-
Article
A computation offloading strategy for multi-access edge computing based on DQUIC protocol
Computation offloading can efficiently expand edge resources and is widely used to perform computing-intensive and delay-sensitive tasks. The inability of existing offloading strategies to pay attention to bot...
-
Article
Perception data fusion-based computation offloading in cooperative vehicle infrastructure systems
With the rapid advancement of intelligent transportation systems, cooperative vehicle infrastructure systems emerge as a vital frontier for development. Real-time mutual fusion of perception data is a crucial ...
-
Article
SPD-YOLOv8: an small-size object detection model of UAV imagery in complex scene
Traditional camera sensors rely on human observation. However, in complex scenes, people often experience fatigue when observing objects of various sizes. Moreover, human cognitive abilities have inherent limi...
-
Article
Graph neural news recommendation based on multi-view representation learning
Accurate news representation is of crucial importance in personalized news recommendation. Most of existing news recommendation model lack comprehensiveness because they do not consider the higher-order struct...
-
Article
Secure symbol-level precoding for reconfigurable intelligent surface-aided cell-free networks
With the improvement in communication network density, inter-cell interference has become severe. Due to the blurring of boundaries, cell-free networks are considered as a solution. However, it faces some chal...
-
Article
MWformer: a novel low computational cost image restoration algorithm
The development of the Internet of Things has led to a surge in edge devices. The image detection algorithm, one of the commonly used algorithms in edge computing, is affected by environments such as weather, ...
-
Article
A fault-tolerant scheduling algorithm that minimizes the number of replicas in heterogeneous service-oriented cloud computing systems
The service-oriented heterogeneous cloud computing system offers paid computing services through its powerful processors. However, task execution failures caused by processors can diminish application reliabil...
-
Article
AMEA-YOLO: a lightweight remote sensing vehicle detection algorithm based on attention mechanism and efficient architecture
Due to the large computational requirements of object detection algorithms, high-resolution remote sensing vehicle detection always involves numerous small objects, high level of background complexity, and cha...
-
Article
Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning
Recent breakthroughs in artificial intelligence and deep neural networks (DNNs) have produced an explosive demand for computing platforms equipped with customized domain-specific accelerators. However, DNN acc...
-
Article
Spatial-guided informative semantic joint transformer for single-image deraining
Single-image deraining is of great significance for image recognition and analysis. However, the majority of current methods face challenges such as incomplete removal of tiny rain streaks, blurred restoration...
-
Article
An optimized resource scheduling algorithm based on GA and ACO algorithm in fog computing
With the rise of Internet of Things (IoT) technology, fog computing has emerged as a promising solution for low-latency and real-time applications. As a highly virtualized platform, fog computing provides comp...
-
Article
SiMaLSTM-SNP: novel semantic relatedness learning model preserving both Siamese networks and membrane computing
Semantic relatedness is one of the most significant aspects of natural language processing. It has been identified as a critical technology for develo** intelligent systems like Siri, Microsoft Ice, Cortana,...
-
Article
Dual graph neural network for overlap** community detection
Community detection has long been designed to find communities with different structures in various networks. It is now widely believed that these communities often overlap with each other. However, due to the...
-
Article
DialogueINAB: an interaction neural network based on attitudes and behaviors of interlocutors for dialogue emotion recognition
Machines can be equipped with the capability of identifying human emotions through conversation, thus enabling them to empathize with natural persons when they speak to them. The emergence of chatbots and inte...
-
Article
Graph-enhanced multi-answer summarization under question-driven guidance
Multi-answer summarization for question-based queries in community Q&A requires comprehensive and in-depth analysis of lengthy and extensive information to generate concise and comprehensive answer summarizati...
-
Article
Open AccessCell tracking with multifeature fusion
Cell tracking is currently a powerful tool in a variety of biomedical research topics. Most cell tracking algorithms follow the tracking by detection paradigm. Detection is critical for subsequent tracking. Un...
-
Article
Data Security Aware and Effective Task Offloading Strategy in Mobile Edge Computing
With the research and development of 5G technology, emerging markets such as Wise Information Technology of med, smart transportation and industrial Internet are gradually growing, which not only provide conve...
-
Article
Row-based hierarchical graph network for multi-hop question answering over textual and tabular data
Multi-hop Question Answering over heterogeneous data is a challenging task in Natural Language Processing(NLP), which aims to find the answer among heterogeneous data sources and reasoning chains. When facing ...
-
Article
Rumor detection driven by graph attention capsule network on dynamic propagation structures
Rumor detection aims to judge the authenticity of posts on social media (such as Weibo and Twitter), which can effectively prevent the spread of rumors. While many recent rumor detection methods based on graph...
-
Article
Int-Monitor: a model triggered hardware trojan in deep learning accelerators
Deep learning accelerators have domain-specific architectures, this special memory hierarchy and working mode could bring about new crucial security vulnerabilities. Neural network reuse PE resources layer by ...