期刊文献+
共找到800篇文章
< 1 2 40 >
每页显示 20 50 100
AI Chain-Driven Control Flow Graph Generation for Multiple Programming Language 被引量:1
1
作者 ZOU Zhou ZUO Zhengkang HUANG Qing 《Wuhan University Journal of Natural Sciences》 2025年第3期222-230,共9页
Control Flow Graphs(CFGs)are essential for understanding the execution and data flow within software,serving as foundational structures in program analysis.Traditional CFG construction methods,such as bytecode analysi... Control Flow Graphs(CFGs)are essential for understanding the execution and data flow within software,serving as foundational structures in program analysis.Traditional CFG construction methods,such as bytecode analysis and Abstract Syntax Trees(ASTs),often face challenges due to the complex syntax of programming languages like Java and Python.This paper introduces a novel approach that leverages Large Language Models(LLMs)to generate CFGs through a methodical Chain of Thought(CoT)process.By employing CoT,the proposed approach systematically interprets code semantics directly from natural language,enhancing the adaptability across various programming languages and simplifying the CFG construction process.By implementing a modular AI chain strategy that adheres to the single responsibility principle,our approach breaks down CFG generation into distinct,manageable steps handled by separate AI and non-AI units,which can significantly improve the precision and coverage of CFG nodes and edges.The experiments with 245 Java and 281 Python code snippets from Stack Overflow demonstrate that our method achieves efficient performance on different programming languages and exhibits strong robustness. 展开更多
关键词 control flow graph Large Language Model Chain of Thought AI chain
原文传递
A Method for Software Vulnerability Detection Based on Improved Control Flow Graph 被引量:2
2
作者 ZHOU Minmin CHEN Jinfu +4 位作者 LIU Yisong ACKAH-ARTHUR Hilary CHEN Shujie ZHANG Qingchen ZENG Zhifeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第2期149-160,共12页
With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great signific... With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great significance in reducing system crashes and maintaining system security and integrity. This paper focuses on detecting three common types of vulnerabilities: Unused_Variable, Use_of_Uninitialized_Variable, and Use_After_ Free. We propose a method for software vulnerability detection based on an improved control flow graph(ICFG) and several predicates of vulnerability properties for each type of vulnerability. We also define a set of grammar rules for analyzing and deriving the three mentioned types of vulnerabilities, and design three vulnerability detection algorithms to guide the process of vulnerability detection. In addition, we conduct cases studies of the three mentioned types of vulnerabilities with real vulnerability program segments from Common Weakness Enumeration(CWE). The results of the studies show that the proposed method can detect the vulnerability in the tested program segments. Finally, we conduct manual analysis and experiments on detecting the three types of vulnerability program segments(30 examples for each type) from CWE, to compare the vulnerability detection effectiveness of the proposed method with that of the existing detection tool Cpp Check. The results show that the proposed method performs better. In summary, the method proposed in this paper has certain feasibility and effectiveness in detecting the three mentioned types of vulnerabilities, and it will also have guiding significance for the detection of other common vulnerabilities. 展开更多
关键词 SOFTWARE SECURITY SOFTWARE VULNERABILITY IMPROVED control flow graph VULNERABILITY detection algorithm
原文传递
Bipartite graph-based control flow checking for COTS-based small satellites 被引量:2
3
作者 Wang Honghao Wang Huiquan Jin Zhonghe 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第3期883-893,共11页
Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced contr... Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced control flow errors (CFEs) may cause unpredictable behavior or crashes of COTSbased small satellites. This paper proposes a generic softwarebased control flow checking technique (CFC) and bipartite graphbased control flow checking (BGCFC). To simplify the types of illegal branches, it transforms the conventional control flow graph into the equivalent bipartite graph. It checks the legal ity of control flow at runtime by comparing a global signature with the expected value and introduces consecutive IDs and bitmaps to reduce the time and memory overhead. Theoretical analysis shows that BGCFC can detect all types of internode CFEs with constant time and memory overhead. Practical tests verify the result of theoretical analysis. Compared with previous techniques, BGCFC achieves the highest error detection rate, lower time and memory overhead; the composite result in evaluation fac tor shows that BGCFC is the most effective one among all these techniques. The results in both theory and practice verify the applicability of BGCFC for COTSbased small satellites. 展开更多
关键词 Bipartite graph control flow checking Commercial-off-the-shelves(COTS) Error injection Fault tolerant Illegal branch Small satellites
原文传递
Graph-tree-based software control flow checking for COTS processors on pico-satellites 被引量:1
4
作者 Yang Mu Wang Hao +1 位作者 Zheng Yangming Jin Zhonghe 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第2期413-422,共10页
This paper proposes a generic high-performance and low-time-overhead software control flow checking solution, graph-tree-based control flow checking (GTCFC) for space-borne commercial-off-the-shelf (COTS) processo... This paper proposes a generic high-performance and low-time-overhead software control flow checking solution, graph-tree-based control flow checking (GTCFC) for space-borne commercial-off-the-shelf (COTS) processors. A graph tree data structure with a topology similar to common trees is introduced to transform the control flow graphs of target programs. This together with design of IDs and signatures of its vertices and edges allows for an easy check of legality of actual branching during target program execution. As a result, the algorithm not only is capable of detecting all single and multiple branching errors with low latency and time overheads along with a linear-complexity space overhead, but also remains generic among arbitrary instruction sets and independent of any specific hardware. Tests of the algorithm using a COTS-processor-based onboard computer (OBC) of in-service ZDPS-1A pico-satellite products show that GTCFC can detect over 90% of the randomly injected and all-pattern-covering branching errors for different types of target programs, with performance and overheads consistent with the theoretical analysis; and beats well-established preeminent control flow checking algorithms in these dimensions. Furthermore, it is validated that GTCGC not only can be accommodated in pico-satellites conveniently with still sufficient system margins left, but also has the ability to minimize the risk of control flow errors being undetected in their space missions. Therefore, due to its effectiveness, efficiency, and compatibility, the GTCFC solution is ready for applications on COTS processors on pico-satellites in their real space missions. 展开更多
关键词 Branching error Commercial-off-the-shelf (COTS) control flow checking Error injection graph tree On-board computer Pico-satellite
原文传递
Data Flow Fuzzy Control of Communication Network with Finite Terminal
5
作者 邓娜 邵世煌 苏庆新 《Journal of Donghua University(English Edition)》 EI CAS 2004年第3期171-174,共4页
We consider the problem of data flow fuzzy control of discrete queuing systems with three different service-rate servers. The objective is to dynamically assign customers to idle severs based on the state of the syste... We consider the problem of data flow fuzzy control of discrete queuing systems with three different service-rate servers. The objective is to dynamically assign customers to idle severs based on the state of the system so as to minimize the mean sojourn time of customers. Simulation shows the validity of the fuzzy controller. 展开更多
关键词 data flow fuzzy control average sojourn time
在线阅读 下载PDF
An Intelligent Quality Control Method for Manufacturing Processes Based on a Human–Cyber–Physical Knowledge Graph 被引量:3
