Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 28 Sep 2024Bibliometrics
research-article
Compensation Method of Electronic Commerce Data Transmission Delay Based on Fuzzy Encryption Algorithm
Abstract

In this study, a delay compensation algorithm based on fuzzy encryption algorithm is proposed. Discussion on Fuzzy encryption algorithm and composition of data encryption system, the data encryption transmission model of electronic commerce ...

research-article
Multiple Digital Image Encryption Algorithm Based on Chaos Algorithm
Abstract

In this study, a multiple digital image encryption algorithm based on chaos algorithm is presented. The cyclic matrix is constructed by logical mapping, and sparse transformation of plaintext image is realized by discrete cosine transform (DCT). ...

research-article
Multi Source Data Association Clustering Analysis Based on Symmetric Encryption Algorithm
Abstract

Due to the low clustering accuracy of the existing methods, a multi-source data association clustering method based on symmetric encryption algorithm is proposed. The multi-source data acquisition model is established, and the baud interval ...

research-article
The Calculation Method of the Network Security Probability of the Multi-rail Division Based on Fuzzy Inference
Abstract

The traditional method uses terminal network monitoring method to estimate the security probability of multi-track segmentation network, but the detection performance is unsatisfactory. A security probability estimation and intrusion detection ...

research-article
Design of Oral English Intelligent Evaluation System Based on DTW Algorithm
Abstract

The accuracy of the existing spoken English intelligent evaluation system is not high, and the spoken English evaluation effect is poor. To improve the accuracy and speed of spoken English evaluation, this paper puts forward the design and ...

research-article
Encryption Transmission Verification Method of IT Operation and Maintenance Data Based on Fuzzy Clustering Analysis
Abstract

In this study, an IT operation and maintenance data encryption transmission verification algorithm based on fuzzy clustering analysis is presented. The key information of IT operation and maintenance data encryption is constructed, the key ...

research-article
Research and Implementation of Parallel Artificial Fish Swarm Algorithm Based on Ternary Optical Computer
Abstract

Artificial fish swarm algorithm (AFS) is used in the field of function optimization problems widely. The traditional AFS algorithm has some problems such as long time to find the optimal solution and easy to fall into local optimality at the later ...

research-article
Consensus Algorithms on Appendable-Block Blockchains: Impact and Security Analysis
Abstract

The Internet of Things (IoT) has been making people’s lives more efficient and more comfortable in the past years, and it is expected to get even better. This improvement may benefit from the use of blockchain to enhance security, scalability, ...

research-article
A Deep Learning Approach to Detection and Mitigation of Distributed Denial of Service Attacks in High Availability Intelligent Transport Systems
Abstract

In the era of Internet of Things (IoT) powered by 5G technologies, Automobile Industry is headed towards a revolution. In Intelligent Transport Systems (ITS), vehicles act as connected entities, and exchange data with each other and with the back-...

research-article
An Optimized Collaborative Scheduling Algorithm for Prioritized Tasks with Shared Resources in Mobile-Edge and Cloud Computing Systems
Abstract

Mobile edge computing (MEC) is a promising technology that has the potential to meet the latency requirements of next-generation mobile networks. Since MEC servers have limited resources, an orchestrator utilizes a scheduling algorithm to decide ...

research-article
Deep Reinforcement Learning for Load Balancing of Edge Servers in IoV
Abstract

In recent years, the use of edge computing to solve the problem of limited resources in the IoV has attracted more and more attention. Vehicles can upload tasks to the edge servers within their radio range for computing cooperation and offloading. ...

research-article
Mobile Edge Server Deployment towards Task Offloading in Mobile Edge Computing: A Clustering Approach
Abstract

Recent years have witnessed the effect of Mobile Edge Computing (MEC) during resource-intensive and time-critical applications toward various mobile devices. Therefore, Mobile Edge Severs (MES) are widely deployed adjacent to the 5G Base Station (...

research-article
An Online Adjustment Based Node Placement Mechanism for the NFV-enabled MEC Network
Abstract

