criminals to conceal dangerous items. Presently, the security process necessitates passengers to individually present their laptops for inspection. The paper introduced a method for laptop removal. By combining projection algorithms with the YOLOv7-Seg model, a laptop’s three views were generated through projection, and instance segmentation of these views was achieved using YOLOv7-Seg. The resulting 2D masks from instance segmentation at different angles were employed to reconstruct a 3D mask through angle restoration. Ultimately, the intersection of this 3D mask with the original 3D data enabled the successful extraction of the laptop’s 3D information. Experimental results demonstrated that the fusion of projection and instance segmentation facilitated the automatic removal of laptops from CT data. Moreover, higher instance segmentation model accuracy leads to more precise removal outcomes. By implementing the laptop removal functionality, the civil aviation security screening process becomes more efficient and convenient. Passengers will no longer be required to individually handle their laptops, effectively enhancing the efficiency and accuracy of security screening. 展开更多
关键词 Instance Segmentation PROJECTION CT Image 3D Segmentation Real-Time Detection
下载PDF
A Systematic Review and Performance Evaluation of Open-Source Tools for Smart Contract Vulnerability Detection
4
作者 Yaqiong He Jinlin Fan Huaiguang Wu 《Computers, Materials & Continua》 SCIE EI 2024年第7期995-1032,共38页
With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges su... With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value. 展开更多
关键词 Blockchain security ethereum smart contracts detection tools evaluation
下载PDF
Authenticated Digital Currency Redaction with Stronger Privacy and Usability
5
作者 Tang Yongli Li Ying +2 位作者 Zhao Zongqu Li Yuanhong Guo Rui 《China Communications》 SCIE CSCD 2024年第6期219-236,共18页
With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification o... With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification of the integrity and source of the generated sub-documents and solve the privacy problem in digital currency by removing blocks from the signed documents.Unfortunately,it has not realized the consolidation of signed documents,which can not solve the problem of merging two digital currencies.Now,we introduce the concept of weight based on the threshold secret sharing scheme(TSSS)and present a redactable signature scheme with merge algorithm(RSS-MA)using the quasi-commutative accumulator.Our scheme can reduce the communication overhead by utilizing the merge algorithm when transmitting multiple digital currency signatures.Furthermore,this can effectively hide the scale of users’private monetary assets and the number of transactions between users.While meeting the three properties of digital currency issuance,in order to ensure the availability of digital currency after redacting,editors shall not remove the relevant identification information block form digital currency.Finally,our security proof and the analysis of efficiency show that RSS-MA greatly improves the communication and computation efficiency when transmitting multiple signatures. 展开更多
关键词 authenticity verification digital currency privacy protection RSS-MA TSSS USABILITY
下载PDF
A new quantum key distribution resource allocation and routing optimization scheme
6
作者 毕琳 袁晓同 +1 位作者 吴炜杰 林升熙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期244-259,共16页
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others. 展开更多
关键词 quantum key distribution(QKD) resource allocation key storage routing algorithm
下载PDF
Effect of strain on structure and electronic properties of monolayer C_(4)N_(4)
7
作者 陈昊 徐瑛 +1 位作者 赵家石 周丹 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期595-600,共6页
The first-principles calculations are performed to examine structural,mechanical,and electronic properties at large strain for a monolayer C_(4)N_(4),which has been predicted as an anchoring promising material to atte... The first-principles calculations are performed to examine structural,mechanical,and electronic properties at large strain for a monolayer C_(4)N_(4),which has been predicted as an anchoring promising material to attenuate shuttle effect in Li–S batteries stemming from its large absorption energy and low diffusion energy barrier.Our results show that the ideal strengths of C_(4)N_(4)under tension and pure shear deformation conditions reach 13.9 GPa and 12.5 GPa when the strains are 0.07 and 0.28,respectively.The folded five-membered rings and diverse bonding modes between carbon and nitrogen atoms enhance the ability to resist plastic deformation of C_(4)N_(4).The orderly bond-rearranging behaviors under the weak tensile loading path along the[100]direction cause the impressive semiconductor–metal transition and inverse semiconductor–metal transition.The present results enrich the knowledge of the structure and electronic properties of C_(4)N_(4)under deformations and shed light on exploring other two-dimensional materials under diverse loading conditions. 展开更多
关键词 two-dimensional materials strain effect structural evolution electronic properties
下载PDF
