期刊文献+
共找到79篇文章
< 1 2 4 >
每页显示 20 50 100
A Comprehensive Survey of Recent Transformers in Image,Video and Diffusion Models
1
作者 Dinh Phu Cuong Le Dong Wang Viet-Tuan Le 《Computers, Materials & Continua》 SCIE EI 2024年第7期37-60,共24页
Transformer models have emerged as dominant networks for various tasks in computer vision compared to Convolutional Neural Networks(CNNs).The transformers demonstrate the ability to model long-range dependencies by ut... Transformer models have emerged as dominant networks for various tasks in computer vision compared to Convolutional Neural Networks(CNNs).The transformers demonstrate the ability to model long-range dependencies by utilizing a self-attention mechanism.This study aims to provide a comprehensive survey of recent transformerbased approaches in image and video applications,as well as diffusion models.We begin by discussing existing surveys of vision transformers and comparing them to this work.Then,we review the main components of a vanilla transformer network,including the self-attention mechanism,feed-forward network,position encoding,etc.In the main part of this survey,we review recent transformer-based models in three categories:Transformer for downstream tasks,Vision Transformer for Generation,and Vision Transformer for Segmentation.We also provide a comprehensive overview of recent transformer models for video tasks and diffusion models.We compare the performance of various hierarchical transformer networks for multiple tasks on popular benchmark datasets.Finally,we explore some future research directions to further improve the field. 展开更多
关键词 TRANSFORMER vision transformer self-attention hierarchical transformer diffusion models
在线阅读 下载PDF
FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient
2
作者 Fei Yu Zinan Zhang +3 位作者 Hui Shen Yuanyuan Huang Shuo Cai Sichun Du 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第2期109-118,共10页
A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and d... A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and dynamically analyzed,and implemented on FPGA.Then,a new pseudo-random number generator(PRNG)based on MHNN is proposed.The post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator,which effectively ensures the randomness of PRNG.The experiments in this paper comply with the IEEE 754-1985 high precision32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7 Z020 CLG400-2 FPGA chip and the Verilog-HDL hardware programming language.The random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis,proving its randomness and high performance.Finally,an image encryption system based on PRNG is proposed and implemented on FPGA,which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things(Io T). 展开更多
关键词 memristive Hopfield neural network(MHNN) pseudo-random number generator(PRNG) FPGA image encryption decryption system
在线阅读 下载PDF
Evolution of defects and deformation mechanisms in different tensile directions of solidified lamellar Ti-Al alloy
3
作者 Yutao Liu Tinghong Gao +7 位作者 Yue Gao Lianxin Li Min Tan Quan Xie Qian Chen Zean Tian Yongchao Liang Bei Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第4期518-524,共7页
Two-phaseγ-TiAl/α_(2)-Ti_(3)Al lamellar intermetallics have attracted considerable attention because of their excellent strength and plasticity.However,the exact deformation mechanisms remain to be investigated.In t... Two-phaseγ-TiAl/α_(2)-Ti_(3)Al lamellar intermetallics have attracted considerable attention because of their excellent strength and plasticity.However,the exact deformation mechanisms remain to be investigated.In this paper,a solidified lamellar Ti-Al alloy with lamellar orientation at 0°,17°,and 73°with respect to the loading direction was stretched by utilizing molecular dynamics(MD)simulations.The results show that the mechanical properties of the sample are considerably influenced by solidified defects and tensile directions.The structure deformation and fracture were primarily attributed to an intrinsic stacking fault(ISF)accompanied by the nucleated Shockley dislocation,and the adjacent extrinsic stacking fault(ESF)and ISF formed by solidification tend to form large HCP structures during the tensile process loading at 73°.Moreover,cleavage cracking easily occurs on theγ/α_(2)interface under tensile deformation.The fracture loading mechanism at 17°is grain boundary slide whereas,at 73°and 0°,the dislocation piles up to form a dislocation junction. 展开更多
关键词 molecular dynamics simulation solidified lamellar Ti-Al alloy tensile directions γ/α_(2)interface
在线阅读 下载PDF
Ghost imaging based on the control of light source bandwidth
4
作者 刘兆骐 白艳锋 +3 位作者 邹璇彭凡 周立宇 付芹 傅喜泉 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期276-279,共4页
A scheme to improve the quality in ghost imaging(GI)by controlling the bandwidth of light source(BCGI)is proposed.The theoretical and numerical results show that the reconstruction result with high quality can be obta... A scheme to improve the quality in ghost imaging(GI)by controlling the bandwidth of light source(BCGI)is proposed.The theoretical and numerical results show that the reconstruction result with high quality can be obtained by adjusting the bandwidth range of the light source appropriately,and the selection criterion of the bandwidth is analyzed by the power distribution of the imaging target.A proof-of-principle experiment is implemented to verify the theoretical and numerical results.In addition,the BCGI also presents better anti-noise performance when compared with some popular GI methods. 展开更多
