|
|
|
Zhixiong Chen, Nan Xiao and Dongsheng Han
Unmanned aerial vehicle (UAV)-assisted relay mobile edge computing (MEC) network is a prominent concept, where network deployment is flexible and network coverage is wide. In scenarios such as emergency communications and low-cost coverage, optimization ...
ver más
|
|
|
|
|
|
|
Kimoon Lee, Dongjin Kim, Daewon Chung and Seonho Lee
This study explores optimizing Synthetic Aperture Radar (SAR) satellite constellation scheduling for multi-imaging missions in densely targeted areas using an in-house-developed Modified Dynamic Programming (MDP) algorithm. By employing Mixed-Integer Lin...
ver más
|
|
|
|
|
|
|
Ruifeng Luo, Yifan Wang, Weifang Xiao and Xianzhong Zhao
Truss layout optimization under complex constraints has been a hot and challenging problem for decades that aims to find the optimal node locations, connection topology between nodes, and cross-sectional areas of connecting bars. Monte Carlo Tree Search ...
ver más
|
|
|
|
|
|
|
Yohan Kim, Sunyong Kim and Hyuk Lim
Network slicing to create multiple virtual networks, called network slice, is a promising technology to enable networking resource sharing among multiple tenants for the 5th generation (5G) networks. By offering a network slice to slice tenants, network ...
ver más
|
|
|
|
|
|
|
Juan Murillo-Morera, Carlos Castro-Herrera, Javier Arroyo, Ruben Fuentes-Fernandez
Pág. 114 - 137
Today, it is common for software projects to collect measurement data through development processes. With these data, defect prediction software can try to estimate the defect proneness of a software module, with the objective of assisting and guiding so...
ver más
|
|
|
|
|
|
|
Zhiqiang Jiang, Hui Qin, Changming Ji, Zhongkai Feng, Jianzhong Zhou
Pág. 1 - 19
An efficient reservoir operation technique plays a very important role in improving the water resources and energy efficiency of reservoirs. In order to effectively avoid or alleviate the ?curse of dimensionality? of Multi-dimensional Dynamic Programming...
ver más
|
|
|
|
|
|
|
Chen Zhang, Celimuge Wu, Min Lin, Yangfei Lin and William Liu
In the advanced 5G and beyond networks, multi-access edge computing (MEC) is increasingly recognized as a promising technology, offering the dual advantages of reducing energy utilization in cloud data centers while catering to the demands for reliabilit...
ver más
|
|
|
|
|
|
|
Tongyang Xu, Yuan Liu, Zhaotai Ma, Yiqiang Huang and Peng Liu
As a new distributed machine learning (ML) approach, federated learning (FL) shows great potential to preserve data privacy by enabling distributed data owners to collaboratively build a global model without sharing their raw data. However, the heterogen...
ver más
|
|
|
|
|
|
|
Wanli Li, Jiong Li, Ningbo Li, Lei Shao and Mingjie Li
Concerned with the problem of interceptor midcourse guidance trajectory online planning satisfying multiple constraints, an online midcourse guidance trajectory planning method based on deep reinforcement learning (DRL) is proposed. The Markov decision p...
ver más
|
|
|
|
|
|
|
Xiaowei Liu, Shuwen Jiang and Yi Wu
With the internet developing rapidly, mobile edge computing (MEC) has been proposed to offer computational capabilities to tackle the high latency caused by innumerable data and applications. Due to limited computing resources, the innovation of computat...
ver más
|
|
|
|
|
|
|
Ranzhen Ren, Lichuan Zhang, Lu Liu, Dongwei Wu, Guang Pan, Qiaogao Huang, Yuchen Zhu, Yazhe Liu and Zixiao Zhu
To reduce the cooperative positioning error and improve the navigation accuracy, a single master?slave AUV cooperative navigation method is proposed in this paper, which mainly focuses on planning the optimal path of the master AUV by the time difference...
ver más
|
|
|
|
|
|
|
Luca Pasqualini and Maurizio Parton
A Pseudo-Random Number Generator (PRNG) is any algorithm generating a sequence of numbers approximating properties of random numbers. These numbers are widely employed in mid-level cryptography and in software applications. Test suites are used to evalua...
ver más
|
|
|
|
|
|
|
Gang Du, Xinyue Li, Hui Hu and Xiaoling Ouyang
Under the background of the unbalanced supply and demand of medical diagnostic equipment and rising health care costs, this study aims to optimize the service scheduling for medical diagnostic equipment so as to improve patient satisfaction by ensuring t...
ver más
|
|
|
|
|
|
|
Yang Bai, Xiaocui Li, Xinfan Wu and Zhangbing Zhou
With the booming proliferation of user requests in the Internet of Things (IoT) network, Edge Computing (EC) is emerging as a promising paradigm for the provision of flexible and reliable services. Considering the resource constraints of IoT devices, for...
ver más
|
|
|
|
|
|
|
Antonio Maci, Alessandro Santorsola, Antonio Coscia and Andrea Iannacone
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are paramou...
ver más
|
|
|
|
|
|
|
Yaxuan Wang, Zhixin Zeng, Qiushan Li and Yingrui Deng
Urban-safety perception is crucial for urban planning and pedestrian street preference studies. With the development of deep learning and the availability of high-resolution street images, the use of artificial intelligence methods to deal with urban-saf...
ver más
|
|
|
|