6
作者 Shilong Wang Jinhan Yang +2 位作者 Bo Yang Dong Li Ling Kang 《Engineering》 SCIE EI CAS CSCD 2024年第10期242-260,共19页
Quality management is a constant and significant concern in enterprises.Effective determination of correct solutions for comprehensive problems helps avoid increased backtesting costs.This study proposes an intelligen... Quality management is a constant and significant concern in enterprises.Effective determination of correct solutions for comprehensive problems helps avoid increased backtesting costs.This study proposes an intelligent quality control method for manufacturing processes based on a human–cyber–physical(HCP)knowledge graph,which is a systematic method that encompasses the following elements:data management and classification based on HCP ternary data,HCP ontology construction,knowledge extraction for constructing an HCP knowledge graph,and comprehensive application of quality control based on HCP knowledge.The proposed method implements case retrieval,automatic analysis,and assisted decision making based on an HCP knowledge graph,enabling quality monitoring,inspection,diagnosis,and maintenance strategies for quality control.In practical applications,the proposed modular and hierarchical HCP ontology exhibits significant superiority in terms of shareability and reusability of the acquired knowledge.Moreover,the HCP knowledge graph deeply integrates the provided HCP data and effectively supports comprehensive decision making.The proposed method was implemented in cases involving an automotive production line and a gear manufacturing process,and the effectiveness of the method was verified by the application system deployed.Furthermore,the proposed method can be extended to other manufacturing process quality control tasks. 展开更多
关键词 Quality control Human-cyber-physical ternary data Knowledge graph
在线阅读 下载PDF
Sedimentary Microfacies and Porosity Modeling of Deep-Water Sandy Debris Flows by Combining Sedimentary Patterns with Seismic Data: An Example from Unit I of Gas Field A, South China Sea 被引量:2
7
作者 LI Shengli YU Xinghe JIN Jianli 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2016年第1期182-194,共13页
Sandy debris flow deposits are present in Unit I during Miocene of Gas Field A in the Baiyun Depression of the South China Sea. The paucity of well data and the great variability of the sedimentary microfacies make it... Sandy debris flow deposits are present in Unit I during Miocene of Gas Field A in the Baiyun Depression of the South China Sea. The paucity of well data and the great variability of the sedimentary microfacies make it difficult to identify and predict the distribution patterns of the main gas reservoir, and have seriously hindered further exploration and development of the gas field. Therefore, making full use of the available seismic data is extremely important for predicting the spatial distribution of sedimentary microfacies when constructing three-dimensional reservoir models. A suitable reservoir modeling strategy or workflow controlled by sedimentary microfacies and seismic data has been developed. Five types of seismic attributes were selected to correlate with the sand percentage, and the root mean square (RMS) amplitude performed the best. The relation between the RMS amplitude and the sand percentage was used to construct a reservoir sand distribution map. Three types of main sedimentary microfacies were identified: debris channels, fan lobes, and natural levees. Using constraints from the sedimentary microfacies boundaries, a sedimentary microfacies model was constructed using the sequential indicator and assigned value simulation methods. Finally, reservoir models of physical properties for sandy debris flow deposits controlled by sedimentary microfacies and seismic inversion data were established. Property cutoff values were adopted because the sedimentary microfacies and the reservoir properties from well-logging interpretation are intrinsically different. Selection of appropriate reservoir property cutoffs is a key step in reservoir modeling when using simulation methods based on sedimentary microfacies control. When the abnormal data are truncated and