Aiming at the high security and high energy consumption risks of downlink multiple input single output (MISO) systems assisted by intelligent reflecting surface (IRS), the transmission beamforming of the base station(...
Aiming at the high security and high energy consumption risks of downlink multiple input single output (MISO) systems assisted by intelligent reflecting surface (IRS), the transmission beamforming of the base station(BS), and the phase shift matrix of IRS are jointly considered for the transmission of the system. A system transmission power minimization problem under the constraint of a legal user secrecy rate was constructed. then a second-order cone programming algorithm based on successive convex approximation(SCA) is proposed to solve the problem. the proposed algorithm simultaneously updates all optimization variables in each iteration and obtains a suboptimal solution to the original problem. the simulation results show that compared withthe proposed baseline scheme, the algorithm in this paper achieves lower transmit power while ensuring the confidentiality quality of legitimate users.
the task of a cross-lingual reverse dictionary can be considered a combination of conventional text summarization and language translation. the description needs to be summarized into target words and further translat...
详细信息
One of the main contributions of the paper is that we introduce "performance as a service" as a key component for future cloud storage environments. this is achieved through demonstration of the design and i...
详细信息
One of the main contributions of the paper is that we introduce "performance as a service" as a key component for future cloud storage environments. this is achieved through demonstration of the design and implementation of a multi-tier cloud storage system (CACSS), and the illustration of a linear programming model that helps to predict future data access patterns for efficient data caching management. the proposed caching algorithm aims to leverage the cloud economy by incorporating both potential performance improvement and revenue-gain into the storage systems.
the intention of this study is to study some implementation of reinforcement learning in the environment of Google Chrome's Dino Game. Different environments were tested on Deep Q network and proximal policy optim...
the intention of this study is to study some implementation of reinforcement learning in the environment of Google Chrome's Dino Game. Different environments were tested on Deep Q network and proximal policy optimization models. Images were provided as inputs in all trials and the highest scores were recorded and analysed to check which algorithm and environment performed better. Further work aims at including more environments and algorithms and performing training on High performance Computers.
Image to Image Translation (I2I) is a challenging computer vision problem used in numerous domains for multiple tasks. Recently, ophthalmology became one of the major fields where the application of I2I is increasing ...
详细信息
this paper studies two parallelization techniques for the implementation of a SPSO algorithm applied to optimize electromagnetic field devices, GPGPU and Pthreads for multiprocessor architectures. the GPGPU and Pthrea...
详细信息
ISBN:
(纸本)9781509019687
this paper studies two parallelization techniques for the implementation of a SPSO algorithm applied to optimize electromagnetic field devices, GPGPU and Pthreads for multiprocessor architectures. the GPGPU and Pthreads implementations are compared in terms of solution quality and speed up. the electromagnetic optimization problems chosen for testing the efficiency of the parallelization techniques are the TEAM22 benchmark problem and Loney's solenoid problem. As we will show, there is no single best parallel implementation strategy since the performances depend on the optimization function.
A new pheromone control strategy based on knowledge guide is presented. the main idea is to use the prior knowledge and group knowledge from statistical learning to guide the ant search. It has more targeted for ants ...
详细信息
ISBN:
(纸本)9781479986477
A new pheromone control strategy based on knowledge guide is presented. the main idea is to use the prior knowledge and group knowledge from statistical learning to guide the ant search. It has more targeted for ants search which combined with new pheromone updating strategy, thus contributing to a better solution for the algorithm. the experimental results indicate that the overall performance of the ant colony algorithm based on knowledge guiding pheromone control strategy is obviously better than other ant colony optimization algorithm.
In this work, a simple and compact-structured convolutional neural network (CNN) entitled as Denoising and Super-Resolution (DnSR) network for single image denoising and super resolution (SISR) is presented. Using spa...
详细信息
Welcome to SAFECOMP 2006, the 25thinternationalconference on Computer Safety, Security and Reliability, held in Gdansk,Poland. Since it was established in 1979 by the European Workshop on Industrial Computer Systems...
详细信息
ISBN:
(数字)9783540457633
ISBN:
(纸本)9783540457626
Welcome to SAFECOMP 2006, the 25thinternationalconference on Computer Safety, Security and Reliability, held in Gdansk,Poland. Since it was established in 1979 by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Reliability and Security (EWICS TC7), SAFECOMP has continuously contributed to the progress in high integrity applications of information technologies. the conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability of critical IT systems and applications and serves as a platform for knowledge and technology transfer for researchers, industry (suppliers, operators, users), regulators and certi?ers of such systems. SAFECOMP provides ample opportunity to exchange insights and experiences on emerging methods, approaches and practical so- tions to safety, security and reliability problems across the borders of di?erent application domains and technologies. the SAFECOMP 2006 program re?ected in this book included 32 papers selected from 101 submissions of full texts. the submissions came from authors representing 26 di?erent countries from Europe, Asia, and North and South America. the 32 accepted papers were prepared by experts representing 14 d- ferent countries. the above data con?rm the broad and increasing interest in SAFECOMP and the topics addressed. the program was supplemented by three keynote presentations by outsta- ing invited experts (not included in this book). the keynotes focused on - terdisciplinary aspects of dependability of computer systems, practical aspects of application of safety standards and new challenges of information security research and development.
there are new diseases discovered in the 21st century which have identical and additional symptoms to the previous diseases but these new diseases are far more dangerous than the previous ones and have some additional...
详细信息
there are new diseases discovered in the 21st century which have identical and additional symptoms to the previous diseases but these new diseases are far more dangerous than the previous ones and have some additional symptoms. So, In this work the new diseases can be identified by taking the input from the user and identifying the disease and displaying it on the users smart screen display. this work aim is to reduce the deaths of people by identifying the disease and cure it in advance. the Random Forest and Naive Bayes algorithms are used for predicting the disease. this prediction is done by considering and comparing the accuracies of boththe algorithms and gives the predicted disease as output which has best accuracy. Its implementation is completed via python programming language and tkinter library.
暂无评论