Solar flares are one of the strongest outbursts of solar activity,posing a serious threat to Earth’s critical infrastructure,such as communications,navigation,power,and ***,it is essential to accurately predict solar...
详细信息
Solar flares are one of the strongest outbursts of solar activity,posing a serious threat to Earth’s critical infrastructure,such as communications,navigation,power,and ***,it is essential to accurately predict solar flares in order to ensure the safety of human ***,the research focuses on two directions:first,identifying predictors with more physical information and higher prediction accuracy,and second,building flare prediction models that can effectively handle complex observational *** terms of flare observability and predictability,this paper analyses multiple dimensions of solar flare observability and evaluates the potential of observational parameters in *** flare prediction models,the paper focuses on data-driven models and physical models,with an emphasis on the advantages of deep learning techniques in dealing with complex and high-dimensional *** reviewing existing traditional machine learning,deep learning,and fusion methods,the key roles of these techniques in improving prediction accuracy and efficiency are *** prevailing challenges,this study discusses the main challenges currently faced in solar flare prediction,such as the complexity of flare samples,the multimodality of observational data,and the interpretability of *** conclusion summarizes these findings and proposes future research directions and potential technology advancement.
X-ray security inspection for detecting prohibited items is widely used to maintain social order and ensure the safety of people’s lives and property. Due to the large number of parameters and high computational comp...
详细信息
Array-geometry-agnostic speech separation (AGA-SS) aims to develop an effective separation method regardless of the microphone array geometry. Conventional methods rely on permutation-free operations, such as summatio...
详细信息
Effective resource allocation can exploit the advantage of intelligent reflective surface(IRS)assisted mobile edge computing(MEC)***,it is challenging to balance the limited energy of MTs and the strict delay requirem...
详细信息
Effective resource allocation can exploit the advantage of intelligent reflective surface(IRS)assisted mobile edge computing(MEC)***,it is challenging to balance the limited energy of MTs and the strict delay requirement of their *** this paper,in order to tackle the challenge,we jointly optimize the offloading delay and energy consumption of mobile terminals(MTs)to realize the delay-energy tradeoff in an IRS-assisted MEC network,in which non-orthogonal multiple access(NOMA)and multiantenna are applied to improve spectral *** achieve the optimal delay-energy tradeoff,an offloading cost minimization model is proposed,in which the edge computing resource allocation,signal detecting vector,uplink transmission power,and IRS phase shift coefficient are needed to be jointly *** optimization of the model is a multi-level fractional problem in complex fields with some coupled high dimension *** solve the intractable problem,we decouple the original problem into a computing subproblem and a wireless transmission subproblem based on the uncoupled relationship between different variable *** computing subproblem is proved convex and the closed-form solution is obtained for the edge computing resource ***,the wireless transmission subproblem is solved iteratively through decoupling the residual *** each iteration,the closed-form solution of residual variables is obtained through different successive convex approximation(SCA)*** verify the proposed algorithm can converge to an optimum with polynomial *** results indicate the proposed method achieves average saved costs of 65.64%,11.24%,and 9.49%over three benchmark methods respectively.
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the *** IoE-based cloud computing services are located at remote locations without the control of the data *** data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security *** lack of knowledge about security capabilities and control over data raises several security *** Acid(DNA)computing is a biological concept that can improve the security of IoE big *** IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher *** paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access *** experimental results illustrated that DNACDS performs better than other DNA-based security *** theoretical security analysis of the DNACDS shows better resistance capabilities.
In task offloading,the movement of vehicles causes the switching of connected RSUs and servers,which may lead to task offloading failure or high service *** this paper,we analyze the impact of vehicle movements on tas...
