期刊文献+
共找到3,568篇文章
< 1 2 179 >
每页显示 20 50 100
HARDWARE DEMODULATION METHOD FOR &D EDGEDETEOTION AND ERROR OOMPENSATION
1
作者 李东光 吉贵军 +1 位作者 杨世民 张国雄 《Transactions of Tianjin University》 EI CAS 1999年第1期52-56,共5页
A hardwale demodulation method for 2-D edge detection is proposed. The filtering step and the differential step are implemented by using the hardware circuit. This demodulation circuit simplifies the edgefinder and re... A hardwale demodulation method for 2-D edge detection is proposed. The filtering step and the differential step are implemented by using the hardware circuit. This demodulation circuit simplifies the edgefinder and reduces the measuring cycle. The calibration method of scale setting is also presented,and bymeasuring some calibrated objects,the demodulation errors and the error correction table is obtained. 展开更多
关键词 edge detection hardware demodulation demodulation error COMPENSATION
下载PDF
Introduction to professor HE Pu-ren's three-edged needle therapy techniques 被引量:1
2
作者 田苑 时旭平 +3 位作者 李婷 李岩 蔡志敏 程素丽 《World Journal of Acupuncture-Moxibustion》 CSCD 2015年第1期35-38,43,共5页
Dr.He's bloodletting therapy utilizing three edged needles is one of his "three adjusting methods of acupuncture". During his 70 years of clinical practice, he developed the theory that most diseases are caused by ... Dr.He's bloodletting therapy utilizing three edged needles is one of his "three adjusting methods of acupuncture". During his 70 years of clinical practice, he developed the theory that most diseases are caused by qi stagnation, and in order to restore qi circulation one needs to improve the blood circulation first. Based on this theory, in combination with empirical insights from clinical practice, he has developed a unique technique for using three-edged needles. He has also categorized and extended the application of bloodletting therapy with three edged needles to cover over 150 diseases. In addition, Dr. He's bloodletting therapy with three edged needles is an innovation that may inspire other physicians to develope and expand the use of acupuncture-related therapies to treat disease. 展开更多
关键词 Professor HE Pu-ren three edged needles bloodletting therapy experience of senior acupuncturist
原文传递
基于高空平台的边缘计算卸载:网络、算法和展望
3
作者 孙恩昌 李梦思 +2 位作者 何若兰 张卉 张延华 《北京工业大学学报》 CAS CSCD 北大核心 2024年第3期348-361,共14页
高空平台(high altitude platform,HAP)技术与多接入边缘计算(multi-access edge computing,MEC)技术的结合将MEC服务器部署区域由地面扩展到空中,打破传统地面MEC网络的局限性,为用户提供无处不在的计算卸载服务。针对基于HAP的MEC卸... 高空平台(high altitude platform,HAP)技术与多接入边缘计算(multi-access edge computing,MEC)技术的结合将MEC服务器部署区域由地面扩展到空中,打破传统地面MEC网络的局限性,为用户提供无处不在的计算卸载服务。针对基于HAP的MEC卸载研究进行综述,首先,从HAP计算节点的优势、网络组成部分、网络结构、主要挑战及其应对技术4个方面分析基于HAP的MEC网络;其次,分别从图论、博弈论、机器学习、联邦学习等理论的角度对基于HAP的MEC卸载算法进行横向分析和纵向对比;最后,指出基于HAP的MEC卸载技术目前存在的问题,并对该技术的未来研究方向进行展望。 展开更多
关键词 高空平台(high altitude platform HAP) 多接入边缘计算(multi-access edge computing MEC) 计算卸载 图论 博弈论 机器学习
下载PDF
240 nm AlGaN-based deep ultraviolet micro-LEDs:size effect versus edge effect 被引量:2
4
作者 Shunpeng Lu Jiangxiao Bai +6 位作者 Hongbo Li Ke Jiang Jianwei Ben Shanli Zhang Zi-Hui Zhang Xiaojuan Sun Dabing Li 《Journal of Semiconductors》 EI CAS CSCD 2024年第1期55-62,共8页
240 nm AlGaN-based micro-LEDs with different sizes are designed and fabricated.Then,the external quantum efficiency(EQE)and light extraction efficiency(LEE)are systematically investigated by comparing size and edge ef... 240 nm AlGaN-based micro-LEDs with different sizes are designed and fabricated.Then,the external quantum efficiency(EQE)and light extraction efficiency(LEE)are systematically investigated by comparing size and edge effects.Here,it is revealed that the peak optical output power increases by 81.83%with the size shrinking from 50.0 to 25.0μm.Thereinto,the LEE increases by 26.21%and the LEE enhancement mainly comes from the sidewall light extraction.Most notably,transversemagnetic(TM)mode light intensifies faster as the size shrinks due to the tilted mesa side-wall and Al reflector design.However,when it turns to 12.5μm sized micro-LEDs,the output power is lower than 25.0μm sized ones.The underlying mechanism is that even though protected by SiO2 passivation,the edge effect which leads to current leakage and Shockley-Read-Hall(SRH)recombination deteriorates rapidly with the size further shrinking.Moreover,the ratio of the p-contact area to mesa area is much lower,which deteriorates the p-type current spreading at the mesa edge.These findings show a role of thumb for the design of high efficiency micro-LEDs with wavelength below 250 nm,which will pave the way for wide applications of deep ultraviolet(DUV)micro-LEDs. 展开更多
