-
3881
Obstacle Avoidance of Surface Agent Formation Based on Streamline Traction at Fixed-Time
Published 2024-11-01“…The optimal guiding angular velocity signal is obtained through quadratic programming, ensuring that the SA steers towards the designated position while avoiding obstacles. …”
Get full text
Article -
3882
Hybrid precoding method for mmWave massive MIMO systems based on LFM
Published 2019-06-01“…Analog-digital hybrid precoding is a key technology for millimeter wave massive MIMO systems that reduce hardware costs while balancing system performance.However,the traditional hybrid precoding scheme often needed to find a suitable codebook for precoding,and some codebooks were not easy to obtain or had deviations in actual situations.An analog-digital hybrid precoding method based on latent factor model (LFM) in machine learning without codebook was proposed for this problem.The LFM decomposition and stochastic gradient descent method were used to approximate the designed precoding matrix to the optimal full digital precoding matrix for good performance.The simulation results show that compared with the hybrid precoding design method based on orthogonal matching pursuit (OMP) algorithm,this method not only does not need a codebook,but also has better performance than the hybrid precoding algorithm based on OMP algorithm,which is closer to optimal full digital precoding method.…”
Get full text
Article -
3883
Classification-based point cloud denoising and 3D reconstruction of roadways
Published 2025-05-01“…The reconstruction algorithm could reduce holes effectively while maintaining the accuracy and smoothness of the roadway model. …”
Get full text
Article -
3884
Enhancing Spreading Factor Assignment in LoRaWAN with a Geometric Distribution Approach for Practical Node Distributions
Published 2024-09-01“…While the GD algorithm consistently demonstrated superior DER values across varying coverage areas and payload sizes, it incurred a slight increase in energy consumption due to node allocations to higher SFs. …”
Get full text
Article -
3885
Indoor Positioning System based on SSA-ELM Neural Network for Visible Light
Published 2025-02-01“…【Objective】The Extreme Learning Machine (ELM) neural network algorithm in the traditional indoor Visible Light Positioning (VLP) system suffers from unstable convergence and a tendency to get stuck in local optimal states, resulting in decreased positioning accuracy. …”
Get full text
Article -
3886
Stability Study of Distributed Drive Vehicles Based on Estimation of Road Adhesion Coefficient and Multi-Parameter Control
Published 2025-01-01“…First, a seven-degree-of-freedom (7-DOF) vehicle dynamics model is established and optimized with a layered control strategy. The upper-level control module calculates the desired yaw rate and sideslip angle using the two-degree-of-freedom (2-DOF) vehicle model and estimates the road adhesion coefficient by using the singular-value optimized cubature Kalman filtering (CKF) algorithm; the middle-level utilizes the second-order sliding mode controller (SOSMC) as a direct yaw moment controller in order to track the desired yaw rate and sideslip angle while also employing a joint distribution algorithm to control the torque distribution based on vehicle stability parameters, thereby enhancing system robustness; and the lower-level controller performs optimal torque allocation based on the optimal tire loading rate as the objective. …”
Get full text
Article -
3887
GREEN ECONOMY AND HOLISTIC PLANNING BY ARTIFICIAL INTELLIGENCEAPPLICATION
Published 2024-10-01“…On the one hand, IT such as machine learning, data analytics, and optimization algorithms offer immense potential to enhance resource efficiency, optimize energy systems, and facilitate sustainable decision-making processes. …”
Get full text
Article -
3888
LazyAct: Lazy actor with dynamic state skip based on constrained MDP.
