INTRODUCTION Store signboards provide important information in street view images,andcharacter recognition in natural scenes is an important research direction in computer *** view store signboard character recognitio...
INTRODUCTION Store signboards provide important information in street view images,andcharacter recognition in natural scenes is an important research direction in computer *** view store signboard character recognition technology,acombination of the two,
Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu...
详细信息
Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data communication across various ***,IoT devices,typically low-powered,are susceptible to cyber ***,blockchain has emerged as a robust solution to secure these devices due to its decentralised ***,the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks,network scalability limitations,and blockchain-specific security ***,on the other hand,is a recently emerged information security solution that has great potential to secure low-powered IoT *** study aims to identify blockchain-specific vulnerabilities through changes in network behaviour,addressing a significant research gap and aiming to mitigate future cybersecurity *** blockchain and IoT technologies presents challenges,including performance bottlenecks,network scalability issues,and unique security *** paper analyses potential security weaknesses in blockchain and their impact on network *** developed a real IoT test system utilising three prevalent blockchain applications to conduct *** results indicate that Distributed Denial of Service(DDoS)attacks on low-powered,blockchain-enabled IoT sensor networks cause measurable anomalies in network and device performance,specifically:(1)an average increase in CPU core usage to 34.32%,(2)a reduction in hash rates by up to 66%,(3)an increase in batch timeout by up to 14.28%,and(4)an increase in block latency by up to 11.1%.These findings suggest potential strategies to counter future DDoS attacks on IoT networks.
The use of machine learning models in intrusion detection systems (IDSs) takes more time to build the model with many features and degrade the performance. The present paper proposes an ensemble of filter feature sele...
详细信息
Background: Cloud services have become a popular approach for offering efficient services for a wide range of activities. Predicting hardware failures in a cloud data center can minimize downtime and make the system m...
详细信息
The development of Deepfakes has become more prevalent with the rise of Generative Adversarial Networks (GANs). Deepfakes are synthetically created, modified images that have been made to look real;they pose severe so...
详细信息
The solid–liquid interface energy anisotropy of Zn alloys remains poorly understood. Recently, characteristic 14-arm dendritic growth has been observed using time-resolved X-ray computed tomography at SPring-8 during...
详细信息
Given the severity of waste pollution as a major environmental concern, intelligent and sustainable waste management is becoming increasingly crucial in both developed and developing countries. The material compositio...
详细信息
Pulsed current cathodic protection(PCCP) could be more effective than direct current cathodic protection(DCCP)for mitigating corrosion in buried structures in the oil and gas industries if appropriate pulsed parameter...
详细信息
Pulsed current cathodic protection(PCCP) could be more effective than direct current cathodic protection(DCCP)for mitigating corrosion in buried structures in the oil and gas industries if appropriate pulsed parameters are chosen. The purpose of this research is to present the corrosion prevention mechanism of the PCCP technique by taking into account the effects of duty cycle as well as frequency, modeling the relationships between pulse parameters(frequency and duty cycle) and system outputs(corrosion rate, protective current and pipe-to-soil potential) and finally identifying the most effective protection conditions over a wide range of frequency(2–10 kHz) and duty cycle(25%-75%). For this, pipe-to-soil potential, pH, current and power consumption, corrosion rate, surface deposits and investigation of pitting corrosion were taken into account. To model the input-output relationship in the PCCP method, a data-driven machine learning approach was used by training an artificial neural network(ANN). The results revealed that the PCCP system could yield the best protection conditions at 10 kHz frequency and 50% duty cycle, resulting in the longest protection length with the lowest corrosion rate at a consumption current 0.3 time that of the DCCP method. In the frequency range of 6–10 kHz and duty cycles of 50%-75%, SEM images indicated a uniform distribution of calcite deposits and no pits on cathode surface.
Today's deep learning models face an increasing demand to handle dynamic shape tensors and computation whose shape information remains unknown at compile time and varies in a nearly infinite range at runtime. This...
详细信息
Today's deep learning models face an increasing demand to handle dynamic shape tensors and computation whose shape information remains unknown at compile time and varies in a nearly infinite range at runtime. This shape dynamism brings tremendous challenges for existing compilation pipelines designed for static models which optimize tensor programs relying on exact shape values. This paper presents TSCompiler, an end-to-end compilation framework for dynamic shape models. TSCompiler first proposes a symbolic shape propagation algorithm to recover symbolic shape information at compile time to enable subsequent optimizations. TSCompiler then partitions the shape-annotated computation graph into multiple subgraphs and fine-tunes the backbone operators from the subgraph within a hardware-aligned search space to find a collection of high-performance schedules. TSCompiler can propagate the explored backbone schedule to other fusion groups within the same subgraph to generate a set of parameterized tensor programs for fused cases based on dependence analysis. At runtime, TSCompiler utilizes an occupancy-targeted cost model to select from pre-compiled tensor programs for varied tensor shapes. Extensive evaluations show that TSCompiler can achieve state-of-the-art speedups for dynamic shape models. For example, we can improve kernel efficiency by up to 3.97× on NVIDIA RTX3090, and 10.30× on NVIDIA A100 and achieve up to five orders of magnitude speedups on end-to-end latency.
The earlier research clearly indicated that the bimodal authentication system has more efficiency than unimodal and multimodal. This is due to the reason for the best intact biometric traits of fingerprint and retina....
详细信息
暂无评论