The following topics are dealt with: feature extraction; control system synthesis; learning (artificial intelligence); production engineering computing; three-term control; design engineering; optimisation; pattern cl...
详细信息
The following topics are dealt with: feature extraction; control system synthesis; learning (artificial intelligence); production engineering computing; three-term control; design engineering; optimisation; pattern classification; closed loop systems; anddigital simulation.
Improving the performance for VNF (Virtualized Network Function) by hardware acceleration is a hot research topic in SdN/NFV architecture. After introducing the acceleration resource for VNF, how to implement uniform ...
详细信息
Improving the performance for VNF (Virtualized Network Function) by hardware acceleration is a hot research topic in SdN/NFV architecture. After introducing the acceleration resource for VNF, how to implement uniform deployment and allocation of the acceleration resources is an urgent problem to be solved. Thus in this paper, a unifieddeployment architecture of acceleration resource for VNF is proposed firstly. On the basis of architecture, the problem of acceleration resource allocation is modeled. By analyzing the influence of acceleration resource for VNF on deployment of service chains, we propose the evaluation index of acceleration resource allocation algorithm for VNF. Finally, we design a two-stage acceleration resource allocation algorithm to solve the problem. The experimental results show that the proposed algorithm can rationally allocate acceleration resources to nodes in the entire network and improve the efficiency of acceleration resource utilization.
The proposal of the multi-controller has improved the scalability andreliability of software-defined networking (SdN), and the entire network is divided into several subdomains with the self-governed controller. due ...
详细信息
To investigate the predictive ability of radiomics signature for preoperative pathological grading of Hepatocellular Carcinomas (HCC), the no contrast MrI images were integrated and a comprehensive analysis was conduc...
详细信息
With the continuous development and popularization of network equipment and services, people's dependence on cyberspace is becoming stronger and stronger, and the importance of network security is becoming more an...
详细信息
With the continuous development and popularization of network equipment and services, people's dependence on cyberspace is becoming stronger and stronger, and the importance of network security is becoming more and more prominent. Mimic defense is based on the system architecture of dynamic heterogeneous redundancy. data is sent to multiple heterogeneous functional equivalents through the input agents, and then the response of heterogeneous functional equivalents is judged according to a certain arbitration policy by the output agent. The abnormal output of a functional equivalent can be effectively eliminated, enabling the system to achieve intrusion prevention against unknown system vulnerabilities or backdoors. This paper analyzes the effect of the isomorphism of functional equivalents on system security, and proposes a mimic method based on the equivalence of mimicry maximization. Experiments have shown that the effectiveness of security defense can be significantly improved.
Considering the use of Fully Connected (FC) layer limits the performance of Convolutional Neural Networks (CNNs), this paperdevelops a method to improve the coupling between the convolution layer and the FC layer by ...
详细信息
Encoder-to-decoder is a newly architecture for Neural Machine Translation(NMT). Convolutional Neural Network(CNN) based on this framework has gained significant success in NMT task. Challenges remain in the practical ...
详细信息
Encoder-to-decoder is a newly architecture for Neural Machine Translation(NMT). Convolutional Neural Network(CNN) based on this framework has gained significant success in NMT task. Challenges remain in the practical use of CNN model, which is in need of bilingual sentence pairs for training and each bilingual data is designed for CNN translation model needing retraining. Although some successful performance has been reported, it is an important research direction to avoid model overfitting caused by the scarcity of parallel corpus. The paper introduces a simple and efficient knowledge distillation method forregularization to solve CNN training overfitting problems by transferring the knowledge of source model to adapted model on low-resource languages in NMT task. The experiment on English-Czech dataset result shows that our model solve the over fitting problem, get better generalization, and improve the performance of a low-resource languages translation task.
A timeout threshold estimation algorithm is proposed which apply in mimic defense systems to reduce the waiting time when timeout is happened. It is inspired by the fact that there is a linearrelationship in task exe...
详细信息
A timeout threshold estimation algorithm is proposed which apply in mimic defense systems to reduce the waiting time when timeout is happened. It is inspired by the fact that there is a linearrelationship in task execution time of a set of heterogeneous executors in mimic defense systems. Experiment results show that our algorithm can generate a specific timeout threshold for each task with high computational efficiency and is particularly suitable for the scene in which the number of arriving tasks changes drastically.
In the 5 G mobile communication network virtualization scenario, how to deploy service function chaining of the core network efficiently is the key problem to realize the efficient deployment of virtual Evolved Packet...
详细信息
In the 5 G mobile communication network virtualization scenario, how to deploy service function chaining of the core network efficiently is the key problem to realize the efficient deployment of virtual Evolved Packet Core network services. In order to solve the problem that the existing deployment methods are difficult to meet the requirement of the mobile communication with low latency, this paper proposed a method for service function chaining deployment based on Q-learning. This method solved the problem by applying establish a Markov decision process model to the latency optimization in the context of VNF deployment, and then design a Q-learning algorithm to found the deployment solutions with minimum delay cost of network services. Simulation results show that the proposed method achieves better performances in terms of average processing time, request acceptance rate, gain and execution time.
The strong security and strong privacy protection features of the blockchain are important aspects of the development of the blockchain, but the security and privacy protection features of the blockchain are not perfe...
The strong security and strong privacy protection features of the blockchain are important aspects of the development of the blockchain, but the security and privacy protection features of the blockchain are not perfect. With the continuous development and wide application of blockchain technology, the problem of privacy leakage is becoming more and more prominent and must be fully taken seriously. This paper proposes a new blockchain signature scheme based on the combination of aggregate signature andring signature for the privacy protection of transaction addresses in blockchain. This scheme uses a ring signature as the basis for the signature algorithm. On the basis of this, it combines the aggregate signature, which hides the address information of the signer on the one hand and fixes the signature length on the other hand. This enhances the privacy protection capability of the transaction address in the blockchain, and also effectively reduces the signature space of the blockchain system, and solves the problem of capacity expansion to some extent.
暂无评论