Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 80, Issue 8May 2024
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISSN:0920-8542
Reflects downloads up to 18 Feb 2025Bibliometrics
research-article
Structure damage diagnosis of bleacher based on DSKNet model
Abstract

Bleacher usually carries a large number of people, and their safety and stability are critical. Structure damage diagnosis of bleacher can find problems and repair them in time to ensure the safety of personnel. Based on Densely Connected ...

research-article
MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment
Abstract

Securing confidential data against unauthorized users leads to access control policies with the rapid progression of Internet of Things (IoT) devices. Because of high mobility subscribers, the dynamic IoT environment is subjected to high signaling ...

research-article
A privacy-preserved IoMT-based mental stress detection framework with federated learning
Abstract

Internet of Medical Things (IoMT) can be leveraged for periodic sensing and recording of different health parameters using sensors, wireless communications, and computation platforms. Health care systems can be enhanced by using IoMT for remote ...

research-article
Computing offloading and resource scheduling based on DDPG in ultra-dense edge computing networks
Abstract

To address the current challenge of smart devices in healthcare Internet of things (IoT) struggling to efficiently process intensive applications in real-time, a collaborative cloud-edge offloading model tailored for ultra-dense edge computing (...

research-article
An efficient meta-heuristic algorithm based on water flow optimizer for data clustering
Abstract

Clustering is a popular data analysis technique that can explore the structure of data through cluster analysis. Similar data are put into the same cluster, while dissimilar data allocate to other clusters. The similarity/dissimilarity among data ...

research-article
Depression detection via a Chinese social media platform: a novel causal relation-aware deep learning approach
Abstract

Depression detection on social media aims to analyze users’ tendency to depression and provide help for the early detection of depressed users. However, most previous research focusses on diagnoses using the binary classification of the English ...

research-article
On modified l-embedded edge-connectivity of enhanced hypercubes
Abstract

With the development of scalability and applications in many interconnection networks used for large-scale parallel computing, link failures are inevitable. Once fault-free processors are guaranteed to lie in specific undamaged subnetworks, the ...

research-article
Explainable recommendation based on fusion representation of multi-type feature embedding
Abstract

In e-commerce recommender systems, the sparsity of user-item rating data limits the quality of semantic embedding representation of users and items, which affects the accuracy of rating prediction. Previous studies have focused on learning ...

research-article
FASE: fast deployment for dependent applications in serverless environments
Abstract

Function-as-a-service has reduced the user burden by allowing cloud service providers to overtake operational activities such as resource allocation, service deployment, auto-scaling, and load-balancing, to name a few. The users are only ...

research-article
Efficient computation of maximum weighted independent sets on weighted dynamic graph
Abstract

An independent set is a set of vertices in a graph in which no two vertices are adjacent to each other. The maximum weighted independent set is the independent set with the largest sum of weights in a weighted graph. Considering that existing ...

research-article
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection
Abstract

The devices deployed across diverse industrial scenarios have generated significant network traffic related to time. The system’s irregular operation could result in substantial bad influence. Anomaly detection technologies utilized for ...

research-article
Advancing medical data classification through federated learning and blockchain incentive mechanism: implications for modern software systems and applications
Abstract

The key issue of medical data is patient information sensitivity and dataset finiteness, which need to guarantee high-efficient training. Besides, the current convolutional neural network has a low image classification and poor robustness ...

research-article
Collaborative framework for UAVs-assisted mobile edge computing: a proximity policy optimization approach
Abstract

Recently, unmanned aerial vehicles (UAVs) have been widely used in mobile edge computing (MEC) scenarios due to their flexibility, rapid deployment, and ability to expand communication coverage. This paper explores how UAVs can compute offloading ...

research-article
Exploring privacy measurement in federated learning
Abstract

Federated learning (FL) is a collaborative artificial intelligence (AI) approach that enables distributed training of AI models without data sharing, thereby promoting privacy by design. However, it is essential to acknowledge that FL only offers ...

research-article
A modular approach to build a hardware testbed for cloud resource management research
Abstract

Research on resource management focuses on optimizing system performance and energy efficiency by distributing shared resources like processor cores, caches, and main memory among competing applications. This research spans a wide range of ...

research-article
A pricing strategy for federated learning in UAV-enabled MEC
Abstract

