The current research work addresses the problem of automating the delivery of machine learning models from MLflow to Kubernetes infrastructure. To solve the mentioned problem, a Kubernetes operator has been developed ...
详细信息
Emergency management and evacuation efficiency is important to ensure the safety of faculty and students in college. Teaching buildings are typically of multiple stories. When classes are in session, a teaching buildi...
详细信息
In this paper, we propose a novel federated learning (FL)-enhanced quality of service (QoS) multicast routing, called FLQMR protocol, in IoT-enabled mobile ad-hoc networks (MANETs) with cell-free massive multiple inpu...
详细信息
ISBN:
(数字)9798350379051
ISBN:
(纸本)9798350379068
In this paper, we propose a novel federated learning (FL)-enhanced quality of service (QoS) multicast routing, called FLQMR protocol, in IoT-enabled mobile ad-hoc networks (MANETs) with cell-free massive multiple input multiple output (CF -mMIMO). The main contributions of this paper can be summarized as follows. First, we consider the integration of cross-layer design, reconfigurable intelligent surfaces (RIS), FL, and edge computing to enhance network performance. Second, we design the FL framework to optimize routing decisions by selecting the best paths from the source node to multiple destinations. Third, we employ a cross-layer design that combines the physical layer information (i.e., mobility, position, SE) with the network layer information (i.e., route information) to establish a stable multicast tree from the source node to multiple destinations. The simulation results show that the proposed FLQMR protocol achieves a high packet delivery ratio, low routing delay, and low control overhead.
The collaboration between clouds and edges unlocks the full potential of edge-cloud systems. Edge-cloud platform has brought about significant decentralization, heterogeneity, complexity, and instability. These charac...
详细信息
ISBN:
(数字)9798350383508
ISBN:
(纸本)9798350383515
The collaboration between clouds and edges unlocks the full potential of edge-cloud systems. Edge-cloud platform has brought about significant decentralization, heterogeneity, complexity, and instability. These characteristics have posed unprecedented challenges to the optimal scheduling problem in the edge-cloud system, including inaccurate decision-making and slow convergence. In this paper, we propose a curiosity-driven collaborative request scheduling scheme in edge-cloud systems, namely Cur-CoEdge. To tackle the challenge of inaccurate decision-making, we introduce a time-scale and decision-level interaction mechanism. This mechanism employs a small-large-time-scale scheduling learning framework, facilitating mutual learning between different decision levels. To address the challenge of slow convergence, we investigate the underlying reasons, such as the sparse reward-setting in reinforcement learning. In response, we develop a curiosity-driven collaborative exploration approach that fosters intrinsic curiosity in the cloud and simultaneously motivates dispatchers to explore the environment both individually and collectively. The effectiveness of this collaborative exploration is also supported by theoretical proof of convergence. Finally, we implement a prototype system on a network hardware system along with two real-world traces. Evaluations demonstrate significant improvements, with up to a 26% increase in time efficiency, a 40% rise in system throughput, and a 71% enhancement in convergence speed.
The rapid development of the information age leads to the mass production and frequent transmission of data, which is difficult to deal with by human alone. With the rise and development of artificial intelligence, th...
详细信息
In view of the deficiency of the current academic early warning mechanism, the application of big data analysis technology in the course teaching management has become a popular trend of university teaching management...
详细信息
In the big data era, a large number of students with big data thinking are needed. Keeping pace with the development of the times, the big data course for a small number of non-computer majors was offered in our unive...
详细信息
In the big data era, a large number of students with big data thinking are needed. Keeping pace with the development of the times, the big data course for a small number of non-computer majors was offered in our university in the early stage, and then a teaching scheme of the big data general course for all students in our university was proposed. The teaching scheme includes thematic teaching content, blended teaching method, course assessment, and evaluation mechanism which focus on teaching process and ability training. The scheme has been practiced for 5 semesters. According to the survey data, 99.2% of the students have a general or even deep understanding of big data after learning the course. The survey data shows that the big data general course is very effective in cultivating students' big data literacy. It also can effectively improve students' big data application ability.
In recent years, there have been a lot of studies focusing on the dynamics of fractional-order neural networks (FONNs). One problem is that the standard Lyapunov theory does not apply to fractional-order systems, so t...
详细信息
Malware has become one of the most severe security threats in cyber security, among which APT malware attacks are more threatening than advanced sustainable threat attacks. In this paper, we perform APT malware and va...
Malware has become one of the most severe security threats in cyber security, among which APT malware attacks are more threatening than advanced sustainable threat attacks. In this paper, we perform APT malware and variant detection based on deep learning and analyze the results by detecting and attribution. The variant detection of APT malware can inhibit the spread of malicious code, which is important for network security detection and defense. This paper proposes a detection and classification method for APT malware and its variants based on deep learning. Firstly, the feature representation method of APT malware based on RGB images is proposed to solve the gradient explosion and gradient disappearance of grayscale map feature extraction and generate images with rich texture information, which can mine deeper features of APT malware attacks. Secondly, this paper also improves the convolutional neural network model by combining the Self-Attention mechanism with the spatial pyramid pool SPP-net to solve the problem of image input of different sizes, as the accuracy is above 92.14%. Then, the experiment results prove the predictive analysis of the model to understand the organization to which the APT attack belongs and the way of its specific attack, providing the possibility of tracing the source. Finally, the visual analysis of APT threat characteristics is presented.
Students enrolled in university experience academic along with mental stressors, which negatively impact their academic results. The research implements artificial intelligence methods for classifying and forecasting ...
详细信息
ISBN:
(数字)9798331523411
ISBN:
(纸本)9798331523428
Students enrolled in university experience academic along with mental stressors, which negatively impact their academic results. The research implements artificial intelligence methods for classifying and forecasting the difficulties which higher education students encounter within Jordanian universities. An electronic questionnaire was designed through structured procedures and received validation from eight academics before being distributed to 1020 students. Statistical analysis through Statistical Package for the Social Sciences (SPSS) validated the questionnaire data while testing the reliability of its findings. Students were classified into four categories—Academic Difficulties and Academic and Psychological Challenges and Psychological Distress alongside Normal—through the utilization of the GPT-4o mini API as a Large Language Model (LLM). Machine learning algorithms were applied to evaluate classification performance. Support Vector Machine (SVM) demonstrated the best result among classification models with an accuracy rate of 88.2% while Logistic Regression came second with 87.7% accuracy. A significant number of 54.7% students faced academic challenges while 60.8% of students reported psychological issues. The generated results will assist educational institutions by guiding their early prevention programs along with choosing appropriate assistance methods to enhance educational outcomes.
暂无评论