-
3581
A grid-based sectoring for energy-efficient wireless sensor networks
Published 2025-04-01“…This research improves CH selection by organizing sensor nodes into square grid clusters and employing a routing algorithm for randomized CH selection. Game theory (GT) and Ad hoc on Demand Vectors (AODV) were used to choose the optimal routing path, while Grey Wolf Optimization (GWO) was used to determine the optimal CHs. …”
Get full text
Article -
3582
A 3D acid fracturing design calibrated to describe the productivity index in several southwestern Iranian oil fields
Published 2025-04-01“…Once these parameters are stabilized, the algorithm proceeds to calculate acid concentration at each node within the fracture area. …”
Get full text
Article -
3583
UAV Small Target Detection Model Based on Dual Branches and Adaptive Feature Fusion
Published 2025-07-01“…The model first constructs a small target detection framework with dual branches to improve the detection accuracy while reducing the number of parameters. Secondly, the model introduces semantic and detail injection (SDI) in the neck network and embeds bidirectional adaptive feature fusion in the detection head to innovate and optimize the feature fusion mechanism, achieve the full interaction of deep and shallow information, enhance the feature representation of small targets, and overcome the problem of scale inconsistency. …”
Get full text
Article -
3584
Bayesian Regularization Backpropagation Neural Network for Glass Beams in Lateral–Torsional Buckling
Published 2023-01-01“…Additionally, the Bayesian regularization backpropagation (trainbr) algorithm is used to optimize the input–output relationship accuracy. …”
Get full text
Article -
3585
Global trends in machine learning applications for single-cell transcriptomics research
Published 2025-08-01“…Abstract Background Single-cell RNA sequencing (scRNA-seq) has revolutionized cellular heterogeneity analysis by decoding gene expression profiles at individual cell level, while machine learning (ML) has emerged as core computational tool for clustering analysis, dimensionality reduction modeling and developmental trajectory inference in single-cell transcriptomics(SCT). …”
Get full text
Article -
3586
Secure Latency-Aware Task Offloading Using Federated Learning and Zero Trust in Edge Computing for IoMT
Published 2025-01-01“…Within FL, an improved on-policy temporal difference control algorithm is leveraged for local model training. Moreover, this algorithm determines the optimal offloading strategy based on the global model while considering trustworthiness, the heterogeneous nature of tasks, resource availability, and latency. …”
Get full text
Article -
3587
Design of key technologies for intranet dynamic gateway based on DPDK
Published 2020-06-01“…Aiming at the problems of high packet processing delay and high overhead caused by IP hopping,active defense gateway system with multi-layer network deployment structure was designed and implemented based on the data plane development kit (DPDK).Firstly,based on the DPDK fast forwarding framework,forwarding and processing performance of the system were optimized.Secondly,for the dynamic random mapping gateway with three different types of IP addresses,an efficient IP address allocation algorithm and an unpredictable IP address conversion algorithm were designed.The experimental results show that the designed system can effectively reduce the rate of information acquisition of sniffing attack,while greatly improving the processing delay caused by dynamic hopping.…”
Get full text
Article -
3588
Coordinated beamforming for cognitive multi-cell networks with wiretap channels
Published 2014-11-01“…Owing to the coupling among the vectors to be optimized,the problem becomes non-convex and non-linear.Accordingly,a centralized coordinated beamforming design method was proposed by constraining the leakage interference and using the semi-definite relaxation,and on the base of it,a decentralized algorithm was also proposed by decomposing the centralized design problem into a group of sub-problems on each cell’s base by using dual decomposition.Simulation results show that the proposed schemes make effective reduction in power consumption while guarantee the legal users’ secrecy rate requirement and the cognitive interference constraint.Moreover,the proposed decentralized method not only reduces the computational complexity,but also has the same performance as the centralized algorithm.…”
Get full text
Article -
3589
Multi-Channel Sparse-Frequency-Scanning White-Light Interferometry with Adaptive Mode Locking for Pulse Wave Velocity Measurement
Published 2025-03-01“…Compared to normal MLCC algorithm, the Fibonacci-optimized algorithm reduces the number of computational iterations by 57 times while maintaining sub-nanometer resolution under dynamic perturbations. …”
