Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection *** study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutional neural net...
详细信息
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection *** study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutional neural network(1DCNN)architectures to enhance ransomware detection *** common challenges in ransomware detection,particularly dataset class imbalance,the synthetic minority oversampling technique(SMOTE)is employed to generate synthetic samples for minority class,thereby improving detection *** integration of ViT and 1DCNN through feature fusion enables the model to capture both global contextual and local sequential features,resulting in comprehensive ransomware *** on the UNSW-NB15 dataset,the proposed ViT-1DCNN model achieved 98%detection accuracy with precision,recall,and F1-score metrics surpassing conventional *** approach not only reduces false positives and negatives but also offers scalability and robustness for real-world cybersecurity *** results demonstrate the model’s potential as an effective tool for proactive ransomware detection,especially in environments where evolving threats require adaptable and high-accuracy solutions.
Hybrid memory systems composed of dynamic random access memory(DRAM)and Non-volatile memory(NVM)often exploit page migration technologies to fully take the advantages of different memory *** previous proposals usually...
详细信息
Hybrid memory systems composed of dynamic random access memory(DRAM)and Non-volatile memory(NVM)often exploit page migration technologies to fully take the advantages of different memory *** previous proposals usually migrate data at a granularity of 4 KB pages,and thus waste memory bandwidth and DRAM *** this paper,we propose Mocha,a non-hierarchical architecture that organizes DRAM and NVM in a flat address space physically,but manages them in a cache/memory *** the commercial NVM device-Intel Optane DC Persistent Memory Modules(DCPMM)actually access the physical media at a granularity of 256 bytes(an Optane block),we manage the DRAM cache at the 256-byte size to adapt to this feature of *** design not only enables fine-grained data migration and management for the DRAM cache,but also avoids write amplification for Intel Optane *** also create an Indirect Address Cache(IAC)in Hybrid Memory Controller(HMC)and propose a reverse address mapping table in the DRAM to speed up address translation and cache ***,we exploit a utility-based caching mechanism to filter cold blocks in the NVM,and further improve the efficiency of the DRAM *** implement Mocha in an architectural *** results show that Mocha can improve application performance by 8.2%on average(up to 24.6%),reduce 6.9%energy consumption and 25.9%data migration traffic on average,compared with a typical hybrid memory architecture-HSCC.
The present study aims to evaluate the effectiveness of using modern neural network models (ChatGPT 4o, Claude 3.5 Sonnet, GigaChat 3.0, YandexGPT 3) for generating mathematical problems for elementary school students...
详细信息
In response to the increasing penetration of volatile and uncertain renewable energy,the regional transmission organizations(RTOs)have been recently focusing on enhancing the models of pump storage hydropower(PSH)plan...
详细信息
In response to the increasing penetration of volatile and uncertain renewable energy,the regional transmission organizations(RTOs)have been recently focusing on enhancing the models of pump storage hydropower(PSH)plants,which are one of the key flexibility assets in the day-ahead(DA)and real-time(RT)markets,to further boost their flexibility provision *** by the recent research works that explored the potential benefits of excluding PSHs’cost-related terms from the objective functions of the DA market clearing model,this paper completes a rolling RT market scheme that is compatible with the DA ***,with the vision that PSHs could be permitted to submit state-of-charge(SOC)headrooms in the DA market and to release them in the RT market,this paper uncovers that PSHs could increase the total revenues from the two markets by optimizing their SOC headrooms,assisted by the proposed tri-level optimal SOC headroom ***,in the proposed tri-level model,the middle and lower levels respectively mimic the DA and RT scheduling processes of PSHs,and the upper level determines the optimal headrooms to be submitted to the RTO for maximizing the total revenue from the two *** case studies quantify the profitability of the optimal SOC headroom submissions as well as the associated financial risks.
Reachability query plays a vital role in many graph analysis *** researches proposed many methods to efficiently answer reachability queries between vertex *** many real graphs are labeled graph,it highly demands Labe...