关键词 ghost imaging light source property spatial frequency domain
在线阅读 下载PDF
Performance analysis of UAV-based mixed underwater PLC-RF systems
5
作者 Shenghai Chen Liang Yang Xianfu Lei 《Digital Communications and Networks》 CSCD 2024年第5期1332-1340,共9页
In this study,we analyzed the performance of an Unmanned Aerial Vehicle(UAV)-based mixed Underwater Power Line Communication-Radio Frequency(UPLC-RF)network.In this network,a buoy located at the sea is used as a relay... In this study,we analyzed the performance of an Unmanned Aerial Vehicle(UAV)-based mixed Underwater Power Line Communication-Radio Frequency(UPLC-RF)network.In this network,a buoy located at the sea is used as a relay to transmit signals from the underwater signal source to the UAV through the PLC link.We assume that the UPLC channel obeys a log-normal distribution and that the RF link follows the Rician distribution.Using this model,we obtained the closed-form expressions for the Outage Probability(OP),Average Bit-error-rate(ABER),and Average Channel Capacity(ACC).In addition,the asymptotic analysis of the OP and ABER was performed,and an upper bound for the average capacity was obtained.Finally,the analytical results were verified by Monte Carlo simulation thereby demonstrating the effect of impulse noise and the altitude of the UAV on network performance. 展开更多
关键词 ABER Average bit-error-rate ACC Average channel capacity OP Outage probability UAV Unmanned aerial vehicle UPLC Underwater power line communication
在线阅读 下载PDF
Review of Text Classification Methods on Deep Learning 被引量:13
6
作者 Hongping Wu Yuling Liu Jingwen Wang 《Computers, Materials & Continua》 SCIE EI 2020年第6期1309-1321,共13页
Text classification has always been an increasingly crucial topic in natural language processing.Traditional text classification methods based on machine learning have many disadvantages such as dimension explosion,da... Text classification has always been an increasingly crucial topic in natural language processing.Traditional text classification methods based on machine learning have many disadvantages such as dimension explosion,data sparsity,limited generalization ability and so on.Based on deep learning text classification,this paper presents an extensive study on the text classification models including Convolutional Neural Network-Based(CNN-Based),Recurrent Neural Network-Based(RNN-based),Attention Mechanisms-Based and so on.Many studies have proved that text classification methods based on deep learning outperform the traditional methods when processing large-scale and complex datasets.The main reasons are text classification methods based on deep learning can avoid cumbersome feature extraction process and have higher prediction accuracy for a large set of unstructured data.In this paper,we also summarize the shortcomings of traditional text classification methods and introduce the text classification process based on deep learning including text preprocessing,distributed representation of text,text classification model construction based on deep learning and performance evaluation. 展开更多
关键词 Text classification deep learning distributed representation CNN RNN attention mechanism
在线阅读 下载PDF
Solid−solid phase transition of tungsten induced by high pressure:A molecular dynamics simulation 被引量:5
7
作者 Xiao-zhen DENG Lin LANG +3 位作者 Yun-fei MO Ke-jun DONG Ze-an TIAN Wang-yu HU 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2020年第11期2980-2993,共14页
The phase transition of tungsten(W)under high pressures was investigated with molecular dynamics simulation.The structure was characterized in terms of the pair distribution function and the largest standard cluster a... The phase transition of tungsten(W)under high pressures was investigated with molecular dynamics simulation.The structure was characterized in terms of the pair distribution function and the largest standard cluster analysis(LSCA).It is found that under 40−100 GPa at a cooling rate of 0.1 K/ps a pure W melt first crystallizes into the body-centred cubic(BCC)crystal,and then transfers into the hexagonal close-packed(HCP)crystal through a series of BCC−HCP coexisting states.The dynamic factors may induce intermediate stages during the liquid−solid transition and the criss-cross grain boundaries cause lots of indistinguishable intermediate states,making the first-order BCC−HCP transition appear to be continuous.Furthermore,LSCA is shown to be a parameter-free method that can effectively analyze both ordered and disordered structures.Therefore,LSCA can detect more details about the evolution of the structure in such structure transition processes with rich intermediate structures. 展开更多
关键词 molecular dynamics(MD)simulation rapid solidification solid−solid phase transition largest standard cluster analysis topologically close-packed cluster
