Self-access language learning has attracted much attention in second language teaching and researching. This paper aims to do some researches on developing self-access language learning in the self-access center and t...Self-access language learning has attracted much attention in second language teaching and researching. This paper aims to do some researches on developing self-access language learning in the self-access center and test its effect on developing learner autonomy. Data,collected in the form of questionnaires and interview,were analyzed. Results show the development of self-access language learning by non-English majors.展开更多
Metacognitive strategies are regarded as advanced strategies in all the learning strategies.This study focuses on the application of metacognitive strategies in English listening in the web-based self-access learning ...Metacognitive strategies are regarded as advanced strategies in all the learning strategies.This study focuses on the application of metacognitive strategies in English listening in the web-based self-access learning environment(WSLE) and tries to provide some references for those students and teachers in the vocational colleges.展开更多
With increasing density and heterogeneity in unlicensed wireless networks,traditional MAC protocols,such as Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)in Wi-Fi networks,are experiencing performance...With increasing density and heterogeneity in unlicensed wireless networks,traditional MAC protocols,such as Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)in Wi-Fi networks,are experiencing performance degradation.This is manifested in increased collisions and extended backoff times,leading to diminished spectrum efficiency and protocol coordination.Addressing these issues,this paper proposes a deep-learning-based MAC paradigm,dubbed DL-MAC,which leverages spectrum data readily available from energy detection modules in wireless devices to achieve the MAC functionalities of channel access,rate adaptation,and channel switch.First,we utilize DL-MAC to realize a joint design of channel access and rate adaptation.Subsequently,we integrate the capability of channel switching into DL-MAC,enhancing its functionality from single-channel to multi-channel operations.Specifically,the DL-MAC protocol incorporates a Deep Neural Network(DNN)for channel selection and a Recurrent Neural Network(RNN)for the joint design of channel access and rate adaptation.We conducted real-world data collection within the 2.4 GHz frequency band to validate the effectiveness of DL-MAC.Experimental results demonstrate that DL-MAC exhibits significantly superior performance compared to traditional algorithms in both single and multi-channel environments,and also outperforms single-function designs.Additionally,the performance of DL-MAC remains robust,unaffected by channel switch overheads within the evaluation range.展开更多
The increasing deployment of Internet of Things(IoT)devices has introduced significant security chal-lenges,including identity spoofing,unauthorized access,and data integrity breaches.Traditional security mechanisms r...The increasing deployment of Internet of Things(IoT)devices has introduced significant security chal-lenges,including identity spoofing,unauthorized access,and data integrity breaches.Traditional security mechanisms rely on centralized frameworks that suffer from single points of failure,scalability issues,and inefficiencies in real-time security enforcement.To address these limitations,this study proposes the Blockchain-Enhanced Trust and Access Control for IoT Security(BETAC-IoT)model,which integrates blockchain technology,smart contracts,federated learning,and Merkle tree-based integrity verification to enhance IoT security.The proposed model eliminates reliance on centralized authentication by employing decentralized identity management,ensuring tamper-proof data storage,and automating access control through smart contracts.Experimental evaluation using a synthetic IoT dataset shows that the BETAC-IoT model improves access control enforcement accuracy by 92%,reduces device authentication time by 52%(from 2.5 to 1.2 s),and enhances threat detection efficiency by 7%(from 85%to 92%)using federated learning.Additionally,the hybrid blockchain architecture achieves a 300%increase in transaction throughput when comparing private blockchain performance(1200 TPS)to public chains(300 TPS).Access control enforcement accuracy was quantified through confusion matrix analysis,with high precision and minimal false positives observed across access decision categories.Although the model presents advantages in security and scalability,challenges such as computational overhead,blockchain storage constraints,and interoperability with existing IoT systems remain areas for future research.This study contributes to advancing decentralized security frameworks for IoT,providing a resilient and scalable solution for securing connected environments.展开更多
