The increaing significance of plant life and botanical expertise extends beyond mere visual appreciation. With the growing interest in sustainable living and alternative remedies, there is a pressing demand for easily...
详细信息
Due to advancements in the deep learning technology, object detection has become significantly important for lane detection and vehicle detection. In recent times, lane detection has become more popular as it plays a ...
详细信息
Named Entity Recognition is a crucial task in Natural Language Processing. It involves detecting and categorizing named entities such as individuals, places, and organizations within a text. This process is vital for ...
详细信息
Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumpt...
详细信息
Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumption of computing/communication resources and usually require reliable communications with bounded ***,these protocols may be unsuitable for Internet of Things(IoT)networks because the IoT devices are usually lightweight,battery-operated,and deployed in an unreliable wireless ***,this paper studies an efficient consensus protocol for blockchain in IoT networks via reinforcement ***,the consensus protocol in this work is designed on the basis of the Proof-of-Communication(PoC)scheme directly in a single-hop wireless network with unreliable communications.A distributed MultiAgent Reinforcement Learning(MARL)algorithm is proposed to improve the efficiency and fairness of consensus for miners in the blockchain *** this algorithm,each agent uses a matrix to depict the efficiency and fairness of the recent consensus and tunes its actions and rewards carefully in an actor-critic framework to seek effective *** results from the simulation show that the fairness of consensus in the proposed algorithm is guaranteed,and the efficiency nearly reaches a centralized optimal solution.
The comprehension of news is substantially improved when it is conveyed in an individual's native language. The increasing volume of news articles, driven by global events, necessitates the effective organization ...
详细信息
This research centers on extracting triplets (Subject, Verb, Object) from domain-specific texts, particularly focusing on the film industry. We compiled a corpus of 4,300 sentences from 500 well-known movie articles a...
详细信息
Detecting sarcasm in social media presents challenges in natural language processing (NLP) due to the informal language, contextual complexities, and nuanced expression of sentiment. Integrating sentiment analysis (SA...
详细信息
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a...
详细信息
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a raft of new behaviors within CPST,which affects users’physical,social,and mental *** this paper,we conceive the Cyber-Syndrome concept to denote the collection of cyber disorders due to excessive or problematic Cyberspace interactions based on CPST *** we characterize the Cyber-Syndrome concept in terms of Maslow’s theory of Needs,from which we establish an in-depth theoretical understanding of Cyber-Syndrome from its etiology,formation,symptoms,and ***,we propose an entropy-based Cyber-Syndrome control mechanism for its computation and *** goal of this study is to give new insights into this rising phenomenon and offer guidance for further research and development.
The increase in the Distributed Denial of Service attack (DDoS) leads to a significant threat to the network security. Inability to timely and accurately detect DDoS attacks disrupts services offered by companies and ...
详细信息
Pre-trained language models have significantly advanced text summarization by leveraging extensive pre-training data to enhance performance. Many cutting-edge models undergo an initial pre-training phase on a large co...
详细信息
暂无评论