In multi-party machine learning scenarios involving sensitive data, safeguarding user and model privacy holds utmost importance. Current approaches often disclose model parameters to expedite training, but this poses ...
详细信息
This study introduces a new local feature descriptor called evaluation window-based adjacent distance local ternary pattern EAdLTP for image classification. It is created by combining evaluation window EwLBP and adjac...
详细信息
The majority of traffic accidents are caused by human error. To counteract that, Advanced Driver-Assistance Systems (ADAS) are being developed and installed in vehicles. One of those systems is the Lane Keeping Assist...
详细信息
The estimation of the human pose is an interesting computer vision problem. The principles of fuzzy logic can be used to distinguish the human poses due to the existing uncertainty. In this paper, we suggest fuzzy log...
详细信息
In this paper, a space vector modulation implementation is done via ATmega2560 microcontroller with the Arduino development board. The control parameters are defined by the user in MATLAB software and sent to Arduino ...
详细信息
Mobile Edge Computing(MEC)is proposed to solve the needs of Inter-net of Things(IoT)users for high resource utilization,high reliability and low latency of service ***,the backup virtual machine is idle when its prima...
详细信息
Mobile Edge Computing(MEC)is proposed to solve the needs of Inter-net of Things(IoT)users for high resource utilization,high reliability and low latency of service ***,the backup virtual machine is idle when its primary virtual machine is running normally,which will waste *** the backup virtual machine under the above circumstances can effectively improve resource ***,these virtual machines are deployed into slots randomly,and then some tasks with cooperative relationship are off-loaded to virtual machines for *** deployment locations have different resource utilization and average service response *** want tofind a balanced solution that minimizes the average service response time of the IoT application while maximizing resource *** this paper,we propose a task scheduler and exploit a Task Deployment Algorithm(TDA)to obtain an optimal virtual machine deployment ***,the simulation results show that the TDA can significantly increase the resource utilization of the system,while redu-cing the average service response time of the application by comparing TDA with the other two classical *** experimental results confirm that the perfor-mance of TDA is better than that of other two methods.
This work presents an adaptive tracking guidance method for robotic fishes. The scheme enables robots to suppress external interference and eliminate motion jitter. An adaptive integral surge line-of-sight guidance ru...
详细信息
This work presents an adaptive tracking guidance method for robotic fishes. The scheme enables robots to suppress external interference and eliminate motion jitter. An adaptive integral surge line-of-sight guidance rule is designed to eliminate dynamics interference and sideslip issues. Limited-time yaw and surge speed observers are reported to fit disturbance variables in the model. The approximation values can compensate for the system's control input and improve the robots' tracking ***, this work develops a terminal sliding mode controller and third-order differential processor to determine the rotational torque and reduce the robots' run jitter. Then, Lyapunov's theory proves the uniform ultimate boundedness of the proposed method. Simulation and physical experiments confirm that the technology improves the tracking error convergence speed and stability of robotic fishes.
Accurate rainfall prediction is crucial for countries like India, with an economy heavily reliant on agriculture. Machine learning techniques, particularly regression models, offer a promising approach for precipitati...
详细信息
Complex optimization problems hold broad significance across numerous fields and ***,as the dimensionality of such problems increases,issues like the curse of dimensionality and local optima trapping also *** address ...
详细信息
Complex optimization problems hold broad significance across numerous fields and ***,as the dimensionality of such problems increases,issues like the curse of dimensionality and local optima trapping also *** address these challenges,this paper proposes a novel Wild Gibbon Optimization Algorithm(WGOA)based on an analysis of wild gibbon population *** two strategies:community search and community *** community search strategy facilitates information exchange between two gibbon families,generating multiple candidate solutions to enhance algorithm ***,the community competition strategy reselects leaders for the population after each iteration,thus enhancing algorithm *** assess the algorithm’s performance,CEC2017 and CEC2022 are chosen as test *** the CEC2017 test suite,WGOA secures first place in 10 *** the CEC2022 benchmark functions,WGOA obtained the first rank in 5 *** ultimate experimental findings demonstrate that theWildGibbonOptimization Algorithm outperforms others in tested *** underscores the strong robustness and stability of the gibbonalgorithm in tackling complex single-objective optimization problems.
Photo compression is a vital thing in virtual photograph processing. Contour coding and wavelet transforms are exceptional techniques that may be used for image compression. Contour coding is a space-filling curve tec...
详细信息
暂无评论