Search
Search Results
-
Dynamic Stacking Optimization in Unpredictable Environments: A Focus on Crane Scheduling
Dynamic Stacking Optimization holds significant practical relevance for multimillion-dollar industries involved in production and delivery processes.... -
Improving the stockpiling sites for inbound, outbound containers by timing the place of stacking
Seaports face rising pressure in container stacking. Nations are endeavoring to get the most advantage from it, increase their portion of this area’s...
-
Design and realization of hybrid resource management system for heterogeneous cluster
As user-generated data diversifies, an increasing number of big data tasks now encompass unstructured data forms, including audio, imagery, and video...
-
Distributed Reinforcement Learning with States Feature Encoding and States Stacking in Continuous Action Space
The practical application of reinforcement learning agents is often bottlenecked by the duration of training time. To accelerate training,... -
Linear Layouts of Bipartite Planar Graphs
A linear layout of a graph G consists of a linear order, \(\prec \)... -
Deep Hawkes process for high-frequency market making
High-frequency market making is a liquidity-providing trading strategy that simultaneously generates many bids and asks for a security at ultra-low...
-
Traffic signal optimization control method based on adaptive weighted averaged double deep Q network
As a critical node and major bottleneck of the urban traffic networks, the control of traffic signals at road intersections has an essential impact...
-
Graph cooperation deep reinforcement learning for ecological urban traffic signal control
Cooperation between intersections in large-scale road networks is critical in traffic congestion. Currently, most traffic signals cooperate via...
-
Explicable Integration Techniques: Relative Temporal Position Taxonomy
In data-driven anti-fraud engineering for online payment services, the integration of proper function modules is an effective way to further improve... -
A performance evaluation method of queuing theory based on Cosmos cross-chain platform
To solve the interconnection between a large number of coexisting blockchains such as Bitcoin and Ethereum and other types of blockchains, more and...
-
A Stable Long-Term Tracking Method for Group-Housed Pigs
In recent years, computer vision technologies have been increasingly applied to livestock farming for improving efficiency and reducing the labor... -
AGRCNet: communicate by attentional graph relations in multi-agent reinforcement learning for traffic signal control
Traffic signal control (TSC) can be described as a multi-agent cooperative game. To realize cooperation, multi-agent reinforcement learning (MARL) is...
-
Research on Energy Consumption Optimization Using a Lyapunov-Based LSTM-PSO Algorithm
As the Internet of Things (IoT) proliferates, there’s a growing demand for efficient task processing and top-tier service. This paper introduces a... -
Learning practically feasible policies for online 3D bin packing
We tackle the online 3D bin packing problem (3D-BPP), a challenging yet practically useful variant of the classical bin packing problem. In this...
-
A novel image shift encryption algorithm based on the dynamic Joseph ring problem
Image encryption can effectively prevent unauthorized users from stealing personal information. Attackers usually analyze the information of the...
-
MOONLIT: momentum-contrast and large-kernel for multi-fine-grained deraining
Deep learning-based methods have achieved excellent performance in image-deraining tasks. Unfortunately, most existing deraining methods incorrectly...
-
Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System
As a key component of next-generation transportation systems, the intelligent traffic signal system is designed to perform dynamic and optimal signal... -
Extrapolating linked list data structures to 3rd dimension
Data management is not in trend just for a while, but it has captured computer scientists’ research interests for a long time. Many of them came up...
-
Intrusion detection using graph neural network and Lyapunov optimization in wireless sensor network
Sensor nodes deployed in a remote location are vulnerable to various attack. An intruder can easily capture and tamper with sensor nodes deployed in...