在线阅读 下载PDF
Research on Data Fusion of Adaptive Weighted Multi-Source Sensor 被引量:4
8
作者 Donghui Li Cong Shen +5 位作者 Xiaopeng Dai Xinghui Zhu Jian Luo Xueting Li Haiwen Chen Zhiyao Liang 《Computers, Materials & Continua》 SCIE EI 2019年第9期1217-1231,共15页
Data fusion can effectively process multi-sensor information to obtain more accurate and reliable results than a single sensor.The data of water quality in the environment comes from different sensors,thus the data mu... Data fusion can effectively process multi-sensor information to obtain more accurate and reliable results than a single sensor.The data of water quality in the environment comes from different sensors,thus the data must be fused.In our research,self-adaptive weighted data fusion method is used to respectively integrate the data from the PH value,temperature,oxygen dissolved and NH3 concentration of water quality environment.Based on the fusion,the Grubbs method is used to detect the abnormal data so as to provide data support for estimation,prediction and early warning of the water quality. 展开更多
关键词 Adaptive weighting multi-source sensor data fusion loss of data processing grubbs elimination
在线阅读 下载PDF
Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage 被引量:4
9
作者 Xiehua Li Yanlong Wang +1 位作者 Ming Xu Yaping Cui 《China Communications》 SCIE CSCD 2018年第2期138-152,共15页
In this paper, we consider the problems of data sharing between multiple distrusted authorities. Prior solutions rely on trusted third parties such as CAs, or are susceptible to collusion between malicious authorities... In this paper, we consider the problems of data sharing between multiple distrusted authorities. Prior solutions rely on trusted third parties such as CAs, or are susceptible to collusion between malicious authorities, which can comprise the security of honest ones. In this paper, we propose a new multi-authority data sharing scheme - Decen- tralized Multi-Authority ABE (DMA), which is derived from CP-ABE that is resilient to these types of misbehavior. Our system distin- guishes between a data owner (DO) principal and attribute authorities (AAs): the DO owns the data but allows AAs to arbitrate access by providing attribute labels to users. The data is protected by policy encryption over these attributes. Unlike prior systems, attributes generated by AAs are not user-specific, and neither is the system susceptible to collusion between users who try to escalate their access by sharing keys. We prove our scherne correct under the Decisional Bilinear Diffie-Hellman (DBDH) assumption; we also include a com- plete end-to-end implementation that demon- strates the practical efficacy of our technique. 展开更多
关键词 multi-authority ABE cloud stor-age access policy
在线阅读 下载PDF
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles 被引量:4
10
作者 Ziming Liu Yang Xu +2 位作者 Cheng Zhang Haroon Elahi Xiaokang Zhou 《Digital Communications and Networks》 SCIE CSCD 2022年第6期976-983,共8页
Social Internet of Vehicles(SIoV)falls under the umbrella of social Internet of Things(IoT),where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services w... Social Internet of Vehicles(SIoV)falls under the umbrella of social Internet of Things(IoT),where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services with other social entities by leveraging the capabilities of 5G technology,which brings new opportunities and challenges,e.g.,collaborative power trading can address the mileage anxiety of electric vehicles.However,it relies on a trusted central party for scheduling,which introduces performance bottlenecks and cannot be set up in a distributed network,in addition,the lack of transparency in state-of-the-art Vehicle-to-Vehicle(V2V)power trading schemes can introduce further trust issues.In this paper,we propose a blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social vehicular networks that uses a distributed market mechanism to introduce trusted power trading and avoids the dependence on a centralized dispatch center.Based on the game theory,we design the pricing and trading matching mechanism for V2V power trading to obtain maximum social welfare.We use blockchain to record power trading data for trusted pricing and use smart contracts for transaction matching.The simulation results verify the effectiveness of the proposed scheme in improving social welfare and reducing the load on the grid. 展开更多
关键词 Social internet of vehicles Bl ockchain Collaborative power trading Vehicle-to-vehicle charging 5G
在线阅读 下载PDF
Reliability analysis of monotone coherent multi-state systems based on Bayesian networks 被引量:2
11
作者 Binghua Song Zhongbao Zhou +2 位作者 Chaoqun Ma Jinglun Zhou Shaofeng Geng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第6期1326-1335,共10页
