Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals...
详细信息
Construction and demolition (C&D) waste management is challenging in urban areas due to the high volume of waste generated and widespread illegal dumping. City authorities are struggling with environmental, econom...
详细信息
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi...
详细信息
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of service(DDoS) attack, which aims to drain the resources of SDN switches and controllers,is one of the most common. Once the switch or controller is damaged, the network services can be *** defense schemes against DDoS attacks have been proposed from the perspective of attack detection;however, such defense schemes are known to suffer from a time consuming and unpromising accuracy, which could result in an unavailable network service before specific countermeasures are taken. To address this issue through a systematic investigation, we propose an elaborate resource-management mechanism against DDoS attacks in an SDN. Specifically, by considering the SDN topology, we leverage the M/M/c queuing model to measure the resistance of an SDN to DDoS attacks. Network administrators can therefore invest a reasonable number of resources into SDN switches and SDN controllers to defend against DDoS attacks while guaranteeing the quality of service(QoS). Comprehensive analyses and empirical data-based experiments demonstrate the effectiveness of the proposed approach.
In Taiwan, the current electricity prices for residential users remain relatively low. This results in a diminished incentive for these users to invest in energy-saving improvements. Consequently, devising strategies ...
详细信息
In recent years, mental health issues have profoundly impacted individuals’ well-being, necessitating prompt identification and intervention. Existing approaches grapple with the complex nature of mental health, faci...
详细信息
In recent years, mental health issues have profoundly impacted individuals’ well-being, necessitating prompt identification and intervention. Existing approaches grapple with the complex nature of mental health, facing challenges like task interference, limited adaptability, and difficulty in capturing nuanced linguistic expressions indicative of various conditions. In response to these challenges, our research presents three novel models employing multi-task learning (MTL) to understand mental health behaviors comprehensively. These models encompass soft-parameter sharing-based long short-term memory with attention mechanism (SPS-LSTM-AM), SPS-based bidirectional gated neural networks with self-head attention mechanism (SPS-BiGRU-SAM), and SPS-based bidirectional neural network with multi-head attention mechanism (SPS-BNN-MHAM). Our models address diverse tasks, including detecting disorders such as bipolar disorder, insomnia, obsessive-compulsive disorder, and panic in psychiatric texts, alongside classifying suicide or non-suicide-related texts on social media as auxiliary tasks. Emotion detection in suicide notes, covering emotions of abuse, blame, and sorrow, serves as the main task. We observe significant performance enhancement in the primary task by incorporating auxiliary tasks. Advanced encoder-building techniques, including auto-regressive-based permutation and enhanced permutation language modeling, are recommended for effectively capturing mental health contexts’ subtleties, semantic nuances, and syntactic structures. We present the shared feature extractor called shared auto-regressive for language modeling (S-ARLM) to capture high-level representations that are useful across tasks. Additionally, we recommend soft-parameter sharing (SPS) subtypes-fully sharing, partial sharing, and independent layer-to minimize tight coupling and enhance adaptability. Our models exhibit outstanding performance across various datasets, achieving accuracies of 96.9%, 97.
With the surge of big data applications and the worsening of the memory-wall problem,the memory system,instead of the computing unit,becomes the commonly recognized major concern of ***,this“memorycentric”common und...
详细信息
With the surge of big data applications and the worsening of the memory-wall problem,the memory system,instead of the computing unit,becomes the commonly recognized major concern of ***,this“memorycentric”common understanding has a humble *** than three decades ago,the memory-bounded speedup model is the first model recognizing memory as the bound of computing and provided a general bound of speedup and a computing-memory trade-off *** memory-bounded model was well received even by *** was immediately introduced in several advanced computer architecture and parallel computing textbooks in the 1990’s as a must-know for scalable *** include *** Hwang’s book“Scalable Parallel Computing”in which he introduced the memory-bounded speedup model as the Sun-Ni’s Law,parallel with the Amdahl’s Law and the Gustafson’s *** the years,the impacts of this model have grown far beyond parallel processing and into the fundamental of *** this article,we revisit the memory-bounded speedup model and discuss its progress and impacts in depth to make a unique contribution to this special issue,to stimulate new solutions for big data applications,and to promote data-centric thinking and rethinking.
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many *** by the self-nonself discrimination par...
详细信息
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many *** by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network ***,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called ***,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept ***,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social *** evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social *** experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding *** experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components.
We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the c...
详细信息
We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the coupling strength via a unidirectional waveguide(IWG)can induce chaotic *** underlying reason for this phenomenon is that adjusting the phase and coupling strength via the phase shifter and IWG bring the system close to an exceptional point(EP),where field localization dynamically enhances the optomechanical nonlinearity,leading to the generation of chaotic *** addition,due to the sensitivity of chaos to phase in the vicinity of the EP,we propose a theoretical scheme to measure the optical phase perturbations using *** work may offer an alternative approach to chaos generation with current experimental technology and provide theoretical guidance for optical signal processing and chaotic secure communication.
Cervical cancer is one of the most fatal and prevalent illnesses affecting women globally. Early detection of cervical cancer is crucial for effective treatment. Pap smear tests are commonly used, but population-based...
详细信息
The Internet of Things (IoT), which enables seamless connectivity and effective data exchange between physical items and digital systems, has completely changed the way we interact with our surroundings. This study ev...
详细信息
暂无评论