Optimal Transmission of Multi Quality Tiled 360 VR Video in MIMO OFDMA Systems

In this paper, we study the optimal transmission of a multi-quality tiled 360virtual reality (VR) video . We minimize the total transmission power with respect to the subcarrierallocation constraints, rate allocation constraints, and successfultransmission constraints . We obtain an asymptotically optimal solution in the case of a large antenna array,and a suboptimal solution in a general case .…

Bayesian Optimisation for a Biologically Inspired Population Neural Network

We have used Bayesian Optimisation (BO) to find hyper-parameters in an existing biologically plausible population neural network . The 8-dimensional optimal parameters should be such that the network dynamicssimulate the resting state alpha rhythm (8 – 13 Hz rhythms in brain signals) The best combination of these parameters leads to theneural network’s output power spectral peak being constraint within the alphaband.…

Finite Volume Neural Network Modeling Subsurface Contaminant Transport

Finite Volume Neural Network (FINN) is a new approach to data-driven modeling of spatiotemporal physical processes . FINN enables better handling of fluxes between controlvolumes and therefore proper treatment of different types of numerical boundary conditions . The FINN method adopts the numerical structure of the well-known Finite volume Method for handling partialdifferential equations, so that each quantity of interest follows its own conservation law, while it concurrently accommodates learnableparameters.…

Variational Autoencoder Analysis of Ising Model Statistical Distributions and Phase Transitions

Variational autoencoders employ an encoding neural network to generate aprobabilistic representation of a data set within a low-dimensional space oflatent variables . The resulting statedistribution in energy-magnetization space then qualitatively resembles that of the training samples . However, because correlations between spins are suppressed, the computed energies are unphysically large for low-dimensionallatent variable spaces .…

WLFC Write Less in Flash based Cache

Flash-based disk cache has been widely used in indurstry in the last decade, such as flashcache (facebook, 2010), bcache (opensource, 2013) These cachesystems typically use commercial SSDs to store and manage cache data . WLFC can significantly reduce the write latency by 70%, increase the write-throughput up to 4.5x, and remove 88.9% unnecessary erase operations at most .…

Tracking Normalized Network Traffic Entropy to Detect DDoS Attacks in P4

Distributed Denial-of-Service (DDoS) attacks represent a persistent threat to telecommunications networks . DDoS attack detection is usually carried out in one or more central nodes that collect significantamounts of monitoring data from networking devices . The dawn of programmabledata planes in Software-Defined Networks can help mitigate this issue, opening the door to the detection of DDoS attacks directly in the data plane of theswitches .…

Exploring the Attack Surface of WebSocket

Web socket is a new type of communications protocol, which was faster and more efficient than previous communication protocols . Its security has been discussed, and technology’s security has always been a challenge for us . In this article, we examine the structure and security problems that can occur in a web socket to choose an excellent alternative to HTTP and use it .…

WLFC Write Less in Flash based Cache

Flash-based disk caches, for example Bcache and Flashcache, has gainedtremendous popularity in industry in the last decade . But these cache systemshave a worse write performance than the read performance because of theasymmetric I/O costs and the internal GC mechanism .…

Variations on the Post Correspondence Problem for free groups

The Post Correspondence Problem is a classical decision problem about equalisers of free monoid homomorphisms . We prove connections between severalvariations of this classical problem, but in the setting of free groups and free group homomorphism . Among other results, and working under certaininjectivity assumptions, we prove that computing the rank of the equaliser of apair of free grouphomomorphisms can be applied to computing a basis of this equaliser .…

Loss of structural balance in stock markets

We establish theoretical relationship between the level of balance in a network and stockpredictability . We use rank correlations as distance functions to establish theinterconnectivity between stock returns . We find a clear balance-unbalance transition for six of the nine countries, following the August 2011 Black Monday in the US, when the Economic PolicyUncertainty index for this country reached its highest monthly level before theCOVID-19 crisis .…

Can Author Collaboration Reveal Impact The Case of h index

A more intense collaboration can result into increased productivity which can potentially have an impact on the author’s future$h$-index . The proposed method outperforms standard machinelearning techniques based on simple graph metrics along with noderepresentations learned from the textual content of the authors’ papers .…

Higher order percolation processes on multiplex hypergraphs

Higher order interactions are increasingly recognised as a fundamental aspect of complex systems ranging from the brain to social contact networks . The wide range of critical behaviors observed for higher-order percolation processes on multiplex hypergraphs elucidates the mechanisms responsible for the emergence of discontinuous transition and uncovers interesting critical behaviors .…

Automated Mechanism Design for Classification with Partial Verification

We study the problem of automated mechanism design with partial verification . We provehardness results when the revelation principle does not necessarily hold, as well as when types have even minimally different preferences . We present an efficient algorithm for finding optimal deterministic truthful mechanisms, which also implies a faster algorithm to find optimal randomized truthful mechanisms via acharacterization based on convexity .…

MIPROT A Medical Image Processing Toolbox for MATLAB

This paper presents a Matlab toolbox to perform basic image processing and visualization tasks, particularly designed for medical image processing . The toolbox is entirely written in native Matlab code, but is fast and flexible . Main use cases for the toolbox are illustrated here, including image input/output, pre-processing, filtering, image registration and visualisation .…

