This paper presents a concise methodology for the detection of partially reduplicated Multi-Word Expressions (MWEs) in Bengali texts. The entire process of identifying such reduplicated forms is carried out in two dis...
详细信息
Cloud storage is crucial for managing large datasets, but dependence on a single cloud space raises security concerns. Conversely, Distributed Ledger Technology (DLT) provides a secure cloud-based storage system opera...
详细信息
We consider the online convex optimization (OCO) problem with quadratic and linear switching cost when at time t only gradient information for functions fτ, τ 16(Lµ+5) for the quadratic switching cost, and also...
详细信息
We consider the online convex optimization (OCO) problem with quadratic and linear switching cost when at time t only gradient information for functions fτ, τ 16(Lµ+5) for the quadratic switching cost, and also show the bound to be order-wise tight in terms of L, µ. In addition, we show that the competitive ratio of any online algorithm is at least max{Ω(L), Ω(pLµ )} when the switching cost is quadratic. For the linear switching cost, the competitive ratio of the OMGD algorithm is shown to depend on both the path length and the squared path length of the problem instance, in addition to L, µ, and is shown to be order-wise, the best competitive ratio any online algorithm can achieve. Copyright is held by author/owner(s).
The network switches in the data plane of Software Defined Networking (SDN) are empowered by an elementary process, in which enormous number of packets which resemble big volumes of data are classified into specific f...
详细信息
The network switches in the data plane of Software Defined Networking (SDN) are empowered by an elementary process, in which enormous number of packets which resemble big volumes of data are classified into specific flows by matching them against a set of dynamic rules. This basic process accelerates the processing of data, so that instead of processing singular packets repeatedly, corresponding actions are performed on corresponding flows of packets. In this paper, first, we address limitations on a typical packet classification algorithm like Tuple Space Search (TSS). Then, we present a set of different scenarios to parallelize it on different parallel processing platforms, including Graphics Processing Units (GPUs), clusters of Central Processing Units (CPUs), and hybrid clusters. Experimental results show that the hybrid cluster provides the best platform for parallelizing packet classification algorithms, which promises the average throughput rate of 4.2 Million packets per second (Mpps). That is, the hybrid cluster produced by the integration of Compute Unified Device Architecture (CUDA), Message Passing Interface (MPI), and OpenMP programming model could classify 0.24 million packets per second more than the GPU cluster scheme. Such a packet classifier satisfies the required processing speed in the programmable network systems that would be used to communicate big medical data.
The emergence of 5G networks has enabled the deployment of a two-tier edge and vehicular-fog network. It comprises Multi-access Edge Computing (MEC) and Vehicular-Fogs (VFs), strategically positioned closer to Interne...
详细信息
PROBLEM Recent years have witnessed the rapid progress of self-supervised language models (LMs)[1],especially large language models (LLMs)[2].LLMs not only achieved state-of-the-art performance on many natural languag...
PROBLEM Recent years have witnessed the rapid progress of self-supervised language models (LMs)[1],especially large language models (LLMs)[2].LLMs not only achieved state-of-the-art performance on many natural language processing tasks,but also captured widespread attention from the public due to their great potential in a variety of real-world applications (***,search engines,writing assistants,etc.)through providing general-purpose intelligent services.A few of the LLMs are becoming foundation models,an analogy to infrastructure,that empower hundreds of downstream applications.
Cloud computing involves accessing and using computing resources, such as servers, storage, and software applications, over the Internet, enabling scalable access on demand. Cloud computing systems are becoming an ess...
详细信息
The use of machine learning models in intrusion detection systems (IDSs) takes more time to build the model with many features and degrade the performance. The present paper proposes an ensemble of filter feature sele...
详细信息
Environmental sound classification(ESC)involves the process of distinguishing an audio stream associated with numerous environmental *** common aspects such as the framework difference,overlapping of different sound e...
详细信息
Environmental sound classification(ESC)involves the process of distinguishing an audio stream associated with numerous environmental *** common aspects such as the framework difference,overlapping of different sound events,and the presence of various sound sources during recording make the ESC task much more complicated and *** research is to propose a deep learning model to improve the recognition rate of environmental sounds and reduce the model training time under limited computation *** this research,the performance of transformer and convolutional neural networks(CNN)are *** audio features,chromagram,Mel-spectrogram,tonnetz,Mel-Frequency Cepstral Coefficients(MFCCs),delta MFCCs,delta-delta MFCCs and spectral contrast,are extracted fromtheUrbanSound8K,ESC-50,and ESC-10,***,this research also employed three data enhancement methods,namely,white noise,pitch tuning,and time stretch to reduce the risk of overfitting issue due to the limited audio *** evaluation of various experiments demonstrates that the best performance was achieved by the proposed transformer model using seven audio features on enhanced *** UrbanSound8K,ESC-50,and ESC-10,the highest attained accuracies are 0.98,0.94,and 0.97 *** experimental results reveal that the proposed technique can achieve the best performance for ESC problems.
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of the studies predominantly focuses on ut...
详细信息
暂无评论