Application of Photoelectric Conversion Technology in Photoelectric Signal Sampling System DOI
Guobin Zhao, Hui Zhao, Jian Zhang

et al.

Archives of Computational Methods in Engineering, Journal Year: 2024, Volume and Issue: unknown

Published: April 30, 2024

Language: Английский

Machine Learning Optimization Techniques: A Survey, Classification, Challenges, and Future Research Issues DOI

Kewei Bian,

Rahul Priyadarshi

Archives of Computational Methods in Engineering, Journal Year: 2024, Volume and Issue: unknown

Published: March 29, 2024

Language: Английский

Citations

32

Research on Image Recognition and Classification Algorithms in Cloud Computing Environment Based on Deep Neural Networks DOI Creative Commons

Zihang Jia

IEEE Access, Journal Year: 2025, Volume and Issue: 13, P. 19728 - 19754

Published: Jan. 1, 2025

Language: Английский

Citations

1

Techniques employed in distributed cognitive radio networks: a survey on routing intelligence DOI
Rahul Priyadarshi, Ravi Kumar, Ying Zhang

et al.

Multimedia Tools and Applications, Journal Year: 2024, Volume and Issue: unknown

Published: April 10, 2024

Language: Английский

Citations

6

Denoising and segmentation in medical image analysis: A comprehensive review on machine learning and deep learning approaches DOI
Ravi Kumar, Rahul Priyadarshi

Multimedia Tools and Applications, Journal Year: 2024, Volume and Issue: unknown

Published: May 17, 2024

Language: Английский

Citations

6

Large Language Models Meet Next-Generation Networking Technologies: A Review DOI Creative Commons
Ching Nam Hang, Pei-Duo Yu, Roberto Morabito

et al.

Future Internet, Journal Year: 2024, Volume and Issue: 16(10), P. 365 - 365

Published: Oct. 7, 2024

The evolution of network technologies has significantly transformed global communication, information sharing, and connectivity. Traditional networks, relying on static configurations manual interventions, face substantial challenges such as complex management, inefficiency, susceptibility to human error. rise artificial intelligence (AI) begun address these issues by automating tasks like configuration, traffic optimization, security enhancements. Despite their potential, integrating AI models in engineering encounters practical obstacles including configurations, heterogeneous infrastructure, unstructured data, dynamic environments. Generative AI, particularly large language (LLMs), represents a promising advancement with capabilities extending natural processing translation, summarization, sentiment analysis. This paper aims provide comprehensive review exploring the transformative role LLMs modern engineering. In particular, it addresses gaps existing literature focusing LLM applications design planning, implementation, analytics, management. It also discusses current research efforts, challenges, future opportunities, aiming guide for networking professionals researchers. main goal is facilitate adoption networking, promoting more efficient, resilient, intelligent systems.

Language: Английский

Citations

5

Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques DOI Creative Commons
P. Chinnasamy,

G. Charles Babu,

Ramesh Kumar Ayyasamy

et al.

Sensors, Journal Year: 2024, Volume and Issue: 24(18), P. 6143 - 6143

Published: Sept. 23, 2024

6G mobile network technology will set new standards to meet performance goals that are too ambitious for 5G networks satisfy. The limitations of have been apparent with the deployment more and networks, which certainly encourages investigation as answer future. This research includes fundamental privacy security issues related technology. Keeping an eye on real-time systems requires secure wireless sensor (WSNs). Denial service (DoS) attacks mark a significant vulnerability WSNs face, they can compromise system whole. proposes novel method in blockchain 6G-based management optimization using machine learning model. In this research, deployed is carried out user datagram transport protocol reinforcement projection regression. Then, completed artificial democratic cuckoo glowworm remora optimization. simulation results based various parameters regarding throughput, energy efficiency, packet delivery ratio, end–end delay, accuracy. order minimise traffic, it also offers capacity determine optimal node path selection data transmission. proposed technique obtained 97% 95% 96% accuracy, 50% 94% ratio.

