-
Chapter and Conference Paper
Fixed-Time Control for Cooperative Target Encirclement and Tracking by Multi-UAV
In the research, a new fixed-time control method is proposed for multiple unmanned aerial vehicles (multi-UAV) to address cooperative target encirclement and tracking. Initially, only the position information ...
-
Chapter and Conference Paper
Immediate Split Trees: Immediate Encoding of Floating Point Split Values in Random Forests
Random forests and decision trees are increasingly interesting candidates for resource-constrained machine learning models. In order to make the execution of these models efficient under resource limitations, ...
-
Chapter and Conference Paper
DAEBI: A Tool for Data Flow and Architecture Explorations of Binary Neural Network Accelerators
Binary Neural Networks (BNNs) are an efficient alternative to traditional neural networks as they use binary weights and activations, leading to significant reductions in memory footprint and computational ene...
-
Chapter and Conference Paper
TREAM: A Tool for Evaluating Error Resilience of Tree-Based Models Using Approximate Memory
Approximate memories reduce the resource demand of machine learning (ML) systems at the cost of bit errors. ML models have an intrinsic error resilience and are therefore suitable candidates to use with approx...
-
Chapter and Conference Paper
Chinese Spelling Error Detection and Correction Based on Knowledge Graph
Spelling error correction is a task in which errors in a natural language sentence can be detected and corrected. In this paper, we consider Chinese spelling error correction (CSC) for generality. A previous s...
-
Chapter and Conference Paper
Profile Consistency Discrimination
Consistency discrimination between attribute information and generated response is vital to personality-based dialogue. On existing work, few works specially investigates the consistency. In this paper, we pro...
-
Chapter and Conference Paper
Construction and Application of Event Logic Graph: A Survey
Since being proposed in 2017, event logic graph has attracted more and more researchers’ attention and has been gradually applied in various fields such as finance, health care, transportation, information, po...
-
Chapter and Conference Paper
SRPAIS: Spectral Matching Algorithm Based on Raman Peak Alignment and Intensity Selection
Currently, the frequent occurrence of safety incidents involving food counterfeiting has greatly disrupted the normal market order, infringed on the rights and interests of regular manufacturers and consumers,...
-
Chapter and Conference Paper
Using a Set of Triangle Inequalities to Accelerate K-means Clustering
The k-means clustering is a well-known problem in data mining and machine learning. However, the de facto standard, i.e., Lloyd’s k-mean algorithm, suffers from a large amount of time on the distance calculati...
-
Chapter and Conference Paper
Resource-Efficient Nanoparticle Classification Using Frequency Domain Analysis
We present a method for resource-efficient classification of nanoparticles such as viruses in liquid or gas samples by analyzing Surface Plasmon Resonance (SPR) images using frequency domain features. The SPR ...
-
Chapter and Conference Paper
Cryptanalysis of an ElGamal-Like Cryptosystem Based on Matrices Over Group Rings
ElGamal cryptography is one of the most important Public Key Cryptography (PKC) since Diffie-Hellman exchanges was proposed, however these PKCs which are based on the hard problems that discrete logarithm prob...
-
Chapter and Conference Paper
An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs
With the rapid development of Internet of Things (IoT), intelligent transportation systems (ITS) brings more and more intelligent and convenient services to people’s daily lives. Vehicular Ad hoc Networks (VAN...
-
Chapter and Conference Paper
A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solv...
-
Chapter and Conference Paper
Top-k Similarity Matching in Large Graphs with Attributes
Graphs have been widely used in social networks to find interesting relationships between individuals. To mine the wealthy information in an attributed graph, effective and efficient graph matching methods are...
-
Chapter and Conference Paper
ContactSim: An Efficient Realistic Trace Driven Contact Simulator for Vehicular Opportunistic Networks
Opportunistic networking is an innovative data delivery solution, which leverages the contact opportunities between mobile terminals to exchange messages. The contact events are highly relevant to human behavi...
-
Chapter and Conference Paper
Semantic Word Similarity Learned from Heterogenous Knowledge Bases
Recognition of semantic similarity between words plays an important role in text information management, information retrieval, and natural language processing. There are two major approaches to recognizing th...
-
Chapter and Conference Paper
Plant Leaf Water Detection Instrument Based on Near Infrared Spectroscopy
In the near infrared spectral region, a reflection plant water detection instrument was designed by using microcontroller STC12C5A60S2. The instrument consisted of signal acquisition system, microcontroller sy...
-
Chapter and Conference Paper
Competitive Design and Analysis for Machine-Minimizing Job Scheduling Problem
We explore the machine-minimizing job scheduling problem, which has a rich history in the line of research, under an online setting. We consider systems with arbitrary job arrival times, arbitrary job deadline...
-
Chapter and Conference Paper
Using Anisotropic Bivariate Threshold Function for Image Denoising in NSCT Domain
In this paper, a more stable solving method of anisotropic bivariate Laplacian distribution function and corresponding threshold function is derived from the model using Bayesian estimation theory and extended...
-
Chapter and Conference Paper
Joint Optimization of System Lifetime and Network Performance for Real-Time Wireless Sensor Networks
Maximizing the aggregate network utility and minimizing the network energy consumption are important but conflict goals in wireless sensor networks. Challenges arise due to the application-specific computing a...