Application traffic identification is of great significance to improve network service quality and cyberspace security. Although deep learning has made great progress in the field of traffic identification, many exist...
详细信息
Cryptanalysis systematically exploits vulnerabilities in cryptographic algorithms to decrypt ciphertext without access to the private key. This study leverages neural networks, which excel in identifying intricate pat...
详细信息
The proceedings contain 12 papers. The topics discussed include: auction mechanism based multi-agent DRL for multi-service placement in mobile edge computing;optimized embedded model for time sequence alignment within...
ISBN:
(纸本)9798350313048
The proceedings contain 12 papers. The topics discussed include: auction mechanism based multi-agent DRL for multi-service placement in mobile edge computing;optimized embedded model for time sequence alignment within distributed video streams environment;BSA tool: an experience report of software automation to perform sanity tests in a global software development environment;application and research of OFD-based e-procurement document management system;a fast decentralized scheduling method of cooperative localization based on actor-critic deep reinforcement learning;mobile based navigation system for visually impaired person using image detection with voice translation;efficient structure search for person re-identification;face detection using the Siamese network with reconstruction supervision;a rate compatible LDPC scheme in the quantum key distribution system;and a method of multiple targets DOA tracking with vector hydrophone based on unite processing in time and frequency domain.
Based on the analysis of the characteristics of the user-side microgrid, the principles of energy storage capacity and power allocation in the microgrid are summarized. Through the analysis of the output of the photov...
详细信息
This paper provides an in-depth analysis of a financial services platform that utilizes blockchain technology for peer-to-peer payments, crowdfunding, and loan services. By leveraging blockchain, the platform guarante...
详细信息
Due to its decentralized and impervious to tampering nature, blockchain technology presents great opportunities for improving data privacy in a variety of contexts. This study offers a thorough analysis of the body of...
详细信息
A two-degree-of-freedom redundantly driven parallel robot is proposed to address the drawback that the two-degree-of-freedom parallel robot cannot reach the boundary. Firstly, the positive and negative solutions of th...
详细信息
The development and popularization of distributed renewable energy generation have granted traditional small-scale electricity consumers the qualification to participate in the electricity trading market. The correspo...
详细信息
Aiming at the defects of poor identification effect and prone to be disturbed by weather and illumination changes in vehicle detection using a single sensor, a multi-sensor fusion sensing system based on millimeter wa...
详细信息
Micropipe defects on the surface of silicon carbide wafers can have a significant impact on the quality of the wafers. Therefore, it is necessary to identify and locate them during the production process. Due to micro...
详细信息
暂无评论