Language: Английский

Citations

4

Analysis of Mutual Inductance Characteristics of Rectangular Coils Based on Double-Sided Electromagnetic Shielding Technology and Study of the Effects of Positional Misalignment DOI Open Access

Yang Leng,

Derong Luo, Zhongqi Li

et al.

Electronics, Journal Year: 2025, Volume and Issue: 14(1), P. 200 - 200

Published: Jan. 5, 2025

In wireless power transfer systems, the relative positional misalignment between transmitting and receiving coils significantly impacts system’s mutual inductance characteristics, thereby constraining output stability transmission efficiency optimization potential. Hence, accurate formulas for calculating are crucial optimizing coil structures achieving stability. This study focuses on characteristics of rectangular under conditions in a dual-sided electromagnetic shielding environment. Initially, research deduces incident magnetic flux density induced by current through dual Fourier transform vector potential method. Subsequently, Maxwell’s equations boundary employed to analytically examine eddy currents within layer, allowing calculation reflected density. Based these analyses, derives formula using A prototype was built experimental verification. The experiment results show that maximum error measured calculated result is less than 3.8%, which verifies feasibility accuracy proposed Simulations empirical validation demonstrate superior practicality formula. not only offers an innovative technological pathway enhancing systems but also provides solid theoretical foundation guiding framework design optimization.

Language: Английский

Citations

0

RL-EAR: reinforcement learning-based energy-aware routing for software-defined wireless sensor network DOI
Abhishek Narwaria,

Varsha Kumari,

Arka Prokash Mazumdar

et al.

The Journal of Supercomputing, Journal Year: 2025, Volume and Issue: 81(3)

Published: Feb. 12, 2025

Language: Английский

Citations

0

Optimized Transformer- Basde Security for Vehicular Network Communication Against Denial- of - Service Attack DOI

Ramani Gaddam,

Amarendra Kothalanka

Salud Ciencia y Tecnología - Serie de Conferencias, Journal Year: 2025, Volume and Issue: 4, P. 1424 - 1424

Published: Jan. 21, 2025

Objective: A Vehicular Ad-Hoc Network (VANET) is one of the crucial elements an Intelligent Transport System (ITS) and plays a significant role in security communication. VANETs are susceptible to Denial Service (DoS) attacks, which inherent threat performance such networks, requiring more sophisticated detection countermeasures. Methods: In response this problem, Spatial Hyena Security Transformer Model (SHSTM) introduced improve use Ad-hoc communication against DoS attacks. The network nodes set up enable Vehicle-to-Vehicle (V2V) communication; SHSTM constantly detects each node detect filter out attack targets. model includes effective Cluster Head (CH) selection approach based on traffic patterns enhance security.Results: Comparative measurements conducted positions before after attacks show enhanced overall terms Packet Delivery Ratio (PDR), Throughput (NT), Energy Consumption (EC), End-to-End Delay (EED), Attack Detection (ADR). attains NT 3.91 Mbps, minimal EC 1.02 mJ, highest PDR 99.04%, EED 0.0206 seconds, higher ADR 98%. Conclusions: design proposed proved improvement performance, outperforms existing state-of-the-art technique. Hence, it considered potential solution address VANET.

Language: Английский

Citations

0

New Frontiers in Machine Learning Optimization DOI

Pooja Dehankar,

Susanta Das

Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 427 - 454

Published: Jan. 10, 2025

Machine learning (ML) optimization techniques serve as essential for training models to achieve high performance in a diverse areas. This chapter offers thorough summary of machine techniques. analysis the development over time. A number common constraints are also discussed. Developing model that works effectively and provides accurate predictions certain set instances is main objective ML. We require ML accomplish that. The practice modifying hyper parameters with an technique minimize cost function called optimization. Because indicates difference between actual value estimated parameter predicted by model, it crucial reduce it. will provide general explanation workings drawbacks strategies. Numerous advancements have been put forth this chapter.

Language: Английский

Citations

0