Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (109)
  • Open Access

    ARTICLE

    A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing

    Yong Ma1, Han Zhao2, Kunyin Guo3,*, Yunni Xia3,*, Xu Wang4, Xianhua Niu5, Dongge Zhu6, Yumin Dong7

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 907-927, 2024, DOI:10.32604/cmes.2024.048759

    Abstract Mobile Edge Computing (MEC) is a technology designed for the on-demand provisioning of computing and storage services, strategically positioned close to users. In the MEC environment, frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery, ultimately enhancing the quality of the user experience. However, due to the typical placement of edge devices and nodes at the network’s periphery, these components may face various potential fault tolerance challenges, including network instability, device failures, and resource constraints. Considering the dynamic nature of MEC, making high-quality content caching decisions… More >

  • Open Access

    ARTICLE

    RL and AHP-Based Multi-Timescale Multi-Clock Source Time Synchronization for Distribution Power Internet of Things

    Jiangang Lu, Ruifeng Zhao*, Zhiwen Yu, Yue Dai, Kaiwen Zeng

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4453-4469, 2024, DOI:10.32604/cmc.2024.048020

    Abstract Time synchronization (TS) is crucial for ensuring the secure and reliable functioning of the distribution power Internet of Things (IoT). Multi-clock source time synchronization (MTS) has significant advantages of high reliability and accuracy but still faces challenges such as optimization of the multi-clock source selection and the clock source weight calculation at different timescales, and the coupling of synchronization latency jitter and pulse phase difference. In this paper, the multi-timescale MTS model is conducted, and the reinforcement learning (RL) and analytic hierarchy process (AHP)-based multi-timescale MTS algorithm is designed to improve the weighted summation of More >

  • Open Access

    ARTICLE

    A Deep Reinforcement Learning-Based Technique for Optimal Power Allocation in Multiple Access Communications

    Sepehr Soltani1, Ehsan Ghafourian2, Reza Salehi3, Diego Martín3,*, Milad Vahidi4

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 93-108, 2024, DOI:10.32604/iasc.2024.042693

    Abstract For many years, researchers have explored power allocation (PA) algorithms driven by models in wireless networks where multiple-user communications with interference are present. Nowadays, data-driven machine learning methods have become quite popular in analyzing wireless communication systems, which among them deep reinforcement learning (DRL) has a significant role in solving optimization issues under certain constraints. To this purpose, in this paper, we investigate the PA problem in a -user multiple access channels (MAC), where transmitters (e.g., mobile users) aim to send an independent message to a common receiver (e.g., base station) through wireless channels. To… More >

  • Open Access

    ARTICLE

    Enhancing Image Description Generation through Deep Reinforcement Learning: Fusing Multiple Visual Features and Reward Mechanisms

    Yan Li, Qiyuan Wang*, Kaidi Jia

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2469-2489, 2024, DOI:10.32604/cmc.2024.047822

    Abstract Image description task is the intersection of computer vision and natural language processing, and it has important prospects, including helping computers understand images and obtaining information for the visually impaired. This study presents an innovative approach employing deep reinforcement learning to enhance the accuracy of natural language descriptions of images. Our method focuses on refining the reward function in deep reinforcement learning, facilitating the generation of precise descriptions by aligning visual and textual features more closely. Our approach comprises three key architectures. Firstly, it utilizes Residual Network 101 (ResNet-101) and Faster Region-based Convolutional Neural Network… More >

  • Open Access

    ARTICLE

    Role Dynamic Allocation of Human-Robot Cooperation Based on Reinforcement Learning in an Installation of Curtain Wall

    Zhiguang Liu1, Shilin Wang1, Jian Zhao1,*, Jianhong Hao2, Fei Yu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 473-487, 2024, DOI:10.32604/cmes.2023.029729

    Abstract A real-time adaptive roles allocation method based on reinforcement learning is proposed to improve human-robot cooperation performance for a curtain wall installation task. This method breaks the traditional idea that the robot is regarded as the follower or only adjusts the leader and the follower in cooperation. In this paper, a self-learning method is proposed which can dynamically adapt and continuously adjust the initiative weight of the robot according to the change of the task. Firstly, the physical human-robot cooperation model, including the role factor is built. Then, a reinforcement learning model that can adjust… More > Graphic Abstract

    Role Dynamic Allocation of Human-Robot Cooperation Based on Reinforcement Learning in an Installation of Curtain Wall

  • Open Access

    ARTICLE

    Research on the Application of Reinforcement Learning Model in Vocational Education System

