In this study, we propose a novel pre-learning approach for genetic programming (GP) that aims to investigate the effect of the probability of being selected for each operator. Furthermore, we present a technique that...
详细信息
We propose an extension of the chaotic evolution algorithm into the discrete domain to address combinatorial optimization problems. In this study, we leverage the discrete chaotic evolution algorithm to tackle the Tra...
详细信息
This research presents a new music generation model and a novel MIDI data format for MIDI music generation. This innovative data format allows us to process MIDI music in a manner analogous to video analysis. Initiall...
详细信息
Deception is essential to model real-world agent behaviors in entertainment and serious games. This paper approaches the challenge of planning deceptive routes on topographic terrains where topographic path costs and ...
详细信息
ISBN:
(纸本)9798400716270
Deception is essential to model real-world agent behaviors in entertainment and serious games. This paper approaches the challenge of planning deceptive routes on topographic terrains where topographic path costs and other deceptive path factors are analyzed. The work explores alternative deceptive strategies tuned to explore the terrain costs to determine how deceptive the path search nodes are and to return paths with low topographic costs. In addition to the A* algorithm, the Theta* algorithm is explored in the search for smoother deceptive routes, which better represent routes used by terrestrial agents in real-world adversarial situations. It also analyzes deceptive topographic paths computed according to the Last Deceptive Point (LDP) and Last Topographic Deceptive Point (LDPT) notions, where examples of returned paths are presented with the help of terrain relief scenarios. Experimental results with the proposed methods are statistically analyzed according to various path search metrics, showing that all deceptive strategies with A* compute topographic paths with higher numbers of deceptive nodes on reduced execution times. Moreover, the strategies with Theta* and LDPT return paths that show a useful combination of topographic path quality and number of deceptive nodes.
This paper considers a cloud streaming game using WebRTC. Since the cloud streaming game consists of a server and a client, the network quality between them affects the game. Among the network quality degradation fact...
详细信息
ISBN:
(数字)9798331504120
ISBN:
(纸本)9798331504137
This paper considers a cloud streaming game using WebRTC. Since the cloud streaming game consists of a server and a client, the network quality between them affects the game. Among the network quality degradation factors, we focus on delay jitter. We reduce the effect of the jitter by buffering. We conduct a subjective experiment of a single-player action game and evaluate application-level QoS and QoE. We investigate the impact of buffering on the video and audio quality of the user playing the game.
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are expl...
详细信息
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are exploited to carry client patterns observed by a *** client patterns facilitate the particular client’s future visit to the corresponding ***,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the *** protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource *** this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP *** proposed protocol uses a secret key embedded within a *** proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication ***,the analysis presented in this paper confirms that proposed protocol resists various known attacks.
Currently, online Shopping platforms have grown significantly, especially during the COVID-19 pandemic. This condition motivates the need for analyzing how the users/customers' opinions on using such platform. Sen...
详细信息
Aiming at the unbalanced problem of big data classification, this paper proposes a classification method of unbalanced data on the ground of Bayesian optimal neural network model. The method firstly uses Optimized Gra...
详细信息
Network security is a crucial component of Information technology, yet organizations continue to grapple with meeting established security benchmarks. Given the rise in cyber-attacks and the continuous emergence of ne...
详细信息
Malware had been a problem for quite some times since it spreads easily and can cause various problems. Currently, malware is also one of the big threats for internet users. With a huge number of internet users today,...
详细信息
暂无评论