With the rise of computing-intensive applications like online gaming and telemedicine on user equipment (UE) and the evolution of 5G technology, there is a surge in demand for greater computing resources and power. Ye...
With the rise of computing-intensive applications like online gaming and telemedicine on user equipment (UE) and the evolution of 5G technology, there is a surge in demand for greater computing resources and power. Yet, UEs have limited resources and batteries. Mobile Cloud Computing (MCC) has emerged as a method to enhance UEs computing capabilities and conserve energy by transferring tasks to the cloud. Mobile Edge Computing (MEC) further aids by reducing delays, although it faces issues like limited resources and unpredictable network conditions. Unmanned Aerial Vehicles (UAVs) offer a remedy by serving as mobile stations for MEC, but optimal offloading decisions in UAV-assisted MEC remain intricate. Addressing this, I propose using Reinforcement Learning (RL), specifically Q-Learning, Deep Q Network (DQN), and Deep Deterministic Policy Gradient (DDPG), to enhance decision-making for offloading. Our focus is on energy efficiency and reduced service delay, and our simulations prove our method's efficacy in UAV-assisted MEC environments.
Chroma intra prediction aims to reduce chroma redundancies within a frame, which plays an important role in improving the coding efficiency of intra coding. Existing chroma intra prediction methods typically utilize t...
详细信息
Knowledge distillation (KD) is a technique that compresses large teacher models by training smaller student models to mimic them. The success of KD in auto-regressive language models mainly relies on Reverse KL for mo...
详细信息
In general, public or private organizations or companies have used information-based technology as a support to improve business performance to be more effective and efficient in order to achieve a company’s business...
详细信息
In general, public or private organizations or companies have used information-based technology as a support to improve business performance to be more effective and efficient in order to achieve a company’s business goals. Given the large contribution of information technology in the application of hotel applications as a supporting information system, it is a vital system that must avoid risks that can hinder and cause harm to the hotel management business processes. Therefore, it is necessary to carry out risk management using the COBIT 5 framework to manage possible risks that may occur based on the APO12 (Manage Risk) domain. From the evaluation results of the data obtained through observation and interviews as well as the calculation of the results of the questionnaire based on 6 APO12 subdomains, the results of the risk management level capability assessment in hotel applications are still at level 3 or have reached the level of established process with the target to be achieved at level 4 resulting in a gap of 1 level. Based on the results obtained, it is necessary to propose recommendations that can be used by hotels in improving the application of information technology risk management so that in the future it can achieve the expected target level so that the APO12 level of capability can increase and become more optimal.
Multimodal knowledge bases (MMKBs) provide cross-modal aligned knowledge crucial for multimodal tasks. However, the images in existing MMKBs are generally collected for entities in encyclopedia knowledge graphs. There...
详细信息
Skin diseases rank among the most prevalent ailments in humans, which underscores the critical importance of early detection and diagnosis. Considering clinical practice, the integration of information from various mo...
详细信息
Process mining techniques can provide insights into the healthcare domain with the rapid growth of electrical health records. Process mining is about understanding the sequence of activities in event logs, where direc...
详细信息
Modern microservice systems have become increasingly complicated due to the dynamic and complex interactions and runtime environment. It leads to the system vulnerable to performance issues caused by a variety of reas...
详细信息
ISBN:
(数字)9798400702174
ISBN:
(纸本)9798350382143
Modern microservice systems have become increasingly complicated due to the dynamic and complex interactions and runtime environment. It leads to the system vulnerable to performance issues caused by a variety of reasons, such as the runtime environments, communications, coordinations, or implementations of services. Traces record the detailed execution process of a request through the system and have been widely used in performance issues diagnosis in microservice systems. By identifying the execution processes and attribute value combinations that are common in anomalous traces but rare in normal traces, engineers may localize the root cause of a performance issue into a smaller scope. However, due to the complex structure of traces and the large number of attribute combinations, it is challenging to find the root cause from the huge search space. In this paper, we propose TraceContrast, a trace-based multidimensional root cause localization approach. TraceContrast uses a sequence representation to describe the complex structure of a trace with attributes of each span. Based on the representation, it combines contrast sequential pattern mining and spectrum analysis to localize multidimensional root causes efficiently. Experimental studies on a widely used microservice benchmark show that TraceContrast outperforms existing approaches in both multidimensional and instance-dimensional root cause localization with significant accuracy advantages. Moreover, Trace-Contrast is efficient and its efficiency can be further improved by parallel execution.
Recent speech synthesis technology can generate high-quality speech indistinguishable from human speech, thus introducing various security and privacy risks. Numerous recent studies have focused on fake voice detectio...
详细信息
ISBN:
(数字)9798350390155
ISBN:
(纸本)9798350390162
Recent speech synthesis technology can generate high-quality speech indistinguishable from human speech, thus introducing various security and privacy risks. Numerous recent studies have focused on fake voice detection to address these risks, with many claiming to achieve ideal performance. However, is this really the case? A recent research work introduced Speaker-Irrelative-Features (SiFs), unrelated to the information in speech files but capable of influencing fake detectors. This means that existing detectors may rely on SiFs to a certain extent to distinguish real and fake speech. In this paper, we introduce an evaluation framework to evaluate the influence of SiFs in existing fake voice detectors in depth. We evaluate three SiFs which include background noise, the mute parts before and after voice, and the sampling rate on ASVspoof2019 and FoR. Our results confirm the substantial influence of SiFs on fake voice detection performance, and we delve into the analysis of the underlying mechanisms.
Although fully convolution networks (FCN) have dominated semantic segmentation since the birth of [24], they are inherently limited in capturing long-range structured relationship with the layers of local kernels. Whi...
详细信息
暂无评论