A Lightweight Network with Dual Encoder and Cross Feature Fusion for Cement Pavement Crack Detection
8
作者 Zhong Qu Guoqing Mu Bin Yuan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期255-273,共19页
Automatic crack detection of cement pavement chiefly benefits from the rapid development of deep learning,with convolutional neural networks(CNN)playing an important role in this field.However,as the performance of cr... Automatic crack detection of cement pavement chiefly benefits from the rapid development of deep learning,with convolutional neural networks(CNN)playing an important role in this field.However,as the performance of crack detection in cement pavement improves,the depth and width of the network structure are significantly increased,which necessitates more computing power and storage space.This limitation hampers the practical implementation of crack detection models on various platforms,particularly portable devices like small mobile devices.To solve these problems,we propose a dual-encoder-based network architecture that focuses on extracting more comprehensive fracture feature information and combines cross-fusion modules and coordinated attention mechanisms formore efficient feature fusion.Firstly,we use small channel convolution to construct shallow feature extractionmodule(SFEM)to extract low-level feature information of cracks in cement pavement images,in order to obtainmore information about cracks in the shallowfeatures of images.In addition,we construct large kernel atrous convolution(LKAC)to enhance crack information,which incorporates coordination attention mechanism for non-crack information filtering,and large kernel atrous convolution with different cores,using different receptive fields to extract more detailed edge and context information.Finally,the three-stage feature map outputs from the shallow feature extraction module is cross-fused with the two-stage feature map outputs from the large kernel atrous convolution module,and the shallow feature and detailed edge feature are fully fused to obtain the final crack prediction map.We evaluate our method on three public crack datasets:DeepCrack,CFD,and Crack500.Experimental results on theDeepCrack dataset demonstrate the effectiveness of our proposed method compared to state-of-the-art crack detection methods,which achieves Precision(P)87.2%,Recall(R)87.7%,and F-score(F1)87.4%.Thanks to our lightweight crack detectionmodel,the parameter count of the model in real-world detection scenarios has been significantly reduced to less than 2M.This advancement also facilitates technical support for portable scene detection. 展开更多
关键词 Shallow feature extraction module large kernel atrous convolution dual encoder lightweight network crack detection
下载PDF
A Comprehensive Survey for Privacy-Preserving Biometrics: Recent Approaches, Challenges, and Future Directions
9
作者 Shahriar Md Arman Tao Yang +3 位作者 Shahadat Shahed Alanoud AlMazroa Afraa Attiah Linda Mohaisen 《Computers, Materials & Continua》 SCIE EI 2024年第2期2087-2110,共24页
The rapid growth of smart technologies and services has intensified the challenges surrounding identity authenti-cation techniques.Biometric credentials are increasingly being used for verification due to their advant... The rapid growth of smart technologies and services has intensified the challenges surrounding identity authenti-cation techniques.Biometric credentials are increasingly being used for verification due to their advantages over traditional methods,making it crucial to safeguard the privacy of people’s biometric data in various scenarios.This paper offers an in-depth exploration for privacy-preserving techniques and potential threats to biometric systems.It proposes a noble and thorough taxonomy survey for privacy-preserving techniques,as well as a systematic framework for categorizing the field’s existing literature.We review the state-of-the-art methods and address their advantages and limitations in the context of various biometric modalities,such as face,fingerprint,and eye detection.The survey encompasses various categories of privacy-preserving mechanisms and examines the trade-offs between security,privacy,and recognition performance,as well as the issues and future research directions.It aims to provide researchers,professionals,and decision-makers with a thorough understanding of the existing privacy-preserving solutions in biometric recognition systems and serves as the foundation of the development of more secure and privacy-preserving biometric technologies. 展开更多
关键词 Biometric modalities biometric recognition biometric security PRIVACY-PRESERVING security threats
下载PDF
CBA: multi source fusion model for fast and intelligent target intention identification
10
作者 WAN Shichang LI Qingshan +1 位作者 WANG Xuhua LU Nanhua 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期406-416,共11页
