Neural organoids and confocal microscopy have the potential to play an important role in microconnectome research to understand neural patterns.We present PLayer,a plug-and-play embedded neural system,which demonstrat...Neural organoids and confocal microscopy have the potential to play an important role in microconnectome research to understand neural patterns.We present PLayer,a plug-and-play embedded neural system,which demonstrates the utilization of sparse confocal microscopy layers to interpolate continuous axial resolution.With an embedded system focused on neural network pruning,image scaling,and post-processing,PLayer achieves high-performance metrics with an average structural similarity index of 0.9217 and a peak signal-to-noise ratio of 27.75 dB,all within 20 s.This represents a significant time saving of 85.71%with simplified image processing.By harnessing statistical map estimation in interpolation and incorporating the Vision Transformer–based Restorer,PLayer ensures 2D layer consistency while mitigating heavy computational dependence.As such,PLayer can reconstruct 3D neural organoid confocal data continuously under limited computational power for the wide acceptance of fundamental connectomics and pattern-related research with embedded devices.展开更多
Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditio...Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditional teaching,this paper proposes curriculum teaching reform based on the outcome-based education(OBE)concept,including determining course objectives,reforming teaching modes and methods,and improving the curriculum assessment and evaluation system.After two semesters of practice,this method not only enhances students’learning initiative but also improves teaching quality.展开更多
This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.W...This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.We delve into the emerging trend of machine learning on embedded devices,enabling tasks in resource-limited environ-ments.However,the widespread adoption of machine learning raises significant privacy concerns,necessitating the development of privacy-preserving techniques.One such technique,secure multi-party computation(MPC),allows collaborative computations without exposing private inputs.Despite its potential,complex protocols and communication interactions hinder performance,especially on resource-constrained devices.Efforts to enhance efficiency have been made,but scalability remains a challenge.Given the success of GPUs in deep learning,lever-aging embedded GPUs,such as those offered by NVIDIA,emerges as a promising solution.Therefore,we propose an Embedded GPU-based Secure Two-party Computation(EG-STC)framework for Artificial Intelligence(AI)systems.To the best of our knowledge,this work represents the first endeavor to fully implement machine learning model training based on secure two-party computing on the Embedded GPU platform.Our experimental results demonstrate the effectiveness of EG-STC.On an embedded GPU with a power draw of 5 W,our implementation achieved a secure two-party matrix multiplication throughput of 5881.5 kilo-operations per millisecond(kops/ms),with an energy efficiency ratio of 1176.3 kops/ms/W.Furthermore,leveraging our EG-STC framework,we achieved an overall time acceleration ratio of 5–6 times compared to solutions running on server-grade CPUs.Our solution also exhibited a reduced runtime,requiring only 60%to 70%of the runtime of previously best-known methods on the same platform.In summary,our research contributes to the advancement of secure and efficient machine learning implementations on resource-constrained embedded devices,paving the way for broader adoption of AI technologies in various applications.展开更多
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed wo...The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks.展开更多
Being different from testing for popular GUI software, the “instruction-category” approach is proposed for testing embedded system. This approach is constructed by three steps including refining items, drawing instr...Being different from testing for popular GUI software, the “instruction-category” approach is proposed for testing embedded system. This approach is constructed by three steps including refining items, drawing instruction-brief and instruction-category, and constructing test suite. Consequently, this approach is adopted to test oven embedded system, and detail process is deeply discussed. As a result, the factual result indicates that the “instruction-category” approach can be effectively applied in embedded system testing as a black-box method for conformity testing.展开更多
Engineering practice is the key bridge between college education and actual work in the industry.In order to deliver qualified talents with engineering quality to the industry,this paper explores integrating software ...Engineering practice is the key bridge between college education and actual work in the industry.In order to deliver qualified talents with engineering quality to the industry,this paper explores integrating software engineering thinking into the Embedded System Design course.A practical and effective teaching mode is designed consisting of immersive learning,case-based learning,progressive practice,interactive learning,and autonomous learning.Through this teaching mode,multi-levels of closed-loop have been established including final project cycle closed-loop,testing cycle closed-loop,and product cycle closed-loop.During this process,students gradually transition to putting forward product requirements,carrying out design and development,thinking and solving problems,collaborating,and assuring quality from the perspective of software engineering.The practice results show that students’engineering quality has been significantly improved.展开更多
Let G be a group.The family of all sets which are closed in every Hausdorf group topology of G form the family of closed sets of a T_(1) topology M_(G) on G called the Markov topology.Similarly,the family of all algeb...Let G be a group.The family of all sets which are closed in every Hausdorf group topology of G form the family of closed sets of a T_(1) topology M_(G) on G called the Markov topology.Similarly,the family of all algebraic subsets of G forms a family of closed sets for another T_(1)topology Z_(G) on G called the Zarski topology.A subgroup H of G is said to be Markov(resp.Zarski)embedded if the equality M_(G|H)=M_(H)(resp.Z_(G|H)=Z_(H))holds.I's proved that an abirary subgroup of a free group is both Zariski and Markov embedded in it.展开更多
