AI / CS Integration Theory Of Computer Science ×

Showing 35 of 35 papers in Integration Theory Of Computer Science

Unraveling the Black Box of Neural Networks: A Dynamic Extremum Mapper

Shengjian Chen, Shengjian Chen
2025-10-13 ChinaXiv: chinaxiv-202510.00066 Original EN

We point out that neural networks are not black boxes, and their generalization stems from the ability to dynamically map a dataset to the extrema of the model function. We further prove that the number of extrema in a neural network is positively correlated with the number of its parameters. We the…

Central Intelligent Drug: Design of a Multi-Agent-Based End-to-End Drug Design and Delivery System

Tian Zihan, Tian Zihan
2025-08-15 ChinaXiv: chinaxiv-202508.00231 Mixed Source

[Objective] To address the "technical silo" issue in the full drug discovery and development pipeline, where target screening, molecular design, efficacy evaluation, and clinical translation rely on isolated models and lack a lightweight end-to-end integrated framework. [Methods] Based on the AutoGe…

Unraveling the Black-box Magic: An Analysis of Neural Networks’ Dynamic Local Extrema

Shengjian Chen, Shengjian Chen
2025-07-08 ChinaXiv: chinaxiv-202507.00082 Original EN

We point out that neural networks are not black boxes, and their generalization stems from the ability to dynamically map a dataset to the local extrema of the model function. We further prove that the number of local extrema in a neural network is positively correlated with the number of its parame…

Postprint: A Study on Customer-Value-Aware Time-Dependent Route Optimization Methods for Collaborative Truck-Drone Delivery

WEN Tingxin, Lü Yanhua
2022-05-18 ChinaXiv: chinaxiv-202205.00131

To address the problems of low delivery timeliness and poor customer value in the logistics industry resulting from increasing vehicle ownership and escalating traffic congestion, this study proposes a time-varying routing optimization method for truck-drone collaborative delivery, comprehensively c…

Multi-Depot Vehicle Routing Optimization Based on End-to-end Deep Reinforcement Learning (Postprint)

Lei Kun, Guo Peng, Wang Qixin, Zhao Wenchao, Tang Liansheng
2022-05-18 ChinaXiv: chinaxiv-202205.00136

To enhance the solution efficiency for the Multi-Depot Vehicle Routing Problem (MDVRP), we propose an end-to-end deep reinforcement learning framework. First, MDVRP is formulated as a Markov Decision Process (MDP), encompassing definitions of state, action, and reward. Additionally, we propose an im…

Postprint: WSI-Based Classification of Breast Pathology Subtypes

Chen Jinling, Li Jie, Zhao Chengming, Liu Xin
2022-05-11 ChinaXiv: chinaxiv-202205.00047

To achieve accurate classification of breast pathology WSI images, we propose a gated convolutional neural network classification method based on hybrid connections. A hybrid module incorporating local residual connections and global dense connections is constructed, with squeeze-and-excitation gate…

Network Terminal-Supported NDN Mobility Management Mechanism Postprint

Li Zhuo, Mao Yachun, Luo Peng, Ma Tianxiang, Zhao Jianli
2022-05-10 ChinaXiv: chinaxiv-202205.00059

Named Data Networking (NDN), as a novel Internet architecture, aims to address the ever-increasing data traffic. Based on its consumer-driven content retrieval model, NDN naturally supports consumer mobility. However, producer mobility remains a challenging problem, requiring additional mechanisms t…

Mobile Crowdsensing Task Recommendation Based on Spatiotemporal Information and Task Popularity Analysis: Postprint

Yang Guisong, Wang Jingru, Li Jun, He Xingyu
2022-05-10 ChinaXiv: chinaxiv-202205.00061

Existing mobile crowdsensing task recommendation methods share common drawbacks: on one hand, they fail to fully consider the impact of spatio-temporal information on worker preferences, resulting in low recommendation accuracy; on the other hand, they ignore the influence of task popularity on reco…

Intent-Based IoT Service Description and Discovery Postprint

Liu Xingyu, Jiang Lingyun
2022-05-10 ChinaXiv: chinaxiv-202205.00063

In the IoT service discovery process, users typically express their requirements through their own intentions, whereas service descriptions constitute explanations of service functionalities; consequently, mismatches between these two elements impact the accuracy of service discovery. Simultaneously…

Postprint: A Survey on Hyperledger Applications in IoT from a Reconstructed Graph Perspective

Leng Zeqi, Wang Kunhao, Liang Wei, Zheng Yuefeng
2022-05-10 ChinaXiv: chinaxiv-202205.00067

In deploying blockchain-based IoT applications, technical obstacles have emerged, including lack of fine-grained privacy protection, low transaction processing efficiency, high latency, and insufficient flexibility and dynamism. To further advance the popularization and practical deployment of block…

Postprint of Improved Optical Flow Matching Algorithm Integrating IMU for Motion Blur Removal

Luan Xiaozhen, Wei Guoliang, Cai Jie
2022-05-10 ChinaXiv: chinaxiv-202205.00070

To further improve the accuracy and speed of optical flow matching in visual SLAM, this paper proposes an improved optical flow matching algorithm that integrates Inertial Measurement Unit (IMU) information to remove motion blur. The algorithm first employs a point spread function computed from IMU …

Deep Reinforcement Learning-Based Stochastic Resource-Constrained Multi-Project Dynamic Scheduling Strategy Postprint

Guo Xiaojian, Hu Fangyong
2022-05-10 ChinaXiv: chinaxiv-202205.00080

Currently, research on the Stochastic Duration Distributed Resource-Constrained Multi-Project Scheduling Problem (SDRCMPSP) is scarce, with most studies focusing on static scheduling schemes that cannot adjust and optimize strategies in real-time in response to environmental changes or promptly addr…

