We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 407 results
  1. Dynamic Stacking Optimization in Unpredictable Environments: A Focus on Crane Scheduling

    Dynamic Stacking Optimization holds significant practical relevance for multimillion-dollar industries involved in production and delivery processes....
    Jiban Kumar Ray, Doina Logofătu, Costin Bădică in Artificial Intelligence Applications and Innovations
    Conference paper 2024
  2. Improving the stockpiling sites for inbound, outbound containers by timing the place of stacking

    Seaports face rising pressure in container stacking. Nations are endeavoring to get the most advantage from it, increase their portion of this area’s...

    Mohammed Ahmed Moqbel Saleh, Attariuas Hicham, ... Smail Admeur in International Journal of Information Technology
    Article 23 June 2023
  3. Design and realization of hybrid resource management system for heterogeneous cluster

    As user-generated data diversifies, an increasing number of big data tasks now encompass unstructured data forms, including audio, imagery, and video...

    Qinlu He, Fan Zhang, ... Zhen Li in Cluster Computing
    Article 22 February 2024
  4. Distributed Reinforcement Learning with States Feature Encoding and States Stacking in Continuous Action Space

    The practical application of reinforcement learning agents is often bottlenecked by the duration of training time. To accelerate training,...
    Tianqi Xu, Dianxi Shi, ... Yaowen Zhang in Collaborative Computing: Networking, Applications and Worksharing
    Conference paper 2021
  5. Linear Layouts of Bipartite Planar Graphs

    A linear layout of a graph G consists of a linear order, \(\prec \)...
    Henry Förster, Michael Kaufmann, ... Chrysanthi Raftopoulou in Algorithms and Data Structures
    Conference paper 2023
  6. Deep Hawkes process for high-frequency market making

    High-frequency market making is a liquidity-providing trading strategy that simultaneously generates many bids and asks for a security at ultra-low...

    Article Open access 26 April 2024
  7. Traffic signal optimization control method based on adaptive weighted averaged double deep Q network

    As a critical node and major bottleneck of the urban traffic networks, the control of traffic signals at road intersections has an essential impact...

    Youqing Chen, Huizhen Zhang, ... Yubiao Pan in Applied Intelligence
    Article 27 January 2023
  8. Graph cooperation deep reinforcement learning for ecological urban traffic signal control

    Cooperation between intersections in large-scale road networks is critical in traffic congestion. Currently, most traffic signals cooperate via...

    Li** Yan, Lulong Zhu, ... Chan Peng in Applied Intelligence
    Article 07 July 2022
  9. Explicable Integration Techniques: Relative Temporal Position Taxonomy

    In data-driven anti-fraud engineering for online payment services, the integration of proper function modules is an effective way to further improve...
    Chapter 2023
  10. A performance evaluation method of queuing theory based on Cosmos cross-chain platform

    To solve the interconnection between a large number of coexisting blockchains such as Bitcoin and Ethereum and other types of blockchains, more and...

    Ou Wu, Binbin Huang, ... Haoming Li in CCF Transactions on High Performance Computing
    Article 18 August 2023
  11. A Stable Long-Term Tracking Method for Group-Housed Pigs

    In recent years, computer vision technologies have been increasingly applied to livestock farming for improving efficiency and reducing the labor...
    Shibo Gao, **meng Gong, ... Linlin Huang in Image and Graphics
    Conference paper 2023
  12. AGRCNet: communicate by attentional graph relations in multi-agent reinforcement learning for traffic signal control

    Traffic signal control (TSC) can be described as a multi-agent cooperative game. To realize cooperation, multi-agent reinforcement learning (MARL) is...

    Tinghuai Ma, Kexing Peng, ... Yurong Qian in Neural Computing and Applications
    Article 30 July 2023
  13. Research on Energy Consumption Optimization Using a Lyapunov-Based LSTM-PSO Algorithm

    As the Internet of Things (IoT) proliferates, there’s a growing demand for efficient task processing and top-tier service. This paper introduces a...
    Sheng Pan, Rui Zhao, ... Zheyan Shi in Wireless Sensor Networks
    Conference paper 2024
  14. Learning practically feasible policies for online 3D bin packing

    We tackle the online 3D bin packing problem (3D-BPP), a challenging yet practically useful variant of the classical bin packing problem. In this...

    Hang Zhao, Chenyang Zhu, ... Kai Xu in Science China Information Sciences
    Article 27 December 2021
  15. A novel image shift encryption algorithm based on the dynamic Joseph ring problem

    Image encryption can effectively prevent unauthorized users from stealing personal information. Attackers usually analyze the information of the...

    Hui Wang, Boxin Dong, ... Gang Liu in Multimedia Tools and Applications
    Article 22 March 2023
  16. MOONLIT: momentum-contrast and large-kernel for multi-fine-grained deraining

    Deep learning-based methods have achieved excellent performance in image-deraining tasks. Unfortunately, most existing deraining methods incorrectly...

    Yifan Liu, **cai Chen, ... Han Liang in The Journal of Supercomputing
    Article 20 April 2023
  17. Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System

    As a key component of next-generation transportation systems, the intelligent traffic signal system is designed to perform dynamic and optimal signal...
    Yingxiao **ang, Tong Chen, ... **nyu Huang in Security and Privacy in New Computing Environments
    Conference paper 2022
  18. Extrapolating linked list data structures to 3rd dimension

    Data management is not in trend just for a while, but it has captured computer scientists’ research interests for a long time. Many of them came up...

    Anurag Dutta, Manan Roy Choudhury, Krishan Kundu in Iran Journal of Computer Science
    Article 20 January 2023
  19. Editorial

    Article 04 November 2023
  20. Intrusion detection using graph neural network and Lyapunov optimization in wireless sensor network

    Sensor nodes deployed in a remote location are vulnerable to various attack. An intruder can easily capture and tamper with sensor nodes deployed in...

    Priyajit Biswas, Tuhina Samanta, Judhajit Sanyal in Multimedia Tools and Applications
    Article 30 September 2022
Did you find what you were looking for? Share feedback.