Data transmission through a wireless network has faced various signal problems in the past *** orthogonal frequency division multiplexing(OFDM)technique is widely accepted in multiple data transfer patterns at various...
详细信息
Data transmission through a wireless network has faced various signal problems in the past *** orthogonal frequency division multiplexing(OFDM)technique is widely accepted in multiple data transfer patterns at various frequency bands.A recent wireless communication network uses OFDM in longterm evolution(LTE)and 5G,among *** main problem faced by 5G wireless OFDM is distortion of transmission signals in the *** transmission loss is called peak-to-average power ratio(PAPR).This wireless signal distortion can be reduced using various *** study uses machine learning-based algorithm to solve the problem of PAPR in 5G wireless *** transmit sequence(PTS)helps in the fast transfer of data in wireless *** is merged with deep belief neural network(DBNet)for the efficient processing of signals in wireless 5G *** indicates that the proposed system outperforms other existing ***,PAPR reduction in OFDM by DBNet is optimized with the help of an evolutionary algorithm called particle swarm ***,the specified design supports in improving the proposed PAPR reduction architecture.
Question answering (QA) tasks have been extensively studied in the field of natural language processing (NLP). Answers to open-ended questions are highly diverse and difficult to quantify, and cannot be simply evaluat...
详细信息
This research study focuses on video categorization, which is a crucial area of computer vision with uses in entertainment, education, and surveillance. Convolutional Neural Networks (CNNs) are used in a two-stage app...
详细信息
Deep neural networks (DNNs) have emerged as the most effective programming paradigm for computer vision and natural language processing applications. With the rapid development of DNNs, efficient hardware architecture...
详细信息
Deep neural networks (DNNs) have emerged as the most effective programming paradigm for computer vision and natural language processing applications. With the rapid development of DNNs, efficient hardware architectures for deploying DNN-based applications on edge devices have been extensively studied. Emerging nonvolatile memories (NVMs), with their better scalability, nonvolatility, and good read performance, are found to be promising candidates for deploying DNNs. However, despite the promise, emerging NVMs often suffer from reliability issues, such as stuck-at faults, which decrease the chip yield/memory lifetime and severely impact the accuracy of DNNs. A stuck-at cell can be read but not reprogrammed, thus, stuck-at faults in NVMs may or may not result in errors depending on the data to be stored. By reducing the number of errors caused by stuck-at faults, the reliability of a DNN-based system can be enhanced. This article proposes CRAFT, i.e., criticality-aware fault-tolerance enhancement techniques to enhance the reliability of NVM-based DNNs in the presence of stuck-at faults. A data block remapping technique is used to reduce the impact of stuck-at faults on DNNs accuracy. Additionally, by performing bit-level criticality analysis on various DNNs, the critical-bit positions in network parameters that can significantly impact the accuracy are identified. Based on this analysis, we propose an encoding method which effectively swaps the critical bit positions with that of noncritical bits when more errors (due to stuck-at faults) are present in the critical bits. Experiments of CRAFT architecture with various DNN models indicate that the robustness of a DNN against stuck-at faults can be enhanced by up to 105 times on the CIFAR-10 dataset and up to 29 times on ImageNet dataset with only a minimal amount of storage overhead, i.e., 1.17%. Being orthogonal, CRAFT can be integrated with existing fault-tolerance schemes to further enhance the robustness of DNNs aga
Multi-Task Learning (MTL) is a framework, where multiple related tasks are learned jointly and benefit from a shared representation space, or parameter transfer. To provide sufficient learning support, modern MTL uses...
详细信息
Human activity recognition (HAR) plays a crucial role in assisting the elderly and individuals with vascular dementia by providing support and monitoring for their daily activities. This paper presents a deep learning...
详细信息
作者:
Saleh, TajErgin, Fatma CorutMalkawi, MalekAlhajj, RedaDepartment of Computer Engineering
Marmara University Istanbul Turkey Department of Computer Engineering Istanbul Medipol University Istanbul Turkey Department of Computer Science University of Calgary Alberta Canada Department of Heath Informatics University of Southern Denmark Odense Denmark
String search algorithms play an important role in many research areas such as data mining and bioinformatics. While there exist a number of algorithms that handles the topic, we are exploring the the Knuth-Morris-Pra...
详细信息
Backdoor attacks in deep neural networks (DNNs) involve an attacker inserting a backdoor into the network by manipulating the training dataset, which causes misclassification of inputs that contain a specific trigger....
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
The tremendous advancement in distributed computing and Internet of Things(IoT)applications has resulted in the adoption of fog computing as today’s widely used framework complementing cloud ***,suitable and effectiv...
详细信息
The tremendous advancement in distributed computing and Internet of Things(IoT)applications has resulted in the adoption of fog computing as today’s widely used framework complementing cloud ***,suitable and effective applications could be performed to satisfy the applications’latency *** allocation techniques are essential aspects of fog networks which prevent unbalanced load *** resource management techniques can improve the quality of service *** to the limited and heterogeneous resources available within the fog infrastructure,the fog layer’s resources need to be optimised to efficiently manage and distribute them to different applications within the IoT *** has been limited research on resource management strategies in fog networks in recent years,and a limited systematic review has been done to compile these *** article focuses on current developments in resource allocation strategies for fog-IoT networks.A systematic review of resource allocation techniques with the key objective of enhancing QoS is *** involved in conducting this systematic literature review include developing research goals,accessing studies,categorizing and critically analysing the *** resource management approaches engaged in this article are load balancing and task offloading *** the load balancing approach,a brief survey of recent work done according to their sub-categories,including stochastic,probabilistic/statistic,graph theory and hybrid techniques is provided whereas for task offloading,the survey is performed according to the destination of task *** load balancing and task-offloading approaches contribute significantly to resource management,and tremendous effort has been put into this critical ***,this survey presents an overview of these extents and a comparative ***,the study discusses ongoing research issues and potential future directio
暂无评论