The proceedings contain 20 papers. The topics discussed include: a multi-head attention mechanism base multi-dimensional data quality evaluation model;regional water resources allocation based on fuzzy data mining;tra...
ISBN:
(纸本)9781450396097
The proceedings contain 20 papers. The topics discussed include: a multi-head attention mechanism base multi-dimensional data quality evaluation model;regional water resources allocation based on fuzzy data mining;traffic data prediction with geometric algebra spatial-temporal attention neural network;research on intelligent recommendation of science and technology resource data based on semantic intelligence analysis;an improved flower pollination algorithm based on logistic chaotic mapping and natural mutation;traffic congestion propagation prediction based on multi-vector deep neural networks;an improved bat algorithm for solving nonlinear algebraic systems of equations;and future of artificial intelligence and machine learning in marketing 4.0.
Pig vital sign monitoring (e.g., estimating the heart rate (HR) and respiratory rate (RR)) is essential to understand the stress level of the sow and detect the onset of parturition. It helps to maximize peri-natal su...
详细信息
Deepfakes are synthetic content generated using advanced deep learning and AI technologies. The advancement of technology has created opportunities for anyone to create and share deepfakes much easier. This may lead t...
详细信息
ISBN:
(纸本)9781450391573
Deepfakes are synthetic content generated using advanced deep learning and AI technologies. The advancement of technology has created opportunities for anyone to create and share deepfakes much easier. This may lead to societal concerns based on how communities engage with it. However, there is limited research available to understand how communities perceive deepfakes. We examined deepfake conversations on Reddit from 2018 to 2021-including major topics and their temporal changes as well as implications of these conversations. Using a mixed-method approach-topic modeling and qualitative coding, we found 6,638 posts and 86,425 comments discussing concerns of the believable nature of deepfakes and how platforms moderate them. We also found Reddit conversations to be pro-deepfake and building a community that supports creating and sharing deepfake artifacts and building a marketplace regardless of the consequences. Possible implications derived from qualitative codes indicate that deepfake conversations raise societal concerns. We propose that there are implications for Human Computer Interaction (HCI) to mitigate the harm created from deepfakes.
Bulk synchronous programming (in distributedmemory systems) and the fork-join pattern (in shared-memory systems) are often used for problems where independent processes must periodically synchronize. Frequent synchron...
详细信息
ISBN:
(纸本)9798350355543
Bulk synchronous programming (in distributedmemory systems) and the fork-join pattern (in shared-memory systems) are often used for problems where independent processes must periodically synchronize. Frequent synchronization can greatly undermine the performance of software designed to solve such problems. We use the actor model of concurrent computing to balance the load of hundreds of thousands of shortlived tasks and mitigate synchronization bottlenecks by buffering communication via actor batching. The actor model is becoming increasingly popular in scientific and high-performance computing because it can handle heterogeneous tasks and computing environments with enhanced programming flexibility and ease relative to conventional paradigms like MPI. For a hydrologic simulation of continental North America with over 500,000 elements, the proposed buffering approach is approximately 4 times faster than no buffering, outperforms MPI on single and multiple nodes, and remains competitive with OpenMP on a single node and MPI+OpenMP on multiple nodes.
It is difficult to design systems that honor the complex and often contradictory emotions that can be surfaced by sensitive encounters with recommender systems. To explore the design and ethical considerations in this...
详细信息
This paper presents lambda-amor, a new type-theoretic framework for amortized cost analysis of higher-order functional programs and shows that existing type systems for cost analysis can be embedded in it lambda-amor ...
详细信息
This paper presents lambda-amor, a new type-theoretic framework for amortized cost analysis of higher-order functional programs and shows that existing type systems for cost analysis can be embedded in it lambda-amor introduces a new modal type for representing potentials - costs that have been accounted for, but not yet incurred, which are central to amortized analysis. Additionally, lambda-amor relies on standard type-theoretic concepts like affineness, refinement types and an indexed cost monad lambda-amor is proved sound using a rather simple logical relation. We embed two existing type systems for cost analysis in lambda-amor showing that, despite its simplicity, lambda-amor can simulate cost analysis for different evaluation strategies (call-by-name and callby-value), in different styles (effect-based and coeffect-based), and with or without amortization. One of the embeddings also implies that lambda-amor is relatively complete for all terminating PCF programs.
The modern power system has developed into a cyber-physical system with the incorporation of smart meters, Phasor measurement Units (PMUs), extensive area monitoring, control systems and substation automation. False D...
详细信息
Within the current threat landscape of cyberattacks, adversaries use a wide array of techniques to gain a persistent and covert presence on systems. Rootkits are a popular form of attack vector because they are a spec...
详细信息
ISBN:
(纸本)9781450386975
Within the current threat landscape of cyberattacks, adversaries use a wide array of techniques to gain a persistent and covert presence on systems. Rootkits are a popular form of attack vector because they are a specialized form of malware that use stealth and administrative privilege to operate without detection. They can also use sophisticated active and passive measures to actually cripple normal defensive software. Zero-day rootkits are particularly dangerous in advanced persistent threat (APT) scenarios because typical signature-based methods of malware scanning are ineffective at detecting them. In this paper, we consider a more robust technique of dynamic malware detection that allows use of side-channel system properties as process-indicative data, allowing observation outside of a rootkit's ability to influence. In particular, we extend prior work that has used CPU power measurements as a means to detect rootkit execution. In this work we use a Data Acquisition (DAQ) system to collect data from an embedded analog power sensor to record low-frequency digital readings from three channels of a PC power supply. Of particular focus, we use a data-driven nonlinear phase space algorithm (NLPSA) to analyze power readings and perform supervised learning to discern infected versus non-infected states. Our initial case study using Windows 10 and Ubuntu rootkits shows that NLPSA can achieve perfect accuracy in distinguishing rootkit execution and normal system operation, confirming other similar studies where side-channel data are in view.
This paper proposes an approach based on numerical simulation to enhance the accuracy and generality of fringe field modeling in Quadrupole Mass Filter (QMF) systems. The proposed method involves SIMION simulation cal...
详细信息
Fortran compilers that provide support for Fortran's native parallel features often do so with a runtime library that depends on details of both the compiler implementation and the communication library, while oth...
详细信息
ISBN:
(纸本)9798350355543
Fortran compilers that provide support for Fortran's native parallel features often do so with a runtime library that depends on details of both the compiler implementation and the communication library, while others provide limited or no support at all. This paper introduces a new generalized interface that is both compiler- and runtime-library-agnostic, providing flexibility while fully supporting all of Fortran's parallel features. The Parallel Runtime Interface for Fortran (PRIF) was developed to be portable across shared- and distributed-memory systems, with varying operating systems, toolchains and architectures. It achieves this by defining a set of Fortran procedures corresponding to each of the parallel features defined in the Fortran standard that may be invoked by a Fortran compiler and implemented by a runtime library. PRIF aims to be used as the solution for LLVM Flang to provide parallel Fortran support. This paper also briefly describes our PRIF prototype implementation: Caffeine.
暂无评论