This paper discusses the task allocation problem in the grid transaction processing system. The task allocation solution is known to be NP-hard. In order to solve this problem, this paper presents task allocation base...
详细信息
ISBN:
(纸本)9781450377515
This paper discusses the task allocation problem in the grid transaction processing system. The task allocation solution is known to be NP-hard. In order to solve this problem, this paper presents task allocation based on cuckoo search-ant colony optimization (LBTA_CSACO) method. The proposed LBTA_CSACO algorithm is based on the cooperative behavior of cuckoo search and ant colony optimization to find a collection of task allocation solutions. The motivation of this work is to maximize the reliability of the system. Six existing algorithms are taken for comparison of results;Social Spider Optimization (SSO), Honey Bee Optimization (HBO), Ant Colony Optimization (ACO), Hierarchical Load Balanced Algorithm (HLBA), Dynamic and Decentralized Load Balancing (DLB), and Randomized respectively.
Nowadays, power electronics converters used in distributed generation have became a common tool to exploit the benefits of renewable energy sources, like solar energy via photovoltaic panels the increase of using this...
详细信息
With the proliferation of mobile and Internet of Things (IoT) devices, there has been an unprecedented growth of data consumption and computation requests at the network edge. To support latency-sensitive and resource...
详细信息
The traditional identity authentication approach of username and password has the security risk of password leakage in the transmission process. For the security of password transmission in the blockchain education ar...
详细信息
The traditional identity authentication approach of username and password has the security risk of password leakage in the transmission process. For the security of password transmission in the blockchain education architecture, an asymmetric encryption algorithm is used to encrypt the transmitted password. Then use an improved random sampling algorithm to randomly extract part of the ciphertext and transmit those selected ciphertexts. The authentication credentials are sampled ciphertext and the location index. At the same time, the authentication factor is generated through the Time-Stamp technology, and mutual authentication is realized based on the Response-Challenge protocol. Through security analysis and experimental analysis, the proposed scheme is proved to be secure.
In this work, we introduce and evaluate federated fine-tuning (FFT) toward developing decentralized systems for IoT applications using edge computing. We demonstrate a deployed, off-grid, FFT network composed of embed...
详细信息
ISBN:
(纸本)9781665443371
In this work, we introduce and evaluate federated fine-tuning (FFT) toward developing decentralized systems for IoT applications using edge computing. We demonstrate a deployed, off-grid, FFT network composed of embedded hardware and assess the system and its performance. The federated averaging algorithm has become the popular approach in decentralized systems with multiple nodes due its low computational costs and simplicity. However, it is commonly implemented using a workstation or a cloud as its server node, typically demonstrated with unrealistic (small) neural network models and may have high communication cost for embedded applications. To address these challenges, we present two main contributions by: (1) Improving the federated averaging algorithm's weight initialization step and by limiting percentage of weights being averaged to enhance system security and model performance, and (2) Demonstrating the proposed system's effectiveness via deployment of realistic model using an edge device as the server node (first time for a federated system). For our evaluation, we use a centrally pre-trained MobileNetV2 model on the CelebA dataset. We record the transmitted model parameters across the network with the modified federated averaging algorithm and FFT, and capture metrics related to memory, power consumption, CPU load, and communication on the device. Overall, results demonstrate that FFT can improve federated system performance and model accuracy while providing stronger privacy, protection of intellectual property, and security against adversarial attacks on federated learning.
The proceedings contain 15 papers. The special focus in this conference is on Latin American High Performance computing. The topics include: Electricity Demand Forecasting Using Computational Intelligence and High Per...
ISBN:
(纸本)9783030680343
The proceedings contain 15 papers. The special focus in this conference is on Latin American High Performance computing. The topics include: Electricity Demand Forecasting Using Computational Intelligence and High Performance computing;parallel/distributed Generative Adversarial Neural Networks for Data Augmentation of COVID-19 Training Images;analysis of Regularization in Deep Learning Models on Testbed Architectures;computer Application for the Detection of Skin Diseases in Photographic Images Using Convolutional Neural Networks;Neocortex and Bridges-2: A High Performance AI+HPC Ecosystem for Science, Discovery, and Societal Good;Fostering Remote Visualization: Experiences in Two Different HPC Sites;high Performance computing Simulations of Granular Media in Silos;performance Analysis of Main Public Cloud Big Data Services Processing Brazilian Government Data;accelerating Machine Learning Algorithms with TensorFlow Using Thread Mapping Policies;Methodology for Design and Implementation an Efficient HPC Cluster;estimating the Execution Time of the Coupled Stage in Multiscale Numerical Simulations;Using HPC as a Competitive Advantage in an international Robotics Challenge;a Survey on Privacy-Preserving Machine Learning with Fully Homomorphic Encryption.
