Edge networks provide ample resources for low-latency service recruitment, unlike remote resources in the Cloud. As such, smart devices and Internet of Things (IoT) nodes form a pool of Extreme Edge Devices (EED) that...
详细信息
ISBN:
(数字)9781665480017
ISBN:
(纸本)9781665480017
Edge networks provide ample resources for low-latency service recruitment, unlike remote resources in the Cloud. As such, smart devices and Internet of Things (IoT) nodes form a pool of Extreme Edge Devices (EED) that are within reach of Mist and Fog networks, providing significant advantages in latency, geographic cognizance, and reduced communication costs. EEDs are often recruited in Edge networks assuming they are reliable in their commitment to tasks. However, many EEDs may fail to fulfill their tasks because they operate under opportunistic approaches and are prone to intermittent connectivity. To ameliorate task failure, we aim to optimize task allocation under the assumption of failure. Additionally, we optimize CPU utilization to engage reliable EEDs, resorting to replication when needed to exceed a tunable reliability margin. We demonstrate the efficacy of our model in multiple scenarios and present future work in EED utilization.
Disbursed algorithms are realistic solutions for resolving the Electromagnetic Compatibilities (EMC) troubles to bob up from wireless neighborhood place networks (WLANs). Such algorithms rent allotted techniques which...
详细信息
The topic in this paper deals with the performance of a multi-input multi-output multi-path dissipating medium in indoor cellular computer network environments on the basis of the ieee 802.11n channel model. The MIMO ...
详细信息
TinyML, deploying low-complexity Machine Learning (ML) models on microcontroller units, which have constrained the availability of resources, is revolutionizing the technologies for extremely low-end devices. This stu...
详细信息
In recent years, semantic segmentation has become an increasingly important task in computer vision, with numerous applications in image analysis and object recognition. One popular approach for semantic segmentation ...
详细信息
ISBN:
(纸本)9781665488679
In recent years, semantic segmentation has become an increasingly important task in computer vision, with numerous applications in image analysis and object recognition. One popular approach for semantic segmentation is the use of convolutional neural networks (CNNs), such as the U-net architecture, which is known for its ability to capture both local and global contexts in images. However, the U-Net model can be computationally intensive and time-consuming, especially for large or highresolution images. This paper proposes a depth-residual separable U-net (DRSU-net) model to improve the U-net model for semantic segmentation tasks. The proposed approach introduces an additional regularisation technique instead of dropout and L2 regularisation and modifies the network's structure to reduce the risk of overfitting and the number of model parameters. This reduces training time without losing model information, especially for large datasets. The effectiveness of the DRSU-net method is demonstrated through extensive experiments on several semantic segmentation benchmarks. The results show improved performance and lower temporal complexity compared to the basic U-net and state-of-the-art architectures.
WiFi is one of the most widely deployed networking technologies, and understanding WiFi performance is therefore of great importance. The WiFi MAC layer sometimes introduces significant and variable delays. No existin...
详细信息
ISBN:
(纸本)9781665480017
WiFi is one of the most widely deployed networking technologies, and understanding WiFi performance is therefore of great importance. The WiFi MAC layer sometimes introduces significant and variable delays. No existing models of the WiFi protocol describe WiFi performance in terms of complete latency distributions. In this work, we present a novel model of WiFi performance. We explicitly define our model in terms of the latency introduced at each step in the protocol state machine, and the model produces complete latency distributions. We validate the model by comparing its outputs to previous modeling work and real-world measurements. Finally, we use our results to quantify the latency distribution of WiFi as a function of the duration of transmit opportunities and the number of stations competing for the channel. Quantifying this relation represents a significant improvement in our understanding of WiFi performance that would not be possible with existing models.
The effectiveness of Intrusion Detection Systems (IDS) is critical in an era where cyber threats are becoming increasingly complex. Machine learning (ML) and deep learning (DL) models provide an efficient and accurate...
详细信息
ISBN:
(纸本)9781728190549
The effectiveness of Intrusion Detection Systems (IDS) is critical in an era where cyber threats are becoming increasingly complex. Machine learning (ML) and deep learning (DL) models provide an efficient and accurate solution for identifying attacks and anomalies in computernetworks. However, using ML and DL models in IDS has led to a trust deficit due to their non-transparent decision-making. This transparency gap in IDS research is significant, affecting confidence and accountability. To address, this paper introduces a novel Explainable IDS approach, called X-CBA, that leverages the structural advantages of Graph Neural networks (GNNs) to effectively process network traffic data, while also adapting a new Explainable AI (XAI) methodology. Unlike most GNN-based IDS that depend on labeled network traffic and node features, thereby overlooking critical packet-level information, our approach leverages a broader range of traffic data through network flows, including edge attributes, to improve detection capabilities and adapt to novel threats. Through empirical testing, we establish that our approach not only achieves high accuracy with 99.47% in threat detection but also advances the field by providing clear, actionable explanations of its analytical outcomes. This research also aims to bridge the current gap and facilitate the broader integration of ML/DL technologies in cybersecurity defenses by offering a local and global explainability solution that is both precise and interpretable.
Deep Convolutional Neural networks (DCNNs) have made tremendous advances in healthcare, but their limited perceptual capacities make it difficult to capture extensive structural details. To solve this restriction, thi...
详细信息
Image classification remains a fundamental challenge in computer vision, demanding models to improve accuracy and efficiency. This paper introduces a novel approach by integrating convolutional neural networks (CNNs) ...
详细信息
With the increasing amount of computation in high-performance computing, the scale of interconnection networks is becoming larger and larger. It is inevitable that processors or links in the network become faulty. The...
详细信息
暂无评论