Working-Memory 发表于 2025-3-26 23:08:17
Differentiated Services Oriented Auction Mechanism Design for NVM Based Edge Cachingrvers of service provider (SP). Dozens of researches show that this problem can be effectively solved by caching contents on the network edge. However, edge caching still faces some challenges. First, cache capacity requirements and dilemma. Most existing edge devices have small storage capacity, whCROW 发表于 2025-3-27 04:15:33
Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Latti the efficient search of the encrypted data stored in the cloud server and keep the privacy of these data during the search phase. However, there exists an inherent security issue for the typical PEKS schemes that they cannot prevent the inside keywords guessing attack (KGA). Moreover, most PEKS sch驾驶 发表于 2025-3-27 05:46:11
http://reply.papertrans.cn/17/1623/162283/162283_33.pngAPRON 发表于 2025-3-27 09:27:29
Covered Face Recognition Based on Deep Convolution Generative Adversarial Networks It can generate very high quality face pictures, so it plays a very important role in the field of criminal investigation. But during surveillance, suspects often wear face covers, such as glasses, masks, hats and so on. It may affect the machine’s recognition of the face. The traditional method isimpaction 发表于 2025-3-27 16:02:54
An Efficient Method for Generating Matrices of Quantum Logic Circuitsof quantum gates in the quantum circuit, and then the matrix of the quantum circuit is constructed according to the mapping relationship between the truth table and the matrix. A common method is to generate a matrix by using the topological transformation rules of quantum gates, and then multiply tcartilage 发表于 2025-3-27 21:43:35
http://reply.papertrans.cn/17/1623/162283/162283_36.pngbeta-cells 发表于 2025-3-27 23:27:08
A Localization Algorithm Based on Emulating Large Bandwidth with Passive RFID Tagsf low cost, simple deployment and long-distance communication. Most researches use the Received Signal Strength (RSS) of the tag backscattered signal or reference tags to realize localization. Owing to the large fluctuation of RSS and its sensitivity to antenna direction and environment, the localiz消音器 发表于 2025-3-28 04:58:40
An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Networkatency, high reliability, and data security for various application services. The fog computing model newly proposed by researchers in recent years can increase the task processing and data analysis capabilities of network edge devices, so it can reduce the computing load of cloud computing devices诱骗 发表于 2025-3-28 07:52:25
A Research for 2-m Temperature Prediction Based on Machine Learning So this study can be divided into two parts. First of all, contrary to the previous machine learning algorithm with only one machine learning model applied for a vast area, a clustering algorithm is proposed to divide the vast area into multiple areas with different models for forecast correction.cluster 发表于 2025-3-28 11:41:23
A New Scheme for Essential Proteins Identification in Dynamic Weighted Protein-Protein Interaction Nent. With the development of high-throughput proteomics technology, essential protein recognition has become a hot topic and focus of research, there are many computational methods for essential proteins detecting. However, these existing methods are mostly predicted in static PPI networks, ignoring