A weakly supervised action localization method, which integrated snippet contrastive learning, was proposed to address the issue of misclassification of snippets at action boundaries in existing attention-based methods. First, an attention mechanism with three branches was introduced to measure the possibility of each video frame being an action instance, context, or background. Second, the Class Activation Sequences (CAS) corresponding to each branch were constructed based on the obtained attention values. Then, positive and negative sample pairs were generated using a snippet mining algorithm. Finally, the network was guided through snippet contrastive learning to correctly classify hard snippets. Experimental results indicated that at an Intersection over Union (IoU) of 0.5, the mean Average Precisions (mAP) of the proposed method on THUMOS14 and ActivityNet1.3 datasets are 33.9% and 40.1% respectively, with improvements of 1.1 and 2.9 percentage points compared to the DGCNN (Dynamic Graph modeling for weakly-supervised temporal action localization Convolutional Neural Network) weakly supervised action localization model, validating the effectiveness of the proposed method.
Both the S-box (multiple outputs) in block ciphers and the feedback function in stream ciphers require special Boolean functions to ensure the security of the cipher algorithm. To solve the problems of excessive resource consumption of reconfigurable hardware operation units and low clock frequency caused by Non-Linear Boolean Function (NLBF) in the existing algorithms of stream cipher, a high-efficiency AIC(And-Inverter Cone)-based design scheme for NLBF reconfigurable operation units was proposed, namely RA-NLBF. Based on the theories of cryptography, after analyzing the NLBF characteristics of various stream cipher algorithms and extracting the function features of NLBF including the times of AND terms, the number of AND terms, and the number of input ports, an NLBF simplification method based on the dual-logic hybrid form of “Mixed Polarity Reed-Muller (MPRM)” and “Traditional Boolean function (TB)” was proposed, which reduced the number of NLBF AND terms by 29% and formed an NLBF expression suitable for the AIC. Based on the simplified expression characteristics, such as the distribution of the number of AND terms and the times of AND terms, reconfigurable AIC units and interconnection networks were designed to form the reconfigurable units that can satisfy the NLBF operation in the existing public stream cipher algorithms. The proposed RA-NLBF was verified by logic synthesis based on CMOS 180 nm technology, and the results show that the area of RA-NLBF is 12 949.67 μm2, and the clock frequency reaches 505 MHz, which is a 59.7% reduction in area and a 37.3% increase in clock frequency compared with Reconfigurable Logic Unit for Sequence Cryptographic (RSCLU), an existing method with the same function.
Concerning the sensor data based activity recognition problem, deep Convolutional Neural Network (CNN) was used to perform activity recognition on public OPPORTUNITY sensor dataset, and an improved Progressive Neural Architecture Search (PNAS) algorithm was proposed. Firstly, in the process of neural network model design, without manual selection of suitable topology, PNAS algorithm was used to design the optimal topology in order to maximize the F1 score. Secondly, a Sequential Model-Based Optimization (SMBO) strategy was used, in which the structure space was searched in the order of low complexity to high complexity, while a surrogate function was learned to guide the search of the structure space. Finally, the top 20 models with the best performance in the search process were fully trained on OPPORTUNIT dataset, and the best performing model was selected as the optimal architecture searched. The F1 score of the optimal architecture searched in this way reaches 93.08% on OPPORTUNITY dataset, which is increased by 1.34% and 1.73% respectively compared with those of the optimal architecture searched by evolutionary algorithm and DeepConvlSTM, which indicates that the proposed method can improve previously manually-designed architectures and is feasible and effective.
The high communication complexity of Practical Byzantine Fault Tolerance (PBFT) consensus protocol will lead to low consensus efficiency, the failure or the existing of Byzantine behavior of the single primary node will lead to the stop of consensus process. In order to solve these problems, an Improved Multi-primary-node Practical Byzantine Fault Tolerance (IMPBFT) consensus mechanism was proposed. Firstly, the number of effective consensus rounds of nodes was calculated by the number of consensus rounds of nodes, the number of consensus rounds with Byzantine behavior and the priority values assigned to the nodes, and several primary nodes were selected according to the size of effective consensus rounds. Then, the original consensus mechanism was improved to make all nodes use the improved consensus mechanism for consensus. Finally, pipeline was introduced to implement the concurrent execution of IMPBFT consensus. In the pipeline operation, multi-stage messages of different rounds’ consensus were signed together, and no fixed cycle was used to control the pipeline. Theoretical research and experimental results show that, the multi-primary-node structure of IMPBFT is more secure and stable than the consensus structure of single primary node. Compared with PBFT and Credit-Delegated Byzantine Fault Tolerance (CDBFT) consensus with square level traffic, the proposed IMPBFT reduces the traffic to linear level. The IMPBFT has better performance than PBFT and CDBFT in terms of transaction throughput, scalability and transaction delay. The IMPBFT using the “multi-stage messages signed together with no fixed cycle” pipeline has improved the transaction throughput by 75.2% compared with the IMPBFT without pipeline.