-
18001
Compressive SAR Imaging Based on Modified Low-Rank and Sparse Decomposition
Published 2025-01-01“…For the CS-MLRSD scheme, an iterative thresholding algorithm is derived to separately reconstruct the low-rank and sparse components. …”
Get full text
Article -
18002
A Design Procedure and Control Method for Improving Efficiency of a Family of Resonant Converters Over Wide Operating Conditions
Published 2025-01-01“…Here, a novel design procedure and control method are proposed for the resonant converters, which have parallel components in their resonant tank circuits to address their light-load or no-load low-efficiency issues. This control algorithm is based on the frequency modulation method and utilizes a variable capacitor or inductor in the resonant tank circuit, simultaneously. …”
Get full text
Article -
18003
Initialization Methods for FPGA-Based EMT Simulations
Published 2024-01-01“…To accelerate initialization, software-to-hardware algorithm and structure are developed to automate initialization data sources for different topologies. …”
Get full text
Article -
18004
Development of an AI-Enabled Q-Agent for Making Data Offloading Decisions in a Multi-RAT Wireless Network
Published 2024-01-01“…We employ a model-free Q-learning algorithm for training of the Q-agent. We use stochastic geometry as a tool for estimating the average data rate offered by the network in a given region by considering the effect of interference. …”
Get full text
Article -
18005
Complexity Analysis of New Future Video Coding (FVC) Standard Technology
Published 2021-01-01“…In this paper, we provide a fast FVC algorithm to achieve better performance and to reduce encoding complexity. …”
Get full text
Article -
18006
Intelligent Traffic Management System Based on the Internet of Vehicles (IoV)
Published 2021-01-01“…Our proposed adaptive algorithm not only significantly reduces the average waiting time (delay) but also increases the number of serviced vehicles. …”
Get full text
Article -
18007
Fermentasi biji durian khas Kalimantan sebagai pengganti tepung terigu dengan metode perendaman berseri
Published 2025-01-01“…Runge-Kutta (RK) third-order method used the kinetic modeling algorithm. The RK solver was completed using the optimization solver in Ms. …”
Get full text
Article -
18008
Runoff Prediction and Uncertainty Analysis for Xijiang River Basin Based on CMIP6 Climate Scenarios
Published 2025-01-01“…Based on this, the Xin'anjiang hydrological model (XAJ) is built, and the particle swarm optimization (PSO) algorithm is employed to calibrate and validate the model parameters. …”
Get full text
Article -
18009
Cascaded H-Bridge MLI and Three-Phase Cascaded VSI Topologies for Grid-Connected PV Systems with Distributed MPPT
Published 2019-01-01“…Distributed maximum power point tracking (MPPT) of PV modules using perturbation and observation algorithm is used for all presented topologies. In all presented configurations, each PV module is connected to one DC-DC isolated Ćuk converter for best MPPT achievement. …”
Get full text
Article -
18010
Fatigue Driving Prediction on Commercial Dangerous Goods Truck Using Location Data: The Relationship between Fatigue Driving and Driving Environment
Published 2020-01-01“…The driver’s yawn data are used as a proxy for ground truth for the classification algorithm. From the six different categories of the predictor set, we obtain a set of 17 predictor variables to train logistic regression, neural network, and random forest classifiers. …”
Get full text
Article -
18011
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
18012
Revisiting the trading activity of high-frequency trading firms around ultra-fast flash events
Published 2025-01-01“…We compare our sample of SFEs with both the so-called “mini flash crashes”, as identified by the Nanex detection algorithm, and the so-called EPMs, as identified by Brogaard et al. (2018). …”
Get full text
Article -
18013
AI-Based Screening Method for Early Identification of Invasive Ductal Carcinoma in Breast Cancer
Published 2024-06-01“…To achieve this, we utilized a deep learning neural network algorithm, employing histopathological microscopic datasets and histological microscopic images from 124 and 576 patients with ductal carcinoma of the breast, respectively. …”
Get full text
Article -
18014
Construction of a 5G Wireless Semantic Web-Assisted English Digital Learning Resource Query System
Published 2021-01-01“…We propose a quality algorithm for 5G wireless networks, which not only captures the characteristics of 5G wireless networks such as local broadcast and node movement but also combines quality predicates as guards with broadcast reception actions, which are used to portray that a node can continue to execute subsequent processes only when the node reception actions satisfy certain conditions, which works together with the node default value mechanism to reduce the impact caused by unreliable links. …”
Get full text
Article -
18015
Active Vibration Control of Helicopter Maneuvering Flight Using Feedforward-Robust Hybrid Control Based on Reference Signal Reconstruction
Published 2021-01-01“…Numerical and experimental results reveal that the proposed algorithm is practical for suppressing transient disturbance and multifrequency helicopter vibration response during maneuvering flight with faster convergence speed and better robustness.…”
Get full text
Article -
18016
Uplink Scheduling and Adjacent-Channel Coupling Loss Analysis for TD-LTE Deployment
Published 2014-01-01“…Second, an uplink scheduling algorithm is proposed to utilize a leakage pattern of ACI in synchronized operations. …”
Get full text
Article -
18017
Improving myocardial infarction diagnosis with Siamese network-based ECG analysis.
Published 2025-01-01“…<h4>Results</h4>The classification accuracy comes out to be 98%. The algorithm works excellently with datasets having class imbalance by taking pair of images as input. …”
Get full text
Article -
18018
Airport Emergency Rescue Model Establishment and Performance Analysis Using Colored Petri Nets and CPN Tools
Published 2018-01-01“…We draw the basic flow chart of AER and, on this basis, propose the basic algorithm of establishing an AER colored Petri net. …”
Get full text
Article -
18019
Legitimate expectations in civil proceedings: traditional legal understanding and synergetic approach
Published 2021-09-01“…The main result of the study is to join a synergetic approach to legal understanding, which provides a complex but clear algorithm for comparing formal and substantive legal phenomena in civil proceedings, which is a multi-stage test of proportionality as a universal tool which provides an opportunity to take into account the diversity of certain law enforcement circumstances in the case, ensuring the legitimate expectations of the person of substantive and procedural nature. …”
Get full text
Article -
18020
Reinforced Cost-Sensitive Graph Network for Detecting Fraud Leaders in Telecom Fraud
Published 2024-01-01“…Finally, weight coefficients are dynamically optimized using the Deep Deterministic Policy Gradient (DDPG) algorithm, and the prediction results of the three base classifiers are combined to produce the final classification outcomes. …”
Get full text
Article