This paper proposes a replacement algorithm for file caching in mobile edge computing (MEC) networks. While there are numerous schemes for file replacement, it remains a challenge to achieve good, robust, and predicta...
详细信息
A larger proportion of crops face disease outbreaks, making agricultural output difficult. Detecting and predicting diseases at an early stage can enhance productivity. Guava, a tropical and subtropical fruit, is cult...
详细信息
作者:
Sarkar, KounteyaMisra, SudipSonu, MayankIit
Department of Computer Science and Engineering Kharagpur India Iit
Department of Electronics and Electrical Communication Engineering Kharagpur India
This work proposes routeNow, a routing algorithm designed for wireless Software Defined Internet of Things by dynamic path relaxation based on real-time heuristic that always gives the best least hop path. This is aim...
详细信息
Interference management is one of the most important issues in the device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets)due to the coexistence of massive cellular and D2D devices in which D2D devices...
详细信息
Interference management is one of the most important issues in the device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets)due to the coexistence of massive cellular and D2D devices in which D2D devices reuse the cellular *** alleviate the interference,an efficient interference management way is to set exclusion zones around the cellular *** this paper,we adopt a stochastic geometry approach to analyze the outage probabilities of cellular and D2D users in the D2D-enabled *** main difficulties contain three aspects:1)how to model the location randomness of base stations,cellular and D2D users in practical networks;2)how to capture the randomness and interrelation of cellular and D2D transmissions due to the existence of random exclusion zones;3)how to characterize the different types of interference and their impacts on the outage probabilities of cellular and D2D *** then run extensive Monte-Carlo simulations which manifest that our theoretical model is very accurate.
In recent times,real time wireless networks have found their applicability in several practical applications such as smart city,healthcare,surveillance,environmental monitoring,*** the same time,proper localization of...
详细信息
In recent times,real time wireless networks have found their applicability in several practical applications such as smart city,healthcare,surveillance,environmental monitoring,*** the same time,proper localization of nodes in real time wireless networks helps to improve the overall functioning of *** study presents an Improved Metaheuristics based Energy Efficient Clustering with Node Localization(IM-EECNL)approach for real-time wireless *** proposed IM-EECNL technique involves two major processes namely node localization and ***,Chaotic Water Strider Algorithm based Node Localization(CWSANL)technique to determine the unknown position of the ***,an Oppositional Archimedes Optimization Algorithm based Clustering(OAOAC)technique is applied to accomplish energy efficiency in the ***,the OAOAC technique derives afitness function comprising residual energy,distance to cluster heads(CHs),distance to base station(BS),and *** performance validation of the IM-EECNL technique is carried out under several aspects such as localization and energy efficiency.A wide ranging comparative outcomes analysis highlighted the improved performance of the IM-EECNL approach on the recent approaches with the maximum packet delivery ratio(PDR)of 0.985.
In this paper, the harnessing QCA for High-Performance, Low-Power Arithmetic Circuits w.r.t. the focusing on Multipliers and Square Circuits is presented. The background in relation to this work is presented next. Qua...
详细信息
This research introduces DeepFakeGuard, a hybrid deep learning framework designed to detect fake profiles on social media platforms, addressing the growing threat of fraudulent accounts online. DeepFakeGuard integrate...
详细信息
The main intent of this paper is to design and implement a novel methodology for lung cancer prediction using the patient's health record. Feature extraction is performed using two well-performing approaches like ...
详细信息
In recent years,wearable devices-based Human Activity Recognition(HAR)models have received significant *** developed HAR models use hand-crafted features to recognize human activities,leading to the extraction of basi...
详细信息
In recent years,wearable devices-based Human Activity Recognition(HAR)models have received significant *** developed HAR models use hand-crafted features to recognize human activities,leading to the extraction of basic *** images captured by wearable sensors contain advanced features,allowing them to be analyzed by deep learning algorithms to enhance the detection and recognition of human *** lighting and limited sensor capabilities can impact data quality,making the recognition of human actions a challenging *** unimodal-based HAR approaches are not suitable in a real-time ***,an updated HAR model is developed using multiple types of data and an advanced deep-learning ***,the required signals and sensor data are accumulated from the standard *** these signals,the wave features are *** the extracted wave features and sensor data are given as the input to recognize the human *** Adaptive Hybrid Deep Attentive Network(AHDAN)is developed by incorporating a“1D Convolutional Neural Network(1DCNN)”with a“Gated Recurrent Unit(GRU)”for the human activity recognition ***,the Enhanced Archerfish Hunting Optimizer(EAHO)is suggested to fine-tune the network parameters for enhancing the recognition *** experimental evaluation is performed on various deep learning networks and heuristic algorithms to confirm the effectiveness of the proposed HAR *** EAHO-based HAR model outperforms traditional deep learning networks with an accuracy of 95.36,95.25 for recall,95.48 for specificity,and 95.47 for precision,*** result proved that the developed model is effective in recognizing human action by taking less ***,it reduces the computation complexity and overfitting issue through using an optimization approach.
While the recent literature has seen a surge in the study of constrained bandit problems, all existing methods for these begin by assuming the feasibility of the underlying problem. We initiate the study of testing su...
详细信息
While the recent literature has seen a surge in the study of constrained bandit problems, all existing methods for these begin by assuming the feasibility of the underlying problem. We initiate the study of testing such feasibility assumptions, and in particular address the problem in the linear bandit setting, thus characterising the costs of feasibility testing for an unknown linear program using bandit feedback. Concretely, we test if ∃x : Ax ≥ 0 for an unknown A ∈ m×d, by playing a sequence of actions xt ∈ d, and observing Axt + noise in response. By identifying the hypothesis as determining the sign of the value of a minimax game, we construct a novel test based on low-regret algorithms and a nonasymptotic law of iterated logarithms. We prove that this test is reliable, and adapts to the 'signal level,' Γ, of any instance, with mean sample costs scaling as Õ(d2/Γ2). We complement this by a minimax lower bound of Ω(d/Γ2) for sample costs of reliable tests, dominating prior asymptotic lower bounds by capturing the dependence on d, and thus elucidating a basic insight missing in the extant literature on such problems. Copyright 2024 by the author(s)
暂无评论