In this study, we integrate the Bidirectional Encoder Representations from Transformers (BERT) model with the Cycle Generative Adversarial Network (CycleGAN) to create a system for Chinese text style transfer. Natural...
详细信息
The use of high-penetration solar photovoltaics (PV) to transmission networks is complicated by voltage rise. Infractions of voltage occur when voltage levels surpass the permitted limits. Several solutions have been ...
详细信息
Aerial access networks have been envisioned as a promising 6G solution to enhance the ground communication systems in both coverage and capacity. To better utilize the spectrum and fully explore different channel char...
详细信息
Aerial access networks have been envisioned as a promising 6G solution to enhance the ground communication systems in both coverage and capacity. To better utilize the spectrum and fully explore different channel characteristics, this paper constructs an integrated network comprising the High Altitude Platform(HAP) and Unmanned Air Vehicles(UAVs) with the NonOrthogonal Multiple Access(NOMA) technology. In order to improve the transmission quality of images and videos, a power management scheme is proposed to minimize the distortion of the transmissions from the HAP and UAVs to the terminals. The power control is formulated as a non-convex problem constrained by the maximal transmit power and the minimal terminal rate requirements. The variable substitution and the first-order Tailor’s expansion is used to transform it into a sequence of convex problems, which are subsequently solved through the gradient projection method. Simulation demonstrates the signal distortion and error rate improvement achieved by the proposed algorithm.
Software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit...
详细信息
Software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining ***,these tools suffer from some *** terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search ***,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information *** this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation *** leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion *** combination allows for the unified handling of binary programs across various architectures,compilers,and compilation ***,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)***,the graph embedding network is utilized to evaluate the similarity of program *** on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target *** solved content serves as the initial seed for targeted *** binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity *** approach facilitates
Minimizing the energy consumption to increase the life span and performance of multiprocessor system on chip(MPSoC)has become an integral chip design issue for multiprocessor *** performance measurement of computation...
详细信息
Minimizing the energy consumption to increase the life span and performance of multiprocessor system on chip(MPSoC)has become an integral chip design issue for multiprocessor *** performance measurement of computational systems is changing with the advancement in *** to shrinking and smaller chip size power densities onchip are increasing rapidly that increasing chip temperature in multi-core embedded *** operating speed of the device decreases when power consumption reaches a threshold that causes a delay in complementary metal oxide semiconductor(CMOS)circuits because high on-chip temperature adversely affects the life span of the *** this paper an energy-aware dynamic power management technique based on energy aware earliest deadline first(EA-EDF)scheduling is proposed for improving the performance and reliability by reducing energy and power consumption in the system on chip(SOC).Dynamic power management(DPM)enables MPSOC to reduce power and energy consumption by adopting a suitable core configuration for task *** migration avoids peak temperature values in the multicore *** utilization factor(ui)on central processing unit(CPU)core consumes more energy and increases the temperature *** technique switches the core bymigrating such task to a core that has less temperature and is in a low power *** proposed EA-EDF scheduling technique migrates load on different cores to attain stability in temperature among multiple cores of the CPU and optimized the duration of the idle and sleep periods to enable the low-temperature *** effectiveness of the EA-EDF approach reduces the utilization and energy consumption compared to other existing methods and *** simulation results show the improvement in performance by optimizing 4.8%on u_(i) 9%,16%,23%and 25%at 520 MHz operating frequency as compared to other energy-aware techniques for MPSoCs when the least number of tasks is in running state and can
Distributed denial-of-service (DDoS) attacks are a common and increasing threat to online services, targeting multiple layers of the OSI model. As communication technology advances, these attacks are getting more freq...
详细信息
It is well known that in one-dimensional(1D) crystalline insulators,the electric polarization is a manifestation of Berry phase,which can not be quantized by time-reversal symmetry(TRS) as in Hermitian physics TRS doe...
详细信息
It is well known that in one-dimensional(1D) crystalline insulators,the electric polarization is a manifestation of Berry phase,which can not be quantized by time-reversal symmetry(TRS) as in Hermitian physics TRS does not induce any topological phase in one *** this paper we report that even though associated with complex eigenenergies a 1D non-Hermitian insulator obeying only TRS is capable of presenting quantized bulk *** underlying physical reason is unveiled:TRS guarantees the complex energies to come in pair(E,E*),and the corresponding decaying and amplifying wave functions also come in pair and have the same variation rate,hence,giving rise to a stable wannier *** electron transport is performed by means of charge pumping process,which verifies the physical mechanism *** last,we discuss the possible experimental implementation of the proposed model by means of twisted-π gauge flux.
Serving generative inference of the large language model is a crucial component of contemporary AI applications. This paper focuses on deploying such services in a heterogeneous and cross-datacenter setting to mitigat...
详细信息
Serving generative inference of the large language model is a crucial component of contemporary AI applications. This paper focuses on deploying such services in a heterogeneous and cross-datacenter setting to mitigate the substantial inference costs typically associated with a single centralized datacenter. Towards this end, we propose HEXGEN, a flexible distributed inference engine that uniquely supports the asymmetric partition of generative inference computations over both tensor model parallelism and pipeline parallelism and allows for effective deployment across diverse GPUs interconnected by a fully heterogeneous network. We further propose a sophisticated scheduling algorithm grounded in constrained optimization that can adaptively assign asymmetric inference computation across the GPUs to fulfill inference requests while maintaining acceptable latency levels. We conduct an extensive evaluation to verify the efficiency of HEXGEN by serving the state-of-the-art LLAMA-2 (70B) model. The results suggest that HEXGEN can choose to achieve up to 2.3× lower latency deadlines or tolerate up to 4× more request rates compared with the homogeneous baseline given the same budget. Our implementation is available at https://***/Relaxed-System-Lab/HexGen. Copyright 2024 by the author(s)
The eight papers in this special section focus on applications of evolutionary computation to games to demonstrate several ways in which evolution can push boundaries and explore new areas of what is possible in the r...
详细信息
The eight papers in this special section focus on applications of evolutionary computation to games to demonstrate several ways in which evolution can push boundaries and explore new areas of what is possible in the realm of games research, with a focus on game-playing, automatic agent parameter tuning, automatic game testing, and procedural content generation.
—Unmanned aerial vehicles (UAVs) have emerged as the potential aerial base stations (BSs) to improve terrestrial communications. However, the limited onboard energy and antenna power of a UAV restrict its communicati...
详细信息
暂无评论