|
|
|
Juan Murillo-Morera, Carlos Castro-Herrera, Javier Arroyo, Ruben Fuentes-Fernandez
Pág. 114 - 137
Today, it is common for software projects to collect measurement data through development processes. With these data, defect prediction software can try to estimate the defect proneness of a software module, with the objective of assisting and guiding so...
ver más
|
|
|
|
|
|
|
Kimoon Lee, Dongjin Kim, Daewon Chung and Seonho Lee
This study explores optimizing Synthetic Aperture Radar (SAR) satellite constellation scheduling for multi-imaging missions in densely targeted areas using an in-house-developed Modified Dynamic Programming (MDP) algorithm. By employing Mixed-Integer Lin...
ver más
|
|
|
|
|
|
|
Chen Zhang, Celimuge Wu, Min Lin, Yangfei Lin and William Liu
In the advanced 5G and beyond networks, multi-access edge computing (MEC) is increasingly recognized as a promising technology, offering the dual advantages of reducing energy utilization in cloud data centers while catering to the demands for reliabilit...
ver más
|
|
|
|
|
|
|
Tongyang Xu, Yuan Liu, Zhaotai Ma, Yiqiang Huang and Peng Liu
As a new distributed machine learning (ML) approach, federated learning (FL) shows great potential to preserve data privacy by enabling distributed data owners to collaboratively build a global model without sharing their raw data. However, the heterogen...
ver más
|
|
|
|
|
|
|
Wanli Li, Jiong Li, Ningbo Li, Lei Shao and Mingjie Li
Concerned with the problem of interceptor midcourse guidance trajectory online planning satisfying multiple constraints, an online midcourse guidance trajectory planning method based on deep reinforcement learning (DRL) is proposed. The Markov decision p...
ver más
|
|
|
|
|
|
|
Antonio Maci, Alessandro Santorsola, Antonio Coscia and Andrea Iannacone
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are paramou...
ver más
|
|
|
|
|
|
|
Yang Bai, Xiaocui Li, Xinfan Wu and Zhangbing Zhou
With the booming proliferation of user requests in the Internet of Things (IoT) network, Edge Computing (EC) is emerging as a promising paradigm for the provision of flexible and reliable services. Considering the resource constraints of IoT devices, for...
ver más
|
|
|
|
|
|
|
Ruifeng Luo, Yifan Wang, Weifang Xiao and Xianzhong Zhao
Truss layout optimization under complex constraints has been a hot and challenging problem for decades that aims to find the optimal node locations, connection topology between nodes, and cross-sectional areas of connecting bars. Monte Carlo Tree Search ...
ver más
|
|
|
|
|
|
|
Ranzhen Ren, Lichuan Zhang, Lu Liu, Dongwei Wu, Guang Pan, Qiaogao Huang, Yuchen Zhu, Yazhe Liu and Zixiao Zhu
To reduce the cooperative positioning error and improve the navigation accuracy, a single master?slave AUV cooperative navigation method is proposed in this paper, which mainly focuses on planning the optimal path of the master AUV by the time difference...
ver más
|
|
|
|
|
|
|
Xiaowei Liu, Shuwen Jiang and Yi Wu
With the internet developing rapidly, mobile edge computing (MEC) has been proposed to offer computational capabilities to tackle the high latency caused by innumerable data and applications. Due to limited computing resources, the innovation of computat...
ver más
|
|
|
|