Management of data backup and restore in case of emergency is a crucial process in every organization. This paper discusses an effective database recovery technique called Point In Time Recovery (PITR) in postgreSQL d...
详细信息
There is an increasing interest in hardware accelerators, both in academia and industry. The industry invests in application-level accelerators, like Graphics Processing Units (GPUs) or Field programmable Gate Array (...
详细信息
ISBN:
(纸本)9781665464642
There is an increasing interest in hardware accelerators, both in academia and industry. The industry invests in application-level accelerators, like Graphics Processing Units (GPUs) or Field programmable Gate Array (FPGA) accelerators connected to the PCIe bus. Hardware accelerators outperform general purpose Central Processing Units (CPUs) in terms of power consumption and performance. Hardware accelerators seek to optimize arithmetic operations, since it is the heart of the computation circuitry in different algorithms and applications. In this context, posit is proposed to replace IEEE Standard 754-2008 floating point and offers more efficient arithmetic units in terms of accuracy and Power-Performance-Area (PPA) matrix. In this paper, we introduce a low power Verilog HDL design and implementation of Posit Arithmetic Unit (PAU) for efficient hardware accelerators. Our regular proposed PAU is synthesized on Xilinx ZYNQ-7000. The results show34% area improvement and 14% power saving, while our compact PAU achieves 25% area reduction and 45% power saving.
作者:
Shang, JunLi, YuzheChen, TongwenTongji University
Department of Control Science and Engineering Shanghai Institute of Intelligent Science and Technology National Key Laboratory of Autonomous Intelligent Unmanned Systems Frontiers Science Center for Intelligent Autonomous Systems Shanghai200092 China Northeastern University
State Key Laboratory of Synthetical Automation for Process Industries Shenyang110004 China University of Alberta
Department of Electrical and Computer Engineering EdmontonABT6G 1H9 Canada
This paper investigates stealthy attacks on sampled-data control systems, where a continuous process is sampled periodically, and the resultant discrete output and control signals are transmitted through dual channels...
详细信息
With the popularity of e-learning,personalization and ubiquity have become important aspects of online *** make learning more personalized and ubiquitous,we propose a learner model for a query-based personalized learn...
详细信息
With the popularity of e-learning,personalization and ubiquity have become important aspects of online *** make learning more personalized and ubiquitous,we propose a learner model for a query-based personalized learning recommendation *** contextual attributes characterize a learner,but considering all of them is costly for a ubiquitous learning *** this paper,a set of optimal intrinsic and extrinsic contexts of a learner are identified for learner modeling.A total of 208 students are ***(Decision Making Trial and Evaluation Laboratory)technique is used to establish the validity and importance of the identified contexts and find the interdependency among *** acquiring methods of these contexts are also *** the basis of these contexts,the learner model is designed.A layered architecture is presented for interfacing the learner model with a query-based personalized learning recommendation *** a ubiquitous learning scenario,the necessary adaptive decisions are identified to make a personalized recommendation to a learner.
Detection. Watermarking techniques can be classified based on various criteria, such as visibility, fragility, application domain, and extraction methods. However, their performance degrades against certain forgery at...
详细信息
ISBN:
(数字)9798331519513
ISBN:
(纸本)9798331519520
Detection. Watermarking techniques can be classified based on various criteria, such as visibility, fragility, application domain, and extraction methods. However, their performance degrades against certain forgery attacks due to specific algorithmic loopholes. To deal with this issue, an in-depth performance evaluation and gap analysis of the latest invisible image watermarking schemes is presented in this paper. Then we propose an enhancement in terms of defining and using secret keys for the process of watermarking to improve temper detection and its localization against forgery attacks. First comprehensive testing is conducted regarding the imperceptibility and temper detection capability of these watermarking schemes against copy-paste, object deletion, text addition, and collage attacks. This testing results in finding the security weaknesses against collage attacks. Finally, we implemented the proposed enhancement and illustrated improved results up-to 99% in terms of localizing forgery detection in certain scenarios of collage attacks enhancement.
Diagnosis and evaluation of Parkinson’s disease (PD) by clinicians is normally dependent on several established clinical criteria. Measuring the severity level according to these criteria depends heavily on the docto...
详细信息
Cognitive agents should be equipped with computational methods enabling autonomous formation and management of their internal cognitive structures. Moreover, due to social nature of multiagent systems a dedicated subs...
详细信息
Cognitive agents should be equipped with computational methods enabling autonomous formation and management of their internal cognitive structures. Moreover, due to social nature of multiagent systems a dedicated subsystem is required to allow for establishing common structures allowing for successful interaction between agents. Current implementation tend to use shared and predefined system-wide ontologies, thus limiting the fexibility and autonomy of individual agents. In this research, we focus on an approach that can remove this dependency by allowing the agents to maintain individual internal ontologies and map them to internal ontologies exploited by other agents. In particular, we propose a general strategy in which agent engages in an interplay that enables determination of certain types of relation between concepts. Further, we focus on one of the initial steps of this strategy, namely, determination of the representative set of exemplars for basic-level categories, which is utilised during the interplay and serves as the baseline to identify the mapping.
The use of Artificial intelligence (AI) technology in the content creation to produce creative aspects like editing, audience analysis, creating ideas, writing copy, etc. The major aim is to streamline and automate th...
详细信息
ISBN:
(数字)9798331505530
ISBN:
(纸本)9798331505547
The use of Artificial intelligence (AI) technology in the content creation to produce creative aspects like editing, audience analysis, creating ideas, writing copy, etc. The major aim is to streamline and automate the process of content creation and convert it into a more efficient and effective way. There is a lack of transparency in the AI content production process and hence it does not exactly mimic human activities, which includes fantasizing and picking up new abilities. AI content creation requires more creativity while investigating with a specific goal in mind. Although, AI faces many challenges since it constantly expands its base knowledge. One of the biggest ethical problems is the probability that AI content is used to deceive or influence people. Hence, to overcome these difficulties a machine learning-based Artificial Intelligent content creation framework is generated for content creation in Ad-supported TV. Here, an effective model Generative Adversarial Network (GAN) introduced to deliver enterprise data, customize descriptions, and adjust content based on consumer behaviors. This developed model produces material that is closely related to the preferences of the user. AI content creation increases efficiency and productivity by saving time and money. It also leads to the development of better content. Finally, the experimental analysis is performed to find the effectiveness of the developed deep learning-based AI content creation framework via various metrics.
This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. The main disadvantage of calculations on quantum co...
详细信息
Considering non-stationary environments in online optimization enables decision-maker to effectively adapt to changes and improve its performance over time. In such cases, it is favorable to adopt a strategy that mini...
详细信息
暂无评论