-
4221
Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments
Published 2024-12-01“…User selection is accomplished through robust Deep Reinforcement Learning with the Tabu Search (DRL-TS) algorithm, while channel selection is optimized through rigorous training employing Proximal Policy Optimization (PPO). …”
Get full text
Article -
4222
A Hybrid Dynamic Path-Planning Method for Obstacle Avoidance in Unmanned Aerial Vehicle-Based Power Inspection
Published 2025-01-01“…Simulation results show that, compared to traditional algorithms, the proposed method achieves an 8% to 12% optimization in path length, more than 50% in node optimization, and over 95% in planning time optimization. …”
Get full text
Article -
4223
Bayesian Q-learning in multi-objective reward model for homophobic and transphobic text classification in low-resource languages: A hypothesis testing framework in multi-objective...
Published 2025-06-01“…Most Reinforcement Learning (RL) algorithms optimize a single-objective function, whereas real-world decision-making involves multiple aspects. …”
Get full text
Article -
4224
Adaptive dimensionality reduction for neural network-based online principal component analysis.
Published 2021-01-01“…While the continuous update of the principal components is widely studied, the available algorithms for dimensionality adjustment are limited to an increment of one in neural network-based and incremental PCA. …”
Get full text
Article -
4225
A Centralized Multi-Agent DRL-Based Trajectory Control Strategy for Unmanned Aerial Vehicle-Enabled Wireless Communications
Published 2024-01-01“…The trajectory of the aerial base stations is then continuously adjusted through a centralized multi-agent deep reinforcement learning algorithm to optimize communication performance. We evaluated our proposed system using real channel measurement data, i.e., amplitude and phase signal information. …”
Get full text
Article -
4226
Local Search-Based Metaheuristic Methods for the Solid Waste Collection Problem
Published 2023-01-01“…The routing solver in the Google OR-tools solver is utilised with three well-known metaheuristic methods for neighbourhood exploration: a guided local search (GLS), a tabu search (TS), and simulated annealing (SA), with two initialisation strategies, Clarke and Wright’s algorithm and the nearest neighbour algorithm. Results showed that optimal solutions are found in faster computational times than using only an IP solver, especially for large instances. …”
Get full text
Article -
4227
Research on the cooperative offloading strategy of sensory data based on delay and energy constraints
Published 2023-03-01“…The edge offloading of the internet of things (IoT) sensing data was investigated.Multiple edge servers cooperatively offload all or part of the sensing data initially sent to the cloud center, which protects data privacy and improves user experience.In the process of cooperative offloading, the transmission of the sensing data and the information exchange among edge servers will consume system resources, resulting in the cost of cooperation.How to maximize the offloading ratio of the sensing data while maintaining a low collaboration cost is a challenging problem.A joint optimization problem of sensing data offload ratio and cooperative scale satisfying the constraints of network delay and system energy consumption was formulated.Subsequently, a distributed alternating direction method of multipliers (ADMM) via constraint projection and variable splitting was proposed to solve the problem.Finally, simulation experiments were carried out on MATLAB.Numerical results show that the proposed method improved the network delay and energy consumption compared to the fairness cooperation algorithm (FCA), the distributed optimization algorithm (DOA), and multi-subtasks-to-multi-servers offloading scheme (MTMS) algorithm.…”
Get full text
Article -
4228
A Time- and Space-Integrated Expansion Planning Method for AC/DC Hybrid Distribution Networks
Published 2025-04-01“…A modified graph attention network (MGAT)-based deep reinforcement learning (DRL) algorithm is used for optimization, balancing economic and reliability objectives. …”
Get full text
Article -
4229
Utilizing weak graph for edge consolidation-based efficient enhancement of network robustness
Published 2025-05-01“…We compare the proposed algorithm with optimal and approximate algorithms across graphs of varying scales. …”
Get full text
Article -
4230
Zynq FPGA-Based Acceleration of Kernelized Correlation Filters via High-Level Synthesis of a Custom DFT Block
Published 2024-04-01“…Within this framework, a custom combined DFT and inverse DFT IP, named CDFT, is developed and optimized on the Programmable Logic (PL) side of the Xilinx ZCU102 FPGA, whereas the rest of the KCF algorithm is run with customized Petalinux build on the (Processing System) side. …”
Get full text
Article -
4231
Predictive model for determining the indications for automated 3D ultrasound for screening patients at low risk of developing breast tumors
Published 2024-06-01“…The developed algorithms will help optimize screening and referral for additional examinations, which is of practical importance for improving diagnostics and optimizing healthcare resources.…”
Get full text
Article -
4232
FUR-DETR: A Lightweight Detection Model for Fixed-Wing UAV Recovery
Published 2025-05-01“…Finally, a wavelet frequency–domain-optimized reverse feature fusion mechanism (WT-FORM) is proposed. …”
Get full text
Article -
4233
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
4234
Learned Shrinkage Approach for Low-Dose Reconstruction in Computed Tomography
Published 2013-01-01“…Our numerical simulations indicate that the proposed algorithm can manage well with noisy measurements, allowing a dose reduction by a factor of 4, while reducing noise and streak artifacts in the FBP reconstruction, comparable to the performance of a statistically based iterative algorithm.…”
Get full text
Article -
4235
WSNs data acquisition by combining expected network coverage and clustered compressed sensing.
Published 2025-01-01“…Combined with an optimized network coverage algorithm, a node scheduling strategy is introduced to focus on critical observation areas while minimizing overall energy consumption. …”
Get full text
Article -
4236
High resolution satellite imaging 0.5U-size freeform telescope for CubeSat
Published 2025-03-01“…The proposed design algorithm proved to be computationally efficient. It enabled to obtain the excellent imaging of the designed telescope, which from mathematical perspective becomes a challenging multi-variable optimization task, unattainable with the standard optimization procedures included in the commercial optical design software.…”
Get full text
Article -
4237
Mortality prediction of heart transplantation using machine learning models: a systematic review and meta-analysis
Published 2025-04-01“…Among the algorithms, CatBoost demonstrated the highest accuracy (AUC 0.80, 95% CI: 0.74, 0.86), while K-nearest neighbor had the lowest accuracy (AUC 0.53, 95% CI: 0.50, 0.55). …”
Get full text
Article -
4238
Research on Automotive Radar Mutual Interference Mitigation Method based on V2X Communication Assistance
Published 2025-02-01“…To solve mixed integer nonlinear programming optimization problems, Q-learning algorithm is introduced. …”
Get full text
Article -
4239
Online Autonomous Motion Control of Communication-Relay UAV with Channel Prediction in Dynamic Urban Environments
Published 2024-12-01“…The method mainly consists of two parts: wireless channel parameter estimation and optimal relay position search. Considering that in practical applications, the radio frequency (RF) channel parameters in complex urban environments are difficult to obtain in advance and are constantly changing, an estimation algorithm based on Gaussian process learning is proposed for online evaluation of the wireless channel parameters near the current position of the UAV; for the optimal relay position search problem, in order to improve the real-time performance of the method, a line search algorithm and a general gradient-based algorithm are proposed, which are used for point-to-point communication and multi-node communication scenarios, respectively, reducing the two-dimensional search to a one-dimensional search, and the stability proof and convergence conditions of the algorithm are given. …”
Get full text
Article -
4240
DLML-PC: an automated deep learning and metric learning approach for precise soybean pod classification and counting in intact plants
Published 2025-07-01“…After 200 epochs, the recognition results of various object detection algorithms were compared to obtain the optimal model. …”
Get full text
Article