In this paper, we study the sixth order equation with the simply supported boundary conditions in a polygonal domain. We propose a new mixed formulation that decomposes the sixth order problem into a system of Poisson...
详细信息
This paper addresses the issue of teaching Ukrainian as a foreign language with the help of modern software. The technical requirements and software service architecture for studying words of Ukrainian language were p...
详细信息
Learning to represent and simulate the dynamics of physical systems is a crucial yet challenging task. Existing equivariant Graph Neural Network (GNN) based methods have encapsulated the symmetry of physics, e.g., tra...
详细信息
Jitter in multimedia traffic is mainly introduced by variations in network characteristics. Ifjitter is so significant in the application that is receiving, this can result in a degraded performance in real-time multi...
详细信息
ISBN:
(纸本)9781665475778
Jitter in multimedia traffic is mainly introduced by variations in network characteristics. Ifjitter is so significant in the application that is receiving, this can result in a degraded performance in real-time multimedia communications applications. Jitter causes inaudible audio or unclear video which can be undesirable and uncomfortable to the user. Buffers are often employed to temporarily to store arriving packets before playing them at equal intervals to curb and minimize jitter. Jitter for voice packets should not exceed 20-50 milliseconds within a given stream. This paper proposes a method to reducejitter in intermediate nodes is proposed, such that when the packets arrive at the receiving end, there would be little or nojitter to process in the de-jitter buffer. We analyze M/G/1 nonpreemptive and pre-emptive resume priority queuing in the intermediate node and analyze how these models will affect delay and jitter. We found out that preemptive priority queuing performs better but almost the same to non-preemptive priority queuing. Both Priority based queues performed much better than the First in First out queue.
Simplicial map neural networks (SMNNs) are topology-based neural networks with interesting properties such as universal approximation ability and robustness to adversarial examples under appropriate conditions. Howeve...
Particle Swarm Optimization (PSO) is a robust stochastic optimization algorithm for solving complex and constrained optimization problems. This paper aims to systematically investigate the influence of diverse random ...
详细信息
Particle Swarm Optimization (PSO) is a robust stochastic optimization algorithm for solving complex and constrained optimization problems. This paper aims to systematically investigate the influence of diverse random number distributions on the learning parameters of PSO and evaluate the algorithm's sensitivity based on these parameters. To this end, several exhaustive numerical experiments were conducted on several test functions, including asymmetric Sphere, Easom, and Csendes. Initially, appropriate random distributions were identified for the learning parameters and proceeded to compare these distributions using all potential combinations. The sensitivity of PSO to these parameters was evaluated using the mean best score, the relative proximity of the best particle to the theoretical optimum, and the average objective function evaluations. The most significant contribution of this research lies in the insights derived from the experimental data. The discovery was that highly skewed and long-tailed distributions such as Chi, Chi-square, Lomax, and Exponential often underperform. On the other hand, distributions that are bounded proportionally to the problem domain consistently surpass the performance of the standard uniform distribution. These findings significantly enhance the understanding of PSO algorithms and provide valuable guidelines for their practical deployment.
In the cloud storage environment, how to efficiently and dynamically complete the integrity verification of multi-user and multi-replica data is a challenging problem. Based on the bilinear mapping signature mechanism...
详细信息
Nowadays, the application prospect of cloud storage is more and more extensive, and the security problem of cloud storage has become one of the hotspots of research. Searchable encryption can make full use of the huge...
详细信息
The sharing of electronic health records (EHR) has shown significant advantages in the accurate diagnosis of patients and the development of medical institutions. However, due to the privacy and sensitivity of medical...
详细信息
Training sophisticated machine learning models usually requires many training samples. Especially in healthcare settings these samples can be very expensive, meaning that one institution alone usually does not have en...
详细信息
暂无评论