Kidney disease (KD) is a gradually increasing global health concern. It is a chronic illness linked to higher rates of morbidity and mortality, a higher risk of cardiovascular disease and numerous other illnesses, and...
详细信息
Public clouds favor sharing of storage resources,in which many tenants acquire bandwidth and storage capacity from a shared storage *** provide high availability,data are often encoded to provide fault tolerance with ...
详细信息
Public clouds favor sharing of storage resources,in which many tenants acquire bandwidth and storage capacity from a shared storage *** provide high availability,data are often encoded to provide fault tolerance with low storage *** this,efficiently organizing an encoded storage system for shared I/Os is critical for application *** is usually hard to achieve as different applications have different stripe configurations and fault tolerance *** this paper,we first study the block trace from the Alibaba cloud,and find that I/O patterns of modern applications prefer the resource sharing *** on this,we propose a globally shared resource paradigm for encoded storage system in the public *** globally shared resource paradigm can provide balanced load and fault tolerance for numerous disk pool sizes and arbitrary application stripe ***,we demonstrate with two case studies that our theory can help address the device-specific problems of HDD and SSD RAID arrays with slight modifications:comparing the existing resource partition and resource sharing methods,our theory can promote the rebuild speed of the HDD RAID arrays by 2.5,and reduce the P99 tail latency of the SSD arrays by up to two orders of magnitude.
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip...
详细信息
Online Signature Verification (OSV), as a personal identification technology, is widely used in various ***, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toadd...
详细信息
Online Signature Verification (OSV), as a personal identification technology, is widely used in various ***, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toaddress these issues, we propose a novel approach for online signature verification, using a one-dimensionalGhost-ACmix Residual Network (1D-ACGRNet), which is a Ghost-ACmix Residual Network that combines convolutionwith a self-attention mechanism and performs improvement by using Ghost method. The Ghost-ACmix Residualstructure is introduced to leverage both self-attention and convolution mechanisms for capturing global featureinformation and extracting local information, effectively complementing whole and local signature features andmitigating the problem of insufficient feature extraction. Then, the Ghost-based Convolution and Self-Attention(ACG) block is proposed to simplify the common parts between convolution and self-attention using the Ghostmodule and employ feature transformation to obtain intermediate features, thus reducing computational ***, feature selection is performed using the random forestmethod, and the data is dimensionally reducedusing Principal Component Analysis (PCA). Finally, tests are implemented on the MCYT-100 datasets and theSVC-2004 Task2 datasets, and the equal error rates (EERs) for small-sample training using five genuine andforged signatures are 3.07% and 4.17%, respectively. The EERs for training with ten genuine and forged signaturesare 0.91% and 2.12% on the respective datasets. The experimental results illustrate that the proposed approacheffectively enhances the accuracy of online signature verification.
Wireless network stability is critical for organizations. Most companies rely on a solid Internet connection for at least part of their day-to-day activities. It is essential to show the fast and high capacity of Wi-F...
详细信息
Accessing wireless services is convenient but not secure. The issue of privacy and security is highly demanded on the internet. The information is sent with the undesired threats of eavesdroppers. Secure communication...
详细信息
This review paper investigates the advances of artificial intelligence (AI) in the field of email spam detection. The study addresses AI-based techniques used for email spam filtering by classifying threats such as ke...
详细信息
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h...
详细信息
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that has been deliberately or accidentally polluted with *** presents a challenge in learning robust GNNs under noisy *** address this issue,we propose a novel framework called Soft-GNN,which mitigates the influence of label noise by adapting the data utilized in *** approach employs a dynamic data utilization strategy that estimates adaptive weights based on prediction deviation,local deviation,and global *** better utilizing significant training samples and reducing the impact of label noise through dynamic data selection,GNNs are trained to be more *** evaluate the performance,robustness,generality,and complexity of our model on five real-world datasets,and our experimental results demonstrate the superiority of our approach over existing methods.
Vehicle to Everything (V2X) is a core 5G technology. V2X and its enabler, Device-to-Device (D2D), are essential for the Internet of Things (IoT) and the Internet of Vehicles (IoV). V2X enables vehicles to communicate ...
详细信息
Blockchain technologies have been used to facilitate Web 3.0 and FinTech ***,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 and FinTech appli...
详细信息
Blockchain technologies have been used to facilitate Web 3.0 and FinTech ***,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 and FinTech applications such as Supply Chain Finance(SCF).Blockchain sharding has been proposed to improve blockchain ***,the existing sharding methods either use a static sharding strategy,which lacks the adaptability for the dynamic SCF environment,or are designed for public chains,which are not applicable to consortium blockchain-based *** address these issues,we propose an adaptive consortium blockchain sharding framework named ACSarF,which is based on the deep reinforcement learning *** proposed framework can improve consortium blockchain sharding to effectively reduce transaction delay and adaptively adjust the sharding and blockout strategies to increase the transaction success rate in a dynamic SCF ***,we propose to use a consistent hash algorithm in the ACSarF framework to ensure transaction load balancing in the adaptive sharding system to further improve the performance of blockchain sharding in dynamic SCF *** evaluate the proposed framework,we conducted extensive experiments in a typical SCF *** obtained experimental results show that the ACSarF framework achieves a more than 60%improvement in user experience compared to other state-of-the-art blockchain systems.
暂无评论