One of the major environmental issues that the world is currently facing is sea erosion, which requires an innovative solution for early detection and mitigation. Our paper focuses on the integrated system that combin...
详细信息
This paper constructs a simulated CPU assembly line robot system. The system incorporates binocular structured light vision technology for CPU recognition and localization. The reflective surface of the CPU poses a si...
详细信息
This paper presents the methodologies implemented for the Automatic Speech Recognition and Machine Translation for the language pairs Bhojpuri-Hindi and Marathi-Hindi for the Dialectal and Low-Resource shared task pro...
详细信息
Hyperspectral image has large size due to abundance of spectral bands preventing efficient storage and transmission in real-time applications. This paper introduces a 3dimensional convolutional autoencoder (CAE) for h...
详细信息
The increase in the volume of vehicles utilizing our roads has highlighted the seriousness of the ongoing problem of traffic congestion. This problem is even worse at intersections, where a line of cars waits patientl...
详细信息
Transient execution attacks like Spectre and its vari-Ants can cause information leakage through a cache hierarchy. There are two classes of techniques that mitigate speculative execution attacks: delay-based and invi...
详细信息
ISBN:
(纸本)9798350350579
Transient execution attacks like Spectre and its vari-Ants can cause information leakage through a cache hierarchy. There are two classes of techniques that mitigate speculative execution attacks: delay-based and invisible speculation. Invisible speculation-based techniques like GhostMinion are the high-performing yet secure techniques that mitigate all kinds of spec-ulative execution attacks. Similar to a cache system, hardware prefetchers can also cause speculative information leakage. To mitigate it, GhostMinion advocates on-commit prefetching on top of strictness ordering in the cache system. Our experiments show that the GhostMinion cache system interacts negatively with the hardware prefetchers leading to redundant traffic between different levels of cache. This traffic causes contention and increases the miss latency leading to performance loss. Next, we observe that on-commit prefetching enforced by GhostMinion leads to nerformance loss as it affects the prefetcher timeliness. We perform the first thorough analysis of the interaction between state-of-The-Art prefetching techniques and the secure cache system. Based on this, we propose two microarchitectural solutions that ensure high performance while designing secure prefetchers on top of secure cache system. The first solution detects and filters redundant traffic when updating the cache hierarchy non-speculatively. The second solution ensures the timeliness of the prefetcher to compensate for the delayed triggering of prefetch requests at commit, resulting in a secure yet high-performing prefetcher. Overall, our enhancements are secure and provide synergistic interactions between hardware prefetchers and a secure cache system. Our experiments show that our filter consistently improves the performance of secure cache systems like GhostMinion in the presence of state-of-The-Art prefetchers (by 1.9% for single-core and 19.0% for multi-core for the top-performing prefetcher). We see a synergistic behavior of
In this paper, design and implementation of a 2D graphics processing hardware unit using FPGA for educational purpose is presented. We propose a more simple & minimalist GPU architecture, which is flexible and eas...
详细信息
In complex network analysis, identifying the viral nodes is a major concern of the research domain by which any kind of information or infection is controlled throughout the entire network. Several algorithms have bee...
详细信息
ISBN:
(纸本)9798350383119
In complex network analysis, identifying the viral nodes is a major concern of the research domain by which any kind of information or infection is controlled throughout the entire network. Several algorithms have been developed over the past few years to identify the viral nodes (influential spreaders) considering many properties of the network. Among them, some authors proposed gravity-based centrality to identify the vital nodes based on the law of gravity with certain limitations. The major limitation of existing gravity-based methods is the mass of the object (i.e. node) is considered as the degree or kshell index only, which does not always signify the spreading ability of the nodes. To address this research challenge, we propose an innovative Local Closeness Gravity method (named LCG) to measure the influential ability of individual nodes, facilitating the identification of the vital nodes in the network. To minimize the computational complexity of Closeness centrality, at first, we measure the local Closeness centrality of individual nodes considering all the nodes residing in the truncation radius. Thereafter we introduce a new parameter 'information sharing ability' based on connectivity strength to measure the distance between the nodes. Finally, the influential ability of each node is measured based on the gravity model considering the local closeness centrality, kshell index, and the distance. The efficiency of LCG is compared with the existing baseline centrality methods by using the Susceptible-Infectious-Recovered (SIR) simulator. The correlation between the LCG method and the baseline centrality methods with the SIR method is compared by Kendalls' tau method considering various infection probabilities and various percentages of seed nodes respectively. The ranking uniqueness of the LCG method and the baseline centrality methods are also measured by the monotonicity metrics. Through the obtained results and various analyses, it becomes evident that t
Epilepsy, a neurological disorder characterized by recurrent and unpredictable seizures, demands timely and accurate detection for effective management and patient safety. While traditional machine learning approaches...
详细信息
Implicit neural representations (INRs) have emerged as a powerful tool in learning 3D geometry, offering unparalleled advantages over conventional representations like mesh-based methods. A common type of INR implicit...
详细信息
暂无评论