Get full text
Article -
3590
Research on Network Handover Based on User Movement Prediction in Visible Light Communication and Wi-Fi Heterogeneous Networks
Published 2025-02-01“…Extracting meaningful and important location points from massive trajectory data for clustering, an improved hidden Markov model is used to predict the user’s next location by analyzing the patterns of the user’s historical mobile trajectory data. The Q-learning algorithm is then used to determine the optimal network handover based on the current network state, while a seamless handover protocol is introduced to ensure successful network transition and uninterrupted data transmission. …”
Get full text
Article -
3591
Efficient and secure multi-party computation protocol supporting deep learning
Published 2025-07-01“…Abstract Privacy-preserving deep learning based on secure multi-party computation (MPC) has emerged as a critical research focus in recent years. While existing approaches predominantly employ additive secret sharing with a fixed number of parties, they have yet to fully leverage the more efficient Shamir-based schemes. …”
Get full text
Article -
3592
Coordinated Scheduling for Zero-Wait RGV/ASR Warehousing Systems with Finite Buffers
Published 2025-06-01“…Additionally, in 15 randomized test scenarios, AMHS demonstrated superior performance over three benchmark algorithms—Genetic Algorithm (GA), Discrete Imperialist Competitive Algorithm (DICA), and Improved Whale Optimization Algorithm (IWOA)—achieving an average makespan reduction of 12.6% relative to GA.…”
Get full text
Article -
3593
A location semantic privacy protection model based on spatial influence
Published 2025-04-01“…Finally, the problem of synthesizing dummy trajectories is transformed into a matching problem for directed bipartite graphs and the optimal k-anonymity set is obtained using the Kuhn Munkres algorithm. …”
Get full text
Article -
3594
Smart IoT-driven precision agriculture: Land mapping, crop prediction, and irrigation system.
Published 2025-01-01“…The experimental results demonstrated that fuzzy logic has faster calibration rate of 66.23% and helps to save around 61% water in comparison to average logic algorithm. The implementation of a fuzzy logic algorithm significantly optimized water usage compared to traditional manual irrigation methods. …”
Get full text
Article -
3595
A method of identification and localization of tea buds based on lightweight improved YOLOV5
Published 2024-11-01“…The Fuding white tea bud image dataset was established by collecting Fuding white tea images; then the lightweight network ShuffleNetV2 was used to replace the YOLOV5 backbone network; the up-sampling algorithm of YOLOV5 was optimized by using CARAFE modular structure, which increases the sensory field of the network while maintaining the lightweight; then BiFPN was used to achieve more efficient multi-scale feature fusion; and the introduction of the parameter-free attention SimAm to enhance the feature extraction ability of the model while not adding extra computation. …”
Get full text
Article -
3596
A Distributed Q Learning Spectrum Decision Scheme for Cognitive Radio Sensor Network
Published 2015-05-01“…Cognitive spectrum management can improve the utilization efficiency of spectrum while increasing the energy consumption of sensor network nodes. …”
Get full text
Article -
3597
Design of the DETECT project: automated cardiac arrest detection and activation of the emergency medical chain integrated into a wristband
Published 2025-07-01“…To optimize cardiac arrest detection, DETECT-2 is set out to develop an algorithm for detection of sudden falls mimicking cardiac arrest-related collapses using accelerometry data (n = 20). …”
Get full text
Article -
3598
Environmental and Economic Dispatching of Fire-Wind Combined System Based on Improved MOPSO
Published 2025-01-01“…Then, an improved multi-objective particle swarm optimization algorithm, LRMOPSO, is proposed by combining multi-objective particle swarm optimization algorithm, Levy flight jamming strategy and reverse learning strategy. …”
Get full text
Article -
3599
Improved RRT*-Connect Manipulator Path Planning in a Multi-Obstacle Narrow Environment
Published 2025-04-01“…During the node expansion process, an adaptive step-size method is introduced to dynamically adjust the step size based on the obstacle information, while a node rejection strategy is used to accelerate the search process so as to generate a near-optimal collision-free path. …”
Get full text
Article -
3600
Conceptual semantic enhanced representation learning for event recognition in still images
Published 2022-12-01“…On that basis, an image event recognition algorithm (CS-IER) based on concept score is proposed, while multi-view learning is applied to fuse concept score and inter-conceptual semantics relations. …”
Get full text
Article