Network slicing has appeared a key feature in 5G and beyond communication networks that enables the creation of multiple virtual networks (i.e., slices) over a shared physical network infrastructure. This process invo...
详细信息
ISBN:
(数字)9783903176669
ISBN:
(纸本)9798331505158
Network slicing has appeared a key feature in 5G and beyond communication networks that enables the creation of multiple virtual networks (i.e., slices) over a shared physical network infrastructure. This process involves efficiently embedding (or mapping) each slice element, including virtual network functions (VNFs) and their interconnections, onto the physical network. This paper explores a scenario where the order of VNFs can be adjusted during slice embedding, offering greater flexibility to increase the number of services deployed on the infrastructure. We formulate a novel optimization framework to tackle the challenges of slice admission control and embedding with this flexibility. A heuristic is also introduced to derive embedding solutions in a timely manner. Simulation results demonstrate that allowing flexible VNF ordering significantly increases the number of slices that can be deployed in the network infrastructure.
Relation extraction is a crucial task within information extraction, and numerous models have demonstrated impressive results. However, most of the tagging-based relation triple extraction methods employ unidirectiona...
详细信息
ISBN:
(数字)9798350349184
ISBN:
(纸本)9798350349191
Relation extraction is a crucial task within information extraction, and numerous models have demonstrated impressive results. However, most of the tagging-based relation triple extraction methods employ unidirectional approaches to extract subjects, objects, and relations, which may overlook crucial information. In this paper, we introduce a novel deep matrix-based bidirectional relation extraction model. Firstly, we extract forward and backward entity pairs. During the bidirectional extraction process,there may be some redundant relationships,so we use a shared encoder to connect and enhance the extraction process. Secondly, we design a low-complexity relation extraction matrix to allocate all possible relations. We assess our model using diverse benchmark datasets, and comprehensive experiments show that our approach effectively addresses subsequent triple extraction issues stemming from entity extraction failures.
The global chip industry is grappling with dual challenges: a profound shortage of new chips and a surge of counterfeit chips valued at $75 billion, introducing substantial risks of malfunction and unwanted surveillan...
The global chip industry is grappling with dual challenges: a profound shortage of new chips and a surge of counterfeit chips valued at $75 billion, introducing substantial risks of malfunction and unwanted surveillance. To counteract this, we propose an optical anti-counterfeiting detection method for semiconductor devices that is robust under adversarial tampering features, such as malicious package abrasions,compromised thermal treatment, and adversarial tearing. Our new deep-learning approach uses a RAPTOR(residual, attention-based processing of tampered optical response) discriminator, showing the capability of identifying adversarial tampering to an optical, physical unclonable function based on randomly patterned arrays of gold nanoparticles. Using semantic segmentation and labeled clustering, we efficiently extract the positions and radii of the gold nanoparticles in the random patterns from 1000 dark-field images in just 27 ms and verify the authenticity of each pattern using RAPTOR in 80 ms with 97.6% accuracy under difficult adversarial tampering conditions. We demonstrate that RAPTOR outperforms the state-ofthe-art Hausdorff, Procrustes, and average Hausdorff distance metrics, achieving a 40.6%, 37.3%, and6.4% total accuracy increase, respectively.
Virtual reality (VR) produces a highly realistic simulated environment with controllable environment variables. This paper proposes a Dynamic Scene Adjustment (DSA) mechanism based on the user interaction status and p...
详细信息
Virtual reality (VR) produces a highly realistic simulated environment with controllable environment variables. This paper proposes a Dynamic Scene Adjustment (DSA) mechanism based on the user interaction status and performance, which aims to adjust the VR experiment variables to improve the user's game engagement. We combined the DSA mechanism with a musical rhythm VR game. The experimental results show that the DSA mechanism can improve the user's game engagement (task performance).
The global context is crucial for the precise segmentation of remote sensing images. However, the large volumes and high spatial resolutions of remote sensing images make efficient analysis of the entire scene challen...
详细信息
ISBN:
(数字)9798350349184
ISBN:
(纸本)9798350349191
The global context is crucial for the precise segmentation of remote sensing images. However, the large volumes and high spatial resolutions of remote sensing images make efficient analysis of the entire scene challenging for most convolutional neural network (CNN)-based methods. To address this issue, we propose to design an innovative framework for semantic segmentation of remote sensing images called Feature Enhancement Swin Transformer (FEST). Firstly, we utilize the Swin Transformer as the encoder and incorporates a Global Information Enhancement Model (GIEM) within each Swin Transformer block to reduce information loss and enable encoding of more accurate spatial information. Secondly, we introduce an enhanced decoding structure called Enhanced Feature Fusion Module (EFFM) with added enhanced channel and spatial attention modules to retain localized information while obtaining extensive contextual information. Finally, for loss calculation, we utilize the dice and cross-entropy loss to jointly supervise the model, aiming to achieve a competitive performance. We comprehensively evaluated FEST on the ISPRS-Vaihingen and Potsdam datasets. The results indicate that our approach has achieved significant improvements in semantic segmentation tasks compared to existing methods.
Consumer Internet of Things (IoT) networks have gained widespread popularity due to their convenience, automation, and security provisions in personal and home environments. Ubiquitous resource-constrained devices, ho...
详细信息
ISBN:
(数字)9798331508050
ISBN:
(纸本)9798331508067
Consumer Internet of Things (IoT) networks have gained widespread popularity due to their convenience, automation, and security provisions in personal and home environments. Ubiquitous resource-constrained devices, however, are plagued with security issues that often arise from firmware-related issues and their propagated effects. While various studies on firmware attestation are available, they require firmware copies, specific hardware, and complex computation on the IoT device. This paper presents a study on the application of Graph Transformer Networks (GTN) in verifying the firmware integrity of consumer IoT swarms using SRAM as an attestation feature. The proposed method achieves an overall 0.99 accuracy on authentic samples from development and physical twin networks, 0.99 on malware, and 0.97 on propagated misbehavior at a $\sim 10^{-4}$ second inference latency on a laptop CPU.
COVID-19 has spread around the world since 2019. Approximately 6.5% of COVID-19 a risk of developing severe disease with high mortality rate. To reduce the mortality rate and provide appropriate treatment, this resear...
详细信息
Route Origin Validation (ROV) with Route Origin Authorizations (ROAs), built on top of the Resource Public Key Infrastructure (RPKI), serves as the only formally standardized and production-grade defense mechanism aga...
详细信息
Underwater image degradation presents complex challenges, significantly impairing the efficiency of underwater tasks. The mainstream underwater image enhancement (UIE) methods are roughly divided into traditional phys...
详细信息
Dear editor,The semi-tensor product (STP) of matrices, proposed by Cheng in 2001 [1], is a generalization of the conventional matrix product and well defined at every two finite-dimensional matrices. In2016, Cheng [2]...
详细信息
Dear editor,The semi-tensor product (STP) of matrices, proposed by Cheng in 2001 [1], is a generalization of the conventional matrix product and well defined at every two finite-dimensional matrices. In2016, Cheng [2] proposed a new concept of semitensor addition (STA), which is a generalization of the conventional matrix addition and well defined at every two finite-dimensional matrices with the same ratio between the numbers of rows and
暂无评论