Multi-access Edge Computing (MEC) aims to reduce mobile services latency and free users from resource constraints by deploying cloud services closer to users. However, with the change of network condition, the service requirements of users cannot ...

research-article
Robust and Cost-effective Resource Allocation for Complex IoT Applications in Edge-Cloud Collaboration
Abstract

The rapid increasing of the Internet-of-Things (IoT) applications make it convenient to sense and collect real-world information in our daily life. To ensure the performance of these IoT applications, researchers established an edge-cloud ...

research-article
Adaptive Clustered Federated Learning for Heterogeneous Data in Edge Computing
Abstract

Although federated learning has been widely used in collaborative training of machine learning models, its practical uses are still challenged by heterogeneous data across clients. To alleviate the impact of non-IID data issue, we present an ...

research-article
Channel Switching Cost-Aware Energy Efficient Routing in Cognitive Radio-Enabled Internet of Things
Abstract

Routing is the process of determining the data transmission path from the source to the destination considering restrictions. Optimizing the transmission performance of acquired data, in particular, emphasizes the importance of routing in today’s ...

research-article
Research on Anti-Jamming Algorithm of Massive MIMO Communication System Based on Multi-User Game Theory
Abstract

Massive MIMO(Multiple-Input Multiple-Output) technology is one of the most important physical layer technologies in 5 g and even 6G. In the process of wireless transmission, due to the complexity of the propagation environment, the signal is ...

brief-report
3D Convolutional Neural Network for Human Behavior Analysis in Intelligent Sensor Network
Abstract

The intelligent recognition of human behavior and action in massive video data is the key application direction in the field of artificial intelligence. With the development of intelligent communication network, multimedia communication has become ...

research-article
Cascade Forward Artificial Neural Network based Behavioral Predicting Approach for the Integrated Satellite-terrestrial Networks
Abstract

In order to reduce the risk of authorized users being interrupted in the cognitive satellite wireless network, a multi-step prediction approach based on a cascaded forward artificial neural network is proposed to predict user behavior in the ...

research-article
Multi-UAV Collaborative Wireless Communication Networks for Single Cell Edge Users
Abstract

Due to fast deployment, strong survivability and flexible scheduling, multiple unmanned aerial vehicles (UAV) can synergistically optimize the trajectory and resource allocation to improve the system performance. Aiming at the poor Quality of ...

research-article
High-Speed VLSI Implementation of an Improved Parallel Delayed LMS Algorithm
Abstract

Motivated by improvement of convergence rate and throughput performance, this work develops a systematic high-speed VLSI implementation of the adaptive filter based on the improved 2-parallel delayed LMS (PDLMS) algorithm. The proposed design uses ...

research-article
Noise Robust Automatic Scoring Based on Deep Neural Network Acoustic Models with Lattice-Free MMI and Factorized Adaptation
Abstract

Automatic scoring based on Automatic Speech Recognition (ASR) has been widely used in L2 (second language) speaking tests. In this paper, novel noise robust automatic scoring methods for L2 speaking tests based on Deep Neural Network (DNN) models ...

brief-report
Remote Sensing Image Super-Resolution Based on Lorentz Fitting
Abstract

Due to the effect of the model mismatch error between the point spread function (PSF) and actual blur kernel, the performance of remote sensing image super-resolution (SR) is usually poor. In this paper, we propose a novel remote sensing image ...

brief-report
A General Matrix Factorization Framework for Recommender Systems in Multi-access Edge Computing Network
Abstract

Due to the growing number of users and items in recommender system, along with the more complex algorithms for precise recommendation, recommender system in broswer/server architecture will consume more computing cost and more service latency. ...

research-article
JOSP: Joint Optimization of Flow Path Scheduling and Virtual Network Function Placement for Delay-Sensitive Applications
Abstract

With the rapid development of network function virtualization, delay-sensitive applications including auto-driving, online gaming, and multimedia conferencing can be served by virtual network function (VNF) chains with low operation expense/...

Comments

Please enable JavaScript to view thecomments powered by Disqus.