![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
258 Result(s)
-
Article
A dynamic spectrum access algorithm based on deep reinforcement learning with novel multi-vehicle reward functions in cognitive vehicular networks
As a revolution in the field of transportation, the demand for communication of vehicles is increasing. Therefore, how to improve the success rate of vehicle spectrum access has become a major problem to be so...
-
Article
Joint resource and trajectory optimization for video streaming in UAV-based emergency indoor-outdoor communication
Due to its ability for flexible placement, the Unmanned Aerial Vehicle (UAV) has been widely utilized as an aerial relay to transmit the video streaming data, which is particularly useful in emergency communic...
-
Article
Perspective of virtual machine consolidation in cloud computing: a systematic survey
Virtual Machine Consolidation (VMC) in cloud computing refers to the process of optimizing resource utilization by consolidating multiple Virtual Machines (VMs) onto fewer physical servers. This approach aims ...
-
Article
Research on Intelligent Courses in English Education based on Neural Networks
Accurately predicting students’ performance plays a crucial role in achieving the intellectualization of courses. This paper studied intelligent courses in English education based on neural networks and design...
-
Article
Improving scheduling in multi-AGV systems by task prediction
Automated guided vehicles (AGVs) are driverless robotic vehicles that pick up and deliver materials. Finding ways to improve efficiency while preventing deadlocks is a core issue in designing AGV systems. In t...
-
Article
Generative adversarial networks-based security and applications in cloud computing: a survey
To meet growing business needs and exponentially increasing development and maintenance costs, the concept of cloud computing has been proposed and developed rapidly. Cloud computing is a brand-new computing m...
-
Article
A new construction of public key authenticated encryption with keyword search based on LWE
A public key encryption with keyword search (PEKS) scheme allows users to share encrypted data through cloud servers. However, an inside adversary may launch inside keyword guessing attack (IKGA) for a given t...
-
Article
VPIR: an efficient verifiable private information retrieval scheme resisting malicious cloud server
Private information retrieval, which allows users to securely retrieve information stored in a single server or multiple servers without disclosing any query content to the server, has attracted much attention...
-
Article
Coverage analysis and deployment design of RIS-assisted systems
Reconfigurable intelligent surface (RIS) is a novel technology that can help enhance the wireless propagation environment by altering the electromagnetic properties of its massive low-cost passive reflecting e...
-
Article
Adaptive MIMO-FSO space diversity MRC reception characteristics over Malaga turbulence channel with pointing errors
Atmospheric turbulence channels experience quasi-static fading, which makes it relatively straightforward to utilize feedback information for link adaptive transmission. Applying adaptive modulation to MIMO sy...
-
Article
Towards a crop pest control system based on the Internet of Things and fuzzy logic
Smart agriculture is an emerging concept that helps modern farm management using technologies such as the Internet of Things (IoT), robotics, drones, and artificial intelligence, so that this leads to an incre...
-
Article
Supervised Feature Selection via Quadratic Surface Regression with \(l_{2,1}\) -Norm Regularization
This paper proposes a supervised kernel-free quadratic surface regression method for feature selection (QSR-FS). The method is to find a quadratic function in each class and incorporates it into the least squa...
-
Article
A reduced peak-to-average power ratio algorithm based on PMI mode in NR
Orthogonal frequency division multiplexing technology, as a key technology of NR air interface transmission, has the advantages of resisting frequency selective fading and narrowband interference, but the prob...
-
Article
A novel and efficient real-time sequencing strategy for appointment scheduling with unpunctual patients
No-shows and non-punctual appointments have always been uncertain factors faced by managers of service-oriented enterprises and institutions, which usually lead to a low utilization rate of resources and a rap...
-
Article
Performance analysis for visible light communications with Gaussian-plus-Laplacian additive noise
In this paper, the performance of an indoor visible light communication (VLC) system in the presence of Gaussian-plus-Laplacian additive noise is investigated. Initially, a realistic VLC system model is establ...
-
Book Series
-
Chapter and Conference Paper
Body and Mind in Virtual Dark Tourism Experiences and Artwork Creations: Embodied Cognition Reaction Perspectives
Dark tourism experiences visualized in destinations evoke diverse tourist experiences, triggering negative emotions and offering insights into historical events. Embodied cognition reactions prompt distinct ex...
-
Chapter
Build Your Security Program for GenAI
This chapter explores policies, processes, and procedures to build a robust security program tailored for GenAI models and applications. It discusses key policy elements like goals, risk management, compliance...
-
Chapter
From LLMOps to DevSecOps for GenAI
This chapter explores the emerging discipline of LLMOps, contrasting it with traditional MLOps approaches and highlighting unique considerations when operationalizing GenAI models and applications. A detailed ...
-
Book