<PARA id="1">Postprint: An Implicit Deep Collaborative Recommendation Model Integrating Propositional Logic and Neural Networks</PARA>

Chen Bang, Wu Maonian, Zhu Shaojun, Zheng Bo, Peng Wei
2022-05-10 ChinaXiv: chinaxiv-202205.00081

With the goal of enhancing the cognitive reasoning capability of recommendation algorithm models and overcoming the current limitation where traditional recommendation algorithms heavily rely on data quality, resulting in constrained performance, we propose an implicit deep collaborative recommendat…

Postprint of Research on Local Directed Acyclic Graph Blockchain in Wireless Internet of Things

Yang Changlin, Wang Jiguang, Wangqing
2022-05-10 ChinaXiv: chinaxiv-202205.00082

To reduce data storage requirements and transmission overhead in wireless Internet of Things (IoT), a local directed acyclic graph blockchain scheme (LDB) based on directed acyclic graph (DAG) is proposed. This scheme addresses node storage constraints and transmission overhead by enabling wireless …

Postprint: Joint Side and Main Path Decoding Feature Learning Method for Multiple Description Coding Image Enhancement

Zhao Lijun, Cao Congying, ZHANG Jinjing, Bai Huihui, Zhao Yao, Wang Anhong
2022-05-10 ChinaXiv: chinaxiv-202205.00084

We propose a multi-description coding image enhancement method based on joint side and central decoding feature learning, which simultaneously considers both side decoding image enhancement and central decoding image enhancement, thereby enabling better network training through joint optimization of…

Postprint: Salient Object Detection with Deep Reuse of Multi-Scale Features

Zhou Zhiping, Fan Bin, fir, Xu Wencheng
2022-04-07 ChinaXiv: chinaxiv-202204.00036

To address the limitations of conventional salient object detection methods in detecting multiple salient objects at different scales, we propose a salient object detection algorithm based on deep reuse of multi-scale features. The network model consists of vertically stacked bidirectional dense fea…

Postprint: Mobile Crowdsensing Task Allocation Method Based on Data Redundancy Control

He Xingyu, Zhao Dan, Yang Guisong, Jin Ziri, Yangkailong Qin, Wang Qipei
2022-04-07 ChinaXiv: chinaxiv-202204.00042

In mobile crowdsensing systems, tasks exhibit spatiotemporal coverage overlap, which may lead to redundant data collection and consequently cause data redundancy issues. To address this, we propose a task allocation method that can simultaneously control both intra-task and inter-task data redundanc…

A Survey on Relay-Assisted Computation Offloading Methods in Mobile Edge Computing: Postprint

Chen Che, Zheng Yifeng, Yang Jingmin, Xie Lingfu, Wenjie Zhang
2022-04-07 ChinaXiv: chinaxiv-202204.00044

To address the challenges of next-generation networks in coverage, deployment cost, and capacity, Mobile Edge Computing (MEC) often necessitates the assistance of relay nodes to execute computation-intensive and delay-sensitive tasks. This paper first introduces the fundamental architecture of relay…

An Improved Warning Propagation Algorithm for Solving Max-SAT Problems (Postprint)

Wu Yuxiang, Wang Xiaofeng, Ding Hongsheng, Yu Zhuo
2022-04-07 ChinaXiv: chinaxiv-202204.00054

Max-SAT is the optimization version of the SAT problem, with the objective of finding a variable assignment that maximizes the number of satisfied clauses in a given clause set. This problem is typically NP-hard. With the in-depth development of big data and artificial intelligence, existing algorit…

A Study on the Greedy Repair Strategy for Particle Swarm Optimization in the Discounted {0-1} Knapsack Problem (Postprint)

Dai Zuhua, Zhou Bin, Long Yujing, Wang Zongquan
2022-04-07 ChinaXiv: chinaxiv-202204.00059

When swarm intelligence heuristic algorithms solve the Discounted {0-1} Knapsack Problem (D{0-1}KP), some repair and optimization strategy is required to transform abnormal encoding individuals into encoding individuals that satisfy the solution constraints, in order to improve solution efficiency a…

Postprint: Achieving Location Privacy Protection through Local Differential Privacy under K-Anonymity

Liu Zhenpeng, Miao Dewei, Liu Qiannan, Li Ruilin, Li Xiaofei
2022-04-07 ChinaXiv: chinaxiv-202204.00066

To address the issue of attackers exploiting background knowledge and other information to launch attacks during user location privacy protection, this paper proposes a location privacy protection method for mobile terminals. The scheme leverages k-anonymity and local differential privacy techniques…

Postprint of Adversarial Training Method for Graph Convolutional Neural Networks Based on Non-Robust Features

Chengqi, Zhu Hongliang, Xin Yang
2022-04-07 ChinaXiv: chinaxiv-202204.00067

Graph Convolutional Networks (GCNs) can extract effective information from graph data through graph convolutions, but they are vulnerable to adversarial attacks that degrade model performance. While adversarial training can enhance neural network robustness, the discrete nature of graph structures a…

Multi-Objective Optimization for Vehicle Following Based on Joint Lateral and Longitudinal Control: Postprint

Li Mengfan, Qin Wenhu, Cloud China
2022-04-07 ChinaXiv: chinaxiv-202204.00083

To address issues such as poor car-following stability, ineffective tracking, or unsafe conditions caused by significant speed fluctuations of vehicles in congested environments, a multi-objective optimization car-following scheme based on vehicle models and deep reinforcement learning is proposed. …