How to mine valuable information from massive multisource heterogeneous data and identify the intention of aerial targets is a major research focus at present. Aiming at the longterm dependence of air target intention... How to mine valuable information from massive multisource heterogeneous data and identify the intention of aerial targets is a major research focus at present. Aiming at the longterm dependence of air target intention recognition, this paper deeply explores the potential attribute features from the spatiotemporal sequence data of the target. First, we build an intelligent dynamic intention recognition framework, including a series of specific processes such as data source, data preprocessing,target space-time, convolutional neural networks-bidirectional gated recurrent unit-atteneion (CBA) model and intention recognition. Then, we analyze and reason the designed CBA model in detail. Finally, through comparison and analysis with other recognition model experiments, our proposed method can effectively improve the accuracy of air target intention recognition,and is of significance to the commanders’ operational command and situation prediction. 展开更多
关键词 INTENTION massive data deep network artificial intelligence
下载PDF
Chemical simulation teaching system based on virtual reality and gesture interaction
11
作者 Dengzhen LU Hengyi LI +2 位作者 Boyu QIU Siyuan LIU Shuhan QI 《虚拟现实与智能硬件(中英文)》 EI 2024年第2期148-168,共21页
Background Most existing chemical experiment teaching systems lack solid immersive experiences,making it difficult to engage students.To address these challenges,we propose a chemical simulation teaching system based ... Background Most existing chemical experiment teaching systems lack solid immersive experiences,making it difficult to engage students.To address these challenges,we propose a chemical simulation teaching system based on virtual reality and gesture interaction.Methods The parameters of the models were obtained through actual investigation,whereby Blender and 3DS MAX were used to model and import these parameters into a physics engine.By establishing an interface for the physics engine,gesture interaction hardware,and virtual reality(VR)helmet,a highly realistic chemical experiment environment was created.Using code script logic,particle systems,as well as other systems,chemical phenomena were simulated.Furthermore,we created an online teaching platform using streaming media and databases to address the problems of distance teaching.Results The proposed system was evaluated against two mainstream products in the market.In the experiments,the proposed system outperformed the other products in terms of fidelity and practicality.Conclusions The proposed system which offers realistic simulations and practicability,can help improve the high school chemistry experimental education. 展开更多
关键词 Chemical experiment simulation Gesture interaction Virtual reality Model establishment Process control Streaming media DATABASE
下载PDF
Suitability of SDN and MEC to facilitate digital twin communication over LTE-A
12
作者 Hikmat Adhami Mohammad Alja’afreh +3 位作者 Mohamed Hoda Jiaqi Zhao Yong Zhou Abdulmotaleb El Saddik 《Digital Communications and Networks》 SCIE CSCD 2024年第2期347-354,共8页
Haptic is the modality that complements traditional multimedia,i.e.,audiovisual,to evolve the next wave of innovation at which the Internet data stream can be exchanged to enable remote skills and control applications... Haptic is the modality that complements traditional multimedia,i.e.,audiovisual,to evolve the next wave of innovation at which the Internet data stream can be exchanged to enable remote skills and control applications.This will require ultra-low latency and ultra-high reliability to evolve the mobile experience into the era of Digital Twin and Tactile Internet.While the 5th generation of mobile networks is not yet widely deployed,Long-Term Evolution(LTE-A)latency remains much higher than the 1 ms requirement for the Tactile Internet and therefore the Digital Twin.This work investigates an interesting solution based on the incorporation of Software-defined networking(SDN)and Multi-access Mobile Edge Computing(MEC)technologies in an LTE-A network,to deliver future multimedia applications over the Tactile Internet while overcoming the QoS challenges.Several network scenarios were designed and simulated using Riverbed modeler and the performance was evaluated using several time-related Key Performance Indicators(KPIs)such as throughput,End-2-End(E2E)delay,and jitter.The best scenario possible is clearly the one integrating MEC and SDN approaches,where the overall delay,jitter,and throughput for haptics-attained 2 ms,0.01 ms,and 1000 packets per second.The results obtained give clear evidence that the integration of,both SDN and MEC,in LTE-A indicates performance improvement,and fulfills the standard requirements in terms of the above KPIs,for realizing a Digital Twin/Tactile Internet-based system. 展开更多
关键词 LTE-A 5G Digital twin Tactile Internet KPIs SDN MEC NFV HAPTIC
下载PDF
A Multi-AGV Routing Planning Method Based on Deep Reinforcement Learning and Recurrent Neural Network
13
作者 Yishuai Lin Gang Hu +2 位作者 Liang Wang Qingshan Li Jiawei Zhu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1720-1722,共3页
Dear Editor,This letter presents a multi-automated guided vehicles(AGV) routing planning method based on deep reinforcement learning(DRL)and recurrent neural network(RNN), specifically utilizing proximal policy optimi... Dear Editor,This letter presents a multi-automated guided vehicles(AGV) routing planning method based on deep reinforcement learning(DRL)and recurrent neural network(RNN), specifically utilizing proximal policy optimization(PPO) and long short-term memory(LSTM). 展开更多
