Nowadays, the rapid growth of data across the internet has provided sufficient labeled data to train deep structured artificial neural networks. While deeper structured networks bring about significant precision gains...
详细信息
ISBN:
(数字)9783319682105
ISBN:
(纸本)9783319682105;9783319682099
Nowadays, the rapid growth of data across the internet has provided sufficient labeled data to train deep structured artificial neural networks. While deeper structured networks bring about significant precision gains in many applications, they also pose an urgent demand for higher computation capacity at the expense of power consumption. To this end, various FPGA based deep neural network accelerators are proposed for higher performance and lower energy consumption. However, as a dilemma, the development cycle of FPGA application is much longer than that of CPU and GPU. Although FPGA vendors such as Altera and Xilinx have released OpenCL framework to ease the programming, tuning the OpenCL codes for desirable performance on FPGAs is still challenging. In this paper, we look into the OpenCL implementation of Convolutional Neural Network (CNN) on FPGA. By analysing the execution manners of a CPU/GPU oriented verision on FPGA, we find out the causes of performance difference between FPGA and CPU/GPU and locate the performance bottlenecks. According to our analysis, we put forward a corresponding optimization method focusing on external memory transfers. We implement a prototype system on an Altera Stratix V A7 FPGA, which brings a considerable 4.76x speed up to the original version. To the best of our knowledge, this implementation outperforms most of the previous OpenCL implementations on FPGA by a large margin.
Design of a fully integrated power amplifier (PA) with distributed active transformer (DAT) architecture is introduced in this paper. PA achieves high efficiency and high power performance necessary for long range int...
详细信息
ISBN:
(纸本)9781509021604
Design of a fully integrated power amplifier (PA) with distributed active transformer (DAT) architecture is introduced in this paper. PA achieves high efficiency and high power performance necessary for long range internet of thing (IoT) wireless communication systems. The amplifier is implemented in a 0.18 mu m SiGe BiCMOS technology with 3.3V supply voltage and achieves a peak output power of +32dBm and a gain of +15dBm while operating at 10GHz. The amplifier has a peak drain efficiency of 35% and peak power added efficiency (PAE) of 47%. The chip has an area of 1.3mm(2) including pads.
Network teaching based on computer has been a new teaching mode put forward in recent *** design and organization of multimedia database is the foundation of the whole network construction and the important standards ...
详细信息
Network teaching based on computer has been a new teaching mode put forward in recent *** design and organization of multimedia database is the foundation of the whole network construction and the important standards for network teaching quality *** network transmission bandwidth is limited,which makes a higher request for database redundancy,calculating method of inquiry and structure *** paper makes specific instructions for the system structure and construction method of the application of multimedia database in the network teaching of university sports elective course.
It is well understood that for internet of Things (IoT), security of underlying hardware is the key to safe and reliable operation. IoT service stack relies on security of network, software, and firmware, all of which...
详细信息
It is well understood that for internet of Things (IoT), security of underlying hardware is the key to safe and reliable operation. IoT service stack relies on security of network, software, and firmware, all of which, in turn, depend on functionality provided by the underlying hardware. The hardware may be compromised or attacked by multiple threat actors. The designer may create a backdoor that leaks vital information such as encryption key used in secure channel; the manufacturer may tamper the design by inserting hardware Trojans or introducing artifacts with known reliability vulnerabilities. Either of these actors may enable writing into protected memory areas that may store secure hash of trusted code base, allowing malware to boot directly on the hardware. Today’s designs integrate IP blocks from multiple vendors; manufactured, tested, and repaired by different companies spanning across the globe. Consequently, there are many entry points for the hardware to be compromised. For a trusted hardware design, protection and security of intellectual property cores are of paramount importance. This special section aims to publish novel solutions for security problems related to hardware used in IoT. •Secured IoT Hardware: Induction of any form of third-party intervention in the hardware design methodology may raise grave security concern for IoT hardware. Securing IoT hardware can be in the form of protecting intellectual property cores against false claim of ownership/piracy/counterfeit. The first form of security measure requires anti-piracy methodologies such as digital watermarking, hardware metering, computational forensic engineering, and obfuscation that can nullify the false claim of ownership or detect unauthorized pirated designs. The second form of threat, which is formally called “hardware Trojan,” is an act of deliberate insertion into a design (such as intellectual property core, hardware) by a rogue designer or vendor, and also requires detection/cor
Denial of service is becoming a growing concern. As our systems communicate more and more with others that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the ...
详细信息
ISBN:
(纸本)9781467392068
Denial of service is becoming a growing concern. As our systems communicate more and more with others that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up our resources and disable our servers. Since these attacks occur before parties are authenticated to each other, we cannot rely upon enforcement of the appropriate access control policy to protect us. Instead we must build our defenses, as much as possible, into the protocols themselves. This paper shows how some principles that have already been used to make protocols more resistant to denial of service can be specified and verified. We specify a protocol for distributed networks and specify, verify it using general formal methods.
