The accurate prediction of the friction angle of clays is crucial for assessing slope stability in engineering *** study addresses the importance of estimating the friction angle and presents the development of four s...
详细信息
The accurate prediction of the friction angle of clays is crucial for assessing slope stability in engineering *** study addresses the importance of estimating the friction angle and presents the development of four soft computing models:YJ-FPA-MLPnet,YJ-CRO-MLPnet,YJ-ACOC-MLPnet,and *** of all,the Yeo-Johnson(YJ)transformation technique was used to stabilize the variance of data and make it more suitable for parametric statistical models that assume normality and equal *** technique is expected to improve the accuracy of friction angle prediction *** friction angle prediction models then utilized multi-layer perceptron neural networks(MLPnet)and metaheuristic optimization algorithms to further enhance performance,including flower pollination algorithm(FPA),coral reefs optimization(CRO),ant colony optimization continuous(ACOC),and cuckoo search algorithm(CSA).The prediction models without the YJ technique,***-MLPnet,CRO-MLPnet,ACOC-MLPnet,and CSA-MLPnet,were then compared to those with the YJ technique,***-FPA-MLPnet,YJ-CRO-MLPnet,YJ-ACOC-MLPnet,and *** these,the YJ-CRO-MLPnet model demonstrated superior reliability,achieving an accuracy of up to 83%in predicting the friction angle of clay in practical engineering *** improvement is significant,as it represents an increase from 1.3%to approximately 20%compared to the models that did not utilize the YJ transformation technique.
With the continued success of the open RISC-V architecture, practical deployment of RISC-V processors necessitates an in-depth consideration of their testability, safety and security aspects. This survey provides an o...
With the continued success of the open RISC-V architecture, practical deployment of RISC-V processors necessitates an in-depth consideration of their testability, safety and security aspects. This survey provides an overview of recent developments in this quickly-evolving field. We start with discussing the application of state-of-the-art functional and system-level test solutions to RISC-V processors. Then, we discuss the use of RISC-V processors for safety-related applications; to this end, we outline the essential techniques necessary to obtain safety both in the functional and in the timing domain and review recent processor designs with safety features. Finally, we survey the different aspects of security with respect to RISC-V implementations and discuss the relationship between cryptographic protocols and primitives on the one hand and the RISC-V processor architecture and hardware implementation on the other. We also comment on the role of a RISC-V processor for system security and its resilience against side-channel attacks.
The global internet relies on a well-coordinated operation of distinct networking domains. This renders multi-domain networking at the heart of today's massive digital information exchange. Although Software-Defin...
The global internet relies on a well-coordinated operation of distinct networking domains. This renders multi-domain networking at the heart of today's massive digital information exchange. Although Software-Defined Networking (SDN) undoubtedly helps advance network operation within a single organization, non-centralized multi-domain networking has received less attention. To significantly advance the state of networking, we are inherently bound to provide progress and evolve the current multi-domain networking scheme. This work exploits the Intent-Based Networking (IBN) paradigm and the Directed Acyclic Graphs (DAGs) data structure to design a novel architecture for multi-domain IP-Optical networking. We highlight the benefits of our approach leading to seamless operation of non-centralized networks, such as optically transparent domain boundaries and cross-domain grooming. We evaluate this approach in a realistic scenario using our novel open-source tool ***, which we shortly introduce and can be broadly used for related research.
Estimating availability in transport networks is essential to successfully provision connectivity services under various requirements. As modern Service Level Agreements (SLAs) are becoming more demanding, it is cruci...
Estimating availability in transport networks is essential to successfully provision connectivity services under various requirements. As modern Service Level Agreements (SLAs) are becoming more demanding, it is crucial to estimate the true availability of an end-to-end path as soon and reliably as possible. Network operators might have expert knowledge regarding the theoretical availability of the network components, or they might have some measured data to infer such information. However, in either case, the true steady-state availability is unknown and must be inferred as a combination of the above. Traditionally, the estimation of Quality of Service (QoS) metrics, like availability, is done by producing a scalar value as an approximation. This can often be misleading and an oversimplification. In this paper, we build a multilevel Bayesian model that provides a probabilistic estimate of all network links’ availability by exploiting expert knowledge and the underlying data. The value of this methodology is greater for scenarios with scarce data, where the inference quality demonstrates remarkable stability regardless of the randomness of the incoming data. We demonstrate the effectiveness of our approach through simulation experiments and compare our results with the empirical interval availability. Our work has important implications for the design and management of optical networks since it constitutes a valuable tool that provides accurate availability estimations, which can be used for sophisticated decision-making.
As China's social economy progresses, the amount of equipment in distribution networks continues to grow, leading to increasingly complex system operations. In this environment, traditional centralized control met...
详细信息
Quick progress in memristive technologies has led to their consideration for several potential applications, many of which are security-critical. New possibilities of memristors, including their unique combination of ...
Quick progress in memristive technologies has led to their consideration for several potential applications, many of which are security-critical. New possibilities of memristors, including their unique combination of non-volatile storage and compute capabilities, make them particularly attractive to edge applications, which are physically exposed to their users and therefore to potential attackers. Therefore, practical deployment of memristive circuitry for, e.g., cryptographic (sub-)modules or on-chip neural network inference, is only feasible when their vulnerability to physical attacks is understood and addressed. We evaluate experimentally one relevant class of physical attacks, namely side-channel attacks, under varying external conditions, namely temperature and magnetic fields. Using a small cryptographic construction, we evaluate both white-box and black-box attack varieties, using respective cryptanalytic techniques. Our results show that, while non-nominal conditions can complicate attacks, the information leakage remains and the secrets are extractable with additional knowledge about the memristive devices. This suggests the need to consider possible external disturbances during security evaluation.
Approximate computing (AxC) has emerged as an attractive architectural paradigm especially for artificial-intelligence applications, yet its security implications are being neglected. We demonstrate a novel covert cha...
Approximate computing (AxC) has emerged as an attractive architectural paradigm especially for artificial-intelligence applications, yet its security implications are being neglected. We demonstrate a novel covert channel where the malicious sender modulates transmission by switching between regular and AxC realizations of the same computational task. The malicious receiver identifies the transmitted information by either reading out the workload statistics or by creating controlled congestion. We demonstrate the channel on both an Android simulator and an actual smartphone and systematically study measures to increase its robustness. The achievable transmission rates are comparable with earlier covert channels based on power consumption, but the malicious behavior of our channel is more stealthy and less detectable.
Network connections in optical backbone networks are subject to failures and the network operator is obliged to compensate its customers according to the terms of the service level agreement (SLA) if outages have occu...
详细信息
In the field of high-performance computing, some application scenarios make extensive use of bit manipulation. RISC-V foundation issues B extension to reduce the number of instructions during the static compilation. B...
详细信息
The purpose of this research aims to monitor, analyze, and compare the performance of infrastructure as a service (IaaS) between the selective cloud providers. To assure which cloud provider has more stability, reliab...
详细信息
暂无评论