Distributed model training is made possible by federated learning on various computing nodes, and compute nodes can submit model updates individually while preserving data privacy and avoiding the need to share raw user data. Unmanned Aerial ...

research-article
Toward efficient structured-grid triangular solver on sunway many-core processors
Abstract

The sparse triangular solver (SpTRSV) is mostly used for scientific and engineering applications. The structured-grid triangular solver of regular dependencies (STRSV) is a special kind of SpTRSV. Some general SpTRSVs that disregards the ...

research-article
Lowest revenue limit-based truthful auction mechanism for cloud resource allocation
Abstract

An auction mechanism is an effective way to allocate resources through market behavior. However, in existing studies, most auction mechanisms are designed based on the maximization of social welfare, and there are few studies on potential revenue. ...

research-article
C-VoNNI: a precise fingerprint construction for indoor positioning systems using natural neighbor methods with clustering-based Voronoi diagrams
Abstract

Indoor positioning is crucial for everyday life, and received signal strength-based fingerprint localization is the most effective method. However, updating the fingerprint database is laborious, as changes in indoor layout would render the ...

research-article
STIGCN: spatial–temporal interaction-aware graph convolution network for pedestrian trajectory prediction
Abstract

Accurately predicting the future trajectory of pedestrians is critical for tasks such as autonomous driving and robot navigation. Previous methods for pedestrian trajectory prediction dealt with social interaction and pedestrian movement factors ...

research-article
Local and soft feature selection for value function approximation in batch reinforcement learning for robot navigation
Abstract

This paper proposes a novel method for robot navigation in high-dimensional environments that reduce the dimension of the state space using local and soft feature selection. The algorithm selects relevant features based on local correlations ...

research-article
Prism refraction search: a novel physics-based metaheuristic algorithm
Abstract

Single-solution-based optimization algorithms are computationally cheap yet powerful methods that can be used on various optimization tasks at minimal processing expenses. However, there is a considerable shortage of research in this domain, ...

research-article
Parallel design of SFO optimization algorithm based on FPGA
Abstract

Taking a lot of time to solve optimization problems has become a challenge for metaheuristic algorithms. Due to independence of the metaheuristics components, parallel processing is a good option to reduce the computational time and to find high ...

research-article
Performance improvement of distributed cache using middleware session
Abstract

This paper proposes a novel approach to routing architecture based on the Session–Cookie protocol. The proposed architecture performs service discovery by integrating IoTs geographic clustering technique and polymorphism mechanism. Prioritizing ...

research-article
IAFCO: an intelligent agent-based framework for combinatorial optimization
Abstract

Solving combinatorial optimization problems (COPs) poses a significant challenge in various application domains. The NP-hardness of many COPs necessitates the integration of meta-heuristics to effectively tackle these problems by leveraging the ...

research-article
Limited environmental information path planning based on 3D point cloud reconstruction
Abstract

We present a new limited environmental information path planning procedure (IEIPPP) that finds collision-free paths without prior knowledge of feasible paths or obstacle locations by analyzing an image set of the area of interest. IEIPPP uses ...

research-article
A novel time series forecasting model for capacity degradation path prediction of lithium-ion battery pack
Abstract

Monitoring battery health is critical for electric vehicle maintenance and safety. However, existing research has limited focus on predicting capacity degradation paths for entire battery packs, representing a gap between literature and ...

research-article
Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation
Abstract

Nowadays, establishing security in data transmission is essential, and it is achieved by cryptography. Encryption of still or video images in specific applications such as Internet of Things, medical and satellite imaging, in applications ...

research-article
HCDQN-ORA: a novel hybrid clustering and deep Q-network technique for dynamic user location-based optimal resource allocation in a fog environment
Abstract

With the proliferation of the Internet of Things and smart devices, there exists an urge to address the critical computation demands of end users for several real-time applications. Fog computing (FC) targets to address the computation ...

research-article
A fast and energy-efficient hybrid 4–2 compressor for multiplication in nanotechnology
Abstract

In this paper, a novel high-speed and energy-efficient 4–2 compressor cell is proposed using carbon nanotube field-effect transistors. The proposed compressor is realized efficiently based on NAND–NOR gates and multiplexers. To estimate the ...

Comments