Information communications technology (ICT) refers to the technology used for communication and managing information must be utilized to enhance the environment, economics, mobility, and governance, among other facets...
详细信息
MRI and CT images are widely utilized for detecting tumors in internal organs. However, accurately distinguishing tumors using these images only, poses a challenge. This demands human expertise to effectively mark tum...
详细信息
In this paper, we have proposed a multi-task learning model for multi-lingual Optical Character Recognition. Our model does the script identification and text recognition simultaneously of offline machine printed docu...
详细信息
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent...
详细信息
Airplanes are a social necessity for movement of humans,goods,and *** are generally safe modes of transportation;however,incidents and accidents occasionally *** prevent aviation accidents,it is necessary to develop a...
详细信息
Airplanes are a social necessity for movement of humans,goods,and *** are generally safe modes of transportation;however,incidents and accidents occasionally *** prevent aviation accidents,it is necessary to develop a machine-learning model to detect and predict commercial flights using automatic dependent surveillance–broadcast *** study combined data-quality detection,anomaly detection,and abnormality-classification-model *** research methodology involved the following stages:problem statement,data selection and labeling,prediction-model development,deployment,and *** data labeling process was based on the rules framed by the international civil aviation organization for commercial,jet-engine flights and validated by expert commercial *** results showed that the best prediction model,the quadratic-discriminant-analysis,was 93%accurate,indicating a“good fit”.Moreover,the model’s area-under-the-curve results for abnormal and normal detection were 0.97 and 0.96,respectively,thus confirming its“good fit”.
Hybrid memory systems composed of dynamic random access memory(DRAM)and Non-volatile memory(NVM)often exploit page migration technologies to fully take the advantages of different memory *** previous proposals usually...
详细信息
Hybrid memory systems composed of dynamic random access memory(DRAM)and Non-volatile memory(NVM)often exploit page migration technologies to fully take the advantages of different memory *** previous proposals usually migrate data at a granularity of 4 KB pages,and thus waste memory bandwidth and DRAM *** this paper,we propose Mocha,a non-hierarchical architecture that organizes DRAM and NVM in a flat address space physically,but manages them in a cache/memory *** the commercial NVM device-Intel Optane DC Persistent Memory Modules(DCPMM)actually access the physical media at a granularity of 256 bytes(an Optane block),we manage the DRAM cache at the 256-byte size to adapt to this feature of *** design not only enables fine-grained data migration and management for the DRAM cache,but also avoids write amplification for Intel Optane *** also create an Indirect Address Cache(IAC)in Hybrid Memory Controller(HMC)and propose a reverse address mapping table in the DRAM to speed up address translation and cache ***,we exploit a utility-based caching mechanism to filter cold blocks in the NVM,and further improve the efficiency of the DRAM *** implement Mocha in an architectural *** results show that Mocha can improve application performance by 8.2%on average(up to 24.6%),reduce 6.9%energy consumption and 25.9%data migration traffic on average,compared with a typical hybrid memory architecture-HSCC.
Nowadays,cloud computing provides easy access to a set of variable and configurable computing resources based on user demand through the *** computing services are available through common internet protocols and netwo...
详细信息
Nowadays,cloud computing provides easy access to a set of variable and configurable computing resources based on user demand through the *** computing services are available through common internet protocols and network standards.n addition to the unique benefits of cloud computing,insecure communication and attacks on cloud networks cannot be *** are several techniques for dealing with network *** this end,network anomaly detection systems are widely used as an effective countermeasure against network *** anomaly-based approach generally learns normal traffic patterns in various ways and identifies patterns of *** anomaly detection systems have gained much attention in intelligently monitoring network traffic using machine learning *** paper presents an efficient model based on autoencoders for anomaly detection in cloud computing *** autoencoder learns a basic representation of the normal data and its reconstruction with minimum ***,the reconstruction error is used as an anomaly or classification *** addition,to detecting anomaly data from normal data,the classification of anomaly types has also been *** have proposed a new approach by examining an autoencoder's anomaly detection method based on data reconstruction *** the existing autoencoder-based anomaly detection techniques that consider the reconstruction error of all input features as a single value,we assume that the reconstruction error is a *** enables our model to use the reconstruction error of every input feature as an anomaly or classification *** further propose a multi-class classification structure to classify the *** use the CIDDS-001 dataset as a commonly accepted dataset in the *** evaluations show that the performance of the proposed method has improved considerably compared to the existing ones in terms of accuracy,recall,false-positive rate,and F1-score
The success of Internet of Things (IoT) services will be determined by how the security of the IoT devices and the networks to which they are connected can be guaranteed. Integrating biometric recognition technology i...
详细信息
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the ...
详细信息
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the longitudinal OAM and the transverse OAM carried by a three-dimensional(3D)spatiotemporal optical vortex(STOV)in the process of tight *** 3D STOV possesses orthogonal OAMs in the x-y,t-x,and y-t planes,and is preconditioned to overcome the spatiotemporal astigmatism effect.x,y,and t are the axes in the spatiotemporal *** corresponding focused wavepacket is calculated by employing the Debye diffraction theory,showing that a phase singularity ring is generated by the interactions among the transverse and longitudinal vortices in the highly confined *** Fourier-transform decomposition of the Debye integral is employed to analyze the mechanism of the orbit-orbit *** is the first revelation of coupling between the longitudinal OAM and the transverse OAM,paving the way for potential applications in optical trapping,laser machining,nonlinear light-matter interactions,and more.
Optimizing therapy and rehabilitation for Parkinson's disease (PD) requires early identification and precise evaluation of the illness's course. However, there is disagreement about the best way to use gait an...
详细信息
暂无评论