Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of softwareengineering theo...
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of softwareengineering theories and methodologies [2]. Instead of replacing existing software modules implemented by symbolic logic, incorporating FMs' capabilities to build software systems requires entirely new modules that leverage the unique capabilities of ***, while FMs excel at handling uncertainty, recognizing patterns, and processing unstructured data, we need new engineering theories that support the paradigm shift from explicitly programming and maintaining user-defined symbolic logic to creating rich, expressive requirements that FMs can accurately perceive and implement.
Recent years have witnessed the rapid growth of social network services. Real-world social networks are huge and changing over time. Consequently, the problems in this area have become more complex. Community detectio...
详细信息
This article presents LoRaDIP, a novel low-light image enhancement (LLIE) model based on deep image priors (DIPs). While DIP-based enhancement models are known for their zero-shot learning, their expensive computation...
详细信息
In recent years, deep learning has significantly advanced skin lesion segmentation. However, annotating medical image data is specialized and costly, while obtaining unlabeled medical data is easier. To address this c...
详细信息
Detecting dangerous driving behavior is a critical research area focused on identifying and preventing actions that could lead to traffic accidents, such as smoking, drinking, yawning, and drowsiness, through technica...
详细信息
Image captioning is an interdisciplinary research hotspot at the intersection of computer vision and natural language processing, representing a multimodal task that integrates core technologies from both fields. This...
详细信息
With the development of artificial intelligence, deep learning has been increasingly used to achieve automatic detection of geographic information, replacing manual interpretation and improving efficiency. However, re...
详细信息
Handling the massive amount of data generated by Smart Mobile Devices(SMDs)is a challenging computational *** Computing is an emerging computation paradigm that is employed to conquer this *** can bring computation po...
详细信息
Handling the massive amount of data generated by Smart Mobile Devices(SMDs)is a challenging computational *** Computing is an emerging computation paradigm that is employed to conquer this *** can bring computation power closer to the end devices to reduce their computation latency and energy ***,this paradigm increases the computational ability of SMDs by collaboration with edge *** is achieved by computation offloading from the mobile devices to the edge nodes or ***,not all applications benefit from computation offloading,which is only suitable for certain types of *** properties,SMD capability,wireless channel state,and other factors must be counted when making computation offloading ***,optimization methods are important tools in scheduling computation offloading tasks in Edge Computing *** this paper,we review six types of optimization methods-they are Lyapunov optimization,convex optimization,heuristic techniques,game theory,machine learning,and *** each type,we focus on the objective functions,application areas,types of offloading methods,evaluation methods,as well as the time complexity of the proposed *** discuss a few research problems that are still *** purpose for this review is to provide a concise summary that can help new researchers get started with their computation offloading researches for Edge Computing networks.
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of P...
详细信息
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of PC,portable networks,spine of internet,networks engaged with advanced mechanics,power generation interconnection,bio-informatics and substance intensify *** number that can be entirely calculated by a graph is called graph *** mathematical graph invariants have been portrayed and utilized for connection investigation during the latest twenty ***,no trustworthy evaluation has been embraced to pick,how much these invariants are associated with a network graph or subatomic *** this paper,it will discuss three unmistakable varieties of bridge networks with an incredible capacity of assumption in the field of computerscience,chemistry,physics,drug industry,informatics and arithmetic in setting with physical and manufactured developments and networks,since Contraharmonic-quadratic invariants(CQIs)are recently presented and have different figure qualities for different varieties of bridge graphs or *** study settled the geography of bridge graphs/networks of three novel sorts with two kinds of CQI and Quadratic-Contraharmonic Indices(QCIs).The deduced results can be used for the modeling of the above-mentioned networks.
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b...
详细信息
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection between cyberspace and physical processes results in the exposure of industrial production information to unprecedented security risks. It is imperative to develop suitable strategies to ensure cyber security while meeting basic performance *** the perspective of control engineering, this review presents the most up-to-date results for privacy-preserving filtering,control, and optimization in industrial cyber-physical systems. Fashionable privacy-preserving strategies and mainstream evaluation metrics are first presented in a systematic manner for performance evaluation and engineering *** discussion discloses the impact of typical filtering algorithms on filtering performance, specifically for privacy-preserving Kalman filtering. Then, the latest development of industrial control is systematically investigated from consensus control of multi-agent systems, platoon control of autonomous vehicles as well as hierarchical control of power systems. The focus thereafter is on the latest privacy-preserving optimization algorithms in the framework of consensus and their applications in distributed economic dispatch issues and energy management of networked power systems. In the end, several topics for potential future research are highlighted.
暂无评论