Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple ...
详细信息
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple *** different programming paradigms,such as Message Passing Interface(MPI),Open Multiple Processing(OpenMP),and Open Accelerators(OpenACC),can increase computation speed and improve *** the integration of multiple models,the probability of runtime errors increases,making their detection difficult,especially in the absence of testing techniques that can detect these *** studies have been conducted to identify these errors,but no technique exists for detecting errors in three-level programming *** the increasing research that integrates the three programming models,MPI,OpenMP,and OpenACC,a testing technology to detect runtime errors,such as deadlocks and race conditions,which can arise from this integration has not been ***,this paper begins with a definition and explanation of runtime errors that result fromintegrating the three programming models that compilers cannot *** the first time,this paper presents a classification of operational errors that can result from the integration of the three *** paper also proposes a parallel hybrid testing technique for detecting runtime errors in systems built in the C++programming language that uses the triple programming models MPI,OpenMP,and *** hybrid technology combines static technology and dynamic technology,given that some errors can be detected using static techniques,whereas others can be detected using dynamic *** hybrid technique can detect more errors because it combines two distinct *** proposed static technology detects a wide range of error types in less time,whereas a portion of the potential errors that may or may not occur depending on the 4502 CMC,2023,vol.74,no.2 operating environme
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
The use of laptops is now increasingly widespread. However, many still need to realize that using laptops with inappropriate attitudes and lighting can cause fatigue and damage to the eyes. Using a laptop for a long t...
详细信息
Soldering irons are a hand tool that is indispensable in the process of making small series of electronic devices. Soldering irons have evolved from very simple devices without temperature control to devices with comp...
详细信息
Transformer models have emerged as dominant networks for various tasks in computer vision compared to Convolutional Neural Networks(CNNs).The transformers demonstrate the ability to model long-range dependencies by ut...
详细信息
Transformer models have emerged as dominant networks for various tasks in computer vision compared to Convolutional Neural Networks(CNNs).The transformers demonstrate the ability to model long-range dependencies by utilizing a self-attention *** study aims to provide a comprehensive survey of recent transformerbased approaches in image and video applications,as well as diffusion *** begin by discussing existing surveys of vision transformers and comparing them to this ***,we review the main components of a vanilla transformer network,including the self-attention mechanism,feed-forward network,position encoding,*** the main part of this survey,we review recent transformer-based models in three categories:Transformer for downstream tasks,Vision Transformer for Generation,and Vision Transformer for *** also provide a comprehensive overview of recent transformer models for video tasks and diffusion *** compare the performance of various hierarchical transformer networks for multiple tasks on popular benchmark ***,we explore some future research directions to further improve the field.
Investing in cybersecurity is increasingly considered a significant area and aspect a business or organisation should seriously consider. Some of these security solutions are network-based and provide many levels of p...
详细信息
Cloud computing is a computing service done not on a local device but an internet connection to a data centre infrastructure. The cloud computing system also provides a scalability solution where cloud computing can i...
详细信息
Multimode fibers hold great promise to advance data rates in optical communications but come with the challenge to compensate for modal crosstalk and mode-dependent losses,resulting in strong *** holographic measureme...
详细信息
Multimode fibers hold great promise to advance data rates in optical communications but come with the challenge to compensate for modal crosstalk and mode-dependent losses,resulting in strong *** holographic measurement of the transmission matrix enables not only correcting distortions but also harnessing these effects for creating a confidential data connection between legitimate communication parties,Alice and *** feasibility of this physical-layer-security-based approach is demonstrated experimentally for the first time on a multimode fiber link to which the eavesdropper Eve is physically *** the proper structured light field is launched at Alice’s side,the message can be delivered to Bob,and,simultaneously,the decipherment for an illegitimate wiretapper Eve is *** a real communication scenario,we implement wiretap codes and demonstrate confidentiality by quantifying the level of *** to an uncoded data transmission,the amount of securely exchanged data is enhanced by a factor of *** complex light transportation phenomena that have long been considered limiting and have restricted the widespread use of multimode fiber are exploited for opening new perspectives on information security in spatial multiplexing communication systems.
With the rapid development of Large Language Model (LLM) technology, it has become an indispensable force in biomedical data analysis research. However, biomedical researchers currently have limited knowledge about LL...
详细信息
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syn...
详细信息
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syntax,it is hard for the developers to write correctly due to lacking knowledge of the mathematical foundations of the first-order logic,which is approximately half accurate at the first stage of devel-opment.A deep neural network named DeepOCL is proposed,which takes the unre-stricted natural language as inputs and automatically outputs the best-scored OCL candidates without requiring a domain conceptual model that is compulsively required in existing rule-based generation *** demonstrate the validity of our proposed approach,ablation experiments were conducted on a new sentence-aligned dataset named *** experiments show that the proposed DeepOCL can achieve state of the art for OCL statement generation,scored 74.30 on BLEU,and greatly outperformed experienced developers by 35.19%.The proposed approach is the first deep learning approach to generate the OCL expression from the natural *** can be further developed as a CASE tool for the software industry.
暂无评论