关键词 ALGAN deep ultraviolet micro-LEDs light extraction efficiency size effect edge effect
下载PDF
Air-Ground Collaborative Mobile Edge Computing:Architecture,Challenges,and Opportunities 被引量:1
5
作者 Qin Zhen He Shoushuai +5 位作者 Wang Hai Qu Yuben Dai Haipeng Xiong Fei Wei Zhenhua Li Hailong 《China Communications》 SCIE CSCD 2024年第5期1-16,共16页
By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-grow... By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-growing computational demands,it is impossible for a single MEC paradigm to effectively support high-quality intelligent services at end user equipments(UEs).To address this issue,we propose an air-ground collaborative MEC(AGCMEC)architecture in this article.The proposed AGCMEC integrates all potentially available MEC servers within air and ground in the envisioned 6G,by a variety of collaborative ways to provide computation services at their best for UEs.Firstly,we introduce the AGC-MEC architecture and elaborate three typical use cases.Then,we discuss four main challenges in the AGC-MEC as well as their potential solutions.Next,we conduct a case study of collaborative service placement for AGC-MEC to validate the effectiveness of the proposed collaborative service placement strategy.Finally,we highlight several potential research directions of the AGC-MEC. 展开更多
关键词 air-ground architecture COLLABORATIVE mobile edge computing
下载PDF
Edge enhanced depth perception with binocular meta-lens 被引量:2
6
作者 Xiaoyuan Liu Jingcheng Zhang +5 位作者 Borui Leng Yin Zhou Jialuo Cheng Takeshi Yamaguchi Takuo Tanaka Mu Ku Chen 《Opto-Electronic Science》 2024年第9期4-13,共10页
The increasing popularity of the metaverse has led to a growing interest and market size in spatial computing from both academia and industry.Developing portable and accurate imaging and depth sensing systems is cruci... The increasing popularity of the metaverse has led to a growing interest and market size in spatial computing from both academia and industry.Developing portable and accurate imaging and depth sensing systems is crucial for advancing next-generation virtual reality devices.This work demonstrates an intelligent,lightweight,and compact edge-enhanced depth perception system that utilizes a binocular meta-lens for spatial computing.The miniaturized system comprises a binocular meta-lens,a 532 nm filter,and a CMOS sensor.For disparity computation,we propose a stereo-matching neural network with a novel H-Module.The H-Module incorporates an attention mechanism into the Siamese network.The symmetric architecture,with cross-pixel interaction and cross-view interaction,enables a more comprehensive analysis of contextual information in stereo images.Based on spatial intensity discontinuity,the edge enhancement eliminates illposed regions in the image where ambiguous depth predictions may occur due to a lack of texture.With the assistance of deep learning,our edge-enhanced system provides prompt responses in less than 0.15 seconds.This edge-enhanced depth perception meta-lens imaging system will significantly contribute to accurate 3D scene modeling,machine vision,autonomous driving,and robotics development. 展开更多
关键词 metasurfaces meta-lenses deep learning depth perception edge detection
下载PDF
IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks 被引量:1
7
作者 Ying Zhang Weiming Niu Leibing Yan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期885-902,共18页
In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of ... In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of UAV,the transmitting beamforming of users,and the phase shift matrix of IRS.The original problem is strong non-convex and difficult to solve.We first propose two basic modes of the proactive eavesdropper,and obtain the closed-form solution for the boundary conditions of the two modes.Then we transform the original problem into an equivalent one and propose an alternating optimization(AO)based method to obtain a local optimal solution.The convergence of the algorithm is illustrated by numerical results.Further,we propose a zero forcing(ZF)based method as sub-optimal solution,and the simulation section shows that the proposed two schemes could obtain better performance compared with traditional schemes. 展开更多
关键词 Mobile edge computing(MEC) unmanned aerial vehicle(UAV) intelligent reflecting surface(IRS) zero forcing(ZF)
下载PDF
基于Solid Edge自动生成数控加工图的二次开发研究
8
作者 吴事谱 陆祉好 阳开应 《锅炉技术》 北大核心 2024年第4期21-26,共6页
