-
4541
Multi-Humanoid Robot Arm Motion Imitation and Collaboration Based on Improved Retargeting
Published 2025-03-01“…Traditional retargeting algorithms, while effective in mapping human motion to robots, typically either ensure similarity in arm configuration (joint space-based) or focus solely on tracking the end-effector position (Cartesian space-based). …”
Get full text
Article -
4542
Research on range matching for wire-speed hardware NIDS
Published 2006-01-01“…To solve the rule matching problem of hardware NIDS,a range matching algorithm LRC-RM was proposed,with more efficient memory utilization.The approach mapped the port range into a compressed bit vector and organized the bit vectors as an extended balanced binary tree.Experiments were employed to show that NIDS using this approach can perform wire-speed range matching for OC-192 links,while saving 99% memory resource comparing to the existing methods.The algorithm is easy to be implemented within a chip without additional RAM.…”
Get full text
Article -
4543
Hierarchical location-diversity-based low-delay anonymous communication framework
Published 2009-01-01“…First, a router selecting based algorithm on location diversity and RTT was proposed; then a hierarchical location-diversity-based low-delay anonymous communication framework was presented.The framework’s security was analyzed and an evaluation algorithm for security was presented. …”
Get full text
Article -
4544
Integrated Guidance and Control for Strap-Down Flight Vehicle: A Deep Reinforcement Learning Approach
Published 2025-05-01“…Secondly, a channel-by-channel progressive training method based on the twin delayed deep deterministic policy gradient (TD3) algorithm is proposed. The agents of the pitch and yaw channels are trained using the TD3 algorithm independently, which substantially alleviates the complexity of the training process, while the roll channel is stabilized through the application of the back-stepping method. …”
Get full text
Article -
4545
Enhancing AES image encryption with a three-dimensional hyperchaotic system for increased security and efficiency.
Published 2025-01-01“…The proposed algorithm markedly reduces the number of encryption rounds to one while enhancing both efficiency and security. …”
Get full text
Article -
4546
Integrated Navigation Method for Orchard-Dosing Robot Based on LiDAR/IMU/GNSS
Published 2024-10-01“…Next, an improved A* algorithm was introduced to ensure the global operational path maintained a safe distance from obstacles, while the DWA algorithm handled dynamic obstacle avoidance. …”
Get full text
Article -
4547
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
Published 2022-08-01“…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
Get full text
Article -
4548
Optimized Airspace Structures and Sequencing Method for Urban Logistics Droneport
Published 2025-03-01“…Experimental results demonstrate that the proposed airspace design reduces take-off/landing time by 34.8% compared to conventional funnel-shaped configurations. The sequencing algorithm prioritizes high-value missions while reducing the average waiting time for low-battery drones by 47.3%, effectively alleviating endurance pressures. …”
Get full text
Article -
4549
Bandit-Based Multiple Access Approach for Multi-Link Operation in Heterogeneous Dynamic Networks
Published 2025-01-01“…The MP-CUCB algorithm enables each MLD to independently make access decisions to improve throughput while guaranteeing the fairness requirements of SLDs. …”
Get full text
Article -
4550
Ambiguity-aware semi-supervised learning for leaf disease classification
Published 2025-04-01“…The results indicate that our semi-supervised method reduces the reliance for fully labeled datasets while preserving high accuracy by utilizing the ambiguity rejection algorithm. …”
Get full text
Article -
4551
A hybrid blockchain-based solution for secure sharing of electronic medical record data
Published 2025-01-01“…This structure enhances both security and transparency while fostering collaborative efforts across different stakeholders. …”
Get full text
Article -
4552
Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems
Published 2025-04-01“…In a hybrid precoding system, the low-complexity GSVD-Sparsity algorithm can achieve a spectral efficiency close to that of the GSVD-based scheme in a fully digital system while maintaining anti-eavesdropping capabilities.…”
Get full text
Article -
4553
Research on GNNs with stable learning
Published 2025-08-01“…The aim is to extract genuine causal features while eliminating spurious causal features. By introducing a feature sample weighting decorrelation technique in the random Fourier transform space and combining it with a baseline GNN model, a Stable-GNN model and a constrained sampling weight gradient update algorithm are designed. …”
Get full text
Article -
4554
A Study on Multi-ship Avoidance System for Unmanned Surface Vehicles Using the Quaternion Ship Domain and Collision Risk Index
Published 2025-02-01“…The algorithm was used to evaluate target ships (TS) using the CRI values, adapt the ship domain based on QSD, and use the velocity obstacle (VO) method to determine feasible avoidance paths while adhering to the International Regulations for Preventing Collisions at Sea (COLREGs). …”
Get full text
Article -
4555
Key Nodes Identification Method in Scale-Free Network Based on Structural Holes
Published 2025-01-01“…The proposed algorithm achieves higher accuracy in structural hole-aware ranking compared to benchmarks while maintaining <inline-formula> <tex-math notation="LaTeX">${ O}\left ({{ m+n.logn }}\right)$ </tex-math></inline-formula> complexity. …”
Get full text
Article -
4556
Combining theory and usability testing to inform optimization and implementation of an online primary care depression management tool
Published 2025-01-01“…To evaluate usability, participants used a written patient scenario to work through the algorithm while verbalizing their thoughts (‘Think Aloud’). …”
Get full text
Article -
4557
DLML-PC: an automated deep learning and metric learning approach for precise soybean pod classification and counting in intact plants
Published 2025-07-01“…After 200 epochs, the recognition results of various object detection algorithms were compared to obtain the optimal model. …”
Get full text
Article -
4558
FEATURES OF THE TREATMENT OF HYPERMOBILITY OF THE ARTICULAR HEADS AND DISLOCATIONS OF THE LOWER JAW ON THE BACKGROUND OF FRACTURES OF THE CONDYGAL PROCESSES OF THE MANDIBLE, AS A P...
Published 2024-03-01“…This pathology requires a personalized treatment algorithm: in each case, the clinical and radiological signs of this pathology should be clearly taken into account and the method of conservative or surgical treatment should be determined. …”
Get full text
Article -
4559
VMD‐FBCCA classification method for SSVEP brain–computer interfaces
Published 2025-03-01“…To address this problem, a variational mode decomposition–based filter bank canonical correlation analysis (VMD‐FBCCA) algorithm is proposed, which integrates the adaptive characteristics of VMD and the training‐free nature of the FBCCA algorithm. …”
Get full text
Article -
4560
TrainNet for locking state recognition of side door of railway freight car
Published 2025-03-01“…The proposed method achieves 91.5% for detecting the lock status of railway freight open-top wagon side doors, while reducing the complexity of the original algorithm and achieving a real-time detection speed of 39.8fps, meeting the requirements for practical application. …”
Get full text
Article