Digital watermarking must balance imperceptibility,robustness,complexity,and security.To address the challenge of computational efficiency in trellis-based informed embedding,we propose a modified watermarking framewo...Digital watermarking must balance imperceptibility,robustness,complexity,and security.To address the challenge of computational efficiency in trellis-based informed embedding,we propose a modified watermarking framework that integrates fuzzy c-means(FCM)clustering into the generation off block codewords for labeling trellis arcs.The system incorporates a parallel trellis structure,controllable embedding parameters,and a novel informed embedding algorithm with reduced complexity.Two types of embedding schemes—memoryless and memory-based—are designed to flexibly trade-off between imperceptibility and robustness.Experimental results demonstrate that the proposed method outperforms existing approaches in bit error rate(BER)and computational complexity under various attacks,including additive noise,filtering,JPEG compression,cropping,and rotation.The integration of FCM enhances robustness by increasing the codeword distance,while preserving perceptual quality.Overall,the proposed framework is suitable for real-time and secure watermarking applications.展开更多
A complete examination of Large Language Models’strengths,problems,and applications is needed due to their rising use across disciplines.Current studies frequently focus on single-use situations and lack a comprehens...A complete examination of Large Language Models’strengths,problems,and applications is needed due to their rising use across disciplines.Current studies frequently focus on single-use situations and lack a comprehensive understanding of LLM architectural performance,strengths,and weaknesses.This gap precludes finding the appropriate models for task-specific applications and limits awareness of emerging LLM optimization and deployment strategies.In this research,50 studies on 25+LLMs,including GPT-3,GPT-4,Claude 3.5,DeepKet,and hybrid multimodal frameworks like ContextDET and GeoRSCLIP,are thoroughly reviewed.We propose LLM application taxonomy by grouping techniques by task focus—healthcare,chemistry,sentiment analysis,agent-based simulations,and multimodal integration.Advanced methods like parameter-efficient tuning(LoRA),quantumenhanced embeddings(DeepKet),retrieval-augmented generation(RAG),and safety-focused models(GalaxyGPT)are evaluated for dataset requirements,computational efficiency,and performance measures.Frameworks for ethical issues,data limited hallucinations,and KDGI-enhanced fine-tuning like Woodpecker’s post-remedy corrections are highlighted.The investigation’s scope,mad,and methods are described,but the primary results are not.The work reveals that domain-specialized fine-tuned LLMs employing RAG and quantum-enhanced embeddings performbetter for context-heavy applications.In medical text normalization,ChatGPT-4 outperforms previous models,while two multimodal frameworks,GeoRSCLIP,increase remote sensing.Parameter-efficient tuning technologies like LoRA have minimal computing cost and similar performance,demonstrating the necessity for adaptive models in multiple domains.To discover the optimum domain-specific models,explain domain-specific fine-tuning,and present quantum andmultimodal LLMs to address scalability and cross-domain issues.The framework helps academics and practitioners identify,adapt,and innovate LLMs for different purposes.This work advances the field of efficient,interpretable,and ethical LLM application research.展开更多
Lactate,as a metabolite,plays a significant role in a number of fields,including medical diagnostics,exercise physiology and food science.Traditional methods for lactate measurement often involve expensive and cumbers...Lactate,as a metabolite,plays a significant role in a number of fields,including medical diagnostics,exercise physiology and food science.Traditional methods for lactate measurement often involve expensive and cumbersome instrumentation.This study developed a portable and low-cost lactate measurement system,including independently detectable hardware circuits and user-friendly embedded software,computer,and smartphone applications.The experiment verified that the relative error of the detection current in the device circuit was less than 1%.The electrochemical performance was measured by comparing the[Fe(CN)_(6)]^(3−)/[Fe(CN)_(6)]^(4−)solution with the desktop electrochemical workstation CHI660E,and a nearly consistent chronoamperometry(CA)curve was obtained.Two modified lactate sensors were used for CA testing of lactate.Within the concentration range of 0.1 mmol·L^(−1)to 20 mmol·L^(−1),there was a good linear relationship between lactate concentration and steady-state current,with a correlation coefficient(R2)greater than 0.99 and good repeatability,demonstrating the reliability of the developed device.The lactate measurement system developed in this study not only provides excellent detection performance and reliability,but also achieves portability and low cost,providing a new solution for lactate measurement.展开更多
In shale gas reservoir stimulation,proppants are essential for sustaining fracture conductivity.However,increasing closing stress causes proppants to embed into the rock matrix,leading to a progressive decline in frac...In shale gas reservoir stimulation,proppants are essential for sustaining fracture conductivity.However,increasing closing stress causes proppants to embed into the rock matrix,leading to a progressive decline in fracture permeability and conductivity.Furthermore,rock creep contributes to long-term reductions in fracture performance.To elucidate the combined effects of proppant embedding and rock creep on sustained conductivity,this study conducted controlled experiments examining conductivity decay in propped fractures under varying closing stresses,explicitly accounting for both mechanisms.An embedded discrete fracture model was developed to simulate reservoir production under different conductivity decay scenarios,while evaluating the influence of proppant parameters on fracture performance.The results demonstrate that fracture conductivity diminishes rapidly with increasing stress,yet at 50 MPa,the decline becomes less pronounced.Simulated production profiles show strong agreement with actual gas well data,confirming the model’s accuracy and predictive capability.These findings suggest that employing a high proppant concentration with smaller particle size(5 kg/m^(2),70/140 mesh)is effective for maintaining long-term fracture conductivity and enhancing shale gas recovery.This study provides a rigorous framework for optimizing proppant selection and designing stimulation strategies that maximize reservoir performance over time.展开更多