Published 2025-01-01“…Inspired by human decision-making patterns, which involve reasoning only on critical states in continuous decision-making tasks without considering all states, we introduce the LazyAct algorithm. This algorithm significantly reduces the number of inferences while preserving the quality of the policy. …”
Get full text
Article -
3889
A User-Priority-Driven Multi-UAV Cooperative Reconnaissance Strategy
Published 2021-01-01“…This reconnaissance process is formulated as a cooperative path planning problem, where the optimization objective is maximizing users’ total satisfaction, while an intelligent algorithm is proposed to solve this problem effectively. …”
Get full text
Article -
3890
A Sleep Scheduling Mechanism with PSO Collaborative Evolution for Wireless Sensor Networks
Published 2015-03-01“…This paper proposes a particle swarm optimization sleep scheduling mechanism for use in wireless sensor networks based on sleep scheduling algorithm. …”
Get full text
Article -
3891
Inverse Strategies for Identifying the Parameters of Constitutive Laws of Metal Sheets
Published 2016-01-01“…It highlights that the identification procedure is dictated by the loading conditions, the geometry of the sample, the type of experimental results selected for the analysis, the cost function, and optimization algorithm used. Also, the type of constitutive law (isotropic and/or kinematic hardening laws and/or anisotropic yield criterion), whose parameters are intended to be identified, affects the whole identification procedure.…”
Get full text
Article -
3892
Steatotic liver disease: radiological and ultrasound point of view
Published 2025-01-01“…All patients were examined with a single diagnostic algorithm consisting of 5 stages: clinical and laboratory stage, physical examination, ultrasound, dual-energy X-ray absorptiometry in the “Whole Body” mode, retrospective analysis of MDCT and/or MRI studies. …”
Get full text
Article -
3893
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
3894
Digital three-stage recursive-separable image processing filter with variable sizes of scanning multielement aperture
Published 2024-12-01“…The study established that the processing time of a test image using the developed filter is on average 5 times less than the time taken by the classical two-dimensional convolution algorithm. The optimal coefficients for magnifying the central element and raising the positive part of the aperture of a digital filter were determined, enabling the efficiency of its use to be enabled.Conclusions. …”
Get full text
Article -
3895
Hybrid A*-Guided Model Predictive Path Integral Control for Robust Navigation in Rough Terrains
Published 2025-02-01“…These computed paths are then used to define the mean control input for the MPPI algorithm, which performs localized optimization while adhering to the terrain-aware trajectory. …”
Get full text
Article -
3896
Obstacle Avoidance Control of Autonomous Undersea Vehicle Based on DVFH+ in Ocean Current Environment
Published 2025-02-01“…Additionally, by considering the drift angle compensation in the real ocean current environment, the obstacle avoidance algorithm was optimized to improve its robustness and adaptability. …”
Get full text
Article -
3897
Comparative Analysis of Bio-Inspired Enhancement Techniques for Localization in 2D Wireless Sensor Networks
Published 2025-07-01“…This study conducts a comparative evaluation of three bio-inspired optimization algorithms for node localization: Particle Swarm Optimization (PSO), Fruit Fly Optimization Algorithm (FOA), and Drop Mongoose Optimization Algorithm (DMOA). …”
Get full text
Article -
3898
Evaluation of Multi-Class Classification Performance Lung Cancer Through K-NN and SVM Approach
Published 2025-04-01“…Therefore, the results show that the SVM algorithm is superior to the KNN algorithm. The KNN and SVM methods were implemented for multi-class classification of lung cancer, allowing identification of various subtypes of lung cancer with optimal accuracy.…”
Get full text
Article -
3899
New design paradigm for federated edge learning towards 6G:task-oriented resource management strategies
Published 2022-06-01“…To this end, it is necessary to model the total training time minimization problem, optimize the quantization series and bandwidth allocation, and design an alternate optimization algorithm to solve this problem. 2. …”
Get full text
Article -
3900
Research on Segmentation Experience of Music Signal Improved Based on Maximization of Negative Entropy
Published 2021-01-01“…Aiming at the problem that the separation performance of the negative entropy maximization method depends on the selection of the initial matrix, the Newton downhill method is used instead of the Newton iteration method as the optimization algorithm to find the optimal matrix. By changing the descending factor, the objective function shows a downward trend, and the dependence of the algorithm on the initial value is reduced. …”
Get full text
Article