the reservoir properties probability distribution fits a normal distribution, microfacies-controlled reservoir property models are more reliable than those obtained from the sequence Gauss simulation method. The cutoffs for effective porosity of the debris channel, fan lobe, and natural levee facies were 0.2, 0.09, and 0.12, respectively; the corresponding average effective porosities were 0.24, 0.13, and 0.15. The proposed modeling method makes full use of seismic attributes and seismic inversion data, and also makes the property data of single-well depositional microfacies more conformable to a normal distribution with geological significance. Thus, the method allows use of more reliable input data when we construct a model of a sandy debris flow. 展开更多
关键词 sandy debris flow deposit seismic attribute and inversion geological modeling controlled by micro-facies data truncated process
在线阅读 下载PDF
Detecting Data-flow Errors Based on Petri Nets With Data Operations 被引量:5
8
作者 Dongming Xiang Guanjun Liu +1 位作者 Chungang Yan Changjun Jiang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期251-260,共10页
In order to guarantee the correctness of business processes, not only control-flow errors but also data-flow errors should be considered. The control-flow errors mainly focus on deadlock, livelock, soundness, and so o... In order to guarantee the correctness of business processes, not only control-flow errors but also data-flow errors should be considered. The control-flow errors mainly focus on deadlock, livelock, soundness, and so on. However, there are not too many methods for detecting data-flow errors. This paper defines Petri nets with data operations(PN-DO) that can model the operations on data such as read, write and delete. Based on PN-DO, we define some data-flow errors in this paper. We construct a reachability graph with data operations for each PN-DO, and then propose a method to reduce the reachability graph. Based on the reduced reachability graph, data-flow errors can be detected rapidly. A case study is given to illustrate the effectiveness of our methods. 展开更多
关键词 Business process modeling data-flow errors Petri nets reachability graph
在线阅读 下载PDF
Exploring the Approaches to Data Flow Computing
9
作者 Mohammad B.Khan Abdul R.Khan Hasan Alkahtani 《Computers, Materials & Continua》 SCIE EI 2022年第5期2333-2346,共14页
Architectures based on the data flow computing model provide an alternative to the conventional Von-Neumann architecture that are widelyused for general purpose computing.Processors based on the data flow architecture... Architectures based on the data flow computing model provide an alternative to the conventional Von-Neumann architecture that are widelyused for general purpose computing.Processors based on the data flow architecture employ fine-grain data-driven parallelism.These architectures have thepotential to exploit the inherent parallelism in compute intensive applicationslike signal processing,image and video processing and so on and can thusachieve faster throughputs and higher power efficiency.In this paper,severaldata flow computing architectures are explored,and their main architecturalfeatures are studied.Furthermore,a classification of the processors is presented based on whether they employ either the data flow execution modelexclusively or in combination with the control flow model and are accordinglygrouped as exclusive data flow or hybrid architectures.The hybrid categoryis further subdivided as conjoint or accelerator-style architectures dependingon how they deploy and separate the data flow and control flow executionmodel within their execution blocks.Lastly,a brief comparison and discussionof their advantages and drawbacks is also considered.From this study weconclude that although the data flow architectures are seen to have maturedsignificantly,issues like data-structure handling and lack of efficient placementand scheduling algorithms have prevented these from becoming commerciallyviable. 展开更多
关键词 Processor architecture data flow architectures Von-Neumann model control flow architectures
在线阅读 下载PDF
基于分段函数的不透明谓词
10
作者 陈沈杰 王智昊 吴彪 《电子科技》 2026年第2期45-53,共9页