关键词 network AGV DEEP
下载PDF
Predicting Age and Gender in Author Profiling: A Multi-Feature Exploration
14
作者 Aiman Muhammad Arshad +2 位作者 Bilal Khan Sadique Ahmad Muhammad Asim 《Computers, Materials & Continua》 SCIE EI 2024年第5期3333-3353,共21页
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g.... Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction. 展开更多
关键词 Digital forensics author profiling for security AdaBoostM1 random forest ensemble learning
下载PDF
Joint alignment and steering to manage interference
15
作者 Zhao Li Xiujuan Liang +2 位作者 Yinghou Liu Jia Liu Zheng Yan 《Digital Communications and Networks》 SCIE CSCD 2024年第2期429-438,共10页
In wireless communication networks,mobile users in overlapping areas may experience severe interference,therefore,designing effective Interference Management(IM)methods is crucial to improving network performance.Howe... In wireless communication networks,mobile users in overlapping areas may experience severe interference,therefore,designing effective Interference Management(IM)methods is crucial to improving network performance.However,when managing multiple disturbances from the same source,it may not be feasible to use existing IM methods such as Interference Alignment(IA)and Interference Steering(IS)exclusively.It is because with IA,the aligned interference becomes indistinguishable at its desired Receiver(Rx)under the cost constraint of Degrees-of-Freedom(DoF),while with IS,more transmit power will be consumed in the direct and repeated application of IS to each interference.To remedy these deficiencies,Interference Alignment Steering(IAS)is proposed by incorporating IA and IS and exploiting their advantages in IM.With IAS,the interfering Transmitter(Tx)first aligns one interference incurred by the transmission of one data stream to a one-dimensional subspace orthogonal to the desired transmission at the interfered Rx,and then the remaining interferences are treated as a whole and steered to the same subspace as the aligned interference.Moreover,two improved versions of IAS,i.e.,IAS with Full Adjustment at the Interfering Tx(IAS-FAIT)and Interference Steering and Alignment(ISA),are presented.The former considers the influence of IA on the interfering user-pair's performance.The orthogonality between the desired signals at the interfered Rx can be maintained by adjusting the spatial characteristics of all interferences and the aligned interference components,thus ensuring the Spectral Efficiency(SE)of the interfering communication pairs.Under ISA,the power cost for IS at the interfered Tx is minimized,hence improving SE performance of the interfered communication-pairs.Since the proposed methods are realized at the interfering and interfered Txs cooperatively,the expenses of IM are shared by both communication-pairs.Our in-depth simulation results show that joint use of IA and IS can effectively manage multiple disturbances from the same source and improve the system's SE. 展开更多
关键词 INTERFERENCE Interference management Interference alignment Interference steering Spectral efficiency
下载PDF
Research and design of matrix operation accelerator based on reconfigurable array
16
作者 邓军勇 ZHANG Pan +2 位作者 JIANG Lin XIE Xiaoyan DENG Jingwen 《High Technology Letters》 EI CAS 2024年第2期128-137,共10页
In the case of massive data,matrix operations are very computationally intensive,and the memory limitation in standalone mode leads to the system inefficiencies.At the same time,it is difficult for matrix operations t... In the case of massive data,matrix operations are very computationally intensive,and the memory limitation in standalone mode leads to the system inefficiencies.At the same time,it is difficult for matrix operations to achieve flexible switching between different requirements when implemented in hardware.To address this problem,this paper proposes a matrix operation accelerator based on reconfigurable arrays in the context of the application of recommender systems(RS).Based on the reconfigurable array processor(APR-16)with reconfiguration,a parallelized design of matrix operations on processing element(PE)array is realized with flexibility.The experimental results show that,compared with the proposed central processing unit(CPU)and graphics processing unit(GPU)hybrid implementation matrix multiplication framework,the energy efficiency ratio of the accelerator proposed in this paper is improved by about 35×.Compared with blocked alternating least squares(BALS),its the energy efficiency ratio has been accelerated by about 1×,and the switching of matrix factorization(MF)schemes suitable for different sparsity can be realized. 展开更多
关键词 matrix factorization(MF) recommender system(RS) array processor RECONFIGURABLE matrix multiplication
下载PDF
Cambricon-QR:a sparse and bitwise reproducible quantized training accelerator
17
作者 李楠 ZHAO Yongwei +7 位作者 ZHI Tian LIU Chang DU Zidong HU Xing LI Wei ZHANG Xishan LI Ling SUN Guangzhong 《High Technology Letters》 EI CAS 2024年第1期52-60,共9页
