Facial attribute editing has mainly two objectives:1)translating image from a source domain to a target one,and 2)only changing the facial regions related to a target attribute and preserving the attribute-excluding d...Facial attribute editing has mainly two objectives:1)translating image from a source domain to a target one,and 2)only changing the facial regions related to a target attribute and preserving the attribute-excluding details.In this work,we propose a multi-attention U-Net-based generative adversarial network(MU-GAN).First,we replace a classic convolutional encoder-decoder with a symmetric U-Net-like structure in a generator,and then apply an additive attention mechanism to build attention-based U-Net connections for adaptively transferring encoder representations to complement a decoder with attribute-excluding detail and enhance attribute editing ability.Second,a self-attention(SA)mechanism is incorporated into convolutional layers for modeling long-range and multi-level dependencies across image regions.Experimental results indicate that our method is capable of balancing attribute editing ability and details preservation ability,and can decouple the correlation among attributes.It outperforms the state-of-the-art methods in terms of attribute manipulation accuracy and image quality.Our code is available at https://github.com/SuSir1996/MU-GAN.展开更多
With progression of the digital age, the complexity of software continues to grow. AS a result, methods to quantitatively assess characteristics of software have attracted significant atten- tion. These efforts have l...With progression of the digital age, the complexity of software continues to grow. AS a result, methods to quantitatively assess characteristics of software have attracted significant atten- tion. These efforts have led to a large number of new measures such as coupling metrics, many of which seek to consider the impact of correlations between components and failures on ap- plication reliability. However, most of these approaches set the coupling parameters arbitrarily by making assumptions instead of utilizing experimental data and therefore may not accurately capture actual coupling between components of software applica- tion. Since the coupling matrix is often set arbitrarily, the existing approaches to assess software reliability considering component correlation fail to reflect the real degree of interaction and rela- tionships among software components. This paper presents an efficient approach to assess the software reliability considering Correlated component failures, incorporating software architec- ture while considering actual internal coupling of software with an efficient approach based on multivariate Bernoulli (MVB) distribu- tion. The unified framework for software Coupling measurement is' informed by a comprehensive survey of frameworks for object- oriented and procedure-oriented software. This framework enables the extraction of more accurate coupling among cornponents. The effectiveness of this method is illustrated through an exPerimental study bylapplying it to a real-time software application.展开更多
For polar codes,the performance of successive cancellation list(SCL)decoding is capable of approaching that of maximum likelihood decoding.However,the existing hardware architectures for the SCL decoding suffer from h...For polar codes,the performance of successive cancellation list(SCL)decoding is capable of approaching that of maximum likelihood decoding.However,the existing hardware architectures for the SCL decoding suffer from high hardware complexity due to calculating L decoding paths simultaneously,which are unfriendly to the devices with limited logical resources,such as field programmable gate arrays(FPGAs).In this paper,we propose a list-serial pipelined hardware architecture with low complexity for the SCL decoding,where the serial calculation and the pipelined operation are elegantly combined to strike a balance between the complexity and the latency.Moreover,we employ only one successive cancellation(SC)decoder core without L×L crossbars,and reduce the number of inputs of the metric sorter from 2L to L+2.Finally,the FPGA implementations show that the hardware resource consumption is significantly reduced with negligible decoding performance loss.展开更多
With the rapid development of the mobile internet and the massive deployment of the Internet of Things, mobile devices, including both the consumer electronics and the sensors, become hungrier for the energy than ever...With the rapid development of the mobile internet and the massive deployment of the Internet of Things, mobile devices, including both the consumer electronics and the sensors, become hungrier for the energy than ever before. Conventional cable based charging largely restrict the movement of the mobile devices. Wireless charging hence emerges as an essential technique for enabling our ultimate goal of charging anytime and anywhere. By efficiently exploiting the legacy of the existing communication infrastructure, we propose a nov- el data and energy integrated network (DEIN) in order to re- alise the radio frequency (RF) based wireless charging with- out degrading the information transmission. In this treatise, we focus on the implementation of the DEIN in both the theoretical and practical aspects, concerning the transceiver architecture design and the rectifier circuit design. Furthermore, we also present a Wi-Fi based testbed for demonstrating the availability of the RF based wireless charging.展开更多
With the improvement of network,security becomes more importable. In market,firewall is one of the importable security products. Firewall can prevent your network from being attacked,for example IP snoop,mail-spm etc....With the improvement of network,security becomes more importable. In market,firewall is one of the importable security products. Firewall can prevent your network from being attacked,for example IP snoop,mail-spm etc. But firewall can not prevent itself from the action which attacks the firewall's code and firewall system. So we add integrity services into firewall system. In firewall system,every module does self-check integrity before it is loaded by system. A bilateral authentication procedure is designed for two modules which call each other to establish trust in the identity and integrity of each other. And it is still necessary to ensure secure linkage between the two parties. Firewall system establishes on the security data architecutre.展开更多
基金supported in part by the National Natural Science Foundation of China(NSFC)(62076093,61871182,61302163,61401154)the Beijing Natural Science Foundation(4192055)+3 种基金the Natural Science Foundation of Hebei Province of China(F2015502062,F2016502101,F2017502016)the Fundamental Research Funds for the Central Universities(2020YJ006,2020MS099)the Open Project Program of the National Laboratory of Pattern Recognition(NLPR)(201900051)The authors gratefully acknowledge the support of NVIDIA Corporation with the donation of the GPU used for this research.