The 3GPP standard defines the requirements for next-generation wireless networks,with particular attention to Ultra-Reliable Low-Latency Communications(URLLC),critical for applications such as Unmanned Aerial Vehicles...The 3GPP standard defines the requirements for next-generation wireless networks,with particular attention to Ultra-Reliable Low-Latency Communications(URLLC),critical for applications such as Unmanned Aerial Vehicles(UAVs).In this context,Non-Orthogonal Multiple Access(NOMA)has emerged as a promising technique to improve spectrum efficiency and user fairness by allowing multiple users to share the same frequency resources.However,optimizing key parameters–such as beamforming,rate allocation,and UAV trajectory–presents significant challenges due to the nonconvex nature of the problem,especially under stringent URLLC constraints.This paper proposes an advanced deep learning-driven approach to address the resulting complex optimization challenges.We formulate a downlink multiuser UAV,Rate-Splitting Multiple Access(RSMA),and Multiple Input Multiple Output(MIMO)system aimed at maximizing the achievable rate under stringent constraints,including URLLC quality-of-service(QoS),power budgets,rate allocations,and UAV trajectory limitations.Due to the highly nonconvex nature of the optimization problem,we introduce a novel distributed deep reinforcement learning(DRL)framework based on dual-agent deep deterministic policy gradient(DA-DDPG).The proposed framework leverages inception-inspired and deep unfolding architectures to improve feature extraction and convergence in beamforming and rate allocation.For UAV trajectory optimization,we design a dedicated actor-critic agent using a fully connected deep neural network(DNN),further enhanced through incremental learning.Simulation results validate the effectiveness of our approach,demonstrating significant performance gains over existing methods and confirming its potential for real-time URLLC in next-generation UAV communication networks.展开更多
This paper aims to investigate self-access centers'effects on college English learning. Data, collected in the form of questionnaires and interview, were analyzed. Results demonstrate that the self-access center(S...This paper aims to investigate self-access centers'effects on college English learning. Data, collected in the form of questionnaires and interview, were analyzed. Results demonstrate that the self-access center(SAC)does help students to promote learner autonomy, lower their anxiety and encourage their interest in college English learning.展开更多
As a promising paradigm of the fifth generation networks,fog radio access network(F-RAN)has attracted lots of attention nowadays.To fully utilize the promising gain of F-RANs,the acquisition of accurate channel state ...As a promising paradigm of the fifth generation networks,fog radio access network(F-RAN)has attracted lots of attention nowadays.To fully utilize the promising gain of F-RANs,the acquisition of accurate channel state information is significant.However,conventional channel estimation approaches are not suitable in F-RANs due to the large training and feedback overhead.In this paper,we consider the channel estimation in F-RANs with fog access point(F-AP)equipped with massive antennas.Thanks to the computing ability of F-AP and the sparsity of channel matrices in angular domain,Gated Recurrent Unit(GRU),a data-driven based channel estimation is proposed at F-AP to reduce the training and feedback overhead.The GRU-based method can capture the hidden sparsity structure automatically through the network training.Moreover,to further improve the channel estimation,a bidirectional GRU based method is proposed,whose target channel structure is decided by previous and subsequent structures.We compare the performance of our proposed channel estimation with traditional methods(Orthogonal Matching Pursuit(OMP)and Simultaneous OMP(SOMP)).Simulation results show that the proposed approaches have better performance compared with the traditional OMP and SOMP methods.展开更多
The spectrum access problem of cognitive users in the fast-changing dynamic interference spectrum environment is addressed in this paper.The prior knowledge for the dynamic spectrum access is modeled and a reliability...The spectrum access problem of cognitive users in the fast-changing dynamic interference spectrum environment is addressed in this paper.The prior knowledge for the dynamic spectrum access is modeled and a reliability quantification scheme is presented to guide the use of the prior knowledge in the learning process.Furthermore,a spectrum access scheme based on the prior knowledge enabled RL(PKRL)is designed,which effectively improved the learning efficiency and provided a solution for users to better adapt to the fast-changing and high-density electromagnetic environment.Compared with the existing methods,the proposed algorithm can adjust the access channel online according to historical information and improve the efficiency of the algorithm to obtain the optimal access policy.Simulation results show that,the convergence speed of the learning is improved by about 66%with the invariant average throughput.展开更多
