Dear editor,This letter presents a deep learning-based prediction model for the quality-of-service(QoS)of cloud ***,to improve the QoS prediction accuracy of cloud services,a new QoS prediction model is proposed,which...
详细信息
Dear editor,This letter presents a deep learning-based prediction model for the quality-of-service(QoS)of cloud ***,to improve the QoS prediction accuracy of cloud services,a new QoS prediction model is proposed,which is based on multi-staged multi-metric feature fusion with individual *** multi-metric features include global,local,and individual *** results show that the proposed model can provide more accurate QoS prediction results of cloud services than several state-of-the-art methods.
Many universities today offer special courses or entire master programs for cyber-physical systems (CPS) developers training. A multi-aspect design route of the CPS creation is considered as the methodological vector,...
详细信息
During the application development process, it is important for a developer to analyze user requirements. This is crucial to the success of interactive systems and is an essential component of the design of informatio...
详细信息
The article considers the problem of designing a synthesis method for Coarse-Grained Reconfigurable Array (CGRA) architectures. The author observes several general problems of such architecture and demonstrates how th...
详细信息
Neutral atom (NA) quantum systems are emerging as a leading platform for quantum computation, offering superior or competitive qubit count and gate fidelity compared to superconducting circuits and ion traps. However,...
详细信息
Analyzing and evaluating students' progress in any learning environment is stressful and time consuming if done using traditional analysis methods. This is further exasperated by the increasing number of students ...
详细信息
In this paper, the method to design deep Convolutional Neural Network (CNN) architecture for the problem of traffic signs classification is proposed. The approach incorporates five main stages followed by each other: ...
详细信息
Requirements elicitation process is employed for the identification of stakeholders of an information system. A large number of stakeholders from different domains across the globe participate during the requirements ...
详细信息
Requirements elicitation process is employed for the identification of stakeholders of an information system. A large number of stakeholders from different domains across the globe participate during the requirements elicitation process. Based on our review, we found that existing methods for the analysis of stakeholders do not support how to classify the stakeholders based on the similarity measures. These measures play an important role for the recommendation of an item/user in a recommendation system. Thus, the objective of this paper is to classify the stakeholders of an information system using fuzzy-based adjusted cosine similarity measure. We have identified the stakeholders of library information system and their opinions for different requirements are recorded. The identified stakeholders have been classified and analysed based on the following similarity measures under fuzzy environment, i.e., Cosine similarity measure, Euclidean distance, Pearson coefficient correlation etc., so that stakeholders having similar requirements can be recommended to strengthen the requirements elicitation process.
Locating objects Non-Line-of-Sight is an important challenge in many fields such as defense applications, autonomous vehicles, natural disasters, etc. With the advancement of signal processing techniques, there has be...
详细信息
ISBN:
(数字)9798331531492
ISBN:
(纸本)9798331531508
Locating objects Non-Line-of-Sight is an important challenge in many fields such as defense applications, autonomous vehicles, natural disasters, etc. With the advancement of signal processing techniques, there has been an increased interest in the detection of objects in hidden areas. In this respect, audio signals have a strong potential as a low-cost technology for object localization. This study presents an experimental application to detect the location of hidden objects Non-Line-of-Sight based on audio signals. The signals from the sound source strike the hidden object through a reflecting surface, such as a wall, and are received back from the reflecting surface as secondary signals. In this study, object detection can be performed with acoustic sound signals without physically intervening in an area beyond the line of sight and without locating any sensors in this area. The experimental results obtained from the study show that the position detection of an object located Non-Line-of-Sight can be done satisfactorily.
Recent advancements in Artificial Intelligence (AI) and the proliferation of the Internet of Things (loT) and mobile devices have generated enormous data volumes, necessitating advanced data processing closer to data ...
详细信息
ISBN:
(数字)9798350354119
ISBN:
(纸本)9798350354126
Recent advancements in Artificial Intelligence (AI) and the proliferation of the Internet of Things (loT) and mobile devices have generated enormous data volumes, necessitating advanced data processing closer to data sources through edge computing to enhance efficiency and reduce latency. Nonetheless, privacy concerns in cloud storage and data transmission, alongside the inadequacy of traditional privacy protections, have highlighted the vulnerability to sophisticated data breaches. This paper offers a survey on edge computing, emphasizing privacy and security challenges, evaluating threats, and exploring solutions to promote the development of secure, robust and privacy-preserving edge computing frameworks.
暂无评论