Tibetan medical named entity recognition(Tibetan MNER)involves extracting specific types of medical entities from unstructured Tibetan medical texts.Tibetan MNER provide important data support for the work related to ...Tibetan medical named entity recognition(Tibetan MNER)involves extracting specific types of medical entities from unstructured Tibetan medical texts.Tibetan MNER provide important data support for the work related to Tibetan medicine.However,existing Tibetan MNER methods often struggle to comprehensively capture multi-level semantic information,failing to sufficiently extract multi-granularity features and effectively filter out irrelevant information,which ultimately impacts the accuracy of entity recognition.This paper proposes an improved embedding representation method called syllable-word-sentence embedding.By leveraging features at different granularities and using un-scaled dot-product attention to focus on key features for feature fusion,the syllable-word-sentence embedding is integrated into the transformer,enhancing the specificity and diversity of feature representations.The model leverages multi-level and multi-granularity semantic information,thereby improving the performance of Tibetan MNER.We evaluate our proposed model on datasets from various domains.The results indicate that the model effectively identified three types of entities in the Tibetan news dataset we constructed,achieving an F1 score of 93.59%,which represents an improvement of 1.24%compared to the vanilla FLAT.Additionally,results from the Tibetan medical dataset we developed show that it is effective in identifying five kinds of medical entities,with an F1 score of 71.39%,which is a 1.34%improvement over the vanilla FLAT.展开更多
Named Entity Recognition(NER)is vital in natural language processing for the analysis of news texts,as it accurately identifies entities such as locations,persons,and organizations,which is crucial for applications li...Named Entity Recognition(NER)is vital in natural language processing for the analysis of news texts,as it accurately identifies entities such as locations,persons,and organizations,which is crucial for applications like news summarization and event tracking.However,NER in the news domain faces challenges due to insufficient annotated data,complex entity structures,and strong context dependencies.To address these issues,we propose a new Chinesenamed entity recognition method that integrates transfer learning with word embeddings.Our approach leverages the ERNIE pre-trained model for transfer learning and obtaining general language representations and incorporates the Soft-lexicon word embedding technique to handle varied entity structures.This dual-strategy enhances the model’s understanding of context and boosts its ability to process complex texts.Experimental results show that our method achieves an F1 score of 94.72% on a news dataset,surpassing baseline methods by 3%–4%,thereby confirming its effectiveness for Chinese-named entity recognition in the news domain.展开更多
The increasing fluency of advanced language models,such as GPT-3.5,GPT-4,and the recently introduced DeepSeek,challenges the ability to distinguish between human-authored and AI-generated academic writing.This situati...The increasing fluency of advanced language models,such as GPT-3.5,GPT-4,and the recently introduced DeepSeek,challenges the ability to distinguish between human-authored and AI-generated academic writing.This situation is raising significant concerns regarding the integrity and authenticity of academic work.In light of the above,the current research evaluates the effectiveness of Bidirectional Long Short-TermMemory(BiLSTM)networks enhanced with pre-trained GloVe(Global Vectors for Word Representation)embeddings to detect AIgenerated scientific Abstracts drawn from the AI-GA(Artificial Intelligence Generated Abstracts)dataset.Two core BiLSTM variants were assessed:a single-layer approach and a dual-layer design,each tested under static or adaptive embeddings.The single-layer model achieved nearly 97%accuracy with trainable GloVe,occasionally surpassing the deeper model.Despite these gains,neither configuration fully matched the 98.7%benchmark set by an earlier LSTMWord2Vec pipeline.Some runs were over-fitted when embeddings were fine-tuned,whereas static embeddings offered a slightly lower yet stable accuracy of around 96%.This lingering gap reinforces a key ethical and procedural concern:relying solely on automated tools,such as Turnitin’s AI-detection features,to penalize individuals’risks and unjust outcomes.Misclassifications,whether legitimate work is misread as AI-generated or engineered text,evade detection,demonstrating that these classifiers should not stand as the sole arbiters of authenticity.Amore comprehensive approach is warranted,one which weaves model outputs into a systematic process supported by expert judgment and institutional guidelines designed to protect originality.展开更多
Multimodal sentiment analysis aims to understand emotions from text,speech,and video data.However,current methods often overlook the dominant role of text and suffer from feature loss during integration.Given the vary...Multimodal sentiment analysis aims to understand emotions from text,speech,and video data.However,current methods often overlook the dominant role of text and suffer from feature loss during integration.Given the varying importance of each modality across different contexts,a central and pressing challenge in multimodal sentiment analysis lies in maximizing the use of rich intra-modal features while minimizing information loss during the fusion process.In response to these critical limitations,we propose a novel framework that integrates spatial position encoding and fusion embedding modules to address these issues.In our model,text is treated as the core modality,while speech and video features are selectively incorporated through a unique position-aware fusion process.The spatial position encoding strategy preserves the internal structural information of speech and visual modalities,enabling the model to capture localized intra-modal dependencies that are often overlooked.This design enhances the richness and discriminative power of the fused representation,enabling more accurate and context-aware sentiment prediction.Finally,we conduct comprehensive evaluations on two widely recognized standard datasets in the field—CMU-MOSI and CMU-MOSEI to validate the performance of the proposed model.The experimental results demonstrate that our model exhibits good performance and effectiveness for sentiment analysis tasks.展开更多