The Bayesian networks (BNs) provide a robust probabilistic method of reasoning under uncertainty and have been successfully applied to a variety of real-world tasks. Aiming to explore the capabilities of the BN formal... The Bayesian networks (BNs) provide a robust probabilistic method of reasoning under uncertainty and have been successfully applied to a variety of real-world tasks. Aiming to explore the capabilities of the BN formalism in reliability analysis of monotone coherent multi-state systems, the BNs are compared with a popular tool for reliability analysis of monotone coherent multi-state systems, namely the multi-state fault trees (MFTs). It is shown that any MFT can be directly mapped into BN and the basic inference techniques on the latter may be used to obtain classical parameters computed from the former (i.e. probability distribution of top variable, minimal upper vectors and maximum lower vectors for any performance level, importance measures of components). Furthermore, some additional information can be obtained by using BN, both at the modeling and analysis level. At the modeling level, several restrictive assumptions implicit in the MFT methodology can be removed and various kinds of dependencies among components can be accommodated. At the analysis level, a general diagnostic analysis can be performed. The comparison of these methods is illustrated by an example of the water supply system. © 2016 Beijing Institute of Aerospace Information. 展开更多
关键词 Bayesian networks Probability distributions RELIABILITY Reliability theory VECTORS Water supply Water supply systems
在线阅读 下载PDF
A Secure Mutual Authentication Scheme of Blockchain-Based in WBANs 被引量:2
12
作者 Jianbo Xu Xiangwei Meng +2 位作者 Wei Liang Hongbo Zhou Kuan-Ching Li 《China Communications》 SCIE CSCD 2020年第9期34-49,共16页
Wireless Body Area Networks(WBANs)refer to small sensor network that consists of sensor devices mounted on the surface of the body or implanted in the body,as such networks are employed to harvest physiological data o... Wireless Body Area Networks(WBANs)refer to small sensor network that consists of sensor devices mounted on the surface of the body or implanted in the body,as such networks are employed to harvest physiological data of the human body or to act as an assistant regulator of several specific physiological indicators of the human body.The sensor devices transmit the harvested human physiological data to the local node via a public channel.Before transmitting data,the sensor device and the local node should perform mutual authentication and key agreement.It is proposed in this paper a secure mutual authentication scheme of blockchain-based in WBANs.To analyze the security of this scheme,formal security analysis,and informal security analysis are used,then the computation and communication costs are compared with those of the relevant schemes.Relevant experimental results reveal that the proposed scheme exhibit more effective control over energy consumption and promising. 展开更多
关键词 information security AUTHENTICATION blockchain WBANs Real-or-Random model
在线阅读 下载PDF
Multi-Label Learning Based on Transfer Learning and Label Correlation 被引量:2
13
作者 Kehua Yang Chaowei She +2 位作者 Wei Zhang Jiqing Yao Shaosong Long 《Computers, Materials & Continua》 SCIE EI 2019年第7期155-169,共15页
In recent years,multi-label learning has received a lot of attention.However,most of the existing methods only consider global label correlation or local label correlation.In fact,on the one hand,both global and local... In recent years,multi-label learning has received a lot of attention.However,most of the existing methods only consider global label correlation or local label correlation.In fact,on the one hand,both global and local label correlations can appear in real-world situation at same time.On the other hand,we should not be limited to pairwise labels while ignoring the high-order label correlation.In this paper,we propose a novel and effective method called GLLCBN for multi-label learning.Firstly,we obtain the global label correlation by exploiting label semantic similarity.Then,we analyze the pairwise labels in the label space of the data set to acquire the local correlation.Next,we build the original version of the label dependency model by global and local label correlations.After that,we use graph theory,probability theory and Bayesian networks to eliminate redundant dependency structure in the initial version model,so as to get the optimal label dependent model.Finally,we obtain the feature extraction model by adjusting the Inception V3 model of convolution neural network and combine it with the GLLCBN model to achieve the multi-label learning.The experimental results show that our proposed model has better performance than other multi-label learning methods in performance evaluating. 展开更多
关键词 Bayesian networks multi-label learning global and local label correlations transfer learning
在线阅读 下载PDF
Robust Watermarking of Mobile Video Resistant against Barrel Distortion 被引量:2
14
作者 Huawei Tian Yanhui Xiao +2 位作者 Gang Cao Jianwei Ding Bo Ou 《China Communications》 SCIE CSCD 2016年第9期131-138,共8页
