The probabilistic bit (P-bit) is the core of probabilistic computing. We propose a novel in-situ P-bit compatible with compute-in-memory (CIM) schemes using voltage-controlled magnetic tunnel junctions (MTJs) to elimi...
详细信息
This paper aims in analyzing the performance of the New Radio (NR) technology introduced by the Third Generation Partnership Project (3GPP) for Vehicle-to-everything (V2X) communication. The NR system is believed to b...
详细信息
This paper aims in analyzing the performance of the New Radio (NR) technology introduced by the Third Generation Partnership Project (3GPP) for Vehicle-to-everything (V2X) communication. The NR system is believed to be a complementary service for the already existing Long Term Evolution (LTE) Cellular-vehicle-to-everything (C-V2X) for advanced services in vehicular communications. The 5th generation (5G) NR systems are believed to outperform LTE C-V2X in terms of providing high throughput, low latency, and high reliability in dense traffic situations. Our aim in this paper is to implement and analyze the 5G NR V2X open source module in network simulation-3 (ns-3) and then to demonstrate the NR V2X performance in terms of different key performance indicators by varying a number of situations, including transmit power, communication range, packet size and sub-carrier spacing in the broadcast channel.
Microservice architecture is getting increasingly popular in recent years for building web-based systems. Finding runtime anomalies in such systems is crucial for improving their reliability. For this purpose, existin...
Microservice architecture is getting increasingly popular in recent years for building web-based systems. Finding runtime anomalies in such systems is crucial for improving their reliability. For this purpose, existing AIOps research has proposed various machine learning-based algorithms. However, a common limitation of existing algorithms is that they are sensitive to the settings of thresholds for anomaly identification when dealing with the high-dimensional multivariate time series data collected by monitoring the running instances of microservices. As a result, the performance of anomaly detection can be easily influenced by threshold changes. To tackle this problem, we propose a new anomaly detection framework called COAD (Combinatorial Optimization enhanced Anomaly Detection), which can work with various anomaly detection algorithms and enhance their detection process by performing real-time feature selection via metaheuristic algorithms. We have evaluated our method on three different testbeds based on a representative microservice system open-sourced by Google. The results show that real-time feature selection can significantly reduce the underlying algorithms' sensitivity to threshold settings (142% reduction on average). At the same time, the best anomaly detection performance (evaluated by f1-score) is improved by 5.67% on average. These results demonstrate the effectiveness and potential usefulness of the approach.
The paper presented an intuitive control system using electromyography (EMG) data that is obtained from the Myo gesture control armband. The aim of this study is to enable users to control multiple devices with a sing...
详细信息
Pedestrian detection is a critical task in computer vision with the aim of accurately identifying pedestrians in images or video frames. In this work, we tackle the issue of enhancing pedestrian detection precision wh...
详细信息
ISBN:
(纸本)9798350371406
Pedestrian detection is a critical task in computer vision with the aim of accurately identifying pedestrians in images or video frames. In this work, we tackle the issue of enhancing pedestrian detection precision while reducing processing time. To achieve this, we propose a novel technique called Softsign Gaussian Deep Belief Neural Network (SGDBNN) for pedestrian detection. The proposed SGDBNN technique leverages the power of recurrent deep neural networks to handle the complexities of pedestrian detection. The input layer receives images as input, which are then processed in the hidden layer. Here, a Gaussian activation function is employed to extract relevant features, effectively detecting pedestrian objects in the images. The incorporation of deep learning and recurrent behavior in the neural networks results in reduced incorrect classifications, leading to a lower false positive rate and improved pedestrian detection accuracy. The softsign activation function at the hidden layer allows the proposed technique to efficiently compare extracted features with pre-stored templates, enabling effective pedestrian identification in the images. By effectively utilizing the recurrent behavior and advanced activation functions, the SGDBNN demonstrates superior performance compared to existing methods, such as Deep Convolutional Neural Networks and Extended Deep Model. Experimental evaluations illustrate the effectiveness of the proposed SGDBNN technique. It achieves a significant increase in Positive Detection Accuracy (PDA) of up to 20% and 16%, while simultaneously reducing the False Positive Rate (FPR) by up to 18% and 3% compared to existing Deep Convolutional Neural Networks and Extended Deep Model, respectively. Additionally, the proposed SGDBNN reduces training time by up to 30% and 12% and decreases memory requirements by up to 47% and 30% when compared to existing Deep Convolutional Neural Networks and Extended Deep Model, respectively. Likewise, the SGDBNN tec
Modeling and predicting the performance of students in collaborative learning paradigms is an important task. Most of the research presented in literature regarding collaborative learning focuses on the discussion for...
详细信息
The sixth-generation (6G) wireless communication networks are envisioned to deliver improved Quality of Services (QoS) such as data-rate, latency, localization, etc., compared to 5G services. This demand will mainly a...
详细信息
In recent years, the data-driven electricity theft detection methods integrated with edge cloud computing [1, 2] have not only demonstrated superior detection accuracy but also improved efficiency, making them viable ...
详细信息
In recent years, the data-driven electricity theft detection methods integrated with edge cloud computing [1, 2] have not only demonstrated superior detection accuracy but also improved efficiency, making them viable alternatives to indoor inspections. Energy service providers(ESPs) typically manage regions by dividing them into various transformer districts(TDs). The detection of electricity theft in a particular region is performed by the associated TD,
Previous graph neural networks (GNNs) usually assume that the graph data is with clean labels for representation learning, but it is not true in real applications. In this paper, we propose a new multi-teacher distill...
详细信息
This paper introduces an enhanced version of the Capuchin Search Algorithm (CapSA) called ECapSA. CapSA draws inspiration from the collective intelligence of Capuchin monkeys and has shown success in solving real-worl...
This paper introduces an enhanced version of the Capuchin Search Algorithm (CapSA) called ECapSA. CapSA draws inspiration from the collective intelligence of Capuchin monkeys and has shown success in solving real-world problems. However, it may encounter challenges handling complex optimization tasks, such as premature convergence or being trapped in local optima. ECapSA employs a local escaping mechanism operating the abandonment limit concept to exploit potential solutions and introduce diversification trends. Additionally, the ECapSA algorithm is improved by integrating the principles of the cooperative island model, resulting in the iECapSA. This modification enables better management of population diversity and a more optimal balance between exploration and exploitation. The efficiency of iECapSA is validated through a series of experiments, including the IEEE-CEC2014 benchmark functions and training the feedforward neural network (FNN) on seven biomedical datasets. The performance of iECapSA is compared to other metaheuristic techniques, namely differential evolution (DE), sine cosine algorithm (SCA), and whale optimization algorithm (WOA). The results of the comparative study demonstrate that iECapSA is a strong contender and surpasses other training algorithms in most datasets, particularly in terms of its ability to avoid local optima and its improved convergence speed.
暂无评论