Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    Residential Energy Consumption Forecasting Based on Federated Reinforcement Learning with Data Privacy Protection

    You Lu1,2,#,*, Linqian Cui1,2,#,*, Yunzhe Wang1,2, Jiacheng Sun1,2, Lanhui Liu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 717-732, 2023, DOI:10.32604/cmes.2023.027032

    Abstract Most studies have conducted experiments on predicting energy consumption by integrating data for model training. However, the process of centralizing data can cause problems of data leakage. Meanwhile, many laws and regulations on data security and privacy have been enacted, making it difficult to centralize data, which can lead to a data silo problem. Thus, to train the model while maintaining user privacy, we adopt a federated learning framework. However, in all classical federated learning frameworks secure aggregation, the Federated Averaging (FedAvg) method is used to directly weight the model parameters on average, which may have an adverse effect on… More >

  • Open Access

    ARTICLE

    An Intelligent Admission Control Scheme for Dynamic Slice Handover Policy in 5G Network Slicing

    Ratih Hikmah Puspita1, Jehad Ali1,*, Byeong-hee Roh2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4611-4631, 2023, DOI:10.32604/cmc.2023.033598

    Abstract 5G use cases, for example enhanced mobile broadband (eMBB), massive machine-type communications (mMTC), and an ultra-reliable low latency communication (URLLC), need a network architecture capable of sustaining stringent latency and bandwidth requirements; thus, it should be extremely flexible and dynamic. Slicing enables service providers to develop various network slice architectures. As users travel from one coverage region to another area, the call must be routed to a slice that meets the same or different expectations. This research aims to develop and evaluate an algorithm to make handover decisions appearing in 5G sliced networks. Rules of thumb which indicates the accuracy… More >

  • Open Access

    ARTICLE

    Bayes-Q-Learning Algorithm in Edge Computing for Waste Tracking

    D. Palanikkumar1, R. Ramesh Kumar2, Mehedi Masud3, Mrim M. Alnfiai4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2425-2440, 2023, DOI:10.32604/iasc.2023.033879

    Abstract The major environmental hazard in this pandemic is the unhygienic disposal of medical waste. Medical wastage is not properly managed it will become a hazard to the environment and humans. Managing medical wastage is a major issue in the city, municipalities in the aspects of the environment, and logistics. An efficient supply chain with edge computing technology is used in managing medical waste. The supply chain operations include processing of waste collection, transportation, and disposal of waste. Many research works have been applied to improve the management of wastage. The main issues in the existing techniques are ineffective and expensive… More >

  • Open Access

    ARTICLE

    Reinforcement Learning-Based Handover Scheme with Neighbor Beacon Frame Transmission

    Youngjun Kim1, Taekook Kim2, Hyungoo Choi1, Jinwoo Park1, Yeunwoong Kyung3,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 193-204, 2023, DOI:10.32604/iasc.2023.032784

    Abstract Mobility support to change the connection from one access point (AP) to the next (i.e., handover) becomes one of the important issues in IEEE 802.11 wireless local area networks (WLANs). During handover, the channel scanning procedure, which aims to collect neighbor AP (NAP) information on all available channels, accounts for most of the delay time. To reduce the channel scanning procedure, a neighbor beacon frame transmission scheme (N-BTS) was proposed for a seamless handover. N-BTS can provide a seamless handover by removing the channel scanning procedure. However, N-BTS always requires operating overhead even if there are few mobile stations (MSs)… More >

  • Open Access

    ARTICLE

    Q-Learning-Based Pesticide Contamination Prediction in Vegetables and Fruits

    Kandasamy Sellamuthu*, Vishnu Kumar Kaliappan

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 715-736, 2023, DOI:10.32604/csse.2023.029017

    Abstract Pesticides have become more necessary in modern agricultural production. However, these pesticides have an unforeseeable long-term impact on people's wellbeing as well as the ecosystem. Due to a shortage of basic pesticide exposure awareness, farmers typically utilize pesticides extremely close to harvesting. Pesticide residues within foods, particularly fruits as well as veggies, are a significant issue among farmers, merchants, and particularly consumers. The residual concentrations were far lower than these maximal allowable limits, with only a few surpassing the restrictions for such pesticides in food. There is an obligation to provide a warning about this amount of pesticide use in… More >

