the proceedings contain 74 papers. the special focus in this conference is on Smart City Applications. the topics include: Tuning Hopfield Neural Networks with Metaheuristic Hy-perparameter Selection;Federated Learnin...
ISBN:
(纸本)9783031886522
the proceedings contain 74 papers. the special focus in this conference is on Smart City Applications. the topics include: Tuning Hopfield Neural Networks with Metaheuristic Hy-perparameter Selection;Federated Learning Using Knowledge Distillation for CNN-Based eHealth Data Analysis;a Hybrid Data Mining Model for Early Detection of Lung Cancer Utilizing Supervised Feature Extraction;Whale Optimization Algorithm-Based Feature Selection Combined withthe XGBoost Model for Breast Cancer Detection: A Comparative Study;CNN-LSTM Based Network Anomaly Detection in WSN-DS;bibliometric Mapping of Data Catalogs: Exploring Advances and Key Research Actors;Towards an Approach for Extracting UML Class Diagrams Using Advanced Language Models;real-Time Data processing and Big Data Analytics: A Comparative Study of Modern Platforms;Comparative Accuracy Assessment of Orthophotos Produced Using Different UAV and Photogrammetric Software;Horizontal Accuracy Tests on Google Satellite Images Over Naples Added in QGIS;Analyzing AI Models for Turkey Earthquake Disaster Prediction;Predicting Monthly Wheat Crop Coefficients in Morocco Using ANN Models with Limited Meteorological Data: A Study in the Draa-Tafilalet Region;intelligent Climate Control in University Residences for Temporary Guests;Hybrid parallel Architecture Integrating FFN, 1D CNN, and LSTM for Predicting Wildfire Occurrences in Morocco;Identifying NovelSARS-Cov-2 Inhibitors Using a Structure-Based Virtual Screening Approach;Analysis of AI Models for Weather Data Interpretation and Forecasting: Case Study on Temperature Predictions;an Automatic Stop Words Removal in Maghrebi Arabic Dialect Text Classification Using Part of Speech Tagging;business Rules: From Text to Formal Language;comparative Analysis of Large Language Models in Moroccan Darija Translation;machine Learning Approaches for Intrusion Detection in IoT: Literature Review.
Backdoor attacks pose significant threats to Natural Language processing (NLP) models. Various backdoor defense methods for NLP models primarily function by identifying and subsequently manipulating backdoor triggers ...
详细信息
As the distribution network system and transportation, energy, municipal, financial, and other service barriers are gradually broken, the comprehensive development of the power network in source network demand, wisdom...
详细信息
Cloud-native microservice applications use different communication paradigms to network microservices, including both synchronous and asynchronous I/O for exchanging data. Existing solutions depend on kernel-based net...
详细信息
ISBN:
(纸本)9798350399806
Cloud-native microservice applications use different communication paradigms to network microservices, including both synchronous and asynchronous I/O for exchanging data. Existing solutions depend on kernel-based networking, incurring significant overheads. the interdependence between microservices for these applications involves considerable communication, including contention between multiple concurrent flows or user sessions. In this paper, we design X-IO, a high-performance unified I/O interface that is built on top of shared memory processing with lock-free producer/consumer rings, eliminating kernel networking overheads and contention. X-IO offers a feature-rich interface. X-IO's zero-copy interface supports building provides truly zero-copy data transfers between microservices, achieving high performance. X-IO also provides a POSIX-like socket interface using HTTP/REST API to achieve seamless porting of microservices to X-IO, without any change to the application code. X-IO supports concurrent connections for microservices that require distinct user sessions operating in parallel. Our preliminary experimental results show that X-IO's zero-copy interfaces achieve 2.8x-4.1x performance improvement compared to kernel-based interfaces. Its socket interfaces outperform kernel TCP sockets and achieve performance close to UNIX-domain sockets. the HTTP/REST APIs in X-IO perform 1.4x-2.3x better than kernel-based alternatives with concurrent connections.
K-Means algorithm is one of the most common clustering algorithms widely applied in various data analysis applications. Yinyang K-Means algorithm is a popular enhanced K-Means algorithm that avoids most unnecessary ca...
详细信息
the E-Field parallel Imaging Correlator (EPIC) is an algorithm designed to perform imaging at several frequencies using radio telescopes on much faster time scales O(N log N) than their traditional counterparts O(N2)....
详细信息
In contemporary social networks, dynamic privacy protection remains a pivotal yet challenging endeavor due to the intricate and evolving nature of information exchange. Traditional privacy models, predominantly static...
详细信息
Withthe increasing concern for environmental protection and resource optimization, efficient waste sorting has become a serious challenge today. In this paper, we propose a new offloading control problem that aims to...
详细信息
Text-based person retrieval primarily aims to retrieve the images of target persons represented by a given text query. In this task, how to effectively align images and text globally and locally is an important challe...
详细信息
Onboard optics and co-packaged optics (CPO) will enable to build an ultra high-radix switching ASIC. Ultra high-radix interconnection networks, which take a low diameter, lead to a marginal impact of intra-job network...
详细信息
ISBN:
(纸本)9783030953881;9783030953874
Onboard optics and co-packaged optics (CPO) will enable to build an ultra high-radix switching ASIC. Ultra high-radix interconnection networks, which take a low diameter, lead to a marginal impact of intra-job network topology on the performance of job mapping, i.e., placement of message passing interface (MPI) ranks onto compute nodes. In this context, we investigate the impact of job mapping algorithms on job scheduling performance, which have different trade-offs between the resource utilization and the constraint of intra-job network topology. Our simulation results show that a simple disjoint job mapping policy (e.g., a topology-oblivious job mapping algorithm) surprisingly outperforms a complicated joint one (e.g., a topology-aware job mapping algorithm) for its substantially better job scheduling performance at the cost of a larger network diameter, especially when dealing with an exceedingly large workload on high-radix networked parallel computers.
暂无评论