|
|
|
Pin-Hung Juan and Ja-Ling Wu
In this study, we present a federated learning approach that combines a multi-branch network and the Oort client selection algorithm to improve the performance of federated learning systems. This method successfully addresses the significant issue of non...
ver más
|
|
|
|
|
|
|
Yuzhu Zhang and Hao Xu
This study investigates the problem of decentralized dynamic resource allocation optimization for ad-hoc network communication with the support of reconfigurable intelligent surfaces (RIS), leveraging a reinforcement learning framework. In the present co...
ver más
|
|
|
|
|
|
|
Urszula Libal and Pawel Biernacki
An automatic honey bee classification system based on audio signals for tracking the frequency of workers and drones entering and leaving a hive.
|
|
|
|
|
|
|
Chinyang Henry Tseng, Woei-Jiunn Tsaur and Yueh-Mao Shen
In detecting large-scale attacks, deep neural networks (DNNs) are an effective approach based on high-quality training data samples. Feature selection and feature extraction are the primary approaches for data quality enhancement for high-accuracy intrus...
ver más
|
|
|
|
|
|
|
Haedam Kim, Suhyun Park, Hyemin Hong, Jieun Park and Seongmin Kim
As the size of the IoT solutions and services market proliferates, industrial fields utilizing IoT devices are also diversifying. However, the proliferation of IoT devices, often intertwined with users? personal information and privacy, has led to a cont...
ver más
|
|
|
|
|
|
|
Marco Leo, Pierluigi Carcagnì, Luca Signore, Francesco Corcione, Giulio Benincasa, Mikko O. Laukkanen and Cosimo Distante
Colorectal cancer is one of the most lethal cancers because of late diagnosis and challenges in the selection of therapy options. The histopathological diagnosis of colon adenocarcinoma is hindered by poor reproducibility and a lack of standard examinati...
ver más
|
|
|
|
|
|
|
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti...
ver más
|
|
|
|
|
|
|
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani...
ver más
|
|
|
|
|
|
|
Pengyun Chen, Zhiru Li, Guangqing Liu, Ziyi Wang, Jiayu Chen, Shangyao Shi, Jian Shen and Lizhou Li
The positioning results of terrain matching in flat terrain areas will significantly deteriorate due to the influence of terrain nonlinearity and multibeam measurement noise. To tackle this problem, this study presents the Pulse-Coupled Neural Network (P...
ver más
|
|
|
|
|
|
|
Bowen Xing, Xiao Wang and Zhenchong Liu
The path planning strategy of deep-sea mining vehicles is an important factor affecting the efficiency of deep-sea mining missions. However, the current traditional path planning algorithms suffer from hose entanglement problems and small coverage in the...
ver más
|
|
|
|