作为一种软件保护技术,代码混淆在保证程序语义不变的前提下通过增强程序的复杂性来对抗逆向工程。不透明谓词技术通过构造虚假控制流在不增加原程序时空开销的前提下隐藏程序真实的执行逻辑。针对当前不透明谓词技术无法对抗动态符号... 作为一种软件保护技术,代码混淆在保证程序语义不变的前提下通过增强程序的复杂性来对抗逆向工程。不透明谓词技术通过构造虚假控制流在不增加原程序时空开销的前提下隐藏程序真实的执行逻辑。针对当前不透明谓词技术无法对抗动态符号执行技术以及混淆后程序控制流较简单问题,文中提出了一种基于分段函数的不透明谓词。攻击动态符号执行存在的缺陷,利用分段函数使引入的变量收敛于设定值,以此构造不透明谓词,隐藏程序真实控制流。基于LLVM(Low Level Virtual Machine)框架实现了所提混淆系统,并进行了实验检测。实验结果表明,所提混淆方法有效增加了程序控制流的复杂度,能够抵御动态符号执行技术。相较于现有混淆系统,所提方法使程序的可维护度平均下降23.8%,具有更高的混淆强度。 展开更多
关键词 代码混淆系统 不透明谓词 虚假控制流 符号执行 静态分析 LLVM 逆向工程 控制流图
在线阅读 下载PDF
基于多组件和时空图卷积网络的交通流预测方法
11
作者 孙焕中 唐向红 陆见光 《电子科技》 2026年第3期24-31,共8页
准确的交通流预测可以减轻交通拥堵,有利于制定更合理的出行决策。现行交通流预测方法对交通流时间依赖性和空间依赖性的提取不充分,文中提出了一种基于多组件和时空图卷积网络(Multi-Component and Spatio-Temporal Graph Convolution ... 准确的交通流预测可以减轻交通拥堵,有利于制定更合理的出行决策。现行交通流预测方法对交通流时间依赖性和空间依赖性的提取不充分,文中提出了一种基于多组件和时空图卷积网络(Multi-Component and Spatio-Temporal Graph Convolution Network, MCSTG)的交通流预测方法。MCSTG在门控时间卷积网络中融入周期信息以此深入捕获时间依赖性,并利用图重构结合空间自注意力方法来生成节点关联性强的邻接矩阵,从而捕获空间依赖性。MCSTG通过并行处理和结果融合的多预测组件架构进一步优化交通流预测性能。在两个真实数据集上的6项预测结果指标中,MCSTG的5项指标预测精度优于基线模型。实验结果表明,MCSTG具有较好的时空建模能力。消融实验验证了MCSTG设计的合理性。 展开更多
关键词 深度学习 时空数据 交通流预测 图卷积网络 注意力机制 扩张因果卷积 数据挖掘 神经网络 交通拥堵
在线阅读 下载PDF
面向小程序模板的漏洞挖掘方法研究
12
作者 杨雲腾 史一哲 杨哲慜 《小型微型计算机系统》 北大核心 2026年第2期443-450,共8页
小程序模板在开发过程中被广泛使用,但其固有的安全漏洞导致大量模板小程序面临安全风险.由于小程序模板代码闭源且使用情况不透明,现有方法难以对小程序模板固有漏洞以及衍生的小程序漏洞进行挖掘.为此,本文提出了一种面向小程序模板... 小程序模板在开发过程中被广泛使用,但其固有的安全漏洞导致大量模板小程序面临安全风险.由于小程序模板代码闭源且使用情况不透明,现有方法难以对小程序模板固有漏洞以及衍生的小程序漏洞进行挖掘.为此,本文提出了一种面向小程序模板的融合多阶段聚类分析和模板行为分析的漏洞挖掘方法.该方法通过提取代码特征汇总相同模板开发的小程序,采用基于图匹配的启发式方法来识别相似的程序行为,即模板行为,以此构建小程序模板过程间控制流图,从而快速定位并系统性评估模板开发行为导致的小程序漏洞及其扩散现象.基于该方法本文实现了一个面向小程序模板的漏洞挖掘工具MTVMiner,从小程序集中提取出11489套小程序模板过程间控制流图,准确率达93.35%,并将其用于密钥泄漏漏洞检测,检出690套存在密钥泄漏漏洞的模板,影响超2万个小程序. 展开更多
关键词 小程序模板 图匹配 数据流分析 漏洞检测
在线阅读 下载PDF
基于数据建模和知识图谱的传染病监测预警系统设计
13
作者 东单锋 李民 顾朗 《医疗卫生装备》 2026年第1期42-49,共8页
目的:为了提高对传染病等突发公共卫生事件的预警和防控能力,设计传染病监测预警系统。方法:传染病监测预警系统基于数据建模和知识图谱设计,通过构建传染病预警模型实现传染病预测。该系统前端主要采用Web形式开发,部署在阿里云;后端采... 目的:为了提高对传染病等突发公共卫生事件的预警和防控能力,设计传染病监测预警系统。方法:传染病监测预警系统基于数据建模和知识图谱设计,通过构建传染病预警模型实现传染病预测。该系统前端主要采用Web形式开发,部署在阿里云;后端采用Java语言开发,部署在政务云。整个系统主要包括数据采集、知识图谱、传染病监测和传染病预警4个功能模块。结果:该系统可整合医疗机构、医保中心、气象服务中心等多部门的相关数据,实现早期传染病的预警和可视化展示,提高传染病预测的准确性。结论:该系统能够对传染病进行准确监测和预警,可为传染病防控提供数据支撑。 展开更多
关键词 知识图谱 数据建模 传染病 传染病监测 传染病预警 传染病防控
在线阅读 下载PDF
Fuzzy k-Means Clustering-Based Machine Learning Models for LFO Damping in Electric Power System Networks
14
作者 Md Shafiullah 《Computer Modeling in Engineering & Sciences》 2026年第2期803-830,共28页
Various factors,including weak tie-lines into the electric power system(EPS)networks,can lead to low-frequency oscillations(LFOs),which are considered an instant,non-threatening situation,but slow-acting and poisonous... Various factors,including weak tie-lines into the electric power system(EPS)networks,can lead to low-frequency oscillations(LFOs),which are considered an instant,non-threatening situation,but slow-acting and poisonous.Considering the challenge mentioned,this article proposes a clustering-based machine learning(ML)framework to enhance the stability of EPS networks by suppressing LFOs through real-time tuning of key power system stabilizer(PSS)parameters.To validate the proposed strategy,two distinct EPS networks are selected:the single-machine infinite-bus(SMIB)with a single-stage PSS and the unified power flow controller(UPFC)coordinated SMIB with a double-stage PSS.To generate data under various loading conditions for both networks,an efficient but offline meta-heuristic algorithm,namely the grey wolf optimizer(GWO),is used,with the loading conditions as inputs and the key PSS parameters as outputs.The generated loading conditions are then clustered using the fuzzy k-means(FKM)clustering method.Finally,the group method of data handling(GMDH)and long short-term memory(LSTM)ML models are developed for clustered data to predict PSS key parameters in real time for any loading condition.A few well-known statistical performance indices(SPI)are considered for validation and robustness of the training and testing procedure of the developed FKM-GMDH and FKM-LSTM models based on the prediction of PSS parameters.The performance of the ML models is also evaluated using three stability indices(i.e.,minimum damping ratio,eigenvalues,and time-domain simulations)after optimally tuned PSS with real-time estimated parameters under changing operating conditions.Besides,the outputs of the offline(GWO-based)metaheuristic model,proposed real-time(FKM-GMDH and FKM-LSTM)machine learning models,and previously reported literature models are compared.According to the results,the proposed methodology outperforms the others in enhancing the stability of the selected EPS networks by damping out the observed unwanted LFOs under various loading conditions. 展开更多