In this study,a new linear friction welding(LFW)process,embedded LFW process,was put forward,which was mainly applied to combination manufacturing of long or overlong loadcarrying titanium alloy structural components ...In this study,a new linear friction welding(LFW)process,embedded LFW process,was put forward,which was mainly applied to combination manufacturing of long or overlong loadcarrying titanium alloy structural components in aircraft.The interfacial plastic flow behavior and bonding mechanism of this process were investigated by a developed coupling EulerianLagrangian numerical model using software ABAQUS and a novel thermo-physical simulation method with designed embedded hot compression specimen.In addition,the formation mechanism and control method of welding defects caused by uneven plastic flow were discussed.The results reveal that the plastic flow along oscillating direction of this process is even and sufficient.In the direction perpendicular to oscillation,thermo-plastic metals mainly flow downward along welding interface under coupling of shear stress and interfacial pressure,resulting in the interfacial plastic zone shown as an inverted“V”shape.The upward plastic flow in this direction is relatively weak,and only a small amount of flash is extruded from top of joint.Moreover,the wedge block and welding components at top of joint are always in un-steady friction stage,leading to nonuniform temperature field distribution and un-welded defects.According to the results of numerical simulation,high oscillating frequency combined with low pressure and small amplitude is considered as appropriate parameter selection scheme to improve the upward interfacial plastic flow at top of joint and suppress the un-welded defects.The results of thermo-physical simulation illustrate that continuous dynamic recrystallization(CDRX)induces the bonding of interface,accompanying by intense dislocation movement and creation of many low-angle grain boundaries.In the interfacial bonding area,grain orientation is random with relatively low texture density(5.0 mud)owing to CDRX.展开更多
Dear Editor,The letter deals with the distributed state and fault estimation of the whole physical layer for cyber-physical systems(CPSs) when the cyber layer suffers from DoS attacks. With the advancement of embedded...Dear Editor,The letter deals with the distributed state and fault estimation of the whole physical layer for cyber-physical systems(CPSs) when the cyber layer suffers from DoS attacks. With the advancement of embedded computing, communication and related hardware technologies, CPSs have attracted extensive attention and have been widely used in power system, traffic network, refrigeration system and other fields.展开更多
Network virtualization is the development trend and inevitable requirement of hybrid wireless sensor networks(HWSNs).Low mapping efficiency and service interruption caused by mobility seriously affect the reliability ...Network virtualization is the development trend and inevitable requirement of hybrid wireless sensor networks(HWSNs).Low mapping efficiency and service interruption caused by mobility seriously affect the reliability of sensing tasks and ultimately affect the long-term revenue of the infrastructure providers.In response to these problems,this paper proposes an efficient virtual network embedding algorithm with a reliable service guarantee.Based on the topological attributes of nodes,a method for evaluating the physical network resource importance degree is proposed,and the nodes with rich resources are selected to improve embedding efficiency.Then,a method for evaluating the physical network reliability degree is proposed to predict the probability of mobile sensors providing uninterrupted services.The simulation results show that the proposed algorithm improves the acceptance rate of virtual sensor networks(VSN)embedding requests and the long-term revenue of the infrastructure providers.展开更多
Edge defects significantly impact the forming quality of Mg/Al composite plates during the rolling process.This study aims to develop an effective rolling technique to suppress these defects.First,an enhanced Lemaitre...Edge defects significantly impact the forming quality of Mg/Al composite plates during the rolling process.This study aims to develop an effective rolling technique to suppress these defects.First,an enhanced Lemaitre damage model with a generalized stress state damage prediction mechanism was used to evaluate the key mechanical factors contributing to defect formation.Based on this evaluation,an embedded composite rolling technique was proposed.Subsequently,comparative validation was conducted at 350℃ with a 50% reduction ratio.Results showed that the plates rolled using the embedded composite rolling technique had smooth surfaces and edges,with no macroscopic cracks observed.Numerical simulation indicated that,compared to conventional processes,the proposed technique reduced the maximum edge stress triaxiality of the plates from-0.02 to-1.56,significantly enhancing the triaxial compressive stress effect at the edges,which suppressed void nucleation and growth,leading to a 96%reduction in damage values.Mechanical property evaluations demonstrated that,compared to the conventional rolling process,the proposed technique improved edge bonding strength and tensile strength by approximately 67.7%and 118%,respectively.Further microstructural characterization revealed that the proposed technique,influenced by the restriction of deformation along the transverse direction(TD),weakened the plastic flow in the TD and enhanced plastic flow along the rolling direction(RD),resulting in higher grain boundary density and stronger basal texture.This,in turn,improved the toughness and transverse homogeneity of the plates.In summary,the embedded composite rolling technique provides crucial technical guidance for the preparation of Mg-based composite plates.展开更多
The use of metal oxides has been extensively documented in the literature and applied in a variety of contexts,including but not limited to energy storage,chemical sensors,and biomedical applications.One of the most s...The use of metal oxides has been extensively documented in the literature and applied in a variety of contexts,including but not limited to energy storage,chemical sensors,and biomedical applications.One of the most significant applications of metal oxides is heterogeneous catalysis,which represents a pivotal technology in industrial production on a global scale.Catalysts serve as the primary enabling agents for chemical reactions,and among the plethora of catalysts,metal oxides including magnesium oxide(MgO),ceria(CeO_(2))and titania(TiO_(2)),have been identified to be particularly effective in catalyzing a variety of reactions[1].Theoretical calculations based on density functional theory(DFT)and a multitude of other quantum chemistry methods have proven invaluable in elucidating the mechanisms of metal-oxide-catalyzed reactions,thereby facilitating the design of high-performance catalysts[2].展开更多
基金supported by the National Key R&D Program of China(Grant No.2021YFA1001000)the National Natural Science Foundation of China(Grant Nos.82111530212,U23A20282,and 61971255)+2 种基金the Natural Science Founda-tion of Guangdong Province(Grant No.2021B1515020092)the Shenzhen Bay Laboratory Fund(Grant No.SZBL2020090501014)the Shenzhen Science,Technology and Innovation Commission(Grant Nos.KJZD20231023094659002,JCYJ20220530142809022,and WDZC20220811170401001).
