With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ...
详细信息
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of the electronic spectrum auction network environment,the security of spectrum auction can not be *** scholars focus on researching the security of the single-sided auctions,while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and *** begin to design the secure double spectrum auction mechanisms,in which two semi-honest agents are introduced to finish the spectrum auction *** these two agents may collude with each other or be bribed by buyers and sellers,which may create security risks,therefore,a secure double spectrum auction is proposed in this *** traditional secure double spectrum auctions,the spectrum auction server with Software Guard Extensions(SGX)component is used in this paper,which is an Ethereum blockchain platform that performs spectrum auctions.A secure double spectrum protocol is also designed,using SGX technology and cryptographic tools such as Paillier cryptosystem,stealth address technology and one-time ring signatures to well protect the private information of spectrum *** addition,the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification,and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum ***,security analysis and performance evaluation of our protocol are discussed.
Marine container terminal(MCT)plays a key role in the marine intelligent transportation system and international logistics ***,the efficiency of resource scheduling significantly influences the operation performance o...
详细信息
Marine container terminal(MCT)plays a key role in the marine intelligent transportation system and international logistics ***,the efficiency of resource scheduling significantly influences the operation performance of *** solve the practical resource scheduling problem(RSP)in MCT efficiently,this paper has contributions to both the problem model and the algorithm ***,in the problem model,different from most of the existing studies that only consider scheduling part of the resources in MCT,we propose a unified mathematical model for formulating an integrated *** new integrated RSP model allocates and schedules multiple MCT resources simultaneously by taking the total cost minimization as the ***,in the algorithm design,a pre-selection-based ant colony system(PACS)approach is proposed based on graphic structure solution representation and a pre-selection *** the one hand,as the RSP can be formulated as the shortest path problem on the directed complete graph,the graphic structure is proposed to represent the solution encoding to consider multiple constraints and multiple factors of the RSP,which effectively avoids the generation of infeasible *** the other hand,the pre-selection strategy aims to reduce the computational burden of PACS and to fast obtain a higher-quality *** evaluate the performance of the proposed novel PACS in solving the new integrated RSP model,a set of test cases with different sizes is *** results and comparisons show the effectiveness and efficiency of the PACS algorithm,which can significantly outperform other state-of-the-art algorithms.
With the recent advances in the field of deep learning, an increasing number of deep neural networks have been applied to business process prediction tasks, remaining time prediction, to obtain more accurate predictiv...
详细信息
With the recent advances in the field of deep learning, an increasing number of deep neural networks have been applied to business process prediction tasks, remaining time prediction, to obtain more accurate predictive results. However, existing time prediction methods based on deep learning have poor interpretability, an explainable business process remaining time prediction method is proposed using reachability graph,which consists of prediction model construction and visualization. For prediction models, a Petri net is mined and the reachability graph is constructed to obtain the transition occurrence vector. Then, prefixes and corresponding suffixes are generated to cluster into different transition partitions according to transition occurrence vector. Next,the bidirectional recurrent neural network with attention is applied to each transition partition to encode the prefixes, and the deep transfer learning between different transition partitions is performed. For the visualization of prediction models, the evaluation values are added to the sub-processes of a Petri net to realize the visualization of the prediction models. Finally, the proposed method is validated by publicly available event logs.
The current urban intelligent transportation is in a rapid development stage, and coherence control of vehicle formations has important implications in urban intelligent transportation research. This article focuses o...
详细信息
Traditional autonomous driving usually requires a large number of vehicles to upload data to a central server for training. However, collecting data from vehicles may violate personal privacy as road environmental inf...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
Temporal knowledge graph(TKG) reasoning, has seen widespread use for modeling real-world events, particularly in extrapolation settings. Nevertheless, most previous studies are embedded models, which require both enti...
详细信息
Temporal knowledge graph(TKG) reasoning, has seen widespread use for modeling real-world events, particularly in extrapolation settings. Nevertheless, most previous studies are embedded models, which require both entity and relation embedding to make predictions, ignoring the semantic correlations among different entities and relations within the same timestamp. This can lead to random and nonsensical predictions when unseen entities or relations occur. Furthermore, many existing models exhibit limitations in handling highly correlated historical facts with extensive temporal depth. They often either overlook such facts or overly accentuate the relationships between recurring past occurrences and their current counterparts. Due to the dynamic nature of TKG, effectively capturing the evolving semantics between different timestamps can be *** address these shortcomings, we propose the recurrent semantic evidenceaware graph neural network(RE-SEGNN), a novel graph neural network that can learn the semantics of entities and relations simultaneously. For the former challenge, our model can predict a possible answer to missing quadruples based on semantics when facing unseen entities or relations. For the latter problem, based on an obvious established force, both the recency and frequency of semantic history tend to confer a higher reference value for the current. We use the Hawkes process to compute the semantic trend, which allows the semantics of recent facts to gain more attention than those of distant facts. Experimental results show that RE-SEGNN outperforms all SOTA models in entity prediction on 6 widely used datasets, and 5 datasets in relation prediction. Furthermore, the case study shows how our model can deal with unseen entities and relations.
The manual process of evaluating answer scripts is strenuous. Evaluators use the answer key to assess the answers in the answer scripts. Advancements in technology and the introduction of new learning paradigms need a...
详细信息
The health care system encompasses the participation of individuals,groups,agencies,and resources that offer services to address the requirements of the person,community,and population in terms of *** to the rising de...
详细信息
The health care system encompasses the participation of individuals,groups,agencies,and resources that offer services to address the requirements of the person,community,and population in terms of *** to the rising debates on the healthcare systems in relation to diseases,treatments,interventions,medication,and clinical practice guidelines,the world is currently discussing the healthcare industry,technology perspectives,and healthcare *** gain a comprehensive understanding of the healthcare systems research paradigm,we offered a novel contextual topic modeling approach that links up the CombinedTM model with our healthcare Bert to discover the contextual topics in the domain of *** research work discovered 60 contextual topics among them fteen topics are the hottest which include smart medical monitoring systems,causes,and effects of stress and anxiety,and healthcare cost estimation and twelve topics are the ***,thirty-three topics are showing in-significant *** further investigated various clusters and correlations among the topics exploring inter-topic distance maps which add depth to the understanding of the research structure of this scientific *** current study enhances the prior topic modeling methodologies that examine the healthcare literature from a particular disciplinary *** further extends the existing topic modeling approaches that do not incorporate contextual information in the topic discovery process adding contextual information by creating sentence embedding vectors through transformers-based *** also utilized corpus tuning,the mean pooling technique,and the hugging face *** method gives a higher coherence score as compared to the state-of-the-art models(LSA,LDA,and Ber Topic).
High reliability applications in dense access scenarios have become one of the main goals of 6G *** solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an inte...
详细信息
High reliability applications in dense access scenarios have become one of the main goals of 6G *** solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an intelligent cooperative secure access scheme based on multi-agent reinforcement learning and federated learning is proposed,that is,the Preamble Slice Orderly Queue Access(PSOQA)*** this scheme,the preamble arrangement is combined with the access *** preamble arrangement is realized by preamble slices which is from the virtual preamble *** access devices learn to queue orderly by deep reinforcement *** orderly queue weakens the random and avoids collision.A preamble slice is assigned to an orderly access queue at each access *** orderly queue is determined by interaction information among multiple *** the federated reinforcement learning framework,the PSOQA scheme is implemented to guarantee the privacy and security of ***,the access performance of PSOQA is compared with other random contention schemes in different load *** results show that PSOQA can not only improve the access success rate but also guarantee low-latency tolerant performances.
暂无评论