391 research outputs found

    Middleware for Internet of Things: A Survey

    Get PDF

    Human-Like Driving: Empirical Decision-Making System for Autonomous Vehicles

    Get PDF
    The autonomous vehicle, as an emerging and rapidly growing field, has received extensive attention for its futuristic driving experiences. Although the fast developing depth sensors and machine learning methods have given a huge boost to self-driving research, existing autonomous driving vehicles do meet with several avoidable accidents during their road testings. The major cause is the misunderstanding between self-driving systems and human drivers. To solve this problem, we propose a humanlike driving system in this paper to give autonomous vehicles the ability to make decisions like a human. In our method, a convolutional neural network model is used to detect, recognize, and abstract the information in the input road scene, which is captured by the on-board sensors. And then a decision-making system calculates the specific commands to control the vehicles based on the abstractions. The biggest advantage of our work is that we implement a decision-making system which can well adapt to real-life road conditions, in which a massive number of human drivers exist. In addition, we build our perception system with only the depth information, rather than the unstable RGB data. The experimental results give a good demonstration of the efficiency and robustness of the proposed method

    Workload characterization of JVM languages

    Get PDF
    Being developed with a single language in mind, namely Java, the Java Virtual Machine (JVM) nowadays is targeted by numerous programming languages. Automatic memory management, Just-In-Time (JIT) compilation, and adaptive optimizations provided by the JVM make it an attractive target for different language implementations. Even though being targeted by so many languages, the JVM has been tuned with respect to characteristics of Java programs only -- different heuristics for the garbage collector or compiler optimizations are focused more on Java programs. In this dissertation, we aim at contributing to the understanding of the workloads imposed on the JVM by both dynamically-typed and statically-typed JVM languages. We introduce a new set of dynamic metrics and an easy-to-use toolchain for collecting the latter. We apply our toolchain to applications written in six JVM languages -- Java, Scala, Clojure, Jython, JRuby, and JavaScript. We identify differences and commonalities between the examined languages and discuss their implications. Moreover, we have a close look at one of the most efficient compiler optimizations - method inlining. We present the decision tree of the HotSpot JVM's JIT compiler and analyze how well the JVM performs in inlining the workloads written in different JVM languages

    Legal Analysis and Case Study on the Choice between Setting Environmental Flows by Using Reclaimed Water in Non-Permanent Rivers and the Sustainable Management of Groundwater in Southeast Spain

    Get PDF
    This article studies the interaction between two environmental objectives actively pursued in water governance. On the one hand, the convenience of establishing or raising a minimum circulating flow in surface water bodies so to improve their quantitative and qualitative status. On the other hand, the need to carry out an intelligent management of aquifers avoiding their overexploitation. In the case study, the proposal consisting of increasing the minimum flow rate on a non-permanent river by means of discharging reclaimed water is studied. Such strategy jeopardizes the recovery of a number of overexploited aquifers since reclaimed water is currently being used for farming under the condition to proportionally reduce groundwater withdrawals. The aim is to discuss whether it is reasonable and rational to ensure continuous flows in water courses which do not have that pattern according to their natural dynamics to the detriment of other environmental or socioeconomic goals. In order to help decision makers to make a right choice, a set of criteria based on legal principles is proposed. According to the principles of minimum intervention, rationality and reasonableness, proportionality, and water economy, it is concluded that the use of reclaimed water to set higher environmental flows in discontinuous and ephemeral streams should only have a minor role in water policies, especially whether it may jeopardize other critical environmental goals.This research was funded by the Water Chair of the University of Alicante-Alicante Provincial Council (2020) and by the CampusHábitat5U network of excellence

    Combinational Circuit Obfuscation through Power Signature Manipulation

    Get PDF
    Today\u27s military systems are composed of hardware and software systems, many of which are critical technologies, and must be protected to ensure our adversaries cannot gain any information from a various analysis attacks. Side Channel Analysis (SCA) attacks allow an attacker to gain the significant information from the measured signatures leaked by side-channels such as power consumption, and electro-magnetic emission. In this research the focus on detecting, characterizing, and manipulating the power signature by designing a power signature estimation and manipulation method. This research has determined that the proposed method capable of characterizing and altering the type of power signature can provide a protection against adversarial SCA attacks

    Computer Aided Verification

    Get PDF
    This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verification to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    • …
    corecore