In today's data-driven world, data privacy and security is of utmost importance. Social media platforms have become the main source of data breaches due to the sheer number of users who are exposed to these risks....
详细信息
When the concentration focuses on data mining, frequent itemset mining (FIM) and high-utility itemset mining (HUIM) are commonly addressed and researched. Many related algorithms are proposed to reveal the general rel...
详细信息
Digital media triage is a main challenge that faces a digital investigator. Knowing what might be useful during crime investigation could greatly save the investigator's time and enhance outcomes. Memory investiga...
详细信息
With growing urbanization there is a need to manage vehicle-to-vehicle communication for intelligent communication in congested traffic. The performance of the widely used routing protocols AODV, DSDV, DSR, LAR, and Z...
详细信息
The majority of information technology organizations nowadays prefer cloud computing as their main choice due to improvements in information technology. However, as a result of cloud computing's vast and open arch...
详细信息
Several Virtual Machines (VMs) belonging to various users transparently share physical resources in multi-tenancy cloud milieu. In these situations, implementing an effective access control system can stop unwanted ac...
详细信息
In this work,we propose a real proportional-integral-derivative plus second-order derivative(PIDD2)controller as an efficient controller for vehicle cruise control systems to address the challenging issues related to ...
详细信息
In this work,we propose a real proportional-integral-derivative plus second-order derivative(PIDD2)controller as an efficient controller for vehicle cruise control systems to address the challenging issues related to efficient *** this regard,this paper is the first report in the literature demonstrating the implementation of a real PIDD2 controller for controlling the respective *** construct a novel and efficient metaheuristic algorithm by improving the performance of the Aquila Optimizer via chaotic local search and modified opposition-based learning strategies and use it as an excellently performing tuning *** also propose a simple yet effective objective function to increase the performance of the proposed algorithm(CmOBL-AO)to adjust the real PIDD2 controller's parameters *** show the CmOBL-AO algorithm to perform better than the differential evolution algorithm,gravitational search algorithm,African vultures optimization,and the Aquila Optimizer using well-known unimodal,multimodal benchmark ***2019 test suite is also used to perform ablation experiments to reveal the separate contributions of chaotic local search and modified opposition-based learning strategies to the CmOBL-AO *** the vehicle cruise control system,we confirm the more excellent performance of the proposed method against particle swarm,gray wolf,salp swarm,and original Aquila optimizers using statistical,Wilcoxon signed-rank,time response,robustness,and disturbance rejection *** also use fourteen reported methods in the literature for the vehicle cruise control system to further verify the more promising performance of the CmOBL-AO-based real PIDD2 controller from a wider *** excellent performance of the proposed method is also illustrated through different quality indicators and different operating ***,we also demonstrate the good performing capability of the CmOBL-AO algorithm for real traffic *** show
With the emergence of the fifth-generation (5G) net-work, numerous revolutionary applications are enabled, including low-latency and machine-type communications. This great in-crease creates a broader security threat ...
详细信息
作者:
Qiu, RanZhao, ShengrongLiang, Hu
Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China
Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science
Shandong Provincial Key Laboratory of Computer Networks Jinan China
Underwater images are often affected by problems such as light attenuation, color distortion, noise and scattering, resulting in image defects. A novel image inpainting method is proposed to intelligently predict and ...
详细信息
Typical machine learning models typically demand a substantial volume of data for effective training, ensuring optimal performance during testing. However, these models often fail to specify the extent of data require...
详细信息
暂无评论