Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
DFCL: Domain-adaptive federated clustering learning
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 432–436https://doi.org/10.1145/3640912.3640996Federated learning is a distributed machine learning approach that enables multiple devices or data sources to train models without sharing their raw data. However, heterogeneity within federated learning, including varying feature distributions, data ...
- research-articleFebruary 2024
Dynamic Energy-Based Electric Logistics Vehicle Driving Route and V2V Charging Optimization Algorithm
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 425–431https://doi.org/10.1145/3640912.3640995By employing vehicle-to-vehicle (V2V) charging, the electric logistics vehicles that are in transit can act as mobile power sources to provide electricity to small electric vehicles with urgent charging needs, this approach not only addresses the issue ...
- research-articleFebruary 2024
Sub-regional multi-AGV dynamic path planning method based on improved A* algorithm
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 420–424https://doi.org/10.1145/3640912.3640994In the field of warehousing and logistics, the path planning of Automated Guided Vehicle (AGV) is a key issue in industrial production. Aiming at the problem that the traditional A* algorithm has a large number of traversal nodes in AGV path planning, ...
- research-articleFebruary 2024
LAL-JER: Label-Aware Learning for Adaptive Joint Entity and Relation Extraction with LLM data augmentation
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 414–419https://doi.org/10.1145/3640912.3640993Joint entity and relation extraction has achieved great improvements in Natural Language Processing (NLP) and has been widely applied, such as constructing knowledge graph, query understanding and question answering. Existing methods usually spend long ...
- research-articleFebruary 2024
MADDPG: A task offloading algorithm based on multi-agent deep reinforcement learning in vehicle-edge computing
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 408–413https://doi.org/10.1145/3640912.3640992Vehicle-edge computing has emerged as a new paradigm based on vehicular networking to provide computing resources for mobile vehicles. However, traditional binary offloading methods result in wastage of vehicle and server resources, as well as the ...
-
- research-articleFebruary 2024
Fairness-Aware Computation Efficiency Maximization for Multi-UAV-Enabled MEC System
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 403–407https://doi.org/10.1145/3640912.3640991Unmanned Aerial Vehicles (UAVs) equipped with Multi-Access Edge Computing (MEC) servers can assist Terminal Devices (TDs) in offloading data tasks. In this paper, we investigate a resource allocation and trajectory optimization problem of multiple UAVs ...
- research-articleFebruary 2024
Bearing Fault Diagnosis Based on Parallel Convolutional Neural Network with Attention Mechanism and Bidirectional Gated Recurrent Unit
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 398–402https://doi.org/10.1145/3640912.3640990Aiming to address the challenges presented by limited samples of bearing faults and complex working conditions, this study attempts to overcome the problem of shallow deep learning models ignoring the temporal characteristics of bearing vibration signals ...
- research-articleFebruary 2024
Research on Fast Time-Frequency Synchronization Algorithm for NR System
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 382–391https://doi.org/10.1145/3640912.3640988Primary Synchronization Signal detection is the first step for UE to access the 5/6G NR system, which can achieve downlink time-frequency synchronization. Considering the shortcomings of existing Primary Synchronization Signal detection algorithms in ...
- research-articleFebruary 2024
A Variable Step LMS Algorithm Based on Particle Swarm Optimization
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 377–381https://doi.org/10.1145/3640912.3640987In response to the shortcomings of manually adjusting parameters in the variable step size LMS algorithm and the contradiction between convergence speed and steady-state error performance, a variable step size LMS algorithm based on improved Particle ...
- research-articleFebruary 2024
A dueling DQN-based online resource allocation algorithm for cloud computing
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 371–376https://doi.org/10.1145/3640912.3640986In recent years, with the continuous expansion of the scale of cloud data centers, resource allocation requirements have gradually increased to better meet the requirements of low latency and high revenue. However, due to the dynamic state of the system ...
- research-articleFebruary 2024
Neural network reliability analysis based on fault injection
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 366–370https://doi.org/10.1145/3640912.3640985Neural networks have been widely applied in various fields, including drones and autonomous vehicles. The performance of neural networks determines their effectiveness, but reliability is equally important. Building on previous research on factors ...
- research-articleFebruary 2024
Recurrent Attentive Neural Networks for Sequential Recommendation
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 356–360https://doi.org/10.1145/3640912.3640983Sequential recommendation is essential in modern online service platforms. By modeling the evolving preferences of a user from the historical behavior sequence, sequential recommendation aims to predict the next interaction of the user in the near ...
- research-articleFebruary 2024
Deep Deterministic Policy Gradient based Dynamic Virtual Network Embedding Algorithm
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 351–355https://doi.org/10.1145/3640912.3640982Due to the limitation of network ossification, network virtualization is a promising architecture to solve the issue. Virtual network embedding is one of the challenges of network virtualization. However, existing algorithms cannot solve the online ...
- research-articleFebruary 2024
Reversible Data Hiding Algorithm based on Paillier Encryption
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 346–350https://doi.org/10.1145/3640912.3640981The encryption domain Reversible data hiding algorithm differs from the plaintext domain in that after encrypting the image information, the redundant space decreases, leading to difficulties in embedding and low embedding capacity in the encryption ...
- research-articleFebruary 2024
Problem-guided Neural Math Problem Solvers
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 341–345https://doi.org/10.1145/3640912.3640980The Math Word Problem (MWP) refers to mathematical problems described in natural language. Recent research has mostly employed sequence-to-sequence (Seq2Seq) or sequence-to-tree (Seq2Tree) approaches to generate computational trees or expressions that ...
- research-articleFebruary 2024
Mirror Detection in Frequency Domain
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 327–331https://doi.org/10.1145/3640912.3640977Mirrors often appear in various places, and personal privacy information will be reflected and leaked out without the user's awareness, affecting the security of personal information. Mirror detection is a very challenging task due to the non-uniform ...
- research-articleFebruary 2024
Research on YOLOv7-tiny Improved Algorithm for Compli-ance Detection of Production Personnel Wearing
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 320–326https://doi.org/10.1145/3640912.3640976Proposed is an improved production personnel wearing target detection algorithm based on YOLOv7, aiming to address the issues of false positives and false negatives caused by occlusion and detection of small to medium-sized objects in complex ...
- research-articleFebruary 2024
Edge-cloud Collaboration Based Service Deployment and Resource Allocation in Digital Twin 6G network
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 308–311https://doi.org/10.1145/3640912.3640974In this paper, we propose an Edge-Cloud based and Artificial Intelligence (AI) supported Scheme (ECAIS) in Digital Twin-enabled 6G network. Specifically, we first analyze the traffic consumption of the backbone network based on the construction workflow ...
- research-articleFebruary 2024
NFA Regular Expression Matching based Electriuec Power Sensitive Data Recognition Algorithm Design and Simulation
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 303–307https://doi.org/10.1145/3640912.3640973In the era of big data, electric power sensitive data recognition and network intrusion detection are concerned. Accurate pattern matching based sensitive data recognition software has low matching efficiency, poor flexibility and high resource ...
- research-articleFebruary 2024
Measurement Model of Big Data Leakage Risk Tolerance Based on Extended Bayesian Classification Algorithm
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 298–302https://doi.org/10.1145/3640912.3640972When measuring big data leakage risk tolerance, the lack of comprehensive analysis of big data leakage risk factors leads to large measurement error. Therefore, a measurement model of big data leakage risk tolerance based on extended Bayesian ...