-
4661
FedG2L: a privacy-preserving federated learning scheme base on “G2L” against poisoning attack
Published 2023-12-01“…Federated learning (FL) can push the limitation of “Data Island” while protecting data privacy has been a broad concern. …”
Get full text
Article -
4662
Application of LSB Steganography for Encrypted Data Using Triple Transposition Vigenere on Digital Images
Published 2025-08-01“…Grayscale images offer advantages in terms of storage and algorithm efficiency, while RGB images provide broader color diversity and versatile applications. …”
Get full text
Article -
4663
Adaptive dimensionality reduction for neural network-based online principal component analysis.
Published 2021-01-01“…This requires to update both the principal components and the dimensionality in every timestep. While the continuous update of the principal components is widely studied, the available algorithms for dimensionality adjustment are limited to an increment of one in neural network-based and incremental PCA. …”
Get full text
Article -
4664
Differentiable architecture search-based automatic modulation recognition for multi-carrier signals
Published 2024-09-01“…Simulation results demonstrate that the proposed algorithm improves accuracy in urban multipath channels, especially at low SNR, while simultaneously providing better robustness to modulation parameter variations and small-sample scenarios.…”
Get full text
Article -
4665
Non-Holonomic Mobile Manipulator Obstacle Avoidance with Adaptive Prioritization
Published 2025-04-01“…A series of examples are proposed in simulation using Matlab and analyzed to show how the algorithm works if the obstacle interferes with the manipulator or the base. …”
Get full text
Article -
4666
Gamified mHealth System for Evaluating Upper Limb Motor Performance in Children: Cross-Sectional Feasibility Study
Published 2025-02-01“…Gold-standard laboratory assessments of the UL are objective and precise but may not be portable, while clinical assessments can be time-intensive. …”
Get full text
Article -
4667
Reliable Process Tracking Under Incomplete Event Logs Using Timed Genetic-Inductive Process Mining
Published 2025-03-01“…Experimental results using real-world event logs from a health service in Indonesia demonstrate that TGIPM achieves higher fitness, precision, and generalization compared to the sequential approach, while slightly compromising simplicity. Moreover, the TGIPM algorithm exhibits lower computational cost and more effectively captures parallelism, making it particularly suitable for large and incomplete datasets. …”
Get full text
Article -
4668
An Improved Large Neighborhood Search for Network-Level Airport Slot Allocation Optimization
Published 2025-01-01“…Validated through an extensive case study involving 4,695 requests across six hub airports, the algorithm achieves solutions within a 1.7% optimality gap while reducing computation time by up to 64%.…”
Get full text
Article -
4669
Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments
Published 2024-12-01“…User selection is accomplished through robust Deep Reinforcement Learning with the Tabu Search (DRL-TS) algorithm, while channel selection is optimized through rigorous training employing Proximal Policy Optimization (PPO). …”
Get full text
Article -
4670
Secure Latency-Aware Task Offloading Using Federated Learning and Zero Trust in Edge Computing for IoMT
Published 2025-01-01“…Within FL, an improved on-policy temporal difference control algorithm is leveraged for local model training. Moreover, this algorithm determines the optimal offloading strategy based on the global model while considering trustworthiness, the heterogeneous nature of tasks, resource availability, and latency. …”
Get full text
Article -
4671
Online Autonomous Motion Control of Communication-Relay UAV with Channel Prediction in Dynamic Urban Environments
Published 2024-12-01“…Considering that in practical applications, the radio frequency (RF) channel parameters in complex urban environments are difficult to obtain in advance and are constantly changing, an estimation algorithm based on Gaussian process learning is proposed for online evaluation of the wireless channel parameters near the current position of the UAV; for the optimal relay position search problem, in order to improve the real-time performance of the method, a line search algorithm and a general gradient-based algorithm are proposed, which are used for point-to-point communication and multi-node communication scenarios, respectively, reducing the two-dimensional search to a one-dimensional search, and the stability proof and convergence conditions of the algorithm are given. …”
Get full text
Article -
4672
Intelligent End-Edge Computation Offloading Based on Lyapunov-Guided Deep Reinforcement Learning
Published 2024-11-01“…Then, we employ deep reinforcement learning algorithm, i.e., asynchronous advantage actor-critic (A3C), and propose Lyapunov-guided A3C algorithm named LyA3C to approximate the optimal computation offloading policy. …”
Get full text
Article -
4673
Filter Observer-Based Attitude Control for Moving Mass Satellites Under Strong Aerodynamic Torques
Published 2025-01-01“…The scheme integrates a moving mass device (MMD) with the traditional reaction wheel actuator to mitigate aerodynamic torques while maintaining effectiveness at varying orbital heights. …”
Get full text
Article -
4674
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
4675
Omnidirectional Motion Trajectory Tracking Control Method for AUVs
Published 2024-12-01“…Using the Bluefin series AUV as an example, the paper designed and modified the omnidirectional motion structure and developed a trajectory generation algorithm based on the Hermite algorithm, a trajectory guidance algorithm based on the scaling factor, and a sailing-heading hybrid control algorithm. …”
Get full text
Article -
4676
Machine Learning-Based 3D Soil Layer Reconstruction in Foundation Pit Engineering
Published 2025-04-01“…Therefore, soil layer reconstruction serves as a critical step, while sparse borehole data limit the accuracy of traditional reconstruction methods. …”
Get full text
Article -
4677
Location estimation of UWB-based wireless capsule endoscopy using TDoA in various gastrointestinal simulation models.
Published 2025-01-01“…Though the present-day wireless capsule endoscopes certified for endoscopic procedures predominantly work on the Medical Implant Communication System (MICS) band, the applications based on the Ultra-Wide Band (UWB) are gaining popularity for their immense possibilities. While received signal strength, time of arrival, phase of arrival, and angle of arrival are the basic parameters applied in research for location estimation of WCE, this paper uses a time difference of arrival (TDoA) approach using the Chan algorithm. …”
Get full text
Article -
4678
A method of identification and localization of tea buds based on lightweight improved YOLOV5
Published 2024-11-01“…The improved algorithm has higher detection accuracy while reducing the amount of computation and parameters. …”
Get full text
Article -
4679
EV Smart Charging in Distribution Grids–Experimental Evaluation Using Hardware in the Loop Setup
Published 2024-01-01“…The results demonstrate that the SC algorithm adequately lowers the EV charging cost while fulfilling the charging demand, and substantially reduces the peak power as well as the overloading duration, even when faced with input data uncertainty. …”
Get full text
Article -
4680
Ad-BBR: Enhancing Round-Trip Time Fairness and Transmission Stability in TCP-BBR
Published 2025-04-01“…While BBR offers lower latency and higher throughput compared to traditional congestion control algorithms, it still faces challenges. …”
Get full text
Article