文摘Neural organoids and confocal microscopy have the potential to play an important role in microconnectome research to understand neural patterns.We present PLayer,a plug-and-play embedded neural system,which demonstrates the utilization of sparse confocal microscopy layers to interpolate continuous axial resolution.With an embedded system focused on neural network pruning,image scaling,and post-processing,PLayer achieves high-performance metrics with an average structural similarity index of 0.9217 and a peak signal-to-noise ratio of 27.75 dB,all within 20 s.This represents a significant time saving of 85.71%with simplified image processing.By harnessing statistical map estimation in interpolation and incorporating the Vision Transformer–based Restorer,PLayer ensures 2D layer consistency while mitigating heavy computational dependence.As such,PLayer can reconstruct 3D neural organoid confocal data continuously under limited computational power for the wide acceptance of fundamental connectomics and pattern-related research with embedded devices.
基金This paper is one of the phased achievements of the Education and Teaching Reform Project of Guangdong University of Petrochemical Engineering in 2022(71013413080)the Research and Practice Project of Teaching and Teaching Reform of University-Level Higher Vocational Education in 2023(JY202353).
文摘Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditional teaching,this paper proposes curriculum teaching reform based on the outcome-based education(OBE)concept,including determining course objectives,reforming teaching modes and methods,and improving the curriculum assessment and evaluation system.After two semesters of practice,this method not only enhances students’learning initiative but also improves teaching quality.
基金supported in part by Major Science and Technology Demonstration Project of Jiangsu Provincial Key R&D Program under Grant No.BE2023025in part by the National Natural Science Foundation of China under Grant No.62302238+2 种基金in part by the Natural Science Foundation of Jiangsu Province under Grant No.BK20220388in part by the Natural Science Research Project of Colleges and Universities in Jiangsu Province under Grant No.22KJB520004in part by the China Postdoctoral Science Foundation under Grant No.2022M711689.
文摘This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.We delve into the emerging trend of machine learning on embedded devices,enabling tasks in resource-limited environ-ments.However,the widespread adoption of machine learning raises significant privacy concerns,necessitating the development of privacy-preserving techniques.One such technique,secure multi-party computation(MPC),allows collaborative computations without exposing private inputs.Despite its potential,complex protocols and communication interactions hinder performance,especially on resource-constrained devices.Efforts to enhance efficiency have been made,but scalability remains a challenge.Given the success of GPUs in deep learning,lever-aging embedded GPUs,such as those offered by NVIDIA,emerges as a promising solution.Therefore,we propose an Embedded GPU-based Secure Two-party Computation(EG-STC)framework for Artificial Intelligence(AI)systems.To the best of our knowledge,this work represents the first endeavor to fully implement machine learning model training based on secure two-party computing on the Embedded GPU platform.Our experimental results demonstrate the effectiveness of EG-STC.On an embedded GPU with a power draw of 5 W,our implementation achieved a secure two-party matrix multiplication throughput of 5881.5 kilo-operations per millisecond(kops/ms),with an energy efficiency ratio of 1176.3 kops/ms/W.Furthermore,leveraging our EG-STC framework,we achieved an overall time acceleration ratio of 5–6 times compared to solutions running on server-grade CPUs.Our solution also exhibited a reduced runtime,requiring only 60%to 70%of the runtime of previously best-known methods on the same platform.In summary,our research contributes to the advancement of secure and efficient machine learning implementations on resource-constrained embedded devices,paving the way for broader adoption of AI technologies in various applications.
文摘The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks.
文摘Being different from testing for popular GUI software, the “instruction-category” approach is proposed for testing embedded system. This approach is constructed by three steps including refining items, drawing instruction-brief and instruction-category, and constructing test suite. Consequently, this approach is adopted to test oven embedded system, and detail process is deeply discussed. As a result, the factual result indicates that the “instruction-category” approach can be effectively applied in embedded system testing as a black-box method for conformity testing.
文摘Engineering practice is the key bridge between college education and actual work in the industry.In order to deliver qualified talents with engineering quality to the industry,this paper explores integrating software engineering thinking into the Embedded System Design course.A practical and effective teaching mode is designed consisting of immersive learning,case-based learning,progressive practice,interactive learning,and autonomous learning.Through this teaching mode,multi-levels of closed-loop have been established including final project cycle closed-loop,testing cycle closed-loop,and product cycle closed-loop.During this process,students gradually transition to putting forward product requirements,carrying out design and development,thinking and solving problems,collaborating,and assuring quality from the perspective of software engineering.The practice results show that students’engineering quality has been significantly improved.
基金Supported by the Grant-in-Aid for Scientific Research(C)by the Japan Society for the Promotion of Science(20K03615)。
文摘Let G be a group.The family of all sets which are closed in every Hausdorf group topology of G form the family of closed sets of a T_(1) topology M_(G) on G called the Markov topology.Similarly,the family of all algebraic subsets of G forms a family of closed sets for another T_(1)topology Z_(G) on G called the Zarski topology.A subgroup H of G is said to be Markov(resp.Zarski)embedded if the equality M_(G|H)=M_(H)(resp.Z_(G|H)=Z_(H))holds.I's proved that an abirary subgroup of a free group is both Zariski and Markov embedded in it.
基金funded by the National Science and Technology Council,Taiwan,under grant number NSTC 114-2221-E-167-005-MY3,and NSTC 113-2221-E-167-006-.
