-
Article
Weakly-supervised temporal action localization using multi-branch attention weighting
Weakly-supervised temporal action localization aims to train an accurate and robust localization model using only video-level labels. Due to the lack of frame-level temporal annotations, existing weakly-superv...
-
Article
Beam prediction and tracking mechanism with enhanced LSTM for mmWave aerial base station
By combining millimeter wave (mmWave) with abundant spectral resources and advanced directional beamforming technology, mmWave aerial base stations (mAeBSs) can provide high-speed services to users on the grou...
-
Chapter and Conference Paper
Design of Sustainable Fashion APP Based on Perceived Value Theory - Taking “Eco Echo” as an Example
While the fashion industry is currently paying increasing attention to environmental pollution, the attention of “Generation Z” consumers to sustainable fashion has not yet reached a high level. Although they ...
-
Chapter and Conference Paper
R-CAE-Informer Based Short-Term Load Forecasting by Enhancing Feature in Smart Grids
As renewable energy usage increases, power systems become more intricate and demand fluctuations intensify. Accurate short-term load forecasting (STLF) is vital for balancing energy supply and demand. Traditio...
-
Chapter and Conference Paper
Regularized DNN Based Adaptive Compensation Algorithm for Gateway Power Meter in Ultra-High Voltage Substations
The development of the power Internet of Things (IoT) has made the data of ultra-high voltage substation metering critical information sources for supporting power energy scheduling and market transactions. Ho...
-
Chapter and Conference Paper
Analytic Hierarchy Process Based Cell Reselection for Inactive Users in LEO Satellite Networks
Low Earth Orbit (LEO) satellites have a global coverage and continuity, which enable them to provide communication services for users in remote areas such as mountains and oceans. This feature makes LEO satell...
-
Chapter and Conference Paper
An Efficient CNN + Sparse Transformer-Based Intrusion Detection Method for IoT
The burgeoning proliferation of Internet of Things (IoT) devices escalates concerns over network security. Intrusion detection, crucial for IoT security, frequently employs deep learning techniques for feature...
-
Chapter and Conference Paper
Collaborative Defense Method Against DDoS Attacks on SDN-Architected Cloud Servers
Addresses excessive control layer load in traditional DDoS detection/defense in cloud SDN. It proposes an efficient collaborative defense using P4 to offload traffic processing to the data layer, reducing cont...
-
Chapter and Conference Paper
Blockchain-Based Federated Learning with Malicious Attacks in Fog Computing Networks
In fog computing networks, the discrete deployment of a large number of fog nodes (FNs) and the frequent information exchange pose significant risks to user privacy and network security. Federated Learning (FL...
-
Article
Open AccessHypergraph convolution mix DDPG for multi-aerial base station deployment
Aerial base stations (AeBS), as crucial components of air-ground integrated networks, can serve as the edge nodes to provide flexible services to ground users. Optimizing the deployment of multiple AeBSs to ma...
-
Article
Open AccessPPO-based deployment and phase control for movable intelligent reflecting surface
Intelligent reflecting surface (IRS) stands as a promising technology to revolutionize wireless communication by manipulating incident signal amplitudes and phases to enhance system performance. While existing...
-
Article
Lightweight multi-departmental data sharing scheme based on consortium blockchain
Epidemiologically investigating, such as COVID-19, means navigating through tight schedules, urgent tasking, and heavy workloads, hence the need for multi-department cooperation. However, a large amount of sur...
-
Chapter and Conference Paper
Research on the Design of Serious Games for the Elderly Cognitive Training Based on Augmented Reality
In recent years, the aging of the world's population has been increasing year by year. As people age, the human brain is prone to aging and damage, and basic abilities such as thinking, language, and execution...
-
Chapter and Conference Paper
VPlaytime: Face-to-Face Recess in Virtual Reality Classrooms
Class break space is a potentially promising informal learning environment for both integrating formal and informal learning using Virtual Reality and supporting student self-regulated learning in art and desi...
-
Article
Research and Implementation of Parallel Artificial Fish Swarm Algorithm Based on Ternary Optical Computer
Artificial fish swarm algorithm (AFS) is used in the field of function optimization problems widely. The traditional AFS algorithm has some problems such as long time to find the optimal solution and easy to f...
-
Chapter and Conference Paper
Harmonic Energy Metering Method for High Proportion of Renewable Energy Access
Realizing low carbon operation of power grid and high proportion of clean energy consumption is one of the important ways for power grid companies to implement the energy security strategy of “Four Revolutions...
-
Chapter and Conference Paper
Containerized Scheduling Method Based on Kubernetes and YARN in Big Data Scenarios
The data in the power Internet of Things has the characteristics of multiple types, large amounts of data, and obvious heterogeneity. In order to solve the storage and scheduling problem of massive heterogeneo...
-
Chapter and Conference Paper
Resource Allocation Algorithm Based on Heterogeneous Resource Evaluation for Edge Computing
With the progress of information technology and the upgrading of hardware equipment, people are considering the use of better edge computing services. These services often have different dimensions of computin...
-
Chapter and Conference Paper
Federated Learning Meets Edge Computing: A Hierarchical Aggregation Mechanism for Mobile Devices
Federated learning (FL) has been proposed and applied in edge computing scenarios. However, the complex edge environment of wireless networks, such as limited device computing resources and unstable signals, l...
-
Chapter and Conference Paper
CDPR: A Dynamic Computing Unit Deployment Algorithm for MEC Based on Popularity and Reliability
With the development of the Internet of Things, the rapid growth of data traffic from the edge brings challenges to the traditional cloud computing, it seems that cloud computing is unable to meet the latency ...