Cognitive Internet of Vehicles(CIoV)can improve spectrum utilization by accessing the spectrum licensed to primary user(PU)under the premise of not disturbing the PU’s transmissions.However,the traditional static spe...Cognitive Internet of Vehicles(CIoV)can improve spectrum utilization by accessing the spectrum licensed to primary user(PU)under the premise of not disturbing the PU’s transmissions.However,the traditional static spectrum access makes the CIoV unable to adapt to the various spectrum environments.In this paper,a reinforcement learning based dynamic spectrum access scheme is proposed to improve the transmission performance of the CIoV in the licensed spectrum,and avoid causing harmful interference to the PU.The frame structure of the CIoV is separated into sensing period and access period,whereby the CIoV can optimize the transmission parameters in the access period according to the spectrum decisions in the sensing period.Considering both detection probability and false alarm probability,a Q-learning based spectrum access algorithm is proposed for the CIoV to intelligently select the optimal channel,bandwidth and transmit power under the dynamic spectrum states and various spectrum sensing performance.The simulations have shown that compared with the traditional non-learning spectrum access algorithm,the proposed Q-learning algorithm can effectively improve the spectral efficiency and throughput of the CIoV as well as decrease the interference power to the PU.展开更多
As is known,centralized federated learning faces risks of a single point of failure and privacy breaches,and blockchain-based federated learning frameworks can address these challenges to a certain extent in recent wo...As is known,centralized federated learning faces risks of a single point of failure and privacy breaches,and blockchain-based federated learning frameworks can address these challenges to a certain extent in recent works.However,malicious clients may still illegally access the blockchain to upload malicious data or steal on-chain data.In addition,blockchain-based federated training suffers from a heavy storage burden and excessive network communication overhead.To address these issues,we propose an asynchronous,tiered federated learning storage scheme based on blockchain and IPFS.It manages the execution of federated learning tasks through smart contracts deployed on the blockchain,decentralizing the entire training process.Additionally,the scheme employs a secure and efficient blockchain-based asynchronous tiered architecture,integrating attribute-based access control technology for resource exchange between the clients and the blockchain network.It dynamically manages access control policies during training and adopts a hybrid data storage strategy combining blockchain and IPFS.Experiments with multiple sets of image classification tasks are conducted,indicating that the storage strategy used in this scheme saves nearly 50 percent of the communication overhead and significantly reduces the on-chain storage burden compared to the traditional blockchain-only storage strategy.In terms of training effectiveness,it maintains similar accuracy as centralized training and minimizes the probability of being attacked.展开更多
Due to the recent trend of software intelligence in the Fourth Industrial Revolution,deep learning has become a mainstream workload for modern computer systems.Since the data size of deep learning increasingly grows,m...Due to the recent trend of software intelligence in the Fourth Industrial Revolution,deep learning has become a mainstream workload for modern computer systems.Since the data size of deep learning increasingly grows,managing the limited memory capacity efficiently for deep learning workloads becomes important.In this paper,we analyze memory accesses in deep learning workloads and find out some unique characteristics differentiated from traditional workloads.First,when comparing instruction and data accesses,data access accounts for 96%–99%of total memory accesses in deep learning workloads,which is quite different from traditional workloads.Second,when comparing read and write accesses,write access dominates,accounting for 64%–80%of total memory accesses.Third,although write access makes up the majority of memory accesses,it shows a low access bias of 0.3 in the Zipf parameter.Fourth,in predicting re-access,recency is important in read access,but frequency provides more accurate information in write access.Based on these observations,we introduce a Non-Volatile Random Access Memory(NVRAM)-accelerated memory architecture for deep learning workloads,and present a new memory management policy for this architecture.By considering the memory access characteristics of deep learning workloads,the proposed policy improves memory performance by 64.3%on average compared to the CLOCK policy.展开更多
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy...Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.展开更多
Link asymmetry in wireless mesh access networks(WMAN)of Mobile ad-hoc Networks(MANETs)is due mesh routers’transmission range.It is depicted as significant research challenges that pose during the design of network pro...Link asymmetry in wireless mesh access networks(WMAN)of Mobile ad-hoc Networks(MANETs)is due mesh routers’transmission range.It is depicted as significant research challenges that pose during the design of network protocol in wireless networks.Based on the extensive review,it is noted that the substantial link percentage is symmetric,i.e.,many links are unidirectional.It is identified that the synchronous acknowledgement reliability is higher than the asynchronous message.Therefore,the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asym-metric links.It paves the way to exploit an investigation