2,077 research outputs found
An SMDP-based Resource Management Scheme for Distributed Cloud Systems
In this paper, the resource management problem in geographically distributed
cloud systems is considered. The Follow Me Cloud concept which enables service
migration across federated data centers (DCs) is adopted. Therefore, there are
two types of service requests to the DC, i.e., new requests (NRs) initiated in
the local service area and migration requests (MRs) generated when mobile users
move across service areas. A novel resource management scheme is proposed to
help the resource manager decide whether to accept the service requests (NRs or
MRs) or not and determine how much resources should be allocated to each
service (if accepted). The optimization objective is to maximize the average
system reward and keep the rejection probability of service requests under a
certain threshold. Numerical results indicate that the proposed scheme can
significantly improve the overall system utility as well as the user experience
compared with other resource management schemes.Comment: 5 pages, 5 figures, conferenc
Water Rights Allocation, Management and Trading in an Irrigation District - A Case Study of Northwestern China
Object-fabrication Targeted Attack for Object Detection
Recent researches show that the deep learning based object detection is
vulnerable to adversarial examples. Generally, the adversarial attack for
object detection contains targeted attack and untargeted attack. According to
our detailed investigations, the research on the former is relatively fewer
than the latter and all the existing methods for the targeted attack follow the
same mode, i.e., the object-mislabeling mode that misleads detectors to
mislabel the detected object as a specific wrong label. However, this mode has
limited attack success rate, universal and generalization performances. In this
paper, we propose a new object-fabrication targeted attack mode which can
mislead detectors to `fabricate' extra false objects with specific target
labels. Furthermore, we design a dual attention based targeted feature space
attack method to implement the proposed targeted attack mode. The attack
performances of the proposed mode and method are evaluated on MS COCO and
BDD100K datasets using FasterRCNN and YOLOv5. Evaluation results demonstrate
that, the proposed object-fabrication targeted attack mode and the
corresponding targeted feature space attack method show significant
improvements in terms of image-specific attack, universal performance and
generalization capability, compared with the previous targeted attack for
object detection. Code will be made available
Variational generation of spin squeezing on one-dimensional quantum devices with nearest-neighbor interactions
Efficient preparation of spin-squeezed states is important for
quantum-enhanced metrology. Current protocols for generating strong spin
squeezing rely on either high dimensionality or long-range interactions. A key
challenge is how to generate considerable spin squeezing in one-dimensional
systems with only nearest-neighbor interactions. Here, we develop variational
spin-squeezing algorithms to solve this problem. We consider both digital and
analog quantum circuits for these variational algorithms. After the closed
optimization loop of the variational spin-squeezing algorithms, the generated
squeezing can be comparable to the strongest squeezing created from two-axis
twisting. By analyzing the experimental imperfections, the variational
spin-squeezing algorithms proposed in this work are feasible in recent
developed noisy intermediate-scale quantum computers
Altered expression of circadian clock gene, mPer1, in mouse brain and kidney under morphine dependence and withdrawal
Every physiological function in the human body exhibits some form of circadian rhythmicity. Under pathological conditions, however, circadian rhythmicity may be dusrupted. Patients infected with HIV or addicted to drugs of abuse often suffer from sleep disorders and altered circadian rhythms. Early studies in Drosophila suggested that drug seeking behavior might be related to the expression of certain circadian clock genes. Our previous research showed that conditioned place preference with morphine treatment was altered in mice lacking the Period-1 (mPer1) circadian clock gene. Thus, we sought to investigate whether morphine treatment could alter the expression of mPer1, especially in brain regions outside the SCN and in peripheral tissues. Our results using Western blot analysis showed that the mPER1 immunoreactivity exhibited a strong circadian rhythm in the brains of the control (Con), morphine-dependent (MD), and morphine-withdrawal (MW) mice. However, the phase of the circadian rhythm of mPER1 expression in the brains of MD mice significantly differed from that of the Con mice (p < 0.05). In contrast to mPER1 expression in the brain, the circadian rhythm of mPER1 immunoreactivity in the kidneys was abolished after morphine administration, whereas the Con mice maintained robust circadian rhythmicity of mPER1 in the kidney. Therefore, the effect of morphine on the circadian clock gene mPer1 may vary among different organs, resulting in desynchronization of circadian function between the SCN and peripheral organs. Originally published Journal of Circadian Rhythms, Vol. 4, No. 9, Aug 2006
- …