5G Core network (5GC) employs a Service Based Architecture (SBA). This architecture decomposes the control plane into multiple independent network Functions (NFs). NFs open interfaces to provide services to other NFs,...
详细信息
Word embeddings or word vectors have become fundamental in language processing techniques, especially deep learning approaches. Although many languages have compound words (e.g., “robot arm” and “maple leaf”), suc...
详细信息
Word embeddings or word vectors have become fundamental in language processing techniques, especially deep learning approaches. Although many languages have compound words (e.g., “robot arm” and “maple leaf”), such words have not received much attention from researchers. Most research on compound word embeddings considered only two-word compounds; there has been little detailed analysis on the learning representations of arbitrary-length compound words. This paper discusses the necessity for learning-based approaches for estimating the distributed representations of compound words instead of a simple average of the representations of constituents. An evaluation of two downstream tasks confirms the effectiveness of compositional models in encoding useful information into vector spaces. The experimental results suggest that complex architectures such as long short-term memory, gated recurrent units, and transformers learn better representations for long entities, whereas simpler models such as recurrent neuralnetworks are more applicable for downstream tasks where there are only short compounds (two or three words in length), as in the noun compound interpretation task.
Reliability is increasingly a major concern in network-on-a-chip (NoC) design, alongside increased performance demands from new applications and the need for continued miniaturization of silicon technology. In this ar...
详细信息
Reliability is increasingly a major concern in network-on-a-chip (NoC) design, alongside increased performance demands from new applications and the need for continued miniaturization of silicon technology. In this article, we look at the task migration mechanism, used to recover from permanent processing element (PE) failures in NoCs, by remapping tasks performed on faulty cores to spare ones. An innovative reliability-aware task mapping technique is presented, based on a hybridization between Multi-Objective Optimization (MOO) and Reinforcement Learning (RL). It takes place in two steps. In the first, a set of optimal remapping solutions for different failure scenarios is generated at design-time, using a Biogeography-Based Multi-Objective Optimization algorithm, while considering communication energy and migration costs. In the second step, an artificial neuralnetwork agent is trained to select the best remapping solution, from those generated at design-time, to recover from execution failures at run-time. Experiments were carried out to evaluate our technique for different sizes of networks and on different benchmarks. The results obtained show that the technique based on the hybridization MOO_RL brings a great improvement in the reliability of the NoC and achieves a good compromise between reliability and performance. It also guarantees a reduction of the overhead caused by the storage space of the remapping solutions, compared to the existing solutions. (C) 2021 Elsevier Inc. All rights reserved.
The popularity of the wireless network and the embedded system has promoted the widespread application of the Internet of Things (IoT) monitoring system which detects anomalies for discovering emergency events to avoi...
详细信息
One of the main challenges of graph filters is the stability of their design. While classical graph filters allow for a stable design using optimal polynomial approximation theory, generalized graph filters tend to su...
详细信息
One of the main challenges of graph filters is the stability of their design. While classical graph filters allow for a stable design using optimal polynomial approximation theory, generalized graph filters tend to suffer from the ill-conditioning of the involved system matrix. This issue, accentuated for increasing graph filter orders, naturally leads to very large (small) filter coefficients or error saturation, casting a shadow on the benefits of these richer graph filter structures. In addition to this, data-driven design/learning of graph filters with large filter orders, even in the case of classical graph filters, suffers from the eigenvalue spread of the input data covariance matrix and mode coupling, leading to convergence-related issues as the ones observed when identifying time-domain filters with large orders. To alleviate these conditioning and convergence problems, and to reduce the overall design complexity, in this work, we propose a cascaded implementation of generalized graph filters and an efficient algorithm for designing the graph filter coefficients in both model- and data-driven settings. Further, we establish the connections of this implementation with so-called graph convolutional neuralnetworks and demonstrate the performance of the proposed structure in different network applications. By the proposed approach, further error reduction and better design stability are achieved.
The security issue of accounting by electronic data processing information systems is a complex system engineering. How to extract useful data from the massive amount of accounting by electronic data processing inform...
详细信息
ISBN:
(数字)9798350318609
ISBN:
(纸本)9798350318616
The security issue of accounting by electronic data processing information systems is a complex system engineering. How to extract useful data from the massive amount of accounting by electronic data processing information and provide decision-making basis for enterprise decision-makers is a key issue. The article is based on data mining and neuralnetwork technology, and studies a security analysis method for accounting by electronic data processing information systems based on data mining and neuralnetworks. This method extracts useful information from data and establishes corresponding models through neuralnetworks to identify key factors that affect the security of accounting by electronic data processing information systems. The results show that the average reliability of the accounting computerization information system based on data mining is 84.38%. The average security of the accounting computerization information system based on neuralnetworks is 94.86%. This article combines the two to create a better accounting by electronic data processing information system.
