A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Novel Random Models of Entity Mobility Models and Performance Analysis of Random Entity Mobility Models
2019
Turkish Journal of Electrical Engineering and Computer Sciences
The reason for the most important problem of this model that is known as Mobile Crowd 6 Sensing (MCS) and allows inferences on the data obtained from its users, lack of data, is the lack of sufficient ...
To increase the amount of data collected, while users may be incentivized in 8 various ways, the amount and accuracy of the collected data may be increased by developing Random Entity Mobility 9 Models ...
Mobile Computing. Boston, MA,USA:Springer,1996, pp. 153-181. [31] Camp T, Boleng J, Davies V. A survey of mobility models for ad hoc network research. ...
doi:10.3906/elk-1904-102
fatcat:tkgkzptcafegxnzpkywxzjwhwm
Resource Intensification for Mobile Devices Using the Approximate Computing Entities
2020
Journal of Trends in Computer Science and Smart Technology
So as to improve the performance and the capability of the mobile devices the mobile cloud computing that integrates the mobile devices with the cloud paradigm has emerged as a promising paradigm. ...
Despites its advantages it still faces many problems due to the load balancing and energy consumption due to its limited battery limited and storage availability as some applications or the video downloading ...
"Cloud computing provides efficient and flexible tools for lowcost usage when required, mobile apps use the distributed computing model to achieve improved user experience and high performance through ...
doi:10.36548/jtcsst.2020.1.003
fatcat:aprg2re2rzbm5lfxbplfjiwqbu
Sensing, tracking and contextualizing entities in ubiquitous computing
2012
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems - MSWiM '12
. describes how entities move along the time • Depending on the scenario, it can be easier -Mobility models for VANETs are more predictable (entity: vehicle) -Mobility models for social communication can ...
Challenge: provide useful services
12
Mobility and topology information
• Mobility model:
13
Mobility models for social
communication
• Example: checkins in Foursquare work as
social sensors ...
Self-protect Manual detection and recovery from attacks and cascading failures. ...
doi:10.1145/2387238.2387241
dblp:conf/mswim/Loureiro12
fatcat:fcjvzuj3xrh37d3oyp4vsyu72u
MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing
2016
Security and Communication Networks
To solve this problem, we propose three secure multi-entities delegated authentication protocols (MEDAPs) in mobile cloud computing, which enables the multiple mobile data owners to authorize a group designated ...
Since the technology of mobile cloud computing has brought a lot of benefits to information world, many applications in mobile devices based on cloud have emerged and boomed in the last years. ...
To address the above problems, we build three secure multi-entities delegated authentication protocols (MEDAPs) for mobile cloud computing. ...
doi:10.1002/sec.1490
fatcat:pxgqktsyejcl5mqfk2p7vsahue
Chinese Named Entity Recognition Based on Character-Word Vector Fusion
2020
Wireless Communications and Mobile Computing
At present, the pretreatment of the character or word vector models is adopted in the training of the Chinese named entity recognition model. ...
Aimed at the problems that taking character vector as an input of the neural network cannot use the words' semantic meanings and give up the words' explicit boundary information, and taking the word vector ...
Acknowledgments This work is supported in part by the Key Science and Technology Program of Xi'an (Grant No. Z20180253) and the Xi'an Science and Technology Innovation Leading Project (Grant No. ...
doi:10.1155/2020/8866540
doaj:f5ef6225ca7f422cb214f57da45d3cfd
fatcat:3fwtsimpife57atvmntljnjrpm
Motion Planning for Mobile Robots
[chapter]
2018
Advanced Path Planning for Mobile Entities
This chapter introduces two kinds of motion path planning algorithms for mobile robots or unmanned ground vehicles (UGV). ...
All the simulation results and the experiments show that two kinds of algorithm are effective for practical use. ...
Acknowledgements This research is supported in part by Natural Science Foundation of China (NSFC) No. 51405001 and 31300125. ...
doi:10.5772/intechopen.76895
fatcat:jvwyxoz3xzbhhowqdszifm6enm
ACE: An Accurate and Efficient Multi-Entity Device-Free WLAN Localization System
2015
IEEE Transactions on Mobile Computing
Previous work in DF WLAN localization focused on the tracking of a single entity due to the intractability of the multi-entity tracking problem whose complexity grows exponentially with the number of humans ...
In this paper, we introduce ACE: a system that uses a probabilistic energy-minimization framework that combines a conditional random field with a Markov model to capture the temporal and spatial relations ...
No
Yes
Multi-entity overhead
Low
Low
Intractable
Moderate (F.print)
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. ...
doi:10.1109/tmc.2014.2320265
fatcat:qkt5qi3l4bbedkuatwuigzu6nq
Fusion Deep Learning and Machine Learning for Heterogeneous Military Entity Recognition
2022
Wireless Communications and Mobile Computing
This paper applies a BERT-BiLSTM-CRF model fusing deep learning and machine learning to recognize military entities, and thus, we can construct a smart military knowledge base with these entities. ...
