In today's society, the agricultural logistics and transportation industry faces numerous challenges in meeting the demands for fresh produce preservation and efficient transport. Insufficient environmental monito...
详细信息
The course Introduction to computer Networks (ICN) has become one of the most vital courses in computer Science and softwareengineering degrees and clearly is an imperative course for a degree in computer networking....
详细信息
The Internet of Underwater Things (IoUT) has garnered significant interest due to its potential applications in monitoring underwater environments. However, the unique characteristics of acoustic communication, such a...
详细信息
The Internet of Underwater Things (IoUT) has garnered significant interest due to its potential applications in monitoring underwater environments. However, the unique characteristics of acoustic communication, such as long propagation delays and high attenuation, present considerable obstacles for achieving efficient and dependable data transmission. Opportunistic routing is a crucial technique for enhancing packet delivery ratios by selecting a set of forwarding nodes and utilizing their cooperative forwarding to boost network throughput. Nevertheless, choosing an excessive number of forwarding nodes can lead to wasteful energy usage and extended communication delays. Moreover, the overlooked trustworthiness of forwarded nodes in most research works can undermine the effectiveness of opportunistic routing. Therefore, this study presents a novel trust opportunistic routing scheme that employs reinforcement learning to achieve resilience in constantly changing underwater settings. The combination of reinforcement learning and trust management enables the proposed opportunistic routing scheme to adapt to the unstable underwater environment and unknown malicious attacks. Initially, a method is introduced for measuring environmental fitness by considering multiple trust factors, including communication success rate, data reliability, and location dynamics. The proposed scheme then uses reinforcement learning to develop a reliable opportunistic routing method based on quantified state information. This component employs the obtained state to formulate action strategies and obtains reward values from environmental inputs. The reward update equation integrates these qualities to optimize the deployment of superior action strategies, finally achieving trust opportunistic routing for underwater data collection. Fundamental experimental results demonstrate that the proposed protocol performs exceptionally well in demanding underwater conditions, outperforming existing method
Traditional serial motif mining methods struggle to quickly identify motif information in large-scale time series data. A CUDA-based multidimensional motif mining algorithm is proposed to discover motifs in multidimen...
详细信息
Cancer is one of the fatal threats to human beings. However, early detection and diagnosis can significantly reduce death risk, in which cytology classification is indispensable. Researchers have proposed many deep le...
详细信息
In large-scale distributed systems, the performance of computation tasks is often significantly degraded by straggling nodes. Recently, coded computation has emerged as a promising approach to mitigate the effect of s...
详细信息
This paper introduces a dynamic-frame time division multiple access (DF-TDMA) scheme aimed at decreasing the age of collection (AoC) in collaborative monitoring scenarios. Unlike the conventional age of information (A...
详细信息
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ...
详细信息
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** application of physical unclonable functions(PUFs)ensures secure data transmission among the internet of things(IoT)devices in a simplified network with an efficient time-stamped *** paper proposes a secure,lightweight,cost-efficient reinforcement machine learning framework(SLCR-MLF)to achieve decentralization and security,thus enabling scalability,data integrity,and optimized processing time in IoT *** has been integrated into SLCR-MLF to improve the security of the cluster head node in the IoT platform during transmission by providing the authentication service for device-to-device *** IoT network gathers information of interest from multiple cluster members selected by the proposed *** addition,the software-defined secured(SDS)technique is integrated with SLCR-MLF to improve data integrity and optimize processing time in the IoT *** analysis shows that the proposed framework outperforms conventional methods regarding the network’s lifetime,energy,secured data retrieval rate,and performance *** enabling the proposed framework,number of residual nodes is reduced to 16%,energy consumption is reduced by up to 50%,almost 30%improvement in data retrieval rate,and network lifetime is improved by up to 1000 msec.
Semi-supervised-Learning(SSL) providing a solution to leverage vast amounts of unlabeled data. In cognitive psychology, the Primacy-effect refers to the phenomenon where the initial information encountered tends to le...
详细信息
Since the preparation of labeled datafor training semantic segmentation networks of pointclouds is a time-consuming process, weakly supervisedapproaches have been introduced to learn fromonly a small fraction of data....
详细信息
Since the preparation of labeled datafor training semantic segmentation networks of pointclouds is a time-consuming process, weakly supervisedapproaches have been introduced to learn fromonly a small fraction of data. These methods aretypically based on learning with contrastive losses whileautomatically deriving per-point pseudo-labels from asparse set of user-annotated labels. In this paper, ourkey observation is that the selection of which samplesto annotate is as important as how these samplesare used for training. Thus, we introduce a methodfor weakly supervised segmentation of 3D scenes thatcombines self-training with active learning. Activelearning selects points for annotation that are likelyto result in improvements to the trained model, whileself-training makes efficient use of the user-providedlabels for learning the model. We demonstrate thatour approach leads to an effective method that providesimprovements in scene segmentation over previouswork and baselines, while requiring only a few userannotations.
暂无评论