A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Mass Cooperative Transmission and QoS Supported Mechanism in Wireless Sensor Networks
2014
International Journal of Distributed Sensor Networks
For establishing the foot pressure acquisition system, gait recognition algorithm based on physiological parameter feature extraction and human motion recognition algorithm based on support vector machine ...
A network topology based on a five-layer network model is established from the given sensor networks. A simulated instance is conducted to evaluate the performance of the proposed scheme. ...
Acknowledgments Thanks are due to the authors of the special issue for their contributions and to the reviewers for their valuable comments on the submissions. Dr. ...
doi:10.1155/2014/363584
fatcat:3dgywtg7ezehhl42norpkzemue
Intelligent Video QoE Prediction Model for Errorprone Networks
2015
Indian Journal of Science and Technology
Application: The evaluation results exemplify the importance of applying machine learning paradigms in broad areas of visual quality assessment. ...
Estimation of video quality in wireless environment requires the conception of better framework and methodologies to improve users' Quality of Experience (QoE).This paper depicts a novel QoE prediction ...
Zheng et al. 41 A novel PSQA based Neural Network scheme by considering various 3G LTE parameters is studied. ...
doi:10.17485/ijst/2015/v8i16/65562
fatcat:cpmypvuydfadlotsuuxl6tdmfe
Research and Development of Advanced Computing Technologies
2015
The Scientific World Journal
Adam et al. build a framework for peak detection on EEG signals in time domain analysis using feature selection and classifier parameters estimation based on particle swarm optimization. ...
Lin et al. proposed a privacy-preserving data mining method by using a compact prelarge GA-based algorithm to delete transactions for hiding sensitive itemsets. ...
This special issue is supported by the National Natural Science Foundation of China under Grant no. 61379101 and the National Basic Research Program of China under Grant no. 2013CB329502. ...
doi:10.1155/2015/239723
pmid:25884022
pmcid:PMC4391607
fatcat:hiafyjnlfva3rgu2xhb3du7jtu
Wireless Machine-to-Machine Networks
2012
International Journal of Distributed Sensor Networks
The paper entitled "A smart electronic tagging system based on context awareness and machine-to-machine interworking" by G.-Y. ...
to provide diverse QoS with ultra-low power consumption and mobility support. ...
doi:10.1155/2012/535927
fatcat:jgjhyed65rbhfos2mf7jdntoye
Wireless Machine-to-Machine Networks 2013
2014
International Journal of Distributed Sensor Networks
as well as consumers on cost reduction and services improvement. ...
It has been expected that there will be a huge increase in the number of machine devices enabled by wireless M2M technology and the amount of traffic generated by these devices in the next five years. ...
The paper entitled "A smart electronic tagging system based on context awareness and machine-to-machine interworking" by G.-Y. ...
doi:10.1155/2014/857139
fatcat:eyv46bo6mrduzowjrpja33wr2q
MACHINE LEARNING METHODS FOR REFINING SLA BASED ADMISSION CONTROL AND RESOURCE ALLOCATION IN CLOUD COMPUTING
2017
International Journal of Advanced Research in Computer Science
Vector Machine (SVM) and Artificial Neural Network (ANN) for better admission control. ...
In this research, Knowledge-based Service Level Agreement (SLA) aware admission controlled scheduling and resource allocation are proposed which makes use of machine learning algorithms namely Support ...
Support Vector Machine Based Admission Control Support vector machine is an administered learning technique which is utilized to investigate information and perceive patterns.It is also used for regression ...
doi:10.26483/ijarcs.v8i9.5228
fatcat:72fptbyv7bbhfmpfacxknhwurm
Guest Editorial on Advances in Tools and Techniques for Enabling Cyber–Physical–Social Systems—Part II
2015
IEEE Transactions on Computational Social Systems
A scheme through five machine learning approaches is implemented and a support vector machine-based approach is selected due to the scheme's high accuracy. ...
The paper "A Performance Evaluation of Machine Learning Based Streaming Spam Tweets Detection" by Chen et al. proposed a performance evaluation of existing machine learningbased streaming spam detection ...
doi:10.1109/tcss.2016.2527159
fatcat:o42kubzkerafbcdcepsfoul3bu
Guest Editorial on Advances in Tools and Techniques for Enabling Cyber–Physical–Social Systems—Part I
2015
IEEE Transactions on Computational Social Systems
A scheme through five machine learning approaches is implemented and a support vector machine-based approach is selected due to the scheme's high accuracy. ...
