2,077 research outputs found

    An SMDP-based Resource Management Scheme for Distributed Cloud Systems

    Full text link
    In this paper, the resource management problem in geographically distributed cloud systems is considered. The Follow Me Cloud concept which enables service migration across federated data centers (DCs) is adopted. Therefore, there are two types of service requests to the DC, i.e., new requests (NRs) initiated in the local service area and migration requests (MRs) generated when mobile users move across service areas. A novel resource management scheme is proposed to help the resource manager decide whether to accept the service requests (NRs or MRs) or not and determine how much resources should be allocated to each service (if accepted). The optimization objective is to maximize the average system reward and keep the rejection probability of service requests under a certain threshold. Numerical results indicate that the proposed scheme can significantly improve the overall system utility as well as the user experience compared with other resource management schemes.Comment: 5 pages, 5 figures, conferenc

    Object-fabrication Targeted Attack for Object Detection

    Full text link
    Recent researches show that the deep learning based object detection is vulnerable to adversarial examples. Generally, the adversarial attack for object detection contains targeted attack and untargeted attack. According to our detailed investigations, the research on the former is relatively fewer than the latter and all the existing methods for the targeted attack follow the same mode, i.e., the object-mislabeling mode that misleads detectors to mislabel the detected object as a specific wrong label. However, this mode has limited attack success rate, universal and generalization performances. In this paper, we propose a new object-fabrication targeted attack mode which can mislead detectors to `fabricate' extra false objects with specific target labels. Furthermore, we design a dual attention based targeted feature space attack method to implement the proposed targeted attack mode. The attack performances of the proposed mode and method are evaluated on MS COCO and BDD100K datasets using FasterRCNN and YOLOv5. Evaluation results demonstrate that, the proposed object-fabrication targeted attack mode and the corresponding targeted feature space attack method show significant improvements in terms of image-specific attack, universal performance and generalization capability, compared with the previous targeted attack for object detection. Code will be made available

    Variational generation of spin squeezing on one-dimensional quantum devices with nearest-neighbor interactions

    Full text link
    Efficient preparation of spin-squeezed states is important for quantum-enhanced metrology. Current protocols for generating strong spin squeezing rely on either high dimensionality or long-range interactions. A key challenge is how to generate considerable spin squeezing in one-dimensional systems with only nearest-neighbor interactions. Here, we develop variational spin-squeezing algorithms to solve this problem. We consider both digital and analog quantum circuits for these variational algorithms. After the closed optimization loop of the variational spin-squeezing algorithms, the generated squeezing can be comparable to the strongest squeezing created from two-axis twisting. By analyzing the experimental imperfections, the variational spin-squeezing algorithms proposed in this work are feasible in recent developed noisy intermediate-scale quantum computers

    Altered expression of circadian clock gene, mPer1, in mouse brain and kidney under morphine dependence and withdrawal

    Get PDF
    Every physiological function in the human body exhibits some form of circadian rhythmicity. Under pathological conditions, however, circadian rhythmicity may be dusrupted. Patients infected with HIV or addicted to drugs of abuse often suffer from sleep disorders and altered circadian rhythms. Early studies in Drosophila suggested that drug seeking behavior might be related to the expression of certain circadian clock genes. Our previous research showed that conditioned place preference with morphine treatment was altered in mice lacking the Period-1 (mPer1) circadian clock gene. Thus, we sought to investigate whether morphine treatment could alter the expression of mPer1, especially in brain regions outside the SCN and in peripheral tissues. Our results using Western blot analysis showed that the mPER1 immunoreactivity exhibited a strong circadian rhythm in the brains of the control (Con), morphine-dependent (MD), and morphine-withdrawal (MW) mice. However, the phase of the circadian rhythm of mPER1 expression in the brains of MD mice significantly differed from that of the Con mice (p < 0.05). In contrast to mPER1 expression in the brain, the circadian rhythm of mPER1 immunoreactivity in the kidneys was abolished after morphine administration, whereas the Con mice maintained robust circadian rhythmicity of mPER1 in the kidney. Therefore, the effect of morphine on the circadian clock gene mPer1 may vary among different organs, resulting in desynchronization of circadian function between the SCN and peripheral organs. Originally published Journal of Circadian Rhythms, Vol. 4, No. 9, Aug 2006
    • …
    corecore