    Fei Xue*

    Journal on Artificial Intelligence, Vol.5, pp. 131-143, 2023, DOI:10.32604/jai.2023.046293

    Abstract Vocational education can effectively improve the vocational skills of employees, improve people’s traditional concept of vocational education, and focus on the training of vocational skills for students by using new educational methods and concepts, so that they can master key vocational skills and develop key abilities. In this paper, three different learning models, Deep Knowledge Tracing (DKT), Dynamic Key-Value Memory Networks (DKVMN) and Double Deep Q-network (DDQN), are used to evaluate the indicators in the vocational education system. On the one hand, the influence of learning degree on the performance of the model is compared, More >

  • Open Access

    ARTICLE

    Multi-Versus Optimization with Deep Reinforcement Learning Enabled Affect Analysis on Arabic Corpus

    Mesfer Al Duhayyim1,*, Badriyya B. Al-onazi2, Jaber S. Alzahrani3, Hussain Alshahrani4, Mohamed Ahmed Elfaki4, Abdullah Mohamed5, Ishfaq Yaseen6, Gouse Pasha Mohammed6, Mohammed Rizwanullah6, Abu Sarwar Zamani6

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3049-3065, 2023, DOI:10.32604/csse.2023.033836

    Abstract Sentiment analysis (SA) of the Arabic language becomes important despite scarce annotated corpora and confined sources. Arabic affect Analysis has become an active research zone nowadays. But still, the Arabic language lags behind adequate language sources for enabling the SA tasks. Thus, Arabic still faces challenges in natural language processing (NLP) tasks because of its structure complexities, history, and distinct cultures. It has gained lesser effort than the other languages. This paper developed a Multi-versus Optimization with Deep Reinforcement Learning Enabled Affect Analysis (MVODRL-AA) on Arabic Corpus. The presented MVODRL-AA model majorly concentrates on identifying… More >

  • Open Access

    ARTICLE

    An Intelligent Algorithm for Solving Weapon-Target Assignment Problem: DDPG-DNPE Algorithm

    Tengda Li, Gang Wang, Qiang Fu*, Xiangke Guo, Minrui Zhao, Xiangyu Liu

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3499-3522, 2023, DOI:10.32604/cmc.2023.041253

    Abstract Aiming at the problems of traditional dynamic weapon-target assignment algorithms in command decision-making, such as large computational amount, slow solution speed, and low calculation accuracy, combined with deep reinforcement learning theory, an improved Deep Deterministic Policy Gradient algorithm with dual noise and prioritized experience replay is proposed, which uses a double noise mechanism to expand the search range of the action, and introduces a priority experience playback mechanism to effectively achieve data utilization. Finally, the algorithm is simulated and validated on the ground-to-air countermeasures digital battlefield. The results of the experiment show that, under the… More >

  • Open Access

    ARTICLE

    Multi-Agent Deep Reinforcement Learning for Efficient Computation Offloading in Mobile Edge Computing

    Tianzhe Jiao, Xiaoyue Feng, Chaopeng Guo, Dongqi Wang, Jie Song*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3585-3603, 2023, DOI:10.32604/cmc.2023.040068

    Abstract Mobile-edge computing (MEC) is a promising technology for the fifth-generation (5G) and sixth-generation (6G) architectures, which provides resourceful computing capabilities for Internet of Things (IoT) devices, such as virtual reality, mobile devices, and smart cities. In general, these IoT applications always bring higher energy consumption than traditional applications, which are usually energy-constrained. To provide persistent energy, many references have studied the offloading problem to save energy consumption. However, the dynamic environment dramatically increases the optimization difficulty of the offloading decision. In this paper, we aim to minimize the energy consumption of the entire MEC system… More >

  • Open Access

    ARTICLE

    Dynamic Security SFC Branching Path Selection Using Deep Reinforcement Learning

    Shuangxing Deng, Man Li*, Huachun Zhou

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2919-2939, 2023, DOI:10.32604/iasc.2023.039985

    Abstract Security service function chaining (SFC) based on software-defined networking (SDN) and network function virtualization (NFV) technology allows traffic to be forwarded sequentially among different security service functions to achieve a combination of security functions. Security SFC can be deployed according to requirements, but the current SFC is not flexible enough and lacks an effective feedback mechanism. The SFC is not traffic aware and the changes of traffic may cause the previously deployed security SFC to be invalid. How to establish a closed-loop mechanism to enhance the adaptive capability of the security SFC to malicious traffic… More >

Displaying 21-30 on page 3 of 109. Per Page