Human action recognition is applicable in different domains. Previously proposed methods cannot appropriately consider the sequence of sub-actions. Herein, we propose a semantical action model based on the sequence of...
详细信息
Detecting and promptly identifying cracks on road surfaces is of paramount importance for preserving infrastructure integrity and ensuring the safety of road users, including both drivers and pedestrians. Presently, t...
详细信息
Graph Neural Networks(GNNs)have become a widely used tool for learning and analyzing data on graph structures,largely due to their ability to preserve graph structure and properties via graph representation ***,the ef...
详细信息
Graph Neural Networks(GNNs)have become a widely used tool for learning and analyzing data on graph structures,largely due to their ability to preserve graph structure and properties via graph representation ***,the effect of depth on the performance of GNNs,particularly isotropic and anisotropic models,remains an active area of *** study presents a comprehensive exploration of the impact of depth on GNNs,with a focus on the phenomena of over-smoothing and the bottleneck effect in deep graph neural *** research investigates the tradeoff between depth and performance,revealing that increasing depth can lead to over-smoothing and a decrease in performance due to the bottleneck *** also examine the impact of node degrees on classification accuracy,finding that nodes with low degrees can pose challenges for accurate *** experiments use several benchmark datasets and a range of evaluation metrics to compare isotropic and anisotropic GNNs of varying depths,also explore the scalability of these *** findings provide valuable insights into the design of deep GNNs and offer potential avenues for future research to improve their performance.
One of themost prominent research areas in information technology is the Internet of Things (IoT) as its applications are widely used, such as structural monitoring, health care management systems, agriculture and bat...
详细信息
One of themost prominent research areas in information technology is the Internet of Things (IoT) as its applications are widely used, such as structural monitoring, health care management systems, agriculture and battlefield management, and so on. Due to its self-organizing network and simple installation of the network, the researchers have been attracted to pursue research in the various fields of IoTs. However, a huge amount of work has been addressed on various problems confronted by IoT. The nodes densely deploy over critical environments and those are operated on tiny batteries. Moreover, the replacement of dead batteries in the nodes is almost impractical. Therefore, the problem of energy preservation and maximization of IoT networks has become the most prominent research area. However, numerous state-of-The-Art algorithms have addressed this issue. Thus, it has become necessary to gather the information and send it to the base station in an optimized method to maximize the network. Therefore, in this article, we propose a novel quantum-informed ant colony optimization (ACO) routing algorithm with the efficient encoding scheme of cluster head selection and derivation of information heuristic factors. The algorithm has been tested by simulation for various network scenarios. The simulation results of the proposed algorithm show its efficacy over a few existing evolutionary algorithms using various performance metrics, such as residual energy of the network, network lifetime, and the number of live IoT nodes. Impact Statement-Toward IoT-based applications, here we presented the Quantum-inspired ACO clustering algorithm for network lifetime. IoT nodes in the clustering phase choose theirCH through the distance between cluster member IoT nodes and the residual energy. Thus, CH selection reduces the energy consumption of member IoT nodes. Therefore, our significant contributions are summarized as follows. i. Developing Quantum-informed ACO clustered routing algor
Fires are becoming one of the major natural hazards that threaten the ecology, economy, human life and even more worldwide. Therefore, early fire detection systems are crucial to prevent fires from spreading out of co...
详细信息
Text mining, a subfield of natural language processing (NLP), has received considerable attention in recent years due to its ability to extract valuable insights from large volumes of unstructured textual data. This r...
详细信息
The paper addresses the critical problem of application workflow offloading in a fog environment. Resource constrained mobile and Internet of Things devices may not possess specialized hardware to run complex workflow...
详细信息
Knowledge graphs(KGs) effectively mitigate data sparsity in recommendation systems(RSs) by providing valuable auxiliary information [1]. However, traditional centralized KG-based RSs increase the risk of user privacy ...
Knowledge graphs(KGs) effectively mitigate data sparsity in recommendation systems(RSs) by providing valuable auxiliary information [1]. However, traditional centralized KG-based RSs increase the risk of user privacy *** learning(FL) enhances RS's privacy by enabling model training on decentralized data [2]. Although integrating KG and FL can address both data sparsity and privacy issues in RSs [3], several challenges persist. CH1,Each client's local model relies on a consistent global model from the server, limiting personalized deployment to endusers.
Deep learning has become an important computational paradigm in our daily lives with a wide range of applications,from authentication using facial recognition to autonomous driving in smart vehicles. The quality of th...
Deep learning has become an important computational paradigm in our daily lives with a wide range of applications,from authentication using facial recognition to autonomous driving in smart vehicles. The quality of the deep learning models, i.e., neural architectures with parameters trained over a dataset, is crucial to our daily living and economy.
Web-services have become most common IT enablers today. Cyber attacks such as the distributed denial of service (DDoS) attacks pose availability concerns which may result into service outages and consequently financia...
详细信息
暂无评论