This paper aims to explore methods and techniques for achieving verifiability in cloud computing environments. Methodologically, by utilizing game theory as the theoretical foundation and employing blockchain and smar...
详细信息
This study investigates the impact of unexpected stimuli on participants’ stress levels during human-robot interactions (HRI). We designed an experiment, where a cobot performs writing tasks, as well as some unexpect...
详细信息
Compilers play a very important role in the development of software. More and more researchers are studying how to improve the reliability of compilers. An effective method is to test the compiler with equivalent prog...
详细信息
As IoT technology evolves, developments of ubiquitous computing accelerates. At the same time, threats of privacy exposure also increase since the IoT systems expose the information such as user’s location or medical...
详细信息
The scientific council at Benghazi University suffered from issues related to the scientific promotion process for faculty members. Promotion is still done manually, without a computerized system. Therefore, it faces ...
详细信息
To meet the high-performance requirements of fifth-generation(5G)and sixth-generation(6G)wireless networks,in particular,ultra-reliable and low-latency communication(URLLC)is considered to be one of the most important...
详细信息
To meet the high-performance requirements of fifth-generation(5G)and sixth-generation(6G)wireless networks,in particular,ultra-reliable and low-latency communication(URLLC)is considered to be one of the most important communication scenarios in a wireless *** this paper,we consider the effects of the Rician fading channel on the performance of cooperative device-to-device(D2D)communication with *** better performance,we maximize and examine the system’s minimal rate of D2D *** to the interference in D2D communication,the problem of maximizing the minimum rate becomes non-convex and difficult to *** solve this problem,a learning-to-optimize-based algorithm is proposed to find the optimal power *** conventional branch and bound(BB)algorithm are used to learn the optimal pruning policy with supervised *** learning is used to train the multiple *** address the imbalanced problem,we used the supervised undersampling *** are made with the conventional BB algorithm and the heuristic *** outcome of the simulation demonstrates a notable performance improvement in power *** proposed algorithm has significantly low computational complexity and runs faster as compared to the conventional BB algorithm and a heuristic algorithm.
Nowadays, mental-insulator-metal (MIM) waveguides are widely used in the design of optical plasmonic waveguides due to their superior ability to confine surface plasmons up to sub wavelength scale. This research propo...
详细信息
Image compression is a technique that reduces storage space and transmission bandwidth requirements by reducing the amount of image data, aiming to improve storage and transmission efficiency while maintaining accepta...
详细信息
Music Emotion Recognition (MER) refers to automatically extracting emotional information from music and predicting its perceived emotions, and it has social and psychological applications. This paper proposes a Dual A...
详细信息
Early detection of skin cancer significantly improves the five-year survival rate for patients. However, early-stage malignant tumors exhibit very subtle lesions in the skin, making their symptoms less noticeable. Pro...
详细信息
暂无评论