The Google Play platform boasts a total of 2,597,819 applications. A pivotal gauge of an application's success rests on its practical utility in daily life, coupled with its demonstrated strong performance metrics...
详细信息
The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed ***, MPI implementations can contain defects that impact the reliability and performance of parallelapplications....
详细信息
The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed ***, MPI implementations can contain defects that impact the reliability and performance of parallelapplications. Detecting and correcting these defects is crucial, yet there is a lack of published models specificallydesigned for correctingMPI defects. To address this, we propose a model for detecting and correcting MPI defects(DC_MPI), which aims to detect and correct defects in various types of MPI communication, including blockingpoint-to-point (BPTP), nonblocking point-to-point (NBPTP), and collective communication (CC). The defectsaddressed by the DC_MPI model include illegal MPI calls, deadlocks (DL), race conditions (RC), and messagemismatches (MM). To assess the effectiveness of the DC_MPI model, we performed experiments on a datasetconsisting of 40 MPI codes. The results indicate that the model achieved a detection rate of 37 out of 40 codes,resulting in an overall detection accuracy of 92.5%. Additionally, the execution duration of the DC_MPI modelranged from 0.81 to 1.36 s. These findings show that the DC_MPI model is useful in detecting and correctingdefects in MPI implementations, thereby enhancing the reliability and performance of parallel applications. TheDC_MPImodel fills an important research gap and provides a valuable tool for improving the quality ofMPI-basedparallel computing systems.
This article explores the importance of IT risk management, especially at XYZ Vocational School. The agency is equipped to manage business risks, emphasizing the need to improve decision-making and risk mitigation by ...
详细信息
Prior study has developed the RouteSegmentation algorithm to identify the perimeter area surrounding a route. In this study, a comparative experiment was carried out to investigate the performance of the RouteSegmenta...
详细信息
The Internet of Things (IoT) has the potential to revolutionize agriculture by enabling precise monitoring and control of environmental conditions. However, in certain areas, the application of IoT in agriculture is s...
详细信息
Big data has emerged very fast, and this has brought both opportunities and problems that are related to the application of deep learning. This paper explores how deep learning can be implemented using big data and in...
详细信息
The use of batteries as an energy storage medium has a very important role in the installation of renewable energy power plants, such as photovoltaics to overcome intermittency in photovoltaics and to maintain stable ...
详细信息
CT-Scan is a computer-based imaging technology, but it presents certain weaknesses, including interpretation challenges, lengthy analysis times, and visualization limitations. The progress in digital image processing ...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing ***’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT *** imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network ***,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization *** prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE *** results showed that the proposed approach outperforms the other approaches and could boost the detection *** addition,a statistical analysis is performed to study the significance and stability of the proposed *** conducted experiments include seven different types of attack cases in the RPL-NIDS17 *** on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%).
The use of covert communications has become more widespread recently as a solution to the information security issue. information security can be partially solved by the discovery and creation of covert routes. Covert...
详细信息
暂无评论