In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the orig... In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the original view and the pre-warped virtual view.A robust watermarking resistant against barrel distortion for HMDs is proposed in this paper.Watermark mask is embedded into image in consideration of imperceptibility and robustness of watermarking.In order to detect watermark from the pre-warped image with barrel distortion,an estimation method of the barrel distortion is proposed for HMDs.Then,the same warp is enforced on the embedded watermark mask with the estimated parameters of barrel distortion.The correlation between the warped watermark and the pre-warped image is computed to predicate the existence of watermark.As shown in experimental results,watermark of mobile video can be detected not only from the original views,but also from the pre-warped virtual view.It also shows that the proposed scheme is resistant against combined barrel distortion and common post-processing,such as JPEG compression. 展开更多
关键词 mobile video HMD with mobile robust watermarking
在线阅读 下载PDF
The dynamics of a memristor-based Rulkov neuron with fractional-order difference 被引量:1
15
作者 Yan-Mei Lu Chun-Hua Wang +1 位作者 Quan-Li Deng Cong Xu 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第6期30-38,共9页
The exploration of the memristor model in the discrete domain is a fascinating hotspot.The electromagnetic induction on neurons has also begun to be simulated by some discrete memristors.However,most of the current in... The exploration of the memristor model in the discrete domain is a fascinating hotspot.The electromagnetic induction on neurons has also begun to be simulated by some discrete memristors.However,most of the current investigations are based on the integer-order discrete memristor,and there are relatively few studies on the form of fractional order.In this paper,a new fractional-order discrete memristor model with prominent nonlinearity is constructed based on the Caputo fractional-order difference operator.Furthermore,the dynamical behaviors of the Rulkov neuron under electromagnetic radiation are simulated by introducing the proposed discrete memristor.The integer-order and fractional-order peculiarities of the system are analyzed through the bifurcation graph,the Lyapunov exponential spectrum,and the iterative graph.The results demonstrate that the fractional-order system has more abundant dynamics than the integer one,such as hyper-chaos,multi-stable and transient chaos.In addition,the complexity of the system in the fractional form is evaluated by the means of the spectral entropy complexity algorithm and consequences show that it is affected by the order of the fractional system.The feature of fractional difference lays the foundation for further research and application of the discrete memristor and the neuron map in the future. 展开更多
关键词 discrete memristor Rulkov neuron fractional-order difference DYNAMICS
在线阅读 下载PDF
Personalized News Recommendation Based on the Text and Image Integration 被引量:1
16
作者 Kehua Yang Shaosong Long +2 位作者 Wei Zhang Jiqing Yao Jing Liu 《Computers, Materials & Continua》 SCIE EI 2020年第7期557-570,共14页
The personalized news recommendation has been very popular in the news recommendation field.In most research,the picture information in the news is ignored,but the information conveyed to the users through pictures is... The personalized news recommendation has been very popular in the news recommendation field.In most research,the picture information in the news is ignored,but the information conveyed to the users through pictures is more intuitive and more likely to affect the users’reading interests than the one in the textual form.Therefore,in this paper,a model that combines images and texts in the news is proposed.In this model,the new tags are extracted from the images and texts in the news,and based on these new tags,an adaptive tag(AT)algorithm is proposed.The AT algorithm selects the tags the user is interested in based on the user feedback.In particular,the AT algorithm can predict tags that a user may be interested in with the help of the tag correlation graph without any user feedback.The proposed AT algorithm is verified by experiments.The experimental results verified the AT algorithm regarding three evaluation indexes F1-score(F1),area under curve(AUC)and mean reciprocal rank(MRR).The recommended effect of the proposed algorithm is found to be better than those of the various baseline algorithms on real-world datasets. 展开更多
关键词 News recommendation F1 AUC MRR feedback correlation graph
在线阅读 下载PDF
Rucklidge-based memristive chaotic system:Dynamic analysis and image encryption 被引量:1
17
作者 蹇璨岭 田泽安 +3 位作者 梁波 胡晨阳 王桥 陈靖翕 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第10期298-309,共12页
A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is performed.The sensitivity of the system to ... A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is performed.The sensitivity of the system to parameters allows it obtains 16 different attractors by changing only one parameter.The various transient behaviors and excellent spectral entropy and C0 complexity values of the system can also reflect the high complexity of the system.A circuit is designed and verified the feasibility of the system from the physical level.Finally,the system is applied to image encryption,and the security of the encryption system is analyzed from multiple aspects,providing a reference for the application of such memristive chaotic systems. 展开更多
关键词 chaotic system MEMRISTOR intermittent chaos multi-transient behavior image encryption
