It is not outside the scope of this to say that the new paper was a pioneer work that revolutionizes our understanding of the rules of routine production. The new approach put forward by our research manages to quanti...
详细信息
The primary goal of a Named Entity Recognition (NER) system is to gather relevant information from the given text. NER in Malayalam text is challenging due to the agglutinative structure of the language. Due to the in...
详细信息
In the present era, the rise in number and complexity of malware poses a major threat leading to the rise in the importance of smarter Malware detection systems to understand and detect modern malwares. Modern systems...
详细信息
This study suggests modifications to the already existing IEEE 802.11 MAC protocol, by proposing the elimination of the back-off period following collisions and recommending the use of Distributed Inter-Frame Space (D...
详细信息
Autonomous systems play a vital role in creating an ambient environment, but for comprehensive human-robot interaction, the system must interpret and identify specific human behaviours. The demand for recognizing huma...
详细信息
Now a days, students are under a lot of stress due to social issues and schoolwork. Additionally, they use smart devices excessively, which negatively impacts their mental health. an online application that allows use...
详细信息
Edge computing at the mobile frontier, enhanced by the integration of wireless energy, represents a cutting-edge strategy to boost processing performance in networks with limited energy resources, such as wireless sen...
详细信息
ISBN:
(纸本)9798350343670
Edge computing at the mobile frontier, enhanced by the integration of wireless energy, represents a cutting-edge strategy to boost processing performance in networks with limited energy resources, such as wireless sensor networks and the Internet of Things (IoT). This study investigates a mobile edge computing (MEC) framework powered by wireless energy, employing a dual-mode offloading scheme. In this paradigm, tasks from wireless devices (WD) may either be processed on-device or entirely shifted to an MEC server. In this approach, tasks from a wireless device (WD) are either processed locally or completely transferred to an MEC server. The objective is to create an online algorithm that can adjust task offloading and wireless resource allocation adaptively according to the variable conditions of the wireless channel. Conventional numerical optimization methods are inadequate due to the swift variations within the channel's coherence time. Our aim is to develop an algorithm that operates online and can dynamically adjust both offloading and resource distribution in response to the fluctuating state of the wireless channel. Traditional numerical optimization approaches fall short because they cannot swiftly adapt to the rapid changes in the channel's coherence. The solution we propose is a framework based on Deep Reinforcement Learning for Online Offloading that utilizes deep neural networks to incrementally learn from offloading decisions, thereby circumventing the need for complex combinatorial optimization. This leads to a significant reduction in the computational load, particularly in expansive networks. We've further enhanced this system with a method that enables real-time modification of the DROO algorithm's parameters. Our experiments demonstrate that this novel algorithm nearly achieves optimal efficiency and significantly reduces computation times - by more than ten times relative to existing techniques. For example, in a network with 30 users, DROO achiev
Emotion recognition is essential in many real-life problems and applications such as computer-human interaction, health monitoring, etc. In this project, we propose a meta-learning approach for developing a computer v...
详细信息
The escalation of deforestation, particularly in the urban periphery, underscores the urgency for advanced frameworks in change detection. This research addresses this imperative by introducing a comprehensive solutio...
详细信息
Cyber-attacks are increasing day to day in this world of AI and Internet. A ML model to detect the network attack based on the network parameters is of great use. The proposed model uses a new and complete method to m...
详细信息
暂无评论