文摘Digital watermarking must balance imperceptibility,robustness,complexity,and security.To address the challenge of computational efficiency in trellis-based informed embedding,we propose a modified watermarking framework that integrates fuzzy c-means(FCM)clustering into the generation off block codewords for labeling trellis arcs.The system incorporates a parallel trellis structure,controllable embedding parameters,and a novel informed embedding algorithm with reduced complexity.Two types of embedding schemes—memoryless and memory-based—are designed to flexibly trade-off between imperceptibility and robustness.Experimental results demonstrate that the proposed method outperforms existing approaches in bit error rate(BER)and computational complexity under various attacks,including additive noise,filtering,JPEG compression,cropping,and rotation.The integration of FCM enhances robustness by increasing the codeword distance,while preserving perceptual quality.Overall,the proposed framework is suitable for real-time and secure watermarking applications.
文摘A complete examination of Large Language Models’strengths,problems,and applications is needed due to their rising use across disciplines.Current studies frequently focus on single-use situations and lack a comprehensive understanding of LLM architectural performance,strengths,and weaknesses.This gap precludes finding the appropriate models for task-specific applications and limits awareness of emerging LLM optimization and deployment strategies.In this research,50 studies on 25+LLMs,including GPT-3,GPT-4,Claude 3.5,DeepKet,and hybrid multimodal frameworks like ContextDET and GeoRSCLIP,are thoroughly reviewed.We propose LLM application taxonomy by grouping techniques by task focus—healthcare,chemistry,sentiment analysis,agent-based simulations,and multimodal integration.Advanced methods like parameter-efficient tuning(LoRA),quantumenhanced embeddings(DeepKet),retrieval-augmented generation(RAG),and safety-focused models(GalaxyGPT)are evaluated for dataset requirements,computational efficiency,and performance measures.Frameworks for ethical issues,data limited hallucinations,and KDGI-enhanced fine-tuning like Woodpecker’s post-remedy corrections are highlighted.The investigation’s scope,mad,and methods are described,but the primary results are not.The work reveals that domain-specialized fine-tuned LLMs employing RAG and quantum-enhanced embeddings performbetter for context-heavy applications.In medical text normalization,ChatGPT-4 outperforms previous models,while two multimodal frameworks,GeoRSCLIP,increase remote sensing.Parameter-efficient tuning technologies like LoRA have minimal computing cost and similar performance,demonstrating the necessity for adaptive models in multiple domains.To discover the optimum domain-specific models,explain domain-specific fine-tuning,and present quantum andmultimodal LLMs to address scalability and cross-domain issues.The framework helps academics and practitioners identify,adapt,and innovate LLMs for different purposes.This work advances the field of efficient,interpretable,and ethical LLM application research.
基金supported by National Natural Science Foundation of China(No.62006092)Natural Science Research Project of Anhui Educational Committee(No.2023AH030081)+1 种基金2023 New Era Education Provincial Quality Engineering Project(Graduate Education)(No.2023cxcysj103)2024 New Era Education Provincial Quality Engineering Project(Graduate Education)。
文摘Lactate,as a metabolite,plays a significant role in a number of fields,including medical diagnostics,exercise physiology and food science.Traditional methods for lactate measurement often involve expensive and cumbersome instrumentation.This study developed a portable and low-cost lactate measurement system,including independently detectable hardware circuits and user-friendly embedded software,computer,and smartphone applications.The experiment verified that the relative error of the detection current in the device circuit was less than 1%.The electrochemical performance was measured by comparing the[Fe(CN)_(6)]^(3−)/[Fe(CN)_(6)]^(4−)solution with the desktop electrochemical workstation CHI660E,and a nearly consistent chronoamperometry(CA)curve was obtained.Two modified lactate sensors were used for CA testing of lactate.Within the concentration range of 0.1 mmol·L^(−1)to 20 mmol·L^(−1),there was a good linear relationship between lactate concentration and steady-state current,with a correlation coefficient(R2)greater than 0.99 and good repeatability,demonstrating the reliability of the developed device.The lactate measurement system developed in this study not only provides excellent detection performance and reliability,but also achieves portability and low cost,providing a new solution for lactate measurement.
基金supported by the National Natural Science Foundation of China(Nos.52204051,52304046).
文摘In shale gas reservoir stimulation,proppants are essential for sustaining fracture conductivity.However,increasing closing stress causes proppants to embed into the rock matrix,leading to a progressive decline in fracture permeability and conductivity.Furthermore,rock creep contributes to long-term reductions in fracture performance.To elucidate the combined effects of proppant embedding and rock creep on sustained conductivity,this study conducted controlled experiments examining conductivity decay in propped fractures under varying closing stresses,explicitly accounting for both mechanisms.An embedded discrete fracture model was developed to simulate reservoir production under different conductivity decay scenarios,while evaluating the influence of proppant parameters on fracture performance.The results demonstrate that fracture conductivity diminishes rapidly with increasing stress,yet at 50 MPa,the decline becomes less pronounced.Simulated production profiles show strong agreement with actual gas well data,confirming the model’s accuracy and predictive capability.These findings suggest that employing a high proppant concentration with smaller particle size(5 kg/m^(2),70/140 mesh)is effective for maintaining long-term fracture conductivity and enhancing shale gas recovery.This study provides a rigorous framework for optimizing proppant selection and designing stimulation strategies that maximize reservoir performance over time.
基金supported in part by the National Science and Technology Major Project under(Grant 2022ZD0116100)in part by the National Natural Science Foundation Key Project under(Grant 62436006)+4 种基金in part by the National Natural Science Foundation Youth Fund under(Grant 62406257)in part by the Xizang Autonomous Region Natural Science Foundation General Project under(Grant XZ202401ZR0031)in part by the National Natural Science Foundation of China under(Grant 62276055)in part by the Sichuan Science and Technology Program under(Grant 23ZDYF0755)in part by the Xizang University‘High-Level Talent Training Program’Project under(Grant 2022-GSP-S098).