文摘Facial attribute editing has mainly two objectives:1)translating image from a source domain to a target one,and 2)only changing the facial regions related to a target attribute and preserving the attribute-excluding details.In this work,we propose a multi-attention U-Net-based generative adversarial network(MU-GAN).First,we replace a classic convolutional encoder-decoder with a symmetric U-Net-like structure in a generator,and then apply an additive attention mechanism to build attention-based U-Net connections for adaptively transferring encoder representations to complement a decoder with attribute-excluding detail and enhance attribute editing ability.Second,a self-attention(SA)mechanism is incorporated into convolutional layers for modeling long-range and multi-level dependencies across image regions.Experimental results indicate that our method is capable of balancing attribute editing ability and details preservation ability,and can decouple the correlation among attributes.It outperforms the state-of-the-art methods in terms of attribute manipulation accuracy and image quality.Our code is available at https://github.com/SuSir1996/MU-GAN.
基金supported by the National Aerospace Science Foundation of China(20140751008)
文摘With progression of the digital age, the complexity of software continues to grow. AS a result, methods to quantitatively assess characteristics of software have attracted significant atten- tion. These efforts have led to a large number of new measures such as coupling metrics, many of which seek to consider the impact of correlations between components and failures on ap- plication reliability. However, most of these approaches set the coupling parameters arbitrarily by making assumptions instead of utilizing experimental data and therefore may not accurately capture actual coupling between components of software applica- tion. Since the coupling matrix is often set arbitrarily, the existing approaches to assess software reliability considering component correlation fail to reflect the real degree of interaction and rela- tionships among software components. This paper presents an efficient approach to assess the software reliability considering Correlated component failures, incorporating software architec- ture while considering actual internal coupling of software with an efficient approach based on multivariate Bernoulli (MVB) distribu- tion. The unified framework for software Coupling measurement is' informed by a comprehensive survey of frameworks for object- oriented and procedure-oriented software. This framework enables the extraction of more accurate coupling among cornponents. The effectiveness of this method is illustrated through an exPerimental study bylapplying it to a real-time software application.
基金supported in part by the National Key R&D Program of China(No.2019YFB1803400)。
文摘For polar codes,the performance of successive cancellation list(SCL)decoding is capable of approaching that of maximum likelihood decoding.However,the existing hardware architectures for the SCL decoding suffer from high hardware complexity due to calculating L decoding paths simultaneously,which are unfriendly to the devices with limited logical resources,such as field programmable gate arrays(FPGAs).In this paper,we propose a list-serial pipelined hardware architecture with low complexity for the SCL decoding,where the serial calculation and the pipelined operation are elegantly combined to strike a balance between the complexity and the latency.Moreover,we employ only one successive cancellation(SC)decoder core without L×L crossbars,and reduce the number of inputs of the metric sorter from 2L to L+2.Finally,the FPGA implementations show that the hardware resource consumption is significantly reduced with negligible decoding performance loss.
基金supported by University of Electronic Science and Technology of China under Grant No.ZYGX2016KYQD103
文摘With the rapid development of the mobile internet and the massive deployment of the Internet of Things, mobile devices, including both the consumer electronics and the sensors, become hungrier for the energy than ever before. Conventional cable based charging largely restrict the movement of the mobile devices. Wireless charging hence emerges as an essential technique for enabling our ultimate goal of charging anytime and anywhere. By efficiently exploiting the legacy of the existing communication infrastructure, we propose a nov- el data and energy integrated network (DEIN) in order to re- alise the radio frequency (RF) based wireless charging with- out degrading the information transmission. In this treatise, we focus on the implementation of the DEIN in both the theoretical and practical aspects, concerning the transceiver architecture design and the rectifier circuit design. Furthermore, we also present a Wi-Fi based testbed for demonstrating the availability of the RF based wireless charging.
文摘With the improvement of network,security becomes more importable. In market,firewall is one of the importable security products. Firewall can prevent your network from being attacked,for example IP snoop,mail-spm etc. But firewall can not prevent itself from the action which attacks the firewall's code and firewall system. So we add integrity services into firewall system. In firewall system,every module does self-check integrity before it is loaded by system. A bilateral authentication procedure is designed for two modules which call each other to establish trust in the identity and integrity of each other. And it is still necessary to ensure secure linkage between the two parties. Firewall system establishes on the security data architecutre.