-
6261
EcoTaskSched: a hybrid machine learning approach for energy-efficient task scheduling in IoT-based fog-cloud environments
Published 2025-04-01“…Integrating cloud and fog resources can help address these challenges by improving fog-cloud computing environments. Nevertheless, the search for optimal task allocation and energy management in such environments continues. …”
Get full text
Article -
6262
DualPFL: A Dual Sparse Pruning Method with Efficient Federated Learning for Edge-Based Object Detection
Published 2024-11-01“…However, existing pruning algorithms exhibit high sensitivity to network architectures and typically require multiple sessions of retraining to identify optimal structures. …”
Get full text
Article -
6263
Multi-factor evaluation of clustering methods for e-commerce application
Published 2024-12-01Get full text
Article -
6264
Fast Processing of Massive Hyperspectral Image Anomaly Detection Based on Cloud-Edge Collaboration
Published 2025-01-01“…Furthermore, we propose a cloud-edge model solving algorithm. This algorithm reformulates the JSCR model into a new optimization problem involving a small amount of factorized data. …”
Get full text
Article -
6265
Enhancing piezoelectric control of cracks in thin solid aluminum plates using finite element data and a neural networks approach
Published 2025-03-01“…In addition, artificial neural networks, specifically feedforward neural networks, are employed for optimal SIF prediction, showcasing the ability to integrate soft computing with mechanical engineering challenges. …”
Get full text
Article -
6266
Hybrid multi-objective node deployment for energy-coverage problem in mobile underwater wireless sensor networks
Published 2022-09-01“…This study evaluated the solution to substantiate its efficacy, particularly regarding the nodes’ coverage rate, energy consumption and the system’s Pareto optimal metrics and execution time. The results and comparative analysis indicate that the Multi-Objective Optimisation Genetic Algorithm based on Adaptive Multi-Parent Crossover and Fuzzy Dominance (MOGA-AMPazy) is a better solution to the multi-objective sensor node deployment problem, outperforming the non-dominated sorting genetic algorithm II, SPEA2 and MOEA/D algorithms. …”
Get full text
Article -
6267
Utilizing UAVs in Wireless Networks: Advantages, Challenges, Objectives, and Solution Methods
Published 2024-10-01Get full text
Article -
6268
-
6269
Integrating Sentiment Analysis With Machine Learning for Cyberbullying Detection on Social Media
Published 2025-01-01“…State-of-the-art solutions predominantly rely on pre-trained language models and machine learning algorithms; however, these methods are often associated with substantial computational overheads and the development of advanced cyberbullying detection algorithms remains limited. …”
Get full text
Article -
6270
Stochastic logic in biased coupled photonic probabilistic bits
Published 2025-01-01“…Abstract Optical computing often employs tailor-made hardware to implement specific algorithms, trading generality for improved performance in key aspects like speed and power efficiency. …”
Get full text
Article -
6271
Lightcone bounds for quantum circuit mapping via uncomplexity
Published 2024-11-01“…We also develop an initial placement algorithm based on graph similarity search, aiding us in optimally placing circuit qubits onto a device. 600 realistic benchmarks using the IBM Qiskit compiler and a brute-force method are then tested against the lightcone bound, with results unambiguously verifying the veracity of the bound, while permitting trustworthy estimations of minimal overhead in near-term realizations of quantum algorithms. …”
Get full text
Article -
6272
-
6273
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
Published 2025-01-01“…Lightweight cryptographic algorithms have emerged to address these challenges, with ASCON gaining recognition for its robustness and efficiency. …”
Get full text
Article -
6274
-
6275
An efficient video slice encryption scheme and its application
Published 2025-06-01“…To address this issue, we propose a novel video security encryption scheme that optimally balances encryption speed and security. We introduce a scheme for video fragmentation, design corresponding sorting and merging algorithms, and construct a video transmission framework compatible with this scheme. …”
Get full text
Article -
6276
-
6277
Improved RRT*-Connect Manipulator Path Planning in a Multi-Obstacle Narrow Environment
Published 2025-04-01Get full text
Article -
6278
Heterogeneous bioinformatic data encryption on portable devices
Published 2025-04-01“…For mobile devices, encryption is even more important yet more challenging, as these devices are usually used in environments that may not be well protected and have rather limited computing resources. With heterogeneous multi-core processors becoming popular on mobile devices to satisfy different needs of applications, designing heterogeneous algorithms to harness all the available resources are tricky but have the potential to deliver high performance. …”
Get full text
Article -
6279
Machine Learning-Based Prediction of Unconfined Compressive Strength of Sands Treated by Microbially-Induced Calcite Precipitation (MICP): A Gradient Boosting Approach and Correlat...
Published 2023-01-01“…A 10-fold cross-validation method and hyperparameter tuning are performed to find the optimal architecture of the gradient boosting algorithm. …”
Get full text
Article -
6280
Integrating holographic counterparts for intelligent IoT consumer devices
Published 2025-07-01“…Advancements in quantum algorithms for predictive learning, self-optimization through more integrated machine learning models, and the development of standardised interoperability protocols to facilitate wider industrial usage are all areas that will be investigated in future research.…”
Get full text
Article