  • Open Access

    ARTICLE

    QL-CBR Hybrid Approach for Adapting Context-Aware Services

    Somia Belaidouni1,2, Moeiz Miraoui3,4,*, Chakib Tadj1

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1085-1098, 2022, DOI:10.32604/csse.2022.024056

    Abstract A context-aware service in a smart environment aims to supply services according to user situational information, which changes dynamically. Most existing context-aware systems provide context-aware services based on supervised algorithms. Reinforcement algorithms are another type of machine-learning algorithm that have been shown to be useful in dynamic environments through trial-and-error interactions. They also have the ability to build excellent self-adaptive systems. In this study, we aim to incorporate reinforcement algorithms (Q-learning) into a context-aware system to provide relevant services based on a user’s dynamic context. To accelerate the convergence of reinforcement learning (RL) algorithms and provide the correct services in… More >

  • Open Access

    ARTICLE

    Deep Q-Learning Based Optimal Query Routing Approach for Unstructured P2P Network

    Mohammad Shoab, Abdullah Shawan Alotaibi*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5765-5781, 2022, DOI:10.32604/cmc.2022.021941

    Abstract Deep Reinforcement Learning (DRL) is a class of Machine Learning (ML) that combines Deep Learning with Reinforcement Learning and provides a framework by which a system can learn from its previous actions in an environment to select its efforts in the future efficiently. DRL has been used in many application fields, including games, robots, networks, etc. for creating autonomous systems that improve themselves with experience. It is well acknowledged that DRL is well suited to solve optimization problems in distributed systems in general and network routing especially. Therefore, a novel query routing approach called Deep Reinforcement Learning based Route Selection… More >

  • Open Access

    ARTICLE

    Data-Driven Self-Learning Controller for Power-Aware Mobile Monitoring IoT Devices

    Michal Prauzek*, Tereza Paterova, Jaromir Konecny, Radek Martinek

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2601-2618, 2022, DOI:10.32604/cmc.2022.019705

    Abstract Nowadays, there is a significant need for maintenance free modern Internet of things (IoT) devices which can monitor an environment. IoT devices such as these are mobile embedded devices which provide data to the internet via Low Power Wide Area Network (LPWAN). LPWAN is a promising communications technology which allows machine to machine (M2M) communication and is suitable for small mobile embedded devices. The paper presents a novel data-driven self-learning (DDSL) controller algorithm which is dedicated to controlling small mobile maintenance-free embedded IoT devices. The DDSL algorithm is based on a modified Q-learning algorithm which allows energy efficient data-driven behavior… More >

  • Open Access

    ARTICLE

    Q-Learning Based Routing Protocol for Congestion Avoidance

    Daniel Godfrey1, Beom-Su Kim1, Haoran Miao1, Babar Shah2, Bashir Hayat3, Imran Khan4, Tae-Eung Sung5, Ki-Il Kim1,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3671-3692, 2021, DOI:10.32604/cmc.2021.017475

    Abstract The end-to-end delay in a wired network is strongly dependent on congestion on intermediate nodes. Among lots of feasible approaches to avoid congestion efficiently, congestion-aware routing protocols tend to search for an uncongested path toward the destination through rule-based approaches in reactive/incident-driven and distributed methods. However, these previous approaches have a problem accommodating the changing network environments in autonomous and self-adaptive operations dynamically. To overcome this drawback, we present a new congestion-aware routing protocol based on a Q-learning algorithm in software-defined networks where logically centralized network operation enables intelligent control and management of network resources. In a proposed routing protocol,… More >

  • Open Access

    ARTICLE

    Collision Observation-Based Optimization of Low-Power and Lossy IoT Network Using Reinforcement Learning

    Arslan Musaddiq1, Rashid Ali2, Jin-Ghoo Choi1, Byung-Seo Kim3,*, Sung-Won Kim1

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 799-814, 2021, DOI:10.32604/cmc.2021.014751

    Abstract The Internet of Things (IoT) has numerous applications in every domain, e.g., smart cities to provide intelligent services to sustainable cities. The next-generation of IoT networks is expected to be densely deployed in a resource-constrained and lossy environment. The densely deployed nodes producing radically heterogeneous traffic pattern causes congestion and collision in the network. At the medium access control (MAC) layer, mitigating channel collision is still one of the main challenges of future IoT networks. Similarly, the standardized network layer uses a ranking mechanism based on hop-counts and expected transmission counts (ETX), which often does not adapt to the dynamic… More >

Displaying 1-10 on page 1 of 12. Per Page  

Share Link