This paper introduces OBL-AHO, an enhanced Archerfish Hunting Optimizer (AHO) variant that integrates Opposition-Based Learning (OBL) to improve AHO's exploratory capabilities. By leveraging opposite solutions alo...
详细信息
In the last decade, Metaheuristic Algorithms (MAs) have been widely employed to estimate parameters in photovoltaic (PV) models to maximize solar energy efficiency. This paper presents a comparative study of the perfo...
详细信息
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent *** mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnect...
详细信息
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent *** mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all *** variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication *** data secure transmission is critical for mobile IIoT *** paper investigates the data secure transmission performance prediction of mobile IIoT *** cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first ***,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction *** mobile signals,the important features may be removed by the pooling *** will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is *** of the input and output layers,it removes the pooling layer and contains six convolution ***,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed *** simulation analysis,good prediction accuracy is achieved by the CNN *** prediction accuracy obtains a 59%increase.
One of the primary challenges in Wireless Sensor Networks (WSNs) is the efficient management of energy con sumption and maintaining robust network connectivity over time. To address this issue, we propose a model that...
详细信息
We present a new approach to capture human actions by using 2D skeletal joints as the foundation for the real-time representation. Our approach combines three distinct types of information, namely: (1) motion detectio...
详细信息
This study assesses the effectiveness of machine learning (ML) models in predicting fluctuations in the direction of Bitcoin prices using conventional technical indicators. Given the volatile nature of Bitcoin markets...
详细信息
Wireless sensor networks refer to a collection of sensors strategically deployed in specific areas for purposes such as environmental monitoring, surveillance, military applications, and various other uses. These sens...
详细信息
The paper revisits the Robust s-t Path problem, one of the most fundamental problems in robust optimization. In the problem, we are given a directed graph with n vertices and k distinct cost functions (scenarios) defi...
详细信息
Today's scientific applications and advanced instruments are producing extremely large volumes of data everyday, so that error-controlled lossy compression has become a critical technique to the scientific data st...
详细信息
The training of multi-agent reinforcement learning (MARL) tasks with the public goods dilemma (PGD) is difficult because the selfish actions of individual agents for high personal rewards may reduce the collective uti...
详细信息
暂无评论