With the rapid development and widespread application of information, computer, and communication technologies, Cyber-Physical-Social Systems (CPSS) have gained increasing importance and attention. To enable intellige...
详细信息
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate disseminatio...
详细信息
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate dissemination at distinct initial *** there are many research results of multi-source identification,the challenge of locating sources with varying initiation times using a limited subset of observational nodes remains *** this study,we provide the backward spread tree theorem and source centrality theorem,and develop a backward spread centrality algorithm to identify all the information sources that trigger the spread at different start *** proposed algorithm does not require prior knowledge of the number of sources,however,it can estimate both the initial spread moment and the spread *** core concept of this algorithm involves inferring suspected sources through source centrality theorem and locating the source from the suspected sources with linear *** experiments from synthetic and real network simulation corroborate the superiority of our method in terms of both efficacy and ***,we find that our method maintains robustness irrespective of the number of sources and the average degree of *** with classical and state-of-the art source identification methods,our method generally improves the AUROC value by 0.1 to 0.2.
Nowadays, trust management plays a significant role in different applications like commercial applications, Internet of Things (IoT) based applications, social networking applications, cloud computing-based applicatio...
详细信息
Mobile Edge Computing(MEC)is a promising technology that provides on-demand computing and efficient storage services as close to end users as *** an MEC environment,servers are deployed closer to mobile terminals to e...
详细信息
Mobile Edge Computing(MEC)is a promising technology that provides on-demand computing and efficient storage services as close to end users as *** an MEC environment,servers are deployed closer to mobile terminals to exploit storage infrastructure,improve content delivery efficiency,and enhance user ***,due to the limited capacity of edge servers,it remains a significant challenge to meet the changing,time-varying,and customized needs for highly diversified content of ***,techniques for caching content at the edge are becoming popular for addressing the above *** is capable of filling the communication gap between the users and content providers while relieving pressure on remote cloud ***,existing static caching strategies are still inefficient in handling the dynamics of the time-varying popularity of content and meeting users’demands for highly diversified entity *** address this challenge,we introduce a novel method for content caching over MEC,i.e.,*** synthesizes a content popularity prediction model,which takes users’stay time and their request traces as inputs,and a deep reinforcement learning model for yielding dynamic caching *** results demonstrate that PRIME,when tested upon the MovieLens 1M dataset for user request patterns and the Shanghai Telecom dataset for user mobility,outperforms its peers in terms of cache hit rates,transmission latency,and system cost.
The text representation issue in text classification is thoroughly examined in this paper, with a focus on handling massive volumes of text data. The paper suggests the word vector weighting model based on WT-GloVe in...
详细信息
Action recognition in videos is a critical task in computer vision, with a wide range of applications including security surveillance, behavior analysis, and cooperative control. Despite significant advancements in ac...
详细信息
As the basis of machine vision,the biomimetic image sensing devices are the eyes of artificial *** recent years,with the development of two-dimensional(2D)materials,many new optoelectronic devices are developed for th...
详细信息
As the basis of machine vision,the biomimetic image sensing devices are the eyes of artificial *** recent years,with the development of two-dimensional(2D)materials,many new optoelectronic devices are developed for their outstanding ***,there are still little sensing arrays based on 2D materials with high imaging quality,due to the poor uniformity of pixels caused by material defects and fabrication ***,we propose a 2D MoS_(2)sensing array based on artificial neural network(ANN)*** equipping the MoS_(2)sensing array with a“brain”(ANN),the imaging quality can be effectively *** the test,the relative standard deviation(RSD)between pixels decreased from about 34.3%to 6.2%and 5.49%after adjustment by the back propagation(BP)and Elman neural networks,*** peak signal to noise ratio(PSNR)and structural similarity(SSIM)of the image are improved by about 2.5 times,which realizes the re-recognition of the distorted *** provides a feasible approach for the application of 2D sensing array by integrating ANN to achieve high quality imaging.
In order to encourage carpooling between workplace personnel and college students, this research article gives a unique method that makes use of machine getting to know and synthetic intelligence (AI) algorithms. The ...
详细信息
Thereis an urgent need for strong security measures to protect Body Area Networks (BANs) from malicious threats, as their use in health monitoring and telemedicine continues to grow. To improve BAN security, this rese...
详细信息
Over the past years, numerous methods have been developed to identify anomalies in traditional VANETs networks. A survey of VANET anomaly detection and mitigation methods is presented in this analysis. This survey loo...
详细信息
暂无评论