文摘Tibetan medical named entity recognition(Tibetan MNER)involves extracting specific types of medical entities from unstructured Tibetan medical texts.Tibetan MNER provide important data support for the work related to Tibetan medicine.However,existing Tibetan MNER methods often struggle to comprehensively capture multi-level semantic information,failing to sufficiently extract multi-granularity features and effectively filter out irrelevant information,which ultimately impacts the accuracy of entity recognition.This paper proposes an improved embedding representation method called syllable-word-sentence embedding.By leveraging features at different granularities and using un-scaled dot-product attention to focus on key features for feature fusion,the syllable-word-sentence embedding is integrated into the transformer,enhancing the specificity and diversity of feature representations.The model leverages multi-level and multi-granularity semantic information,thereby improving the performance of Tibetan MNER.We evaluate our proposed model on datasets from various domains.The results indicate that the model effectively identified three types of entities in the Tibetan news dataset we constructed,achieving an F1 score of 93.59%,which represents an improvement of 1.24%compared to the vanilla FLAT.Additionally,results from the Tibetan medical dataset we developed show that it is effective in identifying five kinds of medical entities,with an F1 score of 71.39%,which is a 1.34%improvement over the vanilla FLAT.
基金funded by Advanced Research Project(30209040702).
文摘Named Entity Recognition(NER)is vital in natural language processing for the analysis of news texts,as it accurately identifies entities such as locations,persons,and organizations,which is crucial for applications like news summarization and event tracking.However,NER in the news domain faces challenges due to insufficient annotated data,complex entity structures,and strong context dependencies.To address these issues,we propose a new Chinesenamed entity recognition method that integrates transfer learning with word embeddings.Our approach leverages the ERNIE pre-trained model for transfer learning and obtaining general language representations and incorporates the Soft-lexicon word embedding technique to handle varied entity structures.This dual-strategy enhances the model’s understanding of context and boosts its ability to process complex texts.Experimental results show that our method achieves an F1 score of 94.72% on a news dataset,surpassing baseline methods by 3%–4%,thereby confirming its effectiveness for Chinese-named entity recognition in the news domain.
文摘The increasing fluency of advanced language models,such as GPT-3.5,GPT-4,and the recently introduced DeepSeek,challenges the ability to distinguish between human-authored and AI-generated academic writing.This situation is raising significant concerns regarding the integrity and authenticity of academic work.In light of the above,the current research evaluates the effectiveness of Bidirectional Long Short-TermMemory(BiLSTM)networks enhanced with pre-trained GloVe(Global Vectors for Word Representation)embeddings to detect AIgenerated scientific Abstracts drawn from the AI-GA(Artificial Intelligence Generated Abstracts)dataset.Two core BiLSTM variants were assessed:a single-layer approach and a dual-layer design,each tested under static or adaptive embeddings.The single-layer model achieved nearly 97%accuracy with trainable GloVe,occasionally surpassing the deeper model.Despite these gains,neither configuration fully matched the 98.7%benchmark set by an earlier LSTMWord2Vec pipeline.Some runs were over-fitted when embeddings were fine-tuned,whereas static embeddings offered a slightly lower yet stable accuracy of around 96%.This lingering gap reinforces a key ethical and procedural concern:relying solely on automated tools,such as Turnitin’s AI-detection features,to penalize individuals’risks and unjust outcomes.Misclassifications,whether legitimate work is misread as AI-generated or engineered text,evade detection,demonstrating that these classifiers should not stand as the sole arbiters of authenticity.Amore comprehensive approach is warranted,one which weaves model outputs into a systematic process supported by expert judgment and institutional guidelines designed to protect originality.
基金supported by the Collaborative Tackling Project of the Yangtze River Delta SciTech Innovation Community(Nos.2024CSJGG01503,2024CSJGG01500)Guangxi Key Research and Development Program(No.AB24010317)Jiangxi Provincial Key Laboratory of Electronic Data Control and Forensics(Jiangxi Police College)(No.2025JXJYKFJJ002).
文摘Multimodal sentiment analysis aims to understand emotions from text,speech,and video data.However,current methods often overlook the dominant role of text and suffer from feature loss during integration.Given the varying importance of each modality across different contexts,a central and pressing challenge in multimodal sentiment analysis lies in maximizing the use of rich intra-modal features while minimizing information loss during the fusion process.In response to these critical limitations,we propose a novel framework that integrates spatial position encoding and fusion embedding modules to address these issues.In our model,text is treated as the core modality,while speech and video features are selectively incorporated through a unique position-aware fusion process.The spatial position encoding strategy preserves the internal structural information of speech and visual modalities,enabling the model to capture localized intra-modal dependencies that are often overlooked.This design enhances the richness and discriminative power of the fused representation,enabling more accurate and context-aware sentiment prediction.Finally,we conduct comprehensive evaluations on two widely recognized standard datasets in the field—CMU-MOSI and CMU-MOSEI to validate the performance of the proposed model.The experimental results demonstrate that our model exhibits good performance and effectiveness for sentiment analysis tasks.
基金co-supported by the National Natural Science Foundation of China(Nos.52105411,52105400and 52305420)the China Postdoctoral Science Foundation(No.2023M742830)Innovation Foundation for Doctor Dissertation of Northwestern Polytechnical University(No.CX2023008).
