Suggested Topics within your search.
Suggested Topics within your search.
-
19041
Joint optimization of edge computing and caching in NDN
Published 2022-08-01“…Named data networking (NDN) is architecturally easier to integrate with edge computing as its routing is based on content names and its nodes have caching capabilities.Firstly, an integrated framework was proposed for implementing dynamic coordination of networking, computing and caching in NDN.Then, considering the variability of content popularity in different regions, a matrix factorization-based algorithm was proposed to predict local content popularity, and deep reinforcement learning was used to solve the the problem of joint optimization for computing and caching resource allocation and cache placement policy with the goal of maximizing system operating profit.Finally, the simulation environment was built in ndnSIM.The simulation results show that the proposed scheme has significant advantages in improving cache hit rate, reducing the average delay and the load on the remote servers.…”
Get full text
Article -
19042
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01“…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
Get full text
Article -
19043
Complexity control method of random forest based HEVC
Published 2019-02-01“…High efficiency video coding (HEVC) has high computational complexity,and fast algorithm cannot perform video coding under restricted coding time.Therefore,a complexity control method of HEVC based on random forest was proposed.Firstly,three random forest classifiers with different prediction accuracy were trained to provide various coding configurations for coding tree unit (CTU).Then,an average depth-complexity model was built to allocate CTU complexity.Finally,the CTU coding configuration,determined by the smoothness,average depth,bit,and CTU-level accumulated coding error,was used to complete complexity control.The experimental results show that the proposed method has better complexity control precision,and outperforms the state-of-the-art method in terms of video quality.…”
Get full text
Article -
19044
基于改进Kriging模型的主动学习可靠性分析方法
Published 2021-01-01“…,the differential evolution algorithm is introduced to explore the optimal parameter of Kriging model and improve the accuracy of Kriging prediction information.As a result,the training point in each iteration is guaranteed to be the global optimal one and the efficiency of ALK model is largely improved.…”
Get full text
Article -
19045
Image colorization based on transformer
Published 2025-07-01“…To ensure the generated image mimics a real-life image in terms of pixel accuracy and visual quality, the algorithm employs a variety of loss functions. Experimental results demonstrate significant performance improvements in black and white image colorization. …”
Get full text
Article -
19046
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01“…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
Get full text
Article -
19047
Enhanced dry SO₂ capture estimation using Python-driven computational frameworks with hyperparameter tuning and data augmentation
Published 2025-04-01“…SHapley Additive exPlanations was essential for comprehending the prediction mechanism through feature significance and the impact of varying feature thresholds on the predicted output. …”
Get full text
Article -
19048
A low-cost autonomous portable poultry egg freshness machine using majority voting-based ensemble machine learning classifiers
Published 2025-03-01“…The proposed machine learning model is an ensemble machine learning algorithm, which integrates predictions obtained from several individual classifiers like Random Forest, Decision Trees, Support Vector Machine, Naïve Bayes, k-Nearest Neighbors and Logical Regression to make a final prediction. …”
Get full text
Article -
19049
Comparing the Potential of Near- and Mid-Infrared Spectroscopy in Determining the Freshness of Strawberry Powder from Freshly Available and Stored Strawberry
Published 2019-01-01“…The best model was determined as the SPA-LS-SVM model based on MIR spectra, which had the residual prediction deviation (RPD) value of 11.198 and the absolute difference between root-mean-square error of calibration and prediction (AB_RMSE) value of 0.505. …”
Get full text
Article -
19050
Sex determination of Amur tigers (Panthera tigris altaica) from footprints in snow
Published 2014-09-01“…The algorithm predicted 5 trails from females and 3 from males. …”
Get full text
Article -
19051
Surrogate-Assisted Multi-Objective Optimization for Simultaneous Three-Dimensional Packing and Motion Planning Problems Using the Sequence-Triple Representation
Published 2024-12-01“…Training data is generated by solving the motion planning problem for a set of packing solutions using the rapidly exploring random tree algorithm. The Non-Dominated Sorting Genetic Algorithm II searches for the Pareto solutions. …”
Get full text
Article -
19052
Nanodesigner: resolving the complex-CDR interdependency with iterative refinement
Published 2025-08-01“…NanoDesigner integrates key stages—structure prediction, docking, CDR generation, and side-chain packing—into an iterative framework based on an expectation maximization (EM) algorithm. …”
Get full text
Article -
19053
Inversely Designed 1 × 4 Power Splitter With Arbitrary Ratios at 2-μm Spectral Band
Published 2018-01-01“…The total transmission efficiencies of all the algorithm-optimized splitters are above 80%, which is predicted by simulations. …”
Get full text
Article -
19054
Deep Learning-Based Signal Constellation for OFDM Underwater Acoustic Communications
Published 2025-05-01“…The hegemony was depicted in the performance of the bit error rate (BER) of the proposed DL-based signal constellation prediction algorithm, which achieved 100% accuracy and a gain of 10dB and 12dB over minimum mean square error (MMSE) and least square (LS) channel estimation performance, respectively, when CP=0 at N_p=N/4. …”
Get full text
Article -
19055
Grey Wolf Optimization Based Demand Side Management in Solar PV Integrated Smart Grid Environment
Published 2023-01-01“…In this paper, a robust optimization algorithm inspired by the lifestyle of grey wolves, popularly known as grey wolf optimization (GWO) algorithm is utilized to solve the proposed DSM minimization problem. …”
Get full text
Article -
19056
Cooperative and Hierarchical Optimization Design of Shipboard MVDC System for Adapting to Large, Pulsed Power Load
Published 2025-02-01“…The SVSDP scheme achieves reductions of 19.5%, 7.6%, and 49.6%, 39.7% compared to VRCD and PSO-FS. …”
Get full text
Article -
19057
Neutrino interaction vertex reconstruction in DUNE with Pandora deep learning
Published 2025-06-01Get full text
Article -
19058
AUTHENTIFICATION USER TOOLS IN CORPORATIVE INFORMATION SYSTEMS AND CLOUD COMPUTING AREAS
Published 2019-06-01Get full text
Article -
19059
Examining peptide–gold nanoparticle interactions through explainable machine learning
Published 2025-05-01“…This work develops an explainable binary machine learning classifier using rough sets as the algorithm and amino acid composition as the features. …”
Get full text
Article -
19060
A Multi-Strategy Visual SLAM System for Motion Blur Handling in Indoor Dynamic Environments
Published 2025-03-01“…Additionally, to refine keypoint filtering, a probability-based algorithm for dynamic feature detection and elimination is incorporated into our SLAM system. …”
Get full text
Article