基于Solid Edge软件平台,利用C#进行二次开发,设计出一款利用三维设计模型和组件图生成数控加工工艺图纸的批量设计软件,并详细展示了软件的工作流程、原理和关键技术。经应用验证,该软件具有出图快、信息匹配度高、适用模型范围广、操... 基于Solid Edge软件平台,利用C#进行二次开发,设计出一款利用三维设计模型和组件图生成数控加工工艺图纸的批量设计软件,并详细展示了软件的工作流程、原理和关键技术。经应用验证,该软件具有出图快、信息匹配度高、适用模型范围广、操作灵活、界面友好等优点,以此实现了车间的无纸化高效数据传输和敏捷生产。 展开更多
关键词 Solid Edge 二次开发 数控加工图 轮廓图 C# 工程图 三维设计
下载PDF
Satellite Communications with 5G, B5G, and 6G: Challenges and Prospects 被引量:1
9
作者 Mehmet Beyaz 《International Journal of Communications, Network and System Sciences》 2024年第3期31-49,共19页
Satellite communications, pivotal for global connectivity, are increasingly converging with cutting-edge mobile networks, notably 5G, B5G, and 6G. This amalgamation heralds the promise of universal, high-velocity comm... Satellite communications, pivotal for global connectivity, are increasingly converging with cutting-edge mobile networks, notably 5G, B5G, and 6G. This amalgamation heralds the promise of universal, high-velocity communication, yet it is not without its challenges. Paramount concerns encompass spectrum allocation, the harmonization of network architectures, and inherent latency issues in satellite transmissions. Potential mitigations, such as dynamic spectrum sharing and the deployment of edge computing, are explored as viable solutions. Looking ahead, the advent of quantum communications within satellite frameworks and the integration of AI spotlight promising research trajectories. These advancements aim to foster a seamless and synergistic coexistence between satellite communications and next-gen mobile networks. 展开更多
关键词 Satellite Communications Spectrum Allocation Edge Computing AI Integration 5G B5G 6G
下载PDF
基于ADAMS的多关节机械手手抓部分的运动学仿真研究
10
作者 毛龙所 李峰 +3 位作者 白东华 吕忠 华卫 张敏 《中国设备工程》 2024年第8期133-135,共3页
利用虚拟样机技术验证多关节机械手的机构设计是否正确,能否实现每分钟的抓取以及其载荷。运用Solid Edge ST5完成虚拟样机三维模型的建立,导入ADAMS中进行机械手机械系统的运动学分析。运用ADAMS对其中一个工作周期内的运动过程进行运... 利用虚拟样机技术验证多关节机械手的机构设计是否正确,能否实现每分钟的抓取以及其载荷。运用Solid Edge ST5完成虚拟样机三维模型的建立,导入ADAMS中进行机械手机械系统的运动学分析。运用ADAMS对其中一个工作周期内的运动过程进行运动学的仿真,得出其各个关节在一个工作周期的位移特性曲线以及速度加速度曲线。本文介绍了多关节机械手具体的虚拟样机几何模型的建立,以及利用ADAMA/View提供的Parasolid模型数据交换接口导入模型,在添加约束时需要关键注意的细节也有介绍。在计算机广泛普及的今天,利用三维设计以及ADAMS软件进行机械手手抓部分的运动学分析,可以大大缩短设计周期,提高设计精度,降低产品开发成本。 展开更多
关键词 虚拟样机技术 ADAMS 多关节机械手 运动学仿真 Solid Edge ST5
下载PDF
A review on edge analytics:Issues,challenges,opportunities,promises,future directions,and applications
11
作者 Sabuzima Nayak Ripon Patgiri +1 位作者 Lilapati Waikhom Arif Ahmed 《Digital Communications and Networks》 SCIE CSCD 2024年第3期783-804,共22页
Edge technology aims to bring cloud resources(specifically,the computation,storage,and network)to the closed proximity of the edge devices,i.e.,smart devices where the data are produced and consumed.Embedding computin... Edge technology aims to bring cloud resources(specifically,the computation,storage,and network)to the closed proximity of the edge devices,i.e.,smart devices where the data are produced and consumed.Embedding computing and application in edge devices lead to emerging of two new concepts in edge technology:edge computing and edge analytics.Edge analytics uses some techniques or algorithms to analyse the data generated by the edge devices.With the emerging of edge analytics,the edge devices have become a complete set.Currently,edge analytics is unable to provide full support to the analytic techniques.The edge devices cannot execute advanced and sophisticated analytic algorithms following various constraints such as limited power supply,small memory size,limited resources,etc.This article aims to provide a detailed discussion on edge analytics.The key contributions of the paper are as follows-a clear explanation to distinguish between the three concepts of edge technology:edge devices,edge computing,and edge analytics,along with their issues.In addition,the article discusses the implementation of edge analytics to solve many problems and applications in various areas such as retail,agriculture,industry,and healthcare.Moreover,the research papers of the state-of-the-art edge analytics are rigorously reviewed in this article to explore the existing issues,emerging challenges,research opportunities and their directions,and applications. 展开更多
关键词 Edge analytics Edge computing Edge devices Big data Sensor Artificial intelligence Machine learning Smart technology Healthcare
下载PDF
Security Implications of Edge Computing in Cloud Networks 被引量:1
12
作者 Sina Ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 Edge Computing Cloud Networks Artificial Intelligence Machine Learning Cloud Security
下载PDF
Task Offloading in Edge Computing Using GNNs and DQN
13