文摘In this study,a new linear friction welding(LFW)process,embedded LFW process,was put forward,which was mainly applied to combination manufacturing of long or overlong loadcarrying titanium alloy structural components in aircraft.The interfacial plastic flow behavior and bonding mechanism of this process were investigated by a developed coupling EulerianLagrangian numerical model using software ABAQUS and a novel thermo-physical simulation method with designed embedded hot compression specimen.In addition,the formation mechanism and control method of welding defects caused by uneven plastic flow were discussed.The results reveal that the plastic flow along oscillating direction of this process is even and sufficient.In the direction perpendicular to oscillation,thermo-plastic metals mainly flow downward along welding interface under coupling of shear stress and interfacial pressure,resulting in the interfacial plastic zone shown as an inverted“V”shape.The upward plastic flow in this direction is relatively weak,and only a small amount of flash is extruded from top of joint.Moreover,the wedge block and welding components at top of joint are always in un-steady friction stage,leading to nonuniform temperature field distribution and un-welded defects.According to the results of numerical simulation,high oscillating frequency combined with low pressure and small amplitude is considered as appropriate parameter selection scheme to improve the upward interfacial plastic flow at top of joint and suppress the un-welded defects.The results of thermo-physical simulation illustrate that continuous dynamic recrystallization(CDRX)induces the bonding of interface,accompanying by intense dislocation movement and creation of many low-angle grain boundaries.In the interfacial bonding area,grain orientation is random with relatively low texture density(5.0 mud)owing to CDRX.
基金supported by the National Natural Science Foundation of China(62303273,62373226)the National Research Foundation,Singapore through the Medium Sized Center for Advanced Robotics Technology Innovation(WP2.7)
文摘Dear Editor,The letter deals with the distributed state and fault estimation of the whole physical layer for cyber-physical systems(CPSs) when the cyber layer suffers from DoS attacks. With the advancement of embedded computing, communication and related hardware technologies, CPSs have attracted extensive attention and have been widely used in power system, traffic network, refrigeration system and other fields.
基金supported by National Natural Science Foundation of China(61901071,61871062,61771082,U20A20157)Science and Natural Science Foundation of Chongqing,China(cstc2020jcyjzdxmX0024)+1 种基金University Innovation Research Group of Chongqing(CXQT20017)Scientific and Technological Research Program of Chongqing Municipal Education Commission(No.KJZD-K201901301).
文摘Network virtualization is the development trend and inevitable requirement of hybrid wireless sensor networks(HWSNs).Low mapping efficiency and service interruption caused by mobility seriously affect the reliability of sensing tasks and ultimately affect the long-term revenue of the infrastructure providers.In response to these problems,this paper proposes an efficient virtual network embedding algorithm with a reliable service guarantee.Based on the topological attributes of nodes,a method for evaluating the physical network resource importance degree is proposed,and the nodes with rich resources are selected to improve embedding efficiency.Then,a method for evaluating the physical network reliability degree is proposed to predict the probability of mobile sensors providing uninterrupted services.The simulation results show that the proposed algorithm improves the acceptance rate of virtual sensor networks(VSN)embedding requests and the long-term revenue of the infrastructure providers.
基金supported by National Key Research and Development Program(2018YFA0707300)Major Program of National Natural Science Foundation of China(U22A20188).
文摘Edge defects significantly impact the forming quality of Mg/Al composite plates during the rolling process.This study aims to develop an effective rolling technique to suppress these defects.First,an enhanced Lemaitre damage model with a generalized stress state damage prediction mechanism was used to evaluate the key mechanical factors contributing to defect formation.Based on this evaluation,an embedded composite rolling technique was proposed.Subsequently,comparative validation was conducted at 350℃ with a 50% reduction ratio.Results showed that the plates rolled using the embedded composite rolling technique had smooth surfaces and edges,with no macroscopic cracks observed.Numerical simulation indicated that,compared to conventional processes,the proposed technique reduced the maximum edge stress triaxiality of the plates from-0.02 to-1.56,significantly enhancing the triaxial compressive stress effect at the edges,which suppressed void nucleation and growth,leading to a 96%reduction in damage values.Mechanical property evaluations demonstrated that,compared to the conventional rolling process,the proposed technique improved edge bonding strength and tensile strength by approximately 67.7%and 118%,respectively.Further microstructural characterization revealed that the proposed technique,influenced by the restriction of deformation along the transverse direction(TD),weakened the plastic flow in the TD and enhanced plastic flow along the rolling direction(RD),resulting in higher grain boundary density and stronger basal texture.This,in turn,improved the toughness and transverse homogeneity of the plates.In summary,the embedded composite rolling technique provides crucial technical guidance for the preparation of Mg-based composite plates.
基金financial support from the National Key R&D Program of China(2021YFB3500700)the National Natural Science Foundation of China(22473042,22003016,and 92145302).
文摘The use of metal oxides has been extensively documented in the literature and applied in a variety of contexts,including but not limited to energy storage,chemical sensors,and biomedical applications.One of the most significant applications of metal oxides is heterogeneous catalysis,which represents a pivotal technology in industrial production on a global scale.Catalysts serve as the primary enabling agents for chemical reactions,and among the plethora of catalysts,metal oxides including magnesium oxide(MgO),ceria(CeO_(2))and titania(TiO_(2)),have been identified to be particularly effective in catalyzing a variety of reactions[1].Theoretical calculations based on density functional theory(DFT)and a multitude of other quantum chemistry methods have proven invaluable in elucidating the mechanisms of metal-oxide-catalyzed reactions,thereby facilitating the design of high-performance catalysts[2].