Malware has become one of the most severe security threats in cyber security, among which APT malware attacks are more threatening than advanced sustainable threat attacks. In this paper, we perform APT malware and va...
详细信息
We propose a novel contrast-based no-reference image quality assessment (NR-IQA) method. The proposed method quantifies the degree of uniformity in the probability distribution of the pixel values of an image to measu...
详细信息
The concept of fog networking has been introduced to provide Cloud-based services to Internet of Things (IoT) devices. One of the crucial tasks in this paradigm is network telemetry, which plays a vital role in ensuri...
Mobile Edge Computing(MEC)is a technology designed for the on-demand provisioning of computing and storage services,strategically positioned close to *** the MEC environment,frequently accessed content can be deployed...
详细信息
Mobile Edge Computing(MEC)is a technology designed for the on-demand provisioning of computing and storage services,strategically positioned close to *** the MEC environment,frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery,ultimately enhancing the quality of the user ***,due to the typical placement of edge devices and nodes at the network’s periphery,these components may face various potential fault tolerance challenges,including network instability,device failures,and resource *** the dynamic nature ofMEC,making high-quality content caching decisions for real-time mobile applications,especially those sensitive to latency,by effectively utilizing mobility information,continues to be a significant *** response to this challenge,this paper introduces FT-MAACC,a mobility-aware caching solution grounded in multi-agent deep reinforcement learning and equipped with fault tolerance *** approach comprehensively integrates content adaptivity algorithms to evaluate the priority of highly user-adaptive cached ***,it relies on collaborative caching strategies based onmulti-agent deep reinforcement learningmodels and establishes a fault-tolerancemodel to ensure the system’s reliability,availability,and *** results unequivocally demonstrate that FTMAACC outperforms its peer methods in cache hit rates and transmission latency.
The cryo-electron microscopy(cryo-EM)is one of the most powerful technologies available today for structural *** RELION(Regularized Likelihood Optimization)implements a Bayesian algorithm for cryo-EM structure determi...
详细信息
The cryo-electron microscopy(cryo-EM)is one of the most powerful technologies available today for structural *** RELION(Regularized Likelihood Optimization)implements a Bayesian algorithm for cryo-EM structure determination,which is one of the most widely used software in this *** researchers have devoted effort to improve the performance of RELION to satisfy the analysis for the ever-increasing volume of *** this paper,we focus on performance analysis of the most time-consuming computation steps in RELION and identify their performance bottlenecks for specific *** propose several performance optimization strategies to improve the overall performance of RELION,including optimization of expectation step,parallelization of maximization step,accelerating the computation of symmetries,and memory affinity *** experiment results show that our proposed optimizations achieve significant speedups of RELION across representative *** addition,we perform roofline model analysis to understand the effectiveness of our optimizations.
Diabetes is a leading cause of death. People with type 1 diabetes (T1D) can face a number of consequences from their illness. Hyperglycemia is a symptom of T1D disease. Hyperglycemia can be symptoms that can be u...
详细信息
Tracking the flow of external inputs in a program with taint-analysis techniques can help developers better identify potential security vulnerabilities in the software. However, directly using the static taint analysi...
详细信息
Down Syndrome (DS) is a genetic disorder causing intellectual disability and developmental delays. Despite instances of discrimination, several individuals with DS have achieved success through proper education and co...
详细信息
There have been many different forms of evolution-ary algorithms (EAs) designed by humans over the past 50 years, with many variants optimized for specific classes of problems. As computational resources grow, the aut...
详细信息
In modern air traffic management, generating synthetic flight trajectories has emerged as a promising solution for addressing data scarcity, protecting sensitive information, and supporting large-scale analyses. In th...
详细信息
暂无评论