作者 Asier Garmendia-Orbegozo Jose David Nunez-Gonzalez Miguel Angel Anton 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期2649-2671,共23页
In a network environment composed of different types of computing centers that can be divided into different layers(clod,edge layer,and others),the interconnection between them offers the possibility of peer-to-peer t... In a network environment composed of different types of computing centers that can be divided into different layers(clod,edge layer,and others),the interconnection between them offers the possibility of peer-to-peer task offloading.For many resource-constrained devices,the computation of many types of tasks is not feasible because they cannot support such computations as they do not have enough available memory and processing capacity.In this scenario,it is worth considering transferring these tasks to resource-rich platforms,such as Edge Data Centers or remote cloud servers.For different reasons,it is more exciting and appropriate to download various tasks to specific download destinations depending on the properties and state of the environment and the nature of the functions.At the same time,establishing an optimal offloading policy,which ensures that all tasks are executed within the required latency and avoids excessive workload on specific computing centers is not easy.This study presents two alternatives to solve the offloading decision paradigm by introducing two well-known algorithms,Graph Neural Networks(GNN)and Deep Q-Network(DQN).It applies the alternatives on a well-known Edge Computing simulator called PureEdgeSimand compares them with the two defaultmethods,Trade-Off and Round Robin.Experiments showed that variants offer a slight improvement in task success rate and workload distribution.In terms of energy efficiency,they provided similar results.Finally,the success rates of different computing centers are tested,and the lack of capacity of remote cloud servers to respond to applications in real-time is demonstrated.These novel ways of finding a download strategy in a local networking environment are unique as they emulate the state and structure of the environment innovatively,considering the quality of its connections and constant updates.The download score defined in this research is a crucial feature for determining the quality of a download path in the GNN training process and has not previously been proposed.Simultaneously,the suitability of Reinforcement Learning(RL)techniques is demonstrated due to the dynamism of the network environment,considering all the key factors that affect the decision to offload a given task,including the actual state of all devices. 展开更多
关键词 Edge computing edge offloading fog computing task offloading
下载PDF
Edge modes in finite-size systems with different edge terminals
14
作者 Huiping Wang Li Ren +1 位作者 Xiuli Zhang Liguo Qin 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期381-387,共7页
We investigate the behavior of edge modes in the presence of different edge terminations and long-range(LR)hopping.Here,we mainly focus on such model crystals with two different types of structures(type I:“…-P-Q-P-Q... We investigate the behavior of edge modes in the presence of different edge terminations and long-range(LR)hopping.Here,we mainly focus on such model crystals with two different types of structures(type I:“…-P-Q-P-Q-…”and type II:“…=P-Q=P-Q=…”),where P and Q represent crystal lines(CLs),while the symbols“-”and“=”denote the distance between the nearest neighbor(NN)CLs.Based on the lattice model Hamiltonian with LR hopping,the existence of edge modes is determined analytically by using the transfer matrix method(TMM)when different edge terminals are taken into consideration.Our findings are consistent with the numerical results obtained by the exact diagonalization method.We also notice that edge modes can exhibit different behaviors under different edge terminals.Our result is helpful in solving novel edge modes in honeycomb crystalline graphene and transition metal dichalcogenides with different edge terminals. 展开更多
关键词 edge modes long-range hopping different edge terminals
原文传递
Digital Twin-Assisted Semi-Federated Learning Framework for Industrial Edge Intelligence
15
作者 Wu Xiongyue Tang Jianhua Marie Siew 《China Communications》 SCIE CSCD 2024年第5期314-329,共16页
