Zero-shot event-relational reasoning is an important task in natural language processing, and existing methods jointly learn a variety of event-relational prefixes and inference-form prefixes to achieve such tasks. Ho...
详细信息
Marine container terminal(MCT)plays a key role in the marine intelligent transportation system and international logistics ***,the efficiency of resource scheduling significantly influences the operation performance o...
详细信息
Marine container terminal(MCT)plays a key role in the marine intelligent transportation system and international logistics ***,the efficiency of resource scheduling significantly influences the operation performance of *** solve the practical resource scheduling problem(RSP)in MCT efficiently,this paper has contributions to both the problem model and the algorithm ***,in the problem model,different from most of the existing studies that only consider scheduling part of the resources in MCT,we propose a unified mathematical model for formulating an integrated *** new integrated RSP model allocates and schedules multiple MCT resources simultaneously by taking the total cost minimization as the ***,in the algorithm design,a pre-selection-based ant colony system(PACS)approach is proposed based on graphic structure solution representation and a pre-selection *** the one hand,as the RSP can be formulated as the shortest path problem on the directed complete graph,the graphic structure is proposed to represent the solution encoding to consider multiple constraints and multiple factors of the RSP,which effectively avoids the generation of infeasible *** the other hand,the pre-selection strategy aims to reduce the computational burden of PACS and to fast obtain a higher-quality *** evaluate the performance of the proposed novel PACS in solving the new integrated RSP model,a set of test cases with different sizes is *** results and comparisons show the effectiveness and efficiency of the PACS algorithm,which can significantly outperform other state-of-the-art algorithms.
The current urban intelligent transportation is in a rapid development stage, and coherence control of vehicle formations has important implications in urban intelligent transportation research. This article focuses o...
详细信息
In the industrial Internet of things(IIoT), various applications generate a large number of interactions and are vulnerable to various attacks, which are difficult to be monitored in a sophisticated way by traditional...
详细信息
In the industrial Internet of things(IIoT), various applications generate a large number of interactions and are vulnerable to various attacks, which are difficult to be monitored in a sophisticated way by traditional network architectures. Therefore, deploying software-defined network(SDN) in IIoT is essential to defend against various attacks. However, SDN has a drawback: there is a security problem of distributed denial-ofservice(DDoS) attacks at the control layer. This paper proposes an effective solution: DDoS detection within the domain using tri-entropy in information theory. The detected attacks are then uploaded to a smart contract in the blockchain, so that the attacks can be quickly cut off even if the same attack occurs in different domains. Experimental validation was conducted under different attack strengths and multiple identical attacks, and the results show that the method has better detection ability under different attack strengths and can quickly block the same attacks.
The Access control scheme is an effective method to protect user data *** access control scheme based on blockchain and ciphertext policy attribute encryption(CP–ABE)can solve the problems of single—point of failure...
详细信息
The Access control scheme is an effective method to protect user data *** access control scheme based on blockchain and ciphertext policy attribute encryption(CP–ABE)can solve the problems of single—point of failure and lack of trust in the centralized ***,it also brings new problems to the health information in the cloud storage environment,such as attribute leakage,low consensus efficiency,complex permission updates,and so *** paper proposes an access control scheme with fine-grained attribute revocation,keyword search,and traceability of the attribute private key distribution *** technology tracks the authorization of attribute private *** credit scoring method improves the Raft protocol in consensus ***,the interplanetary file system(IPFS)addresses the capacity deficit of *** the premise of hiding policy,the research proposes a fine-grained access control method based on users,user attributes,and file *** optimizes the data-sharing *** the same time,Proxy Re-Encryption(PRE)technology is used to update the access *** proposed scheme proved to be *** analysis and experimental results show that the proposed scheme has higher efficiency and more *** can meet the needs of medical institutions.
Monocular object 6D pose estimation is a fundamental yet challenging task in computer vision. Recently, deep learning has been proven to be capable of predicting remarkable results in this task. Existing works often a...
详细信息
Effective path planning is crucial for mobile robots to quickly reach rescue destination and complete rescue tasks in a post-disaster *** this study,we investigated the post-disaster rescue path planning problem and m...
详细信息
Effective path planning is crucial for mobile robots to quickly reach rescue destination and complete rescue tasks in a post-disaster *** this study,we investigated the post-disaster rescue path planning problem and modeled this problem as a variant of the travel salesman problem(TSP)with life-strength *** address this problem,we proposed an improved iterated greedy(IIG)***,a push-forward insertion heuristic(PFIH)strategy was employed to generate a high-quality initial ***,a greedy-based insertion strategy was designed and used in the destruction-construction stage to increase the algorithm’s exploration ***,three problem-specific swap operators were developed to improve the algorithm’s exploitation ***,an improved simulated annealing(SA)strategy was used as an acceptance criterion to effectively prevent the algorithm from falling into local *** verify the effectiveness of the proposed algorithm,the Solomon dataset was extended to generate 27 instances for ***,the proposed IIG was compared with five state-of-the-art *** parameter analysiswas conducted using the design of experiments(DOE)Taguchi method,and the effectiveness analysis of each component has been verified one by *** results indicate that IIGoutperforms the compared algorithms in terms of the number of rescue survivors and convergence speed,proving the effectiveness of the proposed algorithm.
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
Traditional autonomous driving usually requires a large number of vehicles to upload data to a central server for training. However, collecting data from vehicles may violate personal privacy as road environmental inf...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
暂无评论