-
4021
Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments
Published 2024-12-01“…User selection is accomplished through robust Deep Reinforcement Learning with the Tabu Search (DRL-TS) algorithm, while channel selection is optimized through rigorous training employing Proximal Policy Optimization (PPO). …”
Get full text
Article -
4022
A Lightweight, Intelligent Autonomous Exploration System for Indoor Robots Using Improved Random Walk With Back-Off Strategies
Published 2025-01-01“…The algorithm maintained a reliable average localization error of 0.005 m while exhibiting memory efficiency by the reduced memory usage by up to 13.7% relative to TB3. …”
Get full text
Article -
4023
A Hybrid Dynamic Path-Planning Method for Obstacle Avoidance in Unmanned Aerial Vehicle-Based Power Inspection
Published 2025-01-01“…Simulation results show that, compared to traditional algorithms, the proposed method achieves an 8% to 12% optimization in path length, more than 50% in node optimization, and over 95% in planning time optimization. …”
Get full text
Article -
4024
Energy efficient control of indoor environments under time-varying multi-parameter uncertainty
Published 2024-12-01“…Prioritized experience replay (PER) in DDPG is used to rationally and optimally control the power of the equipment for indoor air quality (IAQ) and thermal comfort. …”
Get full text
Article -
4025
A Method for Efficient Task Assignment Based on the Satisfaction Degree of Knowledge
Published 2020-01-01“…Considering the uncertain factors associated with the whole R&D process, the task assignment model component serves as a robust optimization model to assign tasks. …”
Get full text
Article -
4026
Three-Dimensional in Vivo Imaging of Green Fluorescent Protein-Expressing T Cells in Mice with Noncontact Fluorescence Molecular Tomography
Published 2007-03-01“…Given that optical tomography is capable of quantitatively imaging the distribution of several important chromophores and fluorophores in vivo, there has been a great deal of interest in developing optical imaging systems with increased numbers of measurements under optimal experimental conditions. In this article, we present a novel system that enables three-dimensional imaging of fluorescent probes in whole animals using a noncontact setup, in parallel with a three-dimensional surface reconstruction algorithm. …”
Get full text
Article -
4027
A Novel Nonlinear Adaptive Control Method for Longitudinal Speed Control for Four-Independent-Wheel Autonomous Vehicles
Published 2024-11-01“…Based on the design of the upper controller, an innovative optimized longitudinal force distribution strategy and the construction of a tire reverse longitudinal slip model are proposed, followed by the design of a fuzzy PID controller as the lower slip ratio controller to achieve precise whole-vehicle longitudinal speed tracking and improve overall control performance. …”
Get full text
Article -
4028
Unmanned aerial vehicle field sampling and antenna pattern reconstruction using Bayesian compressed sensing
Published 2019-06-01“…Performing onsite measurements by scanning the whole 4π [sr] solid angle around the antenna under test (AUT) is more complicated. …”
Get full text
Article -
4029
Online Autonomous Motion Control of Communication-Relay UAV with Channel Prediction in Dynamic Urban Environments
Published 2024-12-01“…The method mainly consists of two parts: wireless channel parameter estimation and optimal relay position search. Considering that in practical applications, the radio frequency (RF) channel parameters in complex urban environments are difficult to obtain in advance and are constantly changing, an estimation algorithm based on Gaussian process learning is proposed for online evaluation of the wireless channel parameters near the current position of the UAV; for the optimal relay position search problem, in order to improve the real-time performance of the method, a line search algorithm and a general gradient-based algorithm are proposed, which are used for point-to-point communication and multi-node communication scenarios, respectively, reducing the two-dimensional search to a one-dimensional search, and the stability proof and convergence conditions of the algorithm are given. …”
Get full text
Article -
4030
Weighted Hybrid Random Forest Model for Significant Feature prediction in Alzheimer’s Disease Stages
Published 2025-03-01“…Thus, the proposed Weighted Hybrid Random Forest algorithm (WHBM) utilized the 63 features that comprise the whole brain volume. …”
Get full text
Article -
4031
Research on Automotive Radar Mutual Interference Mitigation Method based on V2X Communication Assistance
Published 2025-02-01“…To solve mixed integer nonlinear programming optimization problems, Q-learning algorithm is introduced. …”
Get full text
Article -
4032
Blood Scattering Model for Pulsed Doppler
Published 2014-09-01“…Generated data are used for optimization and validation of Doppler signals processing algorithms. …”
Get full text
Article -
4033
A global object-oriented dynamic network for low-altitude remote sensing object detection
Published 2025-05-01“…This study introduces the Global Object-Oriented Dynamic Network (GOOD-Net) algorithm, comprising three fundamental components: an object-oriented, dynamically adaptive backbone network; a neck network designed to optimize the utilization of global information; and a task-specific processing head augmented for detailed feature refinement. …”
Get full text
Article -
4034
Synthesizing Sum and Difference Patterns with Low Complexity Feeding Network by Sharing Element Excitations
Published 2017-01-01“…Unlike the standard optimization approaches such as genetic algorithm (GA), the described algorithm performs repeatedly deterministic transformations on the initial field until the prescribed requirements are satisfied. …”
Get full text
Article -
4035
Distributed Formation Control with Obstacle and Collision Avoidance for Hypersonic Gliding Vehicles Subject to Multiple Constraints
Published 2023-01-01“…The actual control input solver adopts a feasible solution process to calculate the actual control signals while dealing with constraints. Finally, extensive numerical simulations are implemented to unveil the proposed algorithm’s performance and superiority.…”
Get full text
Article -
4036
Robust sparse smooth principal component analysis for face reconstruction and recognition.
Published 2025-01-01“…Consequently, the proposed RSSPCA algorithm generally outperforms existing algorithms in face reconstruction and recognition. …”
Get full text
Article -
4037
Stratified Object-Oriented Image Classification Based on Remote Sensing Image Scene Division
Published 2018-01-01“…This method firstly uses middle semantic which can reflect an image’s visual complexity to classify the remote sensing image into different scenes, and then within each scene, an improved grid search algorithm is employed to optimize the segmentation result of each scene, so that the optimal scale can be utmostly adopted for each scene. …”
Get full text
Article -
4038
High resolution satellite imaging 0.5U-size freeform telescope for CubeSat
Published 2025-03-01“…The proposed design algorithm proved to be computationally efficient. It enabled to obtain the excellent imaging of the designed telescope, which from mathematical perspective becomes a challenging multi-variable optimization task, unattainable with the standard optimization procedures included in the commercial optical design software.…”
Get full text
Article -
4039
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
4040
Efficient multiplication for finite fields of p characteristic
Published 2009-01-01“…Based on residue arithmetic,a new form of polynomial named PAPB in Fp[x] had been constructed.The amount and distribution of such irreducible polynomials had also been investigated.Then,an efficient algorithm for multiplication modulo PAPB had been proposed using residue arithmetic and Chinese remainder theorem.In the end,the result analysis was given.The theoretic analysis and simulation experiment show that for some finite field of medium prime characteristic,the given algorithm only costs O(k1.5) operations in Fp while the multiplication modulo irreducible binomial cost O(k2) operations,which shows a better performance.As a result,the work presents an interesting perspective for optimal extension field and elliptic curve cryptography.…”
Get full text
Article