Induced subgraph isomorphism search finds the occurrences of embedded subgraphs within a single large data graph that are strictly isomorphic to a given query graph. Labeled graphs contain object types and are a prima...
详细信息
ISBN:
(纸本)9783030856656;9783030856649
Induced subgraph isomorphism search finds the occurrences of embedded subgraphs within a single large data graph that are strictly isomorphic to a given query graph. Labeled graphs contain object types and are a primary input source to this core search problem, which applies to systems like graph databases for answering queries. In recent years, researchers have employed GPU parallel solutions to this problem to help accelerate runtimes by utilizing the filtering-and-joining framework, which first filters vertices that cannot be part of the solution then joins partial solutions with candidate edges until full isomorphisms are determined. However, the performance of current GPU-based solutions is hindered by limited filtering effectiveness and presence of extraneous computations. This paper presents G-Morph, a fast GPU-based induced subgraph isomorphism search system for labeled graphs. Our filtering-and-joining system parallelizes both phases by upfront eliminating irrelevant vertices via a novel space-efficient vertex signature hashing strategy and efficiently joining partial solutions through use of a novel sliding window algorithm (slide-join) that provides overflow protection for larger input. Together these techniques greatly reduce extraneous computations by reducing Cartesian products and improving edge verification while supporting large scan operations (split-scan). G-Morph outperforms the state-of-the-art GPU-based GSI and CPU-based VF3 systems on labeled real-world graphs achieving speedups of up to 15.78x and 43.56x respectively.
Driven by new technologies such as cloud computing and AI, the cloud robot has entered a golden period of rapid development. The problem that restricts robot developers in current cloud robot research is the lack of a...
详细信息
ISBN:
(纸本)9781665404242
Driven by new technologies such as cloud computing and AI, the cloud robot has entered a golden period of rapid development. The problem that restricts robot developers in current cloud robot research is the lack of a safe way to transmit messages between edge and cloud. Therefore, in this paper, we propose the RCC (Robot Cloud Communication), a Python-based software library, which can help swarm intelligence robots data to be efficiently and securely transferred to different types of business clouds or private cloud platforms. In addition, we integrate the RCC function library and can also provide high-quality data security guarantees for development users when sending and receiving data. Through our approach, we successfully implemented the development of an indoor 3D map application which is difficult to achieve on a single robot platform. Our experimental results show that our RCC is not only very stable in performance of reading and writing, but also shows great performance in data encryption and decryption.
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
ISBN:
(纸本)9798331314385
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversarial perturbation (UAP) have not been thoroughly investigated yet. In this paper, we propose DarkSAM, the first prompt-free universal attack framework against SAM, including a semantic decoupling-based spatial attack and a texture distortion-based frequency attack. We first divide the output of SAM into foreground and background. Then, we design a shadow target strategy to obtain the semantic blueprint of the image as the attack target. DarkSAM is dedicated to fooling SAM by extracting and destroying crucial object features from images in both spatial and frequency domains. In the spatial domain, we disrupt the semantics of both the foreground and background in the image to confuse SAM. In the frequency domain, we further enhance the attack effectiveness by distorting the high-frequency components (i.e., texture information) of the image. Consequently, with a single UAP, DarkSAM renders SAM incapable of segmenting objects across diverse images with varying prompts. Experimental results on four datasets for SAM and its two variant models demonstrate the powerful attack capability and transferability of DarkSAM. Our codes are available at: https://***/CGCL-codes/DarkSAM.
With the development of deep learning, artificial intelligence applications and services have boomed in the recent years, including recommendation systems, personal assistant and video analytics. Similar to other serv...
详细信息
ISBN:
(纸本)9781728190747
With the development of deep learning, artificial intelligence applications and services have boomed in the recent years, including recommendation systems, personal assistant and video analytics. Similar to other services in the edge computing environment, artificial intelligence computing tasks are pushed to the network edge. In this paper, we consider the multi-user edge-assisted video analytics task offloading (MEVAO) problem, where users have video analytics tasks with various accuracy requirements. All users independently choose their accuracy decisions, satisfying the accuracy requirement, and offload the video data to the edge server. With the utility function designed based on the features of video analytics, we model MEVAO as a game theory problem and achieve the Nash equilibrium, For the flexibility of making accuracy decisions under different circumstances, a deep reinforcement learning approach is applied to our problem. Our proposed design has much better performance compared with some other approaches in the extensive simulations.
暂无评论