1,329 research outputs found

    Reaching the last mile: best practices in leveraging the power of ICTs to communicate climate services to farmers at scale

    Get PDF
    This report reviews key ICTs for Development (ICT4D) Programs, Innovations and Information Exchange Platforms which are experimented within South Asia to explore the use and scale-ability of these innovative approaches to other parts of Africa and the developing world. Learning from the pioneering experiences of pilot projects across India and Africa in ICT development, we assess the potential ICTs offer to not only communicate climate information and related advisory services but also to build capacity and increase the resilience of rural smallholders. It is our hope that such South-South learning can pave the way for improved cross-regional experience sharing to tackle common challenges in reaching ‘the last mile’ with salient rural extension services, including climate information services

    AdapINT: A Flexible and Adaptive In-Band Network Telemetry System Based on Deep Reinforcement Learning

    Full text link
    In-band Network Telemetry (INT) has emerged as a promising network measurement technology. However, existing network telemetry systems lack the flexibility to meet diverse telemetry requirements and are also difficult to adapt to dynamic network environments. In this paper, we propose AdapINT, a versatile and adaptive in-band network telemetry framework assisted by dual-timescale probes, including long-period auxiliary probes (APs) and short-period dynamic probes (DPs). Technically, the APs collect basic network status information, which is used for the path planning of DPs. To achieve full network coverage, we propose an auxiliary probes path deployment (APPD) algorithm based on the Depth-First-Search (DFS). The DPs collect specific network information for telemetry tasks. To ensure that the DPs can meet diverse telemetry requirements and adapt to dynamic network environments, we apply the deep reinforcement learning (DRL) technique and transfer learning method to design the dynamic probes path deployment (DPPD) algorithm. The evaluation results show that AdapINT can redesign the telemetry system according to telemetry requirements and network environments. AdapINT can reduce telemetry latency by 75\% in online games and video conferencing scenarios. For overhead-aware networks, AdapINT can reduce control overheads by 34\% in cloud computing services.Comment: 14 pages, 19 figure

    SOOD: Towards Semi-Supervised Oriented Object Detection

    Full text link
    Semi-Supervised Object Detection (SSOD), aiming to explore unlabeled data for boosting object detectors, has become an active task in recent years. However, existing SSOD approaches mainly focus on horizontal objects, leaving multi-oriented objects that are common in aerial images unexplored. This paper proposes a novel Semi-supervised Oriented Object Detection model, termed SOOD, built upon the mainstream pseudo-labeling framework. Towards oriented objects in aerial scenes, we design two loss functions to provide better supervision. Focusing on the orientations of objects, the first loss regularizes the consistency between each pseudo-label-prediction pair (includes a prediction and its corresponding pseudo label) with adaptive weights based on their orientation gap. Focusing on the layout of an image, the second loss regularizes the similarity and explicitly builds the many-to-many relation between the sets of pseudo-labels and predictions. Such a global consistency constraint can further boost semi-supervised learning. Our experiments show that when trained with the two proposed losses, SOOD surpasses the state-of-the-art SSOD methods under various settings on the DOTA-v1.5 benchmark. The code will be available at https://github.com/HamPerdredes/SOOD.Comment: Accepted to CVPR 2023. Code will be available at https://github.com/HamPerdredes/SOO

    Practical m

    Get PDF
    In collaborative data publishing (CDP), an m-adversary attack refers to a scenario where up to m malicious data providers collude to infer data records contributed by other providers. Existing solutions either rely on a trusted third party (TTP) or introduce expensive computation and communication overheads. In this paper, we present a practical distributed k-anonymization scheme, m-k-anonymization, designed to defend against m-adversary attacks without relying on any TTPs. We then prove its security in the semihonest adversary model and demonstrate how an extension of the scheme can also be proven secure in a stronger adversary model. We also evaluate its efficiency using a commonly used dataset

    Optimization Algorithm of Control Channel Selection for Wireless Networks

    Get PDF
    Control channel is used to transmit protocol or signal information between wireless network nodes and is a key component of wireless network. Compared with data information, protocol or signal information is usually much less, so the spectrum bandwidth requirement of control channel is also much less than that of data channel. In order to optimize the usage of the limited spectrum resources, this paper focuses on the issue of control channel selection. We propose a greedy algorithm which minimizes the total spectrum bandwidth of the set of control channels. Theoretical analysis proves that the proposed algorithm can achieve the optimal set of control whose sum of the spectrum bandwidth is the minimum. Simulation results also show that the proposed algorithm consumes less spectrum resources than other algorithms in the same wireless network environment

    Protective effect of resveratrol on TNF-α-treated vascular endothelial cells

    Full text link
    • …
    corecore