With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and exc...With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and excessive model parameters in worker violation detection,this study proposes ADCP-YOLO,an enhanced lightweight model based on YOLOv8.Here,“ADCP”represents four key improvements:Alterable Kernel Convolution(AKConv),Dilated-Wise Residual(DWR)module,Channel Reconstruction Global Attention Mechanism(CRGAM),and Powerful-IoU loss.These components collaboratively enhance feature extraction,multi-scale perception,and localization accuracy while effectively reducing model complexity and computational cost.Experimental results show that ADCP-YOLO achieves a mAP of 90.6%,surpassing YOLOv8 by 3.0%with a 6.6%reduction in parameters.These findings demonstrate that ADCP-YOLO successfully balances accuracy and efficiency,offering a practical solution for intelligent safety monitoring in smart factory workshops.展开更多
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p...For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.展开更多
The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to...The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.展开更多
基金TheNationalNatural Science Foundation ofChina(Nos.62272418,62102058)Zhejiang Provincial Natural Science Foundation Major Project(No.LD24F020004)the Major Open Project of Key Laboratory for Advanced Design and Intelligent Computing of the Ministry of Education(No.ADIC2023ZD001).
文摘With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and excessive model parameters in worker violation detection,this study proposes ADCP-YOLO,an enhanced lightweight model based on YOLOv8.Here,“ADCP”represents four key improvements:Alterable Kernel Convolution(AKConv),Dilated-Wise Residual(DWR)module,Channel Reconstruction Global Attention Mechanism(CRGAM),and Powerful-IoU loss.These components collaboratively enhance feature extraction,multi-scale perception,and localization accuracy while effectively reducing model complexity and computational cost.Experimental results show that ADCP-YOLO achieves a mAP of 90.6%,surpassing YOLOv8 by 3.0%with a 6.6%reduction in parameters.These findings demonstrate that ADCP-YOLO successfully balances accuracy and efficiency,offering a practical solution for intelligent safety monitoring in smart factory workshops.
基金National Natural Science Foundation of China under Grant No.60873213,91018008 and 61070192Beijing Science Foundation under Grant No. 4082018Shanghai Key Laboratory of Intelligent Information Processing of China under Grant No. IIPL-09-006
文摘For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.
文摘The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.