QZNs Quantum Z numbers

Z-numbers lack the ability to process the quantum information in quantum environment . The results show that, with the help of quantum computation, the proposed algorithm can make diagnoses correctly and efficiently . Based on QZNs, a novel quantummulti-attributes decision making (MADM) algorithm is proposed and applied in medical diagnosis.…

Ethereum Name Service the Good the Bad and the Ugly

ENS has been criticized for its inherent design flaws, making the system vulnerable to kinds of attacks . DNS domain names are not fullycontrolled by the users, which can be easily taken down by the authorities andregistrars . Since blockchain has its unique properties like immutability anddecentralization, it seems to be promising to build a decentralized nameservice on blockchain .…

Cybersecurity in Smart Farming Canada Market Research

The Cyber Science Lab (CSL) and Smart Cyber-Physical System (SCPS) Lab at theUniversity of Guelph conduct a market study of cybersecurity technologyadoption and requirements for smart and precision farming in Canada . Weconducted 17 stakeholder/key opinion leader interviews in Canada and the USA, to complete this study .…

Towards Efficient Graph Convolutional Networks for Point Cloud Handling

In this paper, we aim at improving the computational efficiency of graphconvolutional networks (GCNs) for learning on point clouds . The optimized networks have reduced computational complexity, decreased memoryconsumption, and accelerated inference speed . Code will be available at\url{https://://://github.com/ofsoundof/EfficientGCN.git and the code is available at http://://www.gofsoundsof-of-soundof.com.org//gofEfficient…

Accelerating science with human versus alien artificial intelligences

Data-driven artificial intelligence models fed with published scientific findings have been used to create powerful prediction engines for scientific and technological advance . These models succeed by predicting human predictions and the scientists who will make them . By tuning AI to avoid the crowd, however, itgenerates scientifically promising “alien” hypotheses unlikely to be imagined or pursued without intervention, not only accelerating but punctuatingscientific advance .…

Feedback Vertex Set on Hamiltonian Graphs

We study the computational complexity of Feedback Vertex Set on subclasses ofHamiltonian graphs . In particular, we consider Hamiltonian graphs that areregular or are planar and regular . We also study the less known class of $p$-Hamiltonian-ordered graphs, which admit for any $ p$-tupleof vertices a Hamiltonian cycle visiting them in the order given by the tuples of vertices .…

Characterization of Decomposition of Matrix Multiplication Tensors

The canonical polyadic (CP) decomposition of tensors thatcorresponds to matrix multiplications is studied . Finding the rank of thesetensors and computing the decompositions is a fundamental problem of algebraiccomplexity theory . In this paper, we present a novel decomposition . of the tensormultiplication of matrices of the size 3×3 with 3×6 with rank 40 .…

Updatable Learned Index with Precise Positions

Index plays an essential role in modern database engines to accelerate the processing . LIPP is able to support all kinds of index operations, namely lookup query,range query, insert, delete, update and bulkload . The results demonstrate that our method consistentlyoutperforms state-of-the-art solutions, achieving by up to 4x for a broaderclass of workloads with different index operations .…

Action Conditioned 3D Human Motion Synthesis with Transformer VAE

We tackle the problem of action-conditioned generation of realistic and diverse human motion sequences . In contrast to methods that complete, orextend, motion sequences, this task does not require an initial pose orsequence . We learn an action-aware latent representation for human motionsby training a generative variational autoencoder (VAE) We evaluate our approach on NTU RGB+D, HumanAct12 and UESTC datasets and show improvements over the state of the art .…

Image Level or Object Level A Tale of Two Resampling Strategies for Long Tailed Detection

Training on datasets with long-tailed distributions has been challenging formajor recognition tasks such as classification and detection . We show that image-level andobject-level resamplings are both important, and thus unify them with a jointresampling strategy (RIO) Our method outperforms state-of-the-art long-taileddetection and segmentation methods on LVIS v0.5 across various backbones.…

Learning Robust Visual semantic Mapping for Zero shot Learning

Zero-shot learning (ZSL) aims at recognizing unseen class examples (e.g.,images) with knowledge transferred from seen classes . In ZSL, the commonpractice is to train a mapping function between the visual and semantic featurespaces with labeled seen class examples . We focus on fullyempowering the semantic feature space, which is one of the key building blocksof ZSL .…

LocalViT Bringing Locality to Vision Transformers

We study how to introduce locality mechanisms into vision transformers . Locally-enhanced transformers outperform the baselines DeiT-T and PVT-t by 2.6\% and 3.1\% with a negligible increase in the number of parameters and effort . The same mechanism was used to apply to 4 visiontransformers, which shows the generalization of the locality concept .…

SchedGuard Protecting against Schedule Leaks Using Linux Containers

Real-time systems have recently been shown to be vulnerable to timinginference attacks . SchedGuard is integrated into the Linux kernel using cgroups, making it amenable to use with container frameworks . Not only is SchedGuard able to protect against the attacks mentioned above, but it also ensures that the real-timetasks/containers meet their temporal requirements .…

View Guided Point Cloud Completion

This paper presents a view-guided solution for the task of point cloudcompletion . ViPC (view-guided pointcloud completion) takes the missing crucial global structure information from an extra single-view image . By leveraging a framework that sequentiallyperforms effective cross-modality and cross-level fusions, our method achievessignificantly superior results over typical existing solutions .…