-
1
Digital Twin-Based Real-Time Monitoring System for Safety of Multiple Laptops in Working Environment
Published 2024-01-01Get full text
Article -
2
High-Performance Multi-Object Tracking for Autonomous Driving in Urban Scenarios With Heterogeneous Embedded Boards
Published 2025-01-01“…We compare our solution against a highly optimized multi-core version and show that we are able to trigger significant performance speedups (up to <inline-formula> <tex-math notation="LaTeX">$7.19\times $ </tex-math></inline-formula>) in all power-modes, sometimes even surpassing the CPU reference with the GPU in a lower-power operating mode.…”
Get full text
Article -
3
Architecture design of re-configurable convolutional neural network on software definition
Published 2021-06-01“…In order to meet the flexibility and efficiency requirement in convolutional neural network (CNN), an architecture of re-configurable CNN based on software definition was proposed.In the architecture, the process of CNN could be normalized and the operation mode could be accelerated.The calculation pipeline was implemented by using dual bus architecture based on AHB and AXI protocols.By software definition, the proposed architecture, which could realize the real-time processing of data among different CNN structure, was implemented on FPGA.The result shows that at least 2 CNN models can be software defined on the FPGA circuit.The output measures an operation processing capacity of 10 times that of CPU, and an operation energy consumption ratio of 2 times that of GPU.…”
Get full text
Article -
4
Modeling the interrupt transmission process of SR-IOV cryptographic device
Published 2019-02-01“…The SR-IOV cryptographic device generates a large number of I/O interrupts when performing operations in a virtualized environment,causing the CPU to frequently switch between the Root mode and the Non-Root mode,which brings huge system performance overhead and affects the operational performance of SR-IOV cryptographic device.Aiming at this problem,the I/O interrupt of SR-IOV cryptographic device was analyzed,and a M/M/1 queuing model according to the cryptographic task first-come-first-served rules was constructed.What’s more,the key factors affecting system performance were analyzed,and the validity of the model via simulation and experiment was verified,and finally the system performance was tested.The results show that the model can quantitatively analyze the impact of the interrupt frequency on the interrupt response time and system queue length.…”
Get full text
Article -
5
Research on flood defense mechanism of SDN control layer:detection and mitigation
Published 2021-11-01“…Aiming at the problem of spoofing flood defense in the control layer of SDN, a controller defense mechanism (CDM)was proposed, including a flood detection mechanism based on key features multi-classification and a flood mitigation mechanism based on SAVI.The flood feature analysis module of the control layer was designed for flood detection, and boosting algorithm was used to overlay each feature weak classifier to form an enhanced classifier, which can achieve more accurate classification spoofing flooding attack effect by continuously reducing the residual in the calculation.In CDM, a flood mitigation mechanism based on SAVI was deployed to realize flood mitigation, which performed flood packet path filtering based on binding-verification mode, and updated the flood features of access layer switches with dynamic polling mode to reduce redundant model update load.The experimental results show that the proposed method has the characteristics of low overhead and high precision.CDM effectively increases the security of the control layer, and reduces the time of host classification of spoofing flood attack and the CPU consumption of corresponding controller.…”
Get full text
Article -
6
Optimization of Embedded Mobile Teaching Model Based on Network Streaming Media Technology
Published 2021-01-01“…In this system, the energy consumption optimization method of mobile streaming media is adopted, and Central Processing Unit (CPU) resources are allocated reasonably according to the principle of maximizing rewards, so as to achieve the purpose of reducing power consumption. …”
Get full text
Article -
7
Shuffled Frog Leaping Algorithm for Preemptive Project Scheduling Problems with Resource Vacations Based on Patterson Set
Published 2013-01-01“…This paper presents a shuffled frog leaping algorithm (SFLA) for the single-mode resource-constrained project scheduling problem where activities can be divided into equant units and interrupted during processing. …”
Get full text
Article -
8
Efficient and safe software defined network topology discovery protocol
Published 2023-12-01“…The network topology discovery in OpenFlow-based software-defined networks is mainly achieved by utilizing the OpenFlow discovery protocol (OFDP).However, it has been observed in existing research that OFDP exhibits low updating efficiency and is susceptible to network topology pollution attacks.To address the efficiency and safety concerns of the network topology discovery protocol, an in-depth investigation was conducted on the mechanism and safety of OFDP network topology discovery.The characteristics of network topology establishment and updating in OFDP were analyzed, and an improved protocol named Im-OFDP (improved OpenFlow discovery protocol) based on the minimum vertex covering problem in graph theory was proposed.In Im-OFDP, the switch port table and network link table were initially established using prior information obtained from OFDP network topology discovery.Subsequently, a graph model of the network topology was constructed, and the minimum vertex covering algorithm in graph theory was employed to select specific switches for the reception and forwarding of topology discovery link layer discovery protocol (LLDP) packets.Multi-level flow tables were designed based on the network topology structure, and these flow entries were installed on the selected switches by the controller to process LLDP packets.To address security issues, dynamic check code verification in LLDP packets was employed to ensure the safety of network links.Additionally, a network equipment information maintenance mechanism was established based on known network topologies to ensure the safety of the network equipment.Experimental results demonstrate a significant reduction in the number of network topology discovery messages, bandwidth overhead, and CPU overhead through the deployment of Im-OFDP.Moreover, the response time for node failures and link recovery time after mode failure is substantially reduced.Im-OFDP also effectively mitigates various network topology pollution attacks, such as link fabrication and switch forgery attacks.Overall, Im-OFDP has the capability to enhance the efficiency and safety of SDN topology discovery.…”
Get full text
Article -
9
Physics-Based Self-Supervised Grasp Pose Detection
Published 2024-12-01“…The system is optimized to run on CPU in headless-parallelized mode, with the option of running in a graphical interface or headless and storing videos of the process. …”
Get full text
Article -
10
Data Overlay Mesh in Distributed Clouds Allowing Collaborative Applications
Published 2025-01-01“…In modern architecture, multi-tenancy is the design mode of operation used to reduce the resource costs of system implementation. …”
Get full text
Article