Filters








166,100 Hits in 5.7 sec

Novel Random Models of Entity Mobility Models and Performance Analysis of Random Entity Mobility Models

2019 Turkish Journal of Electrical Engineering and Computer Sciences  
The reason for the most important problem of this model that is known as Mobile Crowd 6 Sensing (MCS) and allows inferences on the data obtained from its users, lack of data, is the lack of sufficient  ...  To increase the amount of data collected, while users may be incentivized in 8 various ways, the amount and accuracy of the collected data may be increased by developing Random Entity Mobility 9 Models  ...  Mobile Computing. Boston, MA,USA:Springer,1996, pp. 153-181. [31] Camp T, Boleng J, Davies V. A survey of mobility models for ad hoc network research.  ... 
doi:10.3906/elk-1904-102 fatcat:tkgkzptcafegxnzpkywxzjwhwm

Resource Intensification for Mobile Devices Using the Approximate Computing Entities

Dr. Suma V
2020 Journal of Trends in Computer Science and Smart Technology  
So as to improve the performance and the capability of the mobile devices the mobile cloud computing that integrates the mobile devices with the cloud paradigm has emerged as a promising paradigm.  ...  Despites its advantages it still faces many problems due to the load balancing and energy consumption due to its limited battery limited and storage availability as some applications or the video downloading  ...  "Cloud computing provides efficient and flexible tools for lowcost usage when required, mobile apps use the distributed computing model to achieve improved user experience and high performance through  ... 
doi:10.36548/jtcsst.2020.1.003 fatcat:aprg2re2rzbm5lfxbplfjiwqbu

Sensing, tracking and contextualizing entities in ubiquitous computing

Antonio A.F. Loureiro
2012 Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems - MSWiM '12  
. describes how entities move along the time • Depending on the scenario, it can be easier -Mobility models for VANETs are more predictable (entity: vehicle) -Mobility models for social communication can  ...  Challenge: provide useful services 12 Mobility and topology information • Mobility model: 13 Mobility models for social communication • Example: checkins in Foursquare work as social sensors  ...  Self-protect Manual detection and recovery from attacks and cascading failures.  ... 
doi:10.1145/2387238.2387241 dblp:conf/mswim/Loureiro12 fatcat:fcjvzuj3xrh37d3oyp4vsyu72u

MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing

Lei Zhang, Lifei Wei, Dongmei Huang, Kai Zhang, Mianxiong Dong, Kaoru Ota
2016 Security and Communication Networks  
To solve this problem, we propose three secure multi-entities delegated authentication protocols (MEDAPs) in mobile cloud computing, which enables the multiple mobile data owners to authorize a group designated  ...  Since the technology of mobile cloud computing has brought a lot of benefits to information world, many applications in mobile devices based on cloud have emerged and boomed in the last years.  ...  To address the above problems, we build three secure multi-entities delegated authentication protocols (MEDAPs) for mobile cloud computing.  ... 
doi:10.1002/sec.1490 fatcat:pxgqktsyejcl5mqfk2p7vsahue

Chinese Named Entity Recognition Based on Character-Word Vector Fusion

Na Ye, Xin Qin, Lili Dong, Xiang Zhang, Kangkang Sun
2020 Wireless Communications and Mobile Computing  
At present, the pretreatment of the character or word vector models is adopted in the training of the Chinese named entity recognition model.  ...  Aimed at the problems that taking character vector as an input of the neural network cannot use the words' semantic meanings and give up the words' explicit boundary information, and taking the word vector  ...  Acknowledgments This work is supported in part by the Key Science and Technology Program of Xi'an (Grant No. Z20180253) and the Xi'an Science and Technology Innovation Leading Project (Grant No.  ... 
doi:10.1155/2020/8866540 doaj:f5ef6225ca7f422cb214f57da45d3cfd fatcat:3fwtsimpife57atvmntljnjrpm

Motion Planning for Mobile Robots [chapter]

Xiangrong Xu, Yang Yang, Siyu Pan
2018 Advanced Path Planning for Mobile Entities  
This chapter introduces two kinds of motion path planning algorithms for mobile robots or unmanned ground vehicles (UGV).  ...  All the simulation results and the experiments show that two kinds of algorithm are effective for practical use.  ...  Acknowledgements This research is supported in part by Natural Science Foundation of China (NSFC) No. 51405001 and 31300125.  ... 
doi:10.5772/intechopen.76895 fatcat:jvwyxoz3xzbhhowqdszifm6enm

ACE: An Accurate and Efficient Multi-Entity Device-Free WLAN Localization System

Ibrahim Sabek, Moustafa Youssef, Athanasios V. Vasilakos
2015 IEEE Transactions on Mobile Computing  
Previous work in DF WLAN localization focused on the tracking of a single entity due to the intractability of the multi-entity tracking problem whose complexity grows exponentially with the number of humans  ...  In this paper, we introduce ACE: a system that uses a probabilistic energy-minimization framework that combines a conditional random field with a Markov model to capture the temporal and spatial relations  ...  No Yes Multi-entity overhead Low Low Intractable Moderate (F.print) IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL.  ... 
doi:10.1109/tmc.2014.2320265 fatcat:qkt5qi3l4bbedkuatwuigzu6nq

Fusion Deep Learning and Machine Learning for Heterogeneous Military Entity Recognition