In this letter, we present a novel markerless 3D human motion capture (MoCap) system for unstructured, outdoor environments that uses a team of autonomous unmanned aerial vehicles (UAVs) with on-hoard RGB cameras and ...
详细信息
In this letter, we present a novel markerless 3D human motion capture (MoCap) system for unstructured, outdoor environments that uses a team of autonomous unmanned aerial vehicles (UAVs) with on-hoard RGB cameras and computation. Existing methods are limited by calibrated cameras and off-line processing. Thus, we present the first method (AirPose) to estimate human pose and shape using images captured by multiple extrinsically uncalibrated flying cameras. AirPose itself calibrates the cameras relative to the person instead of relying on any pre-calibration. It uses distributedneuralnetworks running on each UAV that communicate viewpoint-independent information with each other about the person (i.e., their 3D shape and articulated pose). The person's shape and pose are parameterized using the SMPL-X body model, resulting in a compact representation, that minimizes communication between the UAVs. The network is trained using synthetic images of realistic virtual environments, and fine-tuned on a small set of real images. We also introduce an optimization-based post-processing method (AirPose+) for offline applications that require higher MoCap quality. We make our method's code and data available for research at https://***/robot-perception-group/AirPose. A video describing the approach and results is available at https://***/xLYelTNHsfs.
Focusing on the problem of increasing the deviation of temperature measurement for Raman-based distributed temperature sensor (RDTS) caused by random noise, a new method of applying a three-layer GraphSAGE-based graph...
详细信息
Focusing on the problem of increasing the deviation of temperature measurement for Raman-based distributed temperature sensor (RDTS) caused by random noise, a new method of applying a three-layer GraphSAGE-based graph neuralnetwork (3L-GraphSAGE) to noise reduction is proposed, where the spatial relationship between each signal is first constructed, and then the effective denoised results are obtained from the developed 3L-GraphSAGE model. First, an experimental setup is built for collecting fiber signals. Then, the datasets are input into the 3L-GraphSAGE to train the model. Finally, the test datasets are input into the well-trained 3L-GraphSAGE model to obtain effective denoised signals. To evaluate the performance of 3L-GraphSAGE, three evaluation indexes are calculated, including maximum deviation (MD), root mean square error (RMSE) and smoothness. The experimental results show that it can efficiently suppress the random noise and reduce the temperature measurement deviation in RDTS compared with direct demodulation of the raw data, and signifi-cantly improve the curve smoothness compared with wavelet transform by soft threshold function (WT-soft) and fast waveform type (FWT). Therefore, 3L-GraphSAGE model can provide an available method for improving the performance of RDTS.
With the rapid development of Natural Language processing and deep learning algorithms, research and applications based on intelligent question answering have gained widespread attention from researchers and the indus...
详细信息
The proceedings contain 28 papers. The special focus in this conference is on Parallel and distributed Computing, Applications and Technologies. The topics include: Insider Trading Detection Algorithm in Industrial Ch...
ISBN:
(纸本)9789819982103
The proceedings contain 28 papers. The special focus in this conference is on Parallel and distributed Computing, Applications and Technologies. The topics include: Insider Trading Detection Algorithm in Industrial Chain Based on Logistics Time Interval Characteristics;link Attributes Based Multi-service Routing for Software-Defined Satellite networks;A Fuzzy Logical RAT Selection Scheme in SDN-Enabled 5G HetNets;SSR-MGTI: Self-attention Sequential Recommendation Algorithm Based on Movie Genre Time Interval;fine Time Granularity Allocation Optimization of Multiple networks Industrial Chains in Task processing Systems;Ε-Maximum Critic Deep Deterministic Policy Gradient for Multi-agent Reinforcement Learning;effective Density-Based Concept Drift Detection for Evolving Data Streams;an End-to-End Multiple Hyper-parameters Prediction Method for distributed Constraint Optimization Problem;Formalization and Verification of the Zab Protocol Using CSP;dynamic Priority Coflow Scheduling in Optical Circuit Switched networks;Deep Reinforcement Learning Based Multi-WiFi Offloading of UAV Traffic;Triple-Path RNN network: A Time-and-Frequency Joint Domain Speech Separation Model;design of Query Based Gallery Selector and Mask-Aware Loss for Person Search;a Privacy-Preserving Blockchain Scheme for the Reliable Exchange of IoT Data;R-RPT-A Reliable Routing Protocol for Industrial Wireless Sensor networks;action Segmentation Based on Encoder-Decoder and Global Timing Information;Security Challenges and Lightweight Cryptography in IoT: Comparative Study and Testing Method for PRESENT-32bit Cipher;The Prediction Model of Water Level in Front of the Check Gate of the LSTM neuralnetwork Based on AIW-CLPSO;Using MPIs Non-Blocking Allreduce for Health Checks in Dynamic Simulations;parallelizable Loop Detection using Pre-trained Transformer Models for Code Understanding;list-Based Workflow Scheduling Utilizing Deep Reinforcement Learning.
暂无评论