With advancements in AI infrastructure and Trusted Execution Environment (TEE) technology, Federated Learning as a Service (FLaaS) through JointCloud computing (JCC) is promising to break through the resource constrai...
详细信息
This theoretical research in fuzzy correlation analysis integrates data uncertainty analysis by measuring the strength of the linear relationship restricted to two fuzzy sets. As the relevant contribution to this rese...
详细信息
This theoretical research in fuzzy correlation analysis integrates data uncertainty analysis by measuring the strength of the linear relationship restricted to two fuzzy sets. As the relevant contribution to this research area, this paper presents the axiomatic definition of the n-dimensional generalized fuzzy correlation coefficient (nGCC), assigning to n input fuzzy sets an output value in the interval [-1,1]. Thus, the properties of general overlap functions and fuzzy negations are studied, discussing binary non-normed restricted dissimilarity functions, and the n-dimensional non-normed conjunctive functions. This study provides new methods for the n-dimensional generalized fuzzy correlation coefficient analysis, regarding their applications in solving multi-criteria and decision-making problems founded on fuzzy logic extensions. The n-dimensional non-normed conjunctive aggregation functions are also introduced, as range domain extensions from [0,1] to [-1.1], covering the interpretation of negative to positive variable associations. The proposal correlation analysis promotes a better evaluation and data selection even when more than one algorithm is applied to evaluate the reduction methods in the defuzzification process based on Interval-valued Fuzzy Logic. We also investigate the relevance to determine a reliable result from the fuzzy inference system based on the nGCC methodology. This correlation methodology applied to the Interval Fuzzy Load Balancing for Cloud computing (Int-FLBCC) model contributes as a flexible approach for virtual machines dynamic consolidation enabling improvements in resource usage and power efficiency, improving the computational system's energy efficiency. So, the nGCC methodology extends the Int-FLBCC model by adding other degrees of reliability to the results obtained with diverse evaluations through n-dimensional generalized fuzzy correlation coefficient expressions, exploring average aggregations as arithmetic and exponential me
Interoperability between libraries is often hindered by incompatible data formats, which can necessitate creating new copies of data when transferring data back and forth between different libraries. This additional d...
详细信息
The GraphBLAS are building blocks for constructing graph algorithms as linear algebra. They are defined mathematically with the goal that they would eventually map onto a variety of programming languages. Today they e...
详细信息
ISBN:
(数字)9781665497473
ISBN:
(纸本)9781665497480
The GraphBLAS are building blocks for constructing graph algorithms as linear algebra. They are defined mathematically with the goal that they would eventually map onto a variety of programming languages. Today they exist in C, C++, Python, MATlab®, and Julia. In this paper, we describe the GraphBLAS for the Go programming language. A particularly interesting aspect of this work is that using the concurrency features of the Go language, we aim to build a runtime system that uses the GraphBLAS nonblocking mode by default.
It is common practice to use large computational resources to train neural networks, known from many examples, such as reinforcement learning applications. However, while massively parallelcomputing is often used for...
详细信息
Structure-based protein design has attracted increasing interest, with numerous methods being introduced in recent years. However, a universally accepted method for evaluation has not been established, since the wet-l...
详细信息
Quantum computing represents a paradigm shift for computation requiring an entirely new computer architecture. However, there is much that can be learned from traditional classical computer engineering. In this paper,...
详细信息
Scheduling task graphs with communication delay is a widely studied NP-hard problem. Many heuristics have been proposed, but there is no constant approximation algorithm for this classic model. In this paper, we focus...
Scheduling task graphs with communication delay is a widely studied NP-hard problem. Many heuristics have been proposed, but there is no constant approximation algorithm for this classic model. In this paper, we focus on the scheduling of the important class of fork-join task graphs (describing many types of common computations) on homogeneous processors. For this sub-case, we propose a guaranteed algorithm with a $\left( {1 + \frac{m}{{m - 1}}} \right)$-approximation factor, where m is the number of processors. The algorithm is not only the first constant approximation for an important sub-domain of the classic scheduling problem, it is also a practical algorithm that can obtain shorter makespans than known heuristics. To demonstrate this, we propose adaptations of known scheduling heuristic for the specific fork-join structure. In an extensive evaluation, we then implemented these algorithms and scheduled many fork-join graphs with up to thousands of tasks and various computation time distributions on up to hundreds of processors. Comparing the obtained results demonstrates the competitive nature of the proposed approximation algorithm.
Deep Neural Network (DNN) Inference in Edge computing, often called Edge Intelligence, requires solutions to insure that sensitive data confidentiality and intellectual property are not revealed in the process. Privac...
详细信息
Web application vulnerability is one of the major causes of cyber attacks. Cyber criminals exploit these vulnerabilities to inject malicious commands to the unsanitized user input in order to bypass authentication of ...
详细信息
ISBN:
(数字)9781728185293
ISBN:
(纸本)9781728185309
Web application vulnerability is one of the major causes of cyber attacks. Cyber criminals exploit these vulnerabilities to inject malicious commands to the unsanitized user input in order to bypass authentication of the database through some cyber-attack techniques like cross site scripting (XSS), phishing, Structured Query Language Injection Attack (SQLIA), malware etc., Although many research works have been conducted to resolve the above mentioned attacks, only few challenges with respect to SQLIA could be resolved. Ensuring security against complete set of malicious payloads are extremely complicated and demanding. It requires appropriate classification of legitimate and injected SQL commands. The existing approaches dealt with limited set of signatures, keywords and symbols of SQL queries to identify the injected queries. This work focuses on extracting SQL injection patterns with the help of existing parsing and tagging techniques. Pattern-based tags are trained and modeled using Multi-layer Perceptron which significantly performs well in classification of queries with accuracy of 94.4% which is better than the existing approaches.
暂无评论