Deep learning use is growing in many numerical simulation fields, and drug discovery does not escape this trend. Indeed, before proceeding with in vitro and then in vivo experiments, drug discovery now relies on in si...
详细信息
In recent years, there has been a growing interest in realizing methodologies to integrate more and more computation at the level of the image sensor. The rising trend has seen an increased research interest in develo...
详细信息
In recent years, there has been a growing interest in realizing methodologies to integrate more and more computation at the level of the image sensor. The rising trend has seen an increased research interest in developing novel event cameras that can facilitate CNN computation directly in the sensor. However, event-based cameras ca be expensive, limiting performance exploration on high-level models and algorithms. This paper presents an event camera simulator that can be a potent tool for hardware design prototyping, parameter optimization, attention-based innovative algorithm development, and benchmarking. The proposed simulator implements a distributed computation model to identify relevant regions in an image frame. Our simulator's relevance computation model is realized as a collection of modules and performs computations in parallel. The distributed computation model is configurable, making it highly useful for design space exploration. The Rendering engine of the simulator samples frame-regions only when there is a new event. The simulator closely emulates an image processing pipeline similar to that of physical cameras. Our experimental results show that the simulator can effectively emulate event vision with low overheads
We study acceleration for distributed sparse regression in high-dimensions, which allows the parameter size to exceed and grow faster than the sample size. When applicable, existing distributed algorithms employing ac...
详细信息
ISBN:
(纸本)9781713871088
We study acceleration for distributed sparse regression in high-dimensions, which allows the parameter size to exceed and grow faster than the sample size. When applicable, existing distributed algorithms employing acceleration perform poorly in this setting, theoretically and numerically. We propose a new accelerated distributed algorithm suitable for high-dimensions. The method couples a suitable instance of accelerated Nesterov's proximal gradient with consensus and gradient-tracking mechanisms, aiming at estimating locally the gradient of the empirical loss while enforcing agreement on the local estimates. Under standard assumptions on the statistical model and tuning parameters, the proposed method is proved to globally converge at linear rate to an estimate that is within the statistical precision of the model. The iteration complexity scales as O(root kappa), while the communications per iteration are at most (O) over tilde (log m/(1-rho)), where kappa is the restricted condition number of the empirical loss, m is the number of agents, and rho is an element of[0,1) measures the network connectivity. As by-product of our design, we also report an accelerated method for high-dimensional estimations over master-worker architectures, which is of independent interest and compares favorably with existing works.
With the rapid evolution of the Internet of Things (IoT), there is a noticeable surge in both the proliferation of edge devices and the voluminous data they generate. These edge devices are progressively furnished wit...
详细信息
ISBN:
(纸本)9798350359329;9798350359312
With the rapid evolution of the Internet of Things (IoT), there is a noticeable surge in both the proliferation of edge devices and the voluminous data they generate. These edge devices are progressively furnished with AI processors, harnessing the power of deep learning to augment their data processing capabilities. However, in edge environments, traditional federated learning methods typically send multiple models to a central server for aggregation, which gives rise to several tough challenges such as low data transmission efficiency, privacy concerns, and the threat of model poisoning attacks. In this paper, we introduce a distributed machine learning framework with an innovative collaborative voting mechanism to integrate the results of adaptive pruned models on various end devices for edge computing. The main goals of this framework are to mitigate the risk of data privacy and strengthen the system's resilience against model poisoning attacks. Additionally, an adaptive model pruning mechanism is implemented to tailor diverse models according to the limited computational resources available on end devices for enhancing training efficiency. Experiments reveal that our framework can effectively mitigate the impact of poisoning attacks, but also provide superior efficiency and accuracy for edge computing compared with other prevalent federated learning methods.
N-6-methyladenosine (m(6)A) is a well-studied and most common interior messenger RNA (mRNA) modification that plays an important function in cell development. N(6)A is found in all kingdoms of life and many other cell...
详细信息
N-6-methyladenosine (m(6)A) is a well-studied and most common interior messenger RNA (mRNA) modification that plays an important function in cell development. N(6)A is found in all kingdoms of life and many other cellular processes such as RNA splicing, immune tolerance, regulatory functions, RNA processing, and cancer. Despite the crucial role of m(6)A in cells, it was targeted computationally, but unfortunately, the obtained results were unsatisfactory. It is imperative to develop an efficient computational model that can truly represent m(6)A sites. In this regard, an intelligent and highly discriminative computational model namely: m6A-word2vec is introduced for the discrimination of m(6)A sites. Here, a concept of natural language processing in the form of word2vec is used to represent the motif of the target class automatically. These motifs (numerical descriptors) are automatically targeted from the human genome without any clear definition. Further, the extracted feature space is then forwarded to the convolution neuralnetwork model as input for prediction. The developed computational model obtained 83.17%, 92.69%, and 90.50% accuracy for benchmark datasets S-1, S-2, and S-3, respectively, using a 10-fold cross-validation test. The predictive outcomes validate that the developed intelligent computational model showed better performance compared to existing computational models. It is thus greatly estimated that the introduced computational model "m6A-word2vec" may be a supportive and practical tool for elementary and pharmaceutical research such as in drug design along with academia. (C) 2020 Elsevier Ltd. All rights reserved.