详细信息
In task offloading,the movement of vehicles causes the switching of connected RSUs and servers,which may lead to task offloading failure or high service *** this paper,we analyze the impact of vehicle movements on task offloading and reveal that data preparation time for task execution can be minimized via forward-looking ***,a Bi-LSTM-based model is proposed to predict the trajectories of *** service area is divided into several equal-sized *** the actual position of the vehicle and the predicted position by the model belong to the same grid,the prediction is considered correct,thereby reducing the difficulty of vehicle trajectory ***,we propose a scheduling strategy for delay optimization based on the vehicle trajectory *** the inevitable prediction error,we take some edge servers around the predicted area as candidate execution servers and the data required for task execution are backed up to these candidate servers,thereby reducing the impact of prediction deviations on task offloading and converting the modest increase of resource overheads into delay reduction in task *** results show that,compared with other classical schemes,the proposed strategy has lower average task offloading delays.
Triangle packing problem has been paid lots of attention to in the literature. In this paper, we study the kernelization of the triangle packing problem in tournaments. For the parameterized arc-disjoint triangle pack...
详细信息
Triangle packing problem has been paid lots of attention to in the literature. In this paper, we study the kernelization of the triangle packing problem in tournaments. For the parameterized arc-disjoint triangle packing problem in tournaments, we find a maximal arc-disjoint triangle packing with the number of vertices bounded by 2.5k. Based on the relation between the maximal arc-disjoint triangle packing and the vertices outside of the packing, a kernel of size 3.5k for the problem is obtained, improving the previous best one 6k. For the parameterized vertex-disjoint triangle packing problem in sparse tournaments, several new properties between the triangles in maximal vertex-disjoint triangle packing and the arcs in the feedback arc set are presented, which result in a kernel of size 7k for the problem, improving the previous best one of *** also give a 7k vertex kernel for the parameterized feedback vertex set problem in sparse *** kernelization process presented in this paper for the parameterized arc-disjoint triangle packing can be applied to solve the parameterized arc-disjoint triangle packing problem on other restricted directed graph classes.
In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scal...
详细信息
In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scale object detection algorithm based on an improved YOLOv8 has been proposed. Firstly, a lightweight attention mechanism, Triplet Attention, is introduced to enhance the algorithm’s ability to extract multi-dimensional and multi-scale features, thereby improving the receptive capability of the feature maps. Secondly, the Diverse Branch Block (DBB) is integrated into the CSP Bottleneck with two Convolutions (C2F) module to strengthen the fusion of semantic information across different layers. Thirdly, a new decoupled detection head is proposed by redesigning the original network head based on the Diverse Branch Block module to improve detection accuracy and reduce missed and false detections. Finally, the Minimum Point Distance based Intersection-over-Union (MPDIoU) is used to replace the original YOLOv8 Complete Intersection-over-Union (CIoU) to accelerate the network’s training convergence. Comparative experiments and dehazing pre-processing tests were conducted on the RTTS and VOC-Fog datasets. Compared to the baseline YOLOv8 model, the improved algorithm achieved mean Average Precision (mAP) improvements of 4.6% and 3.8%, respectively. After defogging pre-processing, the mAP increased by 5.3% and 4.4%, respectively. The experimental results demonstrate that the improved algorithm exhibits high practicality and effectiveness in foggy traffic scenarios.
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
Accurate significant wave height(SWH)prediction is essential for the development and utilization of wave *** learning methods such as recurrent and convolutional neural networks have achieved good results in SWH ***,t...
详细信息
Accurate significant wave height(SWH)prediction is essential for the development and utilization of wave *** learning methods such as recurrent and convolutional neural networks have achieved good results in SWH ***,these methods do not adapt well to dynamic seasonal variations in wave *** this study,we propose a novel method—the spatiotemporal dynamic graph(STDG)neural *** method predicts the SWH of multiple nodes based on dynamic graph modeling and multi-characteristic ***,considering the dynamic seasonal variations in the wave direction over time,the network models wave dynamic spatial dependencies from long-and short-term pattern ***,to correlate multiple characteristics with SWH,the network introduces a cross-characteristic transformer to effectively fuse multiple ***,we conducted experiments on two datasets from the South China Sea and East China Sea to validate the proposed method and compared it with five prediction methods in the three *** experimental results show that the proposed method achieves the best performance at all predictive scales and has greater advantages for extreme value ***,an analysis of the dynamic graph shows that the proposed method captures the seasonal variation mechanism of the waves.
暂无评论