Showing 43,561 - 43,580 results of 68,043 for search '"technology"', query time: 0.30s Refine Results
  1. 43561

    Scheduling framework based on reinforcement learning in online-offline colocated cloud environment by Ling MA, Qiliang FAN, Ting XU, Guanchen GUO, Shenglin ZHANG, Yongqian SUN, Yuzhi ZHANG

    Published 2023-06-01
    “…Some reinforcement learning-based scheduling algorithms for cloud computing platforms barely considered one scenario or ignored the resource constraints of jobs and treated all machines as the same type, which caused low resource utilization or insufficient scheduling efficiency.To address the scheduling problems in online-offline colocated cloud environment, a framework named JobFusion was proposed.Firstly, an efficient resource partitioning scheme was built in the cloud computing platform supporting virtualization technology by integrating the hierarchical clustering method with connectivity constraints.Secondly, a graph convolutional neural network was utilized to embed the attributes of elastic dimension with various constraints and the jobs with various numbers, to capture the critical path information of workflow.Finally, existing high-performance reinforcement learning methods were integrated for scheduling jobs.According to the results of evaluation experiments, JobFusion improves the resource utilization by 39.86% and reduces the average job completion time by up to 64.36% compared with baselines.…”
    Get full text
    Article
  2. 43562

    Design of blockchain based zero-knowledge proof of location system by Wei WU, Erwu LIU, Changxin YANG, Rui WANG

    Published 2020-04-01
    “…With the development of precise positioning technology,a growing number of location-based services (LBS) emerge.For example,visit a specific place to get the corresponding reward.This also leads to location fraud by illegal users in order to gain benefits.Thus,it is necessary to verify location certificates provided by users.However,present proof of location systems are deficient in verifying users’ location certificates while protecting users’ privacy.Users do not flexibly control their location certificates either.Based on blockchain,a kind of distributed proof of location system architecture was proposed and based on the proposed system architecture,a kind of proof of location protocol with zero-knowledge proof was proposed further.With the proposed architecture and the protocol,the proposed proof of location system allows users to freely select disclosed certificate parameters and positional accuracy according to their needs so that hierarchical location privacy protection was achieved.…”
    Get full text
    Article
  3. 43563
  4. 43564
  5. 43565
  6. 43566

    Construction method of double unicast network coding by Baoxing PU, Zhiyi MO

    Published 2020-09-01
    “…In order to use network coding technology for data transmission in double unicast network,a construction method of double unicast network coding was proposed.The pre-coding strategy was implemented at each source node,the random linear network coding combined to the multi-objective optimization evolutionary algorithm was adopted to design the local coding vector of each channel.At the each sink node,the base vector of zero space of matrix was used to eliminate some information interference,and then the two-level pre-coding strategy was used to control the transmission rate at source.Thus,each sink node could be decoded successfully.With the proposed method,the approximate reachable information rate region of double unicast network coding could be determined and the transmission scheme for each vector in the reachable information rate region could be designed.Theoretical derivation and simulation calculation show the effectiveness of the proposed method.…”
    Get full text
    Article
  7. 43567
  8. 43568
  9. 43569
  10. 43570
  11. 43571

    Bionics in Engineering Education Considerations, Experiences and Conclusions by Ralf Neurohr, Cristian Dragomirescu

    Published 2008-01-01
    “…In order to avoid any confusion, considering overlapping or mixing up with other bio-disciplines related to technology, the paper starts with a short introduction, explaining the principles of bionics and providing a clear definition of the field.…”
    Get full text
    Article
  12. 43572

    Neural Network Compensation Control for Output Power Optimization of Wind Energy Conversion System Based on Data-Driven Control by T. Li, A. J. Feng, L. Zhao

    Published 2012-01-01
    “…To solve this problem, data-driven control technology is selected and data-driven controller for the WECS is designed based on the Markov model. …”
    Get full text
    Article
  13. 43573

    EDUCATIONAL PLANNING AND PEDAGOGICAL DIGITALISATION IN NIGERIA'S EDUCATIONAL SYSTEM by EMMANUEL SEMAKO GBESOEVI, RASAKI OLANREWAJU LAWAL, MONSURAT LOLADE OYELAMI, PIUS JIDE GBENU

    Published 2024-07-01
    “…Additionally, the paper delves into the significance of pedagogical digitalization, examining the integration of technology in the Nigerian educational landscape and the associated opportunities and challenges. …”
    Get full text
    Article
  14. 43574

    SELF-ASSEMBLY OF NANOSCALE POLYMER DOMAINS IN MICROSTRUCTURE TEMPLATE MADE BY AFM MICROMACHINING TECHNIQUE by ZOU XinYu, HUANG YiJun, CONG YanRu, HE YongLing, PAN YuChen, MIAO ZhiBin

    Published 2019-01-01
    “…Furthermore,pairing bottom-up and top-down methods is a bright,and perhaps basic,bridge between the parallel self-assembly of molecules and the morphological constraint of prevailing technology.…”
    Get full text
    Article
  15. 43575

    Research on multi-AP joint transmission scheme based on improved genetic algorithm by Man LIU, Xuming FANG

    Published 2023-09-01
    “…In order to solve the problem that overlapping basic service set (OBSS) users are subject to serious co-frequency interference in the dense Wi-Fi network, resulting in low signal to interference plus noise ratio (SINR) of received signals, low data transmission rate or inability to transmit, a multi-access point (AP) joint transmission (JT) scheme based on improved genetic algorithm (IGA) selection of AP coordination set was proposed.Firstly, the SINR threshold method was used to divide all station (STA) in the system into central users and edge users, and the JT scheme was adopted for edge users.Then, with the goal of maximizing the throughput of edge users, IGA was proposed to determine the appropriate coordinated AP for each edge user to form its own AP coordination set, and maximize the potential gain of JT technology.The simulation results show that the proposed scheme can effectively reduce the co-frequency interference between BSS and improve the performance and throughput of BSS edge users in dense network.…”
    Get full text
    Article
  16. 43576

    Pedagogical means of formation of healthy lifestyle of students by Irina G. Kretova, Olga V. Belyaeva

    Published 2018-12-01
    “…For the formation of skills of a healthy lifestyle, attracting attention to health and health care technology, protection principles in emergencies and first aid the staff of the Department uses conventional and interactive methods of teaching: the training and role-playing, debates, round tables, brainstorming, viewing, followed by a discussion themed art and documentary films, the decision of situational tasks. …”
    Get full text
    Article
  17. 43577
  18. 43578
  19. 43579
  20. 43580