详细信息
Reachability query plays a vital role in many graph analysis *** researches proposed many methods to efficiently answer reachability queries between vertex *** many real graphs are labeled graph,it highly demands Label-Constrained Reachability(LCR)query inwhich constraint includes a set of labels besides vertex *** researches proposed several methods for answering some LCR queries which require appearance of some labels specified in constraints in the *** that constraint may be a label set,query constraint may be ordered labels,namely OLCR(Ordered-Label-Constrained Reachability)queries which retrieve paths matching a sequence of ***,no solutions are available for ***,we propose DHL,a novel bloom filter based indexing technique for answering OLCR *** can be used to check reachability between vertex *** the answers are not no,then constrained DFS is ***,we employ DHL followed by performing constrained DFS to answer OLCR *** show that DHL has a bounded false positive rate,and it's powerful in saving indexing time and *** experiments on 10 real-life graphs and 12 synthetic graphs demonstrate that DHL achieves about 4.8-22.5 times smaller index space and 4.6-114 times less index construction time than two state-of-art techniques for LCR queries,while achieving comparable query response *** results also show that our algorithm can answer OLCR queries effectively.
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the ...
详细信息
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the longitudinal OAM and the transverse OAM carried by a three-dimensional(3D)spatiotemporal optical vortex(STOV)in the process of tight *** 3D STOV possesses orthogonal OAMs in the x-y,t-x,and y-t planes,and is preconditioned to overcome the spatiotemporal astigmatism effect.x,y,and t are the axes in the spatiotemporal *** corresponding focused wavepacket is calculated by employing the Debye diffraction theory,showing that a phase singularity ring is generated by the interactions among the transverse and longitudinal vortices in the highly confined *** Fourier-transform decomposition of the Debye integral is employed to analyze the mechanism of the orbit-orbit *** is the first revelation of coupling between the longitudinal OAM and the transverse OAM,paving the way for potential applications in optical trapping,laser machining,nonlinear light-matter interactions,and more.
Deep learning has achieved excellent results in various tasks in the field of computer vision,especially in fine-grained visual *** aims to distinguish the subordinate categories of the label-level *** to high intra-c...
详细信息
Deep learning has achieved excellent results in various tasks in the field of computer vision,especially in fine-grained visual *** aims to distinguish the subordinate categories of the label-level *** to high intra-class variances and high inter-class similarity,the fine-grained visual categorization is extremely *** paper first briefly introduces and analyzes the related public *** that,some of the latest methods are *** on the feature types,the feature processing methods,and the overall structure used in the model,we divide them into three types of methods:methods based on general convolutional neural network(CNN)and strong supervision of parts,methods based on single feature processing,and meth-ods based on multiple feature *** methods of the first type have a relatively simple structure,which is the result of the initial *** methods of the other two types include models that have special structures and training processes,which are helpful to obtain discriminative *** conduct a specific analysis on several methods with high accuracy on pub-lic *** addition,we support that the focus of the future research is to solve the demand of existing methods for the large amount of the data and the computing *** terms of tech-nology,the extraction of the subtle feature information with the burgeoning vision transformer(ViT)network is also an important research direction.
Vector limiter is a computationally complex component of vector control, but its hardware-friendly algorithm is rarely discussed. This paper presents an efficient solution with pure shift-and-add operations, namely th...
详细信息
Nowadays,cloud computing provides easy access to a set of variable and configurable computing resources based on user demand through the *** computing services are available through common internet protocols and netwo...
详细信息
Nowadays,cloud computing provides easy access to a set of variable and configurable computing resources based on user demand through the *** computing services are available through common internet protocols and network standards.n addition to the unique benefits of cloud computing,insecure communication and attacks on cloud networks cannot be *** are several techniques for dealing with network *** this end,network anomaly detection systems are widely used as an effective countermeasure against network *** anomaly-based approach generally learns normal traffic patterns in various ways and identifies patterns of *** anomaly detection systems have gained much attention in intelligently monitoring network traffic using machine learning *** paper presents an efficient model based on autoencoders for anomaly detection in cloud computing *** autoencoder learns a basic representation of the normal data and its reconstruction with minimum ***,the reconstruction error is used as an anomaly or classification *** addition,to detecting anomaly data from normal data,the classification of anomaly types has also been *** have proposed a new approach by examining an autoencoder's anomaly detection method based on data reconstruction *** the existing autoencoder-based anomaly detection techniques that consider the reconstruction error of all input features as a single value,we assume that the reconstruction error is a *** enables our model to use the reconstruction error of every input feature as an anomaly or classification *** further propose a multi-class classification structure to classify the *** use the CIDDS-001 dataset as a commonly accepted dataset in the *** evaluations show that the performance of the proposed method has improved considerably compared to the existing ones in terms of accuracy,recall,false-positive rate,and F1-score
Good working condition of mechanical facility is necessary to ensure orderly industrial production, and remaining useful life (RUL) estimation of mechanical facility via current monitoring parameters is an important i...
详细信息
暂无评论