Heating-cooling processes are widely used in industry and are often subject to latencies and delays. Although the parameters of such processes can be identified using mathematical and physical modeling, this technique...
详细信息
In this paper, the introduction of big data technology, from the hardware and software two aspects of communication security protection system design research. With the support of hardware equipment, the secure commun...
In this paper, the introduction of big data technology, from the hardware and software two aspects of communication security protection system design research. With the support of hardware equipment, the secure communication channel of the system is constructed by using the big data processing center as the support. The network data in the communication is stored in the specified network space to build the network communication link database. In this paper, the results of variance measurement are converted into the similarity between data and the similarity relationship of network communication big data is constructed. In this way, the similarity matrix of network communication big data is obtained. Experimental results show that the system designed by the proposed method has fast communication speed, low energy consumption, and low packet loss rate during communication.
Solving partial differential equations (PDEs) is a common task in numerical mathematics and scientific computing. Typical discretization schemes, for example, finite element (FE), finite volume (FV), or finite differe...
详细信息
Metaheuristics are universal optimization algorithms which should be used for solving difficult problems, unsolvable by classic approaches. In this paper we aim at constructing novel socio-cognitive metaheuristic base...
详细信息
Emotion classification in textual conversations focuses on classifying the emotion of each utterance from textual *** is becoming one of the most important tasks for natural language processing in recent ***,it is a c...
详细信息
Emotion classification in textual conversations focuses on classifying the emotion of each utterance from textual *** is becoming one of the most important tasks for natural language processing in recent ***,it is a challenging task for machines to conduct emotion classification in textual conversations because emotions rely heavily on textual *** address the challenge,we propose a method to classify emotion in textual conversations,by integrating the advantages of deep learning and broad learning,namely *** aims to provide a more effective solution to capture local contextual information(i.e.,utterance-level)in an utterance,as well as global contextual information(i.e.,speaker-level)in a conversation,based on Convolutional Neural Network(CNN),Bidirectional Long Short-Term Memory(Bi-LSTM),and broad *** experiments have been conducted on three public textual conversation datasets,which show that the context in both utterance-level and speaker-level is consistently beneficial to the performance of emotion *** addition,the results show that our proposed method outperforms the baseline methods on most of the testing datasets in weighted-average F1.
It sounds like Koçtaş is a leader in the home improvement sector in Turkey, and they are focused on providing the best service and customer experience possible. They are also actively working to accelerate their ...
详细信息
In this paper, we present an architecture for the deployment of an edge computing system based on Named Data Networking (NDN) as part of a private 5G network. Our proposed architecture integrates IP-based and non-IP-b...
详细信息
ISBN:
(数字)9798331508050
ISBN:
(纸本)9798331508067
In this paper, we present an architecture for the deployment of an edge computing system based on Named Data Networking (NDN) as part of a private 5G network. Our proposed architecture integrates IP-based and non-IP-based components using the W3C Web of Things (WoT) standards, including a Thing Description Directory (TDD). Our results highlight the potential of both edge computing and WoT concepts for private 5G deployments but also reveal several standardization gaps that need to be closed to make effective use of the new technologies.
Geopolitical news provides vast amounts of information essential for understanding international relations and political events. However, organizing this information into a coherent, structured format poses challenges...
详细信息
Recently, media and business companies are utilizing social media to reach a large set of users to maximize the amount of gained profit. Actually, these companies are looking for the best ways to satisfy their user...
详细信息
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 *** to the data transmission nature of the wireless local area netw...
详细信息
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 *** to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate ***,the security design of the wireless structure is vulnerable to versatile *** example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false *** security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world *** paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks *** proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the *** scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in *** proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related *** experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.
暂无评论