Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
Named in-network computing service (NICS) is a potential computing paradigm emerged recently. Benefitted from the characteristics of named addressing and routing, NICS can be flexibly deployed on NDN router side and p...
详细信息
Modulation depth and its associated loss pose a significant challenge in electro-optical telecommunication systems. Optimal modulators strive to enhance modulation depth while minimizing loss rates. We propose a high-...
详细信息
The holomorphic embedding method(HEM)stands as a mathematical technique renowned for its favorable convergence properties when resolving algebraic systems involving complex *** key idea behind the HEM is to convert th...
详细信息
The holomorphic embedding method(HEM)stands as a mathematical technique renowned for its favorable convergence properties when resolving algebraic systems involving complex *** key idea behind the HEM is to convert the task of solving complex algebraic equations into a series expansion involving one or multiple embedded complex *** transformation empowers the utilization of complex analysis tools to tackle the original problem *** the 2010s,the HEM has been applied to steady-state and dynamic problems in power systems and has shown superior convergence and robustness compared to traditional numerical *** paper provides a comprehensive review on the diverse applications of the HEM and its variants reported by the literature in the past *** paper discusses both the strengths and limitations of these HEMs and provides guidelines for practical *** also outlines the challenges and potential directions for future research in this field.
The increasing penetration of renewable energy resources with highly fluctuating outputs has placed increasing concern on the accuracy and timeliness of electric power system state estimation(SE).Meanwhile,we note tha...
详细信息
The increasing penetration of renewable energy resources with highly fluctuating outputs has placed increasing concern on the accuracy and timeliness of electric power system state estimation(SE).Meanwhile,we note that only a fraction of system states fluctuate at the millisecond level and require to be *** such,refreshing only those states with significant variation would enhance the computational efficiency of SE and make fast-continuous update of states ***,this is difficult to achieve with conventional SE methods,which generally refresh states of the entire system every 4–5 *** this context,we propose a local hybrid linear SE framework using stream processing,in which synchronized measurements received from phasor measurement units(PMUs),and trigger/timingmode measurements received from remote terminal units(RTUs)are used to update the associated local ***,the measurement update process efficiency and timeliness are enhanced by proposing a trigger measurement-based fast dynamic partitioning algorithm for determining the areas of the system with states requiring *** particular,non-iterative hybrid linear formulations with both RTUs and PMUs are employed to solve the local SE *** timeliness,accuracy,and computational efficiency of the proposed method are demonstrated by extensive simulations based on IEEE 118-,300-,and 2383-bus systems.
Singular value decomposition (SVD) based image authentication has widespread applications for digital media protection including forensic and medical domains due to the high stability and robustness of singular values...
详细信息
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a uni...
详细信息
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a unidirectional manner,where a bidirectional method can maximize performance results and capture semantic and contextual information in *** addition,there are many separate models for identifying offensive texts based on monolin-gual and multilingual,but there are a few models that can detect both monolingual and multilingual-based offensive *** this study,a detection system has been developed for both monolingual and multilingual offensive texts by combining deep convolutional neural network and bidirectional encoder representations from transformers(Deep-BERT)to identify offensive posts on social media that are used to harass *** paper explores a variety of ways to deal with multilin-gualism,including collaborative multilingual and translation-based ***,the Deep-BERT is tested on the Bengali and English datasets,including the different bidirectional encoder representations from transformers(BERT)pre-trained word-embedding techniques,and found that the proposed Deep-BERT’s efficacy outperformed all existing offensive text classification algorithms reaching an accuracy of 91.83%.The proposed model is a state-of-the-art model that can classify both monolingual-based and multilingual-based offensive texts.
Gait recognition is an active research area that uses a walking theme to identify the subject *** Gait Recognition(HGR)is performed without any cooperation from the ***,in practice,it remains a challenging task under ...
详细信息
Gait recognition is an active research area that uses a walking theme to identify the subject *** Gait Recognition(HGR)is performed without any cooperation from the ***,in practice,it remains a challenging task under diverse walking sequences due to the covariant factors such as normal walking and walking with wearing a ***,over the years,have worked on successfully identifying subjects using different techniques,but there is still room for improvement in accuracy due to these covariant *** paper proposes an automated model-free framework for human gait recognition in this *** are a few critical steps in the proposed ***,optical flow-based motion region esti-mation and dynamic coordinates-based cropping are *** second step involves training a fine-tuned pre-trained MobileNetV2 model on both original and optical flow cropped frames;the training has been conducted using static *** third step proposed a fusion technique known as normal distribution serially *** the fourth step,a better optimization algorithm is applied to select the best features,which are then classified using a Bi-Layered neural *** publicly available datasets,CASIA A,CASIA B,and CASIA C,were used in the experimental process and obtained average accuracies of 99.6%,91.6%,and 95.02%,*** proposed framework has achieved improved accuracy compared to the other methods.
Population growth in cities results in a demand for parking lots from an increasing number of automobiles, which frequently contributes to the global problem of traffic congestion. This study presents the smart parkin...
详细信息
Federated Adversarial Learning (FAL) maintains the decentralization of adversarial training for data-driven innovations while allowing the collaborative training of a common model to protect privacy facilities. Before...
详细信息
暂无评论