The conventional reconfigurable intelligent surface(RIS) is limited to reflecting incident signals,thereby imposing constraints on the placement of the transmitter and receiver, which hinders achieving comprehensive s...
详细信息
The conventional reconfigurable intelligent surface(RIS) is limited to reflecting incident signals,thereby imposing constraints on the placement of the transmitter and receiver, which hinders achieving comprehensive signal coverage across an entire area. This paper investigates a simultaneously transmitting and reflecting(STAR)-RIS-aided simultaneous wireless information and power transfer(SWIPT) system with a nonlinear energy harvesting model under three different RIS transmission protocols: energy splitting(ES),time switching(TS), and mode switching(MS). The objective of this paper is to maximize the weighted sum power(WSP) of all energy harvesting receivers(EHRs) while ensuring fairness in the collected power among them. This is achieved by jointly optimizing the transmit beamforming at the base station(BS)and the transmission and reflection coefficients at the STAR-RIS, subject to rate constraints for information decoding receivers(IDRs), transmit power constraint at the BS, and coefficient constraints of each element at the STAR-RIS corresponding to the three protocols. Solving this optimization problem poses challenges because of the complicated objective function and numerous coupled optimization variables of the ES STAR-RIS. To address this complexity, an efficient alternating optimization(AO) approach is proposed as an iterative solution method that achieves suboptimal results. The AO algorithm is then extended to MS STAR-RIS and TS STAR-RIS. Specifically, for MS STRA-RIS, binary constraints in the STAR-RIS coefficient optimization subproblem are handled using the first-order approximation technique along with the penalty function method. For TS STAR-RIS, apart from optimizing BS transmit beamforming and STAR-RIS coefficients subproblems, the transmission and reflection time allocation of STAR-RIS also needs *** findings demonstrate that compared to conventional RIS-aided systems, utilizing three different protocols in a STAR-RIS-aided sy
This work addresses bi-objective hybrid flow shop scheduling problems considering consistent sublots(Bi-HFSP_CS).The objectives are to minimize the makespan and total energy ***,the Bi-HFSP_CS is formalized,followed b...
详细信息
This work addresses bi-objective hybrid flow shop scheduling problems considering consistent sublots(Bi-HFSP_CS).The objectives are to minimize the makespan and total energy ***,the Bi-HFSP_CS is formalized,followed by the establishment of a mathematical ***,enhanced version of the artificial bee colony(ABC)algorithms is proposed for tackling the Bi-HFSP_***,fourteen local search operators are employed to search for better *** different Q-learning tactics are developed to embed into the ABC algorithm to guide the selection of operators throughout the iteration ***,the proposed tactics are assessed for their efficacy through a comparison of the ABC algorithm,its three variants,and three effective algorithms in resolving 95 instances of 35 different *** experimental results and analysis showcase that the enhanced ABC algorithm combined with Q-learning(QABC1)demonstrates as the top performer for solving concerned *** study introduces a novel approach to solve the Bi-HFSP_CS and illustrates its efficacy and superior competitive strength,offering beneficial perspectives for exploration and research in relevant domains.
End-to-end training has emerged as a prominent trend in speech recognition, with Conformer models effectively integrating Transformer and CNN architectures. However, their complexity and high computational cost pose d...
详细信息
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran...
详细信息
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the transmission may be aborted due to insufficient funds(also called balance) or a low transmission rate. To increase the success rate and reduce transmission delay across all transactions, this work proposes a transaction transmission model for blockchain channels based on non-cooperative game *** balance, channel states, and transmission probability are fully considered. This work then presents an optimized channel transaction transmission algorithm. First, channel balances are analyzed and suitable channels are selected if their balance is sufficient. Second, a Nash equilibrium point is found by using an iterative sub-gradient method and its related channels are then used to transmit transactions. The proposed method is compared with two state-of-the-art approaches: Silent Whispers and Speedy Murmurs. Experimental results show that the proposed method improves transmission success rate, reduces transmission delay,and effectively decreases transmission overhead in comparison with its two competitive peers.
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement engineering(RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric Data Programme from NASA,Predictor Models in Software engineering,and iTrust Electronic Health Care System.
Digital twinning and edge computing are attractive solutions to support computing-intensive and servicesensitive Internet of Vehicles *** of the existing Internet of Vehicles service offloading solutions only consider...
详细信息
Digital twinning and edge computing are attractive solutions to support computing-intensive and servicesensitive Internet of Vehicles *** of the existing Internet of Vehicles service offloading solutions only consider edge–cloud collaboration,but the collaboration between small cell eNodeB(SCeNB)should not be *** delays far lower than offloading tasks to the cloud can be obtained through reasonable collaborative computing between *** proposed framework realizes and maintains the simulation of collaboration between SCeNB nodes by constructing a digital twin that maintains SCeNB nodes in the central controller,thereby realizing user task offloading positions,sub-channel allocation,and computing resource *** an algorithm named AUC-AC is proposed,based on the dominant actor–critic network and the auction *** order to obtain a better command of global information,the convolutional block attention mechanism(CBAM)is used in the digital twin of each SCeNB node to observe its environment and learn *** results show that our experimental scheme is better than several baseline algorithms in terms of service delay.
With the rapid proliferation of IoT devices, the volume of data generated has reached unprecedented levels, necessitating efficient management strategies. Fog computing, complemented by 5G technologies, offers promisi...
详细信息
Cloud computing technology is favored by users because of its strong computing power and convenient *** the same time,scheduling performance has an extremely efficient impact on promoting carbon ***,scheduling researc...
详细信息
Cloud computing technology is favored by users because of its strong computing power and convenient *** the same time,scheduling performance has an extremely efficient impact on promoting carbon ***,scheduling research in the multi-cloud environment aims to address the challenges brought by business demands to cloud data centers during peak ***,the scheduling problem has promising application prospects under themulti-cloud *** paper points out that the currently studied scheduling problems in the multi-cloud environment mainly include independent task scheduling and workflow task scheduling based on the dependencies between *** paper reviews the concepts,types,objectives,advantages,challenges,and research status of task scheduling in the multi-cloud *** scheduling strategies proposed in the existing related references are analyzed,discussed,and summarized,including research motivation,optimization algorithm,and related ***,the research status of the two kinds of task scheduling is compared,and several future important research directions of multi-cloud task scheduling are proposed.
Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research *** fromnatural images,character images pay more attention to stroke ***,existingmodelsmainly cons...
详细信息
Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research *** fromnatural images,character images pay more attention to stroke ***,existingmodelsmainly consider pixel-level informationwhile ignoring structural information of the character,such as its edge and glyph,resulting in reconstructed images with mottled local structure and character *** solve these problems,we propose a novel generative adversarial network(GAN)framework based on an edge-guided generator and a discriminator constructed by a dual-domain U-Net framework,i.e.,*** existing frameworks,the generator introduces the edge extractionmodule,guiding it into the denoising process through the attention mechanism,which maintains the edge detail of the restored inscription ***,a dual-domain U-Net-based discriminator is proposed to learn the global and local discrepancy between the denoised and the label images in both image and morphological domains,which is helpful to blind denoising *** proposed dual-domain discriminator and generator for adversarial training can reduce local artifacts and keep the denoised character structure *** to the lack of a real-inscription image,we built the real-inscription dataset to provide an effective benchmark for studying inscription image *** experimental results show the superiority of our method both in the synthetic and real-inscription datasets.
Current automatic segment extraction techniques for identifying target characters in videos have several limitations, including low accuracy, slow processing speeds, and poor adaptability to diverse scenes. This paper...
详细信息
暂无评论