关键词 Fuzzy k-means clustering grey wolf optimizer group method of data handling long short-term memory low-frequency oscillation power system stabilizer single machine infinite bus STABILITY unified power flow controller
在线阅读 下载PDF
工程装备电控系统调试诊断软件研究与设计
15
作者 孙景明 《机电产品开发与创新》 2026年第1期40-43,共4页
针对某型工程装备电控系统功能结构复杂、集成度高和调试诊断难度大、效率低的情况,结合其CAN总线网络结构与嵌入式PLC系统的工作原理,设计了基于总线系统和模块化结构的调试诊断软件。该软件使用LabVIEW面向对象虚拟仪器平台进行开发,... 针对某型工程装备电控系统功能结构复杂、集成度高和调试诊断难度大、效率低的情况,结合其CAN总线网络结构与嵌入式PLC系统的工作原理,设计了基于总线系统和模块化结构的调试诊断软件。该软件使用LabVIEW面向对象虚拟仪器平台进行开发,应用了数据流、嵌套式状态机和可视化技术。主要设计了CAN总线通讯监控、网络节点监测、作业状态监控、IO端口监测、故障诊断和系统标定等6大模块,可对工程装备电控系统的各ECU单元、传感器、执行器进行故障监测,对传感器、手柄、机构位置、控制参数等进行标定,以及工况参数的分析处理、故障监测与诊断。 展开更多
关键词 电控系统 调试诊断 数据流 嵌套状态机 系统标定
在线阅读 下载PDF
一种基于FlowDroid的Android隐私保护方法 被引量:2
16
作者 马绍菊 万良 +1 位作者 杨婷 马林进 《计算机应用与软件》 2017年第5期317-321,共5页
随着移动设备市场的扩大,Android智能系统占据了手机市场的很大份额,手机设备是承载用户隐私数据较多的移动设备。由于Android系统的开源特性,其存在很多安全隐患。提出一种基于FlowDroid的Android增强型隐私保护方法。对Android应用进... 随着移动设备市场的扩大,Android智能系统占据了手机市场的很大份额,手机设备是承载用户隐私数据较多的移动设备。由于Android系统的开源特性,其存在很多安全隐患。提出一种基于FlowDroid的Android增强型隐私保护方法。对Android应用进行静态污点分析,判断其是否存在隐私泄露,并基于FlowDroid静态污点分析工具实现与验证。通过验证表明提出的方法是有效的。 展开更多
关键词 静态污点 隐私泄露 程序间控制流图 ANDROID操作系统
在线阅读 下载PDF
Dynamical Self-Reconfigurable Mechanism for Data-Driven Cell Array 被引量:3
17
作者 SHAN Rui JIANG Lin +2 位作者 WU Haoyue HE Feilong LIU Xinchuang 《Journal of Shanghai Jiaotong university(Science)》 EI 2021年第4期511-521,共11页
The utilization of computation resources and reconfiguration time has a large impact on reconfiguration system performance. In order to promote the performance, a dynamical self-reconfigurable mechanism for data-drive... The utilization of computation resources and reconfiguration time has a large impact on reconfiguration system performance. In order to promote the performance, a dynamical self-reconfigurable mechanism for data-driven cell array is proposed. Cells can be fired only when the needed data arrives, and cell array can be worked on two modes: fixed execution and reconfiguration. On reconfiguration mode, cell function and data flow direction are changed automatically at run time according to contexts. Simultaneously using an H-tree interconnection network, through pre-storing multiple application mapping contexts in reconfiguration buffer, multiple applications can execute concurrently and context switching time is the minimal. For verifying system performance, some algorithms are selected for mapping onto the proposed structure, and the amount of configuration contexts and execution time are recorded for statistical analysis. The results show that the proposed self-reconfigurable mechanism can reduce the number of contexts efficiently, and has a low computing time. 展开更多
关键词 cell array configurable computing self-reconfigurable mechanism data-DRIVEN data flow graph
原文传递
Research of the Control Domain of Edges in Regression Testing 被引量:1
18
作者 高建华 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期57-61,共5页
Regression testing is the process of validating modified software to provide confidence that the changed parts of the software behave as intended and that the unchanged parts have not been adversely affected by the mo... Regression testing is the process of validating modified software to provide confidence that the changed parts of the software behave as intended and that the unchanged parts have not been adversely affected by the modifications. The goal of regression testing is to reduce the test suit by testing the new characters and the modified parts of a program with the original test suit. Regression testing is a high cost testing method. This paper presents a regression testing selection technique that can reduce the test suit on the basis of Control Flow Graph (CFG). It import the inherit strategy of object-oriented language to ensure an edge’s control domain to reduce the test suit size effectively. We implement the idea by coding the edge. An algorithm is also presented at last. 展开更多