在线阅读 下载PDF
Toward Energy-Efficiency Optimization of Pktgen-DPDK for Green Network Testbeds 被引量:1
18
作者 Guo Li Dafang Zhang +1 位作者 Yanbiao Li Keqin Li 《China Communications》 SCIE CSCD 2018年第11期199-207,共9页
The packet generator (pktgen) is a fundamental module of the majority of soft- ware testers used to benchmark network pro- tocols and functions. The high performance of the pktgen is an important feature of Future I... The packet generator (pktgen) is a fundamental module of the majority of soft- ware testers used to benchmark network pro- tocols and functions. The high performance of the pktgen is an important feature of Future Internet Testbeds, and DPDK is a network packet accelerated platform, so we can use DPDK to improve performance. Meanwhile, green computing is advocated for in the fu- ture of the internet. Most existing efforts have contributed to improving either performance or accuracy. We, however, shifted the focus to energy-efficiency. We find that high per- formance comes at the cost of high energy consumption. Therefore, we started from a widely used high performance schema, deeply studying the multi-core platform, especially in terms of parallelism, core allocation, and fre- quency controlling. On this basis, we proposed an AFfinity-oriented Fine-grained CONtrolling (AFFCON) mechanism in order to improve energy efficiency with desirable performance. As clearly demonstrated through a series of evaluative experiments, our proposal can reduce CPU power consumption by up to 11% while maintaining throughput at the line rate. 展开更多
关键词 CPU affinity DPDK energy-effi-cient NUMA packet generator
在线阅读 下载PDF
Evaluating accuracy of Hessian-based predictor-corrector integrators
19
作者 LU Shao-fei WU Heng LIU Xu-chong 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第7期1696-1702,共7页
Direct dynamics simulations are a useful and general approach for studying the atomistic properties of complex chemical systems because they do not require fitting an analytic potential energy function.Hessian-based p... Direct dynamics simulations are a useful and general approach for studying the atomistic properties of complex chemical systems because they do not require fitting an analytic potential energy function.Hessian-based predictor-corrector integrators are a widely used approach for calculating the trajectories of moving atoms in direct dynamics simulations.We employ a monodromy matrix to propose a tool for evaluating the accuracy of integrators in the trajectory calculation.We choose a general velocity Verlet as a different object.We also simulate molecular with hydrogen(CO_2) and molecular with hydrogen(H_2O) motions.Comparing the eigenvalues of monodromy matrix,many simulations show that Hessian-based predictor-corrector integrators perform well for Hessian updates and non-Hessian updates.Hessian-based predictor-corrector integrator with Hessian update has a strong performance in the H_2O simulations.Hessian-based predictor-corrector integrator with Hessian update has a strong performance when the integrating step of the velocity Verlet approach is tripled for the predicting step.In the CO_2 simulations,a strong performance occurs when the integrating step is a multiple of five. 展开更多
关键词 MONODROMY matrix eigenvalue Hessian-based PREDICTOR-CORRECTOR velocity Verlet
在线阅读 下载PDF
A user-oriented resource scheduling method for improving agile software pattern in cloud environment
20
作者 龙飞 杨昌 +1 位作者 荣辉桂 李建方 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第11期2906-2916,共11页
The crowdsourcing, as a service pattern in cloud environment, usually aims at the cross-disciplinary cooperation and creating value together with customers and becomes increasingly prevalent. Software process, as a ki... The crowdsourcing, as a service pattern in cloud environment, usually aims at the cross-disciplinary cooperation and creating value together with customers and becomes increasingly prevalent. Software process, as a kind of software development and management strategy, is defined as a series of activities implemented by software life cycle and provides a set of rules for various phases of the software engineering to achieve the desired objectives. With the current software development cycle getting shorter, facing more frequent needs change and fierce competition, a new resource management pattern is proposed to respond to these issues agilely by introducing the crowdsourcing service to agile software development for pushing the agility of software process. Then, a user-oriented resource scheduling method is proposed for rational use of various resources in the process and maximizing the benefits of all parties. From the experimental results, the proposed pattern and resources scheduling method reduces greatly the resource of project resource manager and increases the team resource utilization rate, which greatly improves the agility of software process and delivers software products quickly in crowdsourcing pattern. 展开更多
关键词 resource scheduling agile software development project resource manager(PRM) individual resource provider(IRP)-
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部