With the rapid development of artificial intelligence technology, pre-Trained large language models (LLMs) have demonstrated their powerful application potential in various fields. Click fraud is a serious issue in th...
详细信息
With the rapid development of informationtechnology, cloud computing has become one of the key technologies that promotes the optimal allocation of resources for entrepreneurial enterprises. This study deeply explore...
详细信息
This paper investigates the performance of an Internet of Things (IoT) system utilizing a unmanned aerial vehicle (UAV) in an urban environment with the assistance of non-orthogonal multiple access (NOMA) based mobile...
详细信息
ISBN:
(纸本)9798400716713
This paper investigates the performance of an Internet of Things (IoT) system utilizing a unmanned aerial vehicle (UAV) in an urban environment with the assistance of non-orthogonal multiple access (NOMA) based mobile-edge computing (MEC). We consider two clusters of IoT device (ID) with limited resources that can harvest energy from a power beacon (PB) in order to offload their tasks to a UAV. We propose a four-phase protocol for energy harvesting (EH) and offloading task of IDs. To evaluate offloading performance, we derive the expression of successful computation probability (SCP) for the whole system. In addition, we present a formulation of the optimization problem that optimizes the SCP by optimizing the EH time and height of the UAV. The issue was resolved using particle swarm optimization (PSO). On the basis of the Monte Carlo simulation, a number of system parameters, including the number of IDs in each cluster, the EH time, and the height
Due to the openness of the wireless communication system in the power system, the wireless communication is more vulnerable to malicious attacks than the traditional wired communication system. Based on the above prob...
详细信息
ISBN:
(纸本)9798350389913;9798350389906
Due to the openness of the wireless communication system in the power system, the wireless communication is more vulnerable to malicious attacks than the traditional wired communication system. Based on the above problems, the equipment RF fingerprint identification technology scheme is proposed. This scheme collects the RF fingerprint of the existing devices, builds the neural network structure, imports the RF fingerprint data for training and obtains the identification model. It introduces the RF fingerprint of the device into the trained recognition model for testing, and obtains the identification results. This scheme does not require repeated tedious calculation, reduces the cost, and achieves a better identification rate with lower complexity.
Integrated ample facts analytics, the aggregate of online and offline information, is a more and more popular form of massive information analytics. It entails mixing information sources, including information warehou...
详细信息
In recent years, the development of AI technology has driven the development of network edge applications such as smart manufacturing, smart factories, and smart cities. Deep neural networks are increasingly being dep...
详细信息
In this era of rapid development of information science and technology, data codingtechnology has been widely used in multimedia, computer, communication and other fields. Non-deterministic combined coding is further...
详细信息
Down Syndrome, a genetic disorder caused due to an extra copy of chromosome 21. With around 1 in 700 newborn babies being affected from it, it remains one of the most prevalent chromosomal disease. Children with down ...
详细信息
We propose a learning-based image restoration algorithm for a single decoded image with a high-quality foreground and an extremely degraded background for video coding for machines (VCM). First, we develop an encoder ...
详细信息
ISBN:
(纸本)9781728198354
We propose a learning-based image restoration algorithm for a single decoded image with a high-quality foreground and an extremely degraded background for video coding for machines (VCM). First, we develop an encoder that extracts multiscale features and learns latent vectors. Then, a background generator with style and feature fusion blocks generates guided features that contain the prior background information in the input image. Finally, the decoder restores the degraded background region by merging the image features from the encoder and prior background information from the generator. Experimental results show that the proposed algorithm achieves better performance than state-of-the-art algorithms.
Nowadays, big data in livestream (BDL) is becoming increasingly prominent in computing systems (CS). Algebraic structures apply algebraic concepts to BDL in CS, aiding in the analysis and resolution of BDL-related pro...
详细信息
暂无评论