-
3521
Self-Adjusting Look-Ahead Distance of Precision Path Tracking for High-Clearance Sprayers in Field Navigation
Published 2025-06-01“…This is done based on the principle of minimizing the overall error, enabling the dynamic and adaptive optimization of the look-ahead distance within the pure pursuit algorithm. …”
Get full text
Article -
3522
IMSBA: A Novel Integrated Sensing and Communication Beam Allocation Based on Multi-Agent Reinforcement Learning for mmWave Internet of Vehicles
Published 2025-05-01“…To address these challenges, this paper proposes an integrated sensing and communication (ISAC) beam allocation algorithm, termed IMSBA, which jointly optimizes beam direction, transmission power, and spectrum resource allocation to effectively mitigate the interference between I2V and V2V while maximizing the overall network performance. …”
Get full text
Article -
3523
Modeling and control of automatic voltage regulation for a hydropower plant using advanced model predictive control
Published 2025-04-01“…The findings were compared with those derived from an optimal proportional integral derivative (PID) controller designed using the artificial bee colony (ABC) algorithm. …”
Get full text
Article -
3524
Maintenance Scheduling Strategy for MMCs Within an MVDC System Using Sensitivity Analysis
Published 2024-01-01“…The proposed algorithm optimizes the maintenance timing and priority by performing a sensitivity analysis of the system reliability indicators, from both the consumer and operator perspectives. …”
Get full text
Article -
3525
Jumping knowledge graph attention network for resource allocation in wireless cellular system
Published 2025-05-01“…The realization of these features hinges on the development of rational resource allocation strategies to optimize the utilization of radio resources. This study addresses the beamforming design problem for downlink transmission in multi-cell cellular networks, with a focus on maximizing user data rates while adhering to stringent power constraints. …”
Get full text
Article -
3526
A hybrid blockchain-based solution for secure sharing of electronic medical record data
Published 2025-01-01“…This algorithm not only streamlines the signature process across chains but also strengthens system security and optimizes storage efficiency, addressing a key challenge in multi-chain systems. …”
Get full text
Article -
3527
Development and evaluation of a triplex real-time PCR assay for enhanced plague diagnostics in Madagascar.
Published 2025-07-01“…Notably, the new assay resolved 100% of previously inconclusive cases from the duplex qPCR test targeting only pla and caf1.<h4>Discussion</h4>While a new plague diagnostic algorithm has been set up after the outbreak in 2017, the present study suggests a real-time PCR assay based on three genes to improve the speed and accuracy of plague diagnostic. …”
Get full text
Article -
3528
Joint uplink and downlink resource allocation for D2D communication based on weighted bipartite graph matching and interference clustering
Published 2024-06-01“…Moreover, the transmit power of DUE was optimized to maximize the system sum rate while ensured that DUE did not cause serious interference to CUE. …”
Get full text
Article -
3529
Aircraft Flight Autonomous Decision-Making Method Based on Target Predicted Trajectory and Markov Decision Process
Published 2024-12-01“…Secondly, we adopt the Markov Decision Process as the autonomous decision-making method for the own aircraft, proposing a method by which to calculate the optimal decision sequence based on the prediction scenarios of the IMM algorithm; that is, in both multi-step prediction and single-step prediction scenarios, the payoff values of different action strategies at each decision moment are calculated to obtain the optimal decision sequence. …”
Get full text
Article -
3530
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
3531
Learned Shrinkage Approach for Low-Dose Reconstruction in Computed Tomography
Published 2013-01-01“…Our numerical simulations indicate that the proposed algorithm can manage well with noisy measurements, allowing a dose reduction by a factor of 4, while reducing noise and streak artifacts in the FBP reconstruction, comparable to the performance of a statistically based iterative algorithm.…”
Get full text
Article -
3532
WSNs data acquisition by combining expected network coverage and clustered compressed sensing.
Published 2025-01-01“…Combined with an optimized network coverage algorithm, a node scheduling strategy is introduced to focus on critical observation areas while minimizing overall energy consumption. …”
Get full text
Article -
3533
Hybrid energy storage systems for photovoltaic storage microgrids power allocation and capacity determination based on adaptive Savitzky-Golay filtering and VMD-DTW
Published 2025-09-01“…An enhanced dung beetle optimization algorithm is employed to optimize this model, enabling adaptive parameter adjustments in SG filtering. …”
Get full text
Article -
3534
Masks-to-Skeleton: Multi-View Mask-Based Tree Skeleton Extraction with 3D Gaussian Splatting
Published 2025-07-01“…Furthermore, we use a minimum spanning tree (MST) algorithm during the optimization loop to regularize the graph to a tree structure. …”
Get full text
Article -
3535
Shells and Spheres: An n-Dimensional Framework for Medial-Based Image Segmentation
Published 2010-01-01“…For the automated 3D algorithm, the only manual interaction consists of tracing a single contour on a 2D slice to optimize parameters, and identifying an initial point within the target structure.…”
Get full text
Article -
3536
Accelerated Tensor Robust Principal Component Analysis via Factorized Tensor Norm Minimization
Published 2025-07-01“…Experimental results demonstrate that our algorithm achieves significantly faster performance than existing reference methods known for efficient computation while maintaining high accuracy in recovering low-rank tensors for applications such as color image recovery and background subtraction.…”
Get full text
Article -
3537
Fast Processing of Massive Hyperspectral Image Anomaly Detection Based on Cloud-Edge Collaboration
Published 2025-01-01“…With the improvement of hyperspectral image resolution, existing anomaly detection algorithms find it challenging to quickly process large volumes of hyperspectral data while fully exploiting spectral information. …”
Get full text
Article -
3538
A Study on Multi-ship Avoidance System for Unmanned Surface Vehicles Using the Quaternion Ship Domain and Collision Risk Index
Published 2025-02-01“…This paper proposes a multi-ship collision avoidance algorithm that integrates the quaternion ship domain (QSD) and collision risk index (CRI) to assess collision risk and generate optimal avoidance trajectories. …”
Get full text
Article -
3539
A Time- and Space-Integrated Expansion Planning Method for AC/DC Hybrid Distribution Networks
Published 2025-04-01“…A modified graph attention network (MGAT)-based deep reinforcement learning (DRL) algorithm is used for optimization, balancing economic and reliability objectives. …”
Get full text
Article -
3540
Utilizing weak graph for edge consolidation-based efficient enhancement of network robustness
Published 2025-05-01“…We compare the proposed algorithm with optimal and approximate algorithms across graphs of varying scales. …”
Get full text
Article