Showing 281 - 292 results of 292 for search 'Node presentation learning', query time: 0.09s Refine Results
  1. 281

    Resource Allocation With Edge-Cloud Collaborative Traffic Prediction in Integrated Radio and Optical Networks by Bowen Bao, Hui Yang, Qiuyan Yao, Lin Guan, Jie Zhang, Mohamed Cheriet

    Published 2023-01-01
    “…Therefore, an efficient resource allocation scheme needs to consider certain issues: 1) a comprehensive perspective of traffic prediction; 2) a release of pressure on the transmission pipeline during the prediction process; and 3) a reduction of loss of edge nodes due to the computation. In this paper, benefiting from machine learning, we propose a resource allocation with edge-cloud collaborative traffic prediction (TP-ECC) in integrated radio and optical networks, where an efficient resource allocation scheme (ERAS) is designed based on the prediction results with the gated recurrent unit model. …”
    Get full text
    Article
  2. 282
  3. 283

    Spatiotemporal Wind Energy Forecasting: A Comprehensive Survey and a Deep Equilibrium-Based Case Study With StemGNN by Luiza Scapinello Aquino, Laio Oriel Seman, Viviana Cocco Mariani, Leandro Dos Santos Coelho, Stefano Frizzo Stefenon, Gabriel Villarrubia Gonzalez

    Published 2025-01-01
    “…This paper addresses the challenge of modeling the complex spatial and temporal dependencies inherent in wind power generation by presenting a comprehensive survey of existing spatiotemporal forecasting methods and introducing an innovative deep learning approach. …”
    Get full text
    Article
  4. 284

    Multistage adaptive cyberattack in power systems with CNN identification feedback loops by Mohannad Alhazmi, Alexis Pengfei Zhao, Xi Cheng, Chenlu Yang

    Published 2025-07-01
    “…This study presents the first integrated framework combining CNN, reinforcement learning, and blockchain from an adversarial perspective, offering new insights into the evolving threat landscape and guiding the development of future cyber-resilience strategies in multi-energy systems.…”
    Get full text
    Article
  5. 285

    MPJ-SPARK Integration-Based Technique to Enhance Big Data Analytics in High Performance Computing Environments by Sakhr A. Saleh, Maher A. Khemakhem, Fathy E. Eassa

    Published 2025-01-01
    “…Traditional analytics tools lag HPC in computational efficiency, whereas machine learning workloads require substantial resources. However, integrating HPC and big data presents challenges due to architectural differences. …”
    Get full text
    Article
  6. 286

    A survey of data-driven fault-diagnosis methods for large-scale industrial production processes by Qianxiang YU, Qing LI, Linlin LI, Yixuan WANG

    Published 2025-04-01
    “…Meanwhile, consensus analysis focuses on the communication topology of the nodes, ensuring that all nodes converge to a unified data state at any instant. …”
    Get full text
    Article
  7. 287

    Comprehensive Analysis on Complementary FET by Ayush Bhardwaj, Debashish Dash, Aditi Anant, Ved M. Bhanushali, Adarsh Kushwah, Ipshita Mishra, Shubham, Chandan Kumar Pandey

    Published 2025-01-01
    “…This paper delves into the analytical modeling and performance enhancement of CFETs for advanced technology nodes, comparing them with other transistor architectures like lateral GAAFETs. …”
    Get full text
    Article
  8. 288

    Exploring the biological functions and immune regulatory roles of IRAK3, TNFRSF1A, CX3CR1, and JUNB in T2DM combined with MAFLD: integrated bioinformatics and single-cell analysis by Qin Wang, Xiaoqi Li, Kaidierdan Wushoulaji, Jinyang Wang, Li Wan, Ye Yang, Xueli Gong

    Published 2025-08-01
    “…ObjectiveDiabetes mellitus combined with nonalcoholic fatty liver disease is a prevalent and intricate metabolic disorder that presents a significant global health challenge, imposing economic and emotional burdens on society and families. …”
    Get full text
    Article
  9. 289

    Behavior Trees for Smart Robots Practical Guidelines for Robot Software Development by Eric Dortmans, Teade Punter

    Published 2022-01-01
    “…Behavior Trees enable flexible planning and replanning of robot behavior while supporting better maintainable decision-making than traditional Finite State Machines. This paper presents an overview of lessons, which we have learned when applying Behavior Trees to various autonomous robots. …”
    Get full text
    Article
  10. 290

    A novel approach for detecting malicious hosts based on RE-GCN in intranet by Haochen Xu, Xiaoyu Geng, Junrong Liu, Zhigang Lu, Bo Jiang, Yuling Liu

    Published 2024-12-01
    “…For malicious host detection, this paper proposes the Relational-Edge Graph Convolutional Network (RE-GCN) model, which can directly aggregate and learn features on edges and use them to accurately classify nodes, compared to other GNN models. …”
    Get full text
    Article
  11. 291

    Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence by Anna Lekova

    Published 2012-01-01
    “…EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.…”
    Get full text
    Article
  12. 292