on asymmetric links to enhance network functions through link estimation.Here,a novel Learning-based Dynamic Tree routing(LDTR)model is proposed to improve network performance and delay.For the evaluation of delay measures,asymmetric link,interference,probability of transmission failure is evaluated.The proportion of energy consumed is used for monitoring energy conditions based on the total energy capacity.This learning model is a productive way for resolving the routing issues over the network model during uncertainty.The asymmetric path is chosen to achieve exploitation and exploration iteratively.The learning-based Dynamic Tree routing model is utilized to resolve the multi-objective routing problem.Here,the simulation is done with MATLAB 2020a simulation environment and path with energy-efficiency and lesser E2E delay is evaluated and compared with existing approaches like the Dyna-Q-network model(DQN),asymmetric MAC model(AMAC),and cooperative asymmetric MAC model(CAMAC)model.The simulation outcomes demonstrate that the anticipated LDTR model attains superior network performance compared to others.The average energy consump-tion is 250 J,packet energy consumption is 6.5 J,PRR is 50 bits/sec,95%PDR,average delay percentage is 20%.展开更多
Formany years,researchers have explored power allocation(PA)algorithms driven bymodels in wireless networks where multiple-user communications with interference are present.Nowadays,data-driven machine learning method...Formany years,researchers have explored power allocation(PA)algorithms driven bymodels in wireless networks where multiple-user communications with interference are present.Nowadays,data-driven machine learning methods have become quite popular in analyzing wireless communication systems,which among them deep reinforcement learning(DRL)has a significant role in solving optimization issues under certain constraints.To this purpose,in this paper,we investigate the PA problem in a k-user multiple access channels(MAC),where k transmitters(e.g.,mobile users)aim to send an independent message to a common receiver(e.g.,base station)through wireless channels.To this end,we first train the deep Q network(DQN)with a deep Q learning(DQL)algorithm over the simulation environment,utilizing offline learning.Then,the DQN will be used with the real data in the online training method for the PA issue by maximizing the sumrate subjected to the source power.Finally,the simulation results indicate that our proposedDQNmethod provides better performance in terms of the sumrate compared with the available DQL training approaches such as fractional programming(FP)and weighted minimum mean squared error(WMMSE).Additionally,by considering different user densities,we show that our proposed DQN outperforms benchmark algorithms,thereby,a good generalization ability is verified over wireless multi-user communication systems.展开更多
文摘Self-access language learning has attracted much attention in second language teaching and researching. This paper aims to do some researches on developing self-access language learning in the self-access center and test its effect on developing learner autonomy. Data,collected in the form of questionnaires and interview,were analyzed. Results show the development of self-access language learning by non-English majors.
文摘Metacognitive strategies are regarded as advanced strategies in all the learning strategies.This study focuses on the application of metacognitive strategies in English listening in the web-based self-access learning environment(WSLE) and tries to provide some references for those students and teachers in the vocational colleges.
基金supported in part by the National Key R&D Program of China under Grant 2021YFB1714100in part by the Shenzhen Science and Technology Program,China,under Grant JCYJ20220531101015033.
文摘With increasing density and heterogeneity in unlicensed wireless networks,traditional MAC protocols,such as Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)in Wi-Fi networks,are experiencing performance degradation.This is manifested in increased collisions and extended backoff times,leading to diminished spectrum efficiency and protocol coordination.Addressing these issues,this paper proposes a deep-learning-based MAC paradigm,dubbed DL-MAC,which leverages spectrum data readily available from energy detection modules in wireless devices to achieve the MAC functionalities of channel access,rate adaptation,and channel switch.First,we utilize DL-MAC to realize a joint design of channel access and rate adaptation.Subsequently,we integrate the capability of channel switching into DL-MAC,enhancing its functionality from single-channel to multi-channel operations.Specifically,the DL-MAC protocol incorporates a Deep Neural Network(DNN)for channel selection and a Recurrent Neural Network(RNN)for the joint design of channel access and rate adaptation.We conducted real-world data collection within the 2.4 GHz frequency band to validate the effectiveness of DL-MAC.Experimental results demonstrate that DL-MAC exhibits significantly superior performance compared to traditional algorithms in both single and multi-channel environments,and also outperforms single-function designs.Additionally,the performance of DL-MAC remains robust,unaffected by channel switch overheads within the evaluation range.
