Computing-in-memory (CIM) is a promising technique for energy-efficiently conducting the massive amount of required multiply-And-Accumulate (MAC) calculations in neural networks (NNs). The read-decoupled 8T (RD8T) SRA...
详细信息
Facial landmark detection (FLD) is a field of study in computer vision that specializes in detecting and tracking key points from human faces. There are many applications, such as detecting a human's head pose (po...
详细信息
To improve the path efficiency for dynamic obstacle avoidance algorithms of Pioneer robots, this paper proposes an approach to create deep deterministic policy gradient (DDPG) smart agents with recurrent neural networ...
详细信息
The capability of shifting the electricity generation or consumption to proper time of the day,also defined as energy shift(ES),is the key factor to ensure the power balance,especially under high penetration of variab...
详细信息
The capability of shifting the electricity generation or consumption to proper time of the day,also defined as energy shift(ES),is the key factor to ensure the power balance,especially under high penetration of variable renewable energy(VRE).However,the ES is not characterized and traded as an independent product in current market *** this letter,the marginal utility of an ES is assessed and leveraged to characterize the effective ES,while a novel market scheme is proposed considering the trading of both ES and energy level(EL).The proposed scheme can well integrate ES producers such as virtual power plants that cannot be rewarded sufficiently to actively participate in the current market because they are principally labeled as EL ***,the novel concept and mechanism are illustrated by a numerical study and verified to outperform the existing price schemes on integrating the ES resources and VRE.
DNA-based storage has emerged as a promising storage paradigm due to its immense storage potential. However, the error-prone nature of DNA sequencing and synthesis processes limits this potential. Image data is typica...
详细信息
The field of Optical Character Recognition (OCR) consists of techniques that are mainly focused on document image analysis. Aside from generating significant speedups of everyday procedures, OCR has a considerable rol...
详细信息
The deployment of robots into human scenarios necessitates advanced planning strategies, particularly when we ask robots to operate in dynamic, unstructured environments. RoboCup offers the chance to deploy robots in ...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the ***,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole *** proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering *** is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor *** hybridmethod is primarily designed to combat active black-hole *** the LEACH clustering phase,however,can also detect passive black-hole *** effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested *** diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution ***,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.
The web applications security systems often use the authentication strategy and credentials to assess the identity of the user. Based on the credentials, the system is able to claim the identity of the user. Also, the...
详细信息
Recently,computation offloading has become an effective method for overcoming the constraint of a mobile device(MD)using computationintensivemobile and offloading delay-sensitive application tasks to the remote cloud-...
详细信息
Recently,computation offloading has become an effective method for overcoming the constraint of a mobile device(MD)using computationintensivemobile and offloading delay-sensitive application tasks to the remote cloud-based data *** city benefitted from offloading to edge *** a mobile edge computing(MEC)network in multiple *** comprise N MDs and many access points,in which everyMDhasM independent real-time *** study designs a new Task Offloading and Resource Allocation in IoT-based MEC using Deep Learning with Seagull Optimization(TORA-DLSGO)*** proposed TORA-DLSGO technique addresses the resource management issue in the MEC server,which enables an optimum offloading decision to minimize the system *** addition,an objective function is derived based on minimizing energy consumption subject to the latency requirements and restricted *** TORA-DLSGO technique uses the deep belief network(DBN)model for optimum offloading ***,the SGO algorithm is used for the parameter tuning of the DBN *** simulation results exemplify that the TORA-DLSGO technique outperformed the existing model in reducing client overhead in the MEC systems with a maximum reward of 0.8967.
暂无评论