Polymer nanosphere-based devices demonstrate exceptional optoelectronic properties due to the surface and size effect. However, the lack of predictive computational models for nanosphere interactions during fabricatio...
详细信息
Current network assessment models often ignore the impact of attack-defense timing on network security, making it difficult to characterize the dynamic game of attack-defense effectively. To effectively manage the net...
详细信息
Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2;based on the following two properties of disturbance *** property is the weight correlation between the first 1...
详细信息
Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2;based on the following two properties of disturbance *** property is the weight correlation between the first 16-step disturbance vectors and the60-step disturbance *** other property requires all the differences of the active bit positions of the first 16-step disturbance vectors to be
At present, APT attack detection mainly focuses on the specific realization of detection technology, and there is little research on the timing strategy for active detection of APT attack. This paper focuses on the pr...
详细信息
Vulnerable code reuse in open source software is a serious threat to software ***,the existing highefficiency methods for vulnerable code clone detection have a large number of false-nega
ISBN:
(纸本)9781509053643;9781509053636
Vulnerable code reuse in open source software is a serious threat to software ***,the existing highefficiency methods for vulnerable code clone detection have a large number of false-nega
With the development of attack technology, identifying the real intention of network attack and avoiding further deterioration of security situation has become a hot research topic in recent years. This paper proposes...
详细信息
With the development of the nonvolatile memory(NVM),using NVM in the design of the cache and scratchpad memory(SPM)has been *** paper presents a data variable allocation(DVA)algorithm based on the genetic algorithm fo...
详细信息
With the development of the nonvolatile memory(NVM),using NVM in the design of the cache and scratchpad memory(SPM)has been *** paper presents a data variable allocation(DVA)algorithm based on the genetic algorithm for NVM-based SPM to prolong the *** lifetime can be formulated indirectly as the write counts on each SPM *** the differences between global variables and stack variables,our optimization model has three *** constraints of the central processing unit(CPU)utilization and size are used for all variables,while no-overlay constraint is only used for stack *** satisfy the constraints of the optimization model,we use the greedy strategy to generate the initial population which can determine whether data variables are allocated to SPM and distribute them evenly on SPM ***,we use the Mälardalen worst case executive time(WCET)benchmark to evaluate our *** experimental results show that the DVA algorithm can not only obtain close-to-optimal solutions,but also prolong the lifetime by 9.17% on average compared with SRAM-based SPM.
with the growth of network scale, present researches on the attack path discovery often encounter the problem of search space explosion that results in fails. To tackle the problem of attack path discovery for large-s...
详细信息
In a Population-Based Meta-Heuristic Optimization Algorithm (PMOA), individuals in the population will constantly generate new promising individuals, to form new populations. Although the population continuously chang...
In a Population-Based Meta-Heuristic Optimization Algorithm (PMOA), individuals in the population will constantly generate new promising individuals, to form new populations. Although the population continuously changes, the variations in each individual are traceable in most algorithms. An individual in the population comes from the individual in the previous population. The direction of the evolution of populations can be identified on top of this historical inheritance relationship, which improves the efficiency of PMOAs and solves optimization problems more effectively. Since Recurrent Neural Networks (RNNs) are able to capture the temporal dependencies in sequences, we are motivated to propose a novel but simple Evolutionary and Learning Competition Scheme (ELCS), also referred to as the PMOA Booster, in which individuals keep changing for the better fitness based on the heuristic rules of the PMOA while an RNN is used to learn the process that each individual changes in order to guide the generation of promising individuals. The ELCS automatically selects the RNN or PMOA which generates more individuals with the better fitness. We test the proposed scheme using the benchmark of IEEE Congress on Evolutionary Computation 2022 competition (CEC 2022). The results show that this scheme is able to boost the performance of both the classical and state-of-the-art PMOAs and outperforms its counterparts. Also, the ELCS produces promising results in two real-world industrial scenarios. We believe that the effectiveness of the proposed ELCS is due to the adaptive competition between the RNN and the PMOA.
The integrated sensing and communication (ISAC) has been envisioned as one representative usage scenario of sixth-generation (6G) network. However, the unprecedented characteristics of 6G, especially the doubly disper...
详细信息
暂无评论