Search
Now showing items 1-6 of 6
DLRT: Deep learning approach for reliable diabetic treatment
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today, instead of physically utilizing syringes for infusing insulin, a patient can utilize a gadget, for example, a Wireless Insulin ...
Intelligent Task Offloading and Energy Allocation in the UAV-Aided Mobile Edge-Cloud Continuum
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The arrival of big data and the Internet of Things (IoT) era greatly promotes innovative in-network computing techniques, where the edge-cloud continuum becomes a feasible paradigm in handling multi-dimensional resources ...
Fault diagnosis based on deep learning for current-carrying ring of catenary system in sustainable railway transportation
(
Elsevier Ltd
, 2021 , Article)
In the intelligent traffic transportation, the security and stability are vital for the sustainable transportation and efficient logistics. The fault diagnosis on the catenary system is crucial for the railway transportation. ...
A deep learning-based approach for fault diagnosis of current-carrying ring in catenary system
(
Springer Science and Business Media Deutschland GmbH
, 2021 , Article)
In the Industrial Internet of Things, the deep learning-based methods are used to help solve various problems. The current-carrying ring as one of important components on the catenary system which is always small in the ...
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
5G wireless network technology will not only significantly increase bandwidth but also introduce new features such as mMTC and URLLC. However, high request latency will remain a challenging problem even with 5G due to the ...
A deep learning based static taint analysis approach for IoT software vulnerability location
(
Elsevier B.V.
, 2020 , Article)
Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of ...