The Internet of Things (IoT) enables intelligent data exchange across many kinds of interconnected devices in a diverse and unpredictable physical setting. The Internet of Things (IoT) network used in this study is a ...
详细信息
The detection of reconnaissance attacks is crucial for safeguarding Internet of Things (IoT) environments, which are inherently more vulnerable and resource-constrained compared to traditional computing systems. Tradi...
详细信息
Intrusion detection is essential for securing computernetworks by monitoring and analyzing activity to detect and respond to unauthorized access and malicious behavior. By examining network traffic and system logs, i...
详细信息
IoT (Internet of Things) applications often involve stream processing using multiple complex layers of processing nodes, where in each layer, data is received by the nodes, processed, and then transmitted to the nodes...
详细信息
ISBN:
(纸本)9798350329100
IoT (Internet of Things) applications often involve stream processing using multiple complex layers of processing nodes, where in each layer, data is received by the nodes, processed, and then transmitted to the nodes in subsequent layers. Such systems present a tradeoff between reliability and resource usage, including CPU power, energy, network bandwidth, memory, etc. Reducing the reliability at which a node processes inbound data in a layer can have repercussions on nodes in subsequent layers in the network that receive less reliable data, and in turn impact the reliability of the application as a whole. In this paper, we present a generalized model of streaming IoT applications as a layered network of producers and consumers. Our model captures trade-offs between reliability and resource usage of the system. We present an efficient algorithm using SMT constraint solvers to determine the optimal selection of processing quality for each node in the network, such that target system reliability is achieved while respecting the given resource bounds, and resource usage is minimized. In addition, we present a lightweight machine learning based solution to drastically improve our model in terms of run time. We have fully implemented our technique and report experimental results on a layered IoT network.
Deception detection is gaining increasing interest due to ethical and security concerns. This paper explores the application of convolutional neural networks for the purpose of multimodal deception detection. We use a...
详细信息
The prediction of stock prices has recently gained considerable attention as a complex and challenging issue within the realms of economics and finance. Stock prices are affected by various factors, such as the busine...
详细信息
ISBN:
(纸本)9783031820724;9783031820731
The prediction of stock prices has recently gained considerable attention as a complex and challenging issue within the realms of economics and finance. Stock prices are affected by various factors, such as the business environment, stock market operations, inflation, and unexpected events. Since the stock market is volatile and nonlinear, finding the most effective model to forecast stock prices is one of the most challenging problems. Researchers have increasingly explored various Machine Learning (ML) and Deep Learning (DL) models to address this issue due to their capacity to handle time series data and nonlinear patterns. These models often outperform traditional approaches in predicting stock prices with high accuracy and lower root mean square error (RMSE). This paper reviews various works that have utilized ML approaches for stock price prediction, covering research published between 2017 and 2023. This literature review discusses various techniques, their performance, limitations, and future work. We assess the latest techniques in many studies, including ML and DL models. The findings of this review conclude that Neural networks (NNs) are the most commonly used approaches in predicting stock prices due to their effectiveness in detecting complex patterns in financial data.
Reinforcement learning (RL) has been successfully applied in many fields for building autonomous systems, such as robotics and telecommunications. With its self-learning ability, RL provides a framework for learning f...
详细信息
ISBN:
(纸本)9798350348439;9798350384611
Reinforcement learning (RL) has been successfully applied in many fields for building autonomous systems, such as robotics and telecommunications. With its self-learning ability, RL provides a framework for learning from historical experience and adapting to dynamic environments. In response to the surge in network traffic and the evolving nature of traffic behavior, RL has emerged as a crucial technique for developing intelligent and adaptive traffic engineering (TE) solutions. However, most prior studies have focused on using a centralized unit (i.e., a single agent) to construct RL-based TE systems. While the centralized approach leverages global network information for solid performance, it encounters challenges related to scalability, dynamic network topology, and high monitoring overhead for collecting network information. This paper addresses these issues by introducing a jointly trained multi-agent reinforcement learning-based traffic engineering (MATE-JT) system, which operates as a distributed TE solution. Our approach utilizes multiple agents within a network node so that each agent can make independent routing decisions for a subset of flows. We take the approach of sharing parameters among agents and introduce a joint-training technique that facilitates simultaneous learning from multiple agents' experiences. As a result, our proposed method enhances system performance while reducing training time. We evaluate the proposed approach using various network traffic datasets and demonstrate that MATE-JT improves the performance of TE (about 6.5%) and achieves faster convergence (about 35%) in large-scale networks when compared to state-of-the-art methods.
With the advances in IoT and edge-computing, Federated Learning is ever more popular as it offers data privacy. Low-power spiking neural networks (SNN) are ideal candidates for local nodes in such federated setup. Mos...
详细信息
ISBN:
(纸本)9798350327694
With the advances in IoT and edge-computing, Federated Learning is ever more popular as it offers data privacy. Low-power spiking neural networks (SNN) are ideal candidates for local nodes in such federated setup. Most prior works assume that the participating nodes have uniform compute resources, which may not be practical. In this work, we propose a federated SNN learning framework for a realistic heterogeneous environment, consisting of nodes with diverse memory-compute capabilities through activation-checkpointing and time-skipping that offers similar to 4x reduction in effective memory requirement for low-memory nodes while improving the accuracy upto 10% for non-independent and identically-distributed data.
Juniper Apple Rust, also known as Cedar-Apple Rust, is a fungal disease caused by Gymnosporangium juniperi-virginianae. The disease requires two hosts, primarily Eastern red cedars and apple trees, to complete its lif...
详细信息
This study proposes a flexible and effective solution for developing high-performance multistage interconnection networks to maximize the performance of parallel computersystems, cloud computing infrastructure, grids...
详细信息
This study proposes a flexible and effective solution for developing high-performance multistage interconnection networks to maximize the performance of parallel computersystems, cloud computing infrastructure, grids, etc. An omega-type multistage interconnection network, consisting of regulated switchboxes, is used as a testbed to handle flexible two-class load patterns. The wormhole routing method and a special forwarding technique controlled by a global regulator are adopted to alleviate internal 'tree saturation' caused by periodic hotspot traffic combined with uniform traffic. Simulation experiments prove that this concept reduces packet latency, and an additional layer inserted in the final stage further improves the network's architecture.
暂无评论