, and BERT-IDCNN-CRF models, respectively. ...
Although these two models have been improved in character and word feature extraction, they cannot fundamentally 9 Wireless Communications and Mobile Computing overcome the weakness of static word vector ...
doi:10.1155/2022/1103022
fatcat:5oyzz42jfbefnarihaagkejfie
The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy
2021
Wireless Communications and Mobile Computing
BERT pre-trained model and residual dilation convolutional neural networks (RDCNN) are introduced to learn entity context features, and the conditional random field (CRF) layer is employed as a tag decoder ...
To tackle this problem, we present a straightforward active learning strategy for cybersecurity entity recognition utilizing deep learning technology. ...
Acknowledgments This work was supported by the National Natural Science Foundation of China (Grant no. 61802081) and the Science and Technology Project of Guizhou Province (Grant no. [2018]3001). ...
doi:10.1155/2021/6629591
fatcat:j4un3cj2tjfntdrnuqd23fhfwu
Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching
2021
Wireless Communications and Mobile Computing
Furthermore, we propose a multiparty entity matching protocol by employing secure multiparty computing to solve the entity alignment problems and a logistic regression algorithm to achieve privacy-preserving ...
However, the existing aggregation models are too specialized and deal less with users' withdrawal issue. Moreover, protocols for multiparty entity matching are rarely covered. ...
Mobile Computing
. ...
doi:10.1155/2021/6692061
fatcat:lepqf3spw5ekzjl3coqpq4meo4
A blockchain-based service for inviolable presence registration of mobile entities
2021
Journal of the Brazilian Computer Society
AbstractSeveral applications can benefit from recording information about the places a mobile entity visits and the length of time it spends there (e.g., shoppers, employees, buses, portable equipment, ...
This paper presents our approach to recording spatio-temporal presence information in a secure and inviolable way using a Distributed Ledger Technology. ...
Acknowledgements The authors thank the reviewers of the 9th Latin-American Symposium on Dependable Computing (LADC 2019) for their feedback and suggestions. ...
doi:10.1186/s13173-021-00104-y
fatcat:ju34qtkq4jc5hla7746dzurwpy
Joint Extraction of Long-Distance Entity Relation by Aggregating Local- and Semantic-Dependent Features
2022
Wireless Communications and Mobile Computing
In this paper, we propose Long-Distance Feature Aggregation Model (LDFAM), an end-to-end long-distance entity relation joint extraction model, which uses a Bi-GRU and weighted graph neural network to model ...
Experimental results on NYT and SemEval2010-Task8 datasets show that our model has achieved significant improvements compared to the baseline model. ...
Acknowledgments This work was supported by the National Key Research and Development Program of China (no. 2018YFB0704400). ...
doi:10.1155/2022/3763940
fatcat:qmrqhy5t4rbjhnf4pmh3uuhwie
Named Entity Recognition of Traditional Chinese Medicine Patents Based on BiLSTM-CRF
2021
Wireless Communications and Mobile Computing
Named entity recognition (NER) is a fundamental task in natural language processing and a crucial step before indepth analysis of TCM patent. ...
TCM patents contain rich medical, legal, and economic information. ...
Finally, the optimal label sequence is ready for output 4 Wireless Communications and Mobile Computing 5.1. Input Layer. ...
doi:10.1155/2021/6696205
fatcat:75gubhmcc5dsvd4mot263zllte
Named Entity Recognition of Ancient Poems Based on Albert-BiLSTM-MHA-CRF Model
2022
Wireless Communications and Mobile Computing
This paper proposes an Albert-BiLSTM-MHA-CRF model for entity extraction in ancient poems. ...
The experiment is carried out in the corpus of ancient poetry, and the model is compared with Bert-BiLSTM-CRF, BiLSTM-CRF, and CRF model. ...
Communications and Mobile Computing positions of the entity except the initial position of the entity. ...
doi:10.1155/2022/6507719
fatcat:shmkafqcuvavbbb7bdvrsh5j4a
Video Scene Information Detection Based on Entity Recognition
2021
Wireless Communications and Mobile Computing
This model integrates the spatiotemporal relationship between the video subject and object on the basis of entity recognition, so as to realize the recognition of scene information by establishing mapping ...
In order to solve the problem of transforming pixel information into scene information, this paper proposes a video scene information detection method based on entity recognition. ...
Wireless Communications and Mobile Computing Since the occurrence of an anomaly in the same entity is an independent event, according to the principle of event independence, the object anomaly probability ...
doi:10.1155/2021/1020044
fatcat:qu22j3xlebcxxbkr5rhl7xgmey
« Previous
Showing results 1 — 15 out of 166,100 results