An event-driven spectrum-aware routing algorithm based on the Hungarian algorithm (ESRH) is proposed to improve the spectrum utilization and the energy efficiency of cognitive radio sensor networks(CRSN). the method p...
详细信息
the proceedings contain 33 papers. the topics discussed include: DWT-RT: a lightweight image deraining model based on discrete wavelet transforms;data-driven optimal traffic signal control with phase priority and swit...
ISBN:
(纸本)9798350308020
the proceedings contain 33 papers. the topics discussed include: DWT-RT: a lightweight image deraining model based on discrete wavelet transforms;data-driven optimal traffic signal control with phase priority and switching cost;sonar object detection based on global context feature fusion and extraction;an image decomposition-based enhancement using a matrix iterative algorithm;tendency coefficient-based weighted distance measure for intuitionistic fuzzy sets with applications;higher-order link prediction based on message passing simplicial networks;short-term power load forecasting based on CEEMDAN-CNN-LSTM hybrid modeling;a method for large scale unconstrained binary quadratic programming problem based on graph neural network;encoding variable stiffness skills with interaction force and motion information for robot-environment interaction;and distributed Nash equilibrium seeking for high-order dynamics withevent-triggered communication.
the proceedings contain 110 papers. the topics discussed include: integrating speech input in educational immersive virtual reality applications: a systematic review;discrete-event co-simulation interface for time-tri...
ISBN:
(纸本)9798350350982
the proceedings contain 110 papers. the topics discussed include: integrating speech input in educational immersive virtual reality applications: a systematic review;discrete-event co-simulation interface for time-triggered organic computing;imaging in a smart agriculture platform;comparative analysis of machine learning techniques for enhanced predictive modeling in healthcare;exploring graph-based techniques in job recommendation systems;multiple inputs and hybrid deep learning model to identify suspicious posts on social media;analysis and prediction of computer science students’ performance based on core foundational courses using ensemble machine learning methods;efficient news synopsis generation with T5 transformers;and a flexible multi-agent systems task environment for simulating hybrid intelligence.
Enhancing household energy efficiency is crucial, and Non-intrusive Load Monitoring (NILM) offers a valuable solution by giving consumers insights into their energy use without individual device monitoring. However, t...
详细信息
In response to the malfunction of "marine diesel engine unable to start", the possible causes of the malfunction were deduced and a fault tree model was established. On this basis, the fault tree model was t...
详细信息
Mutation Testing (MT) is a technique employed to assess the efficacy of tests by introducing artificial faults, known as mutations, into the system. the goal is to evaluate how well the tests can detect these mutation...
详细信息
ISBN:
(纸本)9798400705892
Mutation Testing (MT) is a technique employed to assess the efficacy of tests by introducing artificial faults, known as mutations, into the system. the goal is to evaluate how well the tests can detect these mutations. these artificial faults are generated using mutation operators, which produce a set of mutations derived from the original system. Mutation operators and frameworks exist for a variety of programming languages, and model-based mutation testing is gaining traction, particularly for timed safety-critical systems. this paper focuses on extending MT to Networks of Timed Automata (NTAs), an area that has not been extensively explored. We introduce mutation operators designed for NTAs specified in UPPAAL, aiming to create temporal interaction faults. We assess the effectiveness of these operators on five UPPAAL NTAs sourced from the literature, specifically examining the generation of equivalent and duplicate mutants. Our results demonstrate a varied prevalence of equivalent mutants (from 12% to 71%) while the number of duplicates is less. In all cases, timed bisimulation was able to process each mutant pair in less than one second.
the proceedings contain 10 papers. the special focus in this conference is on Cloud Computing and Services Science. the topics include: Evaluating Microservices Communication Relationships for Scheduling Containers on...
ISBN:
(纸本)9783031681646
the proceedings contain 10 papers. the special focus in this conference is on Cloud Computing and Services Science. the topics include: Evaluating Microservices Communication Relationships for Scheduling Containers on Kubernetes Clusters;security Evaluation in Software-Defined Networks;a distributed Tool for Monitoring and Benchmarking a National Federated Cloud;metamodel and Formalization to Model, Transform, Deploy, and Execute Quantum Workflows;Edge AI Deployment and Stream-based Time Series Classification Within ARthUR;misconfiguration of Cluster and IoT systems Recovery: Extended Experiments;orchestrating Microservices-based Applications in the Cloud-to-Edge Continuum;fog-Robotics Infrastructures Simulation-based Sizing Approach.
How can we perform similarity joins of multi-dimensional streams in a distributed fashion, achieving low latency? Can we adaptively repartition those streams in order to retain high performance under concept drifts? C...
详细信息
the proceedings contain 14 papers. the topics discussed include: multi-receiver conditional anonymous signcryption mechanism based on multi-dimensional decision attributes for IoV;academic data privacy-preserving usin...
ISBN:
(纸本)9798400718069
the proceedings contain 14 papers. the topics discussed include: multi-receiver conditional anonymous signcryption mechanism based on multi-dimensional decision attributes for IoV;academic data privacy-preserving using centralized and distributedsystems: a comparative study;optimization of machine learning based data mining methods for network intrusion detection;TrustworthyAI: adversarial attacks and defensive strategies in self-driving systems using computer vision and artificial intelligence;exploring event misalignment bias and segment focus bias for weakly-supervised audio-visual video parsing;research on fish disease detection based on big data and deep learning;and intelligent predictive algorithm models of refuting information forwarding behaviors considering users’ personal characteristics.
the proceedings contain 148 papers. the topics discussed include: AI-enhanced velocity prediction for efficient EV energy management with hybrid storage;distributed reinforcement learning framework for autonomous opti...
ISBN:
(纸本)9798350361612
the proceedings contain 148 papers. the topics discussed include: AI-enhanced velocity prediction for efficient EV energy management with hybrid storage;distributed reinforcement learning framework for autonomous optimization of grid-scale energy storage systems in renewable energy integration;synergistic multi-service operation of hybrid energy storage systems;grid stability enhancement through machine learning-driven control strategies in renewable energy integration;high gain voltage SEPIC converter for PV system;towards a blockchain-enabled transactive renewable energy trading market;intelligent energy management system for microgrids using reinforcement learning;power management strategy of AC/DC hybrid microgrids based on integrating battery SoC conditions to state logic control algorithm;and AI-driven energy forecasting for electric vehicle charging stations powered by solar and wind energy.
暂无评论