Nowadays,cloud computing provides easy access to a set of variable and configurable computing resources based on user demand through the *** computing services are available through common internet protocols and netwo...
详细信息
Nowadays,cloud computing provides easy access to a set of variable and configurable computing resources based on user demand through the *** computing services are available through common internet protocols and network standards.n addition to the unique benefits of cloud computing,insecure communication and attacks on cloud networks cannot be *** are several techniques for dealing with network *** this end,network anomaly detection systems are widely used as an effective countermeasure against network *** anomaly-based approach generally learns normal traffic patterns in various ways and identifies patterns of *** anomaly detection systems have gained much attention in intelligently monitoring network traffic using machine learning *** paper presents an efficient model based on autoencoders for anomaly detection in cloud computing *** autoencoder learns a basic representation of the normal data and its reconstruction with minimum ***,the reconstruction error is used as an anomaly or classification *** addition,to detecting anomaly data from normal data,the classification of anomaly types has also been *** have proposed a new approach by examining an autoencoder's anomaly detection method based on data reconstruction *** the existing autoencoder-based anomaly detection techniques that consider the reconstruction error of all input features as a single value,we assume that the reconstruction error is a *** enables our model to use the reconstruction error of every input feature as an anomaly or classification *** further propose a multi-class classification structure to classify the *** use the CIDDS-001 dataset as a commonly accepted dataset in the *** evaluations show that the performance of the proposed method has improved considerably compared to the existing ones in terms of accuracy,recall,false-positive rate,and F1-score
Good working condition of mechanical facility is necessary to ensure orderly industrial production, and remaining useful life (RUL) estimation of mechanical facility via current monitoring parameters is an important i...
详细信息
This paper conducts a comparative analysis of human torso posture estimation methodologies, focusing on an inertial measurement unit (IMU) sensor coupled with an Arduino UNO as a wearable approach, and Kinect V2, util...
详细信息
Water resource management worldwide faces significant challenges, including high consumption rates, scarcity, and ageing infrastructure. This paper proposes a comprehensive approach to address these issues through fiv...
详细信息
MRI and CT images are widely utilized for detecting tumors in internal organs. However, accurately distinguishing tumors using these images only, poses a challenge. This demands human expertise to effectively mark tum...
详细信息
Human pose estimation and automatic detection is a common task in Human-computer Interaction but especially more capitalized in human-robot interaction inspired from biological form of human anatomy to realize a biomi...
详细信息
Poverty is considered a serious global issue that must be immediately eradicated by Sustainable Development Goals (SDGs) 1, namely ending poverty anywhere and in any form. As a developing country, poverty is a complex...
详细信息
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they...
详细信息
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they induce abundant data movements between computing units and ***-based processing-in-memory(PIM)can resolve this problem by processing embedding vectors where they are ***,the embedding table can easily exceed the capacity limit of a monolithic ReRAM-based PIM chip,which induces off-chip accesses that may offset the PIM ***,we deploy the decomposed model on-chip and leverage the high computing efficiency of ReRAM to compensate for the decompression performance *** this paper,we propose ARCHER,a ReRAM-based PIM architecture that implements fully yon-chip recommendations under resource ***,we make a full analysis of the computation pattern and access pattern on the decomposed *** on the computation pattern,we unify the operations of each layer of the decomposed model in multiply-and-accumulate *** on the access observation,we propose a hierarchical mapping schema and a specialized hardware design to maximize resource *** the unified computation and mapping strategy,we can coordinatethe inter-processing elements *** evaluation shows that ARCHER outperforms the state-of-the-art GPU-based DLRM system,the state-of-the-art near-memory processing recommendation system RecNMP,and the ReRAM-based recommendation accelerator REREC by 15.79×,2.21×,and 1.21× in terms of performance and 56.06×,6.45×,and 1.71× in terms of energy savings,respectively.
Recommendation systems deliver a method to simplify the user’s desire. Recommendation systems are now commonly used on the Internet. It helps suggest items in various categories, including e-commerce, medical, educat...
详细信息
This paper proposed a fully LTPS-TFT-based bi-directional biomedical pixel interface with integrated a high linearity stimulator and a high-performance bio-potential sensing front-end circuit to amplify and digitize b...
详细信息
暂无评论