-
2141
Quantum circuit unoptimization
Published 2025-05-01“…In this paper, we define and construct a quantum algorithmic primitive called quantum circuit unoptimization, which makes a given quantum circuit complex by introducing some redundancies while preserving circuit equivalence, i.e., the inverse operation of circuit optimization. …”
Get full text
Article -
2142
CFTformer: End-to-End Cross-Frame Multi-Object Tracking With Transformer
Published 2025-01-01“…Overall, the model was able to achieve 1.7% and 0.6% improvement in the identification F1 score (IDF1) metric on MOT17 and MOT20 datasets while having ~0-15% lower number of identity switches, compared to other transformer-based approaches. …”
Get full text
Article -
2143
RIM-Net: A Real-Imaginary-Magnitude Network for NLOS/LOS Identification in UWB Indoor Positioning Systems
Published 2025-01-01“…Furthermore, the optimization of the TOA algorithm validated the effectiveness of RIM-Net in localization, achieving an average performance improvement of 9.66%. …”
Get full text
Article -
2144
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
2145
Protein docking by the underestimation of free energy funnels in the space of encounter complexes.
Published 2008-10-01“…We describe a docking method based on stochastic global minimization of funnel-shaped energy functions in the space of rigid body motions (SE(3)) while accounting for flexibility of the interface side chains. …”
Get full text
Article -
2146
Research on Dynamic Storage Location Assignment of Picker-to-Parts Picking Systems under Traversing Routing Method
Published 2020-01-01“…Finally, the computer program is developed to simulate the whole process. Simulation and data analysis results show that dynamic storage location assignment can effectively improve picking efficiency when the average order size is small and large demand correlation strength. …”
Get full text
Article -
2147
Privacy-Oriented Successive Approximation Image Position Follower Processing
Published 2021-01-01“…The algorithm solves the problems of lack of scale estimation of KCF algorithm and low real-time rate of DSST algorithm and improves the tracking accuracy while ensuring the real-time performance of the algorithm.…”
Get full text
Article -
2148
Computational design exploration of rocket nozzle using deep reinforcement learning
Published 2025-03-01“…Additionally, the use of the Single-Step Proximal Policy Optimization (SSPPO) algorithm enhances the exploration of nozzle geometries by maximizing aerodynamic performance while balancing computational efficiency. …”
Get full text
Article -
2149
Fairness-Aware Computation Offloading for Mobile Edge Computing With Energy Harvesting
Published 2025-01-01“…This research formulates the Fairness-aware Computation Offloading Optimization (FACOO) algorithm. The Lyapunov approach and sequential least squares quadratic programming (SLSQP) are used to ascertain the best offloading ratio, transmission power, and CPU frequency while complying with signal-to-interference-plus-noise ratio (SINR) limitations. …”
Get full text
Article -
2150
A novel mechanism-guided residual network for accurate modelling of scroll expander under noisy and sparse data conditions
Published 2025-08-01“…This framework is based on the architecture of residual network, where the mechanistic laws are embedded as constraints in the training of the network through an improved loss function. Then, a hybrid optimization algorithm is detailed, which can achieve efficient and accurate updating of the parameters of the network and mechanistic equations. …”
Get full text
Article -
2151
A Distributed Resilience Enhancement Strategy for Multi-microgrids Based on System of Systems Architecture
Published 2023-12-01“…Firstly, the energy exchange process of the multi-microgrid systems is modeled based on the SoS architecture, and the distributed optimization algorithm is used to solve the model, which ensures the privacy of user information. …”
Get full text
Article -
2152
Research on Energy-Saving Control Strategy of Nonlinear Thermal Management System for Electric Tractor Power Battery Under Plowing Conditions
Published 2025-04-01“…Finally, a nonlinear model predictive control cooling optimization strategy is proposed, with the optimization objectives of quickly achieving battery temperature regulation and reducing compressor energy consumption. …”
Get full text
Article -
2153
Online Autonomous Motion Control of Communication-Relay UAV with Channel Prediction in Dynamic Urban Environments
Published 2024-12-01“…Comparative experiments and simulation results under different scenarios show that the proposed motion-control method can drive the UAV to reach or track the optimal relay position and improve the network performance, while demonstrating that it is beneficial to consider the impact of the environments on the channel characteristics.…”
Get full text
Article -
2154
Tent–PSO-Based Unmanned Aerial Vehicle Path Planning for Cooperative Relay Networks in Dynamic User Environments
Published 2025-03-01“…The proper planning of UAV paths can improve user coverage while maintaining communication quality. …”
Get full text
Article -
2155
Hybrid Damping Mode MR Damper: Development and Experimental Validation with Semi-Active Control
Published 2025-05-01“…This configuration supports four damping modes—Soft/Soft, Hard/Soft, Soft/Hard, and Hard/Hard—allowing adaptability to varying driving conditions. Magnetic circuit optimization ensures rapid damping force adjustments (≈10 ms), while a semi-active control algorithm incorporating skyhook logic, roll, dive, and squat control strategies was implemented. …”
Get full text
Article -
2156
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
2157
A Knowledge-Driven Smart System Based on Reinforcement Learning for Pork Supply-Demand Regulation
Published 2025-07-01“…By harnessing dynamic decision-making capabilities of reinforcement learning (RL), we design an optimization architecture centered on the Q-learning mechanism and dual-strategy pools, which is integrated into the honey badger algorithm to form the RL-enhanced honey badger algorithm (RLEHBA). …”
Get full text
Article -
2158
Prediction of Transformer Residual Flux Based on J-A Hysteresis Theory
Published 2025-03-01“…It has low dependence on the initial conditions and greatly avoids the influence of DC offset and noise on measurement results. Firstly, an improved particle-swarm optimization algorithm is proposed in this paper to address the problem of slow convergence speed and susceptibility to local optima in current particle-swarm optimization algorithms for extracting J-A model parameters. …”
Get full text
Article -
2159
Random Natural Gradient
Published 2024-10-01“…In this work we propose two methods that reduce the resources/state preparations required for QNG, while keeping the advantages and performance of the QNG-based optimization. …”
Get full text
Article -
2160
Reinforcement Learning-Driven Secrecy Energy Efficiency Maximization in RIS-Enabled Communication Systems
Published 2025-01-01“…We introduce an innovative framework that utilizes the deep deterministic policy gradient (DDPG) algorithm to address the challenges of the MDP. Our extensive simulations show that our method works much better than current techniques using deterministic policy gradients, like the proximal policy optimization (PPO) framework, in improving SEE. …”
Get full text
Article