文摘The increasing deployment of Internet of Things(IoT)devices has introduced significant security chal-lenges,including identity spoofing,unauthorized access,and data integrity breaches.Traditional security mechanisms rely on centralized frameworks that suffer from single points of failure,scalability issues,and inefficiencies in real-time security enforcement.To address these limitations,this study proposes the Blockchain-Enhanced Trust and Access Control for IoT Security(BETAC-IoT)model,which integrates blockchain technology,smart contracts,federated learning,and Merkle tree-based integrity verification to enhance IoT security.The proposed model eliminates reliance on centralized authentication by employing decentralized identity management,ensuring tamper-proof data storage,and automating access control through smart contracts.Experimental evaluation using a synthetic IoT dataset shows that the BETAC-IoT model improves access control enforcement accuracy by 92%,reduces device authentication time by 52%(from 2.5 to 1.2 s),and enhances threat detection efficiency by 7%(from 85%to 92%)using federated learning.Additionally,the hybrid blockchain architecture achieves a 300%increase in transaction throughput when comparing private blockchain performance(1200 TPS)to public chains(300 TPS).Access control enforcement accuracy was quantified through confusion matrix analysis,with high precision and minimal false positives observed across access decision categories.Although the model presents advantages in security and scalability,challenges such as computational overhead,blockchain storage constraints,and interoperability with existing IoT systems remain areas for future research.This study contributes to advancing decentralized security frameworks for IoT,providing a resilient and scalable solution for securing connected environments.
基金supported by the Deputyship of Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number RI-44-0291.
文摘The 3GPP standard defines the requirements for next-generation wireless networks,with particular attention to Ultra-Reliable Low-Latency Communications(URLLC),critical for applications such as Unmanned Aerial Vehicles(UAVs).In this context,Non-Orthogonal Multiple Access(NOMA)has emerged as a promising technique to improve spectrum efficiency and user fairness by allowing multiple users to share the same frequency resources.However,optimizing key parameters–such as beamforming,rate allocation,and UAV trajectory–presents significant challenges due to the nonconvex nature of the problem,especially under stringent URLLC constraints.This paper proposes an advanced deep learning-driven approach to address the resulting complex optimization challenges.We formulate a downlink multiuser UAV,Rate-Splitting Multiple Access(RSMA),and Multiple Input Multiple Output(MIMO)system aimed at maximizing the achievable rate under stringent constraints,including URLLC quality-of-service(QoS),power budgets,rate allocations,and UAV trajectory limitations.Due to the highly nonconvex nature of the optimization problem,we introduce a novel distributed deep reinforcement learning(DRL)framework based on dual-agent deep deterministic policy gradient(DA-DDPG).The proposed framework leverages inception-inspired and deep unfolding architectures to improve feature extraction and convergence in beamforming and rate allocation.For UAV trajectory optimization,we design a dedicated actor-critic agent using a fully connected deep neural network(DNN),further enhanced through incremental learning.Simulation results validate the effectiveness of our approach,demonstrating significant performance gains over existing methods and confirming its potential for real-time URLLC in next-generation UAV communication networks.
文摘This paper aims to investigate self-access centers'effects on college English learning. Data, collected in the form of questionnaires and interview, were analyzed. Results demonstrate that the self-access center(SAC)does help students to promote learner autonomy, lower their anxiety and encourage their interest in college English learning.
基金supported in part by the State Major Science and Technology Special Project(Grant No.2018ZX03001023)the National Natural Science Foundation of China under No.61831002+1 种基金the National Science Foundation for Postdoctoral Scientists of China(Grant No.2018M641279)FundamentalResearch Funds for the Central Universities under Grant No.2018XKJC01
文摘As a promising paradigm of the fifth generation networks,fog radio access network(F-RAN)has attracted lots of attention nowadays.To fully utilize the promising gain of F-RANs,the acquisition of accurate channel state information is significant.However,conventional channel estimation approaches are not suitable in F-RANs due to the large training and feedback overhead.In this paper,we consider the channel estimation in F-RANs with fog access point(F-AP)equipped with massive antennas.Thanks to the computing ability of F-AP and the sparsity of channel matrices in angular domain,Gated Recurrent Unit(GRU),a data-driven based channel estimation is proposed at F-AP to reduce the training and feedback overhead.The GRU-based method can capture the hidden sparsity structure automatically through the network training.Moreover,to further improve the channel estimation,a bidirectional GRU based method is proposed,whose target channel structure is decided by previous and subsequent structures.We compare the performance of our proposed channel estimation with traditional methods(Orthogonal Matching Pursuit(OMP)and Simultaneous OMP(SOMP)).Simulation results show that the proposed approaches have better performance compared with the traditional OMP and SOMP methods.
