Weight pruning is a technique to remove redundant or unimportant weights from the network. It can help reduce the size and computational cost of neural networks while preserving their accuracy. In this paper, we aim t...
详细信息
Federated self-supervised learning (FedSSL) is an emerging method in the domain of machine learning. It collaboratively learns a powerful feature extractor among multiple participants by utilizing distributed unlabele...
详细信息
In this paper, we propose a dynamic data transmission strategy for smart home environments that aims to optimize the Quality of Experience (QoE) by adaptively adjusting the data upload frequency based on the predicted...
详细信息
Robots are widely used for target search in applications such as search and rescue, environmental monitoring, and surveillance. Existing search algorithms typically rely on target signals or predictable movement patte...
详细信息
Rapid advances in high-throughput sequencers have made it possible to obtain large amounts of whole genome data quickly and inexpensively. As the amount of data increases, the increase in computation time has become a...
详细信息
Computer information processing systems face numerous challenges in the context of big data, and optimization design provides an important avenue to enhance system performance in handling large datasets. This paper fi...
详细信息
In the paper, we propose a truth inference algorithm based on bidirectional convolutional autoencoder to capture and utilize the internal structure information underling complex tasks, e.g. image segmentation. firstly...
详细信息
Log-based anomaly detection has been extensively studied to help detect complex runtime anomalies in production systems. However, existing techniques exhibit several common issues. first, they rely heavily on expert-l...
详细信息
ISBN:
(纸本)9798400701559
Log-based anomaly detection has been extensively studied to help detect complex runtime anomalies in production systems. However, existing techniques exhibit several common issues. first, they rely heavily on expert-labeled logs to discern anomalous behavior patterns. But labelling enough log data manually to effectively train deep neural networks may take too long. Second, they rely on numeric model prediction based on numeric vector input which causes model decisions to be largely non-interpretable by humans which further rules out targeted error correction. In recent years, we have witnessed groundbreaking advancements in large language models (LLMs) such as ChatGPT. These models have proven their ability to retain context and formulate insightful responses over entire conversations. They also present the ability to conduct few-shot and in-context learning with reasoning ability. In light of these abilities, it is only natural to explore their applicability in understanding log content and conducting anomaly classification among parallel file system logs.
With the rapid development of the tourism industry, traditional tourism methods are undergoing significant transformation, and online tourism is gradually becoming a new highlight in the market. However, faced with th...
详细信息
With the continuous advancement of medical technology and equipment, the healthcare domain is undergoing an unprecedented data explosion. Data from gene sequences, medical imaging to daily health monitoring offers inv...
详细信息
ISBN:
(数字)9783031775710
ISBN:
(纸本)9783031775703;9783031775710
With the continuous advancement of medical technology and equipment, the healthcare domain is undergoing an unprecedented data explosion. Data from gene sequences, medical imaging to daily health monitoring offers invaluable insights for improving disease diagnosis and treatment efficacy. Concurrently, the challenge of how to effectively store, manage, access, and share this vast amount of data has emerged as a pressing issue. Traditional centralized data storage methods, with inherent flaws such as data silos, vulnerable single points of failure, and inefficiency in data transmission and access, are increasingly proving to be inadequate. To address these challenges, this research delves into a medical information access mechanism based on distributed computation and storage. This mechanism, considering the diversity, sensitivity, and continuity of medical data, introduces a novel data model. In this model, data is stored in shards across a distributed network. Each shard of data is encrypted to ensure security, and a hash chain structure is employed to ensure data integrity and continuity. Moreover, a mathematical model describing the process of data storage, retrieval, and sharing is established, and corresponding experiments are designed for validation. Experimental results indicate that the mechanism excels in enhancing data access efficiency, ensuring data safety, and maintaining data integrity, paving the way for a new solution in future medical data management.
暂无评论