Users of microblogs such as Twitter publish messages about many topics including real world events. Patterns can be identified and used to classify events from these messages. It is challenging to summarize the event ...
详细信息
After the successful change over from the single core to multi-core processors, the designers are now thinking to place hundreds or even thousands of cores on a single chip. But this practice may lead to many basic an...
详细信息
ISBN:
(纸本)9781615676606
After the successful change over from the single core to multi-core processors, the designers are now thinking to place hundreds or even thousands of cores on a single chip. But this practice may lead to many basic and fundamental restrictions like interconnection of cores, memory size and its access patterns, cache design, number of cache levels etc. In this paper a study related to cache design is presented for multiple cores. Instead of the present three levels cache system, a binary tree based multi level cache system is proposed. Two possible implementations of this model LogN+1 and logN are studied. The important performance matrices like access time and the probability to find the data at different levels of caches is calculated. On the comparison it is found that the proposed tree based multi level cache system works much better for higher number of cores. And the performance gain increases as the number of cores increases. The probability of finding the data at L1 and L2 is found much greater than present three level cache system. And these results found true for the both LogN+1 and LogN configurations.
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
Network lifetime, scalability and load balancing are important requirements for data gathering sensor network applications. A major issue is the technique used for data collection and data gathering. Many protocols we...
详细信息
ISBN:
(纸本)9789881404749
Network lifetime, scalability and load balancing are important requirements for data gathering sensor network applications. A major issue is the technique used for data collection and data gathering. Many protocols were introduced for better performance. LEACH, PEGASIS and TREEPSI were used as established energy-efficient routing protocols. This paper proposes as efficient approach for data collection in wireless sensor networks by introducing an energy efficient priority algorithm (EEPA) model, which is a hybrid model, derived from a combination of LEACH and Member Forward List technique to enhance the cluster-head selection process. This priority algorithm model list includes the nodes with highest priority for forwarding the data. When a node fails or dies, this list is used to select the next node with higher priority. The EEPA prevents the traditional LEACH algorithm cluster-head selection algorithm from repeating when a node fails or dies. The result show that EEPA decreases power consumption and energy loss in wireless sensor networks.
There are some problems to be resolved for speech emotion recognition, such as the dimension of feature sets is usually too high and the redundancy among various features is relatively stronger. Considering these prob...
详细信息
Residential solar installations are becoming increasingly popular among homeowners. However, renters and homeowners living in shared buildings cannot go solar as they do not own the shared spaces. Community-owned sola...
详细信息
Web services and their underlying system grow over time and need to be retested whenever there is a change. This is essential for ensuring uncompromised quality. If we have modified only a small part of the system, it...
详细信息
作者:
Mahesh, T.R.Sinha, Deepak Kumar
Faculty of Engineering and Technology Department of Computer Science and Engineering Bangalore India
Predicting a user's location based on their social media profiles is an active area of study right now. For many years, researchers have tried to figure out how to automatically recognise a location based on its a...
详细信息
作者:
Mathur, AshwiniBabu, S. Anantha
Faculty of Engineering and Technology Department of Computer Science and Engineering Bangalore India
An Internet of Things (IoT) appears to be an innovative technology with great potential for widespread development. There has been a rise in data security issues in recent years as a consequence of various technologic...
详细信息
In today's society, proper safety procedures must be introduced in schools and workplaces. This study changes an industrial safety concept that can be utilised in households and businesses. Installing gas leak det...
详细信息
暂无评论