Hyperspectral image (HSI) spectral-spatial joint feature (FE) extraction methods generally suffer from low feature retention and weak spatial-spectral dependence, which will lead to single-class feature confrontation ...
详细信息
Being a top cause of mortality and serious disability, stroke demands urgent diagnosis and impactful prevention. Current innovations in machine learning (ML) show a great capacity for predicting the likelihood of a st...
详细信息
IoT is becoming increasingly popular due to its quick expansion and variety of applications. In addition, 5G technology helps with communication and network connectivity. This work integrates C-RAN with IoT networks t...
详细信息
Reinforcement learning holds promise in enabling robotic tasks as it can learn optimal policies via trial and ***,the practical deployment of reinforcement learning usually requires human intervention to provide episo...
详细信息
Reinforcement learning holds promise in enabling robotic tasks as it can learn optimal policies via trial and ***,the practical deployment of reinforcement learning usually requires human intervention to provide episodic resets when a failure *** manual resets are generally unavailable in autonomous robots,we propose a reset-free reinforcement learning algorithm based on multi-state recovery and failure prevention to avoid failure-induced *** multi-state recovery provides robots with the capability of recovering from failures by self-correcting its behavior in the problematic state and,more importantly,deciding which previous state is the best to return to for efficient *** failure prevention reduces potential failures by predicting and excluding possible unsafe actions in specific *** simulations and real-world experiments are used to validate our algorithm with the results showing a significant reduction in the number of resets and failures during the learning.
The foundation of contemporary data security, guaranteeing integrity and confidentiality in digital communications, is referred to as cryptography. On the other side, image steganography strengthens data security by p...
详细信息
Computing paradigms are changing at a faster pace leading to highly complex and dynamic environments, thereby demanding resource management acumen. Pivoting in these paradigms, auto scaling ensures optimal resource al...
详细信息
Résumé: Les outils digitaux tels que la blockchain, l’Internet des objets (IoT) et le big data (BD) ont été largement utilisés pour digitaliser la logistique et la gestion de la chaîne d...
详细信息
Device-Free mmWave Sensing (DFWS) could sense target state by analyzing how target activities influence the surrounding mmWave signals. It has emerged as a promising sensing technology. However, when employing DFWS in...
详细信息
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadli...
详细信息
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadline, and popularity. However, the methods are inappropriate forachieving higher scheduling performance. Regarding data security, existingmethods use various encryption schemes but introduce significant serviceinterruption. This article sketches a practical Real-time Application CentricTRS (Throughput-Resource utilization–Success) Scheduling with Data Security(RATRSDS) model by considering all these issues in task scheduling anddata security. The method identifies the required resource and their claim timeby receiving the service requests. Further, for the list of resources as services,the method computes throughput support (Thrs) according to the number ofstatements executed and the complete statements of the service. Similarly, themethod computes Resource utilization support (Ruts) according to the idletime on any duty cycle and total servicing time. Also, the method computesthe value of Success support (Sus) according to the number of completions forthe number of allocations. The method estimates the TRS score (ThroughputResource utilization Success) for different resources using all these supportmeasures. According to the value of the TRS score, the services are rankedand scheduled. On the other side, based on the requirement of service requests,the method computes Requirement Support (RS). The selection of service isperformed and allocated. Similarly, choosing the route according to the RouteSupport Measure (RSM) enforced route security. Finally, data security hasgets implemented with a service-based encryption technique. The RATRSDSscheme has claimed higher performance in data security and scheduling.
Autonomous vehicles represent a transformative technology with the best implications for transportation systems. The key component of their success is their capability to detect and respond to their surroundings. For ...
详细信息
暂无评论