The article presents a new method for scheduling HTTP requests at the front of the Internet service, in a way that the service time of the whole WWW pages wouldn't exceed the service time imposed by the service pr...
详细信息
Model-free reinforcement learning (MFRL) usually has better asymptotic performance than the model-based reinforcement (MBRL) learning algorithms, especially in complex environments. But MBRL algorithms are very often ...
详细信息
Association Rule Mining (ARM) represents an important tool for Data Mining techniques. A key step in ARM is to determine the frequent itemsets present within the analyzed data. Recent algorithms addressing this proble...
详细信息
In this paper we focus on the segmentation problem of specific chained configurations in images taken from colon tissues. The proposed technique uses a priori information about the general structure and the relationsh...
详细信息
Facial landmark detection (FLD) is a field of study in computer vision that specializes in detecting and tracking key points from human faces. There are many applications, such as detecting a human's head pose (po...
详细信息
Wireless networks rely greatly on security for authentication and confidentiality, due to the use of an open communication medium. The tendency to incorporate wireless capabilities in battery powered hand-held devices...
详细信息
Graphics processing units (GPU) are an integral part of today's computing environment. The marketing emphasis on user experience pushes vendors to constantly look for better graphics hardware and newer drivers to ...
详细信息
The field of Optical Character Recognition (OCR) consists of techniques that are mainly focused on document image analysis. Aside from generating significant speedups of everyday procedures, OCR has a considerable rol...
详细信息
The paper presents a symmetrical T-network utilizing fractional order elements. Fractional calculus was used for its modeling. A comparative analysis of a classic T-network and fractional order T-network step response...
详细信息
Internet of Things solutions typically involve interaction between sensors, actuators, the cloud, embedded systems and user applications. Often in such cases, there are time constraints specifying the maximum response...
详细信息
暂无评论