The proceedings contain 403 papers. The topics discussed include: a modified data clustering algorithm for uncertain data in peer to peer networks;concept drift detection for social media: a survey;voice feature analy...
ISBN:
(纸本)9781665438117
The proceedings contain 403 papers. The topics discussed include: a modified data clustering algorithm for uncertain data in peer to peer networks;concept drift detection for social media: a survey;voice feature analysis for speaker recognition to improve content management;analysis and prediction of drugs using machine learning techniques;text summarization using extractive techniques;an analysis and research on sentiments of twitter data;advancements of lab on chip in reducing human intervention: a study;an open air outdoor environment for children in urban residential precinct;analysis of online media content using datascience techniques;a machine learning approach for predicting dengue outbreak;analysis of student performance and requirement using datascience;analytical study of stochastic trends of non-performing assets of public and private commercial banks in india;a critical analysis of diabetes detection using machine learning algorithms;and recommendation system with exploratory data analytics using machine learning.
This paper investigates the deep learning techniques to improve radio resource management (RRM) in vehicular communication network (VCN). In this paper, the deep learning algorithms are highlighted which are used for ...
详细信息
Missing values create issues during the analysis of the dataset. Learning algorithms in an asymmetrical dataset can generate an overrated classification accuracy due to a bias towards the majority class at the expense...
详细信息
Due to slow CPU speed and small battery capacity, intelligent mobile devices cannot perform computing themselves, which causes many problems such as resource scheduling security technology. To reduce these problems, e...
Due to slow CPU speed and small battery capacity, intelligent mobile devices cannot perform computing themselves, which causes many problems such as resource scheduling security technology. To reduce these problems, edge computing techniques are needed. However, moving some computing tasks from mobile devices to edge servers increases the additional energy consumption of transport and server computation. Considering the four factors affecting mobile devices and servers, as well as the energy consumption of data transmission, a particle swarm optimization algorithm based on hierarchical learning was proposed to solve the problems of computing speed, power consumption of downloaded data, and computing security of mobile devices. The proposed algorithm optimizes these four parameters for each mobile device to allocate computing resources more rationally, minimize the total energy consumption, and ensure security during scheduling. When modeling computing resources, the maximum energy consumption, computation cycle, storage, bandwidth, and delay constraints are also considered. Compared to the other algorithms in the container cloud, the proposed particle swarm optimization algorithm optimized by hierarchical learning can get the optimal solution of resource scheduling satisfying the constraints faster, with lower energy consumption and higher security.
Its not news that people have been increasingly relying on digital technologies in recent years. As a result of this consumption, humans and machines are producing more data. On the other hand, these tools imply that ...
详细信息
These days cloud computing plays very major role in the world of computers. On demand services via Internet is provided by cloud computing using large amount of virtual storage. Its most important feature is that user...
详细信息
The aim of the proposed work is related to the detailed study of various types of COVID-19 along with its symptoms. This study utilized a retrospective approach to the COVID data from 2019 to 2021 to assess the severi...
详细信息
Cost budgeting is an important link in enhancing the competitiveness of an enterprise and realizing the optimal configuration of enterprise production. With the development of computer and information technology, ther...
详细信息
A Weibo recommendation algorithm integrating user interests is studied in this manuscript. Among the algorithms based on content similarity recommendation, the LDA algorithm is one of the most used and classic algorit...
详细信息
The Industrial Internet of Things(IIoT) is a revolution that is changing the face of industry. It brings opportunities and also challenges. Due to the harsh sensor environment in the industry, the collected big data i...
详细信息
ISBN:
(纸本)9781665418683
The Industrial Internet of Things(IIoT) is a revolution that is changing the face of industry. It brings opportunities and also challenges. Due to the harsh sensor environment in the industry, the collected big data is not credible, which seriously affects the judgment and feedback of the cloud. Traditional data cleaning relying on sensor nodes is not enough to process big data, while mobile edge computing can provide a good *** paper proposes a data cleaning solution based on mobile edge nodes. First,we obtain the training data of the cleaning ***, we use the isolation forest(iForest) anomaly detection method at the edge nodes. Experimental results show that the scheme improves the efficiency of data cleaning and also ensures the reliability and integrity of the data.
暂无评论