Hui Li, Lin Yu, Jie Zhang, Ming Lyu, Liqin Shi
2022 Wireless Communications and Mobile Computing  
This paper applies a BERT-BiLSTM-CRF model fusing deep learning and machine learning to recognize military entities, and thus, we can construct a smart military knowledge base with these entities.  ...  , and BERT-IDCNN-CRF models, respectively.  ...  Although these two models have been improved in character and word feature extraction, they cannot fundamentally 9 Wireless Communications and Mobile Computing overcome the weakness of static word vector  ... 
doi:10.1155/2022/1103022 fatcat:5oyzz42jfbefnarihaagkejfie

The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy

Bo Xie, Guowei Shen, Chun Guo, Yunhe Cui, Zhili Zhou
2021 Wireless Communications and Mobile Computing  
BERT pre-trained model and residual dilation convolutional neural networks (RDCNN) are introduced to learn entity context features, and the conditional random field (CRF) layer is employed as a tag decoder  ...  To tackle this problem, we present a straightforward active learning strategy for cybersecurity entity recognition utilizing deep learning technology.  ...  Acknowledgments This work was supported by the National Natural Science Foundation of China (Grant no. 61802081) and the Science and Technology Project of Guizhou Province (Grant no. [2018]3001).  ... 
doi:10.1155/2021/6629591 fatcat:j4un3cj2tjfntdrnuqd23fhfwu

Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching

Zhou Zhou, Youliang Tian, Changgen Peng, Zhipeng Cai
2021 Wireless Communications and Mobile Computing  
Furthermore, we propose a multiparty entity matching protocol by employing secure multiparty computing to solve the entity alignment problems and a logistic regression algorithm to achieve privacy-preserving  ...  However, the existing aggregation models are too specialized and deal less with users' withdrawal issue. Moreover, protocols for multiparty entity matching are rarely covered.  ...  Mobile Computing .  ... 
doi:10.1155/2021/6692061 fatcat:lepqf3spw5ekzjl3coqpq4meo4

A blockchain-based service for inviolable presence registration of mobile entities

Matheus Leal, Flávia Pisani, Markus Endler
2021 Journal of the Brazilian Computer Society  
AbstractSeveral applications can benefit from recording information about the places a mobile entity visits and the length of time it spends there (e.g., shoppers, employees, buses, portable equipment,  ...  This paper presents our approach to recording spatio-temporal presence information in a secure and inviolable way using a Distributed Ledger Technology.  ...  Acknowledgements The authors thank the reviewers of the 9th Latin-American Symposium on Dependable Computing (LADC 2019) for their feedback and suggestions.  ... 
doi:10.1186/s13173-021-00104-y fatcat:ju34qtkq4jc5hla7746dzurwpy

Joint Extraction of Long-Distance Entity Relation by Aggregating Local- and Semantic-Dependent Features

Xiao Wei, Yongqi Chen, Deepak Kumar Jain
2022 Wireless Communications and Mobile Computing  
In this paper, we propose Long-Distance Feature Aggregation Model (LDFAM), an end-to-end long-distance entity relation joint extraction model, which uses a Bi-GRU and weighted graph neural network to model  ...  Experimental results on NYT and SemEval2010-Task8 datasets show that our model has achieved significant improvements compared to the baseline model.  ...  Acknowledgments This work was supported by the National Key Research and Development Program of China (no. 2018YFB0704400).  ... 
doi:10.1155/2022/3763940 fatcat:qmrqhy5t4rbjhnf4pmh3uuhwie

Named Entity Recognition of Traditional Chinese Medicine Patents Based on BiLSTM-CRF

Na Deng, Hao Fu, Xu Chen, Arun K. Sangaiah
2021 Wireless Communications and Mobile Computing  
Named entity recognition (NER) is a fundamental task in natural language processing and a crucial step before indepth analysis of TCM patent.  ...  TCM patents contain rich medical, legal, and economic information.  ...  Finally, the optimal label sequence is ready for output 4 Wireless Communications and Mobile Computing 5.1. Input Layer.  ... 
doi:10.1155/2021/6696205 fatcat:75gubhmcc5dsvd4mot263zllte

Named Entity Recognition of Ancient Poems Based on Albert-BiLSTM-MHA-CRF Model

Faguo Zhou, Chao Wang, Jipeng Wang, Jiliang Zhang
2022 Wireless Communications and Mobile Computing  
This paper proposes an Albert-BiLSTM-MHA-CRF model for entity extraction in ancient poems.  ...  The experiment is carried out in the corpus of ancient poetry, and the model is compared with Bert-BiLSTM-CRF, BiLSTM-CRF, and CRF model.  ...  Communications and Mobile Computing positions of the entity except the initial position of the entity.  ... 
doi:10.1155/2022/6507719 fatcat:shmkafqcuvavbbb7bdvrsh5j4a

Video Scene Information Detection Based on Entity Recognition

Hui Qian, Mengxuan Dai, Yong Ma, Jiale Zhao, Qinghua Liu, Tao Tao, Shugang Yin, Haipeng Li, Youcheng Zhang, Chi-Hua Chen
2021 Wireless Communications and Mobile Computing  
This model integrates the spatiotemporal relationship between the video subject and object on the basis of entity recognition, so as to realize the recognition of scene information by establishing mapping  ...  In order to solve the problem of transforming pixel information into scene information, this paper proposes a video scene information detection method based on entity recognition.  ...  Wireless Communications and Mobile Computing Since the occurrence of an anomaly in the same entity is an independent event, according to the principle of event independence, the object anomaly probability  ... 
doi:10.1155/2021/1020044 fatcat:qu22j3xlebcxxbkr5rhl7xgmey
« Previous Showing results 1 — 15 out of 166,100 results