Numerous neural network(NN)applications are now being deployed to mobile *** applications usually have large amounts of calculation and data while requiring low inference latency,which poses challenges to the computin...
详细信息
Numerous neural network(NN)applications are now being deployed to mobile *** applications usually have large amounts of calculation and data while requiring low inference latency,which poses challenges to the computing ability of mobile ***,devices’life and performance depend on ***,in many scenarios,such as industrial production and automotive systems,where the environmental temperatures are usually high,it is important to control devices’temperatures to maintain steady *** this paper,we propose a thermal-aware channel-wise heterogeneous NN inference *** contains two parts,the thermal-aware dynamic frequency(TADF)algorithm and the heterogeneous-processor single-layer workload distribution(HSWD)*** on a mobile device’s architecture characteristics and environmental temperature,TADF can adjust the appropriate running speed of the central processing unit and graphics processing unit,and then the workload of each layer in the NN model is distributed by HSWD in line with each processor’s running speed and the characteristics of the layers as well as heterogeneous *** experimental results,where representative NNs and mobile devices were used,show that the proposed method can considerably improve the speed of the on-device inference by 21%–43%over the traditional inference method.
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce ***,this trend introduces security challenges,such as unauthorized *** access control systems,such as Attribute-Base...
详细信息
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce ***,this trend introduces security challenges,such as unauthorized *** access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and *** paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN *** technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access *** proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy ***,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern ***,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.
The scheme of water resources management is a necessity for reducing water scarcity in arid areas and improving water availability in general [1]. However, water leak detection and irrigation scheduling traditional AI...
详细信息
The growing demand for cloud computing has made it imperative to optimize the utilization of cloud resources. Resource optimization can be improved through Virtual Machine (VM) Placement. In order to effectively optim...
详细信息
Understanding and predicting air quality is pivotal for public health and environmental management, especially in urban areas like Delhi. This study utilizes a comprehensive dataset from the Central Pollution Control ...
详细信息
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication...
详细信息
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication links may be *** paper proposes deploying an intelligent reflecting surface(IRS)on the UAV to enhance the communication performance of mobile vehicles,improve system flexibility,and alleviate eavesdropping on communication *** links for uploading task data from vehicles to a base station(BS)are protected by IRS-assisted physical layer security(PLS).Upon receiving task data,the computing resources provided by the edge computing servers(MEC)are allocated to vehicles for task *** blockchain-based computation offloading schemes typically focus on improving network performance,such as minimizing energy consumption or latency,while neglecting the Gas fees for computation offloading and the costs required for MEC computation,leading to an imbalance between service fees and resource *** paper uses a utility-oriented computation offloading scheme to balance costs and *** paper proposes alternating phase optimization and power optimization to optimize the energy consumption,latency,and communication secrecy rate,thereby maximizing the weighted total utility of the *** results demonstrate a notable enhancement in the weighted total system utility and resource utilization,thereby corroborating the viability of our approach for practical applications.
Thermal images are crucial for object detection in surveillance, security, industrial automation, and vehicular navigation due to their ability to capture heat signatures. However, complexities like low contrast, fluc...
详细信息
Portable document formats (PDFs) are widely used for document exchange due to their widespread usage and versatility. However, PDFs are highly vulnerable to malware attacks, which pose significant security risks. Exis...
详细信息
Detecting and promptly identifying cracks on road surfaces is of paramount importance for preserving infrastructure integrity and ensuring the safety of road users, including both drivers and pedestrians. Presently, t...
详细信息
The dominance of Android in the global mobile market and the open development characteristics of this platform have resulted in a significant increase in *** malicious applications have become a serious concern to the...
详细信息
The dominance of Android in the global mobile market and the open development characteristics of this platform have resulted in a significant increase in *** malicious applications have become a serious concern to the security of Android *** address this problem,researchers have proposed several machine-learning models to detect and classify Android malware based on analyzing features extracted from Android ***,most existing studies have focused on the classification task and overlooked the feature selection process,which is crucial to reduce the training time and maintain or improve the classification *** current paper proposes a new Android malware detection and classification approach that identifies the most important features to improve classification performance and reduce training *** proposed approach consists of two main ***,a feature selection method based on the Attention mechanism is used to select the most important ***,an optimized Light Gradient Boosting Machine(LightGBM)classifier is applied to classify the Android samples and identify the *** feature selection method proposed in this paper is to integrate an Attention layer into a multilayer perceptron neural *** role of the Attention layer is to compute the weighted values of each feature based on its importance for the classification *** evaluation of the approach has shown that combining the Attention-based technique with an optimized classification algorithm for Android malware detection has improved the accuracy from 98.64%to 98.71%while reducing the training time from 80 to 28 s.
暂无评论