基金supported by National Natural Science Foundation of China (No. 62131005)
文摘The spectrum access problem of cognitive users in the fast-changing dynamic interference spectrum environment is addressed in this paper.The prior knowledge for the dynamic spectrum access is modeled and a reliability quantification scheme is presented to guide the use of the prior knowledge in the learning process.Furthermore,a spectrum access scheme based on the prior knowledge enabled RL(PKRL)is designed,which effectively improved the learning efficiency and provided a solution for users to better adapt to the fast-changing and high-density electromagnetic environment.Compared with the existing methods,the proposed algorithm can adjust the access channel online according to historical information and improve the efficiency of the algorithm to obtain the optimal access policy.Simulation results show that,the convergence speed of the learning is improved by about 66%with the invariant average throughput.
基金This work was supported by the Joint Foundations of the National Natural Science Foundations of China and the Civil Aviation of China under Grant U1833102the Natural Science Foundation of Liaoning Province under Grants 2020-HYLH-13 and 2019-ZD-0014+1 种基金the fundamental research funds for the central universities under Grant DUT21JC20the Engineering Research Center of Mobile Communications,Ministry of Education.
文摘Cognitive Internet of Vehicles(CIoV)can improve spectrum utilization by accessing the spectrum licensed to primary user(PU)under the premise of not disturbing the PU’s transmissions.However,the traditional static spectrum access makes the CIoV unable to adapt to the various spectrum environments.In this paper,a reinforcement learning based dynamic spectrum access scheme is proposed to improve the transmission performance of the CIoV in the licensed spectrum,and avoid causing harmful interference to the PU.The frame structure of the CIoV is separated into sensing period and access period,whereby the CIoV can optimize the transmission parameters in the access period according to the spectrum decisions in the sensing period.Considering both detection probability and false alarm probability,a Q-learning based spectrum access algorithm is proposed for the CIoV to intelligently select the optimal channel,bandwidth and transmit power under the dynamic spectrum states and various spectrum sensing performance.The simulations have shown that compared with the traditional non-learning spectrum access algorithm,the proposed Q-learning algorithm can effectively improve the spectral efficiency and throughput of the CIoV as well as decrease the interference power to the PU.
基金supported by the National Natural Science Foundation of China(Grant No.52331012)the Natural Science Foundation of Shanghai Municipality(Grant No.21ZR1426500)the Program for Cultivation of Graduate Students’Top-notch Innovative Talents of Shanghai Maritime University(Grant No.2023YBR007).
文摘As is known,centralized federated learning faces risks of a single point of failure and privacy breaches,and blockchain-based federated learning frameworks can address these challenges to a certain extent in recent works.However,malicious clients may still illegally access the blockchain to upload malicious data or steal on-chain data.In addition,blockchain-based federated training suffers from a heavy storage burden and excessive network communication overhead.To address these issues,we propose an asynchronous,tiered federated learning storage scheme based on blockchain and IPFS.It manages the execution of federated learning tasks through smart contracts deployed on the blockchain,decentralizing the entire training process.Additionally,the scheme employs a secure and efficient blockchain-based asynchronous tiered architecture,integrating attribute-based access control technology for resource exchange between the clients and the blockchain network.It dynamically manages access control policies during training and adopts a hybrid data storage strategy combining blockchain and IPFS.Experiments with multiple sets of image classification tasks are conducted,indicating that the storage strategy used in this scheme saves nearly 50 percent of the communication overhead and significantly reduces the on-chain storage burden compared to the traditional blockchain-only storage strategy.In terms of training effectiveness,it maintains similar accuracy as centralized training and minimizes the probability of being attacked.
