In recent years,the demand for real-time data processing has been increasing,and various stream processing systems have *** the amount of data input to the stream processing system fluctuates,the computing resources r...
详细信息
In recent years,the demand for real-time data processing has been increasing,and various stream processing systems have *** the amount of data input to the stream processing system fluctuates,the computing resources required by the stream processing job will also *** resources used by stream processing jobs need to be adjusted according to load changes,avoiding the waste of computing *** present,existing works adjust stream processing jobs based on the assumption that there is a linear relationship between the operator parallelism and operator resource consumption(e.g.,throughput),which makes a significant deviation when the operator parallelism *** paper proposes a nonlinear model to represent operator *** divide the operator performance into three stages,the Non-competition stage,the Non-full competition stage,and the Full competition *** our proposed performance model,given the parallelism of the operator,we can accurately predict the CPU utilization and operator *** with actual experiments,the prediction error of our model is below 5%.We also propose a quick accurate auto-scaling(QAAS)method that uses the operator performance model to implement the auto-scaling of the operator parallelism of the Flink *** to previous work,QAAS is able to maintain stable job performance under load changes,minimizing the number of job adjustments and reducing data backlogs by 50%.
Accurately diagnosing Alzheimer's disease is essential for improving elderly ***,accurate prediction of the mini-mental state examination score also can measure cognition impairment and track the progression of Al...
详细信息
Accurately diagnosing Alzheimer's disease is essential for improving elderly ***,accurate prediction of the mini-mental state examination score also can measure cognition impairment and track the progression of Alzheimer's ***,most of the existing methods perform Alzheimer's disease diagnosis and mini-mental state examination score prediction separately and ignore the relation between these two *** address this challenging problem,we propose a novel multi-task learning method,which uses feature interaction to explore the relationship between Alzheimer's disease diagnosis and minimental state examination score *** our proposed method,features from each task branch are firstly decoupled into candidate and non-candidate parts for ***,we propose feature sharing module to obtain shared features from candidate features and return shared features to task branches,which can promote the learning of each *** validate the effectiveness of our proposed method on multiple *** Alzheimer's disease neuroimaging initiative 1 dataset,the accuracy in diagnosis task and the root mean squared error in prediction task of our proposed method is 87.86%and 2.5,*** results show that our proposed method outperforms most state-of-the-art *** proposed method enables accurate Alzheimer's disease diagnosis and mini-mental state examination score ***,it can be used as a reference for the clinical diagnosis of Alzheimer's disease,and can also help doctors and patients track disease progression in a timely manner.
Decentralized Anonymous Payment Systems (DAP), often known as cryptocurrencies, stand out as some of the most innovative and successful applications on the blockchain. These systems have garnered significant attention...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
The post-processing rendered sequences improves the quality of the sequences and shortens the time of the rendering phase. However, most of the current post-processing methods for sequences are suitable for video. Dir...
详细信息
Variational Autoencoders (VAEs) have gained popularity as one of the main approaches for generating diverse and high-quality synthetic images. This study examines the suitability of evaluation metrics, specifically In...
详细信息
The integration of artificial intelligence in agriculture has revolutionized farming practices, enhancing crop yields and resource efficiency. However, existing machine learning systems primarily focus on livestock, o...
详细信息
Multiplayer Online Battle Arena (MOBA) games currently dominate the esports landscape, offering a concrete and vivid embodiment for team comparisons, where accurately predicting the winning team is both important and ...
详细信息
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate *** methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on *** these existing mech...
详细信息
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate *** methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on *** these existing mechanisms,the identification of malicious flows depends on the IP ***,the IP address is easy to be changed by *** the IP address,the certificate ismore challenging to be tampered with or ***,the traffic trend in the network is towards *** certificates are popularly utilized by IoT devices for authentication in encryption *** proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN *** on DTLShps,the SDN controller can collect statistics on *** this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for *** goal is ***,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire ***,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay ***,for detecting the Crossfire attack accurately,a method based on graph connectivity is ***,several trust-based routing principles are proposed tomitigate the Crossfire *** principles can also encourage users to use certificates in *** performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting ***,our trust model has a more appropriate decay rate than the traditional methods.
This paper situates itself within the broader medical imaging field, focusing on applying generative modelling techniques for anomaly detection in retinal images. Given the complexity of retinal structures, detecting ...
详细信息
暂无评论