Quantized training has been proven to be a prominent method to achieve deep neural network training under limited computational resources.It uses low bit-width arithmetics with a proper scaling factor to achieve negli... Quantized training has been proven to be a prominent method to achieve deep neural network training under limited computational resources.It uses low bit-width arithmetics with a proper scaling factor to achieve negligible accuracy loss.Cambricon-Q is the ASIC design proposed to efficiently support quantized training,and achieves significant performance improvement.However,there are still two caveats in the design.First,Cambricon-Q with different hardware specifications may lead to different numerical errors,resulting in non-reproducible behaviors which may become a major concern in critical applications.Second,Cambricon-Q cannot leverage data sparsity,where considerable cycles could still be squeezed out.To address the caveats,the acceleration core of Cambricon-Q is redesigned to support fine-grained irregular data processing.The new design not only enables acceleration on sparse data,but also enables performing local dynamic quantization by contiguous value ranges(which is hardware independent),instead of contiguous addresses(which is dependent on hardware factors).Experimental results show that the accuracy loss of the method still keeps negligible,and the accelerator achieves 1.61×performance improvement over Cambricon-Q,with about 10%energy increase. 展开更多
关键词 quantized training sparse accelerator Cambricon-QR
下载PDF
Link Budget and Enhanced Communication Distance for Ambient Internet of Things
18
作者 YANG Yibing LIU Ming +2 位作者 XU Rongtao WANG Gongpu GONG Wei 《ZTE Communications》 2024年第1期16-23,共8页
Backscatter communications will play an important role in connecting everything for beyond 5G(B5G)and 6G systems.One open challenge for backscatter communications is that the signals suffer a round-trip path loss so t... Backscatter communications will play an important role in connecting everything for beyond 5G(B5G)and 6G systems.One open challenge for backscatter communications is that the signals suffer a round-trip path loss so that the communication distance is short.In this paper,we first calculate the communication distance upper bounds for both uplink and downlink by measuring the tag sensitivity and reflection coefficient.It is found that the activation voltage of the envelope detection diode of the downlink tag is the main factor limiting the back-scatter communication distance.Based on this analysis,we then propose to implement a low-noise amplifier(LNA)module before the envelope detection at the tag to enhance the incident signal strength.Our experimental results on the hardware platform show that our method can increase the downlink communication range by nearly 20 m. 展开更多
关键词 ambient IoT(AIoT) B5G backscatter communication link budget low-noise amplifier(LNA) Release 19 tag chip sensitivity upper bounds
下载PDF
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
19
作者 Zhang Lejun Peng Minghui +6 位作者 Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin 《China Communications》 SCIE CSCD 2024年第3期149-159,共11页
With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for clou... With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes.The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem.Our paper proposes a redundant data detection method that meets the privacy protection requirements.By scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data.It has the same effect as zero-knowledge proof,and it will not reveal the privacy of users.In addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data.We use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is deleted.The feasibility of the scheme is proved through safety analysis and efficiency analysis. 展开更多
关键词 blockchain data integrity edge computing privacy protection redundant data
下载PDF
Aspect-Level Sentiment Analysis Incorporating Semantic and Syntactic Information
20
作者 Jiachen Yang Yegang Li +2 位作者 Hao Zhang Junpeng Hu Rujiang Bai 《Journal of Computer and Communications》 2024年第1期191-207,共17页
Aiming at the problem that existing models in aspect-level sentiment analysis cannot fully and effectively utilize sentence semantic and syntactic structure information, this paper proposes a graph neural network-base... Aiming at the problem that existing models in aspect-level sentiment analysis cannot fully and effectively utilize sentence semantic and syntactic structure information, this paper proposes a graph neural network-based aspect-level sentiment classification model. Self-attention, aspectual word multi-head attention and dependent syntactic relations are fused and the node representations are enhanced with graph convolutional networks to enable the model to fully learn the global semantic and syntactic structural information of sentences. Experimental results show that the model performs well on three public benchmark datasets Rest14, Lap14, and Twitter, improving the accuracy of sentiment classification. 展开更多
关键词 Aspect-Level Sentiment Analysis Attentional Mechanisms Dependent Syntactic Trees Graph Convolutional Neural Networks
下载PDF
上一页 1 2 98 下一页 到第
使用帮助 返回顶部