this paper introduces the Temporal Transform Network based on Scale Sequences (TTS) for cloth-changing person re-identification in video datasets. the TTS network is designed to capture multi-scale temporal cues withi...
this paper introduces the Temporal Transform Network based on Scale Sequences (TTS) for cloth-changing person re-identification in video datasets. the TTS network is designed to capture multi-scale temporal cues within video sequences. It accomplishes this by initially modeling short-term temporal cues between adjacent frames, followed by capturing long-term relationships between non-consecutive frames. In more detail, short-term temporal cues are modeled through parallel inflated convolutions with different time dilation rates, enabling the representation of pedestrian movement and appearance dynamics. Long-term relationships are effectively captured using a temporal self-attention model, mitigating challenges such as occlusion and noise within the video sequence. the TTS network outperforms existing methods across cloth-changing video ReID datasets such as CCVID. For instance, under general settings, our approach exhibits a 1.1% improvement in top-1 accuracy and a corresponding 1.1% increase in mAP compared to the baseline. In cloth-changing settings, we observe a 0.2% enhancement in top-1 accuracy and a notable 1.3% increase in mAP relative to the baseline.
Phishing emails are one of the most common and effective tools that cybercriminals use to gain access to an organization9;s network or personal information. To detect these attacks, email service providers use a va...
详细信息
ISBN:
(纸本)9781665439022
Phishing emails are one of the most common and effective tools that cybercriminals use to gain access to an organization's network or personal information. To detect these attacks, email service providers use a variety of tools and indicators, such as the URLs that attackers include in their email messages. However, cybercriminals are able to bypass these detection techniques by omitting URLs in their messages and instead engaging victims in a conversation to advance their attacks. In this paper, we investigate the performance of convolutional neural network (CNN) models that identify phishing attacks by analyzing only the text in the email messages. the models take as input an embedding of the text in the email's body and output a probability indicating the likelihood that the message is malicious. We evaluate several CNN architectures using real-world phishing emails and find that the best performing one can identify phishing attacks with an accuracy of 98.139%, recall of 98.125%, and precision of 98.269%.
We herein propose three novel optimization methods to accelerate distributed transaction processing into a geographically distributed database. the first optimization involves the parallelization of the write-ahead lo...
详细信息
ISBN:
(纸本)9781665439022
We herein propose three novel optimization methods to accelerate distributed transaction processing into a geographically distributed database. the first optimization involves the parallelization of the write-ahead logging protocol. It allows multiple worker threads to synchronize log entries to the storage device simultaneously without any dependencies. the second optimization involves the grouped transfer of log entries from the leader to followers. this reduces the number of transmissions and effectively uses the network bandwidth. the third optimization involves the separation of the worker thread logic. By breaking the logic into the prepare phase and the commit phase, the worker threads at the leader node run asynchronously in parallel without waiting for responses from the follower nodes. the experimental results demonstrated that the proposed method achieved more than 10 million tps and less than 100 ms with client interactions through the network. the CPU utilization was almost 100%, which implied a dramatic reduction in synchronization in worker threads.
Basic recursive summation and common dot product algorithm have a backward error bound that grows linearly withthe vector dimension. Blanchard [1] proposed a class of fast and accurate summation and dot product algor...
详细信息
the proceedings contain 5 papers. the topics discussed include: sparse matrix-dense matrix multiplication on heterogeneous CPU+FPGA embedded system;run-time power modelling in embedded GPUs with dynamic voltage and fr...
the proceedings contain 5 papers. the topics discussed include: sparse matrix-dense matrix multiplication on heterogeneous CPU+FPGA embedded system;run-time power modelling in embedded GPUs with dynamic voltage and frequency scaling;fault-tolerant online scheduling algorithms for CubeSats;an OpenMP parallel genetic algorithm for design space exploration of heterogeneous multi-processor embedded systems;and automated precision tuning in activity classification systems: a case study.
As the gap between compute and I/O performance tends to grow, modern High-Performance Computing (HPC) architectures include a new resource type: an intermediate persistent fast memory layer, called burst buffers. this...
详细信息
ISBN:
(纸本)9783030856656;9783030856649
As the gap between compute and I/O performance tends to grow, modern High-Performance Computing (HPC) architectures include a new resource type: an intermediate persistent fast memory layer, called burst buffers. this is just one of many kinds of renewable resources which are orthogonal to the processors themselves, such as network bandwidth or software licenses. Ignoring orthogonal resources while making scheduling decisions just for processors may lead to unplanned delays of jobs of which resource requirements cannot be immediately satisfied. We focus on a classic problem of makespan minimization for parallel-machine scheduling of independent sequential jobs with additional requirements on the amount of a single renewable orthogonal resource. We present an easily-implementable log-linear algorithm that we prove is 25/6-approximation. In simulation experiments, we compare our algorithm to standard greedy list-scheduling heuristics and show that, compared to LPT, resource-based algorithms generate significantly shorter schedules.
作者:
Mullin, LenoreHains, Gaétan
1400 Washington Ave AlbanyNY12222 United States LACL
Université Paris-Est Créteil94000 France
High-performance architectures have complex features so that reliable production of parallel software is beyond the reach of many Computer Science graduates. Compilers alone cannot guarantee the highest performance an...
详细信息
Static learning is a learning algorithm for finding additional implicit implications between gates in a netlist. In automatic test pattern generation (ATPG) the learned implications help recognize conflicts and redund...
详细信息
ISBN:
(纸本)9781665413343
Static learning is a learning algorithm for finding additional implicit implications between gates in a netlist. In automatic test pattern generation (ATPG) the learned implications help recognize conflicts and redundancies early, and thus greatly improve the performance of ATPG. though ATPG can further benefit from multiple runs of incremental or dynamic learning, it is only feasible when the learning process is fast enough. In the paper, we study speeding up static learning through parallelization on heterogeneous computing platform, which includes multi-core microprocessors (CPUs), and graphics processing units (GPUs). We discuss the advantages and limitations in each of these architectures. Withtheir specific features in mind, we propose two different parallelization strategies that are tailored to multi-core CPUs and GPUs. Speedup and performance scalability of the two proposed parallelalgorithms are analyzed. As far as we know, this is the first time that parallel static learning is studied in the literature.
In order to solve the problems of large data image acquisition, stable transmission and real-time processing of moving objects in industrial scenes, a solution of “acquisition + processing + storage + transmission + ...
详细信息
In order to solve the problems of large data image acquisition, stable transmission and real-time processing of moving objects in industrial scenes, a solution of “acquisition + processing + storage + transmission + display” based on FPGA + ARM architecture for Camera Link high-speed camera is proposed. Zynq-7000 series products with abundant logic resources and general CPU are selected. Make full use of the parallel computing capability of the PL side, To solve the problems of high-speed acquisition and image processing, the PS side used to complete the image storage and stable transmission of the system. this paper introduces the key technologies of each part in detail. the experimental results show that the system has the advantages of optimizing image quality, high real-time, no frame loss, small size, low power consumption and low cost. It is also used in high-definition imaging related projects of train body.
Discrete element modelling (DEM) is widely used to simulate granular systems, nowadays routinely on graphical processing units. Graphics processing units (GPUs) are inherently designed for parallel computation, and re...
详细信息
暂无评论