This study presents a detailed survey on the use of the Internet of Things (IoT) for predictive maintenance and monitoring of cultural heritage, focusing on museums and exhibitions. The integration of IoT in these fie...
详细信息
The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa...
详细信息
This paper solves the boundary value problem of the second-order differential equation under the neutrosophic fuzzy boundary condition. The proposed solution is approximated using the finite difference method but dene...
详细信息
作者:
Chaudhri, Shiv Nath
Faculty of Engineering & Technology Department of Computer Science and Design Wardha India
Organoid intelligence (OI), the next paradigm of intelligence, draws inspiration from the biological learning of organs. On the other hand, artificial intelligence (AI) draws its inspiration only from the cognitive pr...
详细信息
On-device training for deep neural networks(DNN) has become a trend due to various user preferences and scenarios. The DNN training process consists of three phases, feedforward(FF), backpropagation(BP), and weight gr...
详细信息
On-device training for deep neural networks(DNN) has become a trend due to various user preferences and scenarios. The DNN training process consists of three phases, feedforward(FF), backpropagation(BP), and weight gradient(WG) update. WG takes about one-third of the computation in the whole training process. Current training accelerators usually ignore the special computation property of WG and process it in a way similar to FF/BP. Besides, the extensive data sparsity existing in WG, which brings opportunities to save computation, is not well explored. Nevertheless, exploiting the optimization opportunities would meet three underutilization problems, which are caused by(1) the mismatch between WG data dimensions and hardware parallelism,(2) the full sparsity, i.e., the sparsity of feature map(Fmap),error map(Emap), and gradient, and(3) the workload imbalance resulting from irregular sparsity. In this paper, we propose a specific architecture for sparse weight gradient(SWG) computation. The architecture is designed based on hierarchical unrolling and sparsity-aware(HUSA) dataflow to exploit the optimization opportunities of the special computation property and full data sparsity. In HUSA dataflow, the data dimensions are unrolled hierarchically on the hardware architecture. A valid-data trace(VDT) mechanism is embedded in the dataflow to avoid the underutilization caused by the two-sided input sparsity. The gradient is unrolled in PE to alleviate the underutilization induced by output sparsity while maintaining the data reuse opportunities. Besides, we design an intra-and inter-column balancer(IIBLC) to dynamically tackle the workload imbalance problem resulting from the irregular sparsity. Experimental results show that with HUSA dataflow exploiting the full sparsity, SWG achieves a speedup of 12.23× over state-of-the-art gradient computation architecture, Train Ware. SWG helps to improve the energy efficiency of the state-of-the-art training accelerator LNPU from
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Op...
详细信息
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional *** disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network ***,this openness introduces new security challenges compared to traditional *** existing studies overlook these security requirements of the O-RAN *** gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G *** then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities *** providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
In recent days, the population of fish species is enormously increased. The measurement of the total population of the fish species is also a complex task. The population of fishes can be easily identified by its clas...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research *** fromnatural images,character images pay more attention to stroke ***,existingmodelsmainly cons...
详细信息
Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research *** fromnatural images,character images pay more attention to stroke ***,existingmodelsmainly consider pixel-level informationwhile ignoring structural information of the character,such as its edge and glyph,resulting in reconstructed images with mottled local structure and character *** solve these problems,we propose a novel generative adversarial network(GAN)framework based on an edge-guided generator and a discriminator constructed by a dual-domain U-Net framework,i.e.,*** existing frameworks,the generator introduces the edge extractionmodule,guiding it into the denoising process through the attention mechanism,which maintains the edge detail of the restored inscription ***,a dual-domain U-Net-based discriminator is proposed to learn the global and local discrepancy between the denoised and the label images in both image and morphological domains,which is helpful to blind denoising *** proposed dual-domain discriminator and generator for adversarial training can reduce local artifacts and keep the denoised character structure *** to the lack of a real-inscription image,we built the real-inscription dataset to provide an effective benchmark for studying inscription image *** experimental results show the superiority of our method both in the synthetic and real-inscription datasets.
The outbreak of COVID-19 (also known as Coronavirus) has put the entire world at risk. The disease first appears in Wuhan, China, and later spread to other countries, taking a form of a pandemic. In this paper, we try...
详细信息
暂无评论