The exponential growth in the development of smartphones and handheld devices is permeated due to everyday activities i.e.,games applications,entertainment,online banking,social network sites,etc.,and also allow the e...
详细信息
The exponential growth in the development of smartphones and handheld devices is permeated due to everyday activities i.e.,games applications,entertainment,online banking,social network sites,etc.,and also allow the end users to perform a variety of *** of activities,mobile devices attract cybercriminals to initiate an attack over a diverse range of malicious activities such as theft of unauthorized information,phishing,spamming,distributed Denial of Services(DDoS),and malware *** applications are a type of harmful attack that can be used to launch malicious activities and has become a significant threat in the research area.A botnet is a collection of infected devices that are managed by a botmaster and communicate with each other via a command server in order to carry out malicious *** the rise in malicious attacks,detecting botnet applications has become more ***,it is essential to investigate mobile botnet attacks to uncover the security issues in severe financial and ethical damages caused by a massive coordinated command *** state of the art,various solutions were provided for the detection of botnet applications,but in general,the researchers suffer various techniques of machine learning-based methods with static features which are usually ineffective when obfuscation techniques are used for the detection of botnet *** this paper,we propose an approach by exploring the concept of a deep learning-based method and present a well-defined Convolutional neuralnetwork(CNN)*** the visualization approach,we obtain the colored images through byte code files of applications and perform an *** analysis of the results of an experiment,we differentiate the performance of the model from other existing research ***,our method outperforms with 94.34%accuracy,92.9%of precision,and 92%of recall.
The proliferation of edge computing has facilitated the edge-based artificial intelligence-generated content (AIGC) for ubiquitous and distributed end devices. To exemplify, we focus on the distributed implementation ...
详细信息
ISBN:
(纸本)9798350303582;9798350303599
The proliferation of edge computing has facilitated the edge-based artificial intelligence-generated content (AIGC) for ubiquitous and distributed end devices. To exemplify, we focus on the distributed implementation of one established instance, generative adversarial network (GAN), yielding the distributed GAN task. Practically speaking, this task usually is impeded by concerns including the unknown latency (of processing and transmission), the fairness requirement induced by heterogeneous distributed data and the limited energy budget of end devices. Besides, an often neglected factor is how to exploit feedback from networked end devices among which social ties indicate the flow of shared information. In practice, such social ties are partially observable to lack of exact knowledge of users, e.g., resulted from scarce historical data and privacy issues. Under this setting, we propose an online algorithm via integration of 1) online learning aided by graph neuralnetwork (GNN), aiming to recover social ties with GNN-based edge prediction, for accelerated learning of uncertainty and 2) online control to adaptively guarantee the constraints. We theoretically show that it not only achieves a sub-linear regret with guaranteed energy consumption and fairness but also leads to a superior global GAN. We also conduct simulations to justify its outperformance over online baselines.
There have been increasing interests and success of applying deep learning neuralnetworks to their big data platforms and workflows, say distributed Deep Learning. In this paper, we present distributed long short-ter...
详细信息
ISBN:
(纸本)9781728187525
There have been increasing interests and success of applying deep learning neuralnetworks to their big data platforms and workflows, say distributed Deep Learning. In this paper, we present distributed long short-term memory (dLSTM) neuralnetwork model using TensorFlow over multicore Tensor processing Unit (TPU) on Google Cloud. LSTM is a variant of the recurrent neuralnetwork (RNN), which is more suitable for processing temporal sequences. This model could extract human activity features automatically and classify them with a few model parameters. In the proposed model, the raw data collected by mobile sensors was fed into distributed multi-layer LSTM layers. Human activity recognition data from UCI machine-learning library have been applied to the proposed distributed LSTM (dLSTM) model to compare the efficiency of TensorFlow over CPU and TPU based on execution time, and evaluation metrics: accuracy, precision, recall and F1 score along with the use of Google Colab Notebook.
Data augmentation is a technique that improves the ability of neuralnetworks to make accurate predictions by increasing the size of the training dataset. However, it is still uncertain how to properly use data augmen...
详细信息
The rapid expansion of interconnected infrastructures has dramatically increased the volume of network devices and traffic, introducing significant security vulnerabilities in Software-Defined networking (SDN) environ...
详细信息
暂无评论