The rapid development of emerging technologies,such as edge intelligence and digital twins,have added momentum towards the development of the Industrial Internet of Things(IIo T).However,the massive amount of data gen... The rapid development of emerging technologies,such as edge intelligence and digital twins,have added momentum towards the development of the Industrial Internet of Things(IIo T).However,the massive amount of data generated by the IIo T,coupled with heterogeneous computation capacity across IIo T devices,and users’data privacy concerns,have posed challenges towards achieving industrial edge intelligence(IEI).To achieve IEI,in this paper,we propose a semi-federated learning framework where a portion of the data with higher privacy is kept locally and a portion of the less private data can be potentially uploaded to the edge server.In addition,we leverage digital twins to overcome the problem of computation capacity heterogeneity of IIo T devices through the mapping of physical entities.We formulate a synchronization latency minimization problem which jointly optimizes edge association and the proportion of uploaded nonprivate data.As the joint problem is NP-hard and combinatorial and taking into account the reality of largescale device training,we develop a multi-agent hybrid action deep reinforcement learning(DRL)algorithm to find the optimal solution.Simulation results show that our proposed DRL algorithm can reduce latency and have a better convergence performance for semi-federated learning compared to benchmark algorithms. 展开更多
关键词 digital twin edge association industrial edge intelligence(IEI) semi-federated learning
下载PDF
For Mega-Constellations: Edge Computing and Safety Management Based on Blockchain Technology
16
作者 Zhen Zhang Bing Guo Chengjie Li 《China Communications》 SCIE CSCD 2024年第2期59-73,共15页
In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of sate... In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed. 展开更多
关键词 blockchain consensus mechanism edge computing mega-constellation reputation management
下载PDF
Task Offloading and Trajectory Optimization in UAV Networks:A Deep Reinforcement Learning Method Based on SAC and A-Star
17
作者 Jianhua Liu Peng Xie +1 位作者 Jiajia Liu Xiaoguang Tu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1243-1273,共31页
In mobile edge computing,unmanned aerial vehicles(UAVs)equipped with computing servers have emerged as a promising solution due to their exceptional attributes of high mobility,flexibility,rapid deployment,and terrain... In mobile edge computing,unmanned aerial vehicles(UAVs)equipped with computing servers have emerged as a promising solution due to their exceptional attributes of high mobility,flexibility,rapid deployment,and terrain agnosticism.These attributes enable UAVs to reach designated areas,thereby addressing temporary computing swiftly in scenarios where ground-based servers are overloaded or unavailable.However,the inherent broadcast nature of line-of-sight transmission methods employed by UAVs renders them vulnerable to eavesdropping attacks.Meanwhile,there are often obstacles that affect flight safety in real UAV operation areas,and collisions between UAVs may also occur.To solve these problems,we propose an innovative A*SAC deep reinforcement learning algorithm,which seamlessly integrates the benefits of Soft Actor-Critic(SAC)and A*(A-Star)algorithms.This algorithm jointly optimizes the hovering position and task offloading proportion of the UAV through a task offloading function.Furthermore,our algorithm incorporates a path-planning function that identifies the most energy-efficient route for the UAV to reach its optimal hovering point.This approach not only reduces the flight energy consumption of the UAV but also lowers overall energy consumption,thereby optimizing system-level energy efficiency.Extensive simulation results demonstrate that,compared to other algorithms,our approach achieves superior system benefits.Specifically,it exhibits an average improvement of 13.18%in terms of different computing task sizes,25.61%higher on average in terms of the power of electromagnetic wave interference intrusion into UAVs emitted by different auxiliary UAVs,and 35.78%higher on average in terms of the maximum computing frequency of different auxiliary UAVs.As for path planning,the simulation results indicate that our algorithm is capable of determining the optimal collision-avoidance path for each auxiliary UAV,enabling them to safely reach their designated endpoints in diverse obstacle-ridden environments. 展开更多
关键词 Mobile edge computing SAC communication security A-Star UAV
下载PDF
Research on high energy efficiency and low bit-width floating-point type data for abnormal object detection of transmission lines
