This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulati...
详细信息
This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulation(PAM4)***-M reduced the fluctuation by averaging the signal in blocks,RF-M estimated MPI by subtracting the decision value of the corresponding block from the mean value of a signal block,and then generated interference-reduced samples by subtracting the interference signal from the product of the corresponding MPI estimate and then weighting *** paper firstly proposed to separate the signal before decision-making into multiple blocks,which significantly reduced the complexity of DA-M and *** results showed that the MPI noise of 28 GBaud IMDD system under the linewidths of 1e5 Hz,1e6 Hz and 10e6 Hz can be effectively alleviated.
The rapid development of Internet of Things(IoT)technology has led to a significant increase in the computational task load of Terminal Devices(TDs).TDs reduce response latency and energy consumption with the support ...
详细信息
The rapid development of Internet of Things(IoT)technology has led to a significant increase in the computational task load of Terminal Devices(TDs).TDs reduce response latency and energy consumption with the support of task-offloading in Multi-access Edge Computing(MEC).However,existing task-offloading optimization methods typically assume that MEC’s computing resources are unlimited,and there is a lack of research on the optimization of task-offloading when MEC resources are *** addition,existing solutions only decide whether to accept the offloaded task request based on the single decision result of the current time slot,but lack support for multiple retry in subsequent time *** is resulting in TD missing potential offloading opportunities in the *** fill this gap,we propose a Two-Stage Offloading Decision-making Framework(TSODF)with request holding and dynamic *** Short-Term Memory(LSTM)-based task-offloading request prediction and MEC resource release estimation are integrated to infer the probability of a request being accepted in the subsequent time *** framework learns optimized decision-making experiences continuously to increase the success rate of task offloading based on deep learning *** results show that TSODF reduces total TD’s energy consumption and delay for task execution and improves task offloading rate and system resource utilization compared to the benchmark method.
A computer network can be defined as many computing devices connected via a communication medium like the *** network development has proposed how humans and devices communicate *** networks have improved,facilitated,...
详细信息
A computer network can be defined as many computing devices connected via a communication medium like the *** network development has proposed how humans and devices communicate *** networks have improved,facilitated,and made conventional forms of communication ***,it has also led to uptick in-network threats and *** 2022,the global market for informationtechnology is expected to reach$170.4 ***,in contrast,95%of cyber security threats globally are caused by human *** networks may be utilized in several control systems,such as home-automation,chemical and physical assault detection,intrusion detection,and environmental *** proposed literature review presents a wide range of information on Wireless Social Networks(WSNs)and Internet of Things(IoT)*** aim is first to be aware of the existing issues(issues with traditional methods)and network attacks on WSN and IoT systems and how to defend *** second is to review the novel work in the domain and find its *** goal is to identify the area’s primary gray field or current research divide to enable others to address the ***,we concluded that *** Rapid Spanning Tree Protocol(RSTP)messages have higher efficiency in network performance degradation than alternative Bridge Data Unit Protocol(BPDU)*** research divides our future research into solutions and newly developed techniques that can assist in completing the lacking *** this research,we have selected articles from 2015 to 2021 to provide users with a comprehensive literature overview.
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least t...
详细信息
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least two ***, the performance of FedRecs is compromised due to highly sparse on-device data for each client. Second, the system's robustness is undermined by the vulnerability to model poisoning attacks launched by malicious users. In this paper, we introduce a novel contrastive learning framework designed to fully leverage the client's sparse data through embedding augmentation, referred to as CL4FedRec. Unlike previous contrastive learning approaches in FedRecs that necessitate clients to share their private parameters, our CL4FedRec aligns with the basic FedRec learning protocol, ensuring compatibility with most existing FedRec implementations. We then evaluate the robustness of FedRecs equipped with CL4FedRec by subjecting it to several state-of-the-art model poisoning attacks. Surprisingly, our observations reveal that contrastive learning tends to exacerbate the vulnerability of FedRecs to these attacks. This is attributed to the enhanced embedding uniformity, making the polluted target item embedding easily proximate to popular items. Based on this insight, we propose an enhanced and robust version of CL4FedRec(rCL4FedRec) by introducing a regularizer to maintain the distance among item embeddings with different popularity levels. Extensive experiments conducted on four commonly used recommendation datasets demonstrate that rCL4FedRec significantly enhances both the model's performance and the robustness of FedRecs.
We study the reliability of the following simple mechanism for spreading information in a communication network in the presence of random message loss. Initially, some nodes have information that they want to distribu...
详细信息
Plant diseases are one of the major contributors to economic loss in the agriculture industry worldwide. Detection of disease at early stages can help in the reduction of this loss. In recent times, a lot of emphasis ...
详细信息
Text classification is a quintessential and practical problem in natural language processing with applications in diverse domains such as sentiment analysis, fake news detection, medical diagnosis, and document classi...
详细信息
Deformable image registration is a fundamental technique in medical image analysis and provide physicians with a more complete understanding of patient anatomy and function. Deformable image registration has potential...
详细信息
Medical Image Analysis (MIA) is integral to healthcare, demanding advanced computational techniques for precise diagnostics and treatment planning. The demand for accurate and interpretable models is imperative in the...
详细信息
Medical Image Analysis (MIA) is integral to healthcare, demanding advanced computational techniques for precise diagnostics and treatment planning. The demand for accurate and interpretable models is imperative in the ever-evolving healthcare landscape. This paper explores the potential of Self-Supervised Learning (SSL), transfer learning and domain adaptation methods in MIA. The study comprehensively reviews SSL-based computational techniques in the context of medical imaging, highlighting their merits and limitations. In an empirical investigation, this study examines the lack of interpretable and explainable component selection in existing SSL approaches for MIA. Unlike prior studies that randomly select SSL components based on their performance on natural images, this paper focuses on identifying components based on the quality of learned representations through various clustering evaluation metrics. Various SSL techniques and backbone combinations were rigorously assessed on diverse medical image datasets. The results of this experiment provided insights into the performance and behavior of SSL methods, paving the way for an explainable and interpretable component selection mechanism for artificial intelligence models in medical imaging. The empirical study reveals the superior performance of BYOL (Bootstrap Your Own Latent) with resnet as the backbone, as indicated by various clustering evaluation metrics such as Silhouette Coefficient (0.6), Davies-Bouldin Index (0.67), and Calinski-Harabasz Index (36.9). The study also emphasizes the benefits of transferring weights from a model trained on a similar dataset instead of a dataset from a different domain. Results indicate that the proposed mechanism expedited convergence, achieving 98.66% training accuracy and 92.48% testing accuracy in 23 epochs, requiring almost half the number of epochs for similar results with ImageNet weights. This research contributes to advancing the understanding of SSL in MIA, providin
Early detection of any disease and starting its treatment in this early stage are the most important steps in case of any life-threatening disease. Stroke is not an exception in this regard which is one of the leading...
详细信息
暂无评论