关键词 regression testing control flow graph control domain of edges code value of edge inherit strategy
在线阅读 下载PDF
Federated Approach for Privacy-Preserving Traffic Prediction Using Graph Convolutional Network 被引量:1
19
作者 LONARE Savita BHRAMARAMBA Ravi 《Journal of Shanghai Jiaotong university(Science)》 EI 2024年第3期509-517,共9页
Existing traffic flow prediction frameworks have already achieved enormous success due to large traffic datasets and capability of deep learning models.However,data privacy and security are always a challenge in every... Existing traffic flow prediction frameworks have already achieved enormous success due to large traffic datasets and capability of deep learning models.However,data privacy and security are always a challenge in every field where data need to be uploaded to the cloud.Federated learning(FL)is an emerging trend for distributed training of data.The primary goal of FL is to train an efficient communication model without compromising data privacy.The traffic data have a robust spatio-temporal correlation,but various approaches proposed earlier have not considered spatial correlation of the traffic data.This paper presents FL-based traffic flow prediction with spatio-temporal correlation.This work uses a differential privacy(DP)scheme for privacy preservation of participant's data.To the best of our knowledge,this is the first time that FL is used for vehicular traffic prediction while considering the spatio-temporal correlation of traffic data with DP preservation.The proposed framework trains the data locally at the client-side with DP.It then uses the model aggregation mechanism federated graph convolutional network(FedGCN)at the server-side to find the average of locally trained models.The results of the proposed work show that the FedGCN model accurately predicts the traffic.DP scheme at client-side helps clients to set a budget for privacy loss. 展开更多
关键词 federated learning(FL) traffic flow prediction data privacy graph convolutional network(GCN) differential privacy(DP)
原文传递
Multi-faceted spatio-temporal network for weather-aware air traffic flow prediction in multi-airport system
20
作者 Kaiquan CAI Shuo TANG +2 位作者 Shengsheng QIAN Zhiqi SHEN Yang YANG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2024年第7期301-316,共16页
As one of the core modules for air traffic flow management,Air Traffic Flow Prediction(ATFP)in the Multi-Airport System(MAS)is a prerequisite for demand and capacity balance in the complex meteorological environment.D... As one of the core modules for air traffic flow management,Air Traffic Flow Prediction(ATFP)in the Multi-Airport System(MAS)is a prerequisite for demand and capacity balance in the complex meteorological environment.Due to the challenge of implicit interaction mechanism among traffic flow,airspace capacity and weather impact,the Weather-aware ATFP(Wa-ATFP)is still a nontrivial issue.In this paper,a novel Multi-faceted Spatio-Temporal Graph Convolutional Network(MSTGCN)is proposed to address the Wa-ATFP within the complex operations of MAS.Firstly,a spatio-temporal graph is constructed with three different nodes,including airport,route,and fix to describe the topology structure of MAS.Secondly,a weather-aware multi-faceted fusion module is proposed to integrate the feature of air traffic flow and the auxiliary features of capacity and weather,which can effectively address the complex impact of severe weather,e.g.,thunderstorms.Thirdly,to capture the latent connections of nodes,an adaptive graph connection constructor is designed.The experimental results with the real-world operational dataset in Guangdong-Hong Kong-Macao Greater Bay Area,China,validate that the proposed approach outperforms the state-of-the-art machine-learning and deep-learning based baseline approaches in performance. 展开更多
关键词 Air traffic control graph neural network Multi-faceted information Air traffic flow prediction Multi-airport system
原文传递
上一页 1 2 40 下一页 到第
使用帮助 返回顶部