18
作者 Chen Wang Guozheng Peng +2 位作者 Rui Song Jun Zhang Li Yan 《Global Energy Interconnection》 EI CSCD 2024年第3期324-335,共12页
Achieving a balance between accuracy and efficiency in target detection applications is an important research topic.To detect abnormal targets on power transmission lines at the power edge,this paper proposes an effec... Achieving a balance between accuracy and efficiency in target detection applications is an important research topic.To detect abnormal targets on power transmission lines at the power edge,this paper proposes an effective method for reducing the data bit width of the network for floating-point quantization.By performing exponent prealignment and mantissa shifting operations,this method avoids the frequent alignment operations of standard floating-point data,thereby further reducing the exponent and mantissa bit width input into the training process.This enables training low-data-bit width models with low hardware-resource consumption while maintaining accuracy.Experimental tests were conducted on a dataset of real-world images of abnormal targets on transmission lines.The results indicate that while maintaining accuracy at a basic level,the proposed method can significantly reduce the data bit width compared with single-precision data.This suggests that the proposed method has a marked ability to enhance the real-time detection of abnormal targets in transmission circuits.Furthermore,a qualitative analysis indicated that the proposed quantization method is particularly suitable for hardware architectures that integrate storage and computation and exhibit good transferability. 展开更多
关键词 Power edge Data format Quantification Compute-in-memory
下载PDF
Edge and lithium concentration effects on intercalation kinetics for graphite anodes
19
作者 Keming Zhu Denis Kramer Chao Peng 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第3期337-347,I0009,共12页
Graphite interfaces are an important part of the anode in lithium-ion batteries(LIBs),significantly influencing Li intercalation kinetics.Graphite anodes adopt different stacking sequences depending on the concentrati... Graphite interfaces are an important part of the anode in lithium-ion batteries(LIBs),significantly influencing Li intercalation kinetics.Graphite anodes adopt different stacking sequences depending on the concentration of the intercalated Li ions.In this work,we performed first-principles calculations to comprehensively address the energetics and dynamics of Li intercalation and Li vacancy diffusion near the no n-basal edges of graphite,namely the armchair and zigzag-edges,at high Li concentration.We find that surface effects persist in stage-Ⅱ that bind Li strongly at the edge sites.However,the pronounced effect previously identified at the zigzag edge of pristine graphite is reduced in LiC_(12),penetrating only to the subsurface site,and eventually disappearing in LiC_(6).Consequently,the distinctive surface state at the zigzag edge significantly impacts and restrains the charging rate at the initial lithiation of graphite anodes,whilst diminishes with an increasing degree of lithiation.Longer diffusion time for Li hopping to the bulk site from either the zigzag edge or the armchair edge in LiC_(6) was observed during high state of charge due to charge repulsion.Effectively controlling Li occupation and diffusion kinetics at this stage is also crucial for enhancing the charge rate. 展开更多
关键词 Graphite anode EDGE Interface Lithium-ion batteries Density functional theory
下载PDF
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
20
作者 Zhang Lejun Peng Minghui +6 位作者 Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin 《China Communications》 SCIE CSCD 2024年第3期149-159,共11页
With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for clou... With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes.The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem.Our paper proposes a redundant data detection method that meets the privacy protection requirements.By scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data.It has the same effect as zero-knowledge proof,and it will not reveal the privacy of users.In addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data.We use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is deleted.The feasibility of the scheme is proved through safety analysis and efficiency analysis. 展开更多
关键词 blockchain data integrity edge computing privacy protection redundant data
下载PDF
上一页 1 2 179 下一页 到第
使用帮助 返回顶部