The paper "A Performance Evaluation of Machine Learning Based Streaming Spam Tweets Detection" by Chen et al. proposed a performance evaluation of existing machine learningbased streaming spam detection ...
doi:10.1109/tcss.2016.2527158
fatcat:sd3lco3dovbbdmnvfcqj74vsea
Comprehensive Investigations on QUEST: a Novel QoS-Enhanced Stochastic Packet Scheduler for Intelligent LTE Routers
2018
KSII Transactions on Internet and Information Systems
In this paper we propose a QoS-enhanced intelligent stochastic optimal fair real-time packet scheduler, QUEST, for 4G LTE traffic in routers. ...
We analyse two most important QoS metrics, packet loss rate (PLR) and mean waiting time. All claims are supported by discrete event and Monte Carlo simulations. ...
Although the model is based on Markov chain, the has no focus on state estimation by machine learning. ...
doi:10.3837/tiis.2018.02.003
fatcat:jxhjtzoownam5fhgjrqes4tppq
Security and privacy of machine learning assisted P2P networks
2020
Peer-to-Peer Networking and Applications
The paper titled "CSNN: Password Guessing Method Based on Chinese Syllables and Neural Network" has proposed s a password guessing method CSNN for Chinese password sets. ...
Advances in machine learning (ML) in recent years have enabled a dizzying array of applications in diverse areas of networks and communications. ...
The data collection in TMCQA scheme has the following innovations. (1) A trust evaluation mechanism utilizing the idea of machine learning is established to evaluate the trust of the data reporter. (2) ...
doi:10.1007/s12083-020-00922-5
fatcat:2wv5bgze2bbufllvrxmtkuokjm
Taxonomy and issues for antifragile-based multimedia cloud computing
2016
Journal of Reliable Intelligent Environments
Cloud computing has become one of the most dynamic and adoptable computing paradigms. Multimedia Cloud Computing (MCC) is one of today's hot research topic. ...
MCC is proven to be a most dynamic and efficient platform for managing a large amount of multimedia contents with maximum deployment of computing and processing resources at the service provider instead ...
To provide better quality, an improved and novel scheme, based on QDFA, uses the techniques of GMPLS, DiffServ, POSIA, and IntServ. ...
doi:10.1007/s40860-016-0017-7
fatcat:lhxknk32hff6vkoduzq7meydee
IEEE Access Special Section Editorial: Edge Computing and Networking for Ubiquitous AI
2021
IEEE Access
Another is how edge computing supports AI in a networking environment. For example, AI training and inference can be efficiently enabled by a multitude of computing resources from edge computing. ...
This IEEE ACCESS Special Section on Edge Computing and Networking for Ubiquitous AI aims to explore the challenges of ubiquitous intelligence potentially enabled by both edge computing and machine learning ...
In the second group of articles, ''Multivariate seawater quality prediction based on PCA-RVM supported by edge computing towards smart ocean,'' by Sun et al., develops a hybrid multivariate prediction ...
doi:10.1109/access.2021.3090143
fatcat:mdgmfeph6zcrzc6z7w7xjg3iua
Introduction to advances in trust, security, and privacy for wireless networks
2013
EURASIP Journal on Wireless Communications and Networking
In addition, the authors propose two new algorithms, namely intelligent rule-based attribute selection algorithm for effective feature selection and intelligent rule-based enhanced multiclass support vector ...
order to make a rational decision on relay selection and the authentication parameter adaptation to reach a trade-off between security and QoS in CO-MANETs. ...
Last but not the least, we are thankful for the thoughtful work of the many reviewers who provided invaluable evaluations and recommendations. ...
doi:10.1186/1687-1499-2013-287
fatcat:43xkciofzzewzf2xijr6zukzgq
Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments
2018
IEEE Transactions on Parallel and Distributed Systems
However, our approach integrates computing resources adaptation with service admission control based on the RL model. ...
Unlike existing works, we propose a novel Service Level Agreement (SLA) framework for cloud computing, in which a price control parameter is used to meet QoS demands for all classes in the market. ...
: Algorithm h ( ) = ( ) (26)
PERFORMANCE EVALUATION In this section, the performance of the proposed resource adaption scheme is evaluated using discrete event based simulations. ...
doi:10.1109/tpds.2017.2748578
fatcat:pteyb6z5kfc4ffi74qpyhcqvf4
Editorial
2021
International Journal of Information Technology
Support Vector Machine (SVM) and Convolutional Neural Network (CNN). ...
based on grading approach with AdaBoost scheme for analysis and prediction of erythemato-squamous disease (ESD). ...
doi:10.1007/s41870-021-00712-z
pmid:34056522
pmcid:PMC8143440
fatcat:73huysdwcfd4bcnlisnryzsnhu
« Previous
Showing results 1 — 15 out of 5,185 results