Link prediction in complex networks is a fundamental problem with applications in diverse domains, from social networks to biological systems. Traditional approaches often struggle to capture intricate relationships i...
详细信息
Due to recent expansion of wireless communications, it has become impossible to cope with the allotment of the precious spectrum while resources for wireless communication are bounded and finite. Hence, the cognitive ...
详细信息
In a cloud environment,graphics processing units(GPUs)are the primary devices used for high-performance *** exploit flexible resource utilization,a key advantage of cloud *** users share GPUs,which serve as coprocesso...
详细信息
In a cloud environment,graphics processing units(GPUs)are the primary devices used for high-performance *** exploit flexible resource utilization,a key advantage of cloud *** users share GPUs,which serve as coprocessors of central processing units(CPUs)and are activated only if tasks demand GPU *** a container environment,where resources can be shared among multiple users,GPU utilization can be increased by minimizing idle time because the tasks of many users run on a single ***,unlike CPUs and memory,GPUs cannot logically multiplex their ***,GPU memory does not support over-utilization:when it runs out,tasks will ***,it is necessary to regulate the order of execution of concurrently running GPU tasks to avoid such task failures and to ensure equitable GPU sharing among *** this paper,we propose a GPU task execution order management technique that controls GPU usage via time-based *** technique seeks to ensure equal GPU time among users in a container environment to prevent task *** the meantime,we use a deferred processing method to prevent GPU memory shortages when GPU tasks are executed simultaneously and to determine the execution order based on the GPU usage *** the order of GPU tasks cannot be externally adjusted arbitrarily once the task commences,the GPU task is indirectly paused by pausing the *** addition,as container pause/unpause status is based on the information about the available GPU memory capacity,overuse of GPU memory can be prevented at the *** a result,the strategy can prevent task failure and the GPU tasks can be experimentally processed in appropriate order.
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must...
详细信息
The rapid spread of false information on social media has become a major challenge in today's digital world. This has created a need for an effective rumor detection system that can identify and control the spread...
详细信息
Federated learning (FL) is a distributed learning framework that allows clients to jointly train a model by uploading parameter updates rather than sharing local data. FL deployed on a client-edge-cloud hierarchical a...
详细信息
In the setting of error-correcting codes with feedback, Alice wishes to communicate a k-bit message x to Bob by sending a sequence of bits over a channel while noiselessly receiving feedback from Bob. It has been long...
详细信息
The agriculture industry's production and food quality have been impacted by plant leaf diseases in recent years. Hence, it is vital to have a system that can automatically identify and diagnose diseases at an ini...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing huma...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing human users from automated ***-based CAPTCHAs,designed to be easily decipherable by humans yet challenging for machines,are a common form of this ***,advancements in deep learning have facilitated the creation of models adept at recognizing these text-based CAPTCHAs with surprising *** our comprehensive investigation into CAPTCHA recognition,we have tailored the renowned UpDown image captioning model specifically for this *** approach innovatively combines an encoder to extract both global and local features,significantly boosting the model’s capability to identify complex details within CAPTCHA *** the decoding phase,we have adopted a refined attention mechanism,integrating enhanced visual attention with dual layers of Long Short-Term Memory(LSTM)networks to elevate CAPTCHA recognition *** rigorous testing across four varied datasets,including those from Weibo,BoC,Gregwar,and Captcha 0.3,demonstrates the versatility and effectiveness of our *** results not only highlight the efficiency of our approach but also offer profound insights into its applicability across different CAPTCHA types,contributing to a deeper understanding of CAPTCHA recognition technology.
暂无评论