Cloud computing provides the massive potential for technological transformation in traditional distributed network services. In general cloud computing services provide an ease to associated cloud customers to access ...
详细信息
ISBN:
(纸本)9789380544199
Cloud computing provides the massive potential for technological transformation in traditional distributed network services. In general cloud computing services provide an ease to associated cloud customers to access and perform multiple operations on it from multiple locations. Thus, secure data sharing, storage and transference for this large volume of the data set are one of the key issues for cloud computing. Since the transfer of information on the internet or in any other network scheme is vulnerable to an attack by the hacker hence to deal with such kind of problems, cryptography algorithms are used. Cryptography algorithms provide a secure atmosphere in which data transference from a user point of view can easily achieve confidentiality, authentication, integrity, availability and identification. In this paper, we propose secure data transference architecture for cloud computing layered architecture and provide a comprehensive study of related algorithms in proposed model.
Cloud computing as a new and popular IT-based technology is a large-scale distributedcomputing paradigm. Cloud computing is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically scalab...
详细信息
ISBN:
(纸本)9781467393799
Cloud computing as a new and popular IT-based technology is a large-scale distributedcomputing paradigm. Cloud computing is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the internet. Replica selection requires information about the capabilities and performance characteristics of a storage system. It is based on the user demand and failure occurs during response time. In data cloud, the selection of replica is an important issue for users and to access a data file. Our research is mainly focused on replica selection mechanism in order to achieve the best performance. This research proposes new replica selection base on ant colony optimization to improve average access time. We use Java to evaluate the approach. The obtained result showed better performance of the proposed algorithm.
In today scenario of internet world, mining of data from large amount of database is a big challenges, for this finding the relationship from the database is also a big problem, for reduction of this type of problems ...
详细信息
ISBN:
(纸本)9789380544199
In today scenario of internet world, mining of data from large amount of database is a big challenges, for this finding the relationship from the database is also a big problem, for reduction of this type of problems the association rule mining concept is used to mining the whole dataset from the distributed database for solving this type of problem the Apriori algorithms is used to reduce the data mining concept. The primary goal of this paper is to provide the high privacy and security in the distributed database environment to prevent the unauthorized access from the third site user for providing the high privacy, to providing the high privacy two well define algorithm is used first one is hash based algorithm and second one is sign based algorithm for with and without trusted site in both wired and wireless environments. This paper divided the centralized database into the distributed database by using the horizontally partitioned algorithm to reduce the data leakage with highest privacy.
Given the recent advancement in the ubiquitous positioning technologies, it is now common to query terabytes of spatial data. These massive data are usually geo-distributed across multiple data centers to ensure their...
详细信息
ISBN:
(纸本)9781450346177
Given the recent advancement in the ubiquitous positioning technologies, it is now common to query terabytes of spatial data. These massive data are usually geo-distributed across multiple data centers to ensure their availability. Yet, at least one replica of the data is stored close to where the data are generated. Spatial queries are complex and computationally intensive, and therefore, distributed computation platforms, such as Hadoop are now used to improve their execution time. However, Hadoop is agnostic to the spatial data characteristics, and it randomly partitions and locates the data stored in its distributed file system which degrades the performance of the execution of spatial queries. In this paper, we propose CoS-HDFS, an extension to the Hadoop distributed File System (HDFS) that takes into account the spatial characteristics of the data and accordingly co-locates them on the HDFS nodes that span multiple data centers. We integrate CoS-HDFS with SpatialHadoop, a MapReduce framework that natively supports spatial data, to make use of its implementation of spatial indexes, operations, and query interfaces. We experimentally demonstrate significant reduction in the network usage and total execution time in the case of spatial join queries on the TIGER dataset.
Hash Ripple join is an online aggregation algorithm that can rapidly give good approximate join results increases with the progress of the join operation and converges to the real result when the join finishes. Luo et...
详细信息
ISBN:
(纸本)9781538632086
Hash Ripple join is an online aggregation algorithm that can rapidly give good approximate join results increases with the progress of the join operation and converges to the real result when the join finishes. Luo et al. proposed a parallel hash ripple join (PHRJ) that runs in a distributed setting. However, the PHRJ has two drawbacks when handling large-scale data: 1) PHRJ updates approximate results in fine grain which induces extra communication cost in a distributed environment 2) When data is out of memory, PHRJ cannot provide unbiased approximate result. In this thesis, a scalable hash ripple join is proposed that 1) runs on a distributed framework that can process distributed data in coarse-grain to speed up the join performance; 2) continuously gives unbiased and consistent approximate join results even in the presence of memory overflow; and 3) has good scalability handling growing amount of data. We have implemented a prototype of the scalable hash ripple join (SHRJ) algorithm on Spark. Experiment results show that SHRJ can give good approximate join result while taking less than 10% of the time of Spark's own join operator.
暂无评论