|
|
|
Huiting Wang, Yazhi Liu, Wei Li and Zhigang Yang
In data center networks, when facing challenges such as traffic volatility, low resource utilization, and the difficulty of a single traffic scheduling strategy to meet demands, it is necessary to introduce intelligent traffic scheduling mechanisms to im...
ver más
|
|
|
|
|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Jie Ren, Changmiao Li, Yaohui An, Weichuan Zhang and Changming Sun
Few-shot fine-grained image classification (FSFGIC) methods refer to the classification of images (e.g., birds, flowers, and airplanes) belonging to different subclasses of the same species by a small number of labeled samples. Through feature representa...
ver más
|
|
|
|
|
|
|
Leonid Dvorkin, Vitaliy Marchuk, Katarzyna Mróz, Marcin Maroszek and Izabela Hager
Compositions of fine-grained concrete mixtures that provide the minimum required strength values in 1 day (7.5 MPa) have been developed. A comparison was made of the test results of the properties of samples printed on a 3D printer with samples made acco...
ver más
|
|
|
|
|
|
|
Alexia Balla, Vesna Teofilovic and Tímea Kiss
The hydro-geomorphological background in microplastic (MP) deposition and mobilization is often neglected, though the sampling environment is the key point in a monitoring scheme. The aim of the study was to analyze the environmental driving factors of M...
ver más
|
|
|
|
|
|
|
Xiaojuan Wang and Weilan Wang
As there is a lack of public mark samples of Tibetan historical document image characters at present, this paper proposes an unsupervised Tibetan historical document character recognition method based on deep learning (UD-CNN). Firstly, using the Tibetan...
ver más
|
|
|
|
|
|
|
Meijuan Huang, Yutian Liu, Bo Yang, Yanqi Zhao and Mingrui Zhang
Revocable attribute-based encryption (RABE) provides greater flexibility and fine-grained access control for data sharing. However, the revocation process for most RABE schemes today is performed by the cloud storage provider (CSP). Since the CSP is an h...
ver más
|
|
|
|
|
|
|
Margarita Zyrianova, Timothy Collett and Ray Boswell
One of the most studied permafrost-associated gas hydrate accumulations in Arctic Alaska is the Eileen Gas Hydrate Trend. This study provides a detailed re-examination of the Eileen Gas Hydrate Trend with a focus on the gas hydrate accumulation in the we...
ver más
|
|
|
|
|
|
|
Sardar Anisul Haque, Mohammad Tanvir Parvez and Shahadat Hossain
Matrix?matrix multiplication is of singular importance in linear algebra operations with a multitude of applications in scientific and engineering computing. Data structures for storing matrix elements are designed to minimize overhead information as wel...
ver más
|
|
|
|
|
|
|
Xiaodong Cui, Zhuofan He, Yangtao Xue, Keke Tang, Peican Zhu and Jing Han
Underwater Acoustic Target Recognition (UATR) plays a crucial role in underwater detection devices. However, due to the difficulty and high cost of collecting data in the underwater environment, UATR still faces the problem of small datasets. Few-shot le...
ver más
|
|
|
|