基金supported in part by the NRF(National Research Foundation of Korea)Grant(No.2019R1A2C1009275)by the Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by theKorean government(MSIT)(No.2021-0-02068,Artificial Intelligence Innovation Hub).
文摘Due to the recent trend of software intelligence in the Fourth Industrial Revolution,deep learning has become a mainstream workload for modern computer systems.Since the data size of deep learning increasingly grows,managing the limited memory capacity efficiently for deep learning workloads becomes important.In this paper,we analyze memory accesses in deep learning workloads and find out some unique characteristics differentiated from traditional workloads.First,when comparing instruction and data accesses,data access accounts for 96%–99%of total memory accesses in deep learning workloads,which is quite different from traditional workloads.Second,when comparing read and write accesses,write access dominates,accounting for 64%–80%of total memory accesses.Third,although write access makes up the majority of memory accesses,it shows a low access bias of 0.3 in the Zipf parameter.Fourth,in predicting re-access,recency is important in read access,but frequency provides more accurate information in write access.Based on these observations,we introduce a Non-Volatile Random Access Memory(NVRAM)-accelerated memory architecture for deep learning workloads,and present a new memory management policy for this architecture.By considering the memory access characteristics of deep learning workloads,the proposed policy improves memory performance by 64.3%on average compared to the CLOCK policy.
基金partly supported by the University of Malaya Impact Oriented Interdisci-plinary Research Grant under Grant IIRG008(A,B,C)-19IISS.
文摘Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.
文摘Link asymmetry in wireless mesh access networks(WMAN)of Mobile ad-hoc Networks(MANETs)is due mesh routers’transmission range.It is depicted as significant research challenges that pose during the design of network protocol in wireless networks.Based on the extensive review,it is noted that the substantial link percentage is symmetric,i.e.,many links are unidirectional.It is identified that the synchronous acknowledgement reliability is higher than the asynchronous message.Therefore,the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asym-metric links.It paves the way to exploit an investigation on asymmetric links to enhance network functions through link estimation.Here,a novel Learning-based Dynamic Tree routing(LDTR)model is proposed to improve network performance and delay.For the evaluation of delay measures,asymmetric link,interference,probability of transmission failure is evaluated.The proportion of energy consumed is used for monitoring energy conditions based on the total energy capacity.This learning model is a productive way for resolving the routing issues over the network model during uncertainty.The asymmetric path is chosen to achieve exploitation and exploration iteratively.The learning-based Dynamic Tree routing model is utilized to resolve the multi-objective routing problem.Here,the simulation is done with MATLAB 2020a simulation environment and path with energy-efficiency and lesser E2E delay is evaluated and compared with existing approaches like the Dyna-Q-network model(DQN),asymmetric MAC model(AMAC),and cooperative asymmetric MAC model(CAMAC)model.The simulation outcomes demonstrate that the anticipated LDTR model attains superior network performance compared to others.The average energy consump-tion is 250 J,packet energy consumption is 6.5 J,PRR is 50 bits/sec,95%PDR,average delay percentage is 20%.
文摘Formany years,researchers have explored power allocation(PA)algorithms driven bymodels in wireless networks where multiple-user communications with interference are present.Nowadays,data-driven machine learning methods have become quite popular in analyzing wireless communication systems,which among them deep reinforcement learning(DRL)has a significant role in solving optimization issues under certain constraints.To this purpose,in this paper,we investigate the PA problem in a k-user multiple access channels(MAC),where k transmitters(e.g.,mobile users)aim to send an independent message to a common receiver(e.g.,base station)through wireless channels.To this end,we first train the deep Q network(DQN)with a deep Q learning(DQL)algorithm over the simulation environment,utilizing offline learning.Then,the DQN will be used with the real data in the online training method for the PA issue by maximizing the sumrate subjected to the source power.Finally,the simulation results indicate that our proposedDQNmethod provides better performance in terms of the sumrate compared with the available DQL training approaches such as fractional programming(FP)and weighted minimum mean squared error(WMMSE).Additionally,by considering different user densities,we show that our proposed DQN outperforms benchmark algorithms,thereby,a good generalization ability is verified over wireless multi-user communication systems.